This guide assists in three areas. First, it aides military leaders and all personnel to be aware of the indicators associated with insider threat activity while serving in a partnering environment. Second, this guide informs commanders and other leaders by giving them options on how to deal with insider threat activities. This guide is not all encompassing so there are other options a commander has dependent on their operating environment. Lastly, this guide is meant to generate open dialogue between coalition partners and partner nation personnel. Partnering in itself is a sensitive mission and only by creating trust and having an open dialogue with all forces will the mission be accomplished.
A majority of 28 mostly European countries have failed to comply with freedom of information requests about their involvement in secret CIA flights carrying suspected terrorists, two human rights groups said Monday. London-based Reprieve and Madrid-based Access Info Europe accused European nations of covering up their complicity in the so-called “extraordinary rendition” program by failing to release flight-traffic data that could show the paths of the planes. The groups said only seven of 28 countries had supplied the requested information. Five countries said they no longer had the data, three refused to release it and 13 had not replied more than 10 weeks after the requests were made.
(U//FOUO) Joint Center for International Security Force Assistance Iraqi Federal Police Advisor Guide
As the U. S. Defense Department scales back operations in Iraq, one of the most significant questions that remains is whether the Iraqi security forces will be capable of maintaining civil order on their own. This manual was produced by the Joint Center for International Security Force Assistance (JCISFA) to help prepare deploying advisors, trainers, and partner forces that will work directly with Iraqi police. The intent is to provide a basic understanding of the country of Iraq and a solid understanding of the current organization and utilization of the Iraqi police. This manual also provides guidance on what it means to work ” by, with and through” a counterpart, and includes observations and insights learned by your predecessors.
Members of the House Homeland Security Committee introduced a cybersecurity bill on Thursday that would establish a quasi-governmental entity to oversee information-sharing with the private sector. Like the other cybersecurity bills offered by the House GOP, the Promoting and Enhancing Cybersecurity and Information Sharing Effectiveness (PrECISE Act) encourages private firms to share information on cyber threats but stops short of mandating new security standards for sectors deemed critical to national security. “The risk of cyberattack by enemies of the United States is real, is ongoing and is growing,” said Chairman Pete King (R-N.Y.). “The PrECISE Act, in line with the framework set forth by the Speaker’s Cybersecurity Task Force led by Rep. [Mac] Thornberry [R-Texas], protects our critical infrastructure without a heavy-handed and burdensome regulatory approach that could cost American jobs.”
U.S. Army report on “Taliban Top 5 Most Deadly Tactics Techniques and Procedures” from June 2010.
US citizens and assets – including the White House, the Central Intelligence Agency, InfraGard, the state of Arizona, and major defense contracting companies – experienced high-profile cyber threats and attacks in the first half of 2011. Most of the tactics and techniques used were not new, however the increase in attacks during the past few months exemplifies the growth of cyber incursions and reinforces the need to be aware of risks and mitigation techniques associated with cyber threats.
The FBI assesses with high confidence a that law enforcement personnel and hacking victims are at risk for identity theft and harassment through a cyber technique called “doxing.” “Doxing” is a common practice among hackers in which a hacker will publicly release identifying information including full name, date of birth, address, and pictures typically retrieved from the social networking site profiles of a targeted individual.
To inform Deputy Commandants (DCs) Aviation, Combat Development and Integration (CD&I), Plans, Policies, and Operations (PP&O), Installations and Logistics (I&L), Commanding General (CG), Training and Education Command (TECOM), Director of Intelligence, operating forces, and others on results of a Marine Corps Center for Lessons Learned (MCCLL) collection conducted April – May 2011 to document lessons and observations regarding unmanned aerial systems (UAS) operations in support of Regional Command Southwest (RC (SW)) during Operation Enduring Freedom (OEF).
Chief executive pay has roared back after two years of stagnation and decline. America’s top bosses enjoyed pay hikes of between 27 and 40% last year, according to the largest survey of US CEO pay. The dramatic bounceback comes as the latest government figures show wages for the majority of Americans are failing to keep up with inflation. America’s highest paid executive took home more than $145.2m, and as stock prices recovered across the board, the median value of bosses’ profits on stock options rose 70% in 2010, from $950,400 to $1.3m. The news comes against the backdrop of an Occupy Wall Street movement that has focused Washington’s attention on the pay packages of America’s highest paid.
Congress ordered the Secretary of Defense to establish an information security program for detecting “unauthorized access to, use of, or transmission of classified or controlled unclassified information.” The provision was included by the FY2012 defense authorization act that was approved in conference this week (section 922). The insider threat detection program, conceived as a response to WikiLeaks, is intended to “allow for centralized monitoring and detection of unauthorized activities.” Among other things, it is supposed to employ technology solutions “to prevent the unauthorized export of information from a network or to render such information unusable in the event of the unauthorized export of such information.”
U.S. Army TRISA handbook on “Political Groups in Afghanistan” from December 2009.
If the U.S. military wants live video of a missile launcher vehicle halfway around the world, it must rely on spy planes or drones in danger of being shot down. Tomorrow, the Pentagon wants space telescopes hovering in geosynchronous orbit that could take real-time images or live video of any spot on Earth. Contrary to Hollywood’s ideas, today’s spy satellites that orbit the Earth at fast speeds and relatively lower altitudes can only snap photos for the U.S. military and intelligence agencies. Taking live video of a single location would require satellites to hover by matching the Earth’s rotation in geosynchronous orbit about 22,000 miles (36,000 kilometers) high — but creating and launching a space telescope with the huge optics arrays capable of seeing ground details from such high orbit has proven difficult.
Mobile device users may be tracked either via mobile-signal triangulation or via Global Positioning Satellite information. A mobile device user’s recent movements may be analyzed to determine trails or traffic patterns for device user among various locations. Mobile device trail information, either for an individual user or aggregated for multiple users, may be analyzed to determine a next destination for the user. Electronic advertising content, such as advertisements, coupons and/or other communications, associated with the next destination may be sent to an electronic device likely to be viewed by the mobile device user. Additionally, the identity of the mobile device user may be known and the advertisements or coupons may be tailored according to demographic information regarding the mobile device user. In addition, destinations may be recommended to mobile device users based on the recent locations the users have visited.
RPAs are revolutionary surveillance and weapons delivery systems – changing the way the Air Force builds situation awareness and engages enemy forces – but their full potential has yet to be realized. To begin to address this issue, the Air Force initiated this study to review the state-of-the-art in RPA operations, focusing on control and connectivity in an irregular warfare (IW) environment. The Panel was specifically tasked to identify RPA architectures and operational concepts centered on human-systems integration, distributed systems operations, and effective command and control – a cluster of concepts and technologies we subsequently labeled as “mission management” enablers. The Panel was also tasked to recommend mid- to far-term S&T development roadmaps for advancing these technologies to improve the flexibility and capability of RPA operations.
The purpose of this bulletin is officer awareness. Officers should know that instigators involved in violent demonstrations might be familiar with, and might try to apply, techniques from the “Crowd Control and Riot Manual.” The handbook, from Warrior Publications teaches protestors how to defeat law enforcement crowd control techniques. Although it does not address specific groups or organizations, the information is widely applicable.
TC 2-50.5 replaces FM 34-8-2, dated 1 May 1998. This publication does not replace the fundamental principles and tactics, techniques, and procedures contained in the other FM 2-series manuals; however, it does focus on their application. It is to be used in conjunction with the other FM 2-series manuals and conforms to the overarching doctrinal concepts presented in FM 3-0 and FM 2-0. The target audience for this manual is the intelligence officers serving as the G-2/S-2 and their staffs— intelligence warrant officers, noncommissioned officers, and junior enlisted Soldiers. TC 2-50.5 applies to the Active Army, the Army National Guard/Army National Guard of the United States, and the U.S. Army Reserve, unless otherwise stated.
Secretary of Homeland Security Janet Napolitano today unveiled new Spanish-language Public Service Announcements (PSAs) for the Department of Homeland Security’s (DHS) “If You See Something, Say Something” public awareness campaign during a roundtable meeting with Hispanic law enforcement groups at the White House. The PSAs are aimed at reaching out to the Spanish-speaking public to encourage them to report suspicious activity to local law enforcement.
The technology, developed by a former Royal Marine commando, temporarily impairs the vision of anyone who looks towards the source. It has impressed a division of the Home Office which is testing a new range of devices because of the growing number of violent situations facing the police. The developer, British-based Photonic Security Systems, hopes to offer the device to shipping companies to deter pirates. Similar devices have been used by ISAF troops in Afghanistan to protect convoys from insurgents. The laser, resembling a rifle and known as an SMU 100, can dazzle and incapacitate targets up to 500m away with a wall of light up to three metres squared. It costs £25,000 and has an infrared scope to spot looters in poor visibility.
An example of a monthly report released through the Department of Homeland Security’s TRIPwire program that documents bomb threats and other incidents related to the domestic use of improvised explosive devices. The report is compiled from open source information gathered around the country. The reports are not released publicly.
As tremors of distrust resonate throughout Russia due to widely-believed allegations of fraud in Sunday’s Parliamentary elections, new research reveals that US$501.3 billion in illicit money has left the country in the ten years (2000-2009) following Vladimir Putin’s rise to power. The forthcoming report, Illicit Financial Flows from Developing Countries over the Decade Ending 2009 , is to be published next week by Global Financial Integrity (GFI). To make matters worse, The Wall Street Journal reports that Finance Minister Anton Siluanov has predicted net capital flight upwards of US$85 billion for this year, further adding to the illicit component of GFI’s estimates.
The purpose of the JFIIT Tactical Leaders Handbook (version 5) is to provide ground maneuver commanders, battle staffs, and soldiers with information regarding Joint Intelligence, Surveillance, and Reconnaissance (ISR) and attack systems and how to leverage these combat multipliers during planning, preparation, and execution of military operations. JFIIT publishes a classified version of this document on the SIPRNET.
Law enforcement and government officials for decades have understood the critical importance of building relationships, based on trust, with the communities they serve. Partnerships are vital to address a range of challenges and must have as their foundation a genuine commitment on the part of law enforcement and government to address community needs and concerns, including protecting rights and public safety. In our efforts to counter violent extremism, we will rely on existing partnerships that communities have forged with Federal, State, and local government agencies. This reliance, however, must not change the nature or purpose of existing relationships. In many instances, our partnerships and related activities were not created for national security purposes but nonetheless have an indirect impact on countering violent extremism (CVE).
Restricted U.S. Army training presentation on “Taliban Insurgent Syndicate Intelligence Operations” from October 2009.
The Chertoff Group, a global security advisory firm founded by Michael Chertoff, former Secretary of the U.S. Department of Homeland Security (DHS), is pleased to announce the opening of a new office in San Francisco. Founded in 2009, The Chertoff Group provides consulting, business development, and merger and acquisition (M&A) advisory services for clients in the security, defense and government services industries. “We are excited to be expanding our presence in Silicon Valley – the heart of innovation and home to so many truly transformative technologies,” said Michael Chertoff, Chairman of The Chertoff Group. “This office will enable us to share our analysis and insight in the homeland security, defense and intelligence space with this unique community that is developing many of the critical technologies needed to confront today’s global security challenges. Our team has helped an array of companies grow and meet their business objectives especially in the federal and international markets and we look forward to continuing this work on the West Coast.”