Between May 2007 and May 2010, as part of its Street View project, Google Inc. (Google or Company) collected data from Wi-Fi networks throughout the United States and around the world. The purpose of Google’s Wi-Fi data collection initiative was to capture information about Wi-Fi networks that the Company could use to help establish users’ locations and provide location-based services. But Google also collected “payload” data–the content of Internet communications–that was not needed for its location database project. This payload data included e-mail and text messages, passwords, Internet usage history, and other highly sensitive personal information.
Occupy Wall Street (OWS) protesters are calling for a “General Strike” on Tuesday, May 1, urging workers not to go to work and students to boycott classes in protest of what organizers characterize as society’s economic inequality. No unions are expected to participate in the strike, and some have talked to reporters about the fact that they weren’t consulted in OWS’s decision to announce a General Strike. Nonetheless, some elements of organized labor are expected to participate in their own customary May Day rally (which has occurred since 2004), marching from Union Square to Foley Square to Bowling Green, with speeches at either end beginning at about 4:00pm and ending by 7:00pm. The union organizers involved in that march have sought a permit for it. Details are being worked out.
A contracting document for a major transportation project in Afghanistan indicates that the U.S. military is preferentially awarding contracts to companies owned by tribal elders who wield significant power within Afghan society. The performance work statement for the Afghanistan Transportation Network – Southwest/West, which was recently published by the website Cryptocomb, describes a “network of U.S. Government (USG) approved Afghan privately owned trucking companies, otherwise known as Elder Owned Companies (EOC’s or Sub-Contractors) operating under a Management Company (Prime Contractor) to provide secure and reliable means of distributing reconstruction material, security equipment, fuel, miscellaneous dry cargo, and life support assets and equipment throughout the Combined/Joint Operations Area – Afghanistan (CJOA-A) to and from Forward Operating Bases (FOBs) and Distribution Sites located in the Regional Command (RC) – Southwest and RC – West without the use of convoy security.”
U.S. Army Regulation 190–8 Enemy Prisoners of War, Retained Personnel, Civilian Internees and Other Detainees
This regulation provides policy, procedures, and responsibilities for the administration, treatment, employment, and compensation of enemy prisoners of war (EPW), retained personnel (RP), civilian internees (CI) and other detainees (OD) in the custody of U.S. Armed Forces. This regulation also establishes procedures for transfer of custody from the United States to another detaining power.
A video made by the Bureau of Justice Assistance and the International Association of Chiefs of Police. It is designed to inform law enforcement “line officers” of standards for reporting suspicious activity in furtherance of the Nationwide Suspicious Activity Reporting Initiative (NSI). The video and transcript were obtained from the website of the Department of Public Safety in New Mexico.
On Monday, May 16, 2011, thousands of players across the United States received notification of a simulated catastrophic earthquake in the New Madrid Seismic Zone (NMSZ), officially kicking off the National Level Exercise 2011 (NLE 11) functional exercise. From May 16–19, 2011, Federal, state, regional, local, international, nongovernmental, and private sector partners participated in the exercise, the capstone event of a White House-directed, congressionally mandated cycle of planning and preparedness events. Notably, exercise activities were carefully balanced with ongoing efforts to respond to and recover from real-world flooding and tornado-related disasters in the Southern and Central United States. Although some partners, including the four states in FEMA Region IV (Alabama, Kentucky, Mississippi, and Tennessee), had to reduce their participation in NLE 11 due to these events, their actions, requests, and decisions were simulated to allow for robust and realistic exercise play. Simultaneously conducting NLE 11 and managing real-world disasters resulted in a realistic “worst-case scenario.” Consequently, players were able to test the Nation’s ability to respond to several devastating events, strengthening the country’s preparedness through their efforts.
A representative of the Canadian Department of National Defence (DND) has demanded the removal of a document on Canadian Land Force Counterinsurgency Operations that was first released by WikiLeaks in August 2009. The document was published on this website in April 2010 after a copy of the report that was clearer and easier to read was found to be available online. In May 2010, the manual was written about by Doug Saunders, a journalist working for the Globe and Mail who also reproduced the document in full.
Task Force Phoenix has been working in partnership with other nations in training the Afghan Uniformed Police. Civilian Mentor Teams are mentoring senior police leadership at the Kabul police academy. The U.S. is providing basic training courses at a central training facility in Kabul and eight Regional Training Centers in other provinces. More than 62,000 members of the Afghan Uniformed Police, Afghan National Auxiliary Police, and Border Police have completed Police Academy Training programs at U.S. facilities. Over 12,000 have also completed more advanced training courses in specialized areas such as firearms, crowd control, investigative techniques, and domestic violence. In the past year, the Task Force Phoenix has enhanced the Afghan National Police training program with over 200 Mobile training teams and advisors around the country.
A map and list of possible locations of NSA domestic interception points inside the United States. The list was presented by computer security researcher Jacob Appelbaum at a recent event held at the Whitney Museum in New York along with filmmaker Laura Poitras and ex-NSA employee William Binney. One of the addresses, an AT&T building on Folsom Street in San Francisco, is the location of Room 641A which was the subject of multiple lawsuits regarding warrantless surveillance of U.S. citizens. A recent article in Wired quoted Binney as estimating that there are likely ten to twenty of these locations around the country.
The focus of NTP-4 Echo (Naval Communications) is to provide a basic manual addressing C4I concepts and capabilities in the U.S. Navy. Due to increased proliferation of Information Technology (IT) within DoN and the high demand for information dominance within the battle space, the need for a “primary source” C4I document has never been greater. To that end, Naval Network Warfare Command initiated a major revision to this publication reflecting the latest C4I equipment/systems in use today.
In warfighting and counterinsurgency operations, partnering is a command arrangement between a US security force and a host nation (HN) security force in which both forces operate together to achieve mission success and to build the capacity and capability of the HN force. Partnering is not an end, but a deliberate process, a means to an end. A near-term goal might be the standup and development of a HN force increasingly capable of independent operations and decreasingly dependent upon US partnered support. An intermediate objective might be the transition of lead security responsibility from US to HN force. But the ultimate goal is to become “un”-partnered, to enable the HN force to assume full responsibility for security and stability. In warfighting and counterinsurgency partnering, divorce is not a bad ending, it is the desired outcome.
This regulation establishes the Department of the Army Civilian Police and Security Guard (DACP/SG) Program. It assigns responsibilities and establishes policy, standards, and procedures for the effective implementation of the DACP/SG Program. This regulation applies to all Department of the Army civilian personnel in career series 0083 and 0085 and contract security personnel employed by the U.S. Army and involved in the safeguarding and protection of personnel and property.
This regulation establishes the Army Antiterrorism (AT) Program to protect personnel (Soldiers, members of other Services, Department of the Army (DA) civilian employees, Department of Defense (DOD) contractors and Family members of DOD employees), information, property, and facilities (including civil work and like projects) in all locations and situations against terrorism.
This report provides an assessment of Department of Defense (DoD) efforts over the past two years to implement requirements set forth in the 2009 DoD Instruction 3000.05, Stability Operations. It highlights significant initiatives currently underway or planned throughout DoD and provides recommendations and key findings to achieve further progress.
The following series of photos was taken by Paul Weiskel at the Boston Commons on April 15, 2012. The photos depict a Boston Police Department patrolman identified as Vaden Scantlebury who grabs a protester by the neck and then becomes…
Most of the public discussion surrounding the use of drones both internationally and domestically has focused on issues of privacy or civilian casualties. Due to the technical complexity of drone operations, there has been little media examination of the practical feasibility of widespread domestic drone deployment. In February, the FAA Reauthorization Act of 2012 was signed into law clearing the way for more than 30,000 domestic drones by 2020. The law requires the FAA to create procedures for commercially-operated drones by 2015 and enables law enforcement agencies to operate small-scale drones at low altitudes. While this has a number of negative implications for the right to privacy, such as the lack of any laws governing the usage of data collected via drones, the thought of a future where U.S. skies are filled with an array of drones has a much larger, more practical problem: is it even logistically possible to operate thousands of pilot-less aircraft in the domestic airspace?
As of 2 May 2011, the International Chapter of the Vagos Outlaw Motorcycle Gang (Vagos) trademarked their “cuts” – the patches which identify their OMG affiliation – in an effort to prevent law enforcement agencies from inserting undercover officers into their organization. The Vagos added the ® symbol to the bottom center of the large back patch as shown in photo 1. There are only about 20 of these new patches which are currently being worn by members. It is believed that the new patches will be given out to new members as they are vetted by the Vagos leadership. By doing this, the Vagos believe they will have exclusive rights to the Vagos patch and no one, including undercover officers, would be able to wear the patch without the consent of the International Vagos OMG leadership.
FBI High Value Detainee Interrogation Group “Advance the Science of Interrogation” Contract Announcement
This is the Federal Bureau Investigation (FBI) Laboratory Broad Agency Announcement (BAA) BAA-202200 for the High Value Detainee Interrogation Group (HIG) under the Federal Acquisition Regulation (FAR) 6.102(d)(2)(i) to provide for the competitive selection of research proposals for behavioral science research to advance the science and practice of intelligence interviewing and interrogation. This is an unrestricted solicitation. The NAICS Code for this acquisition is 541720 and small business size standard is $19 million.
A fascinating article in the San Jose Mercury News discusses the recent expansion of public-private partnerships in the growing effort to combat cyber threats from foreign governments and criminals. These partnerships occur through formal agreements between major corporations and government-backed organizations, such as law enforcement, the military or research institutions. The agreements usually involve sharing of intelligence between the government and corporate representatives, as well as participation in threat reporting programs and security exercises. In some cases, the partnerships relate directly to research and development regarding ways to mitigate security threats.
The Federal Emergency Management Agency’s (FEMA) Individual and Community Preparedness Division partnered with the International Association of Chiefs of Police (IACP) on a project to research and develop a strategy to improve the public’s awareness and reporting of suspicious activity. In early 2010, IACP conducted research of contemporary and historical practices intended to improve the public’s reporting of suspicious activity. The literature review showed that little research existed on the motivations and barriers that affect whether or not individuals report information to law enforcement. To close this gap in data, IACP developed a three phase primary research strategy. This report provides an overview of key research findings and provides insights and recommendations that support national and local campaigns.
Several Integrated Terrorism Assessment Centre (ITAC) bulletins were obtained via an information request from the Canadian Security Intelligence Service (CSIS) by Paroxysms. Most of the documents were also simultaneously released to the Globe and Mail, though the collection released to Paroxysms is more complete and contains several additional bulletins that are not included in the other collection.
(U//FOUO) U.S. Air Force Small Unmanned Aircraft Systems (SUAS) Airpower Lessons from Iraq and Afghanistan
“Enduring Airpower Lessons from Operation ENDURING FREEDOM (OEF) and Operation IRAQI FREEDOM (OIF)” is one of three lessons learned (L2) focus areas directed by the Chief of Staff of the Air Force (CSAF) at CORONA Top 2008. This report is the third and last in a series of Unmanned Aircraft Systems (UAS) L2 reports produced for fiscal year 2009 and focuses on Small UAS (SUAS) capabilities and issues.
Several reports from the Department of Defense’s Joint Spectrum Center were originally published in April 2010 by a small blog called DoD Leaks. The blog published less than a dozen documents over a two month span and then ceased all activity. The blog’s description states that it was created in response to Cryptome’s call for more publication of “for official use only” documents that are available in the public sphere. These documents relate to frequency allocation and electromagnetic interference tests conducted in relation to datalinks used by Predator drones.
(U//FOUO) U.S. Army Small Unmanned Aerial Vehicle (SUAV) Airspace Command and Control (A2C2) Handbook
The purpose of this handbook is to enhance understanding of Army airspace command and control (A2C2) to mitigate risks between small unit unmanned aerial vehicles (SUAVs) and rotary wing operations below the coordinating altitude. This handbook provides leaders at the brigade and below with guidelines in the form of airspace coordination techniques and procedures regarding SUAV mission planning and airspace deconfliction.
Our overriding conclusion can be stated briefly and explicitly. The pepper spraying incident that took place on November 18, 2011 should and could have been prevented. On November 18, 2011, University of California, Davis, police officers used pepper spray on students sitting in a line in the midst of a protest and “occupation” on the campus quad. Viral images of the incident triggered immediate and widespread condemnation of the police action. The UC Davis protest focused on and drew strength from widespread discontent among students about the increase in tuition and fees at the University of California. The incident also took place against the backdrop of worldwide student protests, including demonstrations by the Occupy Wall Street movement, which triggered similar events across the nation. These protests presented challenges for all affected universities and municipalities in attempting to balance the goals of respecting freedom of speech, maintaining the safety of both protesters and non-protesters, and protecting the legitimate interests of government and the non-protesting public.