Sovereign citizens believe the government is operating outside of its jurisdiction and generally do not recognize federal, state, or local laws, policies, or governmental regulations. They subscribe to a number of conspiracy theories, including a prevalent theory which states the United States Government (USG) became bankrupt and began using citizens as collateral in trade agreements with foreign governments. They believe secret bank accounts exist at the United States (US) Department of the Treasury. These accounts can be accessed using Internal Revenue Service (IRS), Universal Commercial Code (UCC), and fraudulent financial documents.
The Ministry of Counter Narcotics (MCN) and the United Nations Office on Drugs and Crime (UNODC) have joint responsibility of monitoring and verifying opium poppy eradication activities led by the Governors. Governor-led eradication activities are envisaged in all poppy cultivating provinces. Two MCN/UNODC reporters are deputed in MCN for collection of daily reports from the field verifiers and two MCN staffs are assigned for preparing weekly report under UNODC supervision as a part of capacity building activity.
A recent report from the Director of National Intelligence’s Open Source Center (OSC) indicates that opposition parties increasingly believe that Afghan President Hamid Karzai is strengthening the Taliban in an effort to bolster his own political power. The report also assesses that members of Karzai’s camp may be willing to work with militant forces to prevent rival political parties from gaining influence.
On May 20-21, 2012, Chicago will host the 25th North Atlantic Treaty Organization (NATO) Summit – the first NATO Summit in the U.S. held outside of Washington, DC. Delegations from 28 NATO Member Countries, 24 International Security Assistance Force (ISAF) Partner Countries, and six other nations and international organizations will participate in the Summit. The Summit will bring economic benefits in the form of spending, tax revenues, employment, hotel guests, tourism, and broader global attention. Over 7,500 delegates and 7,300 staff, press, and other dignitaries are expected to attend the Summit. In addition, planning for the Summit prompted visits and spending by delegations during advance trips to Chicago. Building on the momentum of the Summit, many Chicago organizations have planned events that will generate additional economic impacts for the City. These ancillary events are expected to draw thousands of additional speakers, staff, attendees, and members of the media.
An updated version of a 2009 “Domestic Extremism Lexicon” produced by the Department of Homeland Security’s Office of Intelligence and Analysis. The list of terms has been substantially reduced and does not include a number of controversial terms from the first version, such as “alternative media” and “direct action.”
OSC has recently observed two Facebook pages and a popular blog that promote the recently established Syrian jihadist group Al-Nusrah Front and jihadist attacks in Syria. As these pages are the top results for a Google search in Arabic of “Al-Nusrah Front,” they are likely to be visited by Arabic-speaking Internet users interested in the group. Observed activity on these pages suggests expanding interest in Al-Nusrah Front.
(U//FOUO) Open Source Center Pakistani Taliban Wants to Use Nuclear Weapons to Ensure Islam’s Survival
Despite past denials by Tehrik-e-Taliban Pakistan (TTP) leaders that the group intends to target Pakistan’s nuclear weapons, TTP Mohmand Agency leader Omar Khalid said in a 21 March video that the TTP aims to use Pakistan’s nuclear technology, among other assets, to ensure Islam’s survival. This is the first time that OSC has observed a TTP leader publicly list Pakistan’s nuclear weapons among its goals. Other elements of Khalid’s statement suggest that he may be seeking to boost his own stature within the group.
(U//FOUO) U.S. Marine Corps 21st‐Century Marine Expeditionary Intelligence Analysis (MEIA‐21) Overview
MEIA‐21 is a formal initiative to structure, standardize, and professionalize tactical intelligence analysis in the Marine Corps. It professionalizes Marine expeditionary intelligence, equipping intelligence analysts with analytically rigorous Structured Models, Approaches, and Techniques (SMATs)—applied tradecraft—to provide commanders with actionable, reliable tactical intelligence in conventional and irregular warfare while also instilling the cognitive and creative skills to create and refine that tradecraft.
Open source reporting indicates the Afghan political landscape, presently dominated by four political groupings and a number of prominent politicians, is likely to undergo further changes in the lead-up to the presidential elections and withdrawal of ISAF forces in 2014. Differing views of the Taliban threat as ISAF withdraws is likely to help drive the realignment and consolidation of political forces. This realignment may result in two major groupings: President Hamid Karzai and allies keen on working with the Taliban versus former anti-Taliban forces and others opposed to the government’s alleged appeasement toward the militants. Such consolidation would likely lead the emerging generation of younger leaders to choose between joining one of the groupings or risk being marginalized at the national level. Four main political groupings — Karzai’s camp, the National Front of Afghanistan (NFA), the National Coalition of Afghanistan (NCA), and the Truth and Justice Party (TJP) — are currently dominating the Afghan political scene.
The expanded use of wireless technology on the enterprise network of medical facilities and the wireless utilization of MDs opens up both new opportunities and new vulnerabilities to patients and medical facilities. Since wireless MDs are now connected to Medical information technology (IT) networks, IT networks are now remotely accessible through the MD. This may be a desirable development, but the communications security of MDs to protect against theft of medical information and malicious intrusion is now becoming a major concern. In addition, many HPH organizations are leveraging mobile technologies to enhance operations. The storage capacity, fast computing speeds, ease of use, and portability render mobile devices an optimal solution.
A document entitled “Full Expectations” was reportedly authored by Samir Khan, a U.S. citizen who was killed in a drone strike in Yemen last year along with Anwar al-Awlaki. The document details what potential Jihadis should expect and bears a great deal of similarity to Inspire magazine, which was also reportedly authored by Khan. After several new issues of Inspire magazine surfaced online in early May, the following document has also recently appeared online with an acknowledgement of the death of Samir Khan.
The U.S. Department of Defense (DoD) has a long history of conducting security force assistance (SFA)-type activities. These activities were primarily focused on gaining access and influence to partner nations (PN). However, by 2005, the purpose of SFA-type activities had evolved. SFA would now enable and develop the sustainable capabilities of foreign security forces (FSF) to a sufficient capacity in order to provide regional stability. The primary purpose of SFA is the development of sustainable capabilities to allow PNs to defend themselves or contribute to operations elsewhere. This is a fundamental shift in how and why the DoD conducts SFA.
Australia-United Kingdom Memorandum of Understanding on National Security/Counter-Terrorism Research
The objective of this Memorandum of Understanding is to establish a framework to encourage, develop and facilitate bilateral cooperative activity in science and technology that contributes to the National Security and Counter-Terrorism activities of both Signatories.
The purpose of The Counterinsurgency Training Center—Afghanistan (CTC-A) “Counterinsurgent’s Guidebook” is two-fold. First, to provide a common language and framework for counterinsurgents currently engaged in Afghanistan, as well as those involved in yet-foreseen conflicts. While each insurgency is unique, the principles, processes, and tools in this Guidebook are intended to be broadly applicable. The second purpose is to provide a structured cognitive process—and supporting tools—whereby counterinsurgents can translate existing counterinsurgency doctrine and theory into practical application. The intended audience for this Guidebook is operational and tactical level U.S./NATO/Coalition counterinsurgents, military and non-military alike.
The Money As A Weapon System – Afghanistan Commander’s Emergency Response Program Standard Operating Procedure supports the United States Government Integrated Civilian-Military Campaign Plan and ISAF Theater Campaign Plan (TCP). The Theater Campaign Plan lists objectives that include improving governance and socio-economic development in order to provide a secure environment for sustainable stability that is observable to the population. CERP provides an enabling tool that commanders can utilize to achieve these objectives. This is accomplished through an assortment of projects planned with desired COIN effects such as addressing urgent needs of the population, promoting GIRoA legitimacy, countering Taliban influence, increasing needed capacity, gaining access, building/expanding relationships, promoting economic growth, and demonstrating positive intent or goodwill.
(U//FOUO) ISAF CJIATF-Shafafiyat Countering Afghan Corruption and Organized Crime Overview Presentation
A presentation from the ISAF CJIATF-Shafafiyat on “Countering Corruption and Organized Crime to Make Afghanistan Stronger for Transition and a Good Future” dated March 2012.
21st‐Century Marine Expeditionary Intelligence Analysis (MEIA‐21) is a formal initiative to structure, standardize, and professionalize tactical intelligence analysis in the Marine Corps. It professionalizes Marine expeditionary intelligence, equipping intelligence analysts with analytically rigorous Structured Models, Approaches, and Techniques (SMATs)—applied tradecraft—to provide commanders with actionable, reliable tactical intelligence in conventional and irregular warfare while also instilling the cognitive and creative skills to create and refine that tradecraft.
According to FM 3-24, the population is the center of gravity for COIN operations. Afghanistan‘s population is roughly half female, half male, but in Afghanistan, the culture segregates by gender. As such, the appropriate operational response that is culturally sensitive to that segregation is to interact male to male & female to female. We want to understand 100% of the community by engaging them directly (Figure 1). By doing so, we get the insight that we need, while being respectful of the culture, yet building the fundamentally essential social contracts founded on trust and established in a cooperative environment. That social contract needs to be with the male and female population…both of whom are making decision about the future of this country, whether publicly or privately. ISAF forces are currently making decisions along all lines of operations that affect the entire population but with limited insight or perspective from the female half of the population.
Do you want to know what kind of information fusion centers gather on you and your friends? A document contained in the recent Anonymous/AntiSec hack of the Lake County Sheriff’s Office provides a great deal of insight into what kind of information is gathered and processed by fusion centers at the request of local law enforcement. The document is described as a “biographical profile” and was produced by the Central Florida Intelligence Exchange (CFIX), a regional fusion center serving a number of counties including Brevard, Lake, Orange, Seminole and Volusia. CFIX is one of several fusion centers in the state of Florida, part of a larger network of more than seventy operating all around the country. When the Lake County Sheriff’s Office asked for a “workup” on a man being investigated for charges relating to child pornography, CFIX produced a six page profile on the subject, who had no prior criminal history. The report has a flashy cover festooned with logos, restrictive markings and even a graphical depiction of the man’s name, meaning that an employee of the fusion center did not just type the man’s name into a word processor, but actually took the time to produce an individualized graphic with stylistic highlights and shadows.
A new stock is being produced by Slide Solutions as a product named the SSAR-15. The product, a bump fire stock, is being sold over the internet and at local gun stores which easily converts special models of the AR to a fully automatic weapon. Information has been received that a Louisiana gun store in Lafayette has ten of them in stock and are selling them for around $380.00 a piece.
No person will restrict a member of the Armed Services from communicating with a member of Congress; an Inspector General; a member of a DOD audit, inspection, investigation or law enforcement organization; an EO/EEO representative; or anyone in the chain of command. Soldiers will be free from reprisal for making or preparing such communications. No employee or Soldier may take or threaten to take an unfavorable personnel action, or to withhold or threaten to withhold favorable personnel action, in reprisal against any Soldier for making or preparing a protected communication. Personnel Action is defined as any action that affects or has the potential to affect the member’s current position or career. These include promotions; disciplinary or other corrective action; transfer or reassignment; performance evaluation; decision on pay, benefits, awards, or training; referral for a mental health evaluation; or other significant change in duties inconsistent with the member’s rank.
A letter from the Commander of U.S. Cyber Command Keith Alexander to Senator John McCain describing the role of U.S. Cyber Command and its position on current efforts to pass cybersecurity legislation.
The President is authorized by the Constitution and laws of the United States to employ the Armed Forces of the United States to suppress insurrections, rebellions, and domestic violence under various conditions and circumstances. Planning and preparedness by the Federal Government and the Department of Defense for civil disturbances are important due to the potential severity of the consequences of such events for the Nation and the population.
Preparing Guardsmen to become effective Joint Task Force Commanders (CJTFs) is a critical first step in securing the United States from attack through an active layered defense and responding to a wide range of challenging incidents. Initially, the National Guard Bureau (NGB) designed this course to provide potential CJTFs the knowledge and ability to plan and employ National Guard (NG) Joint Task Forces (JTFs) for homeland defense (HD) and defense support of civil authorities (DSCA). The course has become a partnership between NGB and USNORTHCOM.
Source: Lawrence Livermore National Laboratory/Flickr