Chairman of the Joint Chiefs of Staff Instruction on disclosing, releasing, and transferring information systems security (INFOSEC) products or associated communications security (COMSEC) information to foreign governments.
Author Archive for Public Intelligence
Archistrategos.
Joint Chiefs of Staff
(U//FOUO) Joint Chiefs of Staff Instruction: Military Information Support Operations (MISO)
In accordance with (IAW) reference a, MISO replaces the term psychological operations (PSYOP). This instruction provides strategic direction for inclusion of MISO to support the full range of military operations including military engagement, security cooperation and deterrence; crisis response and limited contingency operations; major operations and campaigns; and as an integrated information activity within the DOD’s overall contribution to United States Government (USG) communication strategies.
Department of Defense
(U//FOUO) DoD Instruction: Signals Intelligence (SIGINT)
Department of Defense
(U//FOUO) DoD Manual: Defense Industrial Base (DIB) Cybersecurity Program Classification Manual
DIB CS/IA is the DoD program to protect critical DoD unclassified program, technology, and operational information residing on, or transiting, DIB unclassified networks. DoD Components and industry participants collaborate to protect DoD information through the development, implementation, and execution of DoD and DIB processes and procedures.
News
DHS, FBI Warn “Malicious Actors” Are Using Company Websites, Social Media to Plan Attacks
Department of Homeland Security, Federal Bureau of Investigation
(U//FOUO) DHS-FBI Bulletin: Use of the Internet for Attack Planning
Malicious actors may leverage the Internet to gain information against a potential target to support pre-operational planning efforts for kinetic or cyber attacks. Malicious actors can use Internet search engines for information such as maps, company photographs or blueprints, and gain additional details from social media sites and Web blogs. Some actors may use more sophisticated techniques—such as phishing, spear phishing, or actual penetration of an organization’s network or devices—which can be used to gather personal, sensitive, or proprietary data.
Department of Defense
(U//FOUO) DoD Instruction: Intelligence Oversight, Coordination, Assessment and Reporting
Department of Defense
(U//FOUO) DoD Instruction: Raven Rock Mountain Complex (RRMC)
The mission of RRMC is to support the Secretary of Defense, the Chairman of the Joint Chiefs of Staff, select DoD Components and, as appropriate, non-DoD agencies of the Federal Government, and to enable the execution of DoD mission-essential functions (MEFs) in accordance with DoDD S-5100.44 and continuity of operations (COOP) plans and operational orders.
Department of Defense
(U//FOUO) DoD Instruction: Counterintelligence (CI) Activities Supporting Research, Development, and Acquisition
The CI mission in RDA informs the DoD Components and supporting CDCs of foreign collection threats and detects FIE targeting of defense-related technology. The CI support enables RDA program personnel to implement countermeasures and enables CI to develop activities that negate, counter, penetrate, or exploit an FIE.
United States
Restricted U.S. Postal Service Mail Cover Request Procedures
California
San Francisco Bay Area Urban Shield 2013 Overview Presentation
Urban Shield is a continuous, 48-hour Full Scale Multi-Disciplinary Homeland Security/Disaster Preparedness Exercise hosted by the Alameda County Sheriff’s Office, with the support of the Bay Area Urban Area Security Initiative (UASI), and more than 150 local, state, federal, international and private sector partners.
Department of Defense
(U//FOUO) DoD Directive: Counterintelligence (CI)
Defense CI activities shall be undertaken as part of an integrated DoD and national effort to detect, identify, assess, exploit, penetrate, degrade, and counter or neutralize intelligence collection efforts, other intelligence activities, sabotage, espionage, sedition, subversion, assassination, and terrorist activities directed against the Department of Defense, its personnel, information, materiel, facilities, and activities, or against U.S. national security.
Department of Defense
(U//FOUO) DoD Instruction: Counterintelligence (CI) Inquiries
U.S. Army War College
U.S. Army War College Protection of Civilians Military Reference Guide
This PoC Military Reference Guide is intended to be a resource for military commanders and staffs who must consider PoC while conducting operations in PSO and MOAC contexts as shown below Other interested readers may include international organizations, national militaries, training centers, and civilian and police officials who are also concerned with PoC.
Department of Defense
(U//FOUO) DoD Procedures for Wire, Electronic and Oral Interceptions for Law Enforcement
Department of Homeland Security, Federal Bureau of Investigation
(U//FOUO) DHS-FBI Report: Idaho Man Arrested for Providing Material Support to Islamic Movement of Uzbekistan
This Joint Intelligence Bulletin (JIB) provides information on the 16 May 2013 arrest of Idaho-based Uzbekistan national Fazliddin Kurbanov by the FBI Boise Joint Terrorism Task Force (JTTF). On 16 May, Kurbanov was charged under two indictments alleging terrorism, one each in the United States District Court, District of Idaho and United States District Court, District of Utah. FBI and DHS are providing this information to support their respective activities and to assist federal, state, local, tribal, and territorial government counterterrorism and law enforcement officials and the private sector in deterring, preventing, or disrupting terrorist attacks against the United States. All events described in this JIB are taken from the criminal indictment. The charges contained in the indictment are mere allegations. As in any criminal case, the defendant is presumed innocent until proven guilty in a court of law.
National Security Agency
(U//FOUO) NSA Ft. Gordon Georgia “Sweet Tea” Building Specifications
United Nations
UN Human Rights Council Report: Impact of State Surveillance on Privacy and Freedom of Expression
The present report analyses the implications of States’ surveillance of communications for the exercise of the human rights to privacy and to freedom of opinion and expression. While considering the impact of significant technological advances in communications, the report underlines the urgent need to further study new modalities of surveillance and to revise national laws regulating these practices in line with human rights standards.
Bilderberg
American Friends of Bilderberg 2011 Tax Return
The 2011 tax return for the Washington D.C.-based charity American Friends of Bilderberg.
Bilderberg Participant Lists
2013 Bilderberg Meeting Participant List
The 61st Bilderberg meeting is set to take place from 6 until 9 June 2013 in Hertfordshire, UK. A total of around 140 participants from 21 European and North American countries have confirmed their attendance. As ever, a diverse group of political leaders and experts from industry, finance, academia and the media have been invited.
Federal Bureau of Investigation, Massachusetts
Ibragim Todashev Post-Autopsy Body Photos
More than a dozen images originally published on the website Кавказская политика Kavkazskaya Politika (Politics of the Caucasus) after being displayed at a press conference held in Moscow by Ibragim Todashev’s father Abdul-Baki Todashev on May 30, 2013. Ibragim Todashev was shot seven times in his Orlando, Florida apartment on May 22, 2013 following eight hours of questioning by an FBI Special Agent from the Boston Field Office and at least one Massachusetts State Police trooper. Law enforcement sources have provided media outlets with several differing versions of the events leading up to Todashev’s death. First, sources described Todashev being shot after he reportedly attacked the FBI agent with a knife. In later accounts, Todashev was described as being unarmed. In the most recent version of events Todashev reportedly overturned a table, knocking the FBI agent to the ground, before lunging at the agent with a pole or broomstick.
Afghanistan, U.S. Marine Corps
(U//FOUO) U.S. Marine Corps Provincial Reconstruction Teams in Afghanistan Lessons Learned Report
A Provincial Reconstruction Team (PRT) is a civil-military organization, task-organized to a geographical province, whose purpose is to extend the reach and legitimacy of the Central Government of Afghanistan by developing a self-sustaining, peaceful, civil-society. It is a tactical organization with strategic impact. The ratio of military to other governmental, United Nations (UN), and non-governmental organizations depends heavily on the degree to which the area is pacified. The success of a PRT is measured by its ability to increase Central Government capacity and good governance as well as to, “Seize the human terrain and defeat the enemy.” One important element of this is to identify and mentor key Afghan personnel in democratic governance and leadership.
News
DHS Says Aging Infrastructure Poses Significant Risk to U.S.
A recent version of the Department of Homeland Security’s National Risk Profile found that old and deteriorating infrastructure in the U.S. could pose significant risks to the nation and its economy. According to the report, insufficient funding of inspection and maintenance of critical infrastructure throughout the U.S. could create wide-ranging problems as the nation’s infrastructure continues to age. Along with pandemics and nuclear terrorism, a draft version of the DHS National Risk Profile for 2011 lists “aging infrastructure” as having a “potentially significant impact” on the nation’s critical infrastructure. The assessment states that “unusable, ineffectual, and deteriorating critical infrastructure, as well as the potential for exploitation of these vulnerabilities, increase risk . . . due to the inadvertent introduction of flaws, reduced inspection and maintenance workforce, and insufficient investment.” Moreover, this is not a limited threat, as the assessment states that the “entire United States is at risk from aging infrastructure that will eventually “affect all critical infrastructure sectors and ultimately reduce or erode their capacity and lifetimes in unexpected and unpredicted ways.”
Department of Homeland Security, Federal Bureau of Investigation
(U//FOUO) DHS-FBI Bulletin: Increasing Exploitation of Mobile Device Vulnerabilities
State, local, tribal and territorial (SLTT) computer networks have been increasingly targeted by cyber adversaries. At the same time, the expansion of mobile devices integrated into SLTT networks provides new opportunities for cyber adversaries seeking to collect information or disrupt operations by compromising mobile technology and exploiting vulnerabilities in portable operating systems, application software, and hardware. Compromise of a mobile device can have an impact beyond the device itself; malware can propagate across interconnected networks.
Congressional Budget Office
Congressional Budget Office Report: Distribution of Expenditures in Individual Income Tax System
A number of exclusions, deductions, preferential rates, and credits in the federal tax system cause revenues to be much lower than they would be otherwise for any given structure of tax rates. Some of those provisions—in both the individual and corporate income tax systems—are termed “tax expenditures” because they resemble federal spending by providing financial assistance to specific activities, entities, or groups of people. Tax expenditures, like traditional forms of federal spending, contribute to the federal budget deficit; influence how people work, save, and invest; and affect the distribution of income. This report examines how 10 of the largest tax expenditures in the individual income tax system in 2013 are distributed among households with different amounts of income.