2009 Virginia Terrorism Threat Assessment

Total Page:16

File Type:pdf, Size:1020Kb

2009 Virginia Terrorism Threat Assessment 2009 VIRGINIA TERRORISM THREAT ASSESSMENT COMMONWEALTH OF VIRGINIA DEPARTMENT OF STATE POLICE VIRGINIA FUSION CENTER MARCH 2009 LAW ENFORCEMENT SENSITIVE 2009 VIRGINIA TERRORISM THREAT ASSESSMENT This is LAW ENFORCEMENT SENSITIVE information and is protected by Code of Virginia Title 52-48 and 52-49 unless otherwise noted. Further distribution of this document is restricted to law enforcement agencies, intelligence agencies, and Department of Defense organizations only. Prior approval shall be obtained from VFC for dissemination to other agencies. Persons or organizations violating distribution restrictions may be prosecuted and will be prohibited from receiving future documents. NO REPORT OR SEGMENT THEREOF MAY BE RELEASED TO ANY MEDIA SOURCES. Please contact the Virginia Fusion Center at (804) 674-2196 if you have any questions or need additional information. EXECUTIVE SUMMARY............................................................................................................4 OVERVIEW ................................................................................................................................5 VSP DIVISION MAP...................................................................................................................7 Division 1 ..................................................................................................................................................8 Division 2 ................................................................................................................................................10 Division 3 ................................................................................................................................................12 Division 4 ................................................................................................................................................14 Division 5 ................................................................................................................................................16 Division 6 ................................................................................................................................................18 Division 7 ................................................................................................................................................20 OVERVIEW OF TERRORIST AND EXTREMIST DATA IN VIRGINIA ....................................22 INTERNATIONAL TERRORISM THREAT ..............................................................................26 Al-Qa’ida .................................................................................................................................................27 Al-Shabaab .............................................................................................................................................29 HAMAS ...................................................................................................................................................31 Hizballah .................................................................................................................................................33 Jama’at al-Tabligh ..................................................................................................................................35 Jama’at ul Fuqra .....................................................................................................................................37 Lashkar-e Tayyiba ..................................................................................................................................39 Muslim Brotherhood................................................................................................................................41 DOMESTIC TERRORISM THREAT.........................................................................................43 Anarchist Extremists ...............................................................................................................................44 Black Separatist Extremists ....................................................................................................................48 Homegrown Islamic Extremism ..............................................................................................................52 Lone Wolf Extremists..............................................................................................................................58 Militia Extremists.....................................................................................................................................60 Special Interest Extremism .....................................................................................................................62 White Nationalist Extremism...................................................................................................................73 LAW ENFORCEMENT SENSITIVE Page 2 2009 VIRGINIA TERRORISM THREAT ASSESSMENT OVERVIEW OF TERRORISM AND EXTREMISM TRENDS ...................................................77 Bioterrorism ............................................................................................................................................78 Cyber-crime and Cyber-terrorism ...........................................................................................................80 Illicit Entry into U.S..................................................................................................................................85 Narco-terrorism.......................................................................................................................................92 Terrorism Financing................................................................................................................................95 Terrorism Tradecraft .............................................................................................................................111 Terrorist Use of Technology..................................................................................................................118 Recruitment & Radicalization................................................................................................................125 CRITICAL INFRASTRUCTURE/KEY RESOURCES.............................................................134 Agriculture and Food Sector .................................................................................................................137 Banking/Finance ...................................................................................................................................141 Chemical/HAZMAT ...............................................................................................................................146 Commercial Facilities............................................................................................................................149 Critical Manufacturing ...........................................................................................................................154 Emergency Services.............................................................................................................................154 Energy ..................................................................................................................................................158 Government Buildings/Defense Industrial Base ...................................................................................166 Information Technology and Communications......................................................................................170 Monuments and Icons ..........................................................................................................................174 Postal/Shipping.....................................................................................................................................178 Public Health and Healthcare ...............................................................................................................180 Transportation System Sectors.............................................................................................................182 Aviation .....................................................................................................................................182 Highways/Bridges .....................................................................................................................184 Ports..........................................................................................................................................188 Rail and Mass Transit ...............................................................................................................190 Water (Drinking and Waste Systems)...................................................................................................194 CONCLUSION .......................................................................................................................197 RECOMMENDATIONS ..........................................................................................................199 LAW ENFORCEMENT SENSITIVE Page 3 2009 VIRGINIA TERRORISM THREAT ASSESSMENT EXECUTIVE SUMMARY The purpose of the 2009 Terrorism Threat Assessment is to convey potential terrorism threats affecting the Commonwealth of Virginia. Terrorism, for the purpose of this report, is defined as politically motivated violence
Recommended publications
  • The Perfect Victim: the “Profile in DERP” Farce
    The Perfect Victim: The “Profile in DERP” Farce Our findings and conclusions of our investigation into the intentional false public banning of Jkid from /cgl/, the misconduct and social bullying of Jkid by the 4chan moderators and their friends involved during and after Otakon 2010, and the real problem behind the scenes of 4chan.org By a concerned group of 4channers. Twitter: @Themuckrakers Formspring: www.formspringme/Themuckrakers Youtube: youtube.com/user/Themuckraker4 Email: [email protected] 1. Obligatory Inb4 to prevent potential apathic thoughts 2. Introduction 3. Summary of Investigation 4. Details of Investigation 5. Conclusions and what you can do. Appendix: - The Underworld Logs - The Snacks AIM Notes Inb4 the following: Not your personal army Who cares? Who gives a shit/fuck? I don‟t care lol autism lol assburgers lol bullying lol black retard lol retard lol Jkid DEAL WITH IT why didn‟t he manned up U MAD why didn‟t he be a man lol aspergers I don‟t give a fuck MODS=GODS Why didn‟t he kill himself? This isn‟t my problem That‟s old history That‟s ancient history Not my problem Why are you ressurrecting I don‟t give a damn I don‟t give a fuck No spergin it No jerking it Lol black aspie MAN UP Why can‟t he get out more Whites Only No blacks allowed No asspies/aspies/spergs allowed Why can‟t he go to cosplay.com/ flickr/picasa/cosplaylab.com like everyone else? Bitch about mods somewhere else Emo bitch Get the fuck over it Why are you making a big deal out of it? You making a big deal out of nothing.
    [Show full text]
  • Thesis at Seminars and Conferences in Which I Received Helpful Feedback
    UvA-DARE (Digital Academic Repository) Updating civil disobedience Whistleblowing, anonymous hacktivism, and academic piracy Caycedo Casallas, C.B. Publication date 2019 Document Version Final published version License Other Link to publication Citation for published version (APA): Caycedo Casallas, C. B. (2019). Updating civil disobedience: Whistleblowing, anonymous hacktivism, and academic piracy. General rights It is not permitted to download or to forward/distribute the text or part of it without the consent of the author(s) and/or copyright holder(s), other than for strictly personal, individual use, unless the work is under an open content license (like Creative Commons). Disclaimer/Complaints regulations If you believe that digital publication of certain material infringes any of your rights or (privacy) interests, please let the Library know, stating your reasons. In case of a legitimate complaint, the Library will make the material inaccessible and/or remove it from the website. Please Ask the Library: https://uba.uva.nl/en/contact, or a letter to: Library of the University of Amsterdam, Secretariat, Singel 425, 1012 WP Amsterdam, The Netherlands. You will be contacted as soon as possible. UvA-DARE is a service provided by the library of the University of Amsterdam (https://dare.uva.nl) Download date:24 Sep 2021 1 Cover image: Caycedo, B. 2019. No rights reserved. UPDATING CIVIL DISOBEDIENCE Whistleblowing, Anonymous Hacktivism, and Academic Piracy Carlos Bernardo Caycedo Casallas Ph.D. Dissertation, Amsterdam School for Cultural Analysis University of Amsterdam UPDATING CIVIL DISOBEDIENCE Whistleblowing, Anonymous Hacktivism, and Academic Piracy ACADEMISCH PROEFSCHRIFT ter verkrijging van de graad van doctor aan de Universiteit van Amsterdam op gezag van de Rector Magnificus prof.
    [Show full text]
  • Anonymous/ the World of Hackers DCV3.Pages
    * Hacker Manifesto Music: Credit Karl Casey @ White Bat Audio Cold Open: “We are Legion. We do not forgive. We do not forget. Expect us.” This is the typical calling card sign-off for Anonymous, a hacking collective that had formed by 2007. These hackers/activists - or to use their language, “hacktivists” - have used their ability to break into the technology that runs our lives to protest governments, bring down websites, and expose countless pieces of personal information. Anonymous has hassled the KKK, the Church of Scientology, and various governments across the world. They’ve hacked into institutions previously thought to be un-hackable. Like the NSA - the US National Security Agency. Who are they? Well- as the name implies - they are… anonymous. We don’t know most of their identities. They hide behind online aliases and the iconic Guy Fawkes mask from V for Vendetta. Anonymous was born on 4-Chan’s B-Board - a forum dedicated to sharing ridiculous content, offensive jokes, and otherwise provide a safe-haven for young people with dark senses of humor. Humor like mine. Probably like yours. And from this community would bloom an ethos centered around protecting free speech, fighting government corruption, trying to not pay for copy-written movies and music, and sometimes fucking with completely innocent people just for some lulz [lulls]. Anonymous has backed both revolutions and cyber bullying. Today we will dig into the deeds and misdeeds of Anonymous - how they began, what they’ve done, and also dive into the history of hacking. Who were the first hackers? How has hacking evolved over the years? What kinds of heists have some of the world’s most talented and criminally- minded hackers pulled off? Been listening to a lot of early 2000’s techno this week doing the research.
    [Show full text]
  • The Case of Anonymous and Project Chanology a Thes
    New Directions in Networked Activism and Online Social Movement Mobilization: The Case of Anonymous and Project Chanology A thesis presented to the faculty of the College of Arts and Sciences of Ohio University In partial fulfillment of the requirements for the degree Master of Arts Patrick C. Underwood June 2009 © 2009 Patrick C. Underwood. All Rights Reserved. 2 This thesis titled New Directions in Networked Activism and Online Social Movement Mobilization: The Case of Anonymous and Project Chanology by PATRICK C. UNDERWOOD has been approved for the Department of Sociology and Anthropology and the College of Arts and Sciences by Howard T. Welser Assistant Professor of Sociology Benjamin M. Ogles Dean, College of Arts and Sciences 3 ABSTRACT UNDERWOOD, PATRICK C., M.A., June 2009, Sociology New Directions in Networked Activism and Online Social Movement Mobilization: The Case of Anonymous and Project Chanology (242 pp.) Director of Thesis: Howard T. Welser The present study explores the structural aspects of online communities and the potential of online communications technologies for social movement mobilization. This is accomplished through an examination of the online collective known as Anonymous and this group’s social movement activism targeted against the Church of Scientology. The research is primarily concerned with answering questions of how the social structural contexts of Anonymous as an online community influenced the growth and development of Project Chanology, how Anonymous is able to establish insider status and group boundaries without access to traditional markers of identity, and what, if any, form of leadership developed within Chanology. To answer these questions, a hybrid methodology consisting of a qualitative case study and network analysis is developed.
    [Show full text]
  • FCJ-158 Tits Or GTFO: the Logics of Misogyny on 4Chan's Random
    The Fibreculture Journal issn: 1449-1443 DIGITAL MEDIA + NETWORKS + TRANSDISCIPLINARY CRITIQUE issue 22 2013: Trolls and the Negative Space of the Internet FCJ-158 Tits or GTFO: The logics of misogyny on 4chan’s Random - /b/ Vyshali Manivannan Rutgers University Abstract: The decentralised, anonymous imageboard 4chan is decried for its discursive construction of gender, particularly on its Random - /b/ board. However, /b/’s misogyny demonstrably results from an internal moral panic about cultural exclusivity. New users unbalance 4chan’s anti-normative, anti-celebrity, and anti-leader ethic by posting self-photographs primarily featuring women. These users are strategically targeted and trolled based on their exposed identity aspects. While this practice is untenable offsite, viewing misogynistic discourse as a strategic, regenerative practice onsite is necessary as /b/ occupies an extreme point on the genealogical continuum bridging the transgressive cultures of bulletin-board systems, shock sites, and hacker culture. Introduction: The adoption of ‘cumdumpster’ On June 15, 2008, a 4channer identified as female using the colloquial portmanteau ‘femanon’, posted an erotic photograph of herself on the Random - /b/ board, and requested advice regarding a recent breakup, a marriage proposal, and whether she could easily commit marital infidelity. She asserted that the marriage would be for love but simultaneously 109 FCJ-158 fibreculturejournal.org FCJ-158 Tits or GTFO: The logics of misogyny on 4chan’s Random - /b/ stressed the money and government insurance she would receive by marrying an Air Force man. [1] Six minutes into the thread, moderators began editing the post, transforming the original poster’s (OP) request into an ad hominem self-assassination and banning her for authoring it.
    [Show full text]
  • Employing Expert Hackers to Combat Cyber Terrorism
    Vanderbilt Journal of Entertainment & Technology Law Volume 15 Issue 1 Issue 1 - Fall 2012 Article 6 2012 Hacking for Lulzi: Employing Expert Hackers to Combat Cyber Terrorism Swathi Padmanabhan Follow this and additional works at: https://scholarship.law.vanderbilt.edu/jetlaw Part of the Computer Law Commons Recommended Citation Swathi Padmanabhan, Hacking for Lulzi: Employing Expert Hackers to Combat Cyber Terrorism, 15 Vanderbilt Journal of Entertainment and Technology Law 191 (2020) Available at: https://scholarship.law.vanderbilt.edu/jetlaw/vol15/iss1/6 This Note is brought to you for free and open access by Scholarship@Vanderbilt Law. It has been accepted for inclusion in Vanderbilt Journal of Entertainment & Technology Law by an authorized editor of Scholarship@Vanderbilt Law. For more information, please contact [email protected]. Hacking for Lulzi: Employing Expert Hackers to Combat Cyber Terrorism ABSTRACT Because hacking collectives Anonymous and LulzSec have routinely breached supposedly secure computer networks-including Visa, MasterCard, and the Central Intelligence Agency-the threat of cyber terrorism has become more prominent. Many US industries and companies depend on online communication and information storage. If terrorists compromise these capabilities, they could cripple the US economy and perhaps even cause widespread fatalities. Members of Anonymous and LulzSec lack the necessary intent to be prosecuted as cyber terrorists because they hack not to cause fear, but rather to create laughter. Their method of posting all necessary instructions and information regarding intended targets on online message boards could, however, serve as a model for terrorists seeking to cause harm. Indeed, the Anonymous and LulzSec model permits an unknown number of hackers to anonymously participate in attacks.
    [Show full text]
  • Anonymous’ No Facecreates Hate Published As a Public Service by Freedom Magazine
    WHEN CRIME HASHow ‘ANONYMOUS’ NO FACECREATES HATE Published as a Public Service by FREEDOM Magazine This publication aims to inform the public of the nature of the hate group known as “Anonymous” and the damage it has caused. The documents presented are only examples of the harassing tactics used by Anonymous, and by no means purports to represent a complete collection of all such tactics. WHEN CRIME HAS NO FACE HOW ‘ANONYMOUS’ CREATES HATE Table of Contents Behind the Facade of the Anonymous Hate Group.______________________________ 1 Anonymous: In Their Own Words__________________________________________________________________ 5 Anonymous Racism & Religious Hatred_.____________________________________________________9 Anonymous Use of Violent Language and Imagery______________________________15 Murders & Suicides______________________________________________________________________________________________17 Cyber-Terrorism and Terrorist Threats________________________________________________________21 What the Press Has Reported_________________________________________________________________________31 Anti-Gay Propaganda__________________________________________________________________________________________35 Anonymous Use of Pornography___________________________________________________________________37 Glossary_____________________________________________________________________________________________________________________39 1. Behind the Façade of the ‘anonymous’ HATE GROUP Introduction devoid of any type of soul or conscience,”
    [Show full text]
  • A List of Imageboards and Other Sites with Commentary a Homegrown List Made with Love by Creamy
    A List of Imageboards and Other Sites with Commentary A homegrown list made with love by Creamy Hey, guys, I fixed the document outline feature, so hopefully things are more navigable ============================== Contents ============================== 1. Introduction 2. Imageboards 1. 02ch.ins 2. 02ch.net 3. 02ch.su 4. 0chan 1. 0­chan 5. 0chan.cf 6. 0chan.esy 7. 100l 8. 1337chan 9. 1chan 10. 1chan.inach 11. 1chanus 12. 1Eden 13. 10ch 14. 10ch.ru 15. 10chan 16. 13channel 17. 2cat 18. 2­­ch / Тире.ч 19. 2­chru 20. 2ch­an 21. 2hu 22. 2so 23. 2watch 24. 23ch 25. 30ch 26. 314chan 27. 314n ★★ 28. 370chan 29. 38chan 30. 410chan 31. 420chan ★★ 32. 4ch (Choice cuts) 33. 4chan ★★ 34. 4chan.ch 35. 4clams 36. 4ct 37. 5chan 38. 55chan 39. 711chan 40. 7chan 41. 7clams 42. 8chan ★★ 43. 888ichan 44. 89chan 45. 9ch 46. 929chan 47. 99chan 48. A­chan 49. Acrimonie 50. Allchan 51. Alokal 52. Altarchan 53. Amychan 54. Anarchochan 55. Animuchan 56. Anoma 57. Anon­IB 58. AnonFM 59. Alphachan 60. Apachan (Imageboard) 61. Arabchan 62. Aurorachan 63. Ayayayaya 64. B3ta 65. Bakachan 66. Baltchan 67. Barachan 68. BBW­chan 69. Belchan 70. Bienvenido a Internet 71. Bitardengine 72. Britfags 73. Bounceme 74. Boxxy 75. Cable6 76. Camiko 77. Chan.type2 78. Chanon 79. Chansluts 80. Chanweb 81. Chan.org.il 82. Chlomochan 83. Cirno 84. Chaos.cpu 85. Chiboard 86. Claire Imageboard 87. Coolchan 88. CMWP, LLC. Discussion Board 89. Cryptochan 90. CuatroChocios 91. D3w 92. Dejimachan 93. DameIB 94. Deep Hole 95. Demochan 96.
    [Show full text]
  • Newfags Don't Remember Lörs Lärä
    NEWFAGS DON’T REMEMBER LÖRS LÄRÄ INTERNET MEMES ON AN ANONYMOUS IMAGEBOARD Salla Pajunen University of Tampere Faculty of Communication Sciences Information Studies and Interactive media Master’s Thesis May 2017 UNIVERSITY OF TAMPERE, Faculty of Communication Sciences Information Studies and Interactive Media PAJUNEN, SALLA: Newfags don’t remember Lörs lärä - Internet memes on an anonymous imageboard Master’s Thesis, 94 pages. May 2017 The goal of this thesis is to examine Internet memes on Ylilauta.org, a Finnish discussion forum. Internet memes are catchy pictures, videos, sound, or text that spread on the Internet from person to person via different channels. One of their features is viral, virus-like, spreading. Internet memes often spread through repetition and imitation, and people often modify them. Ylilauta is a Finnish, anonymous Internet discussion forum or an imageforum. Another term for this kind of image-focused forum is imageboard and it is used of an Internet forum that has formed a special purpose for images and special kind of anonymous culture. Ylilauta is the Finnish version of the famous imageboard, 4chan. The research questions studied in this thesis are: 1. What kind of image content circulates on Ylilauta? 2. How or in what kind of ways do people use images on Ylilauta? 3. What kind of meme images get modified or how do users modify them on Ylilauta? The research method used in this thesis is netnography, also known as virtual ethnography. The research data were collected in November to December 2015, from /satunnainen/, the random discussion board on Ylilauta. Satunnainen is not a topic- based board so the discussion there is various.
    [Show full text]
  • Standalone Complex”, Or SAC, for Short
    1 “Cry wiki – and let lose the chans of war” Quote 1: Anonymous people on the internet, on the topic of Shakespeare and internet warfare. 1 Introduction Medialogy is all about understanding the connection between people and technology, finding and understanding the interplay between the two, to better understand both. The internet is a perfect example of one such digital frontier, with people using new and faster communication networks and platforms to form communities and sub-cultures, which function unlike anything that has ever been seen before in human history. It is the intended goal of this thesis to define and document a specific aspect of these new internet-based subcultures, a phenomena I call a “StandAlone Complex”, or SAC, for short. It has been inspired by multiple sources of both mainstream pop culture and internet oddities. It should be noted that the term ‘standalone’ is chiefly used in the IT world, usually meaning that something is unconnected or not dependent on a network. This is the purpose of this thesis: To propose the theory of the standalone complex, to explain it, to document it and it and to show examples of it. I have taken the term Standalone Complex from the title of a Japanese anime series called “Ghost in The Shell: Stand Alone Complex” (1) in which an anonymous criminal sparks a wave of independent copycat crimes mimicking the original incident. The fictional crime investigation unit the series revolves around first thinks this is the result of a massive conspiracy, but later learn that it was simply a case of accidental collectivism; random individuals that started doing the same at roughly the same time, without any form of actual coordination or organization between them.
    [Show full text]
  • Complete History of 4Chan Pre-History 1996
    Complete history of 4chan Pre-History 1996 - A man named Masayuki Shiba creates a BBS called Ayashii Warudo (Strange/Suspicious World). Users are anonymous. Warez and cp are posted, and there is a gesu (scum) board where website hackings and invasions are discussed. Many similar BBSes are formed, collectively called Nanashi Warudo (Nameless World), and they develop a culture based on memes. Ayashii World functions as the hubsite of Nanashi World in a similar way to how 4chan would later function as the hubsite of Anonymous. AW's popularity increases exponentially. 1998 - Ayashii World doesn't have good servers, and it keeps crashing. After the owner receives personal threats over the server issues, he shuts the site down. They need a replacement. They get their replacement with Amezou, the First Channel. It starts off as a bunch of links to alternative BBSes for wayward Ayashii Worlders, but soon becomes its own forum and introduces a new style of threaded message board, dependent on bumping and saging. Its popularity increases exponentially. 1999 - The first channel dies due to server issues. A man named Hiroyuki Nishimura sees all this and creates Ni Channeru, the Second Channel, using code based on the first, with enough servers this time to handle the exponential growth. Meanwhile, Lowtax creates Something Awful. April/May 2001 - Lowtax creates the ADTRW (Anime Death Tentacle Rape Whorehouse) board on Something Awful. 30 August 2001 - 2channel is in danger of dying, so a backup forum is created, called Futaba or 2chan (two-leaves). Futaba invents a board called /b/ for random content.
    [Show full text]