United States

Operation Iraqi Freedom “Demons in Baghdad” Report

To establish a single source of facts documenting the 728th Expeditionary Air Control Squadron‘s deployment to Baghdad in support of Operation IRAQI FREEDOM (OIF). This final report is based on information collected from each of the squadron’s work centers in garrison, prior to deployment and during operations at Camp Griffin, Baghdad International Airport, Iraq.

(U//FOUO) DHS Triacetone Triperoxide (TATP) Homemade Explosive Warning

(U//FOUO) Terrorists could use the explosive Triacetone Triperoxide (TATP), also referred to as acetone peroxide, in an attack against the United States. In December 2001, British shoe-bomber Richard Reid tried to detonate an explosive device with TATP as the initiator while aboard a flight from Paris to Miami. TATP can be made from hydrogen peroxide, acetone, and sulfuric acid. These ingredients are commonly available from drug stores, hardware stores, and car batteries. TATP is extremely sensitive to impact, friction, static/sparks, and heat, and may react violently to drug field testing.

FM 31-27 Pack Animals in Support of Special Operations Forces

This manual provides guidance for training Army special operations forces (ARSOF) personnel in the techniques of animal pack transport and for organizing and operating pack animal units. It captures some of the expertise and techniques that have been lost in the United States (U.S.) Army over the last 50 years. The chapters on care, feeding, and veterinary medicine compose a considerable portion of the manual; however, this material is not intended as a substitute for veterinary expertise nor will it make a veterinarian out of the reader. ARSOF personnel must have a rudimentary knowledge of anatomy and physiology, common injuries, diseases (particularly of the feet), feeding, and watering to properly care for the animals and to avoid abusing them from overloading or overworking.

(U//FOUO) New Jersey ROIC 2009 Threat Information

(U//FOUO) The NJ ROIC Analysis Element has no information regarding any specific, credible threat to New Jersey or the U.S. Homeland at this time. Due to an active, federal counterterror investigation, the NJ ROIC Analysis Element produced this overview of potential targets of terrorist activity and the tactics, techniques, and procedures that extremists may use. It was produced with information from FBI and DHS, based on analysis of police investigations, thwarted plots, and past terrorist attacks.

Human Terrain System Afghan Saffron Report

Saffron, referred to by some as “red gold,” has been in demand for centuries. The Latin name for the plant which bears the delicate spice is Crocus sativus L. Saffron growing has been promoted in Afghanistan in recent years in response to a call from the Afghan government to investigate economically viable licit alternatives to poppy. Due to the significant labor costs inherent to saffron production, saffron is the world’s most expensive spice. Not only are saffron profits competitive with opium, in relation to other licit crops, but saffron needs little water during growth, requires minimal refinement, and has a low volume and weight, making it easily transportable.

Human Terrain System Report: Salafist and Wahhabist Influence in Afghanistan

Afghanistan is in many ways an unlikely home for radical Islamic ideologies. Afghan religious life until the 1950s was, and in many places still is, traditional, conservative, rural, and mystical. Just as Afghanistan was politically and ethnically highly fragmented, religious life has also varied tremendously depending on region, ethno-linguistic group, and degree of urbanization.

(U//FOUO) DHS Independence Day 2010 Awareness Note

(U//FOUO) The Homeland Infrastructure Threat and Risk Analysis Center (HITRAC) produces Infrastructure Protection Notes to provide information on risks impacting the critical infrastructure community including terrorist threats, natural hazards, and other events. This IP Note is a joint publication of the DHS Office of Intelligence and Analysis (I&A) Homeland Counterterrorism Division and the Office of Infrastructure Protection (IP), and is designed to
promote security awareness and to identify actions that the critical infrastructure community can take to mitigate risks to the Nation’s critical infrastructure. As an update to the 26 May 2010 IP Note: Preparing for an Evolving Terrorist Threat, this IP Note serves as a reminder for the critical infrastructure community to remain vigilant during the 4 July 2010 Independence Day holiday.

DHS National Information Exchange Model (NIEM) Overview

DHS and DOJ officials have announced a new partnership to provide leadership for enhanced development of the Global Justice XML Data Model as a base for the deployment of the National Information Exchange Model (NIEM). NIEM will provide enhanced capabilities for organizations to share data across federal, state, local and tribal lines. This paper gives an overview of the National Information Exchange Model (NIEM). It outlines the background, concepts, objectives and the development strategy for implementing NIEM.

(U//FOUO) Louisiana Fusion Center Fake Anti-Virus Malware Warning

Over the past few days, there has been an increase in computers infected with Fake spyware and anti-virus malware. These infestations produce a popup stating that your machine is infected with viruses and offer a way to remove them. The object of this software is to trick you into believing you have viruses that need to be removed. A scan will launch after you “click” anywhere on the message and will request payment for removal of the “viruses”.

U.S. Army Mechanisms of Afghan Insurgent Control and Local Governance

(U) Many students of insurgency and counterinsurgency attest to the importance of popular support to each side’s quest to achieve its objectives. Key aspects of popular support, including type (passive or active) and scope (limited or significant), are inarguably important in analyzing an insurgency. However, focusing solely or immediately on these aspects risks glossing over insurgent efforts to set conditions necessary to mobilize such support in the first place. Most notably, these conditions include the generation of compliance and the establishment and institutionalization of control.

(U//FOUO) DHS Warning on Pressure Cooker IEDs

(U//FOUO) Rudimentary improvised explosive devices (IEDs) using pressure cookers to contain the initiator, switch, and explosive charge (typically ammonium nitrate or RDX) frequently have been used in Afghanistan, India, Nepal, and Pakistan. Pressure cookers are common in these countries, and their presence probably would not seem out of place or suspicious to passersby or authorities. Because they are less common in the United States, the presence of a pressure cooker in an unusual location such as a building lobby or busy street corner should be treated as suspicious.

(U//FOUO) U.S. Air Force Vehicle Bomb Mitigation Guide

This guide presents reference material associated with planning and executing programs and operations for protecting Air Force personnel and assets against the threat of vehicle bombs – it is designed for use by a variety of key players, ranging from the Airman at the base gate to the Installation Commander. As with all sound force protection efforts, this guide tackles the threat class using a multi-dimensional approach incorporating threat detection and loss mitigation.

(U//FOUO) U.S. Army SWEAT/Infrastructure Reconnaissance Book

Similar to the Red Book and Sand Book, the SWEAT Book is the Soldier’s reference for Infrastructure Reconnaissance. While the Red and Sand Books focus on different regions, the SWEAT Book focuses on the subject regardless of the part of the world the Soldier may be located. The SWEAT Book is the continuation of the hard work of many organizations to include the National Training Center (the Sidewinders), countless MTOE units, the U.S. Army Engineer School, the Engineer Research and Development Center – (CERL), the U.S. Military Academy, etc. The efforts of all those involved has led to the continued progress towards solving this gap in our capabilities. Future work to be expected includes continued feedback from units supporting missions in OEF/OIF, and U.S.M.A.’s research on an infrastructure assessment methodology. The SWEAT Book will be updated accordingly.

DHS Cybersecurity Research Roadmap

Global-scale identity management concerns identifying and authenticating entities such as people, hardware devices, distributed sensors and actuators, and software applications when accessing critical information technology (IT) systems from anywhere. The term global-scale is intended to emphasize the pervasive nature of identities and implies the existence of identities in federated systems that may be beyond the control of any single organization. This does not imply universal access or a single identity for all purposes, which would be inherently dangerous. In this context, global-scale identity management encompasses the establishment of identities, management of credentials, oversight and accountability, scalable revocation, establishment and enforcement of relevant policies, and resolution of potential conflicts. To whatever extent it can be automated, it must be administratively manageable and psychologically acceptable to users. It must, of course, also be embedded in trustworthy systems and be integrally related to authentication mechanisms and authorization systems, such as access controls. It also necessarily involves the trustworthy binding of identities and credentials. It is much broader than just identifying known individuals. It must scale to enormous numbers of users, computer systems, hardware platforms and components, computer programs and processes, and other entities.