Emergency Management and Response - Information Sharing and Analysis Center

InfoGram 41-09: October 15, 2009

This page may contain links to non-U.S. government websites. What this means to you »

This InfoGram will be distributed weekly to provide members of the Emergency Services Sector with information concerning the protection of their critical infrastructures. For further information, contact the Emergency Management and Response - Information Sharing and Analysis Center (EMR-ISAC) at (301) 447-1325 or by email at emr-isac@fema.dhs.gov.

Receive InfoGrams and Bulletins by Email

“8 Signs of Terrorism” includes Surveillance

The Emergency Management and Response—Information Sharing and Analysis Center (EMR-ISAC) noted that Emergency Services Sector (ESS) departments and agencies continue to notify law enforcement officials of suspected surveillance of their facilities or operations. This fact motivated a look at the video “8 Signs of Terrorism,” produced through a partnership between the Colorado Office of Homeland Security, the Colorado Department of Agriculture, the Colorado Information Analysis Center, and the Center of Empowered Living and Learning under the Department of Homeland Security (DHS) Grant Program.

In the DHS October 6, 2009 press release, DHS Secretary Janet Napolitano stated: “The vigilance of individual citizens is critical to protection our country from the treat of terrorism. The video provides essential information on how to identify the warning signs and emphasizes the vital role of such assistance in state and local law enforcement’s counterterrorism efforts.”

The eight signs that indicate possible terrorism planning are as follows:

The EMR-ISAC also reviewed “Using 911 Calls to Detect Terrorism Threats” (PDF, 529.2 Kb) by the National Institute of Justice, which states that terrorists frequently engage in surveillance activities when selecting a target and planning an attack. This document explains that pre-attack surveillance can include videotaping, photographing, or taking notes about or drawing sketches of a building’s structural components or security defenses. Other activities might involve asking questions seeking details about a target’s occupants or defenses, or leaving suspicious packages or making bomb threats to study emergency response procedures.

Landslides

Wildland fires leave large amounts of scorched and barren land. When heavy rains follow a fire, other natural disasters can occur including landslides, mudflows, and floods. Once ground cover has been burned away, little is left to hold soil in place on steep slopes and hillsides. Considering recent heavy rains and mudslides in California, the Emergency Management and Response—Information Sharing and Analysis Center (EMR-ISAC) researched landslide hazards.

According to United States Geological Survey (USGS) landslide hazards fact sheet (PDF, 540.4 Kb), landslide hazards include fast-moving debris flows or slow-moving landslides. Debris flows triggered by intense rainfall are one of the most dangerous post-fire hazards because they tend to occur with little warning. The Landslides Hazards-A National Threat (PDF, 2.2 Mb) document states that landslides often accompany earthquakes, floods, storm surges, hurricanes, wildfires, or volcanic activity. They are often more damaging and deadly than the triggering event.

Areas that are generally prone to landslides include the following:

The following are features that might be noticed prior to a major landslide:

Additional information can be seen at the USGS Website.

Next Generation 9-1-1 Procurement Tool Kit

The Emergency Management and Response—Information Sharing and Analysis Center (EMR-ISAC) learned that the U.S. Department of Transportation (USDOT) released the Next Generation (NG) 9-1-1 Tool Kit (PDF, 1.2 Mb). According to the 30 September press release, the tool kit is a collection of resources to assist agencies as they transition from today’s 9-1-1 systems to NG9-1-1. The tool kit is to provide guidance in developing procurement specifications for transition services and network equipment.

The NG9-1-1 system will enhance 9-1-1 service to the public, allowing callers to request emergency assistance by sending text, images, and video (in addition to voice) from several different kinds of access networks and communications devices using open standards.

The tool kit states that it has four parts, and while mostly independent of one another, each is designed to support an iterative process building on the previous part. The tool kit includes the following sections:

Computer-Forensics Tool

Microsoft has teamed up with the national White Collar Crime Center (NW3C) to distribute a computer-forensics tool to law enforcement for free. The Emergency Management and Response—Information Sharing and Analysis Center (EMR-ISAC) learned that the Computer Online Forensic Evidence Extractor (COFEE) makes it easy for an officer to record the current processes of a suspect’s computer.

Microsoft states that COFEE brings together a number of common digital forensics capabilities into a fast, easy-to-use, automated tool for first responders. By inserting a USB device into the computer, volatile live evidence can be collected. The fully customizable tool allows officers to run more than 150 commands on a live computer system at the scene. It also provides reports in a simple format for later interpretation by experts or as supportive evidence for subsequent investigation and prosecution. In addition, Microsoft states that COFEE can be tailored to effectively meet the needs of a particular investigation.

COFEE is available to individuals employed by law enforcement agencies within the United States and Canada. More information is available at cofee.nw3c.org.

Disclaimer of Endorsement

The U.S. Fire Administration/EMR-ISAC does not endorse the organizations sponsoring linked websites, and does not endorse the views they express or the products/services they offer.

Fair Use Notice

This INFOGRAM may contain copyrighted material that was not specifically authorized by the copyright owner. EMR-ISAC personnel believe this constitutes "fair use" of copyrighted material as provided for in section 107 of the U.S. Copyright Law. If you wish to use copyrighted material contained within this document for your own purposes that go beyond "fair use," you must obtain permission from the copyright owner.

Reporting Notice

DHS and the FBI encourage recipients of this document to report information concerning suspicious or criminal activity to DHS and/or the FBI. The DHS National Operation Center (NOC) can be reached by telephone at 202-282-9685 or by email at NOC.Fusion@dhs.gov.

The FBI regional phone numbers can be found online at www.fbi.gov/contact/fo/fo.htm

For information affecting the private sector and critical infrastructure, contact the National Infrastructure Coordinating Center (NICC), a sub-element of the NOC. The NICC can be reached by telephone at 202-282-9201 or by email at NICC@dhs.gov.

When available, each report submitted should include the date, time, location, type of activity, number of people and type of equipment used for the activity, the name of the submitting company or organization, and a designated point of contact.

RSS FeedWeekly INFOGRAM's are now available as an RSS Feed. More Information »