A 2010 training guide produced by the U.S. Secret Service describing methods that should be used by law enforcement for identifying armed individuals.
U.S. Secret Service
Department of Homeland Security, Federal Bureau of Investigation, Intelligence Fusion Centers, U.S. Secret Service
(U//FOUO) DHS-FBI-USSS 2012 State of the Union Address Joint Threat Assessment
We have no specific or credible information indicating a threat to the US Capitol or the National Capital Region (NCR) to coincide with the 2012 State of the Union address. We assess, however, that al-Qa‘ida and its affiliates and allies remain committed to attacking the Homeland and, as of February 2010, al-Qa‘ida identified the NCR and the State of the Union address itself as important targets, presumably for attacks. Moreover, homegrown violent extremists (HVEs) as well as lone offenders could view the event as an attractive target, offering the means to inflict casualties and garner extensive media coverage. Detecting homeland plots involving HVEs and lone offenders continues to challenge law enforcement and intelligence agencies due to the operational independence of the perpetrators, which can reduce or eliminate preoperational indicators.
California, Federal Bureau of Investigation, U.S. Secret Service
Rapid Enforcement Allied Computer Team (REACT) Task Force Funding and Progress Report
Rapid Enforcement Allied Computer Team (REACT) Task Force Funding and Progress Report including personnel roster, January 2010.
U.S. Secret Service
U.S. Secret Service: Best Practices For Seizing Electronic Evidence
U.S. Secret Service manual on best practices For seizing electronic evidence, October 9, 2006.
U.S. Secret Service
U.S. Secret Service Network Intrusion Responder Program (NITRO) Course
The Network Intrusion Responder Program (NITRO) was designed by the U.S. Secret Service’s National Computer Forensics Institute to introduce law enforcement officers to basic network intrusion investigation techniques.
U.S. Secret Service
U.S. Secret Service First Responder Computer Forensics
THE U.S. SECRET SERVICE
Investigates . . .
Counterfeit currency
Fraud involving U.S. financial obligations and securities
Crimes affecting other federally insured financial institutions
Threats against the President & other government officials
Telecommunications fraud
Access Device fraud
Identity fraud
Computer fraud