Australia National Security Lawful Interception Legislation Discussion Paper

Telecommunications interception reform recognises that there are significant challenges facing intelligence and law enforcement agencies in accessing communications, particularly in keeping pace with rapid changes in the telecommunications environment. New, emerging and future technologies impact on the ability of these agencies to access communications to collect intelligence and effectively detect and prosecute crimes. The Australian Crime Commission’s Future of Organised Criminality in Australia 2020 assessment reveals that access to highly effective software, ciphers and other methodologies are increasingly being utilised by organised crime to impede detection by law enforcement. Lawful interception, therefore, is the most important tool in the investigation and prosecution of serious and organised and other technology‐enabled crime, and is vital to effectively collect security intelligence. Proposed reforms seek to allow those agencies to utilise modern technologies to maintain effective investigative techniques.

RIAA Presentation: Copyright Alert System and Voluntary Initiatives to Combat Piracy

A presentation from Victoria Sheckler, Deputy General Counsel of the Recording Industry Association of America, was presented at an International Federation of the Phonographic Industry meeting in Panama in April 2012. It contains information on an upcoming effort by internet service providers to police their users’ sharing of copyrighted material called the Copyright Alert System. The presentation also discusses other voluntary measures such as agreements by payment processors to stop doing business with sites that are “repeat offenders” and efforts to encourage domain name registrars to enforce stricter “whois” policies.

Fukushima Nuclear Accident Independent Investigation Commission Official Report

The TEPCO Fukushima Nuclear Power Plant accident was the result of collusion between the government, the regulators and TEPCO, and the lack of governance by said parties. They effectively betrayed the nation’s right to be safe from nuclear accidents. Therefore, we conclude that the accident was clearly “manmade.” We believe that the root causes were the organizational and regulatory systems that supported faulty rationales for decisions and actions, rather than issues relating to the competency of any specific individual.

(U//FOUO) New Jersey Fusion Center: Attack on Afghan Resort Demonstrates Vulnerability of Hotels

A recent terrorist attack on a resort hotel in Afghanistan demonstrates the vulnerability of hotels and other “soft” targets to these types of assaults. On June 22, 2012, Afghan forces retook a lakeside hotel outside of Kabul from a Taliban suicide assault team that was holding dozens of civilian hostages. The Taliban claimed credit for the attack, calling the hotel and others near it a “hub of obscenity and vulgarity.”

DHS-University of Maryland Study: Profiles of Perpetrators of Terrorism – United States (PPT-US)

The objective of this project is to create and manage a comprehensive dataset of groups and movements that have used terrorist tactics within the United States – at some point between 1970 and 2007 – to achieve political, religious, social or economic goals. These data will be integrated into the Terrorist and Extremist Violence in the United States (TEVUS) database in the near future as part of the larger Integrating U.S. Security Databases (IUSSD) project.

U.S. Northern Command Homeland Defense/Civil Support Capabilities Assessment Study Plan

This Study Plan outlines the background, scope, strategic assumptions, study objectives, analysis methodology, scenario considerations, timeline, and management responsibilities in conducting the Homeland Defense and Civil Support Capabilities-based Assessment (HD/CS CBA) to include production of the Functional Area Analysis (FAA), Functional Needs Analysis (FNA) and a Joint Capabilities Document (JCD). This CBA, through the execution of the FAA, FNA. And JCD; identifies, describes, documents, and prioritizes DOD’s capability gaps and excesses in the HD/CS mission areas (to include the Mission Assurance (MA) function).

U.S. Army Military Police School Enemy Prisoner of War and Civilian Internee Policy and Operations Courses

As a military police supervisor, you may become involved with EPW/CI operations in a variety of ways. The Army Military Police have the primary responsibility for EPW/CI operations for the Department of Defense. In any form of hostilities in which the United States is involved, persons that are captured or surrender who cannot be readily classified will be treated as EPW/CI until such time as they are reclassified by competent authority. This includes low intensity conflicts, as well as declared wars. In some cases, you may find yourself as an advisor to other countries. You will be expected to encourage those whom you are advising to afford the same treatment to their prisoners.

U.S. Army Military Police School Detainee Policy, Procedures, and Operations Course

This lesson describes detainees captured or detained by the US Armed Forces and provides key definitions. These definitions explain the different personnel categories that a Military Police (MP) commander may be required to handle, protect, account for, and ensure are treated according to established laws, regulations, and international agreements. For the purpose of this lesson, the broader use of the word “detainee” applies to Enemy Prisoners of War (EPWs), Civilian Internees (CIs), Retained Persons (RPs), and other classification terms for US-controlled persons unless otherwise specified. Use of specific detainee classifications does not preclude protections granted according to Geneva Conventions I through IV (1949), Department of Defense (DoD) Directive 5100.77, or protections promulgated under paragraph 1-5 of Army Regulation (AR) 190-8. MP leaders and Soldiers conducting Internment/Resettlement (I/R) operations must maintain task proficiency for each category. For the purposes of this subcourse, detainee operations are defined as operations that take or keep selected individuals in custody as a result of military operations to control their movement and activity and/or gain intelligence.

DARPA Fog Computing Leak Prevention Software Design Report

This is the design documents for the Allure Defender system. This document is a high level design and API of the components that make up the Allure Defender system. We outline all the high-level pieces and then the individual components, their behaviors, expected input/outputs, and relationships. We will discuss specific implementation and design choices and languages and libraries that will be used. In addition we will cover specific user cases and illustrate some running examples. Last we refer to a running system which implements many of the components we cover in the document.

(U//FOUO) DHS-FBI Bulletin: Potential Use of Cold Packs in Improvised Explosives

Cold packs, packaged and sold commercially, contain chemicals—usually 30 to 85 grams of ammonium nitrate or urea—that, when extracted in sufficient quantity, can be used as precursors for improvised explosives. The chemicals are packaged in prill form, and can be used directly or ground into powder when being used in homemade explosive production. Five hundred packs would yield 30 to 90 pounds of precursor material for use in an improvised explosive device (IED).

Domestic Operational Law Handbook for Judge Advocates 2011

The Domestic Operational Law (DOPLAW) Handbook for Judge Advocates is a product of the Center for Law and Military Operations (CLAMO). Its content is derived from statutes, Executive Orders and Directives, national policy, DoD Directives, joint publications, service regulations and field manuals, and lessons learned by judge advocates and other practitioners throughout federal and state government. This edition includes a substantial revision of Chapter 3, it incorporates new guidance as set for forth Department of Defense Directive 3025.18, Defense Support of Civil Authorities (DSCA), it provides amplifying information on wildfire response, emergency mutual assistance compacts, the role of the National Guard and Army units such as Army North and Joint Task Force—Civil Support, and it discusses the 2010 Deepwater Horizon oil spill.

Library of Congress Analysis of Military Support to Civil Authorities

This report sets forth the statutes, Executive Branch documents, regulations, and Department of Defense (DoD) internal directives that define and govern Military Support to Civil Authorities (MSCA). The policies and responsibilities of the military departments and staff agencies of DoD are reviewed, as they have evolved from the early 1950s to the present. The events of September 11, 2001, have placed the MSCA function in the larger context of homeland security, and documents setting forth homeland security policy as it defines MSCA have been reviewed as well. This report also discusses DoD civilian and military responsibility for MSCA, and the states’ position regarding the National Guard’s role in support of civil authorities. Finally, this report evaluates the criteria for providing MSCA, and assesses how DoD compares this function with its warfighting mission.

(U//FOUO) U.S. Marine Corps Intelligence Activity Afghanistan: Key Bases and Figures of the Mujahideen

Afghanistan’s Pashtun rural population has been the source of manpower, funds, shelter, support, and intelligence for the repeated insurgencies that have plagued that unfortunate county since their monarch, Zahir Shah, was overthrown in 1973. In the general unrest that followed, insurgents opposed Mohammad Daoud’s army until he was overthrown by the communists who served in succession – Taraki, Amin, Karmal, and Najibullah. The communist leadership figures, in turn, were deposed by the anti-communist “Seven Party Alliance” that was soon battling among itself for control of Kabul until the Taliban Movement emerged. The Taliban was also faced with resisting insurgent forces, primarily from the non-Pashtun ethnic groups inhabiting Afghanistan’s northern provinces. Afghanistan’s rural insurgents are generally poorly educated, if literate at all, and succeeding generations of insurgents rely upon story-telling from earlier generations of fighters to gain knowledge of tactics that are applicable to their particular culture and terrain.

U.S. Army – Marine Corps Ground Robotics Master Plan Version 3

The PM RS JPO initiated development of an integrated GRMP in response to direction from senior Army and Marine Corps leadership in 2005. The GRMP is intended to provide Army and Marine Corps ground robotic stakeholders a common information resource document, as well as a comprehensive plan that links robotic S&T Projects and Acquisition/Contingency Programs to User Current Capability Gaps, Future Capability Gaps, and S&T Shortfalls. The pressing need for reliable ground robotic systems capable of detecting and warning of the presence of hidden improvised explosive devices (IEDs), chemical and biological agents, and related threats to ground troops employed by insurgents in combat zones greatly increases the importance of making every S&T dollar count toward filling critical User capability gaps. In addition, the GRMP provides decision makers a tool for making critical resource decisions.

Why is SOCOM Lying About Domestic Drone Activities?

A spokesman for U.S. Special Operations Command (USSOCOM) has provided statements to publications in New Hampshire and Oregon indicating that information regarding domestic drone activities provided by Public Intelligence is inaccurate, despite confirmations from the offices of two U.S. Senators. Following our publication last week of a map of current and proposed Department of Defense drone activities within the U.S., several journalists with local publications around the country wrote articles regarding drone activities that were listed in their area. David Brooks of the Nashua Telegraph wrote about the listing of New Hampshire’s Mt. Washington as the site of a USSOCOM drone activity involving small unmanned aerial vehicles including the Raven and Wasp. Corey Pein of the Willamette Week wrote about a planned USSOCOM drone activity in Portland that was listed as utilizing the same types of drones.

Joint and Coalition Operational Analysis (JCOA) Decade of War: Enduring Lessons from the Past Decade of Operations

In general, operations during the first half of the decade were often marked by numerous missteps and challenges as the US government and military applied a strategy and force suited for a different threat and environment. Operations in the second half of the decade often featured successful adaptation to overcome these challenges. From its study of these operations, JCOA identified overarching, enduring lessons for the joint force that present opportunities for the US to learn and improve, best practices that the US can sustain, and emerging risk factors that the US should address. These lessons were derived from JCOA’s 46 studies during this past decade and vetted through the Joint Staff J7-sponsored Decade of War working group in May 2012; input from working group members was consolidated into this report. This initial effort is envisioned to be the first volume in a sustained, multi-phased effort to identify critical, high-level lessons for the joint force.

(U//FOUO) Central Florida Intelligence Exchange Online Jihadist Calls for Arson Attacks

Past statements from al‐Qa’ida Central, as well as their franchise groups, highlight the importance of targeting the U.S. economy as part of their strategy of confronting the West. Most recently, militant propagandists, such as Adam Gadahn, American mouthpiece for Al‐Qa’ida in Pakistan, have made statements advising Muslims in the West to “…undermine the West’s already struggling economies with…targeted attacks on symbols of capitalism which will shake consumer confidence and stifle spending”. Additionally, in November 2010, al‐Qa’ida in the Arabian Peninsula introduced the “strategy of a thousand cuts”, where they encouraged their mujahideen brothers to “attack the enemy with smaller, but more frequent operations…the aim is to bleed the enemy to death”.

(U//FOUO) U.S. Army Rules of Engagement Vignettes Handbook

Vignettes put the rules of engagement (ROE) into context. Rules can be memorized, but without context, those rules have little meaning or value. There is not a repository of vignettes readily accessible to Soldiers. This handbook addresses that shortcoming for units heading to Afghanistan. Soldiers can use this handbook individually, but its value is greatly increased through group discussion and interaction with leaders and judge advocates.

U.C. Berkeley Police Review Board Report on Occupy Berkeley Protest Response

On the morning of November 9, 2011, thousands of students, faculty, staff, and community members gathered for a noontime rally in Sproul Plaza. Protestors voiced their opposition to a variety of issues including recent tuition increases and state cuts to public education, and their support for the Occupy movement, which began in New York City a few months prior. In the early afternoon, hundreds of protestors convened a “General Assembly,” in which they voted to set up tents near Sproul Hall. The first tents to be erected in the grassy area near Sproul Hall were quickly removed by campus police without incident. Two later incidents in this same area, however, one in the mid-afternoon and one at night, involved the use of force by police against large numbers of protesters. Around 3 p.m., another set of tents was erected. In an effort to remove the tents, the police used batons and other means of force to move protestors that were locking arms and blocking access to the tents. After tense interaction with protesters, the police removed this second set of tents and withdrew to their command post in the basement of Sproul Hall. During this period, six individuals were arrested and more were injured and in some instances handled roughly.