Department of Defense

Operation Northwoods

Operation Northwoods was a plan circulated in the U.S. government in 1962 to stage false flag terrorist attacks inside the U.S. and abroad to provoke “military intervention in Cuba”. The plan called for Central Intelligence Agency (CIA) or other operatives to commit genuine acts of terrorism in U.S. cities and elsewhere. These acts of terrorism were to be blamed on Cuba in order to create public support for a war against that nation, which had recently become communist under Fidel Castro. One part of the Operation Northwoods plan was to “develop a Communist Cuban terror campaign in the Miami area, in other Florida cities and even in Washington.”

U.S. Army Improvised Explosive Device (IED) Awareness Guide Iraq and Afghanistan

The purpose of this guide is to give Commanders, Leaders and Soldiers a training tool representing some of the Improvised Explosive Devices (IED) used in both the Iraq and Afghanistan theaters of operation. The intent of this guide is to support readiness, unit training, operational planning, and awareness as well as provide information in relation to Reacting to a Possible Improvised Explosive Device (IED) common task 093-401 -5050. Both training and awareness are a proven and effective force protection tool as well as a combat multiplier.

SPAWAR/USCYBERCOM Cyber Warfare, Exploitation & Information Dominance (CWEID) Lab Overview

Opening Statements
▼Never before has it been possible for one person to potentially affect an entire Nation‟s security.
▼In 1999 (10 years ago), two Chinese Colonels published a book called “Unrestricted Warfare” that advocated “not fighting” the U.S. directly, but “understanding and employing the principle of asymmetry correctly to allow us [the Chinese] always to find and exploit an enemy’s soft spots.”
▼The idea that a less-capable foe can take on a militarily superior opponent also aligns with the views of the ancient Chinese general, Sun Tzu. In his book “The Art of War,” the strategist advocates stealth, deceptionand indirect attackto overcome a stronger opponent in battle.

USSOUTHCOM El Salvador Gangs Presentation

Maras emerged out of the conflicts during the 1970s & 80s in Central America. In the context of the wars and insurgencies in El Salvador, Guatemala, and Nicaragua, thousands of people, including youngmen fled North, many which had training on guns as well as armed combat techniques. In Los Angeles they encountered rejection by other Hispanic communities and found it difficult to find work and socialize; a percentage of these young men, especially those from El Salvador where part of the insurgency/ civil war back home and joined the 18th Street Gang from LA, which was started by Mexicans and expanded to other Hispanics, African- Americans, and Asians.

U.S. Army TC 21-306: Tracked Combat Vehicle Driver Training

This training circular (TC) provides the unit commander, vehicle commander, and the vehicle driver with the basis for developing a tracked combat vehicle driver training program and can assist commanders in selecting highly qualified drivers. TC 21-306 is a result of the Chief of Staff of the Army’s (CSA) direction to the Training and Doctrine Command (TRADOC) to develop tracked and wheeled vehicle driver training programs, to include the development of training support packages (TSPs) that will standardize driver training Armywide. The TSPs described in this publication fulfill that requirement for tracked vehicles by providing units with flexible training programs that can be implemented as stand-alone courses or integrated into existing training.

U.S. Army Guide: What Should You do if You Spot an IED/VBIED/SVBIED/PBIED?

If stopping the vehicle puts it within the estimated casualty radius of the possible IED/VBIED, the driver should speed up and quickly move through the danger area to a tactically safe position and distance (the minimum safe distance is dependent on the mission, enemy, terrain and weather, troops and support available, time available, and civil considerations [METT-TC] factors).

USMC Intelligence Activity Haiti Open Source Digest

The Washington Post ran an article this morning entitled, “As food distribution improves, Haitians want U.S to ‘take over’.” The increasingly prominent role of U.S. troops and civilian workers is creating high expectations among Haitians. “I want the Americans to take over the country. The Haitian government can’t do anything for us,” said Jean-Louis Geffrard, a laborer who lives under a tarp. The article contains several quotes that underscore the fact that the average citizen has no confidence in their government, but virtually 100% faith in the United States. Average Haitians are taking quick notice to how U.S. troops have brought order and efficiency to aid distribution.

DIA (U//FOUO) Haiti: Health Risks and Health System Impacts Associated With Large-Scale Earthquake

(U) NCMI assesses with high confidence that health care in Haiti is by far the poorest in the Western Hemisphere and on par with that of the less developed African countries. Furthermore, health care availability and accessibility, trauma care, and medical logistics are inadequate to respond to and mitigate the current disaster. Port-au-Prince inpatient and trauma capacity is already overburdened. Haiti is still recovering from the 2008 hurricane season, and the 12 January earthquake only worsened the already poor health situation and damaged the country’s already degraded health care system, which will require years to rebuild. Although major outbreaks of infectious diseases are unlikely as a result of the earthquake, incidences of diarrhea, respiratory diseases, and other infectious diseases likely will increase among local populations. Fires and explosions at facilities storing petroleum, oils, and lubricants (POL) are the greatest industrial chemical health threats. Chemicals released from damaged POL facilities are expected to cause localized contamination of soil and surface water.

USNORTHCOM Joint Task Force North Special Interest Aliens Handbook

This smart book was compiled by Joint Task Force North in response to a support request by the United States Border Patrol. The purpose is to provide the Department of Homeland Security with a basic reference and questioning guide to determine the validity of an apprehended individual’s stated country of origin and to assist in identifying those that are Special Interest Aliens (SIAs). Customs and Border Protection identifies thirty-four countries and two territories as special interest countries. This is current as of March 1, 2008.

Comparative U.S.-Israeli Homeland Security

This report compares United States and Israeli homeland security practices. Its purpose is to determine whether there are lessons from Israeli experience that might enhance U.S. homeland security efforts. The research for this study included a literature review as well as field interviews with American and Israeli elites in Washington, D.C., and Israel during the summer of 2005. The principle investigator met with key Israeli homeland security and counterterrorism experts in Jerusalem, Tel Aviv, Ramla, and Hertzilya.

U.S. Army Public Affairs Handbook

Below are some suggestions on why to release information as early as possible:

1. The American public, Congress and the media are entitled to “timely and accurate” information about the military, per the DoD Principles of Information (See Appendix).

2. Early release of information sets the pace and tone for resolution of a problem.

3. If you wait, the story will often leak anyway. If it does, you jeopardize trust and credibility.

Army PR Chain Teaching Program Talking Points

Individuals not specifically addressed within this definition may be included in our PR responsibilities at the direction of the Secretary of Defense (SECDEF). This expands Army PR responsibilities considerably as multinational partners, American civilians, and citizens from other nations in our operational areas now become potential recovery obligations for the Army.

Joint Publication 3-07.2 Antiterrorism

This publication has been prepared under the direction of the Chairman of the Joint Chiefs of Staff. It sets forth joint doctrine to govern the activities and performance of the Armed Forces of the United States in operations and provides the doctrinal basis for interagency coordination and for US military involvement in multinational operations. It provides military guidance for the exercise of authority by combatant commanders and other joint force commanders (JFCs) and prescribes joint doctrine for operations and training. It provides military guidance for use by the Armed Forces in preparing their appropriate plans.

How a Boy Becomes a Martyr: The Dangers of Web 2.0 Technology

The following report is a fictitious account of how a young person in America could become a suicide bomber for an Islamic extremist group. It is the fifth in a series of reports on Web 2.0 technology and future urban warfare. All references to people, groups, and products are intended for illustrative purposes only. As such, the authors do not suggest that any of the products or organizations listed condone or support extremist activities.

Camp Victory Server Consolidation for Advanced Leveraging of Equipment

Server Consolidation for Advanced Leveraging of Equipment (SCALE) evaluates VMware ESX Server 3.0.1 virtualization software for use at Camp Victory, Baghdad, Iraq. Global Cyberspace Integration Center (GCIC) personnel and Multi-National Corps – Iraq, C6 (MNC-I/C6) synchronized efforts to reduce information technology (IT) equipment, power, space, and heating, ventilation, & air conditioning (HVAC) demands while increasing system redundancy and scalability for Non-Secure Internet Protocol Router Network (NIPRNet), Secure Internet Protocol Router Network (SIPRNet), and Combined Enterprise Regional Information Exchange System (CENTRIXS) in direct support to 8,000 Coalition warfighters.