Chesbro`s Law Enforcement, Research
Transcription
Chesbro`s Law Enforcement, Research
Chesbro's Law Enforcement, Research & Intelligence Compendium (CLERIC) A Guide to Sources of Information Michael Chesbro 6/1/2014 Chesbro's Law Enforcement, Research & Intelligence Compendium (CLERIC) 2014 Table of Contents Agency Addresses & Points of Contact Anarchists, Activists, and Saboteurs Country Studies Cyber-Intelligence / Cyber-Security Databases (Searchable On-Line) Documents and Publications (Intelligence & Analysis) Drugs Encryption Explosives Foreign Languages Gangs & Extremist Organizations Intelligence Community Intelligence Cycle Legal Aspects of Inquiries, Ethics, and Integrity Locks & Lock Picking Maps & Mapping Online Dictionaries, Glossaries, Terms & Definitions Professional Organizations and Memberships Report Crime On-Line Software (Freeware) Surveillance Terrorism Awareness Training & Education (On-Line Learning Portals) Michael Chesbro 2 Chesbro's Law Enforcement, Research & Intelligence Compendium (CLERIC) 2014 Agency Addresses & Points of Contact A-Z Index of U.S. Government Departments and Agencies Bureau of Alcohol, Tobacco, Firearms and Explosives Bureau of Citizenship and Immigration Services Bureau of Justice Statistics Central Intelligence Agency Customs and Border Protection Defense Criminal Investigative Service Defense Intelligence Agency Drug Enforcement Administration (DEA) Federal Bureau of Investigation (FBI) Federal Bureau of Prisons Federal Emergency Management Agency (FEMA) Federal Law Enforcement Training Center Fusion Centers Homeland Security Contacts Homeland Security Investigations Immigration and Customs Enforcement Internet Service Provider (ISP) List – This site and ISP list is for law enforcement use and contains a variety of ISPs and similar information services, specifically, contacts at the legal departments for law enforcement service of subpoena, court orders, and search warrants. INTERPOL Michael Chesbro 3 Chesbro's Law Enforcement, Research & Intelligence Compendium (CLERIC) 2014 National Institute of Justice National Nuclear Security Administration National Security Agency Naval Criminal Investigative Service NOAA Regional Climate Centers Police Locator – Police Locator is a resource for finding police departments, sheriff's offices and other law enforcement agencies in the United States of America. Postal Inspection Service Transportation Security Administration U.S. Air Force Office of Special Investigations (OSI) U.S. Army Criminal Investigation Command (CID) U.S. Attorneys U.S. Marshals Service U.S. Park Police U.S. Secret Service U.S. State Department Bureau of Diplomatic Security Michael Chesbro 4 Chesbro's Law Enforcement, Research & Intelligence Compendium (CLERIC) 2014 Anarchists, Activists, and Saboteurs Activist Post Anarchism In Action: Methods, Tactics, Skills and Ideas Anarchist’s Cookbook Animal Liberation Front: Guide to Direct Action Anonymous Black Cat Sabotage Manual BodyHammer - Tactics and Self-Defense For the Modern Protester BUSTED: The Citizen's Guide to Surviving Police Encounters (Video) A Civilian's Guide to Direct Action CrimethInc Digital Security and Privacy for Human Rights Defenders Michael Chesbro 5 Chesbro's Law Enforcement, Research & Intelligence Compendium (CLERIC) 2014 Digital Security for Activists Direct Action Survival Guide Don't Talk To The Police (Video) Regent Law Professor James Duane gives viewers startling reasons why they should always exercise their 5th Amendment rights when questioned by government officials. Earth First Earth First Wolf Hunt Sabotage Manual Ecodefense: A Field Guide to Monkeywrenching Global Sovereign's Handbook A Guide to Secure Meetings in Pubs How to Cop Proof Your Cell Phone How to Deal with Cops: Q&A with Steve Silverman of Flex Your Rights (Video) If An Agent Knocks Infiltrators, Informers and Grasses: how, why and what to do if your group is targeted Jacob Appelbaum (Part 1/2) Digital Anti-Repression Workshop - April 26 2012 Jacob Appelbaum (Part 2/2) Digital Anti-Repression Workshop - April 26 2012 Know Your Rights (National Lawyer’s Guild) Know Your Rights: What To Do If You're Stopped By Police… (ACLU) ONO – Survival In The Digital Age Operation Backfire - A Survival Guide for Environmental and Animal Rights Activists A Practical Security Handbook for Activists and Campaigns Privacy and Security Info for Activists Michael Chesbro 6 Chesbro's Law Enforcement, Research & Intelligence Compendium (CLERIC) 2014 Rats! Your guide to protecting yourself against snitches, informers, informants, agents provocateurs, narcs, finks, and similar vermin. - Claire Wolfe Recipes for Disaster: An Anarchist Cookbook Riseup Ruckus Security Culture For Activists Security & Counter-Surveillance: Information Against the Police State Security In A Box | Tools and Tactics for Your Digital Security Security Culture: A Handbook For Activists Surveillance Self-Defense (EFF.Org) Tactical Technology Collective Tech Tools For Activists You Have the Right to Stay Out of Jail (Info-Graphic) Virtual Activist 2.0 10 Rules for Dealing with Police (Video) Michael Chesbro 7 Chesbro's Law Enforcement, Research & Intelligence Compendium (CLERIC) 2014 Seattle May-Day Riots 2012 Michael Chesbro 8 Chesbro's Law Enforcement, Research & Intelligence Compendium (CLERIC) 2014 Country Studies BBC Country Profiles CIA World Factbook Country Studies - This website contains the on-line versions of books previously published in hard copy by the Federal Research Division of the Library of Congress as part of the Country Studies/Area Handbook Series sponsored by the U.S. Department of the Army between 1986 and 1998. Each study offers a comprehensive description and analysis of the country or region's historical setting, geography, society, economy, political system, and foreign policy. (Note: Dated Material) Designated Countries List (NASA) - The list of “Designated Countries” is a compilation of countries with which the United States has no diplomatic relations, countries determined by Department of State to support terrorism, countries under Sanction or Embargo by the United States and countries of Missile Technology Concern. DoD Electronic Foreign Clearance Guide (Requires Password, if not on .mil/.gov network) Economist Intelligence Unit International Monetary Fund (IMF) Country Information & Statistics Library of Congress – Country Studies Nation Master US Department of State – Country Studies US Energy Information Administration - Country Briefs World Health Organization – Country Profiles Yahoo Countries Michael Chesbro 9 Chesbro's Law Enforcement, Research & Intelligence Compendium (CLERIC) 2014 Cyber-Intelligence / Cyber-Security Best Practices for Keeping Your Home Network Secure (NSA, June 2013) Certified Cyber Intelligence Professional – McAfee Institute Check your password—is it strong? Cyber-Security (Department of Homeland Security) Cyber-Security (Nextgov) Cyber-Security Tips (US-CERT) Diceware - Diceware is a method for creating passphrases, passwords, and other cryptographic variables using an ordinary die from a pair of dice as a hardware random number generator. Electronic Frontier Foundation Electronic Privacy Information Center (EPIC) FTC - How to Keep Your Personal Information Secure These web-based courses are available through the FBI Virtual Academy as part of the HiTET program: Basic Networking for Investigators Exploiting Mobile Communications for Law Enforcement: Criminal Tactics and Investigative Techniques Michael Chesbro 10 Chesbro's Law Enforcement, Research & Intelligence Compendium (CLERIC) 2014 Investigating Web Sites for Law Enforcement: A Wealth of Information Obtaining and Analyzing Digital Records The Cloud for Law Enforcement: It's All About Communication Social Media: Friend or Foe? Tracing Email Addresses How to Delete Yourself From the Internet Internet Crime Complaint Center (IC3) National Security Agency (NSA) Fact Sheets National Strategy to Secure Cyberspace (2003) OnGuard On-Line (Computer Security) Random.Org – Password Generator Seattle Department of Information Technology – Protecting Your Home Computer U.S. CERT – Home & Business Michael Chesbro 11 Chesbro's Law Enforcement, Research & Intelligence Compendium (CLERIC) 2014 Programs and Applications 7-Zip - 7-Zip is open source software. Most of the source code is under the GNU LGPL license. 7-Zip supports encryption with AES-256 algorithm. This algorithm uses cipher key with length of 256 bits. To create that key 7-Zip uses derivation function based on SHA-256 hash algorithm. A key derivation function produces a derived key from text password defined by user. For increasing the cost of exhaustive search for passwords 7-Zip uses big number of iterations to produce cipher key from text password. AxCrypt - AxCrypt is free and easy to use open source strong file encryption for Windows 2000/2003/XP/Vista/2008/7, integrated with Windows Explorer. Encrypt, compress, decrypt, wipe, view and edit with a few mouse clicks. Cryptographic primitives are AES-128 and SHA-1. Bitmessage is a P2P communications protocol, similar to the Bitcoin protocol, used to send encrypted messages to another person or to many subscribers. CCleaner - CCleaner is a tool for cleaning your Windows PC. It protects your privacy online and makes your computer faster and more secure. ChatCrypt – ChatCrypt is a web-based chat service that uses a JavaScript implementation of AES-256 to encrypt messages before they are sent to the chat room. To use ChatCrypt everyone participating in the chat must share a common password (exchanged beforehand by secure means). From the ChatCrypt web-site enter a chat room name, username, and a shared password. Anyone knowing the chat room name can enter the room, but without knowing the correct password will only see usernames and encrypted text. A WHOIS search shows that the chatcrypt.com domain is registered in Makkoshotyka, Hungary. CounterMail: The Secure Email Provider - CounterMail is a secure and easy to use online email service, designed to provide maximum security and privacy without any unnecessary Michael Chesbro 12 Chesbro's Law Enforcement, Research & Intelligence Compendium (CLERIC) 2014 complexity. You can access your email account at any time, from anywhere in the world. Your account will always be encrypted and anonymous. CounterMail's encryption works automatically and transparently, it requires no specialized computer skills or knowledge. If you are comfortable using services like Hotmail or Gmail, you will be comfortable using CounterMail's secure email! CounterMail is using a strong encryption protocol called OpenPGP, with 4096 bits encryption keys to protect your data. To the best of publicly available information, there is no known method which will allow a person or group to break OpenPGP:s encryption by cryptographic or computational means. Cryptocat - Cryptocat is a free, open-source, cross-platform, encrypted chat application for Firefox, Chrome, and Safari browsers. Cryptocat was initially released on May 19, 2011 and has undergone regular improvements and updates since its initial release. Cryptocat’s lead developer was Nadim Kobeissi. Kobeissi’s goal was to simplify secure on-line communication, making it easily available to everyone who wanted it. Cryptocat is very simple to use. Simply download and install the Cryptocat application for one of the browsers – Firefox, Chrome, or Safari – for which it was designed (Cryptocat does not work on Internet Explorer). Start the application, enter a ‘conversation name’ (the name of the chatroom you want to create), enter a ‘nickname’ (the name you will appear as in the chatroom you created) and then click connect. Cryptocat creates a secure, encrypted connection and creates the chatroom. DNSCrypt - When you use HTTPS or SSL, your web browsing traffic is encrypted. When you use a VPN, all of your traffic is encrypted (usually). Sometimes even with HTTPS and VPNs in play, DNS requests — or the way your computer translates "lifehacker.com" into numbers that your computer understands, like "199.27.72.192," are completely unencrypted, leaving you open to spoofing and man-in-the-middle attacks. DNSCrypt can lock that down. "How to Boost Your Internet Security with DNSCrypt" Encryption Wizard (EW) is a simple, strong, Java file and folder encryptor for protection of sensitive information (FOUO, Privacy Act, CUI, etc.). EW encrypts all file types for data-at-rest and data-in-transit protection. Without installation or elevated privileges, EW runs on Windows, Mac, Linux, Solaris, and other computers with Sun Java. Behind its simple drag-n-drop interface, EW offers 128-bit AES encryption, SHA-256 hashing, searchable metadata, archives, Michael Chesbro 13 Chesbro's Law Enforcement, Research & Intelligence Compendium (CLERIC) 2014 compression, secure deleting, and PKI/CAC/PIV support. EW is GOTS - Government invented, owned, and supported software. Over 62,500 copies of EW protect a wide variety of data. EW comes in two, fully-compatible and interoperable editions, EW-Public and EW-Govt. Anyone can download and use EW-Public. Designed for US Federal Government (and contractor) computers, EW-Govt is accredited by the Army and Air Force for NIPRNet and SIPRNet. EW is free to users. Freenet - Freenet is free software which lets you anonymously share files, browse and publish "freesites" (web sites accessible only through Freenet) and chat on forums, without fear of censorship. Freenet is decentralised to make it less vulnerable to attack, and if used in "darknet" mode, where users only connect to their friends, is very difficult to detect. Communications by Freenet nodes are encrypted and are routed through other nodes to make it extremely difficult to determine who is requesting the information and what its content is. Users contribute to the network by giving bandwidth and a portion of their hard drive (called the "data store") for storing files. Files are automatically kept or deleted depending on how popular they are, with the least popular being discarded to make way for newer or more popular content. Files are encrypted, so generally the user cannot easily discover what is in his datastore, and hopefully can't be held accountable for it. Chat forums, websites, and search functionality, are all built on top of this distributed data store. GPG4Win - Gpg4win enables users to securely transport emails and files with the help of encryption and digital signatures. Encryption protects the contents against an unwanted party reading it. Digital signatures make sure that it was not modified and comes from a specific sender. Gpg4win supports both relevant cryptography standards, OpenPGP and S/MIME Michael Chesbro 14 Chesbro's Law Enforcement, Research & Intelligence Compendium (CLERIC) 2014 (X.509), and is the official GnuPG distribution for Windows. It is maintained by the developers of GnuPG. Gpg4win and the software included with Gpg4win are Free Software (Open Source; among other things free of charge for all commercial and non-commercial purposes). Creation of Gpg4win was supported by the German Federal Office for Information Security (BSI). Guerrilla Mail - Guerrilla Mail gives you a disposable email address. There is no need to register, simply visit Guerrilla Mail and a random address will be given. You can also choose your own address. Guerrilla Mail deletes all email that was delivered to an inbox after 1 hour. Logs are deleted after 24 hours. HTTPS Everywhere - HTTPS Everywhere is a browser extension for Firefox and Chrome that attempts to encrypt your traffic with major web-sites. HTTPS Everywhere was developed by the TOR Project and the Electronic Frontier Foundation. Hushmail - Hushmail is a web-based email service offering PGP-encrypted e-mail, file storage. ushmail uses OpenPGP standards and the source is available for download. Additional security features include hidden IP addresses in e-mail headers. An e-mail account has a storage limit of 25MB, and no IMAP or Post Office Protocol (POP3) service. If public encryption keys are available to both recipient and sender (either both are Hushmail users or have uploaded PGP keys to the Hush keyserver), Hushmail can convey authenticated, encrypted messages in both directions. For recipients for whom no public key is available, Hushmail will allow a message to be encrypted by a password (with a password hint) and stored for pickup by the recipient, or the message can be sent in cleartext. (Wikipedia) I2P Anonymous Network - I2P is an anonymizing network, offering a simple layer that identity-sensitive applications can use to securely communicate. All data is wrapped with several layers of encryption, and the network is both distributed and dynamic, with no trusted parties. Many applications are available that interface with I2P, including mail, peer-peer, IRC chat, and Michael Chesbro 15 Chesbro's Law Enforcement, Research & Intelligence Compendium (CLERIC) 2014 others. The I2P project was formed in 2003 to support the efforts of those trying to build a more free society by offering them an uncensorable, anonymous, and secure communication system. I2P is a development effort producing a low latency, fully distributed, autonomous, scalable, anonymous, resilient, and secure network. The goal is to operate successfully in hostile environments - even when an organization with substantial financial or political resources attacks it. All aspects of the network are open source and available without cost, as this should both assure the people using it that the software does what it claims, as well as enable others to contribute and improve upon it to defeat aggressive attempts to stifle free speech. Internet Relay Chat (IRC) - IRC provides a way of communicating in real time with people from all over the world. It consists of various separate networks (or "nets") of IRC servers, machines that allow users to connect to IRC. IRC is very similar to text messaging, but designed around communicating with large groups of users instead of one on one. IRC Clients for Windows. John the Ripper Password Cracker - John the Ripper is a free password cracking software tool. Initially developed for the UNIX operating system, it now runs on fifteen different platforms (eleven of which are architecture-specific versions of UNIX, DOS, Win32, BeOS, and OpenVMS). It is one of the most popular password testing and breaking programs as it combines a number of password crackers into one package, auto-detects password hash types, and includes a customizable cracker. It can be run against various encrypted password formats including several crypt password hash types most commonly found on various UNIX versions (based on DES, MD5, or Blowfish), Kerberos AFS, and Windows NT/2000/XP/2003 LM hash. Additional modules have extended its ability to include MD4-based password hashes and passwords stored in LDAP, MySQL, and others. Michael Chesbro 16 Chesbro's Law Enforcement, Research & Intelligence Compendium (CLERIC) 2014 JonDonym - JonDonym servers are operated by independent entities committed to protecting your data. Because these operators are independent from each other, no single organization has complete information about you. Your anonymity thereby gets fully protected, unlike alternatives like (Web-) Proxies and VPNs, which are typically controlled by a single party and can be easily exploited thereby. In many cases, these parties, their background and their intent are unknown. When you surf the web your requests travel across different relay points before serving the web page. Like an Internet provider, each of these relay points can monitor your entire data traffic on its way towards its destination, e.g. a website or an e-mail service. By analyzing this data, the relay points may completely deanonymize typical VPN services and (web-) proxies which only have only one single server location. But with JonDonym, you are protected! Each of JonDonym's premium services consists of several servers in several different countries as well as their operators. It would require international cooperation between countries or operator organizations for your information to be revealed. LastPass Password Manager is a free password management service developed by LastPass. It is available as a plugin for Internet Explorer, Mozilla Firefox, Google Chrome, Opera, and Safari. There is also a LastPass Password Manager bookmarklet for other browsers. LastPass seeks to resolve the password fatigue problem by centralising user password management in the cloud. Passwords in LastPass Password Manager are protected by a master password and are encrypted locally and are synchronized to any other browser. LastPass Password Manager also has a form filler that automates password entering and form filling. It also supports password generation, site sharing and site logging. Lightweight Portable Security (LPS) creates a secure end node from trusted media on almost any Intel-based computer (PC or Mac). LPS boots a thin Linux operating system from a CD or USB flash stick without mounting a local hard drive. Administrator privileges are not required; nothing is installed. The LPS family was created to address particular use cases: LPS-Public is a Michael Chesbro 17 Chesbro's Law Enforcement, Research & Intelligence Compendium (CLERIC) 2014 safer, general-purpose solution for using web-based applications. The accredited LPS-Remote Access is only for accessing your organization's private network. LPS-Public allows general web browsing and connecting to remote networks. It includes a smart card-enabled Firefox browser supporting CAC and PIV cards, a PDF and text viewer, Java, and Encryption Wizard - Public. LPS-Public turns an untrusted system (such as a home computer) into a trusted network client. No trace of work activity (or malware) can be written to the local computer. Simply plug in your USB smart card reader to access CAC- and PIV-restricted US government websites. LPS differs from traditional operating systems in that it isn't continually patched. LPS is designed to run from read-only media and without any persistent storage. Any malware that might infect a computer can only run within that session. A user can improve security by rebooting between sessions, or when about to undertake a sensitive transaction. For example, boot LPS immediately before performing any online banking transactions. LPS should also be rebooted immediately after visiting any risky web sites, or when the user has reason to suspect malware might have been loaded. In any event, rebooting when idle is an effective strategy to ensure a clean computing session. LPS is updated on a regular basis (at least quarterly patch and maintenance releases). Update to the latest versions to have the latest protection. Mailvelope - Mailvelope is a browser extension that enables the exchange of encrypted emails following the OpenPGP encryption standard. Mailvelope uses the OpenPGP encryption standard which makes it compatible with existing email encryption solutions. Installing Mailvelope from the Chrome Web Store ensures that the installation package is signed and therefore its origin and integrity can be verified. Mailvelope integrates directly into the webmail user interface, its elements are unintrusive and easy to use in your normal workflow. It comes preconfigured for major webmail providers. Mailvelope can be customized to work with any provider. Malwarebytes - Malwarebytes is an application for computers running under the Microsoft Windows operating system that finds and removes malware. Made by Malwarebytes Corporation, it was first released in January 2008. It is available in a free version, which scans for and removes malware when started manually, and a paid version, which additionally provides scheduled scans, real-time protection and a flash memory scanner. Michael Chesbro 18 Chesbro's Law Enforcement, Research & Intelligence Compendium (CLERIC) 2014 Microsoft Security Essentials is an antivirus software (AV) product that provides protection against different types of malware such as computer viruses, spyware, rootkits and Trojan horses. It runs on Windows XP, Windows Vista and Windows 7, but not on Windows 8, which has a built-in AV component. Open Web Application Security Project (OWASP) OWASP Application Security Videos Password Safe - Many computer users today have to keep track of dozens of passwords: for network accounts, online services, and premium web sites. Some write their passwords on a piece of paper, leaving their accounts vulnerable to thieves or in-house snoops. Others choose the same password for different applications, which makes life easy for intruders of all kinds. With Password Safe, a free utility designed by Bruce Schneier, users can keep their passwords securely encrypted on their computers. A single Safe Combination--just one thing to remember-unlocks them all. Password Safe protects passwords with the Twofish encryption algorithm, a fast, free alternative to DES. Download Password Safe. The Pirate Bay (commonly abbreviated TPB) is a website that provides torrent files and magnet links to facilitate peer-to-peer file sharing using the BitTorrent protocol. It was founded in Sweden in 2003. In 2009, the website’s founders were put on trial in Sweden, charged with facilitating illegal Michael Chesbro 19 Chesbro's Law Enforcement, Research & Intelligence Compendium (CLERIC) 2014 downloading of copyrighted material. They were found guilty by the court and sentenced to a year in prison with a fine of 30 million SEK (€2.7M or US$3.5M as of 2009). In some countries, ISPs have been ordered to block access to the website. Since then, proxies have been made all around the world providing access to The Pirate Bay. The Pirate Bay Browser ProtonMail - ProtonMail was founded in summer 2013 at CERN by scientists who were drawn together by a shared vision of a more secure and private Internet. Early ProtonMail hackathons were held at the famous CERN Restaurant One. ProtonMail is developed both at CERN and MIT and is headquartered in Geneva, Switzerland. Switzerland Based: ProtonMail is incorporated in Switzerland and our servers are located in Switzerland. We are outside of US and EU jurisdiction and all user data is protected by strict Swiss privacy laws. All user data is protected by the Swiss Federal Data Protection Act (DPA) and the Swiss Federal Data Protection Ordinance (DPO) which offers some of the strongest privacy protection in the world for both individuals and entities. Only a court order from the Cantonal Court of Geneva or the Swiss Federal Supreme Court can compel us to release the extremely limited user information we have. Privnote is a message encryption service provided by the technology company Insophia, located in Montevideo, Uruguay. Privnote works by encrypting a message created on the Privnote web-site, storing that encrypted message on the Privnote servers, and providing a link to view that message. An example of a link to a message on the Privnote server looks like this: https://privnote.com/n/mewehlwavzmvhpeq/#tfhduyzlckqeokqf. A person simply follows this link to view the message. Once the message has been opened (someone has clicked on the link) the message is deleted from the Privnote Michael Chesbro 20 Chesbro's Law Enforcement, Research & Intelligence Compendium (CLERIC) 2014 servers. Thus a person gets to read a message sent through Privnote one time before it is deleted. If there is a need to keep the information sent through Privnote, the recipient can copy and paste the text of the message to another document, or make a screenshot of the decrypted Privnote message. Messages left unread on the Privnote servers are automatically deleted after 30 days. OneShar – A system much like Privnote is Oneshar (). Oneshar allows a user to create a message of up to 1000 characters in length, then encrypts the message and provides the user with a link to access the message. Oneshar also allows the creator of the message to set a time of 30 minutes, 1 hour, 2 hours, 4 hours, 8 hours, or 1, 2, or 3 days before the message is deleted from the Oneshar servers. NoteDIP is another service for sending self-destructing messages. NoteDIP allows one to specify a password in order to access NoteDIP link containing the message. NoteDIP also allows for the sender to include an e-mail address to receive notification when a message has been read. Destructing Message creates a link to a created message and includes a selfdestruct time that begins a countdown when the message is opened. The time until the message self-destructs after being opened can be set for 15, 30, or 45 seconds, or 1, 2, or 5 minutes. After the timer reaches zero the message is destroyed. TMWSD stands for “This Message Will Self Destruct”. Like other selfdestructing message services, TMWSD creates a link to the message you have created. TMWSD allows for a password requirement to access the message, and also allows one to create multiple links to the same message (each of which allows the message to be read just one time). Burn Note operates from the web and from both iOS and Android mobile apps. When a Burn Note message is opened by the recipient a sender-set count-down from 1 to 120 seconds starts, and upon reaching zero the message is deleted. Burn Note messages allow setting of a password to open the message as well. A Michael Chesbro 21 Chesbro's Law Enforcement, Research & Intelligence Compendium (CLERIC) 2014 unique feature of Burn Note is the spotlight feature that displays only part of the message at a time (the part under the spotlight) thus resisting copy and paste and screen shots of the entire message. The Amnesiac Incognito Live System (TAILS) Tails is a live system that aims at preserving your privacy and anonymity. It helps you to use the Internet anonymously almost anywhere you go and on any computer but leave no trace using unless you ask it explicitly. It is a complete operating-system designed to be used from a DVD or a USB stick independently of the computer's original operating system. It is Free Software and based on Debian GNU/Linux. Tails comes with several built-in applications pre-configured with security in mind: web browser, instant messaging client, email client, office suite, image and sound editor, etc. TOR (The Onion Router) Tor is free software and an open network that helps you defend against a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security known as traffic analysis Tor was originally designed, implemented, and deployed as a third-generation onion routing project of the U.S. Naval Research Laboratory. It was originally developed with the U.S. Navy in mind, for the primary purpose of protecting government communications. Today, it is used every day for a Michael Chesbro 22 Chesbro's Law Enforcement, Research & Intelligence Compendium (CLERIC) 2014 wide variety of purposes by normal people, the military, journalists, law enforcement officers, activists, and many others. Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. Tor provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy. TrueCrypt - TrueCrypt is software for establishing and maintaining an on-the-fly-encrypted volume (data storage device). On-the-fly encryption means that data is automatically encrypted right before it is saved and decrypted right after it is loaded, without any user intervention. No data stored on an encrypted volume can be read (decrypted) without using the correct password/keyfile(s) or correct encryption keys. Entire file system is encrypted (e.g., file names, folder names, contents of every file, free space, meta data, etc). USB Safeguard Runs with any USB pen drive No installation required On the fly AES 256 bits encryption Free version limited to 2GB drives UseNet - UseNet is a worldwide distributed Internet discussion system. It was developed from the general purpose UUCP architecture of the same name. Duke University graduate students Tom Truscott and Jim Ellis conceived the idea in 1979 and it was established in 1980. Users read and post messages (called articles or posts, and collectively termed news) to one or more categories, known as newsgroups. Usenet resembles a bulletin board system (BBS) in many respects, and is the precursor to Internet forums that are Michael Chesbro 23 Chesbro's Law Enforcement, Research & Intelligence Compendium (CLERIC) 2014 widely used today. Usenet can be superficially regarded as a hybrid between email and web forums. Discussions are threaded, as with web forums and BBSes, though posts are stored on the server sequentially. One notable difference between a BBS or web forum and Usenet is the absence of a central server and dedicated administrator. Usenet is distributed among a large, constantly changing conglomeration of servers that store and forward messages to one another in so-called news feeds. Individual users may read messages from and post messages to a local server operated by a commercial UseNet provider, their Internet service provider, university, or employer. Michael Chesbro 24 Chesbro's Law Enforcement, Research & Intelligence Compendium (CLERIC) 2014 Wicker App Confide App Michael Chesbro 25 Chesbro's Law Enforcement, Research & Intelligence Compendium (CLERIC) 2014 Apricorn Aegis Padlock 1 TB USB 3.0 256-bit AES XTS Hardware Encrypted Portable External Hard Drive Utilizes Military Grade FIPS PUB 197 Validated Encryption Algorithm Super-fast USB 3.0 Connection - Data transfer speeds up to 10X faster than USB 2.0 Software Free Design - With no admin rights needed Sealed from Physical Attacks by Tough Epoxy Coating Brute Force Self Destruct Feature Compact, Rugged Design - Perfect for taking your data on the road Wear Resistant Key Pad See Item on Amazon.Com - Additional security can be obtained by installing TrueCrypt on the Aegis Padlock drive, and then creating a TrueCrypt encrypted volume on the drive in which to store your sensitive document and files. Gaining unauthorized access to data stored in this way would require both bypassing the AES hardware encryption of the Aegis Padlock drive, and then bypassing the AES encryption used in TrueCrypt. Blackphone Michael Chesbro 26 Chesbro's Law Enforcement, Research & Intelligence Compendium (CLERIC) 2014 Databases (Searchable On-Line) Air Traffic Control System Command Center - Flight Delay Information American Medical Association: DoctorFinder – Doctor Finder provides basic professional information on virtually every licensed physician in the United States. This includes more than 814,000 doctors. AnyWho – White Pages Background Affiliation Status Information Center (BASIC) – BASIC contains Commodity Futures Trading Commission (CFTC) registration and NFA membership information and futures-related regulatory and non-regulatory actions contributed by NFA, the CFTC and the U.S. futures exchanges. Better Business Bureau Bureau of Justice Statistics DEA - Office of Diversion Control (Query Form) FCC - License Search Federal Bureau of Prisons Inmate Locator (includes all inmates from 1982 to present) FINRA BrokerCheck - BrokerCheck is a free tool to help investors research the professional backgrounds of current and former FINRA-registered brokerage firms and brokers, as well as investment adviser firms and representatives. Homeland Security Digital Library Immigration & Customs Enforcement (ICE) Detainee Locator System IRS - Exempt Organizations Select Check – This database is an on-line search tool that allows users to select an exempt organization and check certain information about its federal tax status and filings. It consolidates three former search sites into one, providing expanded search Michael Chesbro 27 Chesbro's Law Enforcement, Research & Intelligence Compendium (CLERIC) 2014 capability and a more efficient way to search for organizations that are eligible to receive taxdeductible charitable contributions (Publication 78 data). Users may rely on this list in determining deductibility of contributions. National Sex Offender Public Registry Pipl "The most comprehensive people search on the web." Selective Service Online Registration Verification Spokeo - Spokeo is a people search engine that organizes White Pages listings, Public Records and Social Network Information to help you safely find & learn about people. Uniform Crime Reporting - The Uniform Crime Reporting (UCR) Program has been the starting place for law enforcement executives, students of criminal justice, researchers, members of the media, and the public at large seeking information on crime in the nation. The program was conceived in 1929 by the International Association of Chiefs of Police to meet the need for reliable uniform crime statistics for the nation. In 1930, the FBI was tasked with collecting, publishing, and archiving those statistics. Today, four annual publications, Crime in the United States, National Incident-Based Reporting System, Law Enforcement Officers Killed and Assaulted, and Hate Crime Statistics are produced from data received from over 18,000 city, university/college, county, state, tribal, and federal law enforcement agencies voluntarily participating in the program. The crime data are submitted either through a state UCR Program or directly to the FBI’s UCR Program. VINCheck - NICB's VINCheck is a service provided to the public to assist in determining if a vehicle has been reported as stolen, but not recovered, or has been reported as a salvage vehicle by cooperating NICB members. To perform a search, a Vehicle Identification Number (VIN) is required. A maximum of five VINCheck searches can be conducted within a 24-hour period per IP address. VIN View is a free online VIN decoder that allows you to see the information about your vehicle that it contains. VIN View supports decoding of any vehicle identification number that was Michael Chesbro 28 Chesbro's Law Enforcement, Research & Intelligence Compendium (CLERIC) 2014 issued after 1978, which is when ISO 3779 was established to make a uniform way to track vehicles. VINE-Link - VINE-Link is the online version of VINE (Victim Information and Notification Everyday), the National Victim Notification Network. This service allows crime victims to obtain timely and reliable information about criminal cases and the custody status of offenders 24 hours a day. Victims and other concerned citizens can also register to be notified by phone, email or TTY device when an offender's custody status changes. Users can also register through their participating state or county toll-free number. Uniform Crime Reporting (FBI) U.S. Department of Education Database of Accredited Postsecondary Institutions Michael Chesbro 29 Chesbro's Law Enforcement, Research & Intelligence Compendium (CLERIC) 2014 Documents and Publications (Intelligence & Analysis) 10 Simple Steps to Help Your Agency Become a Part of the National Criminal Intelligence Sharing Plan Department of Justice (February 2008) Analyst Toolbox: A Toolbox for the Intelligence Analyst Department of Justice (November 2006) Analyst's Style Manual Welch, Bill (2008) Assessing Responses to Problems: An Introductory Guide for Police Problem-Solvers Eck, John E. (January 2004) Become a Problem Solving Crime Analyst In 55 Small Steps Clarke, Ronald V. & John Eck (2003) Common Competencies for State, Local, and Tribal Intelligence Analysts Department of Justice (June 2010) Crime Analysis for Problem Solvers In 60 Small Steps Clarke, Ronald V. & John E. Eck (August 2005) Crime Analysis for Problem Solving Security Professionals in 25 Small Steps Vellani, Karim H. (2010) Crime Analyst’s Guide to Mapping Higgins, Daniel F. (April 2003) Criminal Intelligence File Guidelines LEIU March (2002) Michael Chesbro 30 Chesbro's Law Enforcement, Research & Intelligence Compendium (CLERIC) 2014 Criminal Intelligence Manual for Analysts United Nations (April 2011) Criminal Intelligence Manual for Front-line Law Enforcement United Nations (December 2010) Criminal Intelligence Manual for Managers United Nations (March 2011) Criminal Intelligence Resource Guide Department of Justice (June 2011) Critical Thinking and Intelligence Analysis Moore, David (March 2006) Curing Analytic Pathologies - Pathways to Improved Intelligence Analysis Cooper, Jeffrey R. (December 2005) Dictionary of Military and Associated Terms Department of Defense (8 November 2010 (As Amended Through 16 July 2013)) Enhancing the Problem-Solving Capacity of Crime Analysis Units White, Matthew B. (August 2008) Excel for Analysts West Virginia University (2012) Fifteen Axioms for Intelligence Analysts Watanabe, Frank (April 1995) Improving Intelligence Analysis with ACH Heuer, Richards J. (November 2005) Improving the Law Enforcement Intelligence Community Relationship Kelley, Patrick A. (June 2007) Michael Chesbro 31 Chesbro's Law Enforcement, Research & Intelligence Compendium (CLERIC) 2014 Increasing Analytic Capacity of State and Local Law Enforcement Agencies Department of Justice (June 2012) Integrated Intelligence and Crime Analysis Ratcliffe, Jerry H. (August 2007) Integration Of Crime Analysis Into Patrol Work Taylor, Bruce & Rachel Boba (September 2011) Intelligence As A Career AFIO (May 2011) Intelligence Analysis for Problem Solvers Eck, John E. & Ronald V. Clarke (September 2013) Intelligence Guide for First Responders ITACG Intelligence Guide for First Responders, 2nd Edition ITACG (March 2011) Intelligence-Led Policing: The New Intelligence Architecture Peterson, Marilyn (September 2005) Introductory Guide to Crime Analysis and Mapping Boba, Rachel (November 2001) Law Enforcement Analyst Certification Standards Department of Justice (January 2010) Law Enforcement Analytic Standards, 2nd Edition IALEIA (April 2012) Law Enforcement Intelligence A Guide for State Local and Tribal Law Enforcement Agencies Carter, David L. (November 2004) Michael Chesbro 32 Chesbro's Law Enforcement, Research & Intelligence Compendium (CLERIC) 2014 Law Enforcement Intelligence A Guide for State Local and Tribal Law Enforcement Agencies, 2nd Edition Carter, David L. (January 2009) Mapping Crime Principle and Practice Harries, Keith (December 1999) Minimum Criminal Intelligence Training Standards for Law Enforcement and Other Criminal Justice Agencies in the United States, Version 2 Department of Justice (October 2007) National Criminal Intelligence Sharing Plan Department of Justice (October 2003) National Summit on Intelligence Gathering, Sharing, Analysis, and Use After 9-11 IACP (September 2008) Navigating Your Agency's Path to Intelligence-Led Policing Department of Justice (February 2009) Out of Bounds: Innovation and Change in Law Enforcement Intelligence Analysis Osborne, Deborah (Editor) (March 2006) Police Information and Intelligence Systems United Nations (November 2006) Police Intelligence Operations, ATTP 3-39.20 Department of the Army (July 2010) Practical Guide to Intelligence-Led Policing New Jersey State Police (September 2006) Privacy, Civil Rights, and Civil Liberties Compliance Verification for the Intelligence Enterprise Department of Justice (June 2010) Michael Chesbro 33 Chesbro's Law Enforcement, Research & Intelligence Compendium (CLERIC) 2014 Protecting your Community from Terrorism Volume 4 The Production and Sharing of Intelligence Loyka, Stephan A., Donald A. Faggiani, and Clifford Karchmer (February 2005) Protective Intelligence and Threat Assessment Investigations Department of Justice (July 1998) Psychology of Intelligence Analysis Heuer, Richards J. (1999) Reducing Crime Through Intelligence-Led Policing Department of Justice (2012) Security Engineering Ross Anderson (2012) Sensemaking A Structure for an Intelligence Revolution Moore, David T. (March 2011) Special Forces Handbook for the Fingerprint Identification System TC 31-20-2 (FOUO) Department of the Army (September 2008) (Requires DoD CAC to access this publication.) Strategic Early Warning for Criminal Intelligence Criminal Intelligence Service Canada (2007) Structured Analysis of Competing Hypotheses Wheaton, Kristan J. & Diane E. Chido (Nov / Dec 2006) Thinking and Writing Cognitive Science and Intelligence Analysis Sinclair, Robert S. (Jan 84 ) (February 2010) Tradecraft Primer - Structured Analytic Techniques for Improving Intelligence Analysis US Government (March 2009) Why Law Enforcement Agencies Need an Analytical Function Department of Justice (December 2007) Michael Chesbro 34 Chesbro's Law Enforcement, Research & Intelligence Compendium (CLERIC) 2014 Drugs Abused Pharmaceutical Substances Brochure DEA Drug Fact Sheets DEA - Office of Diversion Control (Query Form) DEA Position on Marijuana (January 2011) DEA - Report Submission Form for Suspected Unlawful Sales of Pharmaceutical Drugs on the Internet Drug Guide @ Drug Free.Org Drugs of Abuse: A DEA Resource Guide (2011) Drugs of Abuse: An Identification Guide (2010/2011) Drugs of Abuse: National Institute on Drug Abuse Growing Up Drug Free: A Parent’s Guide to Prevention (October 2012) National Drug Threat Assessment (2011) Pill Identifier - Identify Drugs by Shape, Color, and More WebMD Pill Identification Tool Michael Chesbro 35 Chesbro's Law Enforcement, Research & Intelligence Compendium (CLERIC) 2014 Encryption American Cryptogram Association Basic Cryptanalysis FM 34-40-2 (13 September 1990) Cipher Tools The Code Book How to Make It, Break It, Hack It, Crack It. Codes vs. Ciphers (Khan Academy) CryptoBench - CryptoBench provides a source of strong cryptographic transformations to help in the cryptanalysis process of common cryptographic schemes. With CryptoBench you can: Generate 14 cryptographic hashes and 2 checksums, Encrypt and Decrypt with 29 different secret key or symmetric schemes, Encrypt, Decrypt, Sign and Verify with 6 different public key or asymmetric schemes. Crypto Corner – This website is dedicated to explaining clearly how a variety of codes and ciphers work, how to use them to both encrypt and decrypt a message, and how to use methods to help break a code that you have intercepted. CrypTool – The CrypTool Portal raises awareness and interest in cryptography for everyone. All learning programs in the CrypTool project are open source and available for free. The CrypTool project develops the world most-widespread free e-learning programs in the area of cryptography and cryptoanalysis. Decrypto 8.5 - Decrypto is a fast and automated cryptogram solver by Edwin Olson. It can decode word games often found in newspapers, including puzzles like cryptoquips and patristocrats. You can also download a stand-alone version. Michael Chesbro 36 Chesbro's Law Enforcement, Research & Intelligence Compendium (CLERIC) 2014 Introduction to Cryptography Journey Into Cryptography (Khan Academy) MD5 Decrypter One-time Pad (OTP) - One-time pad (OTP), also called Vernam-cipher or the perfect cipher, is a crypto algorithm where plaintext is combined with a random key. It is the only known method to perform mathematically unbreakable encryption. Used by Special Operations teams and resistance groups in WW2, popular with intelligence agencies and their spies during the Cold War and beyond, protecting diplomatic and military communications around the world for many decades, the one-time pad gained a reputation as a simple yet solid encryption system with an absolute security which is unmatched by today's modern crypto algorithms. Whatever technological progress may come in the future, one-time pad encryption is, and will remain, the only system to provide real long-term message security. An Overview of Cryptography Reverse Hash Calculator ROT-13 Michael Chesbro 37 Chesbro's Law Enforcement, Research & Intelligence Compendium (CLERIC) 2014 Rot-13 (short for rotate 13) is a simple letter substitution encryption scheme. It works by replacing the current English letters in a message with those that are 13 positions ahead in the alphabet. For example, the letter a is replaced by n, b by o, c by p, etc. Numbers and punctuation are not encoded. ROT47 - The ROT47 (Caesar cipher by 47 chars) is a simple character substitution cipher that replaces a character within the ASCII range [33, 126] with the character 47 character after it (rotation) in the ASCII table. It is an invertible algorithm i.e. applying the same algorithm to the input twice will get the origin text. Secret Code Breaker: On-Line Cryptanalysis Handbook Solitaire Encryption Algorithm Tomb: The Crypto Undertaker Michael Chesbro 38 Chesbro's Law Enforcement, Research & Intelligence Compendium (CLERIC) 2014 Explosives Bomb-Making Materials Awareness Program (BMAP) User Guides Bomb Threat Checklist / Call Procedures Bomb Threat Standoff Distance Chart Car Bomb Recognition Guide Defense Ammunition Center Domestic Improvised Explosive Device (IED) Threat Overview Drano Bombs - When added to water, both the sodium in lye (NaOH) and the aluminum (Al) bind preferentially to the oxygen that water (H2O) provides. This creates a reactive white crystal called sodium aluminate (NaAlO2), but more importantly, it creates a large quantity of hydrogen (H2) gas. Add Drano and a few balls of aluminum foil to an empty plastic (or worse, glass) bottle, and you have an improvised explosive device just waiting to blow. As the aluminum dissolves, hydrogen gas fills the bottle, eventually shattering it. The amount of force that is generated when a device of this nature detonates is powerful enough to sever fingers and limbs, cause 2nd and 3rd-degree chemical burns, respiratory injury, blindness and hearing loss, and even death. Explosion Dynamics Course - This module teaches the foundational knowledge of explosion dynamics, which is a necessary precursor to investigating an explosion scene. This foundational knowledge includes the types of explosions, proper terminology when classifying explosions and explosion damage, explosion effects, important factors in the causes of naturally-occurring explosions, and the characteristics of explosives. Explosive Standoff Distances Michael Chesbro 39 Chesbro's Law Enforcement, Research & Intelligence Compendium (CLERIC) 2014 Explosives Course Homemade Explosive / Bulk Explosive Recognition Guide Homemade Explosives Recognition Guide How To Make A Smoke Bomb (Video) Improvised Munitions Black Book, Vol. 1 Improvised Munitions Handbook (TM 31-210) Indicators and Warnings for Homemade Explosives Introduction to Explosives (Dept. of Homeland Security) Mitigating the Effects of High-Explosive Blasts on Structures and Personnel - Mitigating the Effects of High-Explosive Blasts on Structures and Personnel (MEBSP) is a distance learning course that is focused on understanding the destructiveness of explosions, and the effects of blasts on structures. This course will include modeling of structures under explosions, physiological effects of blasts, and methodologies for investigating effectiveness of defensive measures and counter-terrorism planning. (This course must be taken from a .mil or a .gov network.) National Park Service Handbook for the Transportation, and Use of Explosives (1999) Retail Security Awareness: Understanding the Hidden Hazards (IS-912) - The purpose of this course is to make persons involved in commercial retail operations aware of the actions they can take to identify and report suspicious purchases or thefts of products that actors could use in terrorist or other criminal activities. To achieve this goal, the course provides an overview of prevention steps aimed at identifying and monitoring high-risk inventory products and reporting suspicious activities to law enforcement agencies. At the end of this course, the participants will be able to identify steps they can take to help prevent their inventory from being used to manufacture or deploy homemade explosives. Michael Chesbro 40 Chesbro's Law Enforcement, Research & Intelligence Compendium (CLERIC) Michael Chesbro 2014 41 Chesbro's Law Enforcement, Research & Intelligence Compendium (CLERIC) 2014 Sparkler Bombs A sparkler is a type of hand-held firework that burns slowly while emitting colored flames, sparks, and other effects. Sparkler bombs are constructed by binding together a large number of sparklers with tape, leaving one extended to use as a fuse. There are numerous instructions on the Internet that show how to build sparkler bombs. For example, this YouTube Video, or this Step-by-Step Instruction. Sparkler bombs can be quite powerful, causing both property damage and personal injury. * Hole blown through the wall of a school in Kent, WA using a sparkler bomb. Reference: Seattle PI * Man may lose part of leg after sparkler bomb explosion. Reference: King 5 News Suspicious Mail or Packages Threat to Buildings from Explosive Devices (NYPD) Michael Chesbro 42 Chesbro's Law Enforcement, Research & Intelligence Compendium (CLERIC) 2014 Foreign Languages 101 Languages AKO Foreign Language Resources BBC Language Courses Defense Language Institute – Foreign Language Center (Headstart) Deutsche Welle - German Language Course Duo Lingo Español for Law Enforcement Familiarization - Language & Cultural Awareness Foreign Service Institute Language Courses Global Language Online Support System (GLOSS) - Defense Language Institute I Speak... Language Identification Guide - This guide assists literate individuals who are not proficient in English to identify a preferred language. Michael Chesbro 43 Chesbro's Law Enforcement, Research & Intelligence Compendium (CLERIC) 2014 Internet Polyglot Joint Language University Language Proficiency Tests Living Languages Madinah Arabic Course Open Culture Surface Languages Tactical Language & Culture Training System Michael Chesbro 44 Chesbro's Law Enforcement, Research & Intelligence Compendium (CLERIC) 2014 Gangs & Extremist Organizations Definition of Gangs: (1) an association of three or more individuals; (2) whose members collectively identify themselves by adopting a group identity which they use to create an atmosphere of fear or intimidation frequently by employing one or more of the following: a common name, slogan, identifying sign, symbol, tattoo or other physical marking, style or color of clothing, hairstyle, hand sign or graffiti; (3) the association's purpose, in part, is to engage in criminal activity and the association uses violence or intimidation to further its criminal objectives; (4) its members engage in criminal activity, or acts of juvenile delinquency that if committed by an adult would be crimes; (5) with the intent to enhance or preserve the association's power, reputation, or economic resources; (6) the association may also possess some of the following characteristics: (a) the members employ rules for joining and operating within the association; (b) the members meet on a recurring basis; (c) the association provides physical protection of its members from other criminals and gangs; (d) the association seeks to exercise control over a particular location or region, or it may simply defend its perceived interests against rivals; or (e) the association has an identifiable structure. (7) this definition is not intended to include traditional organized crime groups such as La Cosa Nostra, groups that fall within the Department's definition of "international organized crime," drug trafficking organizations or terrorist organizations. (DOJ: Organized Crime and Gang Section) ADL - Symbol Guide for Law Enforcement Hate Symbols International Terrorist Symbols Hate Crime Indicators Bigots on Bikes (ADL 2011) CBS 60 Minutes Report on Sovereign Citizen Movement Federal and State Definitions of the Terms “Gang,” “Gang Crime,” and “Gang Member” Gang-Related Activity in the US Armed Forces Increasing (2007) Gangs 101 Michael Chesbro 45 Chesbro's Law Enforcement, Research & Intelligence Compendium (CLERIC) 2014 Gangs, Guns & Drugs Video (22 minutes) Gangs in the Military: Armed & Dangerous Forces (Part 1) Gangs in the Military: Armed & Dangerous Forces (Part 2) Growing Danger of the Sovereign Citizen Movement National Gang Center National Gang Threat Assessment (2011) Outlaw Motorcycle Gangs (OMGs) are organizations whose members use their motorcycle clubs as conduits for criminal enterprises. OMGs are highly structured criminal organizations whose members engage in criminal activities such as violent crime, weapons trafficking, and drug trafficking. There are more than 300 active OMGs within the United States, ranging in size from single chapters with five or six members to hundreds of chapters with thousands of members worldwide. The Hells Angels, Mongols, Bandidos, Outlaws, and Sons of Silence pose a serious national domestic threat and conduct the majority of criminal activity linked to OMGs, especially activity relating to drug-trafficking and, more specifically, to cross-border drug smuggling. Because of their transnational scope, these OMGs are able to coordinate drug smuggling operations in partnership with major international drug-trafficking organizations (DTOs). Quick Guide to Gangs Recognize the Signs - Gang Awareness Guide Southern Poverty Law Center – Hate Map Sovereign Citizens: An Introduction for Law Enforcement Michael Chesbro 46 Chesbro's Law Enforcement, Research & Intelligence Compendium (CLERIC) 2014 Intelligence Community Intelligence.Gov Office of the Director of National Intelligence The U.S. Intelligence Community (IC) is a coalition of 17 agencies and organizations within the executive branch that work both independently and collaboratively to gather the intelligence necessary to conduct foreign relations and national security activities. Our primary mission is to collect and convey the essential information the President and members of the policymaking, law enforcement, and military communities require to execute their appointed duties. The 17 IC member agencies are: Michael Chesbro 47 Air Force Intelligence Federal Bureau of Investigation Army Intelligence Marine Corps Intelligence Central Intelligence Agency National Geospatial-Intelligence Coast Guard Intelligence Defense Intelligence Agency National Reconnaissance Office Department of Energy National Security Agency Department of Homeland Security Navy Intelligence Department of State Office of the Director of National Department of the Treasury Drug Enforcement Administration Agency Intelligence Members of the IC collect and assess information regarding international terrorist and narcotic activities; other hostile activities by foreign powers, organizations, persons, and their agents; and foreign intelligence activities directed against the United States (U.S.). As needed, the President may also direct the IC to carry out special activities in order to protect U.S. security interests against foreign threats. An Overview of the United States Intelligence Community for the 111th Congress (2009) Commission on the Intelligence Capabilities of the United States Regarding Weapons of Mass Destruction - Report to the President, March 31, 2005 Intelligence: A Guide for First Responders Office of the National Counter Intelligence Executive U.S. National Intelligence - An Overview 2013 Worldwide Threat Assessment of the US Intelligence Community (March 12, 2013) Chesbro's Law Enforcement, Research & Intelligence Compendium (CLERIC) 2014 Intelligence Cycle Intelligence Cycle - The intelligence cycle is the process of developing unrefined data into polished intelligence for the use of policymakers. The intelligence cycle consists of six steps, described below. The graphic below shows the circular nature of this process, although movement between the steps is fluid. Intelligence uncovered at one step may require going back to an earlier step before moving forward. (FBI Directorate of Intelligence) The Intelligence Cycle The Intelligence Cycle is the process of developing raw information into finished intelligence for policymakers to use in decision-making and action. There are five steps which constitute the Intelligence Cycle. Michael Chesbro 49 Chesbro's Law Enforcement, Research & Intelligence Compendium (CLERIC) 2014 1. Planning and Direction This is management of the entire effort, from identifying the need for data to delivering an intelligence product to a consumer. It is the beginning and the end of the cycle--the beginning because it involves drawing up specific collection requirements and the end because finished intelligence, which supports policy decisions, generates new requirements. The whole process depends on guidance from public officials. Policymakers--the President, his aides, the National Security Council, and other major departments and agencies of government-initiate requests for intelligence. 2. Collection ...is the gathering of the raw information needed to produce finished intelligence. There are many sources of information including open sources such as foreign broadcasts, newspapers, periodicals, and books. Open source reporting is integral to CIA's analytical capabilities. There are also secret sources of information. CIA's operations officers collect such information from agents abroad and from defectors who provide information obtainable in no other way. Finally, technical collection--electronics and satellite photography--plays an indispensable role in modern intelligence, such as monitoring arms control agreements and providing direct support to military forces. 3. Processing ...involves converting the vast amount of information collected to a form usable by analysts through decryption, language translations, and data reduction. 4. All Source Analysis and Production ...is the conversion of basic information into finished intelligence. It includes integrating, evaluating, and analyzing all available data--which is often fragmentary and even contradictory-and preparing intelligence products. Analysts, who are subject-matter specialists, consider the information's reliability, validity, and relevance. They integrate data into a coherent whole, put the evaluated information in context, and produce finished intelligence that includes assessments of events and judgments about the implications of the information for the United States. The CIA devotes the bulk of its resources to providing strategic intelligence to policymakers. It performs this important function by monitoring events, warning decisionmakers about threats to the United States, and forecasting developments. The subjects involved may concern different regions, problems, or personalities in various contexts--political, geographic, economic, military, scientific, or biographic. Current events, capabilities, and future trends are examined. Michael Chesbro 50 Chesbro's Law Enforcement, Research & Intelligence Compendium (CLERIC) 2014 The CIA produces numerous written reports, which may be brief--one page or less--or lengthy studies. They may involve current intelligence, which is of immediate importance, or long-range assessments. The Agency presents some finished intelligence in oral briefings. The CIA also participates in the drafting and production of National Intelligence Estimates, which reflect the collective judgments of the Intelligence Community. 5. Dissemination The last step, which logically feeds into the first, is the distribution of the finished intelligence to the consumers, the same policymakers whose needs initiated the intelligence requirements. Finished intelligence is hand-carried daily to the President and key national security advisers. The policymakers, the recipients of finished intelligence, then make decisions based on the information, and these decisions may lead to the levying of more requirements, thus triggering the Intelligence Cycle. Michael Chesbro 51 Chesbro's Law Enforcement, Research & Intelligence Compendium (CLERIC) 2014 Legal Aspects of Inquiries, Ethics, and Integrity 28 CFR Part 23 (Criminal Intelligence Systems Operating Policies) Training Program Civil Rights and Law Enforcement Intelligence Commander’s Legal Handbook (2013) Ethics for the Individual Officer FLETC Legal Division: 4th Amendment Road Map Podcasts (Listen to the following three podcasts.) -Definition of a Government Agent Under the 4th Amendment (MP3) -Reasonable Expectation of Privacy (I) (MP3) -Reasonable Expectation of Privacy (II) (MP3) First Amendment Training Intelligence Oversight Related to CONUS Antiterrorism / Force Protection ISE Core Awareness Training Information Sharing Environment (ISE) Privacy Guidelines - FAQ Introduction to Intelligence Oversight and Sensitive Information: The Department of Defense Rules for Protecting Americans’ Information and Privacy - by Kevin W. Kapitan April 2013 • The Army Lawyer • DA PAM 27-50-479 LEIU’s Criminal Intelligence File Guidelines National Criminal Intelligence Sharing Plan Personally Identifiable Information (PII) Photography When in public spaces where you are lawfully present you have the right to photograph anything that is in plain view. That includes pictures of federal buildings, transportation facilities, and police. Such photography is a form of public oversight over the government and is important in a free society. Taking photographs of things that are plainly visible from public spaces is a Michael Chesbro 52 Chesbro's Law Enforcement, Research & Intelligence Compendium (CLERIC) 2014 constitutional right – and that includes federal buildings, transportation facilities, and police and other government officials carrying out their duties. Unfortunately, there is a widespread, continuing pattern of law enforcement officers ordering people to stop taking photographs from public places, and harassing, detaining and arresting those who fail to comply. Know Your Rights: Photographers (ACLU of Idaho) Legal Rights of Photographers Photographer's Guide to Privacy The Photographer's Rights Posse Comitatus Act and Related Matters: The Use of the Military to Execute Civilian Law Privacy Training Video The Privacy Act of 1974 - This 32 minute training film was produced by the Defense Privacy Office in 1987. Although the footage is somewhat dated and the picture quality is not up to today’s standards, the content is still very current. The film explains the purpose of the Privacy Act, i.e., the protection of the individual’s right to personal privacy, given the Government’s need to maintain records containing personal information. The statute confers specific rights to individuals about whom such records are maintained, principal among those rights are the rights of access to an amendment of records. In furtherance of protecting personal privacy, the law established restrictions and requirements on the collection, use, maintenance, and dissemination of personal information. The film explains these restrictions and requirements so that they are understood by both the individual about whom the information pertains and the persons whose duties include the collection, maintenance, use, or dissemination of personal information. Michael Chesbro 53 Chesbro's Law Enforcement, Research & Intelligence Compendium (CLERIC) 2014 Locks & Lock Picking Bumping Locks CIA Lock Picking Field Operative Training Manual How to Escape from Handcuffs! Introduction to Lock Picking & Key Bumping Lock Picking - by Deviant Ollam Locks: Basic Operation and Manipulation - by Schuyler Towne - YouTube Channel LSI Guide to Lock Picking MIT Guide to Lock Picking Padlock Shim Video – Part 1 Padlock Shim Video – Part 2 Padlock Shim Video – ITS Tactical Amazon.Com Michael Chesbro Amazon.Com Amazon.Com 54 Chesbro's Law Enforcement, Research & Intelligence Compendium (CLERIC) 2014 EZ Decoders EZ Decoder Video - YouTube http://serepick.com/ Bogota Picks Michael Chesbro 55 Chesbro's Law Enforcement, Research & Intelligence Compendium (CLERIC) 2014 Maps & Mapping ArcGIS Explorer On-Line ArcGIS Map Viewer Converting Addresses to/from Latitude/Longitude/Altitude in One Step CSV2KML - With CSV2KML you can convert your CSV file to a Google Earth compatible KML file. Earth Point | Excel To KML - Import a spreadsheet of lat/long coordinates to Google Earth. Pop-up balloons, icons, and paths are easily created from the spreadsheet data. Latitude and Longitude are all that is needed to create a basic display on Google Earth. Add a Name, Description, and an Icon for a professional presentation. Google Earth Geographic Resources Analysis Support System - GRASS GIS, commonly referred to as GRASS (Geographic Resources Analysis Support System), is a free and open source Geographic Information System (GIS) software suite used for geospatial data management and analysis, image processing, graphics and maps production, spatial modeling, and visualization. GRASS GIS is currently used in academic and commercial settings around the world, as well as by many governmental agencies and environmental consulting companies. MapWindow GIS Open Source Project Microsoft Virtual Earth (Bing Maps) NASA World Wind National Atlas PerpHound – PerpHound software updates for BCPI Graduates. Perry-Castañeda Library Map Collection University of Texas at Austin Quantum GIS Michael Chesbro 56 Chesbro's Law Enforcement, Research & Intelligence Compendium (CLERIC) 2014 Terra Fly Geo Database United Nations Cartographic Section Using Google for Mapping Your Data (Western Washington University) Web GIS ZeeMaps Michael Chesbro 57 Chesbro's Law Enforcement, Research & Intelligence Compendium (CLERIC) 2014 Online Dictionaries, Glossaries, Terms & Definitions 'The beginning of wisdom is the definition of terms.' - Socrates DHS Risk Lexicon (2010) DOD Dictionary of Military and Associated Terms Marine Corps Supplement to the DoD Dictionary of Military and Associated Terms Glossary of Key Information Security Terms (Revision 2, May 2013) Glossary of Security Terms, Definitions, and Acronyms Terms & Definitions of Interest for Counterintelligence Professionals Michael Chesbro 58 Chesbro's Law Enforcement, Research & Intelligence Compendium (CLERIC) 2014 Professional Organizations and Memberships AFCEA - Intelligence Association of Former Intelligence Officers Association of Old Crows (Electronic Warfare and Information Operations) Espionage Research Institute International High Technology Crime Investigation Association International Association of Crime Analysts International Association of Law Enforcement Intelligence Analysts National Military Intelligence Association Strategic and Competitive Intelligence Professionals Michael Chesbro 59 Chesbro's Law Enforcement, Research & Intelligence Compendium (CLERIC) 2014 Report Crime On-Line Department of Justice – Report a Crime DEA Office of Diversion Control - Report Submission Form for Suspected Unlawful Sales of Pharmaceutical Drugs on the Internet. Federal law prohibits the sale of prescription drugs without a valid order from a physician. Selling controlled substances online without a valid prescription may be a violation of Federal law. It is a felony to import drugs into the United States and ship to a non-DEA registrant. FBI Tips and Public Leads - Use this website to report suspected terrorism or criminal activity. Your information will be reviewed promptly by an FBI special agent or a professional staff member. To provide information on select major cases, call the FBI Major Case Contact Center at 1-800-CALLFBI (225-5324). Federal Trade Commission Bureau of Consumer Protection - The Federal Trade Commission, the nation's consumer protection agency, collects complaints about companies, business practices, identity theft, and episodes of violence in the media. Your complaints can help us detect patterns of wrong-doing, and lead to investigations and prosecutions. The FTC enters all complaints it receives into Consumer Sentinel, a secure online database that is used by thousands of civil and criminal law enforcement authorities worldwide. The FTC does not resolve individual consumer complaints. Immigration and Customs Enforcement (ICE) - U.S. Immigration and Customs Enforcement (ICE) investigates more than 400 violations of criminal law, ranging from child exploitation to Michael Chesbro 60 Chesbro's Law Enforcement, Research & Intelligence Compendium (CLERIC) 2014 transnational gangs. Use this form to report suspected criminal activity. Anonymous tips may be reported on this form and may also be reported to ICE via the toll-free HSI Tip Line, (866) 3472423. If you would like to report illegal aliens, please call ICE at 1-866-DHS-2ICE (347-2423). They will need to know names, locations (either work place or residence) and any other specific information you can provide. iSalute - Suspicious Activity Reporting - INSCOM If you have information that may be of interest to U.S. Army Counterintelligence, please submit an iSALUTE Suspicious Activity Report. You may also report by telephone at 1800-CALL-SPY (1-800-225-5779) [CONUS] Internet Crime Complaint Center (IC3) - The IC3 accepts online Internet crime complaints from either the actual victim or from a third party to the complainant. The IC3 is co-sponsored by the Federal Bureau of Investigation (FBI) and the National White Collar Crime Center (NW3C). Complaints filed via this website are processed and may be referred to federal, state, local or international law enforcement or regulatory agencies for possible investigation. Office of the Inspector General (OIG) is an office that is part of Cabinet departments and independent agencies of the United States federal government as well as some state and local governments. Each office includes an Inspector General and employees charged with identifying, auditing, and investigating fraud, waste, abuse, and mismanagement within the parent agency. In addition to representing Departments within the United States Government, some OIG's exist to investigate specific offenses (exp. Small Business Loans Office of Inspector General). Contact the OIG for a specific agency to report misconduct within that agency or organization. Michael Chesbro 61 Chesbro's Law Enforcement, Research & Intelligence Compendium (CLERIC) 2014 SPAM - Report Spam Forward unwanted or deceptive messages to: the Federal Trade Commission at [email protected]. Be sure to include the complete spam email. your email provider. Some email services have buttons that allow you to mark messages as junk mail or report them spam. the sender's email provider, if you can tell who it is. Most web mail providers and ISPs want to cut off spammers who abuse their system. Make sure to include the entire spam email and say that you're complaining about spam. If you try to unsubscribe from an email list and your request is not honored, file a complaint with the FTC. US-CERT collects phishing email messages and website locations so that we can help people avoid becoming victims of phishing scams. You can report phishing to US-CERT by forwarding the phishing e-mail (with complete headers) to [email protected] Phishing is an attempt by an individual or group to solicit personal information from unsuspecting users by employing social engineering techniques. Phishing emails are crafted to appear as if they have been sent from a legitimate organization or known individual. These emails often attempt to entice users to click on a link that will take the user to a fraudulent website that appears legitimate. The user then may be asked to provide personal information, such as account usernames and passwords, that can further expose them to future compromises. Additionally, these fraudulent websites may contain malicious code. Anti-Phishing Working Group (APWG) - The APWG is the global industry, law enforcement, and government coalition focused on unifying the global response to cyber-crime through development of data resources, data standards and model response systems and protocols for private and public sectors. The APWG collects, analyzes, and exchanges lists of verified credential collection sites, like those used in phishing. Forward suspected phishing email (with complete headers) to [email protected] Michael Chesbro 62 Chesbro's Law Enforcement, Research & Intelligence Compendium (CLERIC) 2014 Software (Freeware) Analysis of Competing Hypotheses Software - Analysis of Competing Hypotheses (ACH) is a simple model for how to think about a complex problem when the available information is incomplete or ambiguous, as typically happens in intelligence analysis. The software downloadable here takes an analyst through a process for making a well-reasoned, analytical judgment. It is particularly useful for issues that require careful weighing of alternative explanations of what has happened, is happening, or is likely to happen in the future. It helps the analyst overcome, or at least minimize, some of the cognitive limitations that make prescient intelligence analysis so difficult. ACH is grounded in basic insights from cognitive psychology, decision analysis, and the scientific method. It helps analysts protect themselves from avoidable error, and improves their chances of making a correct judgment. This software was developed by Palo Alto Research Center (PARC) in collaboration with Richards J. Heuer, Jr. It was developed for use by the U.S. Intelligence Community with funding from the Intelligence Community's Advanced Research and Development Activity (ARDA) and the Office of Naval Research (ONR). In distributing ACH, PARC is making the presently downloadable version of the program available to the general public at no cost when used for non-commercial or educational purposes subject to the terms and conditions of its end user license. Brain - The Brain for combines the best of note taking, file synchronization and mind mapping apps to give users the ultimate digital memory. The Brain’s unique approach to information organization enables users to create and link together thousands of digital Thoughts. A Thought can represent an idea or topic as well as link to any number of files and web pages. The Brain software has been downloaded over two million times and over half of the Fortune 100 organizations use The Brain for digital brainstorming, project management, and as a complete knowledgebase to find and connect all their information. Computer Online Forensic Evidence Extractor (COFEE) - Microsoft COFEE is being made available to individuals employed by law enforcement agencies within the United States and Canada. COFEE means the Computer Online Forensic Evidence Extractor tool that fits on a USB drive and automates the execution of commands for data extraction and related Michael Chesbro 63 Chesbro's Law Enforcement, Research & Intelligence Compendium (CLERIC) 2014 documentation. Distribution is limited to law enforcement agencies. Access to the COFEE product requires verification of employment with a law enforcement agency and agreement to the terms and conditions of the Microsoft/NW3C Sublicense Agreement. The verification process is automated if you have an email account with RISS.NET or LEO.GOV, or have an account with NW3C. Computer Security Evaluation Tool - The Department of Homeland Security (DHS) has released its latest cyber system assessment tool to the Critical Infrastructure/Key Resources (CI/KR) community. The Computer Security Evaluation Tool (CSET) is a desktop software tool that guides users through a step-by-step process to evaluate their cyber systems and network security practices against recognized industry standards. According to DHS, the benefits of CSET include: Contributing to an organization's risk management and decision-making process; Raising awareness and facilitating discussion on cyber security within the organization; Highlighting vulnerabilities in the organization's systems and providing recommendations on ways to address those vulnerabilities; Identifying areas of strength and best practices being followed in the organization; Providing a method to systematically compare and monitor improvement in the cyber systems; and Providing a common industry-wide tool for assessing cyber systems. CrimeStat III - CrimeStat III is a spatial statistics program for the analysis of crime incident locations, developed by Ned Levine & Associates under the direction of Ned Levine, PhD, that was funded by grants from the National Institute of Justice. The program is Windows-based and interfaces with most desktop GIS programs. The purpose is to provide supplemental statistical tools to aid law enforcement agencies and criminal justice researchers in their crime mapping efforts. CrimeStat is being used by many police departments around the country as well as by criminal justice and other researchers. The latest version is 3.3. The program inputs incident locations (e.g., robbery locations) in 'dbf', 'shp', ASCII or ODBC-compliant formats using either spherical or projected coordinates. It calculates various spatial statistics and writes graphical objects to ArcGIS®, MapInfo®, Surfer for Windows®, and other GIS packages. Michael Chesbro 64 Chesbro's Law Enforcement, Research & Intelligence Compendium (CLERIC) 2014 CrimeStat IV (version 4.0) is the most recent version of CrimeStat, a spatial statistics program for the analysis of crime incident locations. Decision Analyst STATS 2.0 - This easy-to use, Windows-based statistical software for marketing research performs multiple functions, including: Random numbers generator Sample size determination Mean, standard deviation, standard error, and range Standard error of a proportion Significance testing Correlation Cross-tabulation Factor analysis Multiple regression Cluster analysis Digital Forensics Framework - DFF (Digital Forensics Framework) is a free and Open Source computer forensics software built on top of a dedicated Application Programming Interface (API). It can be used both by professional and non-expert people in order to quickly and easily collect, preserve and reveal digital evidences without compromising systems and data. Earth Point - Excel To KML - Maps Excel worksheets onto Google Earth. Optional columns let you control balloon text, icon selection, mouse-over effects, and more. Supports Lat/Lon, UTM, UPS, MGRS, USNG, GEOREF, and State Plane coordinates. (Includes multiple other functions and features.) Epi Info 7 - Epi Info is a suite of free data management, analysis, and visualization tools designed specifically for the public health community. It is used extensively, not just at CDC, but also domestically at the state and local level, as well as internationally. Epi Info allows you to: Rapid Electronic Form Creation and Data Entry - Rapidly create electronic data entry forms; these forms can have intelligence built into them. For example, you can automatically calculate a patient’s age based on the survey data date of birth; you can also move the cursor past certain Michael Chesbro 65 Chesbro's Law Enforcement, Research & Intelligence Compendium (CLERIC) 2014 fields; you can even hide and unhide fields based on various conditions. It also allows you to enter data into those forms. Statistical Analysis - You can conduct various types of statistical analysis, including frequencies, 2x2 (two by two) tables, analysis of variance, conditional and unconditional logistical regression, Kaplan Meier survival analysis, complex samples, and many others. Mapping and Visualization - Epi Info also allows you to create several types of maps, and also has graphing and charting capabilities. Report Design and Generation - And finally, Epi Info allows you to design and generate reports. Foremost - Foremost is a linux program to recover files based on their headers, footers, and internal data structures. This process is commonly referred to as data carving. Foremost can work on image files, such as those generated by dd, Safeback, Encase, etc., or directly on a drive. The headers and footers can be specified by a configuration file or you can use command line switches to specify built-in file types. These built-in types look at the data structures of a given file format allowing for a more reliable and faster recovery. Originally developed by the United States Air Force Office of Special Investigations and The Center for Information Systems Security Studies and Research, Foremost has been opened to the general public. FTK Imager - FTK Imager (by AccessData) is a free forensics tool whose main purpose is to preview recoverable data from a disk of any kind. This powerful tool can create forensic images of local hard drives, floppy disks, Zip disks, CDs, and DVDs, entire folders, or even of individual files from various places within the media storage device. The fact that it can export files and folders from the created image means that this application can also recover data on its own (in some circumstances). Therefore, it can do more than just allow previewing that data for the sake of preparing intricate recovery procedures which usually involve other sophisticated tools. Google Earth - Google Earth is a virtual globe, map and geographical information program that was originally called EarthViewer 3D, and was created by Keyhole, Inc., a Central Intelligence Agency (CIA) funded company acquired by Google in 2004. It maps the Earth by the superimposition of images obtained from satellite imagery, aerial photography and GIS 3D globe. Michael Chesbro 66 Chesbro's Law Enforcement, Research & Intelligence Compendium (CLERIC) 2014 HxD Hex Editor - HxD is a carefully designed and fast hex editor which, additionally to raw disk editing and modifying of main memory (RAM), handles files of any size. The easy to use interface offers features such as searching and replacing, exporting, checksums/digests, insertion of byte patterns, a file shredder, concatenation or splitting of files, statistics and much more. Editing works like in a text editor with a focus on a simple and task-oriented operation, as such functions were streamlined to hide differences that are purely technical. For example, drives and memory are presented similar to a file and are shown as a whole, in contrast to a sector/regionlimited view that cuts off data which potentially belongs together. Drives and memory can be edited the same way as a regular file including support for undo. In addition memory-sections define a foldable region and inaccessible sections are hidden by default. Maltego - Maltego is a program that can be used to determine the relationships and real world links between: People Groups of people (social networks) Companies Organizations Web sites Internet infrastructure such as: o Domains o DNS names o Netblocks o IP addresses Phrases Affiliations Documents and files These entities are linked using open source intelligence. Maltego is easy and quick to install - it uses Java, so it runs on Windows, Mac and Linux. Maltego provides you with a graphical interface that makes seeing these relationships instant and accurate - making it possible to see hidden connections. Michael Chesbro 67 Chesbro's Law Enforcement, Research & Intelligence Compendium (CLERIC) 2014 Using the graphical user interface (GUI) you can see relationships easily - even if they are three or four degrees of separation away. Maltego is unique because it uses a powerful, flexible framework that makes customizing possible. As such, Maltego can be adapted to your own, unique requirements. Mendeley - Mendeley is a free reference manager and academic social network that can help you organize your research, collaborate with others online, and discover the latest research. Automatically generate bibliographies Collaborate easily with other researchers online Easily import papers from other research software Find relevant papers based on what you’re reading Access your papers from anywhere online Near Repeat Calculator - This software originates with the relatively recent discovery of the near repeat phenomenon in burglary patterns, a discovery that has highlighted the communicability of crime events that affect the risk level at nearby locations. The near repeat phenomenon states that if a location is the target of a crime (such as burglary), the homes within a relatively short distance have an increased chance of being burgled for a limited number of weeks (Townsley et al, 2003; Bowers and Johnson, 2004; Johnson and Bowers, 2004a, 2004b). This communicability of risk to nearby locations for a short amount of time raises the possibility that other crime types may also suffer from a near repeat spatiotemporal pattern of behavior. The analytical method employed builds on a space-time clustering methods first pioneered by Knox (1964) to study the epidemiology of childhood leukemia. The Knox test seeks to determine whether there are more event-pairs observed that occur with a closer proximity in space and time than would be expected on the basis of a random distribution. To do this, each shooting for a particular dataset is compared with every other and the spatial and temporal distance between them recorded. The result is a matrix of space-time distances. NIJ Funded Software Tools, Apps and Databases - NIJ has funded a number of free or low cost software tools and databases to assist public safety agencies with investigations. Michael Chesbro 68 Chesbro's Law Enforcement, Research & Intelligence Compendium (CLERIC) 2014 Notepad ++ - Notepad++ is a free source code editor and Notepad replacement that supports several languages. Running in the MS Windows environment, its use is governed by GPL License. Ophcrack - Ophcrack is a free Windows password cracker based on rainbow tables. It is a very efficient implementation of rainbow tables done by the inventors of the method. It comes with a Graphical User Interface and runs on multiple platforms. Pacific Northwest National Laboratory Visual Analytics IN-SPIRE Visual Document Analysis STARLIGHT Visual Information System PlainSight - PlainSight is a versatile computer forensics environment that allows inexperienced forensic practitioners perform common tasks using powerful open source tools. We have taken the best open source forensic/security tools, customised them, and combined them with an intuitive user interface to create an incredibly powerful forensic environment. With PlainSight you can perform operations such as: Get hard disk and partition information Extract user and group information View Internet histories Examine Windows firewall configuration Discover recent documents Recover/Carve over 15 different file types Discover USB storage information Examine physical memory dumps Examine UserAssist information Extract LanMan password hashes Preview a system before acquiring it Michael Chesbro 69 Chesbro's Law Enforcement, Research & Intelligence Compendium (CLERIC) 2014 Problem Analysis Module - Problem Analysis Module (PAM) gives you a framework for analyzing any persistent crime and public safety problem. PAM will ask you to input information concerning every aspect of the problem and then suggest the kinds of responses you could try. PAM was developed to assist police problem solving through the asking of specific questions. The questions come from research into a set of powerful theories within the field of Environmental Criminology – particularly Routine Activity Theory, Situational Crime Prevention, and Crime Pattern Theory. Quantum GIS - Quantum GIS (QGIS) is a user friendly Open Source Geographic Information System (GIS) licensed under the GNU General Public License. QGIS is an official project of the Open Source Geospatial Foundation (OSGeo). It runs on Linux, UNIX, Mac OSX, Windows and Android and supports numerous vector, raster, and database formats and functionalities. R Project for Statistical Computing - R is a language and environment for statistical computing and graphics. It is a GNU project which is similar to the S language and environment which was developed at Bell Laboratories (formerly AT&T, now Lucent Technologies) by John Chambers and colleagues. R can be considered as a different implementation of S. There are some important differences, but much code written for S runs unaltered under R. R provides a wide variety of statistical (linear and nonlinear modeling, classical statistical tests, time-series analysis, classification, clustering ...) and graphical techniques, and is highly extensible. The S language is often the vehicle of choice for research in statistical methodology, and R provides an Open Source route to participation in that activity. One of R's strengths is the ease with which well-designed publication-quality plots can be produced, including mathematical symbols and formulae where needed. Great care has been taken over the defaults for the minor design choices in graphics, but the user retains full control. R is available as Free Software under the terms of the Free Software Foundation's GNU General Public License in source code form. It compiles and runs on a wide variety of UNIX platforms and similar systems (including FreeBSD and Linux), Windows and MacOS. Michael Chesbro 70 Chesbro's Law Enforcement, Research & Intelligence Compendium (CLERIC) 2014 Relavint Desktop - LexisNexis® Relavint Desktop is an easy-to-use visualization and drawing tool specifically designed for creating link analysis charts—visual relationships between individuals, addresses, vehicles, corporations, and other items. RFFlow 5 - RFFlow is a powerful, yet easy to use, tool for drawing flowcharts, organization charts, and many other kinds of diagrams. You will quickly create professional-looking charts for documents, presentations, or the Web. RFFlow can also be used to build crime analysis charts; samples of which can be found at: http://www.rff.com/sample_criminal_analysis.htm Social Networks Visualizer - Social Networks Visualizer (SocNetV) is a flexible and userfriendly tool for the analysis and visualization of Social Networks. It lets you construct networks (mathematical graphs) with a few clicks on a virtual canvas or load networks of various formats (GraphViz, GraphML, Adjacency, Pajek, UCINET, etc) and modify them to suit your needs. SocNetV also offers a built-in web crawler, allowing you to automatically create networks from all links found in a given initial URL. The application can compute basic network properties, such as density, diameter and distances (shortest path lengths), as well as more advanced structural statistics, such as node and network centralities (i.e. closeness, betweeness, graph), clustering coefficient, etc. Various layout algorithms (i.e. Spring-embedder, radial and layered according to node centralization) are supported for meaningful visualizations of your networks. Furthermore, random networks (Erdos-Renyi, Watts-Strogatz, ring lattice, etc) can be created with a few clicks. Squidmat - The program compares two or more courses of action based on two or more evaluation criteria. The user arranges the evaluation criteria in descending order of importance and tells the program how much more important each criterion is than the next lower criterion. These importance ratings are used to calculate weights for each criterion. SquidMat takes usersupplied values for each course-of-action/criterion combination and converts them to Z scores. Using the criterion weights, the program calculates weighted sums for each course of action. The course of action with the highest weighted sum is considered to be the best. SquidMat is designed as a replacement decision matrix program for the CAS3 program DECMAT. Michael Chesbro 71 Chesbro's Law Enforcement, Research & Intelligence Compendium (CLERIC) 2014 Tulip - Data Visualization Software - Tulip is an information visualization framework dedicated to the analysis and visualization of relational data. Tulip aims to provide the developer with a complete library, supporting the design of interactive information visualization applications for relational data that can be tailored to the problems he or she is addressing. Vulnerability Assessment Software - FDA’s Vulnerability Assessment Software tool is a prioritization tool that can be used to assess the vulnerabilities within a system or infrastructure in the food industry. The software program takes companies through questions about their facilities and processes to help them identify vulnerable areas. Companies consider what type of attack is the greatest threat and whether a biological or chemical agent might be used in an attack. The questions center around the flow chart developed by the user for the specific food system to be evaluated. By conducting a vulnerability assessment of a food production facility or process, the user can then focus resources on protecting the most susceptible points in their system. Michael Chesbro 72 Chesbro's Law Enforcement, Research & Intelligence Compendium (CLERIC) 2014 Surveillance Surveillance is required for successful terrorist planning. Experience has taught us that terrorist attacks are generally preceded by pre-operational surveillance in which terrorists gather target intelligence. Surveillance is defined as the process of keeping facilities, vehicles and persons under observation in order to obtain detailed information. Any indications of surveillance should be reported immediately to the security office of your organization and/or the police. All training programs designed to protect individuals from becoming victims of terrorism recommend that people be alert to surveillance. This is excellent advice, but, unfortunately, in most instances it is insufficient, because people have had no training in detecting surveillance, and terrorist organizations are often relatively sophisticated in their surveillance methods. Detecting surveillance conducted by trained experts is not as easy as most Hollywood films would lead us to believe. Fortunately, however, the type of surveillance conducted by terrorist organizations is not normally as elaborate as that done by intelligence organizations nor does it involve as many people or as much equipment. Nevertheless, for people to have a reasonable chance at detecting most forms of surveillance they would have to be somewhat familiar with the techniques used. The purpose of surveillance is to determine (1) the suitability of the potential target based upon the physical and procedural security precautions that the individual has taken and (2) the most suitable time, location, and method of attack. This surveillance may last for days or weeks depending upon the length of time it takes the surveillants to obtain the information that they require. Naturally, the surveillance of a person who has set routines and who takes few Michael Chesbro 73 Chesbro's Law Enforcement, Research & Intelligence Compendium (CLERIC) 2014 precautions will take less time. The people undertaking the surveillance will often not take part in the attack, nor will the attack take place while surveillance is still in progress. Before undertaking surveillance most experts gather information about the subject from other sources. Public records of information made available to the terrorist organization from a sympathetic individual within an organization, local police, or other government office may reveal useful facts about an individual such as the names of family members, an address, a description of vehicles and license numbers, photographs, etc. The surveillants will also make a reconnaissance of the neighborhood in which the target lives and works. This permits them to select positions of observation, the types of vehicles to use, the clothing to be worn, and the type of ruse to use that will give them an ordinary or normal appearance and plausible reasons to be in the area. There are basically three forms of surveillance: foot, vehicle, and stationary (generally categorized as either mobile or static). A brief description of the most common techniques used for each of these forms and methods for detecting each one follows: One or more individuals may undertake foot surveillance. One-person foot surveillance is rather complicated and fairly easy to detect. The surveillance must remain close to the target, particularly in congested areas, to avoid losing him or her. In less congested areas the surveillant can maintain a greater distance, but the lack of other pedestrians makes the surveillant that much more noticeable. The one complicating factor is the use of a disguise to make the surveillant look different (perhaps a uniform). One possible use of a disguise is a shopping bag or some other container for a change of clothes, particularly if the shopping bag is from a store not found in the area or the container somehow seems out of place. Where a disguise is suspected, pay particular attention to shoes and slacks or skirts. These items are less easily and, therefore, less commonly changed. In elevators, watch for people who seem to wait for you to push a button and then select a floor one flight above or below yours. Two-person foot surveillance is more effective in that the second surveillant provides greater flexibility. Normally, one surveillant remains close to the target while the other stays at a greater distance. The second surveillant may follow the first on the same side of the street or travel on the opposite side. Periodically the two surveillants change position so that if the target spots one of them, that one will soon be out of sight, leading the target to think that he or she was mistaken. Obviously, spotting this form of surveillance is more complicated, but individuals who are alert to the people in their vicinity will eventually detect the same surveillant over a period of time. Foot surveillance with three or more people uses the most sophisticated techniques and is the most difficult to spot. Generally, one surveillant remains behind the target close enough to respond to any sudden moves. A second surveillant remains behind the first on the same side of the street with the first surveillant in sight. A third surveillant travels on the opposite side of the Michael Chesbro 74 Chesbro's Law Enforcement, Research & Intelligence Compendium (CLERIC) 2014 street parallel with or just behind the target. In areas where the target has few paths to choose, one surveillant may walk in front of the target, where he or she is least likely to cause suspicion. The positions of the surveillants are frequently changed, most commonly at intersections. The surveillant directly behind the target may move to the opposite side of the street, while another surveillant moves in close behind the target. With the additional surveillants, any surveillant who feels that he or she has been observed may drop out of the formation. The use of this sophisticated technique requires that people be alert not only to those people behind them but also to those across the street and perhaps in front of them. If the same person is seen more than once over a certain distance, surveillance may be suspected even if that person is not continuously seen. Common methods for detecting surveillance apply to all three forms of foot surveillance. The most effective are: stopping abruptly and looking to the rear, suddenly reversing your course, stopping abruptly after turning a corner, watching reflections in shop windows or other reflective surfaces, entering a building and leaving immediately by another exit, walking slowly and then rapidly at intervals, dropping a piece of paper to see if anyone retrieves it, boarding or exiting a bus or subway just before it starts, and making sudden turns or walking around the block. While taking these actions, watch for people who are taken by surprise, react inappropriately, suddenly change direction, or give a signal to someone else. Surveillants will not normally look directly at the target, but they may do so if they are surprised or unaware that you are observing them. Foot surveillance is often used in conjunction with vehicle surveillance since it is likely that the target will use a combination of foot and vehicle transportation. Vehicles used for surveillance are inconspicuous in appearance and of a subdued color. Frequently, the inside dome light is made inoperative so that it will not illuminate the interior of the car when the door is opened. Vehicles will have two or more people in them so that if the target parks his or her vehicle and walks away, the surveillance can be resumed on foot while the driver remains with the vehicle. While moving, the driver gives full attention to driving while the observer operates the radio, watches the target, and makes notes on the target's activities. Sometimes it will be necessary for surveillants to break traffic regulations to avoid losing you. If you see a vehicle run a red light, make an illegal U-turn, travel over the speed limit, or make dangerous or sudden lane changes in an apparent effort to keep up with you, you should, of course, be suspicious of that vehicle. The distance between a surveillance vehicle and the target will vary depending on the speed at which Michael Chesbro 75 Chesbro's Law Enforcement, Research & Intelligence Compendium (CLERIC) 2014 the vehicles are traveling and the amount of traffic. Surveillants will try to keep one or two vehicles between themselves and the target. As with foot surveillance, vehicle surveillance may be undertaken using only one vehicle or using two or more vehicles. One-vehicle surveillance suffers from the same drawbacks as one-person foot surveillance. The target has to be kept in view at all times and followed by the same vehicle. Surveillants can try to overcome this advantage somewhat by changing seating arrangements within the vehicle; putting on and taking off hats, coats, and sunglasses; changing license plates; and turning off onto side streets and then turning back to resume the tail. This makes it necessary for a person suspecting surveillance to remember aspects of a following vehicle that cannot easily be changed such as the make, model, and color of the car and any body damage such as rust, dents, etc. The use of two or more vehicles permits surveillance to switch positions or to drop out of the surveillance when necessary. One vehicle follows the target vehicle and directs other vehicles by radio. The other vehicle may follow behind the lead surveillance vehicle, precede the target vehicle, or travel on parallel roads. At intersections, the vehicle following directly behind the target vehicle will generally travel straight ahead while alerting all other vehicles of the direction in which the target vehicle has turned. Another vehicle in the formation will then take a position behind the target and become the lead vehicle, taking over the responsibility for giving instructions to other surveillants. The former lead vehicle then makes a U-turn or travels around the block to take up a new position ready to resume the lead vehicle position again when necessary. People who have well established routines permit surveillants to use methods that are much more difficult to detect. If, for example, you leave the office at the same time each day and travel by the most direct route to your home or if you live in a remote area with a few or no alternate routes to your home, surveillants have no need to follow you all the way to your residence. An alternative method of surveillance in such situations is leading surveillance and progressive surveillance. In leading surveillance the surveillant travels in front of the target while the observer watches for turns. When the target turns, this is noted. The next day the surveillant Michael Chesbro 76 Chesbro's Law Enforcement, Research & Intelligence Compendium (CLERIC) 2014 makes a turn where the target did the previous day. Over a period of time the surveillants will discover the entire route to the residence while still driving in a position that creates much less suspicion. There are two forms of progressive surveillance. In the first form, surveillants are placed at intersections along the probable routes of the target. When the target makes a turn, this is noted and the position of the surveillants is adjusted to check the next intersection. Eventually, this method leads the surveillants to the residence. In the second form or progressive surveillance, a vehicle will follow the target for a short distance and then turn off. On successive days the surveillant picks up the target where he or she left off the previous day. Leading and progressive surveillance are extremely difficult to detect, but you should not give anyone the opportunity to use these methods. The most effective methods for detecting most forms of vehicle surveillance are: making a U-turn where it is safe to do so, making a turn to the right or left (in general, left turns create greater complications for surveillants because of oncoming traffic that may delay a turn), going through a traffic light just as it is turning red, stopping just beyond a curve or hill, and circling a block. In each case, watch for the reactions of any vehicles that you may suspect. Any vehicles that make unusual maneuvers should be carefully noted. Do not forget to check for motorcycles or motorbikes, since in many parts of the world they seem to be favored by surveillants because they move easily through heavy traffic. Stationary surveillance is commonly used by terrorist organizations. As mentioned earlier, most attacks take place near the residence or office because that part of the route is least easily varied. Most people are more vulnerable in the morning when departing for work, because morning departure times are more predictable than are evening arrivals. Surveillants seek a position that permits them to observe the residence or office clearly without being observed or suspected. Surveillants want to identify observation points that afford the best view of the target. Foot and vehicular traffic, buildings and terrain around each government facility vary with each location. Pedestrian traffic, rush hour traffic flow, temporary street closure, etc. will affect observation points. If the surveillants decide that it is best not to be seen, they may obtain an apartment or rent office space in the area that provides for an adequate view, but such apartments or office space may not be available and the renting of an apartment or office space could provide clues for a subsequent investigation. The use of an apartment or office space for surveillance, while possibly the most difficult to detect, is generally not the easiest or safest method. Many surveillance teams use vans with windows in the side or back that permit observation from the interior of the van. Often the van will have the name of a store or utility company to provide some pretext for its being in the area. The driver may park the van and walk Michael Chesbro 77 Chesbro's Law Enforcement, Research & Intelligence Compendium (CLERIC) 2014 away, leaving the surveillance team inside. Some teams use automobiles for stationary surveillance, parking the vehicle far enough from the residence or office to be less noticeable, using other vehicles for cover, facing the vehicle away from the target, and using the rear view mirrors to watch. Where it is not possible to watch the residence or office unobserved, surveillants must come up with a plausible reason for being in the area. The types of ruses used are limited only by the surveillant's imagination. Some of the more commonly used covers are automotive repairs due to engine trouble or a flat tire, door to door sales, utility repair crews, lovers in a park, walking a dog, construction work, or sitting at a cafe. Women and children are often used to give a greater appearance of innocence. Some things to check for are parked vehicles with people in them, cars with more mirrors or mirrors that are larger than normal, people seen in the area more frequently than seems normal, people who are dressed inappropriately, and workers who seem to accomplish nothing. If you become suspicious of a van, note any information printed on the side of the van, including telephone numbers. Check the telephone book to see if such a business exists. Note the license numbers of any suspicious vehicles and provide them to your security office so they can be checked. Make a habit of checking the neighborhood through a window before you go out each day. Detecting surveillance requires a constant state of alertness and must become an unconscious habit. We do not want to encourage paranoia, but a good sense of what is normal and what is unusual in your surroundings could be more important than any other type of security precaution you take. Above all, do not hesitate to report any unusual events to the police. Many people who have been kidnapped realized afterwards that their suspicions had been well founded. If those suspicions had been reported, their ordeal might have been avoided. Since surveillance attempts to determine the suitability of a potential target and the most opportune time for an attack, it is crucial to avoid predictability. Although the recommendation to vary routes and times of arrivals and departures has become trite, implementing it in one's daily schedule has proven to be effective in deterring sufficient terrorist planning. Varying times and routes apply to jogging, shopping and all activities where a pattern can develop. (Source: http://cryptome.org/spy-spotting.htm) (Originally published as part of a Travel Warning by the US Embassy, Bogota, Columbia 06/06/03. Graphics added.) Michael Chesbro 78 Chesbro's Law Enforcement, Research & Intelligence Compendium (CLERIC) 2014 Surveillance (US Department of State, p.21) The purpose of surveillance is to identify a potential target based on the security precautions that individual takes, and the most suitable time, location, and method of attack. Surveillance may last for days or weeks. Naturally, the surveillance of a person who has set routines and who takes few precautions will take less time. Detecting surveillance requires a fairly constant state of alertness and, therefore, must become a habit. A good sense of what is normal and what is unusual in your surroundings could be more important than any other type of security precaution you may take. Above all, do not hesitate to report any unusual event. There are three forms of surveillance: foot, vehicular, and stationary. People who have wellestablished routines permit surveillants to use methods that are much more difficult to detect. If, for example, you leave the office at the same time each day and travel by the most direct route to your home or if you live in a remote area with few or no alternate routes to your home, surveillants have no need to follow you all the way to your residence. You should: Vary your routes and times of travel. Be familiar with your route and have alternate routes. Check regularly for surveillance. Stationary surveillance is most commonly used by terrorist organizations. Most attacks take place near the victim’s residence, because that part of the route is least easily varied. People are generally most vulnerable in the morning when departing for work because these times are more predictable than evening arrivals. Many surveillance teams use vans with windows in the sides or back that permit observation from the interior of the van. Often the van will have the name of a business or utility company to provide some pretext for being in the area. Where it is not possible to watch the residence unobserved, surveillants must come up with a plausible reason for being in the area. Women and children are often used to give an appearance of innocence. Try to check the street in front of your home from a window before you go out each day. If you suspect that you are being followed, drive to the nearest police station, fire station, or the U.S. mission. Note the license numbers, color and make of the vehicle, and any information printed on its sides that may be useful in tracing the vehicle or its occupants. Michael Chesbro 79 Chesbro's Law Enforcement, Research & Intelligence Compendium (CLERIC) 2014 Don't wait to verify surveillance before you report it. Be alert to people disguised as public utility crews, road workers, vendors, etc., who might station themselves near your home or office. Whenever possible, leave your car in a secured parking area. Be especially alert in underground parking areas. Always check your vehicle inside and out before entering it. If you notice anything unusual, do not enter the vehicle. Household staff and family members should be reminded to look for suspicious activities around your residence; for example, surveillance, attempts to gain access to your residence by fraudulent means, and telephone calls or other inquiries requesting personal information. Tell your household staff and family members to note descriptions and license numbers of suspicious vehicles. Advise them to be alert for details. Household staff can be one of the most effective defensive mechanisms in your home--use them to your advantage. While there are no guarantees that these precautions, even if diligently adhered to, will protect you from terrorist violence, they can reduce your vulnerability and, therefore, your chances of becoming a victim. Detecting Terrorist Surveillance Secrets of Countersurveillance (STRATFOR) Surveillance Awareness: What You Can Do (IS-914) Surveillance Operations Overview (16 hours) Surveillance Recognition - OSAC Law Enforcement Investigations FM 3-19.13 (January 2005) Chapter 26 - Surveillance Operations In law enforcement, surveillance refers to the covert observation of individuals, places, or objects for the purpose of gathering police information or CRIMINT. In both tactical and non-tactical environments, military police and CID personnel employ surveillance techniques in support of law enforcement and security operations. Surveillance techniques are often used to identify criminal activity associated with terrorism, organized crime, drug and contraband trafficking, and serious crimes against individuals. Michael Chesbro 80 Chesbro's Law Enforcement, Research & Intelligence Compendium (CLERIC) Amazon.Com Amazon.Com Amazon.Com Amazon.Com Amazon.Com Amazon.Com Michael Chesbro 2014 Amazon.Com Amazon.Com Amazon.Com 81 Chesbro's Law Enforcement, Research & Intelligence Compendium (CLERIC) 2014 Terrorism Awareness 8 Signs of Terrorism Video | Arizona Counter-Terrorism Information Center To help you and people like you be vigilant, the ACTIC, in conjunction with the City of Phoenix Fire Department, created a special video seminar, "8 SIGNS OF TERRORISM," to help members of the community, as well as local law enforcement and public safety officers, to better identify suspicious activities that could be related to terrorism. Anti-Terrorism (A Self-Help Guide) CJCS Guide 5260 (September 2010) Anti-Terrorism Level-1 Training - Department of Defense anti-terrorism awareness training program. The purpose of this training is to increase your awareness of terrorism and to improve your ability to apply personal protective measures. Completion of this training meets the annual requirement for Level I anti-terrorism training prescribed by DoDI 2000.16. Anti-Terrorism Level II Refresher Course (US Air Force) (DoD PKI/CAC Required - Apply under: Selected Force Training) This is an Antiterrorism Level II Refresher course intended to fulfill the DODI 2000.16 requirement for Antiterrorism Officers to receive refresher training every three years. Course Length 40 Hours Course Introduction Overview Roles and Responsibilities Create and Execute AT Programs Minimum Required AT Program Elements Antiterrorism Planning Working Groups, Committees, and Case Studies - Installation Based and Assessment Contingency Operation Centers Risk Management Considerations - Risk Risk Management Considerations - Threat Lessons Learned Assessment High-Risk Billets and Personnel Risk Management Considerations - AT Considerations in Contracting Criticality Assessment CVAMP Risk Management Considerations - Course Exam Vulnerability Assessment Michael Chesbro 82 Chesbro's Law Enforcement, Research & Intelligence Compendium (CLERIC) 2014 Anti-Terrorism Level-II Refresher Training (US Army) (Requires AKO Log-in) Anti-Terrorism Officer (ATO) refresher training contains 4 lessons that must be completed in sequential order. Prepare a Threat Matrix Prepare the MSHARPP and CARVER Matrices Prepare a Vulnerability Assessment Prepare a Risk Assessment A certificate of completion will be available when the final lesson is completed. Anti-Terrorism Officer (ATO) Level II (GS109.CU) - This 13 hour course is designed for AT program managers of DoD and field activities who otherwise cannot attend a Service-sponsored course and may serve as an alternate for these types of agencies. It provides students with the appropriate background, skills, and abilities to qualify as an Antiterrorism Officer (ATO) and conduct Level 1 AT briefings based on components' approval. The course examines ATO roles and responsibilities, vulnerability and threat assessments, creating and executing antiterrorism (AT) programs, preparing AT plans, resource management, and AT training. Bioterrorism Preparedness Certificate - This free certificate program includes courses that provide training in bioterrorism preparedness and understanding the public health threat. Emergency providers that will be responding to bioterrorism events are also one of the focuses of this program. This certificate is composed of 5 courses: Bioterrorism, Biological Response Preparedness for Emergency Medical Services, Bioterrorism: The Public Health Threat, Bioterrorism: The Agents, and Mass Casualty Incident Triage. Country Reports on Terrorism (US Department of State) Global Terrorism Database The Global Terrorism Database (GTD) is an open-source database including information on terrorist events around the world from 1970 through 2011 (with additional annual updates planned for the future). Unlike many other event databases, the GTD includes systematic data on domestic as well as transnational and international terrorist incidents that have occurred during Michael Chesbro 83 Chesbro's Law Enforcement, Research & Intelligence Compendium (CLERIC) 2014 this time period and now includes more than 104,000 cases. For each GTD incident, information is available on the date and location of the incident, the weapons used and nature of the target, the number of casualties, and--when identifiable--the group or individual responsible. Statistical information contained in the Global Terrorism Database is based on reports from a variety of open media sources. Information is not added to the GTD unless and until we have determined the sources are credible. Users should not infer any additional actions or results beyond what is presented in a GTD entry and specifically, users should not infer an individual associated with a particular incident was tried and convicted of terrorism or any other criminal offense. If new documentation about an event becomes available, an entry may be modified, as necessary and appropriate. iWatch National Video (LAPD) Military Guide to Terrorism in the Twenty-First Century Memorial Institute for the Prevention of Terrorism U.S. Department of State | Bureau of Counterterrorism - The primary mission of the Bureau of Counterterrorism (CT) is to forge partnerships with non-state actors, multilateral organizations, and foreign governments to advance the counterterrorism objectives and national security of the United States. Michael Chesbro 84 Chesbro's Law Enforcement, Research & Intelligence Compendium (CLERIC) 2014 Training & Education (On-Line Learning Portals) 28 CFR Part 23 Training Advanced Global Intelligence Learning Environment Army Management Staff College ASPCA - Combating Dog Fighting Bioterrorism Preparedness Certificate Center for Development of Security Excellence Center for Disease Control Train Certified Fire Investigator - Trainer Network Crime Scene Investigation and Forensic Science Videos A video teaching series consisting of ten 50-minute presentations from the "History Channel". 1-Blood Splatter 5-Fingering the Killer 9-Tracings in Blood 2-Body Clues 6-Fire and Metal 10- Unusual Clues 3-Bullets and Blood 7-Invisible Clues 4-DNA's Debut 8-The Body Searchers Cyber Security Training - TEEX / DHS AWR-175-W Information Security for Everyone AWR-138-W Network Assurance AWR-174-W Cyber Ethics AWR-139-W Digital Forensics Basics AWR-168-W Cyber Law and White Collar Crime AWR-176-W Business Information Continuity AWR-173-W Information Security Basics AWR-177-W Information Risk Management AWR-178-W Secure Software and Network Assurance Michael Chesbro 85 Chesbro's Law Enforcement, Research & Intelligence Compendium (CLERIC) 2014 Defense Cyber Investigations Training Academy Defense Nuclear Weapons School (DNWS classes must be taken on a .mil / .gov network) Doctrine Networked Education & Training (DOCNET) FBI Virtual Academy (Agency account required.) FedVTE - Cyber Security Training for DoD and Federal IA Professionals FEMA – Emergency Management Institute Independent Study FLETC – On-Line Course Catalog Forensic Science Education Forensic Training Network Information Assurance Fundamentals Training Information Assurance Support Environment International IP Crime Investigators College Joint Knowledge On-Line Law 101 - Legal Guide for the Forensic Expert This course provides 13 modules and this introduction which is designed to give a comprehensive discussion of recommended practices for the forensic expert to follow when preparing for and testifying in court. Sources of Scientific Evidence Discovery Report Writing and Supporting General Testifying Tips Documentation Depositions Importance of Case Preparation Pretrial Subpoenas vs. Promises to Appear Trial Affidavits Post-Trial, Pre-Sentencing Being a Court-Appointed Expert Ethics for Experts Marine Net (USMC) Michael Chesbro 86 Chesbro's Law Enforcement, Research & Intelligence Compendium (CLERIC) 2014 Microsoft Digital Literacy Curriculum The Microsoft Digital Literacy curriculum has three levels: The Basic curriculum features a course called A First Course Toward Digital Literacy. This course teaches the value of computers in society and introduces you to using a mouse and the keyboard. The Standard curriculum features five courses that cover computer basics; using the internet and productivity programs; security and privacy; and digital lifestyles. These five courses are available in three versions that use examples and screenshots from different versions of Windows and Microsoft Office. Please read the details below. The Advanced curriculum features four courses that cover creating an e-mail account, creating a great resume, searching for content on the World Wide Web and social networking. Multijurisdictional Counterdrug Task Force Training (MCTFT) Police Intelligence Course (16 hours) National Fire Administration National Institute of Justice Courses National White Collar Crime Center (NW3C) (NW3C account required) Basic Computer Skills for Law Enforcement (Basic Skills) - Web Based Cyber Investigation 100 - Identifying and Seizing Electronic Evidence - Web Based (ISEE-WB) Encryption (Encryption) - Web Based Nationwide SAR Initiative NATO e-Learning Online Statistics Education: An Interactive Multimedia Course of Study Online Statistics: An Interactive Multimedia Course of Study is a resource for learning and teaching introductory statistics. It contains material presented in textbook format and as video presentations. This resource features interactive demonstrations and simulations, case studies, and an analysis lab. This work is in the public domain. Therefore, it can be copied and reproduced without limitation. However, we would appreciate a citation where possible. Please cite as: Online Statistics Education: A Multimedia Course of Study (http://onlinestatbook.com/). Project Leader: David M. Lane, Rice University. Michael Chesbro 87 Chesbro's Law Enforcement, Research & Intelligence Compendium (CLERIC) 2014 Police Intelligence Collectors Course Statistics (UNC Center for Public Health Preparedness) Advanced Data Analysis: Methods to Control for Confounding (1-hour) Analyzing Data (I is for Investigation) (30-minutes) Data Analysis Basics: Variables and Distribution (1-hour) Data Analysis: Simple Statistical Tests (1-hour) Texas A&M Engineering Extension Services United States Institute of Peace University At Albany (e-Learning Center) Michael Chesbro 88