Author Archive for Public Intelligence

Archistrategos.

(U//FOUO//LES) NGIC Gangs Targeting Law Enforcement for Weapons Theft

(U//LES) Gang members and criminals nationwide are targeting law enforcement officials, military, government vehicles, and residences in search of weapons, equipment, police badges, body armor, and uniforms.a These incidents suggest that some gangs are becoming more brazen, tactical, and willing to engage law enforcement and rival gang members in potentially lethal encounters. The National Gang Intelligence Center assesses that these thefts could also allow gang members and criminals to impersonate law enforcement officers to gain better access to their targets.

FEMA Director Battle Book

The purpose of this ―battle book is to provide the FEMA Director with background information and recommended checklist actions on scenarios that may require a significant response operation under the National Response Plan. This document is intended to serve as a ―one stop reference that includes information on the agency’s emergency teams and resources.

(U//FOUO) DHS Project 12 Report: Critical Infrastructure Public-Private Partnerships

The United States relies on critical infrastructure and key resources (CIKR) for government operations and the health and safety of its economy and its citizens. The President issued National Security Presidential Directive 54 (NSPD-54)/Homeland Security Presidential Directive 23 (HSPD-23), which formalized the Comprehensive National Cybersecurity Initiative (CNCI). NSPD-54/HSPD-23 directs the Secretary of Homeland Security, in consultation with the heads of other Sector-Specific Agencies, to submit a report detailing the policy and resource requirements for improving the protection of privately owned U.S. critical infrastructure networks. The report is required to detail how the u.S. Government can partner with the private sector to leverage investment in intrusion protection capabilities and technology, increase awareness about the extent and severity of cyber threats facing critical infrastructure, enhance real-time cyber situational awareness, and encourage intrusion protection for critical information technology infrastructure.”

Senate Report on Private Security Contractor Oversight in Afghanistan

In 2009, the Senate Armed Services Committee initiated an inquiry into private security contractors operating in Afghanistan. In the course of the inquiry, the Committee reviewed hundreds of thousands of pages of documents from the Departments of Defense and State, the U.S. Agency for International Development, and private security contractors. Committee staff conducted more than 30 interviews of military and contractor personnel and solicited written answers from several others. This report is a product of that inquiry.

(U//FOUO) Asymmetric Warfare Group “Attack The Network” Counterinsurgency Methodology

This document continues discussion on effective targeting methods (lethal and non-lethal) at the Battalion and Brigade level. It continues dialogue on Attacking the Network by further describing Center of Gravity and Critical Vulnerability analysis themes and their link to network modeling. This document also discusses the use of detailed, Observable Indicators to focus Intelligence Surveillance and Reconnaissance assets against the enemy’s vulnerabilities. A modified Intelligence Synchronization Matrix (ISM) ensures integration and synchronization to the friendly course of action in a Counter-Insurgency environment. Using doctrinal and situational templates and a modified ISM helps the S2 understand the insurgent networks operating in his Area of Interest, focus assets against the known or suspected Critical Vulnerabilities, and synchronize ISR to give the commander the information he needs at the Decision Points.

CJCS Defense Support of Civil Authorities (DSCA) Exord

THE PURPOSE OF THIS EXORD IS TO DELEGATE LIMITED APPROVAL AUTHORITY TO SUPPORTED COMBATANT COMMANDERS, WHO HAVE DSCA RESPONSIBILITIES, FOR ROUTINE PA REQUESTS FOR ASSISTANCE (RFA), INCLUDING THE TYPES OF RFA HISTORICALLY SUBMITTED BY PA, TO PROVIDE A RAPID AND FLEXIBLE DOD RESPONSE TO FEDERAL PRIMARY AGENCIES FOR POTENTIAL OR ACTUAL EMERGENCIES AND OR DISASTERS WITHIN THE UNITED STATES, ITS TERRITORIES, POSSESSIONS, AND PROTECTORATES.

DoD Defense Support to Civil Authorities Handbook

The most legally sensitive function in DSCA is Military Law Enforcement. Consequently, to prevent violations of the law, all military personnel should be educated on MLE. The main legal obstacle to the use of the military for law enforcement is the Posse Comitatus Act (PCA), discussed briefly in Section 2.3.1 of this chapter. (For more detail on PCA, see Annex A.) The PCA affects National Guard (either in State Active Duty (SAD) or Title 32) and federal forces (Title 10) differently. Thus, it is very important to understand the status of military personnel prior to mission assignment.

Reut Institute Report on Gaza Flotilla and Israel’s “Political Firewall”

This case-study deals with a strategic political strike against the State of Israel that was planned without interruption since February 2009 and materialized on May 31, 2010. Known as the Gaza Flotilla, this effort exceeded the expectations of its organizers in causing tangible and significant damage to Israel. Planning of the Gaza Flotilla was carried out over the internet and in public conferences by non-governmental organizations (NGOs) primarily operating from major cities of countries friendly to Israel, including London, Dublin or San Francisco. In the broader context, the Gaza Flotilla was just the tip of the iceberg. It is one incident out of many in a campaign entitled ‘Lifeline to Gaza’ designed to break the ‘siege’ of Gaza. The campaign itself is one of several being waged against Israel. Others include the Boycott, Divestment, Sanctions (BDS) Movement, the ‘lawfare’ strategy, and the Durban conferences.

DoD Biometrics HIIDE Device User Guide

The HIIDE includes two separate cameras for imaging an individual’s irises and face, and a sensor pad for scanning fingerprints. These three sensors capture the minute details of a subject’s iris, fingerprint and face, as digital photographs, or “scans.” The HIIDE™ translates the photographic data into a binary code and links that code to biographic data about the individual, such as name and a personal identification number. The HIIDE then processes the code and biographic data and builds a portfolio for the individual that is stored in a database. Once an individual has had a record created, or has been “enrolled,” that individual is part of the HIIDE database. One can “recognize,” or confirm that individual’s identity in the future by comparing a live scan of the subjects: iris, fingerprints and/or face to the biometrics contained in the database.

(U//LES) ATF Project Gunrunner Mexican Cartel Strategy

Based on the areas in Mexico controlled by the Gulf, Zetas, and Sinaloa cartels; the locations of U.S.-sourced firearm recoveries in Mexico; and the U.S. locations where firearms recovered in Mexico are most often acquired, the Houston and Phoenix Field Divisions will be primarily responsible for investigating trafficking schemes associated with these cartels. However, this strategy is not intended to limit the initiative of any ATF field division and in fact recognizes the increasingly important role played by non-Southwest border field divisions in combating firearms and explosives trafficking to Mexico. As a result, all ATF field divisions are expected to initiate investigations on cartels and/or their surrogates operating in their geographic areas of responsibility; however, investigations pertaining to the Gulf, Zetas, and Sinaloa cartels must be deconflicted and closely coordinated with the Houston and Phoenix Field Divisions.

US Financial Crimes Enforcement Network Cross-Border Electronic Transmittals of Funds Reporting System Proposals

FinCEN, a bureau of the Department of the Treasury (Treasury), to further its efforts against money laundering and terrorist financing, and as required by 31 U.S.C. § 5318(n), is proposing to issue regulations that would require certain banks and money transmitters to report to FinCEN transmittal orders associated with certain cross-border electronic transmittals of funds (CBETFs). FinCEN is also proposing to require an annual filing with FinCEN by all banks of a list of taxpayer identification numbers of accountholders who transmitted or received a CBETF.

(U//FOUO) Joint Battle Management Command and Control Roadmap 2003 Draft

Central to the transformation of U.S. Forces are development and fielding of integrated Joint Battle Management Command and Control (JBMC2) capabilities to enable U.S. forces to collaboratively plan and rapidly share an accurate picture of the battlespace. This roadmap provides an overview of JBMC2 capability and Global Information Grid (GIG) development efforts in the Department of Defense. It is intended to assist policymakers and decisionmakers in aligning and integrating Service and Combatant Command doctrine, concept development and acquisition efforts. The goal of this roadmap is to provide a coherent and executable plan for fielding integrated JBMC2 capabilities to U.S. Forces.

National Guard Domestic Law Enforcement Operations Guide

a. Consolidate the policy and responsibilities for National Guard law enforcement support and mission assurance operations.

b. Define consistent terminology and concepts for use by the National Guard Bureau and the National Guard of the several states for the planning and conduct of domestic law enforcement support and mission assurance operations.

c. Provide direction for the planning and reporting requirements for National Guard domestic law enforcement support and mission assurance operations.

d. Define National Guard capabilities for domestic law enforcement support and mission assurance operations.

Oracle Intelligence Fusion Center Technology White Paper

State and local law enforcement agencies are engaged in the day-to-day business of fighting crime and terrorism. A federal government, post event analysis concluded that sufficient information existed such that law enforcement officials could have intercepted the terrorists that flew aircraft into the World Trade Center. This “connecting-the-dots” philosophy relies heavily on real-time information integrated into a single comprehensive 360 view of the environment. The development and funding of intelligence fusion centers is a direct result of a need for better, more integrated information about suspects, locations, and conveyances that may be used in the planning or commission of a crime, including a terrorist act. The concept of the fusion center as an all source production of criminal and intelligence information is a good one. The weakness in the approach is the over reliance upon individuals staffing the fusion centers. In any business, labor costs are one of the biggest burdens to the profitability of the business. While current technology cannot replace the human brains ability for abstract thought and analysis, technology can provide methods and means for the collection, integration, analysis, and dissemination of all source intelligence to enhance fusion center operational efficiencies.

Homeland Security Guidance for Response to a Nuclear Detonation

The purpose of this guidance is to provide emergency planners with nuclear detonation specific response recommendations to maximize the preservation of life in the event of an urban nuclear detonation. This guidance addresses the unique effects and impacts of a nuclear detonation such as scale of destruction, shelter and evacuation strategies, unparalleled medical demands, management of nuclear casualties, and radiation dose management concepts. The guidance is aimed at response activities in an environment with a severely compromised infrastructure for the first few days (e.g., 24 – 72 hours) when it is likely that many Federal resources will still be en route to the incident.

(U//FOUO) DHS, NCTC, FBI Homegrown Extremist Threat Reporting Brochure

The attempted bombing in Times Square on 1 May 2010 highlights the need to identify Homegrown Violent Extremists before they carry out a terrorist act. The ability of the bomber to operate under the radar demonstrates the difficulties associated with identifying terrorist activity and reinforces the need for law enforcement, at all levels, to be vigilant and identify individuals who are planning violence or other illegal activities in support of terrorism.

(U//FOUO) FEMA Haiti Earthquake Response Report

The United States (U.S.) Government, along with other nations, international organizations, and nongovernmental organizations, rushed to provide critical life-saving and other assistance to Haiti. President Barack Obama directed the U.S. Agency for International Development (USAID) to lead the coordination of the U.S. Government assistance to Haiti. USAID worked with other Federal agencies to organize and deliver assistance to the victims of the earthquake. The Department of Homeland Security (DHS) deployed over 1,000 personnel from various components to support U.S. assistance in Haiti. As of April 2, 2010, the U.S. Government had provided over $1 billion in assistance to Haiti.