FOUO Joint Air Defense Operations Homeland (JADO-H) Fuzzy Logic Brief, April 10, 2010.
Department of Defense
National Security Agency
NSA Global Information Grid Information Assurance Roadmap
NSA Global Information Grid Information Assurance Roadmap, October 26, 2004.
U.S. Air Force, U.S. Air Force Research Laboratory
INternational Distributed Unified Reporting Environment (INDURE) User Guide
The International Distributed Uniform Reporting Environment (INDURE) software application provides both a data repository and the reporting tools to interact with that repository in a user-friendly manner. Users are able to insert information into the data repository using a wide variety of reports and make that data available to an international audience. Furthermore, users can query all the data within INDURE and export that data to a variety of external formats and programs. The purpose of INDURE is to provide a data repository into which non DoD communities like NGO’s, USAID and others involved in civil capacity, socio cultural information, events of significance and engagement data can all can input, share, extract and analyze data in concert with DoD entities. INDURE provides these communities with standardized reporting tools that span significant activities (SIGACTS), Civil Capacity information, Socio Cultural and Engagement disciplines.
U.S. Air Force, U.S. Air Force Research Laboratory, U.S. Central Command
INternational Distributed Unified Reporting Environment (INDURE) V1.1 Concept of Operations
This Concept of Operations (CONOPS) identifies and describes the use of International Distributed Unified Reporting Environment (INDURE) Version 1.1 on the World Wide Web Internet domain. Under the guidance of the United States Central Command (USCENTCOM) Theater and Under Secretary Defense – Intelligence (USD-I), the need for INDURE was scoped and funded. INDURE will be fully interoperable with the Combined Information Data Network Exchange (CIDNE) (which resides on Secret and higher classification networks) and will be able to exchange data with CIDNE. The Secret-to-Unclassified exchange will require data to be air-gapped between the systems due to the classification of the information domain CIDNE resides on and will require FDO and/or release authority to move data between domains.
Multi-National Corps Iraq
Kirkuk Provincial Reconstruction Team Overview
Kirkuk Provincial Reconstruction Team Overview, May 10, 2008.
U.S. Air Force
U.S. Air Force SKL Wireless & Black Data Distribution System Overview
FOUO U.S. Air Force Cryptologic Systems Group SKL Wireless & Black Data Distribution System Overview, July 2009.
U.S. Air Force
U.S. Air Force SKL (Simple Key Loader) Instruction Guide
FOUO U.S. Air Force SKL (Simple Key Loader) Instruction Guide, July 2007.
U.S. Central Command
U.S. Central Command “Monitoring the Tactical Network”
FOUO U.S. Central Command “Monitoring the Tactical Network” Brief, April 13, 2010.
U.S. Northern Command
USNORTHCOM General Population Evacuation by Air
USNORTHCOM General Population Evacuation by Air Brief from March 17, 2009.
U.S. Army
U.S. Army Game Studio Serious Games Development
U.S. Army Game Studio Serious Games Development Brief, March 29, 2010.
U.S. Army
U.S. Army Mobile Counter-IED Interactive Trainer (MCIT)
U.S. Army Mobile Counter-IED Interactive Trainer (MCIT), April 2010.
U.S. Air Force
Angel Thunder 2010
U.S. Army
7th Special Forces Group (Airborne) Command Operations Brief
FOUO 7th Special Forces Group (Airborne) Command Operations Brief, May 14, 2009.
Afghanistan, U.S. Army
U.S. Army Combined Arms Center: Afghan Counterinsurgency Lessons Brief
FOUO U.S. Army Combined Arms Center: Afghan Counterinsurgency Lessons Brief, February 17, 2010.
Afghanistan, U.S. Army
U.S. Army Combined Arms Center: Afghan Counterinsurgency Overview Brief
FOUO U.S. Army Combined Arms Center: Afghan Counterinsurgency Overview Brief, February 17, 2010.
Department of Defense, U.S. Forces Iraq
(U//FOUO) U.S. Forces – Iraq Armed Civilian Contractor Oversight Operations Order
Eight FOUO documents comprising the U.S. Forces – Iraq Armed Civilian Contractor Oversight Operations Orders from January-March 2010.
Iraq, Multi-National Corps Iraq, U.S. Forces Iraq
U.S. Forces – Iraq Private Security Contractors (PSC) Registration Requirements
1. (U) SITUATION: USF-I, DEPARTMENT OF STATE AND NUMEROUS OTHER ENTITIES IN IRAQ HAVE CONTRACTED SECURITY OPERATIONS FOR FORWARD OPERATING BASES (FOB) AND PERSONAL SECURITY DETAILS (PSD) TO PRIVATE SECURITY CONTRACTORS (PSC). GOVERNMENT OF IRAQ, MINISTRY OF INTERIOR (MOI) HAS IN RECENT MONTHS INDICATED THAT CONTRACTED SECURITY COMPANIES ARE NOT OPERATING WITH THE THE PURVIEW OF ESTABLISHED LAW.
U.S. Army
U.S. Army Combined Arms Center: Information Engagement in Counterinsurgency
Targets of Psychological Operations
PSYOP can assist counterinsurgency by reaching the following targets:
-Insurgents
-Civilian Populace (US & HN)
-Military Force
-Neutral Elements
-External Hostile Powers
-Local Government
U.S. Army
U.S. Army Network Warfare Battalion Recruitment Brief
FOUO Army Network Warfare Battalion Recruitment Brief, December 18, 2008.
U.S. Army
U.S. Army Intelligence: Subversion and Espionage Directed Against the Army (SAEDA)
FOUO U.S. Army 902d MI GROUP Subversion and Espionage Directed Against the Army (SAEDA) Brief.
Department of Defense
Pentagon Force Protection Agency John Patrick Bedell Active Shooter Brief
At 1836 hrs, Bedell approached Amos and Carraway who were performing access control duties at the Metro Entrance Pre-Screen. As Bedell approached the officer’s and within 3 feet of reaching them he began firing shots from a handgun. Bedell ran between the officers and in the direction of the metro entrance doors. The officers immediately gave chase and returned fire. Bedell was shot twice prior to reaching the doors and fell to the ground. Other PPD Officers in the area responded and secured the area. The building was locked down under Code Red conditions and tenants were advised thru the public address systems to remain in the building and out of the hallways.
Naval Sea Systems Command
U.S. Naval Sea Systems Command Electromagnetic Radiation Hazards Manual
The purpose of this volume is to prescribe operating procedures and precautions to prevent injury to personnel and ignition of volatile vapors from exposure to environmental electromagnetic radiation (EMR). The sources of this EMR include communications transmitters, radars, electronic countermeasures transmitters, and lasers.
U.S. Northern Command
USNORTHCOM Electric Energy Security in the Domestic Theater
USNORTHCOM Electric Energy Security in the Domestic Theater brief from December 14, 2009
Afghanistan, Iraq, U.S. Marine Corps
USMC Irregular Warfare (IW) and Interagency Integration Lessons from OIF/OEF
The following material was extracted from MCCLL reports based on interviews, lessons and observations from operational units that participated in OIF/OEF over the past 36 months. Although this material is based on collections that took place in 2005 through 2007, comments from recent observers and currently deployed individuals indicate that issues on the ground likely remain the same. Content of this paper is grouped in response to specific questions in the TECOM tasking dated 2 April 2008.
U.S. Army
U.S. Army Cyberspace Operations Concept Capability Plan 2016-2028
The U.S. Army Training and Doctrine Command’s assessment of the future operational environment highlights the importance of all aspects of information on the future battlefield. Army forces operate in and among human populations, facing hybrid threats that are innovative, networked, and technologically-savvy. These threats capitalize on emerging technologies to establish and maintain a cultural and social advantage; leveraging these new capabilities for command and control, recruiting, coordinating logistics, raising funds, and propagandizing their message. To operate effectively in this emerging environment, the Army must realign its information “Aim Point.” Army leaders and Soldiers must possess an in-depth understanding of how to leverage information-based capabilities to gain and maintain situational awareness. Understanding how to fight for and leverage the power of information, while denying the adversary’s ability to do the same, will be increasingly critical to success on the future battlefield.