A 2011 version of the International Security Assistance Force Afghan Ministry of Interior (MoI) Advisor Guide.
Improvised incendiary devices (IIDs) typically are less expensive to make than improvised explosive devices but still are capable of creating mass casualties and causing widespread fear and panic. Improvised incendiary devices (IIDs) can be constructed easily from everyday materials available at hardware and grocery stores. IIDs can be used against many types of infrastructure targets; violent extremists have used them successfully in attacks in the United States and overseas.
(U//FOUO) Joint Center for International Security Force Assistance Ministerial-Level Advisor Training Effectiveness Study
The intent of Phase I initial impressions is to provide rapid support to the Warfighter. In parallel, these insights serve as part of a broader Ministerial-Level Advisor Training Effectiveness Study, which JCISFA will publish in the spring of 2011. These observations and insights may support planning and decision-making within the NTM-A/CSTC-A as well as joint, interagency, intergovernmental, multinational (JIIM) organizations responsible for force generation supporting the NTM-A/CSTC-A mission. Specifically, this report addresses contemporary issues and senior leader perspectives within the NTM-A/CSTC-A Ministerial-Level Advisor program to include prospective gaps across joint DOTMLPF-P domains. The following illustrates the NTM-A/CSTC-A mission.
A contract solicitation posted to the Federal Business Opportunities website between February 10 – 24, 2012 concerning the construction of a temporary camp anywhere in the continental United States (CONUS) within 72 hours in a disaster-impacted area or “any other situation where FEMA or an agency working through FEMA needs a RSC” to host up to 2,000 responders and emergency staff as well as displaced citizens.
Tattoos are useful indicators to identify individuals who are members of a gang or a criminal organization. It is important to note that an image may have several different, occasionally innocuous, meanings, depending on the interpretation of the individual or gangs using it. The Organized Crime Section (OCS) is providing the following tattoos and their definitions as a tool to assist officers in detecting gang members or members of a criminal organization. It is important that Border Services Officers contact their Regional Intelligence Officers to assist in determining a subject’s admissibility to Canada.
What information from its most recent gang threat assessment does the FBI want to keep only for the eyes of law enforcement? Thanks to the publication of the full “law enforcement sensitive” version of the assessment on the website of the California Gang Investigator’s Association, we now know the answer to that question. The full version of the document contains approximately twenty additional pages of information regarding gang threats across the U.S. including details on the incredible proliferation of Mexican drug trafficking organizations. Most of the content derived from non-public reporting sources, such as FBI field reports, concerns specific incidents that are described more generally in the public version of the document. There are also some rather startling statistics omitted from the public version. For example, the fact that 36% of law enforcement report that gangs in their jurisdiction have ties to Mexican criminal gangs and drug trafficking organizations is omitted from the public version of the report.
Gang members armed with high-powered weapons and knowledge and expertise acquired from employment in law enforcement, corrections, or the military will likely pose an increasing nationwide threat, as they employ these tactics and weapons against law enforcement officials, rival gang members, and civilians. Associates, friends, and family members of gangs will continue to play a pivotal role in the infiltration and acquisition of sensitive information.
The National ICT R&D Fund invites proposals from academia/research institutions, companies, organizations for the development, deployment and operation of a national level URL Filtering and Blocking System. Institutions/organizations/companies desirous of developing, deploying and managing the proposed system are requested to submit their proposals to the ICT R&D Fund Islamabad by 1500 hrs on 2nd March, 2012 as per the prescribed format.
A manual for the Department of Homeland Security’s Media Monitoring Capability that was reportedly obtained by EPIC via a FOIA request. The manual has been slightly redacted by DHS to remove names and contact information and the URL of the Network Operations Center Media Monitoring Capability reporting website. This website has been listed in three of the four publicly available manuals as an example of a website monitored by DHS.
A manual for the California-based outsourcing company oDesk is used by “live content” moderators of Facebook to provide standards for monitoring photos and postings in accordance with Facebook’s abuse and inappropriate content provisions. The manual was originally provided to Gawker by a 21-year-old Moroccan man who says he was paid $1 dollar an hour to scan Facebook for illicit content.
Fully understanding the imperative to balance employment of fires to defeat the enemy with the necessity to protect civilian lives, the Marine Corps has modified the training / education of ground commanders, aviators, forward air controllers (FACs), joint terminal attack controllers (JTACs), and others in the fire support approval chain. This incorporates lessons and guidance contained in the USJFCOM investigation into the Farah incident and the Commander, International Security Assistance Force (COMISAF) tactical directive issued in July 2009.
The release of a toxic industrial chemical (TIC) by a terrorist group or lone actor represents a significant threat. TICs are readily available in large quantities, routinely shipped by commercial carriers, and often stored in bulk containers. Most TICs are generally less toxic than chemical warfare (CW) agents, but a large volume of TICs can be equally dangerous. The release of a TIC in a populated area is capable of generating numerous casualties and deaths; the toxic effects would be more dangerous if release occurred in an enclosed space.
A video taken by a friend of California artist Thomas Flournoy who was beaten by officers with the Santa Rosa Police Department during a violent arrest for obstructing officers following a local event. Sonoma County Deputy District Attorney Andrew Lukas has reportedly requested that a judge produce a court order to demand the removal of this video from YouTube. Lukas claims that the video depicts a “limited view” of the incident and could cause a bias among potential jurors. We have re-uploaded the video and and are making he original MP4 file available for download so that others may share the video as they wish.
Two reports from the U.S. TRADOC Intelligence Support Activity (TRISA) regarding suicide attacks in Pakistan and Afghanistan going back as far as 2007.
Like Damocles’ sword, this global interconnectivity both strengthens us and moderates us at the same time. We are strengthened because we are better connected to others than ever before and thus capable of spreading the seeds of liberty and opportunity to populations that yearn for it and where the lack of it is still being justified. We are moderated by this interconnectivity because others can more easily exploit the seams and turn our freedoms against us to infect with vitriolic propaganda that violently radicalizes populations across this interconnected web. It is the matter of moderation of our strength that brought together the remarkable group of thinkers whose words are reflected within this report. We are concerned here with the problem of deterring violent non-state actors from doing harm to our nation and to our allies. The questions of extending freedom through access while mitigating the misuse of that freedom to harm us were the dominant questions we took up in this workshop.
An unnamed representative of the Bureau of Alcohol Tobacco Firearms and Explosives has requested the removal of a document from this website. The document in question was published more than 2 years ago in January 2010 when this website was less than six months old. The document is effectively one page in length, with a cover and an information page listing a phone number and contact information. The one page of content in the document describes an incident in September 2008 when a quantity of “Magnum Ultra” explosive detonator material from a supply store in Concord, North Carolina.
The Office of Infrastructure Protection (IP) Homeland Infrastructure Threat and Risk Analysis Center (HITRAC) produces Infrastructure Protection Notes to address issues impacting the infrastructure protection community’s risk environment from terrorist threats and attacks, natural hazards, and other events. Based on the analysis within the DHS Office of Intelligence and Analysis product Evolution of the Terrorist Threat to the United States this IP Note outlines the evolution of terrorist threats and impacts to the Nation’s critical infrastructure.
Criminal complaint against Amine El Khalifi, a Moroccan man accused of attempting to bomb the U.S. Capitol building. The complaint was filed February 17, 2012.
The Shadow TUAS extends the ARS Commander’s ability to support the full spectrum of conflict through reconnaissance, security, aerial surveillance, communications relay, and laser designation.
(U//FOUO) DHS Mass Transit and Passenger Railroad Systems Terrorist Attack Preparedness Info Regarding a Realistic Threat
Terrorist attack tactics used against mass transit and passenger railroad systems abroad provide insights that can assist law enforcement officers in securing these critical infrastructure assets. The chart below highlights common tactics noted in attempted or successful use of explosive or incendiary devices against mass transit or passenger railroad systems in attacks conducted between March 2004 and November 2009. The information about these attacks provides insights into device type, selection, and construction and can help law enforcement identify patterns and develop protective measures. Analysis shows terrorists have timed attacks during periods of peak ridership; used multiple, coordinated, drop-and-leave devices in identical or similar baggage; and placed devices inside rail cars to cause casualties among passengers.
The following interactive map was compiled from information reported by the Bureau for Investigative Journalism. It displays the names and locations of airfields/bases inside of Pakistan that have been or are currently being used by U.S. forces. Some of the…
United Nations Assistance Mission in Afghanistan (UNAMA) Protection of Civilians in Armed Conflict 2011 Annual Report
A decade after it began, the armed conflict in Afghanistan again incurred a greater human cost in 2011 than in previous years. The United Nations Assistance Mission in Afghanistan (UNAMA) documented 3,021 civilian deaths in 2011, an increase of eight percent over 2010 (2,790 civilian deaths) and a 25 percent increase from 2009 (2,412 civilian deaths). In 2012, UNAMA re-asserts the imperative for all parties to the conflict – Anti-Government Elements, and Afghan national and international military forces – to increase their commitment and efforts to protect civilians, and to comply fully with their legal obligations to minimize loss of life and injury among civilians.
Social media are web-based and mobile technologies that turn communication into an interactive dialogue in a variety of online fora. It may be appropriate for the government, including DHS, to use social media for a variety of reasons. The President has challenged his Administration to use technology and tools to create a more efficient, effective, and transparent government1. DHS recognizes that the use of social media by government actors must occur with appropriate privacy, civil rights, and civil liberties protections; whether DHS is disclosing its informationand press releases via social media platforms like Twitter and Facebook, reviewing news feeds for situational awareness, or researching identified, discrete targets for legitimate investigatory purposes. Accordingly, DHS has created Department-wide standards designed to protect privacy, civil rights, and civil liberties in each category of its use.
With the continuing growth in the world’s urban areas and increasing population concentrations in urban areas, the probability that the US Army will conduct full spectrum operations in urban environments is ever more likely. As urbanization has changed the demographic landscape, potential enemies recognize the inherent danger and complexity of this environment to the attacker, and may view it as their best chance to negate the technological and firepower advantages of modernized opponents. Given the global population trends and the likely strategies and tactics of future threats, Army forces will likely conduct operations in, around, and over urban areas—not as a matter of fate, but as a deliberate choice linked to national security objectives and strategy. Stability operations––where keeping the social structure, economic structure, and political support institutions intact and functioning or having to almost simultaneously provide the services associated with those structures and institutions is the primary mission––may dominate urban operations. This requires specific and timely intelligence support, placing a tremendous demand on the Intelligence warfighting functions for operations, short-term planning, and long-term planning.