SlideShare a Scribd company logo
UNCLASSIFIED//FOR OFFICIAL USE ONLY 
UNCLASSIFIED//FOR OFFICIAL USE ONLY 
1 
(U) FOR OFFICIAL USE ONLY: The information marked (U//FOUO) in this document is the property of the originator and may be distributed within the Federal Government (and its contractors), US intelligence, law enforcement, public safety or protection officials and individuals with a need to know. Distribution beyond these entities without the originator’s authorization is prohibited. Precautions should be taken to ensure this information is stored and/or destroyed in a manner that precludes unauthorized access. Information bearing the FOUO caveat may not be used in legal proceedings without first receiving authorization from the originating agency. Recipients are prohibited from subsequently posting the information marked FOUO on a website or an unclassified network. 
(U) Special Assessment: ISIL Threats Against the Homeland 
(U) Overview 
(U//FOUO) This ARTIC Special Assessment provides an overview of potential threats posed by the Islamic State of Iraq and the Levant (ISIL), its supporters, those swayed by radical Islam, and lone offenders with the intent or inclination to act on ISIL’s behalf. Presently, the Intelligence Community has not identified any corroborative or definitive extremist plots1 focused on the US Army, its Soldiers, Government Civilians, and Family Members. However, terrorist groups and their supporters have the capability of conducting attacks with little to no warning in the Homeland and against US military installations and facilities worldwide. Given the continued rhetoric being issued by ISIL’s media services and supporters through various social media platforms the ARTIC is concerned of the possibility of an attack. Soldiers, Government Civilians and Family Members are reminded to be vigilant of their surroundings and report suspicious activities to their respective military or local law enforcement. 
(U) ISIL Threatens Attacks against Civilians and Military in the Homeland; Urges Supporters 
(U//FOUO) Over the past year, ISIL has threatened violence against the United States and US interests overseas in response to ongoing counterterrorism pressure. Following the start of US air strikes in Iraq in early August 2014, and then Syria in late September 2014, ISIL supporters launched a Twitter campaign threatening retaliatory violence against the United States. Additionally, a recent audio message from an ISIL spokesman called, for the first time, for lone offender attacks in the Homeland in retaliation for US military operations in Iraq and Syria.2 
 (U) On 22 Sep 14, an ISIL spokesman urged its followers to attack citizens of the US, France and other countries that joined the US-led coalition against the group.3 
 (U) Based on a law enforcement bulletin citing a jihadist tweet ISIL has called on lone offenders in the US to use the “yellow pages,” social media sites like Facebook, Linkedin, and Twitter to find the addresses of service members, “show up [at their homes] and slaughter them.”4 
 (U) According to the US Government as many as 300 Americans are fighting with ISIL; an increase from an initial estimate of 100. There is concern that these Americans could return to the US and commit attacks using the skills they learned overseas. Efforts are being made to track these foreign fighters, however, those not being tracked by law enforcement may be able to reenter the US without raising suspicions.5 During a news conference 
DD Month 2014 
28 DEC 2013 
Army Threat Integration Center (ARTIC) 
Special Assessment 
ARTIC-SA-14-0015 
This ARTIC Special Assessment is a collaborative special product from the ARTIC, Army CID Command Intelligence Operation Center (CIOC), and the Army CI Center (ACIC), provided for situational awareness of general law enforcement, antiterrorism, and force protection issues and should not be considered a finished intelligence product. Some of the material may be derived from intelligence and fusion cells on the condition that it may not be retransmitted outside LE, AT, and FP channels. Any unauthorized disclosure could jeopardize ongoing operations and safety. 
If you received this message in error, please contact the ARTIC immediately. 
Publication Date: 25 September 2014 
Information Cutoff Date: 23 September 2014 
(U) Source Summary Statement 
(U/FOUO) This Special Assessment is derived from US Army operational reporting, interagency law enforcement bulletins, jihadist propaganda, DoD internal reviews, and open press reporting. Heavy reliance is placed on operational and official reporting sources, with press reporting used to validate information concerning high publicity incidents. This Special Assessment is a threat assessment product and does not represent the coordinated views of the US Army.
UNCLASSIFIED//FOR OFFICIAL USE ONLY 
UNCLASSIFIED//FOR OFFICIAL USE ONLY 
2 
on 22 Sep 14, a senior Obama Administration official admitted that some Americans that fought alongside ISIL have returned to the US.6 
 (U) Prior to the initiation of US airstrikes against ISIL in Iraq, Twitter posts were disseminated depicting ISIL supporters in front of the White House in Washington, DC and the Old Republic Building in Chicago. These tweets stated “We are in your state, We are in your cities, We are in your streets.” Another tweet added “we are here #america near our #target…sooooooooooooon.”7 
(U) Examples of Islamic Extremism outside the Middle East 
(U) Generally, terrorist attacks committed against Westerners occur in countries where the terrorist has a greater presence and freedom of movement. In the past, attacks typically consisted of spectacular, massive bombings such as the bombing against transportation systems in Madrid (2004) and London (2005). Recently, more attacks are taking the form of small scale attacks with the use of knives, small caliber weapons, and bombs that can be made “in the kitchen of your mom.” 
 (U) Between 11 and 19 Mar 12, three French soldiers, as well as three Jewish children and a Jewish rabbi were killed by the same gunman in the towns of Toulouse and Montauban in southern France. The shooter, reportedly radicalized in prison, was said to have conducted the attacks in retaliation for France’s involvement in Afghanistan, its ruling on the wear of the burqa, and his anti-Semitic views. He was subsequently killed by a police sniper following a several hour standoff.8 
 (U) On 22 May 13, two al Qa’ida inspired males targeted and attacked a British soldier with knives and a meat cleaver in Woolwich in the southeast area of London, United Kingdom. The British soldier presented a target of opportunity as he walked down the street. He was attacked in broad daylight within 400 meters of the Royal Artillery barracks. Prior to being confronted and detained by police one attacker was videotaped stating the attack was “an eye for an eye, a tooth for a tooth.”9 
 (U) On 24 May 13, a French soldier was stabbed from behind in the neck while conducting a group patrol as part of a national protection program. At the time, the French Government did not want the country to jump to any conclusions given that this incident occurred with days of the Woolwich attack. The attacker in this incident was not caught and his motivations are unknown.10 
 (U) On 15 Apr 13, two brothers detonated two pressure cooker bombs along the final stretch of the Boston Marathon killing three and wounding 250. A manhunt ensued resulting in the death of one suspect and the capture of the other. Resultant investigations determined that the brothers used detailed instructions cited in an online al Qa’ida in the Arabian Peninsula magazine titled Inspire.11 
 (U) On 19 Sep 14, Australian federal and state police raided more than a dozen properties across Sydney and Brisbane foiling an ISIL plot to conduct beheadings in Australia. ISIL-affiliated members in Australia planned on videotaping the beheadings and sending the footage to ISIL media service in Iraq and Syria to disseminate via social media sites for propaganda purposes.12 
(U) Potential Indicators of Attack Planning13 
(U//FOUO) Historically, terrorists engage in substantial, long term, and detailed planning; however, despite the indicators typically associated with pre-operational surveillance or attack planning only a handful of terrorist plots have been disrupted over the years. Based on the ongoing encouragement of HVEs and lone offenders by jihadists it is possible that long term planning may be abbreviated to conduct an attack with little or no warning. It is during this period that observant law enforcement or by-standers may identify some kind of rudimentary pre-operational activity. Possible indicators of pre- operational surveillance or attack planning include: 
 (U) Unusual interest in sensitive information about security measures, personnel, entry points, peak days/hours of operation, and access controls such as alarms or locks 
 (U) Engaging in overtly suspicious actions to provoke and observe responses by public safety personnel 
 (U) Discreet use of cameras or video recorders, sketching, or note-taking consistent with surveillance 
 (U) Observation of, or questions about facility air conditioning, heating, and ventilation systems 
 (U) Repeated visits by the same subjects, including attempts to disguise appearance from visit to visit 
 (U) Attempted or unauthorized access to rooftops or other sensitive areas 
 (U) Observation of or unusual questions about security measures, such as staffing, barriers, restricted areas, cameras, and intrusion detection systems 
 (U) Multiple false alarms or fictitious emergency calls to the same locations or similar venues 
 (U) Unusual interest in speaking with building maintenance personnel 
 (U) Observation of security reaction drills or procedures
UNCLASSIFIED//FOR OFFICIAL USE ONLY 
UNCLASSIFIED//FOR OFFICIAL USE ONLY 
3 
 (U) Attention to or avoidance of surveillance cameras 
 (U//FOUO) Garments not appropriate for weather/seasons 
(U//FOUO) Each indicator may occur singularly, under the guise of lawful conduct or behavior, and may even be considered a constitutional exercise of rights and freedoms as guaranteed by the US Constitution. Suspicious indicators may also be explained or downgraded by would-be perpetrators with explanations that paint their activities as innocent and unplanned. For this reason, no single indicator should be used as the sole basis for law enforcement action; instead, the totality of observed indicators, behaviors, circumstances and details should be evaluated when considering any law enforcement response or action. 
(U) Social Media Precautions14 15 
(U) Think before you post. Always assume everyone in the world will be able to see what you are posting, or tweeting, even if the site limits your posts to your friends and family. 
 (U) Limit who can view your social media sites; but do not trust these settings as absolute 
 (U) Avoid posting your home or work address and phone numbers; and any government or military affiliation 
 (U) Avoid providing detailed accounts of your day (e.g., when you leave for or return from work) 
 (U) Never allow applications to geolocate your location 
(U) Physical/Home Security Precautions16 
(U) While most of these measures are primarily geared toward home burglaries, when implemented these same measures can help prevent an individual from conducting an attack while you or your family members are home. 
 (U) Always lock doors, windows and garages 
 (U) Make sure home entrances are well-lighted, and minimize bushes where intruders can hide before their ambush 
 (U) Use the peephole before opening the door to anyone 
 (U) Don't use the chain latch to open the door part-way 
 (U) Don't open the door to solicitors or strangers 
 (U) Install solid-core doors, heavy-duty locks and window security systems 
 (U) Establish a safehaven 
 (U) Hold a family meeting to work out home security plans 
(U) Conclusion 
(U//FOUO) The ARTIC reminds that it is imperative to be aware of your surroundings and report all suspicious activity to the appropriate authorities; report criminal threat information and suspicious activity to local law enforcement authorities and your chain of command; report Counterintelligence (CI) information by calling 1-800-CALL-SPY or use the online CI incident report link (iSALUTE) within AKO at https://www.inscom.army.mil/isalute/. 
The ARTIC, CIOC, and ACIC-FPTAB welcome your comments and suggestions. 
Please help us to create a better product by providing your feedback. 
FEEDBACK 
NSTS (Secure): 960-1709 TSVOIP: 984-5527 24/7: (703) 695-5300 DSN: (312) 225-5300 
ARTIC Commercial (STE): (703) 697-8647 
ARTIC NIPR Email: usarmy.pentagon.hqda-dcs-g-2.list.dami-artic@mail.mil SIPR Email: usarmy.pentagon.hqda-dcs-g-2.list.dami-ARTIC @mail.smil.mil NIPR Portal: https://west.esps.disa.mil/army/sites/APP/OPMG/OPS/antiterror/ARTIC SIPR Portal: http://army.daiis.mi.army.smil.mil/org/ARTIC 
USACIDC-CIOC NIPR Email: usarmy.belvoir.usacidc.mbx.watch-analytical-center@mail.mil 
This product supports Campaign Objective 4.0, Support Global Operations with Ready Land Power; and Major Objective 4-4, Protect the Army. 
Derived From: Multiple Sources
UNCLASSIFIED//FOR OFFICIAL USE ONLY 
UNCLASSIFIED//FOR OFFICIAL USE ONLY 
4 
1 (U//FOUO) DHS/FBI, Joint Intelligence Bulletin, 23 SEP 14 
2 Ibid 
3 (U) Reuters, http://reut.rs/1mqNFDs, 22 SEP 14 
4 (U) Fox News, http://fxn.ws/1pk1mim, 18 SEP 14 
5 (U) Washington Times, http://bit.ly/1ryZb1G, 26 AUG 14 
6 (U) Time, http://ti.me/1mpO9cM, 22 SEP 14 
7 (U) Breitbart, http://bit.ly/1rtHXkJ, 22 AUG 14 
8 (U) ABC News, http://bit.ly/1sXQfh2, 22 MAR 12 
9 (U) The Guardian, http://bit.ly/1hBbajC, 22 MAY 13 
10 (U) Reuters, http://reut.rs/1tZeu2J, 25 MAY 13 
11 (U) The Boston Globe, http://bit.ly/18Pjtsq, 2014 
12 (U) ABC News, http://abcn.ws/1mhg4eW, 19 SEP 14 
13 (U) DHS, http://bit.ly/1sXPUuO, JUL 12 
14 (U) GFI Blog, http://bit.ly/ZdkhGy, 23 JUN 10 
15 (U) McAfee Blog, http://bit.ly/1vbSykd, 13 JUL 11 
16 (U) State Department, http://1.usa.gov/1hW81OD, n.d.

More Related Content

What's hot

Policy Paper: Confronting the ISIS Threat in the United States
Policy Paper: Confronting the ISIS Threat in the United StatesPolicy Paper: Confronting the ISIS Threat in the United States
Policy Paper: Confronting the ISIS Threat in the United States
Brett Champlin
 
Presidents daily-brief-delivering-intelligence-to-kennedy-and-johnson
Presidents daily-brief-delivering-intelligence-to-kennedy-and-johnsonPresidents daily-brief-delivering-intelligence-to-kennedy-and-johnson
Presidents daily-brief-delivering-intelligence-to-kennedy-and-johnson
https://www.cia.gov.com
 
07
0707
Benjamin fulford february 23, 2015 cia put under lockdown by pentagon to st...
Benjamin fulford   february 23, 2015 cia put under lockdown by pentagon to st...Benjamin fulford   february 23, 2015 cia put under lockdown by pentagon to st...
Benjamin fulford february 23, 2015 cia put under lockdown by pentagon to st...
PublicLeaks
 
Us4ag 010001dp
Us4ag 010001dpUs4ag 010001dp
Us4ag 010001dp
BaddddBoyyyy
 
Felix Sater Statement
Felix Sater StatementFelix Sater Statement
Felix Sater Statement
EverythingPR
 
Source: U.S. man may be helping ISIS on social media
Source: U.S. man may be helping ISIS on social mediaSource: U.S. man may be helping ISIS on social media
Source: U.S. man may be helping ISIS on social media
secretivecloset57
 
Afghan Peace Hopes Amid GreenonBlue Attacks
Afghan Peace Hopes Amid GreenonBlue Attacks  Afghan Peace Hopes Amid GreenonBlue Attacks
Afghan Peace Hopes Amid GreenonBlue Attacks
Naveed Ahmad
 
RMC Intelligence and Analysis Division Open Source Update - January 2019
RMC Intelligence and Analysis Division Open Source Update - January 2019RMC Intelligence and Analysis Division Open Source Update - January 2019
RMC Intelligence and Analysis Division Open Source Update - January 2019
ChadCogan
 
GLOBALIZING TORTURE: CIA SECRET DETENTION AND EXTRAORDINARY RENDITION
GLOBALIZING TORTURE: CIA SECRET DETENTION AND EXTRAORDINARY RENDITION GLOBALIZING TORTURE: CIA SECRET DETENTION AND EXTRAORDINARY RENDITION
GLOBALIZING TORTURE: CIA SECRET DETENTION AND EXTRAORDINARY RENDITION
Valentin Vesa
 
FBI TSC
FBI TSCFBI TSC
FBI TSC
Phil Pulaski
 
Doj press release: defendant pleads guilty to conspiring to export military a...
Doj press release: defendant pleads guilty to conspiring to export military a...Doj press release: defendant pleads guilty to conspiring to export military a...
Doj press release: defendant pleads guilty to conspiring to export military a...
Cocoselul Inaripat
 
Us man imprisoned for selling military. iran news on persiancity...
Us man imprisoned for selling military. iran news on persiancity...Us man imprisoned for selling military. iran news on persiancity...
Us man imprisoned for selling military. iran news on persiancity...
muculetz
 
Nation argentina 3 of 3
Nation argentina  3 of 3Nation argentina  3 of 3
Nation argentina 3 of 3
socialbry
 
Munitions dealers arrested for conspiracy to export military aircraft parts t...
Munitions dealers arrested for conspiracy to export military aircraft parts t...Munitions dealers arrested for conspiracy to export military aircraft parts t...
Munitions dealers arrested for conspiracy to export military aircraft parts t...
muculetz
 

What's hot (15)

Policy Paper: Confronting the ISIS Threat in the United States
Policy Paper: Confronting the ISIS Threat in the United StatesPolicy Paper: Confronting the ISIS Threat in the United States
Policy Paper: Confronting the ISIS Threat in the United States
 
Presidents daily-brief-delivering-intelligence-to-kennedy-and-johnson
Presidents daily-brief-delivering-intelligence-to-kennedy-and-johnsonPresidents daily-brief-delivering-intelligence-to-kennedy-and-johnson
Presidents daily-brief-delivering-intelligence-to-kennedy-and-johnson
 
07
0707
07
 
Benjamin fulford february 23, 2015 cia put under lockdown by pentagon to st...
Benjamin fulford   february 23, 2015 cia put under lockdown by pentagon to st...Benjamin fulford   february 23, 2015 cia put under lockdown by pentagon to st...
Benjamin fulford february 23, 2015 cia put under lockdown by pentagon to st...
 
Us4ag 010001dp
Us4ag 010001dpUs4ag 010001dp
Us4ag 010001dp
 
Felix Sater Statement
Felix Sater StatementFelix Sater Statement
Felix Sater Statement
 
Source: U.S. man may be helping ISIS on social media
Source: U.S. man may be helping ISIS on social mediaSource: U.S. man may be helping ISIS on social media
Source: U.S. man may be helping ISIS on social media
 
Afghan Peace Hopes Amid GreenonBlue Attacks
Afghan Peace Hopes Amid GreenonBlue Attacks  Afghan Peace Hopes Amid GreenonBlue Attacks
Afghan Peace Hopes Amid GreenonBlue Attacks
 
RMC Intelligence and Analysis Division Open Source Update - January 2019
RMC Intelligence and Analysis Division Open Source Update - January 2019RMC Intelligence and Analysis Division Open Source Update - January 2019
RMC Intelligence and Analysis Division Open Source Update - January 2019
 
GLOBALIZING TORTURE: CIA SECRET DETENTION AND EXTRAORDINARY RENDITION
GLOBALIZING TORTURE: CIA SECRET DETENTION AND EXTRAORDINARY RENDITION GLOBALIZING TORTURE: CIA SECRET DETENTION AND EXTRAORDINARY RENDITION
GLOBALIZING TORTURE: CIA SECRET DETENTION AND EXTRAORDINARY RENDITION
 
FBI TSC
FBI TSCFBI TSC
FBI TSC
 
Doj press release: defendant pleads guilty to conspiring to export military a...
Doj press release: defendant pleads guilty to conspiring to export military a...Doj press release: defendant pleads guilty to conspiring to export military a...
Doj press release: defendant pleads guilty to conspiring to export military a...
 
Us man imprisoned for selling military. iran news on persiancity...
Us man imprisoned for selling military. iran news on persiancity...Us man imprisoned for selling military. iran news on persiancity...
Us man imprisoned for selling military. iran news on persiancity...
 
Nation argentina 3 of 3
Nation argentina  3 of 3Nation argentina  3 of 3
Nation argentina 3 of 3
 
Munitions dealers arrested for conspiracy to export military aircraft parts t...
Munitions dealers arrested for conspiracy to export military aircraft parts t...Munitions dealers arrested for conspiracy to export military aircraft parts t...
Munitions dealers arrested for conspiracy to export military aircraft parts t...
 

Viewers also liked

ClickitDIgital_smalbany
ClickitDIgital_smalbanyClickitDIgital_smalbany
ClickitDIgital_smalbany
Liberteks
 
Search social media for job seekers
Search social media for job seekersSearch social media for job seekers
Search social media for job seekers
Liberteks
 
Mobility Management for Dummies
Mobility Management for DummiesMobility Management for Dummies
Mobility Management for Dummies
Liberteks
 
2013 mbo partners-state_of_independence_report
2013 mbo partners-state_of_independence_report2013 mbo partners-state_of_independence_report
2013 mbo partners-state_of_independence_report
Liberteks
 
Service Management for Dummies
Service Management for DummiesService Management for Dummies
Service Management for Dummies
Liberteks
 
Cloud Computing Clusters for Dummies
Cloud Computing Clusters for DummiesCloud Computing Clusters for Dummies
Cloud Computing Clusters for Dummies
Liberteks
 
Office 365 Migration for Dummies
Office 365 Migration for DummiesOffice 365 Migration for Dummies
Office 365 Migration for Dummies
Liberteks
 
Virtualization for Dummies
Virtualization for DummiesVirtualization for Dummies
Virtualization for Dummies
Liberteks
 
Building a B2B Brand Online for Dummies
Building a B2B Brand Online for DummiesBuilding a B2B Brand Online for Dummies
Building a B2B Brand Online for Dummies
Liberteks
 
Ten steps for network documentation
Ten steps for network documentationTen steps for network documentation
Ten steps for network documentation
Liberteks
 
Healthcare intel it 443833 443833
Healthcare intel it 443833 443833Healthcare intel it 443833 443833
Healthcare intel it 443833 443833
Liberteks
 
Value Innovation Tab1
Value Innovation Tab1Value Innovation Tab1
Value Innovation Tab1
Liberteks
 
The E-myth Summary
The E-myth SummaryThe E-myth Summary
The E-myth Summary
Liberteks
 
B2C Experience | Best Practices | Background Research
B2C Experience | Best Practices | Background ResearchB2C Experience | Best Practices | Background Research
B2C Experience | Best Practices | Background Research
Liberteks
 

Viewers also liked (14)

ClickitDIgital_smalbany
ClickitDIgital_smalbanyClickitDIgital_smalbany
ClickitDIgital_smalbany
 
Search social media for job seekers
Search social media for job seekersSearch social media for job seekers
Search social media for job seekers
 
Mobility Management for Dummies
Mobility Management for DummiesMobility Management for Dummies
Mobility Management for Dummies
 
2013 mbo partners-state_of_independence_report
2013 mbo partners-state_of_independence_report2013 mbo partners-state_of_independence_report
2013 mbo partners-state_of_independence_report
 
Service Management for Dummies
Service Management for DummiesService Management for Dummies
Service Management for Dummies
 
Cloud Computing Clusters for Dummies
Cloud Computing Clusters for DummiesCloud Computing Clusters for Dummies
Cloud Computing Clusters for Dummies
 
Office 365 Migration for Dummies
Office 365 Migration for DummiesOffice 365 Migration for Dummies
Office 365 Migration for Dummies
 
Virtualization for Dummies
Virtualization for DummiesVirtualization for Dummies
Virtualization for Dummies
 
Building a B2B Brand Online for Dummies
Building a B2B Brand Online for DummiesBuilding a B2B Brand Online for Dummies
Building a B2B Brand Online for Dummies
 
Ten steps for network documentation
Ten steps for network documentationTen steps for network documentation
Ten steps for network documentation
 
Healthcare intel it 443833 443833
Healthcare intel it 443833 443833Healthcare intel it 443833 443833
Healthcare intel it 443833 443833
 
Value Innovation Tab1
Value Innovation Tab1Value Innovation Tab1
Value Innovation Tab1
 
The E-myth Summary
The E-myth SummaryThe E-myth Summary
The E-myth Summary
 
B2C Experience | Best Practices | Background Research
B2C Experience | Best Practices | Background ResearchB2C Experience | Best Practices | Background Research
B2C Experience | Best Practices | Background Research
 

Similar to Artic Homeland Threats

EXAM NOTES for the Certified in Homeland Security
 EXAM NOTES for the Certified in Homeland Security EXAM NOTES for the Certified in Homeland Security
EXAM NOTES for the Certified in Homeland Security
David Sweigert
 
AntiTerrorism_Level1-7.pdf
AntiTerrorism_Level1-7.pdfAntiTerrorism_Level1-7.pdf
AntiTerrorism_Level1-7.pdf
eliasox
 
(U fouo-les) dhs report- assessing isil’s lnfluence and perceived legitimacy ...
(U fouo-les) dhs report- assessing isil’s lnfluence and perceived legitimacy ...(U fouo-les) dhs report- assessing isil’s lnfluence and perceived legitimacy ...
(U fouo-les) dhs report- assessing isil’s lnfluence and perceived legitimacy ...
RepentSinner
 
Intelligence Collection
Intelligence CollectionIntelligence Collection
Intelligence Collection
Christina Berger
 
The Bush Doctrine
The Bush DoctrineThe Bush Doctrine
The Bush Doctrine
Rachel Phillips
 
Assignment 2 Intelligence and CounterintelligenceBoth domestic an.docx
Assignment 2 Intelligence and CounterintelligenceBoth domestic an.docxAssignment 2 Intelligence and CounterintelligenceBoth domestic an.docx
Assignment 2 Intelligence and CounterintelligenceBoth domestic an.docx
josephinepaterson7611
 
Defense Intelligence Agency And Military Intelligence
Defense Intelligence Agency And Military IntelligenceDefense Intelligence Agency And Military Intelligence
Defense Intelligence Agency And Military Intelligence
Amber Wheeler
 
DoD Housing of Immigrant Detainees: Security Implications 17 July 2018
DoD Housing of Immigrant Detainees: Security Implications 17 July 2018DoD Housing of Immigrant Detainees: Security Implications 17 July 2018
DoD Housing of Immigrant Detainees: Security Implications 17 July 2018
ChadCogan
 
Terrorism
TerrorismTerrorism
Terrorism
Pancham Mayank
 
Suicide Bomb Tactic Review
Suicide Bomb Tactic ReviewSuicide Bomb Tactic Review
Suicide Bomb Tactic Review
Emergency Response & Research Institute
 
SafeAssignCheckTestWaldorf - Waldorf SafeAssign Plagiarism Check.docx
SafeAssignCheckTestWaldorf - Waldorf SafeAssign Plagiarism Check.docxSafeAssignCheckTestWaldorf - Waldorf SafeAssign Plagiarism Check.docx
SafeAssignCheckTestWaldorf - Waldorf SafeAssign Plagiarism Check.docx
jeffsrosalyn
 
565 3805-1-pb
565 3805-1-pb565 3805-1-pb
565 3805-1-pb
Firas Husseini
 
Essay On Public Policy.pdf
Essay On Public Policy.pdfEssay On Public Policy.pdf
Essay On Public Policy.pdf
Heather Lopez
 
Patriot act
Patriot actPatriot act
Patriot act
orlandohb
 
Is there still a terrorist threat?
Is there still a terrorist threat?Is there still a terrorist threat?
Is there still a terrorist threat?
williamkontos
 

Similar to Artic Homeland Threats (15)

EXAM NOTES for the Certified in Homeland Security
 EXAM NOTES for the Certified in Homeland Security EXAM NOTES for the Certified in Homeland Security
EXAM NOTES for the Certified in Homeland Security
 
AntiTerrorism_Level1-7.pdf
AntiTerrorism_Level1-7.pdfAntiTerrorism_Level1-7.pdf
AntiTerrorism_Level1-7.pdf
 
(U fouo-les) dhs report- assessing isil’s lnfluence and perceived legitimacy ...
(U fouo-les) dhs report- assessing isil’s lnfluence and perceived legitimacy ...(U fouo-les) dhs report- assessing isil’s lnfluence and perceived legitimacy ...
(U fouo-les) dhs report- assessing isil’s lnfluence and perceived legitimacy ...
 
Intelligence Collection
Intelligence CollectionIntelligence Collection
Intelligence Collection
 
The Bush Doctrine
The Bush DoctrineThe Bush Doctrine
The Bush Doctrine
 
Assignment 2 Intelligence and CounterintelligenceBoth domestic an.docx
Assignment 2 Intelligence and CounterintelligenceBoth domestic an.docxAssignment 2 Intelligence and CounterintelligenceBoth domestic an.docx
Assignment 2 Intelligence and CounterintelligenceBoth domestic an.docx
 
Defense Intelligence Agency And Military Intelligence
Defense Intelligence Agency And Military IntelligenceDefense Intelligence Agency And Military Intelligence
Defense Intelligence Agency And Military Intelligence
 
DoD Housing of Immigrant Detainees: Security Implications 17 July 2018
DoD Housing of Immigrant Detainees: Security Implications 17 July 2018DoD Housing of Immigrant Detainees: Security Implications 17 July 2018
DoD Housing of Immigrant Detainees: Security Implications 17 July 2018
 
Terrorism
TerrorismTerrorism
Terrorism
 
Suicide Bomb Tactic Review
Suicide Bomb Tactic ReviewSuicide Bomb Tactic Review
Suicide Bomb Tactic Review
 
SafeAssignCheckTestWaldorf - Waldorf SafeAssign Plagiarism Check.docx
SafeAssignCheckTestWaldorf - Waldorf SafeAssign Plagiarism Check.docxSafeAssignCheckTestWaldorf - Waldorf SafeAssign Plagiarism Check.docx
SafeAssignCheckTestWaldorf - Waldorf SafeAssign Plagiarism Check.docx
 
565 3805-1-pb
565 3805-1-pb565 3805-1-pb
565 3805-1-pb
 
Essay On Public Policy.pdf
Essay On Public Policy.pdfEssay On Public Policy.pdf
Essay On Public Policy.pdf
 
Patriot act
Patriot actPatriot act
Patriot act
 
Is there still a terrorist threat?
Is there still a terrorist threat?Is there still a terrorist threat?
Is there still a terrorist threat?
 

More from Liberteks

Testing SAP Solutions for Dummies
Testing SAP Solutions for DummiesTesting SAP Solutions for Dummies
Testing SAP Solutions for Dummies
Liberteks
 
System Engineering for Dummies
System Engineering for DummiesSystem Engineering for Dummies
System Engineering for Dummies
Liberteks
 
Sales and use tax compliance for dummies
Sales and use tax compliance for dummiesSales and use tax compliance for dummies
Sales and use tax compliance for dummies
Liberteks
 
QuestionPro for dummies
QuestionPro for dummiesQuestionPro for dummies
QuestionPro for dummies
Liberteks
 
IT Policy Compliance for Dummies
IT Policy Compliance for DummiesIT Policy Compliance for Dummies
IT Policy Compliance for Dummies
Liberteks
 
Point -of-Sale Security for Dummies
Point -of-Sale Security for DummiesPoint -of-Sale Security for Dummies
Point -of-Sale Security for Dummies
Liberteks
 
Midmarket Collaboration for Dummies
Midmarket Collaboration for DummiesMidmarket Collaboration for Dummies
Midmarket Collaboration for Dummies
Liberteks
 
Email Signatures for Dummies
Email Signatures for DummiesEmail Signatures for Dummies
Email Signatures for Dummies
Liberteks
 
Custom Publishing for Dummies
Custom Publishing for DummiesCustom Publishing for Dummies
Custom Publishing for Dummies
Liberteks
 
Cloud Service for Dummies
Cloud Service for DummiesCloud Service for Dummies
Cloud Service for Dummies
Liberteks
 
B2B Online Display Advertising for Dummies
B2B Online Display Advertising for DummiesB2B Online Display Advertising for Dummies
B2B Online Display Advertising for Dummies
Liberteks
 
APIs for dummies
APIs for dummiesAPIs for dummies
APIs for dummies
Liberteks
 
Website Threats for Dummies
Website Threats for DummiesWebsite Threats for Dummies
Website Threats for Dummies
Liberteks
 
Software-Defined WAM for Dummies
Software-Defined WAM for DummiesSoftware-Defined WAM for Dummies
Software-Defined WAM for Dummies
Liberteks
 
Vulnerability Management for Dummies
Vulnerability Management for DummiesVulnerability Management for Dummies
Vulnerability Management for Dummies
Liberteks
 
Integrated Marketing For Dummies
Integrated Marketing For DummiesIntegrated Marketing For Dummies
Integrated Marketing For Dummies
Liberteks
 
Hyper-Converged Appliances for Dummies
Hyper-Converged Appliances for DummiesHyper-Converged Appliances for Dummies
Hyper-Converged Appliances for Dummies
Liberteks
 
Flash Array Deployment for Dummies
Flash Array Deployment for DummiesFlash Array Deployment for Dummies
Flash Array Deployment for Dummies
Liberteks
 
Container Storage for Dummies
Container Storage for DummiesContainer Storage for Dummies
Container Storage for Dummies
Liberteks
 
Cloud Security for Dumies
Cloud Security for DumiesCloud Security for Dumies
Cloud Security for Dumies
Liberteks
 

More from Liberteks (20)

Testing SAP Solutions for Dummies
Testing SAP Solutions for DummiesTesting SAP Solutions for Dummies
Testing SAP Solutions for Dummies
 
System Engineering for Dummies
System Engineering for DummiesSystem Engineering for Dummies
System Engineering for Dummies
 
Sales and use tax compliance for dummies
Sales and use tax compliance for dummiesSales and use tax compliance for dummies
Sales and use tax compliance for dummies
 
QuestionPro for dummies
QuestionPro for dummiesQuestionPro for dummies
QuestionPro for dummies
 
IT Policy Compliance for Dummies
IT Policy Compliance for DummiesIT Policy Compliance for Dummies
IT Policy Compliance for Dummies
 
Point -of-Sale Security for Dummies
Point -of-Sale Security for DummiesPoint -of-Sale Security for Dummies
Point -of-Sale Security for Dummies
 
Midmarket Collaboration for Dummies
Midmarket Collaboration for DummiesMidmarket Collaboration for Dummies
Midmarket Collaboration for Dummies
 
Email Signatures for Dummies
Email Signatures for DummiesEmail Signatures for Dummies
Email Signatures for Dummies
 
Custom Publishing for Dummies
Custom Publishing for DummiesCustom Publishing for Dummies
Custom Publishing for Dummies
 
Cloud Service for Dummies
Cloud Service for DummiesCloud Service for Dummies
Cloud Service for Dummies
 
B2B Online Display Advertising for Dummies
B2B Online Display Advertising for DummiesB2B Online Display Advertising for Dummies
B2B Online Display Advertising for Dummies
 
APIs for dummies
APIs for dummiesAPIs for dummies
APIs for dummies
 
Website Threats for Dummies
Website Threats for DummiesWebsite Threats for Dummies
Website Threats for Dummies
 
Software-Defined WAM for Dummies
Software-Defined WAM for DummiesSoftware-Defined WAM for Dummies
Software-Defined WAM for Dummies
 
Vulnerability Management for Dummies
Vulnerability Management for DummiesVulnerability Management for Dummies
Vulnerability Management for Dummies
 
Integrated Marketing For Dummies
Integrated Marketing For DummiesIntegrated Marketing For Dummies
Integrated Marketing For Dummies
 
Hyper-Converged Appliances for Dummies
Hyper-Converged Appliances for DummiesHyper-Converged Appliances for Dummies
Hyper-Converged Appliances for Dummies
 
Flash Array Deployment for Dummies
Flash Array Deployment for DummiesFlash Array Deployment for Dummies
Flash Array Deployment for Dummies
 
Container Storage for Dummies
Container Storage for DummiesContainer Storage for Dummies
Container Storage for Dummies
 
Cloud Security for Dumies
Cloud Security for DumiesCloud Security for Dumies
Cloud Security for Dumies
 

Recently uploaded

Letter-from-ECI-to-MeiTY-21st-march-2024.pdf
Letter-from-ECI-to-MeiTY-21st-march-2024.pdfLetter-from-ECI-to-MeiTY-21st-march-2024.pdf
Letter-from-ECI-to-MeiTY-21st-march-2024.pdf
bhavenpr
 
Acolyte Episodes review (TV series)..pdf
Acolyte Episodes review (TV series)..pdfAcolyte Episodes review (TV series)..pdf
Acolyte Episodes review (TV series)..pdf
46adnanshahzad
 
EED - The Container Port PERFORMANCE INDEX 2023
EED - The Container Port PERFORMANCE INDEX 2023EED - The Container Port PERFORMANCE INDEX 2023
EED - The Container Port PERFORMANCE INDEX 2023
El Estrecho Digital
 
Essential Tools for Modern PR Business .pptx
Essential Tools for Modern PR Business .pptxEssential Tools for Modern PR Business .pptx
Essential Tools for Modern PR Business .pptx
Pragencyuk
 
MAGNA CARTA (minimum 40 characters required)
MAGNA CARTA (minimum 40 characters required)MAGNA CARTA (minimum 40 characters required)
MAGNA CARTA (minimum 40 characters required)
Filippo64
 
Gabriel Whitley's Motion Summary Judgment
Gabriel Whitley's Motion Summary JudgmentGabriel Whitley's Motion Summary Judgment
Gabriel Whitley's Motion Summary Judgment
Abdul-Hakim Shabazz
 
2015pmkemenhub163.pdf 2015pmkemenhub163.pdf
2015pmkemenhub163.pdf 2015pmkemenhub163.pdf2015pmkemenhub163.pdf 2015pmkemenhub163.pdf
2015pmkemenhub163.pdf 2015pmkemenhub163.pdf
CIkumparan
 
What Ukraine Has Lost During Russia’s Invasion
What Ukraine Has Lost During Russia’s InvasionWhat Ukraine Has Lost During Russia’s Invasion
What Ukraine Has Lost During Russia’s Invasion
LUMINATIVE MEDIA/PROJECT COUNSEL MEDIA GROUP
 
Hindustan Insider 2nd edition release now
Hindustan Insider 2nd edition release nowHindustan Insider 2nd edition release now
Hindustan Insider 2nd edition release now
hindustaninsider22
 

Recently uploaded (9)

Letter-from-ECI-to-MeiTY-21st-march-2024.pdf
Letter-from-ECI-to-MeiTY-21st-march-2024.pdfLetter-from-ECI-to-MeiTY-21st-march-2024.pdf
Letter-from-ECI-to-MeiTY-21st-march-2024.pdf
 
Acolyte Episodes review (TV series)..pdf
Acolyte Episodes review (TV series)..pdfAcolyte Episodes review (TV series)..pdf
Acolyte Episodes review (TV series)..pdf
 
EED - The Container Port PERFORMANCE INDEX 2023
EED - The Container Port PERFORMANCE INDEX 2023EED - The Container Port PERFORMANCE INDEX 2023
EED - The Container Port PERFORMANCE INDEX 2023
 
Essential Tools for Modern PR Business .pptx
Essential Tools for Modern PR Business .pptxEssential Tools for Modern PR Business .pptx
Essential Tools for Modern PR Business .pptx
 
MAGNA CARTA (minimum 40 characters required)
MAGNA CARTA (minimum 40 characters required)MAGNA CARTA (minimum 40 characters required)
MAGNA CARTA (minimum 40 characters required)
 
Gabriel Whitley's Motion Summary Judgment
Gabriel Whitley's Motion Summary JudgmentGabriel Whitley's Motion Summary Judgment
Gabriel Whitley's Motion Summary Judgment
 
2015pmkemenhub163.pdf 2015pmkemenhub163.pdf
2015pmkemenhub163.pdf 2015pmkemenhub163.pdf2015pmkemenhub163.pdf 2015pmkemenhub163.pdf
2015pmkemenhub163.pdf 2015pmkemenhub163.pdf
 
What Ukraine Has Lost During Russia’s Invasion
What Ukraine Has Lost During Russia’s InvasionWhat Ukraine Has Lost During Russia’s Invasion
What Ukraine Has Lost During Russia’s Invasion
 
Hindustan Insider 2nd edition release now
Hindustan Insider 2nd edition release nowHindustan Insider 2nd edition release now
Hindustan Insider 2nd edition release now
 

Artic Homeland Threats

  • 1. UNCLASSIFIED//FOR OFFICIAL USE ONLY UNCLASSIFIED//FOR OFFICIAL USE ONLY 1 (U) FOR OFFICIAL USE ONLY: The information marked (U//FOUO) in this document is the property of the originator and may be distributed within the Federal Government (and its contractors), US intelligence, law enforcement, public safety or protection officials and individuals with a need to know. Distribution beyond these entities without the originator’s authorization is prohibited. Precautions should be taken to ensure this information is stored and/or destroyed in a manner that precludes unauthorized access. Information bearing the FOUO caveat may not be used in legal proceedings without first receiving authorization from the originating agency. Recipients are prohibited from subsequently posting the information marked FOUO on a website or an unclassified network. (U) Special Assessment: ISIL Threats Against the Homeland (U) Overview (U//FOUO) This ARTIC Special Assessment provides an overview of potential threats posed by the Islamic State of Iraq and the Levant (ISIL), its supporters, those swayed by radical Islam, and lone offenders with the intent or inclination to act on ISIL’s behalf. Presently, the Intelligence Community has not identified any corroborative or definitive extremist plots1 focused on the US Army, its Soldiers, Government Civilians, and Family Members. However, terrorist groups and their supporters have the capability of conducting attacks with little to no warning in the Homeland and against US military installations and facilities worldwide. Given the continued rhetoric being issued by ISIL’s media services and supporters through various social media platforms the ARTIC is concerned of the possibility of an attack. Soldiers, Government Civilians and Family Members are reminded to be vigilant of their surroundings and report suspicious activities to their respective military or local law enforcement. (U) ISIL Threatens Attacks against Civilians and Military in the Homeland; Urges Supporters (U//FOUO) Over the past year, ISIL has threatened violence against the United States and US interests overseas in response to ongoing counterterrorism pressure. Following the start of US air strikes in Iraq in early August 2014, and then Syria in late September 2014, ISIL supporters launched a Twitter campaign threatening retaliatory violence against the United States. Additionally, a recent audio message from an ISIL spokesman called, for the first time, for lone offender attacks in the Homeland in retaliation for US military operations in Iraq and Syria.2  (U) On 22 Sep 14, an ISIL spokesman urged its followers to attack citizens of the US, France and other countries that joined the US-led coalition against the group.3  (U) Based on a law enforcement bulletin citing a jihadist tweet ISIL has called on lone offenders in the US to use the “yellow pages,” social media sites like Facebook, Linkedin, and Twitter to find the addresses of service members, “show up [at their homes] and slaughter them.”4  (U) According to the US Government as many as 300 Americans are fighting with ISIL; an increase from an initial estimate of 100. There is concern that these Americans could return to the US and commit attacks using the skills they learned overseas. Efforts are being made to track these foreign fighters, however, those not being tracked by law enforcement may be able to reenter the US without raising suspicions.5 During a news conference DD Month 2014 28 DEC 2013 Army Threat Integration Center (ARTIC) Special Assessment ARTIC-SA-14-0015 This ARTIC Special Assessment is a collaborative special product from the ARTIC, Army CID Command Intelligence Operation Center (CIOC), and the Army CI Center (ACIC), provided for situational awareness of general law enforcement, antiterrorism, and force protection issues and should not be considered a finished intelligence product. Some of the material may be derived from intelligence and fusion cells on the condition that it may not be retransmitted outside LE, AT, and FP channels. Any unauthorized disclosure could jeopardize ongoing operations and safety. If you received this message in error, please contact the ARTIC immediately. Publication Date: 25 September 2014 Information Cutoff Date: 23 September 2014 (U) Source Summary Statement (U/FOUO) This Special Assessment is derived from US Army operational reporting, interagency law enforcement bulletins, jihadist propaganda, DoD internal reviews, and open press reporting. Heavy reliance is placed on operational and official reporting sources, with press reporting used to validate information concerning high publicity incidents. This Special Assessment is a threat assessment product and does not represent the coordinated views of the US Army.
  • 2. UNCLASSIFIED//FOR OFFICIAL USE ONLY UNCLASSIFIED//FOR OFFICIAL USE ONLY 2 on 22 Sep 14, a senior Obama Administration official admitted that some Americans that fought alongside ISIL have returned to the US.6  (U) Prior to the initiation of US airstrikes against ISIL in Iraq, Twitter posts were disseminated depicting ISIL supporters in front of the White House in Washington, DC and the Old Republic Building in Chicago. These tweets stated “We are in your state, We are in your cities, We are in your streets.” Another tweet added “we are here #america near our #target…sooooooooooooon.”7 (U) Examples of Islamic Extremism outside the Middle East (U) Generally, terrorist attacks committed against Westerners occur in countries where the terrorist has a greater presence and freedom of movement. In the past, attacks typically consisted of spectacular, massive bombings such as the bombing against transportation systems in Madrid (2004) and London (2005). Recently, more attacks are taking the form of small scale attacks with the use of knives, small caliber weapons, and bombs that can be made “in the kitchen of your mom.”  (U) Between 11 and 19 Mar 12, three French soldiers, as well as three Jewish children and a Jewish rabbi were killed by the same gunman in the towns of Toulouse and Montauban in southern France. The shooter, reportedly radicalized in prison, was said to have conducted the attacks in retaliation for France’s involvement in Afghanistan, its ruling on the wear of the burqa, and his anti-Semitic views. He was subsequently killed by a police sniper following a several hour standoff.8  (U) On 22 May 13, two al Qa’ida inspired males targeted and attacked a British soldier with knives and a meat cleaver in Woolwich in the southeast area of London, United Kingdom. The British soldier presented a target of opportunity as he walked down the street. He was attacked in broad daylight within 400 meters of the Royal Artillery barracks. Prior to being confronted and detained by police one attacker was videotaped stating the attack was “an eye for an eye, a tooth for a tooth.”9  (U) On 24 May 13, a French soldier was stabbed from behind in the neck while conducting a group patrol as part of a national protection program. At the time, the French Government did not want the country to jump to any conclusions given that this incident occurred with days of the Woolwich attack. The attacker in this incident was not caught and his motivations are unknown.10  (U) On 15 Apr 13, two brothers detonated two pressure cooker bombs along the final stretch of the Boston Marathon killing three and wounding 250. A manhunt ensued resulting in the death of one suspect and the capture of the other. Resultant investigations determined that the brothers used detailed instructions cited in an online al Qa’ida in the Arabian Peninsula magazine titled Inspire.11  (U) On 19 Sep 14, Australian federal and state police raided more than a dozen properties across Sydney and Brisbane foiling an ISIL plot to conduct beheadings in Australia. ISIL-affiliated members in Australia planned on videotaping the beheadings and sending the footage to ISIL media service in Iraq and Syria to disseminate via social media sites for propaganda purposes.12 (U) Potential Indicators of Attack Planning13 (U//FOUO) Historically, terrorists engage in substantial, long term, and detailed planning; however, despite the indicators typically associated with pre-operational surveillance or attack planning only a handful of terrorist plots have been disrupted over the years. Based on the ongoing encouragement of HVEs and lone offenders by jihadists it is possible that long term planning may be abbreviated to conduct an attack with little or no warning. It is during this period that observant law enforcement or by-standers may identify some kind of rudimentary pre-operational activity. Possible indicators of pre- operational surveillance or attack planning include:  (U) Unusual interest in sensitive information about security measures, personnel, entry points, peak days/hours of operation, and access controls such as alarms or locks  (U) Engaging in overtly suspicious actions to provoke and observe responses by public safety personnel  (U) Discreet use of cameras or video recorders, sketching, or note-taking consistent with surveillance  (U) Observation of, or questions about facility air conditioning, heating, and ventilation systems  (U) Repeated visits by the same subjects, including attempts to disguise appearance from visit to visit  (U) Attempted or unauthorized access to rooftops or other sensitive areas  (U) Observation of or unusual questions about security measures, such as staffing, barriers, restricted areas, cameras, and intrusion detection systems  (U) Multiple false alarms or fictitious emergency calls to the same locations or similar venues  (U) Unusual interest in speaking with building maintenance personnel  (U) Observation of security reaction drills or procedures
  • 3. UNCLASSIFIED//FOR OFFICIAL USE ONLY UNCLASSIFIED//FOR OFFICIAL USE ONLY 3  (U) Attention to or avoidance of surveillance cameras  (U//FOUO) Garments not appropriate for weather/seasons (U//FOUO) Each indicator may occur singularly, under the guise of lawful conduct or behavior, and may even be considered a constitutional exercise of rights and freedoms as guaranteed by the US Constitution. Suspicious indicators may also be explained or downgraded by would-be perpetrators with explanations that paint their activities as innocent and unplanned. For this reason, no single indicator should be used as the sole basis for law enforcement action; instead, the totality of observed indicators, behaviors, circumstances and details should be evaluated when considering any law enforcement response or action. (U) Social Media Precautions14 15 (U) Think before you post. Always assume everyone in the world will be able to see what you are posting, or tweeting, even if the site limits your posts to your friends and family.  (U) Limit who can view your social media sites; but do not trust these settings as absolute  (U) Avoid posting your home or work address and phone numbers; and any government or military affiliation  (U) Avoid providing detailed accounts of your day (e.g., when you leave for or return from work)  (U) Never allow applications to geolocate your location (U) Physical/Home Security Precautions16 (U) While most of these measures are primarily geared toward home burglaries, when implemented these same measures can help prevent an individual from conducting an attack while you or your family members are home.  (U) Always lock doors, windows and garages  (U) Make sure home entrances are well-lighted, and minimize bushes where intruders can hide before their ambush  (U) Use the peephole before opening the door to anyone  (U) Don't use the chain latch to open the door part-way  (U) Don't open the door to solicitors or strangers  (U) Install solid-core doors, heavy-duty locks and window security systems  (U) Establish a safehaven  (U) Hold a family meeting to work out home security plans (U) Conclusion (U//FOUO) The ARTIC reminds that it is imperative to be aware of your surroundings and report all suspicious activity to the appropriate authorities; report criminal threat information and suspicious activity to local law enforcement authorities and your chain of command; report Counterintelligence (CI) information by calling 1-800-CALL-SPY or use the online CI incident report link (iSALUTE) within AKO at https://www.inscom.army.mil/isalute/. The ARTIC, CIOC, and ACIC-FPTAB welcome your comments and suggestions. Please help us to create a better product by providing your feedback. FEEDBACK NSTS (Secure): 960-1709 TSVOIP: 984-5527 24/7: (703) 695-5300 DSN: (312) 225-5300 ARTIC Commercial (STE): (703) 697-8647 ARTIC NIPR Email: usarmy.pentagon.hqda-dcs-g-2.list.dami-artic@mail.mil SIPR Email: usarmy.pentagon.hqda-dcs-g-2.list.dami-ARTIC @mail.smil.mil NIPR Portal: https://west.esps.disa.mil/army/sites/APP/OPMG/OPS/antiterror/ARTIC SIPR Portal: http://army.daiis.mi.army.smil.mil/org/ARTIC USACIDC-CIOC NIPR Email: usarmy.belvoir.usacidc.mbx.watch-analytical-center@mail.mil This product supports Campaign Objective 4.0, Support Global Operations with Ready Land Power; and Major Objective 4-4, Protect the Army. Derived From: Multiple Sources
  • 4. UNCLASSIFIED//FOR OFFICIAL USE ONLY UNCLASSIFIED//FOR OFFICIAL USE ONLY 4 1 (U//FOUO) DHS/FBI, Joint Intelligence Bulletin, 23 SEP 14 2 Ibid 3 (U) Reuters, http://reut.rs/1mqNFDs, 22 SEP 14 4 (U) Fox News, http://fxn.ws/1pk1mim, 18 SEP 14 5 (U) Washington Times, http://bit.ly/1ryZb1G, 26 AUG 14 6 (U) Time, http://ti.me/1mpO9cM, 22 SEP 14 7 (U) Breitbart, http://bit.ly/1rtHXkJ, 22 AUG 14 8 (U) ABC News, http://bit.ly/1sXQfh2, 22 MAR 12 9 (U) The Guardian, http://bit.ly/1hBbajC, 22 MAY 13 10 (U) Reuters, http://reut.rs/1tZeu2J, 25 MAY 13 11 (U) The Boston Globe, http://bit.ly/18Pjtsq, 2014 12 (U) ABC News, http://abcn.ws/1mhg4eW, 19 SEP 14 13 (U) DHS, http://bit.ly/1sXPUuO, JUL 12 14 (U) GFI Blog, http://bit.ly/ZdkhGy, 23 JUN 10 15 (U) McAfee Blog, http://bit.ly/1vbSykd, 13 JUL 11 16 (U) State Department, http://1.usa.gov/1hW81OD, n.d.