(U//FOUO) Civil Disturbance and Criminal Tactics of Protest Extremists

A manual attached to an email from the latest AntiSec release which has no listed author and little indications as to its source. The introduction states that information in the document “was collected and interpreted by multiple agencies” and the manual is intended for use only by “public safety agencies”. However, a 2003 article from a local newspaper in Colorado indicates that the manual was produced by an unknown U.S. Government agency and is used by Joint Terrorism Task Forces to teach local police about “criminal protest tactics”. According to an email in the most recent AntiSec release, the manual is still being circulated today in relation to police confrontations with Occupy protests.

(U//FOUO) DHS-FBI 2011 Holiday Terrorism Warning

This Joint Intelligence Bulletin provides law enforcement, public, and private sector safety officials with an evaluation of potential terrorist threats during the 2011 US holiday season, extending from Thanksgiving through New Year’s Day. This information is provided to support the activities of DHS and FBI and to assist federal, state, local, tribal and territorial government counterterrorism and first responder officials in deterring, preventing, preempting, or responding to terrorist attacks within the United States.

U.S. Army Guerrilla Hunter Killer Smartbook Version 9.5

To effectively defeat an enemy, one must first understand the enemy. Intelligence professionals have forgotten the basic principles on which intelligence analysis is conducted, instead they sub-scribe to the paradigm that the enemy faced in this Global War on Terror has no structure or doctrine. Any organization, military or civilian, must have a structure and a way of doing business if they are to have any chance of being successful.

Restricted U.S. Military Multi-Service Kill Box Employment Manual

The Kill Box MTTP reinforces kill boxes as three-dimensional areas used to facilitate the integration of joint fires while also being a permissive fire support coordination measure (FSCM) in accordance with JP 3-09, Joint Fire Support. The publication offers a detailed explanation of kill box employment and provides information to effectively organize, plan, and execute kill box procedures.

Raytheon Non-Lethal Acoustic Pressure Riot Shield Patent

A man-portable non-lethal pressure shield provides both a physical as well as pressure shield. The pressure shield addresses the concerns of military, police and human rights organizations and international law as regards effectiveness, efficiency and safety and efficiency. A folded acoustic horn is incorporated into the physical shell of the shield. The horn couples acoustic pulses from a sonic pulse generator to an acoustic aperture to output a pulsed pressure beam that approximates a plane wave to produce a pressure barrier. The operator may specify a desired effect on its human target that is maintained as range-to-target changes or a desired effect at a specified perimeter range. The shields may be networked to facilitate coordinated action among multiple pressure shields as a force multiplier or to provide a more sophisticated pressure barrier.

U.S. Army Afghanistan Smart Book, Third Edition

The Smart Book contains information designed to enhance Soldier’s knowledge of Afghanistan, including history, politics, country data and statistics, and the military operational environment. The Smart Book concludes with an overview of the culture of Afghanistan including religion, identity, behavior, communication and negotiation techniques, an overview of ethnic groups, a regional breakdown outlining each province, a language guide, and cultural proverbs, expressions and superstitions.

Asymmetric Warfare Group Guide to Insider Threats in Partnering Environments

This guide assists in three areas. First, it aides military leaders and all personnel to be aware of the indicators associated with insider threat activity while serving in a partnering environment. Second, this guide informs commanders and other leaders by giving them options on how to deal with insider threat activities. This guide is not all encompassing so there are other options a commander has dependent on their operating environment. Lastly, this guide is meant to generate open dialogue between coalition partners and partner nation personnel. Partnering in itself is a sensitive mission and only by creating trust and having an open dialogue with all forces will the mission be accomplished.

(U//FOUO) Joint Center for International Security Force Assistance Iraqi Federal Police Advisor Guide

As the U. S. Defense Department scales back operations in Iraq, one of the most significant questions that remains is whether the Iraqi security forces will be capable of maintaining civil order on their own. This manual was produced by the Joint Center for International Security Force Assistance (JCISFA) to help prepare deploying advisors, trainers, and partner forces that will work directly with Iraqi police. The intent is to provide a basic understanding of the country of Iraq and a solid understanding of the current organization and utilization of the Iraqi police. This manual also provides guidance on what it means to work ” by, with and through” a counterpart, and includes observations and insights learned by your predecessors.

(U//FOUO) Los Angeles Fusion Center: Detecting and Mitigating Cyber Threats

US citizens and assets – including the White House, the Central Intelligence Agency, InfraGard, the state of Arizona, and major defense contracting companies – experienced high-profile cyber threats and attacks in the first half of 2011. Most of the tactics and techniques used were not new, however the increase in attacks during the past few months exemplifies the growth of cyber incursions and reinforces the need to be aware of risks and mitigation techniques associated with cyber threats.

(U//FOUO) FBI Threat to Law Enforcement From “Doxing”

The FBI assesses with high confidence a that law enforcement personnel and hacking victims are at risk for identity theft and harassment through a cyber technique called “doxing.” “Doxing” is a common practice among hackers in which a hacker will publicly release identifying information including full name, date of birth, address, and pictures typically retrieved from the social networking site profiles of a targeted individual.

(U//FOUO) U.S. Marine Corps Afghan Drone Operations in Regional Command Southwest (RC (SW))

To inform Deputy Commandants (DCs) Aviation, Combat Development and Integration (CD&I), Plans, Policies, and Operations (PP&O), Installations and Logistics (I&L), Commanding General (CG), Training and Education Command (TECOM), Director of Intelligence, operating forces, and others on results of a Marine Corps Center for Lessons Learned (MCCLL) collection conducted April – May 2011 to document lessons and observations regarding unmanned aerial systems (UAS) operations in support of Regional Command Southwest (RC (SW)) during Operation Enduring Freedom (OEF).

Amazon Location Tracking and Future Destination Prediction Patent

Mobile device users may be tracked either via mobile-signal triangulation or via Global Positioning Satellite information. A mobile device user’s recent movements may be analyzed to determine trails or traffic patterns for device user among various locations. Mobile device trail information, either for an individual user or aggregated for multiple users, may be analyzed to determine a next destination for the user. Electronic advertising content, such as advertisements, coupons and/or other communications, associated with the next destination may be sent to an electronic device likely to be viewed by the mobile device user. Additionally, the identity of the mobile device user may be known and the advertisements or coupons may be tailored according to demographic information regarding the mobile device user. In addition, destinations may be recommended to mobile device users based on the recent locations the users have visited.

(U//FOUO) USAF Operating Next-Generation Remotely Piloted Aircraft for Irregular Warfare

RPAs are revolutionary surveillance and weapons delivery systems – changing the way the Air Force builds situation awareness and engages enemy forces – but their full potential has yet to be realized. To begin to address this issue, the Air Force initiated this study to review the state-of-the-art in RPA operations, focusing on control and connectivity in an irregular warfare (IW) environment. The Panel was specifically tasked to identify RPA architectures and operational concepts centered on human-systems integration, distributed systems operations, and effective command and control – a cluster of concepts and technologies we subsequently labeled as “mission management” enablers. The Panel was also tasked to recommend mid- to far-term S&T development roadmaps for advancing these technologies to improve the flexibility and capability of RPA operations.

(U//FOUO/LES) Los Angeles Fusion Center: Methods to Defeat Law Enforcement Crowd Control

The purpose of this bulletin is officer awareness. Officers should know that instigators involved in violent demonstrations might be familiar with, and might try to apply, techniques from the “Crowd Control and Riot Manual.” The handbook, from Warrior Publications teaches protestors how to defeat law enforcement crowd control techniques. Although it does not address specific groups or organizations, the information is widely applicable.

(U//FOUO) U.S. Army Intelligence Officer’s Handbook

TC 2-50.5 replaces FM 34-8-2, dated 1 May 1998. This publication does not replace the fundamental principles and tactics, techniques, and procedures contained in the other FM 2-series manuals; however, it does focus on their application. It is to be used in conjunction with the other FM 2-series manuals and conforms to the overarching doctrinal concepts presented in FM 3-0 and FM 2-0. The target audience for this manual is the intelligence officers serving as the G-2/S-2 and their staffs— intelligence warrant officers, noncommissioned officers, and junior enlisted Soldiers. TC 2-50.5 applies to the Active Army, the Army National Guard/Army National Guard of the United States, and the U.S. Army Reserve, unless otherwise stated.

(U//FOUO) JFIIT Intelligence Surveillance and Reconnaissance (ISR) Systems Handbook

The purpose of the JFIIT Tactical Leaders Handbook (version 5) is to provide ground maneuver commanders, battle staffs, and soldiers with information regarding Joint Intelligence, Surveillance, and Reconnaissance (ISR) and attack systems and how to leverage these combat multipliers during planning, preparation, and execution of military operations. JFIIT publishes a classified version of this document on the SIPRNET.

White House Strategic Plan for Preventing Violent Extremism

Law enforcement and government officials for decades have understood the critical importance of building relationships, based on trust, with the communities they serve. Partnerships are vital to address a range of challenges and must have as their foundation a genuine commitment on the part of law enforcement and government to address community needs and concerns, including protecting rights and public safety. In our efforts to counter violent extremism, we will rely on existing partnerships that communities have forged with Federal, State, and local government agencies. This reliance, however, must not change the nature or purpose of existing relationships. In many instances, our partnerships and related activities were not created for national security purposes but nonetheless have an indirect impact on countering violent extremism (CVE).