This Manual is issued under the authority of DoD Directive 0-8530.1, “Computer Network Defense (CND),” January 8, 2001. It provides direction to the DoD Components for obtaining Certification and Accreditation (C&A) of their Computer Network Defense Services (CNDS).
United States
Department of Defense
(U//FOUO) DoD Instruction: Support to Computer Network Defense (CND)
Joint Chiefs of Staff
(U//FOUO) Joint Chiefs of Staff Instruction: Cryptographic Modernization Planning
Joint Chiefs of Staff
Restricted Joint Chiefs of Staff Manual: Exercises Impacting Global Positioning System (GPS) in U.S. and Canada
Department of Defense, Department of Homeland Security, Department of Justice, Federal Bureau of Investigation
U.S. Government Foreign Telecommunications Providers Network Security Agreements
A collection of Network Security Agreements (NSAs) entered into with foreign communications infrastructure providers ensuring U.S. government agencies the ability to access communications data when legally requested. The agreements range in date from 1999 to 2011 and involve a rotating group of government agencies including the Federal Bureau of Investigation (FBI), Department of Homeland Security (DHS), Department of Justice (DoJ), Department of Defense (DoD) and sometimes the Department of the Treasury. According to the Washington Post, the agreements require companies to maintain what amounts to an “internal corporate cell of American citizens with government clearances” ensuring that “when U.S. government agencies seek access to the massive amounts of data flowing through their networks, the companies have systems in place to provide it securely.”
Department of Defense
(U//FOUO) DoD Instruction: Balanced Survivability Assessments (BSAs)
Multidisciplinary, integrated, performance-based, mission survivability assessments to identify and quantify vulnerabilities in systems, networks, architectures, infrastructures, and assets that support DoD MEFs, PMEFs, or the NEFs they support, to assess the mission impact if the vulnerabilities were successfully exploited, and to recommend measures to remediate or mitigate the vulnerabilities.
Bureau of Alcohol Tobacco Firearms and Explosives, Federal Bureau of Investigation
National Explosives Task Force Advisory: Fireworks as Improvised Explosive Device (IED) Components
Fireworks are a common component used in Improvised Explosive Devices (IEDs). The US Government is asking consumer fireworks retailers to be aware of this phenomenon and familiarize themselves with some possible indicators of suspicious activity. This list is not inclusive, nor is it intended to limit the lawful conduct of innocent persons. The totality of behavioral indicators and other relevant circumstances should be considered.
Department of Homeland Security, Federal Bureau of Investigation
(U//FOUO) DHS-FBI Bulletin: Fireworks as Improvised Explosive Device (IED) Components
Recent incidents in the Homeland demonstrate that consumer fireworks—widely used during the upcoming 4 July 2013 celebrations—can be misused by criminals and violent extremists to construct improvised explosive devices (IEDs). Consumer fireworks are defined as devices that produce audible and visible effects by combustion, containing between 50-130 milligrams of explosive material. They are banned in Delaware, Massachusetts, New Jersey, and New York.
Joint Chiefs of Staff
Restricted Joint Chiefs of Staff Manual: Electronic Attack Exercises in U.S. and Canada
Department of Defense
DoD and Chairman of Joint Chiefs of Staff Limited Release Directives, Instructions and Manuals
A series of “limited release” directives from the Department of Defense and the Chairman of the Joint Chiefs of Staff including instructions, directives and manuals detailing DoD policy on a variety of topics from counterintelligence to the use of lasers in space.
Joint Chiefs of Staff
Restricted Joint Chiefs of Staff Manual: Intelligence Planning
This manual provides guidance to Joint Staff, Service (including Service intelligence centers and reserve components), Combatant Command (CCMD), and Combat Support Agency (CSA) personnel for conducting collaborative intelligence planning (IP) primarily in support of Combatant Commander (CCDR) campaign plans, contingency plans, and orders.
U.S. Navy
U.S. Navy Broad Area Maritime Surveillance Demonstrator (BAMS-D) Standard Operating Procedures
U.S. Navy
U.S. Navy 2012 Maryland Drone Crash Investigation Report
An investigation report concerning the crash of a RQ-4A Global Hawk unmanned aerial vehicle on June 11, 2012 during a training flight near the Naval Air Station Patuxent River in Maryland. The report concludes that the accident occurred due to ” mechanical malfunction of the right ruddervator actuator”. However, the pilot “failed to follow the proper emergency procedures” which “did not produce disastrous results in this particular event; however, future breaches of established procedures could produce a different outcome.”
Department of Defense
(U//FOUO) DoD Instruction: Illumination of Objects in Space by Lasers
Joint Chiefs of Staff
Joint Publication 3-14 Space Operations
This publication provides guidance for planning, executing, and assessing joint space operations. It provides space doctrine fundamentals for all joint forces; describes the military operational principles associated with support from, through, and operating in space; explains Joint Staff, combatant command (CCMD), United States Strategic Command (USSTRATCOM), and USSTRATCOM functional and Service component relationships and responsibilities; and establishes a framework for the employment of space forces and space capabilities.
Department of Homeland Security
(U//FOUO) DHS Protective Measures Guide for the U.S. Outdoor Venues Industry
Within DHS, this overarching responsibility for critical infrastructure protection is delegated to the National Protection and Programs Directorate’s (NPPD) Office of Infrastructure Protection (IP), specifically the Sector-Specific Agency Executive Management Office (SSA EMO) CF Branch for commercial facilities. Serving as the Sector-Specific Agency (SSA) for the CF Sector, the CF Branch works with its partners to address and highlight low-cost preparedness and risk management options in the products and tools it makes available to the private sector. For example, the CF SSA has been working to produce a suite of protective measures guides that provide an overview of best practices and protective measures designed to assist owners and operators in planning and managing security at their facilities or events. The Protective Measures Guide for the U.S. Outdoor Venues Industry is one of these guides and reflects the special considerations and challenges posed by the Outdoor Venues Subsector.
Department of Defense
Restricted Joint Chiefs of Staff Instruction: Communication Security Releases to Foreign Nations
Joint Chiefs of Staff
(U//FOUO) Joint Chiefs of Staff Instruction: Military Information Support Operations (MISO)
In accordance with (IAW) reference a, MISO replaces the term psychological operations (PSYOP). This instruction provides strategic direction for inclusion of MISO to support the full range of military operations including military engagement, security cooperation and deterrence; crisis response and limited contingency operations; major operations and campaigns; and as an integrated information activity within the DOD’s overall contribution to United States Government (USG) communication strategies.
Department of Defense
(U//FOUO) DoD Instruction: Signals Intelligence (SIGINT)
Department of Defense
(U//FOUO) DoD Manual: Defense Industrial Base (DIB) Cybersecurity Program Classification Manual
DIB CS/IA is the DoD program to protect critical DoD unclassified program, technology, and operational information residing on, or transiting, DIB unclassified networks. DoD Components and industry participants collaborate to protect DoD information through the development, implementation, and execution of DoD and DIB processes and procedures.
Department of Homeland Security, Federal Bureau of Investigation
(U//FOUO) DHS-FBI Bulletin: Use of the Internet for Attack Planning
Malicious actors may leverage the Internet to gain information against a potential target to support pre-operational planning efforts for kinetic or cyber attacks. Malicious actors can use Internet search engines for information such as maps, company photographs or blueprints, and gain additional details from social media sites and Web blogs. Some actors may use more sophisticated techniques—such as phishing, spear phishing, or actual penetration of an organization’s network or devices—which can be used to gather personal, sensitive, or proprietary data.
Department of Defense
(U//FOUO) DoD Instruction: Intelligence Oversight, Coordination, Assessment and Reporting
Department of Defense
(U//FOUO) DoD Instruction: Raven Rock Mountain Complex (RRMC)
The mission of RRMC is to support the Secretary of Defense, the Chairman of the Joint Chiefs of Staff, select DoD Components and, as appropriate, non-DoD agencies of the Federal Government, and to enable the execution of DoD mission-essential functions (MEFs) in accordance with DoDD S-5100.44 and continuity of operations (COOP) plans and operational orders.
Department of Defense
(U//FOUO) DoD Instruction: Counterintelligence (CI) Activities Supporting Research, Development, and Acquisition
The CI mission in RDA informs the DoD Components and supporting CDCs of foreign collection threats and detects FIE targeting of defense-related technology. The CI support enables RDA program personnel to implement countermeasures and enables CI to develop activities that negate, counter, penetrate, or exploit an FIE.