Tag Archive for Fusion Centers

(U//FOUO) Maryland Fusion Center Implications of Death of Osama bin Laden

The Intelligence Community (IC) assesses the death of al-Qa’ida (AQ) leader Usama Bin Laden could result in retaliatory attacks in the Homeland and against U.S. and Western interests overseas. Attacks might originate with AQ Core elements in the Tribal Areas of Pakistan, with one of their affiliates overseas, and/or with individuals in the Homeland sympathetic to the cause but lacking a formal group association. We have no indications of advanced AQ Core plotting efforts in the Homeland, but the case of now-detained AQ operative Najibullah Zazi—who, along with two associates, planned to attack New York City subway in 2009 using homemade explosives— demonstrates that unidentified operatives could advance plotting in the Homeland.

(U//LES) LA-SAFE Geomagnetic Storm Warning

A series of coronal mass ejections (CMEs) are en route to Earth from a sunspot which will buffet the Earth’s magnetic field during the next 12 to 60 hours. These CMEs are a result of the strongest solar flare in more than four years, which peaked on February 15th and registered as an X-flare. X-flares are the strongest type of solar flare. NOAA forecasters estimate a 45% chance of geomagnetic activity on February 17, 2011. Geomagnetic storms usually last 24 to 48 hours, but some may last for many days. They also have the capability of disrupting communication systems, navigation systems and electric grids.

Fusion Center Locations Revealed

Since 9/11, the U.S. Government has engaged in a multibillion-dollar effort to construct a domestic intelligence network for the ostensible purpose of combating terrorism, criminal activity and violent extremism. One of the central components of this system is the network of “fusion centers” that have sprung up around the country over the last several years. These entities integrate local law enforcement with a state’s police force, Department of Justice, or Office of Emergency Management and are designed to facilitate law enforcement intelligence activities throughout the jurisdiction, providing federal authorities access to local information and databases, while simultaneously allowing federal agencies to disseminate classified intelligence materials to local authorities. There are almost always federal representatives present in local fusion centers and Secretary Napolitano has recently testified that DHS is “committed to having an officer in each fusion center.” Most fusion centers also work with representatives of the private sector, particularly those industries related to so-called “critical infrastructure and key resources.”

(U//FOUO) Washington D.C. Fusion Center: The Perils of Social Networking

In a the New York State court, a NYPD officer was questioned by the defense attorney regarding statements he had posted on his Facebook webpage that portrayed him as a rogue cop. At the conclusion of his testimony, what should have been a slam-dunk “ex-con with a gun” case, resulted in an acquittal for the defendant because of the reasonable doubt created by the officer’s own postings on Facebook and MySpace. In other words, his own website statements were used to impeach him. Convictions rest on the credibility of the officer(s). The defense strategy was to show the jury that what the officer writes about himself on social network websites is how he “really” conducts police work. The suspect in this case claimed that the officer used excessive force on him and broke three ribs. The suspect went on to allege that when the police officer realized that he would have to explain the broken ribs, he “planted” a stolen 9mm Beretta on the suspect and charged him with the offense.

Federal Highway Administration Fusion Center Information Sharing Guidebook

This guidebook provides an overview of the mission and functions of transportation management centers, emergency operations centers, and fusion centers. The guidebook focuses on the types of information these centers produce and manage and how the sharing of such information among the centers can be beneficial to both the day-to-day and emergency operations of all the centers. Challenges exist to the ability to share information, and the guidebook addresses these challenges and options for handling them. The guidebook also provides some lessons learned and best practices identified from a literature search and interviews/site visits with center operators.

(U//FOUO/LES) Maryland Fusion Center Incendiary Device Warning

The Maryland Coordination and Analysis Center (MCAC) reports two potential incendiary devices have activated at state government buildings in Annapolis and Hanover, MD. The first device activated in the Jeffery Building’s mailroom at 16 Francis St, Annapolis; which hosts the offices of the Maryland Secretary of State and the Governor’s Office of Homeland Security. The second device activated at Maryland Department of Transportation (MDOT) headquarters in Hanover, MD.

(U//FOUO) Colorado Information Analysis Center Fake Health Inspectors Warning

On 29 October the Colorado Information Analysis Center received notification from Tri-County Health Department regarding several instances of an individual posing as a health inspector. An individual posing as a “Health Department” inspector has called businesses in Adams, Arapahoe, Douglas, and Larimer counties to set up a meeting to inspect their facilities. However, once scheduled the individual does not show up. The CIAC is aware of similar incidents in Orange County, CA in June 2010. Although Orange County does not use the 760 area code seen in the above incidents, it is possible that these similar reports indicate a trend that crosses state lines. The “inspectors” in Orange County used the same MO as in the Colorado cases. In other states, these types of imposters have extorted money from food facility operators, although this type of activity has not been reported in Colorado.

(U//FOUO) Colorado Information Analysis Center Smartphone Security Bulletin

Smartphones feature an diverse array of computer capabilities which expose them to many of the vulnerabilities previously confined to computers. These threats have evolved from targeting personal computers (PCs) to hitting smartphones much quicker than some security experts anticipated. It took almost fifteen years for these types of attacks to evolve for PCs, but these attacks have been adapted for smartphones much more quickly. The malicious software (malware) currently targeting smartphones attempts to gather personal information stored on the phone and sell it. Since users often store more of this type of information on smartphones than PCs, in some cases it has become more profitable for hackers to create malware for smartphones than PCs.

Florida Fusion Center Monitored BP Protests, Ron Paul Events, Code Pink

Several restricted documents produced by the Central Florida Intelligence Exchange (CFIX) and obtained by Public Intelligence indicate that a variety of protests and political events are monitored by the regional fusion center for potential threats and violent activity. These events span the political spectrum from a summit hosted by Ron Paul’s Campaign for Liberty to anti-war protests conducted by Code Pink and Veterans for Peace. While the documents make no mention of specific threats arising from the events, they do indicate that the fusion center monitors political action in a variety of forms and sometimes requests law enforcement officers to report on constitutionally-protected activities.

(SBU) Central Florida Intelligence Exchange Domestic Security Intelligence Report August 2010

On 13-15 August 2010, the Campaign for Liberty will be holding their second annual Florida Liberty Summit at the Rosen Center Hotel in Orlando, Florida. The Campaign for Liberty is a political organization founded by Congressman Ron Raul. The website for the event states it is a way for “liberty minded activists…to network, learn, and build as our grassroots Revolution to reclaim our Republic and restore our Constitution”. During the 2009 Florida Liberty Summit the start of the program had to be postponed for 30 minutes due to International Drive being backed up with attendees attempting to park. Based on the groups calculations, there was around 1500 people in attendance. Although the attendance numbers on the group sites promoting this year’s event are low, the continued support of Ron Paul and his party may produce similar attendance numbers and issues to that of the 2009 event.

(U//FOUO) Michigan Fusion Center: Soldier Uses Military Disguise to Enter Sporting Event

An athletic facility reported an illegal entry incident during a sporting event on 9, October 2010. The subject arrived at the facility in a military Humvee, wearing a full military formal dress uniform, just prior to the start of the event. The subject advised event security personnel that he was there as part of the game day military Honor Guard, and requested to park the Humvee in the secured parking area reserved for police vehicles. The individual was allowed access at several points and subsequently parked the Humvee in the secured lot. The individual exited the vehicle and retrieved two military M-16 rifles with bayonets from the Humvee.

California State Terrorism Threat Assessment System (STTAS) Concept of Operations

This Concept of Operations (CONOPS) provides California law enforcement and other agencies ensuring the security of our state, a primer on the State Terrorism Threat Assessment System (STTAS). This includes an overview of the California Joint Regional Information Exchange System (CAL JRIES), the state’s principal, real-time information sharing communication platform. Homeland security stakeholders will substantively influence the ongoing evolution of this CONOPS as enhancement cycles inevitably refine California’s response to terrorist and other homeland security threats.

Oracle Intelligence Fusion Center Technology White Paper

State and local law enforcement agencies are engaged in the day-to-day business of fighting crime and terrorism. A federal government, post event analysis concluded that sufficient information existed such that law enforcement officials could have intercepted the terrorists that flew aircraft into the World Trade Center. This “connecting-the-dots” philosophy relies heavily on real-time information integrated into a single comprehensive 360 view of the environment. The development and funding of intelligence fusion centers is a direct result of a need for better, more integrated information about suspects, locations, and conveyances that may be used in the planning or commission of a crime, including a terrorist act. The concept of the fusion center as an all source production of criminal and intelligence information is a good one. The weakness in the approach is the over reliance upon individuals staffing the fusion centers. In any business, labor costs are one of the biggest burdens to the profitability of the business. While current technology cannot replace the human brains ability for abstract thought and analysis, technology can provide methods and means for the collection, integration, analysis, and dissemination of all source intelligence to enhance fusion center operational efficiencies.

(U//FOUO) New York CrossFIRE Radio Theft Report

Fire Departments in Warren and Washington County have recently reported thefts of communications equipment
• Thefts include portable and mobile radios, along with software capable of programming this equipment.
• Only newer model, VHF radios have been stolen. Low‐band and older model radios (which aren’t capable of narrowband) have been left untouched.
• Of particular concern: programming software has been stolen. This software could potentially be used to reprogram radios with frequencies of law enforcement agencies, Fire and EMS services, and other public and private sector organizations/businesses.

Janet Napolitano Speech to New York First Responders on “Rebuilding” Homeland Security

At the heart of this are fusion centers. Starting with just one in 2006, there are now 72 fusion centers nationwide, serving as focal points for information-sharing among federal, state, local, tribal, and territorial partners. By the end of this year, all 72 fusion centers should be able to analyze information and spot trends in order to effectively share timely intelligence – with local law enforcement, and with DHS, so the information can also be used by others within the Intelligence Community. To support this vision: we’re prioritizing fusion centers in our FY2011 grants, and looking for ways to support them through additional technology and personnel, including the deployment of highly-trained experts in critical infrastructure; we’re deploying experienced DHS analysts to every one of these centers – 64 at last count – and we won’t stop until we have them in every one; and we’re linking them together, and with DHS headquarters, through the classified Homeland Security Data Network.

(U//LES) New Jersey ROIC: Soda Bottle Bombs Warning

The NJ ROIC has been monitoring two incidents involving reactionary devices on this date, 06/27/10, one that occurred at 0100 Hours in Lakewood Twp., Ocean Co., and another that occurred at 1145 Hours in Neptune Twp., Monmouth Co. Both incidents involved reactionary devices that are being described as soda bottles (12 oz. to 2 liters) containing a strong acid or base, aluminum foil inside the container, and tape securing the bottle cap. The substances inside these bottles create a chemical reaction, which results in pressure building in the bottle. Eventually, these containers explode creating a risk to law enforcement officers and first responders. First responders should keep a distance of at least 100 feet from any of these devices as a precautionary measure.