A list of current, ongoing, and planned Department of Defense Science and Technology Strategic Communication (SC) programs taken from the 2009 Strategic Communication Science and Technology Plan compiled by the Defense Research and Engineering Rapid Reaction Technology Office.
In order to help ensure public safety and security and to detect, deter, and prevent potential terrorist activities, the New York City Police Department (NYPD) has developed a networked Domain Awareness System. The Domain Awareness System not only supplies critical supplemental assistance to officers’ ongoing security and public safety efforts, but also enhances the collaborative nature of those efforts by leveraging the resources of the private sector and other City agencies. Given the ongoing threat of terrorist attack, the Domain Awareness System is an important part of the NYPD’s integrated approach to providing protection for those who work in, live in, and visit New York City.
The Director of National Intelligence’s Open Source Center produced a report in June 2012 to help representatives of the U.S. government analyze and communicate with the Syrian people more effectively. The report, part of the Master Narratives series produced in conjunction with a private consulting firm called Monitor 360 and other “partners across the U.S. government”, is focused on “surfacing and articulating master narratives across a range of important geographies. These insights can be used to better understand critical audience segments and key influencers, build analytic capabilities, and develop actionable messaging and counter-messaging strategies.”
Understanding master narratives can be the difference between analytic anticipation and unwanted surprise, as well as the difference between communications successes and messaging gaffes. Master narratives are the historically grounded stories that reflect a community’s identity and experiences, or explain its hopes, aspirations, and concerns. These narratives help groups understand who they are and where they come from, and how to make sense of unfolding developments around them. As they do in all countries, effective communicators in Syria invoke master narratives in order to move audiences in a preferred direction. Syrian influencers rely on their native familiarity with these master narratives to use them effectively. This task is considerably more challenging for US communicators and analysts because they must place themselves in the mindset of foreign audiences who believe stories that — from an American vantage point — may appear surprising, conspiratorial, or even outlandish.
The following photos depict various pieces of art held in the CIA Museum at CIA Headquarters in Langley, Virginia. The museum’s collection, interestingly, seems to hold only one abstract art piece by artist Gene Davis who was known for paintings…
A formerly classified document from 1952 on the CIA’s Project BLUEBIRD, an offshoot of Project MKULTRA.
A report from the Senate Select Committee on Intelligence detailing an investigation into the CIA’s MKULTRA program, dated August 3, 1977
A CIA Inspector General report written in 1963 following an investigation into the Agency’s MKULTRA program.
This publication provides multi-Service TTP for the seamless integration of air assets during the conduct of maritime surface warfare. The maritime domain is defined as the oceans, seas, bays, estuaries, islands, coastal areas, and the airspace above these, including the littorals. AOMSW is intended to support the joint force commander’s (JFC’s) objectives by providing capabilities/forces in support of joint maritime operations. The end state of this publication is a streamlined support process for maritime surface warfare within the joint force maritime component commander’s (JFMCC’s) area of operations (AO).
James Eagan Holmes, a 24-year-old male, allegedly shot and killed12 people and wounded approximately 38 more after opening fire in a crowded movie theater during a showing of the new Batman movie, “The Dark Knight Rises.” The shooting erupted during the midnight showing at the multiplex in Aurora, Colorado, not far from Denver, where a large crowd had gathered, some dressed as characters from the highly anticipated Batman sequel. Holmes began the attack by throwing two gas canisters into the theater after entering through an exit door that had been propped open. Witnesses stated many assumed it was a promotional stunt related to the movie and did not initially react. After both canisters had deployed, Holmes commenced shooting into the crowd.
DHS Infrastructure Protection Note: Performance Venues – Indicators of Violence and Protective Measures
Performance venues include theaters, concert halls, auditoriums, and amphitheaters, ranging in size and function from small neighborhood movie theaters or community playhouses to high-capacity venues in major metropolitan areas. Performance venues are relatively open-access, limited egress facilities and have been successfully targeted in the past.
A collection of documents released publicly on July 11, 2012 in response to a Freedom of Information request from the Australian Department of the Prime Minister and Cabinet for material relating to WikiLeaks, Julian Assange and Bradley Manning.
U.S. Department of State Humanitarian Information Unit map from July 19, 2012 depicting locations and numbers of internally and externally displaced persons as a result of the current conflict in Syria.
(U//FOUO) FBI Counterfeit and Substandard Lithium Batteries Pose Serious Health Risks to Law Enforcement
The FBI assesses with high confidence, based on multiple incident reports from a collaborative source with direct access to the information, that counterfeit and substandard lithium batteries pose a serious health and safety risk to consumers, specifically law enforcement officers, emergency medical services providers, and military personnel who use these batteries extensively. The FBI has received numerous reports of such batteries, which are not manufactured with the safety mechanisms of legitimate US branded-batteries, spontaneously combusting while being used, transported, or stored, resulting in serious injuries to consumers and damage to tactical equipment and property.
For the last two fiscal years, the President’s Budget Submissions for the Department of Defense have included purchases of a significant amount of combat equipment, including armored vehicles, helicopters and even artillery, under an obscure section of the FY2008 National Defense Authorization Act (NDAA) for the purposes of “homeland defense missions, domestic emergency responses, and providing military support to civil authorities.” Items purchased under the section include combat vehicles, tanks, helicopters, artillery, mortar systems, missiles, small arms and communications equipment. Justifications for the budget items indicate that many of the purchases are part of routine resupply and maintenance, yet in each case the procurement is cited as being “necessary for use by the active and reserve components of the Armed Forces for homeland defense missions, domestic emergency responses, and providing military support to civil authorities” under section 1815 of the FY2008 NDAA.
Shadow banking, as one of the main sources of financial stability concerns, is the subject of much international debate. In broad terms, shadow banking refers to activities related to credit intermediation and liquidity and maturity transformation that take place outside the regulated banking system. This paper presents a first investigation of the size and the structure of shadow banking within the euro area, using the statistical data sources available to the ECB/Eurosystem.
The FSB has roughly estimated the size of the global shadow banking system at around € 46 trillion in 2010, having grown from € 21 trillion in 2002. This represents 25-30% of the total financial system and half the size of bank assets. In the United States, this proportion is even more significant, with an estimated figure of between 35% and 40%. However, according to the FSB estimates, the share of the assets of financial intermediaries other than banks located in Europe as a percentage of the global size of shadow banking system has strongly increased from 2005 to 2010, while the share of US located assets has decreased. On a global scale, the share of those assets held by European jurisdictions has increased from 10 to 13% for UK intermediaries, from 6 to 8% for NL intermediaries, from 4% to 5% for DE intermediaries and from 2% to 3% for ES intermediaries. FR and IT intermediaries maintained their previous shares in the global shadow banks assets of 6% and 2% respectively.
This manual is a compilation of tools to help all Soldiers collect information through surveillance, reconnaissance, patrolling, interacting with the local populace, tactical site exploitation, tactical questioning and detainee handling, briefing, debriefing, and reporting in offensive, defensive, stability operations, and civil support operations. Most of the text was developed specifically for patrols and to conduct traffic control points (TCPs) or roadblocks, and other missions where Soldiers will interact with the local populace including site exploitation and tactical questioning after a planned or hasty raid. The term “patrol” could reflect a platoon, section, fire team, or other special-purpose group given a mission as listed above.
The NSA has the capability to do individualized searches, similar to Google, for particular electronic communications in real time through such criteria as target addresses, locations, countries and phone numbers, as well as watch-listed names, keywords, and phrases in email. The NSA also has the capability to seize and store most electronic communications passing through its U.S. intercept centers. The wholesale collection of data allows the NSA to identify and analyze Entities or Communities of interest later in a static database. Based on my proximity to the PSP and my years of experience at the NSA, I can draw informed conclusions from the available facts. Those facts indicate that the NSA is doing both.
The Air Force Public Affairs Agency created this guide to help all Airmen safely and wisely use social media. This guide provides simple, easy-to-follow tips to help you use social media tools in your professional and personal life. This guide is for informational purposes only and does not replace official Air Force instructions.
SIGIR audits, inspections, and investigations have found serious weaknesses in the government’s controls over Iraq reconstruction funds that put billions of American taxpayer dollars at risk of waste and misappropriation. The precise amount lost to fraud and waste can never be known, but SIGIR believes it is significant. As of June 30, 2012, SIGIR audit reports had questioned $635.8 million in costs, and SIGIR Investigations, working with other agencies, had resulted in $176.84 million in fines, forfeitures, and other monetary results.
Telecommunications interception reform recognises that there are significant challenges facing intelligence and law enforcement agencies in accessing communications, particularly in keeping pace with rapid changes in the telecommunications environment. New, emerging and future technologies impact on the ability of these agencies to access communications to collect intelligence and effectively detect and prosecute crimes. The Australian Crime Commission’s Future of Organised Criminality in Australia 2020 assessment reveals that access to highly effective software, ciphers and other methodologies are increasingly being utilised by organised crime to impede detection by law enforcement. Lawful interception, therefore, is the most important tool in the investigation and prosecution of serious and organised and other technology‐enabled crime, and is vital to effectively collect security intelligence. Proposed reforms seek to allow those agencies to utilise modern technologies to maintain effective investigative techniques.
A presentation from Victoria Sheckler, Deputy General Counsel of the Recording Industry Association of America, was presented at an International Federation of the Phonographic Industry meeting in Panama in April 2012. It contains information on an upcoming effort by internet service providers to police their users’ sharing of copyrighted material called the Copyright Alert System. The presentation also discusses other voluntary measures such as agreements by payment processors to stop doing business with sites that are “repeat offenders” and efforts to encourage domain name registrars to enforce stricter “whois” policies.
The TEPCO Fukushima Nuclear Power Plant accident was the result of collusion between the government, the regulators and TEPCO, and the lack of governance by said parties. They effectively betrayed the nation’s right to be safe from nuclear accidents. Therefore, we conclude that the accident was clearly “manmade.” We believe that the root causes were the organizational and regulatory systems that supported faulty rationales for decisions and actions, rather than issues relating to the competency of any specific individual.
On May 9, 2012 the California Department of Forestry and Fire Protection (CAL FIRE) conducted a practical evaluation of the Ember Bomb incendiary device as described in the ninth issue of lnspre, a magazine published by al-Qa’ida in the Arabian Peninsula (AQAP).