Despite the continuous counter-narcotics efforts of the international community and the Afghan government throughout the past decade, Agence France-Presse wrote in April 2012 that Afghanistan continues to be a major contributor to the global drug supply. Approximately 90% of the world’s opium, most of which is processed into heroin, originates in Afghan fields. While potential opium production in Afghanistan peaked in 2007, poppy cultivation has recently risen. For instance, the United Nations Office on Drugs and Crime (UNODC) marked a 61% increase in the potential opium production between 2010 and 2011. A separate UNODC report from 2010 states that drugs and bribes are equivalent to approximately a quarter of Afghanistan’s gross domestic product (GDP).
The aim of reintegration is to stabilize local areas by convincing insurgents, their leaders and their supporters to cease active and/or passive support for the insurgency and to become peaceful members of Afghan society. Reintegration will supplement the continuing lethal and non-lethal activities that form a part of counterinsurgency operations. Reintegration will complement efforts to support political, governance, social and economic opportunity within communities. U.S. support for the Afghan Reintegration Programs must be attuned to Afghan culture.
With internet traffic growing exponentially, attacks on government and commercial computers by cyber terrorists and rogue states have escalated. Those wishing harm have espionage programs targeting the data systems used by the United States and allies. Drug traffickers and weapons dealers use the internet with encrypted communications. To counter these activities, the National Security Agency, an agency of the U.S. government, is building a fortified data center deep inside a mountain in Utah. This complex will house the world’s most sophisticated supercomputers dedicated to code breaking and data traffic analysis. Another site will eventually take delivery of the latest Cray supercomputer called Cascade to support the NSA’s need to crack codes faster to protect the nation and its allies.
A map of Department of Homeland Security protective security advisors (PSA) around the country from March 2012.
U.S. Central Command (CENTCOM) Joint Theater Support Contracting Command ethics training presentation from May 2012.
This document covers a particular course of action that is a subset of tactical operations and is conducted primarily during the stabilization phase in order to restore security: counterinsurgency (COIN). It has been developed in order to compensate for the lack of appropriate tactical procedures adapted from classical coercive methods (offensive or defensive) and the control of secured areas.
Field Manual (FM) 3-11.20 provides doctrine for planning and conducting technical escort (TE) operations from August 2007.
Several Louisiana State Analytical & Fusion Exchange (LA-SAFE) Hurricane Isaac situational reports dated August 29 – 30, 2012.
Rapid advances in technology have led to the development and increased use of unmanned aircraft. That technology is now making its way into the hands of law enforcement officers nationwide. We also live in a culture that is extremely sensitive to the idea of preventing unnecessary government intrusion into any facet of our lives. Personal rights are cherished and legally protected by the Constitution. Despite their proven effectiveness, concerns about privacy threaten to overshadow the benefits this technology promises to bring to public safety. From enhanced officer safety by exposing unseen dangers, to finding those most vulnerable who may have wandered away from their caregivers, the potential benefits are irrefutable. However, privacy concerns are an issue that must be dealt with effectively if a law enforcement agency expects the public to support the use of UA by their police.
The ISE is a partnership for responsible sharing of terrorism-related information between the law enforcement, public safety, defense, intelligence, homeland security, and diplomatic communities. It extends to all levels of government – federal, state, local, tribal, and territorial; and incorporates private sector partners and international allies.
DHS National Operations Center Operations Counterterrorism Desk (NCOD) Database Privacy Impact Assessment
The National Operations Center (NOC), within the Office of Operations Coordination and Planning (OPS), operates the NOC Counterterrorism Operations Desk (NCOD) and serves as the primary DHS point of contact to streamline counterterrorism Requests for Information (RFIs). The NCOD Database is a tracking tool used by NCOD Officers to track all counterterrorism related incoming and outgoing inquiries. OPS has conducted this Privacy Impact Assessment (PIA) because the NCOD Database contains personally identifiable information (PII).
Law enforcement agencies around the U.S. are obtaining record amounts of surplus military equipment through the Department of Defense’s Law Enforcement Support Office (LESO). Nearly half-a-billion dollars of equipment has already been provided to law enforcement agencies in the first three quarters of 2012, making this year’s transfer of property set to be the largest in the history of the LESO program.
Afghanistan presents a unique challenge to U.S. Army forces in the geographical, cultural, economic, political, and security dimensions. Providing protection and security to a unique and diverse tribal population is an essential aspect of our counterinsurgency strategy. The proficiency, integrity, and loyalty of Afghan police forces are essential to accomplishing a secure environment and to sustaining success. The following articles cover a range of issues related to SFA and the training of Afghan national police and border police with the specific intent of establishing best practices and lessons learned. The collection should not be considered all-inclusive. This is an effort to capture relevant articles published in recent professional journals or maintained by the Center for Army Lessons Learned (CALL) and other joint archives to inform Soldiers about relevant observations, insights, and lessons and to provide a historical document for future reference.
This paper provides a comprehensive introduction to Afghanistan’s various police agencies, where their authority originates, how they are organized, and the stated purpose and responsibility of each. The paper does not include status or capability information on these agencies with the intent to preserve its utility as a long-lasting reference document. The reader should refer to the IJC IDC’s State of the ANSF and other available intelligence and open source products for current status and capability information on Afghan police agencies.
For a number of years, Congress has recognized that State and local law enforcement could benefit from access to excess and surplus personal Federal property and has passed legislation to make this property and equipment available. The largest generator of this property has been the U.S. Department of Defense (DoD). Although this source of property has passed its peak and the amount and variety of excess property will continue to decline over time, law enforcement agencies can still obtain high-quality, high-value property at little or no cost.
A copy of the model memorandum of agreement that the Defense Logistics Agency signs with states as part of their programs to transfer excess military property to civilian law enforcement agencies through the Law Enforcement Support Office (LESO).
An autonomous or federal Kurdistan within Syria — similar to that which exists in Iraq — is unlikely because of intra-Kurdish conflict and the opposition of Turkey and the Syrian National Council (SNC) — the main external Syrian opposition group.
DHS National Protection and Programs Directorate Protective Security Advisors and Special Event Domestic Incident Tracker Overview presented at the FEMA National Preparedness Symposium on August 8, 2012.
The purpose of this special edition is to provide a practical reference guide for individuals and units to use in preparation for missions as trainers and advisors to foreign military units. The publication includes tactics, techniques, and procedures successfully used by both United States Army special operations forces (SOF) and conventional forces in conducting foreign military training (FMT). The final section of the special edition is an explanation of the security assistance process and includes the organizations involved in planning and resourcing foreign training missions and their respective responsibilities.
From 28 Feb 06 to 18 Apr 06, a five-man Combat Arms Assessment Team from the 2-315th Field Artillery Transportation Support Battalion focused on collecting the most current security force convoy tactics, techniques, and procedures (TTP) in the Iraq Theater. The focus of this collection was convoy security force actions before, during, and after convoy operations including personal security detachment, escort of civilian vehicles (convoy security), and self escort of military convoys.
The Multi-National Corps–Iraq logistics staff and the Iraqi Security Forces (ISF) support operations cell, an element of the Iraqi Assistance Group, merged at the operational level to publish plans, policies, and procedures that met the strategic aims of the coalition forces, the national goals of the government of Iraq, and the joint campaign plan published by Multi-National Force–Iraq. Corps sustainment planners published operational objectives for execution at the operational and tactical levels in an effort to develop a sustainment-based system for the ISF. Based on experiences and observations over the past 18 months, the partners, advisors, and planners gathered the best practices for advising and assisting security forces at all levels of the sustainment system. This handbook presents partnering considerations in developing a fundamental base for a self-sustaining, host nation security force.
Field Manual (FM) 3-05.230, Special Forces Tactical Facilities, supports key United States (U.S.) Army Special Forces (SF) doctrine. An SF tactical facility (TACFAC) is defined as any secure urban or rural facility that enables Army special operations forces (ARSOF) to extend command and control (C2), provides support for operations, and allows operational elements to influence a specified area. SF TACFACs include a variety of secure locations for SF operations, including (but not limited to) firebases, camps, and team houses.
A recently discovered directive from Immigration and Customs Enforcement (ICE) details the policies behind Special Response Teams (SRT) which have been drawing attention in recent years for their large, militaristic armored vehicles and increasing involvement in law enforcement actions around the country. The directive was posted online in 2009 by a local chapter of the American Federation of Government Employees (AFGE), one of the the largest labor unions for federal employees.
When an ICE enforcement activity is determined to be of high risk or sensitive in nature. It may require the use of tactical capabilities beyond those of the typical ICE enforcement officer in order to ensure the safe and successful resolution of the action. Under these circumstances, Tactical Teams possessing specialized skills, specialized equipment and specialized training to meet these particular challenges may be required. The deployment of these teams can be viewed as the use of an elevated level of force. For these reasons, it is important for ICE to have processes and procedures for the establishment and operation of these teams, appropriate training and qualification standards for team members, and very specific reporting requirements through defined reporting channels, for team activities.