The National Institute of Justice (NIJ) Sensor, Surveillance, and Biometric Technologies (SSBT) Center of Excellence (CoE) has undertaken a best practices report of through-the-wall sensor (TTWS) devices for operation by law enforcement and first responder agencies in the United States. These devices use a form of radar to detect movement behind barriers. The ability to sense the presence of individuals through common building materials can be useful during rescue operations, law enforcement operations and other tactical scenarios. This report provides advice, tactics and information related to the use of TTWS in operational settings. The information provides law enforcement individuals and organizations with a better understanding of the capabilities and limitations of available TTWS equipment. When put into practice, an agency can make the most of the technology and improve the outcome and safety of operational scenarios in which it is deployed. The best practices report focuses on the use of commercially available TTWS devices suitable for law enforcement or emergency response applications.
Kuwait, U.S. Marine Corps
(U//FOUO) Marine Corps Intelligence Activity Kuwait Cultural Field Guide
Kuwait, U.S. Marine Corps
Marine Corps Intelligence Activity Kuwait Country Handbook
This handbook provides basic reference information on Kuwait, including its geography, history, government, military forces, and communications and transportation networks. This information is intended to familiarize military personnel with local customs and area knowledge to assist them during their assignment to Kuwait.
Department of Homeland Security
DHS National Cybersecurity and Communications Integration Center DDoS Quick Guide
Department of Homeland Security, Federal Bureau of Investigation, National Counterterrorism Center
(U//FOUO) DHS-FBI-NCTC Bulletin: Fake Help Desk Scams an Ongoing Problem
Law enforcement continues to see reporting of malicious cyber actors using fake help desk scams, also known as technical support scams. These scams, if successful, seek to compromise and take control of computer systems. Malicious cyber actors send users an e-mail or they make cold calls, purportedly representing a help desk from a legitimate software or hardware vendor. The malicious cyber actors try to trick users into believing that their computer is malfunctioning—often by having them look at a system log that typically shows scores of harmless or low-level errors—then convincing them to download software or let the “technician” remotely access the personal computer to “repair” it.
Florida
Florida State Attorney’s Office Ibragim Todashev Killing Report and Documentation
News
FBI Law Enforcement National Data Exchange Contains 223 Million Records
The Law Enforcement National Data Exchange (N-DEx) run by the FBI Criminal Justice Information Services (CJIS) Division now contains approximately 223 million records on nearly two billion entities. A FBI CJIS presentation from February 2014 posted on the website of the Integrated Justice Information Systems Institute includes detailed information on state and local data contributors including a tally of the total number of records contributed by state.
Federal Bureau of Investigation
FBI Law Enforcement National Data Exchange (N-DEx) Overview
United States
House Homeland Security Committee Boston Marathon Bombings Report
This report examines much of Tamerlan Tsarnaev’s personal history and his interaction with Federal agencies, including his radicalization, the 2011 threat assessment carried out by the FBI, and his travel to Russia in early 2012. Additionally, the Committee explores missed opportunities that potentially could have prevented this attack.
Saudi Arabia, U.S. Marine Corps
(U//FOUO) Marine Corps Intelligence Activity Saudi Arabia Cultural Field Guide
Saudi Arabia, U.S. Marine Corps
Marine Corps Intelligence Activity Saudi Arabia Country Handbook
This handbook provides basic reference information on Saudi Arabia, including its geography, history, government, military forces, and communications and transportation networks. This information is intended to familiarize military personnel with local customs and area knowledge to assist them during their assignment to Saudi Arabia.
Department of Defense
DoD Open Business Model for Unmanned Aircraft Systems Ground Control Stations
Over the past twenty years, the Department of Defense (DoD) has acquired a diverse portfolio of Unmanned Aircraft Systems (UAS) across the Military Services to meet its national security needs. Newly emergent threats and evolving national security requirements are prompting the DoD to re-evaluate its entire portfolio of systems, while at the same time, seeking to reduce the total ownership costs including lifecycle sustainment costs of these systems. The anticipated reduction in defense spending in concert with advances in information technology provides ample opportunity for DoD to rethink how it acquires, designs, and builds its systems. As a result, DoD is adopting and exploiting open system design principles and architectures to increase competition, foster reuse across systems, and increase interoperability. This new acquisition model requires access to multi-vendor solutions to enable rapid insertion of new technologies to counter emerging threats, avoid technology obsolescence, and decrease time to field new capabilities. DoD is adopting an Open Business Model (OBM) to support the implementation of an Open Architecture (OA) for UAS Ground Control Stations (GCS) in order to drive greater acquisition efficiencies and reduce the total ownership costs. This new model is built upon several lessons learned from the Navy’s own open architecture efforts in the submarine community when it radically changed its approach to building weapon systems due to an emerging threat from an adversary in conjunction with declining budget.
Pakistan
Marine Corps Intelligence Activity Pakistan Military Culture Study
The Pakistan military is ambivalent toward the United States yet largely dependent on U.S. military aid. The Pakistan military distrusts civilians, and throughout Pakistan’s history, the military has repeatedly sought to control the civilian government. Currently, a worsening security and economic situation is taxing the military’s resources. However, the military is a hierarchical organization that remains internally stable and professional.
Pakistan, U.S. Marine Corps
Marine Corps Intelligence Activity Pakistan Country Handbook
This handbook provides basic reference information on Pakistan, including its geography, history, government, military forces, and communications and transportation networks. This information is intended to familiarize military personnel with local customs and area knowledge to assist them during their assignment to Pakistan.
El Salvador, U.S. Marine Corps
Marine Corps Intelligence Activity El Salvador Country Handbook
This handbook provides basic reference information on El Salvador, including its geography, history, government, military forces, and communications and transportation networks. This information is intended to familiarize military personnel with local customs and area knowledge to assist them during their assignment to El Salvador.
China, U.S. Marine Corps
(U//FOUO) Marine Corps Intelligence Activity Chinese People’s Liberation Army Culture Study
China, U.S. Marine Corps
(U//FOUO) Marine Corps Intelligence Activity Chinese Military Culture Field Guide
China’s Military Culture Field Guide is designed to provide deploying military personnel an overview of China’s military cultural terrain. In this field guide, China’s military cultural history has been synopsized to capture the more significant aspects of China’s military cultural environment, with emphasis on factors having the greatest potential to impact operations. The field guide presents background information to show China’s military mind-set through its history, values, and internal dynamics. It also contains practical sections on lifestyle, customs, and habits. For those seeking more extensive information, MCIA produces a series of cultural intelligence studies on China’s military that explores the dynamics of China’s military culture at a deeper level.
China, U.S. Marine Corps
(U//FOUO) Marine Corps Intelligence Activity China Cultural Field Guide
China, U.S. Marine Corps
Marine Corps Intelligence Activity China Country Handbook
This handbook provides basic reference information on China, including its geography, history, government, military forces, and communications and transportation networks. This information is intended to familiarize military personnel with local customs and area knowledge to assist them during their assignment to China.
Indonesia, U.S. Marine Corps
(U//FOUO) Marine Corps Intelligence Activity Indonesia Cultural Field Guide
Indonesia, U.S. Marine Corps
Marine Corps Intelligence Activity Indonesia Country Handbook
This handbook provides basic reference information on Indonesia, including its geography, history, government, military forces, and communications and transportation networks. This information is intended to familiarize military personnel with local customs and area knowledge to assist them during their assignment to Indonesia.
U.S. Marine Corps, Vietnam
Marine Corps Intelligence Activity Vietnam Country Handbook
This handbook provides basic reference information on Vietnam, including its geography, history, government, military forces, and communications and transportation networks. This information is intended to familiarize military personnel with local customs and area knowledge to assist them during their assignment to Vietnam.
Customs and Border Protection
Customs and Border Protection Use of Force Policy Handbook Unredacted
U.S. Army
U.S. Army Irregular Opposing Forces Manual
Irregular forces are armed individuals or groups who are not members of the regular armed forces, police, or other internal security forces (JP 3-24). The distinction of being armed as an individual or group can include a wide range of people who can be categorized correctly or incorrectly as irregular forces. Excluding members of regular armed forces, police, or internal security forces from being considered irregular forces may appear to add some clarity. However, such exclusion is inappropriate when a soldier of a regular armed force, policeman, or internal security force member is concurrently operating in support of insurgent, guerrilla, or criminal activities.
Intelligence Fusion Centers, New Jersey
(U//FOUO) New Jersey Fusion Center Bulletin: Suspicious Activity Regarding the Electrical Grid in New Jersey
In the past year, the NJ Suspicious Activity Reporting System (NJ SARS) has received multiple reports of intrusions at electrical grid facilities in New Jersey. The NJ ROIC currently has no indication of any specific threats associated with these incidents, but provides this information for situational awareness and requests information on any similar, previously unreported incidents in New Jersey.