Increased illicit use of opioids, including synthetic opioids such as fentanyl and its analogue carfentanil, is a source of increased risk to responders. Most routine encounters between patients or detainees and EMS or law enforcement do not present a significant threat of toxic exposure. While there are anecdotal reports of public safety personnel being exposed to opioids during operations, they are largely unconfirmed. To proactively address the potential risks, this document establishes guidance for personal protective equipment selection and use, decontamination, detection, and medical countermeasures for first responders who may be exposed to opioids in the course of their occupational activities. Throughout the remainder of this document, the term synthetic opioids will be used to include fentanyl, fentanyl analogues, morphine analogues, the U-series opioids, and others.
As the American Army fought in Iraq and Afghanistan, it became the best tactical level counter insurgency force of the modern era. America’s enemies, however, did not rest. Russia observed the transformation of the American Army and began a transformation of their own. This new military barely resembles its former Soviet self. Wielding a sophisticated blend of Unmanned Aircraft Systems (UAS), electronic warfare (EW) jamming equipment, and long range rocket artillery, it took the Soviet model out of the 1980s and into the 21st Century.
The Mad Scientist 2050 Cyber Army project explored the visualization of the Army’s Cyber Force out to 2050 and its ability to address three major objectives of the Army’s Cyberspace Strategy for Unified Land Operations 2025: What does the cyber environment look like in 2040-2050 (how will cyber influence the environment and the population? What will connecting look like / what will they connect to? What are the drivers influencing this or not)? How do we build an Army Cyber Force that can dominate the cyber domain in the context of the multi-domain battle concept to gain a position of relative advantage? How can we build shared goals and expectations as well as develop an understanding of roles and responsibilities in order to build and maintain partnerships with U.S., and international academia, industry, defense departments/ministries and other agencies to enhance cyberspace operations? What new ideas should we be considering? Co-sponsored by the TRADOC G-2 and the Army Cyber Institute at the United States Military Academy, the 2050 Cyber Army project leveraged submitted papers, an on-line technology survey, and a 13-14 September Mad Scientist Conference that generated the insights synthesized in this report.
As part of this vision, DIA has a long history of producing comprehensive and authoritative defense intelligence overviews. In September 1981, Secretary of Defense Caspar Weinberger asked the Defense Intelligence Agency to produce an unclassified overview of the Soviet Union’s military strength. The purpose was to provide America’s leaders, the national security community, and the public a complete and accurate view of the threat. The result: the first edition of Soviet Military Power. DIA produced over 250,000 copies, and it soon became an annual publication that was translated into eight languages and distributed around the world. In many cases, this report conveyed the scope and breadth of Soviet military strength to U.S. policymakers and the public for the first time.
This TC serves as a guide to describe the fundamentals of how to incorporate IO at the tactical and operational level. Appendixes A through F offer tactics, techniques, and procedures (TTP) Special Forces (SF) Soldiers can use to analyze and plan information operations. This TC implements Army and joint IO doctrine established in FM 3-13, Inform and Influence Activities, and Joint Publication (JP) 3-13, Information Operations. This TC reinforces the definition of IO used by Army forces: IO employs the core capabilities of electronic warfare (EW), computer network operations (CNO), Military Information Support operations (MISO), military deception (MILDEC), and operations security (OPSEC), in concert with specified supporting and related capabilities, to affect or defend information and information systems and to influence decisionmaking. This TC is specifically targeted for SF; however, it is also useful to Army special operations forces (ARSOF) and the Army in understanding how SF employs IO.
U.S. competitors pursuing meaningful revision or rejection of the current U.S.-led status quo are employing a host of hybrid methods to advance and secure interests that are in many cases contrary to those of the United States. These challengers employ unique combinations of influence, intimidation, coercion, and aggression to incrementally crowd out effective resistance, establish local or regional advantages, and manipulate risk perceptions in their favor. So far, the United States has not come up with a coherent countervailing approach. It is in this “gray zone”—the awkward and uncomfortable space between traditional conceptions of war and peace—where the United States and its defense enterprise face systemic challenges to U.S. position and authority. As a result, gray zone competition and conflict should be pacers for defense strategy.
(U//FOUO) U. S. Marine Corps Forces Europe and Africa Campaign Plan 2016-2020: Theater Crisis and Contingency Response Forces in Readiness
The U.S. Marine Corps Forces Europe and Africa Campaign Plan 2016-2020 defines the organization’s desired baseline operating conditions and capabilities beyond a one-year planning and execution cycle and directs action to achieve desired end states. The Campaign Plan synthesizes strategic guidance provided by U.S. European Command (USEUCOM), U.S. Africa Command (USAFRICOM), and Headquarters Marine Corps (HQMC); accounts for the Commanders’ priorities and vision; establishes a deliberate yet broadly-defined multi-year plan to achieve stated objectives; and provides a framework for implementation, periodic assessment, and refinement.
Published in three volumes, (Ground; Airspace & Air Defense Systems; and Naval & Littoral Systems) the WEG is the approved document for OPFOR equipment data used in U.S. Army training. Annual updates are posted on the ATN website. Therefore it is available for downloading and local distribution. Distribution restriction is unlimited. This issue replaces all previous issues.
The primary goal of Boko Haram is to institute an Islamic state throughout Nigeria based on a fundamentalist interpretation of Islamic law with an inevitable regional expansion. The founder and spiritual leader of Boko Haram, Muhammed Yusuf, and his followers originally believed in a peaceful transition and made what the current Boko Haram leadership considered illegitimate concessions to and compromises with secular and government leaders. The group has since adopted a takfirist ideology—the belief that less than a strict adherence to Salafist Islam makes a Muslim an “apostate” equal to infidels and, therefore, a legitimate target. Boko Haram has targeted and killed a number of prominent Muslim leaders who have been critical of the organization. Boko Haram considers any support of Western or secular ideas, such as schools based on Western influence, heretical and worthy of attack.
Cell phones, smart phones, the Internet, and GPS are increasingly available and are changing the nature of conflict, even in remote areas. Information can now reach out in new ways to global audiences because of the revolution in Information Technology (IT), particularly using cell phones and smart phones. The revival of hybrid warfare manifested in recent developments in the international security environment – such as the Arab Spring, the Ukrainian crisis, the rise of Jihadist-Salafist terrorism, and the European migrant crisis – demonstrates the power of communication, broadly based on IT advantages: messages and perceptions become predominant of physical engagements and strongly impact the behaviour of people. Orchestrated activities carry messages and have a crucial effect on 55 public opinions, decision-making processes, and domestic support.
U.S. Army Foreign Military Studies Office: Russia’s Military Strategy Impacting 21st Century Reform and Geopolitics
Today’s military innovators are the modern-day scientists and engineers who assist in the creation of contemporary and new concept weaponry; and the military theorists who study changes in the character of war. Digital specialists understand how to develop and employ the capabilities of electronic warfare equipment, satellite technology, and fiber optic cables. While Kalashnikov’s fame is imbedded in Russia’s culture, it may be harder to find a current digital entrepreneur whose legacy will endure as long as his: there are simply too many of them, and their time in the spotlight appears to be quite short, since even now we are about to pass from the age of cyber to that of quantum. It is difficult to predict whose discoveries will be the most coveted by tomorrow’s military-industrial complex, not to mention the decision-making apparatus of the Kremlin and General Staff. Military theorists are playing an important role as well. They are studying how new weaponry has changed the correlation of forces in the world, the nature of war, and the impact of weaponry on both forecasting and the initial period of war.
CI focuses on negating, mitigating, or degrading the foreign intelligence and security services (FISS) and international terrorist organizations (ITO) collection threat that targets Army interests through the conduct of investigations, operations, collection, analysis, production, and technical services and support.
This publication provides a guide for U.S. Army War College students to understand design, planning, and execution of cyberspace operations at combatant commands (CCMDs), joint task forces (JTFs), and joint functional component commands. It combines existing U.S. Government Unclassified and “Releasable to the Public” documents into a single guide.
Inspections and incidents across the Department of Defense (DoD) reveal a need to reinforce basic cybersecurity requirements identified in policies, directives, and orders. In agreement with the Secretary of Defense, the Deputy Secretary of Defense, and the Joint Chiefs of Staff, the DoD Chief Information Officer (CIO) identified key tasks needed to ensure those requirements are achieved. The DoD Cybersecurity Campaign reinforces the need to ensure Commanders and Supervisors at all levels, including the operational level, are accountable for key tasks, including those identified in this Implementation Plan. The Campaign does not relieve a Commander’s and Supervisor’s responsibility for compliance with other cybersecurity tasks identified in policies, directives, and orders, but limits the risk assumed by one Commander or Supervisor in key areas in order to reduce the risk to all other DoD missions.
U.S. Army Special Operations Command Study: Legal Implications of the Status of Persons in Resistance
The purpose of this study is to provide a synthesis of the prevailing issues and analysis concerning the legal status of persons in resistance. This document refers broadly to resistance and those involved in it, meaning those individuals comprising the resistance element, US personnel supporting or countering the resistance, and the standing government. In alignment with this focus, the document explores the status of personnel particularly in foreign internal defense (FID), counterinsurgency (COIN), and unconventional warfare (UW) operations. When originally conceived, this manuscript was to be an updated volume of the 1961 American University Special Operations Research Office (SORO) study, The Legal Status of Participants in Unconventional Warfare. The National Security Analysis Department (NSAD) of the Johns Hopkins University Applied Physics Laboratory (JHU/APL) was asked by the US Army Special Operations Command (USASOC), G-3X Special Programs Division, to review and analyze the historical use of international law, the law of land warfare, and applicable international conventions and update the SORO study accordingly and also include unique legal considerations regarding the status of irregular forces. Because many aspects of both law and policy have changed since the 1961 publication, particularly within the context of US involvement in Afghanistan and Iraq, USASOC requested that this manuscript be a new document to account for these changes, highlight key legal questions, and position these questions within the context of hypothetical scenarios and historical examples.
The Joint Operating Environment 2035 (JOE 2035) is designed to encourage the purposeful preparation of the Joint Force to effectively protect the United States, its interests, and its allies in 2035. For the Joint Force, thinking through the most important conditions in a changing world can mean the difference between victory and defeat, success and failure, and the needless expenditure of human lives and national treasure versus the judicious and prudent application of both to defend our vital interests.
Joint Staff Strategic Multi-Layer Assessment on Bio-Psycho-Social Applications to Cognitive Engagement
The underlying concept of this paper is how bio-psycho-social approaches to cognitive engagement, described in greater depth by DeGennaro, may be put to use to collect, analyze, and/or apply information to meet a tactical, operational, or strategic end. This White Paper will focus on the proverbial “rubber meets the road” approaches of behavioral operations in the human domain where the former is “the study of attributes of human behavior and cognition that impact the design, management, and improvement of operating systems, and the study of the interaction between such attributes and operating systems and processes” and the latter is “the presence, activities (including transactions both physical and virtual), culture, social structure/organization, networks and relationships, motivation, intent, vulnerabilities, and capabilities of humans (single or groups) across all domains of the operational environment (Space, Air, Maritime, Ground, and Cyber).” Information Operations (IO) doctrine defines the cognitive domain as the component of the information environment (IE) that encompasses the gray matter of those who transmit, receive, and act upon information. Cognitive operations such as information processing, perception, judgment, and decision-making are the most vital aspect of the IE. Cognition is influenced by individual and cultural beliefs, norms, vulnerabilities, motivations, emotions, experiences, morals, education, mental health, identities, and ideologies and thus requires research and analysis methods from the bio-psycho-social sciences to understand and manipulate. When, how, and most importantly why to apply that understanding to US advantage at the tactical, operational, and strategic level is the focus of this effort.
Army commanders rely upon timely, relevant, and accurate combat information and intelligence in order to successfully plan, prepare, and execute operations. Human intelligence (HUMINT) and counterintelligence (CI) are two critical assets commanders have, either organic to their unit’s table of organization and equipment (TOE) or through attachment from a supporting command, which can provide input to both combat information and intelligence. While there are similarities between the methodology and tactics, techniques, and procedures (TTP) used by HUMINT and CI, their training and missions are separate and distinct.
This manual identifies the individual MOS training requirements for soldiers in MOS 96U. Commanders, trainers, and soldiers should use it to plan, conduct, and evaluate individual training in their unit. This manual is the primary MOS reference to support the self-development and training of every 96U soldier.
Joint Staff Strategic Assessment: Counter-Da’esh Influence Operations Cognitive Space Narrative Simulation Insights
When planning to deal with any adversary or potential adversaries, it is essential to understand who they are, how they function, their strengths and vulnerabilities, and why they oppose us. Events over the course of the last year and a half highlight the importance of those factors as they relate to the Islamic State of Iraq and the Levant (ISIL or Da’esh). One of Da’esh’s obvious strengths is its ability to propagate tailored messages that resonate with its audiences. If the US Government and our allies are to counter Da’esh effectively, we must attack this center of gravity.
This data set consists of twenty-one teleoperated weapons systems used by terrorist and insurgent groups. It is worth noting that there are many more systems’ images available, but no group affiliation could be associated with them, which is why they were not included in this research project. The plethora of videos and photos on social media indicates that terror and insurgent groups are increasingly turning to improvised weaponry use on the battlefield. One class of improvised weapon that is emerging is remote controlled sniper rifles and machine guns. They are being used across Syria, Iraq, and a lone case in Libya as early as 2011. Typically, rifles or machine guns are improvised to be secured on a base—either mobile or stationary—and linked to cables, which are connected to a remote and screen. Some systems are more refined than others, such as with cameras, but all have at least proven to be somewhat effective.
EXIF (Exchangeable image File Format) is a standard format for storing and exchanging image metadata. Image metadata is included in a captured image file and provides a broad range of supplemental information. Some social networks and photo-sharing sites, such as Flickr, Google+, and Instagram, have features that share EXIF data alongside images. Others, including Facebook and Twitter, do not share EXIF data but my utilize the information internally. EXIF data is stored as tags, some of which reveal unique identifying information.
LinkedIn is a professional networking service that allows you to establish connections with co-workers, customers, business contacts, and potential employees and employers. You can post and share information about current and previous employment, education, military activities, specialties, and interests. To limit exposure of your personal information, you can manage who can view your profile and activities.