United States

U.S. Nuclear Regulatory Commission General Electric BWR/4 Reactor Technical Specifications

This NUREG contains the improved Standard Technical Specifications (STS) for General Electric (GE) BWR/4 plants. Revision 3 incorporates the cumulative changes to Revision 1 and 2, which was published in April 1995 and April 2001, respectively. The changes reflected in Revision 3 resulted from the experience gained from license amendment applications to convert to these improved STS or to adopt partial improvements to existing technical specifications. This publication is the result of extensive public technical meetings and discussions among the Nuclear Regulatory Commission (NRC) staff and various nuclear power plant licensees, Nuclear Steam Supply System (NSSS) Owners Groups, and the Nuclear Energy Institute (NEI).

U.S. Army Enterprise Email CONOPS 2012

The strategic environment has changed significantly since the end of the Cold War, and events since September 11, 2001 have dramatically demonstrated that we have entered a new era of conflict with difficult challenges to overcome. To meet these challenges, the Department of the Army requires enterprise services to create an information advantage by providing seamless collaboration and moving the power of information to the tactical edge. Implementing an Army Enterprise Email Service (EMCS) is a major step towards meeting these needs.

Obama Administration Intellectual Property Enforcement Legislative Recommendations White Paper

On June 22, 2010, the U.S. Intellectual Property Enforcement Coordinator (IPEC) issued the Administration’s first Joint Strategic Plan on Intellectual Property Enforcement (Strategy), which was developed in coordination with many Federal agencies, including the Departments of Commerce, Health and Human Services, Homeland Security (DHS), Justice (DOJ), and State, and the U.S. Trade Representative. As part of the Strategy, the Administration undertook to review existing laws to ensure that they were effective and to identify deficiencies that could hinder enforcement. Based on that review, this White Paper identifies specific recommended legislative changes, designed to increase the effectiveness of U.S. enforcement efforts. We will, of course, continue to assess existing legislation and recommend any further changes to the law as the need arises.

(U//LES) El Paso Intelligence Center Bath Salts Synthetic Stimulant Bulletin

Across the United States, synthetic stimulants that are sold as “bath salts” have become a serious drug abuse threat. These products are produced under a variety of faux brand names, and they are indirectly marketed as legal alternatives to cocaine, amphetamine, and Ecstasy (MDMA or 3,4-Methylenedioxymethamphetamine). Poison control centers nationwide have received hundreds of calls related to the side-effects of, and overdoses
from, the use of these potent and unpredictable products. Numerous media reports have cited bath salt stimulant overdose incidents that have resulted in emergency room visits, hospitalizations, and severe psychotic episodes, some of which, have led to violent outbursts, self-inflicted wounds, and even suicides. A number of states have imposed emergency measures to ban bath salt stimulant products (or the chemicals in them) including Florida, Louisiana, North Dakota, and West Virginia; and similar measures are pending in Hawaii, Kentucky, Michigan, and Mississippi. A prominent U.S. Senator has also recently proposed legislation that would ban the synthetic stimulant chemicals found in bath salt products at the federal level.

(U//FOUO) U.S. Army Human Terrain Team Commander’s Guide

Human terrain teams (HTTs) consist of five to nine personnel deployed by the HTS to support field commanders. HTTs fill the socio-cultural knowledge gap in the commander’s operational environment and interpret events in his AO. The team, individuals with social science and operational backgrounds, deploys with military units to bring knowledge about the local population into a coherent analytic framework. The teams also assist in building relationships with the local community in order to provide advice and opportunities to commanders and staffs in the field.

U.S. Army Human Terrain System Afghanistan Pashtun Tribal Analysis

This report consists of two main parts: the first part is an overview of the existing historical and anthropological research on Pashtun “tribes” in Afghanistan, and the second part examines how “tribes” behave in Afghanistan. It is based mostly on academic sources, but it also includes unclassified government information and research performed by HTS Human Terrain Teams, which have been attached to U.S. Army brigades since 2007.

(U//LES) DHS-FBI Spokane White Supremacist MLK Parade IED Bulletin

Kevin William Harpham was arrested in Colville, Washington by federal law enforcement on 9 March 2011 in connection with the improvised explosive device (IED) found along the route of a Martin Luther King, Jr. Day “MLK Unity March” in Spokane, Washington on 17 January 2011. On 17 January 2011, three sanitation workers in Spokane, Washington discovered a Swiss Army backpack containing an RCIED immediately prior to the Martin Luther King, Jr. Day “MLK Unity March.” The device was placed along the parade route. Based on preliminary forensic examinations, we assess with medium confidenceii that the IED was designed to fire directional fragmentation similar to a single shot shotgun with buckshot or cannon with a grapeshot round. We likewise assess that the device was viable and could have caused personal injury or death.

Bradley Manning’s Description of Abusive Treatment at Quantico

Under my current restrictions, in addition to being stripped at night, I am essentially held in solitary confinement. For 23 hours per day, I sit alone in my cell. The guards checked on me every five minutes during the day by asking me if I am okay. I am required to respond in some affirmative manner. At night, if the guards can not see me clearly, because I have a blanket over my head or I am curled up towards the wall, they will wake me in order to ensure that I am okay. I receive each of my meals in my cell. I am not allowed to have a pillow or sheets. I am not allowed to have any personal items in my cell. I am only allowed to have one book or one magazine at any given time to read. The book or magazine is taken away from me at the end of the day before I go to sleep. I am prevented from exercising in my cell. If I attempt to do push-ups, sit-ups, or any other form of exercise I am forced to stop by the guards. Finally, I receive only one hour of exercise outside of my cell daily. My exercise is usually limited to me walking figure eights in an empty room.

(U//FOUO) DHS-FBI Terrorist Exploitation of Postal and Commercial Shipping Companies

Terrorists remain interested in exploiting postal and commercial shipping companies to conduct or support attacks in the United States. Publicity surrounding the more than 40,000 incidents involving unknown or suspicious substances related to the U.S. Mail since 2001 likely reinforces violent extremists’ belief that the postal sector is a useful mechanism for conducting an attack, as it demonstrates that mail containing potentially harmful substances can be delivered without arousing suspicion or being discovered until the recipient opens the letter or package.

(U//FOUO) DHS Strategy for Improving Improvised Nuclear Device Attack Response

The mission of the Department of Homeland Security (DHS) includes acting as a focal point regarding natural and manmade crises and emergency planning. In support of the Department’s mission, the primary mission of the Federal Emergency Management Agency (FEMA) is to reduce the loss of life and property and protect the Nation from all hazards, including natural disasters, acts of terrorism, and other man-made disasters, by leading and supporting the Nation in a risk-based, comprehensive emergency management system of preparedness, protection, response, recovery, and mitigation. Consistent with these missions, the Nuclear/Radiological Incident Annex to the National Response Framework (June 2008) sets forth DHS as the coordinating agency for all deliberate attacks involving nuclear/radiological materials, including radiological dispersal devices (RDDs) and improvised nuclear devices (INDs).

Retracted Center for Naval Analyses Assessment of the Human Terrain System

The Human Terrain System is a U.S. Army project intended to provide military decisionmakers in Iraq and Afghanistan with greater understanding of the local population’s cultures and perspectives. HTS deploys Human Terrain Teams (HTTs) of five to nine civilian and military personnel to support brigade, division, and theater-level staffs and commanders with operationally relevant information. The program also provides training for deploying personnel, reachback analysis, and software tools developed by HTS to support socio-cultural analysis. HTS emphasizes the use of tools and approaches commonly associated with the academic disciplines of anthropology and sociology’ in its efforts to collect and analyze data about local populations.

U.S. Army Special Forces Unconventional Warfare Training Manual November 2010

The intent of U.S. UW efforts is to exploit a hostile power’s political, military, economic, and psychological vulnerabilities by developing and sustaining resistance forces to accomplish U.S. strategic objectives. Historically, the military concept for the employment of UW was primarily in support of resistance movements during general-war scenarios. While this concept remains valid, the operational environment since the end of World War II has increasingly required U.S. forces to conduct UW in scenarios short of general war (limited war). Enabling a resistance movement or insurgency entails the development of an underground and guerrilla forces, as well as supporting auxiliaries for each of these elements. Resistance movements or insurgencies always have an underground element. The armed component of these groups is the guerrilla force and is only present if the resistance transitions to conflict. The combined effects of two interrelated lines of effort largely generate the end result of a UW campaign. The efforts are armed conflict and subversion. Forces conduct armed conflict, normally in the form of guerrilla warfare, against the security apparatus of the host nation (HN) or occupying military. Conflict also includes operations that attack and degrade enemy morale, organizational cohesion, and operational effectiveness and separate the enemy from the population. Over time, these attacks degrade the ability of the HN or occupying military to project military power and exert control over the population. Subversion undermines the power of the government or occupying element by portraying it as incapable of effective governance to the population.

(U//FOUO) U.S. Navy WikiLeaks Safeguarding Classified National Security Information Recommendations

PROTECTING INFORMATION CRITICAL TO OUR NATION’S SECURITY IS THE RESPONSIBILITY OF EVERYONE. THAT RESPONSIBILITY BECOMES MORE COMPLEX IN AN ELECTRONIC ENVIRONMENT. IT IS INCUMBENT UPON US ALL TO PROMOTE GOOD SECURITY PRACTICES ON THE NETWORK, MAINTAINING AN INFORMATION ADVANTAGE WHILE BALANCING INFORMATION SECURITY. WE OWE IT TO OURSELVES AND OUR FELLOW SAILORS AND MARINES TO PROTECT VITAL INFORMATION NECESSARY TO FIGHT AND WIN. REFS A THROUGH E ARE INTENDED TO IMPROVE THE BASIC PRINCIPLES AND PRACTICES OF INFORMATION SECURITY. THESE PRINCIPALS AND PRACTICES NEED TO BECOME OUR STANDARD AND NOT THE EXCEPTION.

(U//FOUO/LES) Arlington Police Department Khalid Ali‐M Aldawsari Saudi IED Plot Advisory

On 02/23/2011 Khalid Ali‐M Aldawsari (pictured left), a Saudi national currently attending college at South Plains College, near Lubbock, Texas, was arrested on federal terrorism charges. Aldawsari was charged with attempted use of a weapon of mass destruction (WMD), in connection with the alleged purchase of chemicals and equipment necessary to make an improvised explosive device (IED), in addition to research into possible U.S. based targets. Court documents advise that Aldawsari had performed internet research on how to construct an IED, using chemical components. It has also been alleged he had acquired/taken major steps in acquiring the necessary components and equipment needed to build such a device. According to court documents, on 02/01/2011 a chemical supplier reported to the FBI a suspicious purchase of concentrated phenol, by a man named Khalid Aldawsari. Although the toxic chemical phenol can have legitimate uses; it can also be used to make explosives. Concentrated sulfuric and nitric acids, beakers, flasks, clocks, wiring, and a Hazmat suit were found during 2 FBI searches of Aldawsari’s apartment.

HBGary DoD Cyber Warfare Support Work Statement

Cyber Warfare is warfare in the Cyberspace domain, which is defined by the SECDEF as “a global domain within the information environment consisting of the interdependent network of information technology infrastructures, including the internet, telecommunications networks, computer systems and embedded processors and controllers.” Cyber Warfare encompasses Computer Network Operations (e.g. Attack, Defend and Exploit,) Information Assurance, and the network operations that encompass Command, Control, Communications, Intelligence, Surveillance and Reconnaissance (C4ISR) and Information Operations (IO) functions that occur within the Cyberspace domain. This includes Computer Network Operations (CNO) against automated systems (e.g. C4ISR), and the interaction between the physical, social and biological networks that define human-machine interaction.

Africa: U.S. Foreign Assistance Issues

U.S. aid to Africa initially reached a peak in 1985, when global competition with the Soviet Union was at a high point. After the cold war ended, security assistance levels for Africa began to decline. In 1995, at the outset of the 104th Congress, substantial reductions in aid to Africa had been anticipated, as many questioned the importance of Africa to U.S. national security interests in the post-cold war era. As the debate went forward, however, congressional reports and bills emphasized U.S. humanitarian, economic, and other interests in Africa. Aid levels did fall, but gradually began to increase again in FY1997. U.S. assistance to Africa is reaching new highs due to a significant increase in health care sectors under the Global Health and Child Survival (GHCS) program. U.S. aid to Africa nearly quadrupled from $1.2 billion in FY2006 to $6.7 billion in FY2010. Moreover, the United States is the leading donor of humanitarian assistance to Africa. Between FY1999 and FY2009, the United States provided over $10.1 billion to East and Central African countries and an estimated $2.2 billion to Southern Africa countries.

Libya: Background and U.S. Relations

Major anti-government protests broke out in Libya on February 15 and have since intensified, eliciting violent government responses. The demonstrations are in opposition to the 42-year regime of Libya’s leader, Muammar al Qadhafi. As of February 18, some sources have reported that opposition forces have taken over areas of Benghazi, Libya’s second-largest city, and its surroundings in Libya’s northeastern Mediterranean region of Cyrenaica.

Bahrain: Reform, Security, and U.S. Policy

After experiencing serious unrest during the late 1990s, Bahrain undertook several steps to enhance the inclusion of the Shiite majority in governance. However, protests erupting following the uprising that overthrew Egyptian President Hosni Mubarak on February 11, 2011, demonstrate that Shiite grievances over the distribution of power and economic opportunities remain unsatisfied. The new unrest comes four months after smaller protests against the efforts by the Sunni-led government’s efforts to maintain its tight grip on power in the October 23, 2010, parliamentary election. That election, no matter the outcome, would not have unseated the ruling Al Khalifa family from power, but the Shiite population was hoping that winning a majority in the elected lower house could give it greater authority with which to challenge the ruling family. In advance of the elections, the government launched a wave of arrests intended to try to discredit
some of the hard-line Shiite leadership as tools of Iran.

New York Enhanced Security Guard Training Program Instruction Plan

Eighty-five percent of the critical infrastructure in the United States belongs to private enterprise and corporations. Thus, security guards are literally one of the nation’s first groups of defenders and play an integral role in prevention and deterrence efforts. Success in prevention and deterrence of both general crime, and terrorist acts as well, begins with the establishment of a baseline and maintenance of a robust all-hazards and all-crimes management infrastructure. The professional security guard industry in New York State with an excess of 140,000 certified security guards inhabit that baseline. This program will provide security guards with the basic awareness of terrorism issues that can potentially affect responsibilities within the purview of their employment. It will improve observation, detection and reporting capabilities while enhancing coordination capability with other emergency response professionals. Additionally, this program will elaborate on previously provided instruction, thereby elevating participants’ familiarity with access control issues and security technology.

(U//LES) Arizona Fusion Center Warning: Police Officers Targeted on Facebook

On October 28, 2010 a DUI traffic stop by MCSO uncovered a CD containing multiple photographs and names of over 30 Phoenix PD officers and civilian employees. All of the names and photographs found on the CD were obtained from Facebook and reveal the identity of several patrol and undercover officers. All officers who were identified on the CD have been notified. It is unknown how many more CDs (if any) may be circulating. This information is provided for Officer Safety and Situational Awareness purposes.

(U//FOUO) FBI Terrorist Training and Recruitment of CONUS Subjects: Lackawanna, Portland, and Northern Virginia

This assessment addresses the central role of terrorist training in three significant post-9/11 continental United States (CONUS) terrorism investigations: Lackawanna, Portland, and Northern Virginia. This assessment does not address other individuals who may have sought training independently, nor does it address groups of individuals who sought training in regions outside of South or Central Asia.