This Joint Intelligence Bulletin highlights the potential risks for US persons traveling to Syria or Iraq to combat the Islamic State of Iraq and the Levant (ISIL) or expressing online a desire to do so. The FBI, DHS, and NCTC remain concerned that US persons traveling to combat ISIL are at risk of being killed, wounded, or captured. Further, ISIL members or supporters could attempt disingenuously to identify and target US persons so as to harm them before or upon their arrival in Syria or Iraq. The State Department has issued travel warnings for both Iraq and Syria and the US Government does not support US persons traveling overseas to combat ISIL.
During FY 2014, the SOCCENT Commander requested a short-term effort to understand the psychological, ideological, narrative, emotional, cultural, and inspirational (“intangible”) nature of ISIL. As shown below, the SMA1 team really addressed two related questions: “What makes ISIL attractive?” or how has the idea or ideology of ISIL gained purchase with different demographics; and “What makes ISIL successful?” or which of the organization’s characteristics and which of the tactics it has employed account for its push across Syria and Iraq. The effort produced both high-level results and detailed analyses of the factors contributing to each question. The central finding was this: While military action might degrade or defeat factors that make ISIL successful, it cannot overcome what makes ISIL’s message and idea attractive.
As of July 2015, an APT actor that has previously targeted the U.S. financial sector used an implant to provide command and control (C2), according to credible reporting. Implant communications were observed between administrative infrastructure and known malware C2 nodes used in spear-phishing campaigns in July 2015. The communication from administrative infrastructure was an HTTP POST request.
The Criminal Justice Information Services (CJIS) Division’s Quick Capture Platform (QCP) is a state-of-the-art biometric system that enables investigators to collect and store fingerprint data during domestic and international investigations. The QCP enables instant access to federal fingerprint databases. This comprehensive access to the main United States (U.S.) Government biometric holdings enables QCP users to quickly establish whether a subject has possible terrorist links (in the U.S. or abroad) or is likely to pose a threat to the U.S.
SWATTING is the act of sending a SWAT team or some type of law enforcement response to a location by convincing law enforcement that an incident has occurred or is about to occur that requires immediate law enforcement response. Characteristics of swatting include, but are not limited to: Callers using internet-based phones such as Skype USBUS and Magic Jack USBUS, or callers using a legal Caller Identification (ID) masking service. Caller ID spoofing/masking services permit cell phones and landline phones to spoof the call’s origins through a service fee based software. Reports of bomb-threats and SWATTING incidents are coming from area elementary, middle, and high schools, along with universities as well. Federal, state, and local partners are working to identify where the calls are originating from.
This publication identifies multi-Service tactics, techniques, and procedures (MTTP) for Defense Support of Civil Authorities (DSCA). At the tactical level, it assists military planners, commanders, and individual Department of Defense (DOD) components employing military resources and integrating with National Guard Civil Support activities while responding to domestic emergencies in accordance with United States (US) law.
Senegal is a diverse West African nation approximately the size of South Dakota and home to more than 36 ethnic groups and languages. Senegal’s national development has been shaped by its location between the edge of the Sahara and the Atlantic. Trans-Saharan trade brought Islam and Arab influences to Senegal through North Africa. Later, Senegal became one of the first African countries to trade with Europe through the Atlantic seaways. Today, Senegal is seen by the Senegalese as a bridge between Black African, Islamic, and European civilizations.
FID is participation by civilian and military agencies of a government in any of the action programs taken by another government or other designated organization to free and protect its society from subversion, lawlessness, insurgency, terrorism, and other threats to its security (Joint Publication [JP] 3-22, Foreign Internal Defense). This publication depicts the integrated theater efforts that include ARSOF and conventional forces roles in joint, multinational, intergovernmental, and nongovernmental organizations working in a collaborative environment. It provides an overview of selected sources of power applied through the instruments of national power brought to bear for supporting FID and the impact and interaction of Army units with the other instruments of national power. In addition, it illustrates how FID is a key component of a host nation’s (HN’s) program of internal defense and development (IDAD), and that the focus of all U.S. FID efforts is to support that IDAD program to build capability and capacity to free and protect the HN from subversion, lawlessness, and insurgency.
Indonesia is a geographic mixing point between the traditional Malay peoples of most of Southeast Asia and the Austronesian peoples to the east. The country’s territory stretches thousands of miles from east to west and has a centuries-old history of settlement and interaction with the region and rest of the world. Consequently its culture and society reflect influences from China, India, the Middle East, and other areas of Southeast Asia.
Kuwaiti Arabs comprise 45 percent (approximately 950,000) of the population in Kuwait. “Arab” is a name originally given to the nomadic inhabitants of the Arabian Peninsula. It is now largely a cultural/linguistic designation, embracing various national, regional, and religious groups in several different countries.
The Philippines Cultural Field Guide is designed to provide deploying military personnel an overview of the Philippines’ cultural terrain. In this field guide, the Philippines’ cultural history has been synopsized to capture the more significant aspects of the Philippine cultural environment, with emphasis on factors having the greatest potential to impact operations.
Morocco’s military traditions are closely linked with the country’s history and are influenced by its extensive political and cultural heritage. Morocco’s history, and thus its military history, began in the Medieval Islamic period, 12 centuries before the end of the French and Spanish protectorate in 1956, which is often represented as the year Morocco became independent. Moroccans, however, consider 1956 the year the country regained its independence after 44 years of foreign rule. Although foreign rule profoundly transformed Morocco’s economy and infrastructure, Moroccans view the post-protectorate period as a reversion to independent rule by the reigning Alawi or Filali dynasties, which had held power in the country since 1660. Mohamed V presided over this independent rule and military modernization for 34 years (1927–1961). Moroccans inherited a modernized state, albeit with surviving traditional institutions, from their former European rulers, and the dynastic continuity under the protectorate ensured the prominent re-emergence of indigenous influence in many areas, including the military.
Given the complexity and lethality of national security threats in the maritime domain, and in support of the U.S. National Strategy for Maritime Security, and the Sea Services’ (Navy, Marine Corps, and Coast Guard) joint maritime strategy, A Cooperative Strategy for 21st Century Sea Power, it is vital to America’s interests that the Navy and Coast Guard collaboratively plan, field, and sustain interoperable and affordable forces to provide complementary support for each other’s mission sets. As good stewards of the Nation’s resources and faced with an uncertain budget environment, it is imperative that our services cooperate in a deliberate manner. Implementation of the National Fleet Policy will provide the Nation with more interoperable and fiscally efficient Navy and Coast Guard forces. The National Fleet Plan identifies specific Navy and Coast Guard authorities, methods, and measurements to avoid redundancies and achieve economies of scale. It improves operational effectiveness and provides a mechanism to enhance integration and resource development. The Plan is adaptive to meet emerging national security threats and scalable to address changing service challenges.
In recent weeks, the upsurge of Syrians seeking asylum in European countries has overwhelmed existing capacity. According to UNHCR, as of July 2015 almost 350,000 Syrians have applied for asylum in Europe since the conflict in Syria began, nearly half applying in Germany and Sweden and one third in Serbia, Hungary, Austria, Bulgaria, and the Netherlands combined.
Moroccan culture uniquely combines aspects of Europe, the Middle East, and Africa. It is a Muslim country with close ties to other Arab countries in the Middle East, but its proximity to Europe has given it a more Western feel. Morocco experiences many of the economic hardships seen in other African nations, such as a lack of economic diversity, high unemployment, and widespread poverty.
This handbook provides basic reference information on Morocco, including the geography, history, government, military forces, and the communications, and transportation network Morocco. This information is intended to familiarize military personnel with local customs and area knowledge in an effort to assist them during their assignment to Morocco.
Cell-site simulator technology provides valuable assistance in support of important public safety objectives. Whether deployed as part of a fugitive apprehension effort, a complex narcotics investigation, or to locate or rescue a kidnapped child, cell-site simulators fulfill critical operational needs. As with any law enforcement capability, the Department must use cell-site simulators in a manner that is consistent with the requirements and protections of the Constitution, including the Fourth Amendment, and applicable statutory authorities, including the Pen Register Statute. Moreover, any information resulting from the use of cell-site simulators must be handled in a way that is consistent with the array of applicable statutes, regulations, and policies that guide law enforcement in how it may and may not collect, retain, and disclose data.
US Colleges and Universities are known for innovation, collaboration, and knowledge-sharing. These qualities help form the bedrock of US economic success. These same qualities also make US universities prime targets for theft of patents, trade secrets, Intellectual Property (IP), research, and sensitive information. Theft of patents, designs and proprietary information have resulted in the bankruptcy of US businesses and loss of research funding to US universities in the past. When a foreign company uses stolen data to create products, at a reduced cost, then compete against American products, this can have direct harmful consequences for US universities that might receive revenue through patents and technology transfer.
The Plutonium Management and Disposition Agreement (PMDA) calls for the United States and Russia to each dispose of 34 metric tons (MT) of excess weapon-grade plutonium by irradiating it as mixed oxide fuel (MOX), or by any other method that may be agreed by the Parties in writing. The MOX disposition pathway is a realization of the spent fuel standard (SFS) as envisaged in the 1994 National Academy of Sciences (NAS) review that recognized the value of physical, chemical, and radiological barriers to future use of the material in nuclear weapons whether by state or non-state actors. The decision to pursue the MOX pathway using light water reactors in combination with immobilization using a can-in-canister approach was adopted by the United States Department of Energy (DOE) after review of 37 different pathways for disposition in 1997.
Following the Office of the Inspector General’s (OIG) April 2011 report on the FBI’s ability to address the national cyber intrusion threat, in October 2012 the FBI launched its Next Generation Cyber (Next Gen Cyber) Initiative to enhance its ability to address cybersecurity threats to the United States. In fiscal year 2014, the FBI initially budgeted $314 million for its Next Gen Cyber Initiative, including a total of 1,333 full-time positions (including 756 agents). In addition, the Department of Justice (Department) requested an $86.6 million increase in funding for fiscal year 2014 to support the Initiative. The objective of this audit was to evaluate the FBI’s implementation of its Next Gen Cyber Initiative.
Today, Strategic Landpower faces a complex and interconnected global operational environment characterized by a multitude of actors with unknown identities. This presents a wider range of possible threats than encountered before. Our operational environment has fewer well-defined friends and foes with most actors presented along a continuum of: unknown to partially known to known, throughout the range of military operations. Many found in the middle are susceptible to persuasion. Each of these actors has an agenda, often at odds with our objectives, those of other actors, and the goals of the existing political order. Besides a broad range of readily available conventional weapons, state and non-state actors can select from an array of affordable technologies, adapting them to create unexpected and lethal weapons. Social media enables even small groups to mobilize people and resources in ways that can quickly constrain or disrupt operations. This complex operating environment continuously evolves as conditions change and test our ability to innovate and adapt. The complexity reconfirms the imperative to understand, plan, and employ Identity processes and capabilities within land operations.