Casualties resulting from the use of improvised explosive devices (IEDs) have risen significantly in 2012 according to statistics from the Department of Defense’s Joint Improvised Explosive Device Defeat Organization (JIEDDO). Over a 25-month period from August 2010 through August 2012, JIEDDO found that global IED casualties reached their peak in May 2012 with approximately 1800 people wounded and nearly 600 killed in that month alone.
Author Archive for Public Intelligence
Archistrategos.
Joint Improvised Explosive Device Defeat Organization
(U//FOUO) JIEDDO Global IED Monthly Summary Report August 2012
A monthly report from the Joint Improvised Explosive Device Defeat Organization (JIEDDO) detailing IED usage and casualties statistics from every U.S. combatant command for August 2012.
United States
ICANN Law Enforcement Recommendations for Domain Registration and WHOIS Data Collection Revisions
Documentation from the Internet Corporation for Assigned Names and Numbers (ICANN) on suggested amendments to domain registration agreements and due diligence recommendations for ICANN to adopt in accrediting registrars supported by the Australian Federal Police, U.S. Department of Justice, Federal Bureau of Investigation, New Zealand Police, Royal Canadian Mounted Police and Serious Organised Crime Agency.
Customs and Border Protection
(U//FOUO) U.S. Customs and Border Protection Security Policy and Procedures Handbook
The complete U.S. Customs and Border Protection Security Policy and Procedures handbook from August 2009.
Afghanistan, Open Source Center
(U//FOUO) Open Source Center Translation of Hamid Karzai Decree on Fighting Afghan Corruption
An Open Source Center translation of a decree issued by Hamid Karzai in July 2012 on fighting corruption in Afghanistan.
California
California State Prisons Mexican Mafia (La eMe) Membership Chart
A chart from November 2011 depicting members of the Mexican Mafia compiled by the Institutional Gang Investigators at Pelican Bay State Prison, California State Prison – Corcoran and San Quentin.
U.S. Special Operations Command
U.S. Special Operations Command Terms of Reference – Roles, Missions and Functions of Component Commands
This directive provides Terms of Reference (TOR) for United States Army Special Operations Command (USASOC); Naval Special Warfare Command (NAVSPECWARCOM); Air Force Special Operations Command (AFSOC), Marine Forces Special Operations Command (MARSOC), Joint Military Information Support Command (JMISC), and Joint Special Operations University (JSOU).
U.S. Marine Corps
(U//FOUO) U.S. Marine Corps Infantry Battalion Operations in Afghanistan Lessons Learned Report
The mission of training and mentoring Afghani police was complicated by (1) the need to establish and occupy nine forward operating bases (FOBs) spread over an area of approximately 28,700 square kilometers, while (2) simultaneously maintaining a level of security that (3) permitted identification of suitable candidates for police and training them, since a police force did not exist yet in the areas in which 2/7 operated and (4) accomplishing this without any established support network. The operational environment was more kinetic and austere than conditions generally experienced by recent veterans of Operation Iraqi Freedom (OIF). Companies and platoons were widely dispersed and follow-on units deploying to such areas in Afghanistan must be prepared to operate in a semi-autonomous manner. Training and organization need to be tailored to those conditions and their specific area of operations (AO), and consideration should be given to the proven utility of the MAGTF in such an environment.
News
The Growth of Homeland Security’s Domestic Intelligence Enterprise
The Department of Homeland Security’s production of domestic intelligence has increased substantially over the last few years according to a brochure of “intelligence products” published last month by Cryptome. The 2012 DHS Intelligence Enterprise Product Line Brochure is “a standardized catalogue of intelligence reports and products that represent the full breadth” of the agency’s analytical capabilities. It provides descriptions of each type of product created by the DHS Intelligence Enterprise as well as the classification level and instructions on how DHS “customers” can obtain the products.
Intelligence Fusion Centers, New York
(U//FOUO) New York Fusion Center Historical Pre-Election Terrorist Attacks Analysis
In light of the upcoming 2012 US presidential election, NYSIC is providing a snapshot of four historical cases where terrorists conducted attacks in conjunction with upcoming local or national elections, including the tactics, techniques, and procedures (TTP) used and how the attacks met or failed to meet the terrorists’ goals of altering the outcome of the election.
Joint Chiefs of Staff
Joint Publication 3-13.3 Operations Security January 2012
The purpose of operations security (OPSEC) is to reduce the vulnerability of US and multinational forces from successful adversary exploitation of critical information. OPSEC applies to all activities that prepare, sustain, or employ forces. The OPSEC process is a systematic method used to identify, control, and protect critical information and subsequently analyze friendly actions associated with military operations.
Joint Chiefs of Staff
Joint Publication 3-13.2 Military Information Support Operations December 2011
Military information support operations (MISO) play an important role in DOD communications efforts through the planned use of directed programs specifically designed to support USG and DOD activities and policies. MISO are planned operations to convey selected information and indicators to foreign audiences to influence their emotions, motives, objective reasoning, and ultimately the behavior of foreign governments, organizations, groups, and individuals in a manner favorable to the originator’s objectives. Military information support (MIS) professionals follow a deliberate process that aligns commander’s objectives with an analysis of the environment; select relevant TAs; develop focused, culturally, and environmentally attuned messages and actions; employ sophisticated media delivery means; and produce observable, measurable behavioral responses.
Joint Chiefs of Staff
Joint Publication 3-13.1 Electronic Warfare February 2012
All modern forces depend on the electromagnetic spectrum (EMS). The military requirement for unimpeded access to, and use of, the EMS is the key focus for joint electromagnetic spectrum operations (JEMSO), both in support of military operations and as the focus of operations themselves. Electronic warfare (EW) is essential for protecting friendly operations and denying adversary operations within the EMS throughout the operational environment.
Joint Chiefs of Staff
Joint Publication 3-13.4 Military Deception January 2012
Specific guidance from the joint force commander (JFC) or higher authority during planning will determine the military deception (MILDEC) role in a joint operation. MILDEC is intended to deter hostile actions, increase the success of friendly defensive actions, or to improve the success of any potential friendly offensive action. Use of MILDEC during any phase of an operation should help to mislead adversaries as to the strength, readiness, locations, and intended missions of friendly forces. In combat situations, the focus is on driving the adversary to culmination and achieving the objectives defined by the JFC. In noncombat situations, the JFC seeks to dominate the situation with decisive operations designed to establish conditions for an early, favorable conclusion.
California, Intelligence Fusion Centers
(U//FOUO) Los Angeles Fusion Center: Liquid Carbon Dioxide Leaks Pose Risks to Public
Within the past year, first responders and members of the public have died of asphyxiation, or fallen ill, following accidental inhalation of concentrated carbon dioxide (CO2) gas in public locations. At least two recent incidents are connected with significant gas leaks caused by the failure of liquid CO2 lines connected to beverage dispensers in commercial facilities. Emergency personnel responding to medical or service calls can use signs and symptoms to determine possible CO2 exposure and correspondent risks to first responders.
U.S. Army
(U//FOUO) U.S. Army Regulation 190–13 Physical Security Program
This regulation implements DOD 5200.08–R and DODI 3224.03. It prescribes policies, procedures, and guidance to plan and implement the Department of the Army Physical Security Program. It provides guidance concerning requirements for and use of physical security equipment; the appointment of physical security officers and inspectors; the conduct of physical security inspections and surveys; the management of physical security credentials; the management and use of identification cards and badges; restricted areas; access control for installations and stand-alone facilities; and security forces.
Department of Homeland Security, United States
Senate Permanent Subcommittee on Investigations Federal Support for Fusion Centers Report
The Subcommittee investigation found that DHS-assigned detailees to the fusion centers forwarded “intelligence” of uneven quality – oftentimes shoddy, rarely timely, sometimes endangering citizens’ civil liberties and Privacy Act protections, occasionally taken from already-published public sources, and more often than not unrelated to terrorism. Congress directed the Department of Homeland Security (DHS) to lead this initiative. A bipartisan investigation by the Permanent Subcommittee on Investigations has found, however, that DHS’ work with those state and local fusion centers has not produced useful intelligence to support federal counterterrorism efforts.
Department of State
U.S. State Department Operations Center Overview Presentation
An overview presentation on the U.S. Department of State Operations Center from September 24, 2012.
Department of Homeland Security
DHS Privacy Policy for Operational Use of Social Media
This Instruction applies throughout DHS regarding the access to and collection, use, maintenance, retention, disclosure, deletion, and destruction of Personally Identifiable Information (PII) in relation to operational use of social media, with the exception of operational use of social media for: (a) communications and outreach with the public authorized by the Office of Public Affairs; (b) situational awareness by the National Operations Center; (c) situational awareness by Components other than the National Operations Center, upon approval by the Chief Privacy Officer following completion of a Social Media Operational Use Template; and (d) the conduct of authorized intelligence activities carried out by the Office of Intelligence and Analysis, the intelligence and counterintelligence elements of the United States Coast Guard, or any other Component performing authorized foreign intelligence or counterintelligence functions, in accordance with the provisions of Executive Order 12333, as amended.
Headline
Madrid and Athens Anti-Austerity Protest Photos September 2012
Department of Homeland Security
DHS Robotic Aircraft for Public Safety Request for Information
The Robotic Aircraft for Public Safety (RAPS) project will invite SUAS vendors to a chosen location and evaluate each system using key performance parameters under a wide variety of simulated but realistic and relevant real-world operational scenarios, such as law enforcement operations, search and rescue, and fire and hazardous material spill response. The SUAS vendors will provide technically mature, flight proven vehicles and their fully-integrated sensors for evaluation. Safety concerns will also be assessed such as the aircraft’s capability for safe flight in the event of a loss of communications between the aircraft and the ground controller.
United Nations
UNODC Estimating Illicit Financial Flows From Drug Trafficking and Transnational Organized Crimes
A United Nations Office on Drugs and Crime research report from October 2011 that “attempts to shed light on the total amounts likely to be laundered across the globe, as well as the potential attractiveness of various locations to those who launder money” and “examine the magnitude of illicit funds generated by drug trafficking and organized crime.”
National Security Agency
NSA Site M Environmental Impact Survey
The Department of Defense (DOD) has published the (Final) Environmental Impact Statement (EIS) for the proposed implementation of campus development initiatives and the construction of associated facilities for the National Security Agency (NSA) complex at Fort George G. Meade (Fort Meade), Maryland, dated September, 2010. The National Security Agency/Central Security Service (NSA/CSS) is a cryptologic intelligence agency administered as part of the DOD. It is responsible for the collection and analysis of foreign communications and foreign signals intelligence. For NSA/CSS to continue to lead the Intelligence Community into the next 50 years with state-of-the-art technologies and productivity, its mission elements will require new facilities and infrastructure.
Iran, United Nations
Mahmoud Ahmadinejad Speech to UN General Assembly Transcript September 26, 2012
Address by Mahmoud Ahmadinejad, President of the Islamic Republic of Iran, before the 67th session of the United Nations General Assembly on September 26, 2012.
Department of Health and Human Services
Department of Health and Human Services List of Terms for Monitoring Disease Outbreaks via Twitter
A document produced by the Department of Health and Human Services as part of their “Now Trending Challenge” to develop applications for monitoring disease outbreaks via Twitter. The document contains lists of various terms that are associated with a number of diseases from the common cold to diphtheria.