Department of Defense

INternational Distributed Unified Reporting Environment (INDURE) User Guide

The International Distributed Uniform Reporting Environment (INDURE) software application provides both a data repository and the reporting tools to interact with that repository in a user-friendly manner. Users are able to insert information into the data repository using a wide variety of reports and make that data available to an international audience. Furthermore, users can query all the data within INDURE and export that data to a variety of external formats and programs. The purpose of INDURE is to provide a data repository into which non DoD communities like NGO’s, USAID and others involved in civil capacity, socio cultural information, events of significance and engagement data can all can input, share, extract and analyze data in concert with DoD entities. INDURE provides these communities with standardized reporting tools that span significant activities (SIGACTS), Civil Capacity information, Socio Cultural and Engagement disciplines.

INternational Distributed Unified Reporting Environment (INDURE) V1.1 Concept of Operations

This Concept of Operations (CONOPS) identifies and describes the use of International Distributed Unified Reporting Environment (INDURE) Version 1.1 on the World Wide Web Internet domain. Under the guidance of the United States Central Command (USCENTCOM) Theater and Under Secretary Defense – Intelligence (USD-I), the need for INDURE was scoped and funded. INDURE will be fully interoperable with the Combined Information Data Network Exchange (CIDNE) (which resides on Secret and higher classification networks) and will be able to exchange data with CIDNE. The Secret-to-Unclassified exchange will require data to be air-gapped between the systems due to the classification of the information domain CIDNE resides on and will require FDO and/or release authority to move data between domains.

U.S. Forces – Iraq Private Security Contractors (PSC) Registration Requirements

1. (U) SITUATION: USF-I, DEPARTMENT OF STATE AND NUMEROUS OTHER ENTITIES IN IRAQ HAVE CONTRACTED SECURITY OPERATIONS FOR FORWARD OPERATING BASES (FOB) AND PERSONAL SECURITY DETAILS (PSD) TO PRIVATE SECURITY CONTRACTORS (PSC). GOVERNMENT OF IRAQ, MINISTRY OF INTERIOR (MOI) HAS IN RECENT MONTHS INDICATED THAT CONTRACTED SECURITY COMPANIES ARE NOT OPERATING WITH THE THE PURVIEW OF ESTABLISHED LAW.

Pentagon Force Protection Agency John Patrick Bedell Active Shooter Brief

At 1836 hrs, Bedell approached Amos and Carraway who were performing access control duties at the Metro Entrance Pre-Screen. As Bedell approached the officer’s and within 3 feet of reaching them he began firing shots from a handgun. Bedell ran between the officers and in the direction of the metro entrance doors. The officers immediately gave chase and returned fire. Bedell was shot twice prior to reaching the doors and fell to the ground. Other PPD Officers in the area responded and secured the area. The building was locked down under Code Red conditions and tenants were advised thru the public address systems to remain in the building and out of the hallways.

USMC Irregular Warfare (IW) and Interagency Integration Lessons from OIF/OEF

The following material was extracted from MCCLL reports based on interviews, lessons and observations from operational units that participated in OIF/OEF over the past 36 months. Although this material is based on collections that took place in 2005 through 2007, comments from recent observers and currently deployed individuals indicate that issues on the ground likely remain the same. Content of this paper is grouped in response to specific questions in the TECOM tasking dated 2 April 2008.

U.S. Army Cyberspace Operations Concept Capability Plan 2016-2028

The U.S. Army Training and Doctrine Command’s assessment of the future operational environment highlights the importance of all aspects of information on the future battlefield. Army forces operate in and among human populations, facing hybrid threats that are innovative, networked, and technologically-savvy. These threats capitalize on emerging technologies to establish and maintain a cultural and social advantage; leveraging these new capabilities for command and control, recruiting, coordinating logistics, raising funds, and propagandizing their message. To operate effectively in this emerging environment, the Army must realign its information “Aim Point.” Army leaders and Soldiers must possess an in-depth understanding of how to leverage information-based capabilities to gain and maintain situational awareness. Understanding how to fight for and leverage the power of information, while denying the adversary’s ability to do the same, will be increasingly critical to success on the future battlefield.