This publication describes ARSOF CBRN missions and tasks for the chemical reconnaissance detachment (CRD), chemical decontamination detachments (CDDs), ARSOF CBRN reconnaissance and survey operations, decontamination and reconnaissance teams (DRTs), and ARSOF sensitive site exploitation (SSE), and discusses reachback capability. This publication provides a basis for understanding the requirements of individual special operations forces (SOF) personnel operating in CBRN environments, as well as the requirements of ARSOF staff planners across the range of military operations. The manual also provides guidance for commanders who determine force structure, equipment, material, and operational requirements necessary to conduct SOF CBRN missions described herein.
A map depicting the approximate locations, members and national affiliations of every human terrain team operating in Afghanistan as part of the U.S. Army’s Human Terrain System. The information is accurate as of April 3, 2012.
Restricted U.S. Army Unmanned Aircraft Systems (UAS) Ground Based Sense and Avoid (GBSAA) Airspace Integration presentation from July 2009.
U.S. and allied combat operations continue to highlight the value of unmanned systems in the modern combat environment. Combatant Commanders (CCDRs) and warfighters value the inherent features of unmanned systems, especially their persistence, versatility, and reduced risk to human life. The U.S. military Services are fielding these systems in rapidly increasing numbers across all domains: air, ground, and maritime. Unmanned systems provide diverse capabilities to the joint commander to conduct operations across the range of military operations: environmental sensing and battlespace awareness; chemical, biological, radiological, and nuclear (CBRN) detection; counter-improvised explosive device (C-IED) capabilities; port security; precision targeting; and precision strike. Furthermore, the capabilities provided by these unmanned systems continue to expand.
Army General Officer Public Roster (By Rank) from April 2012.
(U//FOUO) U.S. Marine Corps 21st‐Century Marine Expeditionary Intelligence Analysis (MEIA‐21) Overview
MEIA‐21 is a formal initiative to structure, standardize, and professionalize tactical intelligence analysis in the Marine Corps. It professionalizes Marine expeditionary intelligence, equipping intelligence analysts with analytically rigorous Structured Models, Approaches, and Techniques (SMATs)—applied tradecraft—to provide commanders with actionable, reliable tactical intelligence in conventional and irregular warfare while also instilling the cognitive and creative skills to create and refine that tradecraft.
The U.S. Department of Defense (DoD) has a long history of conducting security force assistance (SFA)-type activities. These activities were primarily focused on gaining access and influence to partner nations (PN). However, by 2005, the purpose of SFA-type activities had evolved. SFA would now enable and develop the sustainable capabilities of foreign security forces (FSF) to a sufficient capacity in order to provide regional stability. The primary purpose of SFA is the development of sustainable capabilities to allow PNs to defend themselves or contribute to operations elsewhere. This is a fundamental shift in how and why the DoD conducts SFA.
The purpose of The Counterinsurgency Training Center—Afghanistan (CTC-A) “Counterinsurgent’s Guidebook” is two-fold. First, to provide a common language and framework for counterinsurgents currently engaged in Afghanistan, as well as those involved in yet-foreseen conflicts. While each insurgency is unique, the principles, processes, and tools in this Guidebook are intended to be broadly applicable. The second purpose is to provide a structured cognitive process—and supporting tools—whereby counterinsurgents can translate existing counterinsurgency doctrine and theory into practical application. The intended audience for this Guidebook is operational and tactical level U.S./NATO/Coalition counterinsurgents, military and non-military alike.
The Money As A Weapon System – Afghanistan Commander’s Emergency Response Program Standard Operating Procedure supports the United States Government Integrated Civilian-Military Campaign Plan and ISAF Theater Campaign Plan (TCP). The Theater Campaign Plan lists objectives that include improving governance and socio-economic development in order to provide a secure environment for sustainable stability that is observable to the population. CERP provides an enabling tool that commanders can utilize to achieve these objectives. This is accomplished through an assortment of projects planned with desired COIN effects such as addressing urgent needs of the population, promoting GIRoA legitimacy, countering Taliban influence, increasing needed capacity, gaining access, building/expanding relationships, promoting economic growth, and demonstrating positive intent or goodwill.
21st‐Century Marine Expeditionary Intelligence Analysis (MEIA‐21) is a formal initiative to structure, standardize, and professionalize tactical intelligence analysis in the Marine Corps. It professionalizes Marine expeditionary intelligence, equipping intelligence analysts with analytically rigorous Structured Models, Approaches, and Techniques (SMATs)—applied tradecraft—to provide commanders with actionable, reliable tactical intelligence in conventional and irregular warfare while also instilling the cognitive and creative skills to create and refine that tradecraft.
No person will restrict a member of the Armed Services from communicating with a member of Congress; an Inspector General; a member of a DOD audit, inspection, investigation or law enforcement organization; an EO/EEO representative; or anyone in the chain of command. Soldiers will be free from reprisal for making or preparing such communications. No employee or Soldier may take or threaten to take an unfavorable personnel action, or to withhold or threaten to withhold favorable personnel action, in reprisal against any Soldier for making or preparing a protected communication. Personnel Action is defined as any action that affects or has the potential to affect the member’s current position or career. These include promotions; disciplinary or other corrective action; transfer or reassignment; performance evaluation; decision on pay, benefits, awards, or training; referral for a mental health evaluation; or other significant change in duties inconsistent with the member’s rank.
A letter from the Commander of U.S. Cyber Command Keith Alexander to Senator John McCain describing the role of U.S. Cyber Command and its position on current efforts to pass cybersecurity legislation.
The President is authorized by the Constitution and laws of the United States to employ the Armed Forces of the United States to suppress insurrections, rebellions, and domestic violence under various conditions and circumstances. Planning and preparedness by the Federal Government and the Department of Defense for civil disturbances are important due to the potential severity of the consequences of such events for the Nation and the population.
I/R operations facilitate the ability to conduct rapid and decisive combat operations; deter, mitigate, and defeat threats to populations that may result in conflict; reverse conditions of human suffering; and build the capacity of a foreign government to effectively care for and govern its population. This includes capabilities to conduct shaping operations across the spectrum of military operations to mitigate and defeat the underlying conditions for conflict and counter the core motivations that result in support to criminal, terrorist, insurgent, and other destabilizing groups. I/R operations also include the daily incarceration of U.S. military prisoners at facilities throughout the world.
U.S. Army Regulation 190–8 Enemy Prisoners of War, Retained Personnel, Civilian Internees and Other Detainees
This regulation provides policy, procedures, and responsibilities for the administration, treatment, employment, and compensation of enemy prisoners of war (EPW), retained personnel (RP), civilian internees (CI) and other detainees (OD) in the custody of U.S. Armed Forces. This regulation also establishes procedures for transfer of custody from the United States to another detaining power.
A map and list of possible locations of NSA domestic interception points inside the United States. The list was presented by computer security researcher Jacob Appelbaum at a recent event held at the Whitney Museum in New York along with filmmaker Laura Poitras and ex-NSA employee William Binney. One of the addresses, an AT&T building on Folsom Street in San Francisco, is the location of Room 641A which was the subject of multiple lawsuits regarding warrantless surveillance of U.S. citizens. A recent article in Wired quoted Binney as estimating that there are likely ten to twenty of these locations around the country.
The focus of NTP-4 Echo (Naval Communications) is to provide a basic manual addressing C4I concepts and capabilities in the U.S. Navy. Due to increased proliferation of Information Technology (IT) within DoN and the high demand for information dominance within the battle space, the need for a “primary source” C4I document has never been greater. To that end, Naval Network Warfare Command initiated a major revision to this publication reflecting the latest C4I equipment/systems in use today.
In warfighting and counterinsurgency operations, partnering is a command arrangement between a US security force and a host nation (HN) security force in which both forces operate together to achieve mission success and to build the capacity and capability of the HN force. Partnering is not an end, but a deliberate process, a means to an end. A near-term goal might be the standup and development of a HN force increasingly capable of independent operations and decreasingly dependent upon US partnered support. An intermediate objective might be the transition of lead security responsibility from US to HN force. But the ultimate goal is to become “un”-partnered, to enable the HN force to assume full responsibility for security and stability. In warfighting and counterinsurgency partnering, divorce is not a bad ending, it is the desired outcome.
This regulation establishes the Department of the Army Civilian Police and Security Guard (DACP/SG) Program. It assigns responsibilities and establishes policy, standards, and procedures for the effective implementation of the DACP/SG Program. This regulation applies to all Department of the Army civilian personnel in career series 0083 and 0085 and contract security personnel employed by the U.S. Army and involved in the safeguarding and protection of personnel and property.
This regulation establishes the Army Antiterrorism (AT) Program to protect personnel (Soldiers, members of other Services, Department of the Army (DA) civilian employees, Department of Defense (DOD) contractors and Family members of DOD employees), information, property, and facilities (including civil work and like projects) in all locations and situations against terrorism.
This report provides an assessment of Department of Defense (DoD) efforts over the past two years to implement requirements set forth in the 2009 DoD Instruction 3000.05, Stability Operations. It highlights significant initiatives currently underway or planned throughout DoD and provides recommendations and key findings to achieve further progress.
(U//FOUO) U.S. Air Force Small Unmanned Aircraft Systems (SUAS) Airpower Lessons from Iraq and Afghanistan
“Enduring Airpower Lessons from Operation ENDURING FREEDOM (OEF) and Operation IRAQI FREEDOM (OIF)” is one of three lessons learned (L2) focus areas directed by the Chief of Staff of the Air Force (CSAF) at CORONA Top 2008. This report is the third and last in a series of Unmanned Aircraft Systems (UAS) L2 reports produced for fiscal year 2009 and focuses on Small UAS (SUAS) capabilities and issues.
Several reports from the Department of Defense’s Joint Spectrum Center were originally published in April 2010 by a small blog called DoD Leaks. The blog published less than a dozen documents over a two month span and then ceased all activity. The blog’s description states that it was created in response to Cryptome’s call for more publication of “for official use only” documents that are available in the public sphere. These documents relate to frequency allocation and electromagnetic interference tests conducted in relation to datalinks used by Predator drones.
(U//FOUO) U.S. Army Small Unmanned Aerial Vehicle (SUAV) Airspace Command and Control (A2C2) Handbook
The purpose of this handbook is to enhance understanding of Army airspace command and control (A2C2) to mitigate risks between small unit unmanned aerial vehicles (SUAVs) and rotary wing operations below the coordinating altitude. This handbook provides leaders at the brigade and below with guidelines in the form of airspace coordination techniques and procedures regarding SUAV mission planning and airspace deconfliction.
A manual produced by the DoD’s Joint Personnel Recovery Agency (JPRA) and used by instructors in the JPRA’s Survival Evasion Resistance Escape (SERE) courses to train participants for the potential experience of detention. According to Jason Leopold and Jeffrey Kaye of Truthout, the manual was reportedly consulted during high-level discussions in the Bush administration regarding potential “enhanced interrogation techniques.” Several techniques described in the manual are mentioned in a series of controversial memos commonly referred to as the “Torture memos” authored by Justice Department Office of Legal Counsel attorney John Yoo.