TC 2-50.5 replaces FM 34-8-2, dated 1 May 1998. This publication does not replace the fundamental principles and tactics, techniques, and procedures contained in the other FM 2-series manuals; however, it does focus on their application. It is to be used in conjunction with the other FM 2-series manuals and conforms to the overarching doctrinal concepts presented in FM 3-0 and FM 2-0. The target audience for this manual is the intelligence officers serving as the G-2/S-2 and their staffs— intelligence warrant officers, noncommissioned officers, and junior enlisted Soldiers. TC 2-50.5 applies to the Active Army, the Army National Guard/Army National Guard of the United States, and the U.S. Army Reserve, unless otherwise stated.
Secretary of Homeland Security Janet Napolitano today unveiled new Spanish-language Public Service Announcements (PSAs) for the Department of Homeland Security’s (DHS) “If You See Something, Say Something” public awareness campaign during a roundtable meeting with Hispanic law enforcement groups at the White House. The PSAs are aimed at reaching out to the Spanish-speaking public to encourage them to report suspicious activity to local law enforcement.
The technology, developed by a former Royal Marine commando, temporarily impairs the vision of anyone who looks towards the source. It has impressed a division of the Home Office which is testing a new range of devices because of the growing number of violent situations facing the police. The developer, British-based Photonic Security Systems, hopes to offer the device to shipping companies to deter pirates. Similar devices have been used by ISAF troops in Afghanistan to protect convoys from insurgents. The laser, resembling a rifle and known as an SMU 100, can dazzle and incapacitate targets up to 500m away with a wall of light up to three metres squared. It costs £25,000 and has an infrared scope to spot looters in poor visibility.
An example of a monthly report released through the Department of Homeland Security’s TRIPwire program that documents bomb threats and other incidents related to the domestic use of improvised explosive devices. The report is compiled from open source information gathered around the country. The reports are not released publicly.
As tremors of distrust resonate throughout Russia due to widely-believed allegations of fraud in Sunday’s Parliamentary elections, new research reveals that US$501.3 billion in illicit money has left the country in the ten years (2000-2009) following Vladimir Putin’s rise to power. The forthcoming report, Illicit Financial Flows from Developing Countries over the Decade Ending 2009 , is to be published next week by Global Financial Integrity (GFI). To make matters worse, The Wall Street Journal reports that Finance Minister Anton Siluanov has predicted net capital flight upwards of US$85 billion for this year, further adding to the illicit component of GFI’s estimates.
The purpose of the JFIIT Tactical Leaders Handbook (version 5) is to provide ground maneuver commanders, battle staffs, and soldiers with information regarding Joint Intelligence, Surveillance, and Reconnaissance (ISR) and attack systems and how to leverage these combat multipliers during planning, preparation, and execution of military operations. JFIIT publishes a classified version of this document on the SIPRNET.
Law enforcement and government officials for decades have understood the critical importance of building relationships, based on trust, with the communities they serve. Partnerships are vital to address a range of challenges and must have as their foundation a genuine commitment on the part of law enforcement and government to address community needs and concerns, including protecting rights and public safety. In our efforts to counter violent extremism, we will rely on existing partnerships that communities have forged with Federal, State, and local government agencies. This reliance, however, must not change the nature or purpose of existing relationships. In many instances, our partnerships and related activities were not created for national security purposes but nonetheless have an indirect impact on countering violent extremism (CVE).
Restricted U.S. Army training presentation on “Taliban Insurgent Syndicate Intelligence Operations” from October 2009.
The Chertoff Group, a global security advisory firm founded by Michael Chertoff, former Secretary of the U.S. Department of Homeland Security (DHS), is pleased to announce the opening of a new office in San Francisco. Founded in 2009, The Chertoff Group provides consulting, business development, and merger and acquisition (M&A) advisory services for clients in the security, defense and government services industries. “We are excited to be expanding our presence in Silicon Valley – the heart of innovation and home to so many truly transformative technologies,” said Michael Chertoff, Chairman of The Chertoff Group. “This office will enable us to share our analysis and insight in the homeland security, defense and intelligence space with this unique community that is developing many of the critical technologies needed to confront today’s global security challenges. Our team has helped an array of companies grow and meet their business objectives especially in the federal and international markets and we look forward to continuing this work on the West Coast.”
U.S. Army Asymmetric Warfare Group Afghan Key Leader Engagement (KLE) Tactical Pocket Reference from October 2009.
Freedom of expression and the right to receive and impart information and its corollary, freedom of the media, are indispensable for genuine democracy and democratic processes. Through their scrutiny and in the exercise of their watchdog role, the media provide checks and balances to the exercise of authority. The right to freedom of expression and information as well as freedom of the media must be guaranteed in full respect of Article 10 of the European Convention on Human Rights (ETS No. 5, hereinafter “the Convention”). The right to freedom of assembly and association is equally essential for people’s participation in the public debate and their exercise of democratic citizenship, and it must be guaranteed in full respect of Article 11 of the Convention. All Council of Europe member States have undertaken, in Article 1 of the Convention, to “secure to everyone within their jurisdiction the rights and freedoms” protected by the Convention (without any online/offline distinction).
International Security Assistance Force (ISAF) IED Detector Dogs Standard Operating Procedures 3402 from May 2011.
The chief of the Homeland Security Department’s drone aircraft program is facing an ethics investigation for joining the board of directors of the largest industry group promoting the use of unmanned aircraft, officials said Monday.The internal affairs office of U.S. Customs and Border Protection is reviewing whether Tom Faller, director of unmanned aircraft systems operations, violated internal rules when he took an unpaid position as a board member of the Assn. for Unmanned Vehicle Systems International on Aug. 16. Faller oversees eight Predator B surveillance drones that are chiefly used to help search for illegal immigrants and drug smugglers on the northern and southwestern borders.
A bulletin to local businesses from the City of London Police warning of possible extremist/terrorist threats arising from the Occupy London protests.
International Security Assistance Force (ISAF) Standard Operating Procedures for Detention of Non-ISAF Personnel from August 2006.
The loosely organized hacking collective known as “Anonymous” has announced through several mediums that they plan on conducting cyber attacks, peaceful protests, and other unspecified activity targeting a variety of organizations. The purpose of this product is to judge the likelihood of occurrence for these events, as well as the potential impact.
The purpose of this document is to outline the role of female engagement on the ground and best uses of female engagement initiatives. While existing academic literature on females in Afghanistan is limited mostly to the urban areas, it is evident that the lives of women in rural Helmand are complex and difficult than is generally understood from open source and academic literature. Female engagement encompasses methodical, long-term outreach efforts to the entire population, men, women, and children, which is essential in a counterinsurgency. Such engagement efforts provide opportunities to connect with both men and women, counter negative Taliban IO efforts, and improve civil affairs efforts.
Undercover American narcotics agents have laundered or smuggled millions of dollars in drug proceeds as part of Washington’s expanding role in Mexico’s fight against drug cartels, according to current and former federal law enforcement officials.The agents, primarily with the Drug Enforcement Administration, have handled shipments of hundreds of thousands of dollars in illegal cash across borders, those officials said, to identify how criminal organizations move their money, where they keep their assets and, most important, who their leaders are. They said agents had deposited the drug proceeds in accounts designated by traffickers, or in shell accounts set up by agents.
American citizens are not immune from being treated like an enemy if they take up arms against the United States, the CIA general counsel said on Thursday. CIA General Counsel Stephen Preston was responding to a question at an American Bar Association national security conference about the killing of Americans overseas without presenting evidence of wrongdoing. A CIA drone strike killed Anwar al-Awlaki, an American-born cleric linked to Al Qaeda in the Arabian Peninsula, earlier this year.
The MWD program endured four decades of peace and brief contingency operations from the end of the Vietnam era to the current Global War on Terrorism. The program remained firmly embedded in the Military Police Corps combat support, law and order, and force protection missions. In late 2001, the onset of military operations in Afghanistan provided the impetus to expand MWD capabilities in support of commanders in the field. In 2002, as a direct result of an immediate operational need in Afghanistan, Army leadership directed the establishment of an Army mine detection dog unit and embedded it in the Corps of Engineers. In 2004, as a result of cooperation between the U.S. Army Engineer School and the U.S. Army Military Police School, the Army added a non-aggressive, specialized search dog (explosives detection dog) to the MWD inventory. Combat tracker dogs are returning to Army use as well, along with a very limited number of human remains detector or cadaver search dogs. Two constants emerge in the 60-plus-year history of Army MWD use: working dogs are used in a variety of units for a wide range of missions, and the size of the MWD program has expanded and contracted over time based on the needs of the Army. In the current and projected future operating environment, the MWD program will undoubtedly expand once again.
Complex operations often require the development of specialized teams with multidisciplinary perspectives. Examples of these groups include human terrain teams, provincial reconstruction teams, and, most recently, female engagement teams (FETs). These specialized programs are tasked with engaging local populations to ascertain information on civil-society needs and problems; address security concerns; and to form links between the populace, military, and interagency partners.
An overview of a U.S. State Department survey of Afghan women titled “Exploring Women’s Roles in Afghanistan” from October 2010.
Both House and Senate bills competing to become the National Defense Authorization Act for FY2012 contain a subtitle addressing issues related to detainees at the U.S. Naval Station at Guantanamo Bay, Cuba, and more broadly, hostilities against Al Qaeda and other entities. At the heart of both bills’ detainee provisions appears to be an effort to confirm or, as some observers view it, expand the detention authority that Congress implicitly granted the President via the Authorization for Use of Military Force (AUMF, P.L. 107-40) in the aftermath of the terrorist attacks of September 11, 2001.
Money launderers for ruthless Mexican drug gangs have long had a formidable ally: international banks. Despite strict rules set by international regulatory bodies that require banks to “know their customer,” make inquiries about the source of large deposits of cash and report suspicious activity, they have failed to do so in a number of high-profile cases and instead have allowed billions in dirty money to be laundered. And those who want to stop cartels from easily moving their money express concern that banks that are caught get off with a slap on the wrist. Banking powerhouse Wachovia Corp. last year agreed to pay $160 million in forfeitures and fines after U.S. federal prosecutors accused it of “willfully” overlooking the suspicious character of more than $420 billion in transactions between the bank and Mexican currency-exchange houses — much of it probably drug money, investigators say.