(U//FOUO) U.S. Army Regulation 190-56 Civilian Police and Security Guard Program

This regulation establishes the Department of the Army Civilian Police and Security Guard (DACP/SG) Program. It assigns responsibilities and establishes policy, standards, and procedures for the effective implementation of the DACP/SG Program. This regulation applies to all Department of the Army civilian personnel in career series 0083 and 0085 and contract security personnel employed by the U.S. Army and involved in the safeguarding and protection of personnel and property.

(U//FOUO) U.S. Army Regulation 525–13 Antiterrorism

This regulation establishes the Army Antiterrorism (AT) Program to protect personnel (Soldiers, members of other Services, Department of the Army (DA) civilian employees, Department of Defense (DOD) contractors and Family members of DOD employees), information, property, and facilities (including civil work and like projects) in all locations and situations against terrorism.

Lost-Links and Mid-Air Collisions: The Problems With Domestic Drones

Most of the public discussion surrounding the use of drones both internationally and domestically has focused on issues of privacy or civilian casualties. Due to the technical complexity of drone operations, there has been little media examination of the practical feasibility of widespread domestic drone deployment. In February, the FAA Reauthorization Act of 2012 was signed into law clearing the way for more than 30,000 domestic drones by 2020. The law requires the FAA to create procedures for commercially-operated drones by 2015 and enables law enforcement agencies to operate small-scale drones at low altitudes. While this has a number of negative implications for the right to privacy, such as the lack of any laws governing the usage of data collected via drones, the thought of a future where U.S. skies are filled with an array of drones has a much larger, more practical problem: is it even logistically possible to operate thousands of pilot-less aircraft in the domestic airspace?

(U//LES) FBI Motorcycle Gang Trademarks Logo to Prevent Undercover Infiltration

As of 2 May 2011, the International Chapter of the Vagos Outlaw Motorcycle Gang (Vagos) trademarked their “cuts” – the patches which identify their OMG affiliation – in an effort to prevent law enforcement agencies from inserting undercover officers into their organization. The Vagos added the ® symbol to the bottom center of the large back patch as shown in photo 1. There are only about 20 of these new patches which are currently being worn by members. It is believed that the new patches will be given out to new members as they are vetted by the Vagos leadership. By doing this, the Vagos believe they will have exclusive rights to the Vagos patch and no one, including undercover officers, would be able to wear the patch without the consent of the International Vagos OMG leadership.

FBI High Value Detainee Interrogation Group “Advance the Science of Interrogation” Contract Announcement

This is the Federal Bureau Investigation (FBI) Laboratory Broad Agency Announcement (BAA) BAA-202200 for the High Value Detainee Interrogation Group (HIG) under the Federal Acquisition Regulation (FAR) 6.102(d)(2)(i) to provide for the competitive selection of research proposals for behavioral science research to advance the science and practice of intelligence interviewing and interrogation. This is an unrestricted solicitation. The NAICS Code for this acquisition is 541720 and small business size standard is $19 million.

Public-Private Partnerships Expand Amidst Cybersecurity Fears

A fascinating article in the San Jose Mercury News discusses the recent expansion of public-private partnerships in the growing effort to combat cyber threats from foreign governments and criminals. These partnerships occur through formal agreements between major corporations and government-backed organizations, such as law enforcement, the military or research institutions. The agreements usually involve sharing of intelligence between the government and corporate representatives, as well as participation in threat reporting programs and security exercises. In some cases, the partnerships relate directly to research and development regarding ways to mitigate security threats.

FEMA Research Report: How to Improve Public’s Suspicious Activity Reporting

The Federal Emergency Management Agency’s (FEMA) Individual and Community Preparedness Division partnered with the International Association of Chiefs of Police (IACP) on a project to research and develop a strategy to improve the public’s awareness and reporting of suspicious activity. In early 2010, IACP conducted research of contemporary and historical practices intended to improve the public’s reporting of suspicious activity. The literature review showed that little research existed on the motivations and barriers that affect whether or not individuals report information to law enforcement. To close this gap in data, IACP developed a three phase primary research strategy. This report provides an overview of key research findings and provides insights and recommendations that support national and local campaigns.

Canada Integrated Terrorism Assessment Centre (ITAC) Occupy Wall Street Bulletins

Several Integrated Terrorism Assessment Centre (ITAC) bulletins were obtained via an information request from the Canadian Security Intelligence Service (CSIS) by Paroxysms. Most of the documents were also simultaneously released to the Globe and Mail, though the collection released to Paroxysms is more complete and contains several additional bulletins that are not included in the other collection.

(U//FOUO) U.S. Air Force Small Unmanned Aircraft Systems (SUAS) Airpower Lessons from Iraq and Afghanistan

“Enduring Airpower Lessons from Operation ENDURING FREEDOM (OEF) and Operation IRAQI FREEDOM (OIF)” is one of three lessons learned (L2) focus areas directed by the Chief of Staff of the Air Force (CSAF) at CORONA Top 2008. This report is the third and last in a series of Unmanned Aircraft Systems (UAS) L2 reports produced for fiscal year 2009 and focuses on Small UAS (SUAS) capabilities and issues.

DoD Joint Spectrum Center Predator Drone Frequency Analysis Reports

Several reports from the Department of Defense’s Joint Spectrum Center were originally published in April 2010 by a small blog called DoD Leaks. The blog published less than a dozen documents over a two month span and then ceased all activity. The blog’s description states that it was created in response to Cryptome’s call for more publication of “for official use only” documents that are available in the public sphere. These documents relate to frequency allocation and electromagnetic interference tests conducted in relation to datalinks used by Predator drones.

(U//FOUO) U.S. Army Small Unmanned Aerial Vehicle (SUAV) Airspace Command and Control (A2C2) Handbook

The purpose of this handbook is to enhance understanding of Army airspace command and control (A2C2) to mitigate risks between small unit unmanned aerial vehicles (SUAVs) and rotary wing operations below the coordinating altitude. This handbook provides leaders at the brigade and below with guidelines in the form of airspace coordination techniques and procedures regarding SUAV mission planning and airspace deconfliction.

U.C. Davis Pepper Spray Incident Reynoso Task Force Report

Our overriding conclusion can be stated briefly and explicitly. The pepper spraying incident that took place on November 18, 2011 should and could have been prevented. On November 18, 2011, University of California, Davis, police officers used pepper spray on students sitting in a line in the midst of a protest and “occupation” on the campus quad. Viral images of the incident triggered immediate and widespread condemnation of the police action. The UC Davis protest focused on and drew strength from widespread discontent among students about the increase in tuition and fees at the University of California. The incident also took place against the backdrop of worldwide student protests, including demonstrations by the Occupy Wall Street movement, which triggered similar events across the nation. These protests presented challenges for all affected universities and municipalities in attempting to balance the goals of respecting freedom of speech, maintaining the safety of both protesters and non-protesters, and protecting the legitimate interests of government and the non-protesting public.

DoD SERE Pre-Academic Laboratory (PREAL) Enhanced Interrogation Techniques Manual

A manual produced by the DoD’s Joint Personnel Recovery Agency (JPRA) and used by instructors in the JPRA’s Survival Evasion Resistance Escape (SERE) courses to train participants for the potential experience of detention. According to Jason Leopold and Jeffrey Kaye of Truthout, the manual was reportedly consulted during high-level discussions in the Bush administration regarding potential “enhanced interrogation techniques.” Several techniques described in the manual are mentioned in a series of controversial memos commonly referred to as the “Torture memos” authored by Justice Department Office of Legal Counsel attorney John Yoo.

(U//LES) FBI International Expansion and Influence of US-Based Gangs

The purpose of this assessment is to explore the expansion and influence of US-based gangs abroad and their illicit operations and associations with foreign criminal organizations. For the purpose of this assessment, the term “gang” encompasses both street gangs and outlaw motorcycle gangs. In addition to FBI and open source reporting, the following law enforcement agencies from the United States, Canada, Central America, the Netherlands, and United Kingdom were surveyed to obtain data for the assessment.

National Level Exercise 2012 Will Focus on Cyber Attacks Against Critical Infrastructure

Rather than combating natural disasters or a nuclear detonation in a major U.S. city, this year’s National Level Exercise will focus on cyber threats to critical infrastructure and the “real world” implications for government and law enforcement of large-scale cyber attacks. National Level Exercise 2012 (NLE 2012) is scheduled to take place in June and will involve emergency response personnel from at least thirteen states, four countries, nearly every major governmental department as well as a number of private companies, non-governmental organizations, institutions of higher education and local fusion centers. The exercise will span four FEMA regions and will include scenarios affecting the National Capital Region.

(U//FOUO) U.S. Army Network Operations (NETOPS) Manual

FM 6-02.71 provides doctrine for the overall guidance and direction pertaining to the command and control of Army communications networks (voice, video, and data) and information services (collaboration, messaging, storage, mediation, etc.) throughout strategic, operational, and tactical levels. It describes the Army’s portion of the Global Information Grid ( hereafter referred to as LandWarNet), network operations goals and objectives, and the associated roles and responsibilities of applicable organizations, materiel, leadership, personnel, and facilities that must integrate LandWarNet standards, telecommunications, services, and applications for the purpose of enabling warfighters to conduct the information management and knowledge management tasks necessary to meet achieve information superiority and decision dominance.

(U//FOUO) Michigan Fusion Center Energy Substations Copper Thefts Bulletin

Over the last week, approximately 10 Energy Sector substations in the Marshall and Battle Creek area have been the victims of copper theft. Because the current street value for scrap copper is over $4.00 per pound, electric substations have become lucrative targets. The targeting of substations for copper has been an issue for over a year. The recent thefts from substations in the greater Flint area caused significant power outages to the area and safety issues for first responders. The suspects are stealing the grounding system conductors and other wires stored at the substation at night. This is accomplished by digging up sections of the grounding system conductors and cutting it off from the power units. The process is time-consuming and requires the suspects to go inside the substation perimeter fence. A few sites have experienced repeated offenses of copper theft.

Meet Catalyst: IARPA’s Entity and Relationship Extraction Program

The Office of the Director of National Intelligence (ODNI) is building a computer system capable of automatically analyzing the massive quantities of data gathered across the entire intelligence community and extracting information on specific entities and their relationships to one another. The system which is called Catalyst is part of a larger effort by ODNI to create software and computer systems capable of knowledge management, entity extraction and semantic integration, enabling greater analysis and understanding of complex, multi-source intelligence throughout the government.

(U//FOUO) IARPA Catalyst Entity Extraction and Disambiguation Study Final Report

Catalyst, a component of DDNI/A’s Analytical Transformation Program, will process unstructured, semistructured, and structured data to produce a knowledge base of entities (people, organizations, places, events, …) with associated attributes and the relationships among them. It will perform functions such as entity extraction, relationship extraction, semantic integration, persistent storage of entities, disambiguation, and related functions (these are defined in the body of the report). The objective of this study is to assess the state-of-the-art and state-of-the-practice in these areas.