Department of Defense

(U//FOUO) NSA Hardening Network Infrastructure: Security Recommendations for System Accreditors

Many networks run by public and private organizations have experienced intrusions in recent years, and this cyber exploitation has resulted in an unprecedented transfer of wealth due to lost intellectual property. The threats to our networks and systems exist across numerous components that include end-user-devices, servers, and infrastructure devices. To address threats to routers and other network infrastructure devices, the National Security Agency’s Information Assurance Directorate (IAD) is publishing this IAA to guide U.S. Government systems accreditors’ strategic plan for network hardening.

(U//FOUO) NSA Mitigations Guidance for Distributed Denial of Service Attacks

Adversary actors in cyberspace continue to demonstrate the interest in and ability to execute Distributed Denial of Service (DDoS) attacks against the United States. The need to offer Internet services in support of mission requirements inherently exposes these services to malicious traffic and the potential for DDoS attack. Proactive preparation to ensure network resilience in the event of a DDoS event is essential. Reactive measures are feasible, but are often too slow to respond to the dynamic nature of today’s threat.

(U//FOUO) U.S. Army Operation Iraqi Freedom Information Operations Tactical Commander’s Handbook

This handbook provides the tactical operator, commander, and battle staff with information on planning, executing, assessing, and sustaining information operations (IO). The handbook is based on observations collected in Iraq during July and August 2004 by an IO collection and analysis team (CAAT). The application of this tool is both for training and real-world events the Soldier may encounter in the Iraqi area of operations.

Joint and Coalition Operational Analysis (JCOA) Reducing and Mitigating Civilian Casualties: Enduring Lessons

The United States has long been committed to upholding the Law of Armed Conflict (LOAC) and minimizing collateral damage, which includes civilian casualties (CIVCAS) and unintended damage to civilian objects (facilities, equipment, or other property that is not a military objective). In support of these goals, the U.S. military developed capabilities for precision engagements and accurately identifying targets, such as the development of refined targeting processes and predictive tools to better estimate and minimize collateral damage. These capabilities permitted the conduct of combat operations with lower relative numbers of civilian casualties compared to past operations. However, despite these efforts, and while maintaining compliance with the laws of war, the U.S. military found over the past decade that these measures were not always sufficient for meeting the goal of minimizing civilian casualties when possible. Resulting civilian casualties ran counter to U.S. desires and public statements that the United States did “everything possible” to avoid civilian casualties, and therefore caused negative second-order effects that impacted U.S. national, strategic, and operational interests.

(U//FOUO) U.S. Air Force Notice on Use of Social Networking Sites for Computer Network Exploitation

Nation-state adversaries regularly use accounts on popular social networking sites to facilitate social engineering against DoD members. Information disclosed or discovered on social networking sites creates a significant operations security (OPSEC) concern and in the context of a wide spread collection effort could be by adversaries to form a classified picture.

DoD Report to Congress on North Korea Military and Security Developments 2012

The Democratic People’s Republic of Korea (DPRK) remains one of the United States’ most critical security challenges in Northeast Asia. North Korea remains a security threat because of its willingness to undertake provocative and destabilizing behavior, including attacks on the Republic of Korea (ROK), its pursuit of nuclear weapons and long-range ballistic missiles, and its willingness to proliferate weapons in contravention of its international agreements and United Nations Security Council Resolutions. North Korean aspiration for reunification – attainable in its mind in part by expelling U.S. forces from the Peninsula – and its commitment to perpetuating the Kim family regime are largely unchanged since the nation’s founding in 1948, but its strategies to achieve these goals have evolved significantly. Under Kim Jong Il, DPRK strategy had been focused on internal security; coercive diplomacy to compel acceptance of its diplomatic, economic and security interests; development of strategic military capabilities to deter external attack; and challenging the ROK and the U.S.-ROK Alliance. We anticipate these strategic goals will be consistent under North Korea’s new leader, Kim Jong Un.

Special Inspector General Lessons Learned on the Commander’s Emergency Response Program in Iraq

The CERP was formally established by the Coalition Provisional Authority in July 2003 to provide U.S. military commanders in Iraq with a stabilization tool that benefitted the Iraqi people. The program supported urgent, small-scale projects that local governments could sustain, that generally cost less than $25,000, and that provided employment. DoD defined urgent as “any chronic and acute inadequacy of an essential good or service that, in the judgment of the local commander, calls for immediate action.” Among other things, CERP funds were used to: build schools, health clinics, roads, and sewers; pay condolence payments; support economic development; purchase equipment; and perform civic cleanup. DoD used CERP as a “combat multiplier” whose projects helped improve and maintain security in Iraq through non-lethal means. The program was considered “critical to supporting military commanders in the field in executing counterinsurgency operations” and its pacification effects important to saving lives.

DoD Strategy for Homeland Defense and Defense Support of Civil Authorities February 2013

Defending U.S. territory and the people of the United States is the highest priority of the Department of Defense (DoD), and providing appropriate defense support of civil authorities (DSCA) is one of the Department’s primary missions. This Strategy for Homeland Defense and Defense Support of Civil Authorities orients the Department towards an increasingly complex strategic environment. It emphasizes innovative approaches, greater integration, deepening of external partnerships, and increased effectiveness and efficiencies in DoD’s homeland activities. It applies the vital capabilities of the Total Force – in the Active and Reserve Components – to make the nation more secure and resilient. Finally, the Strategy guides future decisions on homeland defense and civil support issues consistent with the Defense Strategic Guidance and the Quadrennial Defense Review (QDR).

(U//FOUO) U.S. Marine Corps Light Armored Reconnaissance Battalion Operations in Afghanistan Lessons Learned Report

This report is a continuation of the collection effort on units supporting operations in Afghanistan as directed by the Deputy Commandant for Combat Development and Integration. The collection sought to examine the mission, scope, successes, shortfalls, equipment, manning and emerging issues associated with 4th Light Armored Reconnaissance Battalion (4th LAR) operations. Interviews of 28 commanders and staff were conducted at various camps and bases in Afghanistan from December 2009 – April 2010.

DoD Instruction 3025.21 Defense Support of Civilian Law Enforcement Agencies

Establishes DoD policy, assigns responsibilities, and provides procedures for DoD support to Federal, State, tribal, and local civilian law enforcement agencies, including responses to civil disturbances within the United States, including the District of Columbia, the Commonwealth of Puerto Rico, the U.S. Virgin Islands, Guam, American Samoa, the Commonwealth of the Northern Mariana Islands, and any territory or possession of the United States or any other political subdivision thereof in accordance with DoDD 3025.18 (Reference (c)).

(U//FOUO) U.S.-Canada Civil Assistance Plan 2012

This bilateral plan provides a framework for military forces of one nation to support military forces of the other nation that are providing military support of civil authorities. The focus of this document is the unique, bilateral military planning considerations required to align our respective national military plans to respond quickly to national requests for military support of civil authorities. Nothing in this plan prevents either nation from responding unilaterally; rather, this plan will facilitate unity of effort, if and when requests for bilateral support are received.

(U//FOUO) U.S. Army Forensics and Warrant-Based Targeting Newsletter

In January 2009 the Army’s authority to unilaterally apprehend and detain insurgents in Iraq expired. The Army now operates in Iraq at the invitation of the Government of Iraq (GOI). The change in the Army’s authority heightens the guiding principle of working by, with, and through the Iraqi Security Forces (ISF). The Army must work within the Iraqi rule of law when dealing with insurgents who threaten U.S. forces. It requires the Army to work with the ISF and the Iraqi court system to remove insurgents from the street. The Army must learn how the Iraqi system is structured and how its courts operate. The Army must also help educate the Iraqi courts, particularly the judges, on the science of how Americans collect and process evidence (forensics). Educating the judges on forensics is important to the Army having its day in court and its evidence entered into the proceeding against the insurgents.

Restricted U.S. Army Explosives and Demolitions Manual

The doctrine of explosives and demolitions focuses on the procedures that support the combat operations provided by engineer capabilities to the combined arms team. This doctrine reduces the effectiveness of barriers, obstacles, infrastructure, and minefields to maintain mobility and momentum in the operating area. Field Manual (FM) 3-34.214 is the reference manual for explosives and demolitions procedures that support combat operations, as well as, peacetime training missions requiring demolition (the destruction of structures, facilities, or material by use of fire, water, explosives, mechanical, or other means) (FM 1-02) applications.

Restricted U.S. Army Air and Missile Defense Operations Manual

FM 3-01 is the Army Air Defense Artillery’s (ADA) capstone doctrinal publication. The seven chapters that make up this edition of Air and Missile Defense Operations constitute the Army ADA’s view of how it conducts prompt and sustained operations and sets the foundation for developing the other fundamentals and tactics, techniques, and procedures detailed in subordinate field manuals. FM 3-01 also provides operational guidance for commanders and trainers at all echelons.

U.S. Northern Command CONPLAN 3501-08 Defense Support of Civil Authorities (DSCA)

Natural or man-made disasters and special events can be so demanding that local, tribal) state and non-military federal responders are temporarily overwhelmed by the situation. The Department of Defense (DOD) has a long history of supporting civil authorities in the wake of catastrophic events. When directed by the President or the Secretary of Defense (SecDef), United States Northern Command (USNORTHCOM) will respond quickly and effectively to the requests of civil authorities to save livesj prevent human suffering, and mitigate great property damage. The Joint Strategic Capabilities Plan 2008 (JSCP) directs CDRUSNORTHCOM to prepare a plan to support the employment of Title 10 DOD forces providing Defense Support of Civil Authorities (DSCA) in accordance with (IAW) the National Response Framework (NRF), applicable federal law, DOD Directives (DODD), and other policy guidance including those hazards defined by the National Planning Scenarios that are not addressed by other JSCP tasked plans. DSCA is a subset of DOD civil support that is performed within the parameters of the NRF.

(U//FOUO) NSA Field Generation and Over-the-Air Distribution of COMSEC Key Manual

This document is intended as the standard U.S. user’s manual for planning and conducting field key generation and OTAD in support of tactical activities. It is targeted primarily at Joint and Intra-Service Operations and Exercises, particularly those involving forces that do not routinely train or operate together. It also has limited application to Combined operations and exercises involving Allied forces that hold OTAR- and OTAT-capable COMSEC equipment

(U//FOUO) U.S. Army Counterinsurgency Patrolling Handbook

Patrols are one of the most common operations a unit will perform in the counterinsurgency (COIN) environment. A patrol is the basis for many other types of operations. Cordon and search, reconnaissance, demonstration of force, security, and traffic control checkpoints are all activities a unit may perform while on patrol. Patrols are invaluable in the COIN environment because they enable units to interface with the indigenous population and gain human intelligence.

(U//FOUO) U.S. Marine Corps Human Intelligence Exploitation Team (HET) Operations in Iraq Lessons Learned Report

HET is viewed as a highly valuable and effective intelligence generating asset which, in conjunction with other intelligence sources, provides a significant amount of actionable intelligence during operations in Iraq. “The HET teams produced more reporting … than any other intel asset we have out there.” “HETs have been the pointy tip of the spear in this counterinsurgency fight. Two-thirds of MNF-W operations are directly driven by HET operations.” Key observations from this collection include the following.