The purpose of this instruction is to document the Department of Defense (DoD) policy governing the No-strike process, management of No-strike entities, treatment of collateral objects, and the logic, processes, and procedures of the collateral damage estimation (CDE) methodology (CDM).
Available evidence does not support whether behavioral indicators, which are used in the Transportation Security Administration’s (TSA) Screening of Passengers by Observation Techniques (SPOT) program, can be used to identify persons who may pose a risk to aviation security. GAO reviewed four meta-analyses (reviews that analyze other studies and synthesize their findings) that included over 400 studies from the past 60 years and found that the human ability to accurately identify deceptive behavior based on behavioral indicators is the same as or slightly better than chance. Further, the Department of Homeland Security’s (DHS) April 2011 study conducted to validate SPOT’s behavioral indicators did not demonstrate their effectiveness because of study limitations, including the use of unreliable data. Twenty-one of the 25 behavior detection officers (BDO) GAO interviewed at four airports said that some behavioral indicators are subjective. TSA officials agree, and said they are working to better define them. GAO analyzed data from fiscal years 2011 and 2012 on the rates at which BDOs referred passengers for additional screening based on behavioral indicators and found that BDOs’ referral rates varied significantly across airports, raising questions about the use of behavioral indicators by BDOs. To help ensure consistency, TSA officials said they deployed teams nationally to verify compliance with SPOT procedures in August 2013. However, these teams are not designed to help ensure BDOs consistently interpret SPOT indicators.
This publication is for officers holding military occupational specialty (MOS) 350F and their trainers or first-line supervisors. It contains standardized training objectives, in the form of task summaries, which support unit missions during wartime. Officers holding MOS 350F should be issued or have access to this publication. It should be available in the officer’s work area, unit learning center, and unit libraries. Trainers and first-line supervisors should actively plan for officers to have access to this publication.
(U//FOUO) Colorado Information Analysis Center: Butane Hash Oil Production Poses Risks to First Responders
NASA Unmanned Aircraft Systems (UAS) Integration in the National Airspace System (NAS) Project Presentations
A collection of presentations from June 2012 detailing the NASA Unmanned Aircraft Systems (UAS) Integration in the National Airspace System (NAS) Project’s efforts to integrate drones into the national airspace including technical problems with frequency allocation as well as technologies designed to avoid mid-air collisions.
FAA Integration of Civil Unmanned Aircraft Systems (UAS) in the National Airspace System (NAS) Roadmap
Since the early 1990s, unmanned aircraft systems (UAS) have operated on a limited basis in the National Airspace System (NAS). Until recently, UAS mainly supported public operations, such as military and border security operations. The list of potential uses is now rapidly expanding to encompass a broad range of other activities, including aerial photography, surveying land and crops, communications and broadcast, monitoring forest fires and environmental conditions, and protecting critical infrastructures. UAS provide new ways for commercial enterprises (civil operations) and public operators to enhance some of our nation’s aviation operations through increased operational efficiency and decreased costs, while maintaining the safety of the NAS.
A draft order from the Russian Ministry of Communications written in coordination with the FSB that, if implemented, will require Russian internet service providers to retain all internet traffic and provide the FSB with access for 12 hours after the data is collected, including stored data, phone numbers, IP addresses, account names, social network activity and e-mail addresses. The proposed rule changes have concerned Russian telecommunications providers who say that the requirements violate the Russian constitution.
This Brief was produced to alert emergency medical responders and healthcare providers to the dangerous levels of toxicity that can be presented by patients who have smoked alcohol. Although this practice is dangerous, it is not illegal. It is being practiced by young adults all over the country and causing serious medical emergencies and deaths as a result. Because this is a returning trend, unfamiliar to health care providers, there is no statistical data available concerning hospitalizations and deaths. The below information was assembled from open source research and can be duplicated and shared for the purposes of awareness and education.
U.S. Army Africa Pamphlet: Cultural, Historical, and Natural Resource Protection During African Operations
This pamphlet is applicable to United States (US) forces conducting operations in Africa operating under the control of US Army Africa (USARAF) or applicable joint task forces (JTF). The intent of this pamphlet is to provide guidance on the protection and management of recognized cultural, historic, and natural resources that may be placed at risk due to the conduct of the full spectrum of US ground operations and associated close air/naval support operations.
(U//FOUO) Government of the Islamic Republic of Afghanistan Ministries of Defense and Interior Organizational Charts
The Domestic Operational Law (DOPLAW) Handbook for judge advocates is a product of the Center for Law and Military Operations (CLAMO). Its content is derived from statutes, Executive Orders and Directives, national policy, DoD Directives, joint publications, service regulations, field manuals, and lessons learned by judge advocates and other practitioners throughout federal and state government. This edition includes substantial revisions. It incorporates new guidance set forth in Department of Defense Directive 3025.18 (Defense Support of Civil Authorities), Department of Defense Instruction 3025.21 (Defense Support of Civilian Law Enforcement Agencies), numerous new National Planning Framework documents, and many other recently updated publications. It provides amplifying information on wildfire response, emergency mutual assistance compacts, the role of the National Guard and Army units in domestic response, and provides valuable lessons learned from major incidents such as the 2010 Deepwater Horizon oil spill and Hurricane Sandy of 2012.
An excerpt from the Washington D.C. Metropolitan Police Department 2012 Annual Report listing the locations of surveillance cameras throughout the district as well as every activation of the Department’s Joint Operations Command Center (JOCC) that occurred in 2012
Understanding human dynamics is an essential aspect of planning for success across the full spectrum of military and national security operations. While the adage that “warfare is political conflict by other means” is widely recognized, combatants who underestimate the impact of the human element in military operations do so at their risk. During the Second World War and the reconstruction that followed, as well as during the Cold War, understanding human dynamics was considered essential. As conceptualized in this report, the term “human dynamics” comprises the actions and interactions of personal, interpersonal, and social/contextual factors and their effects on behavioral outcomes. Human dynamics are influenced by factors such as economics, religion, politics, and culture. Culture is defined herein as the particular norms and beliefs held by every human, that impacts how individuals, groups and societies perceive, behave and interact.
Significant progress has been made toward building a DoD capability for understanding sociocultural behavior, and some solutions have been delivered to military end users. However, there is much work to be done. The complexity of human behavior defies easy understanding or reliable forecasting. In the context of irregular warfare, counterinsurgency, post-conflict recovery, or any other mission setting of the Armed Forces, technology—including computational models—is essential to support decision making. That technology must be rooted in well-validated, inter-disciplinary theory, and applied appropriately, with recognition of its strengths and limitations.
This Environmental Assessment (EA) has been prepared to analyze the potential environmental, cultural, transportation, and socioeconomic effects associated with the establishment and operation of a U.S. Army Cyber Command / 2nd Army (ARCYBER) Command and Control Facility at Fort George G. Meade, Maryland (hereinafter referred to as Fort Meade), or at Fort Gordon, Georgia. ARCYBER leads a corps of 21,000 soldiers and civilians who serve worldwide operating and defending all Army networks with supporting organizations such as the Army Network Enterprise Technology Command, 780th MI Brigade, and 1st Information Operations. ARCYBER plans, coordinates, integrates, synchronizes, directs, and conducts network operations and defense of all Army networks; when directed, ARCYBER conducts cyberspace operations in support of full spectrum operations to ensure U.S./Allied freedom of action in cyberspace, and to deny the same to our adversaries.
Special Forces (SF) Soldiers use various biometric identification systems in SF operations. Biometric applications are fundamental to a wide array of SF operational activities, including, but not limited to, the growing field of SF sensitive site exploitation (SSE) and the range of unit protection activities. SSE applications include the identification of enemy personnel and cell leaders in a counterinsurgency (COIN) environment following tactical operations, particularly during direct action missions. Unit protection applications include maintaining databases on the identities of both United States Government (USG) and local national personnel.
This handbook provides basic reference information on Afghanistan, including its geography, history, government, military forces, and communications and transportation networks. This information is intended to familiarize military personnel with local customs and area knowledge to assist them during their assignment to Afghanistan.
Understanding master narratives can be the difference between analytic anticipation and unwanted surprise, as well as the difference between communications successes and messaging gaffes. Master narratives are the historically grounded stories that reflect a community’s identity and experiences, or explain its hopes, aspirations, and concerns. These narratives help groups understand who they are and where they come from, and how to make sense of unfolding developments around them. As they do in all countries, effective communicators in Afghanistan invoke master narratives in order to move audiences in a preferred direction. Afghan influencers rely on their native familiarity with these master narratives to use them effectively. This task is considerably more challenging for US communicators and analysts because they must place themselves in the mindset of foreign audiences who believe stories that — from an American vantage point — may appear surprising, conspiratorial, or even outlandish.
Malicious cyber actors have used compromised social media accounts to spread disinformation about alleged emergencies and attacks, most prominently through Twitter. Because it is difficult to determine the authenticity of a tweet, we anticipate malicious cyber actors will continue to seek to exploit Twitter and other social media platforms used by news organizations and public safety agencies to propagate disinformation.