2014-07-25

News
DHS Tells Firefighters, Paramedics Medical Treatment Provides an Opportunity to Identify Extremists
July 22, 2014
guy

A joint bulletin released in March by the Department of Homeland Security, FBI and National Counterterrorism Center instructs firefighters and paramedics to use emergency medical treatment as an opportunity to identify violent extremists.

Read more →
Department of Homeland Security, Federal Bureau of Investigation, National Counterterrorism Center
(U//FOUO) DHS-FBI-NCTC Bulletin: Medical Treatment Presents Opportunity for Discovery of Violent Extremist Activities
July 22, 2014
DHS-FBI-NCTC-MedicalTreatmentExtremists

Efforts to gain expertise with explosive, incendiary, and chemical/biological devices may lead to injuries and emergency treatment, which may provide potential indicators of violent extremist activities to responding emergency medical service (EMS) personnel. Scene size-up and patient assessment provide first responders the opportunity to view both the scene and any patient injuries. EMS personnel and other first responders should consider the totality of information gleaned through direct observation and the statements of patients, witnesses, and bystanders to evaluate whether an injury is a genuine accident or related to violent extremist activity.

Read more →
National Counterterrorism Center
National Counterterrorism Center Flyer: College Drone Programs Can Be Targeted by Violent Extremists
July 20, 2014
NCTC-UAS-Extremists

College programs in unmanned aircraft systems (UAS) are susceptible to potential penetration or attack plotting by violent extremists. Enhanced information and operational security practices can reduce the likelihood of a violent extremist infiltrating UAS programs or planning an attack against students and faculty. There are potential indicators that a student or faculty member may possess ulterior motives for their interest in unmanned aircraft.

Read more →
Federal Aviation Administration
FAA Order: Unmanned Aircraft Operations in the National Airspace System (NAS)
July 19, 2014
FAS-UAS-NAS

Purpose of This Notice. This notice provides information and interim guidance on air traffic policies and prescribes procedures for the planning, coordination, and services involving the operation of unmanned aircraft systems (UAS) in the NAS. These policies and procedures reflect current written directives and regulations and do not reflect any major changes. The intent of this notice is to consolidate all current directives and regulations into one document to assist with understanding UAS operations in the NAS.

Read more →
Federal Aviation Administration
FAA Notice: Reporting Unauthorized Unmanned Aircraft Activity to the Domestic Events Network
July 19, 2014
FAA-UAS-Reporting

A notice issued in July by the FAA to notify air traffic controllers to report unauthorized unmanned aircraft activity to the Domestic Events Network (DEN).

Read more →
Malaysia, U.S. Marine Corps
(U//FOUO) Marine Corps Intelligence Activity Malaysia Cultural Field Guide
July 17, 2014
MCIA-MalaysiaCultureGuide

Malays are predominantly Muslim, and as a result, the country is strongly influenced by Islam. Most Malaysian Muslims are moderate in their views. They do not want Malaysia to become an Islamic state, and regard Islam primarily as a religion, not a lifestyle. Some of Malaysia’s smaller religious and ethnic groups are concerned about what they perceive as the increasingly Islamic nature of Malaysian society.

Read more →
Malaysia, U.S. Marine Corps
Marine Corps Intelligence Activity Malaysia Country Handbook
July 17, 2014
MCIA-MalaysiaHandbook_Page_009

This handbook provides basic reference information on Malaysia, including its geography, history, government, military forces, and communications and transportation networks. This information is intended to familiarize military personnel with local customs and area knowledge to assist them during their assignment to Malaysian.

Read more →
United Nations
UNODC World Drug Report 2014
July 14, 2014
UNODC-WorldDrugReport-2014

The World Drug Report provides an annual overview of the major developments in drug markets for the various drug categories, ranging from production to trafficking, including development of new routes and modalities, as well as consumption.

Read more →
Defense Security Service, Documents
Terms and Definitions of Interest for Counterintelligence Professionals
July 13, 2014
DoD-CI-Definitions

This Glossary is designed to be a reference for counterintelligence (CI) professionals within the Department of Defense (DoD); however other CI professionals may find it of use. It provides a comprehensive compilation of unclassified terms that may be encountered when dealing with the dynamic discipline of counterintelligence and related activities. Where some words may several meanings within the counterintelligence or intelligence context, a variety of definitions are included.

Read more →
Featured
The Vocabulary of Cyber War
July 10, 2014
Brig. Gen. Robert Brooks, director of the Massachusetts Air National Guard gets a eyes-on 3D tutorial of how to analyze data in the Virtual Reality Center at the University of Arkansas at Little Rock, May 2, 2014. Senior leaders from the National Guard toured the University's Emerging Analytics Center and learned about the partnership to allow students at the National Guard Professional Education Center an opportunity to earn their bachelor's, master's or post-doctoral degrees in information technology.

A restricted document from U.S. Strategic Command provides insight into the underlying philosophy of military efforts to wage cyber warfare.

Read more →
U.S. Strategic Command
(U//FOUO) U.S. Strategic Command Cyber Warfare Lexicon
July 10, 2014
USSTRATCOM-CyberWarfareLexicon

Since the 2006 signing of the National Military Strategy for Cyberspace Operations (NMS-CO), the emerging US cyber warfare community continues to mature and its capabilities increasingly compete for consideration when US forces plan operations. Computer network attack (CNA) and electronic attack (EA) technologies have progressed to the point where their use could be routinely considered in the context of existing and developing OPLANS. In order to effectively integrate and standardize use of these non-traditional weapons, the developers, testers, planners, targeteers, decision-makers, and battlefield operators require a comprehensive but flexible cyber lexicon that accounts for the unique aspects of cyber warfare while minimizing the requirement to learn new terms for each new technology of the future. Without a shared understanding of the accurate meanings of a significant number of frequently used terms, it will be difficult to make progress on the more complex and unresolved technical and operational issues for non-traditional weapons: actionable requirements, technical and operational assurance, effective mission planning techniques, and meaningful measures of effectiveness. In fact, the Secretary of Defense’s Information Operations (IO) Roadmap listed its first benefit to the combatant commanders as “a common lexicon and approach to IO, including support to integrated information campaign planning.” Although the focus of cyberspace operations is not the same as that of IO, they share some technologies and until now, no such lexicon (for IO, or any portion of IO) has been published.

Read more →
Immigration and Customs Enforcement
Immigration and Customs Enforcement iGuardians Trading Card Series
July 8, 2014
iGuardian-1

A series of trading cards released by Immigration and Customs Enforcement Homeland Security Investigations in March 2014 intended to raise awareness among children and young adults of issues related to cybersecurity and online sexual predators.

Read more →
Bosnia and Herzegovina, U.S. Marine Corps
Marine Corps Intelligence Activity Bosnia and Herzegovina Country Handbook
July 6, 2014
MCIA-BosniaHerzegovinaHandbook_Page_022

This handbook provides basic reference information on Bosnia and Herzegovina, including its geography, history, government, military forces, and communications and transportation networks. This information is intended to familiarize military personnel with local customs and area knowledge to assist them during their assignment to Bosnia and Herzegovina.

Read more →
Kosovo, U.S. Marine Corps
Marine Corps Intelligence Activity Kosovo Country Handbook
July 6, 2014
MCIA-KosovoHandbook_Page_009

This handbook provides basic reference information on Kosovo, including its geography, history, government, military forces, and communications and transportation networks. This information is intended to familiarize military personnel with local customs and area knowledge to assist them during their assignment to Kosovo.

Read more →
Singapore, U.S. Marine Corps
(U//FOUO) Marine Corps Intelligence Activity Singapore Cultural Field Guide
July 3, 2014
MCIA-SingaporeCultureGuide

Singapore is made up of three main ethnic groups: Chinese, Malays, and Indians. The Chinese ethnic group makes up the majority (75 percent) of the population, followed by the Malays (15 percent) and the Indians (8 percent). Each ethnic group is internally diverse. However, in the view of most Singaporeans, the divisions within each ethnic group are far less significant than those between groups.

Read more →
Department of Homeland Security
DHS Unaccompanied Alien Children (UACs) 2014 Location of Origin Map
July 3, 2014
DHS-UAC-Map

We analyzed these locations to determine the factors pushing child migration to the US Border. We assess these reasons vary regionally. For example, many Guatemalan children come from rural areas, indicating they are probably seeking economic opportunities in the US. Salvadoran and Honduran children, on the other hand, come from extremely violent regions where they probably perceive the risk of traveling alone to the US preferable to remaining at home. This violence, combined with poor economies and other secondary factors will make stemming the flow of UACs to the US a very complex issue to address.

Read more →
Honduras, U.S. Marine Corps
Marine Corps Intelligence Activity Honduras Country Handbook
June 30, 2014
MCIA-HondurasHandbook_Page_009

This handbook provides basic reference information on Honduras, including its geography, history, government, military forces, and communications and transportation networks. This information is intended to familiarize military personnel with local customs and area knowledge to assist them during their assignment to Honduras.

Read more →
Intelligence Fusion Centers, Utah
(U//FOUO) Utah Fusion Center Bulletin: New Ransomware “CryptoWall” Rapidly Infecting Systems Across the U.S.
June 29, 2014
SIAC-CryptoWall

This product addresses the recent wave of CryptoWall (not to be confused with “CryptoLocker”) ransomware infections throughout the United States. Included are prevention and incident response mitigation strategies, as well as a description of the malware and helpful sources.

Read more →
Department of State, Iraq, Syria
U.S. State Department Iraq-Syria Conflict Without Borders Map
June 27, 2014
DoS-IraqSyriaConflict

A map from June 23, 2014 produced by the U.S. State Department Humanitarian Information Unit depicting locations of displaced persons and areas taken by the Islamic State in Iraq and the Levant (ISIL) in Iraq and Syria.

Read more →
Ukraine
(U//FOUO) Marine Corps Intelligence Activity Ukraine Cultural Field Guide
June 27, 2014
MCIA-UkraineCultureGuide

Ukraine is positioned between Eurasia and Europe, and the region has been influenced by many major civilizations. Ukraine, whose name means “borderland,” has lived under foreign powers for most of its existence. This is most recently evidenced by the creation of the Ukrainian Soviet Socialist Republic, controlled by the centralized establishment in Moscow under the communist regime. Even today the capital, Kiev, struggles internally between Moscow and the West, forcing Ukrainians to more closely identify with either their own cultural brethren or a new, more independent direction for the country.

Read more →
Federal Bureau of Investigation
FBI Notifications: Malicious Cyber Actors Targeting U.S. Government Networks and Employees
June 23, 2014
FBI-SpearPhishingTargeting

The FBI and NCIS believe a group of cyber actors have been using various social networking sites to conduct spear phishing activities since at least 2011. FBI and NCIS investigation to date has uncovered 56 unique Facebook personas, 16 domains, and a group of IP addresses associated with these actors. These personas typically would attempt to befriend specific types of individuals such as government, military, or cleared defense contractor personnel. After establishing an online friendship the actor would send a malicious link (usually through one of the associated domains) to the victim, either through e-mail or in a chat on the social networking site eventually compromising the target’s computer.

Read more →
Corporate
International Biometrics and Identification Association Draft Privacy Best Practices for Commercial Biometrics
June 21, 2014
IBIA-PrivacyBestPractices

One fact should not be lost in this discussion. As has always been the case, new methods of authenticating identity, like biometric identification, are necessary to augment existing conventions and meet current needs. Biometric technologies do this and, as a major privacy‐enhancing technology, preserve privacy at the same time. The facial template itself, like other biometric templates, provides no personal information. Indeed, protecting the non‐biometric personal information is enhanced through the use of biometric verification of identity to limit data access to only authorized persons. Biometrics can provide a unique tool to protect and enhance both identity security and privacy and to protect against fraud and identity theft, especially as a factor in identity verification. When your personal data are protected by access mechanisms that include one or more biometric factors, it becomes much more difficult for someone else to gain access to your personal data and applications because no one else has your unique biometric attributes. This enables legitimate access and reduces the risk that a person can steal your identity and, posing as you, collect benefits; board an airplane; get a job; gain access to your personal data, etc.

Read more →
Mexico, U.S. Marine Corps
Marine Corps Intelligence Activity Mexico Country Handbook
June 21, 2014
MCIA-MexicoHandbook_Page_011

This handbook provides basic reference information on Mexico, including its geography, history, government, military forces, and communications and transportation networks. This information is intended to familiarize military personnel with local customs and area knowledge to assist them during their assignment to Mexico.

Read more →
Singapore, U.S. Marine Corps
Marine Corps Intelligence Activity Singapore Country Handbook
June 19, 2014
MCIA-SingaporeHandbook_Page_009

This handbook provides basic reference information on Singapore, including its geography, history, government, military forces, and communications and transportation networks. This information is intended to familiarize military personnel with local customs and area knowledge to assist them during their assignment to Singapore.

Read more →
Intelligence Fusion Centers, Pennsylvania
(U//FOUO) Pennsylvania Fusion Center Bulletin: Targeting First Responders
June 15, 2014
PACIC-TargetingFirstResponders

First responders, such as law enforcement, emergency medical services (EMS), and firefighters, often arrive at incidents completely focused on the emergency at hand. Whether it is a fire, a chest pain complaint, or a vehicular accident, the first responders prepare for certain events to take place during emergency situations and personal safety is a priority throughout the response. Unfortunately, in the past few years there are have been several occurrences where first responders became the victims of ambushes while performing their duties to protect citizens and save lives.

Read more →

Show more