Vous êtes sur la page 1sur 10

TLO INTELLIGENCE

BRIEF
17 FEBRUARY 2010

FOR OFFICIAL USE ONLY//LAW ENFORCEMENT SENSITIVE


SECONDARY DISSEMINATION OR PUBLIC AND MEDIA RELEASE IS NOT AUTHORIZED
Detective Brian Issitt #7475 // (602) 725-4730 // Brian.Issitt@phoenix.gov
BORDER ISSUES
(FOUO/LES) Drive-through Decoy Vehicle with Fake Bundles

On 02-06-2010 agents responding to a citizen’s report


of an abandoned vehicle in the Hereford, AZ area
discovered a 2008 Chevy Avalanche that had suffered
damage consistent with a vehicle incursion of the
border.

The vehicle was left running with no key in the


ignition and was loaded with what appeared to be
bundles of marijuana. The bundles were wrapped in
cellophane with each bundle’s weight and a number
written in black marker, consistent with the typical
packaging of marijuana. Upon inspection, the
bundles were found to contain wood chips. It is
suspected that the vehicle was going to be used as a
decoy. (FIR-NCO-10-730228)

Vehicle Information:
AZ/665ZYT (did not match vehicle)
Source: Placed with
VIN-no record found
permission of US Border
Sonora, MX plate found inside
Patrol, Tucson Sector
SON/ UW-10-078 (did not match vehicle registration)

FOR OFFICIAL USE ONLY//LAW ENFORCEMENT SENSITIVE


SECONDARY DISSEMINATION OR PUBLIC AND MEDIA RELEASE IS NOT AUTHORIZED
Detective Brian Issitt #7475 // (602) 725-4730 // Brian.Issitt@phoenix.gov
Al Qaeda
(U) Terror Talk Growing Louder on the Web
Exclusive: U.S. Intel Officials Seeing Spike in al Qaeda-Linked Internet Chatter
Focused on Ways to Thwart Airport Security

(CBS) CBS News has learned that U.S. Intelligence officials are seeing a
marked increase in terror-related Internet chatter with a frightening focus:
Jihadists bent on finding gaps in airport security - all linked to al Qaeda in
Yemen, reports CBS News chief investigative correspondent Armen Keteyian.

On one radical website, a writer invites fellow members to post information on


how to bypass airport screening.

Another member asks about explosive detection devices, writing: "We have
that system in place in Algiers...does anyone know if it's capable of detecting
[the flammable gas] butane?"

On another Jihadist site, a visitor questions security involving 3D scanners at


British airports asking: "Can I refuse [to pass through] for religious reasons?"

Before long comes this answer: "…advise those who wish to avoid the
Heathrow scanners to take the train to Paris... and then board a plane from
there."

Perhaps most disturbing -- the recent discovery of a confidential TSA


document on a Yemeni Web site discussing the rules for searching
passengers.

SOURCE: http://www.cbsnews.com/stories/2010/02/12/cbsnews_investigates/main6202853.shtml?tag=contentBody;featuredPost-PE

FOR OFFICIAL USE ONLY//LAW ENFORCEMENT SENSITIVE


SECONDARY DISSEMINATION OR PUBLIC AND MEDIA RELEASE IS NOT AUTHORIZED
Detective Brian Issitt #7475 // (602) 725-4730 // Brian.Issitt@phoenix.gov
TERRORISM TRENDS
(U) Biden: Qaeda moving to small, frightening attacks

WASHINGTON - Vice President Joe Biden said on Wednesday that al


Qaeda was moving in the direction of smaller but "devastatingly
frightening" attacks and he viewed the chance of another September 11-
style mass assault as unlikely.

Although U.S. intelligence chiefs testified before a congressional panel


recently that new al Qaeda-backed attacks are certain in the coming
months, Biden said he thought any attempt would be small-scale.

"The idea of there being a massive attack in the United States like 9/11 is
unlikely, in my view," he said, referring to the September 11, 2001,
hijacked plane attacks on New York and Washington, which left nearly
3,000 dead.

"If you see what's happening, particularly with al Qaeda and the Arabian Peninsula, they have decided
to move in the direction of much more small bore but devastatingly frightening attacks," Biden said.
He said a likely model was the attempted Christmas attack on an airliner headed for Detroit. Umar
Farouk Abdulmutallab, 23, is accused of trying to blow up the Amsterdam-to-Detroit flight with a bomb
sewn into his underwear.

"The concern relates to somebody like a shoe bomber or the underpants bomber, the Christmas attack
or someone just strapping a backpack on them with weapons ... and blowing up," Biden said.
Asked if an attack like that would actually happen, he said, "Well, I think there are going to be attempts."

Source: http://www.nydailynews.com/news/politics/2010/02/11/2010-02-11_biden_al_qaedas_changing_tactics_mean_another_911like_attack_is_unlikely.html

FOR OFFICIAL USE ONLY//LAW ENFORCEMENT SENSITIVE


SECONDARY DISSEMINATION OR PUBLIC AND MEDIA RELEASE IS NOT AUTHORIZED
Detective Brian Issitt #7475 // (602) 725-4730 // Brian.Issitt@phoenix.gov
INTELLIGENCE COMMUNITY
(U) 10,000 TSA staff to get secret intel

WASHINGTON — About 10,000 airport security workers will get access to secret
intelligence that could help stop terrorist attacks on planes.

The Transportation Security Administration plan aims to help its officers spot
terrorists by giving them more detailed information about tactics and threats, TSA
officials and security experts said. The agency, viewed by some as throngs of
workers pawing through luggage at checkpoints, hopes to empower its higher-
level workers as part of an effort to professionalize airport security.

The 10,000 people in line to get classified information are managers, supervisors
and "behavior detection officers" who roam airports looking for suspicious
people. They represent about 20% of the TSA's airport workforce and exclude
screeners who scan passengers and bags.
The information will give workers details about terrorist "tactics, planning, operations and threats," TSA spokeswoman Sterling
Payne said. Those details "give context to things they see every day which may otherwise not appear unusual" and let workers
"exercise discretion" in dealing with travelers, Payne added. She would not elaborate on specific intelligence the workers will get.
All TSA airport workers now get daily intelligence briefings that include less sensitive information.

So far, 750 people have been cleared to get classified information, Payne said, adding that it will take two more years to get all
10,000 workers cleared.

The information could include copies of terrorist training videos or tips vaguely describing a terrorism suspect, experts said. "Some
classified information seems innocuous but is classified because it was derived from an intercepted phone conversation," said
Steven Aftergood, an intelligence-policy specialist for the Federation of American Scientists.

"This could enable broader sharing of some kinds of sensitive information," Aftergood said.
About 2.5 million Americans have security clearances, many of them in the military or working for defense contractors, and some
working for the Homeland Security Department, Aftergood said.

SOURCE: http://www.usatoday.com/news/washington/2010-02-11-TSA-security_N.htm

FOR OFFICIAL USE ONLY//LAW ENFORCEMENT SENSITIVE


SECONDARY DISSEMINATION OR PUBLIC AND MEDIA RELEASE IS NOT AUTHORIZED
Detective Brian Issitt #7475 // (602) 725-4730 // Brian.Issitt@phoenix.gov
TECHNOLOGY
(U) Sorting the bad guys from the good

Israel's WeCu claims a 95 percent success rate for its new terrorist detection system that monitors reactions to
visual stimuli at airports and checkpoints; the company's device flashes stimuli, such as photos, a symbol, or a
code word, relating to the information authorities are most interested in (whether it is terrorism, drug smuggling,
or other crimes), to passengers as they pass through terminal checkpoints; hidden biometric sensors then detect
the subjects' physical reactions and subtle behavioral changes remotely or during random contact.

WeCu raises detection to a whole new level. The company’s device — which was six years in the making — flashes stimuli, such as
photos, a symbol, or a code word, relating to the information authorities are most interested in (whether it is terrorism, drug smuggling, or
other crimes), to passengers as they pass through terminal checkpoints.

Hidden biometric sensors then detect the subjects’ physical reactions and subtle behavioral changes remotely or during random contact.
Based on their reactions, the authorities determine whether further investigation or questioning is warranted. The rationale is that when a
person is exposed to stimuli relating to behaviors that he or she is engaged in or familiar with, the reactions to the images will
be heightened.

The trick, says Givon, one of Israel’s top engineers, is that WeCu focuses on very close corroboration between stimuli and reaction, to
the extent that the system can almost always pick out individuals who pose a threat. Tests in both lab and real-life situations with
hundreds of subjects have shown that 95 percent of the people flagged by the WeCu system are indeed “persons of interest” with whom
authorities would want to have a chat, claims Givon.

While conscious behavior that would fit a profile can be controlled, it is almost impossible to hide automatic physical reactions and subtle,
almost involuntary behavior changes, says Givon.

Located in northern Israel and employing about a dozen people, the company has
received several grants from the Israel Chief Scientist’s Office and the U.S.
Transportation Safety Administration (TSA) and DHS, but is 90 percent self-funded.
While there is always media interest in systems that may prevent terrorist attacks,
Givon says his greatest hope is that there won’t be any news to prompt interest in
WeCu. “And hopefully, when the system is widely deployed,” he adds, “there will be far
less media interest in what we do — because there will be far fewer terror incidents
to report.”

SOURCE: http://homelandsecuritynewswire.com/sorting-bad-guys-good?page=0,0

FOR OFFICIAL USE ONLY//LAW ENFORCEMENT SENSITIVE


SECONDARY DISSEMINATION OR PUBLIC AND MEDIA RELEASE IS NOT AUTHORIZED
Detective Brian Issitt #7475 // (602) 725-4730 // Brian.Issitt@phoenix.gov
SUSPICOUS ACTIVITY
(FOUO/LES) Suspicious Activity and Criminal Damage to
Water Sector Well Sites

During the month of January, several water well sites were vandalized by unknown perpetrator(s). There has been forced
entry at only two of the eleven reported incidents.

Modus Operandi

The perpetrator(s) is entering the sites and tampering with the water pump and its power controls. Damage to the sites
include: disconnecting the oil lines to the water pumps, oil contamination at the site, cutting wires to the water flow meter,
shutting off the water pump, unplugging the meter pump, and tampering with the control switches to the site. In all cases,
nothing was stolen from these sites and no physical evidence left by the perpetrator other than the obvious criminal damage.
The damage to the sites could potentially shut down the pump and/or affect the water quality and/or water distribution for the
area. Further, the damage could cause greater problems to the water pumps if left unattended for an extended period of time.
Each incident has been reported to the local police departments. At this time, the incidents seem to be concentrated in the
East Valley (Chandler, Gilbert, Mesa, Scottsdale, Tempe). The exact date and time of each incident is unknown, as these sites
are inspected every 7-10 days. The damage is often discovered well after the perpetrator was at the site.
Intelligence Gaps
“What We Know”
•Have similar incidents occurred before The ACTIC would like to remind our
•Water well sites located in the East Valley have been vandalized
January 2010? readers to report any suspicious
between January 10 and January 31
•Who is/are the perpetrator(s)? activity/persons or incidents to the Watch
•Damage to the sites is consistent with each incident, indicating it is
•Which employees/contractors have the Center for follow-up by Terrorism Liaison
strategically done
knowledge or ability to carry out these Officers and/or for information. Criminal
•Nothing is stolen from the sites, indicating these are not conducted
acts? damage and vandalism to water supply
by metal thieves
•What is the intention of the sites or water pump locations are
•On Sunday, 1/31/2010 at 0300 hours, a private security contractor
perpetrator(s)? considered a risk to the Water Sector and
witnessed a late model four-door Toyota vehicle drive up to a well
•What is the motivation behind the critical infrastructure. If an incident is
site gate at Warner and Price. The driver exited the vehicle and
criminal damage? reported in any Arizona jurisdiction,
pulled on the chain around the gate and quickly fled the area. The
•What is the time of day/day of the week please contact the ACTIC Watch Center
vehicle is thought to have blue or black lettering on both front
these incidents are occurring? at actic@azdps.gov to report the incident
doors. The driver is described as late 20s – 30 years, white or
•Who could benefit from the damage to the Critical Infrastructure Unit for
Hispanic male, with dark clothing and dark medium length hair
caused? analysis.
•Is there a nexus to terrorism?

SOURCE: ACTIC STRATEGIC ANALYST UNIT

FOR OFFICIAL USE ONLY//LAW ENFORCEMENT SENSITIVE


SECONDARY DISSEMINATION OR PUBLIC AND MEDIA RELEASE IS NOT AUTHORIZED
Detective Brian Issitt #7475 // (602) 725-4730 // Brian.Issitt@phoenix.gov
OFFICER AWARENESS/BORDER ISSUES
(FOUO//LES) Reemerging Tactics Utilized by Smugglers
Summary
Law enforcement has recently reported an increase in scout vehicles and countersurveillance tactics being used
by criminal organizations for the transporting of drugs and humans. Though these strategies are not new, the
criminal organizations using them have Progressively become more aggressive in nature in their attempts to
evade law enforcement. Criminal elements are in constant communication with one another via cell phone or
radio for staging loads and identifying any threats by law enforcement.
Details
Law enforcement has received intelligence regarding progressively aggressive evasive tactics being used against law enforcement officers
by criminal organizations, as well as the use of highly organized surveillance. Successful criminal organizations are extremely organized
and specialized in their maneuvers.

• The Caravan: Drug and human smugglers have commonly used a caravan system with 2-3 scout vehicles driving behind and ahead of
the load vehicles. Upon encountering law enforcement, scout vehicles are instructed to deter the officers at all cost. Tactics used by scouts
include erratic and aggressive driving, the use of caltrops, and striking law enforcement with their vehicles during pursuit. Traffickers
typically use large trucks (i.e., F250, 2500), SUVs, and, occasionally, larger sedans. Vehicles are usually borrowed, stolen, or rented, and
may sometimes be older-model vehicles that are considered easily disposable.

• Countersurveillance: Lookouts, scouts, “campanas,” and hawks or “halcones” are responsible for the surveillance of travel areas for
loads prior to, during, and after the transporting of contraband to the stash house or designation. Lookouts may utilize high-rise vantage
points, travel the same roads repeatedly, serve as decoys, hide in bushes, and, in one case, used horses in their efforts to locate
and identify law enforcement.
Conclusion
Although the use of one of these tactics may not signify the presence of organized criminal activity, one or more of these elements may
assist in developing reasonable suspicion. All officers are highly encouraged to utilize extreme caution when encountering possible
smugglers and are reminded to remain vigilant of their surroundings whether on or off duty.

Anyone with comments or questions regarding this bulletin, or with additional information regarding these reemerging tactics, should
contact the DPS Texas Intelligence Center at 1-866-786-5972 or by e-mail at txdpsintelcenter@txdps.state.tx.us.
Sources
Texas DPS Criminal Investigations Division, Drug Unit.

WITH PERMISSION OF:


FOR OFFICIAL USE ONLY//LAW ENFORCEMENT SENSITIVE
SECONDARY DISSEMINATION OR PUBLIC AND MEDIA RELEASE IS NOT AUTHORIZED
Detective Brian Issitt #7475 // (602) 725-4730 // Brian.Issitt@phoenix.gov
TERRORISM TRENDS
(U) Al-Qaida in Yemen tests new "anti-detectable" high explosive

SANAA, Feb. 16 (Xinhua) -- The al-Qaida in the Arabian


Peninsula (AQAP said it has successfully tested a new
anti- detectable high explosive to improve its capability in
the war against the West, its "Military Commission" said in
a newly- published statement on Tuesday.

In its publication of the 12th issue of online magazine


posted on the Internet on Tuesday, al-Qaida said: "we have
tested a new generation of anti-detectable powerful
explosive that is now on its final phases.“

"Its capacity (to kill high-profile officials and destroy


airplanes) is far greater than plastic explosives such as
(PETN) and (RDX) and other high explosive devices," the
al-Qaida's commission went on to say.
Counter-terrorism experts say the newly-released statement will raise Western's concern about the threats posed
by the terrorist group in Yemen. Security officials here, however, dismissed al- Qaida's issues as a mere
propaganda exercise.

"The real capability of the al-Qaida's branch has been far weakened since the Yemeni government and its
security agencies launched a severe crackdown on the militancy during the past three months," a senior official of
the Interior Ministry told Xinhua on condition of anonymity.

He said the security authorities take zero tolerance against those insignificant amount of the extremist militants.
AbdulElah Hider Shaee, a specialist on the Islamic groups and security affairs in Yemen, said the al-Qaida's
media activity adds to the evidence that the group is thriving despite the government's strict anti-terrorism drive.
SOURCE: http://news.xinhuanet.com/english2010/world/2010-02/17/c_13177339.htm

FOR OFFICIAL USE ONLY//LAW ENFORCEMENT SENSITIVE


SECONDARY DISSEMINATION OR PUBLIC AND MEDIA RELEASE IS NOT AUTHORIZED
Detective Brian Issitt #7475 // (602) 725-4730 // Brian.Issitt@phoenix.gov
QUESTIONS, COMMENTS
OR CONCERNS…???
CONTACT:

DETECTIVE BRIAN ISSITT #7475


PHOENIX POLICE DEPARTMENT
HOMELAND DEFENSE BUREAU
(602) 725-4730
BRIAN.ISSITT@PHOENIX.GOV

FOR OFFICIAL USE ONLY//LAW ENFORCEMENT SENSITIVE


SECONDARY DISSEMINATION OR PUBLIC AND MEDIA RELEASE IS NOT AUTHORIZED
Detective Brian Issitt #7475 // (602) 725-4730 // Brian.Issitt@phoenix.gov

Vous aimerez peut-être aussi