This Joint Threat Assessment (JTA) addresses threats to the 2017 Presidential Address to a Joint Session of Congress (the Presidential Address) at the US Capitol Building in Washington, DC, on 28 February 2017. This assessment does not consider nonviolent civil disobedience tactics (for example, protests without a permit) that are outside the scope of federal law enforcement jurisdiction; however, civil disobedience tactics designed to cause a hazard to public safety and/or law enforcement fall within the scope of this assessment.
Department of Homeland Security, Federal Bureau of Investigation, Intelligence Fusion Centers, U.S. Secret Service
We have no specific or credible information indicating a threat to the US Capitol or the National Capital Region (NCR) to coincide with the 2012 State of the Union address. We assess, however, that al-Qa‘ida and its affiliates and allies remain committed to attacking the Homeland and, as of February 2010, al-Qa‘ida identified the NCR and the State of the Union address itself as important targets, presumably for attacks. Moreover, homegrown violent extremists (HVEs) as well as lone offenders could view the event as an attractive target, offering the means to inflict casualties and garner extensive media coverage. Detecting homeland plots involving HVEs and lone offenders continues to challenge law enforcement and intelligence agencies due to the operational independence of the perpetrators, which can reduce or eliminate preoperational indicators.
The Silicon Valley High Technology Task Force, also known as the Rapid Enforcement Allied Computer Team (REACT), is a partnership of 17 local, state, and federal agencies, with the Santa Clara County District Attorney’s Office designated as the lead agency. The REACT Task Force is one of five in the State of California and authorized under California Penal Code 13848. All Agents of the React Task Force are either California Peace Officers and/or U.S. Federal Agents.
U.S. Secret Service manual on best practices For seizing electronic evidence, October 9, 2006.
Listings of U.S. electronic crime statutes by state, taken from copies that are issued to Forward Edge 2, a U.S. Secret Service interactive, computer-based training program which “takes the next step” in training law enforcement officers to conduct electronic crime investigations.
To whom it may concern,
Please take this e-mail as an official request to remove the above listed posting as well as the five .pdf files and the zip file containing the five separate files. These items are marked as law enforcement sensitive and were not intended for non LEO consumption. The original source of your information did not have the authority to post these documents on a publicly available server and removed access to them immediately after being requested to do so. Please respond to this e-mail as to your intentions in this matter. I appreciate your assistance.
The Network Intrusion Responder Program (NITRO) was designed by the U.S. Secret Service’s National Computer Forensics Institute to introduce law enforcement officers to basic network intrusion investigation techniques.
THE U.S. SECRET SERVICE
Investigates . . .
Fraud involving U.S. financial obligations and securities
Crimes affecting other federally insured financial institutions
Threats against the President & other government officials
Access Device fraud