United States

Sandia National Laboratories/Department of Energy Sensitive Country List

A sensitive country is one to which particular attention is given during the review and approval process for Foreign Visits & Assignments. Countries may be designated as sensitive for reasons of national security, nuclear nonproliferation, regional instability, threat to national economic security, or terrorism support. A foreign national is considered to be from a sensitive country if he/she is a citizen of a sensitive country or is employed by the government of an institution of a sensitive country.

(U//FOUO) DHS-FBI Warning: Terrorist Use of Vehicle Ramming Tactics

Terrorists overseas have suggested conducting vehicle ramming attacks—using modified or unmodified vehicles—against crowds, buildings, and other vehicles. Such attacks could be used to target locations where large numbers of people congregate, including sporting events, entertainment venues, or shopping centers. Vehicle ramming offers terrorists with limited access to explosives or weapons an opportunity to conduct a Homeland attack with minimal prior training or experience.

(U//FOUO) DHS London Officials Issue Heroin Anthrax Alert March 2010

On 5 February 2010, the UK Health Protection Agency (HPA)—an official British Government agency—announced the confirmation of one case in England of a heroin user testing positive for anthrax. HPA also said 19 cases of anthrax had been confirmed so far in Scotland and that the heroin, or a contaminated cutting agent mixed with the heroin, was the likely source of infection.

American, British, Canadian, Australian and New Zealand (ABCA) Armies Coalition Operations Handbook

Coalitions, which are created for limited purposes and for a set time, do not afford military planners the same political resolve and commonality of aim as alliances. Thus, planners must closely study the political goals of each participant as a precursor to detailed planning. Political considerations weigh more heavily with coalitions than with alliance operations. Coalition military operations are not new. The American, British, Canadian, Australian, and New Zealand (ABCA) nations have participated together in several coalition operations during the twentieth century. Since human nature has not changed, conflicts over territory, religion, politics, and economics, such as those that prompted previous military operations, will continue to be widespread. The precise role of armies in these operations will vary according to each political and military situation.

U.S. Army Whistleblower Report: Senior Military Leaders’ Loss of Integrity Wounds Afghan War Effort

Senior ranking US military leaders have so distorted the truth when communicating with the US Congress and American people in regards to conditions on the ground in Afghanistan that the truth has become unrecognizable. This deception has damaged America’s credibility among both our allies and enemies, severely limiting our ability to reach a political solution to the war in Afghanistan. It has likely cost American taxpayers hundreds of billions of dollars Congress might not otherwise have appropriated had it known the truth, and our senior leaders’ behavior has almost certainly extended the duration of this war. The single greatest penalty our Nation has suffered, however, has been that we have lost the blood, limbs and lives of tens of thousands of American Service Members with little to no gain to our country as a consequence of this deception.

(U//FOUO) Army National Guard Information Assurance (IA) Program Policy

This Policy provides Information Assurance (IA) policies and mandates procedures for implementing the Army National Guard (ARNG) IA Program. The ARNG IA program will implement the Department of Defense (DoD) IA program, DoD Instruction (DoDI) 8500.2, “Information Assurance Implementation,” IAW Army Regulation (AR) 25-2, “Information Assurance” chapter 1 g-8 to support the DoD Information Management Strategic Plan, (IMSP). This Policy supports the Federal Information Security Management Act, (FISMA) 2002 and any other federal guidelines as needed; and shall be consistent with today’s technological advancements, in a generic fashion to avoid dependency on specific technology.

(U//FOUO) U.S. Army Modular Brigade Augmented for Security Force Assistance Handbook

This hand book synthesizes current doctrine and emerging TTPs into a handbook for units assigned a Security Force Assistance (SFA) mission. Security Force Assistance is not a unit; it is a mission assigned to a unit. Army leaders will assign this mission to Modular brigades more frequently according to the realities of the operational environment. The Modular Brigade, with its broad and flexible command and control structure, is designed to conduct Full Spectrum Operations, which includes Security Force Assistance, but it requires augmentation and specific task organization to effectively accomplish Security Force Assistance tasks.

DHS-University of Maryland Study: Hot Spots of Terrorism and Other Crimes in the United States 1970 to 2008

While efforts are increasingly aimed at understanding and identifying “hot spots” of ordinary crime, little is known about the geographic concentration of terrorist attacks. What areas are most prone to terrorism? Does the geographic concentration of attacks change over time? Do specific ideologies motivate and concentrate terrorist attacks? Moreover, what factors increase the risk that an attack will occur in a particular area? Using recently released data from the Global Terrorism Database, we address these gaps in our knowledge by examining county-level trends in terrorist attacks in the United States from 1970 through 2008.

(U//FOUO) Joint Center for Operational Analysis (JCOA) Civilian Casualties (CIVCAS) Adaptive Learning for Afghanistan

Building on several previously completed studies of civilian casualties (CIVCAS) in Afghanistan, the US Joint Forces Command (JFCOM) Joint Center for Operational Analysis (JCOA) partnered with Ms. Sarah Sewall of Harvard University to conduct an independent and comprehensive assessment of civilian casualties, the Joint Civilian Casualty Study, published in August 2010. The Commander, International Security Assistance Force (COMISAF), responded to this assessment by stating that more work was needed to ensure that the DOTMLPF changes required to reduce and mitigate CIVCAS were institutionalized. Accordingly, COMISAF requested that JCOA, with the support of the Services, conduct a study to “examine the institutionalization of CIVCAS lessons learned into US forces’ preparation for deployment, with a focus on the unique context of Afghanistan.” That study, Adaptive Learning for Afghanistan (ALA), examined ways in which lessons and adaptations in theater were captured, shared, and incorporated into force preparation. In this respect, ALA was not “another CIVCAS study,” but rather, it used CIVCAS as a test case for characterizing the overall process of adaptive learning.

Orange County Private Sector Terrorism Response Group TV Guide Weekly Bulletin

An example of a weekly bulletin released by the Orange County Intelligence Assessment Center to local businesses through its “Private Sector Terrorism Response Group” (PSTRG) on January 6, 2012. The PSTRG was created in “December 2001 to create a private sector partnership [that can] effectively address private sector safety, incident management, employee education and public health consequences of potential attacks on the critical infrastructure within Orange County. Two large groups involved with PSTRG are the Orange County Business Council, of which 80% of the major businesses in Orange County are members, and Technet, a consortium of 28 high tech firms.” The bulletin includes excerpts of news articles related to terrorism, a list of upcoming events, including dirt bike events and rodeos, as well as a helpful list of upcoming television shows on the History Channel and other networks that relate in some manner to terrorism.

(U//FOUO) New Jersey Office of Homeland Security School Bomb Plot Warning

On January 25, 2012, police officers in Utah arrested two teenagers after discovering that they planned to bomb their high school. The plot was foiled because another student received suspicious text messages from one of the boys and notified school administrators. During the subsequent investigation, police were able to corroborate the initial tip. The two suspects had blueprints of the school and planned to steal a plane at a nearby airport after their attack. They told police they were learning to fly on a flight-simulator program on their home computers.

American, British, Canadian, Australian and New Zealand (ABCA) Armies Security Force Capacity Building Handbook

SFCB has come to play an increasingly important role in each of our armies over the last decade and will undoubtedly feature in operations spanning the spectrum of conflict in the future. Its affect on organization, training, equipping and doctrine has been felt to a greater or lesser extent by each of us and will help define recent conflicts and their effects. However, SFCB cannot be done in isolation. What must be borne in the military planner‘s mind from the outset is that SFCB is a part of the wider SSR campaign and as a consequence must be part of a comprehensive approach. Furthermore, if coalition partners are present, an extra layer of complexity is present and must be planned for. Failure to take these two aspects into account runs the risk of failure at worst or a fragmented HNSF as a result, at best. This handbook aims to assist the military planner in their approach to SFCB. It is aimed at both commanders and staff officers, primarily on brigade and divisional staffs, although it also has utility for those charged with training, mentoring and advising HNSF forces at the tactical level.

(U//FOUO) U.S. Marine Corps Partnering with Afghan National Security Forces (ANSF) Lessons Learned

The Marine Corps has a long and storied history of partnering, mentoring, and advising foreign militaries. Marines served as the officer corps of the Gendarmerie d’Haiti and integrated at platoon-level with South Vietnamese Popular Forces. These are only two of many possible examples, but they suffice to illustrate the diversity of relevant Marine Corps experience. This enduring legacy influences Marine counterinsurgency operations in Afghanistan as well as theater security cooperation exercises throughout the world.

(U//FOUO) DHS-FBI Florida-Based Violent Extremist Arrested for Plotting Bombing Attack in Tampa

This Joint Intelligence Bulletin is intended to provide information on the 7 January 2012 arrest by the FBI Tampa Joint Terrorism Task Force (JTTF), as part of a planned law enforcement action, of Florida-based Sami OsmakacUSPER. Osmakac is charged with attempted use of weapons of mass destruction. This information is provided to support the activities of FBI and DHS and to assist federal, state, local, tribal, and territorial, counterterrorism and law enforcement officials to prevent or respond to terrorist attacks against the United States.

FBI “Communities Against Terrorism” Suspicious Activity Reporting Flyers

A collection of 25 flyers produced by the FBI and the Department of Justice are distributed to local businesses in a variety of industries to promote suspicious activity reporting. The fliers are not released publicly, though several have been published in the past by news media and various law enforcement agencies around the country. We have compiled this collection from a number of online sources.

(U//FOUO) Los Angeles Fusion Center: Steganography Intelligence Bulletin

Steganography—the practice of concealing data within a carrier—may be used to obscure malicious or criminal information and activity from law enforcement. While steganography dates to the fifth century BC, it has long been regarded as, and remains, one of the most advanced forms of clandestine communication. In modern usage, the Internet allows accessibility to, and broad dissemination of, steganography tools, and its application continues to evolve with technology. Understanding steganography in its current state is essential to its identification and detection.

(U//FOUO) DHS-FBI-USSS 2012 State of the Union Address Joint Threat Assessment

We have no specific or credible information indicating a threat to the US Capitol or the National Capital Region (NCR) to coincide with the 2012 State of the Union address. We assess, however, that al-Qa‘ida and its affiliates and allies remain committed to attacking the Homeland and, as of February 2010, al-Qa‘ida identified the NCR and the State of the Union address itself as important targets, presumably for attacks. Moreover, homegrown violent extremists (HVEs) as well as lone offenders could view the event as an attractive target, offering the means to inflict casualties and garner extensive media coverage. Detecting homeland plots involving HVEs and lone offenders continues to challenge law enforcement and intelligence agencies due to the operational independence of the perpetrators, which can reduce or eliminate preoperational indicators.

(U//FOUO) Afghanistan Human Terrain Team AF-24 Quarterly Report Summer 2011

Local governance in rural Afghanistan is not simple. Older customary local assemblies operate alongside GIRoA officials, Community Development Councils (CDC’s), and insurgent groups. Although we speak of insurgent governments as “shadow governments,” they rarely exist in the shadows for those over whom they wield power. In villages where insurgents continue to exercise control, the insurgents and not GIRoA perform traditional governmental functions; they levy taxes, resolve disputes (they are, in many villages the only law in town), and maintain local defense forces. Western Powers have invested their hope and their treasure in inventing a new form of local control: Community District Councils that come out of the National Solidarity Program (NSP). Managed by the Ministry of Rural Rehabilitation and Development (MRRD) with funds from NGO’s and from the World Bank, these organizations set priorities for the expenditure of donor money and oversee contracts. Although they offer an alternative to the indiscriminate funding of the past that encouraged favoritism and corruption, these organizations have little authority except when it comes to the stewardship of outside money. As those development funds begin to dry up, will CDC’s vanish? Can they be further empowered?

(U//FOUO) Joint Publication 3-15.1 Counter-Improvised Explosive Device Operations

This publication provides joint doctrine for planning and executing counter-improvised explosive device (C-IED) operations. It outlines responsibilities, provides command and control considerations, discusses organizational options, details the C-IED process and attack the network methodology, and introduces models for coordinating with C-IED supporting organizations.

U.S. Army FM 3-13 Inform and Influence Activities Draft Manual

All assets and capabilities at a commander’s disposal have the capacity to inform and influence selected audiences to varying degrees. While specific assets termed as “information-related capabilities” are information-centric in mission and purpose, others are standard capabilities that inform and influence officers use for planning to support commanders’ information strategy and mission objectives. The primary information-related capabilities that support inform and influence activities typically include, but are not limited to, public affairs, military information support operations, combat camera, Soldier and leader engagement, civil affairs, cyber electromagnetic activities, counterintelligence, operations security, military deception, and others so designated by a commander. In addition to the primary information-related capabilities, there are operational capabilities not solely designed to inform or influence that commanders can designate to assist in achieving mission objectives, such as maneuver forces, engineers, and medical units. Success depends on commanders and staffs effectively employing all available operational assets to best shape the information environment.