International Security Assistance Force (ISAF) IED Detector Dogs Standard Operating Procedures 3402 from May 2011.
The chief of the Homeland Security Department’s drone aircraft program is facing an ethics investigation for joining the board of directors of the largest industry group promoting the use of unmanned aircraft, officials said Monday.The internal affairs office of U.S. Customs and Border Protection is reviewing whether Tom Faller, director of unmanned aircraft systems operations, violated internal rules when he took an unpaid position as a board member of the Assn. for Unmanned Vehicle Systems International on Aug. 16. Faller oversees eight Predator B surveillance drones that are chiefly used to help search for illegal immigrants and drug smugglers on the northern and southwestern borders.
A bulletin to local businesses from the City of London Police warning of possible extremist/terrorist threats arising from the Occupy London protests.
International Security Assistance Force (ISAF) Standard Operating Procedures for Detention of Non-ISAF Personnel from August 2006.
The loosely organized hacking collective known as “Anonymous” has announced through several mediums that they plan on conducting cyber attacks, peaceful protests, and other unspecified activity targeting a variety of organizations. The purpose of this product is to judge the likelihood of occurrence for these events, as well as the potential impact.
The purpose of this document is to outline the role of female engagement on the ground and best uses of female engagement initiatives. While existing academic literature on females in Afghanistan is limited mostly to the urban areas, it is evident that the lives of women in rural Helmand are complex and difficult than is generally understood from open source and academic literature. Female engagement encompasses methodical, long-term outreach efforts to the entire population, men, women, and children, which is essential in a counterinsurgency. Such engagement efforts provide opportunities to connect with both men and women, counter negative Taliban IO efforts, and improve civil affairs efforts.
Undercover American narcotics agents have laundered or smuggled millions of dollars in drug proceeds as part of Washington’s expanding role in Mexico’s fight against drug cartels, according to current and former federal law enforcement officials.The agents, primarily with the Drug Enforcement Administration, have handled shipments of hundreds of thousands of dollars in illegal cash across borders, those officials said, to identify how criminal organizations move their money, where they keep their assets and, most important, who their leaders are. They said agents had deposited the drug proceeds in accounts designated by traffickers, or in shell accounts set up by agents.
American citizens are not immune from being treated like an enemy if they take up arms against the United States, the CIA general counsel said on Thursday. CIA General Counsel Stephen Preston was responding to a question at an American Bar Association national security conference about the killing of Americans overseas without presenting evidence of wrongdoing. A CIA drone strike killed Anwar al-Awlaki, an American-born cleric linked to Al Qaeda in the Arabian Peninsula, earlier this year.
The MWD program endured four decades of peace and brief contingency operations from the end of the Vietnam era to the current Global War on Terrorism. The program remained firmly embedded in the Military Police Corps combat support, law and order, and force protection missions. In late 2001, the onset of military operations in Afghanistan provided the impetus to expand MWD capabilities in support of commanders in the field. In 2002, as a direct result of an immediate operational need in Afghanistan, Army leadership directed the establishment of an Army mine detection dog unit and embedded it in the Corps of Engineers. In 2004, as a result of cooperation between the U.S. Army Engineer School and the U.S. Army Military Police School, the Army added a non-aggressive, specialized search dog (explosives detection dog) to the MWD inventory. Combat tracker dogs are returning to Army use as well, along with a very limited number of human remains detector or cadaver search dogs. Two constants emerge in the 60-plus-year history of Army MWD use: working dogs are used in a variety of units for a wide range of missions, and the size of the MWD program has expanded and contracted over time based on the needs of the Army. In the current and projected future operating environment, the MWD program will undoubtedly expand once again.
Complex operations often require the development of specialized teams with multidisciplinary perspectives. Examples of these groups include human terrain teams, provincial reconstruction teams, and, most recently, female engagement teams (FETs). These specialized programs are tasked with engaging local populations to ascertain information on civil-society needs and problems; address security concerns; and to form links between the populace, military, and interagency partners.
An overview of a U.S. State Department survey of Afghan women titled “Exploring Women’s Roles in Afghanistan” from October 2010.
Both House and Senate bills competing to become the National Defense Authorization Act for FY2012 contain a subtitle addressing issues related to detainees at the U.S. Naval Station at Guantanamo Bay, Cuba, and more broadly, hostilities against Al Qaeda and other entities. At the heart of both bills’ detainee provisions appears to be an effort to confirm or, as some observers view it, expand the detention authority that Congress implicitly granted the President via the Authorization for Use of Military Force (AUMF, P.L. 107-40) in the aftermath of the terrorist attacks of September 11, 2001.
Money launderers for ruthless Mexican drug gangs have long had a formidable ally: international banks. Despite strict rules set by international regulatory bodies that require banks to “know their customer,” make inquiries about the source of large deposits of cash and report suspicious activity, they have failed to do so in a number of high-profile cases and instead have allowed billions in dirty money to be laundered. And those who want to stop cartels from easily moving their money express concern that banks that are caught get off with a slap on the wrist. Banking powerhouse Wachovia Corp. last year agreed to pay $160 million in forfeitures and fines after U.S. federal prosecutors accused it of “willfully” overlooking the suspicious character of more than $420 billion in transactions between the bank and Mexican currency-exchange houses — much of it probably drug money, investigators say.
A presentation included in a collection of materials related to Trevor Eckhart’s research into the “mobile service intelligence” software produced by Carrier IQ. The document was specifically mentioned in a cease and desist order that the company sent to Eckhart demanding that he remove their “confidential training materials” and take down his analysis of the company’s software. Though the company later withdrew the legal complaint, this presentation remains unavailable from its original location and is only available via a number of mirrors at file-hosting sites.
El Dorado County, California Sheriff’s Department use of force policy from May 1996 to January 2000.
Information sharing (or lack thereof) between intelligence agencies has been a sensitive topic in the U.S. After 9/11, there was a push to create fusion centers so that local, state, and federal agencies could share intelligence, allowing the FBI, for example, to see if the local police have anything in their files on a particular individual. Now the Department of Homeland Security wants to create its own internal fusion center so that its many agencies can aggregate the data they have and make it searchable from a central location. The DHS is calling it a “Federated Information Sharing System” and asked its privacy advisory committee to weigh in on the repercussions at a public meeting in D.C. last month.
In the United States all people have the right of free speech and assembly guaranteed by the First Amendment of the Federal Constitution and California State Constitution. Law enforcement recognizes the right of free speech and actively protects people exercising that right. The rights all people have to march, demonstrate, protest, rally, or perform other First Amendment activities comes with the responsibility to not abuse or violate the civil and property rights of others. The responsibility of law enforcement is to protect the lives and property of all people. Law enforcement should not be biased by the opinions being expressed nor by the race, gender, sexual orientation, physical disabilities, appearances, or affiliation of anyone exercising his/her lawful First Amendment rights. Law enforcement personnel must have the integrity to keep personal, political or religious views from affecting their actions.
As you read this, somewhere in California one law enforcement agency is providing mutual aid to another. Mutual aid is an everyday occurrence in a state as large and diverse as California. This is the continuation of the decades-long process of “neighbor helping neighbor.” The law enforcement mutual aid system is an ongoing cooperative effort among law enforcement agencies to ensure an effective and organized response to a wide range of emergencies. There is a misconception that mutual aid is something used only during a riot or disaster. The mutual aid system has been used successfully for many other situations, including large criminal investigations, deployment of special teams such as Special Weapons and Tactics Teams, Bomb Squads, etc.
The California Emergency Management Agency’s original Law Enforcement Guide for Emergency Operations was developed in response to the need for standardization and uniformity of organization and response on the part of law enforcement agencies involved in major multi-jurisdictional and multi-agency incidents such as a civil disorder, technological disaster, or natural disaster. The revised and expanded 2009 Law Enforcement Guide for Emergency Operations is designed to be a practical field-oriented guide to assist law enforcement personnel throughout the State of California with implementation of the Field Level Incident Command System. The intended primary users of this guide are watch commanders and field supervisors. The guide can also be an excellent emergency response tool for law enforcement managers, as well as line officers and deputies.
The following photos were taken before during and after the attempted eviction of the Occupy LA encampment by the LAPD on the evening of November 27 and into the morning of November 28, 2011. Several photos at the end of…
The Federal Reserve and the big banks fought for more than two years to keep details of the largest bailout in U.S. history a secret. Now, the rest of the world can see what it was missing. The Fed didn’t tell anyone which banks were in trouble so deep they required a combined $1.2 trillion on Dec. 5, 2008, their single neediest day. Bankers didn’t mention that they took tens of billions of dollars in emergency loans at the same time they were assuring investors their firms were healthy. And no one calculated until now that banks reaped an estimated $13 billion of income by taking advantage of the Fed’s below-market rates, Bloomberg Markets magazine reports in its January issue.
From 1979 to 2007, real (inflation-adjusted) average household income, measured after government transfers and federal taxes, grew by 62 percent. During that period, the evolution of the nation’s economy and the tax and spending policies of the federal government and state and local governments had varying effects on households at different points in the income distribution: Income after transfers and federal taxes (denoted as after-tax income in this study) for households at the higher end of the income scale rose much more rapidly than income for households in the middle and at the lower end of the income scale.
The Implementation Manual is a companion document developed to provide amplifying and explanatory guidance on the syntax and use of the markings contained in the CAPCO Register. While not the policy basis for individual agencies’ use of any particular marking, the Implementation Manual cites the applicable authority and sponsor for each marking. Some of the Dissemination Controls and Non-Intelligence Community Dissemination Control Markings are restricted to use by certain agencies. They are included to provide guidance on handling documents that bear them. Their inclusion in the manual does not authorize other Agencies to use these markings. Non-US Classification and Joint Classification Markings are restricted to the respective countries or international organizations.
The 2008 version of the Director of National Intelligence’s Classification and Control Markings Register was released via a FOIA request and is available in a redacted form via the Federation of American Scientists. We have obtained an unredacted version and are presenting selected pages alongside the previously released version to highlight the information that was redacted, including several NSA dissemination control markings such as FRONTO, KEYRUT, SEABOOT and SETTEE.