Implements policy, assigns responsibilities, and prescribes procedures necessary to provide the essential structure and support to the U.S. Space Command (USCINCSPACE) for Computer Network Defense (CND) within Department of Defense information systems and computer networks.
A table describing Research in Motion/Blackberry requirements for disclosure of user data to law enforcement. The chart shows what legal process is required to request user data, the type of data each process can typically obtain and the legal authorities authorizing each form of request.
Restricted Joint Chiefs of Staff Manual: Exercises Impacting Global Positioning System (GPS) in U.S. and Canada
Department of Defense, Department of Homeland Security, Department of Justice, Federal Bureau of Investigation
A collection of Network Security Agreements (NSAs) entered into with foreign communications infrastructure providers ensuring U.S. government agencies the ability to access communications data when legally requested. The agreements range in date from 1999 to 2011 and involve a rotating group of government agencies including the Federal Bureau of Investigation (FBI), Department of Homeland Security (DHS), Department of Justice (DoJ), Department of Defense (DoD) and sometimes the Department of the Treasury. According to the Washington Post, the agreements require companies to maintain what amounts to an “internal corporate cell of American citizens with government clearances” ensuring that “when U.S. government agencies seek access to the massive amounts of data flowing through their networks, the companies have systems in place to provide it securely.”
Multidisciplinary, integrated, performance-based, mission survivability assessments to identify and quantify vulnerabilities in systems, networks, architectures, infrastructures, and assets that support DoD MEFs, PMEFs, or the NEFs they support, to assess the mission impact if the vulnerabilities were successfully exploited, and to recommend measures to remediate or mitigate the vulnerabilities.
Fireworks are a common component used in Improvised Explosive Devices (IEDs). The US Government is asking consumer fireworks retailers to be aware of this phenomenon and familiarize themselves with some possible indicators of suspicious activity. This list is not inclusive, nor is it intended to limit the lawful conduct of innocent persons. The totality of behavioral indicators and other relevant circumstances should be considered.
Recent incidents in the Homeland demonstrate that consumer fireworks—widely used during the upcoming 4 July 2013 celebrations—can be misused by criminals and violent extremists to construct improvised explosive devices (IEDs). Consumer fireworks are defined as devices that produce audible and visible effects by combustion, containing between 50-130 milligrams of explosive material. They are banned in Delaware, Massachusetts, New Jersey, and New York.
This study evaluates the oversight of national security and intelligence agencies by parliaments and specialised non-parliamentary oversight bodies, with a view to identifying good practices that can inform the European Parliament’s approach to strengthening the oversight of Europol, Eurojust, Frontex and, to a lesser extent, Sitcen. The study puts forward a series of detailed recommendations (including in the field of access to classified information) that are formulated on the basis of in-depth assessments of: (1) the current functions and powers of these four bodies; (2) existing arrangements for the oversight of these bodies by the European Parliament, the Joint Supervisory Bodies and national parliaments; and (3) the legal and institutional frameworks for parliamentary and specialised oversight of security and intelligence agencies in EU Member States and other major democracies.
A series of “limited release” directives from the Department of Defense and the Chairman of the Joint Chiefs of Staff including instructions, directives and manuals detailing DoD policy on a variety of topics from counterintelligence to the use of lasers in space.
This manual provides guidance to Joint Staff, Service (including Service intelligence centers and reserve components), Combatant Command (CCMD), and Combat Support Agency (CSA) personnel for conducting collaborative intelligence planning (IP) primarily in support of Combatant Commander (CCDR) campaign plans, contingency plans, and orders.
An investigation report concerning the crash of a RQ-4A Global Hawk unmanned aerial vehicle on June 11, 2012 during a training flight near the Naval Air Station Patuxent River in Maryland. The report concludes that the accident occurred due to ” mechanical malfunction of the right ruddervator actuator”. However, the pilot “failed to follow the proper emergency procedures” which “did not produce disastrous results in this particular event; however, future breaches of established procedures could produce a different outcome.”
This publication provides guidance for planning, executing, and assessing joint space operations. It provides space doctrine fundamentals for all joint forces; describes the military operational principles associated with support from, through, and operating in space; explains Joint Staff, combatant command (CCMD), United States Strategic Command (USSTRATCOM), and USSTRATCOM functional and Service component relationships and responsibilities; and establishes a framework for the employment of space forces and space capabilities.
Within DHS, this overarching responsibility for critical infrastructure protection is delegated to the National Protection and Programs Directorate’s (NPPD) Office of Infrastructure Protection (IP), specifically the Sector-Specific Agency Executive Management Office (SSA EMO) CF Branch for commercial facilities. Serving as the Sector-Specific Agency (SSA) for the CF Sector, the CF Branch works with its partners to address and highlight low-cost preparedness and risk management options in the products and tools it makes available to the private sector. For example, the CF SSA has been working to produce a suite of protective measures guides that provide an overview of best practices and protective measures designed to assist owners and operators in planning and managing security at their facilities or events. The Protective Measures Guide for the U.S. Outdoor Venues Industry is one of these guides and reflects the special considerations and challenges posed by the Outdoor Venues Subsector.
In accordance with (IAW) reference a, MISO replaces the term psychological operations (PSYOP). This instruction provides strategic direction for inclusion of MISO to support the full range of military operations including military engagement, security cooperation and deterrence; crisis response and limited contingency operations; major operations and campaigns; and as an integrated information activity within the DOD’s overall contribution to United States Government (USG) communication strategies.
DIB CS/IA is the DoD program to protect critical DoD unclassified program, technology, and operational information residing on, or transiting, DIB unclassified networks. DoD Components and industry participants collaborate to protect DoD information through the development, implementation, and execution of DoD and DIB processes and procedures.
Malicious actors may leverage the Internet to gain information against a potential target to support pre-operational planning efforts for kinetic or cyber attacks. Malicious actors can use Internet search engines for information such as maps, company photographs or blueprints, and gain additional details from social media sites and Web blogs. Some actors may use more sophisticated techniques—such as phishing, spear phishing, or actual penetration of an organization’s network or devices—which can be used to gather personal, sensitive, or proprietary data.