This Environmental Assessment (EA) has been prepared to analyze the potential environmental, cultural, transportation, and socioeconomic effects associated with the establishment and operation of a U.S. Army Cyber Command / 2nd Army (ARCYBER) Command and Control Facility at Fort George G. Meade, Maryland (hereinafter referred to as Fort Meade), or at Fort Gordon, Georgia. ARCYBER leads a corps of 21,000 soldiers and civilians who serve worldwide operating and defending all Army networks with supporting organizations such as the Army Network Enterprise Technology Command, 780th MI Brigade, and 1st Information Operations. ARCYBER plans, coordinates, integrates, synchronizes, directs, and conducts network operations and defense of all Army networks; when directed, ARCYBER conducts cyberspace operations in support of full spectrum operations to ensure U.S./Allied freedom of action in cyberspace, and to deny the same to our adversaries.
United States
U.S. Army
Restricted U.S. Army Special Forces Handbook for the Fingerprint Identification System
Special Forces (SF) Soldiers use various biometric identification systems in SF operations. Biometric applications are fundamental to a wide array of SF operational activities, including, but not limited to, the growing field of SF sensitive site exploitation (SSE) and the range of unit protection activities. SSE applications include the identification of enemy personnel and cell leaders in a counterinsurgency (COIN) environment following tactical operations, particularly during direct action missions. Unit protection applications include maintaining databases on the identities of both United States Government (USG) and local national personnel.
Afghanistan, Department of Defense, U.S. Marine Corps
Marine Corps Intelligence Activity Afghanistan Country Handbook and Cultural Field Guide
This handbook provides basic reference information on Afghanistan, including its geography, history, government, military forces, and communications and transportation networks. This information is intended to familiarize military personnel with local customs and area knowledge to assist them during their assignment to Afghanistan.
Afghanistan, Open Source Center
(U//FOUO) Open Source Center Master Narratives Country Report: Afghanistan
Understanding master narratives can be the difference between analytic anticipation and unwanted surprise, as well as the difference between communications successes and messaging gaffes. Master narratives are the historically grounded stories that reflect a community’s identity and experiences, or explain its hopes, aspirations, and concerns. These narratives help groups understand who they are and where they come from, and how to make sense of unfolding developments around them. As they do in all countries, effective communicators in Afghanistan invoke master narratives in order to move audiences in a preferred direction. Afghan influencers rely on their native familiarity with these master narratives to use them effectively. This task is considerably more challenging for US communicators and analysts because they must place themselves in the mindset of foreign audiences who believe stories that — from an American vantage point — may appear surprising, conspiratorial, or even outlandish.
Department of Homeland Security, Federal Bureau of Investigation
(U//FOUO) DHS-FBI Bulletin: Compromises of Official Social Media Accounts Spread Disinformation
Malicious cyber actors have used compromised social media accounts to spread disinformation about alleged emergencies and attacks, most prominently through Twitter. Because it is difficult to determine the authenticity of a tweet, we anticipate malicious cyber actors will continue to seek to exploit Twitter and other social media platforms used by news organizations and public safety agencies to propagate disinformation.
California
San Francisco Bay Area Urban Shield 2013 Timeline, Vendor Directory and Map
U.S. Air Force, U.S. Army, U.S. Marine Corps, U.S. Navy
U.S. Military Multi-Service Defense Support of Civil Authorities Manual
This publication identifies multi-Service tactics, techniques, and procedures (MTTP) for Defense Support of Civil Authorities (DSCA) and Integrating with National Guard Civil Support. It sets forth MTTP at the tactical level to assist the military planner, commander, and individual Service forces in the employment of military resources in response to domestic emergencies in accordance with United States (US) law. This MTTP focuses on planning, preparation, execution, and assessment of DSCA operations conducted within the US and its territories.
California
Sonoma County Sheriff’s Office Roster June 2011
The following document contains the full roster, including ranks, of the Sonoma County Sheriff’s Office as of June 2011. The roster was obtained via a public records request. The names of certain deputies and detectives are redacted because they work on gang and narcotics task forces making their identities exempt from disclosure under California Government Code 6354 (c), (f) and (k).
California, Intelligence Fusion Centers
(U//FOUO) Los Angeles Fusion Center: School Shootings Five-Year Analysis 2008-2013
From January 2008 to August 2013, 85 school shootings took place across the United States involving 97 attackers. Incidents analyzed met the definition of targeted school violence, including gang‐related shootings. “Targeted violence” is any incident of violence where an attacker selects a particular target prior to the violent attack. The number of incidents peaked at 29 in 2009 and have decreased to an average of 14 per year; two incidents have occurred this year to date.
U.S. Navy
U.S. Navy Information Dominance Roadmap 2013-2028
The Navy is pursuing improved information-based capabilities that will enable it to prevail in the higher-threat, information-intensive combat environments of the 21st Century. This document outlines challenges anticipated over the next 15 years in the operating and information environments, and highlights long-term opportunities for fully integrating Navy’s information-related activities, resources, processes and capabilities to optimize warfighting effects and maintain decision superiority across the spectrum of warfare. The Navy’s plans for achieving Information Dominance center on: 1) assuring command and control (C2) for our deployed forces regardless of the threat environment; 2) enhancing battlespace awareness to shorten the decision cycle inside that of the adversary and to better understand the maritime operating environment; and, 3) fully integrating traditional kinetic and emerging non-kinetic fires to expand warfighting options to both Navy and Joint commanders.
California, Corporate, Intelligence Fusion Centers
Oakland Domain Awareness Center SAIC Proposal and Emails
Joint Improvised Explosive Device Defeat Organization
JIEDDO Social Network Analysis (SNA) Tool Comparison
This is a working paper for an ongoing SNA Tool Comparison effort at the Counter-IED Operations/Intelligence Center’s (COIC) Data Analysis Research and Collaboration (DAR C) Cell. It contains the results of the first phase of this effort. A Power Point presentation summarizing this paper is also available. This paper will be edited and amended as additional results become available from subsequent phases. The objective of this study was to compare and analyze four different Social Network Analysis (SNA) tools for the basic measures of Centrality (Degree, Closeness, Betweenness and Eigenvector), in order to set a baseline for further evaluation of the tools and their capabilities. The four tools compared were Analyst Notebook (ANB), Palantir, UCINet and ORA.
Defense Threat Reduction Agency
Defense Threat Reduction Agency Dynamic Social Network Analysis Study
Department of Homeland Security, Federal Bureau of Investigation
(U//FOUO) DHS-FBI Suspicious Activity Reporting (SAR) Bulletin: Weapons Discovery
Possession of large amounts of weapons, ammunition, explosives, accelerants, or explosive precursor chemicals could indicate pre-operational terrorist attack planning or criminal activity. For example, in preparation for conducting the July 2011 attacks in Norway, Anders Behring Breivik stockpiled approximately 12,000 pounds of precursors, weapons, and armor and hid them underground in remote, wooded locations.
U.S. Army
(U//FOUO) U.S. Army Division Commander’s Guide to Information Operations
Warfare in the 21st Century necessitates a complete shift in the way we think and the way we fight. More than ever, the use of nonlethal effects is having a profound impact on conflicts. Much of today’s battlefield is in the minds of the public, shaped by the spoken word, cyberspace, media, and other means of strategic communications, as well as by our physical actions. Consequently, melding information with physical operations may very well be decisive in counterinsurgency and other stability operations. By melding information operations with physical operations, the division commander, who is executing a war against an insurgency and simultaneously attempting to pacify a populace, can gain the respect, compliance, and support of the people who may tip the balance in his favor. The enemy has become adept at all means of communications, in particular information operations, and uses his actions to reinforce his message. As a result, he influences not only the indigenous population but also the world as a whole.
New York
NYPD Operations Order 34: Use of Social Networks for Investigative Purposes
Data contained within social network sites may assist law enforcement in gathering timely information in furtherance of crime prevention, preservation of public order, and the investigation of criminal activity, including suspected terrorist activity. These guidelines are promulgated, in part, to instill the proper balance between the investigative potential of social network sites and privacy expectations.
Department of Justice
Social Media and Tactical Considerations For Law Enforcement
The use of social media is a relatively new phenomenon in policing. Development of formal policy on social media is generally lagging behind practice. A variety of legal, civil rights, and privacy-related issues regarding social media have been raised, but these issues have not yet been settled by legislatures or resolved in the courts. Social Media and Tactical Considerations for Law Enforcement summarizes discussions at a national conference of police executives on these issues, and analyzes the experiences of selected law enforcement agencies in the United States, Canada, and the United Kingdom that have shown leadership in advancing the use of social media for various purposes. Police agencies can use social media to facilitate two-way communications with the public to disseminate information, manage political demonstrations and other major events, obtain intelligence about “flash mobs” or rioting, and investigate crimes.
California, Corporate, Intelligence Fusion Centers
Oakland Domain Awareness Center SAIC Contract Documents
U.S. Army
(U//FOUO) U.S. Army Stability Operations in Southern Asia Newsletter
The Army is currently engaged in two fights in southwest Asia. However, future conflicts could possibly be brewing throughout all of south and southeast Asia. The largest Islamic country in the world is not in the Middle East but is in Asia: Indonesia with approximately 197 million Muslims. And throughout southern Asia, insurgency and radicalization is on the rise. At a recent conference in Bangladesh, Major General (Retired) A.N.M. Muniruzzaman of the Bangladesh Institute of Peace and Security Studies announced south Asia is now the “epicenter for global terrorism.” Not one of the attendees from Bangladesh, India, Pakistan, Sri Lanka, Nepal, the United States, Canada, Germany, Norway, Spain, Australia, New Zealand, and Singapore disagreed with him.
U.S. Army
(U//FOUO) U.S. Army Operation Tomodachi Fukushima Response Report
The U.S. Army, Pacific Command Chemical, Biological, Radiological, Nuclear, and High Yield Explosives Division and the 71st Chemical Company recently redeployed from Japan in support of Operation Tomodachi. Their efforts provide the center of gravity for this collection effort. This document will strive to highlight and capture some best practices and issues requiring further study by the U.S. Army Chemical, Biological, Radiological, and Nuclear School and other units deploying to similar operations.
Department of Homeland Security, Department of Justice, Federal Bureau of Investigation
Nationwide Suspicious Activity Reporting (SAR) Initiative Annual Report 2012
Over the past year, the NSI PMO has continued its implementation efforts and outreach to NSI stakeholders to help ensure that law enforcement and homeland security partners are afforded another tool to help identify and prevent terrorism and other related criminal activity. The ongoing collaboration among DOJ, DHS, the FBI, SLTT partners, and the National Network of Fusion Centers has strengthened, allowing the NSI to expand its nationwide information sharing capability. As of March 2013, 73 fusion centers have met the requirements outlined by the NSI PMO to be fully NSI-Operational—an increase of 5 centers from the same time last year—and all 78 fusion centers now maintain the capability to contribute and share suspicious activity reports through the Shared Space or eGuardian. This expansion of the NSI has allowed the Federated Search Tool to be accessed by more trained users—increasing the number of searches to more than 76,400—and more than 25,900 Information Sharing Environment (ISE)-SARs had been submitted and shared by the end of March 2013. Further, with the support of the National Network of Fusion Centers, 46 states and the District of Columbia are participating in statewide implementation of the NSI; implementation efforts are currently under way in Guam, Puerto Rico, and the U.S. Virgin Islands to ensure a strengthened nationwide capacity for sharing ISE-SAR information.
Federal Bureau of Investigation
FBI Next Generation Identification Video Presentations
Department of Energy
Sandia National Laboratories Mobile Biometric Device Technology Study
Mobile biometric devices (MBDs) capable of both enrolling individuals in databases and performing identification checks of subjects in the field are seen as an important capability for military, law enforcement, and homeland security operations. The technology is advancing rapidly. The Department of Homeland Security Science and Technology Directorate through an Interagency Agreement with Sandia sponsored a series of pilot projects to obtain information for the first responder law enforcement community on further identification of requirements for mobile biometric device technology. Working with 62 different jurisdictions, including components of the Department of Homeland Security, Sandia delivered a series of reports on user operation of state-of-the-art mobile biometric devices. These reports included feedback information on MBD usage in both operational and exercise scenarios. The findings and conclusions of the project address both the limitations and possibilities of MBD technology to improve operations. Evidence of these possibilities can be found in the adoption of this technology by many agencies today and the cooperation of several law enforcement agencies in both participating in the pilot efforts and sharing of information about their own experiences in efforts undertaken separately.
Department of Homeland Security, Federal Bureau of Investigation
(U//FOUO) DHS-FBI Joint Intelligence Bulletin: Nairobi Mall Attack and Al-Shabaab Threat
This Joint Intelligence Bulletin (JIB) provides information on the 21 September 2013 attack in Nairobi, Kenya likely conducted by al-Shabaab—an al-Qai‘da linked militant group based in Somalia. This JIB examines the ongoing incident and provides background on the threat from al-Shabaab. This JIB also highlights protective measures that can assist in mitigating threats in the United States using similar tactics and is provided to support the activities of FBI and DHS and to assist federal, state, local, tribal, and territorial government counterterrorism and law enforcement officials, as well as first responders and private sector security officials to deter, prevent, preempt, or respond to terrorist attacks in the United States or overseas targeting US interests.
Virginia
Lavabit LLC Unsealed Court Filings
Court documents related to the U.S. government’s efforts to force Lavabit LLC, an encrypted email provider used by Edward Snowden, to hand over encryption keys to decode all secure traffic flowing through the site. The documents were originally obtained and released by Kevin Poulsen of Wired.com after being unsealed by a judge on October 2, 2013.