Department of Defense

(U//FOUO) USAF Operating Next-Generation Remotely Piloted Aircraft for Irregular Warfare

RPAs are revolutionary surveillance and weapons delivery systems – changing the way the Air Force builds situation awareness and engages enemy forces – but their full potential has yet to be realized. To begin to address this issue, the Air Force initiated this study to review the state-of-the-art in RPA operations, focusing on control and connectivity in an irregular warfare (IW) environment. The Panel was specifically tasked to identify RPA architectures and operational concepts centered on human-systems integration, distributed systems operations, and effective command and control – a cluster of concepts and technologies we subsequently labeled as “mission management” enablers. The Panel was also tasked to recommend mid- to far-term S&T development roadmaps for advancing these technologies to improve the flexibility and capability of RPA operations.

(U//FOUO) U.S. Army Intelligence Officer’s Handbook

TC 2-50.5 replaces FM 34-8-2, dated 1 May 1998. This publication does not replace the fundamental principles and tactics, techniques, and procedures contained in the other FM 2-series manuals; however, it does focus on their application. It is to be used in conjunction with the other FM 2-series manuals and conforms to the overarching doctrinal concepts presented in FM 3-0 and FM 2-0. The target audience for this manual is the intelligence officers serving as the G-2/S-2 and their staffs— intelligence warrant officers, noncommissioned officers, and junior enlisted Soldiers. TC 2-50.5 applies to the Active Army, the Army National Guard/Army National Guard of the United States, and the U.S. Army Reserve, unless otherwise stated.

(U//FOUO) JFIIT Intelligence Surveillance and Reconnaissance (ISR) Systems Handbook

The purpose of the JFIIT Tactical Leaders Handbook (version 5) is to provide ground maneuver commanders, battle staffs, and soldiers with information regarding Joint Intelligence, Surveillance, and Reconnaissance (ISR) and attack systems and how to leverage these combat multipliers during planning, preparation, and execution of military operations. JFIIT publishes a classified version of this document on the SIPRNET.

(U//FOUO) U.S. Marine Corps Intelligence Afghan Female Engagement Report

The purpose of this document is to outline the role of female engagement on the ground and best uses of female engagement initiatives. While existing academic literature on females in Afghanistan is limited mostly to the urban areas, it is evident that the lives of women in rural Helmand are complex and difficult than is generally understood from open source and academic literature. Female engagement encompasses methodical, long-term outreach efforts to the entire population, men, women, and children, which is essential in a counterinsurgency. Such engagement efforts provide opportunities to connect with both men and women, counter negative Taliban IO efforts, and improve civil affairs efforts.

(U//FOUO) U.S. Army Commander’s Guide to Military Working Dogs (MWDs)

The MWD program endured four decades of peace and brief contingency operations from the end of the Vietnam era to the current Global War on Terrorism. The program remained firmly embedded in the Military Police Corps combat support, law and order, and force protection missions. In late 2001, the onset of military operations in Afghanistan provided the impetus to expand MWD capabilities in support of commanders in the field. In 2002, as a direct result of an immediate operational need in Afghanistan, Army leadership directed the establishment of an Army mine detection dog unit and embedded it in the Corps of Engineers. In 2004, as a result of cooperation between the U.S. Army Engineer School and the U.S. Army Military Police School, the Army added a non-aggressive, specialized search dog (explosives detection dog) to the MWD inventory. Combat tracker dogs are returning to Army use as well, along with a very limited number of human remains detector or cadaver search dogs. Two constants emerge in the 60-plus-year history of Army MWD use: working dogs are used in a variety of units for a wide range of missions, and the size of the MWD program has expanded and contracted over time based on the needs of the Army. In the current and projected future operating environment, the MWD program will undoubtedly expand once again.

(U//FOUO) U.S. Army Commander’s Guide to Female Engagement Teams

Complex operations often require the development of specialized teams with multidisciplinary perspectives. Examples of these groups include human terrain teams, provincial reconstruction teams, and, most recently, female engagement teams (FETs). These specialized programs are tasked with engaging local populations to ascertain information on civil-society needs and problems; address security concerns; and to form links between the populace, military, and interagency partners.

(U//FOUO) Joint Chiefs of Staff Commander’s Handbook for Counter Threat Finance

This handbook provides an understanding of the processes and procedures being employed by joint force commanders (JFCs) and their staffs to plan, execute, and assess counter threat finance (CTF) activities and integrate them into their joint operation/campaign plans. It provides fundamental principles, techniques, and considerations related to CTF that are being employed in the field and are evolving toward incorporation in joint doctrine.

(U//FOUO) Asymmetric Warfare Group Tactical Information Superiority Report

This document facilitates discussion, training, and implementation of effective information superiority methods at the Battalion and Brigade level. This paper discusses the Center of Gravity analysis model for identifying threat networks, Critical Capabilities, and Critical Vulnerabilities; use of the methodology to determine the threat vulnerabilities; and as a basis for understanding how to achieve Information Superiority.

JIEDDO Afghanistan Victim Operated Improvised Explosive Device (VOIED) Recognition Guide

This Recognition Guide focuses on images of VOIED switches, components, and materials. Common IED indicators (observables) are listed and when found, indicate a high probability of IED activity. Refer to this material if something looks: suspicious, out of place, or out of character. This guide is organized by switches (Pressure Plate, Low Metallic Signature, and No Metal Content), main charges, containers, power supplies, initiators, and finally a section on IED factories.

(U//FOUO) U.S. Navy Strategic Studies Group: Convergence of Sea Power and Cyber Power

This plan outlines the Chief of Naval Operations’ (CNO) Strategic Studies Group (SSG) XXVIFs approach to addressing the challenges of operating at the convergence of Sea Power and Cyber Power as presented in the CNO’s Theme. In addition to providing a framework for the approach, this plan presents SSG XXVIFs initial overarching concept and Concept Team (CT) areas of focus.

(U//FOUO) USJFCOM Combat Observation and Decision-Making in Irregular and Ambiguous Conflicts (CODIAC)

This curriculum was directly inspired by the US Marine Corps’ Combat Hunter program. Created in 2007, in response to a dramatic increase in precision fire causalities in Baghdad, Combat Hunter is systematic training designed to improve cognitive skills, showing personnel how to read the human terrain, establish a baseline, detect an anomaly, and make decisions “left of bang.” In other words, Combat Hunter was designed to train personnel to anticipate danger and meet it proactively. In an irregular conflict, this enables personnel to be the “hunters”—not the “hunted.” CODIAC integrates the USMC Combat Hunter principles, along with proven battlefield decision-making and irregular warfare instruction from across the Joint services. The goal of CODIAC is to enhance the ability of individuals and small teams to address irregular challenges by training enhanced observation, battlefield sensemaking, human terrain pattern recognition, and environmental analysis (including knowledge of combat tracking).

(U//FOUO) U.S. Army Drill Sergeant Handbook

Being a drill sergeant may be the most challenging and rewarding assignment a noncommissioned officer will ever experience during his military career. While training initial entry Soldiers to fight and win in today’s Global War on Terrorism, drill sergeants must embody and reflect the Army’s values and standards. This handbook is designed to help new drill sergeants conquer the many challenges of their assignment and succeed in their mission of training Soldiers.

(U//FOUO) U.S. Army Afghanistan Route Clearance Handbook

Route clearance (RC) operations for Operation Enduring Freedom in Afghanistan are much different from RC operations for Operation Iraqi Freedom in terms of the terrain, seasonal weather, level of infrastructure, volume of insurgent threats, sources of improvised explosive device (IED) components, and motivation for IED emplacement. The purpose of this supplement is to focus on RC in Afghanistan.

(U//FOUO) U.S. Army North Crips Targeting Uniformed Soldiers in Retaliation for Oklahoma Murders

On 21 Sep 11, USACIDC reported the CRIPS have put out an order to shoot any Solider in uniform on sight in retaliation for the shooting of their members by Soldiers earlier in the week. The Lawton Oklahoma Police Department has confirmed the CRIPS have threatened to kill soldiers in uniform. The threat stems from when the soldiers, in retaliation for drug rip off, entered the off-post residence of the CRIPS, robbed and subsequently shot some of the CRIPS members. Three of the victims were identified as members of the “107 Hoover CRIPS.”

(U//FOUO) U.S. Forces Iraq Base Transition Smart Book 2011

This is the Final Edition of the USF-I Base Transition Smartbook. Updated from the October 2010 edition, it provides a single-source, quick reference guide for the base transition process, and captures/de-conflicts updated and additional base transition guidance through the use of bold and strike-through text. The information in this Smartbook summarizes base transition Standard Operating Procedures (SOP), published US Forces-Iraq (USF-I) orders/ guidance, and lessons learned from past base transitions to facilitate honorable and successful transitions of remaining non-enduring bases and enduring sites. The USF-I Base Transition Smartbook is the guiding document for transitioning USF-I bases in the Iraq Joint Operations Area (IJOA) to the Government of Iraq (GoI). Guidance is intended to be flexible enough to fit a range of situations, and to ensure a base is transferred properly, in accordance with applicable laws and regulations. The Base Transition Smartbook is located on the USF-I J7 website. Revisions are summarized below and highlighted throughout the text.

(U//FOUO) U.S. Army Rollout of the iSALUTE Counterintelligence Reporting Portal

Successful counterintelligence (CI) operations depend on accurate and timely reporting of questionable activities to Army counterintelligence. Reports can be initiated through the ISALUTE online reporting portal. Basic information is transmitted to the Army CI coordinating authority (ACICA) for the review and referral to the local CI office or other agencies for the further investigation as needed. In order to provide all Army personnel with the knowledge on how to expeditiously report CI related information the appropriate links to the ISALUTE reporting tool must be disseminated widely. ISALUTE is an online counterintelligence (CI) reporting portal designed to complement other Army threat awareness and reporting initiatives and foster partnerships with the CI, law enforcement organizations, and Army communities. ISALUTE focuses on foreign threats to the DOD and Army from espionage activities, terrorist threats and the insider threat.

U.S. Army Has a Problem With “Toxic Leadership”

The Center for Army Leadership Annual Survey of Army Leadership (CASAL) assesses and tracks trends (since 2005) in Army leader attitudes of leader development, the quality of leadership, and the contribution of leadership to mission accomplishment. CASAL provides research guidance for policy decisions and program development. CASAL is a reliable source because a rigorous scientific approach is used for survey development, data collection, and data analysis including a large random representative sample and high precision. Additionally, findings are calibrated with other Army research. This report will establish a framework, present qualitative and quantitative findings from the 2009 CASAL, quantitative findings from the 2010 CASAL, initial data from the 2011 Profession of Arms campaign (PoA) survey and senior leader survey, and open literature regarding toxic leadership.