The following Army Techniques Publication is an update to a previous Army Tactics, Techniques and Procedures publication titled “Law and Order Operations” released in June 2011. A version of the document from January 1945 (FM 19-10) was titled “Military Police in…
Special Operations Command Central Multi-Method Assessment of the Islamic State of Iraq and the Levant
Early in 2014, as it became clear that the rise of the so-called “Islamic State” was becoming a significant menace to Regional Stability and US Interests, SOCCENT began a dialogue with Dr. Hriar Cabayan and his co-workers regarding a topic that has been at the core of the struggle against Violent Extremism. That question has been, and remains today, a perplexing one for those of us from Western cultures and societies: “What precisely are we contesting, and what is it that fuels the adversary’s power?” The contents of this paper reflect some of the work that Dr. Cabayan and his colleagues are doing to help us understand and comprehend this “intangible power” across a unique enterprise of academicians, scientists, policy intellectuals, current and former Foreign Service, military, and intelligence professionals. Most importantly, their efforts to improve our comprehension will enable us to adjust our efforts, our operations, our investments, and our risk-‐calculations to more effectively contest it and the organization that wields it. I am grateful for their tireless work in this regard, and I commend it to the reader.
Supervisors and coworkers are willing to report on behaviors that have a clear connection to security, such as transmitting classified documents to unauthorized personnel, but they are unwilling to report on colleagues’ personal problems, such as alcohol abuse. Because it was difficult to discern which reporting requirements were clearly related to security, there was very little reporting. PERSEREC, in collaboration with counterintelligence professionals, developed a clear, succinct list of “Coworker Reporting Essentials” (CORE) behaviors that could pose a possible threat to national security and thus should be reported if observed. The draft CORE was reviewed and edited by counterintelligence professionals at the Counterintelligence Field Activity (CIFA), and was coordinated by the DoD Investigative Working Group (IWG).
The world is evolving into an increasingly interconnected environment. The Army of 2020 will operate in a complex world where cloud-based computers receive data from tens of billions of devices. These computers will have the capacity to digest, correlate, contextualize, process and then present data back to humans in a way that assists our decision-making process. The Army is modernizing its network to prepare for the impending data-driven, cloud-based world, as depicted in Figure 1. While legacy networking architectures stored and protected data locally, cloud-based architectures will store and protect data in a centralized yet distributed repository that enables global access. The Army Network Campaign Plan outlines current efforts that posture the Army for success in a cloud-based world.
Radicalization is the process by which an individual, group, or mass of people undergo a transformation from participating in the political process via legal means to the use or support of violence for political purposes (radicalism). Radicalism includes specific forms, such as terrorism, which is violence against the innocent bystander, or insurgency, which is violence against the state. It does not include legal and/or nonviolent political protest, such as protest that is more properly called activism.
This handbook provides basic reference information on Mozambique, including its geography, history, government, military forces, and communications and transportation networks. This information is intended to familiarize military personnel with local customs and area knowledge to assist them during their assignment to Mozambique.
The Gabon Cultural Field Guide is designed to provide deploying military personnel an overview of Gabon’s cultural terrain. In this field guide, Gabon’s cultural history has been synopsized to capture the more significant aspects of the country’s cultural environment, with emphasis on factors having the greatest potential to impact operations.
Cloud computing technology and services provide the Department of Defense (DoD) with the opportunity to deploy an Enterprise Cloud Environment aligned with Federal Department-wide Information Technology (IT) strategies and efficiency initiatives, including federal data center consolidation. Cloud computing enables the Department to consolidate infrastructure, leverage commodity IT functions, and eliminate functional redundancies while improving continuity of operations. The overall success of these initiatives depends upon well executed security requirements, defined and understood by both DoD Components and industry. Consistent implementation and operation of these requirements assures mission execution, provides sensitive data protection, increases mission effectiveness, and ultimately results in the outcomes and operational efficiencies the DoD seeks.
Mauritania is the westernmost country in the Sahel region. Its location between Arab-influenced North Africa and Sub-Saharan Africa has created some ethnic divides and tensions between people of Arab origin and the indigenous populations. In other cases, the population has become united under a common belief; nearly all Mauritanians are Muslim. Most of the country is desert, making life in Mauritania difficult. In the past, northern populations were nomadic herders and the southern populations were sedentary farmers. Many continue these lifestyles today, but desertification and droughts have severely reduced the amount of fertile land in Mauritania.This has hurt herders and farmers. Many have had to abandon their lifestyles to attempt make a living in the cities. As a result, most Mauritanian cities are overcrowded and have high unemployment rates.
This handbook provides basic reference information on Mauritania, including its geography, history, government, military forces, and communications and transportation networks. This information is intended to familiarize military personnel with local customs and area knowledge to assist them during their assignment to Mauritania.
The Jordan Cultural Field Guide is designed to provide deploying military personnel an overview of Jordan’s cultural terrain. In this field guide, Jordan’s cultural history has been synopsized to capture the more significant aspects of the Jordan cultural environment, with emphasis on factors having the greatest potential to impact operations.
This handbook provides basic reference information on Spain, including its geography, history, government, military forces, and communications and transportation networks. This information is intended to familiarize military personnel with local customs and area knowledge to assist them during their assignment to Spain.
This handbook provides essential information on Norway, including a quick reference and a country profile featuring sections on the military, geography, culture, language, history, government, economy, communications, and transportation. It is intended for use by military personnel providing assistance and training to Norway. By making the handbook unclassified and in a cargo-pocket size format, it will fulfill the need for a “field” ready-reference publication.
This handbook provides basic reference information on Poland, including its geography, history, government, military forces, and communications and transportation networks. This information is intended to familiarize military personnel with local customs and area knowledge to assist them during their assignment to Poland.
A central goal of U.S. foreign policy is promotion of respect for human rights, as embodied in the Universal Declaration of Human Rights. Human rights are freedoms, immunities, and benefits that are deemed universal, inherent, and inalienable possessions of all humankind. This means that human rights are not a concession granted by society or any particular government. Human Rights Law requires a nation to guarantee the fundamental human rights of its citizens throughout the peace-war-peace spectrum. The Law of War* is that part of international law that regulates the conduct of armed hostilities.
This manual provides guidance for sanitization of Information Systems (IS) storage devices for disposal or recycling in accordance with NSA/CSS Policy Statement 9-12, “NSA/CSS Storage Device Sanitization.” Information stored on these devices may range from UNCLASSIFIED to TOP SECRET and may include compartmented, sensitive, or limiteddistribution material. Furthermore, this manual provides information on how to obtain current listings of evaluated sanitization equipment that meets NSA/CSS specifications.
TC 2-22.304 provides doctrinal guidance concerning the military intelligence (MI) battalion (interrogation). The TC complements existing doctrine, in particular FM 2-22.3, and incorporates lessons learned from recent operations. The MI battalion (interrogation) is specifically designed to operate within a joint interrogation and debriefing center (JIDC). The battalion command, staff, personnel, and equipment form the nucleus of the JIDC. The battalion is task-organized and augmented with additional personnel from other Services, Government civilians, and civilian contractors to form a JIDC.
TC 3-19.5 provides guidance on specific NLW training with emphasis on User Training, Train-the-Trainer Training, and Unit Training. It is designed to be used with FM 3-22.40, Multi-Service TTP for the Tactical Employment of Nonlethal Weapons, and the Multi-Media Training Support Package (MMTSP). The MMTSP is a Warrior TSP designed to train individual tasks.
Training guide released in November 2014 for airmen who perform “duties to develop, sustain, and enhance cyberspace capabilities to defend national interests from attack and to create effects in cyberspace to achieve national objectives. Conduct Offensive Cyberspace Operations (OCO) and Defensive Cyberspace Operations (DCO) using established tactics, techniques and procedures (TTPs) to achieve COCOM and national objectives. Executes command and control (C2) of assigned cyberspace forces and de-conflict cyberspace operations across the kinetic and non-kinetic spectrum. Supports cyberspace capability development, testing and implementation. Partners with DoD, interagency and Coalition Forces to detect, deny, disrupt, deceive, and mitigate adversarial access to sovereign national cyberspace systems.”
United States cleared industry is a prime target of many foreign intelligence collectors and foreign government economic competitors. Cleared employees working on America’s most sensitive programs are of special interest to other nations. The number of reported collection attempts rises every year, indicating an increased risk for industry. While any geographic region can target sensitive or classified U.S. technology, DSS has consistently found that the majority of suspicious contacts reported by cleared industry originate from East Asia and the Pacific regions. Every region has active collectors. Cleared contractors should remain vigilant regardless of the collector’s assumed country of origin.
A collection of recent intelligence summaries for Operation United Assistance which is being conducted by U.S. Africa Command through U.S. Army Africa. The operation began in September and provides “coordination of logistics, training, and engineering support to the U.S. Agency for International Development (USAID) in West Africa to assist in the overall U.S. Government Foreign Humanitarian Assistance/Disaster Relief efforts to contain the spread of the Ebola Virus/Disease, as part of the international assistance effort supporting the Governments of Liberia, Sierra Leone and Guinea.”
Multi-Service Tactics, Techniques, and Procedures for Installation Emergency represents a significant renaming and revision to the November 2007 publication Multiservice Tactics, Techniques, and Procedures for Installation CBRN Defense. It expands the scope from chemical, biological, radiological, and nuclear (CBRN) defense to all-hazards installation emergency management (IEM), including the management of CBRN events. This publication defines the roles of Department of Defense (DOD) installation commanders and staffs and provides the tactics, techniques, and procedures (TTP) associated with installation planning and preparedness for response to, and recovery from, hazards to save lives, protect property, and sustain mission readiness. The purpose of this publication is to summarize existing policies, responsibilities, and procedures for IEM programs at DOD installations worldwide for all hazards, as defined by DODI 6055.17, and to translate this policy into tactical terms applicable to military installation commanders.