Advanced search Help
Searching for terms: EXACT: "National Counterterrorism Center (U.S.)" in: publisher
Clear all search criteria
Only 2/3! You are seeing results from the Public Collection, not the complete Full Collection. Sign in to search everything (see eligibility).
-
Memorandum of Agreement between the Department of Homeland Security and the National Counterterrorism Center Regarding Advance Passenger Information System Data
"The United States Department of Homeland Security (DHS), acting through the Office of Intelligence and Analysis (I&A) and U.S. Customs and Border Protection (CBP), and the National Counterterrorism Center (NCTC), hereinafter collectively referenced as the 'Parties,' have entered into this Memorandum of Agreement ('MOA' or 'Agreement') to govern the sharing, use and safeguarding of data contained within the Advance Passenger Information System (APIS) for the purpose of identifying information within APIS [Application Programming Interface] as Terrorism Information. The Parties agree that this MOA constitutes the for Terms and Conditions required by the United States Attorney General Guidelines for Access, Retention, Use, and Dissemination by the National Counterterrorism Center and Other Agencies of Information in Datasets Containing Non-Terrorism Information (March 22, 2012) for the sharing of APIS Data."
National Counterterrorism Center (U.S.)
2013?
-
Annual Report on the Access, Retention, Use and Dissemination of United States Person Information March 23, 2012 - March 31, 2013
This report is the 2012-2013 annual report regarding person information in America. This report was published by the National Counterterrorism Center of the United States of America. From the document: "This report covers the activities of the National Counterterrorism Center from March 23, 2012 through March 31, 2013 (hereinafter 'the reporting period'). As of the end of the reporting period, NCTC [National Counterterrorism Center] had not yet executed any Terms and Conditions (T&Cs) under the 2012 NCTC AGGs [Attorney General Guidelines]. As such, all Track 3 datasets replicated at NCTC were still being accessed under NCTC's 2008 AGGs, which require application of a 'promptly review' and remove standard for review of US persons information. Nonetheless, because the annual reporting requirement applies to NCTC's access of data through all three tracks of access - including Tracks 1 (account-based access on a data provider's native system) and 2 (queries provided to a data provider for the data provider to run on its own systems) - NCTC deems the annual reporting requirement to already be in effect. NCTC is therefore submitting this report in accordance with the 2012 NCTC AGGs reporting requirement."
National Counterterrorism Center (U.S.)
2013-03
-
Overview of NCTC's Data Access as Authorized by the 2012 Attorney General Guidelines
"The National Counterterrorism Center (NCTC) is the primary organization in the United States Government for analyzing and integrating all intelligence possessed or acquired by the United States Government pertaining to terrorism and counterterrorism (National Security Act of 1947, as amended). In order to perform this statutory mission, NCTC, like other intelligence community elements, is required by law and Executive Order to have guidelines approved by the Attorney General and the Director of National Intelligence (DNI) relating to its handling of information about United States persons."
National Counterterrorism Center (U.S.)
2012
-
Information Sharing, Dot Connecting and Intelligence Failures: Revisiting Conventional Wisdom
"The year is 2014. The Intelligence Community [IC] is ten years into its efforts to implement the Intelligence Reform and Terrorism Prevention Act (IRTPA). While change has been evident on many fronts, nothing was more closely identified with intelligence reform than information sharing; ever since the 9/11 Commission declared that 'the biggest impediment to all-source analysis -- to a greater likelihood of connecting the dots -- is the human or systemic resistance to sharing information', the two had been inextricably linked. And while we were pushing more electrons than ever before, dissatisfaction continued: in 2014, as in 2009, no analyst in the IC had effective access to all information; analysts in many parts of the Community complained that they couldn't get operational traffic or law enforcement information; we had little ability to do large scale processing of foreign and domestic data sets; our non Federal partners were still dissatisfied with the quality of information sharing. A dizzying array of directives had been issued. Arbitration procedures had been established. And yet organizations weren't getting the information they claimed to 'need.' Legitimate issues coexisted with tripe. According to the critics, we still couldn't connect those dots. The reality, however, was far more complex: the only question was whether it took a major intelligence failure to realize that fact."
National Counterterrorism Center (U.S.)
Travers, Russ
2009-08
-
National Counterterrorism Center 2007 Report on Terrorism
"Consistent with its statutory mission to serve as the U.S. Government's knowledge bank on international terrorism, the National Counterterrorism Center (NCTC) is providing this report and statistical information to assist academics, policy makers and the public in understanding the data. […] While NCTC keeps statistics on the annual number of incidents of 'terrorism,' its ability to track the specific groups responsible for each attack involving killings, kidnappings, and injuries is significantly limited by the availability of reliable open source information, particularly for events involving small numbers of casualties. The statistical material compiled in this report, therefore, is drawn from the number of attacks of 'terrorism' that occurred in 2007, which is the closest figure that is practicable for NCTC to supply in satisfaction of the above-referenced statistical requirements."
National Counterterrorism Center (U.S.)
2008-04-30
-
Counterterrorism 2014 Calendar
"The US National Counterterrorism Center is pleased to present the 2014 edition of the Counterterrorism (CT) Calendar. This edition, like others since the Calendar was first published in daily planner format in 2003, contains many features across the full range of issues pertaining to international terrorism: terrorist groups, wanted terrorists, and technical pages on various threat-related topics. The Calendar also marks dates that terrorists may believe are important if planning attacks to commemorate particular events. Individuals portrayed in this calendar are all listed on the US Government's Rewards for Justice site or on FBI sites devoted to terrorism. These individuals have all been either indicted or are being sought for their involvement in international terrorism. The CT Calendar is designed as a ready reference guide for law-enforcement, intelligence, military and security personnel, contingency planners, or citizens concerned about terrorist threats. The CT Calendar is oriented primarily to readers in the United States, but we hope it will be useful for citizens of other countries as well. We invite you to visit the interactive version of the calendar at http://www.nctc.gov."
National Counterterrorism Center (U.S.)
2014
-
Counterterrorism 2012 Calendar
This invaluable calendar "is designed as a ready reference guide for law enforcement, intelligence, military and security personnel, contingency planners, or citizens concerned about terrorist threats." The calendar "marks dates according to the Gregorian and Islamic calendars, and contains significant dates in terrorism history as well as dates that terrorists may believe are important if planning attacks to commemorate particular events." Additionally, it contains a substantial amount of valuable information related to terrorist threats; including information on common explosives (identification and characteristics), indicators of various chemical and biological agents that could be used in an attack, indicators of radiological attacks, indicators of false travel documents, suspicious financial activity indicators, and a list logos and symbols that belong to groups that the US Department of State has designated as Terrorist Organizations. Lastly, it also provides details on individual terrorist leaders that are wanted, and list of those that have been captured or killed through the years.
National Counterterrorism Center (U.S.)
2011
-
National Counterterrorism Center 2011 Report on Terrorism
"The National Counterterrorism Center (NCTC) was created in 2004 to ensure, in part, that U.S. government agencies have appropriate access to and receive the intelligence necessary to accomplish their assigned missions. NCTC is the U.S. government's central and shared knowledge bank on international terrorism and, in this capacity, NCTC provides the Department of State with statistical information to assist it in completing the annual 'Country Reports on Terrorism' (CRT). NCTC also uses this information to compile its own annual 'NCTC Report on Terrorism' (NRT). Title 22, Section 2656f of the United States Code (U.S.C.) requires the Department of State to include in its annual report, 'to the extent practicable, complete statistical information on the number of individuals, including United States citizens and dual nationals, killed, injured, or kidnapped by each terrorist group during the preceding calendar year.' […] The statistical material in this unclassified report is drawn from terrorism incidents that occurred in 2011, as reported in open source information. This open source material is the most comprehensive resource that NCTC can use to compile and provide the statistical data necessary to the Department of State to fulfill its legislative reporting requirements"
National Counterterrorism Center (U.S.)
2012-03?
-
2008 Counterterrorism Calendar
"The US National Counterterrorism Center is pleased to present an interactive version of the 2008 Counterterrorism Calendar. This version of the Calendar contains many features across the full range of terrorism-related issues: terrorist groups, wanted terrorists, and technical pages on various threat-related issues. The Calendar timeline marks dates according to the Gregorian and Islamic calendars, and contains significant dates in terrorism history as well as dates that terrorists may believe are important when planning 'commemoration-style' attacks. The CT Calendar is designed for anyone concerned with counterterrorism or terrorist threats; law-enforcement, intelligence, military and security personnel, contingency planners, or simply citizens concerned by terrorist threats. The Calendar is oriented primarily to readers in the United States, but we hope that we have also made it useful for citizens of other countries." The print version of the calendar is also available from the link.
National Counterterrorism Center (U.S.)
2008-01
-
National Counterterrorism Center 2010 Report on Terrorism
"Consistent with its statutory mission to serve as the United States government's knowledge bank on international terrorism, the National Counterterrorism Center (NCTC) is providing the Department of State with required statistical information to assist in the satisfaction of its reporting requirements under Section 2656f of title 22 of the US Code (USC). This statute requires the State Department to include in its annual report on terrorism 'to the extent practicable, complete statistical information on the number of individuals, including United States citizens and dual nationals, killed, injured, or kidnapped by each terrorist group during the preceding calendar year.' While NCTC keeps statistics on the annual number of incidents of 'terrorism,' its ability to track the specific groups responsible for each incident involving killings, kidnappings, and injuries is significantly limited by the availability of reliable open source information, particularly for events involving small numbers of casualties. Moreover, specific details about victims, damage, perpetrators, and other incident elements are frequently not fully reported in open source information."
National Counterterrorism Center (U.S.)
2011-04-30
-
Plan to Provide a Status Report on the Implementation of the Hostage Recovery Activities Executive Order
"This document outlines a plan to provide a status report (hereafter 'assessment') on the implementation of Presidential Policy Directive 30 and the Hostage Recovery Activities Executive Order (EO) 13698, which identifies NCTC [National Counterterrorism Center] as the lead for this task. This plan describes NCTC's general approach, timeline, list of potential interviewees, and EO tasks that will be assessed and the corresponding draft Measures of Effect (MoE)."
National Counterterrorism Center (U.S.)
2016-03-18
-
Jemaah Islamiyah (JI)
"Jemaah Islamiyah (JI) is an Indonesia-based clandestine terrorist network formed in the early 1990s to establish an Islamic state encompassing southern Thailand, Malaysia, Singapore, Indonesia, Brunei, and the southern Philippines. Its operatives, who trained in camps in Afghanistan and the southern Philippines, began conducting attacks in 1999. The network's existence was discovered in late 2001 after Singaporean authorities disrupted a cell that was planning to attack targets associated with the US Navy. JI is responsible for a series of lethal bombings targeting Western interests in Indonesia and the Philippines from 2000-2005 […] Southeast Asian governments since 2002 have arrested more than 300 suspected terrorists, significantly degrading JI's network. Thai authorities detained the network's operations chief in 2003. Indonesian police killed JI's most experienced bombmaker in 2005 and arrested its two senior leaders in mid-2007."
National Counterterrorism Center (U.S.)
2013-09
-
Remarks on ISIL Terrorist Group Before the Brookings Institution by Matthew G. Olsen, September 3, 2014
ISIL is the Islamic State of Iraq and the Levant. Matthew G. Olsen, Director, U.S. National Counterterrorism Center, gave these remarks at the Brookings Institution in Washington, D.C. on September 3, 2014. From the speech's conclusion: "In sum, our attention is concentrated on the security crises in Iraq and Syria--and rightly so. ISIL and other groups in Syria threaten our people and interests in the region and, left unchecked, they will seek to carry out attacks closer to home. But no terrorist group, certainly not ISIL, is invincible. The slaughter of tens of thousands of innocent Syrian and Iraqi civilians has shocked and united all civilized peoples, while the barbaric murders of two American journalists and the attack at a Jewish museum in Brussels have demonstrated that these terrorist threats are not confined to one part of the globe. As the President has set out, the U.S. will continue to do whatever is necessary to protect Americans at home and abroad, while we work with the Iraqis, our partners in the region, and our allies over the long term to bring peace and security to a chaotic region of the world."
National Counterterrorism Center (U.S.)
2014-09-03
-
First Responder's Toolbox: Vehicle Borne Improvised Explosive Device (VBIED): Preparedness, Recognition, and Response
"Terrorists may pursue efforts to use VBIEDs [Vehicle Borne Improvised Explosive Device] to conduct mass-casualty attacks in the Homeland. We base this assessment on interest communicated via online platforms and in terrorist publications, as well as on previous VBIED-related incidents and attacks. VBIEDs are typically constructed using common vehicles found locally, making them inconspicuous and potentially difficult to detect just by observation. VBIEDs have been used effectively overseas, and previous attacks serve as examples of how they might be employed in the West. This product seeks to increase VBIED awareness among first responders to aid in preparedness, recognition, and response."
National Counterterrorism Center (U.S.)
2018-07-10
-
First Responder's Toolbox: Planning and Preparedness Can Promote an Effective Response to a Terrorist Attack at Open-Access Events
"This product is intended to assist public safety personnel, security personnel, and other event stakeholders in understanding and implementing protective measures to protect crowds at open-access events, especially those that may have limited security support. This information is a starting point to encourage stakeholders to collaborate and seek further advice, resources, and authorities. This product is meant to be scalable to accommodate a variety of locations and venue sizes."
National Counterterrorism Center (U.S.)
2018-03-30
-
First Responder's Toolbox: Complex Operating Environment--Electric Grid
"The US energy sector consists of three interrelated segments: electricity, oil, and natural gas. The reliance of virtually all industries on electric power and fuels means that all sectors have some dependence on the energy sector. Information sharing is key to ensuring the protection of the national electrical infrastructure (electric grid) since the majority of it is privately owned. [...] A prolonged electrical outage will cause cascading effects to all other sectors. Emergency managers, owners and operators, and public safety personnel are encouraged to develop plans in advance, communicate priorities, and understand the effects of operating and maintaining services to each sector in the event of a mid- to long-term incident."
National Counterterrorism Center (U.S.)
2018-05-08
-
First Responder's Toolbox: Complex Operating Environment--Shopping Malls
"Shopping malls are typically readily accessible by the public, mass transit and delivery vehicles, they are frequented by large crowds, and they are likely considered appealing soft targets. The physical attributes, location, and operational and logistical considerations of shopping malls create security challenges for first responders and security stakeholders. Common mall characteristics include open-access layout, steady hours of operation, and crowds of various sizes depending on time of year, sales events, and special activities, such as concerts, pageants and expos."
National Counterterrorism Center (U.S.)
2018-05-23
-
First Responder's Toolbox: Hospitality Industry: Enhanced Suspicious Activity Awareness Assists in Terrorism Prevention
"This product is intended to promote awareness in the hospitality industry to enhance security and safety against terrorist activities. Hospitality industry security starts with complete comprehensive background screening during the hiring process, and includes suspicious activity awareness training, evaluation of policies and processes, and incorporates the latest technology."
National Counterterrorism Center (U.S.)
2017-11-27
-
First Responder's Toolbox: Complex Operating Environment - Food and Agriculture
"Food and agriculture infrastructure is a $1 trillion industry, almost entirely under private ownership and comprises an estimated 2.1 million farms, 935,000 restaurants, and more than 200,000 registered food manufacturing, processing, and storage facilities. Intentional contamination of the food supply could have significant public health and economic consequences depending on the commodity, the agent used, and where in the supply chain the contaminant was added. This product provides first responders and private-sector stakeholders an awareness of the complex operating environment that may result from intentional contamination of the food supply and identifies key collaborative partners and indicators to minimize the risk of an intentional attack on the food supply."
National Counterterrorism Center (U.S.)
2017-03-07
-
First Responder's Toolbox: Complex Operating Environment - Healthcare Facilities
"The US has more than 5,600 registered healthcare facilities, the majority of which are privately owned and operated. Each varies greatly in size, location, layout, patient demographic, and resource allocation. These facilities provide patient services to millions of people each year and play a significant role at the local, state, or regional levels when responding to hazards ranging from man-made incidents, such as terrorism, to natural disasters or infectious disease outbreaks. This product provides first responders, public health officials, medical professionals, healthcare staff, and other health and medical industry partners planning and operational response considerations in advance of a potential attack at a healthcare facility."
National Counterterrorism Center (U.S.)
2018-04-16
-
First Responder's Toolbox: Violent Extremists Likely Will Continue to Use Disinformation on Social Media Outlets to Instill Fear and Radicalize Others
"This product highlights examples of official media releases by designated foreign terrorist organizations, such as ISIS [Islamic State of Iraq and Syria], and unofficial media releases by auxiliary news agencies and terrorist supporters. It is intended to describe how terrorists use disinformation to potentially influence Homeland and Western audiences, and introduce steps that can be taken to determine the credibility of the messaging."
National Counterterrorism Center (U.S.)
2018-08-09
-
First Responder's Toolbox: Terrorism Prevention--A Form of Violence Reduction
"Terrorism Prevention, previously known as Countering Violent Extremism (CVE), is a multi-agency, multidisciplinary, proactive approach against the many forms of terrorist ideology. Terrorism Prevention works to protect our nation from terrorist threats, and remains our highest priority. It utilizes prevention, intervention, and disengagement efforts. The principles and strategies used in Terrorism Prevention are similar to those applied to community policing, counter-drug, and countergang initiatives. Where possible, Terrorism Prevention should be incorporated into existing programs related to public safety, public health, resilience, inclusion, and violence prevention."
National Counterterrorism Center (U.S.)
2017-10-30
-
First Responder's Toolbox: Special Events Working Aid
"The security footprint for a special event extends past the perimeters of event venues and could have cascading effects on surrounding areas and critical infrastructure. It is important that law enforcement, fire, emergency medical services (EMS), and private sector partners plan, train, and work together whenever possible to ensure preparedness and effective response. By taking into consideration a wide variety of potential terrorist tactics, techniques, and procedures and then planning, coordinating, and exercising against them, stakeholders will be better able to prevent, respond to, and mitigate the effects of terrorist attacks"
National Counterterrorism Center (U.S.)
2016-06-10
-
First Responder's Toolbox: International Partnerships Among Public Health, Private Sector, and Law Enforcement Necessary to Mitigate ISIS's Organ Harvesting for Terrorist Funding
"This product is intended to promote awareness and coordination among intergovernmental authorities, the private sector, and the international community, to include law enforcement, immigration, customs, health organizations, legal entities, nongovernmental organizations, human services, public health, and private sector by providing indicators to combat organ harvesting and trafficking."
National Counterterrorism Center (U.S.)
2017-05-11
-
First Responder's Toolbox: Taxi Cab and Ride-Sharing Service Partnerships - Potential Public Safety Force Multiplier
"With hundreds of thousands of taxi and ride-sharing-service drivers working 24/7 across the US, a security- and first-aid-conscious driver can act as a public safety force multiplier. Their familiarity with their communities and interaction with the general public puts them in a position to identify activities and behaviors potentially related to terrorism, to potentially assist victims of a terrorist attack, and provide authorities information that may aid post-attack investigations."
National Counterterrorism Center (U.S.)
2018-03-09
-
First Responder's Toolbox: Acid Attacks: Potential Opportunistic Threat and Rapid Treatment Awareness
"The number of criminal and gang-related assaults involving acid or other corrosive substances has risen sharply in some Western countries. As of July 2017, police statistics in England indicate assaults and threats involving corrosives have risen from 183 in 2012 to more than 500 this year, according to open source reporting. Although there has been minimal specific interest by terrorists in acid attacks to date, we judge the increase in criminal incidents coupled with recent English-language terrorist messaging encouraging attacks using acid may spur opportunistic terrorist use of the tactic, underscoring the potential threat and importance of an immediate on-scene emergency response."
National Counterterrorism Center (U.S.)
2017-10-03
-
Today's NCTC
From the Foreword: "NCTC [National Counterterrorism Center] was borne out of a post-9/11 world in which the United States Government (USG) reorganized and restructured the Intelligence Community (IC) in order to protect and secure our nation from terrorist attacks. [...] These foundational documents define NCTC's principal roles, missions, and responsibilities--mainly to analyze the threat using all available USG information, to share terrorism-related information with our partners across the counterterrorism (CT) enterprise, to maintain the single authoritative USG database of known and suspected terrorists, and to integrate the national CT effort through effective planning and strategy development."
National Counterterrorism Center (U.S.)
2017-08
-
Status Report on the Implementation of Executive Order 13698 Hostage Recovery Activities
"This National Counterterrorism Center (NCTC) report evaluates U.S. Government (USG) progress in the implementation of Executive Order (E.O.) 13698, Hostage Recovery Activities, signed by the President of the United States on June 24, 2015. This report also reviews implementation of the related Presidential Policy Directive 30 (PPD-30). To ensure accountability for the reforms mandated by the E.O. and PPD-30, the E.O. directed that within one year, NCTC, in consultation with the Secretary of State, Secretary of Defense, Attorney General and the Director of the Federal Bureau of Investigation (FBI), provide a status report to the Assistant to the President for Homeland Security and Counterterrorism on the implementation of the E.O.. The E.O. directed that the status report will be informed by consultation with stakeholders outside of the USG, including former hostages and hostages' families and will, to the extent possible, be made available to the public. This Status Report responds to those requirements."
National Counterterrorism Center (U.S.)
2016-09-30
-
Combatting the Terrorist Threat Through Agility, Persistence, and Resilience, Statement of Russell Travers, Acting Director of the National Counterterrorism Center, Hearing Before the Senate Committee on Homeland Security and Governmental Affairs, October 10, 2018
"In the years since 9/11, the U.S. counterterrorism (CT) community and its many foreign and domestic partners have continued to achieve significant successes against terrorist groups around the world through enhanced information sharing, aggressive intelligence collection, targeted military action, and terrorism prevention programs. Most notably, coalition operations against the Islamic State of Iraq and ash-Sham (ISIS) in Iraq and Syria are now depriving the group of its last territorial holdings in the so-called caliphate. In addition, ongoing CT efforts across Africa, the Middle East, and South Asia continue to diminish the ranks of al-Qa'ida, removing dozens of experienced leaders and operatives. Interagency efforts to enhance our defenses and vigilance at home, including strengthened aviation security measures and border control initiatives, have resulted insubstantial progress in safeguarding the Homeland from terrorist attacks. Despite these considerable achievements, the United States faces an increasingly dynamic terrorist threat from a more diverse range of groups who continue to explore methods to defeat our defenses and strike the West. Terrorists are responding to recent setbacks by adapting their tactics, seeking out alternate safe havens, and using new technologies to recruit and train the next generation of terrorists. Such trends make for a more dispersed, fluid, and unpredictable terrorist threat that requires a persistent and agile U.S. response to mitigate. Given the challenging national security landscape that confronts the United States today, the relative priority attributed to the terrorist threat is being reevaluated. Nevertheless we will need to ensure that we maintain the many improvements made across the government in countering terrorism since 9/11."
National Counterterrorism Center (U.S.)
Travers, Russ
2018-10-10
-
Counterterrorism in an Era of Competing Priorities
From the Document: "I happened to have testified before Congress twice in the last two weeks, along with FBI and DHS leadership, to talk about threats to the homeland. Along with our discussion of terrorism, FBI and DHS leadership laid out a dizzying array of other threats to the homeland -- election security, counterintelligence, intellectual property theft, and transnational organized crime -- the last of which kills far more Americans than terrorism ever has, or ever will. [...] I posed three questions for consideration: [1] 'What does the national risk equation look like as the Country confronts a very complex international security environment?' [2] 'How do we optimize our CT [counterterrorism] resources in the best interests of the Country when Departments and Agencies may have somewhat differing priorities?' [3] 'And if we're going to reduce efforts against terrorism how do we do so in a manner that doesn't inadvertently reverse gains of the past 18 years?'"
National Counterterrorism Center (U.S.)
Travers, Russell E.
2019-11-08