Department of Defense

(U//FOUO) Center for Naval Analyses Study: The War in Southern Afghanistan 2001-2008

This study examines the history of the fighting in southern and western Afghanistan since 2001. The Marine Corps Intelligence Activity sponsored the study. Its purpose is to give Marines a basic understanding of what has happened in southern and western Afghanistan. Most Marines will operate in that area and we hope a historical reference source will be useful. If the study has any single argument it is that government misrule has been a driving factor behind the continuing violence in southern and western Afghanistan. The Afghan government favored warlords, handicapped competent governors, took part in the poppy trade, and allowed the police to abuse the people. Scarcity of security forces and collateral damage from Coalition operations did not help either. Yet above all, we find it unlikely that the instability in southern and western Afghanistan today could have been averted without addressing government misrule.

U.S. Strategic Bombing Survey: The Effects of the Atomic Bombings of Hiroshima and Nagasaki June 1946

The available facts about the power of the atomic bomb as a military weapon lie in the story of what it did at Hiroshima and Nagasaki. Many of these facts have been published, in official and unofficial form, but mingled with distortions or errors. The U.S. Strategic Bombing Survey, therefore, in partial fulfillment of the mission for which it was established, has put together in these pages a fairly full account of just what the atomic bombs did at Hiroshima and Nagasaki. Together with an explanation of how the bomb achieved these effects, this report states the extent and nature of the damage, the casualties, and the political repercussions from the two attacks. The basis is the observation, measurement, and analysis of the Survey’s investigators. The conjecture that is necessary for understanding of complex phenomena and for applying the findings to the problems of defense of the U.S. is clearly labeled.

(U//FOUO) Joint Improvised Explosive Device Defeat Organization (JIEDDO) Attack the Network Lexicon

This first edition of the Attack the Network (AtN) Lexicon was produced by the Joint Improvised Explosive Device Defeat Organization (JIEDDO). The lexicon contents were developed after extensive interviews with military units who successfully employed AtN principles and practices to reduce the number and effectiveness of Improvised Explosive Devices (IEDs) in the Counter-Insurgency (COIN) environment where they encountered multiple and sometimes interconnected adversary networks. The lexicon contents were further developed and refined by subject matter experts from over fifty organizations across the Departments of Defense, Justice, and Homeland Security.

JIEDDO Report: Iranian Weapons Smuggling Activities in Afghanistan

This study investigates Iran’s strategy of smuggling weapons to Afghan insurgents. Based on the hypothesis that Iran utilizes its weapons smuggling networks as proxies to leverage against foreign threats with predictable results, this study will address Iran’s future weapons smuggling behaviors. Iran, like the United States, is a complex actor pursuing rational, national strategic objectives. The perceived dichotomy between Iran’s words and actions results in an atmosphere of suspicion surrounding Iranian motives that can potentially lead to unintended escalations between Iran and other nations. An increase in tensions between the U.S. and Iran, specifically over perceived threats to Iranian sovereignty, will be matched with an increase in the rate and quantity of weapons, an introduction of more capable weapons, or both. Given the elasticity of realizing strategic success by increasing the rate and quantity of weapons, Iran will likely attempt to quickly counter an imminent threat by deploying more destructive weapons comparable to those Iran supplies to Lebanese Hezbollah.

DoD Science and Technology for Communication and Persuasion Abroad Analysis

Over the last 10 years, the U.S. government has made significant investments in science and technology in order to enhance its ability to understand and shape public opinion and behavior abroad—a domain of activity referred to in this report as “shaping,” “influencing,” or “communication and persuasion.” Because this effort is taking place across a vast government bureaucracy, the policy-makers and practitioners engaged in communication and persuasion do not always know what tools are at their disposal and what tools need to be invented. To address this problem, the Department of Defense’s Rapid Reaction Technology Office (RRTO) issued a “Strategic Communication Science and Technology Plan” in 2009 that surveyed the government’s programs in this area and their gaps. To keep abreast of the latest technological developments, RRTO commissioned CNA to update this report for FY 2012. The updated report discusses domains for future investment in research and development (R&D); identifies gaps and proposes new science and technology (S&T) initiatives; and surveys current S&T programs.

Restricted U.S. Military Multi-Service Air Operations in Maritime Surface Warfare Manual

This publication provides multi-Service TTP for the seamless integration of air assets during the conduct of maritime surface warfare. The maritime domain is defined as the oceans, seas, bays, estuaries, islands, coastal areas, and the airspace above these, including the littorals. AOMSW is intended to support the joint force commander’s (JFC’s) objectives by providing capabilities/forces in support of joint maritime operations. The end state of this publication is a streamlined support process for maritime surface warfare within the joint force maritime component commander’s (JFMCC’s) area of operations (AO).

(U//FOUO) U.S. Army Soldier Surveillance: Fundamentals of Tactical Information Collection

This manual is a compilation of tools to help all Soldiers collect information through surveillance, reconnaissance, patrolling, interacting with the local populace, tactical site exploitation, tactical questioning and detainee handling, briefing, debriefing, and reporting in offensive, defensive, stability operations, and civil support operations. Most of the text was developed specifically for patrols and to conduct traffic control points (TCPs) or roadblocks, and other missions where Soldiers will interact with the local populace including site exploitation and tactical questioning after a planned or hasty raid. The term “patrol” could reflect a platoon, section, fire team, or other special-purpose group given a mission as listed above.

Sworn Declaration of Whistleblower William Binney on NSA Domestic Surveillance Capabilities

The NSA has the capability to do individualized searches, similar to Google, for particular electronic communications in real time through such criteria as target addresses, locations, countries and phone numbers, as well as watch-listed names, keywords, and phrases in email. The NSA also has the capability to seize and store most electronic communications passing through its U.S. intercept centers. The wholesale collection of data allows the NSA to identify and analyze Entities or Communities of interest later in a static database. Based on my proximity to the PSP and my years of experience at the NSA, I can draw informed conclusions from the available facts. Those facts indicate that the NSA is doing both.

Special Inspector General Final Forensic Audit of Iraq Reconstruction Funds

SIGIR audits, inspections, and investigations have found serious weaknesses in the government’s controls over Iraq reconstruction funds that put billions of American taxpayer dollars at risk of waste and misappropriation. The precise amount lost to fraud and waste can never be known, but SIGIR believes it is significant. As of June 30, 2012, SIGIR audit reports had questioned $635.8 million in costs, and SIGIR Investigations, working with other agencies, had resulted in $176.84 million in fines, forfeitures, and other monetary results.

U.S. Northern Command Homeland Defense/Civil Support Capabilities Assessment Study Plan

This Study Plan outlines the background, scope, strategic assumptions, study objectives, analysis methodology, scenario considerations, timeline, and management responsibilities in conducting the Homeland Defense and Civil Support Capabilities-based Assessment (HD/CS CBA) to include production of the Functional Area Analysis (FAA), Functional Needs Analysis (FNA) and a Joint Capabilities Document (JCD). This CBA, through the execution of the FAA, FNA. And JCD; identifies, describes, documents, and prioritizes DOD’s capability gaps and excesses in the HD/CS mission areas (to include the Mission Assurance (MA) function).

U.S. Army Military Police School Enemy Prisoner of War and Civilian Internee Policy and Operations Courses

As a military police supervisor, you may become involved with EPW/CI operations in a variety of ways. The Army Military Police have the primary responsibility for EPW/CI operations for the Department of Defense. In any form of hostilities in which the United States is involved, persons that are captured or surrender who cannot be readily classified will be treated as EPW/CI until such time as they are reclassified by competent authority. This includes low intensity conflicts, as well as declared wars. In some cases, you may find yourself as an advisor to other countries. You will be expected to encourage those whom you are advising to afford the same treatment to their prisoners.

U.S. Army Military Police School Detainee Policy, Procedures, and Operations Course

This lesson describes detainees captured or detained by the US Armed Forces and provides key definitions. These definitions explain the different personnel categories that a Military Police (MP) commander may be required to handle, protect, account for, and ensure are treated according to established laws, regulations, and international agreements. For the purpose of this lesson, the broader use of the word “detainee” applies to Enemy Prisoners of War (EPWs), Civilian Internees (CIs), Retained Persons (RPs), and other classification terms for US-controlled persons unless otherwise specified. Use of specific detainee classifications does not preclude protections granted according to Geneva Conventions I through IV (1949), Department of Defense (DoD) Directive 5100.77, or protections promulgated under paragraph 1-5 of Army Regulation (AR) 190-8. MP leaders and Soldiers conducting Internment/Resettlement (I/R) operations must maintain task proficiency for each category. For the purposes of this subcourse, detainee operations are defined as operations that take or keep selected individuals in custody as a result of military operations to control their movement and activity and/or gain intelligence.

DARPA Fog Computing Leak Prevention Software Design Report

This is the design documents for the Allure Defender system. This document is a high level design and API of the components that make up the Allure Defender system. We outline all the high-level pieces and then the individual components, their behaviors, expected input/outputs, and relationships. We will discuss specific implementation and design choices and languages and libraries that will be used. In addition we will cover specific user cases and illustrate some running examples. Last we refer to a running system which implements many of the components we cover in the document.

(U//FOUO) U.S. Marine Corps Intelligence Activity Afghanistan: Key Bases and Figures of the Mujahideen

Afghanistan’s Pashtun rural population has been the source of manpower, funds, shelter, support, and intelligence for the repeated insurgencies that have plagued that unfortunate county since their monarch, Zahir Shah, was overthrown in 1973. In the general unrest that followed, insurgents opposed Mohammad Daoud’s army until he was overthrown by the communists who served in succession – Taraki, Amin, Karmal, and Najibullah. The communist leadership figures, in turn, were deposed by the anti-communist “Seven Party Alliance” that was soon battling among itself for control of Kabul until the Taliban Movement emerged. The Taliban was also faced with resisting insurgent forces, primarily from the non-Pashtun ethnic groups inhabiting Afghanistan’s northern provinces. Afghanistan’s rural insurgents are generally poorly educated, if literate at all, and succeeding generations of insurgents rely upon story-telling from earlier generations of fighters to gain knowledge of tactics that are applicable to their particular culture and terrain.

U.S. Army – Marine Corps Ground Robotics Master Plan Version 3

The PM RS JPO initiated development of an integrated GRMP in response to direction from senior Army and Marine Corps leadership in 2005. The GRMP is intended to provide Army and Marine Corps ground robotic stakeholders a common information resource document, as well as a comprehensive plan that links robotic S&T Projects and Acquisition/Contingency Programs to User Current Capability Gaps, Future Capability Gaps, and S&T Shortfalls. The pressing need for reliable ground robotic systems capable of detecting and warning of the presence of hidden improvised explosive devices (IEDs), chemical and biological agents, and related threats to ground troops employed by insurgents in combat zones greatly increases the importance of making every S&T dollar count toward filling critical User capability gaps. In addition, the GRMP provides decision makers a tool for making critical resource decisions.

Joint and Coalition Operational Analysis (JCOA) Decade of War: Enduring Lessons from the Past Decade of Operations

In general, operations during the first half of the decade were often marked by numerous missteps and challenges as the US government and military applied a strategy and force suited for a different threat and environment. Operations in the second half of the decade often featured successful adaptation to overcome these challenges. From its study of these operations, JCOA identified overarching, enduring lessons for the joint force that present opportunities for the US to learn and improve, best practices that the US can sustain, and emerging risk factors that the US should address. These lessons were derived from JCOA’s 46 studies during this past decade and vetted through the Joint Staff J7-sponsored Decade of War working group in May 2012; input from working group members was consolidated into this report. This initial effort is envisioned to be the first volume in a sustained, multi-phased effort to identify critical, high-level lessons for the joint force.

(U//FOUO) U.S. Army Rules of Engagement Vignettes Handbook

Vignettes put the rules of engagement (ROE) into context. Rules can be memorized, but without context, those rules have little meaning or value. There is not a repository of vignettes readily accessible to Soldiers. This handbook addresses that shortcoming for units heading to Afghanistan. Soldiers can use this handbook individually, but its value is greatly increased through group discussion and interaction with leaders and judge advocates.

(U//FOUO) U.S. Navy Strategic Studies Group: The Unmanned Opportunity

The Chief of Naval Operations (CNO) Strategic Studies Group (SSG) is chartered with generating revolutionary naval warfighting concepts. SSG XXVIII has been tasked to generate innovative concepts for the operational and tactical employment of unmanned systems, in all domains, as an integral part of the Naval Force for 2020 and beyond. From these innovative concepts, SSG XXVIII is also tasked to produce recommendations and actionable steps for implementation of unmanned systems integration into the Navy’s force structure. This Way Ahead Plan provides a framework for SSG XXVIII’s approach to address this task and challenge. It includes a summary of the SSG’s preliminary thoughts on the value of unmanned systems, an initial overarching concept, and associated concept teams and areas of interest.