Archive of government documents and public information regarding national security, finance, international relations, government surveillance, and continuity of government operations.| Public Intelligence |
The 71st Bilderberg Meeting will take place from 12 – 15 June 2025 in Stockholm, Sweden. As ever, a diverse group of political leaders and experts from industry, finance, academia and the media has| Public Intelligence
On July 13, 2024, Thomas Matthew Crooks bought 50 rounds of ammunition on his way to Butler, Pennsylvania, drove to former President Donald Trump’s campaign rally at the Butler Farm Show grounds, and climbed onto the roof of the American Glass Research (AGR) building less than 200 yards away from where the former President was speaking, where at 6:11 pm, he fired eight rounds from an AR-15 semiautomatic rifle, killing one person and injuring three others including the former president. That...| Public Intelligence
In today’s information environment, the way consumers view facts, define truth, and categorize various types of information does not adhere to traditional rules. The shift from print sources of info| Public Intelligence
This bulletin was created by the Central Florida Intelligence Exchange (CFIX) to provide situational awareness regarding the use of literary propaganda used to drive black racially and ethnically moti| Public Intelligence
The J5, a collaborative partnership among tax authorities and law enforcement from five countries, has identified several risk indicators that financial institutions should be aware of. Risk indicator| Public Intelligence
The 70th Bilderberg Meeting will take place from 30 May – 2 June 2024 in Madrid, Spain. As ever, a diverse group of political leaders and experts from industry, finance, academia, labour and the med| Public Intelligence
The Committee on the Judiciary and its Select Subcommittee on the Weaponization of the Federal Government are charged by the House of Representatives with upholding fundamental American civil libertie| Public Intelligence
Since its inception in 1979, the Islamic Republic of Iran has repeatedly disrupted the stability of the Middle East and fostered terrorist threats throughout the world. Iran exploited the power vacuum| Public Intelligence
Sovereign citizens are US citizens who claim to have special knowledge or heritage that renders them immune from government authority and laws. Although the ideology itself is not illegal, sovereign c| Public Intelligence
On May 24, 2022, a mass shooting at Robb Elementary School in Uvalde, Texas, shook the nation. With just two days left in the school year, a former student armed with an AR-15 style assault rifle took| Public Intelligence
This is the eighth batch of documents that were ordered released in the case of alleged victim of Jeffrey Epstein Virginia Guiffre in her case against Ghislaine Maxwell.| Public Intelligence
This is the seventh batch of documents that were ordered released in the case of alleged victim of Jeffrey Epstein Virginia Guiffre in her case against Ghislaine Maxwell.| Public Intelligence
This is the sixth batch of documents that were ordered released in the case of alleged victim of Jeffrey Epstein Virginia Guiffre in her case against Ghislaine Maxwell.| Public Intelligence
This is the fifth batch of documents that were ordered released in the case of alleged victim of Jeffrey Epstein Virginia Guiffre in her case against Ghislaine Maxwell.| Public Intelligence
This is the fourth batch of documents that were ordered released in the case of alleged victim of Jeffrey Epstein Virginia Guiffre in her case against Ghislaine Maxwell.| Public Intelligence
This is the third batch of documents that were ordered released in the case of alleged victim of Jeffrey Epstein Virginia Guiffre in her case against Ghislaine Maxwell.| Public Intelligence
This is the second batch of documents that were ordered released in the case of alleged victim of Jeffrey Epstein Virginia Guiffre in her case against Ghislaine Maxwell.| Public Intelligence
This is the first batch of documents that were ordered released in the case of alleged victim of Jeffrey Epstein Virginia Guiffre in her case against Ghislaine Maxwell.| Public Intelligence
Due to indications of an increase in extremist activity by former and current military personnel, evidenced by a spike in open source reporting, the ARTIC has produced this report examining 22 cases o| Public Intelligence
Phase 2 of the research serves to build upon the foundation laid in Phase 1. The Phase 2 research further explores: the criminal groups utilizing digital assets in illegal activities; how these crimin| Public Intelligence
Private and public sector analysts and subject matter experts working in the cyber financial landscape gathered through a series of meetings to examine the use of financial technologies and cryptocurr| Public Intelligence
The threat from the production, use, and trafficking of illegal drugs throughout the State of Michigan continues to be of great concern. In 2022, the demand and availability of some commonly used drug| Public Intelligence
Terrorist and militant attacks on electric power infrastructure outside the United States in 2021 and 2022 occurred at more than three times the average annual number of attacks from 2015 through 2020| Public Intelligence
The key finding of the COTE response is that, broadly, COTE plan requirements included in the FY 2021 NDAA are addressed through existing authorities, policies, plans, and frameworks. Creation of a CO| Public Intelligence
Peace In Ukraine protest is scheduled to take place March 18, 2023 at San Mateo and Gibson in Albuquerque at 1400 hrs.. This protest is hosted by the Party for Socialism and Liberation. There are no k| Public Intelligence
A People’s Republic of China (PRC) municipal government-controlled media outlet is very likely directing a cluster of English-language, coordinated inauthentic Twitter accounts that posted content d| Public Intelligence
Anarchist violent extremists are anti-government/anti-authority violent extremists who consider capitalism and centralized government to be unnecessary and oppressive, and who further their political| Public Intelligence
(U//FOUO) Militia violent extremists (MVEs) are anti-government/anti-authority violent extremists who seek to use or threaten force or violence to further their ideology in response to perceived abuse| Public Intelligence
The 69th Bilderberg Meeting will take place from 18 – 21 May 2023 in Lisbon, Portugal. About 130 participants from 23 countries have confirmed their attendance. As ever, a diverse group of political| Public Intelligence
The following symbols and phrases are sometimes used by anti-government or anti-authority violent extremists, specifically anarchist violent extremists (AVEs). AVE symbols are often found on online pl| Public Intelligence
The following symbols are used by Anti-Government or Anti-Authority Violent Extremists, specifically Militia Violent Extremists (MVE). MVE symbols are often found on propaganda, online platforms, meme| Public Intelligence
Violent extremist ideologies, rationales, and arguments typically are made of up of six core assertions or rhetorical elements. Generally, all six elements are necessary to persuade, radicalize, and mobilize people to conduct violent attacks; the loss or removal of one… Read more → The post NCTC Guide: The Structure of Violent Extremist Ideologies first appeared on Public Intelligence.| Public Intelligence
A study of individuals who disengaged from violent movements concludes that tailored approaches to countering violent extremism (CVE) at key turning points in the disengagement process can help facili| Public Intelligence
China has long known about nuclear high-altitude electromagnetic pulse (HEMP) and invested in protecting military forces and critical infrastructures from HEMP and other nuclear weapon effects during the Cold War, and continuing today. China has HEMP simulators and defensive and offensive programs that are almost certainly more robust than any in the United States. China's military doctrine regards nuclear HEMP attack as an extension of information or cyber warfare, and deserving highest prio...| Public Intelligence
The Department of Homeland Security (DHS), Federal Bureau of Investigation (FBI), and National Counterterrorism Center (NCTC) assess that domestic violent extremists (DVEs)a fueled by various evolving| Public Intelligence
We judge that narratives driven by Chinese, Iranian, and Russian state media, and proxy websites linked to these governments, often involve fact-based articles as well as editorials; these publication| Public Intelligence
Russia almost certainly is subjecting Ukrainian civilians in occupied areas to so-called filtration operations. Individuals face one of three fates after undergoing filtration, which include being issued documentation and remaining in Russian-occupied Ukraine, forcefully deported to Russia, or detained in prisons in eastern Ukraine or Russia. Read more → The post National Intelligence Council Map: Russian Filtration Operations first appeared on Public Intelligence.| Public Intelligence
This Intelligence In View provides federal, state, local, and private sector stakeholders an overview of Russian Government-affiliated cyber activity targeting the United States and Russian regional a| Public Intelligence
This Joint Intelligence Bulletin (JIB) provides an overview of significant tactics, techniques, and procedures (TTPs) discussed or used by the alleged perpetrator of the 14 May 2022 mass casualty shoo| Public Intelligence
This resource is provided to inform law enforcement, terrorism prevention practitioners, other first responders, community leaders, as well as the general public about both threats of violence and con| Public Intelligence