Documents

(U//FOUO) TSA Transportation Suspicious Incident Report (TSIR) August 2010

(U//FOUO) The vast majority of suspicious incidents are not terrorism related. Incident reporting continues to reveal most involve members of the traveling public who do not have intent to cause harm. Intoxicated passengers, people traveling without proper identification or with propaganda materials, and persons with mental health needs are generally not considered suspicious and are generally not included in the weekly summary. However, some incidents are more serious and are reported for situational awareness. Incidents involving notable drug or weapons concealment, possible surveillance, laser targeting of aircraft, possible insider collusion, exploitable gaps in security, and some unusual behaviors at transportation venues are discussed as they may involve technologies or tactics which may lend insight to future terrorist tradecraft.

(U//FOUO) Air Force Wing Leadership Guide to the Air and Space Expeditionary Force (AEF)

The basic concept of the AEF we use today was born of necessity after years of rotations between Operations Northern Watch and Southern Watch. High operations tempo (OPSTEMPO) forced us to update our Air Force-wide system of organizing, scheduling and presenting our forces to combatant commanders (CCDRs). Launched in 1998 by Gen Mike Ryan, CSAF, Cycle 1 of the AEF was 15 months long and included approximately 60,000 Airmen. Today the AEF operates on a 24-month schedule and includes over 300,000 Airmen. It remains fl exible to accommodate CCDR’s needs, whether for 4 months, 6 months, or 365 days.

James Lee Website, Manifesto and Reality Show Treatment

This is an idea for a reality-game show called “Race to Save the Planet.” This is a show where contestants would come from all over to compete with each other and come up with ideas to save the planet. The idea here is to use human inventiveness to save the planet from the environmental destruction it’s facing. People competing can either have completely new ideas on how to save the planet, or they can build on another person’s idea and make that original idea better. The persons coming up with the good ideas will win cash prizes as incentives. People who build on another person’s ideas will also receive prizes for doing so, AND the persons whose idea was built on will also receive a commission for his original idea and future commissions whenever his idea is used or improved.

Persistent Threat Detection System (PTDS)

The Persistent Threat Detection System (PTDS) is a tethered aerostat-based system that has been in use by the U.S. Army since 2004. According to the PTDS is equipped with multi-mission sensors to provide long endurance intelligence, surveillance, reconnaissance and communications in support of coalition forces in Afghanistan and Iraq. According to information provided by the manufacturer, Lockheed Martin, the PTDS “leverages a wide-area, secure communications backbone for the integration of threat reporting from multiple available sensors. The system’s sensor integration architecture supports the automated interoperability between tactical/theater surveillance assets and the dissemination of threat data to operational forces to aid interdiction of hostile fires and unconventional threats.”

(U//FOUO) U.S. Army Persistent Threat Detection System (PTDS) Tethered Aerostat Specifications

This document specifies the performance of the Baseline and Tactical Persistent Threat Detection System (PTDS). Section 3 specifies the requirements for the Baseline PTDS and Section 4 specifies the requirements for the Tactical PTDS (T-PTDS). Throughout this specification, the acronym PTDS (without B- or T-) applies to both the Baseline PTDS and Tactical PTDS.

(U//FOUO) DHS “Red Cell” Report: Thinking Beyond Mass Transit For Next Homeland Attack

A Homeland strike soon after the London attacks is conceivable but unlikely, and if and when it comes, it could just as well be on other “soft targets” as on mass transit. These were the conclusions of 18 leading academic terrorism experts, former senior National Security Council and DHS officials, mass transit security specialists, and other nongovernmental experts and creative thinkers polled by the DHS Analytic Red Cell immediately after the July 7 attacks.

(U//FOUO) OEF/OIF Legal Services Support To Operational Commanders

Marine Corps Judge Advocates have been providing wartime legal support to operational commanders since the Vietnam War. Judge Advocates who deployed to Operation DESERT STORM reported an increased need for operational law support and a diminished need for traditional military justice (court-martial) support. Observations by Judge Advocates and infantry commanders who served in OEF/OIF between 2003 and 2006 show that the need for operational law support of ground commanders has continued to expand and is now required on a consistent basis at the infantry battalion level.

(U//FOUO) Concept of Operations for Biometrics in U.S. Central Command AOR

(U) Purpose. This Concept of Operations (CONOP) documents concepts and procedures for the use of biometric technologies to support identity superiority, protection and management in the entire USCENTCOM AOR. This CONOP focuses on the biometrics process and key systemic enablers. This CONOP contains UNCLASSIFIED and CLASSIFIED 100 annexes. The body of the CONOP is UNCLASSIFIED however, Annex E, “HUMINT Biometrics Management”, is CLASSIFIED SECRET//NOFORN.

UN/World Bank Afghanistan Drug Industry Report

The magnitude and importance of Afghanistan’s opium economy are virtually unprecedented and unique in global experience —it has been roughly estimated as equivalent to 36% of licit (i.e. non-drug) GDP in 2004/05, or if drugs are also included in the denominator, 27% of total drug-inclusive GDP (see Chapter 2). The sheer size and illicit nature of the opium economy mean that not surprisingly, it infiltrates and seriously affects Afghanistan’s economy, state, society, and politics. It generates large amounts of effective demand in the economy, provides incomes and employment including in rural areas (even though most of the final “value” from Afghan opium accrues outside the country), and supports the balance of payments and indirectly (through Customs duties on drug-financed imports) government revenues. The opium economy by all accounts is a massive source of corruption and undermines public institutions especially in (but not limited to) the security and justice sectors. There are worrying signs of infiltration by the drug industry into higher levels of government and into the emergent politics of the country. Thus it is widely considered to be one of the greatest threats to state-building, reconstruction, and development in Afghanistan.

(U//LES) Northwest HIDTA Washington State Gang Intelligence Bulletin

Outlaw Motorcycle (OMG) and Street Gangs have been active for several years in Washington State. Both Outlaw Motorcycle Gangs (OMG) and Street Gangs have now become entrenched in the region. Street Gangs are involved in a variety of crimes to include drug trafficking, fraud, and prostitution, and have formed alliances with other gangs. They often serve as distribution networks for Mexican National Drug Trafficking Organizations (DTOs). Gang membership and affiliation continue to rise in Washington State. Many gangs have infiltrated Indian Country and cooperated with DTOs, which has enabled them to recruit additional members. Both street gangs and OMGs pose a serious threat to the safety of law enforcement personnel and to the safety of local communities.

Florida Multi-Year Training & Exercise Plan 2011-2013

The purpose of the Multi-Year Training and Exercise Plan (MYTEP) is to provide a follow-on companion document to Florida‟s Domestic Security Strategic Plan. It is a living document that will be updated and refined annually. The MYTEP provides a roadmap for Florida to follow in accomplishing the priorities and goals described in the Florida‟s Domestic Security Strategic Plan. Each State Priority is linked to a corresponding National Priority, and, if applicable, an Improvement Plan (IP) action. The priority is further linked to the associated target capabilities that would facilitate accomplishment of the priority and the training and exercises that will help the jurisdiction obtain those capabilities and achieve that priority.

UN Pakistan Floods Emergency Response Plan August 2010

Over the course of July and early August 2010, Pakistan experienced the worst monsoon-related floods in living memory. Heavy rainfall, flash floods and riverine floods have devastated large parts of Pakistan since the arrival of seasonal monsoon rains on 22 July. Assessments of losses and damages are ongoing, but estimates place the number of affected people at more than 14 million. Over 1,200 people have died, and at least 288,000 homes have been damaged or destroyed. In Khyber Pakhtunkhwa (KPK) Province, intense rains during the last week of July and in early August were compounded by the swelling of major rivers due to rainwater surging down from the highland areas. The Pakistan Meteorological Department reports that within one week in late July, KPK received 9,000 millimetres of rainfall – ten times as much as the province normally receives in the course of an entire year. Baluchistan, Pakistan-Administered Kashmir and Gilgit Baltistan, also experienced extreme weather, resulting in widespread losses and damages.

INTERPOL DNA Data Exchange and Practice Handbook

Globalization and advances in technology allow criminals to commit crimes across international borders with greater ease than ever before. With criminal methods and tactics changing continuously, the tools used to fight crime also need to keep pace. One area where cutting-edge developments have emerged is that of the use of DNA evidence, meaning that ethics and best practice of DNA profiling now need to be addressed on a global scale. At INTERPOL, we are doing just that; assisting the law enforcement and forensic community by supporting, facilitating, and promoting the use of DNA analysis on a national, regional and international level.

DoJ Terrorism and Criminal Extremism Terms and Concepts Guide

In order for criminal justice professionals to effectively combat terrorism/extremism, it is imperative to obtain as much information as possible. Extremist groups often develop languages of their own. Some have created terms that are unique in the English language, while others have given new or expanded meaning to relatively common words and phrases. In addition, certain symbols, events, organizations, and individuals have particular significance for members of some extremist organizations, none of which may be familiar to an investigator or prosecutor who has not previously been involved with such cases. Investigating Terrorism and Criminal Extremism—Terms and Concepts is a glossary designed primarily as a tool for criminal justice professionals to enhance their understanding of words relating to extremist terminology, phrases, activities, symbols, organizations, and selected names that they may encounter while conducting criminal investigations or prosecutions of members of extremist organizations. Included are terms that may be germane to members of an extremist movement. Also defined are words that are singularly employed by specific extremist groups. Legal terms that have been given new meanings by groups’ adherents are also defined. Similarly, certain terms that describe activities and tactics commonly undertaken by extremists are also included. Significant groups, organizations, movements, and publications that are important for an understanding of terrorism/extremism in the United States and that may be encountered by law enforcement officers and prosecutors are also documented. Inasmuch as this publication is primarily intended to define terms, individuals indexed by name are limited in occurrence. However, there are some people who are of such importance to certain segments of the extremist movement that their very names are equated with that cause. Therefore, some of the better-known terrorists are included.

USMC Online Social Media Guidance for Unofficial Internet Posts

Marines are personally responsible for all content they publish on social networking sites, blogs, or other websites. In addition to ensuring Marine Corps content is accurate and appropriate, Marines also must be thoughtful about the non-Marine related content they post, since the lines between a Marine’s personal and professional life often blur in the online space. Marines must be acutely aware that they lose control over content they post on the Internet and that many social media sites have policies that give these sites ownership of all content and information posted or stored on those systems. Thus Marines should use their best judgment at all times and keep in mind how the content of their posts will reflect upon themselves, their unit, and the Marine Corps.

(U//FOUO) U.S. Army Tactical Combat Casualty Care Handbook

Tactical combat casualty care (TCCC) is the pre-hospital care rendered to a casualty in a tactical, combat environment. The principles of TCCC are fundamentally different from those of traditional civilian trauma care where most medical providers and medics train. These differences are based on both the unique patterns and types of wounds that are suffered in combat and the tactical conditions medical personnel face in combat. Unique combat wounds and tactical conditions make it difficult to determine which intervention to perform at what time. Besides addressing a casualty’s medical condition, responding medical personnel must also address the tactical situation faced while providing casualty care in combat. A medically correct intervention performed at the wrong time may lead to further casualties. Put another way, “good medicine may be bad tactics,” which can get the rescuer and casualty killed. To successfully navigate these issues, medical providers must have skills and training oriented to combat trauma care, as opposed to civilian trauma care.

(U//FOUO) U.S. Army Radio Operator Handbook

The unit radio operator (RO) provides platoon- to brigade-level maneuver leaders a command and control capability that is critical to mission success. The RO is more than a Soldier who carries the radio for the commander, serves as the commander’s driver, or provides the commander personal security, although he often serves in these functions. The RO is the commander’s tactical information manager. The process for selecting and training an RO varies widely and is based on the role the unit commander intends the RO to perform; however, there are common factors that every maneuver RO should possess in order to enable effective unit command and control.