The Department of Defense (DOD) has published the (Final) Environmental Impact Statement (EIS) for the proposed implementation of campus development initiatives and the construction of associated facilities for the National Security Agency (NSA) complex at Fort George G. Meade (Fort Meade), Maryland, dated September, 2010. The National Security Agency/Central Security Service (NSA/CSS) is a cryptologic intelligence agency administered as part of the DOD. It is responsible for the collection and analysis of foreign communications and foreign signals intelligence. For NSA/CSS to continue to lead the Intelligence Community into the next 50 years with state-of-the-art technologies and productivity, its mission elements will require new facilities and infrastructure.
United States
Department of Health and Human Services
Department of Health and Human Services List of Terms for Monitoring Disease Outbreaks via Twitter
A document produced by the Department of Health and Human Services as part of their “Now Trending Challenge” to develop applications for monitoring disease outbreaks via Twitter. The document contains lists of various terms that are associated with a number of diseases from the common cold to diphtheria.
U.S. Navy
(U//FOUO) U.S. Navy Cloak Blade Inherently Stealthy Micro-Copter Presentation
A presentation accompanied a recent demonstration of the Cloak Blade, a micro-copter developed by Johns Hopkins University Applied Physics Laboratory under contract from the U.S. Navy.
Iraq, U.S. Air Force
U.S. Air Force Lawful Intercept Capability for the Government of Iraq Statement of Work
This Statement of Work (SOW) involves purchasing and installing a Lawful Intercept (LI) capability for the Government of Iraq (GOI). The capability shall include: providing installation, system engineering, system administration, terminal operations support, and mentoring/training Iraqi system operators. The solution should include a disaster recovery feature/configuration that would replicate (backup) the server and database storage at a physically separate facility. LI will provide the GOI a powerful communications intelligence tool to assist in combating criminal organizations and insurgencies by supporting evidence-based prosecutions, warrant-based targeting, and intelligence-based operations.
United States
Senate Permanent Subcommittee on Investigations Statement on Corporate Offshore Profit Shifting
America stands on the edge of a fiscal cliff. This challenge lends new urgency to a topic this subcommittee has long investigated: how U.S. citizens and corporations have used loopholes and gimmicks to avoid paying taxes. This subcommittee has demonstrated in hearings and comprehensive reports how various schemes have helped shift income to offshore tax havens and avoid U.S. taxes. The resulting loss of revenue is one significant cause of the budget deficit, and adds to the tax burden that ordinary Americans bear.
Department of State, Libya
U.S. State Department OSAC Libya Reports May 2011-September 2012
The group or individuals responsible for the attack on the Benghazi consulate remains unknown. It is also unclear if the attack was premeditated or simply a demonstration that spun out of control. Following the overthrow of Muammar Qaddafi and the ensuing civil war, Libya has been awash with small arms and light weapons. The use of such arms at the demonstration does not necessarily indicate a pre-meditated, coordinated attack. Online jihadi groups have claimed the attack was due to a statement released by al-Qa’ida leader Ayman al-Zawahiri regarding the earlier death of another al-Qa’ida leader, Abu Yahya al-Libi. Others have suggested that the attack was pre-meditated to coincide with the 9/11 anniversary in the United States. Neither of those claims has been substantiated. Until more evidence comes out, OSAC is unable to conclude whether this was a pre-meditated, planned, and coordinated assault on the Consulate.
Department of Defense
(U//FOUO) Joint DoDIIS/Cryptologic SCI Information Systems Security Standards Revision 3
The policy of the U.S. Government is that all classified information must be appropriately safeguarded to assure the confidentiality, integrity, and availability of that information. This document provides procedural guidance for the protection, use, management, and dissemination of Sensitive Compartmented Information (SCI), and is applicable to the Department of Defense (DoD) to include DoD components and Government contractors who process SCI.
Department of Justice
(U//LES) State and Local Anti-Terrorism Training (SLATT) Program: Terrorism Training for Law Enforcement
Eight presentations used in the State and Local Anti-Terrorism Training (SLATT) program for law enforcement, which is supported by grants from the Department of Justice’s Bureau of Justice Assistance.
U.S. Joint Forces Command
(U//FOUO) U.S. Joint Forces Command Military Support to Economic Normalization Draft Handbook
This handbook serves as a bridge between current operational-level doctrine and tactical-level employment at the joint force level. It is intended to inform doctrine writers, educators, and trainers about military support to economic normalization. It supplements, not replaces, existing joint or Service doctrine. The handbook is designed for use by personnel assigned to (or participating in) a joint operation and provides guidance at the operational level on the range of functions required to secure economic stability during or in the immediate post-conflict. Where doctrine is absent, it also presents definitions and constructs from the interagency and international community that have been harmonized with joint doctrine and discusses those ―best practices‖ that have proven of value during on-going military operations, exercises, and experimentation.
U.S. Army
Restricted U.S. Army Special Operations Forces Noncombatant Evacuation Operations
Field Manual (FM) 3-05.131 establishes Army special operations forces (ARSOF) doctrine for planning, coordinating, and executing noncombatant evacuation operations (NEOs) across the entire continuum of operational environments. NEOs are inherently joint operations. History demonstrates that joint forces conducted the vast majority of NEOs. This manual describes ARSOF operating within that context, thus the content of this manual mixes joint and Army terminology where appropriate. This manual does not duplicate or supplant established doctrine dealing with tactical or strategic operations, but it does provide a specific framework to apply that doctrine. Commanders tasked to conduct NEOs should ensure that their planning staff is familiar with referenced publications.
Bureau of Alcohol Tobacco Firearms and Explosives
(U//FOUO) U.S. Bomb Data Center Assessment: Criminal Bombers Use Curiosity and Greed to Lure Victims
Some criminal bombers exploited their victims’ sense of greed or general curiosity by hiding improvised explosive devices (IEDs) inside common everyday items and leaving them as discarded merchandise to be found by the victim. Victims then perceived these situations as an unexpected opportunity to obtain an object of value with no associated cost. The devices utilized victim-operated switches rather than command or time switches. While a seemingly discarded working tool or item could be considered an enticement in itself, the lack of a written note or similar enticement distinguished these bombing incidents from other IEDs that utilized written messages to bait the victim. Recent bombing incidents in Phoenix and Glendale, Arizona, might be another example of this tactic.
Federal Bureau of Investigation
(U//LES) FBI Going Dark: Law Enforcement Problems in Lawful Surveillance
‘Going Dark’ is a Law Enforcement (LE) initiative to address the gap between the legal authority and practical ability of LE to conduct lawfully-authorized electronic surveillance. Problems highlighted by the Going Dark initiative include LE’s difficulty in receiving information from some technology companies, and criminal’s use of advanced technologies and techniques that can complicate carrying out of lawfully-authorized court orders to conduct electronic surveillance.
United States
National Defense Authorization Act (NDAA) 2012 Indefinite Detention Permanent Injunction
Permanent injunction handed down by Judge Katherine B. Forrest on September 12, 2012 in the case Hedges v Obama challenging the constitutionality of indefinite detention under § 1021(b) of the National Defense Authorization Act for Fiscal Year 2012.
U.S. Army
Restricted U.S. Army Drills for Chemical, Biological, Radiological or Nuclear (CBRN) Domestic Support Missions
This drill book provides platoon, squad, and team leaders with standardized drills that are designed for use by trainers at the platoon and squad level. Standardized drills are essential to the success of platoon leaders, trainers, and small-unit leaders. These drills provide the performance measures, standards, and sequential procedures that will help guide the unit through training tasks for which doctrine is just now being developed. Chemical Corps platoons and squads must be able to perform these drills quickly, effectively, and to standard at all times.
National Counterterrorism Center
(U//FOUO) National Counterterrorism Center Advisory: Homegrown Violent Extremists Targeting Law-Enforcement Officers
Some homegrown violent extremists (HVE) have targeted US law-enforcement entities and have used publicly available information to counter these entities’ CT tactics and security practices. Law-enforcement entities are being identified by these extremists as both strategic targets and targets of opportunity, mainly because a core element of HVE subculture perceives that persecution by US law enforcement reflects the West’s inherent aggression toward Islam, which reinforces the violent opposition by HVEs to law enforcement.
Afghanistan, U.S. Army
(U//FOUO) U.S. Army Afghanistan Civilian Casualty Prevention Handbook
The U.S. military has long been committed to upholding the law of armed conflict and minimizing collateral damage. This includes the killing or wounding of noncombatant civilians — described in this handbook as civilian casualties or CIVCAS — as well as damage to facilities, equipment, or other property. Due to several factors, the impact of CIVCAS has increased to the point that single tactical actions can have strategic consequences and limit overall freedom of action. These factors include: the increased transparency of war, where tactical actions can be recorded and transmitted worldwide in real time; increased expectations for the United States’ conduct of war in light of improved precision and overall capabilities; and the enemy exploitation of CIVCAS to undermine U.S. legitimacy and objectives.
Afghanistan, Department of Defense
Money As A Weapon System-Afghanistan (MAAWS-A) Afghanistan Reintegration Program (ARP) SOP
The aim of reintegration is to stabilize local areas by convincing insurgents, their leaders and their supporters to cease active and/or passive support for the insurgency and to become peaceful members of Afghan society. Reintegration will supplement the continuing lethal and non-lethal activities that form a part of counterinsurgency operations. Reintegration will complement efforts to support political, governance, social and economic opportunity within communities. U.S. support for the Afghan Reintegration Programs must be attuned to Afghan culture.
Corporate, National Security Agency
Hitachi Press Release on NSA Utah Data Center Cable Purchases
With internet traffic growing exponentially, attacks on government and commercial computers by cyber terrorists and rogue states have escalated. Those wishing harm have espionage programs targeting the data systems used by the United States and allies. Drug traffickers and weapons dealers use the internet with encrypted communications. To counter these activities, the National Security Agency, an agency of the U.S. government, is building a fortified data center deep inside a mountain in Utah. This complex will house the world’s most sophisticated supercomputers dedicated to code breaking and data traffic analysis. Another site will eventually take delivery of the latest Cray supercomputer called Cascade to support the NSA’s need to crack codes faster to protect the nation and its allies.
Department of Homeland Security
DHS Protective Security Advisor (PSA) Names and Locations March 2012
A map of Department of Homeland Security protective security advisors (PSA) around the country from March 2012.
U.S. Central Command
(U//FOUO) CENTCOM Joint Theater Support Contracting Command Ethics Training
U.S. Central Command (CENTCOM) Joint Theater Support Contracting Command ethics training presentation from May 2012.
U.S. Army
Restricted U.S. Army Technical Escort Battalion Operations Manual
Field Manual (FM) 3-11.20 provides doctrine for planning and conducting technical escort (TE) operations from August 2007.
Louisiana
(U//FOUO) Louisiana Fusion Center Hurricane Isaac Situational Reports
Several Louisiana State Analytical & Fusion Exchange (LA-SAFE) Hurricane Isaac situational reports dated August 29 – 30, 2012.
United States
International Association of Chiefs of Police Recommended Guidelines for Using Drones
Rapid advances in technology have led to the development and increased use of unmanned aircraft. That technology is now making its way into the hands of law enforcement officers nationwide. We also live in a culture that is extremely sensitive to the idea of preventing unnecessary government intrusion into any facet of our lives. Personal rights are cherished and legally protected by the Constitution. Despite their proven effectiveness, concerns about privacy threaten to overshadow the benefits this technology promises to bring to public safety. From enhanced officer safety by exposing unseen dangers, to finding those most vulnerable who may have wandered away from their caregivers, the potential benefits are irrefutable. However, privacy concerns are an issue that must be dealt with effectively if a law enforcement agency expects the public to support the use of UA by their police.
United States
Information Sharing Environment Annual Report to the Congress 2012
The ISE is a partnership for responsible sharing of terrorism-related information between the law enforcement, public safety, defense, intelligence, homeland security, and diplomatic communities. It extends to all levels of government – federal, state, local, tribal, and territorial; and incorporates private sector partners and international allies.
Department of Homeland Security
DHS National Operations Center Operations Counterterrorism Desk (NCOD) Database Privacy Impact Assessment
The National Operations Center (NOC), within the Office of Operations Coordination and Planning (OPS), operates the NOC Counterterrorism Operations Desk (NCOD) and serves as the primary DHS point of contact to streamline counterterrorism Requests for Information (RFIs). The NCOD Database is a tracking tool used by NCOD Officers to track all counterterrorism related incoming and outgoing inquiries. OPS has conducted this Privacy Impact Assessment (PIA) because the NCOD Database contains personally identifiable information (PII).