U.S. Government Foreign Telecommunications Providers Network Security Agreements

A collection of Network Security Agreements (NSAs) entered into with foreign communications infrastructure providers ensuring U.S. government agencies the ability to access communications data when legally requested. The agreements range in date from 1999 to 2011 and involve a rotating group of government agencies including the Federal Bureau of Investigation (FBI), Department of Homeland Security (DHS), Department of Justice (DoJ), Department of Defense (DoD) and sometimes the Department of the Treasury. According to the Washington Post, the agreements require companies to maintain what amounts to an “internal corporate cell of American citizens with government clearances” ensuring that “when U.S. government agencies seek access to the massive amounts of data flowing through their networks, the companies have systems in place to provide it securely.”

(U//FOUO) DoD Instruction: Balanced Survivability Assessments (BSAs)

DoD-BSA

Multidisciplinary, integrated, performance-based, mission survivability assessments to identify and quantify vulnerabilities in systems, networks, architectures, infrastructures, and assets that support DoD MEFs, PMEFs, or the NEFs they support, to assess the mission impact if the vulnerabilities were successfully exploited, and to recommend measures to remediate or mitigate the vulnerabilities.

National Explosives Task Force Advisory: Fireworks as Improvised Explosive Device (IED) Components

NETF-Fireworks

Fireworks are a common component used in Improvised Explosive Devices (IEDs). The US Government is asking consumer fireworks retailers to be aware of this phenomenon and familiarize themselves with some possible indicators of suspicious activity. This list is not inclusive, nor is it intended to limit the lawful conduct of innocent persons. The totality of behavioral indicators and other relevant circumstances should be considered.

(U//FOUO) DHS-FBI Bulletin: Fireworks as Improvised Explosive Device (IED) Components

DHS-FBI-Fireworks

Recent incidents in the Homeland demonstrate that consumer fireworks—widely used during the upcoming 4 July 2013 celebrations—can be misused by criminals and violent extremists to construct improvised explosive devices (IEDs). Consumer fireworks are defined as devices that produce audible and visible effects by combustion, containing between 50-130 milligrams of explosive material. They are banned in Delaware, Massachusetts, New Jersey, and New York.

EU Parliament Study: Oversight of Security and Intelligence Agencies in the European Union

EU-IntelligenceOversight

This study evaluates the oversight of national security and intelligence agencies by parliaments and specialised non-parliamentary oversight bodies, with a view to identifying good practices that can inform the European Parliament’s approach to strengthening the oversight of Europol, Eurojust, Frontex and, to a lesser extent, Sitcen. The study puts forward a series of detailed recommendations (including in the field of access to classified information) that are formulated on the basis of in-depth assessments of: (1) the current functions and powers of these four bodies; (2) existing arrangements for the oversight of these bodies by the European Parliament, the Joint Supervisory Bodies and national parliaments; and (3) the legal and institutional frameworks for parliamentary and specialised oversight of security and intelligence agencies in EU Member States and other major democracies.

U.S. Navy 2012 Maryland Drone Crash Investigation Report

USNavy-Maryland-UAV-Crash

An investigation report concerning the crash of a RQ-4A Global Hawk unmanned aerial vehicle on June 11, 2012 during a training flight near the Naval Air Station Patuxent River in Maryland. The report concludes that the accident occurred due to ” mechanical malfunction of the right ruddervator actuator”. However, the pilot “failed to follow the proper emergency procedures” which “did not produce disastrous results in this particular event; however, future breaches of established procedures could produce a different outcome.”

Joint Publication 3-14 Space Operations

JCS-SpaceOps

This publication provides guidance for planning, executing, and assessing joint space operations. It provides space doctrine fundamentals for all joint forces; describes the military operational principles associated with support from, through, and operating in space; explains Joint Staff, combatant command (CCMD), United States Strategic Command (USSTRATCOM), and USSTRATCOM functional and Service component relationships and responsibilities; and establishes a framework for the employment of space forces and space capabilities.

(U//FOUO) DHS Protective Measures Guide for the U.S. Outdoor Venues Industry

DHS-OutdoorVenues

Within DHS, this overarching responsibility for critical infrastructure protection is delegated to the National Protection and Programs Directorate’s (NPPD) Office of Infrastructure Protection (IP), specifically the Sector-Specific Agency Executive Management Office (SSA EMO) CF Branch for commercial facilities. Serving as the Sector-Specific Agency (SSA) for the CF Sector, the CF Branch works with its partners to address and highlight low-cost preparedness and risk management options in the products and tools it makes available to the private sector. For example, the CF SSA has been working to produce a suite of protective measures guides that provide an overview of best practices and protective measures designed to assist owners and operators in planning and managing security at their facilities or events. The Protective Measures Guide for the U.S. Outdoor Venues Industry is one of these guides and reflects the special considerations and challenges posed by the Outdoor Venues Subsector.

(U//FOUO) Joint Chiefs of Staff Instruction: Military Information Support Operations (MISO)

CJCS-MISO

In accordance with (IAW) reference a, MISO replaces the term psychological operations (PSYOP). This instruction provides strategic direction for inclusion of MISO to support the full range of military operations including military engagement, security cooperation and deterrence; crisis response and limited contingency operations; major operations and campaigns; and as an integrated information activity within the DOD’s overall contribution to United States Government (USG) communication strategies.

(U//FOUO) DHS-FBI Bulletin: Use of the Internet for Attack Planning

DHS-FBI-InternetAttackPlanning

Malicious actors may leverage the Internet to gain information against a potential target to support pre-operational planning efforts for kinetic or cyber attacks. Malicious actors can use Internet search engines for information such as maps, company photographs or blueprints, and gain additional details from social media sites and Web blogs. Some actors may use more sophisticated techniques—such as phishing, spear phishing, or actual penetration of an organization’s network or devices—which can be used to gather personal, sensitive, or proprietary data.