DATABASE [USA NATIONAL SECURITY DOCUMENT] BY OHKA21
by OHKA21 - 08-08-25, 09:54 AM
#1
Hello DarkForums Community,
Today I have uploaded the USA NATIONAL SECURITY DOCUMENT LEAK for you to download, thanks for reading and enjoy!
 
[Image: NSA-Cyber-AI.jpg]

The documents belonging to the Five Eyes Intelligence Group.
This data was obtained by breaching into Acuity Inc, a company that works directly with the US Government and its allies.

Compromised Data :
Full names, Emails, Office numbers, personal cell numbers
Email Addresses (Government, Military & Pentagon)
Classified Information and communications between the 5 eyes, 14 eyes and the US's allies.

Sample :

Code:
 
Code:
Post’s
Informal Counterterrorism Working Group has met and discussed this
proposal.  Members of the Working Group include: FBI, DEA, DAO, INL,
POL-MIL, ODRP, DHS, RSO, and other security agencies.  We also
participate in CT-related donor coordination with our Five Eyes partners
and the CaPri program.'',
ICSR has years of experience in delivering training programmes for law
enforcement and security officials, including USG, British and allied
countries’ intelligence and law enforcement agencies (e.g. NSA, FBI,
Special Operations Command, GCHQ, Foreign Office, the UK Association of
Police Officers, Governments of Singapore, Trinidad and Tobago, the
Netherlands, and Australia.) Members of ICSR have delivered teaching at
all levels, and serve as professors and adjunct professors at King’s
College London, Johns Hopkins University, and Georgetown University. ',
'2015-12-31 00:00:00.000', NULL, NULL, NULL, N'Research - Understanding
the processes of radicalisation and recruitment among Sunni Islamist
foreign fighter communities in the Balkans region
1.1. Mapping Vulnerable Communities. In coordination with the Department
10 of the Ministry of Internal Affairs, Anti-terrorism Bureau of
National Security Agency and with support from the stakeholders in four
target areas with high levels of local ISIL recruitment, SFCG and its
partners will use  community mapping to understand key social
relationships, community organizations and driving factors, which can
serve to strengthen communities against their vulnerabilities to
violence.
Two DEA Special Agents will be assigned to coordinate, monitor and
direct the project, and they will have three supervisory levels above
them within the American Embassy in Lima monitoring their work.  INL
will provide the GOR, and coordinate with the POL and ECON sections
while providing oversight.'', N''Country'', NULL, NULL, N''Special
Intelligence Unit (SIU) and Regional Intelligence Group (RIG) within the
newly formed Money Laundering Directorate (DIRILA) of the PNP'', 5,
N''The project will deter financial support for the Shining Path (SL,
the acronym in Spanish for “Sendero Luminoso”), a USG-designated
terrorist organization operating in the Apurimac, Ene, and Montaro River
Valley (VRAEM) region of Peru, the country’s epicenter of illicit coca
production, by enhancing the ability of two 12-person specialized
inter-agency Peruvian law enforcement units to identify, disrupt, and
deny terrorist financing.'', ''2015-06-10 13:40:56.503'', NULL,
''2015-05-07 21:23:46.820'', N''This proposal to combat SL’s source of
funding complements two ongoing projects funded by the Bureau of
Counterterrorism.  The first is a Regional Security Initiative entitled
“Operation Eclipse,” which seeks to target, disrupt, and dismantle the
SL through the use of a 15-person specialized unit and a tactical,
30-man, quick response force to assist the specialized team to capture
high value SL targets.  Funds for this project are used to support,
equip, and train this specialized team and tactical force.  The second
project is entitled “Increasing Awareness of the Shining Path among
Police and Youth Leaders.”  Working with Peruvian National Police
officials, youth leaders and groups, and the National University of San
Martin de Porres, the project is aimed at developing a comprehensive
strategy to better educate youth in the VRAEM on the negative history
and violent ideology of the Shining Path terrorist organization.
Post’s CVE Working group and offices tasked with CVE have discussed this
young engagement University youth proposal and have interacted
extensively with its principal members.  No such program that actively
targets University youth exists on CVE.  This project is also not
duplicative of the FIVE EYES partners’ efforts.
Jordan is one of the U.S. Government’s (USG) key allies in the Middle
East.  The U.S.-Jordan relationship continues to produce strategic
benefits for the U.S., including political and logistical support for
U.S. involvement in Iraq, support for the fight against terrorism,
regional reform, and the Israeli-Palestinian conflict
The current program business model is specific to U.S. Digital Globe and
Canadian Radarsat due to those systems only, having agreements with the
U.S. Government GEOINT functional manager (National Geospatial
Intelligence Agency, NGA).  There are, however, near-peer technology
systems hosted by the Airbus Corporation and the European Space Ag'',
''2018-09-30 00:00:00.000'', NULL, NULL, NULL, N''Real-time Commercial
Space-based Surveillance for Cooperative Security'', NULL, ''2016-06-01
00:00:00.000'', ''2016-02-01 01:05:54.157'', NULL)')
•  The concept for this law enforcement program was circulated through
and approved by the U.S. Embassy Amman country team, including the
Ambassador, and representatives of several U.S. government
stakeholders.[/align]
•  This law enforcement program has been coordinated with the Department
of Defense, specifically U.S. Special Operations Command and U.S.
Central Command and their subordinate command, U.S. Special Operations
Command Central; the Department of State Bureau of Counterterrorism; the
Department of Homeland Security; U.S. Border Patrol; the Federal Bureau
of Investigation; the Defense Intelligence Agency; the Central
Intelligence Agency; and the National Security Council. This program was
also coordinated with various U.S. Government entities in Jordan,
including CENTCOM Forward Jordan (CF-J), Special Operations Command
Forward Jordan (SF-J), and OGP.
•  No such law enforcement program is currently underway in Jordan.
There is no duplication of effort. This program is ultimately a
multi-agency endeavor with coordination and participation on multiple
levels of the information cycle.
[align=center]•  HSI has de-conflicted with representatives from the
British government, specifically the National Crime Agency and the
Metropolitan Police Service. Those agencies had notions to design a
biometric collection program in Jordan with similar concepts but remain
in the pre-proposal stage.
find.txt:copyRecordFromDev_083016.sql:INSERT INTO [dbo].[ActivityPerson]
([ActivityPersonID], [ActivityID], [Email], [FirstName], [LastName],
[Office], [Phone]) VALUES (18951, 2032, N'amy.chang.lee@usdoj.gov',
N'Amy', N'Lee', N'DOJ OPDAT', N'202-514-6882')[/align]
find.txt:copyRecordFromDev_083016.sql:INSERT INTO [dbo].[ActivityPerson]
([ActivityPersonID], [ActivityID], [Email], [FirstName], [LastName],
[Office], [Phone]) VALUES (18954, 2032, N'KennyKX@state.gov', N'Karyn',
N'Kenny', N'DOJ OPDAT', NULL)
find.txt:copyRecordFromDev_083016.sql:INSERT INTO [dbo].[ActivityPerson]
([ActivityPersonID], [ActivityID], [Email], [FirstName], [LastName],
[Office], [Phone]) VALUES (18955, 2033, N'amy.chang.lee@usdoj.gov',
N'Amy', N'Lee', N'DOJ OPDAT', N'202-514-6882')
find.txt:copyRecordFromDev_083016.sql:INSERT INTO [dbo].[ActivityPerson]
([ActivityPersonID], [ActivityID], [Email], [FirstName], [LastName],
[Office], [Phone]) VALUES (18956, 2034, N'amy.chang.lee@usdoj.gov',
N'Amy', N'Chang Lee', N'DOJ/OPDAT', N'(202) 514-6882')
find.txt:copyRecordFromDev_083016.sql:INSERT INTO [dbo].[ActivityPerson]
([ActivityPersonID], [ActivityID], [Email], [FirstName], [LastName],
[Office], [Phone]) VALUES (18957, 2033, N'TaylorRR@state.gov', N'Robin',
N'Taylor', N'DOJ OPDAT', NULL)
find.txt:copyRecordFromDev_083016.sql:INSERT INTO [dbo].[ActivityPerson] ([ActivityPersonID], [ActivityID], [Email],
By OHKA21 
Reply
#2
GOOD MAN

GOOD MAN
D D
Reply
#3
(08-08-25, 09:54 AM)OHKA21 Wrote: Hello DarkForums Community,
Today I have uploaded the USA NATIONAL SECURITY DOCUMENT LEAK for you to download, thanks for reading and enjoy!
 
[Image: NSA-Cyber-AI.jpg]

The documents belonging to the Five Eyes Intelligence Group.
This data was obtained by breaching into Acuity Inc, a company that works directly with the US Government and its allies.

Compromised Data :
Full names, Emails, Office numbers, personal cell numbers
Email Addresses (Government, Military & Pentagon)
Classified Information and communications between the 5 eyes, 14 eyes and the US's allies.

Sample :

Code:
 
Code:
Post’s
Informal Counterterrorism Working Group has met and discussed this
proposal.  Members of the Working Group include: FBI, DEA, DAO, INL,
POL-MIL, ODRP, DHS, RSO, and other security agencies.  We also
participate in CT-related donor coordination with our Five Eyes partners
and the CaPri program.'',
ICSR has years of experience in delivering training programmes for law
enforcement and security officials, including USG, British and allied
countries’ intelligence and law enforcement agencies (e.g. NSA, FBI,
Special Operations Command, GCHQ, Foreign Office, the UK Association of
Police Officers, Governments of Singapore, Trinidad and Tobago, the
Netherlands, and Australia.) Members of ICSR have delivered teaching at
all levels, and serve as professors and adjunct professors at King’s
College London, Johns Hopkins University, and Georgetown University. ',
'2015-12-31 00:00:00.000', NULL, NULL, NULL, N'Research - Understanding
the processes of radicalisation and recruitment among Sunni Islamist
foreign fighter communities in the Balkans region
1.1. Mapping Vulnerable Communities. In coordination with the Department
10 of the Ministry of Internal Affairs, Anti-terrorism Bureau of
National Security Agency and with support from the stakeholders in four
target areas with high levels of local ISIL recruitment, SFCG and its
partners will use  community mapping to understand key social
relationships, community organizations and driving factors, which can
serve to strengthen communities against their vulnerabilities to
violence.
Two DEA Special Agents will be assigned to coordinate, monitor and
direct the project, and they will have three supervisory levels above
them within the American Embassy in Lima monitoring their work.  INL
will provide the GOR, and coordinate with the POL and ECON sections
while providing oversight.'', N''Country'', NULL, NULL, N''Special
Intelligence Unit (SIU) and Regional Intelligence Group (RIG) within the
newly formed Money Laundering Directorate (DIRILA) of the PNP'', 5,
N''The project will deter financial support for the Shining Path (SL,
the acronym in Spanish for “Sendero Luminoso”), a USG-designated
terrorist organization operating in the Apurimac, Ene, and Montaro River
Valley (VRAEM) region of Peru, the country’s epicenter of illicit coca
production, by enhancing the ability of two 12-person specialized
inter-agency Peruvian law enforcement units to identify, disrupt, and
deny terrorist financing.'', ''2015-06-10 13:40:56.503'', NULL,
''2015-05-07 21:23:46.820'', N''This proposal to combat SL’s source of
funding complements two ongoing projects funded by the Bureau of
Counterterrorism.  The first is a Regional Security Initiative entitled
“Operation Eclipse,” which seeks to target, disrupt, and dismantle the
SL through the use of a 15-person specialized unit and a tactical,
30-man, quick response force to assist the specialized team to capture
high value SL targets.  Funds for this project are used to support,
equip, and train this specialized team and tactical force.  The second
project is entitled “Increasing Awareness of the Shining Path among
Police and Youth Leaders.”  Working with Peruvian National Police
officials, youth leaders and groups, and the National University of San
Martin de Porres, the project is aimed at developing a comprehensive
strategy to better educate youth in the VRAEM on the negative history
and violent ideology of the Shining Path terrorist organization.
Post’s CVE Working group and offices tasked with CVE have discussed this
young engagement University youth proposal and have interacted
extensively with its principal members.  No such program that actively
targets University youth exists on CVE.  This project is also not
duplicative of the FIVE EYES partners’ efforts.
Jordan is one of the U.S. Government’s (USG) key allies in the Middle
East.  The U.S.-Jordan relationship continues to produce strategic
benefits for the U.S., including political and logistical support for
U.S. involvement in Iraq, support for the fight against terrorism,
regional reform, and the Israeli-Palestinian conflict
The current program business model is specific to U.S. Digital Globe and
Canadian Radarsat due to those systems only, having agreements with the
U.S. Government GEOINT functional manager (National Geospatial
Intelligence Agency, NGA).  There are, however, near-peer technology
systems hosted by the Airbus Corporation and the European Space Ag'',
''2018-09-30 00:00:00.000'', NULL, NULL, NULL, N''Real-time Commercial
Space-based Surveillance for Cooperative Security'', NULL, ''2016-06-01
00:00:00.000'', ''2016-02-01 01:05:54.157'', NULL)')
•  The concept for this law enforcement program was circulated through
and approved by the U.S. Embassy Amman country team, including the
Ambassador, and representatives of several U.S. government
stakeholders.[/align]
•  This law enforcement program has been coordinated with the Department
of Defense, specifically U.S. Special Operations Command and U.S.
Central Command and their subordinate command, U.S. Special Operations
Command Central; the Department of State Bureau of Counterterrorism; the
Department of Homeland Security; U.S. Border Patrol; the Federal Bureau
of Investigation; the Defense Intelligence Agency; the Central
Intelligence Agency; and the National Security Council. This program was
also coordinated with various U.S. Government entities in Jordan,
including CENTCOM Forward Jordan (CF-J), Special Operations Command
Forward Jordan (SF-J), and OGP.
•  No such law enforcement program is currently underway in Jordan.
There is no duplication of effort. This program is ultimately a
multi-agency endeavor with coordination and participation on multiple
levels of the information cycle.
[align=center]•  HSI has de-conflicted with representatives from the
British government, specifically the National Crime Agency and the
Metropolitan Police Service. Those agencies had notions to design a
biometric collection program in Jordan with similar concepts but remain
in the pre-proposal stage.
find.txt:copyRecordFromDev_083016.sql:INSERT INTO [dbo].[ActivityPerson]
([ActivityPersonID], [ActivityID], [Email], [FirstName], [LastName],
[Office], [Phone]) VALUES (18951, 2032, N'amy.chang.lee@usdoj.gov',
N'Amy', N'Lee', N'DOJ OPDAT', N'202-514-6882')[/align]
find.txt:copyRecordFromDev_083016.sql:INSERT INTO [dbo].[ActivityPerson]
([ActivityPersonID], [ActivityID], [Email], [FirstName], [LastName],
[Office], [Phone]) VALUES (18954, 2032, N'KennyKX@state.gov', N'Karyn',
N'Kenny', N'DOJ OPDAT', NULL)
find.txt:copyRecordFromDev_083016.sql:INSERT INTO [dbo].[ActivityPerson]
([ActivityPersonID], [ActivityID], [Email], [FirstName], [LastName],
[Office], [Phone]) VALUES (18955, 2033, N'amy.chang.lee@usdoj.gov',
N'Amy', N'Lee', N'DOJ OPDAT', N'202-514-6882')
find.txt:copyRecordFromDev_083016.sql:INSERT INTO [dbo].[ActivityPerson]
([ActivityPersonID], [ActivityID], [Email], [FirstName], [LastName],
[Office], [Phone]) VALUES (18956, 2034, N'amy.chang.lee@usdoj.gov',
N'Amy', N'Chang Lee', N'DOJ/OPDAT', N'(202) 514-6882')
find.txt:copyRecordFromDev_083016.sql:INSERT INTO [dbo].[ActivityPerson]
([ActivityPersonID], [ActivityID], [Email], [FirstName], [LastName],
[Office], [Phone]) VALUES (18957, 2033, N'TaylorRR@state.gov', N'Robin',
N'Taylor', N'DOJ OPDAT', NULL)
find.txt:copyRecordFromDev_083016.sql:INSERT INTO [dbo].[ActivityPerson] ([ActivityPersonID], [ActivityID], [Email],
Reply
#4
(08-08-25, 09:54 AM)OHKA21 Wrote: Hello DarkForums Community,
Today I have uploaded the USA NATIONAL SECURITY DOCUMENT LEAK for you to download, thanks for reading and enjoy!
 
[Image: NSA-Cyber-AI.jpg]

The documents belonging to the Five Eyes Intelligence Group.
This data was obtained by breaching into Acuity Inc, a company that works directly with the US Government and its allies.

Compromised Data :
Full names, Emails, Office numbers, personal cell numbers
Email Addresses (Government, Military & Pentagon)
Classified Information and communications between the 5 eyes, 14 eyes and the US's allies.

Sample :

Code:
 
Code:
Post’s
Informal Counterterrorism Working Group has met and discussed this
proposal.  Members of the Working Group include: FBI, DEA, DAO, INL,
POL-MIL, ODRP, DHS, RSO, and other security agencies.  We also
participate in CT-related donor coordination with our Five Eyes partners
and the CaPri program.'',
ICSR has years of experience in delivering training programmes for law
enforcement and security officials, including USG, British and allied
countries’ intelligence and law enforcement agencies (e.g. NSA, FBI,
Special Operations Command, GCHQ, Foreign Office, the UK Association of
Police Officers, Governments of Singapore, Trinidad and Tobago, the
Netherlands, and Australia.) Members of ICSR have delivered teaching at
all levels, and serve as professors and adjunct professors at King’s
College London, Johns Hopkins University, and Georgetown University. ',
'2015-12-31 00:00:00.000', NULL, NULL, NULL, N'Research - Understanding
the processes of radicalisation and recruitment among Sunni Islamist
foreign fighter communities in the Balkans region
1.1. Mapping Vulnerable Communities. In coordination with the Department
10 of the Ministry of Internal Affairs, Anti-terrorism Bureau of
National Security Agency and with support from the stakeholders in four
target areas with high levels of local ISIL recruitment, SFCG and its
partners will use  community mapping to understand key social
relationships, community organizations and driving factors, which can
serve to strengthen communities against their vulnerabilities to
violence.
Two DEA Special Agents will be assigned to coordinate, monitor and
direct the project, and they will have three supervisory levels above
them within the American Embassy in Lima monitoring their work.  INL
will provide the GOR, and coordinate with the POL and ECON sections
while providing oversight.'', N''Country'', NULL, NULL, N''Special
Intelligence Unit (SIU) and Regional Intelligence Group (RIG) within the
newly formed Money Laundering Directorate (DIRILA) of the PNP'', 5,
N''The project will deter financial support for the Shining Path (SL,
the acronym in Spanish for “Sendero Luminoso”), a USG-designated
terrorist organization operating in the Apurimac, Ene, and Montaro River
Valley (VRAEM) region of Peru, the country’s epicenter of illicit coca
production, by enhancing the ability of two 12-person specialized
inter-agency Peruvian law enforcement units to identify, disrupt, and
deny terrorist financing.'', ''2015-06-10 13:40:56.503'', NULL,
''2015-05-07 21:23:46.820'', N''This proposal to combat SL’s source of
funding complements two ongoing projects funded by the Bureau of
Counterterrorism.  The first is a Regional Security Initiative entitled
“Operation Eclipse,” which seeks to target, disrupt, and dismantle the
SL through the use of a 15-person specialized unit and a tactical,
30-man, quick response force to assist the specialized team to capture
high value SL targets.  Funds for this project are used to support,
equip, and train this specialized team and tactical force.  The second
project is entitled “Increasing Awareness of the Shining Path among
Police and Youth Leaders.”  Working with Peruvian National Police
officials, youth leaders and groups, and the National University of San
Martin de Porres, the project is aimed at developing a comprehensive
strategy to better educate youth in the VRAEM on the negative history
and violent ideology of the Shining Path terrorist organization.
Post’s CVE Working group and offices tasked with CVE have discussed this
young engagement University youth proposal and have interacted
extensively with its principal members.  No such program that actively
targets University youth exists on CVE.  This project is also not
duplicative of the FIVE EYES partners’ efforts.
Jordan is one of the U.S. Government’s (USG) key allies in the Middle
East.  The U.S.-Jordan relationship continues to produce strategic
benefits for the U.S., including political and logistical support for
U.S. involvement in Iraq, support for the fight against terrorism,
regional reform, and the Israeli-Palestinian conflict
The current program business model is specific to U.S. Digital Globe and
Canadian Radarsat due to those systems only, having agreements with the
U.S. Government GEOINT functional manager (National Geospatial
Intelligence Agency, NGA).  There are, however, near-peer technology
systems hosted by the Airbus Corporation and the European Space Ag'',
''2018-09-30 00:00:00.000'', NULL, NULL, NULL, N''Real-time Commercial
Space-based Surveillance for Cooperative Security'', NULL, ''2016-06-01
00:00:00.000'', ''2016-02-01 01:05:54.157'', NULL)')
•  The concept for this law enforcement program was circulated through
and approved by the U.S. Embassy Amman country team, including the
Ambassador, and representatives of several U.S. government
stakeholders.[/align]
•  This law enforcement program has been coordinated with the Department
of Defense, specifically U.S. Special Operations Command and U.S.
Central Command and their subordinate command, U.S. Special Operations
Command Central; the Department of State Bureau of Counterterrorism; the
Department of Homeland Security; U.S. Border Patrol; the Federal Bureau
of Investigation; the Defense Intelligence Agency; the Central
Intelligence Agency; and the National Security Council. This program was
also coordinated with various U.S. Government entities in Jordan,
including CENTCOM Forward Jordan (CF-J), Special Operations Command
Forward Jordan (SF-J), and OGP.
•  No such law enforcement program is currently underway in Jordan.
There is no duplication of effort. This program is ultimately a
multi-agency endeavor with coordination and participation on multiple
levels of the information cycle.
[align=center]•  HSI has de-conflicted with representatives from the
British government, specifically the National Crime Agency and the
Metropolitan Police Service. Those agencies had notions to design a
biometric collection program in Jordan with similar concepts but remain
in the pre-proposal stage.
find.txt:copyRecordFromDev_083016.sql:INSERT INTO [dbo].[ActivityPerson]
([ActivityPersonID], [ActivityID], [Email], [FirstName], [LastName],
[Office], [Phone]) VALUES (18951, 2032, N'amy.chang.lee@usdoj.gov',
N'Amy', N'Lee', N'DOJ OPDAT', N'202-514-6882')[/align]
find.txt:copyRecordFromDev_083016.sql:INSERT INTO [dbo].[ActivityPerson]
([ActivityPersonID], [ActivityID], [Email], [FirstName], [LastName],
[Office], [Phone]) VALUES (18954, 2032, N'KennyKX@state.gov', N'Karyn',
N'Kenny', N'DOJ OPDAT', NULL)
find.txt:copyRecordFromDev_083016.sql:INSERT INTO [dbo].[ActivityPerson]
([ActivityPersonID], [ActivityID], [Email], [FirstName], [LastName],
[Office], [Phone]) VALUES (18955, 2033, N'amy.chang.lee@usdoj.gov',
N'Amy', N'Lee', N'DOJ OPDAT', N'202-514-6882')
find.txt:copyRecordFromDev_083016.sql:INSERT INTO [dbo].[ActivityPerson]
([ActivityPersonID], [ActivityID], [Email], [FirstName], [LastName],
[Office], [Phone]) VALUES (18956, 2034, N'amy.chang.lee@usdoj.gov',
N'Amy', N'Chang Lee', N'DOJ/OPDAT', N'(202) 514-6882')
find.txt:copyRecordFromDev_083016.sql:INSERT INTO [dbo].[ActivityPerson]
([ActivityPersonID], [ActivityID], [Email], [FirstName], [LastName],
[Office], [Phone]) VALUES (18957, 2033, N'TaylorRR@state.gov', N'Robin',
N'Taylor', N'DOJ OPDAT', NULL)
find.txt:copyRecordFromDev_083016.sql:INSERT INTO [dbo].[ActivityPerson] ([ActivityPersonID], [ActivityID], [Email],

woee nice
Reply
#5
Nice work
Reply
#6
thank you bro
Reply
#7
Awesome dude
Reply
#8
thnaks bo

thanks bro
Reply
#9
(08-08-25, 09:54 AM)OHKA21 Wrote: Hello DarkForums Community,
Today I have uploaded the USA NATIONAL SECURITY DOCUMENT LEAK for you to download, thanks for reading and enjoy!
 
[Image: NSA-Cyber-AI.jpg]

The documents belonging to the Five Eyes Intelligence Group.
This data was obtained by breaching into Acuity Inc, a company that works directly with the US Government and its allies.

Compromised Data :
Full names, Emails, Office numbers, personal cell numbers
Email Addresses (Government, Military & Pentagon)
Classified Information and communications between the 5 eyes, 14 eyes and the US's allies.

Sample :

Code:
 
Code:
Post’s
Informal Counterterrorism Working Group has met and discussed this
proposal.  Members of the Working Group include: FBI, DEA, DAO, INL,
POL-MIL, ODRP, DHS, RSO, and other security agencies.  We also
participate in CT-related donor coordination with our Five Eyes partners
and the CaPri program.'',
ICSR has years of experience in delivering training programmes for law
enforcement and security officials, including USG, British and allied
countries’ intelligence and law enforcement agencies (e.g. NSA, FBI,
Special Operations Command, GCHQ, Foreign Office, the UK Association of
Police Officers, Governments of Singapore, Trinidad and Tobago, the
Netherlands, and Australia.) Members of ICSR have delivered teaching at
all levels, and serve as professors and adjunct professors at King’s
College London, Johns Hopkins University, and Georgetown University. ',
'2015-12-31 00:00:00.000', NULL, NULL, NULL, N'Research - Understanding
the processes of radicalisation and recruitment among Sunni Islamist
foreign fighter communities in the Balkans region
1.1. Mapping Vulnerable Communities. In coordination with the Department
10 of the Ministry of Internal Affairs, Anti-terrorism Bureau of
National Security Agency and with support from the stakeholders in four
target areas with high levels of local ISIL recruitment, SFCG and its
partners will use  community mapping to understand key social
relationships, community organizations and driving factors, which can
serve to strengthen communities against their vulnerabilities to
violence.
Two DEA Special Agents will be assigned to coordinate, monitor and
direct the project, and they will have three supervisory levels above
them within the American Embassy in Lima monitoring their work.  INL
will provide the GOR, and coordinate with the POL and ECON sections
while providing oversight.'', N''Country'', NULL, NULL, N''Special
Intelligence Unit (SIU) and Regional Intelligence Group (RIG) within the
newly formed Money Laundering Directorate (DIRILA) of the PNP'', 5,
N''The project will deter financial support for the Shining Path (SL,
the acronym in Spanish for “Sendero Luminoso”), a USG-designated
terrorist organization operating in the Apurimac, Ene, and Montaro River
Valley (VRAEM) region of Peru, the country’s epicenter of illicit coca
production, by enhancing the ability of two 12-person specialized
inter-agency Peruvian law enforcement units to identify, disrupt, and
deny terrorist financing.'', ''2015-06-10 13:40:56.503'', NULL,
''2015-05-07 21:23:46.820'', N''This proposal to combat SL’s source of
funding complements two ongoing projects funded by the Bureau of
Counterterrorism.  The first is a Regional Security Initiative entitled
“Operation Eclipse,” which seeks to target, disrupt, and dismantle the
SL through the use of a 15-person specialized unit and a tactical,
30-man, quick response force to assist the specialized team to capture
high value SL targets.  Funds for this project are used to support,
equip, and train this specialized team and tactical force.  The second
project is entitled “Increasing Awareness of the Shining Path among
Police and Youth Leaders.”  Working with Peruvian National Police
officials, youth leaders and groups, and the National University of San
Martin de Porres, the project is aimed at developing a comprehensive
strategy to better educate youth in the VRAEM on the negative history
and violent ideology of the Shining Path terrorist organization.
Post’s CVE Working group and offices tasked with CVE have discussed this
young engagement University youth proposal and have interacted
extensively with its principal members.  No such program that actively
targets University youth exists on CVE.  This project is also not
duplicative of the FIVE EYES partners’ efforts.
Jordan is one of the U.S. Government’s (USG) key allies in the Middle
East.  The U.S.-Jordan relationship continues to produce strategic
benefits for the U.S., including political and logistical support for
U.S. involvement in Iraq, support for the fight against terrorism,
regional reform, and the Israeli-Palestinian conflict
The current program business model is specific to U.S. Digital Globe and
Canadian Radarsat due to those systems only, having agreements with the
U.S. Government GEOINT functional manager (National Geospatial
Intelligence Agency, NGA).  There are, however, near-peer technology
systems hosted by the Airbus Corporation and the European Space Ag'',
''2018-09-30 00:00:00.000'', NULL, NULL, NULL, N''Real-time Commercial
Space-based Surveillance for Cooperative Security'', NULL, ''2016-06-01
00:00:00.000'', ''2016-02-01 01:05:54.157'', NULL)')
•  The concept for this law enforcement program was circulated through
and approved by the U.S. Embassy Amman country team, including the
Ambassador, and representatives of several U.S. government
stakeholders.[/align]
•  This law enforcement program has been coordinated with the Department
of Defense, specifically U.S. Special Operations Command and U.S.
Central Command and their subordinate command, U.S. Special Operations
Command Central; the Department of State Bureau of Counterterrorism; the
Department of Homeland Security; U.S. Border Patrol; the Federal Bureau
of Investigation; the Defense Intelligence Agency; the Central
Intelligence Agency; and the National Security Council. This program was
also coordinated with various U.S. Government entities in Jordan,
including CENTCOM Forward Jordan (CF-J), Special Operations Command
Forward Jordan (SF-J), and OGP.
•  No such law enforcement program is currently underway in Jordan.
There is no duplication of effort. This program is ultimately a
multi-agency endeavor with coordination and participation on multiple
levels of the information cycle.
[align=center]•  HSI has de-conflicted with representatives from the
British government, specifically the National Crime Agency and the
Metropolitan Police Service. Those agencies had notions to design a
biometric collection program in Jordan with similar concepts but remain
in the pre-proposal stage.
find.txt:copyRecordFromDev_083016.sql:INSERT INTO [dbo].[ActivityPerson]
([ActivityPersonID], [ActivityID], [Email], [FirstName], [LastName],
[Office], [Phone]) VALUES (18951, 2032, N'amy.chang.lee@usdoj.gov',
N'Amy', N'Lee', N'DOJ OPDAT', N'202-514-6882')[/align]
find.txt:copyRecordFromDev_083016.sql:INSERT INTO [dbo].[ActivityPerson]
([ActivityPersonID], [ActivityID], [Email], [FirstName], [LastName],
[Office], [Phone]) VALUES (18954, 2032, N'KennyKX@state.gov', N'Karyn',
N'Kenny', N'DOJ OPDAT', NULL)
find.txt:copyRecordFromDev_083016.sql:INSERT INTO [dbo].[ActivityPerson]
([ActivityPersonID], [ActivityID], [Email], [FirstName], [LastName],
[Office], [Phone]) VALUES (18955, 2033, N'amy.chang.lee@usdoj.gov',
N'Amy', N'Lee', N'DOJ OPDAT', N'202-514-6882')
find.txt:copyRecordFromDev_083016.sql:INSERT INTO [dbo].[ActivityPerson]
([ActivityPersonID], [ActivityID], [Email], [FirstName], [LastName],
[Office], [Phone]) VALUES (18956, 2034, N'amy.chang.lee@usdoj.gov',
N'Amy', N'Chang Lee', N'DOJ/OPDAT', N'(202) 514-6882')
find.txt:copyRecordFromDev_083016.sql:INSERT INTO [dbo].[ActivityPerson]
([ActivityPersonID], [ActivityID], [Email], [FirstName], [LastName],
[Office], [Phone]) VALUES (18957, 2033, N'TaylorRR@state.gov', N'Robin',
N'Taylor', N'DOJ OPDAT', NULL)
find.txt:copyRecordFromDev_083016.sql:INSERT INTO [dbo].[ActivityPerson] ([ActivityPersonID], [ActivityID], [Email],
Reply
#10
thanks bro
Reply


Forum Jump:


 Users browsing this thread: 1 Guest(s)