Don’t be fooled; last year’s ‘Occupy’ was a peaceful protest movement. Under-planning for the coming protests based on the Occupy Movement would be naïve, but overcompensating and overspending would be similarly foolish. In short, know the threat. Here are primary actions for countering company threats from protests.
May 1st, 2012 - by Anthony Macisco
April 26th, 2012 - by Sam Rosenfeld
Last fall, police used pepper spray during protests at the University of California-Davis, and afterwards, the Reynoso Task Force was tasked with investigating the incident and compiling a report. The lack of balance and impartiality in the Reynoso Task Force membership casts doubt onto its conclusions, some of which are valid. As a result, their report is distinctly one-sided, providing serious criticism of the police while not mentioning the roles and responsibilities of protesters and protest organizers.
On Monday, I hosted the premiere of my new international internet radio show, “The Homeland Security Show with Janice Kephart.” My first guest was Emmy Award-winning investigative journalist William LaJeunesse, who has done the most extensive investigative journalism on the federal government’s arms trafficking operation known as Fast and Furious.
Last night, protest organizers for Chicago G8 were celebrating their perceived victory of the move of the G8 to Camp David. However, despite what seems to be a common perception, the move will not affect the protests in Chicago. There are a number of serious issues facing Chicago Police, including their tactics and command preparation and the attendance of the anarchist community.
February 24th, 2012 - by Robert Blitzer
Recent articles have reported on New York Police intelligence operations in the post 9-11 era. It appears Muslim communities in the greater New York and New Jersey area as well as several educational institutions with Muslim students have been targeted by the police. I have mixed emotions about this. New York is “target central” for certain terrorist organizations, but who has legal oversight for the NYPD?
I had the privilege of recently attending a two-day seminar on Intelligence Led Policing (ILP). Law enforcement officials and academics educated participants on the tenets of ILP and how to better equip officers to begin to use ILP in their police departments. Regardless of what it’s called – be it ILP, smart policing or predictive analytics – the best practice comes down to this: Police gather information, they evaluate and analyze that information, and they create a threat assessment. That information and resulting analysis drive the agency’s strategy and its actions.
For better or worse, social media is the billboard of our lives in today’s digital world. Recent news stories detailing how the Department of Homeland Security (DHS) was monitoring media outlets, news sites, and other social networking platforms have raised some eyebrows, but it would be completely irresponsible for DHS, intelligence, or law enforcement authorities to ignore these valuable resources and the information and insights they can provide.
January 25th, 2012 -
By Seth Stodder
This week, the Supreme Court dipped its toes into the muddy waters of how modern surveillance technologies – in this case, GPS tracking – fit within the 200-year-old confines of the Fourth Amendment. In United States v. Jones, the Court ruled that the DC Police and the FBI violated the Fourth Amendment when they placed a GPS tracker on a Jeep Cherokee driven by criminal suspect Antoine Jones, and then tracked it for 28 days – all without a valid search warrant.
January 25th, 2012 - by Guest Contributor
Last week, the White House Office of National Drug Control Policy issued the National Northern Border Counternarcotics Strategy. Unless you knew it was coming and happened to be keeping an eye peeled for it, the document may well have escaped notice—with its release on a Friday, in the heat of primary season, and in the immediate lead-up to the President’s State of the Union Address. This is something of a shame because the plan contains some welcome elements that, if well executed, could make a positive contribution to the field.
January 20th, 2012 - by Chris Battle
I just worked my way through multiple social media feeds from federal law enforcement and homeland security agencies. I wanted to stick a paper clip in my eye. The lack of thought put into the posts and clear lack of interest in engaging community members is obvious. The continuous desire on the part of government agencies to “control the message” is self-defeating. Guys: You’re not controlling any message.
The makers of Long Range Acoustic Device (LRAD) have reported significant increases in sales following the Occupy Movement’s first phase of activity last year. Some, I suspect, think they’re buying a magic crowd management weapon. Yet, the best deterrent to truly criminal behavior is to identify criminals, such as those committing or inciting violence, gathering evidence against them, and successfully arresting and prosecuting them.
Recently, it was reported that members of Mexican Crime Cartels illegally entered five different truck yards in northern Mexico by threatening security officers. These criminals did not steal cash or cargo. Instead, they compromised sensitive corporate information – routing information for U.S.-bound commercial truck shipments. Criminal organizations the world over, especially along the land border of Mexico and the United States, use commercial trucks to move contraband. Because of the huge amount of trade that crosses our borders and the limited number of personnel to inspect and process this trade, two methods were created to ease the cargo delays and help the CBP inspectors target suspect trucks.
December 15th, 2011 - by Rich Cooper
In late October, I had the privilege of interviewing former NYPD and Boston Police Commissioner and LAPD Police Chief Bill Bratton. Unlike a number of people in the public eye, he actually does his homework and thinks before he speaks. Our interview touched on a range of issues – the lessons not learned after 9/11; the state of information sharing with local law enforcement agencies; and how the country’s fiscal climate will impact the overall homeland mission.
It was recently reported that Congress is launching an investigation into the Drug Enforcement Administration, following claims that the agency helped drug cartels launder money – an operation some in Congress say bears striking resemblance to the failed “Fast and Furious” anti-gunrunning probe. While most of America is appalled at the “Fast and Furious” operation, myself included, money laundering investigations are a completely different, proven and accepted investigative technique when conducted properly.
December 1st, 2011 - by Sam Rosenfeld
The LAPD operation to clear the park in City Hall was noteworthy for its change in style and was the correct conclusion to what has been a policing operation characterized by engagement and discretion by the police. This and other examples of policing Occupy Protests must be examined closely by the departments that will host National Significant Security Events next year, extracting the lessons that will apply to certain sections of the protest community, and creating effective plans for the those truly violent demonstrators who were patently absent from Occupy LA.
The newest threat to police from hardline protestors is “doxing” – the photographing of police and publishing their personal details, and sometimes that of their families, to the Internet. This tactic has been used to attempt to intimidate officers during events with protestors calling out officers’ names as they film and telling them they will be “doxed.” This tactic is an import from the hardline protest movements in Britain and should be of significant concern to police at all levels of operations and command, although it does have a very simple remedy.
The treatment of protestors as the enemy at National Significant Security Events is the most counter-productive action law enforcement could think of. If one is running a policing effort during a NSSE, surely the principal information tool during the final hours before an event and during that event is the population itself. However, by treating all protestors as potential terrorists and critical threats, police significantly reduce the likelihood that protestors will “see something, say something,” because the police have chosen a confrontational relationship rather than a collaborative one.
October 27th, 2011 -
During testimony on Capitol Hill, Chairman Issa gets into a tense exchange with Secretary Napolitano on what she knew and when she knew it regarding Operation Fast and Furious.
October 26th, 2011 - by Sam Rosenfeld
The phrase “Occupy Movement” has taken over from Occupy Wall Street as the umbrella term for all protest groups. This shift captures not only the geographic differences, but the fact that each Occupy has its own participants, agendas and therefore must be understood as a separate entity. The Occupy movement is looking to the Arab Spring as inspiration. As time drags on, it is likely there will be increased frustration which will lead some to look for more effective or entertaining tactics. The groups with more violent intent will seek to aggravate the police into reacting violently against not only them but the whole crowd, converting far more people to be willing to fight with the police.
Occupy Wall Street is not just a protest. It’s an intelligence tool for protest organizers the world over. Protesters inspired by the growing Occupy Wall Street movement in New York City are spreading throughout the United States and the world to challenge the current business and governmental paradigm. That is why corporate leaders and their security teams must be aware of the tactics, information, capabilities and equipment protesters are using. Corporations must not underestimate the resolve of the protesters and their efforts to bring a negative view to the corporate brand name.