U.S. Army Irregular Opposing Forces Manual

Irregular forces are armed individuals or groups who are not members of the regular armed forces, police, or other internal security forces (JP 3-24). The distinction of being armed as an individual or group can include a wide range of people who can be categorized correctly or incorrectly as irregular forces. Excluding members of regular armed forces, police, or internal security forces from being considered irregular forces may appear to add some clarity. However, such exclusion is inappropriate when a soldier of a regular armed force, policeman, or internal security force member is concurrently operating in support of insurgent, guerrilla, or criminal activities.

(U//FOUO) New Jersey Fusion Center Bulletin: Suspicious Activity Regarding the Electrical Grid in New Jersey

In the past year, the NJ Suspicious Activity Reporting System (NJ SARS) has received multiple reports of intrusions at electrical grid facilities in New Jersey. The NJ ROIC currently has no indication of any specific threats associated with these incidents, but provides this information for situational awareness and requests information on any similar, previously unreported incidents in New Jersey.

(U//FOUO) FBI Counterintelligence Vulnerability Assessment for Corporate America

To prevent foreign entities from achieving their goals, a Counterintelligence Program (CIP) proactively searches for and uses information from multiple sources. An effective CIP draws information from security programs and other internal systems, as well as from the U.S. Intelligence Community (USIC). Once this information is assembled, an effective CIP develops a coherent picture and crafts a strategy to prevent the foreign entity from successfully achieving its goals and minimizes the damage already done. An effective CIP conducts active analysis of available information, requires annual CI education for all employees, and provides a system for immediate referral of behavior with CI implications.

U.S. Navy Arctic Roadmap 2014-2030

This Roadmap outlines the Navy’s strategic approach for the Arctic Region and the ways and means to achieve the desired national end state. Resource constraints and competing near-term mission demands require that naval investments be informed, focused, and deliberate. Proactive planning today allows the Navy to prepare its forces for Arctic Region operations. This Roadmap emphasizes low-cost, long-lead activities that position the Navy to meet future demands. In the near to mid-term, the Navy will concentrate on improving operational capabilities, expertise, and capacity, extending reach, and will leverage interagency and international partners to achieve its strategic objectives. The Roadmap recognizes the need to guide investments by prudently balancing regional requirements with national goals.

(U//FOUO) DoD Strategy for Defense Critical Infrastructure

The United States currently faces a dynamic, flexible, and very pragmatic adversary. Due to the unconventional nature of the terrorist threat and the asymmetrical tactics demonstrated both at home and abroad by our enemies, we can no longer expect the protection formerly provided by the oceans bordering our coasts to serve as an effective deterrent to attack. The attacks of September 11, 2001, and other events demonstrated that an act of terrorism can cause worldwide infrastructure asset disruption. In the past decade, hurricanes or other violent storms have also revealed that our infrastructure assets are at risk from destruction, degradation, or disruption by natural events. Given scarce resources, this Strategy’s objectives must be balanced against other priorities outlined in the National Defense Strategy.

DoD Instruction: The Use of the National Guard for Defense Support of Civil Authorities

This instruction establishes policy, assigns responsibilities, and provides procedures for the use of the National Guard for Defense Support of Civil Authorities (DSCA) in accordance with the authority in section 502(f) of Title 32, United States Code (U.S.C.) (Reference (a)), DoD Directive (DoDD) 5111.1 (Reference (b)), and Deputy Secretary of Defense Memorandum (Reference (c)); the responsibilities and functions in accordance with DoDD 5111.13 (Reference (d)); and the guidance in DoDD 3025.18 (Reference (e)).

Oakland Domain Awareness Center Draft Privacy and Data Retention Policy

The Joint City-Port Domain Awareness Center (interchangeably referred to in this document as “Joint City-Port Domain Awareness Center”, “Domain Awareness Center,” or “DAC”) was first proposed to the City Council’s Public Safety Committee on June 18, 2009, in an information report regarding the City of Oakland partnering with the Port of Oakland to apply for Port Security Grant funding under the American Recovery and Reinvestment Act, 2009. Under this grant program, funding was available for Maritime Domain Awareness (MDA) projects relative to “maritime” or “waterside”. The Port and City were encouraged to consider the development of a joint City Port Domain Awareness Center. The joint DAC would create a center that would bring together the technology, systems and processes that would provide for an effective understanding of anything associated with the City of Oakland boundaries as well as the Oakland maritime operations that could impact the security, safety, economy or environment.

(U//FOUO) DHS Infrastructure Protection Report: Higher Education Institutions

The higher education community in the United States consists of more than 11,000 higher education institutions that collectively serve more than 17 million students, employ more than 3.4 million faculty and staff, and have combined budgets approaching $360 billion. Higher education institutions range in size from small institutions with fewer than 100 students to large universities with tens of thousands of students and faculty occupying campuses the size of a small town or city. Institution grounds are generally open-access, with varying levels of security within the campus.

(U//FOUO) Joint Center for International Security Force Assistance Guide: Roles and Functions of Senior Advisors

When advising and assisting partner nation security ministries and their institutions, the U.S. Department of Defense (DoD) leverages the knowledge, skills, and abilities (KSA) from a combination of senior uniformed and civilian personnel, to include contractors to carryout development in a broad range of partner nation ministries and institutional requirements.

U.S. Army Cyber Electromagnetic Activities (CEMA) Manual

FM 3-38, Cyber Electromagnetic Activities, provides overarching doctrinal guidance and direction for conducting cyber electromagnetic activities (CEMA). This manual describes the importance of cyberspace and the electromagnetic spectrum (EMS) to Army forces and provides the tactics and procedures commanders and staffs use in planning, integrating, and synchronizing CEMA. This manual provides the information necessary for Army forces to conduct CEMA that enable them to shape their operational environment and conduct unified land operations. It provides enough guidance for commanders and their staffs to develop innovative approaches to seize, retain, and exploit advantages throughout an operational environment. CEMA enable the Army to achieve desired effects in support of the commander’s objectives and intent.

(U//FOUO) DHS-FBI-NCTC Bulletin: Building Security Measures May Hinder Emergency Response Efforts

Facility security measures, such as interior control points or exterior barriers, may require first responders to adjust normal protocols and procedures to operate rapidly during emergencies. The timeline below is an overview of attacks and plots against US-based facilities with varying levels of security. The diversity of tactics and targets used underscores the need for interagency exercises and training that incorporates multiple scenarios to account for building security measures likely to be encountered.

Information Sharing Environment Strategic Implementation Plan for the National Strategy for Information Sharing and Safeguarding

In December 2012 the President signed the National Strategy for Information Sharing and Safeguarding (Strategy) which is anchored on the 2010 National Security Strategy and builds upon the 2007 National Strategy for Information Sharing. The Strategy provides guidance for more effective integration and implementation of policies, processes, standards, and technologies to promote secure and responsible national security information sharing. This document provides a higher-level overview of a longer, more detailed implementation plan for the Strategy, and is intended to assist in briefing senior policy makers on plans, progress, and performance related to achieving the vision of the NSISS.

(U//FOUO) DHS-FBI-NCTC Bulletin: Extortion Schemes Use Telephony-Based Denial-of-Service Attacks

Since at least January 2012, criminals are using telephony-based denial-of-service (TDoS) combined with extortion scams to phone an employee’s office and demand the employee repay an alleged loan. If the victim does not comply, the criminals initiate TDoS attacks against the employer’s phone numbers. TDoS uses automated calling programs—similar to those used by telemarketers—to prevent victims from making or receiving calls.

(U//FOUO) Kansas Intelligence Fusion Center Nairobi Westgate Mall Attack Lessons Learned

On Saturday, September 21, 2013, members of Al Shabaab, a Somali based Islamic terrorist organization affiliated with the international Al Qaeda network, executed a complex terrorist attack on an upscale shopping mall in Nairobi, Kenya. The attackers simultaneously entered the mall from two different entrances, shooting shoppers with assault rifles and throwing hand grenades. The terrorists remained in the mall, engaging government security forces for the next four days, resulting in a major fire and partial collapse of the mall. The Kenyan government has officially reported 72 deaths and more than 200 injured as a result of the attack. A significant number of those killed and injured were foreign citizens, including 6 U.S. citizens who were injured in the attack.

U.N. Assistance Mission in Afghanistan (UNAMA) Protection of Civilians in Armed Conflict 2013 Annual Report

Armed conflict in Afghanistan took an unrelenting toll on Afghan civilians in 2013. The United Nations Assistance Mission in Afghanistan (UNAMA) documented 8,615 civilian casualties (2,959 civilian deaths and 5,656 injured) in 2013, marking a seven percent increase in deaths, 17 percent increase in injured, and a 14 percent increase in total civilian casualties compared to 2012.

Google Inferring Events Based on Mob Source Video Patent

Methods and systems are disclosed for inferring that an event of interest (e.g., a public gathering, a performance, an accident, etc.) has likely occurred. In particular, when there are at least a given number of video clips with similar timestamps and geolocation stamps uploaded to a repository, it is inferred that an event of interest has likely occurred, and a notification signal is transmitted (e.g., to a law enforcement agency, to a news organization, to a publisher of a periodical, to a public blog, etc.).

(U//LES) Virginia Fusion Center Bulletin: TOR, Bitcoins, Silk Road and the Hidden Internet

The purpose of this bulletin is to provide awareness and a basic understanding of the “Hidden Internet” to investigators in the field, as well as provide some examples of how the Hidden Internet can be exploited by criminal elements. While the term “Hidden Internet” can be used in a broader context and refer to other internet terms such as the “Deep Web” or “Deepnet,” for the purpose of this bulletin the term “Hidden Internet” will refer to the hidden services provided by the TOR project to internet users, specifically relating to the Silk road website and use of Bitcoins.