Department of Defense

INternational Distributed Unified Reporting Environment (INDURE) V1.1 Concept of Operations

This Concept of Operations (CONOPS) identifies and describes the use of International Distributed Unified Reporting Environment (INDURE) Version 1.1 on the World Wide Web Internet domain. Under the guidance of the United States Central Command (USCENTCOM) Theater and Under Secretary Defense – Intelligence (USD-I), the need for INDURE was scoped and funded. INDURE will be fully interoperable with the Combined Information Data Network Exchange (CIDNE) (which resides on Secret and higher classification networks) and will be able to exchange data with CIDNE. The Secret-to-Unclassified exchange will require data to be air-gapped between the systems due to the classification of the information domain CIDNE resides on and will require FDO and/or release authority to move data between domains.

U.S. Forces – Iraq Private Security Contractors (PSC) Registration Requirements

1. (U) SITUATION: USF-I, DEPARTMENT OF STATE AND NUMEROUS OTHER ENTITIES IN IRAQ HAVE CONTRACTED SECURITY OPERATIONS FOR FORWARD OPERATING BASES (FOB) AND PERSONAL SECURITY DETAILS (PSD) TO PRIVATE SECURITY CONTRACTORS (PSC). GOVERNMENT OF IRAQ, MINISTRY OF INTERIOR (MOI) HAS IN RECENT MONTHS INDICATED THAT CONTRACTED SECURITY COMPANIES ARE NOT OPERATING WITH THE THE PURVIEW OF ESTABLISHED LAW.

Pentagon Force Protection Agency John Patrick Bedell Active Shooter Brief

At 1836 hrs, Bedell approached Amos and Carraway who were performing access control duties at the Metro Entrance Pre-Screen. As Bedell approached the officer’s and within 3 feet of reaching them he began firing shots from a handgun. Bedell ran between the officers and in the direction of the metro entrance doors. The officers immediately gave chase and returned fire. Bedell was shot twice prior to reaching the doors and fell to the ground. Other PPD Officers in the area responded and secured the area. The building was locked down under Code Red conditions and tenants were advised thru the public address systems to remain in the building and out of the hallways.

USMC Irregular Warfare (IW) and Interagency Integration Lessons from OIF/OEF

The following material was extracted from MCCLL reports based on interviews, lessons and observations from operational units that participated in OIF/OEF over the past 36 months. Although this material is based on collections that took place in 2005 through 2007, comments from recent observers and currently deployed individuals indicate that issues on the ground likely remain the same. Content of this paper is grouped in response to specific questions in the TECOM tasking dated 2 April 2008.

U.S. Army Cyberspace Operations Concept Capability Plan 2016-2028

The U.S. Army Training and Doctrine Command’s assessment of the future operational environment highlights the importance of all aspects of information on the future battlefield. Army forces operate in and among human populations, facing hybrid threats that are innovative, networked, and technologically-savvy. These threats capitalize on emerging technologies to establish and maintain a cultural and social advantage; leveraging these new capabilities for command and control, recruiting, coordinating logistics, raising funds, and propagandizing their message. To operate effectively in this emerging environment, the Army must realign its information “Aim Point.” Army leaders and Soldiers must possess an in-depth understanding of how to leverage information-based capabilities to gain and maintain situational awareness. Understanding how to fight for and leverage the power of information, while denying the adversary’s ability to do the same, will be increasingly critical to success on the future battlefield.

Operation Northwoods

Operation Northwoods was a plan circulated in the U.S. government in 1962 to stage false flag terrorist attacks inside the U.S. and abroad to provoke “military intervention in Cuba”. The plan called for Central Intelligence Agency (CIA) or other operatives to commit genuine acts of terrorism in U.S. cities and elsewhere. These acts of terrorism were to be blamed on Cuba in order to create public support for a war against that nation, which had recently become communist under Fidel Castro. One part of the Operation Northwoods plan was to “develop a Communist Cuban terror campaign in the Miami area, in other Florida cities and even in Washington.”

U.S. Army Improvised Explosive Device (IED) Awareness Guide Iraq and Afghanistan

The purpose of this guide is to give Commanders, Leaders and Soldiers a training tool representing some of the Improvised Explosive Devices (IED) used in both the Iraq and Afghanistan theaters of operation. The intent of this guide is to support readiness, unit training, operational planning, and awareness as well as provide information in relation to Reacting to a Possible Improvised Explosive Device (IED) common task 093-401 -5050. Both training and awareness are a proven and effective force protection tool as well as a combat multiplier.

SPAWAR/USCYBERCOM Cyber Warfare, Exploitation & Information Dominance (CWEID) Lab Overview

Opening Statements
▼Never before has it been possible for one person to potentially affect an entire Nation‟s security.
▼In 1999 (10 years ago), two Chinese Colonels published a book called “Unrestricted Warfare” that advocated “not fighting” the U.S. directly, but “understanding and employing the principle of asymmetry correctly to allow us [the Chinese] always to find and exploit an enemy’s soft spots.”
▼The idea that a less-capable foe can take on a militarily superior opponent also aligns with the views of the ancient Chinese general, Sun Tzu. In his book “The Art of War,” the strategist advocates stealth, deceptionand indirect attackto overcome a stronger opponent in battle.