Category Archives: PUBLIC INTELLIGENCE

Virginia Police Domestic Terrorism and Extremist Groups Presentation

 

Domestic Terrorism and Extremist Groups

Page Count: 41 pages
Date: 2016
Restriction: Law Enforcement Sensitive
Originating Organization: Unknown
File Type: pdf
File Size: 17,464,838 bytes
File Hash (SHA-256):537FFDC427AAB04020F4927A11266F2319AA395C805C3CA627B534F1C45A6340

Download File

va-domesticextremism_page_03

va-domesticextremism_page_04

va-domesticextremism_page_12

va-domesticextremism_page_26

va-domesticextremism_page_31

Advertisements

Heroin and Fentanyl in the United States

Heroin and Fentanyl in the United States

Page Count: 22 pages
Date: November 2016
Restriction: None
Originating Organization: Drug Enforcement Administration
File Type: pdf
File Size: 1,666,389 bytes
File Hash (SHA-256):9AFEAD5D69F929AF77F41CC7460CBF4B52F89B17726974CB9B67EF8BAF19748C

Download File

dea-heroinfentanyl_page_08

dea-heroinfentanyl_page_10

dea-heroinfentanyl_page_11

dea-heroinfentanyl_page_12

dea-heroinfentanyl_page_13

dea-heroinfentanyl_page_15

 

 

Revealed – U.S. Army Commanders Guide to Human Intelligence (HUMINT)

Commanders Guide to Human Intelligence (HUMINT)

Page Count: 42 pages
Date: August 20, 2012
Restriction: For Official Use Only
Originating Organization: U.S. Army, Center for Army Lessons Learned
File Type: pdf
File Size: 1,549,236 bytes
File Hash (SHA-256):16CD07D4EAB8CD147387C726471A2581DE67622689B1C14324D68FE208DD54D4

Download File

Army commanders rely upon timely, relevant, and accurate combat information and intelligence in order to successfully plan, prepare, and execute operations. Human intelligence (HUMINT) and counterintelligence (CI) are two critical assets commanders have, either organic to their unit’s table of organization and equipment (TOE) or through attachment from a supporting command, which can provide input to both combat information and intelligence. While there are similarities between the methodology and tactics, techniques, and procedures (TTP) used by HUMINT and CI, their training and missions are separate and distinct.

This publication serves as a guide to U.S. Army commanders with organic or attached HUMINT elements supporting their unit at the tactical level. This guide is designed to provide the supported commander with an understanding of the mission, capabilities, and effective employment of HUMINT personnel.

HUMINT MISSION AND CAPABILITIES

1-1. HUMINT collection capabilities include the ability to—

  • Collect information and cue from an almost endless variety of potential sources, including friendly forces, civilians, detainees, and source-related documents.
  • Focus on the collection of detailed information not available by other means. This includes information on threat intentions, and local civilian and threat force attitudes and morale. It also includes building interiors and facilities that cannot be collected on by other means due to restrictive terrain or environmental conditions.
  • Corroborate or refute information collected from other reconnaissance and surveillance assets.
  • Operate with minimal equipment and deploy in all operational environments in support of offensive, defensive, stability and reconstruction operations, or civil support operations. Based on solid planning and preparation, HUMINT collection can provide timely information if deployed forward in support of maneuver elements. Additional equipment and resources may be required for controlled source operations (CSO) due to mission, enemy, terrain and weather, troops and support available, time available, and civil considerations (mission variables) and operational environment considerations.

HUMAN INTELLIGENCE VERSUS COUNTERINTELLIGENCE

1-15. Some U.S. Army and MI leaders often misunderstand the differences between the HUMINT and CI disciplines or try to use the two interchangeably. While both disciplines utilize similar methodologies (talking to a human source) and TTP (used to collect and exploit the information), the overriding differences between the two collection activities are the type of information targeted and the objective of the collection. Both HUMINT and CI disciplines require specific training and certification criteria for those agents and collectors allowed to conduct these operations. Additionally, both disciplines have legal restrictions on who is authorized to conduct these operations, as well as when and where.

USE OF HUMINT COLLECTORS

A-26. All U.S. Army commanders, especially commanders of MI units, must understand the capabilities and how to employ their HUMINT Soldiers to avoid misusing and wasting a valuable asset. HUMINT Soldiers are limited and valuable resources providing singular capabilities no one else can. The 2X can greatly assist the commander in understanding the full range of HUMINT capabilities and how to employ them in a manner which best assists the commander in obtaining PIRs, greater situational awareness, and a better understanding of the operational environment.

A-27. HUMINT collectors are Soldiers and are expected to conduct additional duties (for example, guard duty, escort duty, and others) like all unit Soldiers. However, HUMINT activities require significant time to establish and develop to fully support the commander. Even during times between significant operational activities (for example, patrols, raids, cordon and searches, and others), HCTs should be identifying and developing potential sources of information. The commander must balance assigning additional duties with their need for information to support current or future operations.

A-28. HUMINT collectors interact with and question other human beings and will often be a qualified linguist in the target area language. Based upon these skill sets, commanders may assign HUMINT collectors missions similar to activities often associated with civil affairs, MP, criminal investigative command, or interpreters or translators. However, this may be a misuse and potentially illegal. Requiring, or allowing, HUMINT collectors to perform functions outside their MOS can substantially degrade the HUMINT mission and the overall intelligence mission. This significantly reduces the amount of intelligence the commander receives and limits the commander’s situational awareness and situational understanding of the operational environment.

Summary of Report on Snowden Disclosures

 

Executive Summary of Review of the Unauthorized Disclosures of Former National Security Agency Contractor Edward Snowden

Page Count: 4 pages
Date: September 15, 2016
Restriction: None
Originating Organization: House Permanent Select Committee on Intelligence
File Type: pdf
File Size: 764,355 bytes
File Hash (SHA-256):9D2E808E8281494BA8F6FEB6A3CDA09A8A86E8C83C88F3883939A8155007DD70

Download File

In June 2013, former National Security Agency (NSA) contractor Edward Snowden perpetrated the largest and most damaging public release of classified information in U.S. intelligence history. In August 2014, the Chairman and Ranking Member of the House Permanent Select Committee on Intelligence (HPSCI) directed Committee staff to carry out a comprehensive review of the unauthorized disclosures. The aim of the review was to allow the Committee to explain to other Members of Congress–and, where possible, the American people–how this breach occurred, what the U.S. Government knows about the man who committed it, and whether the security shortfalls it highlighted had been remedied.

Over the next two years, Committee staff requested hundreds of documents from the Intelligence Community (IC), participated in dozens of briefings and meetings with IC personnel, conducted several interviews with key individuals with knowledge of Snowden’s background and actions, and traveled to NSA Hawaii to visit Snowden’s last two work locations. The review focused on Snowden’s background, how he was able to remove more than 1.5 million classified documents from secure NSA networks, what the 1.5 million documents contained, and the damage their removal caused to national security.

The Committee,s review was careful not to disturb any criminal investigation or future prosecution of Snowden, who has remained in Russia since he fled there on June 23, 2013. Accordingly) the Committee did not interview individuals whom the Department of Justice identified as possible witnesses at Snowden’s trial, including Snowden himself, nor did the Committee request any matters that may have occurred before a grand jury. Instead, the IC provided the Committee with access to other individuals who possessed substantively similar knowledge as the possible witnesses. Similarly, rather than interview Snowden’s NSA coworkers and supervisors directly, Committee staff interviewed IC personnel who had reviewed reports of interviews with Snowden’s co-workers and supervisors. The Committee remains hopeful that Snowden will return to the United States to face justice.

The bulk of the Committee’s 36-page review, which includes 230 footnotes, must remain classified to avoid causing further harm to national security; however, the Committee has made a number of unclassified findings. These findings demonstrate that the public narrative popularized by Snowden and his allies is rife with falsehoods, exaggerations, and crucial omissions, a pattern that began before he stole 1.5 million sensitive documents.

First, Snowden caused tremendous damage to national security, and the vast majority of the documents he stole have nothing to do with programs impacting individual privacy interests-they instead pertain to military, defense? and intelligence programs of great interest to America,s adversaries. A review of the materials Snowden compromised makes clear that he handed over secrets that protect American troops overseas and secrets that provide vital defenses against terrorists and nation-states. Some of Snowden’s disclosures exacerbated and accelerated existing trends that diminished the IC’s capabilities to collect against legitimate foreign intelligence targets, while others resulted in the loss of intelligence streams that had saved American lives. Snowden insists he has not shared the full cache of 1.5 million classified documents with anyone; however, in June 2016, the deputy chairman of the Russian parliaments defense and security committee publicly conceded that “Snowden did share intelligence” with his government. Additionally, although Snowden’s professed objective may have been to inform the general public, the information he released is also available to Russian, Chinese, Iranian, and North Korean govemment intelligence services; any terrorist with Internet access; and many others who wish to do harm to the United States.

Counter-Da’esh Influence Operations Cognitive Space Narrative Simulation Insights

Counter-Da’esh Influence Operations Cognitive Space Narrative Simulation Insights

Page Count: 69 pages
Date: May 2016
Restriction: None
Originating Organization: Joint Staff J39
File Type: pdf
File Size: 3,665,757 bytes
File Hash (SHA-256):D7EC7D64E98A8B16FBA01D8D46A3AE74CC83DB19378C9EC6C6D5D3F23AAB18E4

Download File

When planning to deal with any adversary or potential adversaries, it is essential to understand who they are, how they function, their strengths and vulnerabilities, and why they oppose us. Events over the course of the last year and a half highlight the importance of those factors as they relate to the Islamic State of Iraq and the Levant (ISIL or Da’esh). One of Da’esh’s obvious strengths is its ability to propagate tailored messages that resonate with its audiences. If the US Government and our allies are to counter Da’esh effectively, we must attack this center of gravity.

The Joint Staff J-39 Strategic Multilayer Assessment (SMA) branch has been evaluating options in “Cognitive Space” to conduct Information Operations to disrupt Da’esh’s ability to command and control forces, neutralize its ability to maintain or increase moral, political, and financial support as well as recruit foreign fighters. This SMA effort continues to identify methods to psychologically isolate Da’esh leaders from one another and their respective constituencies inside and outside of the organization. Furthermore, this SMA effort has been assessing the value of “integrated neuro-cognitive-narrative maneuver” approaches to develop messages and actions that are more likely to have intended effects and less likely to have undesirable unintended or collateral effects, as well as to evaluate message delivery methods more effectively and efficiently by developing campaigns that achieve undercutting effects.

The cornerstone of the effort was the execution of a simulation facilitated by the University of Maryland ICONS team, which sought to

a. support the Psychological Operations (PSYOP) community in meeting training requirements in ways that reinforce the PSYOP process and enhance counter-Da’esh messaging.

b. support the PSYOP community in integrating neuro-cognitive and social science concepts to refine counter-Da’esh message content and increase the effectiveness of the Information Operations (IO) campaign.

c. assist the PSYOP community with understanding the operational environment (OE) and the human networks operating in the OE: friendly, threat, and neutral. Possible examples include providing a (Political, Military, Economic, Social, Information, and Infrastructure) PMESII-framed OE analysis and center of gravity analysis.

This white paper is a compilation of the key findings from the simulation.

countering-isil

Homegrown Terrorists Increasingly Prioritizing Civilian Targets

A graph showing

A chart from the August 2016 bulletin issued by the Department of Homeland Security, FBI, and National Counterterrorism Center (NCTC) shows the increasing number of plots focusing on civilian targets.

A joint intelligence bulletin issued in late August by the Department of Homeland Security, FBI, and National Counterterrorism Center (NCTC) assesses that homegrown violent extremists (HVEs) are “increasingly favoring civilian targets” as part of a wider “variety of targeting choices.”  Previous assessments have found that HVEs are most likely to prioritize attacks on “law enforcement personnel, military members, and US Government-associated targets.”  However, a recent shift towards civilian targets has likely been driven by the accessibility of “soft targets” that are often less secure than government facilities and provide greater opportunities for conducting mass casualty attacks.

Over the last year, seventy-seven percent of the “thirteen HVE attacks and disruptions . . . focused on civilian targets, in contrast to eleven percent of the eighteen HVE attacks and disruptions in the first seven months of 2015.”  Three separate HVE plots in 2016 targeted religious institutions, the “first such cases since a 2009 plot against a New York-based synagogue” according to the bulletin.  Since 2015, HVEs have “plotted against or attacked restaurants, a nightclub, a concert, a public ceremony, a place of employment, and a college classroom, demonstrating the variety of targeting choices.”  The bulletin was issued prior to the recent bombings in New York and New Jersey which also targeted civilian locations including a train station, charity race, and numerous public streets.

The bulletin states that a combination of factors ranging from “perceived lower levels of security” as well as “violent extremist messaging glorifying recent attacks on civilians” have motivated this shift in tactics.  The bulletin also highlights a newer trend which has led HVEs to select “familiar targets of personal significance to simplify plotting,” often capitalizing on preexisting grievances or a desire for revenge.  This is particularly relevant to cases such as the December 2015 attack on the Inland Regional Center in San Bernardino, during which Syed Rizwan Farook and his wife Tashfeen Malik killed fourteen people at a training event and Christmas Party hosted by the San Bernardino County Department of Public Health.  Farook, who worked for the county as a health inspector, had been attending the event earlier in the day prior to conducting the attack.  In another example cited in the bulletin, an eighteen-year-old freshman at the University of California at Merced named Faisal Mohammad stabbed a classmate and three other individuals at the college before being shot by a campus police officer.  The FBI later stated that Mohammad had been viewing extremist material online and they believe the attack was inspired by the Islamic State of Iraq and the Levant (ISIL).

To help prevent HVE attacks, the bulletin recommends that state and local authorities be vigilant and “report suspicious activities related to potential mobilization to violence in the Homeland by US-based individuals inspired by foreign terrorist organizations.”

Exposed – FBI National Instant Criminal Background Check System (NICS) Presentation

 

National Instant Criminal Background Check System (NICS)

Page Count: 25 pages
Date: 2016
Restriction: Law Enforcement Sensitive
Originating Organization: Federal Bureau of Investigation, Criminal Justice Information Systems Division
File Type: pdf
File Size: 1,343,832 bytes
File Hash (SHA-256):0E6448F6CF16E5046871E1CDFA3DEDCCCA00237DD2B507AD0EB5ADAE1DA6A0D6

Download File

 

  • NICS Overview
  • Federal Firearm Prohibitions
  • NICS Access
  • Disposition of Firearm and Permit Checks
  • Conducting a Query with all NICS Protection Orders Returned (QNP)
  • Law Enforcement Enterprise Portal (LEEP)
  • NICS Denied Transaction File (DTF)
  • Contact Information

Title 18, United States Code, Section 922

  • (g)(1) Convicted of a crime punishable by more than one year or a misdemeanor punishable by more than two years
  • (g)(2) Fugitives from justice
  • (g)(3) Unlawful user of or addicted to any controlled substance
  • (g)(4) Adjudicated/committed to a mental institution
  • (g)(5) Illegal/unlawful aliens
  • (g)(6) Dishonorable discharge from military
  • (g)(7) Renounced U.S. Citizenship
  • (g)(8) Protection/restraining order
  • (g)(9) Misdemeanor crimes of domestic violence
  • (n) Under indictment/information for a crime punishable by more than one year or a misdemeanor punishable by more than two years

fbi-nics_page_04fbi-nics_page_05fbi-nics_page_11fbi-nics_page_12fbi-nics_page_13