This manual contains information on administrative and operational procedures for all Navy and Marine Corps units providing air traffic control services and applies on a worldwide basis. Marine forces tactical air traffic control is provided by Marine Air Traffic Control Detachments (MATCD). Each MATCD is organized and equipped to provide continuous all-weather air traffic control services to an independent and geographically separated main air base or air facility and/or remote air sites or points. These services include airport traffic control, low approach and landing, and terminal area control services. To the extent possible and consistent with the ATC requirements of the area to which deployed, the functions, training, qualification, and certification for Marine forces tactical ATC units shall be as prescribed in this manual.
U.S. Navy Pacific Northwest Training Range Complex Manual, July 12, 2010. This manual contains a comprehensive listing of all PACNORWEST TRCM OPAREAs. Chapters 2 through 7 include detailed descriptions of these areas.
This guide is designed to assist in making you and your family less vulnerable to terrorists. You should review its contents and incorporate protective measures applicable to your particular situation. It is important that you ensure all members of your family are made aware ofthis valuable information so they not only protect themselves, but also become an integral part of the overall community force protection effort. Terrorists generate fear through intimidation, coercion, and acts of violence such as bombings, hijackings, or kidnappings. As recent events have shown, terrorists have reached new levels of organization, sophistication, and violence, often targeting members of the Department of Defense and their families. Their tactics and techniques are also continually changing and will continue to be a challenge to predict and neutralize. Accordingly, we must remain vigilant.
In the asymmetrical threat climate of the 21st century, stability and support operations (SASO) are often conducted from a companylevel firm base (FB). These company and platoon size units need immediate, on-scene intelligence support to deal with an enemy that can recruit, rest, and resupply amongst the population in a predominately urban environment. This requires an intense collection and analysis effort by even the smallest unit. And, because of the noncontiguous nature of SASO, it is unrealistic to expect that higher echelon staffs will consistently be available to support them. Therefore, Marines in small units must establish and maintain a limited, but effective, capability for themselves.
U.S. Army Company Intelligence Support Team (COIST) Development, December 3, 2007.
The purpose of the Agreement is to set forth terms by which DHS and DoD will provide personnel, equipment, and facilities in order to increase interdepartmental collaboration in strategic planning for the Nation’s cybersecurity, mutual support for cybersecurity capabilities development, and synchronization of current operational cybersecurity mission activities. Implementing this Agreement will focus national cybersecurity efforts, increasing the overall capacity and capability of both DHS’s homeland security and DoD’s national security missions, while providing integral protection for privacy, civil rights, and civil liberties.
The information found on the website “WIKILEAKS” is classified information that was transmitted to that public domain site illegally. Per reference (a) and the enclosures, “Classified Information shall not be declassified automatically as a result of any unauthorized disclosure of identical or similar information.” Despite the circumstances surrounding WIKILEAKS, we must continue to protect similar or identical information commensurate with the level of classification assigned per reference (b), until the information is assessed by the appropriate Original Classification Authority (DCA).
The overall objective of the this task was to architect and implement a capability that will enable automated parsing, normalization, extraction, aggregation, filtering and then detection of attack patterns based on log and log like data in near real time depending on local network settings. We call this the Audit Data Extraction Utility (ADEU).
This document continues discussion on effective targeting methods (lethal and non-lethal) at the Battalion and Brigade level. It continues dialogue on Attacking the Network by further describing Center of Gravity and Critical Vulnerability analysis themes and their link to network modeling. This document also discusses the use of detailed, Observable Indicators to focus Intelligence Surveillance and Reconnaissance assets against the enemy’s vulnerabilities. A modified Intelligence Synchronization Matrix (ISM) ensures integration and synchronization to the friendly course of action in a Counter-Insurgency environment. Using doctrinal and situational templates and a modified ISM helps the S2 understand the insurgent networks operating in his Area of Interest, focus assets against the known or suspected Critical Vulnerabilities, and synchronize ISR to give the commander the information he needs at the Decision Points.
THE PURPOSE OF THIS EXORD IS TO DELEGATE LIMITED APPROVAL AUTHORITY TO SUPPORTED COMBATANT COMMANDERS, WHO HAVE DSCA RESPONSIBILITIES, FOR ROUTINE PA REQUESTS FOR ASSISTANCE (RFA), INCLUDING THE TYPES OF RFA HISTORICALLY SUBMITTED BY PA, TO PROVIDE A RAPID AND FLEXIBLE DOD RESPONSE TO FEDERAL PRIMARY AGENCIES FOR POTENTIAL OR ACTUAL EMERGENCIES AND OR DISASTERS WITHIN THE UNITED STATES, ITS TERRITORIES, POSSESSIONS, AND PROTECTORATES.
The most legally sensitive function in DSCA is Military Law Enforcement. Consequently, to prevent violations of the law, all military personnel should be educated on MLE. The main legal obstacle to the use of the military for law enforcement is the Posse Comitatus Act (PCA), discussed briefly in Section 2.3.1 of this chapter. (For more detail on PCA, see Annex A.) The PCA affects National Guard (either in State Active Duty (SAD) or Title 32) and federal forces (Title 10) differently. Thus, it is very important to understand the status of military personnel prior to mission assignment.
This short book provides an up-to-date introduction to the tactics employed by insurgents in southern Afghanistan during the years 2005-2008. It includes vignettes and maps on 19 different tactically significant engagements. The book covers three types of attacks: ambushes, attacks on fixed positions, and defensive engagements. The intended audience is Marines and soldiers going into theatre.
The HIIDE includes two separate cameras for imaging an individual’s irises and face, and a sensor pad for scanning fingerprints. These three sensors capture the minute details of a subject’s iris, fingerprint and face, as digital photographs, or “scans.” The HIIDE™ translates the photographic data into a binary code and links that code to biographic data about the individual, such as name and a personal identification number. The HIIDE then processes the code and biographic data and builds a portfolio for the individual that is stored in a database. Once an individual has had a record created, or has been “enrolled,” that individual is part of the HIIDE database. One can “recognize,” or confirm that individual’s identity in the future by comparing a live scan of the subjects: iris, fingerprints and/or face to the biometrics contained in the database.
This document presents the results of the Functional Needs Analysis/Functional Solutions Analysis (FNA/FSA) for the functional area of chemical, biological, radiological, and nuclear defense (CBRND). The FNA/FSA are structured in accordance with the Chairman of the Joint Chief of Staff Instruction (CJCSI) 3170.01D, Joint Capabilities Integration and Development System (JCIDS), and its companion manual, CJCSM 3170.01A, Operation of the Joint Capabilities Integration and Development System.
This roadmap will be the vehicle for prioritizing, aligning, and synchronizing Service JBMC2 architectural and acquisition efforts. Where policy and other acquisition initiatives are defined to drive JBMC2 developments and related activities, the specific means of application to JBMC2 will be via updates to this roadmap and decisions made by the Under Secretary of Defense for Acquisition, Technology, and Logistics (USD(AT&L)) and U.S. Joint Forces Command (USJFCOM) to ensure overall harmonization across affected efforts and programs. This roadmap provides a strategy with three major parts for integrating current and planned JBMC2 capabilities.
Central to the transformation of U.S. Forces are development and fielding of integrated Joint Battle Management Command and Control (JBMC2) capabilities to enable U.S. forces to collaboratively plan and rapidly share an accurate picture of the battlespace. This roadmap provides an overview of JBMC2 capability and Global Information Grid (GIG) development efforts in the Department of Defense. It is intended to assist policymakers and decisionmakers in aligning and integrating Service and Combatant Command doctrine, concept development and acquisition efforts. The goal of this roadmap is to provide a coherent and executable plan for fielding integrated JBMC2 capabilities to U.S. Forces.
FOUO CENTCOM Engineering Contingency Construction Overview, August 2010.
This manual is a single source of LSO information for LSOs, unit commanders, and air crewmembers that contains descriptions of visual landing aids, command relationships, a compendium of LSO-related policies and responsibilities, pilot and LSO training requirements and qualifications, descriptions of visual landing aids, and LSO procedures for recovering fixed-wing non-V/STOL aircraft aboard CV and CVN-class ships.
This manual issues policy, guidance and information for CV and CV/N commanding officers, air officers, airoperations officers, air wing commanders, squadron commanding officers, aircraft detachment Officers-In-Charge, and aircrews aboard CV/N class ships. The information presented herein includes relationships, responsibilities, training requirements, and selected normal and emergency procedures for conducting flight operations on and in the vicinity of the CV/N.
OPERATIONS IN AFGHANISTAN REQUIRE ARMED CONTRACTORS (ACS) AND PRIVATE SECURITY COMPANIES (PSCS) TO FULFILL A VARIETY OF IMPORTANT SECURITY FUNCTIONS FOR THE DEPARTMENT OF DEFENSE, DEPARTMENT OF STATE, AND OTHER ENTITIES OPERATING IN THE COMBINED JOINT OPERATIONS AREA – AFGHANISTAN (CJOA-A). INCLUDED IN THESE ARMED CONTRACTORS AND PRIVATE SECURITY COMPANIES ARE TRADITIONAL PRIVATE SECURITY COMPANIES, THE AFGHAN SECURITY GUARDS AND DOD CONTRACTORS WHO ARE ARMED FOR PERSONAL PROTECTION. TRADITIONAL PSC’S PERFORM CONVOY ESCORT, STATIC SECURITY AND PERSONAL SECURITY DETAILS. AFGHAN SECURITY GUARDS (ASG’S) PROVIDE LOCAL STATIC SECURITY TO FOB’S, COP’S AND OTHER INFRASTRUCTURE WITH LOCAL AFGHAN COMPANIES. DOD CONTRACTORS MAY BE ARMED EITHER AS A FUNCTION THE SERVICE THEY PROVIDE OR THEIR OPERATING LOCATION. THESE AC/PSC’S ARE NOT COMBATANTS; THEY EXECUTE SERVICES TO PROTECT PERSONNEL, SUPPLIES AND EQUIPMENT AND FIXED FACILITIES. WEAPONS EMPLOYED BY AC/PSCS ARE FOR PURELY DEFENSIVE PURPOSES ONLY.
This guide provides Air Force Public Affairs professionals with basic social media knowledge needed to maneuver in the online information space and the basic-level tactics explained here should be used to compliment the traditional forms of Public Affairs, to include internal communication, community relations and media relations.
(U//FOUO) Terrorists typically favor basic tactics, techniques, and procedures (TTP), off-the-shelf technology and readily available resources when planning and carrying out an attack. While simplistic in effort, these factors can be a lethal and destructive combination. Terrorists also continue to explore innovative attack options that take advantage of overlooked vulnerabilities inherent to the civilian sector. One such vulnerability is transporting bulk quantities of ammonium nitrate (AN) via the road, rail and waterway network. Using a region’s bulk AN transportation network to attack critical infrastructure and urban centers would arguably qualify as a high probability — high casualty/destruction threat scenario.
(U/FOUO) 1. ALL ARMY ACTIVITIES ARE DIRECTED TO IMMEDIATELY REVIEW AND REVALIDATE WHO HAS SYSTEM ADMINISTRATOR(SA)/POWER USER PRIVILEGES. IN ACCORDANCE WITH (IAW) REF A, THESE PERSONNEL SHALL BE GRANTED THE MINIMUM SET OF PRIVILEGES REQUIRED TO PERFORM THEIR JOBS AND NOTHING MORE. ALL ACTIVITIES MUST ENSURE THAT THEY HAVE IDENTIFIED THESE PERSONNEL AND THAT NO OTHER PERSONNEL HAVE THESE PRIVILEGES. THIS IS KEY TO PRECLUDING UNAUTHORIZED DOWNLOADING AND DISSEMINATION OF SOFTWARE AND INFORMATION.
ARMY PERSONNEL MUST BE VIGILANT WITH REGARD TO THE INFORMATION POSTED ON THE WIKILEAKS WEBSITE AND ANY OTHER WEBSITE THAT PURPORTS TO PUBLISH CLASSIFIED INFORMATION. VIEWING, DOWNLOADING OR PRINTING INFORMATION FROM THE WEBSITE COULD POTENTIALLY EXPOSE ARMY NETWORKS TO SENSITIVE DATA OR CREATE SITUATIONS IN WHICH DATA IS IMPROPERLY SAFEGUARDED THUS HARMING OUR ABILITY TO CONDUCT MISSIONS VITAL TO OUR NATIONAL DEFENSE. INFORMATION MARKED AS CLASSIFIED BUT IN THE PUBLIC DOMAIN IS NOT CONSIDERED DECLASSIFIED UNTIL ASSESSED BY THE APPROPRIATE ORIGINAL CLASSIFICATION AUTHORITY AND A DETERMINATION ON ITS DISPOSITION AND CONTINUED CLASSIFICATION IS RENDERED.
The basic concept of the AEF we use today was born of necessity after years of rotations between Operations Northern Watch and Southern Watch. High operations tempo (OPSTEMPO) forced us to update our Air Force-wide system of organizing, scheduling and presenting our forces to combatant commanders (CCDRs). Launched in 1998 by Gen Mike Ryan, CSAF, Cycle 1 of the AEF was 15 months long and included approximately 60,000 Airmen. Today the AEF operates on a 24-month schedule and includes over 300,000 Airmen. It remains fl exible to accommodate CCDR’s needs, whether for 4 months, 6 months, or 365 days.