City of Oakland Domain Awareness Center Emails

Oakland-DAC-Emails-1-3_Page_0003

Hundreds of emails from the City of Oakland relating to the construction of the City/Port of Oakland Joint Domain Awareness Center. The files were scanned from printouts held in a series of folders by the City of Oakland and were obtained via a public records request made by members of Occupy Oakland. The emails were the source material for a recent story in the East Bay Express by Darwin BondGraham stating that the City of Oakland had allowed the Domain Awareness Center’s prime contractor Science Applications International Corporation (SAIC) to perjure themselves by signing a disclosure form claiming that the company was in compliance with the city’s Nuclear Weapons Free Zone Ordinance which prohibits the city from doing business with contractors that are connected to the production or use of nuclear weapons. According to the article, SAIC has had a number of contracts relating to nuclear weapons for more than a decade, including a May 2013 U.S. Navy contact for “engineering services, testing, and integration for nuclear command control and communication (NC3) messaging systems.”

Restricted U.S. Army Psychological Operations Officer Training Manual

USArmy-PSYOPS-Officer

The mission of Psychological Operations is to influence the behavior of foreign target audiences (TAs) to support United States (U.S.) national objectives. Psychological Operations(PSYOP) are planned operations to convey selected information and indicators to foreign audiences to influence the emotions, motives, objective reasoning, and ultimately the behavior of foreign governments, organizations, groups, and individuals (JP 3-53, Joint Doctrine for Joint Psychological Operations). Behavioral change is at the root of the PSYOP mission. Although concerned with the mental process of foreign TAs, it is the observable modification of foreign TA behavior that determines the mission success of PSYOP. It is this link between influence and behavior that distinguished PSYOP from other capabilities and activities of information operations (IO) and related components such as public affairs.

Restricted U.S. Army Psychological Operations Specialist Training Guide

USArmy-PSYOPS-Specialist

This Soldier training publication (STP) is for Skill Levels 1 through 4 Soldiers holding the military occupational specialty (MOS) 37F, Psychological Operations Specialist. It contains standardized training objectives in the form of task summaries to train critical tasks that support unit missions. All Soldiers holding MOS 37F should have access to this publication. This publication applies to the Active Army, the Army National Guard (ARNG)/Army National Guard of the United States (ARNGUS), and the United States Army Reserve (USAR) unless otherwise stated.

(U//FOUO) New Jersey Fusion Center Active Shooter Awareness for the 2013 Holiday Season

NJROIC-HolidayActiveShooters

One of the most serious threats facing New Jersey and the entire U.S. Homeland continues to be that of the active shooter, regardless of motivation, who by the very nature of their associated tactics, techniques, and procedures, pose a serious challenge to security personnel based on their ability to operate independently, making them extremely difficult to detect and disrupt before conducting an attack.

Financial Stability Board Global Shadow Banking Monitoring Report 2013

FSB-ShadowBanking-2013

The shadow banking system can broadly be described as credit intermediation involving entities and activities outside the regular banking system. Intermediating credit through non-bank channels can have important advantages and contributes to the financing of the real economy, but such channels can also become a source of systemic risk, especially when they are structured to perform bank-like functions (e.g. maturity transformation and leverage) and when their interconnectedness with the regular banking system is strong. Therefore, appropriate monitoring of shadow banking helps to mitigate the build-up of such systemic risks. The FSB set out its approach for monitoring the global shadow banking system in its report to the G20 in October 2011. This report presents the results of the third annual monitoring exercise following this approach, using end-2012 data. The report includes data from 25 jurisdictions and the euro area as a whole, bringing the coverage of the monitoring exercise to about 80% of global GDP and 90% of global financial system assets.

(U//FOUO) New Jersey Fusion Center Mass Shootings Commonalities December 2012-October 2013

NJROIC-MassShootings-2013-1

The New Jersey Regional Operations Intelligence Center (NJ ROIC) provides the following updated analysis of mass shootings in the last year (December 2012 to October 2013) in order to provide law enforcement personnel, security managers and emergency personnel with identified commonalities and trends, as well as indicators of potential violence.

DHS National Incident Management System: Intelligence/Investigations Function Guidance and Field Operations Guide

DHS-NIMS-IntelGuide

This document includes guidance on how various disciplines can use and integrate the I/I Function while adhering to NIMS concepts and principles. It includes information intended for the NIMS practitioner (including the Incident Commander/Unified Command [IC/UC]) that assists in the placement of the I/I Function within the command structure; provides guidance that may be used while implementing the I/I Function; and has an accompanying Intelligence/ Investigations Function Field Operations Guide (I/I FFOG). While this document provides an example of the I/I Function at the Section level, the IC/UC has the final determination of the scope and placement of the I/I Function within the command structure. The guidance provided in this document is applicable for both domestic incidents that use conventional unclassified information (e.g., open source information, criminal histories, medical records, or educational records) and terrorism incidents where information is often classified and requires the use of national intelligence capabilities.

Connecticut State’s Attorney Report on Sandy Hook Elementary School Mass Shooting

CT-SandyHook

The purpose of this report is to identify the person or persons criminally responsible for the twenty-seven homicides that occurred in Newtown, Connecticut, on the morning of December 14, 2012, to determine what crimes were committed, and to indicate if there will be any state prosecutions as a result of the incident. Since December 14, 2012, the Connecticut State Police and the State’s Attorney’s Office have worked with the federal authorities sharing responsibilities for various aspects of this investigation. Numerous other municipal, state and federal agencies assisted in the investigation. The investigation materials reflect thousands of law enforcement and prosecutor hours. Apart from physical evidence, the materials consist of more than seven-hundred individual files that include reports, statements, interviews, videos, laboratory tests and results, photographs, diagrams, search warrants and returns, as well as evaluations of those items.

Department of Transportation Unmanned Aircraft System (UAS) Service Demand 2015-2035

USAF-UAS-ServiceDemand

This report assesses opportunities, risks, and challenges attendant to future development and deployment of UAS within the National Airspace System (NAS) affecting UAS forecast growth from 2015 to 2035. Analysis of four key areas is performed: technology, mission needs, economics, and existing or anticipated challenges to routine use in NAS operations. Forecast effects of emerging technologies as well as anticipating new technological innovations in areas of airframes, powerplants, sensors, communication, command and control systems, and information technology and processing are evaluated. Anticipated mission needs include intelligence, surveillance and reconnaissance (ISR), as well as new areas such as stores delivery, cargo transport, search and rescue, and pilot augmentation; example business case models are developed for each of these areas. Challenges to routine UAS usage in the NAS include: absence of legislation and regulations for safe flight in integrated airspace; pilot training and certification; regulatory, policy, and procedural issues; social issues, such as privacy and nuisance concerns; environmental issues, such as noise and emissions; and safety.

San Francisco Bay Area Regional Interoperable Communications Systems Authority (BayRICS) Facial Recognition Presentation

BAYRICS-Overview_Page_01

A presentation presenting an overview of the Bay Area Regional Interoperable Communications System Authority (BayRICS), a 13-member Joint Powers Authority (JPA) serving the San Francisco Bay Area, established in August 2011. The presentation lists license plate readers, facial recognition and field fingerprint scanning as potential uses of the BayRICS network.

(U//FOUO) DHS National Cybersecurity and Communications Integration Center (NCCIC) Capabilities Guide

NCCIC-CapabilitiesGuide

The National Cybersecurity and Communications Integration Center (NCCIC) Resource and Capabilities Guide is intended to enhance cross-sector cyber security efforts and collaboration by better informing our cybersecurity and communications partners of the NCCIC’s tools, assets, and collaboration mechanisms offered. This guide also identifies the Center’s resources and capabilities as well as describes the processes for accessing NCCIC information portals and products, incident reporting systems, and relevant point of contact information for our community of partners.

DHS National Cybersecurity and Communications Integration Center Bulletin: Destructive Malware

NCCIC-DestructiveMalware

As related to malware which may exhibit a potentially destructive capability, organizations should increase vigilance and evaluate their capabilities encompassing planning, preparation, detection, and response for such an event. Destructive malware presents a direct threat to an organization’s daily operations, directly impacting the availability of critical assets and data. In addition, the response required for such an event can be extremely resource intensive.

DHS National Cybersecurity and Communications Integration Center Bulletin: Cryptolocker Ransomware

NCCIC-Cryptolocker

The following product is a coordinated effort between NCCIC, U.S. Secret Service and The Cyber Intelligence Network (CIN), provided to assist in prevention, detection and mitigation of a new ransomeware campaign. Ransomware is malware that restricts access to infected computers and requires victims to pay a ransom in order to regain full access. Cryptolocker is particularly interesting in that it functions by encrypting victims computer files with a combination of RSA-2048 and AES-256 encryption. Once encrypted, victims are provided a window of time in which they can pay the actors to receive the key needed to decrypt their files.

Oakland Domain Awareness Center Purchasing Invoices March-July 2013

Oakland-DAC-SAIC-1_Page_003

Scans of all invoices related to the City of Oakland’s contract with Science Applications International Corporation for the construction of the City/Port of Oakland Joint Domain Awareness Center. The documents were collected in a binder held by the City of Oakland and obtained via a public records request made by members of Occupy Oakland. The invoices are organized by month and range in date from March to July 2013.

Joint Chiefs of Staff Instruction Modifies Language on Collateral Damage Estimates for Drone Strikes

drone-strike-damage

An updated instruction issued by the Chairman of the Joint Chiefs of Staff in October 2012 incorporates significantly modified language in numerous sections of the document that describe the process for estimating collateral damage prior to conducting drone strikes and other military actions. These subtle, but important changes in wording provide insight into the military’s attempts to limit expectations in regards to minimizing collateral damage and predicting the lethal effects of military operations.

GAO Report: TSA Should Limit Future Funding for Behavior Detection Activities

GAO-BehaviorDetection

Available evidence does not support whether behavioral indicators, which are used in the Transportation Security Administration’s (TSA) Screening of Passengers by Observation Techniques (SPOT) program, can be used to identify persons who may pose a risk to aviation security. GAO reviewed four meta-analyses (reviews that analyze other studies and synthesize their findings) that included over 400 studies from the past 60 years and found that the human ability to accurately identify deceptive behavior based on behavioral indicators is the same as or slightly better than chance. Further, the Department of Homeland Security’s (DHS) April 2011 study conducted to validate SPOT’s behavioral indicators did not demonstrate their effectiveness because of study limitations, including the use of unreliable data. Twenty-one of the 25 behavior detection officers (BDO) GAO interviewed at four airports said that some behavioral indicators are subjective. TSA officials agree, and said they are working to better define them. GAO analyzed data from fiscal years 2011 and 2012 on the rates at which BDOs referred passengers for additional screening based on behavioral indicators and found that BDOs’ referral rates varied significantly across airports, raising questions about the use of behavioral indicators by BDOs. To help ensure consistency, TSA officials said they deployed teams nationally to verify compliance with SPOT procedures in August 2013. However, these teams are not designed to help ensure BDOs consistently interpret SPOT indicators.

Restricted U.S. Army All Source Intelligence Technician Officer Training Standards

USArmy-AllSourceIntelligence

This publication is for officers holding military occupational specialty (MOS) 350F and their trainers or first-line supervisors. It contains standardized training objectives, in the form of task summaries, which support unit missions during wartime. Officers holding MOS 350F should be issued or have access to this publication. It should be available in the officer’s work area, unit learning center, and unit libraries. Trainers and first-line supervisors should actively plan for officers to have access to this publication.

NASA Unmanned Aircraft Systems (UAS) Integration in the National Airspace System (NAS) Project Presentations

NASA-UAS-NAS-Integration_Page_001

A collection of presentations from June 2012 detailing the NASA Unmanned Aircraft Systems (UAS) Integration in the National Airspace System (NAS) Project’s efforts to integrate drones into the national airspace including technical problems with frequency allocation as well as technologies designed to avoid mid-air collisions.

FAA Integration of Civil Unmanned Aircraft Systems (UAS) in the National Airspace System (NAS) Roadmap

FAA-UAS-Roadmap2013

Since the early 1990s, unmanned aircraft systems (UAS) have operated on a limited basis in the National Airspace System (NAS). Until recently, UAS mainly supported public operations, such as military and border security operations. The list of potential uses is now rapidly expanding to encompass a broad range of other activities, including aerial photography, surveying land and crops, communications and broadcast, monitoring forest fires and environmental conditions, and protecting critical infrastructures. UAS provide new ways for commercial enterprises (civil operations) and public operators to enhance some of our nation’s aviation operations through increased operational efficiency and decreased costs, while maintaining the safety of the NAS.