The purpose of this Roadmap is to articulate a vision and strategy for the continued development, production, test, training, operation, and sustainment of unmanned systems technology across DoD. This “Unmanned Systems Integrated Roadmap” establishes a technological vision for the next 25 years and outlines actions and technologies for DoD and industry to pursue to intelligently and affordably align with this vision.
Public Intelligence has obtained the most recent version of the U.S. Civil-Military Strategic Framework for Afghanistan, the second revision of the document dated August 2013, detailing the U.S. government’s goals and priorities for rebuilding Afghan society. Issued by the U.S. Ambassador to Afghanistan James Cunningham and signed by the commander of U.S. forces Joseph Dunford, the framework covers U.S. priorities related to governance, the rule of law, socioeconomic development as well as the gradual transfer of authority to the Afghan government. When compared with a previous version of the framework from March 2012, also obtained by Public Intelligence, the document solidifies the prospect of long-term U.S. involvement in Afghanistan, removing optimistic statements about turnover dates and self-sustaining funding estimates and replacing them with measured assessments reinforcing the notion that U.S. and international forces will be present in Afghanistan far into the next decade.
The U.S. Civil-Military Strategic Framework for Afghanistan outlines U.S. priorities through the Transformation Decade (2015-2024). It is meant to be adaptive, giving decision makers in Kabul and Washington, and policy implementers throughout Afghanistan, the flexibility needed to respond to changing conditions while advancing a set of commonly stated strategic goals and priorities.
It is to be expected that nations will continue to require assistance from other states and organizations in order to recover from natural disasters, conflict, or chronic societal problems. Such assistance ends as the host nation (HN) transitions back from a period of crisis to self-sufficiency and other actors transition out of their assumed roles and responsibilities. As the HN transitions back from a period of crisis to self-sufficiency, it will be faced with issues involving sovereignty, legitimacy, dependency, and social reform. Managing transitions at all levels requires close cooperation between the HN, other governments, militaries, and civil society. Although many of the lessons and best practices used in this guide are derived from Operation Iraqi Freedom and Operation New Dawn, the intent is to provide a guide that is flexible enough to be used for transition planning of a military campaign or crisis of any size or scope.
In the year since Sandy Hook, there have been a combined total of 22 actual school attacks and disrupted plots nationwide with some of the attacks resulting in the deaths of students and school personnel. The New Jersey Regional Operations Intelligence Center (ROIC) has examined recent reporting on the Sandy Hook attack and the incidents over the last year and provides the following analysis to law enforcement, school resource officers (SROs), and administrators to assist in school security planning efforts.
A total area of over 62,000 hectare of opium poppy cultivation took place in Lao People’s Democratic Republic (Lao PDR), Myanmar and Thailand in 2013. In order to assess the scope of opium poppy cultivation and opium production in the region, UNODC has been conducting opium surveys in cooperation with the Government of Lao PDR since 1992 and the Government of the Republic of the Union of Myanmar (GOUM) since 2002, while Thailand established its own monitoring system. This report contains the results of the 2013 UNODC-supported opium poppy cultivation surveys in Lao PDR and Myanmar. In addition, the results from the opium poppy surveys implemented by the Government of Thailand are presented in this regional overview.
In the wake of the disclosures surrounding PRISM and other US surveillance programmes, this study makes an assessment of the large-scale surveillance practices by a selection of EU member states: the UK, Sweden, France, Germany and the Netherlands. Given the large-scale nature of surveillance practices at stake, which represent a reconfiguration of traditional intelligence gathering, the study contends that an analysis of European surveillance programmes cannot be reduced to a question of balance between data protection versus national security, but has to be framed in terms of collective freedoms and democracy. It finds that four of the five EU member states selected for in-depth examination are engaging in some form of large-scale interception and surveillance of communication data, and identifies parallels and discrepancies between these programmes and the NSA-run operations. The study argues that these surveillance programmes do not stand outside the realm of EU intervention but can be engaged from an EU law perspective via (i) an understanding of national security in a democratic rule of law framework where fundamental human rights standards and judicial oversight constitute key standards; (ii) the risks presented to the internal security of the Union as a whole as well as the privacy of EU citizens as data owners, and (iii) the potential spillover into the activities and responsibilities of EU agencies. The study then presents a set of policy recommendations to the European Parliament.
A federal law passed in February 2012 to help middle class families by creating jobs and cutting payroll taxes included a section mandating the creation of a nationwide interoperable broadband communications system for law enforcement and first responders. The system, which is being created under the direction of the First Responder Network Authority (FirstNet), seeks to create a nationwide broadband network capable of being used for a variety of law enforcement purposes including remote surveillance, mobile biometric applications like field fingerprint scanning and facial recognition, as well as automated license plate reading. The system is currently in a pilot phase with less than a dozen locations around the country participating in the initial rollout of the FirstNet network. However, comments from FirstNet board members indicate that the future goals of the system include an interoperable network operating in all 56 states and territories of the U.S. that is capable of integration at the state, local and federal level.
The intent of this study is to identify and assess the technology effort required to bring the civil uses of RPVs to fruition and to determine whether or not the potential market is real and economically practical, the technologies are within reach, the operational problems are manageable, and the benefits are worth the cost.
Superstorm Sandy, a late-season post-tropical cyclone and the tenth storm of the 2012 Atlantic hurricane season, swept through the Caribbean and up the East Coast of the United States in late October 2012. The storm left 42 dead in New York State (NYS), thousands homeless and millions without power. Superstorm Sandy began as a tropical wave in the Caribbean on October 19, 2012. It quickly developed into a tropical depression and then a tropical storm in six hours. It quickly moved north, then turned northwest within the next week, making landfall on October 29, 2012 striking near Atlantic City, New Jersey with winds of 80 miles per hour. At one point, Superstorm Sandy’s hurricane force winds (74 mph) extended up to 175 miles from its center and tropical storm force winds (39 mph) out to 485 miles. A full moon made high tides 20 percent higher than normal, amplifying Superstorm Sandy’s storm surge.
Hundreds of emails from the City of Oakland relating to the construction of the City/Port of Oakland Joint Domain Awareness Center. The files were scanned from printouts held in a series of folders by the City of Oakland and were obtained via a public records request made by members of Occupy Oakland. The emails were the source material for a recent story in the East Bay Express by Darwin BondGraham stating that the City of Oakland had allowed the Domain Awareness Center’s prime contractor Science Applications International Corporation (SAIC) to perjure themselves by signing a disclosure form claiming that the company was in compliance with the city’s Nuclear Weapons Free Zone Ordinance which prohibits the city from doing business with contractors that are connected to the production or use of nuclear weapons. According to the article, SAIC has had a number of contracts relating to nuclear weapons for more than a decade, including a May 2013 U.S. Navy contact for “engineering services, testing, and integration for nuclear command control and communication (NC3) messaging systems.”
The mission of Psychological Operations is to influence the behavior of foreign target audiences (TAs) to support United States (U.S.) national objectives. Psychological Operations(PSYOP) are planned operations to convey selected information and indicators to foreign audiences to influence the emotions, motives, objective reasoning, and ultimately the behavior of foreign governments, organizations, groups, and individuals (JP 3-53, Joint Doctrine for Joint Psychological Operations). Behavioral change is at the root of the PSYOP mission. Although concerned with the mental process of foreign TAs, it is the observable modification of foreign TA behavior that determines the mission success of PSYOP. It is this link between influence and behavior that distinguished PSYOP from other capabilities and activities of information operations (IO) and related components such as public affairs.
This Soldier training publication (STP) is for Skill Levels 1 through 4 Soldiers holding the military occupational specialty (MOS) 37F, Psychological Operations Specialist. It contains standardized training objectives in the form of task summaries to train critical tasks that support unit missions. All Soldiers holding MOS 37F should have access to this publication. This publication applies to the Active Army, the Army National Guard (ARNG)/Army National Guard of the United States (ARNGUS), and the United States Army Reserve (USAR) unless otherwise stated.
One of the most serious threats facing New Jersey and the entire U.S. Homeland continues to be that of the active shooter, regardless of motivation, who by the very nature of their associated tactics, techniques, and procedures, pose a serious challenge to security personnel based on their ability to operate independently, making them extremely difficult to detect and disrupt before conducting an attack.
Bank of International Settlements, European Central Bank, International Monetary Fund, Organisation for Economic Co-operation and Development, World Bank
The shadow banking system can broadly be described as credit intermediation involving entities and activities outside the regular banking system. Intermediating credit through non-bank channels can have important advantages and contributes to the financing of the real economy, but such channels can also become a source of systemic risk, especially when they are structured to perform bank-like functions (e.g. maturity transformation and leverage) and when their interconnectedness with the regular banking system is strong. Therefore, appropriate monitoring of shadow banking helps to mitigate the build-up of such systemic risks. The FSB set out its approach for monitoring the global shadow banking system in its report to the G20 in October 2011. This report presents the results of the third annual monitoring exercise following this approach, using end-2012 data. The report includes data from 25 jurisdictions and the euro area as a whole, bringing the coverage of the monitoring exercise to about 80% of global GDP and 90% of global financial system assets.
The New Jersey Regional Operations Intelligence Center (NJ ROIC) provides the following updated analysis of mass shootings in the last year (December 2012 to October 2013) in order to provide law enforcement personnel, security managers and emergency personnel with identified commonalities and trends, as well as indicators of potential violence.
DHS National Incident Management System: Intelligence/Investigations Function Guidance and Field Operations Guide
This document includes guidance on how various disciplines can use and integrate the I/I Function while adhering to NIMS concepts and principles. It includes information intended for the NIMS practitioner (including the Incident Commander/Unified Command [IC/UC]) that assists in the placement of the I/I Function within the command structure; provides guidance that may be used while implementing the I/I Function; and has an accompanying Intelligence/ Investigations Function Field Operations Guide (I/I FFOG). While this document provides an example of the I/I Function at the Section level, the IC/UC has the final determination of the scope and placement of the I/I Function within the command structure. The guidance provided in this document is applicable for both domestic incidents that use conventional unclassified information (e.g., open source information, criminal histories, medical records, or educational records) and terrorism incidents where information is often classified and requires the use of national intelligence capabilities.
The purpose of this report is to identify the person or persons criminally responsible for the twenty-seven homicides that occurred in Newtown, Connecticut, on the morning of December 14, 2012, to determine what crimes were committed, and to indicate if there will be any state prosecutions as a result of the incident. Since December 14, 2012, the Connecticut State Police and the State’s Attorney’s Office have worked with the federal authorities sharing responsibilities for various aspects of this investigation. Numerous other municipal, state and federal agencies assisted in the investigation. The investigation materials reflect thousands of law enforcement and prosecutor hours. Apart from physical evidence, the materials consist of more than seven-hundred individual files that include reports, statements, interviews, videos, laboratory tests and results, photographs, diagrams, search warrants and returns, as well as evaluations of those items.
This report assesses opportunities, risks, and challenges attendant to future development and deployment of UAS within the National Airspace System (NAS) affecting UAS forecast growth from 2015 to 2035. Analysis of four key areas is performed: technology, mission needs, economics, and existing or anticipated challenges to routine use in NAS operations. Forecast effects of emerging technologies as well as anticipating new technological innovations in areas of airframes, powerplants, sensors, communication, command and control systems, and information technology and processing are evaluated. Anticipated mission needs include intelligence, surveillance and reconnaissance (ISR), as well as new areas such as stores delivery, cargo transport, search and rescue, and pilot augmentation; example business case models are developed for each of these areas. Challenges to routine UAS usage in the NAS include: absence of legislation and regulations for safe flight in integrated airspace; pilot training and certification; regulatory, policy, and procedural issues; social issues, such as privacy and nuisance concerns; environmental issues, such as noise and emissions; and safety.
San Francisco Bay Area Regional Interoperable Communications Systems Authority (BayRICS) Facial Recognition Presentation
A presentation presenting an overview of the Bay Area Regional Interoperable Communications System Authority (BayRICS), a 13-member Joint Powers Authority (JPA) serving the San Francisco Bay Area, established in August 2011. The presentation lists license plate readers, facial recognition and field fingerprint scanning as potential uses of the BayRICS network.
This Note describes a new combination of tactics by cyber criminals that disrupts telephone systems of targeted organizations. This information is provided to assist and inform the Department and federal, state, local, territorial, tribal, and private sector partners in mitigation efforts regarding criminal activity that could affect their operations.
(U//FOUO) DHS National Cybersecurity and Communications Integration Center (NCCIC) Capabilities Guide
The National Cybersecurity and Communications Integration Center (NCCIC) Resource and Capabilities Guide is intended to enhance cross-sector cyber security efforts and collaboration by better informing our cybersecurity and communications partners of the NCCIC’s tools, assets, and collaboration mechanisms offered. This guide also identifies the Center’s resources and capabilities as well as describes the processes for accessing NCCIC information portals and products, incident reporting systems, and relevant point of contact information for our community of partners.