The level of corruption across Afghanistan’s public and private sectors represents a threat to the success of ISAF’s mission and the viability of the Afghan state. Corruption undermines the legitimacy and effectiveness of Afghanistan’s government, fuels discontent among the population, and generates active and passive support for the insurgency. Corruption and organized crime also serve as a barrier to Afghanistan’s economic growth by robbing the state of revenue and preventing the development of a strong licit economy, thus perpetuating Afghan dependence on international assistance. Corruption also threatens the process of security transition, as institutions weakened by criminality will be unable to accept the transfer of responsibility for security and governance.
On January 16, 2012 an unauthorized party associated with the hacktivist collective Anonymous gained access to this site’s web server. The attacker gained root access and posted a number of versions of a photo of a naked man. These images were used to deface the front of the site in multiple locations and contained the message “WAS HERE WITH 0DAY, ONLY SHIT I FOUND BAD WAS U LOGGING IN FROM A DSL CONNECTION… THEN AGAIN U BOUGHT THIS SERVER WITH UR PERSONAL CARD SO U CAN BE DOX’D… LEFT U THESE COX AS A FRIENDLY REMINDER THAT YOUR BOX CAN BE PWNED AT ALL TIMES…” The attackers then manipulated configuration files for the server which caused an error message to appear to visitors of the site. This state persisted for approximately eight hours blocking access to the site before it was later fixed by the attacker, who left a longer explanation for the hack in the server’s root directory.
Media Operations is responsible for the Command’s media relations activities, including identifying media to engage with to disseminate information, responding to queries, arranging interviews, and advising senior leaders and IJC members on media issues. Media Operations works with local and international media. The staff also manages the IJC media accreditation and embed programs, and works closely with Regional Commands and NATO Training Mission-Afghanistan (NTM-A) Public Affairs staffs. IJC Media Operations distributes, under its letter head, releases from special operations units.
U.S. military presentation from Multi-National Corps Iraq on “Core Warrior Values Training” which describes that the desecration of dead bodies is a prohibited activity.
Studying past combat helps gain insight into how insurgents may operate in the future. This guide uses short, simple vignettes to highlight common Afghan insurgent tactics. Each vignette focuses on a particular mission profile, such as raids, ambushes, and defending against a cordon and search. While tactics are continually evolving, the Afghans have a well documented history of using similar techniques against foreign militaries. Most of the vignettes in this guide are from the 1980s when Afghan insurgents fought the Soviet Union. Despite being more than 20 years old, many of the tactics remain in use today. For a more complete description of Afghan insurgent tactics against the Soviets, MCIA strongly recommends reading The Other Side of the Mountain by Ali Jalali and Les Grau, which this guide is based on. The final three vignettes in this guide are from recent operations in Afghanistan and demonstrate the evolution of tactics, techniques, and procedures (TTPs) by Afghan insurgents.
A body of open-source reporting suggests that fighters leaving the Afghan insurgency are doing so in greater numbers this winter (1,865 fighters) than last winter (443 fighters). As with the winter of 2009-2010, the majority of defecting fighters have continued to reintegrate into Afghan Government entities in the comparatively peaceful northern and western provinces of Afghanistan. The Taliban have rejected these reports, claiming that those joining the government are not Taliban fighters. Because of variations in the level of detail provided in media reports, this compilation could understate the number of reported militants leaving the battlefield. However, even 2,000 defections over six months would not appear to represent a major blow to an insurgency estimated to have 25,000 to 36,000 current fighters,12 and it is likely that at least some of those taking advantage of government reintegration programs were not committed fighters.
The following photos are from a collection housed at Bancroft Library at the University of California at Berkeley. The photos span from 1942-1945 at various internment camps around the U.S. operated by the War Relocation Authority.
Several basic training manuals used by U.S. forces to train the Afghan National Army (ANA) from 2007-2009.
U.S. Air Force presentation detailing human interface systems for drone ground control stations from May 2010.
In certain parts of the US government, when an operation has unintended negative second or third-order consequences, they are called “blowback.” The radical Islamic movements in the Pashtun areas today were always present, but putting them on steroids in the 1980’s was pretty short-sighted by any reasonable accounting — a classic case of “blowback.” During the Soviet-Afghan war, the Pakistanis had their own agenda. The Pakistani Army’s intelligence branch, called the Inter-Services Intelligence Directorate, or ISI, became extremely powerful by cooperating with the United States and the government of Saudi Arabia to channel roughly $7.2 billion dollars worth of covert foreign military aid to their preferred Mujahideen clients. To control the Mujahideen, the ISI formed seven resistance groups, each with a notional political party associated with it. These became known as “the Peshawar Seven.” CIA oversight of the covert money was weak, and much of it went into ISI’s pockets.
Max Planck Institute Brandenburg License Plate Scanning, Access to Telecommunications Data and Mobile Phone Localization Study
A report and presentation compiled by researchers at the Max Planck Institute for Foreign and International Criminal Law regarding controversial police powers recently introduced in the German state of Brandenburg including automated license plate searches, mobile phone localization and access to telecommunications data.
A script produced by the military for the Article 32 hearing of PFC Bradley Manning was released as part of a public court filing and was first reported on by Politico.
The focus of Marine Corps Martial Arts Program (MCMAP) is the personal development of each Marine in a team framework using a standardized, trainable, and sustainable close combat fighting system. As a weapon-based system, all techniques are integrated with equipment, physical challenges, and tactics found on the modern battlefield. The MCMAP is designed to increase the warfighting capabilities of individual Marines and units, enhance Marines’ self-confidence and esprit de corps, and foster the warrior ethos in all Marines. The MCMAP is a weapon-based system rooted in the credo that every Marine is a rifleman and will engage the aggressor from 500 meters to close quarter combat.
During several recent contacts with criminal gang members, an identified Maryland law enforcement agency has heard their radio transmissions broadcast over a suspect’s smartphone. In one incident, officers pursuing a suspect on foot overheard the suspect listening to the pursuing officers’ radio transmission over a smartphone. The radio broadcasts of the agency’s primary secure law enforcement channel had an approximate delay of three seconds on the suspect’s smartphone. Further investigation revealed that the general public, as well as criminal gang members and associates, are utilizing the website www.radioreference.com to listen to law enforcement secure channels streaming via the Internet. Registration and access to the site is free, with advanced features available to premium subscribers. A customer is able to search radio frequencies throughout the country by state, metro area, city and/or zip code. The website advertises a search for trunked frequencies as well. The frequencies are obtained over the Internet and any cell phone that has web access can listen in.
The text of an email sent on January 1, 2012 by a senior member of Scientology’s Sea Org named Debbie Cook. The email was published on the website of the Village Voice, then was removed at the request of Ms. Cook. The email discusses Cook’s problems with the direction that the Church of Scientology has recently taken, including what she perceives an obsessive emphasis on fundraising and a more than $1 billion dollar unused cash reserve. Cook confirmed the email’s authenticity via Facebook.
This report is an executive summary of interviews conducted by CALL in support of the JCOA comprehensive Study Plan covering CIVCAS. Topics included CIVCAS incidents, pre-deployment training, planning, mitigation efforts and best practices from key leaders with recent operational experience in Afghanistan and Iraq.
U.S. Marine Corps Intelligence Activity Micro Mission Guide for Afghanistan published in October 2008.
An email contained in the latest AntiSec release indicates that law enforcement agencies in New York have been circulating an out-of-date manual that was previously criticized by the ACLU to instruct officers about issues related to Occupy protests. The brief email from December 5, 2011 was circulated to a number of law enforcement agencies affiliated with the Mid Hudson Chiefs of Police Association and contains several document attachments that describe tactics used by protesters, including basic guides on how to conduct your own “Occupy” protest. One of the documents is a police manual titled “Civil Disturbance and Criminal Tactics of Protest Extremists” that describes “illegal” tactics used by protesters and so-called “protest extremists”. The document, which was last revised in 2003, does not list its originating agency or author and is marked with a number of unusual protective markings indicating that it is not intended for public release.
A manual attached to an email from the latest AntiSec release which has no listed author and little indications as to its source. The introduction states that information in the document “was collected and interpreted by multiple agencies” and the manual is intended for use only by “public safety agencies”. However, a 2003 article from a local newspaper in Colorado indicates that the manual was produced by an unknown U.S. Government agency and is used by Joint Terrorism Task Forces to teach local police about “criminal protest tactics”. According to an email in the most recent AntiSec release, the manual is still being circulated today in relation to police confrontations with Occupy protests.
This Joint Intelligence Bulletin provides law enforcement, public, and private sector safety officials with an evaluation of potential terrorist threats during the 2011 US holiday season, extending from Thanksgiving through New Year’s Day. This information is provided to support the activities of DHS and FBI and to assist federal, state, local, tribal and territorial government counterterrorism and first responder officials in deterring, preventing, preempting, or responding to terrorist attacks within the United States.
U.S. Army instructional presentation from 2008 on the history and major sects within Islam.
To effectively defeat an enemy, one must first understand the enemy. Intelligence professionals have forgotten the basic principles on which intelligence analysis is conducted, instead they sub-scribe to the paradigm that the enemy faced in this Global War on Terror has no structure or doctrine. Any organization, military or civilian, must have a structure and a way of doing business if they are to have any chance of being successful.
The Kill Box MTTP reinforces kill boxes as three-dimensional areas used to facilitate the integration of joint fires while also being a permissive fire support coordination measure (FSCM) in accordance with JP 3-09, Joint Fire Support. The publication offers a detailed explanation of kill box employment and provides information to effectively organize, plan, and execute kill box procedures.
A man-portable non-lethal pressure shield provides both a physical as well as pressure shield. The pressure shield addresses the concerns of military, police and human rights organizations and international law as regards effectiveness, efficiency and safety and efficiency. A folded acoustic horn is incorporated into the physical shell of the shield. The horn couples acoustic pulses from a sonic pulse generator to an acoustic aperture to output a pulsed pressure beam that approximates a plane wave to produce a pressure barrier. The operator may specify a desired effect on its human target that is maintained as range-to-target changes or a desired effect at a specified perimeter range. The shields may be networked to facilitate coordinated action among multiple pressure shields as a force multiplier or to provide a more sophisticated pressure barrier.
The purpose of the NLW Reference Book is to provide a single source document that contains key information about NLW descriptions, effects, characteristics, concepts of employment, and associated operational parameters and considerations to enhance NLW education and training.