This Concept of Operations (CONOPS) identifies and describes the use of International Distributed Unified Reporting Environment (INDURE) Version 1.1 on the World Wide Web Internet domain. Under the guidance of the United States Central Command (USCENTCOM) Theater and Under Secretary Defense – Intelligence (USD-I), the need for INDURE was scoped and funded. INDURE will be fully interoperable with the Combined Information Data Network Exchange (CIDNE) (which resides on Secret and higher classification networks) and will be able to exchange data with CIDNE. The Secret-to-Unclassified exchange will require data to be air-gapped between the systems due to the classification of the information domain CIDNE resides on and will require FDO and/or release authority to move data between domains.
Kirkuk Provincial Reconstruction Team Overview, May 10, 2008.
FOUO U.S. Air Force Cryptologic Systems Group SKL Wireless & Black Data Distribution System Overview, July 2009.
FOUO U.S. Air Force SKL (Simple Key Loader) Instruction Guide, July 2007.
FOUO U.S. Central Command “Monitoring the Tactical Network” Brief, April 13, 2010.
USNORTHCOM General Population Evacuation by Air Brief from March 17, 2009.
U.S. Army Game Studio Serious Games Development Brief, March 29, 2010.
U.S. Army Mobile Counter-IED Interactive Trainer (MCIT), April 2010.
FOUO 7th Special Forces Group (Airborne) Command Operations Brief, May 14, 2009.
FOUO U.S. Army Combined Arms Center: Afghan Counterinsurgency Lessons Brief, February 17, 2010.
FOUO U.S. Army Combined Arms Center: Afghan Counterinsurgency Overview Brief, February 17, 2010.
Eight FOUO documents comprising the U.S. Forces – Iraq Armed Civilian Contractor Oversight Operations Orders from January-March 2010.
1. (U) SITUATION: USF-I, DEPARTMENT OF STATE AND NUMEROUS OTHER ENTITIES IN IRAQ HAVE CONTRACTED SECURITY OPERATIONS FOR FORWARD OPERATING BASES (FOB) AND PERSONAL SECURITY DETAILS (PSD) TO PRIVATE SECURITY CONTRACTORS (PSC). GOVERNMENT OF IRAQ, MINISTRY OF INTERIOR (MOI) HAS IN RECENT MONTHS INDICATED THAT CONTRACTED SECURITY COMPANIES ARE NOT OPERATING WITH THE THE PURVIEW OF ESTABLISHED LAW.
Targets of Psychological Operations
PSYOP can assist counterinsurgency by reaching the following targets:
-Civilian Populace (US & HN)
-External Hostile Powers
FOUO Army Network Warfare Battalion Recruitment Brief, December 18, 2008.
FOUO U.S. Army 902d MI GROUP Subversion and Espionage Directed Against the Army (SAEDA) Brief.
At 1836 hrs, Bedell approached Amos and Carraway who were performing access control duties at the Metro Entrance Pre-Screen. As Bedell approached the officer’s and within 3 feet of reaching them he began firing shots from a handgun. Bedell ran between the officers and in the direction of the metro entrance doors. The officers immediately gave chase and returned fire. Bedell was shot twice prior to reaching the doors and fell to the ground. Other PPD Officers in the area responded and secured the area. The building was locked down under Code Red conditions and tenants were advised thru the public address systems to remain in the building and out of the hallways.
The purpose of this volume is to prescribe operating procedures and precautions to prevent injury to personnel and ignition of volatile vapors from exposure to environmental electromagnetic radiation (EMR). The sources of this EMR include communications transmitters, radars, electronic countermeasures transmitters, and lasers.
USNORTHCOM Electric Energy Security in the Domestic Theater brief from December 14, 2009
The following material was extracted from MCCLL reports based on interviews, lessons and observations from operational units that participated in OIF/OEF over the past 36 months. Although this material is based on collections that took place in 2005 through 2007, comments from recent observers and currently deployed individuals indicate that issues on the ground likely remain the same. Content of this paper is grouped in response to specific questions in the TECOM tasking dated 2 April 2008.
The U.S. Army Training and Doctrine Command’s assessment of the future operational environment highlights the importance of all aspects of information on the future battlefield. Army forces operate in and among human populations, facing hybrid threats that are innovative, networked, and technologically-savvy. These threats capitalize on emerging technologies to establish and maintain a cultural and social advantage; leveraging these new capabilities for command and control, recruiting, coordinating logistics, raising funds, and propagandizing their message. To operate effectively in this emerging environment, the Army must realign its information “Aim Point.” Army leaders and Soldiers must possess an in-depth understanding of how to leverage information-based capabilities to gain and maintain situational awareness. Understanding how to fight for and leverage the power of information, while denying the adversary’s ability to do the same, will be increasingly critical to success on the future battlefield.
Operation Northwoods was a plan circulated in the U.S. government in 1962 to stage false flag terrorist attacks inside the U.S. and abroad to provoke “military intervention in Cuba”. The plan called for Central Intelligence Agency (CIA) or other operatives to commit genuine acts of terrorism in U.S. cities and elsewhere. These acts of terrorism were to be blamed on Cuba in order to create public support for a war against that nation, which had recently become communist under Fidel Castro. One part of the Operation Northwoods plan was to “develop a Communist Cuban terror campaign in the Miami area, in other Florida cities and even in Washington.”
The purpose of this guide is to give Commanders, Leaders and Soldiers a training tool representing some of the Improvised Explosive Devices (IED) used in both the Iraq and Afghanistan theaters of operation. The intent of this guide is to support readiness, unit training, operational planning, and awareness as well as provide information in relation to Reacting to a Possible Improvised Explosive Device (IED) common task 093-401 -5050. Both training and awareness are a proven and effective force protection tool as well as a combat multiplier.
▼Never before has it been possible for one person to potentially affect an entire Nation‟s security.
▼In 1999 (10 years ago), two Chinese Colonels published a book called “Unrestricted Warfare” that advocated “not fighting” the U.S. directly, but “understanding and employing the principle of asymmetry correctly to allow us [the Chinese] always to find and exploit an enemy’s soft spots.”
▼The idea that a less-capable foe can take on a militarily superior opponent also aligns with the views of the ancient Chinese general, Sun Tzu. In his book “The Art of War,” the strategist advocates stealth, deceptionand indirect attackto overcome a stronger opponent in battle.