Documents

(U//FOUO) Los Angeles Fusion Center: Liquid Carbon Dioxide Leaks Pose Risks to Public

Within the past year, first responders and members of the public have died of asphyxiation, or fallen ill, following accidental inhalation of concentrated carbon dioxide (CO2) gas in public locations. At least two recent incidents are connected with significant gas leaks caused by the failure of liquid CO2 lines connected to beverage dispensers in commercial facilities. Emergency personnel responding to medical or service calls can use signs and symptoms to determine possible CO2 exposure and correspondent risks to first responders.

(U//FOUO) U.S. Army Regulation 190–13 Physical Security Program

This regulation implements DOD 5200.08–R and DODI 3224.03. It prescribes policies, procedures, and guidance to plan and implement the Department of the Army Physical Security Program. It provides guidance concerning requirements for and use of physical security equipment; the appointment of physical security officers and inspectors; the conduct of physical security inspections and surveys; the management of physical security credentials; the management and use of identification cards and badges; restricted areas; access control for installations and stand-alone facilities; and security forces.

Senate Permanent Subcommittee on Investigations Federal Support for Fusion Centers Report

The Subcommittee investigation found that DHS-assigned detailees to the fusion centers forwarded “intelligence” of uneven quality – oftentimes shoddy, rarely timely, sometimes endangering citizens’ civil liberties and Privacy Act protections, occasionally taken from already-published public sources, and more often than not unrelated to terrorism. Congress directed the Department of Homeland Security (DHS) to lead this initiative. A bipartisan investigation by the Permanent Subcommittee on Investigations has found, however, that DHS’ work with those state and local fusion centers has not produced useful intelligence to support federal counterterrorism efforts.

DHS Privacy Policy for Operational Use of Social Media

This Instruction applies throughout DHS regarding the access to and collection, use, maintenance, retention, disclosure, deletion, and destruction of Personally Identifiable Information (PII) in relation to operational use of social media, with the exception of operational use of social media for: (a) communications and outreach with the public authorized by the Office of Public Affairs; (b) situational awareness by the National Operations Center; (c) situational awareness by Components other than the National Operations Center, upon approval by the Chief Privacy Officer following completion of a Social Media Operational Use Template; and (d) the conduct of authorized intelligence activities carried out by the Office of Intelligence and Analysis, the intelligence and counterintelligence elements of the United States Coast Guard, or any other Component performing authorized foreign intelligence or counterintelligence functions, in accordance with the provisions of Executive Order 12333, as amended.

DHS Robotic Aircraft for Public Safety Request for Information

The Robotic Aircraft for Public Safety (RAPS) project will invite SUAS vendors to a chosen location and evaluate each system using key performance parameters under a wide variety of simulated but realistic and relevant real-world operational scenarios, such as law enforcement operations, search and rescue, and fire and hazardous material spill response. The SUAS vendors will provide technically mature, flight proven vehicles and their fully-integrated sensors for evaluation. Safety concerns will also be assessed such as the aircraft’s capability for safe flight in the event of a loss of communications between the aircraft and the ground controller.

UNODC Estimating Illicit Financial Flows From Drug Trafficking and Transnational Organized Crimes

A United Nations Office on Drugs and Crime research report from October 2011 that “attempts to shed light on the total amounts likely to be laundered across the globe, as well as the potential attractiveness of various locations to those who launder money” and “examine the magnitude of illicit funds generated by drug trafficking and organized crime.”

NSA Site M Environmental Impact Survey

The Department of Defense (DOD) has published the (Final) Environmental Impact Statement (EIS) for the proposed implementation of campus development initiatives and the construction of associated facilities for the National Security Agency (NSA) complex at Fort George G. Meade (Fort Meade), Maryland, dated September, 2010. The National Security Agency/Central Security Service (NSA/CSS) is a cryptologic intelligence agency administered as part of the DOD. It is responsible for the collection and analysis of foreign communications and foreign signals intelligence. For NSA/CSS to continue to lead the Intelligence Community into the next 50 years with state-of-the-art technologies and productivity, its mission elements will require new facilities and infrastructure.

U.S. Air Force Lawful Intercept Capability for the Government of Iraq Statement of Work

This Statement of Work (SOW) involves purchasing and installing a Lawful Intercept (LI) capability for the Government of Iraq (GOI). The capability shall include: providing installation, system engineering, system administration, terminal operations support, and mentoring/training Iraqi system operators. The solution should include a disaster recovery feature/configuration that would replicate (backup) the server and database storage at a physically separate facility. LI will provide the GOI a powerful communications intelligence tool to assist in combating criminal organizations and insurgencies by supporting evidence-based prosecutions, warrant-based targeting, and intelligence-based operations.

Clean IT Project Detailed Recommendations for Combating Terrorist Use of the Internet August 2012

This document contains detailed recommendations on how to implement the best practices identified in the Clean IT project. It will be developed further in the months ahead. After the end of the Clean IT project it will only be shared with organizations that have committed to implementing the best practices. It will be developed further with these organizations participating in the Clean IT permanent public-private dialogue platform.

Senate Permanent Subcommittee on Investigations Statement on Corporate Offshore Profit Shifting

America stands on the edge of a fiscal cliff. This challenge lends new urgency to a topic this subcommittee has long investigated: how U.S. citizens and corporations have used loopholes and gimmicks to avoid paying taxes. This subcommittee has demonstrated in hearings and comprehensive reports how various schemes have helped shift income to offshore tax havens and avoid U.S. taxes. The resulting loss of revenue is one significant cause of the budget deficit, and adds to the tax burden that ordinary Americans bear.

U.S. State Department OSAC Libya Reports May 2011-September 2012

The group or individuals responsible for the attack on the Benghazi consulate remains unknown. It is also unclear if the attack was premeditated or simply a demonstration that spun out of control. Following the overthrow of Muammar Qaddafi and the ensuing civil war, Libya has been awash with small arms and light weapons. The use of such arms at the demonstration does not necessarily indicate a pre-meditated, coordinated attack. Online jihadi groups have claimed the attack was due to a statement released by al-Qa’ida leader Ayman al-Zawahiri regarding the earlier death of another al-Qa’ida leader, Abu Yahya al-Libi. Others have suggested that the attack was pre-meditated to coincide with the 9/11 anniversary in the United States. Neither of those claims has been substantiated. Until more evidence comes out, OSAC is unable to conclude whether this was a pre-meditated, planned, and coordinated assault on the Consulate.

(U//FOUO) Joint DoDIIS/Cryptologic SCI Information Systems Security Standards Revision 3

The policy of the U.S. Government is that all classified information must be appropriately safeguarded to assure the confidentiality, integrity, and availability of that information. This document provides procedural guidance for the protection, use, management, and dissemination of Sensitive Compartmented Information (SCI), and is applicable to the Department of Defense (DoD) to include DoD components and Government contractors who process SCI.

(U//FOUO) U.S. Joint Forces Command Military Support to Economic Normalization Draft Handbook

This handbook serves as a bridge between current operational-level doctrine and tactical-level employment at the joint force level. It is intended to inform doctrine writers, educators, and trainers about military support to economic normalization. It supplements, not replaces, existing joint or Service doctrine. The handbook is designed for use by personnel assigned to (or participating in) a joint operation and provides guidance at the operational level on the range of functions required to secure economic stability during or in the immediate post-conflict. Where doctrine is absent, it also presents definitions and constructs from the interagency and international community that have been harmonized with joint doctrine and discusses those ―best practices‖ that have proven of value during on-going military operations, exercises, and experimentation.

Restricted U.S. Army Special Operations Forces Noncombatant Evacuation Operations

Field Manual (FM) 3-05.131 establishes Army special operations forces (ARSOF) doctrine for planning, coordinating, and executing noncombatant evacuation operations (NEOs) across the entire continuum of operational environments. NEOs are inherently joint operations. History demonstrates that joint forces conducted the vast majority of NEOs. This manual describes ARSOF operating within that context, thus the content of this manual mixes joint and Army terminology where appropriate. This manual does not duplicate or supplant established doctrine dealing with tactical or strategic operations, but it does provide a specific framework to apply that doctrine. Commanders tasked to conduct NEOs should ensure that their planning staff is familiar with referenced publications.

(U//FOUO) U.S. Bomb Data Center Assessment: Criminal Bombers Use Curiosity and Greed to Lure Victims

Some criminal bombers exploited their victims’ sense of greed or general curiosity by hiding improvised explosive devices (IEDs) inside common everyday items and leaving them as discarded merchandise to be found by the victim. Victims then perceived these situations as an unexpected opportunity to obtain an object of value with no associated cost. The devices utilized victim-operated switches rather than command or time switches. While a seemingly discarded working tool or item could be considered an enticement in itself, the lack of a written note or similar enticement distinguished these bombing incidents from other IEDs that utilized written messages to bait the victim. Recent bombing incidents in Phoenix and Glendale, Arizona, might be another example of this tactic.

(U//LES) FBI Going Dark: Law Enforcement Problems in Lawful Surveillance

‘Going Dark’ is a Law Enforcement (LE) initiative to address the gap between the legal authority and practical ability of LE to conduct lawfully-authorized electronic surveillance. Problems highlighted by the Going Dark initiative include LE’s difficulty in receiving information from some technology companies, and criminal’s use of advanced technologies and techniques that can complicate carrying out of lawfully-authorized court orders to conduct electronic surveillance.

Restricted U.S. Army Drills for Chemical, Biological, Radiological or Nuclear (CBRN) Domestic Support Missions

This drill book provides platoon, squad, and team leaders with standardized drills that are designed for use by trainers at the platoon and squad level. Standardized drills are essential to the success of platoon leaders, trainers, and small-unit leaders. These drills provide the performance measures, standards, and sequential procedures that will help guide the unit through training tasks for which doctrine is just now being developed. Chemical Corps platoons and squads must be able to perform these drills quickly, effectively, and to standard at all times.

(U//FOUO) National Counterterrorism Center Advisory: Homegrown Violent Extremists Targeting Law-Enforcement Officers

Some homegrown violent extremists (HVE) have targeted US law-enforcement entities and have used publicly available information to counter these entities’ CT tactics and security practices. Law-enforcement entities are being identified by these extremists as both strategic targets and targets of opportunity, mainly because a core element of HVE subculture perceives that persecution by US law enforcement reflects the West’s inherent aggression toward Islam, which reinforces the violent opposition by HVEs to law enforcement.

(U//FOUO) U.S. Army Afghanistan Civilian Casualty Prevention Handbook

The U.S. military has long been committed to upholding the law of armed conflict and minimizing collateral damage. This includes the killing or wounding of noncombatant civilians — described in this handbook as civilian casualties or CIVCAS — as well as damage to facilities, equipment, or other property. Due to several factors, the impact of CIVCAS has increased to the point that single tactical actions can have strategic consequences and limit overall freedom of action. These factors include: the increased transparency of war, where tactical actions can be recorded and transmitted worldwide in real time; increased expectations for the United States’ conduct of war in light of improved precision and overall capabilities; and the enemy exploitation of CIVCAS to undermine U.S. legitimacy and objectives.