This is the first report of progress in producing a NextGen Unmanned Aircraft Systems Research, Development and Demonstration Roadmap (NextGen UAS RD&D Roadmap). The activity was established to enable a responsive, efficient, timely, coordinated multiagency Research and Development (R&D) effort that will enable the U.S. to realize fully the benefits of Unmanned Aircraft Systems (UAS) in the National Airspace System (NAS).
Restricted U.S. Army Unmanned Aircraft Systems (UAS) Ground Based Sense and Avoid (GBSAA) Airspace Integration presentation from July 2009.
U.S. and allied combat operations continue to highlight the value of unmanned systems in the modern combat environment. Combatant Commanders (CCDRs) and warfighters value the inherent features of unmanned systems, especially their persistence, versatility, and reduced risk to human life. The U.S. military Services are fielding these systems in rapidly increasing numbers across all domains: air, ground, and maritime. Unmanned systems provide diverse capabilities to the joint commander to conduct operations across the range of military operations: environmental sensing and battlespace awareness; chemical, biological, radiological, and nuclear (CBRN) detection; counter-improvised explosive device (C-IED) capabilities; port security; precision targeting; and precision strike. Furthermore, the capabilities provided by these unmanned systems continue to expand.
Though the United States has been engaged in a Global War on Terror for more than a decade, the U.S. Government surprisingly does not have a standardized definition of terrorism that is agreed upon by all agencies. The State Department, Federal Bureau of Investigation and a number of other government agencies all utilize differing definitions of what constitutes an act of terrorism. This lack of agreement has allowed individual agencies to present vastly different and, in some cases, far more inclusive definitions of terrorist acts enabling the use of expanded law enforcement and investigative procedures that might not be applicable in other agencies. In fact, some agencies have presented a definition of terrorism so expansive as to include a number of activities that are not traditionally associated with terrorism or terrorist organizations.
Scams, malware campaigns and attacks will continue to grow in scale and complexity as the 27 July opening ceremony in London draws near. Event organizers, sponsors and British authorities continue to increase their physical and cybersecurity awareness as the event approaches. Information systems supporting the Games, transport infrastructure, law enforcement communications, financial operations and similar will become prime targets for criminals. A collective of approximately eighty-seven UK banks exercised their ability to withstand cyber attacks last November. Olympic organizers anticipated cyber threats and began testing their cybersecurity posture during ‘technical rehearsals’ by running scenarios from their Technology Operations Center (TOC) situated on Canary Wharf. The TOC will be manned with over one hundred personnel continuously monitoring critical applications, such as the Commentator Information System, organizers’ intranet, and a telecom infrastructure encompassing 900 servers, 1,000 network and security devices, and 9,500 computers. In addition, British law enforcement organizations have been collaborating with the U.S. Secret Service and other industry experts to understand attack vectors, detection methods and mitigation strategies to combat the threat. However, the cyber implications are more expansive than localized attacks against systems and encompass globally distributed Olympic-themed malware, spam campaigns and scams.
Al-Qaida in the Arabian Peninsula (AQAP) has released issue 9 of its English-language “Inspire” Magazine. There is a portion of the magazine dedicated to attacking the United States by starting wildfires. The article instructs the audience to look for two necessary factors for a successful wildfire, which are dryness and high winds to help spread the fire. Specific fire conditions that are likely to spread fire quickly are Pinewood, crownfires (where the trees and branches are close together), and steep slope fires (fire spreads faster going up a slope).
(U//FOUO) National Guard Geospatial Information Interoperability Exploitation Portable (GIIEP) User Guide
A user guide for the National Guard’s Geospatial Information Interoperability Exploitation Portable (GIIEP) system from March 2010.
Army General Officer Public Roster (By Rank) from April 2012.
Paul Weiskel – http://www.flickr.com/photos/pweiskel08/
niXerKG – http://www.flickr.com/photos/kgnixer/
Chicago Man – http://www.flickr.com/photos/usachicago/
WBEZ – http://www.flickr.com/photos/chicagopublicradio/
Debra Kirby, chief of the Chicago Police Department Office of International Relations, said it is not the intent of Chicago Police to limit or otherwise interfere with coverage of protests and other events related to the NATO summit. The department anticipates that members of the media will be accompanying protesters. Kirby said the department is not endorsing a formal embedding policy (reporters/crews will not be assigned to tag along with specific police units). The department is cognizant that not everyone covering the protests has a NATO or Chicago Police credential. Kirby said credentials from other jurisdictions will be honored, and she recommends that they be worn on a lanyard. At the same time, she is also aware that those who did so in New York encountered problems from protesters; doing so in such circumstances is a judgment call. If there is any question, reporters will be allowed to pull credentials from their pockets to show to police on the street. Information will be released through two joint incident command centers, effective Friday.
Sovereign citizens believe the government is operating outside of its jurisdiction and generally do not recognize federal, state, or local laws, policies, or governmental regulations. They subscribe to a number of conspiracy theories, including a prevalent theory which states the United States Government (USG) became bankrupt and began using citizens as collateral in trade agreements with foreign governments. They believe secret bank accounts exist at the United States (US) Department of the Treasury. These accounts can be accessed using Internal Revenue Service (IRS), Universal Commercial Code (UCC), and fraudulent financial documents.
The Ministry of Counter Narcotics (MCN) and the United Nations Office on Drugs and Crime (UNODC) have joint responsibility of monitoring and verifying opium poppy eradication activities led by the Governors. Governor-led eradication activities are envisaged in all poppy cultivating provinces. Two MCN/UNODC reporters are deputed in MCN for collection of daily reports from the field verifiers and two MCN staffs are assigned for preparing weekly report under UNODC supervision as a part of capacity building activity.
A recent report from the Director of National Intelligence’s Open Source Center (OSC) indicates that opposition parties increasingly believe that Afghan President Hamid Karzai is strengthening the Taliban in an effort to bolster his own political power. The report also assesses that members of Karzai’s camp may be willing to work with militant forces to prevent rival political parties from gaining influence.
On May 20-21, 2012, Chicago will host the 25th North Atlantic Treaty Organization (NATO) Summit – the first NATO Summit in the U.S. held outside of Washington, DC. Delegations from 28 NATO Member Countries, 24 International Security Assistance Force (ISAF) Partner Countries, and six other nations and international organizations will participate in the Summit. The Summit will bring economic benefits in the form of spending, tax revenues, employment, hotel guests, tourism, and broader global attention. Over 7,500 delegates and 7,300 staff, press, and other dignitaries are expected to attend the Summit. In addition, planning for the Summit prompted visits and spending by delegations during advance trips to Chicago. Building on the momentum of the Summit, many Chicago organizations have planned events that will generate additional economic impacts for the City. These ancillary events are expected to draw thousands of additional speakers, staff, attendees, and members of the media.
An updated version of a 2009 “Domestic Extremism Lexicon” produced by the Department of Homeland Security’s Office of Intelligence and Analysis. The list of terms has been substantially reduced and does not include a number of controversial terms from the first version, such as “alternative media” and “direct action.”
OSC has recently observed two Facebook pages and a popular blog that promote the recently established Syrian jihadist group Al-Nusrah Front and jihadist attacks in Syria. As these pages are the top results for a Google search in Arabic of “Al-Nusrah Front,” they are likely to be visited by Arabic-speaking Internet users interested in the group. Observed activity on these pages suggests expanding interest in Al-Nusrah Front.
(U//FOUO) Open Source Center Pakistani Taliban Wants to Use Nuclear Weapons to Ensure Islam’s Survival
Despite past denials by Tehrik-e-Taliban Pakistan (TTP) leaders that the group intends to target Pakistan’s nuclear weapons, TTP Mohmand Agency leader Omar Khalid said in a 21 March video that the TTP aims to use Pakistan’s nuclear technology, among other assets, to ensure Islam’s survival. This is the first time that OSC has observed a TTP leader publicly list Pakistan’s nuclear weapons among its goals. Other elements of Khalid’s statement suggest that he may be seeking to boost his own stature within the group.
(U//FOUO) U.S. Marine Corps 21st‐Century Marine Expeditionary Intelligence Analysis (MEIA‐21) Overview
MEIA‐21 is a formal initiative to structure, standardize, and professionalize tactical intelligence analysis in the Marine Corps. It professionalizes Marine expeditionary intelligence, equipping intelligence analysts with analytically rigorous Structured Models, Approaches, and Techniques (SMATs)—applied tradecraft—to provide commanders with actionable, reliable tactical intelligence in conventional and irregular warfare while also instilling the cognitive and creative skills to create and refine that tradecraft.
Open source reporting indicates the Afghan political landscape, presently dominated by four political groupings and a number of prominent politicians, is likely to undergo further changes in the lead-up to the presidential elections and withdrawal of ISAF forces in 2014. Differing views of the Taliban threat as ISAF withdraws is likely to help drive the realignment and consolidation of political forces. This realignment may result in two major groupings: President Hamid Karzai and allies keen on working with the Taliban versus former anti-Taliban forces and others opposed to the government’s alleged appeasement toward the militants. Such consolidation would likely lead the emerging generation of younger leaders to choose between joining one of the groupings or risk being marginalized at the national level. Four main political groupings — Karzai’s camp, the National Front of Afghanistan (NFA), the National Coalition of Afghanistan (NCA), and the Truth and Justice Party (TJP) — are currently dominating the Afghan political scene.
The expanded use of wireless technology on the enterprise network of medical facilities and the wireless utilization of MDs opens up both new opportunities and new vulnerabilities to patients and medical facilities. Since wireless MDs are now connected to Medical information technology (IT) networks, IT networks are now remotely accessible through the MD. This may be a desirable development, but the communications security of MDs to protect against theft of medical information and malicious intrusion is now becoming a major concern. In addition, many HPH organizations are leveraging mobile technologies to enhance operations. The storage capacity, fast computing speeds, ease of use, and portability render mobile devices an optimal solution.
A document entitled “Full Expectations” was reportedly authored by Samir Khan, a U.S. citizen who was killed in a drone strike in Yemen last year along with Anwar al-Awlaki. The document details what potential Jihadis should expect and bears a great deal of similarity to Inspire magazine, which was also reportedly authored by Khan. After several new issues of Inspire magazine surfaced online in early May, the following document has also recently appeared online with an acknowledgement of the death of Samir Khan.
The U.S. Department of Defense (DoD) has a long history of conducting security force assistance (SFA)-type activities. These activities were primarily focused on gaining access and influence to partner nations (PN). However, by 2005, the purpose of SFA-type activities had evolved. SFA would now enable and develop the sustainable capabilities of foreign security forces (FSF) to a sufficient capacity in order to provide regional stability. The primary purpose of SFA is the development of sustainable capabilities to allow PNs to defend themselves or contribute to operations elsewhere. This is a fundamental shift in how and why the DoD conducts SFA.
Australia-United Kingdom Memorandum of Understanding on National Security/Counter-Terrorism Research
The objective of this Memorandum of Understanding is to establish a framework to encourage, develop and facilitate bilateral cooperative activity in science and technology that contributes to the National Security and Counter-Terrorism activities of both Signatories.
The purpose of The Counterinsurgency Training Center—Afghanistan (CTC-A) “Counterinsurgent’s Guidebook” is two-fold. First, to provide a common language and framework for counterinsurgents currently engaged in Afghanistan, as well as those involved in yet-foreseen conflicts. While each insurgency is unique, the principles, processes, and tools in this Guidebook are intended to be broadly applicable. The second purpose is to provide a structured cognitive process—and supporting tools—whereby counterinsurgents can translate existing counterinsurgency doctrine and theory into practical application. The intended audience for this Guidebook is operational and tactical level U.S./NATO/Coalition counterinsurgents, military and non-military alike.
The Money As A Weapon System – Afghanistan Commander’s Emergency Response Program Standard Operating Procedure supports the United States Government Integrated Civilian-Military Campaign Plan and ISAF Theater Campaign Plan (TCP). The Theater Campaign Plan lists objectives that include improving governance and socio-economic development in order to provide a secure environment for sustainable stability that is observable to the population. CERP provides an enabling tool that commanders can utilize to achieve these objectives. This is accomplished through an assortment of projects planned with desired COIN effects such as addressing urgent needs of the population, promoting GIRoA legitimacy, countering Taliban influence, increasing needed capacity, gaining access, building/expanding relationships, promoting economic growth, and demonstrating positive intent or goodwill.