Department of Defense

(U//FOUO//LES) NCIS Guide to Developing Islamic Extremist Counterterrorism Sources

Following the events of September 11, 2001, the US intelligence and law enforcement communities began a fundamental shift in counterterrorism strategy to enhance national safety and security by changing from a reactive to a proactive posture. The communities have actively moved to identify potential threats and develop intelligence on specific terrorist targets. The core objective of these newly concentrated efforts is to reduce risks and manage potential threats by interrupting forward motion before an attack (Borum, 2004a). The ongoing Global Struggle Against Violent Extremism intensified the need for persons and agencies with counterterrorism responsibilities to understand the commitment, connections, capability, and intentions of Islamic extremists – including the Al-Qa’ida affiliated network – so that viable operations targeting terrorist cells can be developed. Ideally, these efforts involve source operations in which someone willing to provide information to US authorities penetrates an operational cell, or where someone with access to the cell is recruited to work for US authorities.

U.S. Army FM 3-19.15 Civil Disturbance Operations

Field Manual (FM) 3-19.15 addresses continental United States (CONUS) and outside continental United States (OCONUS) civil disturbance operations. Today, United States (US) forces are deployed on peacekeeping, peace enforcement, and humanitarian assistance operations worldwide. During these operations, US forces are often faced with unruly and violent crowds intent on disrupting peace and the ability of US forces to maintain peace. Worldwide instability coupled with increasing US military participation in peacekeeping and related operations requires that US forces have access to the most current doctrine and tactics, techniques, and procedures (TTP) necessary to quell riots and restore public order.

U.S. Army Military Police Civil Disturbance and Martial Law Training Course

Civil disturbances may be riots, violent uprisings, or unlawful actions. As a member of the military forces, you may be ordered under certain conditions to help restore law and order and protect property. The National Guard is likely to face most of the violence during demonstrations. To gain successful control of a civil disturbance, it will require an understanding of the reason for social unrest and basic human behavior patterns. Planning control strategy depends on knowing why people behave as they do. Group behavior sets the scene for civil disturbances. However, it is individual behavior which in the end is the most important.

(U//FOUO) USMC Weaponry Technical Information Manual

This manual provides easy-to-use reference data for the more common items of Marine Corps ordnance equipment. The equipment description sheets, which make up the bulk of the manual, provide a description, function, and technical characteristics of the equipment, including, when applicable, fuel and power requirements, power outputs, major components, and associated components. If available, photographs or drawings of the equipment are provided.

DoD Manual for Civil Emergencies

This Manual assigns responsibilities, prescribes procedures, and provides guidance by which the Department of Defense responds to ALL HAZARDS in accordance with 42 U.S.C. 5121, et seq., as amended (hereafter referred to as the Stafford Act, reference (f)). Under the authority of the Civil Defense Act of 1950, 50 U.S.C. App. 2251, et seq., (reference (a)) and National Security Directive 66 (dated March 16, 1992) (reference (m)) this Manual supports the National civil defense policy and Federal and State civil defense programs in cooperation with the Federal Emergency Management Agency (FEMA).

(U//FOUO) U.S. Army Zero-Point Energy Assessment

(U) Zero-point energy (a very general term) is the lowest energy that a given quantum mechanical system can have (i.e., the ground state of the system). In quantum field theory, it refers to the energy of the vacuum (i.e., a space devoid of matter [the energy of “nothing”]). In this paper, we will use the abbreviation ZPE (as is commonly used by those in the field) to refer to the vacuum energy for use in applications.

U.S. Navy NATOPS Air Traffic Control Manual

This manual contains information on administrative and operational procedures for all Navy and Marine Corps units providing air traffic control services and applies on a worldwide basis. Marine forces tactical air traffic control is provided by Marine Air Traffic Control Detachments (MATCD). Each MATCD is organized and equipped to provide continuous all-weather air traffic control services to an independent and geographically separated main air base or air facility and/or remote air sites or points. These services include airport traffic control, low approach and landing, and terminal area control services. To the extent possible and consistent with the ATC requirements of the area to which deployed, the functions, training, qualification, and certification for Marine forces tactical ATC units shall be as prescribed in this manual.

CJCS Military Family “Self-Help Guide” to Antiterrorism

This guide is designed to assist in making you and your family less vulnerable to terrorists. You should review its contents and incorporate protective measures applicable to your particular situation. It is important that you ensure all members of your family are made aware ofthis valuable information so they not only protect themselves, but also become an integral part of the overall community force protection effort. Terrorists generate fear through intimidation, coercion, and acts of violence such as bombings, hijackings, or kidnappings. As recent events have shown, terrorists have reached new levels of organization, sophistication, and violence, often targeting members of the Department of Defense and their families. Their tactics and techniques are also continually changing and will continue to be a challenge to predict and neutralize. Accordingly, we must remain vigilant.

(U//FOUO) USMC Company Intelligence Cell in Stability and Support Operations TTPs

In the asymmetrical threat climate of the 21st century, stability and support operations (SASO) are often conducted from a companylevel firm base (FB). These company and platoon size units need immediate, on-scene intelligence support to deal with an enemy that can recruit, rest, and resupply amongst the population in a predominately urban environment. This requires an intense collection and analysis effort by even the smallest unit. And, because of the noncontiguous nature of SASO, it is unrealistic to expect that higher echelon staffs will consistently be available to support them. Therefore, Marines in small units must establish and maintain a limited, but effective, capability for themselves.

DHS-DoD Memorandum of Agreement on Cybersecurity October 2010

The purpose of the Agreement is to set forth terms by which DHS and DoD will provide personnel, equipment, and facilities in order to increase interdepartmental collaboration in strategic planning for the Nation’s cybersecurity, mutual support for cybersecurity capabilities development, and synchronization of current operational cybersecurity mission activities. Implementing this Agreement will focus national cybersecurity efforts, increasing the overall capacity and capability of both DHS’s homeland security and DoD’s national security missions, while providing integral protection for privacy, civil rights, and civil liberties.

USMC Reserve Security Office WikiLeaks Guidance

The information found on the website “WIKILEAKS” is classified information that was transmitted to that public domain site illegally. Per reference (a) and the enclosures, “Classified Information shall not be declassified automatically as a result of any unauthorized disclosure of identical or similar information.” Despite the circumstances surrounding WIKILEAKS, we must continue to protect similar or identical information commensurate with the level of classification assigned per reference (b), until the information is assessed by the appropriate Original Classification Authority (DCA).

(U//FOUO) Asymmetric Warfare Group “Attack The Network” Counterinsurgency Methodology

This document continues discussion on effective targeting methods (lethal and non-lethal) at the Battalion and Brigade level. It continues dialogue on Attacking the Network by further describing Center of Gravity and Critical Vulnerability analysis themes and their link to network modeling. This document also discusses the use of detailed, Observable Indicators to focus Intelligence Surveillance and Reconnaissance assets against the enemy’s vulnerabilities. A modified Intelligence Synchronization Matrix (ISM) ensures integration and synchronization to the friendly course of action in a Counter-Insurgency environment. Using doctrinal and situational templates and a modified ISM helps the S2 understand the insurgent networks operating in his Area of Interest, focus assets against the known or suspected Critical Vulnerabilities, and synchronize ISR to give the commander the information he needs at the Decision Points.

CJCS Defense Support of Civil Authorities (DSCA) Exord

THE PURPOSE OF THIS EXORD IS TO DELEGATE LIMITED APPROVAL AUTHORITY TO SUPPORTED COMBATANT COMMANDERS, WHO HAVE DSCA RESPONSIBILITIES, FOR ROUTINE PA REQUESTS FOR ASSISTANCE (RFA), INCLUDING THE TYPES OF RFA HISTORICALLY SUBMITTED BY PA, TO PROVIDE A RAPID AND FLEXIBLE DOD RESPONSE TO FEDERAL PRIMARY AGENCIES FOR POTENTIAL OR ACTUAL EMERGENCIES AND OR DISASTERS WITHIN THE UNITED STATES, ITS TERRITORIES, POSSESSIONS, AND PROTECTORATES.

DoD Defense Support to Civil Authorities Handbook

The most legally sensitive function in DSCA is Military Law Enforcement. Consequently, to prevent violations of the law, all military personnel should be educated on MLE. The main legal obstacle to the use of the military for law enforcement is the Posse Comitatus Act (PCA), discussed briefly in Section 2.3.1 of this chapter. (For more detail on PCA, see Annex A.) The PCA affects National Guard (either in State Active Duty (SAD) or Title 32) and federal forces (Title 10) differently. Thus, it is very important to understand the status of military personnel prior to mission assignment.

(U//FOUO) Insurgent Tactics in Southern Afghanistan 2005-2008

This short book provides an up-to-date introduction to the tactics employed by insurgents in southern Afghanistan during the years 2005-2008. It includes vignettes and maps on 19 different tactically significant engagements. The book covers three types of attacks: ambushes, attacks on fixed positions, and defensive engagements. The intended audience is Marines and soldiers going into theatre.

DoD Biometrics HIIDE Device User Guide

The HIIDE includes two separate cameras for imaging an individual’s irises and face, and a sensor pad for scanning fingerprints. These three sensors capture the minute details of a subject’s iris, fingerprint and face, as digital photographs, or “scans.” The HIIDE™ translates the photographic data into a binary code and links that code to biographic data about the individual, such as name and a personal identification number. The HIIDE then processes the code and biographic data and builds a portfolio for the individual that is stored in a database. Once an individual has had a record created, or has been “enrolled,” that individual is part of the HIIDE database. One can “recognize,” or confirm that individual’s identity in the future by comparing a live scan of the subjects: iris, fingerprints and/or face to the biometrics contained in the database.

(U//FOUO) Chemical, Biological, Radiological, and Nuclear Defense Needs Analysis

This document presents the results of the Functional Needs Analysis/Functional Solutions Analysis (FNA/FSA) for the functional area of chemical, biological, radiological, and nuclear defense (CBRND). The FNA/FSA are structured in accordance with the Chairman of the Joint Chief of Staff Instruction (CJCSI) 3170.01D, Joint Capabilities Integration and Development System (JCIDS), and its companion manual, CJCSM 3170.01A, Operation of the Joint Capabilities Integration and Development System.

(U//FOUO) Joint Battle Management Command and Control (JBMC2) Roadmap Version 1.0

This roadmap will be the vehicle for prioritizing, aligning, and synchronizing Service JBMC2 architectural and acquisition efforts. Where policy and other acquisition initiatives are defined to drive JBMC2 developments and related activities, the specific means of application to JBMC2 will be via updates to this roadmap and decisions made by the Under Secretary of Defense for Acquisition, Technology, and Logistics (USD(AT&L)) and U.S. Joint Forces Command (USJFCOM) to ensure overall harmonization across affected efforts and programs. This roadmap provides a strategy with three major parts for integrating current and planned JBMC2 capabilities.