(U//FOUO) National Counterterrorism Center Advisory: Homegrown Violent Extremists Targeting Law-Enforcement Officers
Some homegrown violent extremists (HVE) have targeted US law-enforcement entities and have used publicly available information to counter these entities’ CT tactics and security practices. Law-enforcement entities are being identified by these extremists as both strategic targets and targets of opportunity, mainly because a core element of HVE subculture perceives that persecution by US law enforcement reflects the West’s inherent aggression toward Islam, which reinforces the violent opposition by HVEs to law enforcement.
The problem of civilian casualties in Afghanistan has presented substantial tactical difficulties for coalition forces according to a recent U.S. Army handbook. Produced by the Center for Army Lessons Learned (CALL) and released to soldiers on a restricted basis in June, the handbook presents best practices for reducing civilian casualties (CIVCAS) and offers strategies for mitigating negative effects from casualties among local populations.
The U.S. military has long been committed to upholding the law of armed conflict and minimizing collateral damage. This includes the killing or wounding of noncombatant civilians — described in this handbook as civilian casualties or CIVCAS — as well as damage to facilities, equipment, or other property. Due to several factors, the impact of CIVCAS has increased to the point that single tactical actions can have strategic consequences and limit overall freedom of action. These factors include: the increased transparency of war, where tactical actions can be recorded and transmitted worldwide in real time; increased expectations for the United States’ conduct of war in light of improved precision and overall capabilities; and the enemy exploitation of CIVCAS to undermine U.S. legitimacy and objectives.
Last month, Cryptome quietly posted a 2007 draft of the Federal Bureau of Investigation’s vision statement for the Domestic Communications Assistance Center (DCAC). The document, which has received no media attention, offers the most in depth view yet of the DCAC and its functions. In May, CNET correspondent Declan McCullagh disclosed the existence of the DCAC, which he described as having a mandate “covering everything from trying to intercept and decode Skype conversations to building custom wiretap hardware or analyzing the gigabytes of data that a wireless provider or social network might turn over in response to a court order.” The vision statement obtained by Cryptome describes the general functions and organization of the DCAC as well as the FBI’s national electronic surveillance (ELSUR) strategy.
Despite the continuous counter-narcotics efforts of the international community and the Afghan government throughout the past decade, Agence France-Presse wrote in April 2012 that Afghanistan continues to be a major contributor to the global drug supply. Approximately 90% of the world’s opium, most of which is processed into heroin, originates in Afghan fields. While potential opium production in Afghanistan peaked in 2007, poppy cultivation has recently risen. For instance, the United Nations Office on Drugs and Crime (UNODC) marked a 61% increase in the potential opium production between 2010 and 2011. A separate UNODC report from 2010 states that drugs and bribes are equivalent to approximately a quarter of Afghanistan’s gross domestic product (GDP).
The aim of reintegration is to stabilize local areas by convincing insurgents, their leaders and their supporters to cease active and/or passive support for the insurgency and to become peaceful members of Afghan society. Reintegration will supplement the continuing lethal and non-lethal activities that form a part of counterinsurgency operations. Reintegration will complement efforts to support political, governance, social and economic opportunity within communities. U.S. support for the Afghan Reintegration Programs must be attuned to Afghan culture.
With internet traffic growing exponentially, attacks on government and commercial computers by cyber terrorists and rogue states have escalated. Those wishing harm have espionage programs targeting the data systems used by the United States and allies. Drug traffickers and weapons dealers use the internet with encrypted communications. To counter these activities, the National Security Agency, an agency of the U.S. government, is building a fortified data center deep inside a mountain in Utah. This complex will house the world’s most sophisticated supercomputers dedicated to code breaking and data traffic analysis. Another site will eventually take delivery of the latest Cray supercomputer called Cascade to support the NSA’s need to crack codes faster to protect the nation and its allies.
A map of Department of Homeland Security protective security advisors (PSA) around the country from March 2012.
U.S. Central Command (CENTCOM) Joint Theater Support Contracting Command ethics training presentation from May 2012.
This document covers a particular course of action that is a subset of tactical operations and is conducted primarily during the stabilization phase in order to restore security: counterinsurgency (COIN). It has been developed in order to compensate for the lack of appropriate tactical procedures adapted from classical coercive methods (offensive or defensive) and the control of secured areas.
Field Manual (FM) 3-11.20 provides doctrine for planning and conducting technical escort (TE) operations from August 2007.
Several Louisiana State Analytical & Fusion Exchange (LA-SAFE) Hurricane Isaac situational reports dated August 29 – 30, 2012.
Rapid advances in technology have led to the development and increased use of unmanned aircraft. That technology is now making its way into the hands of law enforcement officers nationwide. We also live in a culture that is extremely sensitive to the idea of preventing unnecessary government intrusion into any facet of our lives. Personal rights are cherished and legally protected by the Constitution. Despite their proven effectiveness, concerns about privacy threaten to overshadow the benefits this technology promises to bring to public safety. From enhanced officer safety by exposing unseen dangers, to finding those most vulnerable who may have wandered away from their caregivers, the potential benefits are irrefutable. However, privacy concerns are an issue that must be dealt with effectively if a law enforcement agency expects the public to support the use of UA by their police.
The ISE is a partnership for responsible sharing of terrorism-related information between the law enforcement, public safety, defense, intelligence, homeland security, and diplomatic communities. It extends to all levels of government – federal, state, local, tribal, and territorial; and incorporates private sector partners and international allies.
DHS National Operations Center Operations Counterterrorism Desk (NCOD) Database Privacy Impact Assessment
The National Operations Center (NOC), within the Office of Operations Coordination and Planning (OPS), operates the NOC Counterterrorism Operations Desk (NCOD) and serves as the primary DHS point of contact to streamline counterterrorism Requests for Information (RFIs). The NCOD Database is a tracking tool used by NCOD Officers to track all counterterrorism related incoming and outgoing inquiries. OPS has conducted this Privacy Impact Assessment (PIA) because the NCOD Database contains personally identifiable information (PII).
Law enforcement agencies around the U.S. are obtaining record amounts of surplus military equipment through the Department of Defense’s Law Enforcement Support Office (LESO). Nearly half-a-billion dollars of equipment has already been provided to law enforcement agencies in the first three quarters of 2012, making this year’s transfer of property set to be the largest in the history of the LESO program.
Afghanistan presents a unique challenge to U.S. Army forces in the geographical, cultural, economic, political, and security dimensions. Providing protection and security to a unique and diverse tribal population is an essential aspect of our counterinsurgency strategy. The proficiency, integrity, and loyalty of Afghan police forces are essential to accomplishing a secure environment and to sustaining success. The following articles cover a range of issues related to SFA and the training of Afghan national police and border police with the specific intent of establishing best practices and lessons learned. The collection should not be considered all-inclusive. This is an effort to capture relevant articles published in recent professional journals or maintained by the Center for Army Lessons Learned (CALL) and other joint archives to inform Soldiers about relevant observations, insights, and lessons and to provide a historical document for future reference.
This paper provides a comprehensive introduction to Afghanistan’s various police agencies, where their authority originates, how they are organized, and the stated purpose and responsibility of each. The paper does not include status or capability information on these agencies with the intent to preserve its utility as a long-lasting reference document. The reader should refer to the IJC IDC’s State of the ANSF and other available intelligence and open source products for current status and capability information on Afghan police agencies.
For a number of years, Congress has recognized that State and local law enforcement could benefit from access to excess and surplus personal Federal property and has passed legislation to make this property and equipment available. The largest generator of this property has been the U.S. Department of Defense (DoD). Although this source of property has passed its peak and the amount and variety of excess property will continue to decline over time, law enforcement agencies can still obtain high-quality, high-value property at little or no cost.
A copy of the model memorandum of agreement that the Defense Logistics Agency signs with states as part of their programs to transfer excess military property to civilian law enforcement agencies through the Law Enforcement Support Office (LESO).
An autonomous or federal Kurdistan within Syria — similar to that which exists in Iraq — is unlikely because of intra-Kurdish conflict and the opposition of Turkey and the Syrian National Council (SNC) — the main external Syrian opposition group.
DHS National Protection and Programs Directorate Protective Security Advisors and Special Event Domestic Incident Tracker Overview presented at the FEMA National Preparedness Symposium on August 8, 2012.
The purpose of this special edition is to provide a practical reference guide for individuals and units to use in preparation for missions as trainers and advisors to foreign military units. The publication includes tactics, techniques, and procedures successfully used by both United States Army special operations forces (SOF) and conventional forces in conducting foreign military training (FMT). The final section of the special edition is an explanation of the security assistance process and includes the organizations involved in planning and resourcing foreign training missions and their respective responsibilities.