(U//FOUO) Open Source Center Master Narratives Report: Muslim Communities of France

This report serves as a resource for addressing this challenge in two ways. First, it surfaces a set of nine master narratives carefully selected based on their potency in the context of France’s Muslim communities, and their relevance to US strategic interests. Second, this report follows a consistent structure for articulating these narratives and explicitly identifies initial implications for US communicators and analysts. The set outlined here is not exhaustive: these nine master narratives represent a first step that communicators and analysts can efficiently apply to the specific messaging need or analytic question at hand. For seasoned experts on French Muslim communities, these narratives will already be familiar — the content contained in this report can be used to help check assumptions, surface tacit knowledge, and aid customer communications. For newcomers to European Islam accounts, these narratives offer deep insights into the stories and perceptions that shape French Muslim identity and worldviews that may otherwise take years to accumulate.

(U//FOUO) Open Source Center Master Narratives Country Report: Somalia

Understanding master narratives can be the difference between analytic anticipation and unwanted surprise, as well as the difference between communications successes and messaging gaffes. Master narratives are the historically grounded stories that reflect a community’s identity and experiences, or explain its hopes, aspirations, and concerns. These narratives help groups understand who they are and where they come from, and how to make sense of unfolding developments around them. As they do in all countries, effective communicators in Somalia invoke master narratives in order to move audiences in a preferred direction. Somali influencers rely on their native familiarity with these master narratives to use them effectively. This task is considerably more challenging for US communicators and analysts because they must place themselves in the mindset of foreign audiences who believe stories that — from an American vantage point — may appear surprising, conspiratorial, or even outlandish.

ITU CWG-WCIT12 Draft Compilation of Proposals/Options November 2011

Compilations of draft proposals for modifications to International Telecommunications Regulations (ITRs). The current version of the proposed changes to the ITRs (CWG-WCIT12 Temporary Document 64) was recently leaked in response to a lack of publicly available information on the proposals. These documents help to provide background and context on the development of the current proposal.

How to Conduct Psychological Operations

Psychological operations (PSYOP) have long been used by militaries around the world to coerce populations into acting in a manner favorable to their mission objective. The product of these operations, which is commonly called propaganda when distributed by enemy forces, is a mixture of complex social research, art direction and psychological theory designed to manipulate its unsuspecting recipient into modifying their behavior in a way favorable to those conducting the PSYOP. The message conveyed through a PSYOP can often stray into deeply emotional and personal territory that is intended to trigger a profound psychological response. For example, U.S. and British troops fighting in Italy and France during World War II were subjected to a barrage of leaflets dropped by German aircraft describing the futility of their mission, encouraging them to take the “POW life insurance policy” and instructing them that their girlfriends back home were being taken advantage of by Jewish businessmen. The methodology behind these persuasive psychological tactics is described in detail in U.S. Army FM 3-05.301 Psychological Operations Process Tactics, Techniques, and Procedures, which provides fascinating insight into the methods used by PSYOP soldiers to modify the behavior of targeted populations.

Restricted U.S. Army Psychological Operations Process Tactics, Techniques, and Procedures Manual

Field Manual (FM) 3-05.301 describes the tactics, techniques, and procedures (TTP) for the implementation of United States (U.S.) Army Psychological Operations (PSYOP) doctrine presented in the higher-level publication, FM 3-05.30, Psychological Operations. FM 3-05.301 provides general guidance for commanders, staffs, and Soldiers who plan and conduct PSYOP across the range of military operations. The TTP in this manual are presented within the framework of the seven-phase PSYOP process, a mainstay for effective PSYOP executed at the tactical, operational, and strategic levels.

(U//FOUO) Open Source Center North Korea Unusual Threats Signal Possible Action Against South Korea

North Korea’s recent threat to carry out “special actions” against the South is rare and seems intended to signal the regime’s resolve to move forward with some form of provocation. The threat, however, is unlike past warnings the regime has typically issued prior to military provocations, suggesting that the North might follow through with a move other than a conventional military attack. Significantly, some aspects of the warning appear to signal Pyongyang’s commitment to follow up on the “actions” in the near future.

(U//FOUO) Open Source Center North Korea Propaganda Coverage of Party Representatives Conferences

Pyongyang quickly has set the stage for the fourth Party Representatives Conference slated for 11 April. Though state media have not yet announced an agenda for the conference, it is likely that the regime will use the event to memorialize formally Kim Jong Il and appoint Kim Jong Un to a top party post. The tables below provide a baseline of state media coverage of the impending conference and its antecedents.

(U//FOUO) Open Source Center North Korea Kim Jong Un Party Leadership Analysis

Personnel moves at the recent Party Conference and spring session of the legislature — beyond Kim Jong Un’s assumption of the top slots — underscore the new leadership’s continued commitment to revitalizing the Party as an institution and its confidence in managing the system. Though state media billed the moves merely as filling vacancies, the leadership quietly elevated or replaced almost one-third of the ruling Political Bureau, many through unannounced retirements or dismissals. The personnel changes occurred in military, internal security, and economic organizations and are not clustered in one area. Though personnel were added to the National Defense Commission (NDC), its relationship to the Political Bureau and Central Military Commission (CMC) remains unclear.

(U//FOUO) Open Source Center Analysis of North Korea Joint Ventures With Foreign Partners 2004-2011

OSC has identified more than 350 joint ventures in North Korea in a search of open source information. For the 88 ventures for which we have investment amount data, the aggregate total of reported foreign investment from 2004 to 2011 amounted to $2.32 billion, with roughly half of that going toward ventures in the mining sector. Firms from China account for 75% of the joint venture partners for which partner country is known, followed by firms from South Korea, Japan, and Europe. Of the joint ventures for which we found location information, most show a Pyongyang address. The remaining are concentrated at seven locales in other parts of the country.

The Case of the Mysterious Khalid Sheikh Mohammed in Guantanamo Bay Photos

Last month, nearly a dozen photos purporting to show alleged al-Qaeda mastermind Khalid Sheikh Mohammed posing serenely inside a detention facility at Guantanamo Bay were posted on a popular Jihadist forum. The photos depict what appears to be Mohammed sitting in a variety of poses in clothing similar to what is worn by detainees at the internment facilities in Guantanamo Bay. Two of the photos also depict other detainees being held at Guantanamo.

Homeland Security Warns of Terrorist Wildfire Attacks

The Federal Bureau of Investigation, Department of Homeland Security and fusion centers around the country are warning that terrorists are interested in using fire as a weapon, particularly in the form of large-scale wildfires near densely populated areas. A newly released DHS report states that for more than a decade “international terrorist groups and associated individuals have expressed interest in using fire as a tactic against the Homeland to cause economic loss, fear, resource depletion, and humanitarian hardship.” The report notes that the tactical use of fire as a weapon is “inexpensive and requires limited technical expertise” and “materials needed to use fire as a weapon are common and easily obtainable, making preoperational activities difficult to detect and plot disruption and apprehension challenging for law enforcement.”

(U//FOUO) DHS Terrorist Interest in Using Fire as a Weapon

International terrorist groups and violent extremists have long shown interest in using fire as a weapon due to the low cost and limited technical expertise required, the potential for causing large-scale damage, and the low risk of apprehension. Recent encouragement of use of this tactic by terrorist groups and violent extremists in propaganda materials and extremist Web forums is directed at Western audiences and supports Homeland attacks.

2012 Bilderberg Meeting Participant List

The 60th Bilderberg Meeting will be held in Chantilly, Virginia, USA from 31 May – 3 June 2012. The Conference will deal mainly with political, economic and societal issues like Transatlantic Relations, Evolution of the Political Landscape in Europe and the US, Austerity and Growth in Developed Economies, Cyber Security, Energy Challenges, the Future of Democracy, Russia, China and the Middle East. Approximately 145 participants will attend of whom about two-thirds come from Europe and the balance from North America and other countries. About one-third is from government and politics, and two-thirds are from finance, industry, labor, education, and communications. The meeting is private in order to encourage frank and open discussion

NATO Peace Support Operations Doctrine

The term Peace Support Operations is now widely used by many civilian agencies to describe their activities in complex humanitarian emergencies. PSOs are multi-functional operations, conducted impartially, normally in support of an internationally recognised organisation such as the UN or Organisation for Security and Co-operation in Europe (OSCE), involving military forces and diplomatic and humanitarian agencies. PSO are designed to achieve a long-term political settlement or other specified conditions. They include Peacekeeping and Peace Enforcement as well as conflict prevention, peacemaking, peace building and humanitarian relief.

UK Supreme Court Decision Assange v The Swedish Prosecution Authority

On 2 December 2010 the Swedish Prosecution Authority (“the Prosecutor”), who is the respondent to this appeal, issued a European Arrest Warrant (“EAW”) signed by Marianne Ny, a prosecutor, requesting the arrest and surrender of Mr Assange, the appellant. Mr Assange was, at the time, in England, as he still is. The offences of which he is accused and in respect of which his surrender is sought are alleged to have been committed in Stockholm against two women in August 2010. They include “sexual molestation” and, in one case, rape. At the extradition hearing before the Senior District Judge, and subsequently on appeal to the Divisional Court, he unsuccessfully challenged the validity of the EAW on a number of grounds. This appeal relates to only one of these. Section 2(2) in Part 1 of the Extradition Act 2003 (“the 2003 Act”) requires an EAW to be issued by a “judicial authority”. Mr Assange contends that the Prosecutor does not fall within the meaning of that phrase and that, accordingly, the EAW is invalid. This point of law is of general importance, for in the case of quite a number of Member States EAWs are issued by public prosecutors. Its resolution does not turn on the facts of Mr Assange’s case. I shall, accordingly, say no more about them at this stage, although I shall revert briefly to them towards the end of this judgment.

(U//FOUO) U.S. Marine Corps Civil Affairs Detachment Operations in Afghanistan Lessons Learned

The Commanders Emergency Response Program (CERP) funds were the primary mechanism employed by Det L in using money as a weapons system. CERP funds were most readily available and afforded CA flexibility and responsiveness. CA Marines also used Post-Operations Emergency Relief Fund (POERF), an International Security Assistance Force (ISAF) NATO fund available for named operations. With the MEB higher headquarters (Regional Command-South) able to authorize single expenditures of up to 17,500 Euros (approximately U.S. $23,301) and as much as 70,000 Euros (approximately U.S. $93,204) available at a given time, the benefits of POERF included the ability to fill gaps when CERP was not available or could not be used due to statutory restrictions. For example, governed by ISAF SOP 930 and described as having fewer bureaucratic hurdles to overcome than CERP, POERF was used to rapidly fund programs such as providing emergency financial assistance to internally displaced people who were forced to relocate due to MEB military operations.

(U//LES) FBI-NGIC Gang Criminal Activity Expanding Into Juvenile Prostitution

The National Gang Intelligence Center (NGIC) and the FBI’s Crimes Against Children Unit (CACU) assesses with medium confidence that gang activity is expanding towards juvenile prostitution primarily for its steady financial rewards and perceived low risk of law enforcement interaction. Historically, prison, street and outlaw motorcycle gangs profit from drug distribution and have recently become involved in non-traditional criminal activity such as mortgage fraud and identity theft. Some gangs appear to be diversifying their income by reducing or eliminating drug trafficking activities in favor of juvenile prostitution.

DoD Unmanned Aircraft System (UAS) Airspace Integration Plan

While reliance on UAS continues to grow, the ability to integrate UAS into the National Airspace System (NAS) to support operations, training, and testing has not kept pace. Routine access to exercise and execute Combatant Command (COCOM)-tasked missions, and to support broader military and civil missions such as Homeland Security (HLS), Homeland Defense (HD), and Defense Support of Civil Authorities (DSCA) is necessary. Current NAS access for UAS is greatly limited under interim FAA policies that govern UAS operations in the NAS. Currently, DoD UAS operations conducted outside of Restricted, Warning and Prohibited areas are authorized under a temporary Certificate of Waiver or Authorization (COA) from the Federal Aviation Administration (FAA) or under limited conditions outlined in the 2007 DoD-FAA Memorandum of Agreement (MoA). Although DoD has been able to facilitate a small number of flights through the COA process, DoD has not been able to obtain the level of airspace access necessary to accomplish the wide range of DoD UAS missions at current and projected operational tempos.

Joint Advanced Warfighting School Thesis on Problems Integrating Unmanned Aircraft Systems (UAS) into the National Airspace System

In the last 10 years, the unmanned aircraft system (UAS) has captured the public’s imagination and fascination with their ability to provide instantaneous video feeds of military and covert CIA operations in far away places like Afghanistan and Iraq. The rapid proliferation of the UAS and the eventual redeployment of current systems deployed to Afghanistan and Iraq will require the Federal Aviation Administration (FAA) to provide unrestricted unmanned aircraft access within the National Airspace System (NAS). The Department of Defense (DoD) requires routine access to the NAS to execute directed missions, meet training requirements, and perform necessary testing to meet the Joint Force Commander’s (JFC’s) established mission priorities. Over the past several years, the DoD has been able to execute a small portion of UAS flights in the NAS but current rules and regulation do not facilitate seamless integration with manned aircraft. The purpose of this study is to show that although the DoD and the FAA recognize the importance of integrating manned and unmanned aircraft within the NAS, there are many challenges and gaps that must be bridged to facilitate successful integration. The most important challenge to overcome when integrating manned and unmanned aircraft into the same airspace is safety.