"Unthinking respect for authority is the greatest enemy of truth."

Welcome to Infoshop News
Saturday, June 15 2013 @ 10:24 PM CDT

FBI INTELLIGENCE BULLETIN no. 89

News ArchiveSubmitted by Reverend Chuck0:

LAW ENFORCEMENT SENSITIVE

FBI INTELLIGENCE BULLETIN no. 89

October 15, 2003

----------------------------------

THREAT LEVEL: YELLOW (ELEVATED)

THE FBI INTELLIGENCE BULLETIN, DISSEMINATED ON A WEEKLY BASIS,

PROVIDES LAW ENFORCEMENT WITH CURRENT, RELEVANT TERRORISM

INFORMATION DEVELOPED FROM COUNTERTERRORISM INVESTIGATIONS

AND ANALYSIS. THE INTELLIGENCE BULLETIN DOES NOT CONTAIN THREAT
WARNING INFORMATION.

HANDLING NOTICE: Recipients are reminded that the Intelligence Bulletin is designated “Law Enforcement Sensitive” and should not be disseminated beyond law enforcement circles.

ITEM: TACTICS USED DURING PROTESTS AND DEMONSTRATIONS

On October 25, 2003, mass marches and rallies against the occupation is Iraq are scheduled to occur in Washington, D.C. and San Francisco, California. While the FBI possesses no information indicating that violent or terrorist activities are being planned as part of these protests, the possibility exists that elements of the activist community may attempt to engage in violent, destructive, or disruptive acts. Most protests are peaceful events; however, a number of demonstrations, including the biannual International Monetary Fund and World Bank meetings, are more likely to be violent and disruptive and to require enhanced law enforcement security. Several effective and innovative strategies are commonly used by protestors prior to, during, and after demonstrations. The following tactics have been observed by U.S. and foreign law enforcement agencies while responding to criminal activities during protests and demonstrations.

Protestors often use the internet to recruit, raise funds, and coordinate their activities prior to demonstrations. Activists may also make use of training camps to rehearse tactics and counter-strategies for dealing with the police and to resolve any logistical issues.

If a demonstration is going to take place in a secure facility, activists may seek to gain access to the site using false documentation. Surveillance of sites prior to demonstrations can allow activists to identify locations of command posts and law enforcement personnel in order to plan effective countermeasures.

LAW ENFORCEMENT SENSITIVE

Traditional demonstration tactics by which protestors draw attention to their causes include marches, banners, and forms of passive resistance such as sit-ins. Extremist elements may engage in more aggressive tactics that can include vandalism, physical harassment of delegates, trespassing, the formation of human chains or shields, makeshift barricades, devices used against mounted police units, and the use of weapons—such as projectiles and homemade bombs. Even the more peaceful techniques can create a climate of disorder, block access to a site, draw large members of police to a specific location in order to weaken security at other locations, obstruct traffic, and possibly intimidate people from attending the events being protested.

During the course of a demonstration, activists often communicate with one another using cell phones or radios to coordinate activities or to update colleagues about ongoing events. Other types of media equipment (video cameras, photographic equipment, audio tape recorders, microphones, and computer and radio equipment) may be used for documenting potential cases of police brutality and for distribution of information over the internet.

Extremists may be prepared to defend themselves against law enforcement officials during the course of a demonstration. Masks (gas masks, goggles, scarves, scuba masks, filter masks, and sunglasses) can serve to minimize the effects of tear gas and pepper spray as well as obscure one’s identity. Extremists may also employ shields (trash can lids, sheets of plexiglass, truck tire inner tubes, etc.) and body protection equipment (layered clothing, hard hats and helmets, sporting equipment, life jackets, etc.) to protect themselves during marches. Activists may also use intimidation techniques such as videotaping and the swarming of police officers to hinder the arrest of other demonstrators.

After demonstrations, activists are usually reluctant to cooperate with law enforcement officials. They seldom carry any identification papers and often refuse to divulge any information about themselves or other protestors. Post-demonstration activities can include fundraising in support of the legal defense of accused protestors and demonstrations of solidarity calling for the release of the accused.

Law enforcement agencies should be alert to these possible indicators of protest activity and report any potential illegal acts to the nearest FBI Joint Terrorism Task Force.

ADMINISTRATIVE NOTE: LAW ENFORCEMENT RESPONSE

Information contained in the FBI Intelligence Bulletin is Law Enforcement Sensitive and intended for official use only. No portion of this bulletin should be released to the media, the general public or over non-secure Internet servers. Release of Law Enforcement Senstive material could adversely affect or jeopardize investigative activities.

Departments are requested to contact the nearest FBI field office or resident agency in their area

LAW ENFORCEMENT SENSITIVE

Should additional information be developed related to the above matter. Questions regarding the content of these Bulletins should also be directed to the nearest FBI field office or resident agency. Specific comments or suggestions about the format or content can be provided to lesc@leo.gov.
Share
  • Facebook
  • Google Bookmarks
  • Ask
  • Kirtsy
  • LinkedIn
  • Digg
  • Twitter
  • SlashDot
  • Reddit
  • MySpace
  • Fark
  • Del.icio.us
  • Blogmarks
  • Yahoo Buzz
FBI INTELLIGENCE BULLETIN no. 89 | 15 comments | Create New Account
The following comments are owned by whomever posted them. This site is not responsible for what they say.
comment by Anonamouse
Authored by: Anonymous on Tuesday, April 25 2006 @ 11:24 AM CDT
Anyone know if there is a place where leo.gov traffic is cross-posted? Sounds like it would be very helpful to a lot of us. I'm thinking a peer-to-peer method would be harder to shut down/more anonymous than a server type setup.
comment by
Authored by: Anonymous on Monday, November 24 2003 @ 08:51 PM CST
At least they\'re verifying that some of our tactics are effective and worthwhile (not that we didn\'t already know that...).

Hey, where the fuck are the other 88 bulletins? Seems like we need to up our counterintelligence program funding...i\'ll forward a memo to the chair of the regional Anti-pig council...
comment by sid
Authored by: Anonymous on Monday, November 24 2003 @ 07:32 PM CST
ha...tire inner tubes. good idea
comment by Reverend Chuck0
Authored by: Anonymous on Monday, November 24 2003 @ 08:23 PM CST
That\'s funny, I thought this was about the ANSWER protests!

It\'s a good thing that most Americans aren\'t seeing this document, because they would start asking questions about the FBI\'s competence. Here we have an organizaton that couldn\'t find the Unabomber and they are disseminating documents to police departments telling them what they already know.

You have to wonder if this is really indicative of the \"intelligence\" that the FBI has on activists.

This document includes a few good ideas though.
comment by
Authored by: Anonymous on Monday, November 24 2003 @ 10:54 PM CST
Yeah, extremists that film police and publicize. brutality and attempt to protect themselves from it. What a bunch of crazy, irrational people.
comment by Ex-Scully
Authored by: Anonymous on Monday, November 24 2003 @ 11:05 PM CST
Yeah, who leaked this out anyhow? Where are the other 88? Bring \'em on! This reminds me of the bogus TSA (Transporation Security Administration) classification of \"SSI\" - \"Sensitive Security Information\" - previously public info they suddenly decide to make classified. Totally bogus...another way of preventing info from getting into John Q. Public\'s hands.
comment by pr
Authored by: Anonymous on Tuesday, November 25 2003 @ 12:19 AM CST
The FBI spy, lie and deny, they couldn\'t catch USAma but a bunch of kids with hankie\'s - hey, \'No problembo\'. What a pack of fucking wankers.
comment by Jonathan Nil
Authored by: Anonymous on Tuesday, November 25 2003 @ 11:09 AM CST
My absolute favorite paragraph is the third one under the \"Law Enforcement Sensitive\" headline.

Mr. Joe Typical American asks, Gee, why would \'extremists\' feel the need to \'defend themselves against law enforcement officials\', do you think? Gee, why does the FBI consider \'videotaping\' police officers to be an \'intimidation tactic\'?

In their own words, that\'s great. It\'s always interesting to be reminded that the FBI and law enforcement type people really DO see some things pretty much the same as us, they\'ve just chosen a different side.
comment by
Authored by: Anonymous on Tuesday, November 25 2003 @ 12:42 PM CST
My favorite part:
\"No portion of this bulletin should be released to the media, the general public or over non-secure Internet servers.\"

Good thing they didn\'t release it!
comment by haha
Authored by: Anonymous on Tuesday, November 25 2003 @ 03:15 PM CST


Has anyone tried to contact the person\'s email at the bottom of this memo lesc@leo.gov? Maybe he\'ll let us have a look-see at the other 88 bulletins

The most disturbing thing is thatthey think you are an \"Extremist\" if you \"defend yourself against law enforcement officials during the course of a demonstration\" - by wearing a mask, bandana or sunglasses.

Oh yeah, the part about using \"intimidation techniques\" such as videotaping a bunch of grown men dressed like robots is really funny.
comment by Jonathan Nil
Authored by: Anonymous on Tuesday, November 25 2003 @ 06:17 PM CST
While they didn\'t want it released, it was distributed to many (all?) local police departments, all over the country. So it wasn\'t exactly \'secret\', that\'s a lot of people. Apparently at least one of them decided to give it to the media---the mainstream media has been talking about the contents of this memo for a week or so, although I hadn\'t seen the contents until infoshop.

The email at the bottom is obviously just the email of the office that releases these memos, and has released the previous 87 too. Somehow I doubt that office would be keen on giving you all the rest just cause you emailed them. Although it is hard to resist the invitation to send them comments and suggestions on the content, isn\'t it? Not neccesarily a great idea though.
comment by .
Authored by: Anonymous on Tuesday, November 25 2003 @ 06:29 PM CST
Interesting - about leo.gov

http://groups.google.com/groups?num=100&q=+%22%40leo.gov%22



From: Steve (furbish@cybertours.com)
Subject: Re: Notification
View: Complete Thread (20 articles)
Original Format
Newsgroups: alt.law-enforcement
Date: 2000/06/25

\"Pagan\" wrote in message
news:slbidbqcjev162@corp.supernews.com...
> To be honest, it would be nice to have somewhere on line where I can ask
> direct questions and get direct answers. Here everybody filters their
> responses so as not to give away their personal information. I have to do
> the same. The last thing I need is some nut calling my house or department
> and making my life any more complicated.

I tried on occassion to recruit some of the REAL MCCOYs here onto leo.gov.
It\'s not the internet, it\'s a private WAN for law enforcement which is
restricted to criminal justice employees. It\'s run by the DOJ and I have the
application in Adobe Acrobat format if anyone is interested. There\'s not a
ton of traffic on it\'s newsgroups, but I was able to find help on the new
software my department is using and some tip on sitting on a communications
specialist oral board by asking questions there. It\'s free (800 number) and
they do verify employment. If you want the application just drop me a line
at sfurbish@worldspy.net (that\'s a alternate email address that I actually
check on occassion). If you already subscribe to leo.gov - pass it on to
your leo buddies.

Steve
comment by
Authored by: Anonymous on Wednesday, November 26 2003 @ 05:56 PM CST
hehe..yeah, I got curious about leo.gov too, particularly since it doesn\'t have any web presence (eg, www.leo.gov doesn\'t exist).

Turns out internet.leo.gov only hosts mail services (port 25) and some weird stuff on the https port (443) which isn\'t accessible with a standard web client (maybe needs special client certificate authentication?). All other TCP ports are filtered.

It also runs Win2k SP3, for whatever that\'s worth.

Nmap
comment by Anonamouse
Authored by: Anonymous on Tuesday, June 29 2004 @ 12:19 PM CDT
LEO Info

http://www.fbi.gov/hq/cjisd/leo.htm
FBI INTELLIGENCE BULLETIN no. 89
Authored by: Renegade on Wednesday, May 09 2007 @ 03:00 AM CDT
OK, so we know this is as much as they know... we need to use psychology and reverse-psychology to sabotage their attempts to thwart us. don't do what they expect. new goal: confuse the hell out of them.
we should also know who they are so that cops cannot infiltrate us anymore. photographic records of all cops in all areas. everyone ever hired, covert ways of photoing those in plain clothes infiltration. this is important to confuse them and render their preparations ineffective.

---
~~~I know things~~~