U.S. Army

(U//FOUO) U.S. Army Commander’s Guide to Biometrics in Afghanistan

Biometrics capabilities on the tactical battlefield enable a wide variety of defensive and offensive operations. Biometrics help ensure enemy personnel, criminals, and other undesirable elements are not allowed access to our facilities, hired to provide services, or awarded contracts. Biometrics is used to vet members of the Afghan government and military with whom our forces interact. Unfortunately, biometrics capabilities we put in the hands of Soldiers, Marines, Sailors, and Airmen — and that we ask unit commanders to employ — are relatively recent additions to the list of capabilities our military employs on the battlefield today.

U.S. Army Irregular Opposing Forces Manual

Irregular forces are armed individuals or groups who are not members of the regular armed forces, police, or other internal security forces (JP 3-24). The distinction of being armed as an individual or group can include a wide range of people who can be categorized correctly or incorrectly as irregular forces. Excluding members of regular armed forces, police, or internal security forces from being considered irregular forces may appear to add some clarity. However, such exclusion is inappropriate when a soldier of a regular armed force, policeman, or internal security force member is concurrently operating in support of insurgent, guerrilla, or criminal activities.

U.S. Army Cyber Electromagnetic Activities (CEMA) Manual

FM 3-38, Cyber Electromagnetic Activities, provides overarching doctrinal guidance and direction for conducting cyber electromagnetic activities (CEMA). This manual describes the importance of cyberspace and the electromagnetic spectrum (EMS) to Army forces and provides the tactics and procedures commanders and staffs use in planning, integrating, and synchronizing CEMA. This manual provides the information necessary for Army forces to conduct CEMA that enable them to shape their operational environment and conduct unified land operations. It provides enough guidance for commanders and their staffs to develop innovative approaches to seize, retain, and exploit advantages throughout an operational environment. CEMA enable the Army to achieve desired effects in support of the commander’s objectives and intent.

(U//FOUO) U.S. Army Unified Exploitation Concept of Operations 2012-2018

This CONOPS describes an overarching concept of operations for the 2012-2018 timeframe that provides a framework for “Unified Exploitation (UE)” operations and the basis to develop supporting capabilities. It establishes linkages to other Army concepts and describes how UE enables decisive action in support of unified land operations. This CONOPS describes the operational context and how commanders integrate supporting UE capabilities through Mission Command to produce an operational advantage. This CONOPS addresses the central military problem: the Army lacks a systematic approach to effectively integrate multiple organizations, disciplines, functions, and processes that support exploitation through their application of tactical, technical, and scientific capabilities. The absence of an organized exploitation framework to develop facts, actionable information or intelligence from collected enemy information, materials, or people, results in a knowledge void. This lack of knowledge may compromise our ability to execute commander directed, follow-on actions and represents tactical and perhaps even strategic opportunities lost.

(U//FOUO) U.S. Army Senior Leader’s Guide to Transition Planning Version 3

It is to be expected that nations will continue to require assistance from other states and organizations in order to recover from natural disasters, conflict, or chronic societal problems. Such assistance ends as the host nation (HN) transitions back from a period of crisis to self-sufficiency and other actors transition out of their assumed roles and responsibilities. As the HN transitions back from a period of crisis to self-sufficiency, it will be faced with issues involving sovereignty, legitimacy, dependency, and social reform. Managing transitions at all levels requires close cooperation between the HN, other governments, militaries, and civil society. Although many of the lessons and best practices used in this guide are derived from Operation Iraqi Freedom and Operation New Dawn, the intent is to provide a guide that is flexible enough to be used for transition planning of a military campaign or crisis of any size or scope.

Restricted U.S. Army Psychological Operations Officer Training Manual

The mission of Psychological Operations is to influence the behavior of foreign target audiences (TAs) to support United States (U.S.) national objectives. Psychological Operations(PSYOP) are planned operations to convey selected information and indicators to foreign audiences to influence the emotions, motives, objective reasoning, and ultimately the behavior of foreign governments, organizations, groups, and individuals (JP 3-53, Joint Doctrine for Joint Psychological Operations). Behavioral change is at the root of the PSYOP mission. Although concerned with the mental process of foreign TAs, it is the observable modification of foreign TA behavior that determines the mission success of PSYOP. It is this link between influence and behavior that distinguished PSYOP from other capabilities and activities of information operations (IO) and related components such as public affairs.

Restricted U.S. Army Psychological Operations Specialist Training Guide

This Soldier training publication (STP) is for Skill Levels 1 through 4 Soldiers holding the military occupational specialty (MOS) 37F, Psychological Operations Specialist. It contains standardized training objectives in the form of task summaries to train critical tasks that support unit missions. All Soldiers holding MOS 37F should have access to this publication. This publication applies to the Active Army, the Army National Guard (ARNG)/Army National Guard of the United States (ARNGUS), and the United States Army Reserve (USAR) unless otherwise stated.

Restricted U.S. Army All Source Intelligence Technician Officer Training Standards

This publication is for officers holding military occupational specialty (MOS) 350F and their trainers or first-line supervisors. It contains standardized training objectives, in the form of task summaries, which support unit missions during wartime. Officers holding MOS 350F should be issued or have access to this publication. It should be available in the officer’s work area, unit learning center, and unit libraries. Trainers and first-line supervisors should actively plan for officers to have access to this publication.

U.S. Army Africa Pamphlet: Cultural, Historical, and Natural Resource Protection During African Operations

This pamphlet is applicable to United States (US) forces conducting operations in Africa operating under the control of US Army Africa (USARAF) or applicable joint task forces (JTF). The intent of this pamphlet is to provide guidance on the protection and management of recognized cultural, historic, and natural resources that may be placed at risk due to the conduct of the full spectrum of US ground operations and associated close air/naval support operations.

U.S. Army Cyber Command and Control Facility Environmental Assessment

This Environmental Assessment (EA) has been prepared to analyze the potential environmental, cultural, transportation, and socioeconomic effects associated with the establishment and operation of a U.S. Army Cyber Command / 2nd Army (ARCYBER) Command and Control Facility at Fort George G. Meade, Maryland (hereinafter referred to as Fort Meade), or at Fort Gordon, Georgia. ARCYBER leads a corps of 21,000 soldiers and civilians who serve worldwide operating and defending all Army networks with supporting organizations such as the Army Network Enterprise Technology Command, 780th MI Brigade, and 1st Information Operations. ARCYBER plans, coordinates, integrates, synchronizes, directs, and conducts network operations and defense of all Army networks; when directed, ARCYBER conducts cyberspace operations in support of full spectrum operations to ensure U.S./Allied freedom of action in cyberspace, and to deny the same to our adversaries.

Restricted U.S. Army Special Forces Handbook for the Fingerprint Identification System

Special Forces (SF) Soldiers use various biometric identification systems in SF operations. Biometric applications are fundamental to a wide array of SF operational activities, including, but not limited to, the growing field of SF sensitive site exploitation (SSE) and the range of unit protection activities. SSE applications include the identification of enemy personnel and cell leaders in a counterinsurgency (COIN) environment following tactical operations, particularly during direct action missions. Unit protection applications include maintaining databases on the identities of both United States Government (USG) and local national personnel.

U.S. Military Multi-Service Defense Support of Civil Authorities Manual

This publication identifies multi-Service tactics, techniques, and procedures (MTTP) for Defense Support of Civil Authorities (DSCA) and Integrating with National Guard Civil Support. It sets forth MTTP at the tactical level to assist the military planner, commander, and individual Service forces in the employment of military resources in response to domestic emergencies in accordance with United States (US) law. This MTTP focuses on planning, preparation, execution, and assessment of DSCA operations conducted within the US and its territories.

(U//FOUO) U.S. Army Division Commander’s Guide to Information Operations

Warfare in the 21st Century necessitates a complete shift in the way we think and the way we fight. More than ever, the use of nonlethal effects is having a profound impact on conflicts. Much of today’s battlefield is in the minds of the public, shaped by the spoken word, cyberspace, media, and other means of strategic communications, as well as by our physical actions. Consequently, melding information with physical operations may very well be decisive in counterinsurgency and other stability operations. By melding information operations with physical operations, the division commander, who is executing a war against an insurgency and simultaneously attempting to pacify a populace, can gain the respect, compliance, and support of the people who may tip the balance in his favor. The enemy has become adept at all means of communications, in particular information operations, and uses his actions to reinforce his message. As a result, he influences not only the indigenous population but also the world as a whole.

(U//FOUO) U.S. Army Stability Operations in Southern Asia Newsletter

The Army is currently engaged in two fights in southwest Asia. However, future conflicts could possibly be brewing throughout all of south and southeast Asia. The largest Islamic country in the world is not in the Middle East but is in Asia: Indonesia with approximately 197 million Muslims. And throughout southern Asia, insurgency and radicalization is on the rise. At a recent conference in Bangladesh, Major General (Retired) A.N.M. Muniruzzaman of the Bangladesh Institute of Peace and Security Studies announced south Asia is now the “epicenter for global terrorism.” Not one of the attendees from Bangladesh, India, Pakistan, Sri Lanka, Nepal, the United States, Canada, Germany, Norway, Spain, Australia, New Zealand, and Singapore disagreed with him.

(U//FOUO) U.S. Army Operation Tomodachi Fukushima Response Report

The U.S. Army, Pacific Command Chemical, Biological, Radiological, Nuclear, and High Yield Explosives Division and the 71st Chemical Company recently redeployed from Japan in support of Operation Tomodachi. Their efforts provide the center of gravity for this collection effort. This document will strive to highlight and capture some best practices and issues requiring further study by the U.S. Army Chemical, Biological, Radiological, and Nuclear School and other units deploying to similar operations.

(U//FOUO) U.S. Army Mitigation of Afghan Civilian Casualties (CIVCAS) on Coalition Artillery Ranges

The value of exploded ordnance scrap metal and UXO that can be collected from CF artillery ranges is a lucrative risk the Afghan population is willing to take. Reports indicate that Afghan adults send their children to the properly marked CF artillery ranges, after live fire and calibration training events, in order to collect exploded ordnance scrap metal to sell.

(U//FOUO) U.S. Army Cyber/Electromagnetic Contest Capabilities Based Assessment (C/EM CBA) V0.9

Trends in the operational environment continue to indicate that cyberspace and the electromagnetic spectrum (EMS) will remain important entities within the operational environment for the foreseeable future. The Army understands the importance of cyberspace and the electromagnetic spectrum to human societies in general, and to military operations specifically. Army leaders and Soldiers must possess an in-depth understanding of this contest, and how to gain, maintain, and leverage advantages in this contest. To this end, the Army Concept Framework recognizes an increasingly important aspect to military operations: the cyber/electromagnetic contest (C/EM contest).

(U//FOUO) U.S. Army Restoring Essential Services in Stability Operations

The primary intent of this Center for Army Lessons Learned publication is to provide a reference to assist commanders and planners in understanding how these complex systems are organized, managed, and operated — from a civilian perspective. It will not make the reader an expert. Each chapter was developed by students attending the Command and General Staff College during an elective course titled “Restoring Essential Services in Stability Operations.”

(U//FOUO) U.S. Army Operation Iraqi Freedom Information Operations Tactical Commander’s Handbook

This handbook provides the tactical operator, commander, and battle staff with information on planning, executing, assessing, and sustaining information operations (IO). The handbook is based on observations collected in Iraq during July and August 2004 by an IO collection and analysis team (CAAT). The application of this tool is both for training and real-world events the Soldier may encounter in the Iraqi area of operations.

(U//FOUO) U.S. Army Forensics and Warrant-Based Targeting Newsletter

In January 2009 the Army’s authority to unilaterally apprehend and detain insurgents in Iraq expired. The Army now operates in Iraq at the invitation of the Government of Iraq (GOI). The change in the Army’s authority heightens the guiding principle of working by, with, and through the Iraqi Security Forces (ISF). The Army must work within the Iraqi rule of law when dealing with insurgents who threaten U.S. forces. It requires the Army to work with the ISF and the Iraqi court system to remove insurgents from the street. The Army must learn how the Iraqi system is structured and how its courts operate. The Army must also help educate the Iraqi courts, particularly the judges, on the science of how Americans collect and process evidence (forensics). Educating the judges on forensics is important to the Army having its day in court and its evidence entered into the proceeding against the insurgents.