Sign in to follow this  
Followers 0
WAS967

U.S. Department of Homeland Security Information Bulletin

1 post in this topic

Homeland Security asks emergency responders to be more vigilant protecting

official identification

U.S. Department of Homeland Security Information Bulletin

DETAILS:

Al-Qaeda and other terrorist groups likely view the theft or other illegal

acquisition of official identification, uniforms, or vehicles as an

effective way to increase access and decrease scrutiny in furtherance of

planning and operations. Although we possess no information that Al-Qaeda or

other terrorist groups are systematically pursuing the illegal acquisition

of the above referenced items, there is indeed precedence for the use of

official identification, uniforms, or vehicles in the execution of terrorist

attacks. Terrorist groups have utilized police or military uniforms to mask

their identities and achieve closer access to their targets without arousing

suspicion. This was illustrated in the December 2002, suicide bombings that

targeted the Chechen Government Headquarters in Groznyy, Russia. Terrorists

in South America, the Philippines and Pakistan have commandeered or stolen

emergency medical services vehicles and uniforms (or cleverly designed

imitations) to facilitate the execution of their attacks on key facilities.

In an effort to understand the extent of official identification, uniform,

and vehicle thefts, DHS recently conducted a survey of selected members of

the law enforcement community in five states. This survey revealed that from

February to May 2003 hundreds of official identification cards, badges,

decals, uniforms, and government license plates were reported stolen or

lost. Additionally, a number of private companies have reported receiving

suspicious inquiries about renting official delivery vehicles and emergency

services representatives have received unusual requests for detailed vehicle

descriptions. There is no historical baseline to compare recent theft or

suspicious inquiry data, and the intent or resolution of many of the thefts

cannot be determined.

The worldwide proliferation of individuals or companies that traffic in

high-quality imitations of official identification, uniforms, or vehicles is

a related issue that increases the possibility such items could be used to

facilitate future terrorist attacks and further complicates efforts to

prevent their acquisition. For example, earlier this month the New York City

High Intensity Drug Trafficking Area (HIDTA) Task Force reported that it had

identified a Japanese website selling near exact replicas of badges from law

enforcement agencies such as the U.S. Secret Service, Federal Bureau of

Investigation, Drug Enforcement Agency, U.S. Marshals Service, and Los

Angeles Police Department.

Several press reports this year have referred to the theft and sale over the

Internet of a large number of United Parcel Service (UPS) uniforms. Although

these reports proved to be false, they did bring to the public's attention

the potential security concerns of missing or stolen identification,

uniforms, or vehicles.

DHS reminds all recipients to remain vigilant to the disappearance of, or

unauthorized inquiries regarding, official identification cards, badges,

decals, uniforms, government license plates, and vehicles and establish

practices that account for missing items. DHS encourages recipients to

report suspicious incidents to the proper authorities and to remain vigilant

for any nexus to terrorism

PROTECTIVE MEASURES:

Recognizing that possession of some combination of official identification

cards, badges, decals, uniforms, government license plates, and vehicles

tends to reduce suspicion and might allow an individual or vehicle greater

access to sensitive facilities, the following protective measures are

suggested:

Keep comprehensive records of all official identification cards, badges,

decals, uniforms, and license plates distributed, documenting any anomalies

and canceling access to items that are lost or stolen.

Practice accountability of all vehicles to include tracking vehicles that

are in service, in repair status, or sent to salvage.

Safeguard uniforms, patches, badges, ID cards, and other forms of official

identification to protect against unauthorized access to facilities, to

include stripping all decommissioned vehicles slated for resale and/or

salvage of all agency identifying markings and emergency warning devices.

Check multiple forms of valid identification for each facility visitor.

Verify the legitimate business needs of all approaching vehicles and

personnel.

Improve identification card technology to eliminate reuse or unauthorized

duplication.

Alert uniform store vendors of the need to establish and verify the

identities of individuals seeking to purchase uniform articles.

Ensure all personnel are provided a security briefing regarding present and

emerging threats.

DHS encourages recipients of this Information Bulletin to report information

concerning suspicious or criminal activity to law enforcement or a DHS watch

office. The DHS Information Analysis and Infrastructure Protection watch

offices may be contacted at:

For private citizens and companies

Phone: (202) 323--3205, 1-888-585-9078

Email: nipc.watch@fbi.gov

Online: http://www.nipc.gov/incident/cirr.htm

Title: Suspicious Activity Reporting Criteria for Infrastructure Owners and

Operators

Date: August 3, 2004

FOR: Information Sharing and Analysis Centers (ISACs), State Homeland

Security Advisors, Government First Responders, Security Managers, and

Facility Operators

Overview

DHS and FBI request that the owners and operators of the nation's critical

infrastructure/key resource facilities provide reporting to the above

offices on the following types of suspicious activities potentially

indicative of pre-operational terrorist planning:

Surveillance/Probing Activity

- Report attempts to test or conduct reconnaissance of security operations

at critical infrastructure/key resource facilities, high profile venues or

sector-specific events.

- Report any persons showing uncommon interest in security measures or

personnel, entry points or access controls, or perimeter barriers such as

fences or walls.

- Report any persons showing uncommon interest in critical

infrastructure/key resource facilities, networks, or systems (e.g.,

photographing or videotaping assets).

- Report any theft of or missing official company identification documents,

uniforms, credentials, or vehicles necessary for accessing critical

infrastructure/key resource facilities or sector-specific events.

- Report all suspicious attempts to recruit employees or persons

knowledgeable about key personnel or critical infrastructure/ key resource

facilities, networks, or systems.

- Report any theft, purchase, or suspicious means of obtaining plans,

blueprints, alarm system schematics, or similar physical security-related or

sensitive information related to a facility with critical infrastructure/key

resource facilities and systems.

- Report any discovery of documents (particularly foreign language products)

containing pictures or drawings of critical infrastructure/key resource

facilities or systems.

- Report any persons near critical infrastructure/key resource facilities

who do not fit the surrounding environment, such as individuals wearing

improper attire for conditions or not normally present in the area (such as,

homeless persons, street vendors, demonstrators, or street sweepers).

- Report pedestrian surveillance near critical infrastructure/key resource

facilities involving any surveillance activity of sensitive operations,

including photography, videotaping, or extensive note-taking/use of audio

recorder (regardless of the number of individuals involved), or mobile

surveillance by cars, trucks, motorcycles, boats or small aircraft.

Threat/Warnings

- Report all threats/warnings that could affect the reliability and

operation of the nation's critical infrastructure/key resource facilities.

- Report discoveries of website postings which make violent threats specific

to critical infrastructures or sector specific events.

For comments or questions relating to the content or dissemination of this

Information Bulletin, please contact the DHS/Information Analysis and

Infrastructure Protection Directorate's Requirements Division at

DHS.IAIP@DHS.GOV.

APPENDIX

CRITICAL INFRASTRUCTURES AND KEY RESOURCE FACILITIES [1] Critical

Infrastructures

- Banking and Finance

- Chemical

- Defense Industrial Base

- Electric Power

- Emergency Services

- Food/Agriculture

- Information Technology

- National Monuments and Icons

- Oil and Natural Gas

- Postal and Shipping

- Public Health

- Telecommunications

- Transportation (Rail/Mass Transit, Maritime, Aviation, Highway)

- Water

Key Resource Facilities

- Commercial Facilities

- Dams

- Government Facilities

- Nuclear Reactors/Materials

- end special bulletin -

Share this post


Link to post
Share on other sites



Guest
This topic is now closed to further replies.
Sign in to follow this  
Followers 0

  • Recently Browsing   0 members

    No registered users viewing this page.