The 63rd Bilderberg conference is set to take place from 11 – 14 June 2015 in Telfs-Buchen, Austria. A total of around 140 participants from 22 countries have confirmed their attendance. As ever, a diverse group of political leaders and experts from industry, finance, academia and the media have been invited.
Al Qusayr, a village in Syria’s Homs district, is a traditional transit point for personnel and goods traveling across the Lebanon/Syria border. Located in the southern half of the Orontes valley known as the al Assi basin, its proximity to northern Lebanon has made this region an important logistical area for the rebel forces of the Free Syrian Army (FSA) and the Syrian Arab Army (SAA), in what has become known as the Homs front. A typical border region, the al Assi basin’s inhabitants are multinational as well as multi-ethnic with a complex makeup of Sunni, Shia, Alawi, and Christian religions that claim both Lebanese and Syrian Citizenship. Due to the proximity to the border region, and the main north and south highway from Homs to Damascus, al Qusayr is a pivotal point in the Syrian conflict for both the FSA and the pro-regime SAA.
This handbook provides basic reference information on South Korea, including its geography, history, government, military forces, and communications and transportation networks. This information is intended to familiarize military personnel with local customs and area knowledge to assist them during their assignment to South Korea.
This document identifies recommended actions and guidance for state and major urban area fusion centers (fusion centers) to integrate information technology, cybersecurity, and cybercrime1 prevention (cyber) intelligence and analytic capabilities. Development of these capabilities will inform local, state, and national detection, mitigation, response, recovery, investigation, and criminal prosecution activities that support and maintain the United States’ cybersecurity.
This handbook provides basic reference information on Japan, including its geography, history, government, military forces, and communications and transportation networks. This information is intended to familiarize military personnel with local customs and area knowledge to assist them during their assignment to Japan.
UN Human Rights Report: The Role of Encryption and Anonymity in Protecting Privacy and Freedom of Expression
In the present report, submitted in accordance with Human Rights Council resolution 25/2, the Special Rapporteur addresses the use of encryption and anonymity in digital communications. Drawing from research on international and national norms and jurisprudence, and the input of States and civil society, the report concludes that encryption and anonymity enable individuals to exercise their rights to freedom of opinion and expression in the digital age and, as such, deserve strong protection.
This Executive Summary provides a brief overview of the results of the Department of Justice (Department or DOJ) Office of the Inspector General’s (OIG) third review of the Federal Bureau of Investigation’s (FBI) use of the investigative authority granted by Section 215 of the Patriot Act. Section 215 is often referred to as the “business record” provision. The OIG’s first report, A Review of the Federal Bureau of Investigation’s Use of Section 215 Orders for Business Records, was issued in March 2007 and covered calendar years 2002 through 2005. The OIG’s second report, A Review of the FBI’s Use of Section 215 Orders for Business Records in 2006, was issued in March 2008 and covered calendar year 2006. This third review was initiated to examine the progress the Department and the FBI have made in addressing the OIG recommendations which were included in our second report. We also reviewed the FBI’s use of Section 215 authority in calendar years 2007, 2008, and 2009.
This Strategic Master Plan (SMP) translates the United States Air Force’s 30-year strategy, America’s Air Force: A Call to the Future, into comprehensive guidance, goals, and objectives. The complete SMP consists of a core narrative, goals, objectives. and four annexes: the Human Capital Annex (HCA), Strategic Posture Annex (SPA), Capabilities Annex (CA), and the Science and Technology Annex (STA). The core SMP will be updated every two years, while the annexes may be revised annually. as required. The SMP’s primary audience includes the Headquarters Air Force (HAF) staff, the Air Force Major Commands (MAJCOMs), and the Core Function Leads (CFLs) that reside within the MAJCOMs who are responsible for planning, progran1ming and budgeting. However, guidance in the SMP also serves as authoritative· direction for all Air Force programs and Flight Plans.
The Islamic State of Iraq and the Levant (ISIL) has risen to prominence as a danger to peace and a regional threat with global impact. This perception comes, in large measure, because of its successes in Syria and then a rapid takeover of northern Iraq. Its military victories are largely due to successful recruiting, intra-insurgent conflict, large cash reserves, and ineffective opponents. There is much to learn from how ISIL is fighting. The ready availability of recruits, many of whom are foreigners attracted to ISIL successes, and large amounts of money for payroll and purchasing war materiel are critical considerations, but it is also important to consider how ISIL is fighting on the ground.
The FBI is providing the following information with HIGH confidence: The FBI has obtained information regarding one or more groups of cyber actors who have compromised and stolen sensitive business information from US commercial and government networks through cyber espionage. Analysis indicates a significant amount of the computer network exploitation activities emanated from infrastructure located within China. Any activity related to these groups detected on a network should be considered an indication of a compromise requiring extensive mitigation and contact with law enforcement.
The FBI and TSA are currently analyzing claims in recent media reports which included statements that critical in-flight networks on commercial aircraft may be vulnerable to remote intrusion. At this time, the FBI and TSA have no information to support these claims but continue to leverage public and private sector partnerships to evaluate potential threats posed by intrusions into a commercial aircraft’s secure networks. The FBI and TSA also continuously monitor and analyze reporting on cyber and technical threats to proactively deter individuals from using remote intrusions to disrupt any portion of the aviation sector, including its business networks, critical navigation and air traffic control signals, and the onboard networks of commercial aircraft.
The Assessing Revolutionary and Insurgent Strategies (ARIS) series consists of a set of case studies and research conducted for the US Army Special Operations Command by the National Security Analysis Department of The Johns Hopkins University Applied Physics Laboratory. The purpose of the ARIS series is to produce a collection of academically rigorous yet operationally relevant research materials to develop and illustrate a common understanding of insurgency and revolution. This research, intended to form a bedrock body of knowledge for members of the Special Forces, will allow users to distill vast amounts of material from a wide array of campaigns and extract relevant lessons, thereby enabling the development of future doctrine, professional education, and training.
This handbook provides basic reference information on India, including its geography, history, government, military forces, and communications and transportation networks. This information is intended to familiarize military personnel with local customs and area knowledge to assist them during their assignment to India.
FM 3-18 is the principal manual for Special Forces (SF) doctrine. It describes SF roles, missions, capabilities, organization, mission command, employment, and sustainment operations across the range of military operations. This manual is a continuation of the doctrine established in the JP 3-05 series, ADP 3-05, ADRP 3-05, and FM 3-05.
Domestic rail shipments of crude oil grew from 9,500 train car loads in 2008 to 435,560 loads in 2013—an increase of nearly 4,500 percent. The growth in shipment volume has increased the threat of spills, explosions, and other effects associated with a train derailment or crash. Recent incidents in Lac Mégantic, Quebec, Lynchburg, Virginia, Mount Carbon, West Virginia, and Galena, Illinois demonstrate the consequences of crude by rail incidents on surrounding communities and natural environments.
The United Arab Emirates Cultural Field Guide is designed to provide deploying military personnel an overview of UAE’s cultural terrain. In this field guide, UAE’s cultural history has been synopsized to capture the more significant aspects of the country’s cultural environment, with emphasis on factors having the greatest potential to impact operations.
This handbook provides basic reference information on the United Arab Emirates, including its geography, history, government, military forces, and communications and transportation networks. This information is intended to familiarize military personnel with local customs and area knowledge to assist them during their assignment to the United Arab Emirates.
Any Internet-connected organization can fall prey to a disruptive network intrusion or costly cyber attack. A quick, effective response to cyber incidents can prove critical to minimizing the resulting harm and expediting recovery. The best time to plan such a response is now, before an incident occurs.
This handbook provides basic reference information on Egypt, including its geography, history, government, military forces, and communications and transportation networks. This information is intended to familiarize military personnel with local customs and area knowledge to assist them during their assignment to Egypt.