STRATFOR Global Information Services

Size: px
Start display at page:

Download "STRATFOR Global Information Services"

Transcription

1 The Terrorist Attack Cycle December 1, 2009

2 STRATFOR Global Information Services STRATFOR Global Information Services publishes intelligence, analysis and research for professionals in government, corporations and research institutions. For more than a decade, this information has helped customers monitor, track and manage political risk and instability around the world. STRATFOR Global Information Services delivers information in three ways: via password protected websites, customized information and data feeds and customized briefings and presentations. More than 1 million professionals rely upon this information at organizations that range from The U.S. Air Force to Yale University to The Federal Reserve Bank of Atlanta and others. STRATFOR Global Information Services 700 Lavaca Street, Suite 900 Austin, TX Tel: Electronic delivery Reports are also available online by subscribing at com. Copyright 2009 STRATFOR. All Rights Reserved. Neither this publication nor any part of it may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, without prior permission of STRATFOR. All information in this report is verified to the best of the author s and the publisher s ability. However, STRATFOR does not accept responsibility for any loss arising from reliance on it. To learn more please contact Patrick Boykin, Vice President, by calling

3 The Terrorist Attack Cycle December 1, Vulnerabilities in the Terrorist Attack Cycle 7 Operational Planning 9 Selecting the Target 11 Deployment and Attack 13 Media Exploitation iii

4 The Terrorist Attack Cycle Vulnerabilities in the Terrorist Attack Cycle Attacks designed to instill terror, not only among the surviving victims and those in the immediate vicinity of the violence, but among society in general, always appear to occur suddenly to come out of the blue. The actual event, however, is the culmination of the six-stage attack cycle: target selection, planning, deployment, the attack, escape and exploitation. During the target selection and planning stages, terrorists conduct preoperational surveillance. In this stage, terrorists are no different from other criminals in preparing for an operation. The complexity and extent of the surveillance, however, vary with the scale of the operation and the end goal. A purse snatcher, for example, might size up the target for only a few seconds, while pre-operational surveillance for a terrorist attack could take several weeks. The purpose of surveillance is to determine the target s patterns of behavior if it is an individual, or possible weaknesses and attack methods if the target is a building or facility. When the target is a person, perhaps targeted for assassination or kidnapping, terrorists will look for things such as the time the target leaves for work or what route is taken on certain days. They also will take note of what type of security, if any, the target uses. For fixed targets, the surveillance will be used to determine patterns and levels of security. For example, the plotters will look for times when fewer guards are present or when the guards are about to come on or off their shifts. In both cases, this information will be used to select the best time and location for the attack, and to determine what resources are needed to execute the attack. Because part of pre-operational surveillance involves establishing patterns, terrorists will conduct their surveillance multiple times. The more they conduct surveillance, the greater the chances of being observed themselves. If they are observed, their entire plan can be compromised by alerting security personnel to the fact that something is being planned. Conversely, the terrorists could end up being surveilled themselves and can unwittingly lead intelligence and law enforcement agencies to other members of their cell. Despite some impressions that al Qaeda is capable of conducting stealthy, clandestine surveillance, evidence recovered in Afghanistan during the U.S.-led invasion in October 2001 and other places suggest that most of the terrorist network s surveillance is sloppy and even amateurish. Al Qaeda training manuals, including the infamous Military Studies in the Jihad against the Tyrants, and their online training magazines instruct operatives to perform surveillance, and even go so far as to discuss what type of information to gather. The texts, however, do not teach how to gather the information. This is the stage at which al Qaeda s operations often have found to be lacking. The skills necessary to be a good surveillance operative are difficult to acquire, and take extensive training to develop. It is extremely difficult, for instance, to act naturally while performing an illegal act. Quite often, surveillance operatives

5 Courtesy of ANTONIO SCORZA/AFP/Getty Images. Security personnel monitor the surveillance cameras during a terrorist attack drill at the Engenha stadium in Rio de Janeiro, Brazil, November 24, will get the so-called burn syndrome, the feeling that they have been detected even though they have not. This feeling can cause them to act abnormally, causing them to blow their cover. As a result, it is very easy for amateurs to make mistakes while conducting surveillance, such as being an obvious lurker, taking photos of objects or facilities that would not normally be photographed, and not having a realistic cover story when confronted or questioned. In some cases, however, al Qaeda operatives have conducted extensive, detailed surveillance of their potential targets. In July 2004, the arrest in Pakistan of an individual identified by U.S. officials as Mohammad Naeem Noor Khan revealed a personal computer that contained detailed information about potential economic targets in the United States. The targets included the New York Stock Exchange and Citigroup headquarters in New York, the International Monetary Fund and World Bank buildings in Washington, D.C., and Prudential Financial headquarters in Newark, N.J. From the information on the computer, it appeared that the targets were under surveillance for an extended period. 5

6 Countersurveillance the process of detecting and mitigating hostile surveillance is an important aspect of counterterrorism and security operations. Good countersurveillance is proactive; it provides a means to prevent an attack from happening. Countersurveillance can be an individual or group effort, involving a dedicated countersurveillance team. Individuals can and should conduct their own countersurveillance by being aware of their surroundings and watching for individuals or vehicles that are out of place. Countersurveillance is the proactive means of spotting terrorist and criminal surveillance during the target selection and planning stage the time the operation is most vulnerable to interdiction. Law enforcement and intelligence agencies, corporations and individuals must understand the importance of countersurveillance and be capable of recognizing hostile surveillance before the next phase of the attack cycle begins. Once the actual attack has begun, it cannot be undone. The genie cannot be put back into the bottle. Operational Planning Terrorist attacks often require meticulous planning and preparation. As we have said, this process takes place in a six-stage attack cycle: target selection, planning, deployment, the attack, escape and exploitation. After a target is selected and surveilled, operational planning for the actual attack begins. During this phase, the who, how, where and when of the attack are determined. To make these decisions, the plotters must conduct more surveillance, initiate logistic support and assemble the attack team. In the course of performing these acts, the cell is further exposed to vulnerabilities that can compromise the operation. Surveillance conducted during the target-selection stage of the attack cycle is aimed at determining which aspects of a target make it a desirable candidate for attack. Once these factors are established and a specific target is chosen over others, planning for the actual attack begins. This preparation includes more surveillance, weapons selection or bomb assembly, money transfers, bringing the attack team together and sometimes conducting dry runs. During this time, communication in the form of phone calls or Internet traffic increases, as does the movement of group members. This increase in activity naturally leaves signs that can tip-off law enforcement or intelligence personnel. The money transfers, the communications traffic and the movement of individuals across borders leave trails that can be followed. If enough pieces of the puzzle are collected from this activity, a complete picture of the planned attack can emerge. During the operational planning stage, target surveillance is often more difficult to detect than during the target-selection stage. For one thing, the operatives conducting operational surveillance generally are better at their jobs than the ones who conduct target-selection surveillance. Instead of gathering information about possible targets, these operatives are looking at specific aspects of the target. In many cases, those conducting the surveillance are the ones who will carry out the actual attack. 6

7 This also creates vulnerability in the attack cycle. Because the operatives who will carry out the attack usually are more closely linked to the plotters than those who initially surveilled the target, they likely are known to intelligence or law enforcement agencies. Knowing this makes them more careful, or more nervous, depending on the individual. If they are more nervous about being observed by countersurveillance personnel, they might make mistakes that can expose them. During the planning stage, terrorists begin performing operational acts that are more visible to law enforcement and intelligence agencies. Some of the training and preparation the pilot training for the Sept. 11 attacks, for example can take months or even years. In addition, if counterterrorism personnel have good intelligence that allows them to piece the puzzle together, they possibly can Courtesy of YOSHIKAZU TSUNO/AFP/Getty Images. This crowded street scene in Tokyo can be evocative of the actual busy streets that terrorists employ for both surveillance and dry runs. 7

8 determine which stage of the attack cycle the cell is in. Cell members can then be rounded up immediately, or allowed to continue operating so as to expose others involved in the operation. From a counterterrorism perspective, the critical decision is, at what point to strike. Moving in too early could result in failure to round up the entire team; too late could find the attack in progress. During the attack cycle, law enforcement and intelligence agencies usually receive some indication that an operation is being planned. Lack of resources, including in human intelligence and analytical capacities, however, sometimes prevents the full picture from forming in time to prevent an attack. It is during the planning stage that terrorists begin carrying out duties that can attract attention, even though counterterrorism personnel often lack the resources to understand what they are seeing. This is a critical phase of the attack cycle in which a cell can either be exposed or move one step closer to committing its attack. Selecting the Target Terrorist attacks and criminal operations often require meticulous planning and preparation. As we have said, this process takes place in a six-stage attack cycle: target selection, planning, deployment, the attack, escape and exploitation. The cycle begins with selecting a target based on several factors. Terrorist targets rarely are chosen based on military utility, such as disrupting lines of communication or supply, or otherwise limiting an enemy s capacity to operate. On the contrary, terrorists generally choose targets that have symbolic value or that will elicit the greatest media reaction. One way to guarantee the latter is by killing and maiming a large number of people to generate graphic, provocative images that can be splashed across television screens and the front pages of newspapers. The reason for this need to generate media attention is that terrorists, unlike insurgent groups, are not after military targets. Their target audience is people around the world who witness the unfolding events via the media. The Sept. 11 al Qaeda attacks, for example, were designed to send a message to the Western world and the Muslim streets that went far beyond the immediate destruction. Because they usually are lightly armed and equipped compared to modern military units, terrorists usually prefer to avoid attacking hard targets heavily defended or robust targets such as military units or installations. In addition, less-protected targets, such as civilians and civilian infrastructure, will generate a higher number of casualties and generate more media attention. Therefore, soft targets lightly or undefended civilian targets and important symbols more often are chosen by terrorists during this stage of the attack cycle. Criminals use similar criteria when choosing their targets, although their operations are often not as complex. Criminals often select their targets based on vulnerability and lack of defenses or protection. Like terrorists, criminals use a rational cost/benefit analysis in selecting their targets, although for mentally imbalanced criminals, such as stalkers, the target selection process rarely follows 8

9 Courtesy of NICOLAS ASFOURI/AFP/Getty Images. Pakistani students speak on the telephone a few miles away from the scene of a bomb blast at Islamic International University in Islamabad on October 20, a rational pattern. Their targets are chosen based in large part on delusion or emotion. All of the Sept. 11 targets selected by al Qaeda were highly symbolic, including the Pentagon. Had al Qaeda really wanted to impact the U.S. ability to conduct military operations, it would have attacked a communications or command and control node. Instead, the attack against the Pentagon did very little to disrupt the U.S. military capabilities on the day of the attack or in the days that followed. In fact, U.S. Secretary of Defense Donald Rumsfeld was able to give a press conference from one part of the building while the affected part still burned. During the target selection phase, terrorists research potential targets. The depth and detail of the research varies with the group and the target selected. In recent years, the Internet has made this stage of the attack cycle much easier. By using any number of search engines, terrorists can obtain pictures, maps, histories and even satellite images of their targets. Activists such as anti-globalization groups or environmental groups are very good at conducting research, known as electronic scouting, over the Internet. After the information is gathered electronically, the 9

10 plotters then conduct pre-operational surveillance of targets to determine which are the most vulnerable and desirable. In recent years, embassies and diplomatic missions have been adapting to better deter and defend against terrorist attacks. In some parts of the world, Western embassies are practically fortresses, with thick, bullet-proof glass and concrete barriers to keep potential vehicle-borne improvised explosive devices (VBIEDs) away. More important, new embassies are constructed farther away from streets to provide them stand-off distance to lessen the impact of VBIEDs. Because embassies have become hard targets, terrorists have turned to attacking hotels, which also are symbols of Western influence in many parts of the world. In many ways, large Western hotel chains have become today s embassies. Lowering their highly visible profile by removing company signs and logos to discourage attacks would be contrary to most business practices, especially abroad. Because they are soft targets, attacks against hotels can be expected to generate a high number of casualties, many of them Western tourists or business people. In November 2002, 15 people were killed when al Qaeda-linked suicide bombers attacked the Israeli-owned Paradise Hotel in Kilifi, Kenya. In August 2003, the Jemaah Islamiyah militant group attacked the JW Marriot in Jakarta, Indonesia, killing more than a dozen people and injuring more than 100. In July, four al Qaeda-linked suicide car bombers attacked hotels in Egypt s Sharm el-sheikh resort, killing 34 people. The criteria used by terrorists to select their targets should be taken into account when developing anti-terrorism measures. Making a target less attractive by reducing access to it, increasing security and defense measures, reducing the potential casualty count or by using countersurveillance to interrupt the attack cycle could encourage terrorists to move on to another target that offers fewer challenges. Anti-terrorism experts who say the key is not to be able to run faster than the bear, just faster than the other person, are right on target. Deployment and Attack Terrorist attacks often require meticulous planning and preparation. As we have said, this process takes place in a six-stage attack cycle: target selection, planning, deployment, the attack, escape and exploitation. After a target is selected and surveilled, operational planning for the attack begins. When the planning stage is complete, the terrorists deploy for the actual attack the point of no return. In the deployment stage, the attackers will leave their safe houses, collect any weapons, assemble any improvised explosive devices being used, form into teams and move to the location of the target. If counterterrorism and law enforcement personnel have not stopped them by this point, the terrorists will press home their attack. Once terrorists have deployed for the attack, the cycle is beyond stopping. In order to prevent an attack, in other words, counterterrorism personnel must interdict the plot before it reaches the deployment phase. Even if part of the cell 10

11 carrying out the attack has been interdicted, the remaining members will still go on with their plan. In fact, they may be unaware that their colleagues have been apprehended. This was the case in the attack on the U.S. Consulate in Jeddah, Saudi Arabia in December The attack was planned with two attacking elements, but Saudi intelligence and anti-terrorism forces disrupted the larger of the two in advance of the operation, leaving only the smaller element which still attacked the consulate. The second group quite possibly had no idea that the first one had been interdicted, and expected it to take part in the attack as planned. In some cases, the selected target will still be attacked even if a previous attempt has failed. The October 2000 attack on the USS Cole in Aden harbor, Yemen, went forward despite the failure of a previous attempt against USS The Sullivans in the same harbor. The strike against The Sullivans failed when the attacking boat sunk under its own weight, but the tactic was successfully used 10 months later against the USS Cole. Counterterrorism and intelligence agencies sometimes mistakenly assume that terrorists will refrain from attacking a target that has been attacked once before. As a result, intelligence collection, vigilance and security around that target may be decreased. This can have tragic consequences as demonstrated by the Courtesy of Mark Wilson/Getty Images. The USS Cole departs the Norfolk, Virginia on June 8, 2006 for the Middle East for the first time since it was bombed by terrorists in Yemen in 2000 killing 17 sailors. 11

12 repeated attacks on the World Trade Center and tourist resorts on the Indonesian resort island of Bali. Incorrectly identifying the attacking element of a terrorist cell is another mistake. This happened in the November 2004 assassination of Dutch filmmaker Theo van Gogh by Mohammed Bouyeri, a Dutchman of Moroccan descent. Bouyeri had been under surveillance by Dutch authorities for his connection to the Hofstad Network, a group of individuals with jihadist sympathies in Holland. However, in the course of their surveillance, the Dutch investigators did not consider Bouyeri to be a threat; rather, they assumed that his role in the network was a logistical rather than an operational one, and shifted their attention to other suspects. Once the attack stage begins, the only way to mitigate the level of death and/ or destruction is for the intended victims to put in motion their pre-planned countermeasures. During the planning phase, terrorists seek to achieve tactical surprise they have control over the time, place and method of attack. If the target is surprised and freezes like a deer in the headlights, the consequences will be dire. It is critical that the target realizes it is being attacked (this is called attack recognition) and takes immediate action to flee the attack zone. Once the attack goes operational, for the most part it will be successful and only effective protective security countermeasures can mitigate the blast effect or reduce the body count. More established groups, such as al Qaeda, factor in all visible security measures as part of their overall tactical plans, thus negating that factor as a means of protection. This can increase the number of casualties. Only by conducting drills, establishing safe havens, and practicing emergency action plans can those who occupy targeted locations have a chance of surviving an attack. Media Exploitation Terrorist attacks are made of six stages: target selection, planning, deployment, the attack, escape and exploitation. After the perpetrators successfully stage an attack, they will attempt to derive additional value from it by generating publicity. The goal beyond flaunting the success and spreading the terror is to gain wider support and sympathy from those most inclined to agree with the perpetrators goals and tactics. Brutal and well-publicized attacks also make it easier for terrorist or insurgent groups to collect revolutionary taxes protection money from farmers or businessmen in their areas of operation. The best way to elicit widespread coverage, of course, is to carry out spectacular, brazen and particularly violent acts, or attacks against prominent people meaning potential media reaction is considered during the first phase of the attack cycle, target selection. An attack against a prominent target or one carried out in a densely populated area with a probability of generating a high number of casualties makes more of a media impact than hitting a target who is not as well known or has less potential for producing shocking scenes of mass deaths and injuries. Because of the built-in sensationalism, the media tacitly assists the terrorists in this goal by providing timely, sometimes around-the-clock coverage of attacks. 12

13 Courtesy of Courtney Kealy/Getty Images The Mukefaha, a Lebanese Army anti-terrorism special unit, train at the Beirut International Airport October 26, The same airport was the scene of the 1985 TWA Flight 847 hijacking. In some cases, the media actually contributes to the hype surrounding terrorist threats. The Internet is having a new and dramatic impact on the way terrorist groups exploit their activities. By posting statements to certain Web sites, these groups are able to gain almost instant access to the world s media. The Internet has been used in combination with the particularly graphic and brutal spectacle of beheadings. By posting the videos of beheadings on the Internet along with a statement, Abu Musab al-zarqawi achieved a high degree of shock value and infamy. This notoriety catapulted him into the high-level leadership tier of the international jihadist movement. An excellent example of a terrorist attack that became a media circus is the June 1985 hijacking of Trans World Airlines Flight 847. The flight from Athens to Rome was hijacked by terrorists demanding the release of Shiite Muslim prisoners from Israeli jails. The hijackers forced the crew to fly the Boeing 727 to Beirut, which was in the middle of a civil war. The hijackers then demanded to be flown to Algiers, Algeria, then back to Beirut, then back to Algiers and finally back to Beirut. 13

14 During the three-day ordeal, the media were allowed to get close enough to the aircraft for the hijackers to issue statements and give interviews from an open cockpit window. At times, the hijackers brandished weapons for the media s benefit and threatened to kill hostages. The most graphic coverage occurred during the second stop in Beirut, when the hijackers killed Robert Stethem, a 22-year-old U.S. Navy diver who had been on leave when the flight was hijacked. After discovering that he was a member of the U.S. military, the hijackers brutally beat Stethem, an event the plane s pilot reported to controllers on the ground as it happened. The international media then broadcast recordings of the pilot s report. During Flight 847s second stop in Beirut, the hijackers stood the barely conscious Stethem in the door of the aircraft, shot him in the head and dumped his body on the tarmac as international media recorded the event. Well-publicized hijackings also can be exploited to gain the release of imprisoned comrades, as was the case with the December 1999 hijacking of an Air India flight from Kathmandu to New Delhi. After a stalemate on the runway in Kandahar, Afghanistan, the five-man hijacking crew succeeded in achieving the release of three of their fellow Kashmiri militants from prison in India, including Harkat-ul-Mujahideen leader Masood Azhar. Media exploitation can work both ways, however. The United States makes an effort to report any possible rifts or friction within groups such as al Qaeda and the Taliban. These reports may be legitimate or part of a disinformation campaign, but either way the leaders of these groups must expend energy to refute false claims, or attempt to repair real rifts. This has been a significant part of the U.S. strategy against al Qaeda in Iraq and Afghanistan. In early October, a Pentagon spokesman reported that al Qaeda s second-in command Ayman al-zawahiri had written a letter to al Qaeda in Iraq leader Abu Musab al-zarqawi warning that the terrorist network is losing force in Afghanistan due to the loss of leadership figures, disruptions in its lines of communication and lack of funds. In the letter, al-zawahiri reportedly criticized al-zarqawi for committing acts that could alienate otherwise sympathetic Muslims. In a purported letter to al Qaeda leader Osama bin Laden posted on Islamist Web sites in June, al-zarqawi said his ability to conduct operations is dwindling and warned his group would have to move to another country or members would have to die as martyrs should the group be unable to assume control of Iraq. In May, U.S. forces in Iraq reported seizing a letter reportedly written by Abu Asim al-qusaymi al-yemeni, an al Qaeda operative in the country, addressed to the Sheikh, a name often used to refer to al-zarqawi. In the letter, al-yemeni, a member of al Qaeda in Iraq, criticizes the Sheikh for the incompetence of jihadist leaders and decreasing support for the movement. By going to the media with these supposed rifts and deficiencies in the global jihadist movement, law enforcement and intelligence agencies hope to complicate the networks ability to operate. Militant leaders, then, must provide their own spin on the reports in order to downplay any purported weaknesses or disunity or risk losing the confidence of their supporters. 14

15 STRATFOR Global Information Services STRATFOR Global Information Services publishes intelligence, analysis and research for professionals in government, corporations and research institutions. For more than a decade, this information has helped customers monitor, track and manage political risk and instability around the world. STRATFOR Global Information Services delivers information in three ways: via password protected websites, customized information and data feeds and customized briefings and presentations. More than 1 million professionals rely upon this information at organizations that range from The U.S. Air Force to Yale University to The Federal Reserve Bank of Atlanta and others. STRATFOR Global Information Services 700 Lavaca Street, Suite 900 Austin, TX Tel: Electronic delivery Reports are also available online by subscribing at com. Copyright 2009 STRATFOR. All Rights Reserved. Neither this publication nor any part of it may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, without prior permission of STRATFOR. All information in this report is verified to the best of the author s and the publisher s ability. However, STRATFOR does not accept responsibility for any loss arising from reliance on it. To learn more please contact Patrick Boykin, Vice President, by calling

Monday Warm-Up 9/12 What do you know about September 11, 2001?

Monday Warm-Up 9/12 What do you know about September 11, 2001? Monday Warm-Up 9/12 What do you know about September 11, 2001? Know 9/11 Terrorism Al-Qaeda Do Summarize the events of September 11, 2001 by completing a timeline Overview September 11 th, 2001: 19 extremist

More information

CHAPTER 8. Key Issue Four: why has terrorism increased?

CHAPTER 8. Key Issue Four: why has terrorism increased? CHAPTER 8 Key Issue Four: why has terrorism increased? TERRORISM Terrorism by individuals and organizations State support for terrorism Libya Afghanistan Iraq Iran TERRORISM Terrorism is the systematic

More information

Threats to Peace and Prosperity

Threats to Peace and Prosperity Lesson 2 Threats to Peace and Prosperity Airports have very strict rules about what you cannot carry onto airplanes. 1. The Twin Towers were among the tallest buildings in the world. Write why terrorists

More information

Global Terrorism. Traditional Motives: Primary Goal: Popular Methods: Traditional Targets: Recent Developments: Biological & Chemical terrorism

Global Terrorism. Traditional Motives: Primary Goal: Popular Methods: Traditional Targets: Recent Developments: Biological & Chemical terrorism Traditional Motives: Primary Goal: Global Terrorism Gain Independence or Political Freedom Expel Foreigners or their influences Cause Change in Society Preserve Religious or Cultural Beliefs Destruction

More information

(U) Terrorist Attack Planning Cycle A Homeland Case Study

(U) Terrorist Attack Planning Cycle A Homeland Case Study (U) Terrorist Attack Planning Cycle A Homeland Case Study (U) INTRODUCTION (U) This case study is an examination of behaviors that resulted in a disrupted terrorist attack, revealing a cycle of planning

More information

The Global War on Terrorism

The Global War on Terrorism The Global War on Terrorism - Operation ENDURING FREEDOM - Operation IRAQI FREEDOM The Global War on Terrorism Almost every captain in the Air Force who flies airplanes has combat experience virtually

More information

Combating Terrorist Networks. Rebecca Goolsby, Ph.D. ONR/ Constella Group June 2003

Combating Terrorist Networks. Rebecca Goolsby, Ph.D. ONR/ Constella Group June 2003 Combating Terrorist Networks Rebecca Goolsby, Ph.D. ONR/ Constella Group June 2003 Al Qaeda and its Subnets Short background on the problem Al Qaeda as a terrorist organization that developed out of support

More information

Planning Terrorism Counteraction ANTITERRORISM

Planning Terrorism Counteraction ANTITERRORISM CHAPTER 18 Planning Terrorism Counteraction At Army installations worldwide, terrorism counteraction is being planned, practiced, assessed, updated, and carried out. Ideally, the total Army community helps

More information

Case 1:06-cr RWR Document 6 Filed 11/16/07 Page 1 of 11 IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLUMBIA

Case 1:06-cr RWR Document 6 Filed 11/16/07 Page 1 of 11 IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLUMBIA Case 1:06-cr-00089-RWR Document 6 Filed 11/16/07 Page 1 of 11 IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLUMBIA Holding a Criminal Term Grand Jury Sworn in on November 3, 2006 UNITED STATES

More information

SCHOOL BUS DRIVER SECURITY TRAINING PROGRAM

SCHOOL BUS DRIVER SECURITY TRAINING PROGRAM SCHOOL BUS DRIVER SECURITY TRAINING PROGRAM COURSE OUTLINE New Mexico Surety Task Force New Mexico Department of Transportation New Mexico Public Education Department Developed by: Ream Lazaro Lazaro &

More information

IntelCenter. al-qaeda Attack/Messaging Statistics v1.0 PUBLIC RELEASE VERSION. 22 August :32:38 EST / 23:32:38 GMT

IntelCenter. al-qaeda Attack/Messaging Statistics v1.0 PUBLIC RELEASE VERSION. 22 August :32:38 EST / 23:32:38 GMT al-qaeda Attack/Messaging Statistics v1.0 PUBLIC RELEASE VERSION 22 August 2003 18:32:38 EST / 23:32:38 GMT Page 1 of 14 - v1.0 22 August 2003 TABLE OF CONTENTS INTRODUCTION 3 AL-QAEDA OPERATIONAL TEMPO

More information

31 OCTOBER 2010 (U) Explosives Discovered in Packages on Cargo Aircraft Bound for the Homeland

31 OCTOBER 2010 (U) Explosives Discovered in Packages on Cargo Aircraft Bound for the Homeland Produced by Intelligence Watch and Warning 31 OCTOBER 2010 (U) Explosives Discovered in Packages on Cargo Aircraft Bound for the Homeland (U) NOTICE: This report is intended to provide information on a

More information

Middle Eastern Conflicts

Middle Eastern Conflicts Middle Eastern Conflicts Enduring Understanding: Since the fall of the Soviet Union in 1991, the world s attention no longer focuses on the tension between superpowers. Although problems rooted in the

More information

Marine Security Guards

Marine Security Guards united states Department of state Bureau of Diplomatic Security UNITED STATES Marine Security Guards Safeguarding American Missions Around the World 1 In preparation for an emergency drill, a Marine Security

More information

ATTACHMENT CISR INCIDENT MANAGEMENT EXERCISE TERRORISM SCENARIO

ATTACHMENT CISR INCIDENT MANAGEMENT EXERCISE TERRORISM SCENARIO ATTACHMENT CISR INCIDENT MANAGEMENT EXERCISE TERRORISM SCENARIO MODULE 1: PRE-INCIDENT A new video is released by a well-known terrorist organization on several internet sites. The video describes striking

More information

IntelCenter. al-qaeda/al-ablaj Threat Assessment v1.0 PUBLIC RELEASE VERSION. 30 May :00:01 EST / 07:00:01 GMT

IntelCenter. al-qaeda/al-ablaj Threat Assessment v1.0 PUBLIC RELEASE VERSION. 30 May :00:01 EST / 07:00:01 GMT al-qaeda/al-ablaj Threat Assessment v1.0 PUBLIC RELEASE VERSION 30 May 2003 02:00:01 EST / 07:00:01 GMT by Ben Venzke (bvenzke@intelcenter.com) http://www.intelcenter.com Page 1 of 9 - v1.0 30 May 2003

More information

ACTIVE SHOOTER HOW TO RESPOND

ACTIVE SHOOTER HOW TO RESPOND ACTIVE SHOOTER HOW TO RESPOND October 2008 Emergency Numbers EMERGENCY SERVICES: 9-1 -1 LOCAL EMERGENCY INFORMATION LINE: LOCAL POLICE DEPARTMENT: LOCAL FIRE DEPARTMENT: LOCAL HOSPITAL: LOCAL FBI FIELD

More information

Intro. To the Gulf War

Intro. To the Gulf War Intro. To the Gulf War Persian Gulf War, conflict beginning in August 1990, when Iraqi forces invaded and occupied Kuwait. The conflict culminated in fighting in January and February 1991 between Iraq

More information

ACTIVE SHOOTER HOW TO RESPOND. U.S. Department of Homeland Security. Washington, DC

ACTIVE SHOOTER HOW TO RESPOND. U.S. Department of Homeland Security. Washington, DC U.S. Department of Homeland Security Washington, DC 20528 cfsteam@hq.dhs.gov www.dhs.gov ACTIVE SHOOTER HOW TO RESPOND October 2008 MANAGING THE CONSEQUENCES OF AN ACTIVE SHOOTER SITUATION LESSONS LEARNED

More information

MARITIME SECURITY & MARITIME COUNTER-TERRORISM

MARITIME SECURITY & MARITIME COUNTER-TERRORISM Published on South Asia Analysis Group (http://www.southasiaanalysis.org) Home > MARITIME SECURITY & MARITIME COUNTER-TERRORISM MARITIME SECURITY & MARITIME COUNTER-TERRORISM Submitted by asiaadmin2 on

More information

Terrorist Financing: The Mumbai Bombing, a Case Study in the Possible and Probable. Dennis M. Lormel 7/31/2014

Terrorist Financing: The Mumbai Bombing, a Case Study in the Possible and Probable. Dennis M. Lormel 7/31/2014 Terrorist Financing: The Mumbai Bombing, a Case Study in the Possible and Probable Dennis M. Lormel 7/31/2014 Overview Between November 26 and 28, 2008, the world was riveted by an extremely well planned

More information

SEPTEMBER 11 ATTACKS

SEPTEMBER 11 ATTACKS Social Studies/United States History/September 11 SEPTEMBER 11 ATTACKS On the morning of September 11, 2001, the United States of America suffered a terrorist attack. It was the worst attack in the nation

More information

The FBI s Field Intelligence Groups and Police

The FBI s Field Intelligence Groups and Police The FBI s Field Intelligence Groups and Police Joining Forces By an analyst with the FBI's Directorate of Intelligence ince the terrorist attacks of September 11, 2001, managing and sharing Stimely threat

More information

CRS Report for Congress Received through the CRS Web

CRS Report for Congress Received through the CRS Web Order Code RS20721 Updated January 30, 2001 CRS Report for Congress Received through the CRS Web Terrorist Attack on USS Cole: Background and Issues for Congress Summary Raphael Perl, Specialist in International

More information

(U//FOUO) Terrorist Threat to Homeland Military Targets in the Aftermath of Usama bin Ladin's Death

(U//FOUO) Terrorist Threat to Homeland Military Targets in the Aftermath of Usama bin Ladin's Death (U//FOUO) Terrorist Threat to Homeland Military Targets in the Aftermath of Usama bin Ladin's Death 25 May 2011 (U) Scope (U//FOUO) This Joint Intelligence Bulletin addresses the effect of the 2 May 2011

More information

2 Articles on Just Published State Department Country Reports on

2 Articles on Just Published State Department Country Reports on 2 Articles on Just Published State Department Country Reports on Terrorism 2017 Worldwide terrorist attacks decreased by 23 percent in 2017 THE HILL BY JOHN BOWDEN 09/19/18 N i l i l i a l k. a t h a Nathan

More information

Domestic Nuclear Detection Office (DNDO)

Domestic Nuclear Detection Office (DNDO) Domestic Nuclear Detection Office (DNDO) Radiological and Nuclear Detection Program Support Noel Mueller SETA Contract - Senior Program Support Specialist State and Local RND Liaison U.S. Department of

More information

PRESS RELEASE. Chester County Law Enforcement Is Prepared for Active Threat Incidents

PRESS RELEASE. Chester County Law Enforcement Is Prepared for Active Threat Incidents CHESTER COUNTY DISTRICT ATTORNEY S OFFICE TELEPHONE: 610-344-6801 FAX: 610-344-5905 THOMAS P. HOGAN DISTRICT ATTORNEY 201 W. MARKET STREET, SUITE 4450 POST OFFICE BOX 2748 WEST CHESTER, PA 19380-0991 March

More information

Tidewater Community College Crisis and Emergency Management Plan Appendix F Emergency Operations Plan. Annex 8 Active Threat Response

Tidewater Community College Crisis and Emergency Management Plan Appendix F Emergency Operations Plan. Annex 8 Active Threat Response Tidewater Community College Crisis and Emergency Management Plan Appendix F Emergency Operations Plan A. Purpose Annex 8 Active Threat Response This Annex has been developed to direct actions in response

More information

Decade of Service 2000s

Decade of Service 2000s Decade of Service 2000s Immediately following the Sept. 11, 2001, attacks, a DAV mobile service office delivered thousands of articles of clothing and comfort kits to first responders at the Twin Towers.

More information

Reduce loss of lives and property MANN ASSOCIATES NIG LTD PRESENTS: &

Reduce loss of lives and property MANN ASSOCIATES NIG LTD PRESENTS: & Reduce loss of lives and property MANN ASSOCIATES NIG LTD PRESENTS: & COUNTER TERRORISM TRAINING SEMINAR FOR THE PRIVATE & PUBLIC SECTOR IN NIGERIA WITH THE LEGENDARY COMMANDER DANIEL SHARON rtd (BSc,

More information

(U//FOUO) Recent Active Shooter Incidents Highlight Need for Continued Vigilance

(U//FOUO) Recent Active Shooter Incidents Highlight Need for Continued Vigilance (U//FOUO) Recent Active Shooter Incidents Highlight Need for Continued Vigilance 27 December 2012 (U) Scope (U//FOUO) This Joint Intelligence Bulletin (JIB) is intended to provide information on the recent

More information

Combating Terrorism: Prevention, Protection & Response

Combating Terrorism: Prevention, Protection & Response 13-14 June 2016 Hong Kong Combating Terrorism: Prevention, Protection & Response Nowhere to run, Nowhere to hide Key Benefits of Attending This Workshop: UNDERSTAND why defining and labeling terrorism

More information

Combating Terrorism Threats and Capability to Counter Historical Setting Fragmented groups Professional Subversive Specific Agendas Causes Support War A Few Major Examples First U.S. Aircraft hijacked,

More information

COUNT ONE. (Conspiracy to Kill United States Nationals) date of the filing of this Indictment, al Qaeda has been an

COUNT ONE. (Conspiracy to Kill United States Nationals) date of the filing of this Indictment, al Qaeda has been an UNITED STATES DISTRICT COURT SOUTHERN DISTRICT OF NEW YORK - - - - - - - - - - - - - - - - x UNITED STATES OF AMERICA - v. - INDICTMENT SULAIMAN ABU GHAYTH, S14 98 Cr. 1023 (LAK) a/k/a "Salman Abu Ghayth,"

More information

Subj: CHIEF OF NAVAL AIR TRAINING ANTITERRORISM PLAN

Subj: CHIEF OF NAVAL AIR TRAINING ANTITERRORISM PLAN CNATRA STAFF INSTRUCTION 3300.1A DEPARTMENT OF THE NAVY CHIEF OF NAVAL AIR TRAINING 250 LEXINGTON BLVD SUITE 102 CORPUS CHRISTI TX 78419-5041 CNATRASTAFFINST 3300.1A 00 Subj: CHIEF OF NAVAL AIR TRAINING

More information

MISSION STATEMENT THE SHIELD PROGRAM HANOVER CRIME TREND AWARENESS. Volume 1 / Issue 8 Monthly Newsletter January 12, 2017

MISSION STATEMENT THE SHIELD PROGRAM HANOVER CRIME TREND AWARENESS. Volume 1 / Issue 8 Monthly Newsletter January 12, 2017 Volume 1 / Issue 8 Monthly Newsletter January 12, 2017 MISSION STATEMENT Through community and multiagency partnerships: receive, analyze, and develop meaningful intelligence to counter crime and extremism

More information

Non-fiction: Always Remember. Americans Remember the Victims and Heroes of Sept. 11, 2001

Non-fiction: Always Remember. Americans Remember the Victims and Heroes of Sept. 11, 2001 Always Remember Americans Remember the Victims and Heroes of Sept. 11, 2001 Ask most adults, and they ll tell you where they were on Sept. 11, 2001. The morning started like any other in New York City,

More information

Total Immersion training at the Spartan Ranch in Maysville, NC

Total Immersion training at the Spartan Ranch in Maysville, NC Mirror Image: From the Edge of Raqqa, The Evolution and Future of ISIS and Their Wilayats Counterterrorism Training June 19-23, 2017 See Special Guest Speakers Total Immersion training at the Spartan Ranch

More information

Sep. 11, 2001 Attacks are made against USA

Sep. 11, 2001 Attacks are made against USA 10 Years Later Sep. 11, 2001 Attacks are made against USA Terrorist hijack four commercial aircraft making cross-country journeys and fly two into the World Trade Center in NYC, one into the Pentagon in

More information

November 26, 2008 (Report Current as of November 28)

November 26, 2008 (Report Current as of November 28) Mumbai Combined Arms Operation November 26, 2008 (Report Current as of November 28) The contents of this (U) presentation in no way represent the policies, views, or attitudes of the United States Department

More information

City of Torrance Police Department

City of Torrance Police Department City of Torrance Police Department Testimony of John J. Neu Chief of Police Hearing on Radicalization, Information Sharing and Community Outreach: Protecting the Homeland from Homegrown Terror United States

More information

ACTIVE SHOOTER GUIDEBOOK

ACTIVE SHOOTER GUIDEBOOK ACTIVE SHOOTER GUIDEBOOK HOW TO RESPOND WHAT IS AN ACTIVE SHOOTER? An Active Shooter is an individual actively engaged in killing or attempting to kill people in a confined and populated area; in most

More information

The US Retaliates in Yemen

The US Retaliates in Yemen The US Retaliates in Yemen Oct. 14, 2016 The war in Yemen could shut down shipping lanes, which the U.S. can t afford. By Jacob L. Shapiro Last Sunday, two missiles were launched at U.S. warships, the

More information

Section Preview. Terrorism at Home and Abroad. Section3

Section Preview. Terrorism at Home and Abroad. Section3 Section3 Terrorism at Home and Abroad In the 1990s, terrorism against the United States increased. Terrorism is acts of violence aimed at demoralizing or intimidating others. In 1993, a bomb exploded in

More information

Red Teaming the Terrorist Threat to Preempt the Next Waves of Catastrophic Terrorism

Red Teaming the Terrorist Threat to Preempt the Next Waves of Catastrophic Terrorism Red Teaming the Terrorist Threat to Preempt the Next Waves of Catastrophic Terrorism Dr. Joshua Sinai ANSER Tel: 703/416-3578 joshua.sinai@anser.org 14 th Annual NDIA SO/LIC Symposium & Exhibition 12 February

More information

National Security Agency

National Security Agency National Security Agency 9 August 2013 The National Security Agency: Missions, Authorities, Oversight and Partnerships balance between our need for security and preserving those freedoms that make us who

More information

SHOWDOWN IN THE MIDDLE EAST

SHOWDOWN IN THE MIDDLE EAST SHOWDOWN IN THE MIDDLE EAST IRAN IRAQ WAR (1980 1988) PERSIAN GULF WAR (1990 1991) WAR IN IRAQ (2003 Present) WAR IN AFGHANISTAN (2001 Present) Iran Iraq War Disputes over region since collapse of the

More information

MANPADS. Scale & Nature of the Threat

MANPADS. Scale & Nature of the Threat MANPADS Scale & Nature of the Threat Loren B. Thompson, Ph.D. Chief Operating Officer / Lexington Institute Adjunct Professor of Emerging Technology / Georgetown University November 12, 2003 Man-Portable

More information

SS.7.C.4.3 Describe examples of how the United States has dealt with international conflicts.

SS.7.C.4.3 Describe examples of how the United States has dealt with international conflicts. SS.7.C.4.3 Benchmark Clarification 1: Students will identify specific examples of international conflicts in which the United States has been involved. The United States Constitution grants specific powers

More information

Model Policy. Active Shooter. Updated: April 2018 PURPOSE

Model Policy. Active Shooter. Updated: April 2018 PURPOSE Model Policy Active Shooter Updated: April 2018 I. PURPOSE Hot Zone: A geographic area, consisting of the immediate incident location, with a direct and immediate threat to personal safety or health. All

More information

Chapter 4 The Iranian Threat

Chapter 4 The Iranian Threat Chapter 4 The Iranian Threat From supporting terrorism and the Assad regime in Syria to its pursuit of nuclear arms, Iran poses the greatest threat to American interests in the Middle East. Through a policy

More information

Directive on United States Nationals Taken Hostage Abroad and Personnel Recovery Efforts June 24, 2015

Directive on United States Nationals Taken Hostage Abroad and Personnel Recovery Efforts June 24, 2015 Administration of Barack Obama, 2015 Directive on United States Nationals Taken Hostage Abroad and Personnel Recovery Efforts June 24, 2015 Presidential Policy Directive/PPD 30 Subject: U.S. Nationals

More information

TFR-028: YEMEN - COMPLEX ATTACK AGAINST CID BUILDING IN ADEN - 05 NOVEMBER The Triton Report is compiled monthly by highly specialised

TFR-028: YEMEN - COMPLEX ATTACK AGAINST CID BUILDING IN ADEN - 05 NOVEMBER The Triton Report is compiled monthly by highly specialised TFR-028: YEMEN - COMPLEX ATTACK AGAINST CID BUILDING IN ADEN - 05 NOVEMBER 2017 The Triton Report is compiled monthly by highly specialised data collators and former British Military Ammunition Technical

More information

IntelCenter. al-qaeda Operational Tempo Madrid Follow-on Attack Assessment v1.0 Sun, 14 March :00:00 EST / 05:00:00 GMT FOR PUBLIC RELEASE

IntelCenter. al-qaeda Operational Tempo Madrid Follow-on Attack Assessment v1.0 Sun, 14 March :00:00 EST / 05:00:00 GMT FOR PUBLIC RELEASE al-qaeda Operational Tempo Madrid Follow-on Attack Assessment v1.0 Sun, 14 March 2004 00:00:00 EST / 05:00:00 GMT Page 1 of 7 - v1.0 14 March 2004 TABLE OF CONTENTS EXECUTIVE SUMMARY 3 INCREASED OPS TEMPO/MADRID

More information

OVERVIEW OF EMERGENCY PROCEDURES

OVERVIEW OF EMERGENCY PROCEDURES OVERVIEW OF EMERGENCY PROCEDURES TYPE: Bolded items have procedures listed below Active Threat/Active Shooter (incl. Hostage, Assault, Murder, Kidnapping) ALICE Bomb Threat Weather (Ice & snow, Flooding,

More information

Global Vigilance, Global Reach, Global Power for America

Global Vigilance, Global Reach, Global Power for America Global Vigilance, Global Reach, Global Power for America The World s Greatest Air Force Powered by Airmen, Fueled by Innovation Gen Mark A. Welsh III, USAF The Air Force has been certainly among the most

More information

Active Shooter Defense. Facility Tenant Brief

Active Shooter Defense. Facility Tenant Brief Facility Tenant Brief 2013 Active Shooter Defense Facility Tenant Brief January 2013 1 Introduction Nidal Hasan killed 13 people and wounded 30 others on November 5, 2009, at the Soldier Readiness Processing

More information

Active Shooter Guideline

Active Shooter Guideline 1. Purpose: This procedure establishes guidelines for Monterey County Public Safety Personnel who respond to Active Shooter Incidents (ASI). The goal is to provide effective rescue and treatment procedures,

More information

Case 1:05-cv RJL Document Filed 12/03/2008 Page 1 of 13 EXHIBIT A

Case 1:05-cv RJL Document Filed 12/03/2008 Page 1 of 13 EXHIBIT A Case 1:05-cv-00429-RJL Document 163-2 Filed 12/03/2008 Page 1 of 13 J I EXHIBIT A Case 1:05-cv-00429-RJL Document 163-2 Filed 12/03/2008 Page 2 of 13 IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT

More information

The Challenging Scope of the. Improvised Explosive Device Battlespace. Commander ADF Counter-IED Task Force Brigadier Wayne Budd.

The Challenging Scope of the. Improvised Explosive Device Battlespace. Commander ADF Counter-IED Task Force Brigadier Wayne Budd. The Challenging Scope of the Improvised Explosive Device Battlespace Commander ADF Counter-IED Task Force Brigadier Wayne Budd Where is the IED threat? Sweden: Suicide Attack, Stockholm, 11 December 2010

More information

Operational Security (OPSEC)

Operational Security (OPSEC) Operational Security (OPSEC) The success of military and intelligence operations depend upon secrecy; without secrecy, they generally fail. Paraphrase of Gen. George Washington, First President of the

More information

WHAT IS AN EMERGENCY? WHY IT IS IMPORTANT TO PREPARE COMMUNICATIONS

WHAT IS AN EMERGENCY? WHY IT IS IMPORTANT TO PREPARE COMMUNICATIONS OVERVIEW The purpose of this plan is to provide for the carrying out of emergency functions to save lives; establish responsibilities necessary to performing these functions; prevent, minimize, and repair

More information

ALTAMONTE SPRINGSPOLICE DEPARTMENT P/P 86-04

ALTAMONTE SPRINGSPOLICE DEPARTMENT P/P 86-04 ALTAMONTE SPRINGSPOLICE DEPARTMENT P/P 86-04 SUPERSEDES: DATE: 08-29-86 PAGE 1 OF 10 CFA STANDARDS: 17.07M, 17.08, 17.10M SUBJECT: POLICE VEHICLE OPERATION REV #: 9 (11/10/97) CONTENTS: This policy and

More information

Notes about the USA s War on Terror

Notes about the USA s War on Terror Notes about the USA s War on Terror gene m. stover created Sunday, 2005 July 3 updated Sunday, 2005 July 3 Copyright copyright 2005 Gene Michael Stover. All rights reserved. Permission to copy, store,

More information

4. What are the 2-3 most important aspects of this island you think you should know?

4. What are the 2-3 most important aspects of this island you think you should know? In 1941, France invaded French Indochina. This is the area of Thailand that the French still controlled under imperialism. They had controlled this area for its resources and for power for decades. The

More information

Mass Shooting at Colorado Movie Theater Aurora, Colorado Friday, July 20, 2012

Mass Shooting at Colorado Movie Theater Aurora, Colorado Friday, July 20, 2012 Incident Assessment Mass Shooting at Colorado Movie Theater Aurora, Colorado Friday, July 20, 2012 NJ ROIC Analysis Element AE201207-1246 Information Cut-off Date: 20 July 2012, 11:30 AM (U) INFORMATION

More information

THE GUARDIA CIVIL AND ETA

THE GUARDIA CIVIL AND ETA THE GUARDIA CIVIL AND ETA Report Documentation Page Form Approved OMB No. 0704-0188 Public reporting burden for the collection of information is estimated to average 1 hour per response, including the

More information

x

x Case 1:98-cr-01023-LAK Document 1103 Filed 06/17/11 Page 1 of 17 :,.~::'LJ';_# ~.'A..)I'iY,. 1' \,., ;, F~~\T""" UNITED STATES DISTRICT COURT;' \j. U i'!d" 1 I' :~~:~~~~_~=::~=::= _~:_~~~_:~~~ ~~-:U(';i,~N'CALLY

More information

Office for Bombing Prevention Bomb Threat Management

Office for Bombing Prevention Bomb Threat Management Bomb Threat Management FOR OFFICIAL USE ONLY Rev: B 1 Second level Third level Fourth level Fifth level Homeland Security Presidential Directive-19 Homeland Security Presidential Directive 19: Establishes

More information

U.S. AIR STRIKE MISSIONS IN THE MIDDLE EAST

U.S. AIR STRIKE MISSIONS IN THE MIDDLE EAST U.S. AIR STRIKE MISSIONS IN THE MIDDLE EAST THE QUANTITATIVE DIFFERENCES OF TODAY S AIR CAMPAIGNS IN CONTEXT AND THE IMPACT OF COMPETING PRIORITIES JUNE 2016 Operations to degrade, defeat, and destroy

More information

IN THE UNITED STATES DISTRICT COURT FOR THE EASTERN DISTRICT OF VIRGINIA Alexandria Division

IN THE UNITED STATES DISTRICT COURT FOR THE EASTERN DISTRICT OF VIRGINIA Alexandria Division IN THE UNITED STATES DISTRICT COURT FOR THE EASTERN DISTRICT OF VIRGINIA Alexandria Division UNITED STATES OF AMERICA ) v. ) Criminal Number JOHN PHILIP WALKER LINDH, ) a/k/a "Suleyman al-faris," ) a/k/a

More information

UNCLASSIFIED//FOR OFFICIAL USE ONLY

UNCLASSIFIED//FOR OFFICIAL USE ONLY United States Department of Homeland Security Homeland Security Advisory System Increased to Orange for Mass Transit and Passenger Rail July 7, 2005 ATTENTION: Federal Departments and Agencies, State Homeland

More information

P.O. Box 5735, Arlington, Virginia Tel: (Fax)

P.O. Box 5735, Arlington, Virginia Tel: (Fax) Colonel David M. Rohrer Chief of Police Fairfax County Police Department 4100 Chain Bridge Road Fairfax, Virginia 22030 April 24, 2008 Dear Chief Rohrer: I am writing to request that you rectify a serious

More information

Statement of. Michael P. Downing Assistant Commanding Officer Counter-Terrorism/Criminal Intelligence Bureau Los Angeles Police Department.

Statement of. Michael P. Downing Assistant Commanding Officer Counter-Terrorism/Criminal Intelligence Bureau Los Angeles Police Department. Statement of Michael P. Downing Assistant Commanding Officer Counter-Terrorism/Criminal Intelligence Bureau Los Angeles Police Department Before the Committee on Homeland Security s Subcommittee on Intelligence,

More information

Intelligence Bulletin Joint FBI-DHS Bulletin No. 348

Intelligence Bulletin Joint FBI-DHS Bulletin No. 348 Intelligence Bulletin Joint FBI-DHS Bulletin No. 348 (U//FOUO) Moscow Metro Bombing March 29, 2010 (U) Handling Notice: Recipients are reminded that FBI and DHS intelligence bulletins contain sensitive

More information

Signature: Signed by GNT Date Signed: 11/24/2013

Signature: Signed by GNT Date Signed: 11/24/2013 Atlanta Police Department Policy Manual Standard Operating Procedure Effective Date: December 2, 2013 Applicable To: All employees Approval Authority: Chief George N. Turner Signature: Signed by GNT Date

More information

Title Global Chokepoints

Title Global Chokepoints G-2 Title Global Chokepoints Date December 2011 US Army TRADOC G2 TRADOC Intelligence Support Activity (TRISA) Threats Publication Date: 15 December 11 Information Cut-Off Date: 21 November 11 US Army

More information

8/15/2016 THREAT ASSESSMENT: THE ACTIVE SHOOTER RISK OBJECTIVES RECENT NEWS K DON EDWARDS DO. Understand what the past has shown us

8/15/2016 THREAT ASSESSMENT: THE ACTIVE SHOOTER RISK OBJECTIVES RECENT NEWS K DON EDWARDS DO. Understand what the past has shown us K DON EDWARDS DO THREAT ASSESSMENT: THE ACTIVE SHOOTER RISK OBJECTIVES Understand what the past has shown us Develop a better awareness of the risks Prepare staff in what to do Develop a simple, practical

More information

UNITED STATES DISTRICT COURT DISTRICT OF MASSACHUSETTS

UNITED STATES DISTRICT COURT DISTRICT OF MASSACHUSETTS UNITED STATES DISTRICT COURT DISTRICT OF MASSACHUSETTS UNITED STATES OF AMERICA) ) CRIMINAL NO. V. ) ) VIOLATIONS: ) 18 U.S.C. 2332a(a)(1) ) (Attempted Use of a Weapon of a/k/a ABDUL RAHEEM, ABU ) Mass

More information

Military Radar Applications

Military Radar Applications Military Radar Applications The Concept of the Operational Military Radar The need arises during the times of the hostilities on the tactical, operational and strategic levels. General importance defensive

More information

Annex D - Active Shooter

Annex D - Active Shooter Annex D - Active Shooter Version: 1.0 Effective: 10/01/2015 Revision Date: 10/01/2015 Approved By: John Pitcher Purpose The purpose of the Active Shooter Annex is to provide a response guideline for BHCC

More information

Running head: ETHNICAL DILEMMAS AMERICAN FIGHTING FORCES FACE IN THE

Running head: ETHNICAL DILEMMAS AMERICAN FIGHTING FORCES FACE IN THE Ethical Dilemma 1 Running head: ETHNICAL DILEMMAS AMERICAN FIGHTING FORCES FACE IN THE WAR ON TERROR Ethnical Dilemmas American Fighting Forces Face in the War on Terror SGM Cory M. Kroll United States

More information

Homeland Security in Israel

Homeland Security in Israel Homeland Security in Israel The Societal and First Responder Environments NADAV MORAG CENTER FOR HOMELAND DEFENSE AND SECURITY DEPT. OF NATIONAL SECURITY AFFAIRS NAVAL POSTGRADUATE SCHOOL Slide 1 Opening

More information

Does 9/11 look like an "inside job"? Consider the evidence for yourself.

Does 9/11 look like an inside job? Consider the evidence for yourself. WAS 9/11 AN "INSIDE JOB"? Jim Fetzer (READER WEEKLY 2 September 2004, pp. 24-25) Does 9/11 look like an "inside job"? Consider the evidence for yourself. At the Pentagon: * How could a Boeing 757, with

More information

National Resource and Technical Assistance Center for Improving Law Enforcement Investigations

National Resource and Technical Assistance Center for Improving Law Enforcement Investigations Readers to Enhance Criminal Investigations Assistant Chief of Police Travis Martinez Redlands Police Department Introduction With the vast majority of crimes involving the use of motor vehicles, law enforcement

More information

RISK MANAGEMENT BULLETIN

RISK MANAGEMENT BULLETIN Maryland s New License Plate Readers and Captured Plate Data Law Historically, privacy was almost implicit, because it was hard to find and gather information. But in the digital world, whether it's digital

More information

Chapter 17: Foreign Policy and National Defense Section 2

Chapter 17: Foreign Policy and National Defense Section 2 Chapter 17: Foreign Policy and National Defense Section 2 Objectives 1. Summarize the functions, components, and organization of the Department of Defense and the military departments. 2. Explain how the

More information

The Necessity of Human Intelligence in Modern Warfare Bruce Scott Bollinger United States Army Sergeants Major Academy Class # 35 SGM Foreman 31 July

The Necessity of Human Intelligence in Modern Warfare Bruce Scott Bollinger United States Army Sergeants Major Academy Class # 35 SGM Foreman 31 July The Necessity of Human Intelligence in Modern Warfare Bruce Scott Bollinger United States Army Sergeants Major Academy Class # 35 SGM Foreman 31 July 2009 Since the early days of the Revolutionary War,

More information

Mérida Initiative: Background and Funding

Mérida Initiative: Background and Funding Order Code RS22837 March 18, 2008 Mérida Initiative: Background and Funding Colleen W. Cook, Rebecca G. Rush, and Clare Ribando Seelke Analysts in Latin American Affairs Foreign Affairs, Defense, and Trade

More information

San Diego Operational Area. Policy # 9A Effective Date: 9/1/14 Pages 8. Active Shooter / MCI (AS/MCI) PURPOSE

San Diego Operational Area. Policy # 9A Effective Date: 9/1/14 Pages 8. Active Shooter / MCI (AS/MCI) PURPOSE PURPOSE The intent of this Policy is to provide direction for performance of the correct intervention, at the correct time, in order to stabilize and prevent death from readily treatable injuries in the

More information

(U//FOUO) Security Awareness Reminder for the 2011 Holiday Season

(U//FOUO) Security Awareness Reminder for the 2011 Holiday Season (U//FOUO) Security Awareness Reminder for the 2011 Holiday Season 23 November 2011 (U) Scope (U//FOUO) This Joint Intelligence Bulletin provides law enforcement, public, and private sector safety officials

More information

JH WEEKLIES ISSUE # The 10 th ANNIVERSARY OF SEPTEMBER 11

JH WEEKLIES ISSUE # The 10 th ANNIVERSARY OF SEPTEMBER 11 JH WEEKLIES ISSUE #2 2011-2012 The 10 th ANNIVERSARY OF SEPTEMBER 11 Synopsis The September 11 attacks were a series of four coordinated airplane attacks that occurred in New York City (NYC), near Washington,

More information

Thwarting the Modern Terrorist at Hotels and Special Events

Thwarting the Modern Terrorist at Hotels and Special Events Thwarting the Modern Terrorist at Hotels and Special Events Agenda Introduction Attacks on Special Events Attacks on Hotels Diagnosis of Tactics Utilized Mitigation Strategies Questions Closing Special

More information

The Cuban Missile Crisis, October 1962

The Cuban Missile Crisis, October 1962 The Cuban Missile Crisis, October 1962 By U.S. State Department, adapted by Newsela staff on 11.30.16 Word Count 697 Level 800L TOP: A briefing is given to President John F. Kennedy (center) at the Cape

More information

OPFOR Tactical Task List

OPFOR Tactical Task List OPFOR Tactical Task List The OPFOR Tactical Task List is a listing of tactical tasks that are specific to the OPFOR. OPFOR tactical organizations and individuals perform these tasks instead of the comparable

More information

INSS Insight No. 459, August 29, 2013 US Military Intervention in Syria: The Broad Strategic Purpose, Beyond Punitive Action

INSS Insight No. 459, August 29, 2013 US Military Intervention in Syria: The Broad Strategic Purpose, Beyond Punitive Action , August 29, 2013 Amos Yadlin and Avner Golov Until the publication of reports that Bashar Assad s army carried out a large attack using chemical weapons in an eastern suburb of Damascus, Washington had

More information

Rethinking the Nuclear Terrorism Threat from Iran and North Korea

Rethinking the Nuclear Terrorism Threat from Iran and North Korea Rethinking the Nuclear Terrorism Threat from Iran and North Korea A Presentation by Henry Sokolski Executive Director The Nonproliferation Policy Education Center 1718 M Street, NW, Suite 244 Washington,

More information

HAWAII OPERATION ATTACK ON PEARL HARBOR

HAWAII OPERATION ATTACK ON PEARL HARBOR HAWAII OPERATION ATTACK ON PEARL HARBOR PROPAGANDA: Attack was on Sunday, December 7, 1941 Sunday = Day off for US soldiers OVERALL: On December 7, 1941, Japan surprise attacks Pearl Harbor Japan dropped

More information