Department of Defense

U.S. Army Unexploded Ordnance (UXO) Procedures Manual

UXO on the battlefield affects the mobility and mission aspects of all units. Battlefields are littered with UXO hazards from two sources: ordnance that has either failed to function or ordnance designed to be used for area denial, such as conventional land mines and the family of scatterable mines (FASCAM). With the sophistication of modern weapons systems, battlefield commanders can target anything within their theater of operations.
After these attacks are completed, UXO hazards will be left on the battlefield. UXO hazards may not always pose an immediate threat to unit mission or mobility, but they are hazards that have in the past caused needless loss of life and materiel. Battlefield commanders need to know where UXO hazards are, as these hazards can affect the mobility of follow-on elements. This manual teaches personnel about the UXO hazard and how this hazard affects mission capabilities and what procedures are used to report
and protect personnel and equipment. All units should be able to react to the UXO hazard effectively and to report and protect against it.

U.S. Army Information Technology Agency WikiLeaks Phishing Warning

ITA is pleased to provide this information update as part of our commitment to support your information assurance efforts. All users are strongly advised against attempting to access information posted on the Internet or browse websites that claim to contain classified information from government owned computing systems. This message is in accordance with Headquarters Department of the Army issued All Army Activities (ALARACT) message issued on August 14, 2010 related to the WikiLeaks website. In addition, the Office of the Administrative Assistant (OAA) Communications has advised that all Department of Defense employees are not permitted to access, review, or search for any material pertaining to the WikiLeaks website from a government-issued computer. Users are advised that doing so may include the user as part of the formal ongoing investigation.

Sikorsky UH-3H Executive Transport NATOPS Flight Manual

The model UH-3H helicopter is manufactured by Sikorsky Aircraft, Division of United Technologies, Stratford, Connecticut 06615. The helicopter is a Class 1B aircraft, designed for both shore and shipbased operations to provide logistic support and a search and rescue capability as required. The crew consists of a pilot, copilot, and two utility aircrewmen. The UH-3H Executive Transport basic airframe is manufactured by Sikorsky Aircraft Corporation, a subsidiary of United Technologies Corporation, Stratford, CT., 06615. It is a Class 1B aircraft, designed for shore and ship based operations to provide executive transportation and logistic support. The crew consists of a pilot, copilot, and aircrew member.

(U//FOUO//LES) NCIS Guide to Developing Islamic Extremist Counterterrorism Sources

Following the events of September 11, 2001, the US intelligence and law enforcement communities began a fundamental shift in counterterrorism strategy to enhance national safety and security by changing from a reactive to a proactive posture. The communities have actively moved to identify potential threats and develop intelligence on specific terrorist targets. The core objective of these newly concentrated efforts is to reduce risks and manage potential threats by interrupting forward motion before an attack (Borum, 2004a). The ongoing Global Struggle Against Violent Extremism intensified the need for persons and agencies with counterterrorism responsibilities to understand the commitment, connections, capability, and intentions of Islamic extremists – including the Al-Qa’ida affiliated network – so that viable operations targeting terrorist cells can be developed. Ideally, these efforts involve source operations in which someone willing to provide information to US authorities penetrates an operational cell, or where someone with access to the cell is recruited to work for US authorities.

U.S. Army FM 3-19.15 Civil Disturbance Operations

Field Manual (FM) 3-19.15 addresses continental United States (CONUS) and outside continental United States (OCONUS) civil disturbance operations. Today, United States (US) forces are deployed on peacekeeping, peace enforcement, and humanitarian assistance operations worldwide. During these operations, US forces are often faced with unruly and violent crowds intent on disrupting peace and the ability of US forces to maintain peace. Worldwide instability coupled with increasing US military participation in peacekeeping and related operations requires that US forces have access to the most current doctrine and tactics, techniques, and procedures (TTP) necessary to quell riots and restore public order.

U.S. Army Military Police Civil Disturbance and Martial Law Training Course

Civil disturbances may be riots, violent uprisings, or unlawful actions. As a member of the military forces, you may be ordered under certain conditions to help restore law and order and protect property. The National Guard is likely to face most of the violence during demonstrations. To gain successful control of a civil disturbance, it will require an understanding of the reason for social unrest and basic human behavior patterns. Planning control strategy depends on knowing why people behave as they do. Group behavior sets the scene for civil disturbances. However, it is individual behavior which in the end is the most important.

(U//FOUO) USMC Weaponry Technical Information Manual

This manual provides easy-to-use reference data for the more common items of Marine Corps ordnance equipment. The equipment description sheets, which make up the bulk of the manual, provide a description, function, and technical characteristics of the equipment, including, when applicable, fuel and power requirements, power outputs, major components, and associated components. If available, photographs or drawings of the equipment are provided.

DoD Manual for Civil Emergencies

This Manual assigns responsibilities, prescribes procedures, and provides guidance by which the Department of Defense responds to ALL HAZARDS in accordance with 42 U.S.C. 5121, et seq., as amended (hereafter referred to as the Stafford Act, reference (f)). Under the authority of the Civil Defense Act of 1950, 50 U.S.C. App. 2251, et seq., (reference (a)) and National Security Directive 66 (dated March 16, 1992) (reference (m)) this Manual supports the National civil defense policy and Federal and State civil defense programs in cooperation with the Federal Emergency Management Agency (FEMA).

(U//FOUO) U.S. Army Zero-Point Energy Assessment

(U) Zero-point energy (a very general term) is the lowest energy that a given quantum mechanical system can have (i.e., the ground state of the system). In quantum field theory, it refers to the energy of the vacuum (i.e., a space devoid of matter [the energy of "nothing"]). In this paper, we will use the abbreviation ZPE (as is commonly used by those in the field) to refer to the vacuum energy for use in applications.

U.S. Navy NATOPS Air Traffic Control Manual

This manual contains information on administrative and operational procedures for all Navy and Marine Corps units providing air traffic control services and applies on a worldwide basis. Marine forces tactical air traffic control is provided by Marine Air Traffic Control Detachments (MATCD). Each MATCD is organized and equipped to provide continuous all-weather air traffic control services to an independent and geographically separated main air base or air facility and/or remote air sites or points. These services include airport traffic control, low approach and landing, and terminal area control services. To the extent possible and consistent with the ATC requirements of the area to which deployed, the functions, training, qualification, and certification for Marine forces tactical ATC units shall be as prescribed in this manual.

CJCS Military Family “Self-Help Guide” to Antiterrorism

This guide is designed to assist in making you and your family less vulnerable to terrorists. You should review its contents and incorporate protective measures applicable to your particular situation. It is important that you ensure all members of your family are made aware ofthis valuable information so they not only protect themselves, but also become an integral part of the overall community force protection effort. Terrorists generate fear through intimidation, coercion, and acts of violence such as bombings, hijackings, or kidnappings. As recent events have shown, terrorists have reached new levels of organization, sophistication, and violence, often targeting members of the Department of Defense and their families. Their tactics and techniques are also continually changing and will continue to be a challenge to predict and neutralize. Accordingly, we must remain vigilant.

(U//FOUO) USMC Company Intelligence Cell in Stability and Support Operations TTPs

In the asymmetrical threat climate of the 21st century, stability and support operations (SASO) are often conducted from a companylevel firm base (FB). These company and platoon size units need immediate, on-scene intelligence support to deal with an enemy that can recruit, rest, and resupply amongst the population in a predominately urban environment. This requires an intense collection and analysis effort by even the smallest unit. And, because of the noncontiguous nature of SASO, it is unrealistic to expect that higher echelon staffs will consistently be available to support them. Therefore, Marines in small units must establish and maintain a limited, but effective, capability for themselves.

DHS-DoD Memorandum of Agreement on Cybersecurity October 2010

The purpose of the Agreement is to set forth terms by which DHS and DoD will provide personnel, equipment, and facilities in order to increase interdepartmental collaboration in strategic planning for the Nation’s cybersecurity, mutual support for cybersecurity capabilities development, and synchronization of current operational cybersecurity mission activities. Implementing this Agreement will focus national cybersecurity efforts, increasing the overall capacity and capability of both DHS’s homeland security and DoD’s national security missions, while providing integral protection for privacy, civil rights, and civil liberties.

USMC Reserve Security Office WikiLeaks Guidance

The information found on the website “WIKILEAKS” is classified information that was transmitted to that public domain site illegally. Per reference (a) and the enclosures, “Classified Information shall not be declassified automatically as a result of any unauthorized disclosure of identical or similar information.” Despite the circumstances surrounding WIKILEAKS, we must continue to protect similar or identical information commensurate with the level of classification assigned per reference (b), until the information is assessed by the appropriate Original Classification Authority (DCA).

(U//FOUO) Asymmetric Warfare Group “Attack The Network” Counterinsurgency Methodology

This document continues discussion on effective targeting methods (lethal and non-lethal) at the Battalion and Brigade level. It continues dialogue on Attacking the Network by further describing Center of Gravity and Critical Vulnerability analysis themes and their link to network modeling. This document also discusses the use of detailed, Observable Indicators to focus Intelligence Surveillance and Reconnaissance assets against the enemy’s vulnerabilities. A modified Intelligence Synchronization Matrix (ISM) ensures integration and synchronization to the friendly course of action in a Counter-Insurgency environment. Using doctrinal and situational templates and a modified ISM helps the S2 understand the insurgent networks operating in his Area of Interest, focus assets against the known or suspected Critical Vulnerabilities, and synchronize ISR to give the commander the information he needs at the Decision Points.