Tag Archive for Terrorism

U.S. State Department OSAC Cell Phone Video Surveillance Warning

On December 15, 2009, the City of London Police released film footage of hostile reconnaissance conducted in July 2008 by an Algerian national (Subject 1). Subject 1 was stopped by two alert police officers who saw him using his cell phone camera to record video inside Liverpool Street Station in London. When the police officers examined the footage they found 90 minutes of video recording of various sites in and around London and several UK cities to include Tube and mainline rail stations, shopping areas, bars, and restaurants. His detention and the follow-up investigation led to the arrest of Subject 1’s brother (Subject 2) and a third Algerian male (Subject 3). British authorities also looked at 30 other individuals and recovered extremist material supporting al-Qa’ida in the Islamic Maghreb in one residence. Police believe the two brothers may have been fundraising and conducting surveillance for a future terrorist operation.

New York Office of Homeland Security Post 9-11 Terrorist Training Infrastructure Report

Until shortly after 9/11, when the U.S. military launched an invasion intended to destroy Al Qaeda’s infrastructure and sanctuary, the vast majority of the terror network’s training camps were located in Afghanistan. According to the 9/11 Commission, between 1996 and 2001, a total of 10,000 to 20,000 individuals trained for jihad at camps such as Al-Farooq, Khalden, and Derunta. Other sources, such as former Senator Bob Graham, cite an estimate from the CIA’s Counterterrorism Center that, in fact, between 70,000 and 120,000 passed through Al Qaeda’s Afghan camps. A significant number of those attendees were Western citizens. For example, open sources report that in January 2002, British military intelligence discovered the names of 1,200 British citizens who trained with Al Qaeda in Afghanistan. U.S citizens, such as Jose Padilla, John Walker Lindh, and the Lackawanna Six, also traveled to Afghanistan for training.

You May Be a Terrorist

Did you know? You might be a terrorist. You probably didn’t know that. In fact, you probably don’t think about terrorism much. However, there are a large amount of people at the Department of Homeland Security, the Federal Bureau of Investigation, and a variety of law enforcement agencies all around the country that do think about it, a lot. It is, in many respects, their job to think about it. Yet, the ever-expanding search for potential activities and indicators of terrorist activity has become emblematic of the overreaching and obsessive nature of efforts to combat terrorism in the United States. Departing more and more from rational depictions of truly suspicious activity, the criteria listed in law enforcement reports as indicating criminal or terrorist activity have become so expansive as to include many ubiquitous, everyday activities. The following list demonstrates the extent of “suspicious activity reporting” by listing a number of criteria which are said to indicate criminal or terrorist activity.

(U//FOUO/LES) Federal Bureau of Prisons Counter-Terrorism Unit Inmate Spying Reports

The following documents contain analysis of the monitoring of communications made by inmates convicted of offenses related to domestic and international terrorism. Many of the inmates are housed at the Communications Management Units in Terre Haute, Indiana (THA CMU) or Marion, Illinois (MAR CMU). These secretive units have been described by inmates as “Little Guantanamo” due to their unusual construction and treatment of detainees, severely restricting access to the public and media. For background information, see the June 25, 2009 Democracy Now interview with Andrew Stepanian, an animal rights activist imprisoned at one of the Communications Management Units.

(U//FOUO) TSA Pipeline Threat Assessment

(U//FOUO) The Transportation Security Administration’s (TSA) mission includes enhancing the security preparedness of our nation’s hazardous liquid and natural gas pipeline systems. This 2008 threat assessment addresses terrorist attacks against oil and gas pipeline facilities overseas and considers the potential for attacks against the oil and gas pipeline industry in the United States. Pipelines are a mode of transportation with distinct characteristics and security requirements. Pipelines operate in all 50 states and transport more than two-thirds of all petroleum products, including gasoline, diesel and jet fuel, home heating oil, kerosene, and propane. Natural gas transmission and distribution pipelines transport natural gas from sources to residential, commercial, and industrial customers. Hazardous liquid pipelines transport crude oil to refineries and refined oil products to product terminals and airports. America depends daily on its pipelines to meet its oil and gas requirements.

(U//FOUO) DHS Mubtakar Improvised Cyanide Gas Device Warning

(U//FOUO) Terrorists have shown considerable interest in an improvised chemical device called the mubtakar, which is designed to release lethal quantities of hydrogen cyanide, cyanogen chloride, and chlorine gases. One or more devices could be used in attacks in enclosed spaces, such as restaurants, theaters, or train cars. The mubtakar is small and could be transported in a bag or box, or assembled at the attack site. DHS and FBI encourage recipients of this document to report information about suspicious devices and the acquisition or possession of mubtakar precursor chemicals or components (see figures for details) to the nearest state and local fusion center and to the local FBI Joint Terrorism Task Force.

(U//FOUO) DHS Small-Scale Toxin and Poison Attack Warning

(U//FOUO) Terrorists continue to express broad interest in toxins and poisons that could be used to contaminate food or water supplies, or spread through skin contact. Widely circulated terrorist manuals contain instructions for mixing toxins and poisons with skin penetrating enhancers such as oils, lotions, and other ointments. Other possible methods of delivery include adding toxins or poisons to beverages, fruits, vegetables, or other foods. Most toxins and poisons mentioned in terrorist manuals are more suitable for assassinations and small-scale attacks than for mass casualty attacks, but terrorists might calculate that a coordinated series of simultaneous small attacks could produce comparable casualties and widespread public fear, as well as erode consumer confidence.

(SSI) DHS-CBP-TSA Terrorist Watchlist Screening Implementation User’s Guide

The Department of Homeland Security (DHS) merges the capability to anticipate, preempt, and deter threats to the homeland whenever possible through its component agencies. Under the guidance of its Screening Coordination Office, DHS directed U.S. Customs and Border Protection (CBP) and the Transportation Security Administration (TSA) to combine the Advance Passenger Information System (APIS) Pre-Departure and Secure Flight concepts and systems to provide “One DHS Solution” to the commercial aviation industry consistent with applicable authorities and statutes.

Terrorism Liaison Officer (TLO) Program

The Terrorism Liaison Officer (TLO) is designed to be a nationally interconnected program of designated law enforcement officers, firefighters, military, and other first responders that attend an approved and accredited course of instruction. This shared learning experience prepares the TLOs to fill a specific role within their organization as a link or “liaison.” The TLO program was initiated in California via the Commission on Peace Officer Standards and Training (POST) around 2005-2006 by a Anthony Lukin. According to several proposals for the program, Fusion Centers in California “utilize the Terrorism Liaison Officer (TLO) Program to foster communication and collaboration amongst the fire service; law enforcement; the federal homeland security and intelligence communities and public safety stakeholders. The TLOs serve as the conduit through which homeland security and crime-related information flows from the field to the Fusion Center for assessment and analysis. The network also serves as the vehicle to carry actionable intelligence from the Fusion Center to field personnel. This information flow provides for increased safety and security for fire department personnel as well as the communities served.”

FBI Takes Down 73,000 Blogs Over Al-Qaeda Magazine

Earlier this week, the owner of a Wordpress-based blogging platform Blogetery.com was informed by the site’s hosting provider Burst.net that their servers had been deactivated following a request from the Federal Bureau of Investigation. Although preliminary reports attributed this takedown to copyrighted content, it has since been discovered that the removal was due to “terrorist materials”. A press release from BurstNet explains “Upon review, Burst.net determined that the posted material, in addition to potentially inciting dangerous activities, specifically violated the BurstNet Acceptable Use Policy. This policy strictly prohibits the posting of ‘terrorist propaganda, racist material, or bomb/weapon instructions’. Due to this violation and the fact that the site had a history of previous abuse, BurstNet elected to immediately disable the system.” Burst.net later posted comments to a forum indicating that they would not allow the customer access to his data. “We cannot give him his data nor can we provide any other details. By stating this, most would recognize that something serious is afoot.”

(U//FOUO) DHS Homeland Terrorist Threat Reporting Guide

This Terrorist Threats to the U.S. Homeland Reporting Guide (TTRG) was jointly produced by the Federal Bureau of Investigation (FBI) and the Department of Homeland Security (DHS). The purpose of this document is to leverage the vast information collection and reporting resources of our state, local and tribal law enforcement partners, as well as other first responder partners, in recognizing activities or conditions that may be indicative of terrorist activity. State and local organizations are on the front line in the war against terror and therefore have a critical role as primary sources of information. Timely and relevant information from the “front lines” is critical to the identification of terrorists and their supporters, development of insights into their plans and intentions, and subsequent disruption of their operations.

Regional Organized Crime Information Center Terrorist Indicators Guide

ANALYSIS of terrorist preparations for past attacks overseas and in the United States suggests that preoperational indicators may be present in the days or weeks prior to an attack. Indicators may point to possible terrorist planning. Alone, an indicator can result from legitimate commercial activity or criminal activity not related to terrorism; however, multiple indicators can suggest a terrorist threat.

Canada Terrorist Attack Tactics Against Bridges and Tunnels: January 2002 – December 2008

Canada has many large bridges and tunnels, including 24 international vehicular bridges and tunnels linking Canada and the United States – specifically to the states of Maine, Vermont, New York, Michigan and Minnesota. Fourteen of these bridges and tunnels are in Ontario, nine are in New Brunswick, and one is in Quebec. As well, there are nine international railway bridges and tunnels – eight in Ontario, with another one in New Brunswick. Damage to one or more of these structures would cause short to medium-term traffic congestion at the border, and would hurt the economy of both countries.

NYPD Brief: Attack on Police and ISI Offices in Lahore, Pakistan, May 27, 2009

Summary
•On 5/27/09 at least four gunmen opened fire and set off of a car bomb between police and intelligence buildings in Lahore, Pakistan.
•Latest reports indicate that at least 23 people are dead, and hundreds wounded.
•Two suspects were taken into custody, but were later released.
•There have been no claims of responsibility, but the attack is assessed to be a response to the Pakistani army’s offensive in the Swat Valley.

Al Qaeda and Affiliates: Historical Perspective, Global Presence, and Implications for U.S. Policy

Al Qaeda (AQ) has evolved into a significantly different terrorist organization than the one that perpetrated the September 11, 2001, attacks. At the time, Al Qaeda was composed mostly of a core cadre of veterans of the Afghan insurgency against the Soviets, with a centralized leadership structure, made up mostly of Egyptians. Most of the organization’s plots either emanated from the top or were approved by the leadership. Some analysts describe pre-9/11 Al Qaeda as akin to a corporation, with Osama Bin Laden acting as an agile Chief Executive Officer issuing orders and soliciting ideas from subordinates.

FBI Terrorism Quick Reference Card

First responding officers should be aware of suspicious factors that may indicate a possible terrorist threat. These factors should be considered collectively in assessing a possible threat. This quick reference guide is intended to provide practical information for line officers but may not encompass every threat or circumstance. State and local law enforcement may contact their local FBI field office or resident agency for additional assistance.

NYPD Threat Analysis September 17, 2008 U.S. Embassy Attack in Yemen

Summary
•The U.S. Embassy in Yemen was attacked on the morning of September 17th, 2008
•Six attackers in two vehicles, both of which were VBIEDs, attacked the front gate of the embassy
•The attack resulted in 16 deaths, a toll that includes all six attackers
•No Americans were killed, and there was no reported damage to the embassy buildings
•A group calling itself Islamic Jihad in Yemen claimed responsibility for the attack
•This is the largest attack in Yemen in the last few years, as al-Qaeda is reportedly undergoing a resurgence in that country

Model Procedures for Responding to a Package with Suspicion of a Biological Threat

Local and world events have placed the nation’s emergency service at the forefront of homeland defense. The service must be aware that terrorists, both foreign and domestic, are continually testing the homeland defense system. In October 2001, a person or persons contaminated the U.S. mail stream with anthrax, resulting in illness and death. The potential threat of similar attacks continues, and the authorities continue to be called in to assess hoaxes and suspect materials. No community is immune from the threat. To protect the health and safety of the public, and to help deal with hoaxes and suspicious materials, clear procedures for assessing and managing biological threats are imperative.