January 9, 2012 in U.S. Marine Corps
In certain parts of the US government, when an operation has unintended negative second or third-order consequences, they are called “blowback.” The radical Islamic movements in the Pashtun areas today were always present, but putting them on steroids in the 1980′s was pretty short-sighted by any reasonable accounting — a classic case of “blowback.” During the Soviet-Afghan war, the Pakistanis had their own agenda. The Pakistani Army’s intelligence branch, called the Inter-Services Intelligence Directorate, or ISI, became extremely powerful by cooperating with the United States and the government of Saudi Arabia to channel roughly $7.2 billion dollars worth of covert foreign military aid to their preferred Mujahideen clients. To control the Mujahideen, the ISI formed seven resistance groups, each with a notional political party associated with it. These became known as “the Peshawar Seven.” CIA oversight of the covert money was weak, and much of it went into ISI’s pockets.
January 9, 2012 in Germany
A report and presentation compiled by researchers at the Max Planck Institute for Foreign and International Criminal Law regarding controversial police powers recently introduced in the German state of Brandenburg including automated license plate searches, mobile phone localization and access to telecommunications data.
January 8, 2012 in Department of Defense
A script produced by the military for the Article 32 hearing of PFC Bradley Manning was released as part of a public court filing and was first reported on by Politico.
January 8, 2012 in U.S. Marine Corps
The focus of Marine Corps Martial Arts Program (MCMAP) is the personal development of each Marine in a team framework using a standardized, trainable, and sustainable close combat fighting system. As a weapon-based system, all techniques are integrated with equipment, physical challenges, and tactics found on the modern battlefield. The MCMAP is designed to increase the warfighting capabilities of individual Marines and units, enhance Marines’ self-confidence and esprit de corps, and foster the warrior ethos in all Marines. The MCMAP is a weapon-based system rooted in the credo that every Marine is a rifleman and will engage the aggressor from 500 meters to close quarter combat.
January 5, 2012 in Intelligence Fusion Centers, Maryland
During several recent contacts with criminal gang members, an identified Maryland law enforcement agency has heard their radio transmissions broadcast over a suspect’s smartphone. In one incident, officers pursuing a suspect on foot overheard the suspect listening to the pursuing officers’ radio transmission over a smartphone. The radio broadcasts of the agency’s primary secure law enforcement channel had an approximate delay of three seconds on the suspect’s smartphone. Further investigation revealed that the general public, as well as criminal gang members and associates, are utilizing the website www.radioreference.com to listen to law enforcement secure channels streaming via the Internet. Registration and access to the site is free, with advanced features available to premium subscribers. A customer is able to search radio frequencies throughout the country by state, metro area, city and/or zip code. The website advertises a search for trunked frequencies as well. The frequencies are obtained over the Internet and any cell phone that has web access can listen in.
January 3, 2012 in Corporate
The text of an email sent on January 1, 2012 by a senior member of Scientology’s Sea Org named Debbie Cook. The email was published on the website of the Village Voice, then was removed at the request of Ms. Cook. The email discusses Cook’s problems with the direction that the Church of Scientology has recently taken, including what she perceives an obsessive emphasis on fundraising and a more than $1 billion dollar unused cash reserve. Cook confirmed the email’s authenticity via Facebook.
January 3, 2012 in U.S. Army
This report is an executive summary of interviews conducted by CALL in support of the JCOA comprehensive Study Plan covering CIVCAS. Topics included CIVCAS incidents, pre-deployment training, planning, mitigation efforts and best practices from key leaders with recent operational experience in Afghanistan and Iraq.
January 3, 2012 in Afghanistan, U.S. Marine Corps
U.S. Marine Corps Intelligence Activity Micro Mission Guide for Afghanistan published in October 2008.
January 2, 2012 in United States
A manual attached to an email from the latest AntiSec release which has no listed author and little indications as to its source. The introduction states that information in the document “was collected and interpreted by multiple agencies” and the manual is intended for use only by “public safety agencies”. However, a 2003 article from a local newspaper in Colorado indicates that the manual was produced by an unknown U.S. Government agency and is used by Joint Terrorism Task Forces to teach local police about “criminal protest tactics”. According to an email in the most recent AntiSec release, the manual is still being circulated today in relation to police confrontations with Occupy protests.
January 2, 2012 in Department of Homeland Security, Federal Bureau of Investigation
This Joint Intelligence Bulletin provides law enforcement, public, and private sector safety officials with an evaluation of potential terrorist threats during the 2011 US holiday season, extending from Thanksgiving through New Year’s Day. This information is provided to support the activities of DHS and FBI and to assist federal, state, local, tribal and territorial government counterterrorism and first responder officials in deterring, preventing, preempting, or responding to terrorist attacks within the United States.
January 1, 2012 in U.S. Army
U.S. Army instructional presentation from 2008 on the history and major sects within Islam.
December 30, 2011 in U.S. Army
To effectively defeat an enemy, one must first understand the enemy. Intelligence professionals have forgotten the basic principles on which intelligence analysis is conducted, instead they sub-scribe to the paradigm that the enemy faced in this Global War on Terror has no structure or doctrine. Any organization, military or civilian, must have a structure and a way of doing business if they are to have any chance of being successful.
December 29, 2011 in Department of Defense
The Kill Box MTTP reinforces kill boxes as three-dimensional areas used to facilitate the integration of joint fires while also being a permissive fire support coordination measure (FSCM) in accordance with JP 3-09, Joint Fire Support. The publication offers a detailed explanation of kill box employment and provides information to effectively organize, plan, and execute kill box procedures.
December 28, 2011 in United States
A man-portable non-lethal pressure shield provides both a physical as well as pressure shield. The pressure shield addresses the concerns of military, police and human rights organizations and international law as regards effectiveness, efficiency and safety and efficiency. A folded acoustic horn is incorporated into the physical shell of the shield. The horn couples acoustic pulses from a sonic pulse generator to an acoustic aperture to output a pulsed pressure beam that approximates a plane wave to produce a pressure barrier. The operator may specify a desired effect on its human target that is maintained as range-to-target changes or a desired effect at a specified perimeter range. The shields may be networked to facilitate coordinated action among multiple pressure shields as a force multiplier or to provide a more sophisticated pressure barrier.
December 27, 2011 in Department of Defense
The purpose of the NLW Reference Book is to provide a single source document that contains key information about NLW descriptions, effects, characteristics, concepts of employment, and associated operational parameters and considerations to enhance NLW education and training.
December 23, 2011 in Multi-National Corps Iraq, U.S. Marine Corps
Multi-National Forces West Biometric Automated Toolset (BAT) Handheld Interagency Identity Detection Equipment (HIIDE) SOP and TTP from June 2007.
December 22, 2011 in Afghanistan, U.S. Army
The Smart Book contains information designed to enhance Soldier’s knowledge of Afghanistan, including history, politics, country data and statistics, and the military operational environment. The Smart Book concludes with an overview of the culture of Afghanistan including religion, identity, behavior, communication and negotiation techniques, an overview of ethnic groups, a regional breakdown outlining each province, a language guide, and cultural proverbs, expressions and superstitions.
December 21, 2011 in U.S. Army
This guide assists in three areas. First, it aides military leaders and all personnel to be aware of the indicators associated with insider threat activity while serving in a partnering environment. Second, this guide informs commanders and other leaders by giving them options on how to deal with insider threat activities. This guide is not all encompassing so there are other options a commander has dependent on their operating environment. Lastly, this guide is meant to generate open dialogue between coalition partners and partner nation personnel. Partnering in itself is a sensitive mission and only by creating trust and having an open dialogue with all forces will the mission be accomplished.
December 20, 2011 in Iraq, Joint Chiefs of Staff
As the U. S. Defense Department scales back operations in Iraq, one of the most significant questions that remains is whether the Iraqi security forces will be capable of maintaining civil order on their own. This manual was produced by the Joint Center for International Security Force Assistance (JCISFA) to help prepare deploying advisors, trainers, and partner forces that will work directly with Iraqi police. The intent is to provide a basic understanding of the country of Iraq and a solid understanding of the current organization and utilization of the Iraqi police. This manual also provides guidance on what it means to work ” by, with and through” a counterpart, and includes observations and insights learned by your predecessors.
December 20, 2011 in Afghanistan, U.S. Army
U.S. Army report on “Taliban Top 5 Most Deadly Tactics Techniques and Procedures” from June 2010.
December 18, 2011 in California, Intelligence Fusion Centers
US citizens and assets – including the White House, the Central Intelligence Agency, InfraGard, the state of Arizona, and major defense contracting companies – experienced high-profile cyber threats and attacks in the first half of 2011. Most of the tactics and techniques used were not new, however the increase in attacks during the past few months exemplifies the growth of cyber incursions and reinforces the need to be aware of risks and mitigation techniques associated with cyber threats.
December 18, 2011 in Federal Bureau of Investigation
The FBI assesses with high confidence a that law enforcement personnel and hacking victims are at risk for identity theft and harassment through a cyber technique called “doxing.” “Doxing” is a common practice among hackers in which a hacker will publicly release identifying information including full name, date of birth, address, and pictures typically retrieved from the social networking site profiles of a targeted individual.
December 17, 2011 in U.S. Marine Corps
To inform Deputy Commandants (DCs) Aviation, Combat Development and Integration (CD&I), Plans, Policies, and Operations (PP&O), Installations and Logistics (I&L), Commanding General (CG), Training and Education Command (TECOM), Director of Intelligence, operating forces, and others on results of a Marine Corps Center for Lessons Learned (MCCLL) collection conducted April – May 2011 to document lessons and observations regarding unmanned aerial systems (UAS) operations in support of Regional Command Southwest (RC (SW)) during Operation Enduring Freedom (OEF).
December 15, 2011 in U.S. Army
U.S. Army TRISA handbook on “Political Groups in Afghanistan” from December 2009.
December 15, 2011 in Corporate
Mobile device users may be tracked either via mobile-signal triangulation or via Global Positioning Satellite information. A mobile device user’s recent movements may be analyzed to determine trails or traffic patterns for device user among various locations. Mobile device trail information, either for an individual user or aggregated for multiple users, may be analyzed to determine a next destination for the user. Electronic advertising content, such as advertisements, coupons and/or other communications, associated with the next destination may be sent to an electronic device likely to be viewed by the mobile device user. Additionally, the identity of the mobile device user may be known and the advertisements or coupons may be tailored according to demographic information regarding the mobile device user. In addition, destinations may be recommended to mobile device users based on the recent locations the users have visited.