Author Archive for Public Intelligence

Archistrategos.

(U//FOUO) Army Unauthorized Information Dissemination Safeguards in Response to WikiLeaks

(U/FOUO) 1. ALL ARMY ACTIVITIES ARE DIRECTED TO IMMEDIATELY REVIEW AND REVALIDATE WHO HAS SYSTEM ADMINISTRATOR(SA)/POWER USER PRIVILEGES. IN ACCORDANCE WITH (IAW) REF A, THESE PERSONNEL SHALL BE GRANTED THE MINIMUM SET OF PRIVILEGES REQUIRED TO PERFORM THEIR JOBS AND NOTHING MORE. ALL ACTIVITIES MUST ENSURE THAT THEY HAVE IDENTIFIED THESE PERSONNEL AND THAT NO OTHER PERSONNEL HAVE THESE PRIVILEGES. THIS IS KEY TO PRECLUDING UNAUTHORIZED DOWNLOADING AND DISSEMINATION OF SOFTWARE AND INFORMATION.

(U//FOUO) Army WikiLeaks Warning: Classified Public Information

ARMY PERSONNEL MUST BE VIGILANT WITH REGARD TO THE INFORMATION POSTED ON THE WIKILEAKS WEBSITE AND ANY OTHER WEBSITE THAT PURPORTS TO PUBLISH CLASSIFIED INFORMATION. VIEWING, DOWNLOADING OR PRINTING INFORMATION FROM THE WEBSITE COULD POTENTIALLY EXPOSE ARMY NETWORKS TO SENSITIVE DATA OR CREATE SITUATIONS IN WHICH DATA IS IMPROPERLY SAFEGUARDED THUS HARMING OUR ABILITY TO CONDUCT MISSIONS VITAL TO OUR NATIONAL DEFENSE. INFORMATION MARKED AS CLASSIFIED BUT IN THE PUBLIC DOMAIN IS NOT CONSIDERED DECLASSIFIED UNTIL ASSESSED BY THE APPROPRIATE ORIGINAL CLASSIFICATION AUTHORITY AND A DETERMINATION ON ITS DISPOSITION AND CONTINUED CLASSIFICATION IS RENDERED.

(U//FOUO) TSA Transportation Suspicious Incident Report (TSIR) August 2010

(U//FOUO) The vast majority of suspicious incidents are not terrorism related. Incident reporting continues to reveal most involve members of the traveling public who do not have intent to cause harm. Intoxicated passengers, people traveling without proper identification or with propaganda materials, and persons with mental health needs are generally not considered suspicious and are generally not included in the weekly summary. However, some incidents are more serious and are reported for situational awareness. Incidents involving notable drug or weapons concealment, possible surveillance, laser targeting of aircraft, possible insider collusion, exploitable gaps in security, and some unusual behaviors at transportation venues are discussed as they may involve technologies or tactics which may lend insight to future terrorist tradecraft.

(U//FOUO) Air Force Wing Leadership Guide to the Air and Space Expeditionary Force (AEF)

The basic concept of the AEF we use today was born of necessity after years of rotations between Operations Northern Watch and Southern Watch. High operations tempo (OPSTEMPO) forced us to update our Air Force-wide system of organizing, scheduling and presenting our forces to combatant commanders (CCDRs). Launched in 1998 by Gen Mike Ryan, CSAF, Cycle 1 of the AEF was 15 months long and included approximately 60,000 Airmen. Today the AEF operates on a 24-month schedule and includes over 300,000 Airmen. It remains fl exible to accommodate CCDR’s needs, whether for 4 months, 6 months, or 365 days.

James Lee Website, Manifesto and Reality Show Treatment

This is an idea for a reality-game show called “Race to Save the Planet.” This is a show where contestants would come from all over to compete with each other and come up with ideas to save the planet. The idea here is to use human inventiveness to save the planet from the environmental destruction it’s facing. People competing can either have completely new ideas on how to save the planet, or they can build on another person’s idea and make that original idea better. The persons coming up with the good ideas will win cash prizes as incentives. People who build on another person’s ideas will also receive prizes for doing so, AND the persons whose idea was built on will also receive a commission for his original idea and future commissions whenever his idea is used or improved.

Persistent Threat Detection System (PTDS)

The Persistent Threat Detection System (PTDS) is a tethered aerostat-based system that has been in use by the U.S. Army since 2004. According to the PTDS is equipped with multi-mission sensors to provide long endurance intelligence, surveillance, reconnaissance and communications in support of coalition forces in Afghanistan and Iraq. According to information provided by the manufacturer, Lockheed Martin, the PTDS “leverages a wide-area, secure communications backbone for the integration of threat reporting from multiple available sensors. The system’s sensor integration architecture supports the automated interoperability between tactical/theater surveillance assets and the dissemination of threat data to operational forces to aid interdiction of hostile fires and unconventional threats.”

(U//FOUO) U.S. Army Persistent Threat Detection System (PTDS) Tethered Aerostat Specifications

This document specifies the performance of the Baseline and Tactical Persistent Threat Detection System (PTDS). Section 3 specifies the requirements for the Baseline PTDS and Section 4 specifies the requirements for the Tactical PTDS (T-PTDS). Throughout this specification, the acronym PTDS (without B- or T-) applies to both the Baseline PTDS and Tactical PTDS.

(U//FOUO) DHS “Red Cell” Report: Thinking Beyond Mass Transit For Next Homeland Attack

A Homeland strike soon after the London attacks is conceivable but unlikely, and if and when it comes, it could just as well be on other “soft targets” as on mass transit. These were the conclusions of 18 leading academic terrorism experts, former senior National Security Council and DHS officials, mass transit security specialists, and other nongovernmental experts and creative thinkers polled by the DHS Analytic Red Cell immediately after the July 7 attacks.

UN/World Bank Afghanistan Drug Industry Report

The magnitude and importance of Afghanistan’s opium economy are virtually unprecedented and unique in global experience —it has been roughly estimated as equivalent to 36% of licit (i.e. non-drug) GDP in 2004/05, or if drugs are also included in the denominator, 27% of total drug-inclusive GDP (see Chapter 2). The sheer size and illicit nature of the opium economy mean that not surprisingly, it infiltrates and seriously affects Afghanistan’s economy, state, society, and politics. It generates large amounts of effective demand in the economy, provides incomes and employment including in rural areas (even though most of the final “value” from Afghan opium accrues outside the country), and supports the balance of payments and indirectly (through Customs duties on drug-financed imports) government revenues. The opium economy by all accounts is a massive source of corruption and undermines public institutions especially in (but not limited to) the security and justice sectors. There are worrying signs of infiltration by the drug industry into higher levels of government and into the emergent politics of the country. Thus it is widely considered to be one of the greatest threats to state-building, reconstruction, and development in Afghanistan.

Washington Post Censors Article About Half of Karzai’s Palace Being On CIA Payroll

The Washington Post has changed significant portions of an article published earlier today regarding the CIA’s payment of large numbers of people within Hamid Karzai’s administration in Afghanistan. These changes occur mostly in the beginning of the article and substantially manipulate its content. Most notable among the changes is the complete elimination of a quote describing how “half of Karzai’s palace” is on the CIA payroll. This quote, from an anonymous U.S. government official, was replaced with a paraphrased statement that “a significant number” of officials in Karzai’s administration are paid by the CIA. This alteration is followed by a quote from a CIA spokesman, which does not appear in the original article, who says that the “anonymous source appears driven by ignorance, malice or both.” Another significant quote from this anonymous source, detailing how Kazai is “blind to about 80 percent of what’s going on below him”, was also completely eliminated from the article. There are also a number of smaller changes all of which are designed to eliminate the perception of ignorance, malfeasance, and public perception that the Afghan government is almost wholly owned by the CIA.

(U//LES) Northwest HIDTA Washington State Gang Intelligence Bulletin

Outlaw Motorcycle (OMG) and Street Gangs have been active for several years in Washington State. Both Outlaw Motorcycle Gangs (OMG) and Street Gangs have now become entrenched in the region. Street Gangs are involved in a variety of crimes to include drug trafficking, fraud, and prostitution, and have formed alliances with other gangs. They often serve as distribution networks for Mexican National Drug Trafficking Organizations (DTOs). Gang membership and affiliation continue to rise in Washington State. Many gangs have infiltrated Indian Country and cooperated with DTOs, which has enabled them to recruit additional members. Both street gangs and OMGs pose a serious threat to the safety of law enforcement personnel and to the safety of local communities.

Florida Multi-Year Training & Exercise Plan 2011-2013

The purpose of the Multi-Year Training and Exercise Plan (MYTEP) is to provide a follow-on companion document to Florida‟s Domestic Security Strategic Plan. It is a living document that will be updated and refined annually. The MYTEP provides a roadmap for Florida to follow in accomplishing the priorities and goals described in the Florida‟s Domestic Security Strategic Plan. Each State Priority is linked to a corresponding National Priority, and, if applicable, an Improvement Plan (IP) action. The priority is further linked to the associated target capabilities that would facilitate accomplishment of the priority and the training and exercises that will help the jurisdiction obtain those capabilities and achieve that priority.

INTERPOL DNA Data Exchange and Practice Handbook

Globalization and advances in technology allow criminals to commit crimes across international borders with greater ease than ever before. With criminal methods and tactics changing continuously, the tools used to fight crime also need to keep pace. One area where cutting-edge developments have emerged is that of the use of DNA evidence, meaning that ethics and best practice of DNA profiling now need to be addressed on a global scale. At INTERPOL, we are doing just that; assisting the law enforcement and forensic community by supporting, facilitating, and promoting the use of DNA analysis on a national, regional and international level.

USMC Online Social Media Guidance for Unofficial Internet Posts

Marines are personally responsible for all content they publish on social networking sites, blogs, or other websites. In addition to ensuring Marine Corps content is accurate and appropriate, Marines also must be thoughtful about the non-Marine related content they post, since the lines between a Marine’s personal and professional life often blur in the online space. Marines must be acutely aware that they lose control over content they post on the Internet and that many social media sites have policies that give these sites ownership of all content and information posted or stored on those systems. Thus Marines should use their best judgment at all times and keep in mind how the content of their posts will reflect upon themselves, their unit, and the Marine Corps.

(U//FOUO) U.S. Army Tactical Combat Casualty Care Handbook

Tactical combat casualty care (TCCC) is the pre-hospital care rendered to a casualty in a tactical, combat environment. The principles of TCCC are fundamentally different from those of traditional civilian trauma care where most medical providers and medics train. These differences are based on both the unique patterns and types of wounds that are suffered in combat and the tactical conditions medical personnel face in combat. Unique combat wounds and tactical conditions make it difficult to determine which intervention to perform at what time. Besides addressing a casualty’s medical condition, responding medical personnel must also address the tactical situation faced while providing casualty care in combat. A medically correct intervention performed at the wrong time may lead to further casualties. Put another way, “good medicine may be bad tactics,” which can get the rescuer and casualty killed. To successfully navigate these issues, medical providers must have skills and training oriented to combat trauma care, as opposed to civilian trauma care.

(U//FOUO) U.S. Army “Unit RESET” Redeployment Handbook

For purposes of this handbook, unit RESET is the process a unit uses to plan and execute those critical tasks needed to restore the unit to combat readiness after redeployment. This process must be carefully planned and synchronized by all stakeholders, beginning with actions a unit sets in place before the unit deploys. The unit follows the RESET model published in Army RESET ordersand executes RESET tasks while still in theater to redeploy and return the unit to collective training capability as quickly as possible. This enormous task is complex and requires detailed planning, clear communication and intent, and strong unit leadership not only from the unit conducting RESET but also from those supporting the mission (e.g., garrison, contractors, and other Department of Defense organizations). The goal is returning the unit to combat readiness quickly, efficiently, and—most importantly—safely.

(U//FOUO) Commander’s Emergency Response Program (CERP) Handbook

The Commander’s Emergency Response Program (CERP) has become a critical capability in the commander’s toolbox for conducting stability operations. CERP funds provide tactical commanders a means to conduct multiple stability tasks that have traditionally been performed by U.S., foreign, or indigenous professional civilian personnel or agencies. These tasks include but are not limited to the reconstruction of infrastructure, support to governance, restoration of public services, and support to economic development. This handbook focuses on basic tactics, techniques, and procedures (TTP) for the application of the CERP. Its intended audience is the brigade, battalion, and provincial reconstruction team commander and staff. This handbook is based on lessons learned and best practices in use today in both Iraq and Afghanistan and identifies the training, planning, and operational procedures required to fund projects and services the commander requires during the conduct of stability operations. This handbook also provides the TTP to guide the commander through the regulatory and administrative requirements of the CERP.