United States

(U//FOUO) Synchronized Predeployment & Operational Tracker Government Organization User Workbook

The Department of Defense (DoD) has implemented the Synchronized Predeployment & Operational Tracker (SPOT) as the single source to track deployed personnel supporting DoD military operations worldwide. SPOT is a scalable, net-centric, Web-based application that provides the capability to maintain accountability and report status for deployed personnel across the military, civilian, and contractor communities.

U.S. Army Improvised Explosive Device Effects Simulator (IEDES) Program

The IED Effects Simulator (IEDES) kit is a Training Aids Device that will assist the Army in training the joint and individual service on operational support tasks, conditions, and standards needed to achieve U.S. Military IED objectives. The IEDES is configured to simulate a Small, Medium, Large, and Extra Large explosive signature. The IEDES is designed to train key tasks of Explosive Hazards (EHs) defeat, to predict, prevent, detect, classify, neutralize, mark, report and record EH and to protect personnel, equipment and facilities from EH effects.

FBI Bulletin: Prison Gangs Learn Arabic for Secret Codes

(U//LES) Recent law enforcement reporting indicates that Black Guerilla Family (BGF) members are using language training manuals to learn Arabic at Pelican Bay State Prison in Crescent City, California. Both corrections officers and FBI cryptanalysts believe this will lead to inmates using Arabic to create secret codes to communicate. This raises safety concerns for law enforcement officials who may come in contact with BGF associates using Arabic to conceal criminal activity.

(U//FOUO) U.S. Forces – Iraq Money as a Weapons System (MAAWS) SOP March 2010

OIF is a dynamic, full spectrum operation encompassing both kinetic and non-kinetic operations and is arguably the most complex and challenging fiscal environment in our nation’s history. The dollar amounts spent supporting or are substantial and represent the treasure of our nation. Leaders must know what funding resources are available and how to best apply them in order to gain the maximum operational effectiveness. This “Money as a Weapons System” (MAAWS) SOP is published to educate and advise you on how to financially resource operations here in Iraq. It will serve as a financial road map to assist you in navigating the myriad of funding challenges and issues that will arise during your time in Iraq.. recommend you keep a copy readily available, and ensure the appropriate leadership in your organizations has access to a copy as necessary.

Human Terrain Team Handbook

Human Terrain Teams (HTTs) are five- to nine-person teams deployed by the Human Terrain System (HTS) to support field commanders by filling their cultural knowledge gap in the current operating environment and providing cultural interpretations of events occurring within their area of operations. The team is composed of individuals with social science and operational ackgrounds that are deployed with tactical and operational military units to assist in bringing knowledge about the local population into a coherent analytic framework and build relationships with the local power-brokers in order to provide advice and opportunities to Commanders and staffs in the field.

USDA Information Technology Services (ITS) Security Policy Manual

This policy manual establishes policy for the management and administration of information technologies for the United States Department of Agriculture (USDA) Office of the Chief Information Officer (OCIO), Information Technology Services (ITS) that supports the Farm Service Agency (FSA), Natural Resources Conservation Service (NRCS), and Rural Development (RD) including Large Offices (Beltsville, Fort Collins, Fort Worth, Kansas City, Lincoln, Portland, Salt Lake, St. Louis, and Washington D.C. — hereafter referred to as “Large Offices”) and Service Centers (including State, District, Area, County, and Local Field Service Offices — hereafter referred to as “Field Offices”), and their partners.

California Disguised Weapons Handbook

The mission of the California Department of Justice, Division of Law Enforcement, is to provide its customers and clients extraordinary service in forensic services, forensic education, narcotic investigations, criminal investigations, intelligence, and training. In support of this mission, the Division’s Criminal Intelligence Bureau’s (CIB) Organized Crime Analysis Unit conducted an in-depth intelligence-gathering and examination effort into law enforcement safety handbook.

Terrorist Identities Datamart Environment

The Terrorist Identities Datamart Environment (TIDE) is the US Government’s (USG) central repository of information on international terrorist identities as established by the Intelligence Reform and Terrorism Prevention Act of 2004. TIDE supports the USG’s various terrorist screening systems or “watchlists” and the US Intelligence Community’s overall counterterrorism mission. The Terrorist Identities Group (TIG), located in the National Counterterrorism Center’s Information Sharing & Knowledge Development Directorate (ISKD), is responsible for building and maintaining TIDE.

(U//FOUO) U.S. Marine Corps Information Operations April 2010

Information Operations (BOTTOM LINE)

•IT IS NOT:
–All about technology
–Focused on individual capabilities, i.e., PYSOP, EW, CNO, etc
–Strategic Communication
–Public Affairs

•IT IS:
–All about influencing key decision makers and populations through operations within and affecting the information environment
–The art of integrating lethal and non-lethal capabilities to affect the information environment (supports combat operations)
–Employed across the spectrum of conflict and throughout every phase (0-5) of operations
–Consistent with strategic communication goals and synchronized with public affairs

(U//FOUO) FBI VoIP Server Intrusions in North Carolina Banks and Businesses

(U//FOUO) This SIR has been produced in an effort to alert federal, state, and local law enforcement agencies of criminal activity with a nexus to North Carolina. The Charlotte Division has observed two similar occurrences of compromised Voice over Internet Protocol (VoIP) servers used to facilitate vishing attacks. Vishing attacks, a deviation from the term phishing attacks, use voice and text messages rather than email in attempts to trick victims into providing personal and financial account information.

Effects of Subsea Processing on Deepwater Environments in the Gulf of Mexico

Oil and gas exploration and development is extending into deeper water in the Gulf of Mexico. The current record is 3,051 m (10,011 ft) in Chevron’s Toledo prospect in the Alaminos Canyon Block 951 in the Gulf of Mexico. This report was prepared to support the Minerals Management Service (MMS) regulatory decisions for oil and gas leasing. Given the recent development of subsea technologies, it is not surprising that very little information is readily available on the potential environmental effects. This report represents the compilation and synthesis of existing published and unpublished literature on the environmental effects of subsea operations on the deepwater environment. Technical experts from the oil and gas industry, regulatory agencies, and academic institutions were also consulted to identify potential environmental issues.