Alternative Media Sources

Public Intelligence

  1. Doctrine of Information Security of the Russian Federation December 2016
    APPROVED by Decree of the President of the Russian Federation No. 646 of December 5, 2016   Doctrine of Information Security of the Russian Federation I. General Provisions This Doctrine constitutes a system of official views on ensuring the national…

    Read more →

  2. Information Security Doctrine of the Russian Federation September 2000
    The Information Security Doctrine of the Russian Federation represents a totality of official views on the goals, objectives, principles and basic guidelines for ensuring information security in the Russian Federation.

    Read more →

  3. DHS-FBI-NCTC Bulletin: Complex Operating Environment Food and Agriculture
    Food and agriculture infrastructure is a $1 trillion industry, almost entirely under private ownership and comprises an estimated 2.1 million farms, 935,000 restaurants, and more than 200,000 registered food manufacturing, processing, and storage facilities. Intentional contamination of the food supply could have significant public health and economic consequences depending on the commodity, the agent used, and where in the supply chain the contaminant was added. This product provides first responders and private-sector stakeholders an awareness of the complex operating environment that may result from intentional contamination of the food supply and identifies key collaborative partners and indicators to minimize the risk of an intentional attack on the food supply.

    Read more →

  4. Bureau of Justice Assistance Real-Time and Open Source Analysis Resource Guide
    Open source platforms can be used by criminals to instigate or conduct illegal activity and by terrorists to recruit and encourage new members, disseminate violent extremist messaging through video or documents, coordinate activities, and claim responsibility for attacks around the world. As such, law enforcement and analytic personnel should understand the uses of social media and be aware of social media tools that can be used to document criminal and terrorist activity. A wide variety of open source analysis tools—both no-cost and paid—is available to public and private sector organizations, including law enforcement and analytic personnel, and the technology continues to evolve. ROSA tools that access only publicly available information and are capable of searching multiple platforms simultaneously are assets for maximizing efficiency during authorized uses by law enforcement and analytic personnel.

    Read more →

  5. (U//FOUO) DHS Assessment: Foreign Terrorist Organization-Inspired Vehicle-Ramming Attacks
    assesses the increase in the number of vehicle-ramming attacks since January 2016 indicates Foreign Terrorist Organization (FTO) messaging efforts are probably resonating with violent extremists and will most likely continue in the near term. FTO-inspired violent extremists will probably continue to plan and engage in vehicle-ramming attacks against Western-based mass gathering and public venues since this tactic often requires minimal training, expertise, and preoperational planning. Since January 2016, eight FTO-inspired vehicle-ramming attacks have occurred in Western countries. OCIA identified three common characteristics among these attacks: targeting of public venues or mass gatherings; use of secondary weapons; and lack of observable indicators immediately before the attack.

    Read more →

If you like the information I provide, please donate to help ensure this site and podcast will continue. Thank You!
761007
Today
Yesterday
This Week
This Month
Total
234
952
2636
9199
761007

Your IP: 54.145.124.143
Server Time: 2017-11-18 10:35:34