Author Archive for Public Intelligence

Archistrategos.

(U//FOUO) U.S. Army Military Intelligence Reference Guide

Currently, the intelligence warfighting function includes a formidable set of capabilities across all echelons from “mud-to-space.” This flexible force of personnel, organizations, and equipment collectively provides commanders with the timely, relevant, accurate, predictive, and tailored intelligence they need. We provide the intelligence that continuously supports the commander in visualizing the operational environment, assessing the situation, and directing military actions through ISR synchronization and the other intelligence tasks. The intelligence warfighting function is comprised of nine powerful intelligence disciplines. Eight of those disciplines essentially feed the discipline of all-source intelligence which in turn is focused on the commanders’ requirements. Technological advances have enabled single-discipline analysts to leverage other analysts and information and to conduct multi-discipline analysis to an extent not possible in the past. However, all-source intelligence is still the nexus that integrates information and intelligence from all units and the other intelligence disciplines.

(U//FOUO) U.S. Army Human Terrain Report: Afghan Tribal Structure Versus Iraqi Tribal Structure

Most US personnel that are serving in Afghanistan have already served a tour in Iraq and are accustomed to doing things “the Iraq way”. Many people are trying to apply the lessons learned in Iraq to Afghanistan, which in many cases is inappropriate. AF2 wants to provide a product to US units to compare and contrast Iraqi tribal structure and Pashtun tribal structure to prevent future missteps by US forces.

Do You Like Online Privacy? You May Be a Child Pornographer

The government says anyone who opposes federal plans to make electronic surveillance easier for police and spies is siding with child pornographers. It’s the first salvo in a battle that will resume Tuesday when the government reintroduces legislation that would expand online monitoring powers. The issue pits the desire of intelligence and law-enforcement officials to have easier access to information about Internet users against the individual’s right to privacy.

Sandia National Laboratories/Department of Energy Sensitive Country List

A sensitive country is one to which particular attention is given during the review and approval process for Foreign Visits & Assignments. Countries may be designated as sensitive for reasons of national security, nuclear nonproliferation, regional instability, threat to national economic security, or terrorism support. A foreign national is considered to be from a sensitive country if he/she is a citizen of a sensitive country or is employed by the government of an institution of a sensitive country.

(U//FOUO) DHS-FBI Warning: Terrorist Use of Vehicle Ramming Tactics

Terrorists overseas have suggested conducting vehicle ramming attacks—using modified or unmodified vehicles—against crowds, buildings, and other vehicles. Such attacks could be used to target locations where large numbers of people congregate, including sporting events, entertainment venues, or shopping centers. Vehicle ramming offers terrorists with limited access to explosives or weapons an opportunity to conduct a Homeland attack with minimal prior training or experience.

(U//FOUO) DHS London Officials Issue Heroin Anthrax Alert March 2010

On 5 February 2010, the UK Health Protection Agency (HPA)—an official British Government agency—announced the confirmation of one case in England of a heroin user testing positive for anthrax. HPA also said 19 cases of anthrax had been confirmed so far in Scotland and that the heroin, or a contaminated cutting agent mixed with the heroin, was the likely source of infection.

American, British, Canadian, Australian and New Zealand (ABCA) Armies Coalition Operations Handbook

Coalitions, which are created for limited purposes and for a set time, do not afford military planners the same political resolve and commonality of aim as alliances. Thus, planners must closely study the political goals of each participant as a precursor to detailed planning. Political considerations weigh more heavily with coalitions than with alliance operations. Coalition military operations are not new. The American, British, Canadian, Australian, and New Zealand (ABCA) nations have participated together in several coalition operations during the twentieth century. Since human nature has not changed, conflicts over territory, religion, politics, and economics, such as those that prompted previous military operations, will continue to be widespread. The precise role of armies in these operations will vary according to each political and military situation.

U.S. Army Whistleblower Report: Senior Military Leaders’ Loss of Integrity Wounds Afghan War Effort

Senior ranking US military leaders have so distorted the truth when communicating with the US Congress and American people in regards to conditions on the ground in Afghanistan that the truth has become unrecognizable. This deception has damaged America’s credibility among both our allies and enemies, severely limiting our ability to reach a political solution to the war in Afghanistan. It has likely cost American taxpayers hundreds of billions of dollars Congress might not otherwise have appropriated had it known the truth, and our senior leaders’ behavior has almost certainly extended the duration of this war. The single greatest penalty our Nation has suffered, however, has been that we have lost the blood, limbs and lives of tens of thousands of American Service Members with little to no gain to our country as a consequence of this deception.

(U//FOUO) Army National Guard Information Assurance (IA) Program Policy

This Policy provides Information Assurance (IA) policies and mandates procedures for implementing the Army National Guard (ARNG) IA Program. The ARNG IA program will implement the Department of Defense (DoD) IA program, DoD Instruction (DoDI) 8500.2, “Information Assurance Implementation,” IAW Army Regulation (AR) 25-2, “Information Assurance” chapter 1 g-8 to support the DoD Information Management Strategic Plan, (IMSP). This Policy supports the Federal Information Security Management Act, (FISMA) 2002 and any other federal guidelines as needed; and shall be consistent with today’s technological advancements, in a generic fashion to avoid dependency on specific technology.

(U//FOUO) U.S. Army Modular Brigade Augmented for Security Force Assistance Handbook

This hand book synthesizes current doctrine and emerging TTPs into a handbook for units assigned a Security Force Assistance (SFA) mission. Security Force Assistance is not a unit; it is a mission assigned to a unit. Army leaders will assign this mission to Modular brigades more frequently according to the realities of the operational environment. The Modular Brigade, with its broad and flexible command and control structure, is designed to conduct Full Spectrum Operations, which includes Security Force Assistance, but it requires augmentation and specific task organization to effectively accomplish Security Force Assistance tasks.

DHS-University of Maryland Study: Hot Spots of Terrorism and Other Crimes in the United States 1970 to 2008

While efforts are increasingly aimed at understanding and identifying “hot spots” of ordinary crime, little is known about the geographic concentration of terrorist attacks. What areas are most prone to terrorism? Does the geographic concentration of attacks change over time? Do specific ideologies motivate and concentrate terrorist attacks? Moreover, what factors increase the risk that an attack will occur in a particular area? Using recently released data from the Global Terrorism Database, we address these gaps in our knowledge by examining county-level trends in terrorist attacks in the United States from 1970 through 2008.

(U//FOUO) Joint Center for Operational Analysis (JCOA) Civilian Casualties (CIVCAS) Adaptive Learning for Afghanistan

Building on several previously completed studies of civilian casualties (CIVCAS) in Afghanistan, the US Joint Forces Command (JFCOM) Joint Center for Operational Analysis (JCOA) partnered with Ms. Sarah Sewall of Harvard University to conduct an independent and comprehensive assessment of civilian casualties, the Joint Civilian Casualty Study, published in August 2010. The Commander, International Security Assistance Force (COMISAF), responded to this assessment by stating that more work was needed to ensure that the DOTMLPF changes required to reduce and mitigate CIVCAS were institutionalized. Accordingly, COMISAF requested that JCOA, with the support of the Services, conduct a study to “examine the institutionalization of CIVCAS lessons learned into US forces’ preparation for deployment, with a focus on the unique context of Afghanistan.” That study, Adaptive Learning for Afghanistan (ALA), examined ways in which lessons and adaptations in theater were captured, shared, and incorporated into force preparation. In this respect, ALA was not “another CIVCAS study,” but rather, it used CIVCAS as a test case for characterizing the overall process of adaptive learning.

(U//FOUO) New Jersey Office of Homeland Security School Bomb Plot Warning

On January 25, 2012, police officers in Utah arrested two teenagers after discovering that they planned to bomb their high school. The plot was foiled because another student received suspicious text messages from one of the boys and notified school administrators. During the subsequent investigation, police were able to corroborate the initial tip. The two suspects had blueprints of the school and planned to steal a plane at a nearby airport after their attack. They told police they were learning to fly on a flight-simulator program on their home computers.

American, British, Canadian, Australian and New Zealand (ABCA) Armies Security Force Capacity Building Handbook

SFCB has come to play an increasingly important role in each of our armies over the last decade and will undoubtedly feature in operations spanning the spectrum of conflict in the future. Its affect on organization, training, equipping and doctrine has been felt to a greater or lesser extent by each of us and will help define recent conflicts and their effects. However, SFCB cannot be done in isolation. What must be borne in the military planner‘s mind from the outset is that SFCB is a part of the wider SSR campaign and as a consequence must be part of a comprehensive approach. Furthermore, if coalition partners are present, an extra layer of complexity is present and must be planned for. Failure to take these two aspects into account runs the risk of failure at worst or a fragmented HNSF as a result, at best. This handbook aims to assist the military planner in their approach to SFCB. It is aimed at both commanders and staff officers, primarily on brigade and divisional staffs, although it also has utility for those charged with training, mentoring and advising HNSF forces at the tactical level.

(U//FOUO) U.S. Marine Corps Partnering with Afghan National Security Forces (ANSF) Lessons Learned

The Marine Corps has a long and storied history of partnering, mentoring, and advising foreign militaries. Marines served as the officer corps of the Gendarmerie d’Haiti and integrated at platoon-level with South Vietnamese Popular Forces. These are only two of many possible examples, but they suffice to illustrate the diversity of relevant Marine Corps experience. This enduring legacy influences Marine counterinsurgency operations in Afghanistan as well as theater security cooperation exercises throughout the world.

ISAF CAAT Afghan National Security Forces (ANSF) Guidelines in Partnering for Transition

The level of partnership with ANSF units largely depends on the individual coalition commander’s discretion whether it is a partnered unit or an advisor team. Although this discretion is important to empower leaders on the ground, the current parameters in partnering guidance are very broad which leads to varying levels of effectiveness and consistency. Standardized guidelines would provide specific tasks (e.g. develop and conduct all planning and operations from a Joint TOC) to units designated as ANSF partners. Additionally, true embedded partnership improves ANSF development, mission accomplishment and force protection. The recommendations in this paper offer uniformed standards throughout diverse allied forces, assistance during RIP/TOA, improvement in the development of the Afghan forces, and a path to effective transition.

Do You Believe in Conspiracy Theories? You May Be a Terrorist

A flyer from a series created by the FBI and Department of Justice to promote suspicious activity reporting states that espousing conspiracy theories or anti-US rhetoric should be considered a potential indicator of terrorist activity. The document, part of a collection published yesterday by Public Intelligence, indicates that individuals who discuss “conspiracy theories about Westerners” or display “fury at the West for reasons ranging from personal problems to global policies of the U.S.” are to be considered as potentially engaging in terrorist activity. For an example of the kinds of conspiracy theories that are to be considered suspicious, the flyer specifically lists the belief that the “CIA arranged for 9/11 to legitimize the invasion of foreign lands.”

Do You Like Online Privacy? You May Be a Terrorist

A flyer designed by the FBI and the Department of Justice to promote suspicious activity reporting in internet cafes lists basic tools used for online privacy as potential signs of terrorist activity. The document, part of a program called “Communities Against Terrorism”, lists the use of “anonymizers, portals, or other means to shield IP address” as a sign that a person could be engaged in or supporting terrorist activity. The use of encryption is also listed as a suspicious activity along with steganography, the practice of using “software to hide encrypted data in digital photos” or other media. In fact, the flyer recommends that anyone “overly concerned about privacy” or attempting to “shield the screen from view of others” should be considered suspicious and potentially engaged in terrorist activities.

FBI “Communities Against Terrorism” Suspicious Activity Reporting Flyers

A collection of 25 flyers produced by the FBI and the Department of Justice are distributed to local businesses in a variety of industries to promote suspicious activity reporting. The fliers are not released publicly, though several have been published in the past by news media and various law enforcement agencies around the country. We have compiled this collection from a number of online sources.