The U.S. Department of Defense (DoD) has a long history of conducting security force assistance (SFA)-type activities. These activities were primarily focused on gaining access and influence to partner nations (PN). However, by 2005, the purpose of SFA-type activities had evolved. SFA would now enable and develop the sustainable capabilities of foreign security forces (FSF) to a sufficient capacity in order to provide regional stability. The primary purpose of SFA is the development of sustainable capabilities to allow PNs to defend themselves or contribute to operations elsewhere. This is a fundamental shift in how and why the DoD conducts SFA.
Australia-United Kingdom Memorandum of Understanding on National Security/Counter-Terrorism Research
The objective of this Memorandum of Understanding is to establish a framework to encourage, develop and facilitate bilateral cooperative activity in science and technology that contributes to the National Security and Counter-Terrorism activities of both Signatories.
The purpose of The Counterinsurgency Training Center—Afghanistan (CTC-A) “Counterinsurgent’s Guidebook” is two-fold. First, to provide a common language and framework for counterinsurgents currently engaged in Afghanistan, as well as those involved in yet-foreseen conflicts. While each insurgency is unique, the principles, processes, and tools in this Guidebook are intended to be broadly applicable. The second purpose is to provide a structured cognitive process—and supporting tools—whereby counterinsurgents can translate existing counterinsurgency doctrine and theory into practical application. The intended audience for this Guidebook is operational and tactical level U.S./NATO/Coalition counterinsurgents, military and non-military alike.
The Money As A Weapon System – Afghanistan Commander’s Emergency Response Program Standard Operating Procedure supports the United States Government Integrated Civilian-Military Campaign Plan and ISAF Theater Campaign Plan (TCP). The Theater Campaign Plan lists objectives that include improving governance and socio-economic development in order to provide a secure environment for sustainable stability that is observable to the population. CERP provides an enabling tool that commanders can utilize to achieve these objectives. This is accomplished through an assortment of projects planned with desired COIN effects such as addressing urgent needs of the population, promoting GIRoA legitimacy, countering Taliban influence, increasing needed capacity, gaining access, building/expanding relationships, promoting economic growth, and demonstrating positive intent or goodwill.
(U//FOUO) ISAF CJIATF-Shafafiyat Countering Afghan Corruption and Organized Crime Overview Presentation
A presentation from the ISAF CJIATF-Shafafiyat on “Countering Corruption and Organized Crime to Make Afghanistan Stronger for Transition and a Good Future” dated March 2012.
21st‐Century Marine Expeditionary Intelligence Analysis (MEIA‐21) is a formal initiative to structure, standardize, and professionalize tactical intelligence analysis in the Marine Corps. It professionalizes Marine expeditionary intelligence, equipping intelligence analysts with analytically rigorous Structured Models, Approaches, and Techniques (SMATs)—applied tradecraft—to provide commanders with actionable, reliable tactical intelligence in conventional and irregular warfare while also instilling the cognitive and creative skills to create and refine that tradecraft.
According to FM 3-24, the population is the center of gravity for COIN operations. Afghanistan‘s population is roughly half female, half male, but in Afghanistan, the culture segregates by gender. As such, the appropriate operational response that is culturally sensitive to that segregation is to interact male to male & female to female. We want to understand 100% of the community by engaging them directly (Figure 1). By doing so, we get the insight that we need, while being respectful of the culture, yet building the fundamentally essential social contracts founded on trust and established in a cooperative environment. That social contract needs to be with the male and female population…both of whom are making decision about the future of this country, whether publicly or privately. ISAF forces are currently making decisions along all lines of operations that affect the entire population but with limited insight or perspective from the female half of the population.
Do you want to know what kind of information fusion centers gather on you and your friends? A document contained in the recent Anonymous/AntiSec hack of the Lake County Sheriff’s Office provides a great deal of insight into what kind of information is gathered and processed by fusion centers at the request of local law enforcement. The document is described as a “biographical profile” and was produced by the Central Florida Intelligence Exchange (CFIX), a regional fusion center serving a number of counties including Brevard, Lake, Orange, Seminole and Volusia. CFIX is one of several fusion centers in the state of Florida, part of a larger network of more than seventy operating all around the country. When the Lake County Sheriff’s Office asked for a “workup” on a man being investigated for charges relating to child pornography, CFIX produced a six page profile on the subject, who had no prior criminal history. The report has a flashy cover festooned with logos, restrictive markings and even a graphical depiction of the man’s name, meaning that an employee of the fusion center did not just type the man’s name into a word processor, but actually took the time to produce an individualized graphic with stylistic highlights and shadows.
A new stock is being produced by Slide Solutions as a product named the SSAR-15. The product, a bump fire stock, is being sold over the internet and at local gun stores which easily converts special models of the AR to a fully automatic weapon. Information has been received that a Louisiana gun store in Lafayette has ten of them in stock and are selling them for around $380.00 a piece.
No person will restrict a member of the Armed Services from communicating with a member of Congress; an Inspector General; a member of a DOD audit, inspection, investigation or law enforcement organization; an EO/EEO representative; or anyone in the chain of command. Soldiers will be free from reprisal for making or preparing such communications. No employee or Soldier may take or threaten to take an unfavorable personnel action, or to withhold or threaten to withhold favorable personnel action, in reprisal against any Soldier for making or preparing a protected communication. Personnel Action is defined as any action that affects or has the potential to affect the member’s current position or career. These include promotions; disciplinary or other corrective action; transfer or reassignment; performance evaluation; decision on pay, benefits, awards, or training; referral for a mental health evaluation; or other significant change in duties inconsistent with the member’s rank.
A letter from the Commander of U.S. Cyber Command Keith Alexander to Senator John McCain describing the role of U.S. Cyber Command and its position on current efforts to pass cybersecurity legislation.
The President is authorized by the Constitution and laws of the United States to employ the Armed Forces of the United States to suppress insurrections, rebellions, and domestic violence under various conditions and circumstances. Planning and preparedness by the Federal Government and the Department of Defense for civil disturbances are important due to the potential severity of the consequences of such events for the Nation and the population.
Preparing Guardsmen to become effective Joint Task Force Commanders (CJTFs) is a critical first step in securing the United States from attack through an active layered defense and responding to a wide range of challenging incidents. Initially, the National Guard Bureau (NGB) designed this course to provide potential CJTFs the knowledge and ability to plan and employ National Guard (NG) Joint Task Forces (JTFs) for homeland defense (HD) and defense support of civil authorities (DSCA). The course has become a partnership between NGB and USNORTHCOM.
Source: Lawrence Livermore National Laboratory/Flickr
The eighth and ninth issues of Inspire magazine reportedly created by Al-Malahem Media Foundation, the media arm of Al Qaeda in the Arabian Peninsula. Issue eight is from September 2011 but was only recently released online. Issue nine is from April 2012.
I/R operations facilitate the ability to conduct rapid and decisive combat operations; deter, mitigate, and defeat threats to populations that may result in conflict; reverse conditions of human suffering; and build the capacity of a foreign government to effectively care for and govern its population. This includes capabilities to conduct shaping operations across the spectrum of military operations to mitigate and defeat the underlying conditions for conflict and counter the core motivations that result in support to criminal, terrorist, insurgent, and other destabilizing groups. I/R operations also include the daily incarceration of U.S. military prisoners at facilities throughout the world.
Between May 2007 and May 2010, as part of its Street View project, Google Inc. (Google or Company) collected data from Wi-Fi networks throughout the United States and around the world. The purpose of Google’s Wi-Fi data collection initiative was to capture information about Wi-Fi networks that the Company could use to help establish users’ locations and provide location-based services. But Google also collected “payload” data–the content of Internet communications–that was not needed for its location database project. This payload data included e-mail and text messages, passwords, Internet usage history, and other highly sensitive personal information.
Occupy Wall Street (OWS) protesters are calling for a “General Strike” on Tuesday, May 1, urging workers not to go to work and students to boycott classes in protest of what organizers characterize as society’s economic inequality. No unions are expected to participate in the strike, and some have talked to reporters about the fact that they weren’t consulted in OWS’s decision to announce a General Strike. Nonetheless, some elements of organized labor are expected to participate in their own customary May Day rally (which has occurred since 2004), marching from Union Square to Foley Square to Bowling Green, with speeches at either end beginning at about 4:00pm and ending by 7:00pm. The union organizers involved in that march have sought a permit for it. Details are being worked out.
A contracting document for a major transportation project in Afghanistan indicates that the U.S. military is preferentially awarding contracts to companies owned by tribal elders who wield significant power within Afghan society. The performance work statement for the Afghanistan Transportation Network – Southwest/West, which was recently published by the website Cryptocomb, describes a “network of U.S. Government (USG) approved Afghan privately owned trucking companies, otherwise known as Elder Owned Companies (EOC’s or Sub-Contractors) operating under a Management Company (Prime Contractor) to provide secure and reliable means of distributing reconstruction material, security equipment, fuel, miscellaneous dry cargo, and life support assets and equipment throughout the Combined/Joint Operations Area – Afghanistan (CJOA-A) to and from Forward Operating Bases (FOBs) and Distribution Sites located in the Regional Command (RC) – Southwest and RC – West without the use of convoy security.”
U.S. Army Regulation 190–8 Enemy Prisoners of War, Retained Personnel, Civilian Internees and Other Detainees
This regulation provides policy, procedures, and responsibilities for the administration, treatment, employment, and compensation of enemy prisoners of war (EPW), retained personnel (RP), civilian internees (CI) and other detainees (OD) in the custody of U.S. Armed Forces. This regulation also establishes procedures for transfer of custody from the United States to another detaining power.
A video made by the Bureau of Justice Assistance and the International Association of Chiefs of Police. It is designed to inform law enforcement “line officers” of standards for reporting suspicious activity in furtherance of the Nationwide Suspicious Activity Reporting Initiative (NSI). The video and transcript were obtained from the website of the Department of Public Safety in New Mexico.
On Monday, May 16, 2011, thousands of players across the United States received notification of a simulated catastrophic earthquake in the New Madrid Seismic Zone (NMSZ), officially kicking off the National Level Exercise 2011 (NLE 11) functional exercise. From May 16–19, 2011, Federal, state, regional, local, international, nongovernmental, and private sector partners participated in the exercise, the capstone event of a White House-directed, congressionally mandated cycle of planning and preparedness events. Notably, exercise activities were carefully balanced with ongoing efforts to respond to and recover from real-world flooding and tornado-related disasters in the Southern and Central United States. Although some partners, including the four states in FEMA Region IV (Alabama, Kentucky, Mississippi, and Tennessee), had to reduce their participation in NLE 11 due to these events, their actions, requests, and decisions were simulated to allow for robust and realistic exercise play. Simultaneously conducting NLE 11 and managing real-world disasters resulted in a realistic “worst-case scenario.” Consequently, players were able to test the Nation’s ability to respond to several devastating events, strengthening the country’s preparedness through their efforts.
A representative of the Canadian Department of National Defence (DND) has demanded the removal of a document on Canadian Land Force Counterinsurgency Operations that was first released by WikiLeaks in August 2009. The document was published on this website in April 2010 after a copy of the report that was clearer and easier to read was found to be available online. In May 2010, the manual was written about by Doug Saunders, a journalist working for the Globe and Mail who also reproduced the document in full.
Task Force Phoenix has been working in partnership with other nations in training the Afghan Uniformed Police. Civilian Mentor Teams are mentoring senior police leadership at the Kabul police academy. The U.S. is providing basic training courses at a central training facility in Kabul and eight Regional Training Centers in other provinces. More than 62,000 members of the Afghan Uniformed Police, Afghan National Auxiliary Police, and Border Police have completed Police Academy Training programs at U.S. facilities. Over 12,000 have also completed more advanced training courses in specialized areas such as firearms, crowd control, investigative techniques, and domestic violence. In the past year, the Task Force Phoenix has enhanced the Afghan National Police training program with over 200 Mobile training teams and advisors around the country.
A map and list of possible locations of NSA domestic interception points inside the United States. The list was presented by computer security researcher Jacob Appelbaum at a recent event held at the Whitney Museum in New York along with filmmaker Laura Poitras and ex-NSA employee William Binney. One of the addresses, an AT&T building on Folsom Street in San Francisco, is the location of Room 641A which was the subject of multiple lawsuits regarding warrantless surveillance of U.S. citizens. A recent article in Wired quoted Binney as estimating that there are likely ten to twenty of these locations around the country.