This handbook was written to assist Soldiers and leaders at the platoon, company, and battalion level to better understand the importance of their actions on an objective, as well as to teach the fundamentals of tactical site exploitation (TSE) and cache search operations. While selecting the right Soldiers to be on a TSE team is important, the Soldiers and leaders must also understand the importance of the TSE process and the end results of their efforts. Proper TSE fuels the intelligence-operations cycle and may quickly answer the commander’s critical information requirements and assist in the criminal prosecution of detainees.
Three presentations on the DNI’s Blackbook semantic data management framework are from 2008-2009 and reflect information on versions 2 and 3
The purpose of this assessment is to provide an overview of the international activities of the MS-13 criminal organization. The report is the result of the analysis of arrest records, law enforcement reports, deportation records, interviews, and observations conducted by members of the MS-13 National Gang Task Force (NGTF) regarding documented MS-13 members in the United States; Chiapas, Mexico; El Salvador; and Honduras. Violent MS-13 members have crossed international boundaries and key members have documented links between the United States and the countries addressed in this assessment.
Group logos, flags, and other extremist imagery are prevalent throughout most terrorist and extremist groups. Imagery provides a means of evoking existing emotional and historical memories in addition to communicating ideas to potential recruits. Logos and symbols are often used as visual representation of groups and/or their ideology. Print, internet propaganda, tattoos, clothing and accessories, stickers, and other graphic media are the most common representations of extremist imagery. First responders need to be aware of common extremist imagery as it may indicate involvement or support for a particular domestic extremist organization or international terrorist group.
Several newspapers in southern Florida are reporting that trash collectors are receiving training from their employer Waste Management to work with local law enforcement to report crimes and other suspicious activities. The training is part of a program called Waste Watch that is designed to leverage the fact that “drivers are familiar with their routes and are in the same neighborhoods every day” which “puts them in the unique position to spot unusual activity and anything out of the ordinary.” Press releases from Waste Management describe the program as a way of opening “channels of communication with the authorities to help keep them informed and alert of what’s happening in their city’s streets and alleys.”
In the busy street markets of Kabul, stacks of cash sit in piles as moneychangers shout the day’s exchange rate to shoppers bustling by. Currency is bought and sold in the open air. But all the money changing hands on the streets is barely a drop in the bucket compared to all the cash being siphoned out of the country in suitcases, and that is not a metaphor. “It’s hard to estimate exactly how much is going out of Afghanistan, but I can tell you in 2011, 4.5 billion was (flown) out of Afghanistan,” said Khan Afzal Hadawal, deputy governor of the bank of Afghanistan.
Joint Special Operations University Report on Convergence of Special Forces and Civilian Law Enforcement
In recent years there has been an apparent convergence of the operations conducted by Special Operations Forces (SOF) and those of civilian law enforcement agencies (LEAs), especially Special Weapons and Tactics (SWAT) units, in what were formerly separate and distinct missions. The requirements to obtain warrants prior to execution of raids for high-value targets, collect and preserve evidence for criminal prosecution, and on occasion present testimony in courts of law are new missions for SOF. They are not relatively simple changes in the rules of engagement or comparable techniques. As far as can be determined, previously no U.S. military combat arms unit has ever been tasked with such a mission during combat operations. The thesis is straightforward; if such missions are to continue, then consideration must be given to adequate training for them.
Increasing criminal activity among Juggalos is of concern due to the ease with which these transitory and loosely affiliated criminal sub-sets are able to form and break off of the well established Juggalo sub-culture of over one million followers. Their crimes are characterized by acts of violence and destruction directed against law enforcement, members of the community, public/private property, and other members of their group. Juggalos are classified as a gang in the states of Arizona, California, Pennsylvania and Utah. Despite this narrow classification, Juggalo-related crime has been documented in at least 20 other states according to law enforcement and open-source reporting.
Cop Block, based on the description on their Facebook page, is a “decentralized project supported by a diverse group of individuals united by their shared goals of police accountability, education of individual rights and the dissemination of effective tactics to utilize while filming police.” The project was founded in 2010 by an individual who started Cop Block due to his personal experiences with law enforcement when he was “a victim of the war on drugs, twice”.
The PLA’s sustained modernization effort over the past two decades has driven remarkable transformation within the force and put the creation of modern command, control, communications, computers, intelligence, surveillance, and reconnaissance (C4ISR) infrastructure at the heart of the PLA’s strategic guidelines for long term development. This priority on C4ISR systems modernization, has in turn been a catalyst for the development of an integrated information warfare (IW) capability capable of defending military and civilian networks while seizing control of an adversary’s information systems during a conflict.
The lawyer for the soldier accused of massacring seventeen people in a small Afghan village earlier this month has stated publicly that there is little or no evidence against his client. John Henry Browne, who is defending Staff Sergeant Robert Bales, told NBC that the U.S. government’s prosecution of Bales will be difficult as “They have no bodies, they have no autopsies, they have no forensics, they have no photographs, they have no witnesses. There is no Afghan who is going to come here to testify against this guy, so how do they prove premeditation? It’s going to be a problem for them.” In an interview with PBS, Browne reiterated this claim stating “There is no crime scene. There is no CSI stuff. There’s no DNA. There’s no fingerprints.” Browne has also stated that there is “no evidence about how many alleged victims” or “of where those remains are.”
This document describes a system for allowing advertisers to target on-line advertisements based on environmental factors of end users. When determining what ads to serve to end users, the environmental factors can be used independently or in combination with matching of keywords associated with the advertisements and keywords in user search queries. A web browser or search engine located at the user’s site may obtain information on the environment (e.g., temperature, humidity, light, sound, air composition) from sensors. Advertisers may specify that the ads are shown to users whose environmental conditions meet certain criteria. For example, advertisements for air conditioners can be sent to users located at regions having temperatures above a first threshold, while advertisements for winter overcoats can be sent to users located at regions having temperatures below a second threshold.
A presentation from the U.S. Army Office of the Provost Marshal General about military forensics operations in Afghanistan from August 2011.
In 1999 the Department of Justice convened a working group to discuss the increasing role of technology in criminality and the challenges law enforcement face when conducting online investigations. The Online Investigations Working Group included members of the FBI, Treasury, Secret Service, IRS, ATF, Air Force and even NASA who worked to produce a series of general principles governing the legality of online investigative practices. The working group codified these eleven principles, governing everything from basic information gathering to undercover operations, and wrote a report titled “Online Investigative Principles for Federal Law Enforcement Agents” that detailed the group’s findings. Though the document was originally marked “Sensitive Law Enforcement Information” and “Distribution Limited to Law Enforcement Personnel” a significant portion of the document was released to the Electronic Privacy Information Center (EPIC) in 2004. However, very significant portions of the document that discuss online undercover operations were heavily redacted. These sections are highly relevant to understanding law enforcement’s pursuit of the hacktivist group Anonymous and the recent case of LulzSec leader “Sabu” who operated for nearly six months as a FBI informant after his arrest in June 2011.
A guide to principles used in online investigations conducted by federal law enforcement agents was authored by a special working group convened by the Department of Justice in 1999. The working group included members of the FBI, Treasury, Secret Service, IRS, ATF, Air Force and even NASA who worked to create a standard guide for federal agents engaged in online criminal investigations.
The following photos are from March and February of this year and were taken at Joint Base Lewis-McChord, Washington. The first four photos from March depict riot control training for a “domestic quick reaction force” that would aid in civil…
The military’s embattled crime lab is trying to fire an outspoken whistleblower who’s spotlighted its problems. Earlier this month, the U.S. Army Criminal Investigation Laboratory warned its firearms branch chief, Donald Mikko, in a memo of its plans to fire him, in part for talking to a McClatchy reporter.
The effective employment of IO to influence primary target audiences, including the population, local leaders, host nation security forces, government officials, and insurgents, is a key component of counterinsurgency (COIN) operations.
The New Jersey Office of Homeland Security and Preparedness is pleased to present this opportunity for you to learn more about terrorism awareness and prevention. This program is designed to raise the awareness of New Jersey citizens and workers so they can assist in combating terrorism by enhancing powers of observation and encouraging mutual assistance and concern. It involves the joint efforts of the federal, state and local agencies along with the residents of New Jersey. While our country tells us to be more aware no one is telling is how and for what. This leaves the possibility for misunderstanding, abuses, and prejudices to surface. This program will inform citizens of what to look for and that their observations should rely on the unusual or suspicious activities and behaviors. Citizens should never use race or religion as factors for reporting suspicious activity. You, the residents and workers of New Jersey, are our partners.
Washington D.C. Metropolitan Police Department Procedures for Handling First Amendment Assemblies and Mass Demonstrations
The Standard Operating Procedures (SOP) outlined in this manual are to ensure that this department is prepared to respond effectively and efficiently in accordance with applicable law and District of Columbia policy to any unlawful conduct occurring in the context of First Amendment assemblies. These SOP’s incorporate revisions to the manner in which the Metropolitan Police Department responds to demonstrations and other assemblies on District of Columbia public space that the District has implemented in resolving litigation. This manual also reflects measures mandated by the First Amendment Rights and Police Standards Act of 2004.
Israel’s intelligence services agree with American intelligence assessments that there is not enough proof to determine whether Iran is building a nuclear bomb, according to a report published Sunday in the New York Times. The newspaper said that senior American officials believe there is little disagreement between the Mossad and U.S. intelligence agencies over Iran’s nuclear program, despite the fact that Israeli political leaders have been pushing for quick action to block Iran from becoming what they describe as an existential threat.
This publication provides Tactics, Techniques, and Procedures (TTP) required for Army personnel when conducting Document and Media Exploitation (DOMEX) operations. The document is designed to serve as a reference for multiple personnel at varying echelons. The ATTP provides specific information for Army personnel operating as part of a DOMEX or other exploitation team for the collection, processing, and reporting of DOMEX activities. The manual serves as a reference for staff planners and intelligence personnel at battalion and brigade combat teams. Additionally, the manual provides an understanding of DOMEX activities, procedures, organizations, products, and databases at joint task force, U.S. Army, and the Department of Defense.
JFIRE is a pocket-size, quick-reference guide for requesting fire support in accordance with approved joint tactics, techniques, and procedures (TTP). JFIRE contains calls for fire, joint air attack team (JAAT) techniques, a format for joint air strike requests, close air support (CAS) coordination and planning procedures, communications architecture, and weapons data.
Mirrored copies of multiple articles referencing and containing pictures of Staff Sergeant Robert Bales who has been identified as the man accused of murdering of 16 civilians in Kandahar on March 11, 2012. These two articles along with all other photos and media created by the U.S. Army that references Bales or contains photos of him is being removed from Army websites in an attempt to wipe away traces of the soldier’s online history. We have mirrored the material in the interest of preserving the documents for analysis and historical interest.
The transition from law of war-based detentions to evidence-based criminal detentions is underway. To fully support this aspect of our counter-insurgency (COIN) mission, Coalition Forces, partnered with Afghan units, are working in the field to provide information and evidence that supports detention operations. These efforts will most fully support the COIN effort if detainees suspected of committing criminal offenses are referred to the Afghan criminal justice system for pre-trial detention, prosecution, and serving of sentence for their crimes, based upon evidence which is used and understood in Afghan criminal courts.