This handbook provides basic reference information on Bahrain, including its geography, history, government, military forces, and communications and transportation networks. This information is intended to familiarize military personnel with local customs and area knowledge to assist them during their assignment to Bahrain.
United States
Oman, U.S. Marine Corps
Marine Corps Intelligence Activity Oman Country Handbook
This handbook provides basic reference information on Oman, including its geography, history, government, military forces, and communications and transportation networks. This information is intended to familiarize military personnel with local customs and area knowledge to assist them during their assignment to Oman.
Qatar, U.S. Marine Corps
(U//FOUO) Marine Corps Intelligence Activity Qatar Cultural Field Guide
The Qatar Cultural Field Guide is designed to provide deploying military personnel an overview of Qatar’s cultural terrain. In this field guide, Qatar’s cultural history has been synopsized to capture the more significant aspects of the country’s cultural environment, with emphasis on factors having the greatest potential to impact operations.
Qatar, U.S. Marine Corps
Marine Corps Intelligence Activity Qatar Country Handbook
This handbook provides basic reference information on Qatar, including its geography, history, government, military forces, and communications and transportation networks. This information is intended to familiarize military personnel with local customs and area knowledge to assist them during their assignment to Qatar.
Intelligence Fusion Centers, New Jersey
(U//FOUO) New Jersey Fusion Center Special Events List September 2014
The NJ Office of Homeland Security and Preparedness (OHSP) compiles a statewide list of special events that provides situational awareness to law enforcement, as well as to assist in local planning requirements. Special events include any event that attracts large numbers of participants and spectators in both a public or private venue. Examples include concerts, marathons, firework displays, community celebrations, visits by VIPs, sporting events, holiday gatherings, etc.
General Services Administration
General Services Administration Palantir Technologies Pricelist
General Services Administration
General Services Administration 1122 Program Equipment and Supplies Catalog
Section 1122 of the fiscal year 1994 National Defense Authorization Act established the authority for State and local governments to purchase law enforcement equipment through Federal procurement channels, provided that the equipment is used in the performance of counter-drug activities. The “1122 Program” affords State and local governments the opportunity to maximize their use of taxpayer dollars, by taking advantage of the purchasing power of the Federal Government to receive discounts commensurate with large volume purchases.
National Guard
(U//FOUO) National Guard Roles, Status and Authorities Presentation August 2014
Afghanistan, Joint Chiefs of Staff
(U//FOUO) Joint Center for International Security Force Assistance Afghan National Police Mentor Guide
In order to develop the ANP, the Combined Security Transition Command-Afghanistan (CSTC-A) uses Police Mentor Teams to help develop them. A shortage of PMTs across the country, however, has led to the formation of in-lieu of advisor teams comprised of Soldiers from land owning units or attached Military Police units. The purpose of this document is to help provide those additional advisory teams with information they need to develop the skills required to effectively augment the CSTC-A program. This handbook will provide an overview of the entire police program including current goals, relationships to other organizations, the Focused District Development Program, key challenges that may be encountered and the duties of key members of the police advising teams including how to work with the team’s enablers.
Afghanistan, Joint Chiefs of Staff
(U//FOUO) Joint Center for International Security Force Assistance Afghan National Army Mentor Guide
This guide is a JCISFA publication on mentoring the Afghan National Army and is applicable to advisors, mentors and partner forces executing Security Force Assistance (SFA) operations. The guide is a companion to the May 2009 JCISFA Afghan National Police Mentor Guide and addresses identified gaps in mentoring Afghan National Security Forces. The guide offers cultural background information, partner security force challenges, advisor/mentor best practices, and challenges. As the United States assists other nations, our forces must adopt a “by, with, and through” strategy to enable a supported nation and its security forces to generate and sustain capabilities institutionally and operationally. We can achieve this by advising and mentoring them, partnering with the supported nation and through development of the supported nation and its security forces so that they can do it themselves.
U.S. Army
Megacities and the U.S. Army: Preparing for a Complex and Uncertain Future
Cities with populations of ten million or more are given a special designation: megacity. There are currently over twenty megacities in the world, and by 2025 there will be close to forty. The trends are clear. Megacities are growing, they are be-coming more connected, and the ability of host nation governments to effectively deal with their explosive growth and maintain security is, in many cases, diminishing. Megacities are a unique environment that the U.S. Army does not fully understand.
California
San Francisco Bay Area Urban Shield 2014 Overview Presentation
Urban Shield is a continuous, 48-hour Full Scale Multi-Disciplinary Homeland Security/Disaster Preparedness Exercise hosted by the Alameda County Sheriff’s Office, with the support of the Bay Area Urban Area Security Initiative (UASI), and more than 200 local, state, federal, international and private sector partners.
Federal Bureau of Investigation
FBI Cyber Bulletin: Malicious Actors Targeting Protected Health Information
The FBI is providing the following information with HIGH confidence. The FBI has observed malicious actors targeting healthcare related systems, perhaps for the purpose of obtaining Protected Healthcare Information (PHI) and/or Personally Identifiable Information (PII). These actors have also been seen targeting multiple companies in the healthcare and medical device industry typically targeting valuable intellectual property, such as medical device and equipment development data.
California, Intelligence Fusion Centers
(U//LES) Northern California Fusion Center Bulletin: Recreational Drones Create Problems for Law Enforcement
The expansion of Unmanned Aerial Vehicle (UAV) operations for military purposes in the last decade has driven growth in the commercial UAV industry where. the casual enthusiast can now purchase a ready-to-fly system for less than $300. These UAVs can be accessorized for varied purposes such as cinematography, agricultural monitoring, wildlife tracking, site surveillance, and potentially even for kinetic attacks with a firearm or improvised explosive. This Advisory Bulletin addresses an observed increase in UAV use by ordinary citizens, outlining capabilities and implications for the law enforcement community. The NCRIC has not received any specific or credible UAV threats in our 15-county AOR and presents the following information for situational awareness purposes.
Department of Justice
Department of Justice Review of FBI Use of National Security Letters 2007-2009
This review is a follow-up to three previous OIG reports concerning the FBI’s use of national security letter authorities. In our first and second NSL reports, issued in March 2007 and March 2008, the OIG found repeated instances of the FBI’s misuse of NSL authorities during 2003 through 2006. During our first NSL review we also discovered the FBI’s practice of issuing exigent letters and using other informal methods to obtain telephone records, instead of using NSLs or other legal process. We addressed these practices in a separate report issued in January 2010.
Department of Homeland Security, Federal Bureau of Investigation, National Counterterrorism Center
(U//FOUO) DHS-FBI-NCTC Bulletin: Malicious Cyber Actors Use Advanced Search Techniques
Malicious cyber actors are using advanced search techniques, referred to as “Google dorking,” to locate information that organizations may not have intended to be discoverable by the public or to find website vulnerabilities for use in subsequent cyber attacks. “Google dorking” has become the acknowledged term for this malicious activity, but it applies to any search engine with advanced search capabilities. By searching for specific file types and keywords, malicious cyber actors can locate information such as usernames and passwords, e-mail lists, sensitive documents, bank account details, and website vulnerabilities. For example, a simple “operator:keyword” syntax, such as “filetype:xls intext:username,” in the standard search box would retrieve Excel spreadsheets containing usernames. Additionally, freely available online tools can run automated scans using multiple dork queries.
Philippines, U.S. Marine Corps
Marine Corps Intelligence Activity Philippines Country Handbook
This handbook provides basic reference information on the Philippines, including its geography, history, government, military forces, and communications and transportation networks. This information is intended to familiarize military personnel with local customs and area knowledge to assist them during their assignment to the Philippines.
Federal Bureau of Investigation
(U//FOUO) FBI Analytic Report: Autonomous Cars Present Game Changing Opportunities and Threats For Law Enforcement
The FBI assesses that if autonomous cars are approved by Congress for use by the public nationwide in the next five to seven years, these vehicles will have a high impact on transforming what both law enforcement and its adversaries can operationally do with a car. State regulators in California, Florida, and Nevada already legalized the use of these vehicles within their states.
Department of Homeland Security
DHS National Cybersecurity and Communications Integration Center Bulletin: Hotel Business Centers Keyloggers
The following is an advisory for owners, managers and stakeholders in the hospitality industry, which highlights recent data breaches uncovered by the United States Secret Service (USSS). The attacks were not sophisticated, requiring little technical skill, and did not involve the exploit of vulnerabilities in browsers, operating systems or other software. The malicious actors were able to utilize a low-cost, high impact strategy to access a physical system, stealing sensitive data from hotels and subsequently their guest’s information. The NCCIC and the USSS have provided some recommendations at the end of this document that may help prevent similar attacks on publicly available computers.
U.S. Army
U.S. Army Techniques Publication 3-39.33: Civil Disturbances
ATP 3-39.33 provides discussion and techniques about civil disturbances and crowd control operations that occur in the continental United States (CONUS) and outside the continental United States (OCONUS). United States (U.S.) forces deploy in support of unified action, overseas contingency operations, and humanitarian assistance worldwide. During these operations, U.S. forces are often faced with unruly and violent crowds who have the intent of disrupting peace and the ability of U.S. forces to maintain peace. Worldwide instability coupled with U.S. military participation in unified-action, peacekeeping, and related operations require that U.S. forces have access to the most current doctrine and techniques that are necessary to quell riots and restore public order.
Department of Homeland Security
(U//LES) DHS Assessment: Domestic Violent Extremists Pose Increased Threat to Law Enforcement and Government Officials
After years of only sporadic violence from violent domestic extremists motivated by anti-government ideologies, I&A has seen a spike within the past year in violence committed by militia extremists and lone offenders who hold violent anti-government beliefs. These groups and individuals recognize government authority but facilitate or engage in acts of violence due to their perception that the United States Government is tyrannical and oppressive, coupled to their belief that the government needs to be violently resisted or overthrown. Historically, spikes in violence have followed high-profile confrontations involving the United States Government, such as Ruby Ridge and Waco. The April 20 14 Bunkerville, Nevada standoff likely represents a similar event that could inspire further violence.
Intelligence Fusion Centers, New Jersey
(U//FOUO) New Jersey Fusion Center: Potential Threats to Government Officials in New Jersey
The FBI San Antonio Division recently reported that groups of young individuals in Texas, and possibly other states, were attempting to elicit information regarding residences of firefighters, military personnel, police officers, etc. The subjects knocked on neighborhood doors, telling residents they worked for an organization that helps young people with public speaking by sending them out to contact random people at their homes and ask about their professions. The youths reportedly received points based on the professions they located, with the potential of winning a college scholarship and a large sum of money. Police officer had the highest point value.
Federal Bureau of Investigation
(U//FOUO) FBI San Antonio Bulletin: Sovereign Citizens Identifying Law Enforcement Residences
Lithuania, U.S. Marine Corps
Marine Corps Intelligence Activity Lithuania Country Handbook
This handbook provides basic reference information on Lithuania, including its geography, history, government, military forces, and communications and transportation networks. This information is intended to familiarize military personnel with local customs and area knowledge to assist them during their assignment to Lithuania.
Colombia, U.S. Marine Corps
(U//FOUO) Marine Corps Intelligence Activity Colombia Cultural Field Guide
The Colombia Cultural Field Guide is designed to provide deploying military personnel an overview of Colombia’s cultural terrain. In this field guide, Colombia’s cultural history has been synopsized to capture the more significant aspects of the Colombia cultural environment, with emphasis on factors having the greatest potential to impact operations.