Advertisement
Nottojudge1

DHS Analyst's Desktop Binder

May 26th, 2012
2,483
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 85.47 KB | None | 0 0
  1. Analyst's
  2. Desktop Binder
  3.  
  4.  
  5.  
  6. Department of Homeland Security
  7. National Operations Center
  8. Media Monitoring Capability
  9. Desktop Reference Binder
  10.  
  11.  
  12.  
  13. 2011
  14.  
  15.  
  16.  
  17. Analyst's Desktop Binder 2011
  18.  
  19.  
  20.  
  21. Contents
  22.  
  23. 1 Media Monitoring Capability Mission & Reporting Parameters: 4
  24.  
  25. 1.1 MMC Mission 4
  26.  
  27. 1.1.1 Leverage Operationally Relevant Data 4
  28.  
  29. 1.1.2 Support NOC in Identifying Relevant Operational Media 4
  30.  
  31. 1.1.3 Increase Situational Awareness of the DHS Secretary 5
  32.  
  33. 1.2 Critical Information Requirements 5
  34.  
  35. 1.3 Item of Interest Categorization 5
  36.  
  37. 1.4 Department of Homeland Security (DHS) Component Agencies 7
  38.  
  39. 1.5 DHS National Operations Center (NOC) Phases of Reporting 8
  40.  
  41. 1.5.1 NOC Notes 8
  42.  
  43. 1.5.2 Steady States 8
  44.  
  45. 1.5.3 National and International Situation Summary Updates 8
  46.  
  47. 1.5.4 Events of High Media Interest of International Significance 9
  48.  
  49. 1.5.5 NOC Numbered Items 9
  50.  
  51. 2 Items of Interest (101): 10
  52.  
  53. 2.1 Incidents that Warrant an 101 10
  54.  
  55. 2.2 101 Severity Chart 10
  56.  
  57. 2.3 Notification of MMC Management 11
  58.  
  59. 2.4 Critical Information Requirements 12
  60.  
  61. 2.5 101 Categorization 12
  62.  
  63. 2.6 Credible Sources for Corroboration 14
  64.  
  65. 2.7 Sourcing 101s 15
  66.  
  67. 2.8 101 Distribution Lists 15
  68.  
  69. 2.9 Creating 101s (Traditional Media Application) 15
  70.  
  71. 2.10 Creating 101s (Social Media Application) 17
  72.  
  73. 2.11 Outlook Back-Up Procedure 18
  74.  
  75. 2.12 Correction Notices 19
  76.  
  77. 2.13 Key Words & Search Terms 20
  78.  
  79. 3 Personally Identifiable Information (Pll) Guidance: 24
  80.  
  81. 3.1 Effective: January 7, 2011 25
  82.  
  83. 4 Operational Summary Guidance: 26
  84.  
  85. 2
  86.  
  87.  
  88.  
  89. Analyst's Desktop Binder 2011
  90.  
  91.  
  92.  
  93. 1.1.1. Operational Summary (OPSUM) Format: 26
  94.  
  95. 5 Retrieving NOC Priorities from Homeland Security Information Network (HSIN): 29
  96.  
  97. 1.1.2. NOC Priorities (HSIN Retrieval) 29
  98.  
  99. 6 Audio Video System: 33
  100.  
  101. 6.1 Direct TV Full Channel List 33
  102.  
  103. 6.2 Direct TV Account Information 33
  104.  
  105. 6.3 Online Audio-Video Switch 33
  106.  
  107. 7 HSIN jgjjjjgj Connection Instructions: 35
  108.  
  109. 8 Usernames, Passwords & Contact Information: 38
  110.  
  111. 8.1 Passwords 38
  112.  
  113. MMCWifi Network: 38
  114.  
  115. MMC Telephones: 38
  116.  
  117. Desktops & Apple Mac Mini: 38
  118.  
  119. Shared Drives: 38
  120.  
  121. MMC DHS Email (Back Up) 38
  122.  
  123. Video Switch: 38
  124.  
  125. Twitter/ Tweet Deck: 38
  126.  
  127. 8.2 TSI Senior Reviewers 39
  128.  
  129. TheSWO/KMO: 39
  130.  
  131. HSIN Help Desk: 39
  132.  
  133. TSI Senior Reviewers: 39
  134.  
  135.  
  136.  
  137. Analyst's Desktop Binder 2011
  138.  
  139.  
  140.  
  141. 1 Media Monitoring Capability Mission & Reporting Parameters:
  142.  
  143. 1.1 MMC Mission
  144.  
  145. The MMC has three primary missions:
  146.  
  147. • First - to continually update existing National Situation Summaries (NSS) and International
  148. Situation Summaries (ISS) with the most recent, relevant, and actionable open source media
  149. information
  150.  
  151. • Second - to constantly monitor all available open source information with the goal of
  152. expeditiously alerting the NOC Watch Team and other key Department personnel of emergent
  153. situations
  154.  
  155. • Third - to receive, process, and distribute media captured by DHS Situational Awareness Teams
  156. (DSAT) or other streaming media available to the NOC such as Northern Command's
  157. (NORTHCOM) Full Motion Video (FMV) and via open sources
  158.  
  159. These three missions are accomplished by employing various tools, services, and procedures that
  160. are described in detail in this document. Expanded upon, these primary missions have three key
  161. components:
  162.  
  163. 1.1.1 Leverage Operationally Relevant Data
  164.  
  165. Leveraging news stories, media reports and postings on social media sites concerning Homeland
  166. Security, Emergency Management, and National Health for operationally relevant data,
  167. information, analysis, and imagery is the first mission component. The traditional and social
  168. media teams review a story or posting from every direction and interest, utilizing thousands of
  169. reporters, sources, still/video cameramen, analysts, bloggers and ordinary individuals on scene.
  170. Traditional Media outlets provide unmatched insight into the depth and breadth of the situation,
  171. worsening issues, federal preparations, response activities, and critical timelines. At the same
  172. time, Social Media outlets provide instant feedback and alert capabilities to rapidly changing or
  173. newly occurring situations. The MMC works to summarize the extensive information from these
  174. resources to provide a well rounded operational picture for the Department of Homeland
  175. Security.
  176.  
  177. 1.1.2 Support NOC in Identifying Relevant Operational Media
  178.  
  179. Supporting the NOC by ensuring they have a timely appreciation for evolving Homeland
  180. Security news stories and media reports of interest to the public and DHS/other federal agencies
  181. involved in preparations and response activities is the second key component. DHS and other
  182. federal agencies conducting joint operations may be affected by other evolving situations in that
  183. area. These situations may be related; have a cause and effect relationship; or be unrelated but
  184. have a detrimental effect. Through coordination with the NOC Duty Director (NDD), Senior
  185. Watch Officer (SWO) the MMC works to ensure the NOC Watch Team is aware of such stories
  186. and news events and has time to analyze any effect on operations.
  187.  
  188.  
  189.  
  190. Timely reporting of current information is an integral element in maintaining complete
  191. operational awareness by Homeland Security Personnel. The MMC understand it is vital that
  192.  
  193.  
  194.  
  195. Analyst's Desktop Binder 2011
  196.  
  197.  
  198.  
  199. critical information is relayed to key Department decision makers in as expeditious a manner as
  200. possible.
  201.  
  202. 1.1.3 Increase Situational Awareness of the DHS Secretary
  203.  
  204. Mitigating the likelihood that the Secretary and DHS Executive staffs are unaware of a breaking
  205. Homeland Security news story or media report is the third component. The Secretary and executive staff
  206. members are subject to press questions regarding domestic and international events and may or may not
  207. be informed of the most current media coverage. The MMC understands critical information
  208. requirements and monitors news coverage with the perspective of how the breaking story may be related
  209. to current and other important ongoing situations and DHS activities.
  210.  
  211. The on-duty MMC analyst alerts DHS personnel and related federal agencies of updated news stories
  212. through distributed Items of Interest (see section 3.9.6). Recognizing that local media coverage is
  213. potentially sensationalizing an incident, the MMC strives to comprehend the media's message and
  214. identify sensitive situations that must be brought to the attention of the Secretary.
  215.  
  216. 1.2 Critical Information Requirements
  217.  
  218. The attribution of IOIs by CIR allows the MMC to catalog articles into five specific categories depending
  219. on the potential impact or type of article that is being distributed. These CIRs include:
  220.  
  221. 1) Potential Threat to DHS, other federal, and state/ local response units, facilities,
  222. and resources.
  223.  
  224. 2) Potential impact on DHS capability to accomplish the HSPD-5 mission
  225.  
  226. 3) Identifying events with operational value. . .corroborating critical information
  227.  
  228. 4) Identifying media reports that reflect adversely on DHS and response activities
  229.  
  230. 5) Standing HSC planning scenarios
  231.  
  232. 1.3 Item of Interest Categorization
  233.  
  234. The categorization of IOIs in the daily log allows analysts to track the types of articles that are
  235. distributed as they relate to 14 characterizations. These include:
  236.  
  237. 1) Terrorism: Includes media reports on the activities of terrorist organizations
  238. both in the United States as well as abroad. This category will also cover media
  239. articles that report on the threats, media releases by al Qaeda and other
  240. organizations, killing, capture, and identification of terror leaders and/or cells.
  241.  
  242. 2) Weather/Natural Disasters/Emergency Management: Includes media reports
  243. on emergency and disaster management related issues. Reports include
  244. hurricanes, tornadoes, flooding, earthquakes, winter weather, etc. (all hazards).
  245. Reports will outline the tracking of weather systems, reports on response and
  246. recovery operations, as well as the damage, costs, and effects associated with
  247. emergencies and disasters by area. Will also include articles regarding requests
  248. for resources, disaster proclamations, and requests for assistance at the local,
  249. state, and federal levels.
  250.  
  251. 3) Fire: Includes reports on the ignition, spread, response, and containment of
  252. wildfires/industrial fires/explosions regardless of source.
  253.  
  254. 4) Trafficking/Border Control Issues: Includes reports on the trafficking of
  255. narcotics, people, weapons, and goods into and out of the United States of an
  256.  
  257.  
  258.  
  259. Analyst's Desktop Binder 2011
  260.  
  261.  
  262.  
  263. exceptional level. Reports will also include articles outlining the strategy changes
  264. by Agencies involved in the interdiction of the items outlined above.
  265.  
  266. 5) Immigration: Includes reports on the apprehension of illegal immigrants, policy
  267. changes with regard to immigration in the United States, and border control
  268. issues.
  269.  
  270. 6) HAZMAT: Includes reports on the discharge of chemical, biological, and
  271. radiological hazardous materials as well as security and procedural incidents at
  272. nuclear facilities around the world, and potential threats toward nuclear facilities
  273. in the United States. Also included under this category will be reports and
  274. response to suspicious powder and chemical or biological agents.
  275.  
  276. 7) Nuclear: To include reports on international nuclear developments, attempts to
  277. obtain nuclear materials by terrorist organizations, and stateside occurrences such
  278. as melt downs, the mismanagement of nuclear weapons, releases of radioactive
  279. materials, illegal transport of nuclear materials, obtaining of weapons by terrorist
  280. organizations, and breaches in nuclear security protocol.
  281.  
  282. 8) Transportation Security: To include reports on security breaches, airport
  283. procedures, and other transportation related issues, and any of the above issues
  284. that affect transportation. Reports will include threats toward and incidents
  285. involving rail, air, road, and water transit in the United States.
  286.  
  287. 9) Infrastructure: Reports on national infrastructure including key assets and
  288. technical structures. Reports will include articles related to failures or attacks on
  289. transportation networks, telecommunications/ internet networks, energy grids,
  290. utilities, finance, domestic food and agriculture, government facilities, and public
  291. health, as well as those listed above.
  292.  
  293. 10) National/International Security: Includes reports on threats or actions taken
  294. against United States national interests both at home and abroad. Reports would
  295. include articles related to threats against American citizens, political figures,
  296. military installations, embassies, consulates, as well as efforts taken by local,
  297. state, and federal agencies to secure the homeland. Articles involving intelligence
  298. will also be included in this category.
  299.  
  300. 11) Health Concerns, National/International: Includes articles on national and
  301. international outbreaks of infectious diseases and recalls of food or other items
  302. deemed dangerous to the public health.
  303.  
  304. 12) Public Safety: Includes reports on public safety incidents, building lockdowns,
  305. bomb threats, mass shootings, and building evacuations.
  306.  
  307. 13) Reports on DHS, Components, and other Federal Agencies: Includes both
  308. positive and negative reports on FEMA, CIS, CBP, ICE, etc. as well as
  309. organizations outside of DHS.
  310.  
  311. 14) Cyber Security: Reports on cyber security matters that could have a national
  312. impact on other CIR Categories; internet trends affecting DHS missions such as
  313. cyber attacks, computer viruses; computer tools and techniques that could thwart
  314. local, state and federal law enforcement; use of IT and the internet for terrorism,
  315. crime or drug-trafficking; and Emergency Management use of social media
  316. strategies and tools that aid or affect communications and management of crises.
  317.  
  318.  
  319.  
  320. Analyst's Desktop Binder 2011
  321.  
  322.  
  323.  
  324. 1.4 Department of Homeland Security (DHS) Component Agencies
  325.  
  326. The Directorate for National Protection and Programs works to advance the Department's
  327. risk-reduction mission. Reducing risk requires an integrated approach that encompasses both
  328. physical and virtual threats and their associated human elements.
  329.  
  330. The Directorate for Science and Technology is the primary research and development arm of
  331. the Department. It provides federal, state and local officials with the technology and capabilities
  332. to protect the homeland.
  333.  
  334. The Directorate for Management is responsible for Department budgets and appropriations,
  335. expenditure of funds, accounting and finance, procurement; human resources, information
  336. technology systems, facilities and equipment, and the identification and tracking of performance
  337. measurements.
  338.  
  339. The Office of Policy is the primary policy formulation and coordination component for the
  340. Department of Homeland Security. It provides a centralized, coordinated focus to the
  341. development of Department-wide, long-range planning to protect the United States.
  342.  
  343. The Office of Health Affairs coordinates all medical activities of the Department of Homeland
  344. Security to ensure appropriate preparation for and response to incidents having medical
  345. significance.
  346.  
  347. The Office of Intelligence and Analysis is responsible for using information and intelligence
  348. from multiple sources to identify and assess current and future threats to the United States.
  349.  
  350. The Office of Operations Coordination and Planning is responsible for monitoring the
  351. security of the United States on a daily basis and coordinating activities within the Department
  352. and with governors, Homeland Security Advisors, law enforcement partners, and critical
  353. infrastructure operators in all 50 states and more than 50 major urban areas nationwide.
  354.  
  355. The Federal Law Enforcement Training Center provides career-long training to law
  356. enforcement professionals to help them fulfill their responsibilities safely and proficiently.
  357.  
  358. The Domestic Nuclear Detection Office works to enhance the nuclear detection efforts of
  359. federal, state, territorial, tribal, and local governments, and the private sector and to ensure a
  360. coordinated response to such threats.
  361.  
  362. The Transportation Security Administration (TSA) protects the nation's transportation
  363. systems to ensure freedom of movement for people and commerce.
  364.  
  365. United States Customs and Border Protection (CBP) is one of the Department of Homeland
  366. Security's largest and most complex components, with a priority mission of keeping terrorists
  367. and their weapons out of the U.S. It also has a responsibility for securing and facilitating trade
  368. and travel while enforcing hundreds of U.S. regulations, including immigration and drug laws.
  369.  
  370.  
  371.  
  372. Analyst's Desktop Binder 2011
  373.  
  374.  
  375.  
  376. United States Citizenship and Immigration Services secures America's promise as a nation of
  377. immigrants by providing accurate and useful information to our customers, granting immigration
  378. and citizenship benefits, promoting an awareness and understanding of citizenship, and ensuring
  379. the integrity of our immigration system.
  380.  
  381. United States Immigration and Customs Enforcement (ICE), promotes homeland security
  382. and public safety through the criminal and civil enforcement of federal laws governing border
  383. control, customs, trade, and immigration.
  384.  
  385. The United States Coast Guard is one of the five armed forces of the United States and the
  386. only military organization within the Department of Homeland Security. The Coast Guard
  387. protects the maritime economy and the environment, defends our maritime borders, and saves
  388. those in peril.
  389.  
  390. The Federal Emergency Management Agency (FEMA) supports our citizens and first
  391. responders to ensure that as a nation we work together to build, sustain, and improve our
  392. capability to prepare for, protect against, respond to, recover from, and mitigate all hazards.
  393.  
  394. The United States Secret Service (USSS) safeguards the nation's financial infrastructure and
  395. payment systems to preserve the integrity of the economy, and protects national leaders, visiting
  396. heads of state and government, designated sites, and National Special Security Events.
  397.  
  398. 1.5 DHS National Operations Center (NOC) Phases of Reporting
  399.  
  400. 1.5.1 NOC Notes
  401.  
  402. NOC Notes are produced by the NOC whenever there is a situation that could potentially require
  403. federal assets such as personnel, equipment, or funding. In such cases, this would be an ongoing
  404. event and NOC-assigned number will be used for labeling and monitoring the situation (MMC
  405. will get notice via blast call, email, or pager). These IOIs have higher precedence over regular
  406. IOIs, but could either develop into a Steady State or become resolved rather quickly. These do
  407. not get added to the COP (only NSSs/ISSs), but the MMC will continue to publish IOIs on the
  408. event until the NOC determines that the situation has been resolved.
  409.  
  410. 1.5.2 Steady States
  411.  
  412. Steady States are IOI's that have a higher precedence over general IOIs or NOC Notes (many
  413. Steady States are produced as a result of a NOC Note), but are not quite as relevant as NSSs or
  414. ISSs. Each of these covers a singular event continuously and could upgrade to an NSS or ISS
  415. item over a period of time depending on the situation. These do not get added to the COP, but
  416. the NOC and the MMC will continue to monitor such IOIs until the event has been resolved.
  417.  
  418. 1.5.3 National and International Situation Summary Updates
  419.  
  420. Distributed National Situation Summary (NSS) Updates or International Situation Summary
  421. (ISS) updates are formatted in the same manner as all other types of IOIs, but are utilized to
  422. provide supplemental information for COP updates to active NSS/ISSs. These reports provide
  423.  
  424.  
  425.  
  426. Analyst's Desktop Binder 2011
  427.  
  428.  
  429.  
  430. the NOC Watch Team with a summary of media reports on a particular NSS/ISS and to increase
  431. the overall situational awareness of the NOC. The NSS/ISS updates include a brief synopsis of
  432. the incident's latest developments, an overview of broadcast television media coverage, and a
  433. summary of print news media coverage.
  434.  
  435. For loading NSS/ISS updates to the COP, please refer to COP posting information beginning in
  436. Section 4.1.2, Media Monitoring User Page. Figure 7 is an example of the format for NSS/ISS
  437. updates.
  438.  
  439. 1.5.4 Events of High Media Interest of International Significance
  440.  
  441. Periodically, there are events that the NOC constantly monitors - both national and international
  442. - and are listed on the NOC Priorities and Monitoring Report (Section 3.9.23, National
  443. Operations Center Priorities and Monitoring Report). The MMC will monitor such events to see
  444. if an IOI is warranted. Usually these events will be included in the OPSUM even though they
  445. may not seem to be a high priority for the NOC, and in this case, would simply be used to
  446. enhance situational awareness. Some of these events may be issued an NOC-assigned number
  447. and in this case, the MMC will publish IOIs in the same manner as it would for NOC Notes,
  448. Steady States, or NSSs/ISSs. These do not get added to the COP unless the NOC directs the
  449. MMC to do so.
  450.  
  451. 1.5.5 NOC Numbered Items
  452.  
  453. On occasion, the NDD/SWO will determine that an incident is worth tracking; however it may
  454. not be substantial enough to warrant the generation of a higher level report, such as a NOC Note,
  455. Steady State or Phase Report.
  456.  
  457. NOC Numbers may be utilized for any type of incident, and usually follow the [NOC #0000-00:
  458. Incident Title] format. However, if an incident falls under the Public Safety or Suspicious
  459. Activity category, the NOC may issue an item in the [NOC #0000-00-000: Incident Title]
  460. format. In those cases, incidents will be issued one of the following NOC Numbers, with the
  461. addition of a 3-digit tracking number at the end:
  462.  
  463. • NOC #0012-11: Suspicious Activity - Chemical, Biological, Radiological, Nuclear or
  464. Explosive (CBRNE): covering any suspicious incident which may involve a CBRNE or
  465. CBRNE threat.
  466.  
  467. • NOC #0013-11: Suspicious Activity: Covers any suspicious incident which does not
  468. involve a CBRNE
  469.  
  470. • NOC #0014-11: Public Safety/Unusual Activity: Covers any incident that is not
  471. suspicious in nature, but needs further information or tracking
  472.  
  473. Example: NOC 0012-11-295 [Suspicious Powder, Anchorage, AK]
  474.  
  475. If included on the NOC Priorities list for the day, these incidents will be summarized in the
  476. OPSUM.
  477.  
  478.  
  479.  
  480. Analyst's Desktop Binder 2011
  481.  
  482.  
  483.  
  484. 2 Items of Interest (IOI):
  485.  
  486. MMC coverage focuses primarily on providing information on incidents of national significance,
  487. which are usually defined as catastrophic events that result in wide-scale damage or disruption to
  488. the nation's critical infrastructure, key assets, or the Nation's health; and require a coordinated
  489. and effective response by Federal, State, and Local entities. For the most part, coverage of
  490. international incidents is limited to that of terrorist activities and infectious diseases that impact a
  491. wide population of humans or animal stock, such as mad cow disease or H5N1, and catastrophic
  492. weather events around the globe (Category 5 Hurricanes, Tsunami, and Large Magnitude
  493. Earthquakes). An Item of Interest (IOI) is generated whenever an MMC search or alert produces
  494. information about an emergent incident that should be brought to the attention of the NOC.
  495.  
  496. Note - Reports that pertain to DHS and sub agencies - especially those that have a negative spin
  497. on DHS/Component preparation, planning, and response activities should be reported to
  498. management before being sent to the distribution list. Senior TSI personnel will decide whether
  499. the information should be reported through normal channels. If there are ANY questions about
  500. whether an incident or other reported item is a valid IOI article check with management.
  501.  
  502. 2.1 Incidents that Warrant an IOI
  503.  
  504. Terrorist incidents (including foreign countries)
  505.  
  506. Major natural disasters (e.g., floods, tornadoes, earthquakes)
  507.  
  508. Transportation incidents where major bottlenecks may occur or chemical/explosive
  509.  
  510. hazards exist
  511.  
  512. Incidents that could result in injury to a local population (e.g., fire at a chemical
  513.  
  514. production facility releasing toxic fumes)
  515.  
  516. Incidents that result in damage to critical infrastructure
  517.  
  518. • Safety issues (e.g., aircraft emergency)
  519.  
  520. • Certain crimes (e.g., snipers, mall/school shootings, major drug busts, illegal
  521. immigrant busts, etc).
  522.  
  523. • Policy directives, debates, and implementations related to DHS
  524.  
  525.  
  526.  
  527.  
  528.  
  529.  
  530. 2.2 IOI Severity Chart
  531.  
  532. The Item of Interest (IOI) Severity Chart is a tool that provides MMC analysts with a process to
  533. assess the severity of a news story and the urgency in which the corresponding IOI should be
  534. distributed. Determining the severity of an IOI allows analysts to triage news stories and send
  535. out time-sensitive pieces first, followed by less acute stories. The IOI Severity Chart is broken
  536. down into five categories, from "Urgent" to "Validate." Each category explains the threat
  537. assessment, when distribution should occur, and the probable source. So, for example, if an
  538. analyst has two stories that are fit to distribute, the analyst will use the Severity Chart to
  539. determine the order of distribution and follow-ups. Let's say the analyst has one story on an
  540. explosion at a subway stop in New York City and another story on a policy change to passport
  541. purchases. According to the IOI Severity Chart, the explosion falls into Category 2, "Critical,"
  542. and requires immediate distribution. The change in passport purchase policy falls into Category
  543. 4, "Routine," and has a more lax distribution protocol. In this instance, the analyst would
  544. immediate distribute the story on the explosion at a subway stop in New York City. Only after
  545.  
  546.  
  547.  
  548. 10
  549.  
  550.  
  551.  
  552. Analyst's Desktop Binder I 2011
  553.  
  554.  
  555.  
  556. additional follow-ups on the outcome and cause of the explosion would the second article on
  557. passport policy be distributed.
  558.  
  559.  
  560.  
  561. Category
  562.  
  563.  
  564. Threat Assessment
  565.  
  566.  
  567. Distribution
  568.  
  569.  
  570. Probable Source
  571.  
  572.  
  573. - 1 Catastrophic: Bombing with casualties
  574.  
  575. 1 (excluding Afghanistan and Iraq), tsunami, mass
  576. 1 shootings, terrorist attack, train derailment with
  577. 1 mass causalities, major attack and/or destruction
  578. of U.S. infrastructure.
  579.  
  580.  
  581. Immediate
  582.  
  583.  
  584. Breaking news on National
  585.  
  586. Broadcast (Fox News, CNN, etc.).
  587.  
  588. Foreign and Regional press (BBC,
  589.  
  590. Sky News, etc.) Story has not yet
  591.  
  592. reached national or local print.
  593.  
  594.  
  595. 2 — Critical
  596.  
  597.  
  598. Highly destructive/pases a threat to a large
  599.  
  600. group of people and or resources: HAZMAT
  601.  
  602. situation, tornado, hurricane, wildfires, mass
  603.  
  604. flooding, publicized terronst threat, suspicious
  605.  
  606. package and/or substance, harm (accidental or
  607.  
  608. intentional) to a large group of people and/or
  609.  
  610. resources.
  611.  
  612.  
  613. Immediate
  614.  
  615.  
  616. Breaking news on National
  617.  
  618. Broadcast (Fox News, CNN, etc.)
  619.  
  620. and national and/or local print.
  621.  
  622.  
  623. 3 — ftionty
  624.  
  625.  
  626. Low threat to a specific area, potential for
  627. incident to upgrade to Category 1 and or 2:
  628.  
  629. Border patrol incidents (with violence), severe
  630.  
  631. weather, health concerns/recalls, train
  632.  
  633. derailment, chemical spill, etc.
  634.  
  635.  
  636. After Category 1 and 2 stones
  637.  
  638. and follow-ups have been
  639.  
  640. released by MMC.
  641.  
  642. The story has been reviewed
  643. for timeliness and accuracy.
  644.  
  645.  
  646. National and/or local print, UK
  647. news (BBC, Sky News).
  648.  
  649.  
  650. 4 — Routine
  651.  
  652.  
  653. Of Interest:
  654.  
  655. Border incidents (with no violence), drug busts,
  656.  
  657. localized crime and/or related incidents,
  658.  
  659. immigration, additional articles that are not
  660.  
  661. subjective in nature.
  662.  
  663.  
  664. When there is a significant lull
  665.  
  666. in MMC releases and after the
  667.  
  668. story has been verified from
  669.  
  670. several sources.
  671.  
  672.  
  673. National and/or local print.
  674.  
  675. Western European and Canadian
  676.  
  677. news sources-
  678.  
  679.  
  680. 5 - Validate
  681.  
  682.  
  683. Subjective:
  684.  
  685. Reports on federal agencies, (particularly as
  686. related to DHS activity), research/ studies, etc.
  687.  
  688.  
  689. Upon verification from Brad
  690.  
  691. Mitch, Ray, or one of the team
  692.  
  693. leads.
  694.  
  695.  
  696. Local print, medical reviews,
  697.  
  698. foreign news agencies (with the
  699.  
  700. exception of Western Europe and
  701.  
  702. Canada).
  703.  
  704.  
  705.  
  706. It is important to note that although the IOI Severity Chart provides guidance in detennirhng the
  707. categoiy of a potential IOI, there will be tunes when a story fails to fall into a specific category .
  708. When in doubt of whether an article should be distributed, it is the analyst's responsibility to
  709. contact one of the managers or team leads to receive direction and confirmation on handling the
  710. IOI in question.
  711.  
  712. 2.3 Notification of MMC Management
  713.  
  714. TSI management is an integral part of MMC operations are to be used to augment understanding
  715. and proficiency of MMC policies and procedures. When there is ever a question that cannot be
  716. answered through the SOP or the analyst's own deductive reasoning, then the analyst must call
  717. TSI management to receive proper guidance. Times when you must call Brad, Mitch or Ray (or
  718. others when directed) are when:
  719.  
  720. • Something significant has occurred
  721.  
  722. • A particular report seems IOI worthy, but there are no corroborating reports
  723.  
  724.  
  725.  
  726. 11
  727.  
  728.  
  729.  
  730. Analyst's Desktop Binder 2011
  731.  
  732.  
  733.  
  734. The initial IOI worthy report and the corroborating report are not from the source list we
  735.  
  736. typically use
  737.  
  738. The IOI worthy report reflects negatively on DHS or some other federal agency
  739.  
  740. It appears the IOI worthy report will require numerous updates and potentially be an
  741.  
  742. enduring topic
  743.  
  744. You are not sure if an event has already been reported during a previous watch
  745.  
  746. You feel a correction must be issued
  747.  
  748. You are experiencing system problems - even if you have addressed them
  749.  
  750. Whenever you have had to employ your backup
  751.  
  752. You are simply not sure about a particular report and want a second opinion
  753.  
  754. You have been given special instructions from DHS-related personnel such as the NOC
  755.  
  756. SWO
  757.  
  758.  
  759.  
  760. 2.4 Critical Information Requirements
  761.  
  762. The attribution of IOIs by CIR allows the MMC to catalog articles into five specific categories
  763. depending on the potential impact or type of article that is being distributed. These CIRs include:
  764.  
  765. 1) Potential Threat to DHS, other federal, and state/ local response units, facilities, and
  766. resources.
  767.  
  768. 2) Potential impact on DHS capability to accomplish the HSPD-5 mission
  769.  
  770. 3) Identifying events with operational value. . .corroborating critical information
  771.  
  772. 4) Identifying media reports that reflect adversely on DHS and response activities
  773.  
  774. 5) Standing HSC planning scenarios
  775.  
  776.  
  777.  
  778. 2.5 IOI Categorization
  779.  
  780. 1) Terrorism: Includes media reports on the activities of terrorist organizations
  781. both in the United States as well as abroad. This category will also cover media
  782. articles that report on the threats, media releases by al Qaeda and other
  783. organizations, killing, capture, and identification of terror leaders and/or cells.
  784.  
  785. 2) Weather/Natural Disasters/Emergency Management: Includes media reports
  786. on emergency and disaster management related issues. Reports include
  787. hurricanes, tornadoes, flooding, earthquakes, winter weather, etc. (all hazards).
  788. Reports will outline the tracking of weather systems, reports on response and
  789. recovery operations, as well as the damage, costs, and effects associated with
  790. emergencies and disasters by area. Will also include articles regarding requests
  791. for resources, disaster proclamations, and requests for assistance at the local,
  792. state, and federal levels.
  793.  
  794. 3) Fire: Includes reports on the ignition, spread, response, and containment of
  795. wildfires/industrial fires/explosions regardless of source.
  796.  
  797. 4) Trafficking/Border Control Issues: Includes reports on the trafficking of
  798. narcotics, people, weapons, and goods into and out of the United States of an
  799. exceptional level. Reports will also include articles outlining the strategy changes
  800. by Agencies involved in the interdiction of the items outlined above.
  801.  
  802. 12
  803.  
  804.  
  805.  
  806. Analyst's Desktop Binder 2011
  807.  
  808.  
  809.  
  810. 5) Immigration: Includes reports on the apprehension of illegal immigrants, policy
  811. changes with regard to immigration in the United States, and border control
  812. issues.
  813.  
  814. 6) HAZMAT: Includes reports on the discharge of chemical, biological, and
  815. radiological hazardous materials as well as security and procedural incidents at
  816. nuclear facilities around the world, and potential threats toward nuclear facilities
  817. in the United States. Also included under this category will be reports and
  818. response to suspicious powder and chemical or biological agents.
  819.  
  820. 7) Nuclear: To include reports on international nuclear developments, attempts to
  821. obtain nuclear materials by terrorist organizations, and stateside occurrences such
  822. as melt downs, the mismanagement of nuclear weapons, releases of radioactive
  823. materials, illegal transport of nuclear materials, obtaining of weapons by terrorist
  824. organizations, and breaches in nuclear security protocol.
  825.  
  826. 8) Transportation Security: To include reports on security breaches, airport
  827. procedures, and other transportation related issues, and any of the above issues
  828. that affect transportation. Reports will include threats toward and incidents
  829. involving rail, air, road, and water transit in the United States.
  830.  
  831. 9) Infrastructure: Reports on national infrastructure including key assets and
  832. technical structures. Reports will include articles related to failures or attacks on
  833. transportation networks, telecommunications/ internet networks, energy grids,
  834. utilities, finance, domestic food and agriculture, government facilities, and public
  835. health, as well as those listed above.
  836.  
  837. 10) National/International Security: Includes reports on threats or actions taken
  838. against United States national interests both at home and abroad. Reports would
  839. include articles related to threats against American citizens, political figures,
  840. military installations, embassies, consulates, as well as efforts taken by local,
  841. state, and federal agencies to secure the homeland. Articles involving intelligence
  842. will also be included in this category.
  843.  
  844. 11) Health Concerns, National/International: Includes articles on national and
  845. international outbreaks of infectious diseases and recalls of food or other items
  846. deemed dangerous to the public health.
  847.  
  848. 12) Public Safety: Includes reports on public safety incidents, building lockdowns,
  849. bomb threats, mass shootings, and building evacuations.
  850.  
  851. 13) Reports on DHS, Components, and other Federal Agencies: Includes both
  852. positive and negative reports on FEMA, CIS, CBP, ICE, etc. as well as
  853. organizations outside of DHS.
  854.  
  855. 14) Cyber Security: Reports on cyber security matters that could have a national
  856. impact on other CIR Categories; internet trends affecting DHS missions such as
  857. cyber attacks, computer viruses; computer tools and techniques that could thwart
  858. local, state and federal law enforcement; use of IT and the internet for terrorism,
  859. crime or drug-trafficking; and Emergency Management use of social media
  860. strategies and tools that aid or affect communications and management of crises.
  861.  
  862.  
  863.  
  864. 13
  865.  
  866.  
  867.  
  868. Analyst's Desktop Binder 2011
  869.  
  870.  
  871.  
  872. 2.6 Credible Sources for Corroboration
  873.  
  874. First Tier - A first tier source is one that does not typically need additional corroboration prior
  875. to release. Sources that construct the first tier platform include major news networks, such as
  876. CNN and Fox; major newspapers, such as USA Today and The Washington Post; and
  877. international news, such as the BBC and The International Herald Tribune. These sources do not
  878. typically need additional corroboration prior to release
  879.  
  880. o Major news networks (Television and Internet)
  881.  
  882. ■ CNN, FOX, ABC, NBC, CBS, MSNBC, Associated Press, Reuters (local
  883. affiliates of these major networks can be considered Tier 1 sources)
  884.  
  885. ■ Local affiliates of major networks, preferably sourced by the wire services
  886. like AP or Reuters
  887.  
  888. O Major newspapers
  889.  
  890. ■ Washington Post, LA Times, USA Today, US News and World Report, Wall
  891. Street Journal, Chicago Tribune, Houston Chronicle, Boston Globe, Arizona
  892. Republic, San Francisco Chronicle, Detroit Free Press, Miami Herald
  893.  
  894. ■ Some major local/state newspapers are appropriate as well (New York Daily
  895. News, Chicago Sun Times, Minneapolis Star Tribune, Seattle Times, etc.)
  896.  
  897. o International News
  898.  
  899. ■ BBC, Sky News, UPI (United Press International), IHT (International Herald
  900. Tribune), AFP (Agence France-Presse), Asian Times Online, Al Jazeera English,
  901. Prensa Latina (Latin American News Agency), The Guardian, Le Monde
  902. (France), The Economist, Kyodo News (Japan), The Australian News, German
  903. News, Canada Free Press, Agenzia Italia, United News of India, EFE (Spain),
  904. ARI (Russian Information Agency),
  905.  
  906. Second Tier - Should ideally be verified by a First Tier source prior to release.
  907.  
  908. o Government or specialized sites with a specific focus. Often includes .org's, .net's,
  909. and .co's.
  910.  
  911. ■ AllAfrica.com, Emergency and Disaster Management Service,
  912. GlobalSecurity.org, etc.
  913.  
  914. o Obviously partisan or agenda-driven sites
  915.  
  916. ■ MoveOn.org, Amnesty International, etc.
  917.  
  918. Third Tier - Must be verified by a First Tier source prior to release.
  919. o Tabloids (national and international)
  920.  
  921. ■ The Sun (UK), National Enquirer, Star, etc.
  922. O Blogs, even if they are of a serious, political nature
  923. O Popular magazines
  924.  
  925. ■ People Weekly, Washingtonian, etc.
  926.  
  927. Fourth Tier - Must be verified by a First Tier source prior to release
  928. o News collection/ compilation sites
  929.  
  930. ■ NationalTerrorAlert.com, Drudge Report.com, DisasterNews.net,
  931. Opensourceintelligence.org, Homelandsecurityleader.com,
  932. HomelandSecurityToday.com.
  933.  
  934.  
  935.  
  936. 14
  937.  
  938.  
  939.  
  940. Analyst's Desktop Binder 2011
  941.  
  942.  
  943.  
  944. 2.7 SourcinglOIs
  945.  
  946. 1) Credible Source: The item of interest was distributed following information
  947. provide by a credible source, such as a twitter posting by a media outlet
  948.  
  949. 2) Credible Evidence: Information is provided by social media sources, but is being
  950. redistributed by other users or media outiets, lending credibility
  951.  
  952. 3) Corroborating "Hits" Indicating a Trend: The item of interest was produced
  953. from multiple social media different sources providing an overall picture of the
  954. event
  955.  
  956. 4) Official Alert: A notification posted by an official government or private sector
  957. source
  958.  
  959.  
  960.  
  961. 2.8 IOI Distribution Lists
  962.  
  963. There are different types of distribution lists that the MMC uses. Each one addresses a particular group,
  964. depending on the severity of the event. The following is a listing of the different lists and the purpose of
  965. each. In rare cases, one or more lists will be allowed for use.
  966.  
  967. 1) Default - this is a full distribution (FULLDIS) list that (more than just NOC personnel
  968. listed) is primarily used for IOIs pertaining to terror attacks/terrorism stories,
  969. border/immigration issues, natural disasters, wildfires, floods, drugs/drug violence, mass
  970. killings/shootings, domestic oil spills, health concerns, etc.
  971.  
  972. 2) LIMDIS - this is a Limited Distribution List that consists primarily to certain DHS,
  973. NOC, and TSI Leadership. IOIs that are sent utilizing the LIMDIS list are major traffic
  974. disruptions, suspicious package/powder incidents, hazmat, and school lockdowns.
  975.  
  976. 3) SN-Only - this is reserved for the SN team and includes specific members of the DHS
  977. Privacy office.
  978.  
  979. 4) SPECDIS - also known as Special Distribution List, is determined by Management and
  980. is used in rare cases, unusual events, or for certain individuals.
  981.  
  982. 5) TSI Test - used for training and test purposes.
  983.  
  984. Note: For a current copy of any of the above IOI distribution lists, please refer to management and
  985. request that distribution list be sent to you.
  986.  
  987.  
  988.  
  989. 2.9 Creating IOIs (Traditional Media Application)
  990.  
  991. The MMC team utilizes the App as its regular method for distributing IOIs. The App is a
  992. worksheet like function that requires the analyst to input data into specific fields, resulting in a
  993. correctly formatted IOI once published. The App automatically databases each item that is
  994. distributed, which results in an automated numbering of distributions. This means that when
  995. creating an IOI, the new report will be sequentially numbered, building on previous distributions.
  996. When analysts are generating an update for an IOI, they only have to make sure that they are
  997. updating the correct string (incident) and the App will automatically ensure that it is correctly
  998. numbered.
  999.  
  1000.  
  1001.  
  1002. 15
  1003.  
  1004.  
  1005.  
  1006. Analyst's Desktop Binder I 2011
  1007.  
  1008.  
  1009.  
  1010. Analysts are responsible for:
  1011.  
  1012.  
  1013.  
  1014. Generating a subject line that summarizes the main points of the article in a clear
  1015.  
  1016. and concise manner and entering it hi the proper field.
  1017.  
  1018. Copying and pasting the article's original title into the proper field.
  1019.  
  1020. Selecting the correlating CIR# from the drop down menu.
  1021.  
  1022. Selecting the most specific location possible from the drop down menu.
  1023.  
  1024. Copying and pasting relevant points from the article into the text field.
  1025.  
  1026. Identifying the specific media source and entering it in the proper field
  1027.  
  1028. Copying and pasting the source link into the correct field
  1029.  
  1030. Selecting the method used to find the article (Sourcmg)
  1031.  
  1032. Inserting tags (keywords)
  1033.  
  1034. Selecting correct distribution list (Default, Linidis, Specdis, SN Only)
  1035.  
  1036. Proofing the entire report
  1037.  
  1038. Verifying that the format is conect
  1039.  
  1040.  
  1041.  
  1042. > MMC: Add Report - Mozilla Firefox
  1043.  
  1044.  
  1045.  
  1046. File Edit View
  1047.  
  1048.  
  1049.  
  1050. Bookmarks Tools Help
  1051.  
  1052.  
  1053.  
  1054. - C X ta> iGMS
  1055.  
  1056.  
  1057.  
  1058. report_m.aspx?sessionID=12933411744312500D&reportType=2&reporvj' -\ \^M" Google
  1059.  
  1060.  
  1061.  
  1062. l Most Visited ™ Setting Started Latest Headlines Q 5W Suspicious Vehicle
  1063.  
  1064.  
  1065.  
  1066. Analyst's Subject Title
  1067.  
  1068.  
  1069.  
  1070. Article Title
  1071.  
  1072.  
  1073.  
  1074. Event Location
  1075.  
  1076.  
  1077.  
  1078. Article Text
  1079.  
  1080.  
  1081.  
  1082. Tags
  1083.  
  1084.  
  1085.  
  1086. Source Title
  1087.  
  1088.  
  1089.  
  1090. Link
  1091.  
  1092.  
  1093.  
  1094. P
  1095.  
  1096.  
  1097.  
  1098. CIR Selection
  1099. Drop Down Menu
  1100.  
  1101.  
  1102.  
  1103. Category Drop
  1104. Down Menu
  1105.  
  1106.  
  1107.  
  1108.  
  1109. 16
  1110.  
  1111.  
  1112.  
  1113. Analyst's Desktop Binder I 2011
  1114.  
  1115.  
  1116.  
  1117. 2.10 Creating IOIs (Social Media Application)
  1118.  
  1119. The SN team utilizes the App as its regular method for distributing IOIs. The App is a worksheet
  1120. like function that requires the analyst to input data into specific fields, resulting in a correctly
  1121. formatted IOI once published. The App automatically databases each item that is distributed,
  1122. which results in an automated numbering of distributions. This means that when creating an IOI,
  1123. the new report will be sequentially numbered, building on previous distributions. When analysts
  1124. are generating an update for an IOI, they only have to make sure that they are updating the
  1125. correct string (incident) and the App will automatically ensure that it is correctly numbered.
  1126.  
  1127. Analysts are responsible for:
  1128.  
  1129. • Generating a subject line that summarizes the main points of the article in a clear
  1130. and concise manner and entering it in the proper field.
  1131. Selecting the correlating CIR# from the drop down menu.
  1132. Selecting the most specific location possible from the drop down menu.
  1133. Pulling relevant points from multiple social media sources and generating a
  1134. concise summary in the text field
  1135.  
  1136. Identifying the social media sources and entering them in the proper field
  1137. Copying and pasting the source links/social media postings into the correct field
  1138. Selecting the method used to find the article (Sourcing)
  1139. Inserting tags (keywords)
  1140.  
  1141. Selecting correct distribution list (Default, Limdis, Specdis, SN Only)
  1142. Proofing the entire report
  1143. Verifying that the format is correct
  1144.  
  1145.  
  1146.  
  1147. M"<W|-HI»T'i«BH
  1148.  
  1149.  
  1150.  
  1151. ■uiJ I
  1152.  
  1153.  
  1154.  
  1155. Analyst's Subject Title
  1156.  
  1157.  
  1158.  
  1159. Summary of Social
  1160. Media postings
  1161.  
  1162.  
  1163.  
  1164. Kevword Taes
  1165.  
  1166.  
  1167.  
  1168.  
  1169. 17
  1170.  
  1171.  
  1172.  
  1173. Analyst's Desktop Binder I 2011
  1174.  
  1175.  
  1176.  
  1177. 2.11 Outlook Back-Up Procedure
  1178.  
  1179. If the App is unavailable, analysts can generate an IOI via Microsoft Outlook using the following
  1180. process:
  1181.  
  1182. • Open a new message in the Outlook program
  1183.  
  1184. • Insert the format text into the message or type layout. An easy way to get the
  1185. format is to copy it from a previous IOI
  1186.  
  1187. • Copy and paste the title of the article into the Title line and generate a subject line
  1188. that reflects the main points of the incident. When applicable, include a location.
  1189.  
  1190. • Add the location of the incident. Ensure this is the actual incident site and not the
  1191. location of the journalist or news source.
  1192.  
  1193. • Select the CIR # that best corresponds to the incident.
  1194.  
  1195. • Insert the article's text.
  1196.  
  1197. • Insert the article's source and link.
  1198.  
  1199. Unfitted - Message IHTMU . r x
  1200.  
  1201. otmfltfc
  1202.  
  1203.  
  1204.  
  1205. §! IS&ttQ
  1206.  
  1207.  
  1208.  
  1209. J
  1210.  
  1211.  
  1212.  
  1213. "W
  1214.  
  1215.  
  1216.  
  1217. Ooiqns Formatted:
  1218.  
  1219.  
  1220.  
  1221. jf FcrnaE Painter
  1222.  
  1223.  
  1224.  
  1225. Times New '16 'A.' a' := T
  1226.  
  1227.  
  1228.  
  1229. _~jjj S^| ^ M ^ ! High Important
  1230.  
  1231.  
  1232.  
  1233. |B / D "ty ' A ' =: = := ~K ~'K: Address Chcri Attach Attach Busmws Calendar Signature FolltJt; a. LowJmpilrtariLe Spelling
  1234. — — — =— v - ' : " '""' Bnok Hames File Item Card' Up*
  1235.  
  1236.  
  1237.  
  1238. : . .
  1239.  
  1240.  
  1241.  
  1242. This mciH-ge ha: not bttn icni
  1243.  
  1244.  
  1245.  
  1246. Hi
  1247.  
  1248.  
  1249.  
  1250. Subject:
  1251.  
  1252.  
  1253.  
  1254. :
  1255.  
  1256.  
  1257.  
  1258. NOC Media Monitoring Capability - Traditional Media
  1259.  
  1260. Title:
  1261.  
  1262. Location:
  1263.  
  1264. NOC MMC CIR #3: Idenflfyrng events with operational whir ...corroborating r irlic al information
  1265.  
  1266. Excerpt from News Articlefs};
  1267.  
  1268. Sources (some page content may change or not be available over time):
  1269.  
  1270. Source Name
  1271.  
  1272. Link
  1273.  
  1274.  
  1275.  
  1276. [Analyst Name]
  1277.  
  1278. Operations Analyst
  1279.  
  1280. DHS TOC Media Motoring .
  1281.  
  1282.  
  1283.  
  1284. b (6)
  1285.  
  1286.  
  1287.  
  1288. 18
  1289.  
  1290.  
  1291.  
  1292. Analyst's Desktop Binder 2011
  1293.  
  1294.  
  1295.  
  1296. 2.12 Correction Notices
  1297.  
  1298. Correction notices are issued in the event incorrect information is distributed in an IOI. The
  1299. magnitude of misinformation can range from a misspelled word to a missing link. Whenever
  1300. the analyst finds a mistake in a distribution after the item is sent, the first step the analyst will
  1301. take is to contact management and inform management of the mistake.
  1302.  
  1303. Management will review the severity of the mistake and determine whether a correction
  1304. notice will be issued. Under no circumstance will the analyst send out a correction notice
  1305. without managerial approval. If an IOI is numbered wrong, a correction notice usually is not
  1306. issued. Update the log with the correct IOI number and ensure the succeeding IOI is
  1307. correcdy numbered.
  1308.  
  1309. It should be noted that although MMC strives to send high quality work, mistakes at times do
  1310. occur. Taking time to thoroughly review an IOI prior to distribution and maintaining a high
  1311. degree of attention to detail will keep mistakes to a minimum. When a correction notice is
  1312. required, the analyst will draft a brief summary detailing the error and providing corrected
  1313. information. This summary will be bold and placed at the top of the IOI, before the rest of the
  1314. report. The word CORRECTION: will also be placed at the beginning of the IOIs subject
  1315. line.
  1316.  
  1317. Sample Subject Line: CORRECTION: U.S. Army Soldier Reportedly Among 3 Cartel
  1318. Hitmen Arrested In Ciudad Juarez - Chihuahua, Mexico— MMC IOI #6836-11
  1319.  
  1320. Sample Correction Summary: CORRECTION: The location of the news station KTSM
  1321. was incorrectly reported as "El Paso, NM" and should have read "El Paso, TX". The
  1322. correction has been made in this distribution.
  1323.  
  1324.  
  1325.  
  1326. 19
  1327.  
  1328.  
  1329.  
  1330. Analyst's Desktop Binder I 2011
  1331.  
  1332.  
  1333.  
  1334.  
  1335.  
  1336.  
  1337. ORRECTlOPi U.S, Army Sr, Idler Hcprted y among i Cartd Hitmen Arreted ii Cm did tarrs - ChitiuahuB, Me<i::--MMl L.l~3ii-U - Mss-sarjElHTML)
  1338.  
  1339.  
  1340.  
  1341. ,B-&~
  1342.  
  1343.  
  1344.  
  1345. Message | fristit Options F-arrnai Tort
  1346.  
  1347.  
  1348.  
  1349. u
  1350.  
  1351.  
  1352.  
  1353. frotsNew- 12
  1354.  
  1355.  
  1356.  
  1357. i A't-h=='J5' |l^
  1358.  
  1359.  
  1360.  
  1361. Fasti
  1362. T 7 Format Fainter
  1363.  
  1364.  
  1365.  
  1366. C i:cad
  1367.  
  1368.  
  1369.  
  1370. rt"/ llll*'' A-l|= = = |* S|
  1371. Basic lent 3
  1372.  
  1373.  
  1374.  
  1375. if sign r
  1376.  
  1377.  
  1378.  
  1379. iJJ -.,: II <:k
  1380.  
  1381. Book Names
  1382. Names
  1383.  
  1384.  
  1385.  
  1386. -::.:■-■ fttddi Rj : ineis calendar signature Follow
  1387. File Item Card" * Up*
  1388. JnrJnde '•
  1389.  
  1390.  
  1391.  
  1392. Subject; CORRECTION; U.5, Aimy Sd-qici =LepertrdlyAn 'rig] Cartel HrtmenMetfrdtn CiudadJuarei -Chihuahua Moiw-MMC 10] *5S3G-11
  1393.  
  1394.  
  1395.  
  1396.  
  1397. Subject line should now read:
  1398.  
  1399. "CORRECTION: U.S. Army Soldier Reportedly
  1400. Among 3 Cartel Hitmen Arrested In Ciudad
  1401. Juarez - Chihuahua, Mexico — MMC IOI #6836-
  1402. 11
  1403.  
  1404.  
  1405.  
  1406. CORRECTION: The location of the Dews station KTSMwas meorre-efh" reported as "El Pa so, MF and should have road "El Paso. TX W . The correction has been made in this
  1407.  
  1408. distribution.
  1409.  
  1410. Location: Ciudad Juarez, Chihuahua, Mexico
  1411.  
  1412.  
  1413.  
  1414. * eCTSMin E] Paso. T!v, and Juarez media report that one of three carrel-Linked j'.itmen arrested Wednesday in Ciudid Juarez is an active duty U S Armv soldier
  1415.  
  1416. o Authorities claim thernari identified himself as a U i Army soldier daring his arrest and that his status ss~as confirmed by police personnei
  1417.  
  1418. ■ His claim has not been confirmed bv ITS authohties
  1419. o There ivas no immediate report of ssfiat carte! tie man may he linked to
  1420.  
  1421. • AccDrding to auttunriries. ill three men confesseri t rj taidn e put in the xiurdas of four JaEttez police officers between 7-8 September
  1422.  
  1423.  
  1424.  
  1425. \esv Media Sources (some page content may change or not b e assailable over rime):
  1426.  
  1427. - Twitter [KTSM-TYJ
  1428.  
  1429. - http:..'twitte{,com^!,NC9'Stanises. , 34497]88336tB89S24
  1430. -Borderland Beat
  1431.  
  1432. - htsn lAnvTf.h o:d emdbeat .com.-
  1433.  
  1434. (Analyst Name)
  1435. Operations, Analyst
  1436. TjTTSNOC Meilia Mtmitoriiis
  1437.  
  1438.  
  1439.  
  1440. A brief explanation is given just
  1441. below the subject line in the
  1442. body of the IOI.
  1443.  
  1444.  
  1445.  
  1446. (b) (6)
  1447.  
  1448.  
  1449.  
  1450. 2.13 Keywords & Search Terms
  1451.  
  1452. This is a current list of terms that will be used by the NOC when monitoring social media sites to
  1453. provide situational awareness and establish a common operating picture. As natural or manmade disasters
  1454. occur, new search terms may be added. The new search terms will not use PE1 in searcliiiig for relevant
  1455. mission-related infonnation
  1456.  
  1457.  
  1458.  
  1459. DHS & Other Agencies
  1460.  
  1461. Department of Homeland
  1462.  
  1463. Security (DHS)
  1464.  
  1465. Federal Emergency
  1466.  
  1467. Management Agency
  1468.  
  1469. (FEjVLA)
  1470.  
  1471. Coast Guard (USCG)
  1472.  
  1473. Customs and Border
  1474.  
  1475. Protection (CBP)
  1476.  
  1477. Border Patrol
  1478.  
  1479. Secret Service (USSS)
  1480.  
  1481. National Operations Center
  1482.  
  1483. (NOC)
  1484.  
  1485. Homeland Defense
  1486.  
  1487.  
  1488.  
  1489. Immigration Customs
  1490.  
  1491. Enforcement (ICE)
  1492.  
  1493. Agent
  1494.  
  1495. Task Force
  1496.  
  1497. Central Intelligence Agency
  1498.  
  1499. (CIA)
  1500.  
  1501. Fusion Center
  1502.  
  1503. Drug Enforcement Agency
  1504.  
  1505. (DEA)
  1506.  
  1507. Secure Border Initiative
  1508.  
  1509. (SBI)
  1510.  
  1511. Federal Bureau of
  1512.  
  1513. Investigation (FBI)
  1514.  
  1515.  
  1516.  
  1517. Alcohol Tobacco and
  1518.  
  1519. Firearms (ATF)
  1520.  
  1521. U.S. Citizenship and
  1522.  
  1523. Immigration Services (CIS)
  1524.  
  1525. Federal Air Marshal Service
  1526.  
  1527. (FAMS)
  1528.  
  1529. Transportation Security
  1530.  
  1531. Adniinistration (TSA)
  1532.  
  1533. Air Marshal
  1534.  
  1535. Federal Aviation
  1536.  
  1537. Administration (FAA)
  1538.  
  1539. National Guard
  1540.  
  1541. Red Cross
  1542.  
  1543. United Nations (UN)
  1544.  
  1545.  
  1546.  
  1547. 20
  1548.  
  1549.  
  1550.  
  1551. Domestic Security
  1552.  
  1553.  
  1554.  
  1555.  
  1556.  
  1557.  
  1558. Assassination
  1559.  
  1560.  
  1561. Emergency management
  1562.  
  1563.  
  1564. Gangs
  1565.  
  1566.  
  1567. Attack
  1568.  
  1569.  
  1570. Emergency response
  1571.  
  1572.  
  1573. National security
  1574.  
  1575.  
  1576. Domestic security
  1577.  
  1578.  
  1579. First responder
  1580.  
  1581.  
  1582. State of emergency
  1583.  
  1584.  
  1585. Drill
  1586.  
  1587.  
  1588. Homeland security
  1589.  
  1590.  
  1591. Security
  1592.  
  1593.  
  1594. Exercise
  1595.  
  1596.  
  1597. Maritime domain awareness
  1598.  
  1599.  
  1600. Breach
  1601.  
  1602.  
  1603. Cops
  1604.  
  1605.  
  1606. (MDA)
  1607.  
  1608.  
  1609. Threat
  1610.  
  1611.  
  1612. Law enforcement
  1613.  
  1614.  
  1615. National preparedness
  1616.  
  1617.  
  1618. Standoff
  1619.  
  1620.  
  1621. Authorities
  1622.  
  1623.  
  1624. initiative
  1625.  
  1626.  
  1627. SWAT
  1628.  
  1629.  
  1630. Disaster assistance
  1631.  
  1632.  
  1633. Militia
  1634.  
  1635.  
  1636. Screening
  1637.  
  1638.  
  1639. Disaster management
  1640.  
  1641.  
  1642. Shooting
  1643.  
  1644.  
  1645. Lockdown
  1646.  
  1647.  
  1648. DNDO (Domestic Nuclear
  1649.  
  1650.  
  1651. Shots fired
  1652.  
  1653.  
  1654. Bomb (squad or threat)
  1655.  
  1656.  
  1657. Detection Office)
  1658.  
  1659.  
  1660. Evacuation
  1661.  
  1662.  
  1663. Crash
  1664.  
  1665.  
  1666. National preparedness
  1667.  
  1668.  
  1669. Deaths
  1670.  
  1671.  
  1672. Looting
  1673.  
  1674.  
  1675. Mitigation
  1676.  
  1677.  
  1678. Hostage
  1679.  
  1680.  
  1681. Riot
  1682.  
  1683.  
  1684. Prevention
  1685.  
  1686.  
  1687. Explosion (explosive)
  1688.  
  1689.  
  1690. Emergency Landing
  1691.  
  1692.  
  1693. Response
  1694.  
  1695.  
  1696. Police
  1697.  
  1698.  
  1699. Pipe bomb
  1700.  
  1701.  
  1702. Recovery
  1703.  
  1704.  
  1705. Disaster medical assistance
  1706.  
  1707.  
  1708. Incident
  1709.  
  1710.  
  1711. Dirty bomb
  1712.  
  1713.  
  1714. team (DMAT)
  1715.  
  1716.  
  1717. Facility
  1718.  
  1719.  
  1720. Domestic nuclear detection
  1721.  
  1722.  
  1723. Organized crime
  1724.  
  1725.  
  1726.  
  1727.  
  1728. HAZMAT & Nuclear
  1729.  
  1730.  
  1731.  
  1732.  
  1733.  
  1734.  
  1735. Hazmat
  1736.  
  1737.  
  1738. Leak
  1739.  
  1740.  
  1741. Gas
  1742.  
  1743.  
  1744. Nuclear
  1745.  
  1746.  
  1747. Biological infection (or
  1748.  
  1749.  
  1750. Spillover
  1751.  
  1752.  
  1753. Chemical spill
  1754.  
  1755.  
  1756. event)
  1757.  
  1758.  
  1759. Anthrax
  1760.  
  1761.  
  1762. Suspicious package/device
  1763.  
  1764.  
  1765. Chemical
  1766.  
  1767.  
  1768. Blister agent
  1769.  
  1770.  
  1771. Toxic
  1772.  
  1773.  
  1774. Chemical burn
  1775.  
  1776.  
  1777. Chemical agent
  1778.  
  1779.  
  1780. National laboratory
  1781.  
  1782.  
  1783. Biological
  1784.  
  1785.  
  1786. Exposure
  1787.  
  1788.  
  1789. Nuclear facility
  1790.  
  1791.  
  1792. Epidemic
  1793.  
  1794.  
  1795. Burn
  1796.  
  1797.  
  1798. Nuclear threat
  1799.  
  1800.  
  1801. Hazardous
  1802.  
  1803.  
  1804. Nerve agent
  1805.  
  1806.  
  1807. Cloud
  1808.  
  1809.  
  1810. Hazardous material incident
  1811.  
  1812.  
  1813. Ricin
  1814.  
  1815.  
  1816. Plume
  1817.  
  1818.  
  1819. Industrial spill
  1820.  
  1821.  
  1822. Sarin
  1823.  
  1824.  
  1825. Radiation
  1826.  
  1827.  
  1828. Infection
  1829.  
  1830.  
  1831. North Korea
  1832.  
  1833.  
  1834. Radioactive
  1835.  
  1836.  
  1837. Powder (white)
  1838.  
  1839.  
  1840.  
  1841.  
  1842. Health Concern + H1N1
  1843.  
  1844.  
  1845.  
  1846.  
  1847.  
  1848.  
  1849. Outbreak
  1850.  
  1851.  
  1852. Salmonella
  1853.  
  1854.  
  1855. Agriculture
  1856.  
  1857.  
  1858. Contamination
  1859.  
  1860.  
  1861. Small Pox
  1862.  
  1863.  
  1864. Listeria
  1865.  
  1866.  
  1867. Exposure
  1868.  
  1869.  
  1870. Plague
  1871.  
  1872.  
  1873. Symptoms
  1874.  
  1875.  
  1876. Virus
  1877.  
  1878.  
  1879. Human to human
  1880.  
  1881.  
  1882. Mutation
  1883.  
  1884.  
  1885. Evacuation
  1886.  
  1887.  
  1888. Human to Animal
  1889.  
  1890.  
  1891. Resistant
  1892.  
  1893.  
  1894. Bacteria
  1895.  
  1896.  
  1897. Influenza
  1898.  
  1899.  
  1900. Antiviral
  1901.  
  1902.  
  1903. Recall
  1904.  
  1905.  
  1906. Center for Disease Control
  1907.  
  1908.  
  1909. Wave
  1910.  
  1911.  
  1912. Ebola
  1913.  
  1914.  
  1915. (CDC)
  1916.  
  1917.  
  1918. Pandemic
  1919.  
  1920.  
  1921. Food Poisoning
  1922.  
  1923.  
  1924. Drug Administration (FDA)
  1925.  
  1926.  
  1927. Infection
  1928.  
  1929.  
  1930. Foot and Mouth (FMD)
  1931.  
  1932.  
  1933. Public Health
  1934.  
  1935.  
  1936. Water/air borne
  1937.  
  1938.  
  1939. H5N1
  1940.  
  1941.  
  1942. Toxic
  1943.  
  1944.  
  1945. Sick
  1946.  
  1947.  
  1948. Avian
  1949.  
  1950.  
  1951. Agro Terror
  1952.  
  1953.  
  1954. Swine
  1955.  
  1956.  
  1957. Flu
  1958.  
  1959.  
  1960. Tuberculosis (TB)
  1961.  
  1962.  
  1963. Pork
  1964.  
  1965.  
  1966.  
  1967. 21
  1968.  
  1969.  
  1970.  
  1971. Analyst's Desktop Binder 2011
  1972.  
  1973.  
  1974.  
  1975. Strain
  1976. Quarantine
  1977. H1N1
  1978. Vaccine
  1979.  
  1980.  
  1981.  
  1982. Tamiflu
  1983. Norvo Virus
  1984. Epidemic
  1985.  
  1986.  
  1987.  
  1988. World Health Organization
  1989. (WHO) (and components)
  1990. Viral Hemorrhagic Fever
  1991. E. Coli
  1992.  
  1993.  
  1994.  
  1995. Infrastructure Security
  1996.  
  1997.  
  1998.  
  1999.  
  2000.  
  2001.  
  2002. Infrastructure security
  2003. Airport
  2004.  
  2005.  
  2006. Airplane (and derivatives)
  2007. Chemical fire
  2008.  
  2009.  
  2010.  
  2011.  
  2012. CIKR (Critical Infrastructure
  2013.  
  2014.  
  2015. Subway
  2016.  
  2017.  
  2018. Electric
  2019.  
  2020.  
  2021. & Key Resources)
  2022.  
  2023.  
  2024. BART
  2025.  
  2026.  
  2027. Failure or outage
  2028.  
  2029.  
  2030. AMTRAK
  2031.  
  2032.  
  2033. MARTA
  2034.  
  2035.  
  2036. Black out
  2037.  
  2038.  
  2039. Collapse
  2040.  
  2041.  
  2042. Port Authority
  2043.  
  2044.  
  2045. Brown out
  2046.  
  2047.  
  2048. Computer infrastructure
  2049.  
  2050.  
  2051. NBIC (National
  2052.  
  2053.  
  2054. Port
  2055.  
  2056.  
  2057. Communications
  2058.  
  2059.  
  2060. Biosurveillance Integration
  2061.  
  2062.  
  2063. Dock
  2064.  
  2065.  
  2066. infrastructure
  2067.  
  2068.  
  2069. Center)
  2070.  
  2071.  
  2072. Bridge
  2073.  
  2074.  
  2075. Telecommunications
  2076.  
  2077.  
  2078. Transportation security
  2079.  
  2080.  
  2081. Cancelled
  2082.  
  2083.  
  2084. Critical infrastructure
  2085.  
  2086.  
  2087. Grid
  2088.  
  2089.  
  2090. Delays
  2091.  
  2092.  
  2093. National infrastructure
  2094.  
  2095.  
  2096. Power
  2097.  
  2098.  
  2099. Service disruption
  2100.  
  2101.  
  2102. Metro
  2103. WMATA
  2104.  
  2105.  
  2106. Smart
  2107.  
  2108. Body scanner
  2109.  
  2110.  
  2111. Power lines
  2112.  
  2113.  
  2114. Southwest Border Violence
  2115.  
  2116.  
  2117.  
  2118.  
  2119.  
  2120.  
  2121. Drug cartel
  2122.  
  2123.  
  2124. Fort Hancock
  2125.  
  2126.  
  2127. Gunfight
  2128.  
  2129.  
  2130. Violence
  2131.  
  2132.  
  2133. San Diego
  2134.  
  2135.  
  2136. Trafficking
  2137.  
  2138.  
  2139. Gang
  2140.  
  2141.  
  2142. Ciudad Juarez
  2143.  
  2144.  
  2145. Kidnap
  2146.  
  2147.  
  2148. Drug
  2149.  
  2150.  
  2151. Nogales
  2152.  
  2153.  
  2154. Calderon
  2155.  
  2156.  
  2157. Narcotics
  2158.  
  2159.  
  2160. Sonora
  2161.  
  2162.  
  2163. Reyosa
  2164.  
  2165.  
  2166. Cocaine
  2167.  
  2168.  
  2169. Colombia
  2170.  
  2171.  
  2172. Bust
  2173.  
  2174.  
  2175. Marijuana
  2176.  
  2177.  
  2178. Mara salvatrucha
  2179.  
  2180.  
  2181. Tamaulipas
  2182.  
  2183.  
  2184. Heroin
  2185.  
  2186.  
  2187. MS13orMS-13
  2188.  
  2189.  
  2190. Meth Lab
  2191.  
  2192.  
  2193. Border
  2194.  
  2195.  
  2196. Drug war
  2197.  
  2198.  
  2199. Drug trade
  2200.  
  2201.  
  2202. Mexico
  2203.  
  2204.  
  2205. Mexican army
  2206.  
  2207.  
  2208. Illegal immigrants
  2209.  
  2210.  
  2211. Cartel
  2212.  
  2213.  
  2214. Methamphetamine
  2215.  
  2216.  
  2217. Smuggling (smugglers)
  2218.  
  2219.  
  2220. Southwest
  2221.  
  2222.  
  2223. Cartel de Golfo
  2224.  
  2225.  
  2226. Matamoros
  2227.  
  2228.  
  2229. Juarez
  2230.  
  2231.  
  2232. Gulf Cartel
  2233.  
  2234.  
  2235. Michoacana
  2236.  
  2237.  
  2238. Sinaloa
  2239.  
  2240.  
  2241. La Familia
  2242.  
  2243.  
  2244. Guzman
  2245.  
  2246.  
  2247. Tijuana
  2248.  
  2249.  
  2250. Reynosa
  2251.  
  2252.  
  2253. Arellano-Felix
  2254.  
  2255.  
  2256. Torre on
  2257.  
  2258.  
  2259. Nuevo Leon
  2260.  
  2261.  
  2262. Beltran-Leyva
  2263.  
  2264.  
  2265. Yuma
  2266.  
  2267.  
  2268. Narcos
  2269.  
  2270.  
  2271. Barrio Azteca
  2272.  
  2273.  
  2274. Tucson
  2275.  
  2276.  
  2277. Narco banners (Spanish
  2278.  
  2279.  
  2280. Artistic Assassins
  2281.  
  2282.  
  2283. Decapitated
  2284.  
  2285.  
  2286. equivalents)
  2287.  
  2288.  
  2289. Mexicles
  2290.  
  2291.  
  2292. U.S. Consulate
  2293.  
  2294.  
  2295. Los Zetas
  2296.  
  2297.  
  2298. New Federation
  2299.  
  2300.  
  2301. Consular
  2302.  
  2303.  
  2304. Shootout
  2305.  
  2306.  
  2307.  
  2308.  
  2309. El Paso
  2310.  
  2311.  
  2312. Execution
  2313.  
  2314.  
  2315.  
  2316.  
  2317.  
  2318. 22
  2319.  
  2320.  
  2321.  
  2322. Analyst's Desktop Binder 2011
  2323.  
  2324.  
  2325.  
  2326. Terrorism
  2327.  
  2328.  
  2329.  
  2330.  
  2331.  
  2332.  
  2333. Terrorism
  2334.  
  2335.  
  2336. IED (Improvised Explosive
  2337.  
  2338.  
  2339. Suspicious substance
  2340.  
  2341.  
  2342. Al Qaeda (all spellings)
  2343.  
  2344.  
  2345. Device)
  2346.  
  2347.  
  2348. AQAP (AL Qaeda Arabian
  2349.  
  2350.  
  2351. Terror
  2352.  
  2353.  
  2354. Abu Sayyaf
  2355.  
  2356.  
  2357. Peninsula)
  2358.  
  2359.  
  2360. Attack
  2361.  
  2362.  
  2363. Hamas
  2364.  
  2365.  
  2366. AQIM (Al Qaeda in the
  2367.  
  2368.  
  2369. Iraq
  2370.  
  2371.  
  2372. FARC (Armed Revolutionary
  2373.  
  2374.  
  2375. Islamic Maghreb)
  2376.  
  2377.  
  2378. Afghanistan
  2379.  
  2380.  
  2381. Forces Colombia)
  2382.  
  2383.  
  2384. TTP (Tehrik-i-Taliban
  2385.  
  2386.  
  2387. Iran
  2388.  
  2389.  
  2390. IRA (Irish Republican Army)
  2391.  
  2392.  
  2393. Pakistan)
  2394.  
  2395.  
  2396. Pakistan
  2397.  
  2398.  
  2399. ETA (Euskadi ta Askatasuna)
  2400.  
  2401.  
  2402. Yemen
  2403.  
  2404.  
  2405. Agro
  2406.  
  2407.  
  2408. Basque Separatists
  2409.  
  2410.  
  2411. Pirates
  2412.  
  2413.  
  2414. Environmental terrorist
  2415.  
  2416.  
  2417. Hezbollah
  2418.  
  2419.  
  2420. Extremism
  2421.  
  2422.  
  2423. Eco terrorism
  2424.  
  2425.  
  2426. Tamil Tigers
  2427.  
  2428.  
  2429. Somalia
  2430.  
  2431.  
  2432. Conventional weapon
  2433.  
  2434.  
  2435. PLF (Palestine Liberation
  2436.  
  2437.  
  2438. Nigeria
  2439.  
  2440.  
  2441. Target
  2442.  
  2443.  
  2444. Front)
  2445.  
  2446.  
  2447. Radicals
  2448.  
  2449.  
  2450. Weapons grade
  2451.  
  2452.  
  2453. PLO (Palestine Liberation
  2454.  
  2455.  
  2456. Al-Shabaab
  2457.  
  2458.  
  2459. Dirty bomb
  2460.  
  2461.  
  2462. Organization
  2463.  
  2464.  
  2465. Home grown
  2466.  
  2467.  
  2468. Enriched
  2469.  
  2470.  
  2471. Car bomb
  2472.  
  2473.  
  2474. Plot
  2475.  
  2476.  
  2477. Nuclear
  2478.  
  2479.  
  2480. Jihad
  2481.  
  2482.  
  2483. Nationalist
  2484.  
  2485.  
  2486. Chemical weapon
  2487.  
  2488.  
  2489. Taliban
  2490.  
  2491.  
  2492. Recruitment
  2493.  
  2494.  
  2495. Biological weapon
  2496.  
  2497.  
  2498. Weapons cache
  2499.  
  2500.  
  2501. Fundamentalism
  2502.  
  2503.  
  2504. Ammonium nitrate
  2505.  
  2506.  
  2507. Suicide bomber
  2508.  
  2509.  
  2510. Islamist
  2511.  
  2512.  
  2513. Improvised explosive device
  2514.  
  2515.  
  2516. Suicide attack
  2517.  
  2518.  
  2519.  
  2520.  
  2521. Weather/Disaster/Emergency
  2522.  
  2523.  
  2524.  
  2525.  
  2526.  
  2527.  
  2528. Emergency
  2529.  
  2530.  
  2531. Ice
  2532.  
  2533.  
  2534. Mud slide or Mudslide
  2535.  
  2536.  
  2537. Hurricane
  2538.  
  2539.  
  2540. Stranded/Stuck
  2541.  
  2542.  
  2543. Erosion
  2544.  
  2545.  
  2546. Tornado
  2547.  
  2548.  
  2549. Help
  2550.  
  2551.  
  2552. Power outage
  2553.  
  2554.  
  2555. Twister
  2556.  
  2557.  
  2558. Hail
  2559.  
  2560.  
  2561. Brown out
  2562.  
  2563.  
  2564. Tsunami
  2565.  
  2566.  
  2567. Wildfire
  2568.  
  2569.  
  2570. Warning
  2571.  
  2572.  
  2573. Earthquake
  2574.  
  2575.  
  2576. Tsunami Warning Center
  2577.  
  2578.  
  2579. Watch
  2580.  
  2581.  
  2582. Tremor
  2583.  
  2584.  
  2585. Magnitude
  2586.  
  2587.  
  2588. Lightening
  2589.  
  2590.  
  2591. Flood
  2592.  
  2593.  
  2594. Avalanche
  2595.  
  2596.  
  2597. Aid
  2598.  
  2599.  
  2600. Storm
  2601.  
  2602.  
  2603. Typhoon
  2604.  
  2605.  
  2606. Relief
  2607.  
  2608.  
  2609. Crest
  2610.  
  2611.  
  2612. Shelter-in-place
  2613.  
  2614.  
  2615. Closure
  2616.  
  2617.  
  2618. Temblor
  2619.  
  2620.  
  2621. Disaster
  2622.  
  2623.  
  2624. Interstate
  2625.  
  2626.  
  2627. Extreme weather
  2628.  
  2629.  
  2630. Snow
  2631.  
  2632.  
  2633. Burst
  2634.  
  2635.  
  2636. Forest fire
  2637.  
  2638.  
  2639. Blizzard
  2640.  
  2641.  
  2642. Emergency Broadcast System
  2643.  
  2644.  
  2645. Brush fire
  2646.  
  2647.  
  2648. Sleet
  2649.  
  2650. Cyber Security
  2651.  
  2652.  
  2653.  
  2654.  
  2655. Cyber security
  2656.  
  2657.  
  2658. 2600
  2659.  
  2660.  
  2661. Hacker
  2662.  
  2663.  
  2664. Botnet
  2665.  
  2666.  
  2667. Spammer
  2668.  
  2669.  
  2670. China
  2671.  
  2672.  
  2673. DDOS (dedicated denial of
  2674.  
  2675.  
  2676. Phishing
  2677.  
  2678.  
  2679. Conficker
  2680.  
  2681.  
  2682. service)
  2683.  
  2684.  
  2685. Rootkit
  2686.  
  2687.  
  2688. Worm
  2689.  
  2690.  
  2691. Denial of service
  2692.  
  2693.  
  2694. Phreaking
  2695.  
  2696.  
  2697. Scammers
  2698.  
  2699.  
  2700. Malware
  2701.  
  2702.  
  2703. Cain and abel
  2704.  
  2705.  
  2706. Social media
  2707.  
  2708.  
  2709. Virus
  2710.  
  2711.  
  2712. Brute forcing
  2713.  
  2714.  
  2715.  
  2716.  
  2717. Trojan
  2718.  
  2719.  
  2720. Mysql injection
  2721.  
  2722.  
  2723.  
  2724.  
  2725. Keylogger
  2726.  
  2727.  
  2728. Cyber attack
  2729.  
  2730.  
  2731.  
  2732.  
  2733. Cyber Command
  2734.  
  2735.  
  2736. Cyber terror
  2737.  
  2738.  
  2739.  
  2740.  
  2741.  
  2742. 23
  2743.  
  2744.  
  2745.  
  2746. Analyst's Desktop Binder 2011
  2747.  
  2748.  
  2749.  
  2750. 3 Personally Identifiable Information (PII) Guidance:
  2751.  
  2752. PII refers to information that can be used to uniquely identify, contact, or locate a single person
  2753. or can be used with other sources to uniquely identify a single individual. Before sending out
  2754. ANY reports, including IOIs, ]\al331 analysts must ensure that if there is any PII included in a
  2755. media article, that information must be removed, due to privacy issues! (Figure 6, IOI Example
  2756.  
  2757. )
  2758.  
  2759. Generally, both MMC and SN must never send out any IOIs with PII included except in
  2760. "extremis situations". An extremis situation occurs when there is an imminent threat of loss of
  2761. life, serious bodily harm, or damage/destruction to critical facilities or equipment (in these
  2762. circumstances, the appropriate DHS OPS authority must approve PII, in which case, TSI
  2763. management would need to be made aware of the situation). Note: The DHS OPS authority
  2764. includes OPS Senior Executive leadership and the SWO.
  2765.  
  2766. The following are cases in which PII must be removed from all MMC reports:
  2767.  
  2768. 1) Names, positions, or other information that would enable someone to determine the
  2769. identity of a particular person
  2770.  
  2771. a. The Privacy Impact Assessment (PIA) allows for certain exemptions in which PII
  2772. may be included to identify spokesmen, government officials and reporters. Note:
  2773. Refer to section 3.1 and the current PIA for more information
  2774.  
  2775. 2) Names of known or suspected terrorists, DTO leaders, or other individuals who are a
  2776. threat to homeland security, regardless of whether a U.S. citizen or non-U.S. citizen
  2777.  
  2778. 3) Links to the actual articles or postings referenced provided the links themselves do not
  2779. contain PII. In this case the analyst would use "No Link Due To PII" instead of the
  2780. actual link.
  2781.  
  2782. 4) Addresses that would reveal where a person lives. In this case the analyst would either
  2783. delete the street address completely generalize it to the street block. Example: instead of
  2784. using "1345 John Doe Avenue", the analyst could use "the 1300 block of John Doe
  2785. Avenue".
  2786.  
  2787.  
  2788.  
  2789. Note: The MMC watch may provide the name, position, or other information considered to be
  2790. PII to the NOC over the telephone when approved by the appropriate DHS OPS authority. But
  2791. that information must not be stored in a database that could be searched by an individual's PII.
  2792.  
  2793.  
  2794.  
  2795. 24
  2796.  
  2797.  
  2798.  
  2799. Analyst's Desktop Binder 2011
  2800.  
  2801.  
  2802.  
  2803. 3.1 Effective: January 7, 2011
  2804.  
  2805. OPS conducted an update to the Privacy Impact Assessment (PIA) allowing the Media
  2806. Monitoring Capability to now collect and disseminate PII for certain narrowly tailored
  2807. categories. Furthermore, PII on the following categories of individuals may be collected when it
  2808. lends credibility to the report or facilitates coordination with federal, state, local, tribal,
  2809. territorial, foreign, or international government partners:
  2810.  
  2811. 1) U.S. and foreign individuals in extremis situations involving potential life or death
  2812. circumstances; (this is no change)
  2813.  
  2814. 2) Senior U.S. and foreign government officials who make public statements or provide
  2815. public updates;
  2816.  
  2817. 3) U.S. and foreign government spokespersons who make public statements or provide
  2818. public updates;
  2819.  
  2820. 4) U.S. and foreign private sector officials and spokespersons who make public statements
  2821. or provide public updates;
  2822.  
  2823. 5) Names of anchors, newscasters, or on-scene reporters who are known or identified as
  2824. reporters in their post or article or who use traditional and/or social media in real time to
  2825. keep their audience situationally aware and informed;
  2826.  
  2827. 6) Current and former public officials who are victims of incidents or activities related to
  2828. Homeland Security; and
  2829.  
  2830. 7) Terrorists, drug cartel leaders or other persons known to have been involved in major
  2831. crimes of Homeland Security interest, (e.g., mass shooters such as those at Virginia Tech
  2832. or Ft. Hood) who are killed or found dead.
  2833.  
  2834. NOTE: PII on these individuals may include: 1) full name; 2) affiliation; 3) position or title; and
  2835. 3) publicly-available user ID. Analysts are trained to use only approved PII that is easily
  2836. identifiable and to ignore and exclude any non-authorized PII. Practical implementation: the
  2837. PII must add value, i.e. we can now say Sheriff or Fire Chief, but if the name is not important
  2838. (and it usually isn't) don't include the name, just the title, especially for lower level officials.
  2839. Should PII come into the NOC's possession, apart from these categories, the NOC shall redact it
  2840. prior to further dissemination of any collected information. (Current PII retraction procedures do
  2841. not change)
  2842.  
  2843. What was NOT Approved:
  2844.  
  2845. - We will not report on Individuals suspected or accused of committing crimes of National or
  2846. Homeland Security interest, if captured, (see # 7 above for the exception if they are killed or
  2847. found dead)
  2848.  
  2849. - We will not report on Private citizens no matter if they are witnesses, victims, observers or
  2850. some other way connected to an event
  2851.  
  2852. - We will not report on high profile people such as celebrities, sports figures or media members
  2853. who are victims, (see # 6 above for the exception if they are current or former public officials)
  2854.  
  2855.  
  2856.  
  2857. 25
  2858.  
  2859.  
  2860.  
  2861. Analyst's Desktop Binder I 2011
  2862.  
  2863.  
  2864.  
  2865. Operational Summary Guidance:
  2866.  
  2867. Night shift analysts will compile a summary of items that have been distributed by the MMC
  2868. over each 24 horn - period. The Operational Summary provides a synopsis of distributed items
  2869. based on a set of designated priorities that are generated by the NOC. In rare circumstances,
  2870. the NOC may require that Operational Summaries be generated at irregular intervals in
  2871. support of ongoing situations. These special reports will be generated at the direction of the
  2872. NOC or senior personnel, and will be highly coordinated with TSI senior management before
  2873. distribution.
  2874.  
  2875. Both the on duty Traditional and Social Media Analysts will collaborate to generate a single
  2876. report and then submit it to the designated TSI Senior Reviewer no later than 0400. The
  2877. Senior Reviewer will check the report for proper grammar, punctuation, and adherence to the
  2878. NOC Priorities. Once the Senior Reviewer has approved the Operational Summary, the on
  2879. duty Traditional Media Watch analyst will distribute it.
  2880.  
  2881. • One copy of the OPSUM will be sent to the IOI Distro List using the BCC line.
  2882.  
  2883. • A se cond (Identical) copy will be sent to:
  2884. o ■(*)■(*]■ I n the TO Tine
  2885.  
  2886.  
  2887.  
  2888. o
  2889.  
  2890.  
  2891.  
  2892. (b) (6)
  2893.  
  2894. (0) (6)
  2895.  
  2896. (D) (tij
  2897.  
  2898. (b) (6)
  2899.  
  2900.  
  2901.  
  2902. in the BCC
  2903.  
  2904.  
  2905.  
  2906. Lme
  2907. • The OPSUM must not be distributed any earlier than 0445, and no later than 0500
  2908.  
  2909. unless an early production call is issued by the NOC. If an early production is requested
  2910. the on duty analysts in responsible for notifying the TSI Senior Reviewer for that shift
  2911. as soon as possible that the time production time has been adjusted.
  2912.  
  2913. 4.1 Operational Summary (OPSUM) Format:
  2914.  
  2915. Operational Summaries (OPSUM) are distributed each morning to provide recipients
  2916. with the most current statistics for ongoing situations (e.g. NSS/ISSs, Steady-States), and
  2917. events of high media interest. As such, the OPSUM format directly reflects the published
  2918. NOC Priorities. Analyst will gather the most current media information on the active
  2919. situation(s) for the summary. The most current information is considered information not
  2920. older than 24 hours and will include information from previous IOIs in addition to
  2921. scanning for new information and relevant updates. It is important to remember that the
  2922. Operational S ummar y is used for agency briefings and must relay the most current
  2923. information in a structured and easily readable format.
  2924.  
  2925. Note: If there was a NOC item during the previous 24 hours that was closed out prior to
  2926. the drafting of the morning OPSUM, it may be included if there was significant coverage
  2927. by the MMC or heavy interest on part of the NOC while the item was active.
  2928.  
  2929. • The OPSUM is created in an Outlook email message.
  2930.  
  2931. • The standardized subject line is used for the report
  2932.  
  2933. • A short summary of the topics covered in the report will also be included in a
  2934. header for the OPSUM
  2935.  
  2936. • Analyst will utilize a header and bullet format when inputting information.
  2937.  
  2938.  
  2939.  
  2940. 26
  2941.  
  2942.  
  2943.  
  2944. Analyst's Desktop Binder 2011
  2945.  
  2946.  
  2947.  
  2948. o To distinguish between Traditional and Social Media items, all Social Media
  2949. input will be italicized. Social Media analysts will also include (Social Media)
  2950. at the end of each bullet as an additional designator.
  2951. Sources will be included with the bullets for items of high interest or particularly
  2952. controversial summaries. SN analysts will include links to translated articles if using
  2953. foreign language sources.
  2954.  
  2955.  
  2956.  
  2957. NOC MEDIA MONITORING OPERATIONAL SUMMARY (OPSUM)
  2958.  
  2959. 24 Hour Summary, August 16, 2011
  2960.  
  2961. TODAY'S OPSUM COVERS THE FOLLOWING NOC PRIORITIES
  2962. • NOC Priority Items with new information
  2963.  
  2964.  
  2965.  
  2966. Southwest Border Violence
  2967.  
  2968.  
  2969.  
  2970. Other Significant Items
  2971.  
  2972. Severe Weather
  2973.  
  2974.  
  2975.  
  2976. o
  2977.  
  2978.  
  2979.  
  2980. Hyper Links Take Reader To Relevant
  2981. Sections
  2982.  
  2983.  
  2984.  
  2985. ■ KY/IN
  2986.  
  2987.  
  2988.  
  2989. Items Identified on NOC Priorities
  2990. but not reported By MMC/SN
  2991.  
  2992.  
  2993.  
  2994. (Social Media)
  2995. designates
  2996.  
  2997. contributions from SN
  2998. Sources. NOT BOLD
  2999.  
  3000.  
  3001.  
  3002. Al Qaeda Urges Attacks Against U.S.
  3003. Continued Violence in Syria
  3004. • NOC Priority Items (Nothing Significant To Report (NSTR)) 4
  3005.  
  3006. Commercial Aviation Cargo Threats/Incidents in the U.S. and Overseas
  3007.  
  3008. o Indications of Mass Migration in the Caribbean
  3009.  
  3010. o CBRNE Threats/Incidents in the U.S. and its Territories
  3011.  
  3012. NOC 0003-11: Southwest Border Violence - U.S./Mexico Border
  3013.  
  3014.  
  3015.  
  3016. Killings (non U.S. persons)
  3017.  
  3018. The Mexican Army captured the suspected leader of a Beltran Leyva drug cartel who allegedly controlled
  3019. drug trafficking in the Costa Grande region of Guerrero state and orchestrated a number of killings Fox
  3020. News Latino
  3021.  
  3022.  
  3023.  
  3024. The suspect had ta ken over the Beltran Leyva cartel's operations in the city of Zihuatanejo,
  3025. Guerrara, after th^ arrest of one of his bosses, unleashing a wave of executions of rival group
  3026.  
  3027.  
  3028.  
  3029. members
  3030.  
  3031. Killings (non U.S. persons) (Social Media)
  3032.  
  3033. • Three separate grenade attacks in Mexican cities over the weekend have resulted in 1 death and / injuries
  3034. Milenio News [Trdnsldted by Google]
  3035.  
  3036. o The dttdcks occurred dt a prison in ApoddCd, Nuevo Leon; on a busy tourist boulevdrd in
  3037. Verdcruz; dnd dt a movie thedter in Reynosd
  3038.  
  3039. • The director of the Ixtldhudcdn del Rio Police wds executed on Sdturddy night in dn dmbuldnce in the
  3040. municipdlity of Cuquio Guerrd Contm El Ndrco [Trdnsldted by Google]
  3041.  
  3042. o Medicdl stdff confirmed thdt the vehicle wds intercepted by dn unknown number of individudls on
  3043.  
  3044. the Rio-Cuquio Ixtldhudcdn highwdy dt Sdn Judn del Monte
  3045. o The murderers bedt emergency medicdl technicidns dfter the execution dnd fled
  3046.  
  3047.  
  3048.  
  3049. Other Impacts of Southwest Border Violence (SWBV)
  3050.  
  3051. • As part of the Central American Law Enforcement Exchange, law enforcement officers from Latin America
  3052. are training with local police in Los Angeles on combating international gang crimes, especially narcotics
  3053. trafficking, kidnapping and human trafficking
  3054.  
  3055. o The Exchange features a week-long training class made up of about 30 officers from the U.S., El
  3056.  
  3057. Salvador, Panama, Costa Rica, Honduras and other countries,
  3058. o FBI Officials said Los Angeles stands to benefit from the collaboration because there are up to 500
  3059. gangs in the area ranging between 5,000 and 7,000 members.
  3060.  
  3061.  
  3062.  
  3063. Sources
  3064. Included for
  3065. Bullets
  3066. Including
  3067. Significant
  3068. Value or
  3069. Controversial
  3070. Information
  3071.  
  3072.  
  3073.  
  3074. TBack to topi
  3075.  
  3076.  
  3077.  
  3078. Analyst's Desktop Binder 2011
  3079.  
  3080.  
  3081.  
  3082. Double
  3083. Space
  3084. Between
  3085. Sections
  3086.  
  3087.  
  3088.  
  3089. OTHER SIGNIFICANT EVENTS:
  3090.  
  3091. Severe Weather — Kentucky / Indiana (Social Media) Twitter [WAVE 3 News]
  3092.  
  3093. • As of 3:00 a.m. [16 Aug] local time, LG &E's outage map was reporting less than 12,000 customers
  3094. without power in Jefferson County, down from a peak of over 128,000 Saturday night
  3095.  
  3096. LG & E hopes to have a majority of customers back up and running Monday and Tuesday, and the
  3097.  
  3098. remaining by Wednesday
  3099. The Jefferson County Public School system cancelled all classes on Monday due to power outages
  3100. in the area
  3101. Duke Energy reports 1,516 outages remaining across 5 Indiana counties
  3102.  
  3103.  
  3104.  
  3105. 1
  3106.  
  3107.  
  3108.  
  3109. New Al Qaeda Leader Urges Attacks on the U.S. Fox News (AP)
  3110.  
  3111. • In a video posted on militant websites Sunday, Al Qaeda' s new leader called on followers to avenge the
  3112. killing of Osama bin Laden and to continue the Islamist jihad against America
  3113.  
  3114. The leader also stated that uprisings in Egypt and Tunisia have presented Al Qaeda with
  3115.  
  3116. opportunities to spread its message throughout the Arab world
  3117. Al Qaeda has tried to forge a role for itself in the recent uprisings though it has little in common
  3118. with the mainly youth activists behind the protests.... most uprising leaders say they seek greater
  3119. freedoms, not Islamic states
  3120.  
  3121.  
  3122.  
  3123. Continued Violence in Syria Reuters
  3124.  
  3125. • Syrian forces shelled residential districts in Latakia on Monday, the third day of an assault on Sunni
  3126. neighborhoods of the port city
  3127.  
  3128. Approximately 35 people, and possibly more, have been killed in the city since the assault on
  3129. Latakia began on Saturday, activists and witnesses say (Social Media)
  3130.  
  3131. • More than 5,000 Palestinian refugees have fled a camp in Latakia (Social Media)
  3132.  
  3133. It was not immediately clear where the refugees were seeking shelter (Social Media)
  3134. A UN spokesman reports that "there were 10,000 refugees in the camp" prior to the attack (Social
  3135. Media)
  3136.  
  3137. • Separately, troops conducted raids and arrests in the village of Houla
  3138.  
  3139. • UN authorities cite reports that Syrian security forces have opened fire on defectors within their own ranks
  3140. and executed troops that refused orders to kill civilians (Social Media)
  3141.  
  3142. "There are indications that more than 300 security forces or army personnel have died, in
  3143.  
  3144. circumstances that remain to be elucidated, but could include clashes with armed opposition as
  3145. well as internal executions of defecting soldiers," officials said (Social Media) <
  3146.  
  3147.  
  3148.  
  3149. TBack to topi
  3150.  
  3151.  
  3152.  
  3153. Link takes reader back to
  3154. top of report
  3155.  
  3156.  
  3157.  
  3158. Analyst's Name
  3159.  
  3160. Operations Analyst
  3161.  
  3162. DHS NOC Media Monitoring
  3163.  
  3164. Phoii
  3165.  
  3166. Cell:
  3167.  
  3168.  
  3169.  
  3170. (Social Media) designates
  3171. contributions from SN Sources.
  3172. NOT BOLD
  3173.  
  3174.  
  3175.  
  3176. (b) (6)
  3177.  
  3178.  
  3179.  
  3180. 28
  3181.  
  3182.  
  3183.  
  3184. Analyst's Desktop Binder I 2011
  3185.  
  3186.  
  3187.  
  3188. Retrieving NOC Priorities from Homeland Security Information
  3189. Network (HSIN):
  3190.  
  3191. The National Operations Center publishes a daily NOC Priorities report every 24 hours to
  3192. identify the priorities for each shift and help guide the information gathering activities of
  3193. NOC personnel. This report is usually distributed via email from the NOC between 2000-
  3194. 2300 each day. Analyst should use the priorities report to direct their reporting and as a guide
  3195. for the generation of the Operational Summary.
  3196.  
  3197.  
  3198.  
  3199.  
  3200.  
  3201.  
  3202. u _4i _* kjjj fe *«— & r * *::„
  3203.  
  3204.  
  3205.  
  3206.  
  3207.  
  3208.  
  3209. -■•■■-- ' :;."f
  3210.  
  3211.  
  3212.  
  3213. ■-B-
  3214.  
  3215.  
  3216.  
  3217. ■t I*-*"
  3218.  
  3219.  
  3220.  
  3221. rni ■ -n^l tt*i j_tifcinuji.ini
  3222. IV &«fc,I^M^;-n7l3W!F7?WST'S^^ '-'■■- HlllfTrim
  3223.  
  3224.  
  3225.  
  3226. ■mi rttao.iJ,Mij7.:jAM
  3227.  
  3228.  
  3229.  
  3230. a^
  3231.  
  3232.  
  3233.  
  3234. ]WX Piiniriir. inrl l.fenflnnn; Drum) !m ST imuil »)l 4ftN*il f i dati i]T HI)
  3235.  
  3236.  
  3237.  
  3238.  
  3239.  
  3240.  
  3241. rr
  3242.  
  3243.  
  3244.  
  3245. LhClASSIFIEDr.-FOfl OFFICIAL USE OKLY
  3246. U. 5. 3tpjrn-i-i n J Hnmiland Sacunty
  3247.  
  3248. Qfllc* of Optrjwns Cooridlnjdonind punning
  3249. NOC PrinrfMa and Monitoring Rupert
  3250.  
  3251. 3d. Hour Duiroak tar ff Augun 3011 - Unditi 1
  3252.  
  3253.  
  3254.  
  3255. 1 NOC Fmmtws and ir*ms t>i l«tfere™t
  3256.  
  3257. Eita*wCtnifTuiii«tir4 Si^on $ECR£TAftV *nd CEPUtV £ECKiTT*AY
  3258.  
  3259. NOC 03 1 £- i 1 Saradr S;«c - TS EfflMEd* - Ctni al FKifie
  3260.  
  3261. NOCOMB-lt SoulhttKtBontwVidence
  3262.  
  3263. NOCOOOO't CumnwfeiBl AMBifln r;»:gfl fhf eaHflCH*Enl^ m he tf s HndCveHftH
  3264.  
  3265. NOC OIIKkll lrdii:«i.om ur I.'kw MigDiliBE m LImsCmiUkjh
  3266.  
  3267. NOC QQt2-1t CBRN6 Thfw&lrttttows mififi U 5 and (s TGmLorrci
  3268.  
  3269. 0«g [ ..■.:, J1 , JH ?**(***
  3270.  
  3271. £ECft£1V«Y. NCR
  3272. DEPUTY SEGREFARV NCR
  3273. QP3 Ltrtmbc
  3274. □waor NCR
  3275.  
  3276. DHS Smvi SjH RcjutfUb Tut InfmfiwlKn ' Evn« Suskmi NTR
  3277.  
  3278.  
  3279.  
  3280. 5.1 NOC Priorities (HSIN Retrieval)
  3281.  
  3282. These instructions should be utilized as a means of retrieving the National Operations
  3283. Center Priorities for each shift should there be a malfunction in the automated forwarding
  3284. system.
  3285.  
  3286. 1) Step One: Access the Homeland Security Information Network
  3287.  
  3288.  
  3289.  
  3290. H5IN Government Portal
  3291.  
  3292. Home
  3293.  
  3294.  
  3295.  
  3296.  
  3297. Your Contact Card
  3298.  
  3299.  
  3300.  
  3301.  
  3302. Orgs nEStion I
  3303.  
  3304. First Name:
  3305.  
  3306. Middle Initial: .
  3307.  
  3308. Last Name;
  3309.  
  3310. Ern-fli-l Address:
  3311. Mobile Email Address:
  3312. Trtler
  3313.  
  3314. Adcess- Nam*:
  3315. Address Una u
  3316. Adds-MoLmo 2;
  3317. Cttf.;
  3318.  
  3319. State:
  3320.  
  3321. Postal Coder
  3322.  
  3323. Country;
  3324.  
  3325. First Choice of Contact;
  3326. SECD-nd Choice, or Contact:
  3327. Third Choice of Contact:
  3328.  
  3329.  
  3330. TECH DP Eolations International
  3331. Michael
  3332.  
  3333.  
  3334. v our Address Sook
  3335. Edit Ydl* - [information
  3336.  
  3337. Changs Your Pascncd
  3338. View Community List
  3339.  
  3340.  
  3341. b 6 , b 7 C ■ ' M
  3342.  
  3343.  
  3344. Ope*-ations Center Media Analyst
  3345.  
  3346. jgjBHBH
  3347.  
  3348. WashinntrjnD.C.
  3349.  
  3350. 2QQL6 "
  3351. Unitod Ststoa
  3352. EmailAddress
  3353. IHiMtrw : = hone
  3354.  
  3355.  
  3356. [Qajsn3ia:(a]
  3357.  
  3358. Mobil e Phone : ^^^^^^^™
  3359. Ottier Rione:
  3360.  
  3361.  
  3362. your Co^nmunitioB
  3363.  
  3364. Federal
  3365. Emeffjen-cy Manaflemanl
  3366. Federal Operations'
  3367. H3]N Government Home
  3368. National Operations Center
  3369.  
  3370.  
  3371.  
  3372.  
  3373.  
  3374.  
  3375.  
  3376.  
  3377.  
  3378.  
  3379.  
  3380.  
  3381.  
  3382. 29
  3383.  
  3384.  
  3385.  
  3386. Analyst's Desktop Binder I 2011
  3387.  
  3388.  
  3389.  
  3390. 2) Step Two: Select the National Operations Center Tab in the lower left earner.
  3391.  
  3392.  
  3393.  
  3394.  
  3395.  
  3396. Kager:
  3397. Other Phone:
  3398.  
  3399.  
  3400.  
  3401.  
  3402. Your Communities
  3403. Federal
  3404.  
  3405. Emergency Management
  3406.  
  3407. Federal Operations
  3408. ^k HSIN Government Home
  3409.  
  3410. National Operations Center
  3411.  
  3412.  
  3413.  
  3414.  
  3415.  
  3416.  
  3417.  
  3418. 3) Step Three: Select the Library Tab.
  3419.  
  3420.  
  3421.  
  3422.  
  3423. HSIN
  3424.  
  3425.  
  3426.  
  3427. ! I NJ. Watch Desks | Library I Tr amino | H5IH Database ! COP | support
  3428.  
  3429.  
  3430.  
  3431. ral [ipergtions Center
  3432. fruriicernents
  3433.  
  3434. ■Jew [tern | ^Fitter
  3435.  
  3436.  
  3437.  
  3438. t
  3439.  
  3440.  
  3441.  
  3442.  
  3443. iteragency Threat Assessment and Coordination Group Brochure
  3444.  
  3445. SIN System Migration
  3446.  
  3447. OC Watch COOP Familiarization Tour (March 3008)
  3448.  
  3449. OC Cornmunrt/ of Interest architecture modification
  3450.  
  3451.  
  3452.  
  3453. -ndar
  3454.  
  3455.  
  3456.  
  3457. 4) Step Four: Scroll down to the document library section.
  3458.  
  3459.  
  3460.  
  3461. 30
  3462.  
  3463.  
  3464.  
  3465. Analyst's Desktop Binder I 2011
  3466.  
  3467.  
  3468.  
  3469. Home | NOCWatchDcsks | Library | Training | HSIN Database | COP | Support
  3470.  
  3471.  
  3472.  
  3473. National Operations Center
  3474. NOC Watch Desk SOPs
  3475.  
  3476.  
  3477.  
  3478. i BJI Crisis Action Process Operating Instructions (v. 10 as of 17 Apr 07-SWS)
  3479.  
  3480. i3] IIMG SOP (02 23 OS)
  3481.  
  3482. * BQ JFO SOP Appendix-Annexes (v55)
  3483.  
  3484.  
  3485.  
  3486. Q Add new document
  3487.  
  3488.  
  3489.  
  3490. Type Name
  3491.  
  3492. ■Q 11000-14 identification Access Control Card Request
  3493.  
  3494. |3g| 11000-25 Contract Suitability-Security Screening Request Form
  3495.  
  3496. §| 3130 DHS Non-Staff Assignment Form
  3497.  
  3498. St] NAC Access Control - Visitor Access Form
  3499.  
  3500. ^3 NAC Access Control and Visitor Access Procedures (memo 9-26-06)
  3501.  
  3502.  
  3503.  
  3504. a Add new document
  3505.  
  3506.  
  3507.  
  3508. «"
  3509.  
  3510.  
  3511.  
  3512. Type Name
  3513.  
  3514. ^] DHS OPS-HSOC-NOC SA-COP Brief 24 May 06
  3515.  
  3516. 9t1 The Evolution of HSOC Situational Awareness 03 April 2006 R.EV4_hurricarte_ version
  3517.  
  3518. Ha DHS CINT Intelligence Notes
  3519.  
  3520. r*g DHS Cyber Daily Reports
  3521.  
  3522. DHS Daily Ops Report
  3523.  
  3524. t=EMA National SITREP
  3525.  
  3526.  
  3527.  
  3528. El
  3529. Ca
  3530.  
  3531.  
  3532.  
  3533. NOAA Meteorological Update
  3534.  
  3535. NOC Priorities and Monitoring Reports
  3536.  
  3537.  
  3538.  
  3539. 5) Step Five: Select the NOC Priorities folder:
  3540.  
  3541.  
  3542.  
  3543. Type Name
  3544.  
  3545.  
  3546. £
  3547.  
  3548.  
  3549. *3] DHS OPS-HSOC-NOC 5A-COP Brief Z4 May 06
  3550.  
  3551. Plf) The Evolution of HSOC Situational Awareness 03 April 2006 REV4_hurricane_version
  3552.  
  3553. ^ DHS CINT Intelligence Notes
  3554.  
  3555.  
  3556. (b)(6), (b)(7)(C)
  3557.  
  3558.  
  3559.  
  3560.  
  3561. C3 DHS Cyber Daily Reports
  3562.  
  3563.  
  3564. Ca DHS Daily Ops Report
  3565.  
  3566.  
  3567. ES FEMA National SITREP
  3568.  
  3569. f^ NOAA Meteorological Update
  3570.  
  3571. P^ NOC Priorities and Monitoring Reports -*^^^bbbbbbbbbbbbbbbbbibbm
  3572.  
  3573.  
  3574. h Add new document
  3575.  
  3576.  
  3577.  
  3578. Operations Directorate COOP Documents
  3579.  
  3580.  
  3581.  
  3582. 31
  3583.  
  3584.  
  3585.  
  3586. Analyst's Desktop Binder I 2011
  3587.  
  3588.  
  3589.  
  3590. 6) Step Six: When the folder opens, scroll down to the Document Library
  3591.  
  3592.  
  3593.  
  3594. [ICIM National Operations
  3595. nrDIIM Center [NQQ AW*
  3596.  
  3597.  
  3598.  
  3599. tsmm ~i i
  3600.  
  3601.  
  3602.  
  3603. Home | HOC Watch Desks | Library | Training | HSIN Database | COP | Support
  3604.  
  3605.  
  3606.  
  3607. National Operations Center
  3608. NOC Watch Desk SOPs
  3609.  
  3610.  
  3611.  
  3612. ^] Crisis Action Process Operating Instructions (v.10 as of 17 Apr 07-SWS)
  3613.  
  3614. § IIMG SOP (02 23 05J
  3615.  
  3616. W\ JFC SOP Appendix-Annexes (vBSj
  3617.  
  3618.  
  3619.  
  3620. h Add new document
  3621.  
  3622.  
  3623.  
  3624. A Modified By
  3625.  
  3626.  
  3627.  
  3628.  
  3629. Type Name
  3630.  
  3631. ^1 Li.000-14 Identification Access Control Card Request
  3632.  
  3633. J pQj| 11000-25 Contract Suitability-Security Screening Request Form
  3634.  
  3635. 13^ 3 -— DHS Non-Staff Assignment Form
  3636.  
  3637. @f| NAC Access Control - Visitor Access Form
  3638.  
  3639.  
  3640.  
  3641. NAC Access Control and Visitor Access Procedures (memo 9-26-06)
  3642.  
  3643.  
  3644.  
  3645. 1 Modified By-
  3646.  
  3647.  
  3648.  
  3649.  
  3650. Ei Add new document
  3651.  
  3652.  
  3653.  
  3654. Document Library
  3655.  
  3656.  
  3657.  
  3658. NOC Priorities and Monitoring Report 5 December 2003 I new
  3659. NOC Priorities and Monitoring Report 4 December 2003
  3660.  
  3661.  
  3662.  
  3663. h Add new document
  3664.  
  3665.  
  3666.  
  3667. rations Directorate COOP Documents
  3668.  
  3669.  
  3670.  
  3671. i Modified By
  3672.  
  3673.  
  3674.  
  3675. (b)(6), (b)<7)(c;
  3676.  
  3677.  
  3678.  
  3679. 7) Step Seven: Select the NOC Priority list for the desired date:
  3680.  
  3681.  
  3682.  
  3683.  
  3684.  
  3685.  
  3686.  
  3687.  
  3688.  
  3689. Tvoe Name ^ , ± J _ L _ ;■_■__ ,,
  3690.  
  3691.  
  3692.  
  3693.  
  3694. ■ AL&. •' *j
  3695.  
  3696.  
  3697.  
  3698.  
  3699. U3' 5 ! NOC Priorities and Monitorina Report 4 December 2003 ^^^
  3700.  
  3701.  
  3702. ■■I
  3703.  
  3704.  
  3705. h Add new document
  3706.  
  3707.  
  3708.  
  3709.  
  3710.  
  3711.  
  3712.  
  3713.  
  3714.  
  3715.  
  3716.  
  3717.  
  3718.  
  3719.  
  3720.  
  3721. 32
  3722.  
  3723.  
  3724.  
  3725. Analyst's Desktop Binder I 2011
  3726.  
  3727.  
  3728.  
  3729. 6 Audio Video System:
  3730.  
  3731.  
  3732.  
  3733. 6. 1 Direct TV Full Channel List
  3734.  
  3735.  
  3736.  
  3737. A&E 265
  3738.  
  3739. ABC Family 311
  3740.  
  3741. American Movie Classics (AMC) 254
  3742.  
  3743. America's Store 243
  3744.  
  3745. Animal Planet 282
  3746.  
  3747. BBC America 264
  3748.  
  3749. The Biography Channel 266
  3750.  
  3751. Black Entertainment Television
  3752.  
  3753. (BET) 329
  3754.  
  3755. Bloomberg Television 353
  3756.  
  3757. Boomerang 297
  3758.  
  3759. Bravo 273
  3760.  
  3761. BYU TV 374
  3762.  
  3763. Cartoon Network 296
  3764.  
  3765. CCTV-9 (Chinese) 455
  3766.  
  3767. The Church Channel 371
  3768.  
  3769. CNBC 355
  3770.  
  3771. CNBC World 357
  3772.  
  3773. CNN 202
  3774.  
  3775. Comedy Central 249
  3776.  
  3777. Country Music Television (CMT) 327
  3778.  
  3779. Court TV 203
  3780.  
  3781. C-SPAN 350
  3782.  
  3783. C-SPAN2 351
  3784.  
  3785. CSTV: College Sports Television
  3786.  
  3787. 610
  3788.  
  3789. Current TV 366
  3790.  
  3791. Daystar 369
  3792.  
  3793. Discovery Channel 278
  3794.  
  3795. Discovery Health Channel 279
  3796.  
  3797. Discovery Home Channel 286
  3798.  
  3799. Discovery Kids 294
  3800.  
  3801. Discovery Times Channel 285
  3802.  
  3803. DIY Network 230
  3804.  
  3805. El Entertainment Television 236
  3806.  
  3807.  
  3808.  
  3809. EWTN 422
  3810.  
  3811. FINE LIVING 232
  3812.  
  3813. FitTV 368
  3814.  
  3815. Food Network 231
  3816.  
  3817. Fox News Channel 360
  3818.  
  3819. Fox Reality 250
  3820.  
  3821. FUELTV612
  3822.  
  3823. Fuse 339
  3824.  
  3825. FX248
  3826.  
  3827. G4 videogame tv 354
  3828.  
  3829. Galavision 404
  3830.  
  3831. GolTV 426
  3832.  
  3833. Great American Country 326
  3834.  
  3835. GSN: the network for games 309
  3836.  
  3837. Hallmark Channel 312
  3838.  
  3839. Headline News 204
  3840.  
  3841. The History Channel 204
  3842.  
  3843. History International 271
  3844.  
  3845. HITN TV+438
  3846.  
  3847. Home & Garden Television 229
  3848.  
  3849. Home Shopping Network 240
  3850.  
  3851. The Learning Channel {TLC) 280
  3852.  
  3853. Lifetime 252
  3854.  
  3855. Lifetime Real Women 261
  3856.  
  3857. Link TV 375
  3858.  
  3859. The Military Channel 287
  3860.  
  3861. MSNBC 356
  3862.  
  3863. MTV 331
  3864.  
  3865. MTV2 333
  3866.  
  3867. National Geographic Channel 276
  3868.  
  3869. NASA TV 376
  3870.  
  3871. NBA TV 720
  3872.  
  3873. News Mix 102
  3874.  
  3875. NRB Network 378
  3876.  
  3877. NFL Network 212
  3878.  
  3879.  
  3880.  
  3881. Nickelodeon/Nick at Nile (East) 299
  3882.  
  3883. Nickelodeon/Nick at Nile (West) 300
  3884.  
  3885. Nicktoons Network 302
  3886.  
  3887. Noggin/The N 298
  3888.  
  3889. Outdoor Channel 606
  3890.  
  3891. OLN 608
  3892.  
  3893. ONCEMexico t 415
  3894.  
  3895. Oxygen 251
  3896.  
  3897. QVC317
  3898.  
  3899. RFD-TV 379
  3900.  
  3901. Sci-Fi Channel 244
  3902.  
  3903. Speed 607
  3904.  
  3905. Spike TV 325
  3906.  
  3907. Superstation WGN 307
  3908.  
  3909. TBS 247
  3910.  
  3911. TCT Network 377
  3912.  
  3913. TNT 245
  3914.  
  3915. Travel Channel 277
  3916.  
  3917. Trinity Broadcasting Network (TBN)
  3918.  
  3919. 372
  3920.  
  3921. Turner Classic Movies (TCM) 256
  3922.  
  3923. Turner South* 631
  3924.  
  3925. TV Guide Channel 224
  3926.  
  3927. TV Land 301
  3928.  
  3929. TV One 241
  3930.  
  3931. TVGThe Interactive Horseracing
  3932.  
  3933. Network 602
  3934.  
  3935. Univision402
  3936.  
  3937. USA Network 242
  3938.  
  3939. VH1 335
  3940.  
  3941. VH1 Classic 337
  3942.  
  3943. The Weather Channel 362
  3944.  
  3945. The Word 373
  3946.  
  3947. World Harvest Television (WHT) 321
  3948.  
  3949.  
  3950.  
  3951. 6.2 Direct TV Account Information
  3952.  
  3953.  
  3954.  
  3955. Contac
  3956.  
  3957.  
  3958.  
  3959. (b)(6), (b)(7)(C)
  3960.  
  3961.  
  3962.  
  3963. 6.3 Online Audio-Video Switch
  3964.  
  3965. In order to change the channels for the displays at t he front of the MMC office, analyst must
  3966. access the TSI network at: http:
  3967.  
  3968.  
  3969.  
  3970. b 7 E
  3971.  
  3972.  
  3973.  
  3974. Username:!!-
  3975. Password
  3976.  
  3977.  
  3978.  
  3979.  
  3980. ere is one universal usemame/password for everyone)
  3981.  
  3982.  
  3983.  
  3984. It's probably a good idea to have this interface available during your shift, so that you can make
  3985. any adjustments on the fly.
  3986.  
  3987. Manual Switching
  3988.  
  3989. Using the matrix of Inputs (along left side) and Outputs (along top side) you can quickly click
  3990.  
  3991. which source you would like to display on any one of 5 outputs. Selection is made by clicking
  3992. the button that references the combination of Input and Output you wish to see, and then click
  3993.  
  3994.  
  3995.  
  3996. 33
  3997.  
  3998.  
  3999.  
  4000. Analyst's Desktop Binder 2011
  4001.  
  4002.  
  4003.  
  4004. the "Submit" button at the bottom of the page. Outputs 1 through 4 correspond to the TVs left to
  4005. right, from top row to bottom row:
  4006.  
  4007.  
  4008.  
  4009. ONE
  4010.  
  4011.  
  4012. TWO
  4013.  
  4014.  
  4015. THREE
  4016.  
  4017.  
  4018. FOUR
  4019.  
  4020.  
  4021.  
  4022. Output 5 allows you to assign the audio of any input to the overall room speakers.
  4023.  
  4024. Stored Configurations
  4025.  
  4026. To make common configurations easily and quickly available, we have set up some presets. By
  4027. selecting the number from the drop-down menu under "Stored Configurations" and clicking
  4028. "Load", you can call up these stored presets. These settings can be changed if we find specific
  4029. presets that are preferred.
  4030.  
  4031. 1) MMC Extended Desktop HSIN (1), CNN (2), FOX News (3) MSNBC (4).
  4032.  
  4033. 2) MMC Extended Desktop HSIN (2), CNN (1), FOX News (3) MSNBC (4).
  4034.  
  4035. 3) MMC Extended Desktop HSIN (3), CNN (2), FOX News (1) MSNBC (4).
  4036.  
  4037. 4) MMC Extended Desktop HSIN (4), CNN (2), FOX News (1) MSNBC (3).
  4038.  
  4039. 5) SN Extended Desktop HSIN (1), CNN (2), FOX News (3) MSNBC (4).
  4040.  
  4041. 6) SN Extended Desktop HSIN (2), CNN (1), FOX News (3) MSNBC (4).
  4042.  
  4043. 7) SN MAC Desktop HSIN (2), CNN (1), FOX News (3) MSNBC (4).
  4044.  
  4045. 8) SN MAC Desktop (3), CNN (1), FOX News (2) MSNBC (4).
  4046.  
  4047.  
  4048.  
  4049. 34
  4050.  
  4051.  
  4052.  
  4053. Analyst's Desktop Binder I 2011
  4054.  
  4055.  
  4056.  
  4057. 7 HSIN^myg Connection Instructions:
  4058.  
  4059. QuU||| is a Text based cornniunications tool utilized by the D epartme nt of Homeland Security to
  4060. connect individuals at different locations. The MMC utilizes [j||jjjjjj as a means to communicate
  4061. with members of the NOC Watch throughout the shift. The NOC has a dedicated chat room,
  4062. identified as NOCWatch in which all members of t he NOC Watch team can post information
  4063. regarding ongoing incidents. MMC analysts will useUijjUH to pass information on rapidly
  4064. evolving situations, request information and conmiumcatedirectly with the SWO, KMO or
  4065. NDD.
  4066.  
  4067. Once logged into HSIN. click on theB||IBj||do\\iiload box on the right side of the Emergency
  4068. Management Portal. After selecting tneljgUb|jJ full client download, you will be provided with
  4069. theijjj |jLj|j EXE file. Once the download is complete, follow each of the instructions given by the
  4070. prompt wmdows until the installation process is complete.
  4071.  
  4072. After the file is insta lie d analy sts will need to adjust the programs configuration settings. When
  4073. the login screen for thetj||j||H thick client conies up there a couple settings that need to be
  4074. entered into the login screen to set up the connection. This information includes the domain you
  4075. will be connecting to, your login credentials, and the port that will be used for the connection.
  4076. Any variants in this information could result in a user having issues connecting to the necessary
  4077. servers.
  4078.  
  4079. The initial login screen prompts the user for fairly basic information. This information includes a
  4080. usemame, password, domain, and also asks if you want to use an existing account or crea te a
  4081. new one. The ability to create a new account is not functional in this release of the j|2UusJ thick
  4082. client software, resulting in an error message when users attempt to do this. The res t of the
  4083. information, with exception of resource is mandatory to successfully log into HSINF
  4084.  
  4085.  
  4086.  
  4087. The usemame and password are specific to each individual user that is going to be logging into
  4088. the client software. However, the domain information is going to consistent for all users. The
  4089. domain that needs to be supplied is "hsin.gov". Once this information has been entered it allows
  4090. the user to save then password, this is not suggested for security reasons.
  4091.  
  4092.  
  4093.  
  4094. 35
  4095.  
  4096.  
  4097.  
  4098. Analyst's Desktop Binder I 2011
  4099.  
  4100.  
  4101.  
  4102. Account Information
  4103.  
  4104. Enter your account Information.
  4105.  
  4106.  
  4107.  
  4108. C 1 want to create a new account
  4109. ©I have an existing account
  4110.  
  4111.  
  4112.  
  4113. Lfeamame
  4114.  
  4115.  
  4116. | john.doe
  4117.  
  4118.  
  4119.  
  4120.  
  4121.  
  4122.  
  4123. Password
  4124.  
  4125.  
  4126. | ************
  4127.  
  4128.  
  4129.  
  4130.  
  4131.  
  4132.  
  4133. Domain
  4134.  
  4135.  
  4136. J hsln.gov
  4137.  
  4138.  
  4139.  
  4140.  
  4141.  
  4142.  
  4143. Resource
  4144.  
  4145.  
  4146. W2HS531 <
  4147.  
  4148.  
  4149.  
  4150. Note: Resource names identify the client where you are logged in. IF you are
  4151. online with multiple clients at the same bme, a unique identifier is necessary to
  4152. route messages accurately. Provide a unique resource name to describe
  4153. this client/location. Example: Home, Work, Mobile, etc.
  4154.  
  4155. Q5ave my password
  4156.  
  4157. Automatically login with this Information
  4158.  
  4159.  
  4160.  
  4161. Nes<t> Finish Cancel
  4162.  
  4163.  
  4164.  
  4165. The seco nd screen for the user login requires that the use r enter the hostname which
  4166. should he^B*/yi XC|iis 1 «H' ^ ie P or * wn * cn should heUMJ|j|| and the connection type
  4167. to establish "select the checkbox that reads Use a secure connection". Note, after entering
  4168. port 443 and selecting the chec k box, the port number may change and you need to make
  4169. sure you change it back («■§■ again and then click next. These settings will remain
  4170. consistent for all the users accessing HSIN|jfi
  4171.  
  4172.  
  4173.  
  4174. Connection Information
  4175.  
  4176. Enter yuur connection hFarrration
  4177.  
  4178.  
  4179.  
  4180.  
  4181. 36
  4182.  
  4183.  
  4184.  
  4185. Analyst's Desktop Binder 2011
  4186.  
  4187.  
  4188.  
  4189. After clicking on next, the following screen will appear and you must select "Accept for
  4190. all sessions"
  4191.  
  4192.  
  4193.  
  4194. t Invalid SSL Certificate X
  4195.  
  4196.  
  4197. SSL Warning!
  4198. The server has sent you an invalid certificate.
  4199.  
  4200.  
  4201. Accept for this session only Accept for all sessions
  4202.  
  4203.  
  4204. Reject this certificate
  4205.  
  4206.  
  4207.  
  4208.  
  4209.  
  4210. 37
  4211.  
  4212.  
  4213.  
  4214. Analyst's Desktop Binder I 2011
  4215.  
  4216.  
  4217.  
  4218. 8 Usernames, Passwords & Contact Information:
  4219.  
  4220.  
  4221.  
  4222. 8.1 Passwords
  4223.  
  4224.  
  4225.  
  4226. -SN
  4227.  
  4228.  
  4229.  
  4230. MMC Wifi Network:
  4231.  
  4232. Network Name: MM C
  4233.  
  4234. Passwoidj^^g
  4235.  
  4236. Network Name^MM C' -SN (BackUp)
  4237.  
  4238. Password:
  4239.  
  4240.  
  4241.  
  4242. MMC Telephones:
  4243.  
  4244. MMC Office Voicernai
  4245. SN Office Voiceniail:
  4246. Blast Call Cell Phone
  4247.  
  4248.  
  4249.  
  4250.  
  4251.  
  4252.  
  4253. Desktops & Apple Mac Mini:
  4254.  
  4255. MMC Desktop:
  4256. MMC Mac:
  4257. SNMC Mac:
  4258. MMC Outlook
  4259. Meltwater
  4260.  
  4261.  
  4262.  
  4263. U: MMC Analyst
  4264. U: MMC Analyst
  4265. U: snmc analyst
  4266. U:
  4267. U:
  4268.  
  4269.  
  4270.  
  4271. (b) (6)
  4272.  
  4273.  
  4274.  
  4275. (b) (7)(E)
  4276.  
  4277.  
  4278.  
  4279. Shared Drives
  4280.  
  4281. MMC Address
  4282. SN Address
  4283. Usemarne:[
  4284. Password
  4285.  
  4286.  
  4287.  
  4288. (b) (7)(E)
  4289.  
  4290.  
  4291.  
  4292. (b) (7)(E)
  4293.  
  4294.  
  4295.  
  4296. MMC DHS Email (BackUp)
  4297.  
  4298. https://coiniect.dhs.gov (functions only in Microsoft Internet Explorer)
  4299. Usemame: I
  4300.  
  4301. Password ^Ef,BHCfIt3^H (changes every 90 days)
  4302. Password ]
  4303.  
  4304.  
  4305.  
  4306. (b) (7)(E)
  4307. (b)(6)
  4308.  
  4309.  
  4310.  
  4311. b 7 E
  4312.  
  4313.  
  4314.  
  4315. Video Switch:
  4316.  
  4317. Address: |
  4318.  
  4319. Click "VIDEO SWITCH"
  4320.  
  4321. Usemame:!
  4322.  
  4323. Password:
  4324.  
  4325.  
  4326.  
  4327. Twitter/ Tweet Deck:
  4328. Twitter:
  4329. Usemame: DHSr :
  4330.  
  4331. Password:
  4332. TweetDecI
  4333. Email:
  4334. Passworc
  4335.  
  4336.  
  4337.  
  4338. ;k
  4339.  
  4340.  
  4341.  
  4342.  
  4343. b) (6)
  4344.  
  4345.  
  4346.  
  4347. 38
  4348.  
  4349.  
  4350.  
  4351. Analyst's Desktop Binder I 2011
  4352.  
  4353.  
  4354.  
  4355. 8.2 TSI Senior Reviewers
  4356.  
  4357. The SWO/KMO:
  4358.  
  4359.  
  4360.  
  4361.  
  4362. lroom:NOC Watch
  4363.  
  4364.  
  4365.  
  4366. HSIN Help Desk:
  4367.  
  4368. HSIN Help Desk
  4369.  
  4370.  
  4371.  
  4372.  
  4373. TSI Senior Reviewers:
  4374.  
  4375.  
  4376.  
  4377.  
  4378. 39
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement