United States

(U//FOUO) Los Angeles Fusion Center: Detecting and Mitigating Cyber Threats

US citizens and assets – including the White House, the Central Intelligence Agency, InfraGard, the state of Arizona, and major defense contracting companies – experienced high-profile cyber threats and attacks in the first half of 2011. Most of the tactics and techniques used were not new, however the increase in attacks during the past few months exemplifies the growth of cyber incursions and reinforces the need to be aware of risks and mitigation techniques associated with cyber threats.

(U//FOUO) FBI Threat to Law Enforcement From “Doxing”

The FBI assesses with high confidence a that law enforcement personnel and hacking victims are at risk for identity theft and harassment through a cyber technique called “doxing.” “Doxing” is a common practice among hackers in which a hacker will publicly release identifying information including full name, date of birth, address, and pictures typically retrieved from the social networking site profiles of a targeted individual.

(U//FOUO) U.S. Marine Corps Afghan Drone Operations in Regional Command Southwest (RC (SW))

To inform Deputy Commandants (DCs) Aviation, Combat Development and Integration (CD&I), Plans, Policies, and Operations (PP&O), Installations and Logistics (I&L), Commanding General (CG), Training and Education Command (TECOM), Director of Intelligence, operating forces, and others on results of a Marine Corps Center for Lessons Learned (MCCLL) collection conducted April – May 2011 to document lessons and observations regarding unmanned aerial systems (UAS) operations in support of Regional Command Southwest (RC (SW)) during Operation Enduring Freedom (OEF).

(U//FOUO) USAF Operating Next-Generation Remotely Piloted Aircraft for Irregular Warfare

RPAs are revolutionary surveillance and weapons delivery systems – changing the way the Air Force builds situation awareness and engages enemy forces – but their full potential has yet to be realized. To begin to address this issue, the Air Force initiated this study to review the state-of-the-art in RPA operations, focusing on control and connectivity in an irregular warfare (IW) environment. The Panel was specifically tasked to identify RPA architectures and operational concepts centered on human-systems integration, distributed systems operations, and effective command and control – a cluster of concepts and technologies we subsequently labeled as “mission management” enablers. The Panel was also tasked to recommend mid- to far-term S&T development roadmaps for advancing these technologies to improve the flexibility and capability of RPA operations.

(U//FOUO/LES) Los Angeles Fusion Center: Methods to Defeat Law Enforcement Crowd Control

The purpose of this bulletin is officer awareness. Officers should know that instigators involved in violent demonstrations might be familiar with, and might try to apply, techniques from the “Crowd Control and Riot Manual.” The handbook, from Warrior Publications teaches protestors how to defeat law enforcement crowd control techniques. Although it does not address specific groups or organizations, the information is widely applicable.

(U//FOUO) U.S. Army Intelligence Officer’s Handbook

TC 2-50.5 replaces FM 34-8-2, dated 1 May 1998. This publication does not replace the fundamental principles and tactics, techniques, and procedures contained in the other FM 2-series manuals; however, it does focus on their application. It is to be used in conjunction with the other FM 2-series manuals and conforms to the overarching doctrinal concepts presented in FM 3-0 and FM 2-0. The target audience for this manual is the intelligence officers serving as the G-2/S-2 and their staffs— intelligence warrant officers, noncommissioned officers, and junior enlisted Soldiers. TC 2-50.5 applies to the Active Army, the Army National Guard/Army National Guard of the United States, and the U.S. Army Reserve, unless otherwise stated.

(U//FOUO) JFIIT Intelligence Surveillance and Reconnaissance (ISR) Systems Handbook

The purpose of the JFIIT Tactical Leaders Handbook (version 5) is to provide ground maneuver commanders, battle staffs, and soldiers with information regarding Joint Intelligence, Surveillance, and Reconnaissance (ISR) and attack systems and how to leverage these combat multipliers during planning, preparation, and execution of military operations. JFIIT publishes a classified version of this document on the SIPRNET.

White House Strategic Plan for Preventing Violent Extremism

Law enforcement and government officials for decades have understood the critical importance of building relationships, based on trust, with the communities they serve. Partnerships are vital to address a range of challenges and must have as their foundation a genuine commitment on the part of law enforcement and government to address community needs and concerns, including protecting rights and public safety. In our efforts to counter violent extremism, we will rely on existing partnerships that communities have forged with Federal, State, and local government agencies. This reliance, however, must not change the nature or purpose of existing relationships. In many instances, our partnerships and related activities were not created for national security purposes but nonetheless have an indirect impact on countering violent extremism (CVE).

(U//FOUO) U.S. Marine Corps Intelligence Afghan Female Engagement Report

The purpose of this document is to outline the role of female engagement on the ground and best uses of female engagement initiatives. While existing academic literature on females in Afghanistan is limited mostly to the urban areas, it is evident that the lives of women in rural Helmand are complex and difficult than is generally understood from open source and academic literature. Female engagement encompasses methodical, long-term outreach efforts to the entire population, men, women, and children, which is essential in a counterinsurgency. Such engagement efforts provide opportunities to connect with both men and women, counter negative Taliban IO efforts, and improve civil affairs efforts.

(U//FOUO) U.S. Army Commander’s Guide to Military Working Dogs (MWDs)

The MWD program endured four decades of peace and brief contingency operations from the end of the Vietnam era to the current Global War on Terrorism. The program remained firmly embedded in the Military Police Corps combat support, law and order, and force protection missions. In late 2001, the onset of military operations in Afghanistan provided the impetus to expand MWD capabilities in support of commanders in the field. In 2002, as a direct result of an immediate operational need in Afghanistan, Army leadership directed the establishment of an Army mine detection dog unit and embedded it in the Corps of Engineers. In 2004, as a result of cooperation between the U.S. Army Engineer School and the U.S. Army Military Police School, the Army added a non-aggressive, specialized search dog (explosives detection dog) to the MWD inventory. Combat tracker dogs are returning to Army use as well, along with a very limited number of human remains detector or cadaver search dogs. Two constants emerge in the 60-plus-year history of Army MWD use: working dogs are used in a variety of units for a wide range of missions, and the size of the MWD program has expanded and contracted over time based on the needs of the Army. In the current and projected future operating environment, the MWD program will undoubtedly expand once again.

(U//FOUO) U.S. Army Commander’s Guide to Female Engagement Teams

Complex operations often require the development of specialized teams with multidisciplinary perspectives. Examples of these groups include human terrain teams, provincial reconstruction teams, and, most recently, female engagement teams (FETs). These specialized programs are tasked with engaging local populations to ascertain information on civil-society needs and problems; address security concerns; and to form links between the populace, military, and interagency partners.

Detainee Provisions in the National Defense Authorization Bills

Both House and Senate bills competing to become the National Defense Authorization Act for FY2012 contain a subtitle addressing issues related to detainees at the U.S. Naval Station at Guantanamo Bay, Cuba, and more broadly, hostilities against Al Qaeda and other entities. At the heart of both bills’ detainee provisions appears to be an effort to confirm or, as some observers view it, expand the detention authority that Congress implicitly granted the President via the Authorization for Use of Military Force (AUMF, P.L. 107-40) in the aftermath of the terrorist attacks of September 11, 2001.

California Peace Officer Standards and Training Crowd Management and Civil Disobedience Guidelines

In the United States all people have the right of free speech and assembly guaranteed by the First Amendment of the Federal Constitution and California State Constitution. Law enforcement recognizes the right of free speech and actively protects people exercising that right. The rights all people have to march, demonstrate, protest, rally, or perform other First Amendment activities comes with the responsibility to not abuse or violate the civil and property rights of others. The responsibility of law enforcement is to protect the lives and property of all people. Law enforcement should not be biased by the opinions being expressed nor by the race, gender, sexual orientation, physical disabilities, appearances, or affiliation of anyone exercising his/her lawful First Amendment rights. Law enforcement personnel must have the integrity to keep personal, political or religious views from affecting their actions.

California Bluebook Law Enforcement Mutual Aid Plan

As you read this, somewhere in California one law enforcement agency is providing mutual aid to another. Mutual aid is an everyday occurrence in a state as large and diverse as California. This is the continuation of the decades-long process of “neighbor helping neighbor.” The law enforcement mutual aid system is an ongoing cooperative effort among law enforcement agencies to ensure an effective and organized response to a wide range of emergencies. There is a misconception that mutual aid is something used only during a riot or disaster. The mutual aid system has been used successfully for many other situations, including large criminal investigations, deployment of special teams such as Special Weapons and Tactics Teams, Bomb Squads, etc.

California Redbook Law Enforcement Guide for Emergency Operations

The California Emergency Management Agency’s original Law Enforcement Guide for Emergency Operations was developed in response to the need for standardization and uniformity of organization and response on the part of law enforcement agencies involved in major multi-jurisdictional and multi-agency incidents such as a civil disorder, technological disaster, or natural disaster. The revised and expanded 2009 Law Enforcement Guide for Emergency Operations is designed to be a practical field-oriented guide to assist law enforcement personnel throughout the State of California with implementation of the Field Level Incident Command System. The intended primary users of this guide are watch commanders and field supervisors. The guide can also be an excellent emergency response tool for law enforcement managers, as well as line officers and deputies.

Congressional Budget Office: Top 1% Income Rose 275% From 1979-2007

From 1979 to 2007, real (inflation-adjusted) average household income, measured after government transfers and federal taxes, grew by 62 percent. During that period, the evolution of the nation’s economy and the tax and spending policies of the federal government and state and local governments had varying effects on households at different points in the income distribution: Income after transfers and federal taxes (denoted as after-tax income in this study) for households at the higher end of the income scale rose much more rapidly than income for households in the middle and at the lower end of the income scale.

(U//FOUO) Director of National Intelligence Classification and Control Markings Manual Version 1.2

The Implementation Manual is a companion document developed to provide amplifying and explanatory guidance on the syntax and use of the markings contained in the CAPCO Register. While not the policy basis for individual agencies’ use of any particular marking, the Implementation Manual cites the applicable authority and sponsor for each marking. Some of the Dissemination Controls and Non-Intelligence Community Dissemination Control Markings are restricted to use by certain agencies. They are included to provide guidance on handling documents that bear them. Their inclusion in the manual does not authorize other Agencies to use these markings. Non-US Classification and Joint Classification Markings are restricted to the respective countries or international organizations.

(U//FOUO) Director of National Intelligence Classification Markings Register Version 1.2

The 2008 version of the Director of National Intelligence’s Classification and Control Markings Register was released via a FOIA request and is available in a redacted form via the Federation of American Scientists. We have obtained an unredacted version and are presenting selected pages alongside the previously released version to highlight the information that was redacted, including several NSA dissemination control markings such as FRONTO, KEYRUT, SEABOOT and SETTEE.