In August, ISIS released a seven-minute, English-language video encouraging would-be fighters to travel to the Philippines instead of Syria and Iraq. The video was the latest sign the group has shifted its recruiting tactics as it loses ground to Coalition Forces in the Middle East. Asia has become a new focus for ISIS, according to private sector analysts, such as Flashpoint Intelligence.
Department of Defense, Department of Justice
InterAgency Board Recommendations on Personal Protective Equipment and Decontamination Products for Fentanyl Exposure
Increased illicit use of opioids, including synthetic opioids such as fentanyl and its analogue carfentanil, is a source of increased risk to responders. Most routine encounters between patients or detainees and EMS or law enforcement do not present a significant threat of toxic exposure. While there are anecdotal reports of public safety personnel being exposed to opioids during operations, they are largely unconfirmed. To proactively address the potential risks, this document establishes guidance for personal protective equipment selection and use, decontamination, detection, and medical countermeasures for first responders who may be exposed to opioids in the course of their occupational activities. Throughout the remainder of this document, the term synthetic opioids will be used to include fentanyl, fentanyl analogues, morphine analogues, the U-series opioids, and others.
California, Intelligence Fusion Centers
(U//FOUO) Orange County Fusion Center Bulletin: Improvised Weapons Found at Lawful Protests
Department of Homeland Security
DHS Infrastructure Assessment: Electric Vehicle Charging Stations
Electric vehicle (EV) usage continues to increase in the United States, along with its supporting infrastructure. As EVs increase in market share, issues like charging speed and battery capacity will drive future development of EV charging technology. As EV demand increases, manufacturers will continue to develop, build, and deploy additional Internet-connected charging stations and new connected technologies to satisfy demand.
U.S. Army
(U//FOUO) Asymmetric Warfare Group Russian New Generation Warfare Handbook
As the American Army fought in Iraq and Afghanistan, it became the best tactical level counter insurgency force of the modern era. America’s enemies, however, did not rest. Russia observed the transformation of the American Army and began a transformation of their own. This new military barely resembles its former Soviet self. Wielding a sophisticated blend of Unmanned Aircraft Systems (UAS), electronic warfare (EW) jamming equipment, and long range rocket artillery, it took the Soviet model out of the 1980s and into the 21st Century.
Customs and Border Protection
Customs and Border Protection Alert: Fentanyl Analogues Not Resistant to Narcan (Naloxone)
Contrary to recent news reporting, there are no fentanyl analogues resistant to Naloxone. News reports indicated a “new” fentanyl analogue, acrylfentanyl, was “extremely powerful” and implied it resisted Naloxone’s effects. However, acrylfentanyl binds to the same receptors within the human body as fentanyl, meaning correctly administered Naloxone is effective against it.
Department of Homeland Security
(U//FOUO) DHS Reference Aid: Overview of Recently Successful or Arrested HVEs’ Radicalization to Violence
This Reference Aid is based on I&A’s review of the radicalization to violence of 39 US homegrown violent extremists (HVEs) who either successfully carried out or were arrested before attempting to carry out attacks in the Homeland between 1 January 2015 and 31 December 2016. It is intended to inform federal, state, local, tribal, and territorial counterterrorism, law enforcement, and countering violent extremism (CVE) officials. For additional information about these HVEs, please see the classified I&A Intelligence Assessment “(U//FOUO) Commonalities in HVEs’ Radicalization to Violence Provide Prevention Opportunities,” published 10 February 2017.
Department of Homeland Security, Federal Bureau of Investigation, National Counterterrorism Center
(U//FOUO) DHS-FBI-NCTC Guide: Terrorist Attack Planning Cycle – A Homeland Case Study
This case study is an examination of behaviors that resulted in a disrupted terrorist attack, revealing a cycle of planning and preparation that could provide indicators for preventing similar attempts. The terrorist attack planning cycle is not a static, linear process but rather could begin in any of the several stages with variances in details, sequence, and timing. An individual’s mobilization to violence often provides observable behavioral indicators such as, pre-attack surveillance, training, and rehearsal. The indicators potentially allow third-party observers and law enforcement to identify individuals moving to violence, circumstances that may allow for disruption of planned attacks. This product is intended to cultivate an awareness of the planning cycle among stakeholders for identification, mitigation, and disruption of attack planning.
Department of Homeland Security, Federal Bureau of Investigation, National Counterterrorism Center
DHS-FBI-NCTC Guide: International Partnerships Necessary To Mitigate ISIS’s Organ Harvesting for Terrorist Funding
The Islamic State of Iraq and ash-Sham (ISIS) is attempting to obtain money from organ harvesting, including from its own injured members, captives, and deceased individuals. Identification, prevention, and interdiction of organ harvesting and trafficking is a highly complex issue which may be effectively addressed through international partnerships among governmental, health, law enforcement, legal, and private-sector entities.
Department of Homeland Security, Federal Bureau of Investigation, National Counterterrorism Center
(U//FOUO) DHS-FBI-NCTC Guide: Cyber Threats to First Responders are a Persistent Concern
We assess with moderate confidence that cyber actors, including those who support violent extremism, are likely to continue targeting first responders on the World Wide Web, including by distributing personally identifiable information (PII) for the purpose of soliciting attacks from willing sympathizers in the homeland, hacking government websites, or attacking 911 phone systems to hinder first responders’ ability to respond to crises.
Delaware, Intelligence Fusion Centers
(U//FOUO) Delaware Fusion Center: Officer Safety Smart Watches
The Delaware State Police (DSP) Intelligence Unit is providing the following information for officer safety and situational awareness. Officers should be mindful, when placing prisoners in custody, of smart watches and similar devices that can connect via Bluetooth to a cellular device. Smart watches have the capability to both make and receive phone calls and text messages, as well as erasing same. This could cause an issue if a cellular device and it’s contents are being used as evidence. Through experimentation at Troop 7, it was determined that if a prisoner is in the detention area and the phone is seized, the watch could still be operational.
New Jersey
New Jersey Office of Homeland Security Guide: Anarchist Extremists – Antifa
Self-described Antifa groups have been established across the United States and in several major cities, including New York, Philadelphia, Chicago, and San Francisco. A majority of New Jersey-based anarchist groups are affiliated with the Antifa movement and are opposed to “fascism,” racism, and law enforcement. Antifa groups coordinate regionally and have participated in protests in New York City and Philadelphia. There are three loosely organized chapters in New Jersey, known as the North Jersey Antifa, the South Jersey Antifa, and the HubCity Antifa New Brunswick (Middlesex County).
Department of Homeland Security
DHS Electromagnetic Pulse (EMP) Protection and Restoration Guidelines for Equipment and Facilities
The EMP protection guidelines presented in this report were initially developed by Dr. George H. Baker, based on his previous work where he led the Department of Defense program to develop EMP protection standards while at the Defense Nuclear Agency (DNA) and the Defense Threat Reduction Agency (DTRA). He is currently serving as a consultant to the Department of Homeland Security (DHS) and is emeritus professor of applied science at James Madison University (JMU). He presently serves on the Board of Directors of the Foundation for Resilient Societies, the Board of Advisors for the Congressional Task Force on National and Homeland Security, the JMU Research and Public Service Advisory Board, the North American Electric Reliability Corporation GMD Task Force, the EMP Coalition, and as a Senior Scientist for the Congressional EMP Commission.
Department of Homeland Security
DHS Report: Threats Posed by Autonomous Vehicles
Autonomous vehicles collect and process data from their environments, taking actions that can either help or replace drivers. OCIA assesses that these vehicles will benefit society by improving road safety and reducing deaths, injuries, and costs associated with collisions. Autonomous vehicles will also likely lead to a decrease in traffic congestion, decreasing fuel consumption and emissions per mile, and helping save drivers’ money and time. However, as vehicles become increasingly connected and a part of the Internet of Things, vulnerabilities and potential consequences are likely to increase unless cybersecurity is better integrated into vehicle design and development. Legal and regulatory gaps exist on issues such as collision liability and safety standards; if these gaps are not addressed, cities and states might implement their own laws and regulations, creating inefficiencies for automobile manufacturers, shipping companies, and drivers. Moreover, fully autonomous vehicles will likely have an adverse effect on the professional driver workforce when bus, taxi, and truck drivers are eventually replaced.
Department of Homeland Security
DHS Report: Artificial Intelligence Risk to Critical Infrastructure
Artificial Intelligence (AI) is an emerging risk that will affect critical infrastructure (CI) as it becomes common throughout the United States. The purpose of this research paper is to analyze the narratives about AI to understand the prominence of perceived key benefits and threats from AI adoption and the resulting implications for infrastructure security and resilience. Narratives are strongly held beliefs, and understanding them will help decision makers mitigate potential consequences before they become significant problems.
Drug Enforcement Administration
DEA Drug Slang Code Words
This Drug Enforcement Administration (DEA) Intelligence Report contains information from a variety of law enforcement and open sources. It is designed as a ready reference for law enforcement personnel who are confronted by many of the hundreds of slang terms used to identify a wide variety of controlled substances, designer drugs, and synthetic compounds. Every effort has been made to ensure the accuracy and completeness of the information presented. However, due to the dynamics of the ever-changing drug scene, subsequent additions, deletions, and corrections are inevitable. Further addendums to this report will attempt to capture changed terminology, to the extent possible. This compendium of drug slang terms has been alphabetically ordered, and identifies drugs and drug categories in English and foreign language derivations.
Federal Bureau of Investigation
FBI Cyber Bulletin: IP Addresses and Domains Used by Iran-Based Cyber Actors to Attack Victims Worldwide
The FBI assesses a group of malicious cyber actors—likely located in Iran—use Virtual Private Server infrastructure hosted in the United States to compromise government, corporate, and academic computer networks based in the Middle East, Europe and the United States. This infrastructure is used in conjunction with identified malicious domains to support a broad cyber campaign which likely includes the use of e-mail spear phishing, social engineering, and malicious Web sites (“watering hole attack”). These cyber actors almost certainly have been involved in this activity since at least early-2015.
Drug Enforcement Administration, Pennsylvania
DEA Analysis of Overdose Deaths in Pennsylvania 2016
The analysis of drug-related overdose death data plays a pivotal role in law enforcement’s efforts to identify and combat drug suppliers, and ultimately drug abuse and related overdoses. At the most basic level, the drugs that contribute to death are an indicator of drug availability in the user market. Analysis of this data also highlights geographic patterns of abuse and identifies at-risk populations, and when coupled with drug treatment statistics, law enforcement drug seizure data, and public health indicators, allows for multi-disciplinary data-driven decisions regarding resource placement and strategic initiatives.
U.S. Army
U.S. Army Mad Scientist Conference Report: The 2050 Cyber Army
The Mad Scientist 2050 Cyber Army project explored the visualization of the Army’s Cyber Force out to 2050 and its ability to address three major objectives of the Army’s Cyberspace Strategy for Unified Land Operations 2025: What does the cyber environment look like in 2040-2050 (how will cyber influence the environment and the population? What will connecting look like / what will they connect to? What are the drivers influencing this or not)? How do we build an Army Cyber Force that can dominate the cyber domain in the context of the multi-domain battle concept to gain a position of relative advantage? How can we build shared goals and expectations as well as develop an understanding of roles and responsibilities in order to build and maintain partnerships with U.S., and international academia, industry, defense departments/ministries and other agencies to enhance cyberspace operations? What new ideas should we be considering? Co-sponsored by the TRADOC G-2 and the Army Cyber Institute at the United States Military Academy, the 2050 Cyber Army project leveraged submitted papers, an on-line technology survey, and a 13-14 September Mad Scientist Conference that generated the insights synthesized in this report.
News
DEA Data Shows Drug Cartels Continue to “Operate and Profit” From Marijuana Sales in Legalized Markets
A bulletin from the El Paso Intelligence Center (EPIC) released to law enforcement in February 2017 describes how Mexican transnational criminal organizations (TCOs) are continuing to exploit legalized markets for the sale and distribution of marijuana. In January 2016, EPIC produced a bulletin detailing how “data provided by the Drug Enforcement Administration (DEA) and open source reporting” indicated that Mexican TCOs had not been adversely affected by marijuana legalization in numerous markets, noting instead “that the effort of legalization had conversely brought new opportunities for illicit profits from marijuana sales.”
Drug Enforcement Administration, Intelligence Fusion Centers
(U//LES) EPIC Bulletin: Transnational Criminal Organizations (TCOs) Continue to Profit from Marijuana Sales in Legalized Markets
In January 2016, EPIC published Intelligence Note 02303-16a, this product provided analysis of data provided by the Drug Enforcement Administration (DEA) and open source reporting that indicated Transnational Criminal Organizations (TCOs) continued to operate and profit from marijuana sales in legalized U.S. marijuana markets. EPIC research further showed that legalization of marijuana in some U.S. markets had not adversely impacted TCO profitability in marijuana markets, and that the effort of legalization had conversely brought new opportunities for illicit profits from marijuana sales. As of January 2017, EPIC research indicates that TCOs continue to exploit legalized marijuana markets in the United States.
California, Intelligence Fusion Centers
(U//FOUO) Orange County Fusion Center Bulletin: Criminal Use of E-mail Filters to Monitor and Divert Communications
Office of the Director of National Intelligence
Office of the Director of National Intelligence Countering Foreign Intelligence Threats Implementation and Best Practices Guide
The National Counterintelligence and Security Center (NCSC) is charged with leading and supporting the counterintelligence (CI) and security activities of the U.S. government, the U.S. Intelligence Community, and U.S. private sector entities that are at risk of intelligence collection, penetration, or attack by foreign adversaries and malicious insiders. The capabilities and activities described in this Guide are exemplars of program components delineated as requirements in numerous strategies, policies, and guidelines.
Drug Enforcement Administration
(U//LES) DEA Fentanyl Briefing Guide for First Responders
In the last several years, U.S. Law Enforcement has seen a dramatic increase in the availability of dangerous synthetic opioids. A large majority of these synthetic opioids are structural derivatives of the synthetic drug “fentanyl.” Fentanyl is a synthetic opioid currently listed as a Schedule II prescription drug that mimics the effects of morphine in the human body, but has potency 50–100 times that of morphine. Due to the high potency and availability of fentanyl, both transnational and domestic criminal organizations are increasingly utilizing these dangerous synthetic opioids as an adulterant in heroin and other controlled substances. The presence of these synthetic opioids in the illicit U.S. drug market is extremely concerning as the potency of these drugs has led to a significant increase in overdose incidents and overdose-related deaths throughout the nation.
Federal Bureau of Investigation
FBI Cyber Bulletin: Individuals Threatening Distributed Denial of Service of Private-Sector Companies for Bitcoin
An individual or group claiming to be “Anonymous” or “Lizard Squad” sent extortion emails to private-sector companies threatening to conduct distributed denial of service (DDoS) attacks on their network unless they received an identified amount of Bitcoin. No victims to date have reported DDoS activity as a penalty for non-payment.