<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>News | Public Intelligence</title>
	<atom:link href="https://publicintelligence.net/category/news/feed/" rel="self" type="application/rss+xml" />
	<link>https://publicintelligence.net</link>
	<description></description>
	<lastBuildDate>Fri, 28 Jul 2017 01:16:52 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	
	<item>
		<title>DEA Data Shows Drug Cartels Continue to &#8220;Operate and Profit&#8221; From Marijuana Sales in Legalized Markets</title>
		<link>https://publicintelligence.net/dea-drug-cartels-profit-from-legal-marijuana/</link>
		
		<dc:creator><![CDATA[Public Intelligence]]></dc:creator>
		<pubDate>Fri, 28 Jul 2017 01:16:52 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Drug Enforcement Administration]]></category>
		<category><![CDATA[El Paso Intelligence Center]]></category>
		<category><![CDATA[Legalized Marijuana]]></category>
		<category><![CDATA[Marijuana]]></category>
		<category><![CDATA[Mexican Drug Cartels]]></category>
		<guid isPermaLink="false">https://publicintelligence.net/?p=38618</guid>

					<description><![CDATA[<p>A bulletin from the El Paso Intelligence Center (EPIC) released to law enforcement in February 2017 describes how Mexican transnational criminal organizations (TCOs) are continuing to exploit legalized markets for the sale and distribution of marijuana.  In January 2016, EPIC produced a bulletin detailing how "data provided by the Drug Enforcement Administration (DEA) and open source reporting" indicated that Mexican TCOs had not been adversely affected by marijuana legalization in numerous markets, noting instead "that the effort of legalization had conversely brought new opportunities for illicit profits from marijuana sales." </p>
<p class="more-link-p">
<a class="btn btn-primary" href="https://publicintelligence.net/dea-drug-cartels-profit-from-legal-marijuana/">Read more &#8594;</a></p>
The post <a href="https://publicintelligence.net/dea-drug-cartels-profit-from-legal-marijuana/">DEA Data Shows Drug Cartels Continue to “Operate and Profit” From Marijuana Sales in Legalized Markets</a> first appeared on <a href="https://publicintelligence.net">Public Intelligence</a>.]]></description>
										<content:encoded><![CDATA[<div id="attachment_38623" style="width: 762px" class="wp-caption aligncenter"><a href="https://q.publicintelligence.net/wp-content/uploads/2017/07/legal-marijuana-co.jpg"><img fetchpriority="high" decoding="async" aria-describedby="caption-attachment-38623" class="size-large wp-image-38623" src="https://q.publicintelligence.net/wp-content/uploads/2017/07/legal-marijuana-co-1024x678.jpg" alt="" width="752" height="498" srcset="https://q.publicintelligence.net/wp-content/uploads/2017/07/legal-marijuana-co-1024x678.jpg 1024w, https://q.publicintelligence.net/wp-content/uploads/2017/07/legal-marijuana-co-300x199.jpg 300w, https://q.publicintelligence.net/wp-content/uploads/2017/07/legal-marijuana-co-768x509.jpg 768w, https://q.publicintelligence.net/wp-content/uploads/2017/07/legal-marijuana-co-150x99.jpg 150w, https://q.publicintelligence.net/wp-content/uploads/2017/07/legal-marijuana-co.jpg 2048w" sizes="(max-width: 752px) 100vw, 752px" /></a><p id="caption-attachment-38623" class="wp-caption-text">A legal marijuana grow in Colorado. Photo Brett Levin/Flickr.</p></div>
<p>A bulletin from the El Paso Intelligence Center (EPIC) released to law enforcement in February 2017 describes how Mexican transnational criminal organizations (TCOs) are continuing to exploit legalized markets in the U.S. for the sale and distribution of marijuana.  In January 2016, EPIC produced a bulletin detailing how &#8220;data provided by the Drug Enforcement Administration (DEA) and open source reporting&#8221; indicated at the time that Mexican TCOs had not been adversely affected by marijuana legalization in numerous markets, noting instead &#8220;that the effort of legalization had conversely brought new opportunities for illicit profits from marijuana sales.&#8221;  The updated February 2017 bulletin, which was <a href="https://publicintelligence.net/epic-cartels-legal-marijuana/">obtained by Public Intelligence</a>, indicates that Mexican TCOs continue to exploit the legalization of Marijuana in these areas, operating in three distinct &#8220;co-equal marijuana markets in U.S. legalized states: a legal market; an illegal market, and a black market.&#8221;</p>
<p>Based on &#8220;analytical exchanges&#8221; between DEA and Northwest High Intensity Drug Trafficking Area (HIDTA) analysts, the bulletin states that TCOs are selling illegally grown marijuana in legal markets, including to &#8220;proscribed customers, such as children.&#8221;  In black markets, TCOs are selling illegally grown marijuana at lower prices in an attempt to undercut the profit margins on legally cultivated marijuana.  In all three markets, the TCOs are &#8220;evading state tax laws&#8221; and often utilizing public lands to grow the marijuana before transporting it back to non-legalized state markets.  The bulletin provides some specific examples of diversion from legalized markets:</p>
<blockquote>
<ul>
<li>(U//DSEN) In November 2015, DEA reporting indicated that representatives of an unknown TCO were cultivating marijuana at indoor-grow houses in Colorado, and transferring marijuana to Florida, a state with strict medical marijuana requirements that ban recreational use.</li>
<li>(U//DSEN) According federal and state law enforcement reporting, since the legalization of marijuana in Washington State in 2012, Washington State marijuana has been illegally diverted to forty-three states throughout the United States.</li>
<li>(U) According to open sources, throughout 2016 federal agents and state law enforcement officers in Colorado have attempted to curtail illegally grown cannabis, and officials indicate that marijuana is being grown in the state for transfer and sale across the nation.</li>
<li>(U//LES) Analysis of CY2015 seizure incidents on U.S. Interstate highways indicates Colorado State marijuana has been illegally diverted to states where marijuana is illegal .</li>
<li>(U) In January 2017, according to press reporting, federal agents and authorities in El Paso County served several warrants and arrested several individuals in connection with an “out-of-state organization” for illegally growing marijuana outside Colorado Springs, Colorado, and illegally transporting and selling it in Texas, where sales are illegal.</li>
</ul>
</blockquote>
<p>The bulletin concludes by assessing that based on the &#8220;developing nature of marijuana legalization&#8221; Mexican TCOs will likely &#8220;continue to profit from marijuana sales in both legalized and still-illegal state markets.&#8221;  As legalization leads to more decriminalized markets, EPIC assesses that &#8220;rising marijuana demand will continue to encourage TCOs to meet that demand.&#8221;</p>
<div id="DV-viewer-3902253-EPIC-Bulletin-Transnational-Criminal" class="DC-embed DC-embed-document DV-container"></div>
<p><script src="//assets.documentcloud.org/viewer/loader.js"></script><br />
<script>
  DV.load("https://www.documentcloud.org/documents/3902253-EPIC-Bulletin-Transnational-Criminal.js", {
  width: 750,
    height: 1000,
    sidebar: false,
    container: "#DV-viewer-3902253-EPIC-Bulletin-Transnational-Criminal"
  });
</script></p>The post <a href="https://publicintelligence.net/dea-drug-cartels-profit-from-legal-marijuana/">DEA Data Shows Drug Cartels Continue to “Operate and Profit” From Marijuana Sales in Legalized Markets</a> first appeared on <a href="https://publicintelligence.net">Public Intelligence</a>.]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>The 2017 Guide to Detecting Homegrown Violent Extremists</title>
		<link>https://publicintelligence.net/2017-guide-to-hves/</link>
		
		<dc:creator><![CDATA[Public Intelligence]]></dc:creator>
		<pubDate>Mon, 27 Mar 2017 01:35:22 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Homegrown Violent Extremists]]></category>
		<category><![CDATA[Islamic State of Iraq and the Levant]]></category>
		<category><![CDATA[National Counterterrorism Center]]></category>
		<category><![CDATA[Radicalization]]></category>
		<guid isPermaLink="false">https://publicintelligence.net/?p=38304</guid>

					<description><![CDATA[<p>The National Counterterrorism Center (NCTC) has released a 2017 version of their handbook for spotting indicators of mobilization to violence among homegrown violent extremists (HVEs).  The guide was originally intended for distribution among public safety personnel and is not intended&#8230;</p>
<p class="more-link-p">
<a class="btn btn-primary" href="https://publicintelligence.net/2017-guide-to-hves/">Read more &#8594;</a></p>
The post <a href="https://publicintelligence.net/2017-guide-to-hves/">The 2017 Guide to Detecting Homegrown Violent Extremists</a> first appeared on <a href="https://publicintelligence.net">Public Intelligence</a>.]]></description>
										<content:encoded><![CDATA[<div id="attachment_38336" style="width: 867px" class="wp-caption aligncenter"><a href="https://q.publicintelligence.net/wp-content/uploads/2017/03/awlaki-hves.png"><img decoding="async" aria-describedby="caption-attachment-38336" class="size-full wp-image-38336" src="https://q.publicintelligence.net/wp-content/uploads/2017/03/awlaki-hves.png" alt="" width="857" height="621" srcset="https://q.publicintelligence.net/wp-content/uploads/2017/03/awlaki-hves.png 857w, https://q.publicintelligence.net/wp-content/uploads/2017/03/awlaki-hves-300x217.png 300w, https://q.publicintelligence.net/wp-content/uploads/2017/03/awlaki-hves-768x557.png 768w, https://q.publicintelligence.net/wp-content/uploads/2017/03/awlaki-hves-150x109.png 150w" sizes="(max-width: 857px) 100vw, 857px" /></a><p id="caption-attachment-38336" class="wp-caption-text">A graphic from the 2017 National Counterterrorism Center handbook on indicators of mobilization to violence among homegrown violent extremists depicts a man watching a video of Anwar al-Awlaki.</p></div>
<p>The National Counterterrorism Center (NCTC) has released a 2017 version of their handbook for spotting indicators of mobilization to violence among homegrown violent extremists (HVEs).  The guide was originally intended for distribution among public safety personnel and is not intended for public release, but has since appeared on several publicly accessible law enforcement mailing lists and conference websites.  In 2014, the NCTC&#8217;s Office of National Intelligence Management formed an Interagency Analytic Focus Group with members from the Department of Homeland Security, Department of Energy, FBI, NSA, as well as representatives of state and local law enforcement.  The focus group &#8220;collaboratively developed the list of behavioral indicators and ranked them into three tiers of diagnosticity,&#8221; eventually developing a list to distribute to law enforcement personnel.  The 2017 handbook released by NCTC is a version of that list updated with new indicators observed since the handbook was last published.</p>
<p>Intended to provide &#8220;a roadmap of observable behaviors that could inform whether individuals or groups are preparing to engage in violent extremist activities,&#8221; the handbook is a <a href="https://publicintelligence.net/nctc-hve-indicators-2017/">slick 36-page publication</a> with colorful graphics depicting dozens of behavioral indicators that an HVE is mobilizing to violence.  These behaviors are divided into three groups based on their overall diagnostic capacity.  Group A includes indicators that are &#8220;very diagnostic on their own&#8221; and thus require little else to indicate mobilization to violence.  These indicators include &#8220;preparing or disseminating a last will or martyrdom video/statement&#8221; as well as &#8220;planning or attempting to travel to a conflict zone to fight with or support an FTO.&#8221;  Group B includes indicators that are &#8220;moderately diagnostic, more so when observed with other indicators.&#8221;  These include more common activities that may not directly indicate an imminent threat of violence, such as &#8220;posting terrorist icons/flags/prominent figures to social media&#8221; and &#8220;expressing acceptance of violence as a necessary means to achieve ideological goals.&#8221;  Group C includes indicators that are even more common and thus are &#8220;minimally diagnostic on their own,&#8221; requiring the &#8220;presence of other indicators to gain diagnosticity.&#8221;  This group includes &#8220;unusual purchase of military style tactical equipment&#8221; and &#8220;blaming external factors for failure in school, career, or relationships.&#8221;</p>
<div id="attachment_38338" style="width: 776px" class="wp-caption aligncenter"><a href="https://q.publicintelligence.net/wp-content/uploads/2017/03/hve-mobilization-indicators.png"><img decoding="async" aria-describedby="caption-attachment-38338" class="wp-image-38338 size-full" src="https://q.publicintelligence.net/wp-content/uploads/2017/03/hve-mobilization-indicators.png" alt="" width="766" height="585" srcset="https://q.publicintelligence.net/wp-content/uploads/2017/03/hve-mobilization-indicators.png 766w, https://q.publicintelligence.net/wp-content/uploads/2017/03/hve-mobilization-indicators-300x229.png 300w, https://q.publicintelligence.net/wp-content/uploads/2017/03/hve-mobilization-indicators-150x115.png 150w" sizes="(max-width: 766px) 100vw, 766px" /></a><p id="caption-attachment-38338" class="wp-caption-text">A graphic depicting the scale of threat levels assigned to various behavior indicators of mobilization to violence among HVEs.</p></div>
<p>The guide also introduces a scale for evaluating the overall threat level of indicators by ranking: how diagnostic they are in positively identifying mobilization to violence; how dependent they are on other indicators to positively diagnose mobilization; how easily observable the indicators are; as well as whether the indicators present a long-term, near-term, or imminent concern.  For example, someone &#8220;disseminating a last will or martyrdom video/statement&#8221; is ranked as highly diagnostic, independent of other indicators, and observable, presenting an imminent concern.  An indicator like &#8220;surveilling potential targets&#8221; is moderately diagnostic and observable, but is highly dependent on other indicators and only presents a near-term concern.</p>
<p>While some of the initial indicators in Group A seem plainly apparent as being indicators of mobilization towards violence, many indicators in the Group B and C are broad and at times confusing in their origin.  One indicator in Group C is &#8220;inappropriate use of what an individual perceives as &#8216;doctrine&#8217; to manipulate the behavior of parents, co-workers, close friends and family.&#8221;  The guide offers examples of this indicator including &#8220;criticism of parents&#8217; clothing choices, reading material choices, musical preferences, religious practices, interfaith friendships.&#8221;  Another broad indicator in Group B is &#8220;use of encrypted media applications to engage with unknown overseas individuals.&#8221;  Several indicators in Group C also relate to communications privacy, such as &#8220;utilizing communication security techniques&#8221; and &#8220;discussing operational security.&#8221;  Many of these indicators are rated as being dependent upon other evidence &#8220;pointing to terrorism and intent to take violent action&#8221; and the guide makes clear that &#8220;many of these signals or indicators—some of which might involve constitutionally protected activities—may be insignificant on their own.&#8221;  If any public safety personnel receiving the guide &#8220;reasonably believes&#8221; based on the information contained in the guide &#8220;that an individual may be mobilizing to violence &#8220;they are encouraged to &#8220;inform LE agencies with investigative authorities via mechanisms like E-Guardian or Suspicious Activity Reporting.&#8221;</p>
<div id="DV-viewer-3525027-NCTC-Homegrown-Violent-Extremist-Mobilization" class="DC-embed DC-embed-document DV-container"></div>
<p><script src="//assets.documentcloud.org/viewer/loader.js"></script><br />
<script>
  DV.load("https://www.documentcloud.org/documents/3525027-NCTC-Homegrown-Violent-Extremist-Mobilization.js", {
  width: 740,
    height: 1000,
    sidebar: false,
    container: "#DV-viewer-3525027-NCTC-Homegrown-Violent-Extremist-Mobilization"
  });
</script></p>The post <a href="https://publicintelligence.net/2017-guide-to-hves/">The 2017 Guide to Detecting Homegrown Violent Extremists</a> first appeared on <a href="https://publicintelligence.net">Public Intelligence</a>.]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Feds Say Homegrown Terrorists Increasingly Prioritizing Civilian Targets</title>
		<link>https://publicintelligence.net/feds-hves-targeting-civilians/</link>
		
		<dc:creator><![CDATA[Public Intelligence]]></dc:creator>
		<pubDate>Mon, 03 Oct 2016 01:39:05 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Department of Homeland Security]]></category>
		<category><![CDATA[Federal Bureau of Investigation]]></category>
		<category><![CDATA[Islamic State of Iraq and the Levant]]></category>
		<category><![CDATA[National Counterterrorism Center]]></category>
		<guid isPermaLink="false">https://publicintelligence.net/?p=37990</guid>

					<description><![CDATA[<p>A joint intelligence bulletin issued in late August by the Department of Homeland Security, FBI, and National Counterterrorism Center (NCTC) assesses that homegrown violent extremists (HVEs) are "increasingly favoring civilian targets" as opposed to government facilities and personnel.  Previous assessments have found that HVEs are most likely to prioritize "law enforcement personnel, military members, and US Government-associated targets."  However, a recent shift towards civilian targets has likely been driven by the accessibility of "soft targets" that are less secure and provide greater opportunities for mass casualty attacks.</p>
<p class="more-link-p">
<a class="btn btn-primary" href="https://publicintelligence.net/feds-hves-targeting-civilians/">Read more &#8594;</a></p>
The post <a href="https://publicintelligence.net/feds-hves-targeting-civilians/">Feds Say Homegrown Terrorists Increasingly Prioritizing Civilian Targets</a> first appeared on <a href="https://publicintelligence.net">Public Intelligence</a>.]]></description>
										<content:encoded><![CDATA[<div id="attachment_37992" style="width: 762px" class="wp-caption aligncenter"><a href="https://q.publicintelligence.net/wp-content/uploads/2016/10/CivilianTargetsHVEs.jpg"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-37992" class="size-large wp-image-37992" src="https://q.publicintelligence.net/wp-content/uploads/2016/10/CivilianTargetsHVEs-1024x511.jpg" alt="A graph showing " width="752" height="375" srcset="https://q.publicintelligence.net/wp-content/uploads/2016/10/CivilianTargetsHVEs-1024x511.jpg 1024w, https://q.publicintelligence.net/wp-content/uploads/2016/10/CivilianTargetsHVEs-300x150.jpg 300w, https://q.publicintelligence.net/wp-content/uploads/2016/10/CivilianTargetsHVEs-768x383.jpg 768w, https://q.publicintelligence.net/wp-content/uploads/2016/10/CivilianTargetsHVEs-150x75.jpg 150w, https://q.publicintelligence.net/wp-content/uploads/2016/10/CivilianTargetsHVEs.jpg 1320w" sizes="auto, (max-width: 752px) 100vw, 752px" /></a><p id="caption-attachment-37992" class="wp-caption-text">A chart from the August 2016 bulletin issued by the Department of Homeland Security, FBI, and National Counterterrorism Center (NCTC) shows the increasing number of plots focusing on civilian targets.</p></div>
<p>A <a href="https://publicintelligence.net/dhs-fbi-nctc-hve-civilian-targets/">joint intelligence bulletin issued</a> in late August by the Department of Homeland Security, FBI, and National Counterterrorism Center (NCTC) assesses that homegrown violent extremists (HVEs) are &#8220;increasingly favoring civilian targets&#8221; as part of a wider &#8220;variety of targeting choices.&#8221;  Previous assessments have found that HVEs are most likely to prioritize attacks on &#8220;law enforcement personnel, military members, and US Government-associated targets.&#8221;  However, a recent shift towards civilian targets has likely been driven by the accessibility of &#8220;soft targets&#8221; that are often less secure than government facilities and provide greater opportunities for conducting mass casualty attacks.</p>
<p>Over the last year, seventy-seven percent of the &#8220;thirteen HVE attacks and disruptions . . . focused on civilian targets, in contrast to eleven percent of the eighteen HVE attacks and disruptions in the first seven months of 2015.&#8221;  Three separate HVE plots in 2016 targeted religious institutions, the &#8220;first such cases since a 2009 plot against a New York-based synagogue&#8221; according to the bulletin.  Since 2015, HVEs have &#8220;plotted against or attacked restaurants, a nightclub, a concert, a public ceremony, a place of employment, and a college classroom, demonstrating the variety of targeting choices.&#8221;  The bulletin was issued prior to the recent bombings in New York and New Jersey which also targeted civilian locations including a train station, charity race, and numerous public streets.</p>
<p>The bulletin states that a combination of factors ranging from &#8220;perceived lower levels of security&#8221; as well as &#8220;violent extremist messaging glorifying recent attacks on civilians&#8221; have motivated this shift in tactics.  The bulletin also highlights a newer trend which has led HVEs to select &#8220;familiar targets of personal significance to simplify plotting,&#8221; often capitalizing on preexisting grievances or a desire for revenge.  This is particularly relevant to cases such as the December 2015 attack on the Inland Regional Center in San Bernardino, during which Syed Rizwan Farook and his wife Tashfeen Malik killed fourteen people at a training event and Christmas Party hosted by the San Bernardino County Department of Public Health.  Farook, who worked for the county as a health inspector, had been attending the event earlier in the day prior to conducting the attack.  In another example cited in the bulletin, an eighteen-year-old freshman at the University of California at Merced named Faisal Mohammad stabbed a classmate and three other individuals at the college before being shot by a campus police officer.  The FBI later stated that Mohammad had been viewing extremist material online and they believe the attack was <a href="http://sanfrancisco.cbslocal.com/2016/03/17/fbi-uc-merced-stabbing-suspect-may-have-been-inspired-by-isil/">inspired by the Islamic State of Iraq and the Levant (ISIL)</a>.</p>
<p>To help prevent HVE attacks, the bulletin recommends that state and local authorities be vigilant and &#8220;report suspicious activities related to potential mobilization to violence in the Homeland by US-based individuals inspired by foreign terrorist organizations.&#8221;</p>
<div id="DV-viewer-3117898-DHS-FBI-NCTC-Bulletin-US-Homegrown-Violent" class="DV-container"></div>
<p><script src="//assets.documentcloud.org/viewer/loader.js"></script><br />
<script>
  DV.load("https://www.documentcloud.org/documents/3117898-DHS-FBI-NCTC-Bulletin-US-Homegrown-Violent.js", {
  width: 740,
    height: 1000,
    sidebar: false,
    container: "#DV-viewer-3117898-DHS-FBI-NCTC-Bulletin-US-Homegrown-Violent"
  });
</script></p>The post <a href="https://publicintelligence.net/feds-hves-targeting-civilians/">Feds Say Homegrown Terrorists Increasingly Prioritizing Civilian Targets</a> first appeared on <a href="https://publicintelligence.net">Public Intelligence</a>.]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>DHS Report Finds &#8220;Immeasurable Vulnerabilities and Attack Vectors&#8221; Against U.S. Critical Infrastructure</title>
		<link>https://publicintelligence.net/dhs-immeasurable-vulnerabilities-critical-infrastructure/</link>
		
		<dc:creator><![CDATA[Public Intelligence]]></dc:creator>
		<pubDate>Wed, 06 Jul 2016 02:35:46 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Department of Homeland Security]]></category>
		<category><![CDATA[Office of Cyber and Infrastructure Analysis]]></category>
		<guid isPermaLink="false">https://publicintelligence.net/?p=37420</guid>

					<description><![CDATA[<p>A Department of Homeland Security assessment released in April states that critical infrastructure throughout the U.S. faces "immeasurable vulnerabilities and attack vectors" due to the increasingly prominent role of information and communication technology (ICT) in critical infrastructure sectors.  The strategic risk assessment, authored by the Office of Cyber and Infrastructure Analysis within DHS, was obtained by Public Intelligence and describes the "convergence of cyber and physical domains" as a strategic threat to the nation's infrastructure.</p>
<p class="more-link-p">
<a class="btn btn-primary" href="https://publicintelligence.net/dhs-immeasurable-vulnerabilities-critical-infrastructure/">Read more &#8594;</a></p>
The post <a href="https://publicintelligence.net/dhs-immeasurable-vulnerabilities-critical-infrastructure/">DHS Report Finds “Immeasurable Vulnerabilities and Attack Vectors” Against U.S. Critical Infrastructure</a> first appeared on <a href="https://publicintelligence.net">Public Intelligence</a>.]]></description>
										<content:encoded><![CDATA[<div id="attachment_37778" style="width: 762px" class="wp-caption aligncenter"><a href="https://q.publicintelligence.net/wp-content/uploads/2016/06/black-energy-word.png"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-37778" class="size-large wp-image-37778" src="https://q.publicintelligence.net/wp-content/uploads/2016/06/black-energy-word-1024x817.png" alt="A " width="752" height="600" srcset="https://q.publicintelligence.net/wp-content/uploads/2016/06/black-energy-word-1024x817.png 1024w, https://q.publicintelligence.net/wp-content/uploads/2016/06/black-energy-word-300x239.png 300w, https://q.publicintelligence.net/wp-content/uploads/2016/06/black-energy-word-768x613.png 768w, https://q.publicintelligence.net/wp-content/uploads/2016/06/black-energy-word-150x120.png 150w, https://q.publicintelligence.net/wp-content/uploads/2016/06/black-energy-word.png 1413w" sizes="auto, (max-width: 752px) 100vw, 752px" /></a><p id="caption-attachment-37778" class="wp-caption-text">A screenshot released by the security company Kaspersky shows a malicious Microsoft Word document similar to one used by hackers in an December 2015 attack against the Ukrainian energy sector. The attack disrupted more than 200,000 customers and affected dozens of substations.</p></div>
<p>A Department of Homeland Security assessment released in April states that critical infrastructure throughout the U.S. faces &#8220;immeasurable vulnerabilities and attack vectors&#8221; due to the increasingly prominent role of information and communication technology (ICT) in critical infrastructure sectors.  The strategic risk assessment, authored by the Office of Cyber and Infrastructure Analysis within DHS, was <a href="https://publicintelligence.net/dhs-ocia-critical-infrastructure-2025/">obtained by Public Intelligence</a> and describes the &#8220;convergence of cyber and physical domains&#8221; as a strategic threat to the nation&#8217;s infrastructure.</p>
<p>As ICT is increasingly depended upon in &#8220;all 16 critical infrastructure sectors,&#8221; there is an &#8220;inherent reliance on a network connection for functionality&#8221; that &#8220;creates numerous vulnerabilities&#8221; and makes &#8220;universal security extremely difficult and improbable, allowing cyber attackers to more easily exploit critical infrastructure.&#8221;  These vulnerabilities are also expected to affect the growth of smart cities and other developments related to the internet of things (IoT).  DHS cites a report estimating the smart cities market to be valued at $392 billion by 2019 and estimates that in five years 26-50 billion IoT devices to exist.  Warning that the growth of these technologies advantages comes with &#8220;inherent vulnerabilities,&#8221; DHS states that billions of &#8220;interconnected IoT devices creating, transmitting, and storing data will result in &#8216;data exhaust,&#8217; which allows threat actors to gain significant insights into sensitive information such as telemetry, voice, video, health, and infrastructure component status data.&#8221;  Moreover, failures of  &#8220;critical infrastructure IoT devices&#8221; could result not just in &#8220;economic loss through lost productivity and damage to the national economy,&#8221; but also &#8220;adversely affect public safety through physical infrastructure damage or catastrophic infrastructure failure.&#8221;</p>
<p>Industrial control systems (ICS), such as supervisory control and data acquisition (SCADA) systems, that are connected to cloud infrastructure are also cited as a growing concern as &#8220;cloud providers are generally not prepared or equipped&#8221; to address many of the specialized security needs of these systems.  The report states that the &#8220;compromise of critical infrastructure SCADA systems that are connected to cloud infrastructure could have a direct physical effect on human life.&#8221;  However, the threat to ICS extends far beyond cloud security issues with more than 245 cyber-related incidents in FY2014 according to the Industrial Control Systems-Cyber Emergency Response Team (ICS-CERT).  Techniques used in these incidents included &#8220;access and exploitation of Internet facing ICS and SCADA devices, exploitation of zero-day vulnerabilities in control system devices and software, malware infections within air-gapped control system networks, Structured Query Language injection and application vulnerability exploitation, network scanning and probing, lateral movement between network zones, targeted spear-phishing campaigns, and strategic Website compromises (a.k.a. watering hole attacks).&#8221;</p>
<p>Similar concerns were expressed in a <a href="https://publicintelligence.net/apt-energy-infrastructure/">January 2016 intelligence assessment</a> issued by DHS which found that nation-state cyber actors are actively “targeting US energy sector enterprise networks&#8221; to maintain “persistent access to facilitate the introduction of malware” in the event of “hostilities with the United States.”  While the assessment states that this activity is focused primarily on &#8220;data theft&#8221; as well as “accessing and maintaining presence on ICS” networks and systems, the report uses unusually blunt language to describe how this kind of access would likely be used as &#8220;part of nation-state contingency planning&#8221; only to be &#8220;implemented to conduct a damaging or disruptive attack in the event of hostilities with the United States.&#8221;  In December 2015, a coordinated attack on the Ukrainian energy sector demonstrated just how damaging this sort of access to ICS infrastructure can be, resulting in the loss of power for more than 225,000 customers and the disruption of at least fifty regional substations.  The attack is described in the DHS assessment as &#8220;consistent with our understanding of Moscow’s capability and intent, including observations of cyber operations during regional tensions.&#8221;</p>
<div id="DV-viewer-2940533-DHS-Critical-Infrastructure-2025-Strategic-Risk" class="DV-container"></div>
<p><script src="//assets.documentcloud.org/viewer/loader.js"></script><br />
<script>// <![CDATA[
DV.load("https://www.documentcloud.org/documents/2940533-DHS-Critical-Infrastructure-2025-Strategic-Risk.js", { width: 740, height: 1000, sidebar: false, container: "#DV-viewer-2940533-DHS-Critical-Infrastructure-2025-Strategic-Risk" });
// ]]&gt;</script></p>The post <a href="https://publicintelligence.net/dhs-immeasurable-vulnerabilities-critical-infrastructure/">DHS Report Finds “Immeasurable Vulnerabilities and Attack Vectors” Against U.S. Critical Infrastructure</a> first appeared on <a href="https://publicintelligence.net">Public Intelligence</a>.]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Nation-State Cyber Actors Focused on &#8220;Maintaining  Persistent Access&#8221; to U.S. Energy Infrastructure</title>
		<link>https://publicintelligence.net/apt-energy-infrastructure/</link>
		
		<dc:creator><![CDATA[Public Intelligence]]></dc:creator>
		<pubDate>Mon, 04 Apr 2016 01:39:05 +0000</pubDate>
				<category><![CDATA[Featured]]></category>
		<guid isPermaLink="false">https://publicintelligence.net/?p=37131</guid>

					<description><![CDATA[<p>There is currently a low threat of damaging cyber attacks against the U.S. energy infrastructure according an intelligence assessment released by the Department of Homeland Security and Industrial Control Systems Computer Emergency Response Team (ICS-CERT) in January.  While "advanced persistent threat (APT) nation-state cyber actors are targeting US energy sector enterprise networks," these activities are conducted primarily in support of cyber espionage focused primarily on "acquiring and maintaining persistent access to facilitate the introduction of malware" in the event of "hostilities with the United States."</p>
<p class="more-link-p">
<a class="btn btn-primary" href="https://publicintelligence.net/apt-energy-infrastructure/">Read more &#8594;</a></p>
The post <a href="https://publicintelligence.net/apt-energy-infrastructure/">Nation-State Cyber Actors Focused on “Maintaining  Persistent Access” to U.S. Energy Infrastructure</a> first appeared on <a href="https://publicintelligence.net">Public Intelligence</a>.]]></description>
										<content:encoded><![CDATA[<p>Damaging cyber attacks against the U.S. energy infrastructure do not currently pose a significant threat according to an intelligence assessment released by the Department of Homeland Security and Industrial Control Systems Computer Emergency Response Team (ICS-CERT) in January.  While cyber actors backed by a number of nation-states are actively &#8220;targeting US energy sector enterprise networks,&#8221; these activities are focused primarily on supporting cyber espionage activities to acquire and maintain &#8220;persistent access to facilitate the introduction of malware&#8221; in the event of &#8220;hostilities with the United States.&#8221;</p>
<p>The restricted DHS assessment titled &#8220;Damaging Cyber Attacks Possible but Not Likely Against the US Energy Sector&#8221; was <a href="https://publicintelligence.net/dhs-cyber-attacks-energy-sector/">obtained by Public Intelligence</a> and reveals that at least seventeen intrusions against the U.S. energy sector were traced back to APT actors in FY 2014.  The attacks never resulted in damage or disruption, but were instead focused on &#8220;data theft from enterprise networks&#8221; and &#8220;accessing and maintaining presence on ICS&#8221; networks and systems.  One example cited in the assessment is a piece of malware called <a href="https://ics-cert.us-cert.gov/alerts/ICS-ALERT-14-176-02A">Havex</a> that was &#8220;likely developed by Russian state-sponsored cyber actors.&#8221;  The existence of the malware was first disclosed in a June 2014 <a href="https://www.f-secure.com/weblog/archives/00002718.html">blog post by Finnish security firm F-Secure</a> which described how the remote access tool (RAT) was being used as part of an industrial espionage campaign.  DHS states that this campaign dates back to 2011 and that while the &#8220;main function is to gather information,&#8221; Havex can also run &#8220;specialized plug-ins for additional capabilities.&#8221;</p>
<p>The assessment also mentions an attack on the Ukrainian energy sector in December 2015 that resulted in at least 80,000 customers losing power for up to six hours.  At the time the assessment was written, ICS-CERT stated that they were &#8220;unable to confirm&#8221; the event was triggered by cyber means, but that a sample of the malware provided by the Ukranian Government had the capability to &#8220;enable remote access and delete computer content, including system drives.&#8221;  While DHS does not attribute the attack to any specific cyber actor, the assessment states that the attack is &#8220;consistent with our understanding of Moscow’s capability and intent, including observations of cyber operations during regional tensions.&#8221;</p>
<p>A month after the DHS assessment was published, ICS-CERT <a href="https://ics-cert.us-cert.gov/alerts/IR-ALERT-H-16-056-01">released an alert</a> describing the attack in much greater detail and relaying the findings of a team that included representatives of the U.S. Computer Emergency Readiness Team (US-CERT), Department of Energy, FBI and North American Electric Reliability Corporation.  The alert increased the number of those affected by the attack to more than 225,000 customers, noting that the attack was &#8220;reportedly synchronized and coordinated, probably following extensive reconnaissance of the victim networks.&#8221;  The attackers reportedly &#8220;acquired legitimate credentials and leveraged valid remote access pathways&#8221; to cause 50 regional substations to experience &#8220;malicious remote operation of their breakers conducted by multiple external humans.&#8221;</p>
<p>ICS-CERT also released a restricted version of the alert marked For Official Use Only that included non-public details and analysis of the vulnerabilities exposed by the attack.  An updated version of the restricted alert from March was also <a href="https://publicintelligence.net/nccic-ukrainian-power-attack/">obtained by Public Intelligence</a> and states that &#8220;critical infrastructure [industrial control system or ICS] networks, across multiple sectors, are vulnerable to similar attacks.&#8221; ICS-CERT argues that the &#8220;incident highlights the urgent need for critical infrastructure owners and operators across all sectors to implement enhanced cyber measures that reduce risks&#8221; that could result from the use of a number of different techniques that were employed by the attackers, including:</p>
<blockquote><p>• Theft of legitimate user credentials to enable access masquerading as approved users,<br />
• Leveraging legitimate remote access pathways (VPNs),<br />
• The remote operation of human-machine interface (HMI) via company installed remote access software (such as RDP, TeamViewer or rlogin)<br />
• The use of destructive malware such as KillDisk to disable industrial control systems (ICSs) and corporate network systems<br />
• Firmware overwrites that disable/destroy field equipment<br />
• Unauthorized scheduled disconnects of uninterruptable power supplies (UPS) to devices to deny their availability<br />
• The delivery of malware via spear-phishing emails and the use of malicious Microsoft Office attachments<br />
• Use of Telephone Denial of Service (TDoS) to disrupt operations and restoration.</p></blockquote>
<p>During the attacks, &#8220;remote human operators&#8221; accessed the workstations of dispatchers at the facilities using legitimately installed tools for remote access.  They used this access to trip the breakers, change the passwords for key systems, corrupt firmware of serial-to-ethernet converters used for substation communication and leverage backup battery systems to trigger shutdowns of connected servers and devices.  In one instance, the attackers used an uninterruptible power supply (UPS) to target an internal telecommunications server which cut off &#8220;all internal communications with regional offices and distribution substations.&#8221;</p>
<p>Despite the risks demonstrated in the Ukrainian attack, the DHS assessment from January tries to downplay the threat posed by state actors, noting that 63 percent of malicious cyber activity in FY 2014 was &#8220;unattributed, low-level activity&#8221; related to cybercrime using methods such as ransomware and denial-of-service attacks.  The assessment&#8217;s authors also include a section criticizing the media&#8217;s over-hyping of cyber attacks and cyber warfare as leading to &#8220;misperceptions about the cyber threat to the US energy sector.&#8221;  The term &#8220;cyber attack&#8221; is often used by the media and private sector to refer to incidents and activities that are not necessarily intended to &#8220;cause denial, disruption, destruction, or other negative effects&#8221; which would better be described as &#8220;cyber espionage, and even low-level, untargeted incidents of cybercrime.&#8221;  The assessment even speculates that overuse of the term could lead to &#8220;alarm fatigue&#8221; which could lead to less reporting of incidents and longer response times.</p>
<div id="DV-viewer-2783054-DHS-Damaging-Cyber-Attacks-Possible-but-Not" class="DV-container"></div>
<p><script src="//assets.documentcloud.org/viewer/loader.js"></script><script>// <![CDATA[
  DV.load("https://www.documentcloud.org/documents/2783054-DHS-Damaging-Cyber-Attacks-Possible-but-Not.js", {
  width: 860,
    height: 1100,
    sidebar: false,
    container: "#DV-viewer-2783054-DHS-Damaging-Cyber-Attacks-Possible-but-Not"
  });
// ]]&gt;</script></p>
<div id="DV-viewer-2783050-NCCIC-Cyberattack-Against-Ukrainian-Critical" class="DV-container"></div>
<p><script src="//assets.documentcloud.org/viewer/loader.js"></script><script>// <![CDATA[
  DV.load("https://www.documentcloud.org/documents/2783050-NCCIC-Cyberattack-Against-Ukrainian-Critical.js", {
  width: 860,
    height: 1100,
    sidebar: false,
    container: "#DV-viewer-2783050-NCCIC-Cyberattack-Against-Ukrainian-Critical"
  });
// ]]&gt;</script></p>The post <a href="https://publicintelligence.net/apt-energy-infrastructure/">Nation-State Cyber Actors Focused on “Maintaining  Persistent Access” to U.S. Energy Infrastructure</a> first appeared on <a href="https://publicintelligence.net">Public Intelligence</a>.]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>DHS Report Details &#8220;Persistent&#8221; Cyber Targeting of Police, Emergency Services</title>
		<link>https://publicintelligence.net/dhs-cyber-threats-emergency-services/</link>
		
		<dc:creator><![CDATA[Public Intelligence]]></dc:creator>
		<pubDate>Tue, 23 Feb 2016 02:22:34 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Department of Homeland Security]]></category>
		<category><![CDATA[Hacktivism]]></category>
		<category><![CDATA[Ransomware]]></category>
		<guid isPermaLink="false">https://publicintelligence.net/?p=37040</guid>

					<description><![CDATA[<p>Cyber attacks against law enforcement, fire departments and other emergency services have become increasingly common and are likely to increase according to a recent intelligence assessment prepared by the Department of Homeland Security and the Multi-State Information Sharing and Analysis Center (MS-ISAC).  The assessment, which was distributed to law enforcement in September 2015 and was obtained by Public Intelligence, reviewed a number of "cyber attacks against the [emergency services sector or ESS] between February 2012 and May 2015," finding that "targeting of the ESS will likely increase as ESS systems and networks become more interconnected and the ESS becomes more dependent on information technology for the conduct of daily operations—creating a wider array of attack vectors for cyber targeting."</p>
<p class="more-link-p">
<a class="btn btn-primary" href="https://publicintelligence.net/dhs-cyber-threats-emergency-services/">Read more &#8594;</a></p>
The post <a href="https://publicintelligence.net/dhs-cyber-threats-emergency-services/">DHS Report Details “Persistent” Cyber Targeting of Police, Emergency Services</a> first appeared on <a href="https://publicintelligence.net">Public Intelligence</a>.]]></description>
										<content:encoded><![CDATA[<div class="alert alert-info"><iframe loading="lazy" src="https://www.youtube-nocookie.com/embed/TQWtqJylMKQ?rel=0&amp;controls=1&amp;showinfo=0" width="720" height="540" frameborder="0" allowfullscreen="allowfullscreen"></iframe><br />
<em>A clip from a local television station in Montana shows an emergency alert that was generated by &#8220;unknown attackers&#8221; in February 2013. The attackers used default credentials to broadcast false emergency messages stating that the &#8220;bodies of the dead are rising from their graves and attacking the living.&#8221; Similar messages aired in several other states where similar systems were compromised by the attackers.</em></div>
<p>Cyber attacks against law enforcement, fire departments and other emergency services have become increasingly common and are likely to increase according to a recent intelligence assessment prepared by the Department of Homeland Security and the Multi-State Information Sharing and Analysis Center (MS-ISAC).  The assessment, which was distributed to law enforcement in September 2015 and was <a href="https://publicintelligence.net/dhs-cyber-targeting-ess/">obtained by Public Intelligence</a>, reviewed a number of &#8220;cyber attacks against the [emergency services sector or ESS] between February 2012 and May 2015,&#8221; finding that &#8220;targeting of the ESS will likely increase as ESS systems and networks become more interconnected and the ESS becomes more dependent on information technology for the conduct of daily operations—creating a wider array of attack vectors for cyber targeting.&#8221;  Recent incidents involving the use of telephony-denial-of-service (TDoS) attacks, ransomware as well as the exploitation of &#8220;critical hardware and software&#8221; including call-center communications-management software, closed-circuit TV camera systems, interactive voice response systems, and emergency alert systems are detailed in the assessment.</p>
<p>DHS and MS-ISAC assess that the &#8220;most prominent cyber actors targeting the ESS&#8221; are &#8220;criminal hackers&#8221; who have engaged in &#8220;numerous attacks against state and local networks, particularly law enforcement, in response to perceived social and legal injustices&#8221; and are &#8220;prone to announcing attacks to increase visibility and support for their cause.&#8221;  The assessment defines &#8220;criminal hackers&#8221; as &#8220;individuals or groups that commit a crime by illegally accessing or altering systems, often in furtherance of an ideological goal.&#8221;  The use of the term &#8220;criminal hackers&#8221; marks a departure from previous law enforcement bulletins which have used the terms &#8220;hacktivists&#8221; or &#8220;hacker groups&#8221; to describe ideologically-motivated cyber actors.  The term is also used in an FBI bulletin released in May 2015 titled &#8220;Criminal Hackers Target Police to Protest Perceived Injustices.&#8221;  The assessment distinguishes between these criminal hackers and &#8220;cybercriminals&#8221; who &#8220;carry out illegal activities on computer networks, such as carding schemes, ransom and extortion, theft of personally identifiable information, and account information to facilitate fraud.&#8221;</p>
<p>Criminal hackers &#8220;gain support for their political agenda—or to exact retribution for perceived social or legal injustices—have shown repeated interest in targeting the ESS&#8221; as is &#8220;evidenced by the numerous attacks against state and local networks, particularly law enforcement, in response to perceived social and legal injustices.&#8221;  However, DHS and MS-ISAC assess that their capabilities are not particularly sophisticated, limiting them to &#8220;low-level cyber operations, such as [denial of service or DoS] attacks, website defacements, and doxing (publishing of personally identifiable information), often attacking targets of opportunity.&#8221;  These low-level operations have proliferated in recent years, particularly in response to increased political controversy surrounding police brutality and excessive use of force.  The assessment also discusses several examples of these operations, often involving DoS attacks or doxing, including a series of DoS attacks conducted by the hacker collective Anonymous against the City of Madison, Wisconsin in 2014 to protest an officer-involved shooting.  The attack <a href="http://www.wkow.com/story/28325831/2015/03/09/emergency-government-systems-in-dane-county-threatened-by-cyber-attack">reportedly</a> &#8220;affected some police, fire, and medical dispatch services; as well as city government Internet and e-mail communications, and online payment services.&#8221;</p>
<p>Though so-called &#8220;criminal hackers&#8221; are the most prominent cyber actors in DHS and MS-ISAC&#8217;s assessment, cybercriminals working for financial gain pose a &#8220;persistent threat&#8221; and have launched attacks significantly impacting ESS operations.</p>
<ul>
<li>In May 2015, a Nevada county sheriff&#8217;s department and a Wisconsin police department were victims of a ransomware attack that encrypted both departments&#8217; shared folders.  MS-ISAC later determined that the intrusions occurred as a result of visits to a legitimate website which had been compromised.</li>
<li>A city in Southern California and several local public-safety agencies were hit by ransomware in June 2014.  The compromise affected 100 computers and 10 servers.</li>
<li>A fire department in Northern California and a law enforcement agency in Southern California were infected by ransomware resulting in the compromise of one computer and one server in each location, making vital information unavailable.</li>
<li>In 2013, telephony denial of service (TDoS) attacks affected approximately 600 critical government phone systems nationwide, including 200 public-safety answering points (PSAPs).  After several days, the attackers reportedly requested $5,000 to cease the attacks.</li>
</ul>
<p></ br></p>
<div id="DV-viewer-2716855-DHS-Assessment-Cyber-Targeting-of-the-US" class="DV-container"></div>
<p><script src="//assets.documentcloud.org/viewer/loader.js"></script><script>// <![CDATA[
DV.load("https://www.documentcloud.org/documents/2716855-DHS-Assessment-Cyber-Targeting-of-the-US.js", { width: 740, height: 1000, sidebar: false, container: "#DV-viewer-2716855-DHS-Assessment-Cyber-Targeting-of-the-US" });
// ]]&gt;</script></p>The post <a href="https://publicintelligence.net/dhs-cyber-threats-emergency-services/">DHS Report Details “Persistent” Cyber Targeting of Police, Emergency Services</a> first appeared on <a href="https://publicintelligence.net">Public Intelligence</a>.]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>DEA Report Details Philadelphia&#8217;s Growing Drug Overdose Problem</title>
		<link>https://publicintelligence.net/philadelphia-drug-overdoses/</link>
		
		<dc:creator><![CDATA[Public Intelligence]]></dc:creator>
		<pubDate>Mon, 04 Jan 2016 02:38:24 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Heroin]]></category>
		<category><![CDATA[Opioids]]></category>
		<category><![CDATA[Pennsylvania]]></category>
		<category><![CDATA[philadelphia]]></category>
		<guid isPermaLink="false">https://publicintelligence.net/?p=36908</guid>

					<description><![CDATA[<p>Since 2009 Philadelphia has seen a 43 percent increase in drug-related overdose deaths, helping to make Pennsylvania the nation&#8217;s leading state for drug overdose death among young men.  Over the same period, the city has seen a 45 percent increase&#8230;</p>
<p class="more-link-p">
<a class="btn btn-primary" href="https://publicintelligence.net/philadelphia-drug-overdoses/">Read more &#8594;</a></p>
The post <a href="https://publicintelligence.net/philadelphia-drug-overdoses/">DEA Report Details Philadelphia’s Growing Drug Overdose Problem</a> first appeared on <a href="https://publicintelligence.net">Public Intelligence</a>.]]></description>
										<content:encoded><![CDATA[<div id="attachment_36922" style="width: 762px" class="wp-caption aligncenter"><a href="https://q.publicintelligence.net/wp-content/uploads/2016/01/narcan-kit.jpg" rel="attachment wp-att-36922"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-36922" class="size-large wp-image-36922" src="https://q.publicintelligence.net/wp-content/uploads/2016/01/narcan-kit-1024x674.jpg" alt="T" width="752" height="495" srcset="https://q.publicintelligence.net/wp-content/uploads/2016/01/narcan-kit.jpg 1024w, https://q.publicintelligence.net/wp-content/uploads/2016/01/narcan-kit-300x197.jpg 300w, https://q.publicintelligence.net/wp-content/uploads/2016/01/narcan-kit-768x506.jpg 768w, https://q.publicintelligence.net/wp-content/uploads/2016/01/narcan-kit-150x99.jpg 150w" sizes="auto, (max-width: 752px) 100vw, 752px" /></a><p id="caption-attachment-36922" class="wp-caption-text">A nasal spray kit for Narcan, also called Naxolene, a drug that can be used to reverse the symptoms of acute opioid overdose.  The photo is taken from a handout produced by the Delaware Valley Intelligence Center.</p></div>
<p>Since 2009 Philadelphia has seen a 43 percent increase in drug-related overdose deaths, helping to make Pennsylvania the nation&#8217;s <a href="http://articles.philly.com/2015-11-21/news/68443621_1_intervention-support-young-adults-fatality">leading state for drug overdose death among young men</a>.  Over the same period, the city has seen a 45 percent increase in overdose deaths where heroin was present in the individual&#8217;s system.  While heroin is still the primary source of drug overdose deaths, the city is also seeing a significant increase in deaths related to prescription drug abuse, particularly opioids.  Deaths related to Fentanyl, an <a href="https://en.wikipedia.org/wiki/Fentanyl">extremely potent prescription painkiller</a>, have increased more than 300 percent between 2013 and 2014.</p>
<p>Using data provided by the Philadelphia Medical Examiner’s Office, the DEA&#8217;s Philadelphia Field Division issued a report in July analyzing overdose deaths for the years 2013 and 2014.  The report which, was <a href="https://publicintelligence.net/dea-philadelphia-overdoses-2013-2014/">obtained by Public Intelligence</a>, showed a 33 percent increase in drug-related overdose deaths in the city between 2013 and 2014.  Nearly two-thirds of those that died were male and the average age was 42 years old. The largest number of deaths occurred in the 46-60 age group.  The deaths are also highest among whites, which accounted for approximately 60 percent of overall deaths in 2013 and 2014.</p>
<div id="attachment_36917" style="width: 965px" class="wp-caption aligncenter"><a href="https://q.publicintelligence.net/wp-content/uploads/2016/01/philly-drug-overdose-opioids.png" rel="attachment wp-att-36917"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-36917" class="wp-image-36917 size-full" src="https://q.publicintelligence.net/wp-content/uploads/2016/01/philly-drug-overdose-opioids.png" alt="philly-drug-overdose-opioids" width="955" height="605" srcset="https://q.publicintelligence.net/wp-content/uploads/2016/01/philly-drug-overdose-opioids.png 955w, https://q.publicintelligence.net/wp-content/uploads/2016/01/philly-drug-overdose-opioids-300x190.png 300w, https://q.publicintelligence.net/wp-content/uploads/2016/01/philly-drug-overdose-opioids-768x487.png 768w, https://q.publicintelligence.net/wp-content/uploads/2016/01/philly-drug-overdose-opioids-150x95.png 150w" sizes="auto, (max-width: 955px) 100vw, 955px" /></a><p id="caption-attachment-36917" class="wp-caption-text">A chart showing the number of deceased individuals in Philadelphia in 2013 and 2014 that tested positive for opioids other than heroin.</p></div>
<p>The increasing abuse of prescription painkillers has led to a significant increase in heroin-related deaths. The DEA report states that the &#8220;widely reported trend of prescription opioids abusers switching to heroin, with deadly results, is supported by the stability in toxicology test results for the opioids oxycodone and hydrocodone, while heroin-positive results increased substantially during the reviewed years.&#8221; However, the number of deaths where prescription opioids are a factor has also increased significantly. The presence of oxymorphone, marketed under the name Opana, increased 42 percent from 2013 to 2014 which supports &#8220;law enforcement reporting indicating that Opana is increasingly popular and sought after by prescription drug abusers in Philadelphia.&#8221; Likewise, the more than 300 percent increase in deaths where fentanyl was present in the decedent&#8217;s system demonstrates the highly increased &#8220;potential for overdose and death&#8221; due to the drug&#8217;s increased availability.</p>
<p>The DEA says the data &#8220;paints a clear and chilling picture of the impact of drug abuse in Philadelphia, especially related to heroin and fentanyl.&#8221;  The report also praised the <a href="http://www.portal.health.state.pa.us/portal/server.pt/community/emergency_medical_services/14138/act_139_-_naloxone/1938552">recent passage of legislation in Pennsylvania</a> allowing for law enforcement officers, fire fighters and EMS personnel to administer naloxone, also called Narcan, a drug which can reverse the symptoms of an opioid overdose.  A September 2015 report from the Delaware Valley Intelligence Center that was also <a href="https://publicintelligence.net/dvic-narcan-2015/">obtained by Public Intelligence</a> shows the statistics for Narcan administrations in Philadelphia between January and June of last year.  Narcan administration numbers can indicate the locations of &#8220;abuser populations&#8221; and also indicate areas where law enforcement should focus their attention.</p>
<div id="attachment_36923" style="width: 762px" class="wp-caption aligncenter"><a href="https://q.publicintelligence.net/wp-content/uploads/2016/01/DVIC-Narcan-2015_Page_05.jpg" rel="attachment wp-att-36923"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-36923" class="size-large wp-image-36923" src="https://q.publicintelligence.net/wp-content/uploads/2016/01/DVIC-Narcan-2015_Page_05-1024x768.jpg" alt="A m" width="752" height="564" srcset="https://q.publicintelligence.net/wp-content/uploads/2016/01/DVIC-Narcan-2015_Page_05-1024x768.jpg 1024w, https://q.publicintelligence.net/wp-content/uploads/2016/01/DVIC-Narcan-2015_Page_05-300x225.jpg 300w, https://q.publicintelligence.net/wp-content/uploads/2016/01/DVIC-Narcan-2015_Page_05-768x576.jpg 768w, https://q.publicintelligence.net/wp-content/uploads/2016/01/DVIC-Narcan-2015_Page_05-150x113.jpg 150w" sizes="auto, (max-width: 752px) 100vw, 752px" /></a><p id="caption-attachment-36923" class="wp-caption-text">A map showing the total number of Narcan administrations in Philadelphia between January and June 2015.</p></div>
<p>During the period analyzed, Narcan was administered in every zip code in Philadelphia excluding one small area south of the Wells Fargo Center and Lincoln Financial Field.  Many of the neighborhoods surrounding North Philadelphia saw the most administrations of Narcan, including one near Port Richmond that had 253 administrations during the period.  The second highest zip code only had 92 administrations during the same period.  The DEA hopes that this will reduce the number of overdose deaths, however, it notes that &#8220;although the number of fatal overdoses will fall, the rate of abuse will not be impacted without continued joint law enforcement and public health efforts to address supply and abuse.&#8221;</p>
<div id="DV-viewer-2671245-DEA-Analysis-of-Drug-Related-Overdose-Deaths-in" class="DV-container"></div>
<p><script src="//assets.documentcloud.org/viewer/loader.js"></script><script>// <![CDATA[
DV.load("https://www.documentcloud.org/documents/2671245-DEA-Analysis-of-Drug-Related-Overdose-Deaths-in.js", { width: 740, height: 1000, sidebar: false, container: "#DV-viewer-2671245-DEA-Analysis-of-Drug-Related-Overdose-Deaths-in" });
// ]]&gt;</script></p>
<div id="DV-viewer-2671246-DVIC-Philadelphia-Narcan-Administration-by-ZIP" class="DV-container"></div>
<p><script src="//assets.documentcloud.org/viewer/loader.js"></script><script>// <![CDATA[
DV.load("https://www.documentcloud.org/documents/2671246-DVIC-Philadelphia-Narcan-Administration-by-ZIP.js", { width: 740, height: 500, sidebar: false, container: "#DV-viewer-2671246-DVIC-Philadelphia-Narcan-Administration-by-ZIP" });
// ]]&gt;</script></p>The post <a href="https://publicintelligence.net/philadelphia-drug-overdoses/">DEA Report Details Philadelphia’s Growing Drug Overdose Problem</a> first appeared on <a href="https://publicintelligence.net">Public Intelligence</a>.]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>FBI Finds &#8220;Minimal Correlation&#8221; Between Suicide Vests Used in Middle East and Europe</title>
		<link>https://publicintelligence.net/fbi-suicide-vests-europe/</link>
		
		<dc:creator><![CDATA[Public Intelligence]]></dc:creator>
		<pubDate>Wed, 16 Dec 2015 03:11:06 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Improvised Explosive Devices]]></category>
		<category><![CDATA[Islamic State of Iraq and the Levant]]></category>
		<category><![CDATA[Suicide Bombing]]></category>
		<category><![CDATA[Terrorism]]></category>
		<guid isPermaLink="false">https://publicintelligence.net/?p=36769</guid>

					<description><![CDATA[<p>An analysis of recent suicide bombings throughout the Middle East, Europe and Africa by the FBI Terrorism Explosive Device Analytical Center (TEDAC) that was released after the terrorist attacks in Paris, France last month states that "suicide vest and belt improvised explosive devices (IEDs) in the Middle Eastern, African, and European regions likely . . . have minimal correlation" and do not indicate tactical migration.</p>
<p class="more-link-p">
<a class="btn btn-primary" href="https://publicintelligence.net/fbi-suicide-vests-europe/">Read more &#8594;</a></p>
The post <a href="https://publicintelligence.net/fbi-suicide-vests-europe/">FBI Finds “Minimal Correlation” Between Suicide Vests Used in Middle East and Europe</a> first appeared on <a href="https://publicintelligence.net">Public Intelligence</a>.]]></description>
										<content:encoded><![CDATA[<div id="attachment_36796" style="width: 810px" class="wp-caption aligncenter"><a href="https://q.publicintelligence.net/wp-content/uploads/2015/11/suicide-vests-comparison.jpg"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-36796" class="size-full wp-image-36796" src="https://q.publicintelligence.net/wp-content/uploads/2015/11/suicide-vests-comparison.jpg" alt="A collec" width="800" height="552" srcset="https://q.publicintelligence.net/wp-content/uploads/2015/11/suicide-vests-comparison.jpg 800w, https://q.publicintelligence.net/wp-content/uploads/2015/11/suicide-vests-comparison-300x207.jpg 300w, https://q.publicintelligence.net/wp-content/uploads/2015/11/suicide-vests-comparison-150x104.jpg 150w" sizes="auto, (max-width: 800px) 100vw, 800px" /></a><p id="caption-attachment-36796" class="wp-caption-text">Images of suicide vests and belts from an FBI&#8217;s intelligence note released after the November 2013 .</p></div>
<p>An analysis of recent suicide bombings throughout the Middle East, Europe and Africa by the FBI Terrorism Explosive Device Analytical Center (TEDAC) that was released after the terrorist attacks in Paris, France last month states that &#8220;suicide vest and belt improvised explosive devices (IEDs) in the Middle Eastern, African, and European regions likely . . . have minimal correlation&#8221; and do not indicate tactical migration.</p>
<p>Following the attacks in Paris, which featured seven separate suicide bombings, media coverage has focused on the prominent use of suicide vests as indicative a tactical shift for the Islamic State of Iraq and the Levant (ISIL).  Though there are past examples of suicide attacks inside Europe, such as the <a href="https://en.wikipedia.org/wiki/7_July_2005_London_bombings">2005 London bombings</a>, the use of suicide vests in the Paris attacks has been said to represent an entirely <a href="http://news.yahoo.com/paris-suicide-vests-mark-change-tactics-threat-182119483.html">new type of threat</a>, a tactic once relegated to the battlefields of Iraq and Syria now appearing in European cities.  However, an External Intelligence Note issued by TEDAC on November 17 titled &#8220;Suicide Vest and Belt Improvised Explosive Device Tactics in the Middle Eastern, African, and European Regions Show Minimal Signs of Tactic Migration&#8221; and obtained by Public Intelligence presents a different view, attributing the tactical similarities to factors such as &#8220;available materials, training, and local or national counter-IED policies.&#8221;</p>
<p>While TEDAC would normally assume that &#8220;similarities between suicide vests and belts from different regions likely indicate common training or common IED facilitators,&#8221; the intelligence note states that these similarities &#8220;may be a product of independent open source research, thus resulting in a false link between devices and subjects.&#8221;  Moreover, the similarities may &#8220;indicate tactic or construction influences&#8221; based on the nature of the devices and access to required materials.  Similarities can include everything from &#8220;overall IED construction, wiring techniques, common explosives, initiators, switches, electronic diagrams, enhancements, and employment.&#8221;</p>
<p>When broadly examined, the types of &#8220;suicide vests and belt IEDs observed in each region&#8221; covered in the intelligence note &#8220;differ broadly in many characteristics, resulting in an inconclusive determination that the suicide vest and belt IEDs prevalent in any one area translate to tactic migration.&#8221;</p>
<p>A study by the Institute of National Security Studies found that there were approximately 370 suicide bombings in the Middle East region in 2014 claiming the lives of over 2,700 victims.  Iraq, Yemen, Lebanon and Libya all saw a significant increase in the use of the tactic over the previous year.  Prior to the attacks in Paris, suicide bombings in Europe have been primarily limited to Turkey and Russia.</p>
<table>
<tbody>
<tr>
<td></td>
<td style="text-align: center;"><strong>Middle East</strong></td>
<td style="text-align: center;"><strong>Europe</strong></td>
<td style="text-align: center;"><strong>Africa</strong></td>
</tr>
<tr>
<td><strong>Common explosives used in suicide vests/belts</strong></td>
<td>triacetone triperoxide (TATP), trinitrotoluene (TNT), Semtex, C4, Research Development Formula X (RDX), and pentaerythritol tetranitrate (PETN)</td>
<td>TNT and C4</td>
<td>RDX, Ammonium Nitrate, and Urea Nitrate</td>
</tr>
</tbody>
</table>
<p>The intelligence note takes several quotes from an <a href="http://www.spiegel.de/international/world/a-conversation-with-an-isis-suicide-bomber-logistician-a-1043485.html">interview conducted by <em>Der Spiegel</em></a> with a captured ISIL leader named Abu Abdullah discussing the group&#8217;s target selection process and methods for constructing suicide vests.  He describes how he used &#8220;explosive fill removed from artillery shells for car bombs&#8221; and &#8220;drilled open the shells of anti-aircraft guns to construct suicide belts because he believed the effect of the powder was more intense.&#8221;  According to the interview, he would receive a potential bombers&#8217; measurements in &#8220;advance from the leadership in order to be able to make a well-fitting belt&#8221; and &#8220;always had belts in different sizes prepared.&#8221;</p>
<p>Explosive vests in Yemen have also included similar design elements.  A suicide bomber tied to Al Qaeda in the Arabian Peninsula (AQAP) was killed in July 2015 by Houthi forces prior to detonating his vest, allowing for forensic analysis.  The device featured &#8220;dual grenade-pin detonators, a main charge wrapped with sheets of ball bearings, and detonation cord that was placed inside a pouch around the bomber’s waist.&#8221;</p>
<p>Similar to the Middle East, bombings in Turkey have often used either C4 or trinitrotoluene (TNT) in suicide vests.  Vests used in the Middle East often included other high-powered explosives such as Semtex or Research Development Formula X (RDX) or triacetone triperoxide (TATP), the explosive that was reportedly used in the vests detonated during the Paris attacks.</p>
<div id="DV-viewer-2642355-U-LES-FBI-Suicide-Vest-and-Belt-Use-in-Middle" class="DV-container"></div>
<p><script src="//assets.documentcloud.org/viewer/loader.js"></script><script>// <![CDATA[
DV.load("https://www.documentcloud.org/documents/2642355-U-LES-FBI-Suicide-Vest-and-Belt-Use-in-Middle.js", { width: 740, height: 1000, sidebar: false, container: "#DV-viewer-2642355-U-LES-FBI-Suicide-Vest-and-Belt-Use-in-Middle" });
// ]]&gt;</script></p>The post <a href="https://publicintelligence.net/fbi-suicide-vests-europe/">FBI Finds “Minimal Correlation” Between Suicide Vests Used in Middle East and Europe</a> first appeared on <a href="https://publicintelligence.net">Public Intelligence</a>.]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>The Dangers of Traveling Overseas to Fight Against the Islamic State</title>
		<link>https://publicintelligence.net/its-dangerous-fighting-isis/</link>
					<comments>https://publicintelligence.net/its-dangerous-fighting-isis/#respond</comments>
		
		<dc:creator><![CDATA[Public Intelligence]]></dc:creator>
		<pubDate>Mon, 05 Oct 2015 01:44:46 +0000</pubDate>
				<category><![CDATA[Featured]]></category>
		<guid isPermaLink="false">https://publicintelligence.net/?p=36374</guid>

					<description><![CDATA[<p>Foreign fighters are pouring into Iraq and Syria from all over the world to take up arms with the Islamic State (ISIL).  Recent reports have estimated that as many as 30,000 foreign fighters may be fighting in Iraq and Syria and that they are flowing in at a rate of nearly 1,000 new recruits a month.  However, a recently emerging phenomenon of Western individuals, primarily veterans, returning to Iraq and Syria to fight against ISIL forces has only recently begun to receive significant media attention.  No one has a precise number on how many Westerners are actually fighting in the conflict against ISIL, though estimates often place the number somewhere around 100-130 foreign fighters.</p>
<p class="more-link-p">
<a class="btn btn-primary" href="https://publicintelligence.net/its-dangerous-fighting-isis/">Read more &#8594;</a></p>
The post <a href="https://publicintelligence.net/its-dangerous-fighting-isis/">The Dangers of Traveling Overseas to Fight Against the Islamic State</a> first appeared on <a href="https://publicintelligence.net">Public Intelligence</a>.]]></description>
										<content:encoded><![CDATA[<p>Foreign fighters are pouring into Iraq and Syria from all over the world to take up arms with the Islamic State (ISIL).  Recent reports have estimated that as many as<a href="http://www.nytimes.com/2015/09/27/world/middleeast/thousands-enter-syria-to-join-isis-despite-global-efforts.html"> 30,000 foreign fighters may be fighting in Iraq and Syria</a> and that they are flowing in at a rate of nearly 1,000 new recruits a month.  However, a recently emerging phenomenon of Western individuals, primarily veterans, returning to Iraq and Syria to fight against ISIL forces has only <a href="http://www.wsj.com/articles/the-american-veterans-who-fight-isis-1441362601">recently</a> <a href="http://www.foxnews.com/world/2015/05/27/there-evil-in-this-world-us-vets-risk-all-to-fight-isis-with-kurdish-forces/">begun</a> <a href="http://www.huffingtonpost.com/entry/american-foreign-fighters-syria-iraq_55e76900e4b0c818f61a85f0">to receive</a> <a href="http://www.nytimes.com/2015/03/12/us/disenchanted-by-civilian-life-veterans-volunteer-to-fight-isis.html">significant</a> <a href="http://www.nbcsandiego.com/news/local/San-Diego-Veteran-Plans-to-Return-to-Iraq-to-Fight-Against-ISIS-309657431.html">media attention</a>.  No one has a precise number on how many Westerners are actually fighting in the conflict against ISIL, though estimates often place the number somewhere around <a href="https://www.bellingcat.com/wp-content/uploads/2015/08/The-Other-Foreign-Fighters1.pdf">100-130 foreign fighters</a>.</p>
<p>Seeing this increasing trend, the Department of Homeland Security, National Counterterrorism Center and FBI released a joint intelligence bulletin in late July warning of the dangers in traveling overseas to fight against ISIL forces.  The bulletin titled &#8220;<a href="https://publicintelligence.net/dhs-fbi-nctc-risks-fighting-isis/">Risks for US Persons Traveling to Combat the Islamic State of Iraq and the Levan</a>t&#8221; was obtained by Public Intelligence and discusses the &#8220;emerging trend of US persons traveling to combat ISIL.&#8221;</p>
<p>The bulletin states that a &#8220;number of US persons have traveled to Syria or Iraq of their own volition to combat ISIL over the past year, according to media interviews granted by these individuals&#8221; which &#8220;underscores a recent broader trend of Westerners mostly joining Kurdish forces and likely motivated by ISIL’s indiscriminate killing of civilians, aid workers, and journalists, as well as a desire to protect civilians, among other reasons.&#8221;</p>
<p>The bulletin notes that many of the &#8220;identified US persons do not appear to have ethnic or family ties to Syria or Iraq&#8221; and that the trend will likely continue &#8220;given the group’s ongoing atrocities, the publicity that US anti-ISIL fighters have received, the perception among some US persons that regional groups confronting ISIL need their help, and the prevalence of social media tools to facilitate communication and travel with anti-ISIL groups in the region.&#8221;</p>
<h5>People&#8217;s Protection Units</h5>
<p>The majority of U.S. and European individuals that have traveled to Iraq and Syria to fight against ISIL have joined Kurdish forces.  Some have elected to fight alongside the Peshmerga, the forces of Iraqi Kurdistan, while many others have joined the YPG, also known as the <a href="https://en.wikipedia.org/wiki/People's_Protection_Units">People&#8217;s Protection Units</a> of Syrian Kurdistan.  The YPG has a robust online recruitment effort <a href="http://thelionsofrojava.com/">complete with a website</a> providing useful information on what to expect when fighting alongside Kurdish forces and interviews with foreign fighters that have successfully made the journey to Syria.  Their Facebook page <a href="https://www.facebook.com/TheLionsOfRojava">The Lions of Rojava</a> has more than 30,000 likes and features many pictures of Western fighters along with other promotional items.</p>
<div id="attachment_36589" style="width: 970px" class="wp-caption aligncenter"><a href="https://publicintelligence.net/wp-content/uploads/2015/09/americans-fighting-isis.jpg"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-36589" class="size-full wp-image-36589" src="https://publicintelligence.net/wp-content/uploads/2015/09/americans-fighting-isis.jpg" alt="A photo from Jordan Matson's Facebook page" width="960" height="576" srcset="https://q.publicintelligence.net/wp-content/uploads/2015/09/americans-fighting-isis.jpg 960w, https://q.publicintelligence.net/wp-content/uploads/2015/09/americans-fighting-isis-300x180.jpg 300w, https://q.publicintelligence.net/wp-content/uploads/2015/09/americans-fighting-isis-150x90.jpg 150w" sizes="auto, (max-width: 960px) 100vw, 960px" /></a><p id="caption-attachment-36589" class="wp-caption-text">A photo from Jordan Matson&#8217;s Facebook page. Matson, second from the right, is one of a number of foreign fighters that have joined with Kurdish forces to fight against ISIL.</p></div>
<p>One fighter who has received significant media attention after joining the YPG is Jordan Matson, a 28-year-old man from Wisconsin who previously served in the U.S. Army.  Matson reportedly worked as a delivery driver for several months to save money prior to heading to Turkey in September 2014 to meet with Kurdish forces.  He was eventually escorted by a YPG representative into Iraq and posed as a doctor to get into Syria.  He has <a href="https://www.facebook.com/jordan.matson.3">documented his journey on Facebook</a> which contains dozens of photos of Matson with other Kurdish fighters.  In an <a href="http://www.usatoday.com/story/news/world/2014/10/06/jordan-matson-joins-kurds-against-islamic-state/16796487/">interview with USA Today</a>, Matson said that he is not paid for his efforts but that the Kurds &#8220;treat me like family.&#8221;  They provide little in the way of supplies and are their ranks are often made up of young men and women with minimal training.  &#8220;Sometimes it&#8217;s just kids.  That&#8217;s the way it is.  I have a Kalashnikov and that&#8217;s it.&#8221;</p>
<div id="attachment_36593" style="width: 226px" class="wp-caption alignright"><a href="https://publicintelligence.net/wp-content/uploads/2015/09/keith-broomfield.jpg"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-36593" class="size-full wp-image-36593" src="https://publicintelligence.net/wp-content/uploads/2015/09/keith-broomfield.jpg" alt="An image of Keith Broomfield distributed by the YPG." width="216" height="300" srcset="https://q.publicintelligence.net/wp-content/uploads/2015/09/keith-broomfield.jpg 216w, https://q.publicintelligence.net/wp-content/uploads/2015/09/keith-broomfield-108x150.jpg 108w" sizes="auto, (max-width: 216px) 100vw, 216px" /></a><p id="caption-attachment-36593" class="wp-caption-text">An image of Keith Broomfield distributed by the YPG.</p></div>
<p>In June, a 36-year-old from Massachusetts named Keith Broomfield was killed near Kobani, Syria while fighting with the YPG.   Broomfield is believed to be <a href="http://www.nbcnews.com/storyline/isis-terror/kurds-hail-american-martyr-keith-broomfield-killed-fighting-isis-n373626">the first U.S. citizen killed</a> while fighting with the Kurds against ISIL.  According to his father, Broomfield had gotten into trouble in his younger years and straightened his life out after finding religion.  He &#8220;believed it was God&#8217;s will that he go help the suffering Kurds.&#8221;  Broomfield&#8217;s brother said that &#8220;He knew the risk. He understood those. He believed in opposing evil, which I believe in, too.&#8221;  After his death, his sister posted a message on Facebook stating that &#8220;My brother died to defend my sisters who are being sold, enslaved, raped and murdered. To defend my brothers who are shot beheaded and dumped into piles off trucks.&#8221;</p>
<p>The joint intelligence bulletin issued by DHS, FBI and NCTC describes Broomfield&#8217;s death as underscoring the &#8220;risks of traveling to join anti-ISIL groups&#8221; which include &#8220;dying in accidents or being captured in combat.&#8221;  The bulletin adds that &#8220;ISIL almost certainly would seek to use captured US persons in its messaging videos, as it has done with captive Western journalists, aid workers, and coalition military personnel.&#8221;</p>
<h5>ISIL Social Engineering</h5>
<p>Due to the online recruitment efforts of Kurdish forces, one particular concern that is repeated numerous times in the joint intelligence bulletin is that individuals wishing to join the fight against ISIL are vulnerable to social engineering.  &#8220;Violent extremist hackers have commonly used various forms of social engineering to obtain information about their adversaries&#8221; and ISIL supporters in other countries &#8220;could use these techniques against US persons who express on social media a desire to travel to join anti-ISIL groups.&#8221;  The bulletin cites an incident in November 2014 where a Syrian civil rights group received an email claiming to be from Canadian activists and identifying the location of ISIL strongholds.  Instead, a link in the email led to &#8220;malware intended to collect the victim’s IP address and other system information to determine a victim’s physical location.&#8221;</p>
<p>The threat posed by social engineering is heightened due to the fact that &#8220;those with former US military affiliations may be more desirable targets for ISIL, particularly in light of ISIL’s September 2014 call for attacks against members of the military, law enforcement, and government personnel; a message the group continues to emphasize.&#8221;  Moreover, the FBI has received &#8220;reporting indicating individuals located overseas are spotting and assessing like-minded individuals in the United States who are willing and capable of conducting attacks against current and former US-based members of the US military.&#8221;  An <a href="https://publicintelligence.net/fbi-middle-eastern-males/">FBI alert from early July</a> reported that two Middle-Eastern men approached the wife of US service member in Colorado and asked if she was the &#8220;wife of a US interrogator.&#8221;  The men laughed when she denied this and &#8220;left the area in a dark-colored, four-door sedan with two other Middle-Eastern males in the vehicle.&#8221;  The alert added that similar &#8220;incidents in Wyoming have been reported to the FBI throughout June 2015&#8221; where &#8220;family members of military personnel were confronted by Middle-Eastern males in front of their homes&#8221; who attempted to &#8220;obtain personal information about the military member and family members through intimidation.&#8221;</p>
<p>The joint intelligence bulletin ends with a statement that &#8220;FBI, DHS, and NCTC urge vigilance and advise individuals who express anti-ISIL sentiment publicly—current and former military members in particular—to review their online social media accounts for any information that might serve to attract the attention of violent extremists, and to exercise operational security in their interactions online.&#8221;  It also advises that anyone planning to go to the region &#8220;regardless of their intent or motivation, should be aware of the limited consular access in Syria and Iraq, the potential to inadvertently violate US or Iraqi law, and the increased likelihood of being targeted by violent extremist groups, including but not limited to ISIL.&#8221;</p>
<div id="DV-viewer-2448151-dhs-fbi-nctc-bulletin-risks-for-us-persons" class="DV-container"></div>
<p><script src="//assets.documentcloud.org/viewer/loader.js"></script><script>// <![CDATA[
DV.load("//www.documentcloud.org/documents/2448151-dhs-fbi-nctc-bulletin-risks-for-us-persons.js", { width: 860, height: 1100, sidebar: false, container: "#DV-viewer-2448151-dhs-fbi-nctc-bulletin-risks-for-us-persons" });
// ]]&gt;</script></p>The post <a href="https://publicintelligence.net/its-dangerous-fighting-isis/">The Dangers of Traveling Overseas to Fight Against the Islamic State</a> first appeared on <a href="https://publicintelligence.net">Public Intelligence</a>.]]></content:encoded>
					
					<wfw:commentRss>https://publicintelligence.net/its-dangerous-fighting-isis/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Transitioning PGP Keys</title>
		<link>https://publicintelligence.net/new-pgp-key/</link>
		
		<dc:creator><![CDATA[Public Intelligence]]></dc:creator>
		<pubDate>Sun, 20 Sep 2015 02:00:48 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<guid isPermaLink="false">https://publicintelligence.net/?p=36539</guid>

					<description><![CDATA[<p>We are transitioning PGP keys in conjunction with the establishment of new security procedures.  We are moving from our old key (0x5FE1B448) to our new key (0xD0516538).</p>
<p class="more-link-p">
<a class="btn btn-primary" href="https://publicintelligence.net/new-pgp-key/">Read more &#8594;</a></p>
The post <a href="https://publicintelligence.net/new-pgp-key/">Transitioning PGP Keys</a> first appeared on <a href="https://publicintelligence.net">Public Intelligence</a>.]]></description>
										<content:encoded><![CDATA[<p>We are transitioning PGP keys in conjunction with the establishment of new security procedures.  The following is our key transition statement signed with our new key.  You can download a copy of the new key <a href="https://publicintelligence.net/public-intel-key.asc">here</a>.  You can also download a copy of the transition statement below <a href="https://publicintelligence.net/wp-content/uploads/2015/09/key-transition-new.txt.asc">signed with our new key</a> as well as a copy of the statement <a href="https://publicintelligence.net/wp-content/uploads/2015/09/key-transition-old.txt.asc">signed with our old key</a>.</p>
<pre>
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

We are switching keys as of September 20, 2015 from our old key:

pub   4096R/5FE1B448 2010-08-04 [expires: 2020-08-01]
      Key fingerprint = 26BB 850B 4764 B794 F2D7  5158 1461 A2E6 5FE1 B448
uid                  Public Intelligence &lt;support@publicintelligence.net&gt;
uid                  Public Intelligence &lt;admin@publicintelligence.net&gt;
uid                  Public Intelligence &lt;legal@publicintelligence.net&gt;
uid                  Public Intelligence &lt;inquiries@publicintelligence.net&gt;
uid                  Public Intelligence &lt;info@publicintelligence.net&gt;
sub   4096R/53B3CD8A 2010-08-04 [expires: 2020-08-01]

to our new key:

pub   4096R/D0516538 2015-09-05 [expires: 2020-01-01]
      Key fingerprint = 4D17 E7AA 79C5 6039 7924  A511 098D A386 D051 6538
uid                  Public Intelligence &lt;info@publicintelligence.net&gt;
sub   4096R/0F43412D 2015-09-05 [expires: 2017-09-04]
sub   4096R/710BFB6B 2015-09-05 [expires: 2017-09-04]

Here is a copy of the key: 

- -----BEGIN PGP PUBLIC KEY BLOCK-----
Version: GnuPG v2
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=ZQsZ
- -----END PGP PUBLIC KEY BLOCK-----
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2
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=8sb1
-----END PGP SIGNATURE-----
</pre>The post <a href="https://publicintelligence.net/new-pgp-key/">Transitioning PGP Keys</a> first appeared on <a href="https://publicintelligence.net">Public Intelligence</a>.]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>DHS, CIA Provide Glomar Responses to FOIA Requests on Public Intelligence</title>
		<link>https://publicintelligence.net/dhs-cia-glomar-responses/</link>
					<comments>https://publicintelligence.net/dhs-cia-glomar-responses/#respond</comments>
		
		<dc:creator><![CDATA[Public Intelligence]]></dc:creator>
		<pubDate>Mon, 20 Jul 2015 02:13:56 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Central Intelligence Agency]]></category>
		<category><![CDATA[Department of Homeland Security]]></category>
		<category><![CDATA[Glomar Response]]></category>
		<guid isPermaLink="false">http://publicintelligence.net/?p=35280</guid>

					<description><![CDATA[<p>The Central Intelligence Agency (CIA) and Department of Homeland Security Office of Intelligence and Analysis (I&#038;A) have both responded to recent requests under the Freedom of Information Act (FOIA) for all records "related to or mentioning the website Public Intelligence" with a glomar response, refusing to admit the existence or nonexistence of records related to the request.</p>
<p class="more-link-p">
<a class="btn btn-primary" href="https://publicintelligence.net/dhs-cia-glomar-responses/">Read more &#8594;</a></p>
The post <a href="https://publicintelligence.net/dhs-cia-glomar-responses/">DHS, CIA Provide Glomar Responses to FOIA Requests on Public Intelligence</a> first appeared on <a href="https://publicintelligence.net">Public Intelligence</a>.]]></description>
										<content:encoded><![CDATA[<div id="attachment_36011" style="width: 1290px" class="wp-caption aligncenter"><a href="https://publicintelligence.net/wp-content/uploads/2015/07/glomar-explorer.jpg"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-36011" class="size-full wp-image-36011" src="https://publicintelligence.net/wp-content/uploads/2015/07/glomar-explorer.jpg" alt="The Glomar explorer" width="1280" height="833" srcset="https://q.publicintelligence.net/wp-content/uploads/2015/07/glomar-explorer.jpg 1280w, https://q.publicintelligence.net/wp-content/uploads/2015/07/glomar-explorer-300x195.jpg 300w, https://q.publicintelligence.net/wp-content/uploads/2015/07/glomar-explorer-1024x666.jpg 1024w, https://q.publicintelligence.net/wp-content/uploads/2015/07/glomar-explorer-150x98.jpg 150w" sizes="auto, (max-width: 1280px) 100vw, 1280px" /></a><p id="caption-attachment-36011" class="wp-caption-text">The USNS Hughes Glomar Explorer (T-AG-193), now known as the GSF Explorer, from which the so-called &#8220;Glomar response&#8221; derives its name.</p></div>
<p>The Central Intelligence Agency (CIA) and Department of Homeland Security Office of Intelligence and Analysis (I&amp;A) have both responded to recent requests under the Freedom of Information Act (FOIA) for all records &#8220;related to or mentioning the website Public Intelligence&#8221; with a Glomar response, refusing to admit the existence or nonexistence of records related to the request.</p>
<p>The <a href="https://info.publicintelligence.net/DHS-DenialFinal.pdf">response from I&amp;A</a> states that the request is denied specifically pursuant to Title 50 US Code § 3024(i) and 6 U.S.C. § 121(d)(11), two statutes protecting intelligence sources and methods. The denial states that &#8220;the fact of the existence or nonexistence of records pertaining to your request would be exempted from disclosure pursuant to the third exemption of the Freedom of Information Act (FOIA)&#8221; and though specific statutes are cited &#8220;I&amp;A neither confirms nor denies that such records may or may not exist.&#8221;</p>
<p>The <a href="https://info.publicintelligence.net/CIA-DenialFinal.pdf">response from CIA</a> states that the request is denied due to section 102A(i)(1) of the National Security Act of 1947 as well as section 6 of the CIA Act of 1949. Section 102A(i) of the National Security Act of 1947 as amended requires the Director of National Intelligence to protect &#8220;intelligence sources and methods from unauthorized disclosure.&#8221; Section 6 of the CIA Act of 1949 as amended references section 102A(i)(1) of the National Security Act and further affirms that the Agency is exempt from the &#8220;provisions of any other laws which require the publication or disclosure of the organization, functions, names, official titles, salaries, or numbers of personnel employed by the Agency . . .&#8221; In 2010, John Young of Cryptome previously requested information on himself and his website and received a <a href="http://cryptome.org/0002/cia-cryptome.pdf">nearly identical response</a> citing the same statutes.</p>
<p>A &#8220;Glomar response&#8221; is generally provided when an agency&#8217;s denial of a request would indicate that records pertinent to the request do, in fact, exist and thus expose either classified information or impact an individual&#8217;s privacy.  For example, the Department of Justice Office of Information Policy <a href="http://www.justice.gov/oip/blog/foia-update-oip-guidance-privacy-glomarization">states that</a> a &#8220;FOIA request seeking records which would indicate that a particular political figure, prominent businessman or even just an ordinary citizen has been the subject of a law enforcement investigation may require an agency to flatly refuse to confirm or deny whether such records exist.&#8221;  This is also true if the records in question are properly classified as &#8220;confirmation or denial of the existence of responsive records would, in and of itself, reveal exempt information.&#8221;</p>
<p>The &#8220;Glomar response&#8221; takes its name from the U.S. Navy Ship Hughes Glomar Explorer, a vessel built by Howard Hughes for his company Global Marine Development Inc.  Though the ship was ostensibly a marine research vessel, it was actually built on behalf of the CIA for an operation called <a href="https://en.wikipedia.org/wiki/Project_Azorian">Project Azorian</a> that was focused on salvaging a Russian submarine that had sunk in the middle of the Pacific Ocean in 1969.  After news stories that exposed the operation appeared in both the Los Angeles Times and New York Times in 1975, journalists for both publications revealed that the CIA had made significant efforts to prevent the stories from being published.  A journalist named Harriet Ann Phillippi filed a request for records related to the Agency&#8217;s censorship attempts and was provided a response that read &#8220;in the interest of national security, involvement by the U.S. Government in the activities which are the subject matter of your request can neither be confirmed nor denied.&#8221;</p>
<div id="DV-viewer-2157914-cia-glomar-response-to-request-on-public" class="DV-container"></div>
<p><script src="//s3.amazonaws.com/s3.documentcloud.org/viewer/loader.js"></script><script>// <![CDATA[
DV.load("//www.documentcloud.org/documents/2157914-cia-glomar-response-to-request-on-public.js", {   width: 740,     height: 1000,     sidebar: false,     container: "#DV-viewer-2157914-cia-glomar-response-to-request-on-public"   });
// ]]&gt;</script></p>
<div id="DV-viewer-2157915-dhs-i-amp-a-glomar-response-to-request-on-public" class="DV-container"></div>
<p><script src="//s3.amazonaws.com/s3.documentcloud.org/viewer/loader.js"></script><script>// <![CDATA[
DV.load("//www.documentcloud.org/documents/2157915-dhs-i-amp-a-glomar-response-to-request-on-public.js", {   width: 740,     height: 1000,     sidebar: false,     container: "#DV-viewer-2157915-dhs-i-amp-a-glomar-response-to-request-on-public"   });
// ]]&gt;</script></p>The post <a href="https://publicintelligence.net/dhs-cia-glomar-responses/">DHS, CIA Provide Glomar Responses to FOIA Requests on Public Intelligence</a> first appeared on <a href="https://publicintelligence.net">Public Intelligence</a>.]]></content:encoded>
					
					<wfw:commentRss>https://publicintelligence.net/dhs-cia-glomar-responses/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>The Increasing Sophistication and Legitimacy of the Islamic State</title>
		<link>https://publicintelligence.net/the-increasing-sophistication-of-the-islamic-state/</link>
					<comments>https://publicintelligence.net/the-increasing-sophistication-of-the-islamic-state/#respond</comments>
		
		<dc:creator><![CDATA[Public Intelligence]]></dc:creator>
		<pubDate>Tue, 23 Jun 2015 02:47:42 +0000</pubDate>
				<category><![CDATA[Featured]]></category>
		<category><![CDATA[Department of Homeland Security]]></category>
		<category><![CDATA[Islamic State of Iraq and the Levant]]></category>
		<guid isPermaLink="false">https://publicintelligence.net/?p=35744</guid>

					<description><![CDATA[<p>The Islamic State of Iraq and the Levant (ISIL) has become the preeminent terror group among U.S.-based extremists according to an assessment authored by the Department of Homeland Security and more than a dozen state and local fusion centers. Individuals determined to fight "overseas in a Muslim-majority country" or conduct attacks domestically will be "more likely to derive inspiration from ISIL than [al-Qaeda] or any of its affiliates" as long as ISIL can maintain its "current level of perceived legitimacy and relevancy." This assessment of ISIL's increasing popularity among domestic extremists is the focus of a ten page Field Analysis Report obtained by Public Intelligence titled <em>Assessing ISIL's Influence and Perceived Legitimacy in the Homeland: A State and Local Perspective</em>. Drawing on suspicious activity reports from around the country as well as intelligence reporting from DHS and the Bureau of Prisons, the report finds that ISIL's military successes in Iraq and Syria along with the group's self-proclaimed re-establishment of the caliphate have captured the attention of violent extremists likely to buy in to its "violent extremist counterculture."</p>
<p class="more-link-p">
<a class="btn btn-primary" href="https://publicintelligence.net/the-increasing-sophistication-of-the-islamic-state/">Read more &#8594;</a></p>
The post <a href="https://publicintelligence.net/the-increasing-sophistication-of-the-islamic-state/">The Increasing Sophistication and Legitimacy of the Islamic State</a> first appeared on <a href="https://publicintelligence.net">Public Intelligence</a>.]]></description>
										<content:encoded><![CDATA[<p>The Islamic State of Iraq and the Levant (ISIL) has become the preeminent terror group among U.S.-based extremists according to an assessment authored by the Department of Homeland Security and more than a dozen state and local fusion centers. Individuals determined to fight &#8220;overseas in a Muslim-majority country&#8221; or conduct attacks domestically will be &#8220;more likely to derive inspiration from ISIL than [al-Qaeda] or any of its affiliates&#8221; as long as ISIL can maintain its &#8220;current level of perceived legitimacy and relevancy.&#8221; This assessment of ISIL&#8217;s increasing popularity among domestic extremists is the focus of a ten page Field Analysis Report obtained by Public Intelligence titled <em><a href="https://publicintelligence.net/dhs-assessing-legitimacy-isil/">Assessing ISIL&#8217;s Influence and Perceived Legitimacy in the Homeland: A State and Local Perspective</a></em>. Drawing on suspicious activity reports from around the country as well as intelligence reporting from DHS and the Bureau of Prisons, the report finds that ISIL&#8217;s military successes in Iraq and Syria along with the group&#8217;s self-proclaimed re-establishment of the caliphate have captured the attention of violent extremists likely to buy in to its &#8220;violent extremist counterculture.&#8221;</p>
<p>While this may mean that more &#8220;lone offender&#8221; attacks against U.S. targets are on the way, an assessment from the DHS Office of Intelligence and Analysis sees more sophisticated plots on the horizon. Focusing on a plot disrupted in January 2015 by Belgian authorities in which &#8220;a large group of terrorists possibly operating under ISIL direction&#8221; were found to have stockpiled explosive precursors and sophisticated weaponry, DHS concludes that the group may have &#8220;developed the capability to launch more complex operations in the West.&#8221; The assessment titled <em><a href="https://publicintelligence.net/dhs-assessing-legitimacy-isil/">Future ISIL Operations in West Could Resemble Disrupted Belgian Plot</a></em> was released to law enforcement last month and was also obtained by Public Intelligence.</p>
<p><strong>An Increase in Suspicious Activity </strong></p>
<p>In the second half of 2014, the volume of ISIL-related suspicious activity reports that were received by state, local and federal authorities &#8220;increased sharply,&#8221; indicating a trend that &#8220;signifies a penetration of ISIL&#8217;s messaging into the Homeland.&#8221; This increase coincides with the group&#8217;s recent military successes including &#8220;rapid territorial gains&#8221; and the &#8220;self-declared re-establishment of a caliphate.&#8221; ISIL has also rapidly expanded its English-language messaging to include armies of social media accounts, elaborate and gruesome videos as well as an English-language magazine that highlights life inside of the Islamic State, including &#8220;government services&#8221; such as &#8220;banking, health care and education.&#8221; Previous <a href="https://publicintelligence.net/isil-savvy-media-western-youth/">assessments from DHS</a> have noted the &#8220;savvy&#8221; use of media by ISIL, though the Field Analysis Report studying the group&#8217;s legitimacy focuses on the activity this messaging has inspired domestically. According to the report, graffiti, symbols, paraphernalia and other ISIL-related imagery has been reported to law enforcement throughout the U.S.  Personnel at Marine Corps Base Quantico reportedly discovered leaflets with an ISIL banner discussing &#8220;coming from Mexico on a train.&#8221; Small ISIL flags were found on the windshields of vehicles in a residential neighborhood in Falls Church, Virginia. ISIL stickers have also been reported on highway signs and other public structures in Arizona, Nevada and Texas.</p>
<p>Though suspicious activity reports related to ISIL have increased significantly, many of the reports are likely not a legitimate indicator of ISIL activity. In preparing their Field Analysis Report, fusion center personnel reviewed a number of incidents that resulted in suspicious activity reports being filed into the national Information Sharing Environment and found that half of those were based on anonymous tips &#8220;that were likely not credible.&#8221; These reports often described &#8220;aspirational threats of violence against family or friends, where ISIL-affiliation appeared to be used only as a means to intimidate the victim(s).&#8221; The other incidents reviewed, &#8220;most of which . . . were also likely not credible&#8221; related to public threats against political targets. These include threats made against the President as well as public calls for the assassination of Twitter employees following the company&#8217;s suspension of accounts associated with ISIL in 2014. Over one-third of the reports were related to &#8220;social media postings&#8221; including the dissemination of &#8220;official ISIL messaging.&#8221;</p>
<p><strong>ISIL&#8217;s Legitimacy Surpasses al-Qaeda<br />
</strong></p>
<p>Whether the increase in suspicious activity reporting related to ISIL is an accurate indicator of the group&#8217;s increasing operational presence or simply an artifact of the group&#8217;s increasing notoriety, the Field Analysis Report argues it is a reflection of the group&#8217;s increasing legitimacy.  Through its bloody tactics, the group wins converts by asserting their defense of &#8220;Muslims against enemy attacks&#8221; as well as the defense of the &#8220;self-proclaimed re-establishment of the caliphate.&#8221;  Citing surveillance of inmate communications conducted by the Bureau of Prisons, the Field Analysis Report lists a number of incidents where U.S. involvement in the Middle East was listed as a justification of ISIL&#8217;s tactics.  In multiple conversations with family members, one inmate reportedly stated his belief that the group needed to &#8220;finish Shiites and other disbelievers.&#8221;  Criminal indictments of U.S. persons inspired by ISIL to either travel overseas or conduct attacks domestically also indicate a &#8220;general desire to fight overseas, defend Muslims against aggressors and join like-minded violent extremists.&#8221;</p>
</div>
</div>
</div>
</div>
<div class="grid wfull">
<div style="height: 800px; background: url(https://publicintelligence.net/wp-content/uploads/2015/05/garland-attack.jpeg); no-repeat; background-size: cover;"></div>
</div>
<div id="page">
<div id="main" class="grid row">
<div id="primary" class="c9 centered">
<div class="entry-content">
<p>ISIL&#8217;s attraction among domestic extremists has become so strong that the formal division between the group&#8217;s leadership and al-Qaeda has had little effect on their support for both groups.  Individuals arrested for trying to join ISIL, as well as individuals who have traveled overseas to fight with the group, have expressed support for Anwar al-Aulaqi, al-Qaeda in the Arabian Peninsula as well as Jabhat al-Nusra.  This support indicates that potential &#8220;homegrown violent extremists&#8221; may &#8220;embrace the groups&#8217; similarities more than their distinctions.&#8221;  However, U.S.-based extremists are &#8220;more likely to derive inspiration from ISIL than [al-Qaeda]&#8221; or other groups, a judgment which DHS states is &#8220;consistent with [the Office of Intelligence and Analysis&#8217;] review of all-source reporting on the topic.&#8221;  In fact, DHS states that it concurs with the Field Analysis Report&#8217;s judgment that &#8220;ISIL&#8217;s 2014 successes on the ground in Iraq and Syria&#8211;especially its declaration reestablishing the caliphate&#8211;and sophisticated English-language messaging campaign . . . are key drivers contributing to the group&#8217;s support among a small subset of US-based individuals.&#8221;</p>
<p><strong>Increasingly Sophisticated Attacks</strong></p>
<p>Along with their rising legitimacy and increasing popular appeal, ISIL has also likely &#8220;developed the capability to launch more complex operations in the West.&#8221;  An assessment authored by the DHS Office of Intelligence and Analysis in May concludes that future attacks conducted by ISIL could reflect an increasingly &#8220;complex, centrally planned plotting&#8221; over the &#8220;more-simplistic attacks by ISIL-inspired or directed individuals.&#8221;  The assessment focuses on a plot disrupted in Belgium earlier this year &#8220;involving an Islamic State of Iraq and the Levant (ISIL) group with at least ten operatives—some of whom were returning foreign fighters—possibly targeting police or the public.&#8221;  The plot may have been directed by members of ISIL and was apparently in an early planning phase as there is no publicly available information about the group&#8217;s target.  The raid of a safe house in Verviers, Belgium on January 15, 2015 resulted in a firefight between three suspects involved in the plot and police.  Two of the suspects were ultimately killed and the third was arrested by Belgian authorities.  Items recovered from the safe house as well as other locations in Belgium and several other European countries included &#8220;automatic firearms, precursors for the explosive triacetone triperoxide (TATP), a body camera, multiple cell phones, handheld radios, police uniforms, fraudulent identification documents, and a large quantity of cash.&#8221;</p>
<p>With more than a dozen individuals associated with the plot spread out throughout Europe, including France, Spain, Greece and the Netherlands, the group sought to exploit the &#8220;significant challenges for law enforcement to detect and investigate multi-jurisdictional threats and the necessity of interagency sharing of information about emerging and ongoing threats.&#8221;  In fact, the group&#8217;s leader Abdelhamid Abaaoud reportedly directed other members via a cell phone from a safe house in Athens, Greece and was able to return to Syria even after the raid in Belgium, despite having international warrants for his arrest.  The group also employed sophisticated operational security measures and were able to acquire weapons and other supplies without being detected by law enforcement due to knowledge gained during their extensive criminal histories.</p>
<p>The DHS assessment finds that the &#8220;countermeasures used by this group underscore how knowledge of law enforcement tactics can help subjects adapt their patterns of behavior and highlight the need for investigators to consider whether subjects may be using countermeasures to deflect scrutiny.&#8221; One group member reportedly changed his cell phone five times, instructed other members of the group to frequently switch vehicles and to examine their surroundings for hidden microphones and other surveillance equipment. Communications between group members often occurred in several different languages and used coded language to hinder translation efforts. The group utilized an assortment of fraudulent identification documents and kept a large amount of cash &#8220;intended to fund some of the group’s procurement activities and to conceal purchasing patterns.&#8221;</p>
<p>These efforts to conceal their activities indicate that the group was &#8220;likely aided by members’ criminal background and possible access to criminal groups, underscoring the potential for operatives to bypass traditional tripwires and obscure operational planning efforts.&#8221;  One group member Souhaib el Abdi reportedly &#8220;had previous experience with trafficking forged documents&#8221; and much of the equipment held in their Belgian safe house &#8220;including Kalashnikov rifles, handguns, ammunition, and materials to make explosives&#8221; is believed to have been acquired illegally.  Though security measures employed by the group could make it more difficult for law enforcement to discover potential plots, the DHS assessment argues that they may also provide an opportunity to &#8220;detect ongoing plotting, as investigations of intercepted illegal activities may present indicators of other nefarious intentions&#8221; and &#8220;awareness of the tactics and tradecraft used by this group could assist with identifying and disrupting potential complex plots in the United States.&#8221;</p>
<div id="DV-viewer-2094339-dhs-assessing-isils-lnfluence-and-perceived" class="DV-container"></div>
<p><script src="//s3.amazonaws.com/s3.documentcloud.org/viewer/loader.js"></script><script>// <![CDATA[
DV.load("//www.documentcloud.org/documents/2094339-dhs-assessing-isils-lnfluence-and-perceived.js", {   width: 860,     height: 1100,     sidebar: false,     container: "#DV-viewer-2094339-dhs-assessing-isils-lnfluence-and-perceived"   });
// ]]&gt;</script></p>
<div id="DV-viewer-2094340-dhs-assessment-future-isil-operations-in-the" class="DV-container"></div>
<p><script src="//s3.amazonaws.com/s3.documentcloud.org/viewer/loader.js"></script><script>// <![CDATA[
DV.load("//www.documentcloud.org/documents/2094340-dhs-assessment-future-isil-operations-in-the.js", {   width: 860,     height: 1100,     sidebar: false,     container: "#DV-viewer-2094340-dhs-assessment-future-isil-operations-in-the"   });
// ]]&gt;</script></p>The post <a href="https://publicintelligence.net/the-increasing-sophistication-of-the-islamic-state/">The Increasing Sophistication and Legitimacy of the Islamic State</a> first appeared on <a href="https://publicintelligence.net">Public Intelligence</a>.]]></content:encoded>
					
					<wfw:commentRss>https://publicintelligence.net/the-increasing-sophistication-of-the-islamic-state/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>U.S. Cyber Command Blocking Public Intelligence and Nearly 2,500 &#8220;WikiLeaks-Related&#8221; Websites</title>
		<link>https://publicintelligence.net/dod-blocks-public-intelligence/</link>
					<comments>https://publicintelligence.net/dod-blocks-public-intelligence/#respond</comments>
		
		<dc:creator><![CDATA[Public Intelligence]]></dc:creator>
		<pubDate>Fri, 22 May 2015 02:42:20 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[U.S. Army]]></category>
		<category><![CDATA[U.S. Cyber Command]]></category>
		<guid isPermaLink="false">http://publicintelligence.net/?p=31032</guid>

					<description><![CDATA[<p>U.S. Cyber Command (CYBERCOM) has blocked access to the Public Intelligence website (publicintelligence.net) as well as at least 2,484 other "WIKILEAKS-related websites" on their unclassified network.</p>
<p class="more-link-p">
<a class="btn btn-primary" href="https://publicintelligence.net/dod-blocks-public-intelligence/">Read more &#8594;</a></p>
The post <a href="https://publicintelligence.net/dod-blocks-public-intelligence/">U.S. Cyber Command Blocking Public Intelligence and Nearly 2,500 “WikiLeaks-Related” Websites</a> first appeared on <a href="https://publicintelligence.net">Public Intelligence</a>.]]></description>
										<content:encoded><![CDATA[<div id="attachment_35425" style="width: 762px" class="wp-caption aligncenter"><a href="https://publicintelligence.net/wp-content/uploads/2015/03/public-intelligence-blocked.png"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-35425" class="wp-image-35425 size-large" src="https://publicintelligence.net/wp-content/uploads/2015/03/public-intelligence-blocked-1024x661.png" alt="public-intelligence-blocked" width="752" height="485" srcset="https://q.publicintelligence.net/wp-content/uploads/2015/03/public-intelligence-blocked-1024x661.png 1024w, https://q.publicintelligence.net/wp-content/uploads/2015/03/public-intelligence-blocked-300x194.png 300w, https://q.publicintelligence.net/wp-content/uploads/2015/03/public-intelligence-blocked-150x97.png 150w, https://q.publicintelligence.net/wp-content/uploads/2015/03/public-intelligence-blocked.png 1435w" sizes="auto, (max-width: 752px) 100vw, 752px" /></a><p id="caption-attachment-35425" class="wp-caption-text">A block page displayed when users on military networks attempt to access this website.</p></div>
<p>U.S. Cyber Command (CYBERCOM) has blocked access to the Public Intelligence website (publicintelligence.net) as well as at least 2,484 other &#8220;WIKILEAKS-related websites&#8221; on their unclassified network.</p>
<p>The block was first reported in June 2012 by a regular contributor to <a href="http://www.phibetaiota.net">Phibetaiota.net</a>, a website run by former CIA officer and longtime proponent of open-source intelligence Robert David Steele.  An anonymous contributor to the blog <a href="http://www.phibetaiota.net/2012/06/marcus-aurelius-nsa-blocks-publicintelligence-et/">reported</a> that CYBERCOM had &#8220;blocked access to www.publicintelligence.net from DoD computers&#8221; for unstated &#8220;operational reasons.&#8221;  The article described the contents of the notice that is displayed when users attempt to access the site and stated that the &#8220;block category&#8221; was listed as: &#8220;USCC_WIKILEAKS_BLOCK.&#8221;  According to other individuals who have experienced the block, a message is displayed indicating that you have &#8220;attempted to access a blocked website&#8221; and that access has been denied for unstated &#8220;operational reasons by the DOD Enterprise-Level Protection System.&#8221;  The notice also instructs the user to &#8220;contact your local Network Control Center&#8221; to gain access to blocked websites that are &#8220;mission essential.&#8221;</p>
<div id="attachment_35453" style="width: 766px" class="wp-caption aligncenter"><a href="https://publicintelligence.net/wp-content/uploads/2015/03/public-intelligence-blocked-2.png"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-35453" class="wp-image-35453 " src="https://publicintelligence.net/wp-content/uploads/2015/03/public-intelligence-blocked-2.png" alt="public-intelligence-blocked-2" width="756" height="505" srcset="https://q.publicintelligence.net/wp-content/uploads/2015/03/public-intelligence-blocked-2.png 692w, https://q.publicintelligence.net/wp-content/uploads/2015/03/public-intelligence-blocked-2-300x200.png 300w, https://q.publicintelligence.net/wp-content/uploads/2015/03/public-intelligence-blocked-2-150x100.png 150w" sizes="auto, (max-width: 756px) 100vw, 756px" /></a><p id="caption-attachment-35453" class="wp-caption-text">An email from an intelligence analyst with the U.S. Army TRADOC G2 Intelligence Support Activity (TRISA) requesting access to this website.</p></div>
<p>In March 2013, a U.S. Army intelligence analyst did just that: she requested that an exception be made for her unit to access the site in order to conduct official research.  The analyst&#8217;s request is contained in a 15-page document from the U.S. Army&#8217;s Network Enterprise Technology Command (NETCOM) that was released following a request under the Freedom of Information Act (FOIA).  The document contains a chain of emails between members of the U.S. Army TRADOC G2 Intelligence Support Activity (TRISA) and IT Specialists with NETCOM.  In an email dated March 7, 2013, an analyst with the Contemporary Operational Environment and Threat Integration Directorate (CTID) within TRISA states that &#8220;CTID requests access to this website http://publicintelligence.net/&#8221; and adds that &#8220;we all use this website for official open source research to support [REDACTED].&#8221;</p>
<p>The request was referred to members of the 106th Signal Brigade under NETCOM who requested a memorandum for record stating that access was required for official business and had been approved by the unit&#8217;s information assurance manager.  The request appeared to be moving along until late April 2013 when the 106th Signal Brigade informed the IT personnel at TRISA that the block was a CYBERCOM block related to WikiLeaks.  In an email from April 23, 2013, NETCOM informed all parties involved in the effort to unblock the site that &#8220;TRISA has withdrawn their request for access to the site&#8221; after being informed by IT personnel at TRISA that &#8220;this was considered a wiki leak [sic] type site so this can be closed with no further action and if she needs access to this site she can use [REDACTED].&#8221;  In another email regarding the retraction of the request, NETCOM personnel discussed how &#8220;once the user requesting the unblock realized the site was a wiki leaks block, they decided they would use the [REDACTED].&#8221;</p>
<p>A response from the 106th Signal Brigade stated that &#8220;info.publicintelligence.net is blocked by the United States Cyber Command under the category of wikileaks&#8221; and cites several tasking orders and all army activities (ALARACT) messages distributed in support of the WikiLeaks block.  Two of those ALARACTs were previously obtained by Public Intelligence and discuss preventative measures taken to <a href="https://publicintelligence.net/ufouo-army-unauthorized-information-dissemination-safeguards-in-response-to-wikileaks/">limit the unauthorized dissemination of information</a> and protect &#8220;<a href="https://publicintelligence.net/ufouo-army-wikileaks-warning-classified-public-information/">sensitive information in the public domain</a>.&#8221;  ALARACT 245-2010 explicitly forbids Army personnel from viewing any classified information released by WikiLeaks because it would introduce classified material onto unclassified networks where it may not be properly safeguarded:</p>
<blockquote><p>ARMY PERSONNEL MUST BE VIGILANT WITH REGARD TO THE INFORMATION POSTED ON THE WIKILEAKS WEBSITE AND ANY OTHER WEBSITE THAT PURPORTS TO PUBLISH CLASSIFIED INFORMATION. VIEWING, DOWNLOADING OR PRINTING INFORMATION FROM THE WEBSITE COULD POTENTIALLY EXPOSE ARMY NETWORKS TO SENSITIVE DATA OR CREATE SITUATIONS IN WHICH DATA IS IMPROPERLY SAFEGUARDED THUS HARMING OUR ABILITY TO CONDUCT MISSIONS VITAL TO OUR NATIONAL DEFENSE. INFORMATION MARKED AS CLASSIFIED BUT IN THE PUBLIC DOMAIN IS NOT CONSIDERED DECLASSIFIED UNTIL ASSESSED BY THE APPROPRIATE ORIGINAL CLASSIFICATION AUTHORITY AND A DETERMINATION ON ITS DISPOSITION AND CONTINUED CLASSIFICATION IS RENDERED.</p></blockquote>
<p>Similar notices were disseminated by the <a href="https://publicintelligence.net/u-s-air-force-warning-against-accessing-wikileaks/">Air Force</a>, <a href="https://publicintelligence.net/ufouo-u-s-navy-wikileaks-safeguarding-classified-information/">Navy</a>, <a href="https://publicintelligence.net/white-house-wikileaks-memo-mishandling-of-classified-information/">White House</a> and a number of other government agencies in 2010 following the release of hundreds of thousands of U.S. diplomatic cables by WikiLeaks.</p>
<p>In response to a FOIA request for records related to the WikiLeaks block, CYBERCOM confirmed that in November 2013 there were 2,484 &#8220;WIKILEAKS-related websites&#8221; blocked on &#8220;their unclassified network.&#8221;  However, the release of a forty-six page document listing these websites was denied on the grounds that the information was properly classified and its release could &#8220;risk circumvention of the law.&#8221;</p>
<p><strong>A Pattern of Blocking</strong></p>
<p>In June 2013, it was revealed that the DoD has been <a href="http://www.usnews.com/news/blogs/washington-whispers/2013/06/28/blackout-defense-department-blocks-all-articles-about-nsa-leaks-from-millions-of-computers">blocking access to news stories</a> regarding the disclosure of classified NSA documents by Edward Snowden.  According to Pentagon spokesman Lt. Col. Damien Pickart, any website that chooses to &#8220;post information the department deems classified&#8221; will have that content &#8220;filtered&#8221; rendering it &#8220;inaccessible from DoD networks so long as it remains classified.&#8221;  Public Intelligence has not posted any of the material revealed by Snowden or WikiLeaks and hosts only a small number of previously classified documents that have been publicly revealed in media reports.  Lt. Col. Pickart told U.S. News &amp; World Report that the DoD &#8220;does not determine what sites its personnel can choose to visit while on a DoD system, but instead relies on automated filters that restrict access based on content concerns or malware threats.&#8221;</p>
<p>Pickart also made clear that DoD is not &#8220;going to block websites from the American public in general, and to do so would violate our highest-held principle of upholding and defending the Constitution and respecting civil liberties and privacy.&#8221;  However, Pickart&#8217;s statements are contradicted by the experiences of individuals who have encountered the CYBERCOM block.  Users report encountering the block on documents that are unclassified and, in some cases, have no control markings at all.</p>
<p>In addition to the CYBERCOM block, the army&#8217;s Continental U.S. (CONUS) Network Operations and Security Center (C-TNOSC) has also previously blocked portions of the Public Intelligence website from being accessed on army computers.  Visitors report that attempts to access information on the site have been met with the following notice:</p>
<blockquote>
<table>
<tbody>
<tr>
<td>&#8220;The site you have requested has been blocked by Team CONUS (C-TNOSC/RCERT-CONUS) due to malware being hosted on the site&#8221;</td>
</tr>
</tbody>
</table>
</blockquote>
<p>The U.S. Army block has apparently been in effect since at least February 2012.  A number of <a href="http://forums.randi.org/showthread.php?postid=8267256#post8267256">forum</a> <a href="http://www.m4carbine.net/showpost.php?p=1298617&amp;postcount=2">postings</a> and <a href="http://westernrifleshooters.wordpress.com/2012/02/03/snitch-nation/#comment-21342">comments</a> on a variety of websites make reference to the block.  There are no independent reports of malware being hosted on the Public Intelligence website and all public security directories list the site as safe.  When contacted for comment, U.S. Network Enterprise Technology Command spokesperson Gordon Van Vleet told Public Intelligence that he was unable to provide any information on the block.</p>
<div id="DV-viewer-1683093-u-s-army-correspondence-on-u-s-cyber-command" class="DV-container"></div>
<p><script src="//s3.amazonaws.com/s3.documentcloud.org/viewer/loader.js"></script><script>// <![CDATA[
DV.load("//www.documentcloud.org/documents/1683093-u-s-army-correspondence-on-u-s-cyber-command.js", {   width: 740,     height: 1000,     sidebar: false,     container: "#DV-viewer-1683093-u-s-army-correspondence-on-u-s-cyber-command"   });
// ]]&gt;</script></p>
<div id="DV-viewer-1683102-u-s-strategic-command-denial-of-request-on" class="DV-container"></div>
<p><script src="//s3.amazonaws.com/s3.documentcloud.org/viewer/loader.js"></script><script>// <![CDATA[
DV.load("//www.documentcloud.org/documents/1683102-u-s-strategic-command-denial-of-request-on.js", {   width: 740,     height: 1000,     sidebar: false,     container: "#DV-viewer-1683102-u-s-strategic-command-denial-of-request-on"   });
// ]]&gt;</script></p>The post <a href="https://publicintelligence.net/dod-blocks-public-intelligence/">U.S. Cyber Command Blocking Public Intelligence and Nearly 2,500 “WikiLeaks-Related” Websites</a> first appeared on <a href="https://publicintelligence.net">Public Intelligence</a>.]]></content:encoded>
					
					<wfw:commentRss>https://publicintelligence.net/dod-blocks-public-intelligence/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>On Twentieth Anniversary of Oklahoma City Bombing, Feds Warn of Domestic Extremist Threat</title>
		<link>https://publicintelligence.net/persistent-domestic-extremist-threat/</link>
					<comments>https://publicintelligence.net/persistent-domestic-extremist-threat/#respond</comments>
		
		<dc:creator><![CDATA[Public Intelligence]]></dc:creator>
		<pubDate>Sun, 19 Apr 2015 23:01:20 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Department of Homeland Security]]></category>
		<category><![CDATA[Domestic Extremism]]></category>
		<category><![CDATA[Federal Bureau of Investigation]]></category>
		<category><![CDATA[Leftwing Extremists]]></category>
		<category><![CDATA[Rightwing Extremists]]></category>
		<guid isPermaLink="false">https://publicintelligence.net/?p=35593</guid>

					<description><![CDATA[<p>A joint intelligence bulletin released by the Department of Homeland Security and FBI to coincide with the twentieth anniversary of the Oklahoma City Bombing warns that "domestic extremism will remain a persistent threat through the end of 2015 and beyond" with "high confidence that lone offenders and those who pursue leaderless resistance continue to pose the greatest threat of violence."  The bulletin, which is based on "recent patterns of extremist activity" often "taken by those who plan and act alone or in small cells," states that domestic extremism "remains a persistent threat, and the United States has experienced violent ideologically-motivated criminal acts, both prior to and after the Oklahoma City attack" including "assaults, arsons, shootings, and use, or attempted use, of improvised incendiary and explosive devices, resulting in death, injury, and property damage."  Moreover, the bulletin states that "many of the same motivations used by domestic extremists to justify their criminal acts in the mid-1990s—anti-government and anti-law enforcement sentiment; racial, ethnic, and religious hatred; and advocacy of violent conspiracy theories—continue to influence domestic extremists and their targeting choices in 2015."</p>
<p class="more-link-p">
<a class="btn btn-primary" href="https://publicintelligence.net/persistent-domestic-extremist-threat/">Read more &#8594;</a></p>
The post <a href="https://publicintelligence.net/persistent-domestic-extremist-threat/">On Twentieth Anniversary of Oklahoma City Bombing, Feds Warn of Domestic Extremist Threat</a> first appeared on <a href="https://publicintelligence.net">Public Intelligence</a>.]]></description>
										<content:encoded><![CDATA[<div id="attachment_35594" style="width: 762px" class="wp-caption aligncenter"><a href="https://publicintelligence.net/wp-content/uploads/2015/04/oklahoma-city-bombing.jpg"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-35594" class="size-large wp-image-35594" src="https://publicintelligence.net/wp-content/uploads/2015/04/oklahoma-city-bombing-1024x705.jpg" alt="This " width="752" height="518" srcset="https://q.publicintelligence.net/wp-content/uploads/2015/04/oklahoma-city-bombing-1024x705.jpg 1024w, https://q.publicintelligence.net/wp-content/uploads/2015/04/oklahoma-city-bombing-300x206.jpg 300w, https://q.publicintelligence.net/wp-content/uploads/2015/04/oklahoma-city-bombing-150x103.jpg 150w" sizes="auto, (max-width: 752px) 100vw, 752px" /></a><p id="caption-attachment-35594" class="wp-caption-text">A photo of the  Alfred P. Murrah Federal Building following the Oklahoma City Bombing on April 19, 2015.</p></div>
<p>A joint intelligence bulletin issued by the Department of Homeland Security and FBI to coincide with the twentieth anniversary of the Oklahoma City Bombing warns that &#8220;domestic extremism will remain a persistent threat through the end of 2015 and beyond&#8221; with &#8220;high confidence that lone offenders and those who pursue leaderless resistance continue to pose the greatest threat of violence.&#8221;  The bulletin, which is based on &#8220;recent patterns of extremist activity&#8221; often &#8220;taken by those who plan and act alone or in small cells,&#8221; states that domestic extremism &#8220;remains a persistent threat, and the United States has experienced violent ideologically-motivated criminal acts, both prior to and after the Oklahoma City attack&#8221; including &#8220;assaults, arsons, shootings, and use, or attempted use, of improvised incendiary and explosive devices, resulting in death, injury, and property damage.&#8221;  Moreover, the bulletin states that &#8220;many of the same motivations used by domestic extremists to justify their criminal acts in the mid-1990s—anti-government and anti-law enforcement sentiment; racial, ethnic, and religious hatred; and advocacy of violent conspiracy theories—continue to influence domestic extremists and their targeting choices in 2015.&#8221;</p>
<p>The bulletin, titled &#8220;<a href="https://publicintelligence.net/dhs-fbi-domestic-extremist-threat/">Twenty Years after Oklahoma City Bombing, Domestic Extremism Remains a Persistent Threat</a>,&#8221; was originally posted online to a public website associated with the Northwest Warning, Alert and Response Network (NW-WARN), a &#8220;collaborative effort between government and private sector partners&#8221; throughout the region &#8220;with a goal to maximize real-time sharing of situational information without delay and provide immediate distribution of intelligence to those in the field who need to act on it.&#8221;  The bulletin has <a href="https://www.mystateusa.com/docs/NWWARN/15-0050_JIB_-_Twenty_Years_after_Oklahoma_City_Bombing_Domestic_Extremism_Remains_a_Persistent_Threat_-_16Apr15_%28U-FOUO%29_.pdf">since been removed</a>.  However, Public Intelligence was able to obtain a copy of the bulletin prior to its removal from the site.</p>
<p>To illustrate the &#8220;scale of the current threat&#8221; from domestic extremists, the bulletin cites eighteen incidents between January 1, 2014 and April 1, 2015 that were &#8220;conducted by individuals inside the United States in furtherance of political or social agendas without foreign direction, are criminal and violent in nature and caused, or could have reasonably caused death, grievous harm, or financial losses of at least $1 million.&#8221;  The incidents vary both in scope and motivation, from a 52-year-old woman from Austin, Texas who <a href="http://www.washingtontimes.com/news/2015/mar/25/molotov-cocktail-thrown-at-pro-life-protesters-out/">threw a Molotov cocktail</a> at a Planned Parenthood facility in March to a <a href="http://www.nbcnews.com/storyline/michael-brown-shooting/ferguson-plot-included-assassinations-blowing-arch-report-n257306">plot by a &#8220;Moorish sovereign citizen&#8221;</a> to kill the police chief of Ferguson, Missouri following protests over the killing of Michael Brown last year.  In addition to attacks perpetrated by Earth Liberation Front members and other left-wing extremists, the bulletin also highlights the events that occurred in April 2014 at the Bundy Ranch in Bunkerville, Nevada in which dozens of &#8220;militia extremists converged on a Nevada ranch to prevent [the Bureau of Land Management] from executing a court order to seize cattle in a dispute over unpaid grazing fees.&#8221;  These &#8220;militia extremists&#8221; in association with &#8220;individuals from across the country . . . who reacted to reports about altercations between BLM personnel and the rancher’s family and supporters that alleged unnecessary excess on the part of the US Government&#8221; eventually engaged in an &#8220;armed standoff and the ultimate suspension of the BLM operation due to militia extremist threats.&#8221;</p>
<p>The bulletin also contains a list of the various types of domestic extremists recognized by the DHS and FBI, including animal rights extremists, black separatist extremists, militia extremists and sovereign citizen extremists:</p>
<blockquote><p>(U//FOUO) Domestic Extremists: individuals present in the United States who seek to further political or social goals, wholly or in part, through unlawful acts of force or violence. The mere advocacy of political or social positions, political activism, use of strong rhetoric, or generalized philosophic embrace of violent tactics may not constitute extremism, and may be constitutionally protected. This definition does not include or describe homegrown violent extremists, who are defined by the FBI as al-Qa‘ida-inspired individuals based in the United States and radicalized primarily in the United States, and are not directly collaborating with a foreign terrorist organization.</p>
<p>(U//FOUO) Animal Rights Extremists: individuals who seek, wholly or in part, through unlawful acts of force or violence, to further their opposition to people, businesses, or government entities perceived to be exploiting or abusing animals. The mere advocacy of political or social positions, political activism, use of strong rhetoric, or generalized philosophic embrace of violent tactics may not constitute extremism, and may be constitutionally protected.</p>
<p>(U//FOUO) Black Separatist Extremists: individuals who seek, wholly or in part, through unlawful acts of force or violence, to attain separation from the non-black US population. This separation includes, but is not limited to, physical separation, political separation, or social separation as demonstrated by separate communities, political institutions, or social organizations. This desire for separation is typically based on either a religious or political belief system, which is sometimes formed around or includes a belief in racial superiority or supremacy. The mere advocacy of political or social positions, political activism, use of strong rhetoric, or generalized philosophic embrace of violent tactics may not constitute extremism, and may be constitutionally protected.</p>
<p>(U//FOUO) Environmental Extremists: individuals who seek, wholly or in part, through unlawful acts of force or violence, to further their opposition to people, businesses, or government entities perceived to be destroying, degrading, or exploiting the natural environment. The mere advocacy of political or social positions, political activism, use of strong rhetoric, or generalized philosophic embrace of violent tactics may not constitute extremism, and may be constitutionally protected.</p>
<p>(U//FOUO) Lone Offenders: individuals who, operating alone or without the witting support of others, seek to advance, wholly or in part, a particular ideology or social agenda through unlawful acts of force or violence in violation of federal law.</p>
<p>(U//FOUO) Militia Extremists: individuals who seek, wholly or in part, to engage in unlawful acts of force or violence in response to perceived abuses of power or authority by government, perceived threats to Constitutional rights by government, or bureaucratic incompetence in attending to critical tasks. The mere advocacy of political or social positions, political activism, use of strong rhetoric, or generalized philosophic embrace of violent tactics may not constitute extremism, and may be constitutionally protected.</p>
<p>(U//FOUO) Sovereign Citizen Extremists: individuals who openly reject their US citizenship status, believe that most forms of established government, authority, and institutions are illegitimate, and seek, wholly or in part, through unlawful acts of force or violence, to further their claim to be immune from government authority. The mere advocacy of political or social positions, political activism, use of strong rhetoric, or generalized philosophic embrace of violent tactics may not constitute extremism, and may be constitutionally protected.</p>
<p>(U//FOUO) White Supremacist Extremists: individuals who seek, wholly or in part, through unlawful acts of force or violence, to support their belief in the intellectual and moral superiority of the white race over other races. The mere advocacy of political or social positions, political activism, use of strong rhetoric, or generalized philosophic embrace of violent tactics may not constitute extremism, and may be constitutionally protected.</p></blockquote>
<div id="DV-viewer-1995435-dhs-fbi-bulletin-twenty-years-after-oklahoma" class="DV-container"></div>
<p><script src="//s3.amazonaws.com/s3.documentcloud.org/viewer/loader.js"></script><script>// <![CDATA[
  DV.load("//www.documentcloud.org/documents/1995435-dhs-fbi-bulletin-twenty-years-after-oklahoma.js", {
  width: 740,
    height: 1000,
    sidebar: false,
    container: "#DV-viewer-1995435-dhs-fbi-bulletin-twenty-years-after-oklahoma"
  });
// ]]&gt;</script></p>The post <a href="https://publicintelligence.net/persistent-domestic-extremist-threat/">On Twentieth Anniversary of Oklahoma City Bombing, Feds Warn of Domestic Extremist Threat</a> first appeared on <a href="https://publicintelligence.net">Public Intelligence</a>.]]></content:encoded>
					
					<wfw:commentRss>https://publicintelligence.net/persistent-domestic-extremist-threat/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Feds Issue Bulletin Warning ISIL&#8217;s &#8220;Savvy&#8221; Use of Media is Resonating with Western Youth</title>
		<link>https://publicintelligence.net/isil-savvy-media-western-youth/</link>
					<comments>https://publicintelligence.net/isil-savvy-media-western-youth/#respond</comments>
		
		<dc:creator><![CDATA[Public Intelligence]]></dc:creator>
		<pubDate>Thu, 26 Mar 2015 02:34:28 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Department of Homeland Security]]></category>
		<category><![CDATA[Federal Bureau of Investigation]]></category>
		<category><![CDATA[Islamic State of Iraq and the Levant]]></category>
		<category><![CDATA[Radicalization]]></category>
		<guid isPermaLink="false">https://publicintelligence.net/?p=35490</guid>

					<description><![CDATA[<p>The "innovative use of social media and messaging" by the Islamic State of Iraq and the Levant (ISIL) "has played a key role in motivating young Western males and females to travel to the Syrian conflict to join and support the self-declared Islamic State" according to a join intelligence bulletin released by the Department of Homeland Security and FBI last month.  The 5-page bulletin titled "ISIL Social Media Messaging Resonating with Western Youth" was disseminated to law enforcement throughout the country at the end of February to report on the "continuing trend" of Western youth being inspired to travel to Syria and join ISIL forces.  According to the bulletin, this trend is aided by the fact that "Western youth are willing to connect over social media with like-minded persons, and have proven adept at obfuscating such social media usage from their parents and guardians."</p>
<p class="more-link-p">
<a class="btn btn-primary" href="https://publicintelligence.net/isil-savvy-media-western-youth/">Read more &#8594;</a></p>
The post <a href="https://publicintelligence.net/isil-savvy-media-western-youth/">Feds Issue Bulletin Warning ISIL’s “Savvy” Use of Media is Resonating with Western Youth</a> first appeared on <a href="https://publicintelligence.net">Public Intelligence</a>.]]></description>
										<content:encoded><![CDATA[<div id="attachment_35516" style="width: 810px" class="wp-caption aligncenter"><a href="https://publicintelligence.net/wp-content/uploads/2015/03/isil-teens.jpg"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-35516" class="size-full wp-image-35516" src="https://publicintelligence.net/wp-content/uploads/2015/03/isil-teens.jpg" alt="The fo" width="800" height="450" srcset="https://q.publicintelligence.net/wp-content/uploads/2015/03/isil-teens.jpg 800w, https://q.publicintelligence.net/wp-content/uploads/2015/03/isil-teens-300x169.jpg 300w, https://q.publicintelligence.net/wp-content/uploads/2015/03/isil-teens-150x84.jpg 150w" sizes="auto, (max-width: 800px) 100vw, 800px" /></a><p id="caption-attachment-35516" class="wp-caption-text">Three British teenagers Shamima Begum, 15, Kadiza Sultana, 16, and Amira Abase, 15, who traveled last month to Turkey before crossing the border into Syria to join the Islamic State of Iraq and the Levant (ISIL).</p></div>
<p>The &#8220;innovative use of social media and messaging&#8221; by the Islamic State of Iraq and the Levant (ISIL) &#8220;has played a key role in motivating young Western males and females to travel to the Syrian conflict to join and support the self-declared Islamic State&#8221; according to a joint intelligence bulletin released by the Department of Homeland Security and FBI last month.  The 5-page bulletin titled &#8220;<a href="https://publicintelligence.net/dhs-fbi-social-media-isil/">ISIL Social Media Messaging Resonating with Western Youth</a>&#8221; was disseminated to law enforcement throughout the country at the end of February to report on the &#8220;continuing trend&#8221; of Western youth being inspired to travel to Syria and join ISIL forces.  According to the bulletin, this trend is aided by the fact that &#8220;Western youth are willing to connect over social media with like-minded persons, and have proven adept at obfuscating such social media usage from their parents and guardians.&#8221;</p>
<p>ISIL&#8217;s &#8220;savvy media packaging&#8221; has helped it gain &#8220;widespread attention&#8221; among both male and female youth demographics, particularly those &#8220;who are already radicalized to violence.&#8221;  The group&#8217;s &#8220;Western-focused messaging frequently features fluent English speakers, including Western youth, with whom audiences probably are able to relate&#8221; including &#8220;several videos featuring high-tech filming and editing&#8221; that likely intensifies the &#8220;appeal of these messaging efforts.&#8221;  Their videos &#8220;often include dramatic shots and sound effects to further the viewer’s tension and interest&#8221; as well as &#8220;graphics and chronological layout&#8221; making them &#8220;more like documentary films.&#8221;</p>
<p>Moreover, ISIL&#8217;s resonance with &#8220;with female youths is unprecedented and has prompted a number to attempt to travel to Syria.&#8221;  While &#8220;most females appear motivated to travel based on a desire to live in ISIL’s self-declared state&#8221; rather than participate in the conflict, the effectiveness of the group&#8217;s messaging demonstrates &#8220;ISIL’s broad appeal across demographic boundaries.&#8221;  The joint intelligence bulletin cites a number of instances where Western youth have attempted to travel to Syria to join ISIL and states that &#8220;Western teenagers currently in Syria are known to have accessed violent extremist messaging for guidance on means and routes for traveling to Syria.&#8221;  An <a href="http://www.independent.co.uk/news/uk/home-news/syria-girls-at-least-60-british-women-and-girls-as-young-as-15-have-joined-isis-in-syria-10078069.html">article earlier this month</a> in the British newspaper <em>The Independent</em> cited Helen Ball, the London Metropolitan Police Service Senior National Coordinator for Counterterrorism, as saying that at least sixty British women, including girls as young as fifteen, have traveled to Syria in the hopes of joining ISIL.</p>
<p>A significant number of American youths have also attempted to &#8220;radicalize others to violence, establish contact with like-minded individuals, and travel to Syria to join the group.&#8221;  The <em>Wall Street Journal</em> <a href="http://www.wsj.com/articles/u-s-authorities-struggle-to-find-a-pattern-among-aspiring-isis-members-1425586022">reported earlier this month</a> that at least one-hundred and eighty Americans have traveled or attempted to travel to join ISIL in Syria.  The Justice Department has prosecuted nearly thirty cases related to ISIL in the last eighteen months and the FBI claims to have ISIL-related investigations open in all fifty states.</p>
<p>Some of the cases do not involve direct attempts to travel to Syria, but rather efforts to help others join ISIL often using social media.  One case cited in the joint intelligence bulletin involves a Virginia teenager who was arrested in February for encouraging others to join ISIL and even facilitating travel arrangements.  The DHS-FBI bulletin states that &#8220;ISIL messaging likely influenced [the teenager] to create, produce, and disseminate violent extremist messaging via social media to radicalize other youth to violence&#8221; as well as &#8220;establish connectivity with violent extremists overseas, connect with like-minded aspirants, and distribute ISIL messaging to a network of friends and followers.&#8221;  One of his associates reportedly was successful in traveling to Syria to join ISIL.  An <a href="http://www.washingtonpost.com/local/crime/northern-va-teen-thought-to-have-helped-man-join-islamic-state/2015/03/04/51c7ec34-c1e6-11e4-ad5c-3b8ce89f1b89_story.html">article in the <em>Washington Post</em></a> about the case states that the boy was viewed by community members who knew him as a quiet, though typical teenager.  He was &#8220;taking Advanced Placement classes and listed some of his interests as civil rights and social action.&#8221;</p>
<div id="DV-viewer-1694960-dhs-fbi-joint-intelligence-bulletin-isil-social" class="DV-container"></div>
<p><script src="//s3.amazonaws.com/s3.documentcloud.org/viewer/loader.js"></script><script>// <![CDATA[
DV.load("//www.documentcloud.org/documents/1694960-dhs-fbi-joint-intelligence-bulletin-isil-social.js", {   width: 740,     height: 1000,     sidebar: false,     container: "#DV-viewer-1694960-dhs-fbi-joint-intelligence-bulletin-isil-social"   });
// ]]&gt;</script></p>The post <a href="https://publicintelligence.net/isil-savvy-media-western-youth/">Feds Issue Bulletin Warning ISIL’s “Savvy” Use of Media is Resonating with Western Youth</a> first appeared on <a href="https://publicintelligence.net">Public Intelligence</a>.]]></content:encoded>
					
					<wfw:commentRss>https://publicintelligence.net/isil-savvy-media-western-youth/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Comments on Reddit Led to Virginia Fusion Center Warning on Protesters Attacking Emergency Vehicles</title>
		<link>https://publicintelligence.net/vfc-violent-protesters-reddit/</link>
					<comments>https://publicintelligence.net/vfc-violent-protesters-reddit/#comments</comments>
		
		<dc:creator><![CDATA[Public Intelligence]]></dc:creator>
		<pubDate>Tue, 17 Mar 2015 02:25:40 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[First Amendment]]></category>
		<category><![CDATA[virginia]]></category>
		<category><![CDATA[Virginia Fusion Center]]></category>
		<guid isPermaLink="false">https://publicintelligence.net/?p=35457</guid>

					<description><![CDATA[<p>A bulletin issued in December 2014 by the Virgina Fusion Center (VFC) warned law enforcement and first responders that emergency vehicles could be targeted by violent protesters seeking to retaliate against the perceived surveillance of their activities. The bulletin, which is titled "Malicious Activists May Promote Harm to Emergency Management Vehicles Observed During Violent Protests," draws its conclusion that "violent or malicious activity" could be directed toward emergency vehicles "operating near protest areas" based primarily upon comments to a post on Reddit and a protest guide posted anonymously on Pastebin.</p>
<p class="more-link-p">
<a class="btn btn-primary" href="https://publicintelligence.net/vfc-violent-protesters-reddit/">Read more &#8594;</a></p>
The post <a href="https://publicintelligence.net/vfc-violent-protesters-reddit/">Comments on Reddit Led to Virginia Fusion Center Warning on Protesters Attacking Emergency Vehicles</a> first appeared on <a href="https://publicintelligence.net">Public Intelligence</a>.]]></description>
										<content:encoded><![CDATA[<table>
<tr>
<td>
<div style="text-align: center;"><iframe loading="lazy" src="https://www.youtube.com/embed/xpdpjX8Vsfw?rel=0&amp;showinfo=0" width="730" height="411" frameborder="0" allowfullscreen="allowfullscreen"></iframe><br />
<span style="font-size: x-small;">A video posted to YouTube in December 2014 by activists associated with Anonymous that appears to show Chicago police officers discussing surveillance of protesters.</span>
</div>
</td>
</tr>
</table>
<p></ br></p>
<p>A bulletin issued in December 2014 by the Virgina Fusion Center (VFC) warned law enforcement and first responders that emergency vehicles could be targeted by violent protesters seeking to retaliate against the perceived surveillance of their activities. The bulletin, which is titled &#8220;<a href="https://publicintelligence.net/vfc-violent-protesters/">Malicious Activists May Promote Harm to Emergency Management Vehicles Observed During Violent Protests</a>,&#8221; draws its conclusion that &#8220;violent or malicious activity&#8221; could be directed toward emergency vehicles &#8220;operating near protest areas&#8221; based primarily upon comments to a post on Reddit and a protest guide posted anonymously on Pastebin.</p>
<p>Following the decision last year by a Missouri grand jury not to indict police officer Darren Wilson in the killing of unarmed black teenager Michael Brown, protests have taken place throughout the nation.  One particular protest held in Chicago on November 28, 2014, just days after the decision, gained attention online after numerous protesters noticed a Chicago Office of Emergency Management and Communications (OEMC) vehicle that followed them as they marched through the city streets. Several posts on Twitter and other social media platforms include <a href="https://twitter.com/may20p/status/540705615329239040">pictures of the vehicle</a> with some protesters noting that their phone begins to malfunction and behave strangely when the vehicle is near. After the photos began to spread on social media, there was rampant online speculation that the vehicle may have contained a <a href="https://en.wikipedia.org/wiki/Stingray_phone_tracker">Stingray IMSI-catcher</a> produced by <a href="https://publicintelligence.net/tag/harris-corporation/">Harris Corporation</a> and used by law enforcement to intercept cellular communication content including calls, text messages and other data.</p>
<p>The protesters&#8217; speculations were further bolstered when a video was <a href="https://www.youtube.com/watch?v=xpdpjX8Vsfw">posted on YouTube</a> by activists associated with the group Anonymous that featured recordings of police scanner traffic where an officer appears to discuss the ability of the local police fusion center to intercept cellular phone calls made by the protesters:</p>
<blockquote><p>Dispatch: “CPIC [Crime Prevention and Information Center] on the air for a mobile”<br />
CPIC Officer: “Go ahead”<br />
Car 41 Officer: “Yeah one of the girls is kind of an organizer here, um, she’s been on her phone a lot. Are you guys picking up any information, uh, where they’re going, possibly?”<br />
CPIC Officer: “Yeah we’ll keep an eye on it, we’ll let you know if we hear anything.”<br />
Car 41 Officer: “10-4. They’re compliant, and they’re, they’re doing ok now but she’s spending a lot of time on the phone.”<br />
CPIC Officer: “10-4”</p></blockquote>
<p>A post on the <a href="https://privacysos.org/node/1609">excellent PrivacySOS blog</a> authored by Kade Crockford, director of the ACLU of Massachusetts’ Technology for Liberty Project, covered the protesters&#8217; observations as well as video released by Anonymous. The post, which is directly cited in the VFC bulletin, also mentioned that a local news outlet had identified the potential target of the police surveillance mentioned in the Anonymous video as Kristiana Rae Colón, daughter of Chicago alderman Rey Colón and organizer of the #BlackLivesMatter protest that was being held that day.  The blog post on PrivacySOS was later <a href="https://www.reddit.com/r/news/comments/2ofby2/anonymous_has_released_a_video_featuring_what/">linked to in the news section of Reddit</a>, leading to more than five-thousand positive votes and two-thousand comments. The VFC issued its bulletin warning law enforcement that &#8220;emergency management vehicles operating near protest areas may be targeted by precipitating violent or malicious activity&#8221; primarily because a few comments on Reddit, several of which appear to be facetious, suggest using violent tactics against the Chicago OEMC vehicle or otherwise sabotaging its surveillance capabilities.</p>
<p>One comment highlighted in the bulletin states if &#8220;someone were to accidentally operate a device at protests that happened to operate at the frequencies that truck is using&#8221; that it would &#8220;block their transmissions.&#8221; Another commenter says &#8220;if you see one of those cars&#8221; at a protest, just &#8220;make a bunch of calls saying &#8216;I think I just overheard someone saying there was a bomb'&#8221; on the other side of town. More interestingly, a comment is included in the bulletin because it references Virginia, despite the fact that the comment simply notes that a vehicle like this exists in &#8220;Chesterfield VA and it&#8217;s only supposed to be used with a court order or a search warrant.&#8221; These comments are described in the bulletin as commenters expressing &#8220;interest in responding to similar vehicles via technical, subversive, or violent means.&#8221;</p>
<p>These violent or malicious intentions are further exemplified, according to the bulletin, by an anonymous post on Pastebin from December 6, 2014 titled &#8220;<a href="http://pastebin.com/mpayjwzw">Stingback: A Short, Emergency Guide for Activists Being Spied on by Chicago Police Stingrays (and very likely other police departments)</a>.&#8221; The guide provides a few simple actions protesters can take to help protect themselves from police surveillance while organizing, including using separate phones for personal and protest activities, using encrypted communication apps such as the products of Open Whisper Systems including TextSecure, RedPhone and Signal, as well as turning off a phone&#8217;s location tracking features. One of the last suggestions in the guide, which mentions physically inhibiting the movements of the vehicle, is what led to it being cited in the VFC bulletin. VFC warns law enforcement that &#8220;emergency management vehicles deployed to potential protest areas, particularly areas which may have a propensity for violence, should exercise caution&#8221; and &#8220;be aware that they may be targeted by non-violent methods in order to inhibit their vehicle movements in the area.&#8221;</p>
<p>At no point in the VFC bulletin is the fundamental claim of the protesters addressed: that surveillance of the protesters&#8217; communications based solely on the fact that they are engaging in free speech activities is a violation of their Constitutional rights. In fact, this point is made explicitly clear in the Department of Homeland Security and Department of Justice&#8217;s <a href="https://publicintelligence.net/doj-dhs-law-enforcement-guidelines-for-first-amendment-protected-events/">guidelines on policing First Amendment-protected events</a> which states that &#8220;collecting, maintaining, using, or sharing information regarding persons or groups solely because they are involved in constitutionally protected activity&#8221; is prohibited, as is &#8220;collecting, maintaining, using, or sharing information regarding persons or groups solely because of the content of their speech.&#8221;</p>
<div id="DV-viewer-1687242-virginia-fusion-center-bulletin-malicious" class="DV-container"></div>
<p><script src="//s3.amazonaws.com/s3.documentcloud.org/viewer/loader.js"></script><script>// <![CDATA[
DV.load("//www.documentcloud.org/documents/1687242-virginia-fusion-center-bulletin-malicious.js", {
  width: 740,
    height: 1000,
    sidebar: false,
    container: "#DV-viewer-1687242-virginia-fusion-center-bulletin-malicious"
  });
// ]]&gt;</script></p>The post <a href="https://publicintelligence.net/vfc-violent-protesters-reddit/">Comments on Reddit Led to Virginia Fusion Center Warning on Protesters Attacking Emergency Vehicles</a> first appeared on <a href="https://publicintelligence.net">Public Intelligence</a>.]]></content:encoded>
					
					<wfw:commentRss>https://publicintelligence.net/vfc-violent-protesters-reddit/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>FBI Warns Law Enforcement of Copy Cat Attacks Following Murders of Two NYPD Officers</title>
		<link>https://publicintelligence.net/fbi-copy-cat-police-attacks/</link>
					<comments>https://publicintelligence.net/fbi-copy-cat-police-attacks/#respond</comments>
		
		<dc:creator><![CDATA[Public Intelligence]]></dc:creator>
		<pubDate>Thu, 01 Jan 2015 03:09:29 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<guid isPermaLink="false">http://publicintelligence.net/?p=35151</guid>

					<description><![CDATA[<p>The FBI has issued a National Situational Information Report (NSIR) to law enforcement around the country warning of "copy cat assassinations" following the murder of two New York Police Department (NYPD) officers in December. The report, which was issued days before Christmas and posted online by a lodge of the Chicago Fraternal Order of Police, states that the "recent murders of New York City Police Officers Wenjian Liu and Rafael Ramos have spawned numerous threats" against law enforcement personnel.</p>
<p class="more-link-p">
<a class="btn btn-primary" href="https://publicintelligence.net/fbi-copy-cat-police-attacks/">Read more &#8594;</a></p>
The post <a href="https://publicintelligence.net/fbi-copy-cat-police-attacks/">FBI Warns Law Enforcement of Copy Cat Attacks Following Murders of Two NYPD Officers</a> first appeared on <a href="https://publicintelligence.net">Public Intelligence</a>.]]></description>
										<content:encoded><![CDATA[<div id="attachment_35153" style="width: 762px" class="wp-caption aligncenter"><a href="https://publicintelligence.net/wp-content/uploads/2014/12/nypd-murdered.jpg"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-35153" class="size-large wp-image-35153" src="https://publicintelligence.net/wp-content/uploads/2014/12/nypd-murdered-1024x845.jpg" alt="uhuuh" width="752" height="621" srcset="https://q.publicintelligence.net/wp-content/uploads/2014/12/nypd-murdered-1024x845.jpg 1024w, https://q.publicintelligence.net/wp-content/uploads/2014/12/nypd-murdered-300x248.jpg 300w, https://q.publicintelligence.net/wp-content/uploads/2014/12/nypd-murdered-150x124.jpg 150w" sizes="auto, (max-width: 752px) 100vw, 752px" /></a><p id="caption-attachment-35153" class="wp-caption-text">Photos of NYPD officers Rafael Ramos and Wenjian Liu who were murdered on December 20, 2014 by Ismaaiyl Brinsley in apparent retaliation for the deaths of Michael Brown and Eric Garner.</p></div>
<p>The FBI has issued a National Situational Information Report (NSIR) to law enforcement around the country warning of &#8220;copy cat assassinations&#8221; following the murder of two New York Police Department (NYPD) officers in December. The report, which was issued days before Christmas and posted online by a lodge of the Chicago Fraternal Order of Police, states that the &#8220;recent murders of New York City Police Officers Wenjian Liu and Rafael Ramos have spawned numerous threats&#8221; against law enforcement personnel. The report states that Ismaaiyl Brinsley, the man who reportedly shot the two NYPD officers, claimed to be part of a nationwide group planning to kill police officers:</p>
<blockquote><p>&#8220;As of November 2014, USPER Ismaaiyl Brinsley, responsible for the shooting of two New York City Police officers on 20 December 2014, claimed to be a member of an unidentified group that was &#8220;going to get a lot of cops in Florida, Las Vegas, and California for New Year&#8217;s.&#8221; Ismaaiyl Brinsley also discussed travel plans via Amtrak with two other individuals known as &#8220;Larry&#8221; and FNU LNU (NFI) [First Name Unknown Last Name Unknown (No Further Information)].&#8221;</p></blockquote>
<p>Brinsley, who was initially identified in the media as a member of the national prison gang the Black Guerrilla Family, was later said to have <a href="http://www.huffingtonpost.com/2014/12/20/ismaaiyl-brinsley-nypd-black-guerilla-family_n_6361324.html">no connection to the gang</a>. However, the day before the murders were committed, the Baltimore FBI office issued a bulletin stating that they had received &#8220;reliable information&#8221; that members of the gang were planning to target white law enforcement officers to &#8220;send a message.&#8221; The FBI NSIR mentions this as well as information that indicates the &#8220;Heartless Felons Gang, an Ohio street gang, gave its members orders to kill white police officers in the Cleveland area to avenge black lives taken by white police officers.&#8221;</p>
<p>Several online threats against law enforcement are also documented in the FBI NSIR including statements made by a man on the East Orange New Jersey Police Department&#8217;s Google plus page that he wanted to kill law enforcement officers. The Department of Homeland Security questioned another man at his home in Memphis, Tennessee after he posted online that he was &#8220;heading to New York City to kill two more police officers.&#8221; The man allegedly wrote &#8220;Good Job #F-K12 Kill em all i’m on my way to NY now #shootthepolice 2 more going down tomorrow.&#8221; No charges were ultimately filed as the man stated he was intoxicated when he wrote the post.</p>
<p>The FBI NSIR also includes a YouTube comment made by a man later identified as Jeremiah Perez of Colorado Springs:</p>
<blockquote><p>“SINCE DARREN WILSON our group has killed 6 retired sheriffs and cops&#8230;&#8230;because of this event we will hunt two more in colorado this week&#8230;..for every innocent citizen that cops kill WE, VETERANS WILL KILL RETIRED HELPLESS COPS&#8230;&#8230;..we already started and MORE TO COME NOW&#8230;&#8230;.join us and kill any cop or any retired cop !!!!!!! MORE PEOPLE HAVE BEEN KILLED SINCE THE PROTEST !!! THEY DONT CARE, SO NOW REAL HEROS WILL HUNT THEM ALL !!! fuck ISIS, COPS ARE THE REAL ENEMIES OF FREEDOM LOVING AMERICANS and TIME TO STRIKE BACK IN ALL OUT WAR IS NOW !!”</p></blockquote>
<p>The comment ultimately led to the man&#8217;s arrest on federal charges under 18 USC §875, using interstate communications to convey threats of injury against an individual. A criminal complaint written against Perez and <a href="http://www.justice.gov/usao/co/news/2014/dec/perez_threats_complaint.pdf">posted on the Department of Justice&#8217;s website</a> states that the FBI was alerted to Perez&#8217;s comment after Google voluntarily notified law enforcement because of the comment&#8217;s threatening content. The complaint includes the entire notice provided to the FBI by Google, which states that &#8220;based on the content of a post/comment to a YouTube video on Google Plus Social Media, Google Inc. believes that there presently exists an emergency involving imminent death or serious bodily injury to a person or persons, and that immediate disclosure to you of certain information is required to avert the emergency.&#8221; After obtaining a search warrant based on the IP address provided by Google, the FBI seized Perez&#8217;s computer and interviewed him. He admitted posting the comments and stated that his comments &#8220;were the result of misplaced frustration and a way of experimenting with words.&#8221;</p>
<p>Forensic examination conducted by the FBI of Perez&#8217;s computer revealed a number of other posts to YouTube and other websites using the screen name &#8220;Vets Hunting Cops,&#8221; including searches that were conducted for the following terms:</p>
<blockquote><p>“Kill Sara Palin, Kill Barack Obama, Kill Cory Gardner, Kill Darren Wilson, Find and Kill Darren Wilson, Kill Fox Pundints, Fox News Headquarters, Kill Fox News Racist, Kill Bill O’Reilly, Fox News Headquarters gets bombed, Someone Kill Fox News, Kill the Cops, Beaver Creek City Police Department, How to Find Somebody on YouTube, How to Find Somebody’s IP Address Through YouTube, Kill Ted Cruz, Kill M itch McConnell, Calls to Assassinate GOP Leaders, Google Maps for Fox News Headquarters, Hunt Darren Wilson’s Family, St. Louis Police Officer’s Association, Darren Wilson Prosecutor, Locate Bill O’Reilly’s house.”</p></blockquote>
<p>Perez reportedly admitted to FBI agents that he had conducted the searches, but said that he had no intention of following through with the actions he was researching. Perez now faces up to five years in prison.</p>
<div id="DV-viewer-1386269-fbi-bulletin-threats-to-law-enforcement-officers" class="DV-container"></div>
<p><script src="//s3.amazonaws.com/s3.documentcloud.org/viewer/loader.js"></script><script>// <![CDATA[
DV.load("//www.documentcloud.org/documents/1386269-fbi-bulletin-threats-to-law-enforcement-officers.js", {
  width: 740,
    height: 1000,
    sidebar: false,
    container: "#DV-viewer-1386269-fbi-bulletin-threats-to-law-enforcement-officers"
  });
// ]]&gt;</script></p>The post <a href="https://publicintelligence.net/fbi-copy-cat-police-attacks/">FBI Warns Law Enforcement of Copy Cat Attacks Following Murders of Two NYPD Officers</a> first appeared on <a href="https://publicintelligence.net">Public Intelligence</a>.]]></content:encoded>
					
					<wfw:commentRss>https://publicintelligence.net/fbi-copy-cat-police-attacks/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>DHS Analysis Finds ISIL Most Likely to Conduct IED, Small Arms Attacks in Western Countries</title>
		<link>https://publicintelligence.net/dhs-analysis-isil-attack-tactics/</link>
					<comments>https://publicintelligence.net/dhs-analysis-isil-attack-tactics/#respond</comments>
		
		<dc:creator><![CDATA[Public Intelligence]]></dc:creator>
		<pubDate>Fri, 05 Dec 2014 03:56:00 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Department of Homeland Security]]></category>
		<category><![CDATA[Domestic Terrorism]]></category>
		<category><![CDATA[Islamic State of Iraq and the Levant]]></category>
		<guid isPermaLink="false">http://publicintelligence.net/?p=35045</guid>

					<description><![CDATA[<p>An intelligence assessment released last month by the Department of Homeland Security's Office of Intelligence and Analysis found that a domestic terrorist attack conducted by individuals affiliated with or inspired by the Islamic State of Iraq and the Levant (ISIL) would most likely "employ tactics involving edged weapons, small arms, or improvised explosive devices (IEDs)."  The assessment, which was obtained by Public Intelligence, was released in October following several recent attacks conducted in Europe and Australia by individuals sympathetic to ISIL.  Based on a review of these and other planned attacks, analysts at DHS evaluated the tactics and targets, as well as operational security measures employed in order to determine "tactics, targets, and tradecraft that potentially could be used in the Homeland by individuals associated with or inspired" by ISIL.</p>
<p class="more-link-p">
<a class="btn btn-primary" href="https://publicintelligence.net/dhs-analysis-isil-attack-tactics/">Read more &#8594;</a></p>
The post <a href="https://publicintelligence.net/dhs-analysis-isil-attack-tactics/">DHS Analysis Finds ISIL Most Likely to Conduct IED, Small Arms Attacks in Western Countries</a> first appeared on <a href="https://publicintelligence.net">Public Intelligence</a>.]]></description>
										<content:encoded><![CDATA[<div id="attachment_35062" style="width: 790px" class="wp-caption aligncenter"><a href="https://publicintelligence.net/wp-content/uploads/2014/12/ottawa-shooter.jpg"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-35062" class="size-full wp-image-35062" src="https://publicintelligence.net/wp-content/uploads/2014/12/ottawa-shooter.jpg" alt="A photo of " width="780" height="520" srcset="https://q.publicintelligence.net/wp-content/uploads/2014/12/ottawa-shooter.jpg 780w, https://q.publicintelligence.net/wp-content/uploads/2014/12/ottawa-shooter-300x200.jpg 300w, https://q.publicintelligence.net/wp-content/uploads/2014/12/ottawa-shooter-150x100.jpg 150w" sizes="auto, (max-width: 780px) 100vw, 780px" /></a><p id="caption-attachment-35062" class="wp-caption-text">A photo of Michael Zehaf-Bibeau who shot a Canadian solider on October 22, 2014 in an attack on Parliament Hill that was reportedly inspired by Islamic State of Iraq and the Levant (ISIL).  The photo was taken by a tourist at the beginning of Zehaf-Bibeau&#8217;s attack.</p></div>
<p>An intelligence assessment released last month by the Department of Homeland Security&#8217;s Office of Intelligence and Analysis found that a domestic terrorist attack conducted by individuals affiliated with or inspired by the Islamic State of Iraq and the Levant (ISIL) would most likely &#8220;employ tactics involving edged weapons, small arms, or improvised explosive devices (IEDs).&#8221;  The assessment, which was <a href="https://publicintelligence.net/dhs-isil-attack-tactics/">obtained by Public Intelligence</a>, was released in October following several recent attacks conducted in Europe and Australia by individuals sympathetic to ISIL.  Based on a review of these and other planned attacks, analysts at DHS evaluated the tactics and targets, as well as operational security measures employed in order to determine &#8220;tactics, targets, and tradecraft that potentially could be used in the Homeland by individuals associated with or inspired&#8221; by ISIL.</p>
<p>The assessment concludes that the &#8220;most likely perpetrators of a potential ISIL-directed or inspired Homeland attack include individuals acting under the direction of foreign-based terrorists, returning foreign fighters, and those who are inspired by the ongoing conflict in Syria and Iraq but who cannot or will not travel overseas.&#8221;  These individuals would likely use &#8220;edged weapons, small arms, or improvised explosive devices (IEDs)&#8221; to attack targets that provide an &#8220;opportunity to successfully execute an attack that would garner media attention.&#8221;  For example, recent plots in Europe and Australia have targeted public gatherings, government employees and Jewish facilities.</p>
<p>Several attacks in Europe over the last year have shown the willingness of former ISIL fighters to conduct attacks once they return to their home countries.  In February, a man named Ibrahim Boudina was <a href="http://www.cnn.com/2014/08/28/world/europe/france-suspected-isis-link/">arrested in France</a> after returning from Syria where he reportedly fought with ISIL.  During a search in Greece, where Boudina had been entering into Europe, authorities discovered a USB drive with instructions on making explosives.  A French-Tunisian friend of Boudina was also arrested in Italy after returning from Syria.  A week after the arrest, members of the French security service reportedly discovered &#8220;a handgun, bomb-making instructions, and three soda cans filled with the high-explosive compound TATP&#8221; in an apartment complex owned by Boudina&#8217;s father.</p>
<p>In May, a French citizen that is believed to have fought with ISIL in Syria <a href="http://en.wikipedia.org/wiki/Jewish_Museum_of_Belgium_shooting">shot and killed four people</a> at a Jewish museum in Brussels, Belgium.  When the man was arrested several weeks after the attack, he was found to be in possession of an ISIL flag as well as an automatic rifle that was believed to have been used in the attack.</p>
<div id="attachment_35044" style="width: 1007px" class="wp-caption aligncenter"><a href="https://publicintelligence.net/wp-content/uploads/2014/12/isil-past-tactics.png"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-35044" class="wp-image-35044 size-full" src="https://publicintelligence.net/wp-content/uploads/2014/12/isil-past-tactics.png" alt="isil-past-tactics" width="997" height="942" srcset="https://q.publicintelligence.net/wp-content/uploads/2014/12/isil-past-tactics.png 997w, https://q.publicintelligence.net/wp-content/uploads/2014/12/isil-past-tactics-300x283.png 300w, https://q.publicintelligence.net/wp-content/uploads/2014/12/isil-past-tactics-150x141.png 150w" sizes="auto, (max-width: 997px) 100vw, 997px" /></a><p id="caption-attachment-35044" class="wp-caption-text">An image from the DHS intelligence assessment released in October highlights various plots in Europe and Australia, providing examples of their tactics and targets as well as operational security measures employed by the attackers.</p></div>
<p>In September, Australian authorities <a href="http://online.wsj.com/articles/australia-detains-suspects-in-terrorism-probe-1411008044">arrested fifteen individuals</a> suspected of planning to kidnap and behead members of the public on behalf of ISIL.  The plot was allegedly foiled after communications were intercepted between a &#8220;Syria-based Australian senior ISIL member and a Sydney-based group member discussing a plot reportedly centered on filming the murders of randomly selected individuals in Sydney, which would then be sent to ISIL&#8217;s media wing to disseminate via social media.&#8221;  According to the DHS assessment, the plot is an example of the &#8220;potential threat posed by individuals who have not traveled to Syria or Iraq, but who maintain contact and take some level of direction from overseas-based ISIL leaders.&#8221;</p>
<p>A similar incident mentioned in the assessment also occurred in September when an eighteen-year-old Australian who had publicly expressed his support for ISIL <a href="http://www.reuters.com/article/2014/09/24/us-australia-security-shooting-idUSKCN0HI2IM20140924">stabbed two police officers</a> after volunteering to meet with counterterrorism task force members as part of an ongoing investigation.  Less than a week after the assessment&#8217;s publication by DHS, a Canadian citizen named Michael Zehaf-Bibeau <a href="http://en.wikipedia.org/wiki/2014_shootings_at_Parliament_Hill,_Ottawa">shot a soldier</a> at the Canadian War Memorial in an attack that was reportedly inspired by ISIL and entered a building on Parliament Hill before being shot by police.</p>
<div id="DV-viewer-1375001-dhs-intelligence-assessment-potential-tactics" class="DV-container"></div>
<p><script src="//s3.amazonaws.com/s3.documentcloud.org/viewer/loader.js"></script><script>// <![CDATA[
DV.load("//www.documentcloud.org/documents/1375001-dhs-intelligence-assessment-potential-tactics.js", {   width: 740,     height: 1000,     sidebar: false,     container: "#DV-viewer-1375001-dhs-intelligence-assessment-potential-tactics"   });
// ]]&gt;</script></p>The post <a href="https://publicintelligence.net/dhs-analysis-isil-attack-tactics/">DHS Analysis Finds ISIL Most Likely to Conduct IED, Small Arms Attacks in Western Countries</a> first appeared on <a href="https://publicintelligence.net">Public Intelligence</a>.]]></content:encoded>
					
					<wfw:commentRss>https://publicintelligence.net/dhs-analysis-isil-attack-tactics/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>FBI Warns of Hacktivist Threats Following U.S. Airstrikes in Iraq and Syria</title>
		<link>https://publicintelligence.net/fbi-hacktivists-isil/</link>
					<comments>https://publicintelligence.net/fbi-hacktivists-isil/#comments</comments>
		
		<dc:creator><![CDATA[Public Intelligence]]></dc:creator>
		<pubDate>Mon, 29 Sep 2014 01:56:19 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Department of Homeland Security]]></category>
		<category><![CDATA[Domestic Terrorism]]></category>
		<category><![CDATA[Federal Bureau of Investigation]]></category>
		<category><![CDATA[Islamic State of Iraq and the Levant]]></category>
		<category><![CDATA[U.S. Army]]></category>
		<guid isPermaLink="false">http://publicintelligence.net/?p=34760</guid>

					<description><![CDATA[<p>The FBI Cyber Division has issued a notification to private industry and law enforcement to be aware of the potential for retaliatory cyber attacks following recent U.S. military actions in the Middle East. While the FBI has "no information at this time to indicate specific cyber threats to US networks or infrastructure in response to ongoing US military air strikes against the terrorist group known as the Islamic State of Iraq and the Levant (ISIL)" the bulletin states that the FBI believes that "extremist hackers and hacktivist groups, including but not limited to those aligned with the ISIL ideology, will continue to threaten and may attempt offensive cyber actions against the United States in response to perceived or actual US military operations in Iraq or Syria."</p>
<p class="more-link-p">
<a class="btn btn-primary" href="https://publicintelligence.net/fbi-hacktivists-isil/">Read more &#8594;</a></p>
The post <a href="https://publicintelligence.net/fbi-hacktivists-isil/">FBI Warns of Hacktivist Threats Following U.S. Airstrikes in Iraq and Syria</a> first appeared on <a href="https://publicintelligence.net">Public Intelligence</a>.]]></description>
										<content:encoded><![CDATA[<div id="attachment_34764" style="width: 902px" class="wp-caption aligncenter"><a href="https://publicintelligence.net/wp-content/uploads/2014/09/twitter-jihad.png"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-34764" class="size-full wp-image-34764" src="https://publicintelligence.net/wp-content/uploads/2014/09/twitter-jihad.png" alt="A twitter account " width="892" height="523" srcset="https://q.publicintelligence.net/wp-content/uploads/2014/09/twitter-jihad.png 892w, https://q.publicintelligence.net/wp-content/uploads/2014/09/twitter-jihad-300x175.png 300w, https://q.publicintelligence.net/wp-content/uploads/2014/09/twitter-jihad-150x87.png 150w" sizes="auto, (max-width: 892px) 100vw, 892px" /></a><p id="caption-attachment-34764" class="wp-caption-text">A Twitter account purporting to be operated by Junaid Hussain, also known as Abu Hussain Al Britani, who was sentenced to six months in prison in 2012 for hacking an email account associated with former Prime Minister Tony Blair and flooding the U.K. national anti-terror hotline with automated calls.</p></div>
<p>The FBI Cyber Division has issued a notification to private industry and law enforcement to be aware of the potential for retaliatory cyber attacks following recent U.S. military actions in the Middle East. While the FBI has &#8220;no information at this time to indicate specific cyber threats to US networks or infrastructure in response to ongoing US military air strikes against the terrorist group known as the Islamic State of Iraq and the Levant (ISIL)&#8221; the bulletin states that the FBI believes that &#8220;extremist hackers and hacktivist groups, including but not limited to those aligned with the ISIL ideology, will continue to threaten and may attempt offensive cyber actions against the United States in response to perceived or actual US military operations in Iraq or Syria.&#8221;</p>
<p>The bulletin titled &#8220;Threat of Cyberterrorist and Hacktivist Activity in Response to US Military Actions in the Middle East&#8221; was released last Wednesday and is based on &#8220;recent, nonspecific, and probably aspirational threats made on social media platforms to carry out cyber as well as physical attacks in response to the US military presence in the Middle East.&#8221; The bulletin, which was <a href="https://publicintelligence.net/fbi-isil-cyberterrorism/">obtained by Public Intelligence</a>, states that &#8220;Middle East-based hacktivist groups and extremist cyber actors have previously targeted US commercial and government Web sites in response to a range of US military actions and foreign policy positions&#8221; using tactics such as &#8220;Cross Site Scripting (XSS), Structured Query Language (SQL) Injection, and TCP/UDP Flooding for defacement and DDoS attacks.&#8221; According to the FBI, web site defacements &#8220;conducted by these actors will likely contain messages expressing support for ISIL, and/or contain imagery such as the black ISIL flag or graphic imagery, e.g., pictures or videos of ISIL executions.&#8221;</p>
<p>Previous examples of hacktivist attacks motivated by U.S. military actions are included in the bulletin including an incident in May 2014 in which the &#8220;Tunisian Hackers Team threatened Distributed Denial of Service (DDoS) attacks against the US financial sector unless US military forces were withdrawn from presumed-Islamic lands.&#8221; The bulletin also cites numerous threatening posts on Twitter and identifies several accounts that have expressed support for ISIL, some of which have even provided guidance on tools that could potentially be used in a cyber attack.  One particularly interesting example cited in the bulletin is the case of Junaid Hussain, a British man who pleaded guilty in 2012 to charges related to the hacking of an email account connected with former Prime Minister Tony Blair.  Hussain, who was just sixteen at the time the hacking occurred, was involved in the compromise of a Gmail account used by <a href="http://www.theregister.co.uk/2012/07/27/teen_hacker_six_months/">Blair&#8217;s adviser Katie Kay</a> and later <a href="http://pastebin.com/mn6Dhgcd">posted private contact information obtained from the account</a>.  As part of the hacking group TeaMp0isoN, Hussain also participated in an attack that flooded the the U.K.&#8217;s national anti-terror hotline with automated calls, including some prank calls that are <a href="http://www.youtube.com/watch?v=PEBQoxHh1uU">still available on YouTube</a>.  After serving six months in a youth detention facility, Hussain was arrested on suspicion of &#8220;violent disorder&#8221; in late 2013 and while on bail fled to Syria with a <a href="http://www.dailymail.co.uk/news/article-2739006/Revealed-How-middle-aged-mother-two-Kent-used-girl-rock-band-reinvented-jihadi-threatening-behead-Christians-blunt-knife.html">24-year-old rapper named <span id="ext-gen93">Abdel-Majed Abdel Bary</span></a>.  He is now reportedly fighting with ISIL and goes by the name Abu Hussain Al Britani.  A <a href="https://twitter.com/abuhussain102">Twitter account</a> reportedly operated by Hussain features a profile photo depicting him pointing an AK-47 at the camera and a bio that reads &#8220;random British mujahid somewhere in the Islamic State.&#8221;</p>
<div id="attachment_34772" style="width: 768px" class="wp-caption aligncenter"><a href="https://publicintelligence.net/wp-content/uploads/2014/09/jihad-tweets.png"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-34772" class="wp-image-34772 " src="https://publicintelligence.net/wp-content/uploads/2014/09/jihad-tweets.png" alt="jihad-tweets" width="758" height="805" srcset="https://q.publicintelligence.net/wp-content/uploads/2014/09/jihad-tweets.png 726w, https://q.publicintelligence.net/wp-content/uploads/2014/09/jihad-tweets-282x300.png 282w, https://q.publicintelligence.net/wp-content/uploads/2014/09/jihad-tweets-141x150.png 141w" sizes="auto, (max-width: 758px) 100vw, 758px" /></a><p id="caption-attachment-34772" class="wp-caption-text">A recent tweet from Junaid Hussain featuring a photo of a RPG and AK-47.</p></div>
<p>Several recent law enforcement bulletins issued by the Department of Homeland Security and local fusion centers have warned about online threats made by supporters of ISIL. A joint DHS-FBI intelligence bulletin from August 22, 2014 <a href="http://www.foxnews.com/politics/interactive/2014/08/29/joint-intelligence-bulletin-082214/">obtained by Fox News</a> warned that following the &#8220;start of US military air strikes on 8 August against the ISIL in Iraq, ISIL supporters launched a Twitter campaign threatening retaliatory violence against the Homeland and US interests overseas.&#8221; The bulletin went on to say that social media is increasingly being used by ISIL supporters to encourage violent attacks on U.S. interests. Another fusion center bulletin from early July, also <a href="http://www.foxnews.com/world/2014/09/17/law-enforcement-bulletin-warned-isis-urging-jihad-attacks-on-us-soil/">obtained by Fox News</a>, cited specific tweets threatening the lives of U.S. military personnel. One tweet from a British jihadist cited in the bulletin reportedly instructed supporters to use LinkedIn and Facebook to look up information on U.S. service members prior to staging attacks: &#8220;You could literally search for soldiers, find their town, photos of them, look for address in Yellowbook or something. Then show up and slaughter them.&#8221;</p>
<p>While no specific plots have been identified, online threats against U.S. service members are evidently credible enough to warrant a response from the U.S. Army.  The Army Threat Integration Center (ARTIC) <a href="https://publicintelligence.net/artic-isil-threats-homeland/">issued a special assessment</a> on Thursday warning soldiers about the threat posed by the &#8220;Islamic State of Iraq and the Levant (ISIL), its supporters, those swayed by radical Islam, and lone offenders with the intent or inclination to act on ISIL’s behalf.&#8221;  Given the &#8220;continued rhetoric being issued by ISIL’s media services and supporters through various social media platforms,&#8221; the assessment states that ARTIC is concerned of the possibility of attacks conducted against U.S. military personnel and their families:</p>
<blockquote><p>Over the past year, ISIL has threatened violence against the United States and US interests overseas in response to ongoing counterterrorism pressure. Following the start of US air strikes in Iraq in early August 2014, and then Syria in late September 2014, ISIL supporters launched a Twitter campaign threatening retaliatory violence against the United States. Additionally, a recent audio message from an ISIL spokesman called, for the first time, for lone offender attacks in the Homeland in retaliation for US military operations in Iraq and Syria.</p></blockquote>
<p>The assessment includes tips on basic home security precautions that service members should take to protect against an individual &#8220;conducting an attack while you or your family members are home.&#8221;  These tips include using the &#8220;peephole before opening the door to anyone&#8221; and not opening the door to &#8220;solicitors or strangers.&#8221;</p>
<p>&nbsp;</p>
<div id="DV-viewer-1306420-fbi-private-industry-notification-threat-of" class="DV-container"></div>
<p><script src="//s3.amazonaws.com/s3.documentcloud.org/viewer/loader.js"></script><script>// <![CDATA[
DV.load("//www.documentcloud.org/documents/1306420-fbi-private-industry-notification-threat-of.js", {   width: 740,     height: 1000,     sidebar: false,     container: "#DV-viewer-1306420-fbi-private-industry-notification-threat-of"   });
// ]]&gt;</script></p>The post <a href="https://publicintelligence.net/fbi-hacktivists-isil/">FBI Warns of Hacktivist Threats Following U.S. Airstrikes in Iraq and Syria</a> first appeared on <a href="https://publicintelligence.net">Public Intelligence</a>.]]></content:encoded>
					
					<wfw:commentRss>https://publicintelligence.net/fbi-hacktivists-isil/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>Joint Chiefs of Staff Guide Offers Blunt Assessment of Afghan National Police</title>
		<link>https://publicintelligence.net/jcisfa-afghan-national-police/</link>
					<comments>https://publicintelligence.net/jcisfa-afghan-national-police/#respond</comments>
		
		<dc:creator><![CDATA[Public Intelligence]]></dc:creator>
		<pubDate>Mon, 08 Sep 2014 01:40:19 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Afghan National Army]]></category>
		<category><![CDATA[Afghan National Police]]></category>
		<category><![CDATA[Afghan National Security Forces]]></category>
		<category><![CDATA[Afghanistan]]></category>
		<category><![CDATA[U.S. Army]]></category>
		<guid isPermaLink="false">http://publicintelligence.net/?p=34617</guid>

					<description><![CDATA[<p>"First time I ever saw an Afghan Police Station I thought it was something straight out of the dark ages, complete with zero electricity, mud structure, and no sewage drainage. Immediately I knew this mission would be challenging and wondered what the heck I got myself into?" This quote from a U.S. Army Captain is just one example of the unusually blunt assessments contained in the Joint Center for International Security Force Assistance (JCISFA) guide for advising the Afghan National Police (ANP). The 2010 version of the JCISFA ANP Mentor Guide, which was obtained by Public Intelligence along with a guide for troops assisting the Afghan National Army (ANA), contains a number of revealing observations on the often poor condition of Afghan National Security Forces, in particular the ANP.</p>
<p class="more-link-p">
<a class="btn btn-primary" href="https://publicintelligence.net/jcisfa-afghan-national-police/">Read more &#8594;</a></p>
The post <a href="https://publicintelligence.net/jcisfa-afghan-national-police/">Joint Chiefs of Staff Guide Offers Blunt Assessment of Afghan National Police</a> first appeared on <a href="https://publicintelligence.net">Public Intelligence</a>.]]></description>
										<content:encoded><![CDATA[<div id="attachment_34619" style="width: 762px" class="wp-caption aligncenter"><a href="https://publicintelligence.net/wp-content/uploads/2014/09/afghan-national-police.jpg"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-34619" class="size-large wp-image-34619" src="https://publicintelligence.net/wp-content/uploads/2014/09/afghan-national-police-1024x681.jpg" alt="The fo" width="752" height="500" srcset="https://q.publicintelligence.net/wp-content/uploads/2014/09/afghan-national-police-1024x681.jpg 1024w, https://q.publicintelligence.net/wp-content/uploads/2014/09/afghan-national-police-300x199.jpg 300w, https://q.publicintelligence.net/wp-content/uploads/2014/09/afghan-national-police-150x99.jpg 150w, https://q.publicintelligence.net/wp-content/uploads/2014/09/afghan-national-police.jpg 1440w" sizes="auto, (max-width: 752px) 100vw, 752px" /></a><p id="caption-attachment-34619" class="wp-caption-text">An Afghan National Police patrolmen poses for a photo at a Police Sub-station under construction and under guard in Kandahar City. (U.S. Navy photo by Petty Officer 2nd Class Ernesto Hernandez Fonte)</p></div>
<p>&#8220;First time I ever saw an Afghan Police Station I thought it was something straight out of the dark ages, complete with zero electricity, mud structure, and no sewage drainage. Immediately I knew this mission would be challenging and wondered what the heck I got myself into?&#8221;</p>
<p>This quote from a U.S. Army Captain is just one example of the unusually blunt assessments contained in the Joint Center for International Security Force Assistance (JCISFA) guide for advising the Afghan National Police (ANP). The 2010 version of the JCISFA ANP Mentor Guide, which was <a href="https://publicintelligence.net/jcisfa-anp-mentor-guide/">obtained by Public Intelligence</a> along with a <a href="https://publicintelligence.net/jcisfa-ana-mentor-guide/">guide for troops assisting the Afghan National Army (ANA)</a>, contains a number of revealing observations on the often poor condition of Afghan National Security Forces, in particular the ANP.</p>
<p>The JCISFA guide explains to would-be advisers that an ANP station will not &#8220;resemble anything close to what an American police station would look like&#8221; and are often constructed from mud and straw. Though the Combined Security Transition Command–Afghanistan (CSTC-A) is reportedly funding numerous station rebuilds and renovations throughout the country, the guide warns that advisers could encounter the following conditions:</p>
<ul>
<li>Electricity (1 to 2 kerosene lanterns for light) in rural areas up to 2 to 4 hours of power each day.</li>
<li>Lack of heat and air conditioning.</li>
<li>Generators that work poorly (if at all).</li>
<li>Latrines that are almost all “Eastern style” and have plumbing problems.</li>
<li>Limited water and an unworkable sewage system.</li>
</ul>
<p>The introduction to the mentor guide states that &#8220;public perception of the ANP is poor&#8221; and that police officers &#8220;have been known to establish Vehicle Control Points (VCP’s) or Traffic Control Points (TCP’s) for the purpose of exacting tolls&#8221; or &#8220;stealing from the population.&#8221;  They will often ask to see the vehicle’s registration papers and then require a bribe, referred to as a &#8220;baksheesh&#8221; which literally means gift, before they return the registration to the vehicle&#8217;s owner.  Local or tribal leaders will even utilize the ANP at times to &#8220;oppress their rivals in inter-family squabbles&#8221; which leads to a low public opinion of the national police force.  While the ANA is often well regarded by the population, the ANP has a negative reputation among the Afghan people which is used to the advantage of insurgents.  According to the guide, ANP are killed at three times the rate of ANA soldiers.</p>
<p>Here are some other revealing observations found in the JCISFA guide:</p>
<ul>
<li><strong>Police Stations are Often Not Staffed Properly</strong>: <em>&#8220;In order for a district station to function properly, the ANP need to fill key staff and leadership roles. Unfortunately, in many stations, some of the positions are unfilled, while in other stations the chief is the only key position filled.&#8221;</em></li>
<li><strong>Centralized Leadership Can Cause Inaction</strong>: <em>&#8220;Control in the ANP is very centralized. As a result, subordinate officers rarely have the latitude to make decisions without first consulting with the chief. In some ways, this centralized control makes the advisor’s job easier since once he convinces the chief of the need to do something, he has convinced the whole station. On the down side, however, subordinate leaders will rarely take the initiative to solve problems without direction, and if the chief is not present they will often defer a decision, even a critical one, until his return.&#8221;</em></li>
<li><strong>Many Police Chiefs are Appointed Due to Patronage</strong>: <em>&#8220;Many ANP chiefs owe their position not to leadership ability or police experience, but to the patronage of a local leader. As a result, advisors must often guide them very closely to help them do the right things.&#8221;</em></li>
<li><strong>Police Chiefs Often Feel They Can Fleece the Population</strong>: <em>&#8220;Many chiefs also feel that their position grants them the right to certain &#8216;benefits&#8217; including skimming pay or demanding additional compensation from the community.&#8221;</em></li>
<li><strong>Afghan Police Lack Muzzle Awareness</strong>: <em>&#8220;Muzzle awareness is a major problem with many ANP, especially those who have never had an advisor team before. Developing muzzle awareness takes patience and constant spot corrections. Over time, these efforts will have an impact. ANP will also have a tendency to carry loaded weapons with the safety disengaged. A Kalashnikov-type weapon with a selector switch in a position other than &#8216;safe&#8217; is easy to spot. Advisors need to maintain vigilance regarding the condition and position of ANP weapons.&#8221;</em></li>
<li><strong>Afghan Police Lack Fire Discipline</strong>: <em>&#8220;Accountability of weapons and ammunition remains problematic due to poor record keeping, theft, maintenance issues, and, in the case of ammunition, operational use. Since the ANP are not known for their fire discipline, keeping stations stocked with sufficient ammunition in areas with a lot of enemy activity will become a constant challenge for the advisor teams.&#8221;</em></li>
<li><strong>There is &#8220;Rarely&#8221; a Formal Work Schedule</strong>: <em>&#8220;ANP normally work a &#8216;fire house&#8217; schedule where they will live and work at the station for a number of days followed by some time off. Unfortunately, the work schedule of the ANP is rarely formalized. Therefore neither the chief nor the advisors can accurately predict how many ANP will be at the station from day to day. This lack of predictability is exacerbated when the ANP conduct a major operation. It is not unusual on the day after an operation for the ANP to have almost no one on duty due to poor schedule management. Typically, advisors can expect to find 50-70% of a station’s assigned strength on duty at any given time. While some of the absences are authorized (time off, sick, injured, leave) some of the absences may be “ghost” police who either do not exist or exist only to collect a pay check.&#8221;</em></li>
<li><strong>Police Can Often Have Ties to Illegal Militias or the Taliban</strong>: <em>&#8220;That many ANP owe their jobs to the influence of these local leaders has led to the perception that many of them have ties to insurgents or the Taliban, work with illegal militias, or have questionable loyalty to the ANP over their tribal benefactors. Unfortunately, in many cases, these perceptions are reality. The lack of a comprehensive national criminal database also makes weeding out the bad very difficult. In a country where mid to upper level Taliban leaders can freely travel the streets because no one is able or willing to identify them makes infiltration of the ANP by criminals and insurgents a foregone conclusion.&#8221;</em></li>
<li><strong>New Recruits Often Skip Their Training</strong>: <em>&#8220;A new ANP hire is expected to attend basic police training at either the Central Training Center (CTC) in Kabul or one of the seven Regional Training Centers (RTC) in Kandahar, Gardez, Herat, Kunduz, Jalabad, Mazar-i-Sharif, and Bamian. New hires are expected to attend training within 1-3 months of hire, since they are paid full ANP from the date of hire, often there is no impetus for them to go. Poor record keeping further exacerbates the problem resulting in a large number of untrained ANP.&#8221;</em></li>
<li><strong>Police Stations Often Use Hand Drawn Maps</strong>: <em>&#8220;Districts often lack maps or may have hand-drawn maps. Maps in Dari can be requested, but land navigation training must be provided in order for the map to be read accurately. Dividing an area of responsibility into sectors based on recognizable terrain features and given simple code names based on colors or numbers, along with specific check points based on easily recognizable points will assist in intelligence gathering, operational planning, and communications.&#8221;</em></li>
<li><strong>Police Corruption is Rampant</strong>: <em>&#8220;Corruption can be found at all levels, and may be justified by reasoning that the ANP risk much and are underpaid. One favorite tactic is to &#8216;shake down&#8217; travelers at [traffic control points]. Another is to steal various items while conducting the search of a home. Leaders must be encouraged to follow up on reported acts such as these and to resolve them. Unresolved issues such as these can and will lead to more violence against the ANP and more support for insurgents.&#8221;</em></li>
</ul>
<p>&nbsp;</p>
<div id="DV-viewer-1285070-jcisfa-afghan-national-police-mentorguide" class="DV-container"></div>
<p><script src="//s3.amazonaws.com/s3.documentcloud.org/viewer/loader.js"></script><script>// <![CDATA[
  DV.load("//www.documentcloud.org/documents/1285070-jcisfa-afghan-national-police-mentorguide.js", {
  width: 740,
    height: 1000,
    sidebar: false,
    container: "#DV-viewer-1285070-jcisfa-afghan-national-police-mentorguide"
  });
// ]]&gt;</script></p>The post <a href="https://publicintelligence.net/jcisfa-afghan-national-police/">Joint Chiefs of Staff Guide Offers Blunt Assessment of Afghan National Police</a> first appeared on <a href="https://publicintelligence.net">Public Intelligence</a>.]]></content:encoded>
					
					<wfw:commentRss>https://publicintelligence.net/jcisfa-afghan-national-police/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Feds Issue Bulletin on Google Dorking</title>
		<link>https://publicintelligence.net/feds-google-dorking/</link>
					<comments>https://publicintelligence.net/feds-google-dorking/#comments</comments>
		
		<dc:creator><![CDATA[Public Intelligence]]></dc:creator>
		<pubDate>Mon, 25 Aug 2014 00:25:46 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Department of Homeland Security]]></category>
		<category><![CDATA[Federal Bureau of Investigation]]></category>
		<category><![CDATA[Google]]></category>
		<category><![CDATA[National Counterterrorism Center]]></category>
		<guid isPermaLink="false">http://publicintelligence.net/?p=34473</guid>

					<description><![CDATA[<p>A bulletin issued by the Department of Homeland Security, the FBI and the National Counterterrorism Center earlier this month warns law enforcement and private security personnel that malicious cyber actors can use "advanced search techniques" to discover sensitive information and other vulnerabilities in websites.  The bulletin, titled "Malicious Cyber Actors Use Advanced Search Techniques," describes a set of techniques collectively referred to as "Google dorking" or "Google hacking" that are used to refine search queries to provide more specific results.</p>
<p class="more-link-p">
<a class="btn btn-primary" href="https://publicintelligence.net/feds-google-dorking/">Read more &#8594;</a></p>
The post <a href="https://publicintelligence.net/feds-google-dorking/">Feds Issue Bulletin on Google Dorking</a> first appeared on <a href="https://publicintelligence.net">Public Intelligence</a>.]]></description>
										<content:encoded><![CDATA[<div id="attachment_34577" style="width: 790px" class="wp-caption aligncenter"><a href="https://publicintelligence.net/wp-content/uploads/2014/08/google-dorking.png"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-34577" class="size-full wp-image-34577" src="https://publicintelligence.net/wp-content/uploads/2014/08/google-dorking.png" alt="An examples" width="780" height="549" srcset="https://q.publicintelligence.net/wp-content/uploads/2014/08/google-dorking.png 780w, https://q.publicintelligence.net/wp-content/uploads/2014/08/google-dorking-300x211.png 300w, https://q.publicintelligence.net/wp-content/uploads/2014/08/google-dorking-150x105.png 150w" sizes="auto, (max-width: 780px) 100vw, 780px" /></a><p id="caption-attachment-34577" class="wp-caption-text">An example of a &#8220;Google dork&#8221; query with accompanying responses.</p></div>
<p>A bulletin issued by the Department of Homeland Security, the FBI and the National Counterterrorism Center earlier this month warns law enforcement and private security personnel that malicious cyber actors can use &#8220;advanced search techniques&#8221; to discover sensitive information and other vulnerabilities in websites.  The bulletin, titled &#8220;<a href="https://publicintelligence.net/dhs-fbi-nctc-google-dorking/">Malicious Cyber Actors Use Advanced Search Techniques</a>,&#8221; describes a set of techniques collectively referred to as &#8220;Google dorking&#8221; or &#8220;Google hacking&#8221; that use &#8220;advanced operators&#8221; to refine search queries to provide more specific results.  Lists of these operators are <a href="https://sites.google.com/site/gwebsearcheducation/advanced-operators">provided by Google</a> and include the following examples:</p>
<table border="0" cellspacing="0" cellpadding="0">
<tbody>
<tr>
<td><strong>allintext: / intext:</strong></td>
<td><span style="font-size: medium;">Restricts results to those containing all the query terms you specify in the text of the page</span></td>
</tr>
<tr>
<td><strong>allintitle: / intitle:</strong></td>
<td><span style="font-size: medium;">Restricts results to those containing all the query terms you specify in the title</span></td>
</tr>
<tr>
<td><strong>allinurl: / inurl:</strong></td>
<td><span style="font-size: medium;">Restricts results to those containing all the query terms you specify in the URL</span></td>
</tr>
<tr>
<td><strong>filetype:suffix</strong></td>
<td><span style="font-size: medium;">Limits results to pages whose names end in </span><span style="font-style: italic; font-weight: bold;"><span style="font-size: medium;">suffix</span></span></td>
</tr>
<tr>
<td><strong><span style="font-weight: bold;"><span style="font-size: medium;">site:</span></span></strong></td>
<td>Using the <strong><em>site:</em></strong> operator restricts your search results to the site or domain you specify</td>
</tr>
<tr>
<td><strong>Minus sign  ( – ) to exclude</strong></td>
<td><span style="font-size: medium;">Placing  a minus sign immediately before a word indicates that you do not want pages that contain this word to appear in your results</span></td>
</tr>
<tr>
<td><strong>Phrase search (using double quotes, “…” )</strong></td>
<td><span style="font-size: medium;">By putting double quotes around a set of words, you are telling Google to consider the exact words in that exact order without any change</span></td>
</tr>
</tbody>
</table>
<p>Here is an example of a query constructed from these operators:</p>
<p><a href="https://www.google.com/?gws_rd=ssl#q=%22sensitive+but+unclassified%22+filetype:pdf+site:publicintelligence.net">&#8220;sensitive but unclassified&#8221; filetype:pdf site:publicintelligence.net</a></p>
<p>The bulletin warns that malicious cyber actors can use these techniques to &#8220;locate information that organizations may not have intended to be discoverable by the public or to find website vulnerabilities for use in subsequent cyber attacks.&#8221;  Hackers searching for &#8220;specific file types and keywords . . . can locate information such as usernames and passwords, e-mail lists, sensitive documents, bank account details, and website vulnerabilities.&#8221;  Moreover, &#8220;freely available online tools can run automated scans using multiple dork queries&#8221; to discover vulnerabilities.  In fact, the bulletin recommends that security professionals use these tools &#8220;such as the Google Hacking Database, found at http://www.exploit-db.com/google-dorks, to run pre-made dork queries to find discoverable proprietary information and website vulnerabilities.&#8221;</p>
<p>Several security breaches related to the use of &#8220;advanced search techniques&#8221; are also referenced in the bulletin.  One <a href="http://www.cnet.com/news/yale-oversight-exposes-43000-social-security-numbers/">incident in August 2011</a> resulted in the compromise of the personally identifiable information of approximately 43,000 faculty, staff, students and alumni of Yale University.  The information was located in a spreadsheet placed on a publicly accessible File Transfer Protocol (FTP) server and was listed in Google search results for more than ten months prior to being discovered.  Another <a href="http://krebsonsecurity.com/2013/10/thousands-of-sites-hacked-via-vbulletin-hole/">incident in October 2013</a> involved attackers using Google dorking to discover websites running vulnerable versions of vBulletin message board software prior to running automated tools that created administrator accounts on the compromised sites.  As many as 35,000 websites were believed to have been compromised in the incident.</p>
<div id="DV-viewer-1276146-dhs-fbi-nctc-bulletin-malicious-cyber-actors-use" class="DV-container"></div>
<p><script src="//s3.amazonaws.com/s3.documentcloud.org/viewer/loader.js"></script><script>// <![CDATA[
DV.load("//www.documentcloud.org/documents/1276146-dhs-fbi-nctc-bulletin-malicious-cyber-actors-use.js", {   width: 740,     height: 1000,     sidebar: false,     container: "#DV-viewer-1276146-dhs-fbi-nctc-bulletin-malicious-cyber-actors-use"   });
// ]]&gt;</script></p>The post <a href="https://publicintelligence.net/feds-google-dorking/">Feds Issue Bulletin on Google Dorking</a> first appeared on <a href="https://publicintelligence.net">Public Intelligence</a>.]]></content:encoded>
					
					<wfw:commentRss>https://publicintelligence.net/feds-google-dorking/feed/</wfw:commentRss>
			<slash:comments>4</slash:comments>
		
		
			</item>
		<item>
		<title>DHS Warns of &#8220;Domestic Violent Extremists&#8221; Targeting Government Officials, Law Enforcement</title>
		<link>https://publicintelligence.net/dhs-domestic-violent-extremists-enemy/</link>
					<comments>https://publicintelligence.net/dhs-domestic-violent-extremists-enemy/#comments</comments>
		
		<dc:creator><![CDATA[Public Intelligence]]></dc:creator>
		<pubDate>Thu, 14 Aug 2014 16:19:26 +0000</pubDate>
				<category><![CDATA[Featured]]></category>
		<category><![CDATA[Department of Homeland Security]]></category>
		<category><![CDATA[Rightwing Extremists]]></category>
		<category><![CDATA[Sovereign Citizen]]></category>
		<guid isPermaLink="false">http://publicintelligence.net/?p=34520</guid>

					<description><![CDATA[<p>An intelligence assessment released July 22 by the Department of Homeland Security Office of Intelligence and Analysis warns of an increasing trend of "anti-government violence" from what are described as "domestic violent extremists" inspired by the recent standoff at the Bundy Ranch in Bunkerville, Nevada.  The report, titled "Domestic Violent Extremists Pose Increased Threat to Government Officials an Law Enforcement," was originally obtained and published by Public Employees for Environmental Responsibility, a non-profit alliance of local state and federal resource professionals that has been advocating for criminal charges against Cliven Bundy and "militia snipers" involved in the April standoff with the Bureau of Land Management.  In recent months, the report suggests that there has been a notable increase in violence from domestic extremists motivated by "anti-government ideologies."</p>
<p class="more-link-p">
<a class="btn btn-primary" href="https://publicintelligence.net/dhs-domestic-violent-extremists-enemy/">Read more &#8594;</a></p>
The post <a href="https://publicintelligence.net/dhs-domestic-violent-extremists-enemy/">DHS Warns of “Domestic Violent Extremists” Targeting Government Officials, Law Enforcement</a> first appeared on <a href="https://publicintelligence.net">Public Intelligence</a>.]]></description>
										<content:encoded><![CDATA[<div class="hero-unit"><em>An intelligence assessment from the Department of Homeland Security demonstrates law enforcement&#8217;s growing fear of violence from &#8220;anti-government&#8221; extremists emboldened by the recent standoff at the Bundy Ranch in Nevada.</em></div>
<p>An intelligence assessment released July 22 by the Department of Homeland Security Office of Intelligence and Analysis warns of an increasing trend of &#8220;anti-government violence&#8221; from what are described as &#8220;domestic violent extremists&#8221; inspired by the recent standoff at the Bundy Ranch in Bunkerville, Nevada.  The report, titled &#8220;Domestic Violent Extremists Pose Increased Threat to Government Officials an Law Enforcement,&#8221; was originally obtained and published by Public Employees for Environmental Responsibility, a non-profit alliance of local state and federal resource professionals that has been <a href="http://www.peer.org/news/news-releases/2014/07/31/extremist-anti-government-militias-on-the-rise/">advocating for criminal charges</a> against Cliven Bundy and &#8220;militia snipers&#8221; involved in the April standoff with the Bureau of Land Management.  In recent months, the report suggests that there has been a notable increase in violence from domestic extremists motivated by &#8220;anti-government ideologies.&#8221;  Compared to the previous four years, DHS assesses that the &#8220;perceived victory by militia extremists in a show of force against the Department of Interior&#8217;s Bureau of Land Management (BLM) will likely inspire additional anti-government violence over the next year.&#8221;  The report reflects a current trend in the national law enforcement community that views the rise of domestic extremist groups, variously referred to as militia or anti-government extremists as well as sovereign citizens, as a significant threat to the safety of government officials, law enforcement and first responders.  In fact, a <a href="https://www.start.umd.edu/pubs/START_UnderstandingLawEnforcementIntelligenceProcesses_July2014.pdf">recent survey conducted by the National Consortium for the Study of Terrorism and Responses to Terrorism (START)</a> at the University of Maryland found that law enforcement throughout the country identifies sovereign citizens as the top terrorist threat, greater even than the threat posed by Islamic extremists.</p>
<p><strong>Domestic Violent Extremists and The Victory at Bunkerville</strong></p>
<p>Though law enforcement agencies have been warning for years of the potential for violence perpetrated by members of the so-called sovereign citizen movement, who believe that the U.S. government is &#8220;operating outside of its jurisdiction and generally do not recognize federal, state, or local laws, policies, or governmental regulations,&#8221; the DHS&#8217; recent assessment does not focus on members of this group.  Instead, the assessment focuses on <em>domestic violent extremists</em> motivated by &#8220;anti-government ideologies&#8221; and a common perception of &#8220;government overreach and oppression.&#8221;  Unlike sovereign citizens, these groups and individuals &#8220;recognize government authority,&#8221; however they may engage in acts of violence due to &#8220;their perception that the United States Government is tyrannical and oppressive&#8221; and &#8220;needs to be violently resisted or overthrown.&#8221;  The assessment also refers repeatedly to &#8220;militia extremists&#8221; who are defined as facilitating or engaging in acts of violence &#8220;directed at federal, state, or local government officials or infrastructure in response to their belief that the government deliberately is stripping Americans of their freedoms and is attempting to establish a totalitarian regime.&#8221;  These individuals often &#8220;oppose many federal and state authorities&#8217; laws and regulations (particularly those related to firearms ownership), and often belong to paramilitary groups.&#8221;</p>
<p>The DHS assessment finds that a &#8220;recent spike in anti-government attacks and plots since November 2013&#8221; is a departure from the previously sporadic occurrence of &#8220;domestic extremist violence.&#8221;  The increase is believed to be motivated by &#8220;perception of government actions (or lack of action) addressing political issues such as gun control, land-use, property, and other activities as interfering with their individual rights and as oppressive measures that warrant violent reprisal against US Government entities and law enforcement.&#8221;  Historically, spikes in violence have followed &#8220;high-profile confrontations&#8221; involving the U.S. government including Ruby Ridge and Waco.  DHS identifies the recent standoff with BLM agents in Bunkerville, Nevada as an example of such an event that could &#8220;inspire further violence&#8221;:</p>
<blockquote><p>(U//LES) I&amp;A assesses that the belief among militia extremists that their threats and show of force against the BLM during the April Bunkerville standoff was a defining victory over government oppression is galvanizing some individuals-particularly militia extremists and violent lone offenders-to actively confront law enforcement officials, increasing the likelihood of violence. Additionally, this perceived success likely will embolden other militia extremists and like-minded lone offenders to attempt to replicate these confrontational tactics and force future armed standoffs with law enforcement and government officials during 2014.</p></blockquote>
<p>Several incidents in 2014 are identified as having a &#8220;connection to the events in Bunkerville&#8221; based on news reports and information provided by law enforcement.  The most significant incident discussed in the assessment is the recent murder of two Las Vegas police officers and another civilian committed by Jerad and Amanda Miller.  The pair, who had attended the Bunkerville standoff, &#8220;expressed that violence was necessary to fight a perceived tyrannical US government apparatus intent on stripping Americans of their rights&#8221; according to the Southern Nevada Counterterrorism Center.  The couple also left a note on the murdered police officers that &#8220;exclaimed the attack was the start of a &#8216;revolution,&#8217; and a &#8216;new day,&#8217; suggesting they anticipated further violence, and made statements on their social media profiles indicating their willingness to &#8216;shed blood,&#8217; and &#8216;die fighting,&#8217; to stop government oppression.&#8221;</p>
<div id="attachment_34527" style="width: 2714px" class="wp-caption aligncenter"><a href="https://publicintelligence.net/wp-content/uploads/2014/08/timeline-dve.jpg"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-34527" class="wp-image-34527 size-full" src="https://publicintelligence.net/wp-content/uploads/2014/08/timeline-dve.jpg" alt="timeline-dve" width="2704" height="2176" srcset="https://q.publicintelligence.net/wp-content/uploads/2014/08/timeline-dve.jpg 2704w, https://q.publicintelligence.net/wp-content/uploads/2014/08/timeline-dve-300x241.jpg 300w, https://q.publicintelligence.net/wp-content/uploads/2014/08/timeline-dve-1024x824.jpg 1024w, https://q.publicintelligence.net/wp-content/uploads/2014/08/timeline-dve-150x120.jpg 150w" sizes="auto, (max-width: 2704px) 100vw, 2704px" /></a><p id="caption-attachment-34527" class="wp-caption-text">A timeline included in the DHS intelligence assessment documenting a &#8220;surge&#8221; in violent plotting from domestic extremists.</p></div>
<p>In all, DHS found that there had been eight incidents of &#8220;anti-government&#8221; violence since March 2011, either in the form of an actual attack or an arrest stemming from a plot that was interrupted prior to to an attack taking place, including:</p>
<ul>
<li>March 2011 &#8211; Four members of the militia extremist group The Alaska Peacemakers Militia (APM) &#8211; including its leader &#8211; were arrested in March 2011 for conspiracy to kill judges and law enforcement.  APM&#8217;s leader was sentenced in January 2013 to 26 years in prison.  Three other members received sentences of 26, 12 and 5 years, respectively.</li>
<li>November 2011 &#8211; Four militia extremists were arrested in November 2011 for planning to obtain explosives, guns and a biological toxins for attacks against government personnel, including employees of the Internal Revenue Service, the Bureau of Alcohol Tobacco Firearms and Explosives and local law enforcement.  Two were convicted in 2012 for plotting to obtain explosives and two were convicted in 2014 for plotting to obtain the toxins.</li>
<li>December 2011 &#8211; Georgia-based US Army soldiers &#8211; arrested in December 2011 &#8211; were convicted in 2012, 2013 and 2014 for involvement in a homicide to cover up the plans of their militia extremist group called F.E.A.R. (Forever Enduring Always Ready) that plotted to attack government and critical infrastructure targets including a hydroelectric dam and Ft. Stewart military base.  According to court documents, the individuals allegedly stockpiled over $87,000 in firearms and bomb-making components.</li>
<li>November 2013 &#8211; An armed lone offender extremist with an anti-government ideology entered Terminal 3 of LAX on November 1, 2013 and proceeded to the security screening area where he opened fire with an AR-15 style assault rifle.  The gunman subsequently shot and killed one TSA Transportation Security Officer (TSO) and wounded two other TSOs, plus a civilian.  Another individual was injured fleeing the scene.  The suspected gunmen was wounded and is awaiting trial.</li>
<li>February 2014 &#8211; Three militia extremists in February 2014 were arrested by federal law enforcement attempting to buy explosives in furtherance of a plot to allegedly attack the electrical grid and government targets, including DHS personnel and facilities.  They are awaiting trial.</li>
<li>March 2014 &#8211; A militia extremist in March 2014 was arrested by federal law enforcement for a series of plots culminating in a plan to allegedly acquire weapons and travel to Washington, D.C. to kill law enforcement and government officials.  He is awaiting trial.</li>
<li>April 2014 &#8211; Militia Extremists &#8211; many of whom traveled from around the country &#8211; joined peaceful protesters at a ranch in Bunkerville, NV and additionally surrounded officers with firearms during an armed standoff over grazing rights.</li>
<li>June 2014 &#8211; Two violent lone offender extremists motivated by anti-government ideology ambushed and killed two Las Vegas Metropolitan Police Department officers and a civilian, wounding one more officer before dying in a shootout.</li>
</ul>
<p>According to DHS analysis, the common link between these incidents is the targeting of &#8220;government facilities and personnel, followed by law enforcement personnel and critical infrastructure and key resources (CIKR).&#8221;  Law enforcement is targeted &#8220;because these individuals perceive it as an extension of state control over individuals and CIKR is targeted to undermine the government&#8217;s perceived economic and societal power and control.&#8221;</p>
<p><strong>Government and Law Enforcement are Primary Targets</strong></p>
<p>Over the last few months, fusion centers around the country have issued a number of bulletins on the potential threat to law enforcement by sovereign citizens and other &#8220;domestic extremists.&#8221;  In May, the <a href="https://publicintelligence.net/pacic-targeting-first-responders/">Pennsylvania Criminal Intelligence Center released a bulletin</a> to law enforcement on &#8220;Targeting First Responders&#8221; describing a number of recent incidents where individuals have sought to bring firefighters, paramedics and law enforcement to a location for the purposes of conducting a subsequent attack.  In early June, the <a href="https://publicintelligence.net/nysic-targeting-law-enforcement/">New York State Intelligence Center issued a bulletin</a> stating that suspects &#8220;motivated by elements of a far right anti-government ideology with a particular fixation on law enforcement&#8221; had conducted attacks on government targets, including a recent incident in which Dennis Marx attempted to enter the courthouse in Forsyth County, Georgia with an an assault rifle, an assortment of grenades, body armor, and a gas mask.  Marx wounded a sheriff&#8217;s deputy who returned fire, preventing him from entering the courthouse where he was scheduled to have a hearing on eleven felony drug and weapons charges.  According to the bulletin, Marx had &#8220;long running issues with law enforcement and was a self-identified sovereign citizen.&#8221;</p>
<p>In July, the <a href="https://publicintelligence.net/nj-fire-safety-sovereign-citizens/">New Jersey Office of Homeland Security and Preparedness issued a bulletin</a> to firefighters warning about the threat posed by the &#8220;anti-government sovereign citizen movement&#8221; which has been &#8220;catapulted into the forefront of public attention due to an increase in criminal activity by sovereign citizens nationwide.&#8221;  The bulletin notes that while there &#8220;have been no reported incidents of fire service personnel being targeted or coming in contact with confirmed or suspected sovereign citizens&#8221; it is nonetheless important to know the indicators that one is dealing with a sovereign citizen, such as the use of &#8220;unusual language regarding self-identity, such as &#8216;freemen,&#8217; state citizens, non-resident aliens, sovereign citizens, or common law citizens.&#8221;</p>
<p>Last August, the <a href="https://publicintelligence.net/fbi-sovereign-citizens-identifying-law-enforcement/">FBI&#8217;s San Antonio Division issued a bulletin</a> stating that a Sovereign Citizen group was organizing youth groups to participate in door-to-door fundraising campaign with the actual intent of identifying the homes of law enforcement and first responders.  The youth traveled in &#8220;small teams of at least two, traveled throughout neighborhoods knocking on doors&#8221; telling the homeowners that &#8220;they worked for a fund raising organization designed to help young individuals with public speaking.&#8221;  The groups were &#8220;instructed that the information they collected counted as &#8216;points'&#8221; and that the &#8220;team with the most points would win a college scholarship and a large sum of money.&#8221;   A yellow reference card was provided to each of the groups listing approximately fifteen professions that corresponded to a point value ranging from 500 to 2000 points.  Professions listed on the card included firefighters, nurses, doctors as well as members of the military.  However, the profession with the highest point value of 2000 was &#8220;police officer.&#8221; Following the release of the FBI bulletin, the <a href="https://publicintelligence.net/njroic-potential-threats-government-officials/">New Jersey Regional Operations Intelligence Center later issued a request for information</a> describing incidents where government officials had been threatened and instructing law enforcement to be careful when providing their personal information to unknown parties.</p>
<div id="DV-viewer-1273285-dhs-domestic-violent-extremists-pose-increased" class="DV-container"></div>
<p><script src="//s3.amazonaws.com/s3.documentcloud.org/viewer/loader.js"></script><script>// <![CDATA[
DV.load("//www.documentcloud.org/documents/1273285-dhs-domestic-violent-extremists-pose-increased.js", {   width: 860,     height: 1300,     sidebar: false,     container: "#DV-viewer-1273285-dhs-domestic-violent-extremists-pose-increased"   });
// ]]&gt;</script></p>The post <a href="https://publicintelligence.net/dhs-domestic-violent-extremists-enemy/">DHS Warns of “Domestic Violent Extremists” Targeting Government Officials, Law Enforcement</a> first appeared on <a href="https://publicintelligence.net">Public Intelligence</a>.]]></content:encoded>
					
					<wfw:commentRss>https://publicintelligence.net/dhs-domestic-violent-extremists-enemy/feed/</wfw:commentRss>
			<slash:comments>9</slash:comments>
		
		
			</item>
		<item>
		<title>DHS Tells Firefighters, Paramedics Medical Treatment Provides an Opportunity to Identify Extremists</title>
		<link>https://publicintelligence.net/dhs-medical-treatment-extremists/</link>
					<comments>https://publicintelligence.net/dhs-medical-treatment-extremists/#respond</comments>
		
		<dc:creator><![CDATA[Public Intelligence]]></dc:creator>
		<pubDate>Tue, 22 Jul 2014 02:01:35 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Department of Homeland Security]]></category>
		<category><![CDATA[Federal Bureau of Investigation]]></category>
		<category><![CDATA[National Counterterrorism Center]]></category>
		<category><![CDATA[Suspicious Activity Reporting]]></category>
		<guid isPermaLink="false">http://publicintelligence.net/?p=34318</guid>

					<description><![CDATA[<p>A joint bulletin released in March by the Department of Homeland Security, FBI and National Counterterrorism Center instructs firefighters and paramedics to use emergency medical treatment as an opportunity to identify violent extremists.</p>
<p class="more-link-p">
<a class="btn btn-primary" href="https://publicintelligence.net/dhs-medical-treatment-extremists/">Read more &#8594;</a></p>
The post <a href="https://publicintelligence.net/dhs-medical-treatment-extremists/">DHS Tells Firefighters, Paramedics Medical Treatment Provides an Opportunity to Identify Extremists</a> first appeared on <a href="https://publicintelligence.net">Public Intelligence</a>.]]></description>
										<content:encoded><![CDATA[<div><iframe loading="lazy" src="//www.youtube.com/embed/u2LkTcdM_mE" width="740" height="416" frameborder="0" allowfullscreen="allowfullscreen"></iframe><br />
<em>A report from WJLA on the arrest of Todd Dwight Wheeler in January 2014.</em></div>
<p>A joint bulletin released in March by the Department of Homeland Security, FBI and National Counterterrorism Center instructs firefighters and paramedics to use emergency medical treatment as an opportunity to identify violent extremists.  The March 2014 bulletin <a href="https://publicintelligence.net/dhs-fbi-nctc-medical-treatment-extremists/">obtained by Public Intelligence</a> titled &#8220;Emergency Medical Treatment Presents Opportunity for Discovery of Violent Extremist Activities&#8221; is part of the <em>Fire Line</em> series distributed to firefighters, emergency medical service personnel and other first responders around the country.</p>
<p>The bulletin states that efforts to &#8220;gain expertise with explosive, incendiary, and chemical/biological devices may lead to injuries and emergency treatment, which may provide potential indicators of violent extremist activities to responding emergency medical service (EMS) personnel.&#8221;  An initial &#8220;size-up&#8221; of the scene and &#8220;patient assessment&#8221; provide first responders with the ability to &#8220;evaluate whether an injury is a genuine accident or related to violent extremist activity.&#8221;  For example, &#8220;hastily or expediently treated injuries&#8221; observed by first responders &#8220;may be an indicator of illicit activity as actors injured in nefarious activity are often not inclined to seek legitimate medical attention, or use efforts that are designed to mislead or obscure the genuine nature of the injury.&#8221;  Other indicators include &#8220;shock or infection accompanying healing wounds, or corrective treatment for healed wounds&#8221; often without plausable explanation &#8220;may be signs of suspicious activity.&#8221;</p>
<p>To support its claims, the bulletin cites the January 2014 arrest of a Maryland man named Todd Dwight Wheeler Jr. for making and possessing explosive materials.  According to the <a href="http://articles.baltimoresun.com/2014-01-07/news/bs-md-ar-explosive-update-20140107_1_glen-burnie-bomb-making-baltimore-washington-medical-center">Baltimore Sun</a>, Wheeler was arrested after one of his relatives called 911 and reported that he may be suicidal.  Paramedics reportedly found Wheeler &#8220;suffering from injuries caused by &#8216;chemical or mechanical reactions'&#8221; including &#8220;burns to one of his limbs that paramedics determined could have come from a blast.&#8221;  After speaking with Wheeler, first responders &#8220;became suspicious of his story, suspicious of his injuries and suspicious of his distinct chemical odor.&#8221;  Police <a href="http://usnews.nbcnews.com/_news/2014/01/07/22221146-massive-cache-of-explosives-bomb-manuals-found-in-maryland-home">later searched the home</a> with help from Bureau of Alcohol, Tobacco, Firearms and Explosives agents finding several &#8220;completed bombs&#8221;, &#8220;more than 100 pounds of chemicals, including acids, fuels, oxidizers and explosives precursors&#8221;, &#8220;components of destructive devices, including igniters and detonators&#8221;, &#8220;an automatic Ruger Mini-14 rifle, other guns and knives&#8221; as well as &#8220;manuals and books detailing explosive manufacturing and booby traps, with titles like The Poor Man&#8217;s James Bond, Booby Traps, Deadly Brew and Highly Explosive Pyrotechnic Compositions.&#8221;  Under a plea agreement entered in May, Wheeler pled guilty to one count of &#8220;being a prohibited person in possession of firearms.&#8221;  He faces up to ten years in prison.</p>
<div id="DV-viewer-1223983-dhs-fbi-nctc-bulletin-emergency-medical" class="DV-container"></div>
<p><script src="//s3.amazonaws.com/s3.documentcloud.org/viewer/loader.js"></script><script>// <![CDATA[
DV.load("//www.documentcloud.org/documents/1223983-dhs-fbi-nctc-bulletin-emergency-medical.js", {   width: 740,     height: 1000,     sidebar: false,     container: "#DV-viewer-1223983-dhs-fbi-nctc-bulletin-emergency-medical"   });
// ]]&gt;</script></p>The post <a href="https://publicintelligence.net/dhs-medical-treatment-extremists/">DHS Tells Firefighters, Paramedics Medical Treatment Provides an Opportunity to Identify Extremists</a> first appeared on <a href="https://publicintelligence.net">Public Intelligence</a>.]]></content:encoded>
					
					<wfw:commentRss>https://publicintelligence.net/dhs-medical-treatment-extremists/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>The Vocabulary of Cyber War</title>
		<link>https://publicintelligence.net/the-vocabulary-of-cyber-war/</link>
					<comments>https://publicintelligence.net/the-vocabulary-of-cyber-war/#comments</comments>
		
		<dc:creator><![CDATA[Public Intelligence]]></dc:creator>
		<pubDate>Thu, 10 Jul 2014 16:17:41 +0000</pubDate>
				<category><![CDATA[Featured]]></category>
		<category><![CDATA[Cyber Warfare]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[U.S. Strategic Command]]></category>
		<guid isPermaLink="false">http://publicintelligence.net/?p=33337</guid>

					<description><![CDATA[<p>A restricted document from U.S. Strategic Command provides insight into the underlying philosophy of military efforts to wage cyber warfare.</p>
<p class="more-link-p">
<a class="btn btn-primary" href="https://publicintelligence.net/the-vocabulary-of-cyber-war/">Read more &#8594;</a></p>
The post <a href="https://publicintelligence.net/the-vocabulary-of-cyber-war/">The Vocabulary of Cyber War</a> first appeared on <a href="https://publicintelligence.net">Public Intelligence</a>.]]></description>
										<content:encoded><![CDATA[<div class="hero-unit"><em>A restricted document from U.S. Strategic Command provides insight into the underlying philosophy of military efforts to wage cyber warfare.</em></div>
<p>At the 39th Joint Doctrine Planning Conference, a semiannual meeting on topics related to military doctrine and planning held in May 2007, a contractor for Booz Allan Hamilton named Paul Schuh gave a short presentation discussing doctrinal issues related to &#8220;cyberspace&#8221; and the military&#8217;s increasing effort to define its operations involving computer networks.  Schuh, who would later become <a href="http://www.linkedin.com/pub/paul-schuh/10/a9a/377">chief of the Doctrine Branch at U.S. Cyber Command</a>, argued that military terminology related to <em>cyberspace operations</em> was inadequate and failed to address the expansive nature of <em>cyberspace</em>.  According to Schuh, the existing definition of cyberspace as &#8220;the notional environment in which digitized information is communicated over computer networks&#8221; was imprecise.  Instead, he proposed that cyberspace be defined as &#8220;a domain characterized by the use of electronics and the electromagnetic spectrum to store, modify, and exchange data via networked systems and associated physical infrastructures.&#8221;</p>
<p>Amid the disagreements about &#8220;notional environments&#8221; and &#8220;operational domains,&#8221; Schuh informed the conference that &#8220;experience gleaned from recent cyberspace operations&#8221; had revealed &#8220;the necessity for development of a lexicon to accommodate cyberspace operations, cyber warfare and various related terms&#8221; such as &#8220;weapons consequence&#8221; or &#8220;target vulnerability.&#8221;  The lexicon needed to explain how the &#8220;&#8216;four D&#8217;s (deny, degrade, disrupt, destroy)&#8221; and other core terms in military terminology could be applied to cyber weapons.  The document that would later be produced to fill this void is <a href="https://publicintelligence.net/cyber-warfare-lexicon/">The Cyber Warfare Lexicon</a>, a relatively short compendium designed to &#8220;consolidate the core terminology of cyberspace operations.&#8221;  Produced by the U.S. Strategic Command&#8217;s Joint Functional Command Component – Network Warfare, a predecessor to the current U.S. Cyber Command, the lexicon documents early attempts by the U.S. military to define its own cyber operations and place them within the larger context of traditional warfighting.  A version of the lexicon from January 2009 obtained by Public Intelligence includes a complete listing of terms related to the process of creating, classifying and analyzing the effects of cyber weapons.  An attachment to the lexicon includes a series of discussions on the evolution of military commanders&#8217; conceptual understanding of cyber warfare and its accompanying terminology, attempting to align the actions of software with the outcomes of traditional weaponry.</p>
<p><strong>Defining Cyber Warfare</strong></p>
<p>One of the primary reasons for creating a lexicon devoted to cyber warfare is that there are &#8220;significant underlying differences&#8221; between traditional military operations and so-called &#8220;non-traditional weapons&#8221; such as those employed in cyber warfare.  The lexicon was intended to reduce these differences by integrating and standardizing the &#8220;use of these non-traditional weapons&#8221; while providing &#8220;developers, testers, planners, targeteers, decision-makers, and battlefield operators . . . a comprehensive but flexible cyber lexicon that accounts for the unique aspects of cyber warfare while minimizing the requirement to learn new terms for each new technology of the future.&#8221;  Described as a <em>Language to Support the Development, Testing, Planning, and Employment of Cyber Weapons and Other Modern Warfare Capabilities</em>, the lexicon is designed to facilitate the construction and employment of cyber weapons:</p>
<blockquote><p>The cyber warfare community needs a precise language that both meets their unique requirements and allows them to interoperate in a world historically dominated by kinetic warfare. Mission planners must be able to discuss cyber weapons with their commanders, the intelligence analysts, the targeteers, and the operators, using terms that will be understood not just because they have been defined somewhere in doctrine, but also because they make sense. Giving the weapons planners a well-founded lexicon enables them to have far-reaching discussions about all manner of weapons and make important decisions with a significantly reduced likelihood of misunderstanding and operational error.</p></blockquote>
<p>To understand what exactly constitutes a <em>cyber weapon</em> and what makes it so different from the kind of weapons employed in traditional warfare, it is important to understand the objectives of <em>cyber warfare</em>.  Cyber warfare is defined in the lexicon as the creation of &#8220;effects in and through cyberspace in support of a combatant commander&#8217;s military objectives, to ensure friendly forces freedom of action in cyberspace while denying adversaries these same freedoms.&#8221;  This can be accomplished through <em>cyber attacks</em>, <em>cyber defense</em> as well as <em>cyber exploitation</em>, with each option providing its own unique set of associated capabilities and potential outcomes.  Cyber attacks bare the greatest resemblance to popular notions of cyber war, incorporating actions to &#8220;deny or manipulate information and/or infrastructure in cyberspace&#8221; through methods like a computer network attack (CNA) that are intended to &#8220;disrupt, deny, degrade, or destroy the information within computers and computer networks and/or the computers/networks themselves.&#8221;  Cyber defense is primarily focused on defending U.S. military networks from similar attacks conducted by other nations or non-state actors and protecting the integrity of the Department of Defense&#8217;s Global Information Grid (GIG) which carries military communications worldwide.  Cyber exploitation is focused primarily on the collection of intelligence and other useful data from targeted computer systems to enable improved &#8220;threat recognition&#8221; that can contribute to future operations in cyberspace.</p>
<p>These components of cyber warfare rely on <em>capabilities</em> that are used to construct <em>cyber weapon systems</em>.  A <em>cyber warfare capability</em> is a &#8220;device, computer program or technique&#8221; that includes any combination of &#8220;software, firmware, and hardware&#8221; that is &#8220;designed to create an effect in cyberspace, but has not been weaponized.&#8221;  Weaponization is a process that takes these capabilities and implements &#8220;control methods, test and evaluation, safeguards, security classification guidance, interface/delivery method&#8221; and other tactical considerations to ensure that the capability can be properly employed to produce the intended effect.  A completed <em>cyber weapon system</em> is a combination of one or more of these capabilities that have been weaponized and are ready for deployment.  These weapons can then be categorized based upon specific uses and issues related to their employment, such as who is authorized to use them.  One suggested schema in the lexicon provides three categories: the first for weapons that require approval from the combatant commander, a second for weapons that are pre-approved for specific uses and a third that requires the approval of the President or Secretary of Defense before the weapon can be utilized.</p>
<div id="attachment_34350" style="width: 1360px" class="wp-caption aligncenter"><a href="https://publicintelligence.net/wp-content/uploads/2014/07/CyberShield.jpg"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-34350" class="size-full wp-image-34350" src="https://publicintelligence.net/wp-content/uploads/2014/07/CyberShield.jpg" alt="Brig. Gen. Robert Brooks, director of the Massachusetts Air National Guard gets a eyes-on 3D tutorial of how to analyze data in the Virtual Reality Center at the University of Arkansas at Little Rock, May 2, 2014.  Senior leaders from the National Guard toured the University's Emerging Analytics Center and learned about the partnership to allow students at the National Guard Professional Education Center an opportunity to earn their bachelor's, master's or post-doctoral degrees in information technology." width="1350" height="900" srcset="https://q.publicintelligence.net/wp-content/uploads/2014/07/CyberShield.jpg 1350w, https://q.publicintelligence.net/wp-content/uploads/2014/07/CyberShield-300x200.jpg 300w, https://q.publicintelligence.net/wp-content/uploads/2014/07/CyberShield-1024x682.jpg 1024w, https://q.publicintelligence.net/wp-content/uploads/2014/07/CyberShield-150x100.jpg 150w" sizes="auto, (max-width: 1350px) 100vw, 1350px" /></a><p id="caption-attachment-34350" class="wp-caption-text">Brig. Gen. Robert Brooks, director of the Massachusetts Air National Guard gets a eyes-on 3D tutorial of how to analyze data in the Virtual Reality Center at the University of Arkansas at Little Rock, during the 2014 Cyber Shield Exercise held in May.</p></div>
<p>One of the &#8220;Discussions on Cyberspace Operations&#8221; contained in the lexicon follows the military&#8217;s historical apprehension toward describing software programs and other cyber capabilities as weapons.  Throughout the early 1990s, the term &#8220;tool&#8221; was widely favored in the initial phases of the military&#8217;s cyber warfare mission.  One reason for this reluctance was military commanders&#8217; concerns about the lack of authority under Title 10 for conducting cyber operations.  However, given that there are six &#8220;Joint functions&#8221; recognized in military doctrine &#8220;C2 [command and control], Intel, Fires, Maneuver, Protection and Sustainment,&#8221; the use of any offensive cyber capabilities &#8220;unquestionably&#8221; is a form of fires, making the cyber capability itself a kind of weapon.  The idea that software and computer hardware could be considered a weapon is further complicated by the fact that many offensive cyber capabilities consist of nothing more than &#8220;cyber techniques&#8221; that involve &#8220;keystrokes, but where no hardware or software is introduced into the target system.&#8221;  When &#8220;last minute changes in the target render the approved weapon inert, an operator might need to use cyber techniques to complete an assigned mission, particularly one that has been approved for effect or objective,&#8221; making the certification process and training of the &#8220;operator&#8221; critical to considering cyber capabilities as a &#8220;weapon system.&#8221;  There must be control methods, testing and evaluation, safeguards, certified personnel, mission logs, a concept of operations as well as tactics, techniques and procedures on how to employ the weapon system.  This is similar to the situation with conventional weapons as &#8220;the very first M-16 rifle ever made, while a &#8216;weapon&#8217; in the dictionary sense of the word, was not deployed until it was operationally tested, had a training program, spare parts inventory, etc.&#8221;  It was only after this process that &#8220;each new M-16 was part of a &#8216;weapon system&#8217; and could be crated and shipped to the front lines directly from the assembly line.&#8221;</p>
<p><strong>Cyber Weapons and Their Effects</strong></p>
<p>A fundamental distinction discussed in the lexicon, one which separates cyber weapons from those used in conventional warfare, is the distinction between kinetic and non-kinetic weaponry.  Kinetic weapons are those that &#8220;use forces of dynamic motion and/or energy upon material bodies&#8221; whereas non-kinetic weapons are those that &#8220;create their effects based upon the laws of logic or principles other than the laws of physics.&#8221;  Within each of these broad categories, there are further distinctions based upon the lethality of the weapon being described.  For example, a Mark-84 bomb is an example of a lethal kinetic weapon capable of inflicting physical damage to material entities based upon the use of motion and force.  The Active Denial System, a directed-energy weapon which uses millimeter waves to create a sensation of heat on the skin of human targets, is an example of a non-lethal kinetic weapon.  As a non-kinetic weapon creates its effect through the use of logic or other principles, the category necessarily encompasses a much wider array of weapon systems from diverse fields like information warfare and psychological operations.  Biological and chemical weapons are examples of lethal non-kinetic weapons that rely upon biological factors rather than physical force to create their effect.  Computer network attack (CNA) software, on the other hand, is an example of a non-lethal non-kinetic weapon, creating an effect based solely on the logical operations it performs on a targeted computer system.</p>
<p>While cyber weapons are considered to be non-lethal in their effects, this doesn&#8217;t mean that non-lethal weapons are &#8220;required to have zero probability of causing fatalities, permanent injuries, or destruction.&#8221;  To better understand the effects that non-lethal non-kinetic weapons can have, the lexicon attempts to align cyber weapons with the traditional terminology of the &#8220;Four D&#8217;s&#8221; used throughout the information operations community: deny, destroy, degrade and disrupt.  One discussion in the lexicon introduces a construct to understand these effects in terms of a scope, level and time of &#8220;denial&#8221; in a targeted system, causing &#8220;reduction, restriction, or refusal of target operations.&#8221;  Using this framework, &#8220;degrade, disrupt, and destroy&#8221; would all be considered different forms of denial that have varying scopes.  Disrupt introduces a &#8220;time aspect of denial&#8221; and degrade adds an &#8220;amount or level of denial.&#8221;  The final term &#8220;destroy&#8221; is saved for the &#8220;special case that includes the maximum time and maximum amount of denial.&#8221;  The lexicon even proposes a function for calculating denial:</p>
<blockquote><p>Quantitatively, denial (D) can be expressed as a function of scope (s), level (l), and time (t), i.e. D<span style="font-size: 70%; vertical-align: sub;">(s,l,t)</span>. Defining effects in this manner makes it clear to the planning staff that each of the parameters of the function must be considered and specified as necessary as indicated by, or derived from, commander&#8217;s objective. As the level (l) or amount approaches 100% and time (t) approaches infinity, destruction is achieved.</p></blockquote>
<p>The true effects of a cyber weapon often differ significantly from simply denying or even destroying an enemy system.  Every weapon &#8220;takes an action&#8221; when it is triggered and this action is &#8220;intended to have an effect.&#8221;  For a traditional bomb, that action is a &#8220;kinetic explosion and the effect is normally target damage,&#8221; whereas a cyber weapon may result in &#8220;the execution of some software and the effects, some form of denial or manipulation.&#8221;  However, weapons also have &#8220;outcomes that are not expected and are not required to achieve the objective.&#8221;  The lexicon describes these as indirect effects that can result in consequences for unintended targets.  When these consequences affect unlawful targets or cause &#8220;damage to persons or objects that would not be lawful military targets,&#8221; they are considered &#8220;collateral effects&#8221; that are similar to the traditional notion of collateral damage.</p>
<p><a href="https://publicintelligence.net/wp-content/uploads/2014/05/unintended-consequences.png"><img loading="lazy" decoding="async" class="aligncenter wp-image-34133" src="https://publicintelligence.net/wp-content/uploads/2014/05/unintended-consequences.png" alt="unintended-consequences" width="928" height="314" /></a><strong>Vulnerabilities and Target States</strong></p>
<p>Past worries about collateral damage from cyber weapons have proven to be well founded.  In the summer of 2010, copies of an unknown computer worm <a href="http://www.nytimes.com/interactive/2012/06/01/world/middleeast/how-a-secret-cyberwar-program-worked.html?pagewanted=all">began replicating throughout the internet</a> using a vulnerability in Microsoft Windows to <a href="http://blogs.wsj.com/cio/2012/11/08/stuxnet-infected-chevrons-it-network/">find its way into the control systems of major corporations like Chevron</a>.  However, the malicious program was not the work of Chinese hackers or sophisticated cyber criminals, it was a cyber weapon called Stuxnet created as part of a joint U.S. and Israeli intelligence operation targeting Iran&#8217;s nuclear program that was <a href="http://www.nytimes.com/2012/06/01/world/middleeast/obama-ordered-wave-of-cyberattacks-against-iran.html?pagewanted=all&amp;_r=0">codenamed &#8220;Olympic Games.&#8221;</a>  Stuxnet would later claim other unintended targets, including a <a href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/russian-nuclear-power-plant-infected-by-stuxnet-malware-says-cybersecurity-expert-8935529.html">Russian nuclear power plant</a>.  Unintended effects associated with cyber weapons are dangerous for a number of reasons, including the risk that an adversary might be able to use the weapon, once discovered, against the originator of the attack.  According to the lexicon, these <em>vulnerabilities</em> of cyber weapons can be separated into six distinct categories:</p>
<blockquote>
<ul>
<li>(U//FOUO) Detectability risk &#8211; The risk that a weapon will be unable to elude discovery or suspicion of its existence. This includes the adverse illumination risk of hardware weapons.</li>
<li>(U//FOUO) Attribution risk &#8211; The risk that the discoverer of a weapon or weapon data will be able to identify the source and/or originator of the attack or the source of the weapon used in the attack.</li>
<li>(U//FOUO) Co-optability risk &#8211; The risk that, once discovered, the weapon or its fires will be able to be recruited, used, or reused without authorization.</li>
<li>(U//FOUO) Security Vulnerability risk &#8211; The risk that, once discovered, an unauthorized user could uncover a security vulnerability in the weapon that allows access to resources of the weapon or its launch platform. This includes the risk of an adversary establishing covert channels over a weapon&#8217;s C2 link.</li>
<li>(U//FOUO) Misuse risk &#8211; The risk that the weapon can be configured such that an authorized user could unintentionally use it improperly, insecurely, unsafely, etc.</li>
<li>(U//FOUO) Policy, Law, &amp; Regulation (PLR) risk &#8211; The risk that the weapon can be configured such that an authorized user could intentionally use it in violation of existing policy, laws, and regulations.</li>
</ul>
</blockquote>
<p>These vulnerabilities are &#8220;mostly unfamiliar to the kinetic weapons community, and are due to the complexity of the weapons, the dynamic nature of the &#8216;atmosphere&#8217; of cyberspace, and the difficulty of gathering detailed intelligence about cyber targets.&#8221;  A discussion on cyber weapon vulnerabilities in the lexicon argues that &#8220;the crowded nature of cyberspace and the proliferation of anonymizing technologies can work to both our advantage and disadvantage, in that attribution can be very difficult for both our adversaries and ourselves.&#8221;  Once a network target has been &#8220;accessed and subverted,&#8221; the implanted cyber weapon should be &#8220;considered like a mine or an improvised explosive device (lED) where there are no longer any delivery considerations for the weapon, but only survivability and transferring of commands and updates.&#8221;</p>
<p>In several portions of the lexicon, attacking unaffiliated infrastructure that happens to be used by an adversary is discussed as a viable means of creating a &#8220;second order&#8221; effect on the target.  For example, if &#8220;privileged access in not possible, we may still be able to create our desired effect in the first order by using public access to the target&#8221; such as &#8220;a distributed denial of service (DDOS) that floods a port on the target.&#8221;  When the intended target &#8220;cannot be directly accessed via either public or privileged means, the desired effect can still be achieved by targeting an intermediating link or node so that the desired effect cascades from the first order effect.&#8221;  An example of this is &#8220;conducting a DDOS attack on a critical link&#8221; leading to the target or &#8220;degradation through packet flooding&#8221; by assuming the &#8220;maximum data bus speed and a maximum input/output processor throughput on the target.&#8221;  A ping flood attack can be &#8220;directed at a single IP address or broadcast to a whole Class B IP domain with thousands of recipients.&#8221;</p>
<p>The effectiveness of a cyber weapon corresponds to its ability to place a target into a particular state of operation.  The <em>target state </em>&#8220;corresponds to the condition of the target with respect to a military objective&#8221; such as creating a root shell for privileged access.  A typical cyberspace target state can typically be considered to operate in one of the following &#8220;five states relative to achieving a commander&#8217;s primary objective&#8221;:</p>
<blockquote>
<ul>
<li>Unconfirmed: Unknown if there is an access path to target.</li>
<li>Confirmed/Nominal: Access path to target established.</li>
<li>Unprivileged access: Unprivileged access to target established.</li>
<li>Privileged access/At risk: Privileged access to target established.</li>
<li>Goal/Other condition: Target has been placed in the desired or other intermediate condition.</li>
</ul>
</blockquote>
<p>Using a real world example, the lexicon asks us to &#8220;consider the use of a &#8216;buffer overflow&#8217; capability to achieve &#8216;root&#8217; level (privileged) access on a computer operating system in order to disable an adversary&#8217;s computer program.&#8221;  The use of a &#8220;buffer overflow creates an initial effect (access to unauthorized portion of memory) and, by including in the buffer overflow capability other carefully crafted code, it can also enable another effect (e.g. gaining root access) and place the target in a different state.&#8221;  Whereas the previous state of the target was &#8220;nominal,&#8221; the new state of the target is &#8220;compromised.&#8221;  If the system administrator has implemented &#8220;a mechanism to log and report all creations of a root shell,&#8221; the outcome can still create unintended consequences because the cyber weapon could be detected and then be susceptible to attribution or manipulation.  With certain types of cyber weapons this sort of discovery or attribution could present serious problems, though with others it may prove to be of little use to the weapon&#8217;s discoverer.  As cyber weapons only &#8220;deliver information or some other information-related effect to the target and not high explosive or high energy,&#8221; they can be used &#8220;as long as we have electrical power.&#8221;</p>
<div id="DV-viewer-1213643-u-s-strategic-command-cyber-warfare-lexicon" class="DV-container"></div>
<p><script src="//s3.amazonaws.com/s3.documentcloud.org/viewer/loader.js"></script><script>// <![CDATA[
DV.load("//www.documentcloud.org/documents/1213643-u-s-strategic-command-cyber-warfare-lexicon.js", {
  width: 860,
    height: 1300,
    sidebar: false,
    container: "#DV-viewer-1213643-u-s-strategic-command-cyber-warfare-lexicon"
  });
// ]]&gt;</script></p>
<p>&nbsp;</p>
<h1 class="entry-title">U.S. Strategic Command Cyber Warfare Lexicon</h1>
<p><a name="top"></a></p>
<blockquote><p>Select a term from the following list to read the full definition. All definitions are taken from U.S. Strategic Command (USSTRATCOM) Cyber Warfare Lexicon Version 1.7.6.</p></blockquote>
<table width="900">
<tbody>
<tr>
<td style="vertical-align: top;"><em><a style="text-decoration: none;" href="#cyberspace">cyberspace</a></em></p>
<p><em><a style="text-decoration: none;" href="#co">cyberspace operations (CO)</a></em></p>
<p><em><a style="text-decoration: none;" href="#cw">cyber warfare (CW)</a></em></p>
<ul>
<li><em><a style="text-decoration: none;" href="#ca">cyber attack (CA)</a></em></li>
<li><em><a style="text-decoration: none;" href="#cd">cyber defense (CD)</a></em></li>
<li><em><a style="text-decoration: none;" href="#ce">cyber exploitation (CE)</a></em></li>
</ul>
<p><em><a style="text-decoration: none;" href="#capability">cyber warfare capability</a></em></p>
<p><em><a style="text-decoration: none;" href="#weapon">cyber weapon system</a></em></p>
<p><em><a style="text-decoration: none;" href="#weaponization">cyber weaponization</a></em></p>
<p><em><a style="text-decoration: none;" href="#characterization">cyber weapon characterization</a></em></p>
<p><em><a style="text-decoration: none;" href="#categorization">cyber weapon categorization</a></em></p>
<p><em><a style="text-decoration: none;" href="#delivery">cyber weapon delivery mode</a></em></p>
<p><em><a style="text-decoration: none;" href="#flexibility">cyber weapon flexibility</a></em></p>
<p><em><a style="text-decoration: none;" href="#identification">cyber weapon identification</a></em></td>
<td style="vertical-align: top;"><a href="#vulnerability"><em>cyber weapon vulnerability</em></a></p>
<ul>
<li><a href="#detectability"><em>detectability risk</em></a></li>
<li><a href="#attribution"><em>attribution risk</em></a></li>
<li><a href="#cooptability"><em>co-optability risk</em></a></li>
<li><a href="#security"><em>security vulnerability risk</em></a></li>
<li><a href="#misuse"><em>misuse risk</em></a></li>
<li><a href="#plr"><em>policy, law, &amp; regulation (PLR) risk</em></a></li>
</ul>
<p><a href="#access"><em>access</em></a></p>
<p><a href="#collateral"><em>collateral effect</em></a></p>
<p><a href="#deny"><em>deny</em></a></p>
<ul>
<li><a href="#degrade"><em>degrade</em></a></li>
<li><a href="#disrupt"><em>disrupt</em></a></li>
<li><a href="#destroy"><em>destroy</em></a></li>
</ul>
<p><a href="#dud"><em>dud</em></a></p>
<p><a href="#ea"><em>effects assessment (EA)</em></a></p>
<p><a href="#cybereffect"><em>intended cyber effect</em></a></td>
<td style="vertical-align: top;"><a href="#kinetic"><em>kinetic</em></a></p>
<p><a href="#nonkinetic"><em>non-kinetic</em></a></p>
<p><a href="#lethal"><em>lethal</em></a></p>
<p><a href="#nonlethal"><em>non-lethal</em></a></p>
<p><a href="#manipulate"><em>manipulate</em></a></p>
<p><a href="#misfire"><em>misfire</em></a></p>
<p><a href="#pe"><em>probability of effect (PE)</em></a></p>
<p><a href="#target"><em>target state</em></a></p>
<p><a href="#targetvulnerability"><em>targeted vulnerability</em></a></p>
<ul>
<li><a href="#objectivevulnerability"><em>objective vulnerability</em></a></li>
<li><a href="#accessvulnerability"><em>access vulnerability</em></a></li>
</ul>
<p><a href="#weaponaction"><em>weapon action</em></a></p>
<p><a href="#weaponeffect"><em>weapon effect</em></a></p>
<ul>
<li><a href="#directeffect"><em>direct effect</em></a></li>
<li><a href="#indirecteffect"><em>indirect effect</em></a></li>
</ul>
</td>
</tr>
</tbody>
</table>
<p>&nbsp;</p>
<p><a name="cyberspace"></a></p>
<p><strong>cyberspace</strong></p>
<p>(U//FOUO) cyberspace: a global domain within the information environment consisting of the interdependent network of information technology infrastructures, including the Internet, telecommunications networks, computer systems, and embedded processors and controllers. (from 12 May 2008 SECDEF memo)</p>
<p>[(U//FOUO) Previous version &#8211; cyberspace: A domain characterized by the use of electronics and the electromagnetic spectrum to store, modify, and exchange data via networked systems and associated physical infrastructures. (from NMS-CO)]</p>
<p><a href="#top">↑ Return to the top</a></p>
<p>&nbsp;</p>
<p><a name="co"></a></p>
<p><strong>cyberspace operations (CO)</strong></p>
<p>(U//FOUO) cyberspace operations (CO): All activities conducted in and through cyberspace in support of the military, intelligence, and business operations of the Department. (based on NMS-CO description)</p>
<p>(U//FOUO) cyberspace operations (CO): The employment of cyber capabilities where the primary purpose is to achieve military objectives or effects in or through cyberspace. Such operations include computer network operations and activities to operate and defend the global information grid. (from 29 Sep 2008 VJCS Memo, however it is inconsistent with NMS-CO and improperly limited)</p>
<p><a href="#top">↑ Return to the top</a></p>
<p>&nbsp;</p>
<p><a name="cw"></a></p>
<p><strong>cyber warfare (CW)</strong></p>
<p>(U//FOUO) cyber warfare (CW): Creation of effects in and through cyberspace in support of a combatant commander&#8217;s military objectives, to ensure friendly forces freedom of action in cyberspace while denying adversaries these same freedoms. Composed of cyber attack (CA), cyber defense (CD), and cyber exploitation (CE).</p>
<p><a href="#top">↑ Return to the top</a></p>
<p>&nbsp;</p>
<p><a name="ca"></a></p>
<p><strong>cyber attack (CA)</strong></p>
<p>(U//FOUO) cyber attack (CA): Cyber warfare actions intended to deny or manipulate information and/ or infrastructure in cyberspace. Cyber attack is considered a form of fires.</p>
<p><a href="#top">↑ Return to the top</a></p>
<p>&nbsp;</p>
<p><a name="cd"></a></p>
<p><strong>cyber defense (CD)</strong></p>
<p>(U//FOUO) cyber defense (CD): Cyber warfare actions to protect, monitor, detect, analyze, and respond to any uses of cyberspace that deny friendly combat capability and unauthorized activity within the DOD global information grid (GIG).</p>
<p><a href="#top">↑ Return to the top</a></p>
<p>&nbsp;</p>
<p><a name="ce"></a></p>
<p><strong>cyber exploitation (CE)</strong></p>
<p>(U//FOUO) cyber exploitation (CE): Cyber warfare enabling operations and intelligence collection activities to search for, collect data from, identify, and locate targets in cyberspace for threat recognition, targeting, planning, and conduct of future operations.</p>
<p><a href="#top">↑ Return to the top</a></p>
<p>&nbsp;</p>
<p><a name="capability"></a></p>
<p><strong>cyber warfare capability</strong></p>
<p>(U//FOUO) cyber warfare capability: A capability (e.g. device, computer program, or technique), including any combination of software, firmware, and hardware, designed to create an effect in cyberspace, but that has not been weaponized. Not all cyber capabilities are weapons or potential weapons.</p>
<p><a href="#top">↑ Return to the top</a></p>
<p>&nbsp;</p>
<p><a name="weapon"></a></p>
<p><strong>cyber weapon system</strong></p>
<p>(U//FOUO) cyber weapon system: A combination of one or more weaponized offensive cyber capabilities with all related equipment, materials, services, personnel, and means of delivery and deployment (if applicable) required for self-sufficiency. (Note: adapted directly from JP 1-02 of weapon system.)</p>
<p><a href="#top">↑ Return to the top</a></p>
<p>&nbsp;</p>
<p><a name="weaponization"></a></p>
<p><strong>cyber weaponization</strong></p>
<p>(U//FOUO) cyber weaponization: The process of taking an offensive cyber capability from development to operationally ready by incorporating control methods, test and evaluation, safeguards, security classification guidance, interface/ delivery method, certified and trained personnel, employment recorder, CONOP, TIP, life-cycle support, and launch platform.</p>
<p><a href="#top">↑ Return to the top</a></p>
<p>&nbsp;</p>
<p><a name="characterization"></a></p>
<p><strong>cyber weapon characterization</strong></p>
<p>(U//FOUO) cyber weapon characterization: The process of determining and documenting the effect producing mechanisms and assurance factors of cyber weapons. Characterization includes aspects of technical assurance evaluation, OT&amp;E, risk/protection assessments, and other screening processes. Answers the question: &#8220;What do I need to know about this weapon before I can use it?&#8221; [Note: Cyber Weapon Characterization is one step in the Cyber Weaponization process.]</p>
<p><a href="#top">↑ Return to the top</a></p>
<p>&nbsp;</p>
<p><a name="categorization"></a></p>
<p><strong>cyber weapon categorization</strong></p>
<p>(U//FOUO) cyber weapon categorization: A binning of cyber weapon capabilities into categories, based on risk assessment and the release authority required for their use. Useful for answering the question: &#8220;Who can authorize use of this weapon?&#8221; Example categories might be:</p>
<p>• Category I- Combatant commander release</p>
<p>• Category II &#8211; Pre-approved for combatant commander use in specific OPLANs</p>
<p>• Category III- President/SECDEF release only</p>
<p><a href="#top">↑ Return to the top</a></p>
<p>&nbsp;</p>
<p><a name="delivery"></a></p>
<p><strong>cyber weapon delivery mode</strong></p>
<p>(U//FOUO) cyber weapon delivery mode: The method via which a cyber weapon (or a command to such a weapon) is delivered to the target. Delivery may be via direct implant or remote launch. Hardware cyber weapons often require direct implant. Remote launched cyber weapons and/or commands may be placed via wired and/or wireless paths.</p>
<p><a href="#top">↑ Return to the top</a></p>
<p>&nbsp;</p>
<p><a name="flexibility"></a></p>
<p><strong>cyber weapon flexibility</strong></p>
<p>(U//FOUO) cyber weapon flexibility: The extent to which the cyber weapon&#8217;s design enables operator reconfiguration to account for changes in the target environment.</p>
<p><a href="#top">↑ Return to the top</a></p>
<p>&nbsp;</p>
<p><a name="identification"></a></p>
<p><strong>cyber weapon identification</strong></p>
<p>(U//FOUO) cyber weapon identification: The manner in which a cyber weapon is represented for inventory control purposes, based on the weapon&#8217;s forensic attributes (e.g. for software: file name, file size, creation date, hash value, etc., for hardware: serial number, gram weight, stimulus response, x-ray image, unique markings, etc.).</p>
<p><a href="#top">↑ Return to the top</a></p>
<p>&nbsp;</p>
<p><a name="vulnerability"></a></p>
<p><strong>cyber weapon vulnerability</strong></p>
<p>(U//FOUO) cyber weapon vulnerability: An exploitable weakness inherent in the design of a cyber weapon. Weaknesses are often in one of the following risk areas:</p>
<ul>
<li><a name="detectability"></a><strong>detectability risk </strong>&#8211; The risk that a weapon will be unable to elude discovery or suspicion of its existence. This includes the adverse illumination risk of hardware weapons.</li>
<li><a name="attribution"></a><strong>attribution risk</strong> &#8211; The risk that the discoverer of a weapon or its effect will be able to identify the source and/or originator of the attack or the source of the weapon used in the attack.</li>
<li><a name="cooptability"></a><strong>co-optability risk </strong>&#8211; The risk that, once discovered, the weapon or its fires will be able to be recruited, used, or reused without authorization.</li>
<li><a name="security"></a><strong>security vulnerability risk</strong> &#8211; The risk that, once discovered, an unauthorized user could uncover a security vulnerability in the weapon that allows access to resources of the weapon or its launch platform. This includes the risk of an adversary establishing covert channels over a weapon&#8217;s C2 link.</li>
<li><a name="misuse"></a><strong>misuse risk</strong> &#8211; The risk that the weapon can be configured such that an authorized user could unintentionally use it improperly, insecurely, unsafely, etc.</li>
<li><a name="plr"></a><strong>policy, law, &amp; regulation (PLR) risk</strong> &#8211; The risk that the weapon could be configured such that an authorized user could intentionally use it in violation of existing policy, laws, and regulations.</li>
</ul>
<p><a href="#top">↑ Return to the top</a></p>
<p><a name="access"></a></p>
<p><strong>access</strong></p>
<p>(U) access: Sufficient level of exposure to or entry into a target to enable the intended effect.</p>
<p><a href="#top">↑ Return to the top</a></p>
<p><a name="collateral"></a></p>
<p><strong>collateral effect</strong></p>
<p>(U) collateral effect: Unintentional or incidental effects, including injury or damage, to persons or objects that would not be lawful military targets in the circumstances ruling at the time.</p>
<p><a href="#top">↑ Return to the top</a></p>
<p><a name="deny"></a></p>
<p><strong>deny</strong></p>
<p>(U) deny: To attack by degrading, disrupting, or destroying access to or operation of a targeted function by a specified level for a specified time. Denial is concerned with preventing adversary use of resources.</p>
<ul>
<li><a name="degrade"></a><strong>degrade</strong>(U) degrade: (a function of amount) To deny access to or operation of a targeted function to a level represented as a percentage of capacity. Desired level of degradation is normally specified.</li>
<li><a name="disrupt"></a><strong>disrupt</strong>(U) disrupt: (a function of time) To completely but temporarily deny access to or operation of a targeted function for a period represented as a function of time. Disruption can be considered a special case of degradation where the degradation level selected is 100%.</li>
<li><a name="destroy"></a><strong>destroy</strong>(U) destroy: To permanently, completely, and irreparably deny access to, or operation of, a target. Destruction is the denial effect where time and level are both maximized.</li>
</ul>
<p><a href="#top">↑ Return to the top</a></p>
<p><a name="dud"></a></p>
<p><strong>dud</strong></p>
<p>(U) dud: A munition that has not been armed or activated as intended or that failed to take an expected action after being armed or activated. (Note: adapted directly from JP 1-02 of dud.)</p>
<p><a href="#top">↑ Return to the top</a></p>
<p><a name="ea"></a></p>
<p><strong>effects assessment (EA)</strong></p>
<p>(U) effects assessment (EA): The timely and accurate evaluation of effects resulting from the application of lethal or non-lethal force against a military objective. Effect assessment can be applied to the employment of all types of weapon systems (air, ground, naval, special forces, and cyber weapon systems) throughout the range of military operations. Effects assessment is primarily an intelligence responsibility with required inputs and coordination from the operators. Effects assessment is composed of physical effect assessment, functional effect assessment, and target system assessment. Note: Battle Damage Assessment (BDA) is a specific type of effects assessment for damage effects. &#8221; (This is a direct adaptation from the JP 1-02 definition of BDA.)</p>
<p><a href="#top">↑ Return to the top</a></p>
<p><a name="cybereffect"></a></p>
<p><strong>intended cyber effect</strong></p>
<p>(U//FOUO) intended cyber effect: A sorting of cyber capabilities into broad operational categories based on the outcomes they were designed to create. These categories are used to guide capability selection decisions. Answers the question: &#8220;What kind of capability is this?&#8221; Specifically:</p>
<p>• denial &#8211; degrade, disrupt, or destroy access to, operation, quality of service, or availability of target resources, processes, and/or data.</p>
<p>• manipulation &#8211; manipulate, distort, or falsify trusted information on a target.</p>
<p>• command and control &#8211; provide operator control of deployed cyber capabilities.</p>
<p>• information/data collection &#8211; obtain targeting information about targets or target environments.</p>
<p>• access &#8211; establish unauthorized access to a target.</p>
<p>• enabling &#8211; provide resources or create conditions that support the use of other capabilities.</p>
<p><a href="#top">↑ Return to the top</a></p>
<p><a name="kinetic"></a></p>
<p><strong>kinetic</strong></p>
<p>(U) kinetic: Of or pertaining to a weapon that uses, or effects created by, forces of dynamic motion and/ or energy upon material bodies. Includes traditional explosive weapons/ effects as well as capabilities that can create kinetic RF effects, such as continuous wave jammers, lasers, directed energy, and pulsed RF weapons.</p>
<p><a href="#top">↑ Return to the top</a></p>
<p><a name="nonkinetic"></a></p>
<p><strong>non-kinetic</strong></p>
<p>(U) non-kinetic: Of or pertaining to a weapon that does not use, or effects not created by, forces of dynamic motion and/ or energy upon material bodies.</p>
<p><a href="#top">↑ Return to the top</a></p>
<p><a name="lethal"></a></p>
<p><strong>lethal</strong></p>
<p>(U) lethal: Of or pertaining to a weapon or effect intended to cause death or permanent injuries to personnel.</p>
<p><a href="#top">↑ Return to the top</a></p>
<p><a name="nonlethal"></a></p>
<p><strong>non-lethal</strong></p>
<p>(U) non-lethal: Of or pertaining to a weapon or effect not intended to cause death or permanent injuries to personnel. Nonlethal effects may be reversible and are not required to have zero probability of causing fatalities, permanent injuries, or destruction of property.</p>
<p><a href="#top">↑ Return to the top</a></p>
<p><a name="manipulate"></a></p>
<p><strong>manipulate</strong></p>
<p>(U//FOUO) manipulate: To attack by controlling or changing a target&#8217;s functions in a manner that supports the commander&#8217;s objectives; includes deception, decoying, conditioning, spoofing, falsification, etc. Manipulation is concerned with using an adversary&#8217;s resources for friendly purposes and is distinct from influence operations (e.g. PSYOP, etc.).</p>
<p><a href="#top">↑ Return to the top</a></p>
<p><a name="misfire"></a></p>
<p><strong>misfire</strong></p>
<p>(U) misfire: The failure of a weapon to take its designed action; failure of a primer, propelling charge, transmitter, emitter, computer software, or other munitions component to properly function, wholly or in part. (Note: adapted directly from JP 1-02 of misfire.)</p>
<p><a href="#top">↑ Return to the top</a></p>
<p><a name="pe"></a></p>
<p><strong>probability of effect (PE)</strong></p>
<p>(U) probability of effect (PE): The chance of a specific functional or behavioral impact on a target given a weapon action.</p>
<p><a href="#top">↑ Return to the top</a></p>
<p><a name="target"></a></p>
<p><strong>target state</strong></p>
<p>(U) target state: The condition of a target described with respect to a military objective or set of objectives.</p>
<p><a href="#top">↑ Return to the top</a></p>
<p><a name="targetvulnerability"></a></p>
<p><strong>targeted vulnerability</strong></p>
<p>(U) targeted vulnerability: An exploitable weakness in the target required by a specific weapon.</p>
<ul>
<li><a name="objectivevulnerability"></a><strong>objective vulnerability</strong>objective vulnerability: A vulnerability whose exploitation directly accomplishes part or all of an actual military objective.</li>
<li><a name="accessvulnerability"></a><strong>access vulnerability</strong>access vulnerability: A vulnerability whose exploitation allows access to an objective vulnerability.</li>
</ul>
<p><a href="#top">↑ Return to the top</a></p>
<p><a name="weaponaction"></a></p>
<p><strong>weapon action</strong></p>
<p>(U) weapon action: The effect-producing mechanisms or functions initiated by a weapon when triggered. The weapon actions of a kinetic weapon are blast, heat, fragmentation, etc. The weapon actions of a cyber attack weapon might be writing to a memory register or transmission of a radio frequency (RF) waveform.</p>
<p><a href="#top">↑ Return to the top</a></p>
<p><a name="weaponeffect"></a></p>
<p><strong>weapon effect</strong></p>
<p>(U) weapon effect: A direct or indirect objective (intended) outcome of a weapon action. In warfare, the actions of a weapon are intended to create effects, typically against the functional capabilities of a material target or to the behavior of individuals. Effect-based tasking is specified by a specific target scope, desired effect level, and start time and duration.</p>
<ul>
<li><a name="directeffect"></a><strong>direct effect</strong>direct effect: An outcome that is created directly by the weapon&#8217;s action. Also known as a first order effect.</li>
<li><a name="indirecteffect"></a><strong>indirect effect</strong>indirect effect: An outcome that cascades from one or more direct effects or other indirect effects of the weapon&#8217;s action. Also known as second, third, Nth order effects, etc.</li>
</ul>
<p><a href="#top">↑ Return to the top</a></p>The post <a href="https://publicintelligence.net/the-vocabulary-of-cyber-war/">The Vocabulary of Cyber War</a> first appeared on <a href="https://publicintelligence.net">Public Intelligence</a>.]]></content:encoded>
					
					<wfw:commentRss>https://publicintelligence.net/the-vocabulary-of-cyber-war/feed/</wfw:commentRss>
			<slash:comments>7</slash:comments>
		
		
			</item>
		<item>
		<title>Identity Dominance: The U.S. Military&#8217;s Biometric War in Afghanistan</title>
		<link>https://publicintelligence.net/identity-dominance/</link>
					<comments>https://publicintelligence.net/identity-dominance/#comments</comments>
		
		<dc:creator><![CDATA[Public Intelligence]]></dc:creator>
		<pubDate>Mon, 21 Apr 2014 01:55:45 +0000</pubDate>
				<category><![CDATA[Featured]]></category>
		<category><![CDATA[Afghanistan]]></category>
		<category><![CDATA[Biometrics]]></category>
		<category><![CDATA[Center for Army Lessons Learned]]></category>
		<category><![CDATA[U.S. Army]]></category>
		<guid isPermaLink="false">http://publicintelligence.net/?p=31684</guid>

					<description><![CDATA[<p>For years the U.S. military has been waging a biometric war in Afghanistan, working to unravel the insurgent networks operating throughout the country by collecting the personal identifiers of large portions of the population.  A restricted U.S. Army guide on the use of biometrics in Afghanistan obtained by Public Intelligence provides an inside look at this ongoing battle to identify the Afghan people.   </p>
<p class="more-link-p">
<a class="btn btn-primary" href="https://publicintelligence.net/identity-dominance/">Read more &#8594;</a></p>
The post <a href="https://publicintelligence.net/identity-dominance/">Identity Dominance: The U.S. Military’s Biometric War in Afghanistan</a> first appeared on <a href="https://publicintelligence.net">Public Intelligence</a>.]]></description>
										<content:encoded><![CDATA[<div class="hero-unit"><em>For years the U.S. military has been waging a biometric war in Afghanistan, working to unravel the insurgent networks operating throughout the country by collecting the personal identifiers of large portions of the population.  A restricted U.S. Army guide on the use of biometrics in Afghanistan obtained by Public Intelligence provides an inside look at this ongoing battle to identify the Afghan people.      </em></div>
<p>Mohammad Zahid was not the target of a joint military operation that came through his village in Khost Province in late February 2012.  However, that day the twenty-two year old man who claimed to be a student was arrested and eventually convicted in an Afghan court because his fingerprints reportedly matched those found on an improvised explosive device (IED) cache that had been discovered the previous year.</p>
<p>Zahid was one of more than a hundred military-age males that were scanned that day by the joint coalition forces and Afghan National Army operation.  As part of its effort to combat insurgent forces interspersed within an indigenous population, the use of biometrics has become a central component of the U.S. war effort.  Having expanded heavily since its introduction during the war in Iraq, biometric identification and tracking of individuals has become a core mission in Afghanistan with initiatives sponsored by the U.S. and Afghan governments seeking to obtain the biometric identifiers of nearly everyone in the country.</p>
<p>Though there is no formal doctrine or universally accepted tactics, techniques, and procedures for using biometrics throughout the U.S. military, a 2011 U.S. Army handbook and several other documents obtained by Public Intelligence provide insight into the practical use of biometrics in Afghanistan, showing both the level of collection and the functional use of the data for intelligence gathering, force protection and even obtaining criminal convictions.  By collecting vast amounts of information on the population of Afghanistan, including both friend and foe alike, the U.S. military has sought to achieve <em>identity dominance</em> by undermining the fluid anonymity of terrorist and criminal networks and attaching permanent identities to malicious actors.</p>
<p><strong>What is biometrics?</strong></p>
<p>While the use of biometrics has become an increasingly important part of the war in Afghanistan, there is a fundamental lack of agreement about the doctrine surrounding the collection and use of biometric information.  An introduction to the <a href="https://publicintelligence.net/call-afghan-biometrics/">2011 U.S. Army Commander&#8217;s Guide to Biometrics in Afghanistan</a> states that there is &#8220;no formal doctrine; universally accepted tactics, techniques, and procedures; or institutionalized training programs across the Department of Defense&#8221; for biometric capabilities.  Despite this lack of formal doctrine, the U.S. military is currently using more than 7,000 devices to collect biometric data from the Afghan population.  Though biometrics can take the form of any &#8220;measurable biological (anatomical and physiological) and behavioral characteristic that can be used for automated recognition,&#8221; the biometric identifiers being collected in Afghanistan consist primarily of fingerprints, iris scans and facial photographs.  Other biological characteristics, which are referred to as <em>modalities</em>, that can be used to identify a person include certain types of voice patterns, palm prints, DNA, as well as behavioral characteristics such as gait and even keystroke patterns on a keyboard.</p>
<p>The U.S. military currently uses three devices for collecting the bulk of the biometric data harvested in Aghanistan: the Biometrics Automated Toolset (BAT), Handheld Interagency Identity Detection Equipment (HIIDE) and Secure Electronic Enrollment Kit (SEEK).  The BAT is used primarily by the Army and Marine Corps and consists of a laptop computer and separate peripherals for collecting fingerprints, scanning irises, and taking photographs.  The HIIDE is more mobile, providing a handheld device capable of collecting fingerprints, scanning irises and taking photographs.  Like the BAT, the HIIDE can connect to a network of approximately 150 servers throughout Afghanistan to upload and download current biometric information and watchlists.  The SEEK is also a handheld device with many of the same capabilities of the HIIDE, though it also has a built-in keyboard for remotely entering biographical information on the subject.  Used primarily by special operations forces, the SEEK will eventually replace the HIIDE as the standard collection device for the Army and Marine Corps.</p>
<div id="attachment_31700" style="width: 916px" class="wp-caption aligncenter"><a href="https://publicintelligence.net/wp-content/uploads/2013/08/8693093969_a1b0678c7d_b.jpg"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-31700" class=" wp-image-31700 " title="Collection in Action" src="https://publicintelligence.net/wp-content/uploads/2013/08/8693093969_a1b0678c7d_b.jpg" alt="" width="906" height="605" srcset="https://q.publicintelligence.net/wp-content/uploads/2013/08/8693093969_a1b0678c7d_b.jpg 1024w, https://q.publicintelligence.net/wp-content/uploads/2013/08/8693093969_a1b0678c7d_b-300x200.jpg 300w" sizes="auto, (max-width: 906px) 100vw, 906px" /></a><p id="caption-attachment-31700" class="wp-caption-text">Airman 1st Class Michael Vue, 455th Expeditionary Security Forces Squadron entry controller, scans an Afghan woman&#8217;s iris in the waiting area of the Egyptian Hospital at Bagram Airfield, Afghanistan, on April 16. Medical teams use biometrics to identify and track the records for all incoming patients by scanning their iris and fingerprints and then inputting the information into a database. Photo via U.S. Air Force.</p></div>
<p>Data from these devices is stored in local and national databases which can be searched and compared with other intelligence information to help identify enemy combatants.  All biometric data collected in Afghanistan is ultimately sent back to the DOD&#8217;s Automated Biometric Identification System (ABIS) located in West Virginia, where it is stored and also shared with the Department of Homeland Security (DHS) and FBI.  Partnerships with other nations also allow the DOD to run data against biometrics collected by foreign governments and law enforcement.</p>
<p><strong>Enroll Everyone</strong></p>
<p>Though the use of biometrics is relatively new for U.S. forces, collection efforts in Afghanistan have become ubiquitous, taking in data on large swaths of the population from government officials to local villagers.  In 2009, it was reported that even foreign journalists covering the war in Afghanistan would be <a href="http://www.ndia.org/Divisions/Divisions/BiometricsEnabledIdentity/Documents/PolicyCommittee/Document_Library-Advancement,_Planned_Usage,_Standards/Journalists_required_to_submit_to_biometric_scan_in_Afghan5.6.09%E2%80%A6.pdf">required to provide their biometric data</a> before being accredited and provided access to military facilities.  The collection of biometric data is viewed as being so essential to the war effort that the Afghan Ministry of Interior was enlisted to help run a program called Afghan 1000, which provides a comprehensive framework for collecting biometric data on the citizens of Afghanistan.  The program established a goal of <a href="http://www.state.gov/documents/organization/170479.pdf">enrolling eighty percent of the country&#8217;s population</a> by 2012, covering nearly 25 million people.  While the actual enrollment numbers are not public, the Afghan 1000 program has been in operation for several years, collecting data for every traveler passing through Kabul International Airport, border crossings and Afghan Population Registration Department offices throughout the country.</p>
<p>The stated goal of the Afghan effort is no less than the collection of biometric data for <a href="http://www.nytimes.com/2011/11/20/world/asia/in-afghanistan-big-plans-to-gather-biometric-data.html?pagewanted=all">every living person in Afghanistan</a>.  At a conference with Afghan officials in 2010, the commander of the U.S. Army&#8217;s Task Force Biometrics Col. Craig Osborne <a href="http://www.centcom.mil/press-releases/conference-maps-the-way-ahead-for-biometrics-in-afghanistan%3FAltItemid=312.html">told the attendees</a> that the collection of biometric data is not simply about &#8220;identifying terrorists and criminals,&#8221; but that &#8220;it can be used to enable progress in society and has countless applications for the provision of services to the citizens of Afghanistan.&#8221;  According to Osborne, biometrics provide the Afghan government with &#8220;identity dominance&#8221; enabling them to know who their citizens are and link actions with actors.  &#8220;Your iris design belongs only to you and your left and right irises are different,&#8221; Osborne said at the conference.  &#8220;A name can be changed or altered illegally or even legally, but once your iris is formed at the age of six months, it cannot be altered, duplicated or forged.&#8221;</p>
<p>The <a href="https://publicintelligence.net/call-afghan-biometrics/">U.S. Army Commander&#8217;s Guide to Biometrics in Afghanistan</a> recommends that &#8220;all combat outposts and checkpoints throughout Afghanistan make it a priority to collect biometric data from as many local nationals as possible.&#8221;  During cordoning operations, the guide advises soldiers to &#8220;enroll everyone&#8221; including the dead, from which DNA is often collected using buccal swabs to capture the cells that line the mouth.  While Afghanistan offers &#8220;an extraordinarily complicated environment for the broad employment of biometrics,&#8221; the guide notes that the &#8220;payoff to U.S. and coalition forces is so great in terms of securing the population and identification of bad actors in the country, that commanders must be creative and persistent in their efforts to enroll as many Afghans as possible.&#8221;</p>
<div id="attachment_31701" style="width: 916px" class="wp-caption aligncenter"><a href="https://publicintelligence.net/wp-content/uploads/2013/08/6856337981_6d9165dc00_b.jpg"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-31701" class=" wp-image-31701" title="6856337981_6d9165dc00_b" src="https://publicintelligence.net/wp-content/uploads/2013/08/6856337981_6d9165dc00_b.jpg" alt="" width="906" height="604" srcset="https://q.publicintelligence.net/wp-content/uploads/2013/08/6856337981_6d9165dc00_b.jpg 1024w, https://q.publicintelligence.net/wp-content/uploads/2013/08/6856337981_6d9165dc00_b-300x200.jpg 300w" sizes="auto, (max-width: 906px) 100vw, 906px" /></a><p id="caption-attachment-31701" class="wp-caption-text">U.S. Army Spc. Robert Irwin, serving with 2nd Platoon, D Company, 3rd Battalion, 509th Infantry Regiment, 25th Infantry Division, Task Force Gold Geronimo, uses his Handheld Interagency Identity Detection Equipment (HIIDE) to scan a local Afghan man&#8217;s fingerprints, Paktya Province, Afghanistan, Jan. 30, 2012. Photo via U.S. Army.</p></div>
<p>In a section titled &#8220;Population Management,&#8221; the U.S. Army&#8217;s guide recommends that &#8220;every person who lives within an operational area should be identified and fully biometrically enrolled with facial photos, iris scans, and all ten fingerprints (if present).&#8221;  The soldiers must also record &#8220;good contextual data&#8221; about the individual such as &#8220;where they live, what they do, and to which tribe or clan they belong.&#8221;  According to the guide, popuation management actions &#8220;can also have the effect of building good relationships and rapport&#8221; by sending the message that the &#8220;census&#8221; is intended to protect them from &#8220;the influence of outsiders and will give them a chance to more easily identify troublemakers in their midst.&#8221;  A checklist included in the section includes the following instructions:</p>
<blockquote>
<ul>
<li>Locate and identify every resident (visit and record every house and business). At a minimum, fully biometrically enroll all military-age males as follows:
<ul>
<li>Full sets of fingerprints.</li>
<li>Full face photo.</li>
<li>Iris scans.</li>
<li>Names and all variants of names.</li>
<li>BAT associative elements:
<ul>
<li>Address.</li>
<li>Occupation.</li>
<li>Tribal name.</li>
<li>Military grid reference of enrollment.</li>
</ul>
</li>
</ul>
</li>
<li>Create an enrollment event for future data mining.</li>
<li>Listen to and understand residents’ problems.</li>
<li>Put residents in a common database.</li>
<li>Collect and assess civil-military operations data.</li>
<li>Identify local leaders and use them to identify the populace.</li>
<li>Use badging to identify local leaders, and key personnel.</li>
<li>Cultivate human intelligence sources.</li>
<li>Push indigenous forces into the lead at every possible opportunity.</li>
<li>Track persons of interest; unusual travel patterns may indicate unusual activities.</li>
</ul>
</blockquote>
<p>Widespread enrollment of the population or the &#8220;census&#8221; as the guide refers to it, is seen in Afghanistan &#8220;as supportive of the local government, particularly if accompanied with a badging program that highlights the government’s presence in an area.&#8221;  Tribal leaders and clan heads can use biometrics to control their local area which can lend &#8220;authority to tribal leadership by helping them keep unwanted individuals out of their areas.&#8221;</p>
<p><strong>Biometric Watch Lists</strong></p>
<p>One of the most essential products of the widespread collection of biometric data in Afghanistan is the Biometric Enabled Watch List (BEWL).  Known as &#8220;the watch list,&#8221; the BEWL is a &#8220;collection of individuals whose biometrics have been collected and determined by [biometrics-enabled intelligence (BEI)] analysts to be threats, potential threats, or who simply merit tracking.&#8221;  When loaded onto a biometrics collection device like the HIIDE, the BEWL &#8220;allows for instantaneous feedback on biometrics collections without the need for real-time communications to the authoritative biometrics database,&#8221; allowing the soldier to immediately identify persons of interest.</p>
<p>Once BEI analysts combine all of the data from biometric enrollments, forensic evidence, and other forms of intelligence they develop the BEWL in cooperation with numerous other intelligence agencies and organizations throughout the government.  At least twenty-nine dedicated BEI analysts located throughout Afghanistan work to create the BEWL and individual units can request that specific individuals be added or removed from the list.  When a person&#8217;s biometric data is collected in Afghanistan and they are not matched to an entity on the watch list, the data and &#8220;associated contextual information required for enrollment&#8221; are transmitted back to the ABIS in West Virgina for matching against all other collected biometrics, including the 90 million fingerprint entries collected by DHS and 55 million from criminal enrollments made by the FBI.  If a match is found there, the information is sent to the National Ground Intelligence Center (NGIC) in Charlottesville, VA which generates a biometrics intelligence analysis report (BIAR) detailing the history and potential threat posed by the individual.  NGIC then contacts Task Force Biometrics in Afghanistan which notifies the proper unit in the operational environment.  Depending on the unit collecting the biometric data, this process can take anywhere from a few minutes to several days if the match is made against a latent fingerprint.  Whether a match is ultimately found or not, all information is stored for further use in the BEI process.</p>
<div id="attachment_33844" style="width: 1210px" class="wp-caption aligncenter"><a href="https://publicintelligence.net/wp-content/uploads/2014/03/biometrics-intel-cycle.jpg"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-33844" class="size-full wp-image-33844" src="https://publicintelligence.net/wp-content/uploads/2014/03/biometrics-intel-cycle.jpg" alt="Biometrics exploitation and enrollment linkage" width="1200" height="1381" srcset="https://q.publicintelligence.net/wp-content/uploads/2014/03/biometrics-intel-cycle.jpg 1200w, https://q.publicintelligence.net/wp-content/uploads/2014/03/biometrics-intel-cycle-260x300.jpg 260w, https://q.publicintelligence.net/wp-content/uploads/2014/03/biometrics-intel-cycle-889x1024.jpg 889w, https://q.publicintelligence.net/wp-content/uploads/2014/03/biometrics-intel-cycle-130x150.jpg 130w" sizes="auto, (max-width: 1200px) 100vw, 1200px" /></a><p id="caption-attachment-33844" class="wp-caption-text">A figure from the U.S. Army Commander&#8217;s Guide to Biometrics in Afghanistan explaining the linkage between exploitation of biometric information and enrollment on the battlefield.</p></div>
<p>Even when it is obvious that the people being enrolled have no connection to the insurgency, the Commander&#8217;s Guide to Biometrics in Afghanistan emphasizes that &#8220;all collections are important.&#8221;  The guide states that identification of the &#8220;population in a particular area is essential to effective counterinsurgency operations&#8221; and essential to a unit&#8217;s capacity for &#8220;owning ground&#8221; in a combat zone.  Units must know &#8220;who lives where, who does what, who belongs, and who does not.&#8221;  Mapping the &#8220;human terrain&#8221; is described as key to security, allowing U.S. forces to know &#8220;who they are, what they do, to whom they are related&#8221; and to help &#8220;separate the locals from the insurgents.&#8221;  To aid this effort, the guide recommends demonstrating the &#8220;value of biometrics&#8221; to subordinates and having a &#8220;belief in biometrics&#8221; so that the &#8220;support staff and leaders do not treat biometrics operations as a check-the-block activity.&#8221;</p>
<p style="text-align: left;"><strong>Obtaining Convictions</strong></p>
<p>While biometrics are best known for helping U.S forces identify and locate suspected insurgents in Afghanistan, battlefield forensics has become an increasingly important part of the Afghan justice system, helping to convict individuals of aiding the Taliban by hiding weapons caches or constructing roadside bombs.  The U.S. Army&#8217;s guide notes that forensics are &#8220;being used at an increasing rate by the Afghan criminal justice system, and convictions are now occurring in the Afghan courts based solely on biometric evidence.&#8221;  The U.S. Army&#8217;s <a href="https://publicintelligence.net/us-army-afghanistan-evidence-collection-guide/">Afghanistan Theater of Operations Evidence Collection Guide</a> advises soldiers on how to collect various forms of biometric evidence for forensic investigators to provide to Afghan prosecutors in the hopes of obtaining a conviction.  This reliance on criminal convictions is part of a &#8220;transition from law of war-based detentions to evidence-based criminal detentions&#8221; where U.S. and coalition forces must &#8220;coordinate with the relevant local, provincial, or national prosecutors and judges to determine the specific type and amount of evidence deemed credible&#8221; by providing &#8220;evidence and witness statements for use in an Afghan court of law to enable the National Security Prosecutor’s Unit (NSPU) or a provincial criminal court to prosecute and convict criminal suspects.&#8221;  The guide advises soldiers to &#8220;enroll all subjects on-site&#8221; following a criminal activity and &#8220;ensure that a full enrollment is collected, to include iris scans, ten digit fingerprints, a full facial photograph, and other biometric data.&#8221;  Complex instructions are included on collecting latent fingerprints from pieces of evidence and collecting DNA samples from potential suspects.  The <a href="https://publicintelligence.net/isaf-guide-to-collecting-evidence-for-prosecution-in-afghan-courts/">International Security Assistance Force (ISAF) Guide to Evidence Collection</a> also contains similar instructions including how to make plaster casts of footprint and tire tracks to provide to investigators.</p>
<div id="attachment_31699" style="width: 916px" class="wp-caption aligncenter"><a href="https://publicintelligence.net/wp-content/uploads/2013/08/biometrics-conviction.jpg"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-31699" class=" wp-image-31699" title="biometrics-conviction" src="https://publicintelligence.net/wp-content/uploads/2013/08/biometrics-conviction-1024x639.jpg" alt="" width="906" height="566" srcset="https://q.publicintelligence.net/wp-content/uploads/2013/08/biometrics-conviction-1024x639.jpg 1024w, https://q.publicintelligence.net/wp-content/uploads/2013/08/biometrics-conviction-300x187.jpg 300w, https://q.publicintelligence.net/wp-content/uploads/2013/08/biometrics-conviction.jpg 1612w" sizes="auto, (max-width: 906px) 100vw, 906px" /></a><p id="caption-attachment-31699" class="wp-caption-text">A summary of the conviction of an Afghan man last year for building and emplacing improvised explosive devices (IEDs) that was based entirely upon biometric evidence.</p></div>
<p>A <a href="http://ndupress.ndu.edu/Media/News/NewsArticleView/tabid/7849/Article/8327/jfq-72-biometric-enabled-intelligence-in-regional-command-east.aspx">study in the January 2014 issue</a> of National Defense University&#8217;s Joint Force Quarterly found that Afghan courts are increasingly looking for &#8220;biometrics as a component of the prosecution’s case.&#8221;  Focusing particular attention on the Afghan National Security Court located at the Justice Center in Parwan (JCIP), which is described as a &#8220;model for successful use of biometric evidence in criminal prosecutions,&#8221; the study describes the &#8220;prominent role&#8221; that biometrics now play in obtaining convictions at the facility.  In fact, the Afghan National Security Court has obtained convictions in &#8220;almost every case where a biometric match has been made between the defendant and the criminal instrument.&#8221;  The study also found that sentences are consistently longer for individuals convicted using biometric evidence like fingerprints or DNA.  &#8220;Collections and enrollments matter and increase the effectiveness of all other operations&#8221; the authors state at the conclusion of the study, instructing their readers to &#8220;treat every event as a means to collect additional biometrics.&#8221;</p>
<p>The number of convictions in Afghan courts based solely on biometric evidence is unknown, as is the accuracy of the systems used for determining a biometric match.  However, we do know that the number of prosecutions is going up.  One such example is the case of Mohammad Zahid, the twenty-two-year-old man arrested in Khost Province in February 2012.  Zahid was arrested with nothing on his person.  He claimed to be a student and said he had no connection with the Taliban, yet a latent fingerprint from an IED found in a cache the previous year along with cell phones, battery packs and other bomb-making supplies reportedly matched his own.  Zahid was one of over a hundred military-age males enrolled in that village in Khost on February 23, 2012.  Now, he will spend years in prison and, according to his testimony, does not know why his fingerprints were found on the bomb-making equipment discovered by coalition forces.</p>
<div id="DV-viewer-1111982-u-s-army-commanders-guide-to-biometrics-in" class="DV-container"></div>
<p><script src="//s3.amazonaws.com/s3.documentcloud.org/viewer/loader.js"></script><br />
<script>
  DV.load("//www.documentcloud.org/documents/1111982-u-s-army-commanders-guide-to-biometrics-in.js", {
  width: 860,
    height: 1300,
    sidebar: false,
    container: "#DV-viewer-1111982-u-s-army-commanders-guide-to-biometrics-in"
  });
</script></p>The post <a href="https://publicintelligence.net/identity-dominance/">Identity Dominance: The U.S. Military’s Biometric War in Afghanistan</a> first appeared on <a href="https://publicintelligence.net">Public Intelligence</a>.]]></content:encoded>
					
					<wfw:commentRss>https://publicintelligence.net/identity-dominance/feed/</wfw:commentRss>
			<slash:comments>18</slash:comments>
		
		
			</item>
		<item>
		<title>FBI Law Enforcement National Data Exchange Contains 223 Million Records</title>
		<link>https://publicintelligence.net/fbi-ndex-223-million-records/</link>
					<comments>https://publicintelligence.net/fbi-ndex-223-million-records/#respond</comments>
		
		<dc:creator><![CDATA[Public Intelligence]]></dc:creator>
		<pubDate>Mon, 31 Mar 2014 01:49:09 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Federal Bureau of Investigation]]></category>
		<category><![CDATA[Law Enforcement National Data Exchange]]></category>
		<guid isPermaLink="false">http://publicintelligence.net/?p=33409</guid>

					<description><![CDATA[<p>The Law Enforcement National Data Exchange (N-DEx) run by the FBI Criminal Justice Information Services (CJIS) Division now contains approximately 223 million records on nearly two billion entities.  A FBI CJIS presentation from February 2014 posted on the website of the Integrated Justice Information Systems Institute includes detailed information on state and local data contributors including a tally of the total number of records contributed by state.</p>
<p class="more-link-p">
<a class="btn btn-primary" href="https://publicintelligence.net/fbi-ndex-223-million-records/">Read more &#8594;</a></p>
The post <a href="https://publicintelligence.net/fbi-ndex-223-million-records/">FBI Law Enforcement National Data Exchange Contains 223 Million Records</a> first appeared on <a href="https://publicintelligence.net">Public Intelligence</a>.]]></description>
										<content:encoded><![CDATA[<div id="attachment_33410" style="width: 810px" class="wp-caption aligncenter"><a href="https://publicintelligence.net/wp-content/uploads/2014/02/FBI-NDex-Overview_Page_30.jpg"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-33410" class=" wp-image-33410" title="FBI-NDex-Overview_Page_28" alt="" src="https://publicintelligence.net/wp-content/uploads/2014/02/FBI-NDex-Overview_Page_30.jpg" width="800" height="601" /></a><p id="caption-attachment-33410" class="wp-caption-text">A slide from a February 2014 presentation showing the combined state and local contributors to the National Data Exchange (N-DEx).</p></div>
<p><strong>Public Intelligence</strong></p>
<p>The Law Enforcement National Data Exchange (N-DEx) run by the FBI Criminal Justice Information Services (CJIS) Division now contains approximately 223 million records on nearly two billion entities.  An <a href="https://publicintelligence.net/fbi-ndex-overview/">FBI CJIS presentation from February 2014</a> posted on the website of the Integrated Justice Information Systems Institute includes detailed information on state and local data contributors including a tally of the total number of records contributed by state.</p>
<p>The FBI <a href="http://www.fbi.gov/about-us/cjis/n-dex">describes N-DEx</a> as &#8220;a mechanism for sharing, searching, linking, and analyzing information across jurisdictional boundaries&#8221; including &#8220;incident and case reports, booking and incarceration data, and parole/probation information.&#8221;  Sypherlink, contractor involved in implementing N-DEx data sharing around the country, <a href="http://www.sypherlink.com/solutions/NDEx-support.asp">describes the system</a> as being able to detect &#8220;relationships between people, vehicle/property, location, and/or crime characteristics.&#8221;  Slides from the February 2014 N-DEx presentation indicate that at least 34 states are contributing data to the system with Texas, Arkansas, California, Virginia and Tennessee each providing at least ten million records.  Texas has contributed more than any other state, adding more than 68 million records to the system, nearly three times its nearest competitor.  Federal agencies have added another 23 million records to the system.  According to an updated listing of N-DEx data contributors listed in the presentation, federal and state contributions amount to more than 191 million records in total.  However, other slides in the presentation brag that their are &#8220;approximately 223 million records&#8221; on &#8220;nearly 2 billion entities&#8221; stored in N-DEx.  It is unclear where the more than 30 million records not contributed by states and federal agencies listed in the presentation are obtained from.</p>
<p>A <a href="http://www.fbi.gov/foia/privacy-impact-assessments/n-dex">privacy impact assessment issued by the FBI</a> in January 2007 stated that &#8220;during initial deployment&#8221; it was &#8220;estimated that the number of records in the N-DEx may be approximately 30-35 million records.&#8221;  In an <a href="http://www.policechiefmagazine.org/magazine/index.cfm?fuseaction=display_arch&amp;article_id=2867&amp;issue_id=22013">article for Police Chief Magazine</a>, a N-DEx &#8220;outreach liaison&#8221; stated that the system had &#8220;more than 145 million records&#8221; in November 2012 and &#8220;one billion searchable entities.&#8221;  N-DEx program manager Michael Haas stated in a <a href="http://www.computerworld.com/s/article/9243354/It_s_criminal_Why_data_sharing_lags_among_law_enforcement_agencies_?taxonomyId=13&amp;pageNumber=2">October 2013 interview with Computer World</a> that he hoped future developments will make the system a &#8220;gateway for access to other CJIS databases, including the division&#8217;s Next Generation Identification system, an updated version of its Integrated Automated Fingerprint Identification System database that contains wanted lists and arrest warrants, criminal histories, fingerprints, palm prints, facial images and other biometric data used for identification purposes.&#8221;  The <a href="https://publicintelligence.net/fbi-ngi-update/">FBI Next Generation Identification system</a>, which has been in development for several years, promises to offer law enforcement around the country the <a href="https://publicintelligence.net/fbi-ngi-update/">ability to use facial recognition software</a> and other tools to automatically search through vast troves of biometric data to identify suspects and conduct investigations.  Haas also said that the growth of the system has been expanding because CJIS has encouraged &#8220;states to submit records from prosecutions, court records, corrections, probation and other related areas&#8221; so that in addition to the &#8220;incident information&#8221; already added to the system, N-DEx will begin to obtain more data over time on &#8220;pretrial investigations, warrants, supervised release details, citations, field interviews and incarceration information.&#8221;</p>
<p><strong>N-DEx Data Contributors Listed By State</strong></p>
<table width="565">
<tbody>
<tr>
<td width="100">Alabama</td>
<td>1,420,223</td>
<td width="100">Maine</td>
<td>12,497</td>
<td width="100">Pennsylvania</td>
<td>513,349</td>
</tr>
<tr>
<td width="100">Alaska</td>
<td></td>
<td width="100">Maryland</td>
<td>226,110</td>
<td width="100">Rhode Island</td>
<td></td>
</tr>
<tr>
<td width="100">Arizona</td>
<td>126,165</td>
<td width="100">Massachusetts</td>
<td></td>
<td width="100">South Carolina</td>
<td></td>
</tr>
<tr>
<td width="100">Arkansas</td>
<td>24,153,042</td>
<td width="100">Michigan</td>
<td>2,393,851</td>
<td width="100">South Dakota</td>
<td>133,794</td>
</tr>
<tr>
<td width="100">California</td>
<td>20,393,280</td>
<td width="100">Minnesota</td>
<td>18</td>
<td width="100">Tennessee</td>
<td>10,971,501</td>
</tr>
<tr>
<td width="100">Colorado</td>
<td>184,338</td>
<td width="100">Mississippi</td>
<td> 44,830</td>
<td width="100">Texas</td>
<td>68,793,268</td>
</tr>
<tr>
<td width="100">Connecticut</td>
<td></td>
<td width="100">Missouri</td>
<td>141,658</td>
<td width="100">Utah</td>
<td>16,654</td>
</tr>
<tr>
<td width="100">D.C.</td>
<td>962,356</td>
<td width="100">Montana</td>
<td></td>
<td width="100">Vermont</td>
<td></td>
</tr>
<tr>
<td width="100">Delaware</td>
<td>1,085,708</td>
<td width="100">Nebraska</td>
<td>173,877</td>
<td width="100">Virginia</td>
<td>10,342,356</td>
</tr>
<tr>
<td width="100">Florida</td>
<td></td>
<td width="100">Nevada</td>
<td> 276</td>
<td width="100">Washington</td>
<td>8,520,754</td>
</tr>
<tr>
<td width="100">Georgia</td>
<td>1,020,907</td>
<td width="100">New Hampshire</td>
<td></td>
<td width="100">West Virginia</td>
<td>34,578</td>
</tr>
<tr>
<td width="100">Hawaii</td>
<td></td>
<td width="100">New Jersey</td>
<td></td>
<td width="100">Wisconsin</td>
<td>154,401</td>
</tr>
<tr>
<td width="100">Idaho</td>
<td>578,174</td>
<td width="100">New Mexico</td>
<td>35,076</td>
<td width="100">Wyoming</td>
<td></td>
</tr>
<tr>
<td width="100">Illinois</td>
<td>4,515,553</td>
<td width="100">New York</td>
<td>1,189,118</td>
<td width="100"></td>
<td></td>
</tr>
<tr>
<td width="100">Indiana</td>
<td>108,715</td>
<td width="100">North Carolina</td>
<td></td>
<td width="100">State</td>
<td>168,569,227</td>
</tr>
<tr>
<td width="100">Iowa</td>
<td></td>
<td width="100">North Dakota</td>
<td></td>
<td width="100">Federal</td>
<td>23,005,381</td>
</tr>
<tr>
<td width="100">Kansas</td>
<td>2,108,188</td>
<td width="100">Ohio</td>
<td>5,564,883</td>
<td width="100"></td>
<td></td>
</tr>
<tr>
<td width="100">Kentucky</td>
<td>1,637,232</td>
<td width="100">Oklahoma</td>
<td></td>
<td width="100"></td>
<td></td>
</tr>
<tr>
<td width="100">Louisiana</td>
<td></td>
<td width="100">Oregon</td>
<td>1,012,497</td>
<td width="100"><strong>Total</strong></td>
<td>191,574,608</td>
</tr>
</tbody>
</table>
<p><a href="https://publicintelligence.net/wp-content/uploads/2014/03/FBI-NDex-Overview_Page_31.jpg"><img loading="lazy" decoding="async" class="aligncenter  wp-image-33889" alt="FBI-NDex-Overview_Page_31" src="https://publicintelligence.net/wp-content/uploads/2014/03/FBI-NDex-Overview_Page_31.jpg" width="800" height="599" srcset="https://q.publicintelligence.net/wp-content/uploads/2014/03/FBI-NDex-Overview_Page_31.jpg 1000w, https://q.publicintelligence.net/wp-content/uploads/2014/03/FBI-NDex-Overview_Page_31-300x225.jpg 300w, https://q.publicintelligence.net/wp-content/uploads/2014/03/FBI-NDex-Overview_Page_31-150x112.jpg 150w" sizes="auto, (max-width: 800px) 100vw, 800px" /></a><a href="https://publicintelligence.net/wp-content/uploads/2014/02/FBI-NDex-Overview_Page_27.jpg"><img loading="lazy" decoding="async" class="aligncenter  wp-image-33410" title="FBI-NDex-Overview_Page_27" alt="" src="https://publicintelligence.net/wp-content/uploads/2014/02/FBI-NDex-Overview_Page_27.jpg" width="800" height="601" /></a><a href="https://publicintelligence.net/wp-content/uploads/2014/02/FBI-NDex-Overview_Page_28.jpg"><img loading="lazy" decoding="async" class="aligncenter  wp-image-33410" title="FBI-NDex-Overview_Page_28" alt="" src="https://publicintelligence.net/wp-content/uploads/2014/02/FBI-NDex-Overview_Page_28.jpg" width="800" height="601" srcset="https://q.publicintelligence.net/wp-content/uploads/2014/02/FBI-NDex-Overview_Page_28.jpg 1000w, https://q.publicintelligence.net/wp-content/uploads/2014/02/FBI-NDex-Overview_Page_28-300x225.jpg 300w" sizes="auto, (max-width: 800px) 100vw, 800px" /></a><a href="https://publicintelligence.net/wp-content/uploads/2014/02/FBI-NDex-Overview_Page_29.jpg"><img loading="lazy" decoding="async" class="aligncenter  wp-image-33410" title="FBI-NDex-Overview_Page_29" alt="" src="https://publicintelligence.net/wp-content/uploads/2014/02/FBI-NDex-Overview_Page_29.jpg" width="800" height="601" /></a></p>The post <a href="https://publicintelligence.net/fbi-ndex-223-million-records/">FBI Law Enforcement National Data Exchange Contains 223 Million Records</a> first appeared on <a href="https://publicintelligence.net">Public Intelligence</a>.]]></content:encoded>
					
					<wfw:commentRss>https://publicintelligence.net/fbi-ndex-223-million-records/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Feds Tell Law Enforcement to Look Out for Dead Body Bombs</title>
		<link>https://publicintelligence.net/look-out-for-dead-body-bombs/</link>
					<comments>https://publicintelligence.net/look-out-for-dead-body-bombs/#respond</comments>
		
		<dc:creator><![CDATA[Public Intelligence]]></dc:creator>
		<pubDate>Thu, 23 Jan 2014 02:52:47 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Department of Homeland Security]]></category>
		<category><![CDATA[Federal Bureau of Investigation]]></category>
		<category><![CDATA[india]]></category>
		<category><![CDATA[Terrorism]]></category>
		<guid isPermaLink="false">http://publicintelligence.net/?p=33145</guid>

					<description><![CDATA[<p>In the first weeks of 2013, police officers were combing through a bloody scene in the Indian state of Jharkhand where a dozen security personnel had died in a shootout with local rebels.  The Naxalite fighters, who promote a Maoist ideology through their ongoing guerrilla conflict with the Indian government, had killed the men, including five Central Reserve Police Force members, in a gun battle days before.  When local villagers and police tried to remove the bodies, a bomb went off killing four more people.  After the incident, a group of doctors in nearby Ranchi were performing an autopsy on one of the bodies when they encountered something metal lodged inside the body.  A bomb squad was called in and an explosive device triggered by shifts in pressure that had been sewn into the police officer's body was successfully defused.</p>
<p class="more-link-p">
<a class="btn btn-primary" href="https://publicintelligence.net/look-out-for-dead-body-bombs/">Read more &#8594;</a></p>
The post <a href="https://publicintelligence.net/look-out-for-dead-body-bombs/">Feds Tell Law Enforcement to Look Out for Dead Body Bombs</a> first appeared on <a href="https://publicintelligence.net">Public Intelligence</a>.]]></description>
										<content:encoded><![CDATA[<div><iframe loading="lazy" src="//www.youtube.com/embed/zu5QhbUVHWU?rel=0;3&amp;autohide=1&amp;showinfo=0" height="411" width="730" frameborder="0"></iframe><br />
<span>A news report from CNN-IBN describing the January 2013 incident where a bomb was concealed in the body of a deceased member of the Central Reserve Police Force.</span></div>
<p><strong>Public Intelligence</strong></p>
<p>In the first weeks of 2013, police officers were combing through a bloody scene in the Indian state of Jharkhand where a dozen security personnel had died in a shootout with local rebels.  The Naxalite fighters, who promote a Maoist ideology through their ongoing guerrilla conflict with the Indian government, had killed the men, including five Central Reserve Police Force members, in a gun battle days before.  When local villagers and police tried to remove the bodies, a <a href="http://www.ndtv.com/article/india/1-5-kg-bomb-found-in-body-of-jawan-killed-in-naxal-encounter-in-latehar-315642">bomb went off</a> killing four more people.  After the incident, a group of doctors in nearby Ranchi were performing an autopsy on one of the bodies when they encountered something metal lodged inside the body.  A bomb squad was called in and an explosive device triggered by shifts in pressure that had been sewn into the police officer&#8217;s body was successfully defused.</p>
<p>A <a href="https://publicintelligence.net/dhs-fbi-dead-body-bombs/">Department of Homeland Security and FBI bulletin</a> sent to law enforcement around the county in May 2013 warns of the same thing happening in a U.S. city.  The bulletin describes how &#8220;insurgents in India placed improvised explosive devices (IEDs) in the bodies of two police officers who were killed during an ambush . . . designed to target first responders, medical personnel, and medical facilities.&#8221;  Though this &#8220;concealment method&#8221; has not been &#8220;encountered in the Homeland,&#8221; the bulletin warns that the &#8220;incident received broad English-language media coverage overseas, which could prompt technically-competent violent extremists to consider adopting the tactic.&#8221;</p>
<p>The DHS-FBI bulletin credits Indian medical personnel with preventing detonation of the device because of their alertness to the &#8220;suspicious indicators&#8221; that a bomb had been placed inside the body.  First responders are advised to look for &#8220;unusual or fresh—possibly still bleeding or seeping—incisions accompanied by crude stitching&#8221; as well as &#8220;signs of post-mortem incisions or stitching.&#8221;  Other signs include &#8220;abnormal bloating or swelling of the body&#8221; or &#8220;foreign objects protruding from the body&#8221; as well as human remains &#8221; placed in a manner/location requiring responders to immediately remove them from the encountered position/location.&#8221;</p>
<div class="DV-container" id="DV-viewer-1008774-dhs-fbi-bulletin-improvised-explosive-device"></div>
<p><script type="text/javascript" src="//s3.amazonaws.com/s3.documentcloud.org/viewer/loader.js"></script><script type="text/javascript">// <![CDATA[
DV.load("//www.documentcloud.org/documents/1008774-dhs-fbi-bulletin-improvised-explosive-device.js", {   width: 730,     height: 1000,     sidebar: false,     container: "#DV-viewer-1008774-dhs-fbi-bulletin-improvised-explosive-device"   });
// ]]&gt;</script></p>The post <a href="https://publicintelligence.net/look-out-for-dead-body-bombs/">Feds Tell Law Enforcement to Look Out for Dead Body Bombs</a> first appeared on <a href="https://publicintelligence.net">Public Intelligence</a>.]]></content:encoded>
					
					<wfw:commentRss>https://publicintelligence.net/look-out-for-dead-body-bombs/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>The U.S. Government&#8217;s Diminishing Expectations Plan for Afghanistan</title>
		<link>https://publicintelligence.net/us-plan-in-afghanistan/</link>
					<comments>https://publicintelligence.net/us-plan-in-afghanistan/#respond</comments>
		
		<dc:creator><![CDATA[Public Intelligence]]></dc:creator>
		<pubDate>Tue, 31 Dec 2013 00:23:45 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Afghanistan]]></category>
		<category><![CDATA[Department of State]]></category>
		<category><![CDATA[International Security Assistance Force]]></category>
		<guid isPermaLink="false">http://publicintelligence.net/?p=32620</guid>

					<description><![CDATA[<p>Public Intelligence has obtained the most recent version of the U.S. Civil-Military Strategic Framework for Afghanistan, the second revision of the document dated August 2013, detailing the U.S. government's goals and priorities for rebuilding Afghan society.  Issued by the U.S. Ambassador to Afghanistan James Cunningham and signed by the commander of U.S. forces Joseph Dunford, the framework covers U.S. priorities related to governance, the rule of law, socioeconomic development as well as the gradual transfer of authority to the Afghan government.  When compared with a previous version of the framework from March 2012, also obtained by Public Intelligence, the document solidifies the prospect of long-term U.S. involvement in Afghanistan, removing optimistic statements about turnover dates and self-sustaining funding estimates and replacing them with measured assessments reinforcing the notion that U.S. and international forces will be present in Afghanistan far into the next decade.</p>
<p class="more-link-p">
<a class="btn btn-primary" href="https://publicintelligence.net/us-plan-in-afghanistan/">Read more &#8594;</a></p>
The post <a href="https://publicintelligence.net/us-plan-in-afghanistan/">The U.S. Government’s Diminishing Expectations Plan for Afghanistan</a> first appeared on <a href="https://publicintelligence.net">Public Intelligence</a>.]]></description>
										<content:encoded><![CDATA[<div id="attachment_32623" style="width: 740px" class="wp-caption aligncenter"><a href="https://publicintelligence.net/wp-content/uploads/2013/11/kerry-dunford-cunningham.jpg"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-32623" class=" wp-image-32623" title="kerry-dunford-cunningham" alt="" src="https://publicintelligence.net/wp-content/uploads/2013/11/kerry-dunford-cunningham.jpg" width="730" height="547" srcset="https://q.publicintelligence.net/wp-content/uploads/2013/11/kerry-dunford-cunningham.jpg 1024w, https://q.publicintelligence.net/wp-content/uploads/2013/11/kerry-dunford-cunningham-300x225.jpg 300w" sizes="auto, (max-width: 730px) 100vw, 730px" /></a><p id="caption-attachment-32623" class="wp-caption-text">U.S. Secretary of State John Kerry speaks with U.S. Marine Corps General Joseph Dunford, as U.S. Ambassador to Afghanistan James Cunningham listens, in Kabul, Afghanistan, March 26, 2013.  Ambassador Cunningham issued the new U.S. Civil-Military Strategic Framework for Afghanistan in August which was signed by General Dunford.  Photo via State Department.</p></div>
<p><strong>Public Intelligence</strong></p>
<p>Afghan President Hamid Karzai&#8217;s recent refusal to sign a bilateral security agreement with the U.S. has fueled a growing sense of frustration and confusion among those charting the future of Afghanistan.  The agreement, which authorizes the continued presence of American troops in Afghanistan beyond 2014, has been described as &#8220;critical to Afghanistan’s future stability.&#8221;  One unnamed Afghan official quoted in a <a href="http://worldnews.nbcnews.com/_news/2013/11/19/21534305-endless-afghanistan-us-afghan-agreement-would-keep-troops-in-place-and-funds-flowing-perhaps-indefinitely">recent report from NBC News</a> said that without the thousands of U.S. troops that are expected to maintain a presence in the country &#8220;the government could collapse and Afghanistan would enter a civil war.&#8221;  Former Ambassador to Afghanistan Ryan Crocker <a href="http://killerapps.foreignpolicy.com/posts/2013/11/20/the_war_in_afghanistan_could_be_lost_this_week">told Foreign Policy</a> that he worries about a lack of &#8220;sustained administration engagement at a high level,&#8221; which has the potential to set the stage for a repeat of &#8220;pretty horrible&#8221; past events, referring to the civil war in the early 1990s that led to the Taliban&#8217;s rise to power.</p>
<p>While Karzai has signaled that he will likely sign the agreement, stating earlier this month that he wants to wait until after the April 2014 presidential elections, he continues to find new reasons for failing to do so, including most recently <a href="http://online.wsj.com/news/articles/SB10001424052702303290904579276470869260680">disagreeing with the U.S. government&#8217;s definition of terrorism</a>.  Assuming the agreement is eventually signed, what does the future actually hold for the Afghan people?  Public Intelligence has obtained the most recent version of the U.S. Civil-Military Strategic Framework for Afghanistan, the second revision of the document dated August 2013, detailing the U.S. government&#8217;s goals and priorities for rebuilding Afghan society.  Issued by the U.S. Ambassador to Afghanistan James Cunningham and signed by the commander of U.S. forces Joseph Dunford, the framework covers U.S. priorities related to governance, the rule of law, socioeconomic development as well as the gradual transfer of authority to the Afghan government.  When compared with a previous version of the framework from March 2012, also obtained by Public Intelligence, the document solidifies the prospect of long-term U.S. involvement in Afghanistan, removing optimistic statements about turnover dates and self-sustaining funding estimates and replacing them with measured assessments reinforcing the notion that U.S. and international forces will be present in Afghanistan far into the next decade.</p>
<p><strong>The Transformation Decade</strong></p>
<p>The U.S. Civil-Military Strategic Framework for Afghanistan has evolved substantially since its first edition, issued by Ambassador Crocker in March 2012.  The document has abandoned much of its original optimism to embrace a more grounded view of the realities of a war-torn developing nation.  The most recent version of the U.S. Strategic Framework, revised in August, places a much greater focus on the process of transferring power to Afghan authorities, emphasizing  &#8220;transition&#8221; as a guiding concept of U.S. operations in the country.  Transition is defined as shifting &#8220;security responsibility for Afghanistan to the Afghan Security Institutions (ASI) and the Afghan National Security Forces (ANSF)&#8221; as well as embracing a &#8220;more traditional diplomatic and development model&#8221; for U.S. efforts.  According to the framework, much of this will be achieved during the so-called &#8220;Transformation Decade,&#8221; a period from 2015-2024 that will see Afghanistan working to reduce its dependence on &#8220;international assistance, improving delivery of government services, and promoting fundamental freedoms and human rights.&#8221;  By 2025, the framework envisions Afghanistan having &#8220;reduced its dependence on international assistance in non-security sectors to levels consistent with other least developed nations,&#8221; increasing &#8220;peace and stability&#8221; through &#8220;effective development&#8221; and improving the &#8220;delivery of government services.&#8221;  By 2030, this transformation will allow Afghanistan to &#8220;emerge as a model of a developing democratic Islamic nation.&#8221;</p>
<p>Despite its optimism, the framework is remarkably frank about its diminishing expectations for Afghanistan, noting that even with &#8220;a strong partnership between the U.S. and Afghanistan, the Transformation Decade will be fraught with challenges&#8221; requiring &#8220;constant evaluation.&#8221;  Even under &#8220;the best of circumstances,&#8221; the framework says &#8220;Afghanistan will continue to be in the category of &#8216;least developed nations&#8217; with high levels of poverty, unemployment, and illiteracy, as well as underdeveloped infrastructure.&#8221;  Moreover, the nation will continue to be threatened by &#8220;non-state actors&#8221; that will decrease stability and challenge the Afghan government&#8217;s capacity to govern.</p>
<p><strong>The Framework&#8217;s Structure</strong></p>
<p>The U.S. Strategic Framework is conceived of as a structure with a foundation and three pillars that support long-term U.S. strategic goals in Afghanistan.  The structure is founded on security, which focuses on &#8220;creating an environment that enables progress in governance, rule of law, and socio-economic development.&#8221;  The process of supporting Afghan security involved a gradual transition over time from operations led by NATO International Security Assistance Force (ISAF) personnel, to partnered combat operations, to the current state &#8220;where ANSF is leading combat operations.&#8221;  This transition has been achieved through a series of &#8220;tranches&#8221; that have involved specific provinces and districts within Afghanistan taking responsibility for the security of their own area the country.  The final tranche was <a href="http://www.stripes.com/news/middle-east/afghan-forces-take-over-responsibility-for-security-from-nato-1.226391">announced in June 2013</a> indicating that all districts have now begun the process of &#8220;security transition.&#8221;</p>
<p>The viability of this transition remains to be seen as U.S. troops have previously voiced concerns about the readiness of Afghan forces.  A 2012 <a href="https://publicintelligence.net/ana-cf-partnership-problems/">survey of several U.S. Army companies</a> stationed in Khost and Paktiya provinces found that nearly half of soldiers surveyed said the Afghan National Army (ANA) had improved little, not much or not at all during their partnership.  Many soldiers cited in the report list Afghan forces&#8217; lack of motivation and rampant illiteracy as factors undermining their training efforts.  Nearly 62% of soldiers responding to the survey said that so-called “ANA-led” missions are rarely or never actually planned and executed by Afghan forces.  One soldier quoted in the survey described how a recent “ANA-led” mission required him to “spoon-feed” his Afghan counterpart the entire operations order and planning.  &#8220;We do the heavy lifting, they put a face on it,&#8221; another soldier said.</p>
<div id="attachment_32901" style="width: 575px" class="wp-caption aligncenter"><a href="https://publicintelligence.net/wp-content/uploads/2013/12/afghan-us-strategic-framework.jpg"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-32901" class=" wp-image-32901" title="afghan-us-strategic-framework" alt="" src="https://publicintelligence.net/wp-content/uploads/2013/12/afghan-us-strategic-framework.jpg" width="565" height="399" /></a><p id="caption-attachment-32901" class="wp-caption-text">A graphic depicting the theoretical structure of the U.S. Civil-Military Strategic Framework for Afghanistan.</p></div>
<p>There are also a number of significant challenges threatening the &#8220;three pillars&#8221; of the U.S. Strategic Framework.  The governance pillar, which is particularly important to the future of Afghanistan, is primarily focused on strengthening the &#8220;Afghan people’s confidence in their government&#8221; by working to enhance its legitimacy and eliminating corruption.  The U.S. hopes to do this by supporting a &#8220;credible&#8221; and &#8220;transparent&#8221; election in 2014, when Afghan President Hamid Karzai will finally be forced to step down from his position.  The U.S. will also work to build Afghan government infrastructure from the ground up, strengthening &#8220;governance architecture and functionality, revenue collection and budget prioritization, execution, and accountability at both the national and sub-national levels, leading to more efficient, effective, and accountable service delivery for all Afghan citizens.&#8221;</p>
<p>Much of the success that will come from strengthening Afghan governance will depend on the second pillar of the U.S. framework: the &#8220;rule of law.&#8221;  This requires that the U.S. and Afghan government work to create a justice system providing access to &#8220;fair, efficient, and transparent justice based on Afghan law and international obligations&#8221; while also minding the &#8220;linkages between formal and customary justice&#8221; currently operating in the country.  The existing structure of Afghan justice is poor after &#8220;over thirty years&#8221; of &#8220;social and political upheavals, corruption, and technical and material deprivation.&#8221;  Afghans have little &#8220;confidence in their governments’ ability to provide fair, efficient, and transparent justice to all citizens&#8221; which discourages &#8220;economic growth by deterring investment and licit business opportunities.&#8221;  The rampant corruption throughout Afghanistan is a significant factor in this lack of trust, enabling a system of informal justice that often exploits &#8220;society’s most vulnerable members,&#8221; delegitimizing the Afghan government and making &#8220;harsh justice more acceptable to many Afghans.&#8221;</p>
<p>The final pillar of the U.S. framework focusing on socioeconomic development will depend largely on the success of U.S. initiatives to strengthen the legal and governance environment in Afghanistan.  A growing economy is described by the framework as increasing &#8220;stability within Afghanistan and the broader region&#8221; by providing jobs as well as &#8220;an adequate tax base to fund government-provided services.&#8221;  Economic growth will help bolster people&#8217;s confidence in the Afghan government, providing for &#8220;healthy and educated Afghans with jobs&#8221; that are able to provide for their families, making them &#8220;less likely to participate in the insurgency.&#8221;  The U.S. hopes that this will be accomplished through support of several key industries in Afghanistan, including telecommunications and extractives.  The original version of the U.S. Strategic Framework from March 2012 places heavy emphasis on the potential for cultivating Afghanistan&#8217;s extractives industry, which has previously been <a href="http://www.reuters.com/article/2010/10/25/us-afghanistan-mining-idUSTRE69O3JP20101025">estimated to be worth trillions of dollars</a>.  &#8220;Development of minerals and hydrocarbons is Afghanistan’s best chance to draw foreign investment and reduce its dependence on foreign assistance,&#8221; the March 2012 version of the framework states.  This development will &#8220;increase demand for the construction of regional rail, road, and energy networks that can generate significant revenue and create jobs.&#8221;  However, it will be at least &#8220;five to ten years&#8221; before the Afghan government begins to &#8220;realize revenue from its significant mineral deposits.&#8221;  In the interim, U.S. policies will support &#8220;trade policy liberalization, commercial law development, customs process reform&#8221; and &#8220;removal of barriers to cross-border trade.&#8221;</p>
<div class="DV-container" id="DV-viewer-816154-us-civil-military-strategic-framework-for"></div>
<p><script type="text/javascript" src="//s3.amazonaws.com/s3.documentcloud.org/viewer/loader.js"></script><script type="text/javascript">// <![CDATA[
DV.load("//www.documentcloud.org/documents/816154-us-civil-military-strategic-framework-for.js", {   width: 730,     height: 1000,     sidebar: false,     container: "#DV-viewer-816154-us-civil-military-strategic-framework-for"   });
// ]]&gt;</script></p>The post <a href="https://publicintelligence.net/us-plan-in-afghanistan/">The U.S. Government’s Diminishing Expectations Plan for Afghanistan</a> first appeared on <a href="https://publicintelligence.net">Public Intelligence</a>.]]></content:encoded>
					
					<wfw:commentRss>https://publicintelligence.net/us-plan-in-afghanistan/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>The Nationwide Network Working to Bring Mobile Biometrics to Your Community</title>
		<link>https://publicintelligence.net/firstnet-in-your-community/</link>
					<comments>https://publicintelligence.net/firstnet-in-your-community/#comments</comments>
		
		<dc:creator><![CDATA[Public Intelligence]]></dc:creator>
		<pubDate>Wed, 18 Dec 2013 02:33:59 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Biometrics]]></category>
		<category><![CDATA[Facial Recognition]]></category>
		<category><![CDATA[FirstNet]]></category>
		<category><![CDATA[Privacy]]></category>
		<guid isPermaLink="false">http://publicintelligence.net/?p=32841</guid>

					<description><![CDATA[<p>A federal law passed in February 2012 to help middle class families by creating jobs and cutting payroll taxes included a section mandating the creation of a nationwide interoperable broadband communications system for law enforcement and first responders. The system, which is being created under the direction of the First Responder Network Authority (FirstNet), seeks to create a nationwide broadband network capable of being used for a variety of law enforcement purposes including remote surveillance, mobile biometric applications like field fingerprint scanning and facial recognition, as well as automated license plate reading. The system is currently in a pilot phase with less than a dozen locations around the country participating in the initial rollout of the FirstNet network. However, comments from FirstNet board members indicate that the future goals of the system include an interoperable network operating in all 56 states and territories of the U.S. that is capable of integration at the state, local and federal level.</p>
<p class="more-link-p">
<a class="btn btn-primary" href="https://publicintelligence.net/firstnet-in-your-community/">Read more &#8594;</a></p>
The post <a href="https://publicintelligence.net/firstnet-in-your-community/">The Nationwide Network Working to Bring Mobile Biometrics to Your Community</a> first appeared on <a href="https://publicintelligence.net">Public Intelligence</a>.]]></description>
										<content:encoded><![CDATA[<div><iframe loading="lazy" src="//www.youtube.com/embed/qo3PhrR8i7M?rel=0&amp;showinfo=0" height="411" width="730" frameborder="0"></iframe><br />
<em>A video from Alcatel-Lucent demonstrating mobile facial recognition technology that would be used with the FirstNet network.</em></div>
<p><strong>Public Intelligence</strong></p>
<p>A federal law passed in February 2012 to help middle class families by creating jobs and cutting payroll taxes included a section mandating the creation of a nationwide interoperable broadband communications system for law enforcement and first responders. The system, which is being created under the direction of the First Responder Network Authority (FirstNet), seeks to create a nationwide broadband network capable of being used for a variety of law enforcement purposes including remote surveillance, mobile biometric applications like field fingerprint scanning and facial recognition, as well as automated license plate reading. The system is currently in a pilot phase with less than a dozen locations around the country participating in the initial rollout of the FirstNet network. However, comments from FirstNet board members indicate that the future goals of the system include an interoperable network operating in all 56 states and territories of the U.S. that is capable of integration at the state, local and federal level.</p>
<p>FirstNet was created by the <a href="http://www.gpo.gov/fdsys/pkg/BILLS-112hr3630enr/pdf/BILLS-112hr3630enr.pdf">Middle Class Tax Relief and Job Creation Act of 2012</a> which mandates the creation of a &#8220;nationwide public safety broadband network&#8221; with a &#8220;nationwide level of interoperability.&#8221; Section 6203 of the Act mandated that a board of experts, in consultation with NIST and the National Telecommunications and Information Administration (NTIA), draft <a href="http://apps.fcc.gov/ecfs/document/view?id=7021919873">minimum technical requirements</a> for the nationwide system. A board of directors comprised of telecommunications executives and law enforcement officials from around the country, including former Secretary of Homeland Security Janet Napolitano, was assembled and <a href="http://www.commerce.gov/news/press-releases/2012/08/20/firstnet-board-members-appointed-acting-us-commerce-secretary-rebecca">announced in August 2012</a>.</p>
<p>The public safety network being created by FirstNet has many positive applications, enabling police, firefighters, paramedics and other first responders to communicate more effectively, increasing coordination of emergency response efforts and increasing situational awareness. The network&#8217;s capabilities could potentially enable <a href="http://www.naco.org/legislation/policies/Documents/Telecommunications%20and%20Technology/2013%20FIRSTNET.pdf">novel applications</a> such as &#8220;enabling firefighters to download blueprints of burning buildings in order to plan their entry route&#8221; or &#8220;allowing emergency medical technicians to remotely access a victim’s medical records from an ambulance.&#8221; However, the network will also enable a number of capabilities that are concerning to privacy advocates including facial recognition technology, mobile iris scanning and fingerprinting devices, automated license plate recognition and much more. These capabilities will be facilitated by a network that is interoperable with federal and state authorities including the FBI, Department of Homeland Security and even the Army National Guard.</p>
<p><strong>What is FirstNet?</strong></p>
<p>FirstNet received <a href="http://www.txdps.state.tx.us/LTE/index.htm">initial funding of over $2 billion</a> as part of the Middle Class Tax Relief and Job Creation Act of 2012. Future stages of the project will eventually be funded through spectrum auctions that are expected to generate approximately $5 billion. The FirstNet network will function in a portion of the frequency spectrum at 7000MHz known as Public Safety Broadband Band 14. The spectrum allocation was <a href="http://urgentcomm.com/public-safety-broadbandfirstnet/fcc-approves-rules-firstnet-spectrum">certified by the FCC in October</a>, paving the way for construction and sales of devices to first responders. The decision was <a href="http://urgentcomm.com/public-safety-broadbandfirstnet/fcc-approves-rules-firstnet-spectrum">hailed by the FCC commissioner Ajit Pai</a> as a first step towards helping &#8220;the equipment market for the 700 MHz public-safety band to develop and for innovation to flourish.&#8221;</p>
<p>There are less than a dozen locations around the country that are currently serving as test sites for FirstNet&#8217;s broadband network, including Mississippi, Colorado, New Jersey, New Mexico, North Carolina and California. These sites were selected because of their participation in the NTIA <a href="http://www.ntia.doc.gov/category/broadband-technology-opportunities-program">Broadband Technology Opportunities Program</a>, which provides billions in dollars in grant money to local communities for broadband projects. In July, FirstNet <a href="http://www.ntia.doc.gov/press-release/2013/firstnet-issues-rfis-technology-nationwide-wireless-broadband-network">issued 17 requests for information</a> covering all aspects related to the construction of the network infrastructure. According to a presentation by FirstNet board member Ed Reynolds in June of this year, FirstNet will have a &#8220;diverse network architecture&#8221; with three main components: multiple terrestrial networks, including both dedicated public safety and commercial networks, mobile satellite systems as well as publicly deployable systems that could be installed in vehicles.</p>
<p style="text-align: left;">Though still in its infancy, FirstNet&#8217;s work towards building an interoperable nationwide network has not been without controversy. In April, a FirstNet board member decried the fledgling organization&#8217;s overreliance on private sector consultants motivated by their own commercial interests. Sheriff Paul Fitzgerald of Story County, Iowa <a href="http://www.politico.com/story/2013/09/firstnet-secrecy-inquiry-97239.html">described FirstNet&#8217;s network</a> as being “developed largely by consultants” with &#8220;board members having a commercial-wireless point of view&#8221; receiving more documentation and having more input over &#8220;board members with a public-safety point of view.&#8221; Fitzgerald also noted his concerns with the organization&#8217;s lack of transparency, saying that certain financial information was not being provided to all board members. &#8220;I worked hand-in-hand with [the] Public Safety Alliance for quite some time to see this network created, and I will not sit by and watch it built by my industry board-member colleagues in accordance with their commercial vision, rather than the vision of the public-safety users of the public-safety broadband network,&#8221; Fitzgerald said in a <a href="http://urgentcomm.com/ntiafirstnet/sheriff-paul-fitzgerald-s-statement-april-23-2013-meeting-firstnet-board">statement to his fellow board members</a>.</p>
<p><strong>Introducing Mobile Biometrics<br />
</strong></p>
<p>The creation of the FirstNet network is primarily intended to enable communication between first responder entities including police, medical response, firefighters. The system is intended to facilitate interoperable communication during disasters, mass casualty events and other catastrophic situations that could threaten traditional communications systems, such as the land mobile radio (LMR) systems currently used by emergency services. However, the broadband capabilities of the FirstNet network, based on the 4G LTE standard, enable entirely new applications of wireless technology for law enforcement. The high bandwidth network&#8217;s powerful capabilities enabling large file transfers and remote database access are already being explored by a number of companies seeking to create the next generation of law enforcement technology.</p>
<p>One of the primary focus areas for companies seeking to exploit FirstNet&#8217;s capabilities is mobile biometrics. Until now, biometric identification using fingerprints or iris scans has remained a tool limited to the context of active war zones or high-security government facilities. FirstNet&#8217;s broadband network is set to change this by enabling police around the country to use mobile biometric devices to scan the fingerprints of suspects, scan their irises or even match their face against a central database of criminal mugshots. Promotional materials for FirstNet <a href="http://www.ntia.doc.gov/files/ntia/publications/atis_ed_reynolds_06142013_final.pdf">explicitly list</a> the use of facial recognition technology and other biometric identification techniques as part of the &#8220;vision&#8221; and &#8220;promise&#8221; of the national network they are building. FirstNet lists the use of &#8220;specialized applications that allow police to quickly identify criminal suspects and accident victims through technologies such as facial recognition, iris scanning, and fingerprint identification&#8221; on the <a href="http://www.ntia.doc.gov/files/ntia/publications/firstnet_prospectus_-_final.pdf">first page of its recruitment prospectus</a>.</p>
<div id="attachment_32850" style="width: 740px" class="wp-caption aligncenter"><a href="https://publicintelligence.net/wp-content/uploads/2013/11/firstnet-promise.png"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-32850" class=" wp-image-32850" title="firstnet-promise" alt="" src="https://publicintelligence.net/wp-content/uploads/2013/11/firstnet-promise-1024x767.png" width="730" height="546" srcset="https://q.publicintelligence.net/wp-content/uploads/2013/11/firstnet-promise-1024x767.png 1024w, https://q.publicintelligence.net/wp-content/uploads/2013/11/firstnet-promise-300x224.png 300w, https://q.publicintelligence.net/wp-content/uploads/2013/11/firstnet-promise.png 1091w" sizes="auto, (max-width: 730px) 100vw, 730px" /></a><p id="caption-attachment-32850" class="wp-caption-text">A presentation slide describing potential future applications of FirstNet&#8217;s nationwide broadband network.</p></div>
<p>With the advent of the distributed data network created by FirstNet, law enforcement throughout the U.S. will soon have access to the same capabilities currently used in Afghanistan to track and monitor the population. A <a href="https://publicintelligence.net/sandia-mobile-biometrics/">study released in June 2013</a> by Sandia National Laboratories and co-sponsored by the Department of Homeland Security Science and Technology Directorate (DHS S&amp;T) sponsored a series of &#8220;pilot projects&#8221; to obtain information and feedback from the &#8220;first responder law enforcement community on further identification of requirements for mobile biometric device technology.&#8221; The study involved 62 jurisdictions around the country with many testing the very same devices currently used by U.S. forces in Afghanistan, such as the <a href="http://www.crossmatch.com/seekII.php">SEEK II made by CrossMatch Technologies</a> and the <a href="http://www.morphotrust.com/files/591-HIIDE5_0810.pdf">HIIDE 5 made by MorphoTrust</a>. According to the study&#8217;s conclusions, mobile biometric devices (MBDs) are currently used only in a limited number of jurisdictions in the U.S. that rely on &#8220;intermediate communication links and Wi-Fi proximity to either Blackberries or patrol car mobile data terminals.&#8221; FirstNet&#8217;s capabilities would expand this reach to enable any police department in the country to implement or expand the use of MBDs, something the study says many departments want to do. This includes &#8220;technologies for subject/suspect/detainee enrollment in the field&#8221; which is currently of &#8220;definite interest&#8221; to a number of law enforcement and first responder stakeholders who &#8220;have also identified a need for a truly integrated MBD that uses fingerprint, facial recognition, iris recognition, and voice recognition technologies.&#8221;</p>
<p><strong>The Future of Crime Fighting</strong></p>
<p>While still years away, the promise of advanced law enforcement technologies made possible by FirstNet&#8217;s broadband network has driven a number of companies to begin capitalizing on what they hope will someday be a lucrative market.  At the 2013 International Wireless Communications Expo, Alcatel-Lucent demonstrated mobile biometric technologies for facial recognition that would rely on FirstNet&#8217;s broadband network.  Through the company&#8217;s <a href="http://www.ngconnect.org/program/service-concepts/pub-safe.htm">ng Connect Public Safety Program</a>, Alcatel-Lucent is building a coalition of companies that focus in facial recognition, location tracking using GPS and other law enforcement technologies facilitated by the &#8220;commercial deployment of an all IP Network (4G LTE) with high bandwidth and low latency&#8221; known as FirstNet.  Touting the U.S. government&#8217;s allocation of $7 billion for the construction of FirstNet, an infographic created by Alcatel-Lucent proudly displays the estimated annual value of the U.S. homeland security and public safety market at over $100 billion by 2020.  The nG Connect Public Safety Program combines the expertise of several companies to redefine the &#8220;art of the possible&#8221; by building applications that help law enforcement to incorporate &#8220;award winning tracking solutions for fleet management and leading edge law enforcement surveillance and covert operations capabilities&#8221; as well as &#8220;proprietary recognition engines for analysis of video streams to identify &#8216;people of interest&#8217; by biometric and personal characteristics.&#8221;</p>
<div><iframe loading="lazy" src="//www.youtube.com/embed/IblfZzQ1BtE?rel=0amp;showinfo=0" height="411" width="730" frameborder="0"></iframe><br />
<em>A short video from EclipseIR, part of Alcatel-Lucent&#8217;s ng Connect Public Safety program working to create applications that would leverage FirstNet&#8217;s high-bandwidth data transfer capabilities.</em></div>
<p>Mutualink, another company working to leverage FirstNet&#8217;s capabilities, is taking the concept of mobile biometrics one step further with its Google Glass for Public Safety.  &#8220;Robocop may not be real, but his efficiency is something worth aspiring to,&#8221; begins <a href="http://www.govtech.com/public-safety/Can-Google-Glass-Help-First-Responders.html">an article about the product</a> published in <em>Government Technology</em>.  The technology will integrate with the Google Glass heads up display to allow users to &#8220;look to the right in their peripheral vision and view information that is being served to them, like maps, blueprints, surveillance video feeds, or other documents.&#8221;  According to Mutualink&#8217;s Senior Vice President Joe Mazzarella, the technology could be &#8220;very useful for first responders and soldiers alike.&#8221;  An <a href="http://www.policeone.com/police-products/communications/articles/6412068-The-first-police-application-for-Google-Glass/">article in the law enforcement publication PoliceOne.com</a> provides examples of potential applications for the Google Glass for Public Safety, suggesting an &#8220;officer interviewing a suspected gang member could run the suspect’s image through a facial recognition database of known gangsters, or pull up a photo record of a tattoo to compare against one on the person in front of them.&#8221;  During a search of a building, officers could &#8220;see their own location and those of everyone else involved in the effort on a stored floor plan of the structure&#8221; or, as a <a href="http://mutualink.net/Mutualink-Unveils-Google-Glass-for-Public-Safety.asp">Mutualink press release</a> states, they could &#8220;watch video feed from school security cameras in real-time during an active shooter scenario.&#8221;</p>
<p>A <a href="http://www.ntia.doc.gov/files/ntia/publications/regional_workshop_vision_denver.pdf">presentation</a> from the acting Chief Technology Officer of FirstNet Craig Farrill at a regional workshop in May 2013 indicates that FirstNet intends to foster a &#8220;vibrant developer community contributing useful apps for first responders.&#8221;  These applications would be vetted by FirstNet prior to being offered for download to devices on the broadband network, something like an iTunes for law enforcement and first responders.  Similar plans were discussed in a <a href="https://publicintelligence.net/criminal-intelligence-enterprise/">prospectus issued by the Major Cities Chiefs’ Association in 2012</a> which called for the creation of a &#8220;secure, socially driven interface&#8221; resembling Facebook to enable &#8220;state and local intelligence and counterterrorism personnel to effectively network,&#8221; allowing &#8220;a detective in Las Vegas . . . to securely customize a profile page, build a network of ‘friends’ who are in fact colleagues in other agencies, and network by sharing nonsensitive information through wall posts, messages, and status updates . . .&#8221;  In June, Bill Bratton, who has headed police departments in Boston, New York and Los Angeles, <a href="http://www.reuters.com/article/2013/06/29/usa-police-socialmedia-idUSL2N0F502P20130629">announced the creation</a> of BlueLine, described as a &#8220;Facebook for cops&#8221; that is &#8220;geared toward collaboration on policing issues like gangs or drugs and product and technology advances.&#8221;  The network will reportedly be funded through law enforcement product sales including everything from &#8220;from socks to Glocks&#8221; according to the project&#8217;s Chief Strategy Officer Jack Weiss.</p>
<p><strong>Local Interest in Mobile Biometrics<br />
</strong></p>
<p>Though adoption of many of the advanced technologies made possible by FirstNet&#8217;s broadband network will ultimately remain up to local municipalities, several local jurisdictions have already expressed interest in mobile biometrics and other applications.  At a meeting in August, the Bay Area Regional Interoperable Communications Systems Authority (BayRICS), a joint powers authority of 12 counties throughout the San Francisco Bay Area, <a href="https://publicintelligence.net/bayrics-overview/">used a slide from FirstNet</a> describing facial recognition, field fingerprinting and automated license plate reading as part of the &#8220;promise of broadband&#8221; coming soon to the area.</p>
<p>Likewise, an Oregon Statewide Interoperability Coordination technical report issued in December 2012 titled &#8220;<a href="http://www.oregon.gov/SIEC/Docs/Supplementals/2012.12_OPSBN_Planning.for.FirstNet.pdf">Planning for FirstNet</a>&#8221; discusses introducing a number of &#8220;labor saving applications incorporating license plate recognition, scanning of driver licenses, facial recognition, and other advanced technologies&#8221; once the FirstNet broadband network is operational.  A section of the report listing public safety broadband applications includes remote access to database including &#8220;mug shots, finger prints, reporting, NCIC, criminal history, hot files&#8221; as well as &#8220;video surveillance, remote monitoring&#8221; and &#8220;automated license plate recognition.&#8221;  A press release issued in February by the Texas Department of Public Safety titled &#8220;<a href="http://www.connectmi.org/blog/post/firstnet-ready-boost-texas-public-safety">FirstNet Ready to Boost Texas Public Safety</a>&#8221; states that the network will not only &#8220;give emergency responders a common and instant connection, it will allow them to share information through automatic license plate readers, facial recognition systems, field fingerprint analysis processers and much more.&#8221;</p>
<p>The National Association of Counties even <a href="http://www.naco.org/legislation/policies/Documents/Telecommunications%20and%20Technology/2013%20FIRSTNET.pdf">issued a policy brief</a> in June 2013 advising counties that it is &#8220;imperative&#8221; that they &#8220;engage in the consultation process and actively seek out the designated state coordinator&#8221; to take advantage of the more than &#8220;$7 billion of spectrum auction proceeds and valuable spectrum bandwidth toward deployment of the nationwide network&#8221; as well as $135 million allocated by Congress for a new &#8220;State and Local Implementation Grant Program administered by NTIA to support State, regional, tribal and local jurisdictions’ planning work with FirstNet.&#8221;  The network is described in the brief as working to provide a &#8220;secure and interoperable network&#8221; that will &#8220;also support cutting-edge applications – for example, enabling firefighters to download blueprints of burning buildings in order to plan their entry route, allowing emergency medical technicians to remotely access a victim’s medical records from an ambulance, or helping police to identify criminal suspects through facial recognition or iris scanning technologies.&#8221;</p>The post <a href="https://publicintelligence.net/firstnet-in-your-community/">The Nationwide Network Working to Bring Mobile Biometrics to Your Community</a> first appeared on <a href="https://publicintelligence.net">Public Intelligence</a>.]]></content:encoded>
					
					<wfw:commentRss>https://publicintelligence.net/firstnet-in-your-community/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>Joint Chiefs of Staff Instruction Modifies Language on Collateral Damage Estimates for Drone Strikes</title>
		<link>https://publicintelligence.net/collateral-damage-from-drone-strikes/</link>
					<comments>https://publicintelligence.net/collateral-damage-from-drone-strikes/#respond</comments>
		
		<dc:creator><![CDATA[Public Intelligence]]></dc:creator>
		<pubDate>Fri, 15 Nov 2013 00:34:29 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Collateral Damage]]></category>
		<category><![CDATA[Drones]]></category>
		<category><![CDATA[Joint Chiefs of Staff]]></category>
		<guid isPermaLink="false">http://publicintelligence.net/?p=32451</guid>

					<description><![CDATA[<p>An updated instruction issued by the Chairman of the Joint Chiefs of Staff in October 2012 incorporates significantly modified language in numerous sections of the document that describe the process for estimating collateral damage prior to conducting drone strikes and other military actions.  These subtle, but important changes in wording provide insight into the military's attempts to limit expectations in regards to minimizing collateral damage and predicting the lethal effects of military operations.</p>
<p class="more-link-p">
<a class="btn btn-primary" href="https://publicintelligence.net/collateral-damage-from-drone-strikes/">Read more &#8594;</a></p>
The post <a href="https://publicintelligence.net/collateral-damage-from-drone-strikes/">Joint Chiefs of Staff Instruction Modifies Language on Collateral Damage Estimates for Drone Strikes</a> first appeared on <a href="https://publicintelligence.net">Public Intelligence</a>.]]></description>
										<content:encoded><![CDATA[<div id="attachment_32598" style="width: 705px" class="wp-caption aligncenter"><a href="https://publicintelligence.net/wp-content/uploads/2013/11/3160_01.jpg"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-32598" class=" wp-image-32598" title="3160_01" alt="" src="https://publicintelligence.net/wp-content/uploads/2013/11/3160_01.jpg" width="695" height="328" srcset="https://q.publicintelligence.net/wp-content/uploads/2013/11/3160_01.jpg 677w, https://q.publicintelligence.net/wp-content/uploads/2013/11/3160_01-300x141.jpg 300w" sizes="auto, (max-width: 695px) 100vw, 695px" /></a><p id="caption-attachment-32598" class="wp-caption-text">A chart from Chairman of the Joint Chiefs of Staff Instruction 3160.01A depicts collateral damage estimation levels and their representative risk to overall operations.</p></div>
<p><strong>Public Intelligence</strong></p>
<p>An updated instruction issued by the Chairman of the Joint Chiefs of Staff in October 2012 incorporates significantly modified language in numerous sections of the document that describe the process for estimating collateral damage prior to conducting drone strikes and other military actions.  These subtle, but important changes in wording provide insight into the military&#8217;s attempts to limit expectations in regards to minimizing collateral damage and predicting the lethal effects of military operations.</p>
<p>The update to Chairman of the Joint Chiefs of Staff Instruction (CJCSI) 3160.01A &#8220;<a href="https://publicintelligence.net/cjcs-collateral-damage/">No-Strike and the Collateral Damage Estimation Methodology</a>&#8221; incorporates technical updates to the process for estimating collateral damage as well as lessons learned from the conflicts in Libya and Afghanistan.  Despite its release restrictions, a <a href="https://www.aclu.org/files/dronefoia/dod/drone_dod_3160_01.pdf">previous version of the instruction was provided in full to the ACLU</a> in 2011 after the group filed a Freedom of Information Act request for documents related to the military&#8217;s use of armed drones.  The version of the instruction obtained by the ACLU, which is dated February 2009, contains significantly different language in numerous key sections of the document that describe the accuracy and processes for predicting collateral damage.</p>
<p>While much of the actual technical methodology for predicting collateral damage remains unchanged, language throughout the document is modified in a way that minimizes expectations about the ability of U.S. forces to accurately predict collateral damage and includes qualifying statements regarding the compliance of U.S. military operations with international law.  In a section of the document detailing procedures related to no-strike entities (NSEs), which have &#8220;protected status&#8221; and cannot be targeted in military operations, the new version of the instruction no longer describes the U.S. as &#8220;adhering to&#8221; international law, but instead states that the U.S. is &#8220;bound by&#8221; international law which &#8220;regulates&#8221;, rather than &#8220;requires&#8221; certain conduct during military operations.  A few paragraphs later, a sentence warning against the &#8220;infliction of unnecessary suffering or damage to civilian persons or property that is excessive in relation to the concrete and direct military advantage anticipated&#8221; is removed from the document, as is the statement that the conduct is &#8220;inconsistent with international law.&#8221;  A section requiring &#8220;all military personnel to take reasonable precautions to ensure that only military objectives are targeted&#8221; and <em>ensure</em> that civilians are not made the object of attack is changed to require only that military personnel &#8220;avoid targeting (i.e., attacking) civilian or noncombatant persons or objects.&#8221;</p>
<p>The new version of the instruction also modifies a requirement that commanders <em>limit</em> &#8220;unnecessary suffering and disproportionate damage.&#8221;  Instead, commanders are now only required to <em>mitigate</em> &#8220;human suffering and property damage.&#8221;  The overall process for estimating collateral damage is described as &#8220;a conservative characterization&#8221; of the risks involved rather than the previous &#8220;best judgment of potential damage to collateral concerns.&#8221;  Several additions are also made in the new version of the instruction including an allowance for &#8220;weapon delivery uncertainties&#8221; and a statement indicating that U.S. forces are not responsible for &#8220;secondary explosions&#8221; from fuel or other supplies on the ground.</p>
<p>A small selection of some of the differences between the two versions of the instruction is included in the table below.  Blue indicates text modified from the previous version of the instruction.  Red indicates text that was inserted into the new version of the instruction.</p>
<table width="565">
<tbody>
<tr>
<td style="text-align: center;"><strong>Old Version</strong><br />
February 13, 2009</td>
<td style="text-align: center;"><strong>New Version</strong><br />
October 12, 2012</td>
<td style="text-align: center;"><strong>Changes</strong></td>
</tr>
<tr valign="top">
<td style="text-align: justify;">The <span style="color: blue;">source and method</span> for defining a person, place, or thing as a No-Strike entity is derived primarily from the body of international law collectively known as LOW. <span style="color: blue;">The LOW incorporates international treaties and agreements adhered to by the U.S. government, as well as customary international law, into a comprehensive set of guidance and requirements governing the conduct of modern warfare.</span></td>
<td style="text-align: justify;">The <span style="color: red;">basis</span> for defining a person, place, or thing as a No-Strike entity is derived primarily from the body of international law collectively known as LOW. <span style="color: red;">LOW comprises the international law related to the conduct of hostilities binding on the United States or its individual citizens, including treaties to which the United States is a party and applicable customary international law that regulates the conduct of armed hostilities.</span></td>
<td style="text-align: justify;">Law of war is now the &#8220;basis&#8221; for defining no-strike entities rather than the source.  The law of war is defined as international law &#8220;binding&#8221; rather than &#8220;adhered to&#8221; by the U.S. This includes treaties and &#8220;customary international law&#8221; that &#8220;regulates&#8221; rather than &#8220;requires&#8221; certain actions when conducting military activity.</td>
</tr>
<tr valign="top">
<td style="text-align: justify;">No-Strike entities are those designated by the appropriate authority upon which kinetic or non-kinetic operations are prohibited to avoid violating international law, <span style="color: blue;">conventions,</span> or agreements, or damaging relations with coalition partners and indigenous populations. <span style="color: blue;">The infliction of unnecessary suffering or damage to civilian persons or property that is excessive in relation to the concrete and direct military advantage anticipated is inconsistent with international law and is contrary to DOD policy outlined in this document and in references a and b.</span></td>
<td style="text-align: justify;">No-Strike entities are those designated by the appropriate authority upon which kinetic or non-kinetic operations are prohibited to avoid violating international law, or agreements, or damaging relations with coalition partners and indigenous populations.</td>
<td style="text-align: justify;">The new version removes &#8220;conventions&#8221; from a list of things to avoid violating.  An entire sentence prohibiting the infliction of &#8220;unnecessary suffering or damage to civilian persons or property&#8221; is removed, as well as the statement that this is &#8220;inconsistent with international law&#8221; and &#8220;contrary to DOD policy.&#8221;</td>
</tr>
<tr valign="top">
<td style="text-align: justify;">The LOW requires all military personnel to take reasonable precautions to ensure that only military objectives are targeted and to <span style="color: blue;">ensure that civilian or noncombatant objects are not made the object of attack.</span></td>
<td style="text-align: justify;">The LOW requires all military personnel to take reasonable precautions to ensure that only military objectives are targeted and to <span style="color: red;">avoid targeting (i.e., attacking) civilian or noncombatant persons or objects.</span></td>
<td style="text-align: justify;">A requirement to &#8220;ensure&#8221; that civilians are not the subject of attacks is changed to an admonishment to &#8220;avoid targeting&#8221; civilians.</td>
</tr>
<tr valign="top">
<td style="text-align: justify;">However, in these circumstances the commander must weigh the anticipated loss of life, damage to property, or other negative effects incidental to the attack versus the military advantage expected to be gained by the attack. <span style="color: blue;">In making the decision, commanders must consider the military necessity for attacking the target, proportionality of the means planned for target engagement, and reasonableness within the framework of operational objectives.</span></td>
<td style="text-align: justify;">However, in these circumstances the commander must weigh the anticipated loss of life, damage to property, or other negative effects incidental to the attack versus the military advantage expected to be gained by the attack. <span style="color: red;">The anticipated injury or loss of civilian or noncombatant life, damage to civilian or noncombatant property, or any combination thereof, incidental to attacks must not be excessive in relation to the concrete and direct military advantage expected to be gained.</span></td>
<td style="text-align: justify;">When making the decision to attack a location where collateral damage is likely, the commander is no longer told to consider &#8220;proportionality&#8221; and &#8220;reasonableness within the framework of objectives&#8221;, but is instead required to ensure that loss of civilian or noncombatant life or property is &#8220;not excessive&#8221; in relation to the &#8220;concrete and direct military advantage expected to be gained&#8221; by the attack.</td>
</tr>
<tr valign="top">
<td style="text-align: justify;">By <span style="color: blue;">limiting unnecessary</span> suffering and <span style="color: blue;">disproportionate</span> damage, the No-Strike process will accelerate recovery in post-conflict operations and minimize operational limitations routinely imposed as a result of international sensitivities over the humanitarian impacts of military operations.</td>
<td style="text-align: justify;">By <span style="color: red;">mitigating human</span> suffering and <span style="color: red;">property</span> damage, the No-Strike process will accelerate recovery in post-conflict operations and minimize operational limitations routinely imposed as a result of international sensitivities over the humanitarian impacts of military operations.</td>
<td style="text-align: justify;">A commander&#8217;s &#8220;limiting&#8221; of &#8220;unnecessary&#8221; suffering is now only a requirement to  &#8220;mitigate human suffering&#8221; and property damage.</td>
</tr>
<tr valign="top">
<td style="text-align: justify;">Failure to observe these obligations <span style="color: blue;">could result in disproportionate negative effects on civilians and noncombatants</span> and be considered a LOW violation. Furthermore, <span style="color: blue;">U.S. leadership and military</span> could be subject to global criticism, which could adversely impact military objectives, alliances, partnerships, or national goals.</td>
<td style="text-align: justify;">Failure to observe these obligations <span style="color: red;">would</span> be considered a LOW violation. Furthermore, the <span style="color: red;">United States</span> could be subject to global criticism, which could adversely impact military objectives, alliances, partnerships, or national goals.</td>
<td style="text-align: justify;">A statement that collateral damage could &#8220;result in disproportionate negative effects on civilians and noncombatants&#8221; is now no longer included.  Global criticism in such a circumstance would also be leveled at the U.S. generally rather than the &#8220;U.S. leadership and military.&#8221;</td>
</tr>
<tr valign="top">
<td style="text-align: justify;">The CDM is a balance of science and art that produces <span style="color: blue;">the best judgment of potential damage to collateral concerns.</span></td>
<td style="text-align: justify;">The CDM is a balance of science and art that produces <span style="color: red;">a conservative characterization of the risk of collateral damage for commanders and decision makers.</span></td>
<td style="text-align: justify;">The collateral damage estimation (CDE) methodology (CDM) has changed from a &#8220;best judgment of potential damage&#8221; to a &#8220;conservative characterization of the risk of collateral damage&#8221;.</td>
</tr>
<tr valign="top">
<td style="text-align: justify;">However, the science is inherently limited by the quantity and reliability of collected and analyzed weapons effects data and target information.</td>
<td style="text-align: justify;">However, the science is inherently limited by the quantity and reliability of collected and analyzed weapons effects data, <span style="color: red;">weapon delivery uncertainties,</span> and target information.</td>
<td style="text-align: justify;">The new version inserts &#8220;weapon delivery uncertainties&#8221; into a list of factors affecting collateral damage estimation.</td>
</tr>
<tr valign="top">
<td style="text-align: justify;">All of these sources contain some degree of inherent <span style="color: blue;">error and uncertainty</span>.</td>
<td style="text-align: justify;">All of these sources contain some degree of inherent <span style="color: red;">variability</span>.</td>
<td style="text-align: justify;">Sources of information that feed into the collateral damage estimation process are no longer subject to some degree of &#8220;error and uncertainty&#8221;, but are instead subject to &#8220;variability.&#8221;</td>
</tr>
<tr valign="top">
<td style="text-align: justify;"><span style="color: blue;">CDM is merely an estimate to assist a commander in the decision making process relying on informed data and sound judgment.</span></td>
<td style="text-align: justify;"><span style="color: red;">Ultimately CDE is an estimative process to help inform a commander’s decision making.</span></td>
<td style="text-align: justify;">An entire sentence is changed to reflect that attempting to predict collateral damage is an &#8220;estimative process&#8221; rather than an &#8220;estimate&#8221; to &#8220;help inform the commander&#8217;s decision making.&#8221;  A description of this process as &#8220;relying on informed data and sound judgment&#8221; is also removed.</td>
</tr>
<tr valign="top">
<td></td>
<td style="text-align: justify;"><span style="color: red;">The CDM does not account for secondary explosions. Collateral damage due to secondary explosions (i.e., weapons cache or fuel tanks for military equipment) cannot be consistently measured or predicted. Commanders should remain cognizant of any additional risk due to secondary explosions.</span></td>
<td style="text-align: justify;">A passage is inserted indicating the collateral damage estimation methodology (CDM) does not apply to secondary explosions from gas and fuel tanks on the ground.</td>
</tr>
</tbody>
</table>
<p></p>
<div class="DV-container" id="DV-viewer-834367-chairman-of-the-joint-chiefs-of-staff"></div>
<p><script type="text/javascript" src="//s3.amazonaws.com/s3.documentcloud.org/viewer/loader.js"></script><script type="text/javascript">// <![CDATA[
DV.load("//www.documentcloud.org/documents/834367-chairman-of-the-joint-chiefs-of-staff.js", {   width: 730,     height: 1000,     sidebar: false,     container: "#DV-viewer-834367-chairman-of-the-joint-chiefs-of-staff"   });
// ]]&gt;</script></p>The post <a href="https://publicintelligence.net/collateral-damage-from-drone-strikes/">Joint Chiefs of Staff Instruction Modifies Language on Collateral Damage Estimates for Drone Strikes</a> first appeared on <a href="https://publicintelligence.net">Public Intelligence</a>.]]></content:encoded>
					
					<wfw:commentRss>https://publicintelligence.net/collateral-damage-from-drone-strikes/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Trying to Understand School Shootings</title>
		<link>https://publicintelligence.net/understanding-school-shootings/</link>
					<comments>https://publicintelligence.net/understanding-school-shootings/#comments</comments>
		
		<dc:creator><![CDATA[Public Intelligence]]></dc:creator>
		<pubDate>Tue, 22 Oct 2013 21:07:06 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Fusion Centers]]></category>
		<category><![CDATA[Mass Shootings]]></category>
		<category><![CDATA[School shooter]]></category>
		<guid isPermaLink="false">http://publicintelligence.net/?p=32426</guid>

					<description><![CDATA[<p>A statistical analysis of school shootings released in August by the Los Angeles Joint Regional Intelligence Center (LAJRIC) studied school shootings throughout the U.S. from January 2008 to August 2013. In that five-year span, there were 85 school shootings that took place in 29 states, a majority of the country, with most states experiencing between one and three incidents over the last five years. California ranked highest with 18 incidents, followed by Michigan and Tennessee. The majority of school shootings, about 52%, took place at high schools, with the rest equally distributed between colleges/universities and elementary/middle schools.</p>
<p class="more-link-p">
<a class="btn btn-primary" href="https://publicintelligence.net/understanding-school-shootings/">Read more &#8594;</a></p>
The post <a href="https://publicintelligence.net/understanding-school-shootings/">Trying to Understand School Shootings</a> first appeared on <a href="https://publicintelligence.net">Public Intelligence</a>.]]></description>
										<content:encoded><![CDATA[<div id="attachment_32430" style="width: 649px" class="wp-caption aligncenter"><a href="https://publicintelligence.net/wp-content/uploads/2013/10/school-shootings-map.gif"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-32430" class=" wp-image-32430" title="school-shootings-map" alt="" src="https://publicintelligence.net/wp-content/uploads/2013/10/school-shootings-map.gif" width="639" height="354" srcset="https://q.publicintelligence.net/wp-content/uploads/2013/10/school-shootings-map.gif 621w, https://q.publicintelligence.net/wp-content/uploads/2013/10/school-shootings-map-300x166.gif 300w" sizes="auto, (max-width: 639px) 100vw, 639px" /></a><p id="caption-attachment-32430" class="wp-caption-text">A map of school shootings throughout the U.S. from January 2008-August 2013 included in a report from the Los Angeles Joint Regional Intelligence Center.</p></div>
<p><strong>Public Intelligence</strong></p>
<p>Law enforcement has <a href="https://publicintelligence.net/fusion-centers-struggle-to-respond/">struggled</a> in recent years with the issue of mass shootings and how to provide the public with adequate ways to detect and possibly catch shooters before they strike. School shootings, in particular, have vexed criminal analysts trying to help school officials ensure the safety of their students by identifying at-risk individuals that might engage in acts of violence. This has led to some strange and seemingly arbitrary speculations about the nature of school shooters.</p>
<p>A 2009 document released by the FBI and the National Center for the Analysis of Violent Crime titled &#8220;<a href="https://publicintelligence.net/fbi-the-school-shooter-a-quick-reference-guide/">The School Shooter: A Quick Reference Guide</a>&#8221; is one example of this sort of speculation. The guide warns that &#8220;repeated viewing of movies depicting school shootings&#8221; such as Zero Day and Elephant could indicate a fascination with school shootings. According to the guide, school shooters often exhibit &#8220;violence in their own writings, poems, essays, and journal entries&#8221; and have an interest in violent movies. Law enforcement and school officials concerned about a student are encouraged to monitor the subject&#8217;s online videos, blogs, and social networking activities to look for signs of grief and desperation.</p>
<p>Another guide <a href="https://publicintelligence.net/regional-organized-crime-information-center-active-shooter-guide/">produced in 2006 by the Regional Organized Crime Information Center</a> contained similarly broad and speculative observations that could likely be applied to large swaths of the student body at your local high school. In a section on &#8220;warning signs&#8221; of a school shooter, the guide lists an &#8220;attitude of superiority&#8221; and &#8220;exaggerated sense of entitlement.&#8221; The guide goes on to say that school shooters are often &#8220;fans of violent media, especially first-person shooter games&#8221; and &#8220;social outcasts who pride themselves on exclusion from popular circles.&#8221;</p>
<p><strong>Analyzing School Shootings</strong></p>
<p>Moving away from these basic speculations, law enforcement has expanded its efforts to embrace statistical analysis in the hopes of discovering common attributes among school shooters and mass shootings generally. Over the last year, fusion centers in several states have released studies, deriving useful information from aggregate analysis that can actually help the public understand the phenomenon of school shootings and what drives people to engage in this sort of seemingly random violence.</p>
<p>A statistical analysis of school shootings released in August by the Los Angeles Joint Regional Intelligence Center (LAJRIC) studied school shootings throughout the U.S. from January 2008 to August 2013. In that five-year span, there were 85 school shootings that took place in 29 states, a majority of the country, with most states experiencing between one and three incidents over the last five years. California ranked highest with 18 incidents, followed by Michigan and Tennessee. The majority of school shootings, about 52%, took place at high schools, with the rest equally distributed between colleges/universities and elementary/middle schools.</p>
<div style="width: 555px" class="wp-caption aligncenter"><a href="https://publicintelligence.net/wp-content/uploads/2013/10/school-shootings-analysis-3.png"><img loading="lazy" decoding="async" title="school-shootings-analysis-3" alt="" src="https://publicintelligence.net/wp-content/uploads/2013/10/school-shootings-analysis-3.png" width="545" height="339" /></a><p class="wp-caption-text">A chart from the Los Angeles Joint Regional Intelligence Center study of school shooting incidents from January 2008-August 2013 depicts motivations for school shooters.</p></div>
<p>These shootings were perpetrated by 97 people, almost entirely male, with only 4% being perpetrated by females. Most of the shootings involved the use of small arms and only 11% involved the use of multiple weapons. Less than half of the shootings (46%) were committed by current or former students at the school and only 8% were committed by current or former employees. Significantly, at least 40% of school shooters during the five-year period had no connection to the school where the attack occurred.</p>
<p>Half of the victims of school shootings were intentionally targeted by the gunman with only 21% being killed or wounded due to indiscriminate gunfire. In 57% of the incidents the perpetrator directly knew the victims. The majority of the perpetrators were between 16‐18 years old (31%) with the second largest group being 13‐15 year old (23%). Demographics and motivations for school shooters vary widely, with most being perpetrated for unknown reasons. Gang-related shootings happening in and around school campuses account for nearly three-times the amount of incidents as murders/suicides and retaliation for bullying. In fact, only 27% of school shooters commit suicide or are killed by authorities. Most school shooters (61%) end up being arrested after having killed one or more victims.</p>
<p><strong>Digging Deeper</strong></p>
<p>A similar <a href="https://publicintelligence.net/ma-school-shootings/">report released in March by the Massachusetts Commonwealth Fusion Center (CFC)</a> studied school shootings from 1992-2012, obtaining significantly different results from the study conducted by LAJRIC due to the use of more stringent criteria. The CFC study found that 80% of school shooters were current or former students at the targeted school, as opposed to the figure of 40% in LAJRIC&#8217;s report. CFC found that 40% of perpetrators used two or more weapons and that 43% entered the building normally with their weapons concealed. According to the CFC&#8217;s findings, most school shootings (42%) occur in the morning between 7-11:30 AM. One particularly interesting finding from the CFC report is the high number of victims from a few specific incidents versus the relatively low number of victims from most school shootings. Though 87% of incidents resulted in 0-3 fatalities, CFC found that three incidents accounted for 45% of all fatalities during the period.</p>
<p>The CFC report notes that a history of mental health issues was cited in 28% of school shootings as a motivating factor. Other common motivations include &#8220;difficulty coping with significant losses or personal failures&#8221; or specific grievances, including bullying. Both the CFC report as well as an <a href="https://publicintelligence.net/njroic-school-shootings/">analysis released last year by the New Jersey Regional Operations Intelligence Center</a> (NJROIC) found that school shooters often indicate their intentions to others prior to the incident. The CFC found that in 33% of incidents one or more people knew directly of some aspect of the perpetrator&#8217;s intentions through direct statements or online posts using social media. The NJROIC analysis states that &#8220;the majority of students who have conducted plots or attacks against their schools have publicized their anger or intentions through the use of social media&#8221; and provides several examples of school shootings that followed online threats. For example, the perpetrator of a 2011 school shooting in Omaha, Nebraska that resulted in the death of a school administrator <a href="http://www.cbsnews.com/8301-504083_162-20027545-504083.html">posted a Facebook update</a> prior to the shooting that read:</p>
<blockquote>
<table>
<tbody>
<tr>
<td>&#8220;Everybody that used to know me, I&#8217;m sorry but Omaha changed me and fucked me up. And the school I attend is even worse. You&#8217;re gonna here [sic] about the evil shit I did but that fucking school drove me to this. I want you guys to remember me for who I was before this. I greatly affected the lives of the families ruined but I&#8217;m sorry. Goodbye.&#8221;</td>
</tr>
<tr>
<td></td>
</tr>
</tbody>
</table>
</blockquote>
<p>Likewise, the perpetrator of a school shooting at an Ohio high school in February 2012 that resulted in the deaths of three students <a href="http://abcnews.go.com/US/chardon-high-school-shooting-gunman-identified-tjlane/ story?id=15799815">posted a poem</a> filled with violent imagery on Facebook several months prior that ended with the phrase: &#8220;Die, all of you.&#8221; If caught in time, these indicators can actually help stop attacks from happening. A plot to bomb a Utah high school in early 2012 was foiled after one of the potential perpetrators <a href="http://usatoday30.usatoday.com/news/nation/story/2012-01-27/utah-school-bomb-plot/52820328/1">sent a text message</a> to another student stating &#8220;If I tell you one day not to go to school, make damn sure you . . . are not there.&#8221; The text messages went on to document parts of the teens&#8217; alleged plot to steal an airplane following the attack and flee the country: &#8220;I get the feeling you know what I&#8217;m planning . . . explosives, airport, airplane. We ain&#8217;t gonna crash it, we&#8217;re just gonna kill and fly our way to a country that won&#8217;t send us back to the U.S.&#8221; Due to the text messages being reported to authoirities, the plan to attack the school was thwarted. Investigators said they later found detailed blueprints of the school and bomb-making materials at the suspect&#8217;s home.</p>
<div class="DV-container" id="DV-viewer-808640-los-angeles-joint-regional-intelligence-center"></div>
<p><script type="text/javascript" src="//s3.amazonaws.com/s3.documentcloud.org/viewer/loader.js"></script><script type="text/javascript">// <![CDATA[
DV.load("//www.documentcloud.org/documents/808640-los-angeles-joint-regional-intelligence-center.js", {     width: 730,     height: 750,     sidebar: false,     container: "#DV-viewer-808640-los-angeles-joint-regional-intelligence-center"   });
// ]]&gt;</script></p>The post <a href="https://publicintelligence.net/understanding-school-shootings/">Trying to Understand School Shootings</a> first appeared on <a href="https://publicintelligence.net">Public Intelligence</a>.]]></content:encoded>
					
					<wfw:commentRss>https://publicintelligence.net/understanding-school-shootings/feed/</wfw:commentRss>
			<slash:comments>4</slash:comments>
		
		
			</item>
		<item>
		<title>Feds Say Possession of &#8220;Large Amounts&#8221; of Weapons May Indicate Terrorist Activity</title>
		<link>https://publicintelligence.net/weapons-discovery-terrorism/</link>
					<comments>https://publicintelligence.net/weapons-discovery-terrorism/#comments</comments>
		
		<dc:creator><![CDATA[Public Intelligence]]></dc:creator>
		<pubDate>Wed, 16 Oct 2013 01:09:06 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Department of Homeland Security]]></category>
		<category><![CDATA[Federal Bureau of Investigation]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Suspicious Activity Reporting]]></category>
		<guid isPermaLink="false">http://publicintelligence.net/?p=31975</guid>

					<description><![CDATA[<p>A joint bulletin issued in early August by the Department of Homeland Security and FBI warns state and local law enforcement agencies to look out for people in possession of "large amounts" of weapons and ammunition, describing the discovery of "unusual amounts" of weapons as a potential indicator of criminal or terrorist activity.</p>
<p class="more-link-p">
<a class="btn btn-primary" href="https://publicintelligence.net/weapons-discovery-terrorism/">Read more &#8594;</a></p>
The post <a href="https://publicintelligence.net/weapons-discovery-terrorism/">Feds Say Possession of “Large Amounts” of Weapons May Indicate Terrorist Activity</a> first appeared on <a href="https://publicintelligence.net">Public Intelligence</a>.]]></description>
										<content:encoded><![CDATA[<div id="attachment_31977" style="width: 670px" class="wp-caption aligncenter"><a href="https://publicintelligence.net/wp-content/uploads/2013/09/weapons-discovery.jpg"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-31977" class=" wp-image-31977" title="weapons-discovery" alt="" src="https://publicintelligence.net/wp-content/uploads/2013/09/weapons-discovery.jpg" width="660" height="496" srcset="https://q.publicintelligence.net/wp-content/uploads/2013/09/weapons-discovery.jpg 600w, https://q.publicintelligence.net/wp-content/uploads/2013/09/weapons-discovery-300x225.jpg 300w" sizes="auto, (max-width: 660px) 100vw, 660px" /></a><p id="caption-attachment-31977" class="wp-caption-text">An example photo of a &#8220;weapons cache&#8221; included in a Department of Homeland Security and FBI bulletin to law enforcement. Photo via Maine State Police.</p></div>
<p><strong>Public Intelligence</strong></p>
<p>A joint bulletin issued in early August by the Department of Homeland Security and FBI warns state and local law enforcement agencies to look out for people in possession of &#8220;large amounts&#8221; of weapons and ammunition, describing the discovery of &#8220;unusual amounts&#8221; of weapons as a potential indicator of criminal or terrorist activity.</p>
<p>Citing the example of Norwegian mass-murderer Anders Behring Breivik, who reportedly &#8220;stockpiled approximately 12,000 pounds of precursors, weapons, and armor and hid them underground in remote, wooded locations,&#8221; <a href="https://publicintelligence.net/dhs-fbi-weapons/">the bulletin instructs law enforcement</a> to look for &#8220;large amounts of weapons, ammunition, explosives, accelerants, or explosive precursor chemicals&#8221; that &#8220;could indicate pre-operational terrorist attack planning or criminal activity.&#8221;  Weapons do not have to be &#8220;cached&#8221; in remote locations to meet the standard for suspicious activity.  According to the bulletin, weapons could be stored in an &#8220;individual&#8217;s home, storage facility, or vehicle&#8221; and may include common firearms such as &#8220;rifles, shotguns, pistols&#8221; as well as &#8220;military grade weapons.&#8221;  The illegal possession of large amounts of ammunition is also listed as a potential indicator of &#8220;criminal weapons possession related to terrorism.&#8221;  While the bulletin never clarifies what constitutes a &#8220;large&#8221; or &#8220;unusual&#8221; quantity of weapons or ammunition, it does say that such a quantity would &#8220;arouse suspicion in a reasonable person.&#8221;</p>
<p>The <a href="https://publicintelligence.net/dhs-fbi-weapons/">joint DHS-FBI Roll Call Release</a> distributed to police, first responders and private security throughout the U.S. is part of a series of bulletins describing activities &#8220;reasonably indicative of criminal activity associated with terrorism.&#8221;  The suspicious activities described in the bulletins are derived from criteria in the <a href="http://nsi.ncirc.gov/documents/ISE-FS-200_ISE-SAR_Functional_Standard_V1_5_Issued_2009.pdf">Information Sharing Environment (ISE) Functional Standard for Suspicious Activity Reporting</a> signed in 2009.  The ISE Functional Standard governs the collection of information for the <a href="http://nsi.ncirc.gov/">Nationwide Suspicious Activity Reporting Initiative (NSI)</a>, an interagency program to collect suspicious activity reports from law enforcement agencies around the country.  Other bulletins in the series focus on everything from <a href="https://publicintelligence.net/dhs-fbi-observation/">surveillance</a> and <a href="https://publicintelligence.net/dhs-fbi-theft-loss/">theft</a> to <a href="https://publicintelligence.net/dhs-fbi-photography/">photography</a> and even &#8220;<a href="https://publicintelligence.net/dhs-fbi-terrorist-elicitation-of-information/">eliciting information</a>,&#8221; an activity described as &#8220;questioning individuals at a level beyond mere curiosity.&#8221;</p>
<p>Like other bulletins in the DHS-FBI series on suspicious activity reporting, the document notes that &#8220;constitutional activities should not be reported&#8221; unless the circumstances &#8220;support the source agency’s suspicion that the behavior observed is not innocent, but rather reasonably indicative of criminal activity associated with terrorism, including evidence of pre-operational planning related to terrorism.&#8221;  However, no guidance is provided on potential legal issues related to the reporting of constitutionally-protected activities.</p>
<div class="DV-container" id="DV-viewer-805312-dhs-fbi-roll-call-release-suspicious-activity"></div>
<p><script type="text/javascript" src="//s3.amazonaws.com/s3.documentcloud.org/viewer/loader.js"></script><script type="text/javascript">// <![CDATA[
  DV.load("//www.documentcloud.org/documents/805312-dhs-fbi-roll-call-release-suspicious-activity.js", {
    width: 730,
    height: 900,
    sidebar: false,
    container: "#DV-viewer-805312-dhs-fbi-roll-call-release-suspicious-activity"
  });
// ]]&gt;</script></p>
<p><noscript><br />
  <a href="http://s3.documentcloud.org/documents/805312/dhs-fbi-roll-call-release-suspicious-activity.pdf">DHS-FBI Roll Call Release: Suspicious Activity Reporting (SAR) Weapons Discovery (PDF)</a></p>
<p><a href="http://s3.documentcloud.org/documents/805312/dhs-fbi-roll-call-release-suspicious-activity.txt">DHS-FBI Roll Call Release: Suspicious Activity Reporting (SAR) Weapons Discovery (Text)</a><br />
</noscript></p>The post <a href="https://publicintelligence.net/weapons-discovery-terrorism/">Feds Say Possession of “Large Amounts” of Weapons May Indicate Terrorist Activity</a> first appeared on <a href="https://publicintelligence.net">Public Intelligence</a>.]]></content:encoded>
					
					<wfw:commentRss>https://publicintelligence.net/weapons-discovery-terrorism/feed/</wfw:commentRss>
			<slash:comments>90</slash:comments>
		
		
			</item>
		<item>
		<title>Fusion Center Study Finds 79% of Recent Mass Shootings Attributable to History of Mental Illness</title>
		<link>https://publicintelligence.net/mass-shootings-mental-illness/</link>
					<comments>https://publicintelligence.net/mass-shootings-mental-illness/#comments</comments>
		
		<dc:creator><![CDATA[Public Intelligence]]></dc:creator>
		<pubDate>Wed, 21 Aug 2013 22:23:17 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Fusion Centers]]></category>
		<category><![CDATA[Mass Shootings]]></category>
		<guid isPermaLink="false">http://publicintelligence.net/?p=31744</guid>

					<description><![CDATA[<p>Analysis conducted by the Central Florida Intelligence Exchange (CFIX) has found that 79% of mass shootings since 2011 have been perpetrated by individuals with "demonstrated signs of continuous behavioral health issues and mental illness."  In a July case study titled "Acts of Violence Attributed by Behavioral and Mental Health Issues", CFIX analyzed 14 mass shooting incidents that occurred between 2011 and 2013 finding that only three of the shooters had no history of mental illness.</p>
<p class="more-link-p">
<a class="btn btn-primary" href="https://publicintelligence.net/mass-shootings-mental-illness/">Read more &#8594;</a></p>
The post <a href="https://publicintelligence.net/mass-shootings-mental-illness/">Fusion Center Study Finds 79% of Recent Mass Shootings Attributable to History of Mental Illness</a> first appeared on <a href="https://publicintelligence.net">Public Intelligence</a>.]]></description>
										<content:encoded><![CDATA[<div id="attachment_31745" style="width: 740px" class="wp-caption aligncenter"><a href="https://publicintelligence.net/wp-content/uploads/2013/08/CFIX-MentalHealthViolence_Page_6.jpg"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-31745" class=" wp-image-31745" title="CFIX-MentalHealthViolence_Page_6" alt="" src="https://publicintelligence.net/wp-content/uploads/2013/08/CFIX-MentalHealthViolence_Page_6-1024x768.jpg" width="730" height="548" srcset="https://q.publicintelligence.net/wp-content/uploads/2013/08/CFIX-MentalHealthViolence_Page_6-1024x768.jpg 1024w, https://q.publicintelligence.net/wp-content/uploads/2013/08/CFIX-MentalHealthViolence_Page_6-300x225.jpg 300w, https://q.publicintelligence.net/wp-content/uploads/2013/08/CFIX-MentalHealthViolence_Page_6.jpg 2000w" sizes="auto, (max-width: 730px) 100vw, 730px" /></a><p id="caption-attachment-31745" class="wp-caption-text">A chart from a Central Florida Intelligence Exchange (CFIX) study released in July shows cases of mass shootings believed to be attributable to mental illness.</p></div>
<p><strong>Public Intelligence</strong></p>
<p>Analysis conducted by the Central Florida Intelligence Exchange (CFIX) has found that 79% of mass shootings since 2011 have been perpetrated by individuals with &#8220;demonstrated signs of continuous behavioral health issues and mental illness.&#8221;  In a July case study titled &#8220;<a href="https://publicintelligence.net/cfix-mental-health-violence/">Acts of Violence Attributed by Behavioral and Mental Health Issues</a>&#8220;, CFIX analyzed 14 mass shooting incidents that occurred between 2011 and 2013 and found that only three of the shooters had no history of mental illness.</p>
<p>The study, which focuses primarily on &#8220;violence perpetrated against healthcare providers and emergency responders&#8221; particularly &#8220;by patients with behavioral and mental health issues&#8221;, also discusses the correlation between mental health issues and mass shootings.  According to the CFIX analysts, across the country &#8220;the numbers of mass shootings involving perpetrators with behavioral health issues have noticeably increased&#8221; with 79% of mass shooting occurrences between January 2011 to May 2013 involving perpetrators that exhibited &#8220;continuous behavioral health issues&#8221; and &#8220;mental illness&#8221;.  In the same period, the only mass shootings found to have been committed by individuals with no previous history of mental health issues were the Sikh temple shooting in Oak Creek, Wisconsin, which is described as a hate crime, and the &#8220;work-related&#8221; shooting spree perpetrated by Christopher Dorner in early 2013.  Another incident in New York which involved a man named Kurt Myers killing several people at a car wash and barber shop in March 2013 has no known motive, though speculation centered on the <a href="http://www.huffingtonpost.com/2013/03/18/kurt-myers-shootout-suspect-penniless_n_2903413.html">shooter&#8217;s money problems</a>.</p>
<p>The analysis provided by CFIX is useful for understanding the connection between mental health issues and senseless acts of large-scale violence, though the analysts&#8217; conflation of mental disorders and mental illness leads to some conclusions that may not be warranted.  For example, Adam Lanza, the perpetrator of the mass killing at Sandy Hook Elementary School in Newtown, Connecticut, had been reportedly diagnosed with mental disorders including Asperger syndrome that are fairly common and do not constitute mental illness.  These issues are further complicated by the fact that many perpetrators of mass shootings suffer from mental illness throughout their lives, though are never formally diagnosed.  Due to the fact that many perpetrators of mass shootings commit suicide or are killed by police during the incident, this diagnosis often never occurs leaving only vague statements from friends and family members about the perpetrator&#8217;s history of unusual behavior.</p>
<p>A list of the perpetrators of mass shootings that were found by CFIX to be linked to &#8220;mental illness&#8221; is included below with a brief synopsis of the shooters&#8217; actions and history of mental health issues.</p>
<p><strong>Mass Shootings Attributed to History of Mental Illness<br />
</strong></p>
<ul>
<li title="United States House of Representatives"><em>Jared Loughner</em>; January 8, 2011; 6 killed, 13 injured &#8211; Loughner went to an event with U.S. Representative Gabrielle Giffords in a Safeway parking lot in Tucson, Arizona and killed six people, including a U.S. District Court Judge John Roll and a 9-year-old girl.  Loughner was later diagnosed with paranoid schizophrenia and was initially ruled incompetent to stand trial.</li>
<li><em>Eduardo Sencion</em>; September 6, 2011; 4 killed, 7 injured &#8211; Sencion killed 4 and injured 7 in and around an IHOP restaurant in Carson City, Nevada using a Norinco Mak 90 semiautomatic rifle illegally converted to fully-automatic mode.  Sencion was diagnosed with paranoid schizophrenia at age 18.</li>
<li><em>Scott Evans Dekraai</em>; October 12, 2011; 8 killed, 1 injured &#8211; Dekraai went into Salon Meritage hair salon where his ex-wife worked in Seal Beach, California and opened fire with several handguns killing 8 in the salon and injuring 1 in the parking lot.  Dekraai had been diagnosed with posttraumatic stress disorder in September 2008.</li>
<li><em>Jeong Soo Paek</em>; February 21, 2012; 4 killed &#8211; Paek walked into a spa owned by his sisters&#8217; families, killing his sisters and their husbands with a .45-caliber handgun before killing himself.  Paek had a history of mental health issues according to court filings and had been described as suicidal in the years leading up to the attack.</li>
<li><em>One L. Goh</em>; April 2, 2012; 7 killed, 3 injured &#8211; Goh, a former student at Oikos University, a Korean Christian college in Oakland, California, stood up in a nursing classroom while class was in session, ordered classmates to line up against the wall, and opened fire with a .45-caliber semi-automatic handgun killing 7.  Goh was later diagnosed with paranoid schizophrenia by court-appointed psychiatrists.</li>
<li><em>Ian Lee Stawicki</em>; May 30, 2012; 5 killed, 1 injured &#8211; Stawicki walked into Café Racer in the University District of Seattle, Washington and opened fire with two .45-caliber handguns, killing four patrons and wounding the café&#8217;s chef.  Stawicki&#8217;s father later said his son suffered from mental health issues throughout his life and may have been manic depressive.</li>
<li><em>James Eagan Holmes</em>; July 20, 2012; 12 killed, 58 injured &#8211; Holmes used a Smith &amp; Wesson M&amp;P15 semi-automatic rifle, Remington tactical shotgun and two Glock 22 handguns to kill 12 and wound 58 during a midnight premiere screening of The Dark Night Rises at the Century 16 multiplex in Aurora, Colorado.  Holmes was seeing a psychiatrist at the University of Colorado prior to the shooting who later reported that he had made &#8220;homicidal statements&#8221; and said he a was a threat to others.  Holmes reportedly asked other students at the University of Colorado about dysphoric mania, a mental disorder characterized by simultaneous symptoms of mania and depression.</li>
<li><em>Andrew Engeldinger</em>; September 27, 2012; 5 killed, 3 injured &#8211; Engeldinger opened fire with a Glock 19 9mm pistol killing 6 and injuring 2 at his workplace Accent Signage Systems in Minneapolis, Minnesota after being fired.  According to his parents, Engeldinger had a history of undiagnosed mental illness.</li>
<li><em>Adam Lanza</em>; December 14, 2012; 27 killed, 2 wounded &#8211; Lanza killed his mother, then took several firearms in his mother&#8217;s car to Sandy Hook Elementary School where he killed twenty children and six employees of the school with a semi-automatic Bushmaster XM15-E2S rifle.  Lanza had behavioral problems throughout childhood and was said by family members to have a personality disorder.  Lanza was reportedly diagnosed with sensory processing disorder as a child and family friends claimed that he had been diagnosed with Asperger syndrome.</li>
<li><em>William Spengler</em>; December 24, 2012; 3 killed, 2 wounded &#8211; Spengler killed his sister, then intentionally set their house on fire, firing an illegally-acquired Bushmaster semi-automatic rifle at firefighters responding to the scene, killing two and injuring two more.  Spengler was convicted of manslaughter in 1980 after murdering his grandmother with a hammer and had spent years in a correctional mental health facility.</li>
<li><em>John Zawahri</em>; June 7, 2013; 5 killed, 4 wounded &#8211; Zawahri killed his father and brother after setting their house on fire, then hijacked a passing car, forcing the driver to drive him to Santa Monica College where he killed 3 more people and wounded 4.  While attending high school, Zawahri had communicated to a classmate his desire to hurt other students and was later admitted to UCLA&#8217;s Neuropsychiatric Institute for a brief period of time.</li>
</ul>
<p>&nbsp;</p>
<p><iframe loading="lazy" style="" src="http://docs.google.com/viewer?url=http%3A%2F%2Finfo.publicintelligence.net%2FCFIX-MentalHealthViolence.pdf&amp;embedded=true" height="1000" width="730"></iframe></p>The post <a href="https://publicintelligence.net/mass-shootings-mental-illness/">Fusion Center Study Finds 79% of Recent Mass Shootings Attributable to History of Mental Illness</a> first appeared on <a href="https://publicintelligence.net">Public Intelligence</a>.]]></content:encoded>
					
					<wfw:commentRss>https://publicintelligence.net/mass-shootings-mental-illness/feed/</wfw:commentRss>
			<slash:comments>10</slash:comments>
		
		
			</item>
		<item>
		<title>FBI Warns of Cyber Espionage Targeting the Aviation Industry</title>
		<link>https://publicintelligence.net/fbi-apt-aviation-industry/</link>
					<comments>https://publicintelligence.net/fbi-apt-aviation-industry/#comments</comments>
		
		<dc:creator><![CDATA[Public Intelligence]]></dc:creator>
		<pubDate>Thu, 15 Aug 2013 23:46:02 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Advanced Persistent Threat]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Federal Bureau of Investigation]]></category>
		<guid isPermaLink="false">http://publicintelligence.net/?p=31718</guid>

					<description><![CDATA[<p>Since June, advanced persistent threat (APT) actors have been targeting the aviation industry and attempting to extract confidential information by sending "spear-phishing" emails designed to trick recipients into opening malicious attachments or follow links to infected websites.  According to an FBI Cyber Division bulletin from July 8, "individuals associated with the air travel industry" have received an increased number of spear-phishing emails often using spoofed senders "in an attempt to make the e-mail appear more legitimate."</p>
<p class="more-link-p">
<a class="btn btn-primary" href="https://publicintelligence.net/fbi-apt-aviation-industry/">Read more &#8594;</a></p>
The post <a href="https://publicintelligence.net/fbi-apt-aviation-industry/">FBI Warns of Cyber Espionage Targeting the Aviation Industry</a> first appeared on <a href="https://publicintelligence.net">Public Intelligence</a>.]]></description>
										<content:encoded><![CDATA[<div id="attachment_31722" style="width: 742px" class="wp-caption aligncenter"><a href="https://publicintelligence.net/wp-content/uploads/2013/08/apt-threat-cycle.png"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-31722" class=" wp-image-31722" title="apt-threat-cycle" alt="" src="https://publicintelligence.net/wp-content/uploads/2013/08/apt-threat-cycle.png" width="732" height="477" srcset="https://q.publicintelligence.net/wp-content/uploads/2013/08/apt-threat-cycle.png 844w, https://q.publicintelligence.net/wp-content/uploads/2013/08/apt-threat-cycle-300x195.png 300w" sizes="auto, (max-width: 732px) 100vw, 732px" /></a><p id="caption-attachment-31722" class="wp-caption-text">A portion of a table from the FBI Cyber Division July 8 bulletin &#8220;APT Actors Increased Interest in the Aviation Industry&#8221; describes the advanced persistent threat cycle.</p></div>
<p><strong>Public Intelligence</strong></p>
<p>Since June, advanced persistent threat (APT) actors have been targeting the aviation industry and attempting to extract confidential information by sending &#8220;spear-phishing&#8221; emails designed to trick recipients into opening malicious attachments or follow links to infected websites.  According to an <a href="https://publicintelligence.net/fbi-aviation-apt/">FBI Cyber Division bulletin from July 8</a>, &#8220;individuals associated with the air travel industry&#8221; have received an increased number of spear-phishing emails often using spoofed senders &#8220;in an attempt to make the e-mail appear more legitimate.&#8221;</p>
<p>APT actors conduct targeted attacks seeking &#8220;precise information rather than monetary gain&#8221; which separates them from hacktivists or cyber criminals.  Most APT activity is thought to originate from China, leading <a href="http://www.networkworld.com/news/2011/020111-advanced-persistent-threat.html">some to say</a> that APT is basically a euphemism for China&#8217;s state-sponsored cyber espionage activities.  However, the FBI bulletin never mentions a particular country in relation to the recent targeting of the aviation industry, saying that while &#8220;the activity cannot often be definitively linked to any particular nation state, the sophistication, resources, and types of information sought suggests governmental support.&#8221;</p>
<p>The bulletin goes on to describe APT actors as &#8220;semi-sophisticated and difficult to detect while on network systems.&#8221;  They harvest &#8220;enormous amounts of critical information including proprietary data, source code, negotiation tactics, and strategic operational plans&#8221; which has reportedly cost the U.S. &#8220;hundreds of millions of dollars over the past decade.&#8221;  APT actors have also &#8220;breached networks containing sensitive national security information&#8221; according to the bulletin.</p>
<p>While the bulletin does not provide much in the way of defensive measures, such as physically separating or &#8220;air gapping&#8221; certain systems from networked devices, the idea of mitigating data loss is emphasized.  Private sector recipients of the bulletin are encouraged to ask themselves, &#8220;If proprietary data, personally identifiable information (PII), research and development-related data, e-mail, or other critical information were stolen, what would the current and future consequences be?&#8221;  Employees of targeted industries should be aware of &#8220;unsolicited or unexpected e-mail containing attachments or links with caution, even (and perhaps especially) when the e-mail appears related to known events or projects.&#8221;  The bulletin adds that APT activity will only eventually be mitigated by &#8220;paradigmatic shifts in cyber security.&#8221;</p>
<p><iframe loading="lazy" style="" src="http://docs.google.com/viewer?url=http%3A%2F%2Finfo.publicintelligence.net%2FFBI-AviationAPT.pdf&amp;embedded=true" height="1000" width="730"></iframe></p>The post <a href="https://publicintelligence.net/fbi-apt-aviation-industry/">FBI Warns of Cyber Espionage Targeting the Aviation Industry</a> first appeared on <a href="https://publicintelligence.net">Public Intelligence</a>.]]></content:encoded>
					
					<wfw:commentRss>https://publicintelligence.net/fbi-apt-aviation-industry/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>Police Chiefs Creating Domestic Criminal Intelligence Enterprise</title>
		<link>https://publicintelligence.net/criminal-intelligence-enterprise/</link>
					<comments>https://publicintelligence.net/criminal-intelligence-enterprise/#comments</comments>
		
		<dc:creator><![CDATA[Public Intelligence]]></dc:creator>
		<pubDate>Fri, 09 Aug 2013 00:52:08 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Criminal Intelligence Enterprise]]></category>
		<category><![CDATA[Domestic Surveillance]]></category>
		<category><![CDATA[Fusion Centers]]></category>
		<category><![CDATA[Suspicious Activity Reporting]]></category>
		<guid isPermaLink="false">http://publicintelligence.net/?p=31651</guid>

					<description><![CDATA[<p>An organization representing police chiefs from major cities around the U.S. is promoting an initiative to strengthen intelligence collection at the local level, increasing the integration of state and local law enforcement into the larger structure of the U.S. intelligence community.</p>
<p class="more-link-p">
<a class="btn btn-primary" href="https://publicintelligence.net/criminal-intelligence-enterprise/">Read more &#8594;</a></p>
The post <a href="https://publicintelligence.net/criminal-intelligence-enterprise/">Police Chiefs Creating Domestic Criminal Intelligence Enterprise</a> first appeared on <a href="https://publicintelligence.net">Public Intelligence</a>.]]></description>
										<content:encoded><![CDATA[<div id="attachment_31653" style="width: 554px" class="wp-caption aligncenter"><a href="https://publicintelligence.net/wp-content/uploads/2013/08/cie.jpg"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-31653" class=" wp-image-31653" title="cie" alt="" src="https://publicintelligence.net/wp-content/uploads/2013/08/cie.jpg" width="544" height="381" srcset="https://q.publicintelligence.net/wp-content/uploads/2013/08/cie.jpg 548w, https://q.publicintelligence.net/wp-content/uploads/2013/08/cie-300x209.jpg 300w" sizes="auto, (max-width: 544px) 100vw, 544px" /></a><p id="caption-attachment-31653" class="wp-caption-text">An image from the Major Cities Chiefs&#8217; Intelligence Commanders Group proposal for a National Criminal Intelligence Enterprise (CIE) shows the three layers of national intelligence collection.  The CIE plan would strengthen the top layer, focusing on locally-led collection operations.</p></div>
<p><strong>Public Intelligence</strong></p>
<p>An organization representing police chiefs from major cities around the U.S. is promoting an initiative to strengthen intelligence collection at the local level, increasing the integration of state and local law enforcement into the larger structure of the U.S. intelligence community.</p>
<p>In 2011, the Major Cities Chiefs&#8217; Association (MCCA) began the initiative aimed at strengthening domestic intelligence collection efforts and creating a &#8220;more defined, whole-of-government architecture that interconnects and better integrates state and local criminal intelligence and counterterrorism operations.&#8221;  The Major Cities Chiefs&#8217; Criminal Intelligence Enterprise (CIE) is an effort to create &#8220;better connectivity&#8221; between &#8220;state and local counterterrorism and intelligence units and among locally-led operations, fusion centers, and federally-led operations&#8221; such as Joint Terrorism Task Forces (JTTFs) and Field Intelligence Groups (FIGs). The initiative is being organized around the  pre-existing infrastructure of the Major Cities Chiefs&#8217; Intelligence Commanders Group (MCCICG), a working group of the MCCA that <a href="http://nsi.ncirc.gov/documents/NSI_EE.pdf">played a significant role</a> in creating the unified national suspicious activity reporting process.</p>
<p>A <a href="https://www.majorcitieschiefs.com/pdf/news/mcca_criminal_intelligence_enterprise_initiative_20120329.pdf">nine page proposal</a> for the CIE written in March 2012 by MCCICG Steering Committee Chair Greg McCurdy argues that the &#8220;unprecedented growth of transnational organized crime&#8221; poses a significant threat to national security and public safety&#8221; requiring that &#8220;criminal intelligence and information sharing should be enhanced, and collaboration with state and local law enforcement should continue to grow and improve.&#8221;  Criminal threats including &#8220;well-organized and disproportionately funded drug trafficking, human smuggling, and weapons trafficking&#8221; continue to threaten American communities as well as &#8220;violent extremism&#8221; and homegrown terrorism.  In order to dismantle these criminal enterprises, McCurdy argues that &#8220;community engagement programs&#8221; including those designed to enable citizens to report suspicious activities are insufficient:</p>
<blockquote>
<table>
<tbody>
<tr>
<td>&#8220;While community engagement programs help in this identification, relying solely on citizens to report suspicious activity or a crime may leave law enforcement dependent on a limited window of opportunity to respond. As such, to ensure that law enforcement has the information needed to disrupt criminal activity before it occurs, state and local law enforcement agencies must also conduct criminal and terrorism-related investigations and intelligence operations when appropriate. Provided that the collection of information is adherent to strict privacy, civil rights, and civil liberties guidelines; these efforts offer a proactive approach for identifying violent extremism and the activities of criminal enterprises.&#8221;</td>
</tr>
<tr>
<td></td>
</tr>
</tbody>
</table>
</blockquote>
<p>To address this deficiency, McCurdy outlines four objectives for the CIE.  The first objective is increasing &#8220;connectivity among state and local counterterrorism and intelligence units and among locally-led operations, fusion centers, and federally-led operations.&#8221;  Discussing this objective, McCurdy emphasizes that &#8220;transnational crime and terrorism know no geographic boundaries&#8221; and therefore &#8220;the law enforcement intelligence community must virtually eliminate theirs.&#8221;  He adds that &#8220;actions that occur in a different state or, for that matter, in a different country now become relative.&#8221;</p>
<p>The second objective of the CIE is the &#8220;development and sharing of local threat domain assessments so that the collection component of each major locality can better address the specific threats that affect their individual communities.&#8221;  This involves local law enforcement agencies working with fusion centers to assess their &#8220;respective domains to identify what criminal or terrorist groups pose the greatest threat&#8221; and establish &#8220;Standing Information Needs (SINs), Prioritized Information Needs (PINs), and Intelligence Directives.&#8221;</p>
<p>Third, the CIE will coordinate the &#8220;development, implementation, and sharing of local collection plans&#8221; for intelligence gathering.  The CIE will &#8220;provide the necessary template that state and local counterterrorism and intelligence units need to establish a standardized systematic process that identifies the tools and methods that can be used to effectively and properly collect crime and terrorism information from within their threat domain.&#8221;  Increased interconnection generated by the CIE will &#8220;enable local law enforcement agencies to expand their geographical reach while physically maintaining their jurisdictional boundaries.&#8221;  Utilizing &#8220;interconnected collection efforts&#8221;, the CIE will allow local law enforcement to &#8220;effectively but appropriately&#8221; transcend borders.</p>
<p>The fourth objective of the CIE initiative is to develop and deploy a &#8220;secure, socially driven interface&#8221; resembling Facebook that enables &#8220;state and local intelligence and counterterrorism personnel to effectively network while still adhering to strict privacy guidelines.&#8221;  McCurdy says that &#8220;in the state and local criminal intelligence and counterterrorism environment where collaboration is of the utmost importance, the use of socially driven networking becomes advantageous&#8221; allowing &#8220;a detective in Las Vegas . . . to securely customize a profile page, build a network of &#8216;friends&#8217; who are in fact colleagues in other agencies, and network by sharing nonsensitive information through wall posts, messages, and status updates . . .&#8221;</p>
<p>Besides McCurdy&#8217;s proposal, little information about the initiative is publicly available, though the initiative is mentioned in the <a href="https://www.majorcitieschiefs.com/pdf/news/mcca_2012_annual_report1.pdf">2012 annual report for the MCCA</a> as a &#8220;continuing priority.&#8221;  Congressional testimony from the former head of the MCCA shows that the group was <a href="http://www.gpo.gov/fdsys/pkg/CHRG-111hhrg50615/html/CHRG-111hhrg50615.htm">asking as early as 2009</a> to use the MCCICG to construct a &#8220;integrated national intelligence capability.&#8221;</p>
<p><iframe loading="lazy" style="" src="http://docs.google.com/viewer?url=http%3A%2F%2Finfo.publicintelligence.net%2FMCAA-CriminalIntelligenceEnterprise.pdf&amp;embedded=true" height="1000" width="730"></iframe></p>The post <a href="https://publicintelligence.net/criminal-intelligence-enterprise/">Police Chiefs Creating Domestic Criminal Intelligence Enterprise</a> first appeared on <a href="https://publicintelligence.net">Public Intelligence</a>.]]></content:encoded>
					
					<wfw:commentRss>https://publicintelligence.net/criminal-intelligence-enterprise/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
	</channel>
</rss>

<!--
Performance optimized by W3 Total Cache. Learn more: https://www.boldgrid.com/w3-total-cache/?utm_source=w3tc&utm_medium=footer_comment&utm_campaign=free_plugin

Page Caching using Disk: Enhanced (SSL caching disabled) 

Served from: publicintelligence.net @ 2026-04-12 22:19:03 by W3 Total Cache
-->