This note has been produced by the Rightsholder Group as an initial response to a request from the Minister for Culture, Communications and the Creative Industries to see whether there is scope to move toward across-industry voluntary approach to inhibiting access to websites that are substantially focused upon infringement of copyright. Our proposal is for a voluntary approach that will have a significant impact on the problem of infringement undertaken using the internet while being legally and technically feasible, cost-effective and proportionate. Our proposal is advanced on the basis that sound internet policy should encompass notions of accountability to incentivise private sector participants to take commercially reasonable steps, where available, to prevent or limit those harms that flow from the products or services they offer. This is a complex issue and we have addressed it here by offering a general approach based on core principles, exemplified by a more detailed explanation of the legal basis for the approach and of how such a system could work.
U.S. Air Force
U.S. Air Force F-16A/B Flight Manual
Restricted U.S. Air Force F-16A/B Flight Manual from August 15, 2003.
United Nations
United Nations Civilian Police Handbook
United Nations Department of Peace-keeping Operations Civilian Police Handbook from October 1995.
U.S. Army
(U//FOUO) U.S. Army Commander’s Negotiation Preparation Guide
U.S. Army presentation titled “Negotiations: A Preparation Guide for Commanders” from 2003.
National Security Agency
(U//FOUO) NSA Social Networking Sites Security Guide
A social networking site (SNS) is a web-based service that allows communities of people to share common interests and/or experiences. Rather than using direct point-to-point communication to stay in touch (e.g., face-toface, phone, text/video messages), SNSs allow users to publish information that can be read later by other users (a one-to-many form of communication) and follow their friend’s postings and provide comments. SNSs provide innovative methods for interacting with friends through third-part applications, such as simple games (tic-tac-toe, paper-rock-scissors), interactive maps to show places visited across the world, and quiz/trivia games which allow for score comparison with others. Many SNSs also allow users to logon from mobile devices that have web browser access to the Internet, allowing them to check and update their accounts from virtually any location with a Wi-Fi or cellular signal.
National Security Agency
(U//FOUO) NSA BlackBerry and iPhone/iPad Security Guides
Two pamphlets produced by the NSA on “Using Your BlackBerry Securely” and “Security Tips for Personally Managed Apple iPhones and iPads” from March 2011.
U.S. Army
(U//FOUO) U.S. Army Battle Staff Operations in a Counterinsurgency Environment
IED and Sniper Defeat: The Battle Staff Operations Process in a COIN Environment briefing from April 13, 2007.
World Bank
World Bank Fraud, Corruption, and Collusion in the Roads Sector Report
Because an extensive, well maintained network of roads is essential for economic development, road construction and maintenance projects have been a mainstay of the World Bank’s lending portfolio since its founding. This long experience in the roads sector is reflected in favorable project evaluations. The Bank’s Independent Evaluation Group reports that roads and other transport projects consistently score higher on measures of outcomes, institutional development, and sustainability than non-transport projects and the Bank’s Quality Assurance Group has found that roads projects are well-supervised. At the same time, roads projects around the globe remain plagued by fraud, corruption, and collusion. A Transparency International poll ranked construction as the industry most prone to corruption and a survey of international firms revealed that companies in the construction industry were more likely than firms in any other sector to have lost a contract because of bribery. World Bank-financed projects are not immune. Roughly one-fourth of the 500 plus projects with a Bank-funded roads component approved over the past decade drew one or more allegations of fraud, corruption, or collusion; to date, the Bank’s Integrity Vice Presidency (INT) has confirmed allegations in 25 projects resulting in 29 cases of misconduct under Bank rules.
U.S. Coast Guard
(U//FOUO) U.S. Coast Guard Maritime Homeland Threat Summary June 2011
The Maritime Threat Summary is a monthly product the Maritime Homeland Threat Analysis Branch (MHTAB) of the US Coast Guard (USCG) Intelligence Coordination Center produces for USCG Homeport. It highlights suspicious maritime activities and security incidents associated with the US Maritime Transportation System (MTS).
Headline
What Happens When Your Hockey Team Loses
Foxtongue – http://www.flickr.com/photos/foxtongue/ BrittneyBush – http://www.flickr.com/photos/tzofia/ eych-you-bee-ee-ahr-tee – http://www.flickr.com/photos/eych/ refreshment_66 – http://www.flickr.com/photos/15574096@N00/
White House
Obama Administration Report on Legal Justification for Military Actions in Libya
In his address to the nation on Libya on March 28, 2011, President Obama presented a comprehensive explanation for why he authorized military action as part of an international coalition to protect the people of Libya and to enforce U.N. Security Council Resolution (UNSCR) 1973. In the intervening weeks and months, coalition efforts have been effective in protecting the Libyan population. The regime has suffered numerous defeats, cities and towns across Libya have been liberated from brutal sieges, strong sanctions are in place, and the regime is encountering serious difficulties raising revenues through oil sales or other means. All these actions and outcomes are consistent with UNSCR 1973.
U.S. Army
(U//FOUO) US Army Company Intelligence Support Team (COIST) Handbook
The mission of COISTs is to describe the effects of the weather, enemy, terrain, and local population on friendly operations to reduce uncertainty and aid in decision making. This is a simple and clear mission with a powerful purpose. However, the operation of the company COIST is far from simple. Company leaders must review and interpret huge volumes of data on a daily basis to determine their relevance and relationships. A few examples of this data include weapons intelligence team reports, patrol debriefs, intelligence summaries (INTSUMs), link diagrams, and be-on-the-lookout (BOLO) lists. Although the commander will determine and direct the exact requirements for the COIST, specified and implied tasks usually include targeting; intelligence, surveillance, and reconnaissance (ISR); patrol briefings and debriefings; detainee operations; and site exploitation.
United States
Congressional Lawsuit Over Obama Administration’s Violation of War Powers Act in Libya
This is an action for injunctive and declaratory relief to protect the Plaintiffs and the country from a stated policy of Defendant Barack Obama, President of the United States, whereby a president may unilaterally go to war in Libya and other countries without the declaration of war from Congress required by Article I, Section 8, Clause 11 of the U.S. Constitution.
U.S. Army
(U//FOUO) U.S. Army Biometric Automated Toolset (BAT) Smart Card
U.S. Army Biometric Automated Toolset (BAT) Smart Card from February 2007.
News
NSA $3.2 Billion “Site M” Expansion Planning Documents Reveal Cyberwar Command Center
In July 2010, the NSA revealed that it was expanding into a 227-acre parcel of land at Fort Meade called “Site M”, constructing a series of buildings that could cost as much as $5.2 billion. This expansion would displace two golf courses currently occupying the land and provide the NSA, which already occupies 630 acres at Fort Meade, with more space to build “an operational complex and to construct and operate consolidated facilities to meet the National Security Agency’s (NSA) continually evolving requirements and for Intelligence Community use”. The project has been shrouded in secrecy throughout its existence and there are only a few references to “Site M” in DoD budget planning documents. However, a recently discovered collection of development planning documents for the Site M project provide detailed information about the proposed $3.2 billion expansion, indicating that the facility will be a centralized command center for the NSA’s evolving cyberwarfare capabilities.
National Security Agency
(U//FOUO) NSA “Site M” Expansion Planning Documents
National Security Agency “Site M” Expansion Development Plan and Anti-Terrorism Force Protection Assessment from May 31, 2011. The Site M Area Development Plan (ADP) for the National Security Agency/Central Security Service (NSA/CSS) coordinates the development of facilities on Site M at Fort George G. Meade (Ft. Meade), allowing for growth and expansion over time. Site M development is planned to consist of administrative buildings, operation buildings, High Performance Computing Centers (HPCC) and associated support facilities. The objective of the AT/FP component is to develop a plan for protection of the proposed Site M development. This plan is based on the mandatory DoD minimum antiterrorism standards as well the specific requirements of NSA/CSS Ft. Meade. The plan provides overall guidance for development of the site as well as specific design strategies for key AT/FP components. A layered approach to security has been applied to ensure probability of detection with low false and nuisance alarm rates.
Headline
Israeli Security Barrier Occupation Checkpoint Photos
jenniferlisa – http://www.flickr.com/photos/jenniferlisa/ delayed gratification – http://www.flickr.com/photos/joshhough/ chris yunker – http://www.flickr.com/photos/chris-yunker/ david ortmann – http://www.flickr.com/photos/davidortmann/ justincgio – http://www.flickr.com/photos/51479356@N05/ Michael Loadenthal – http://www.flickr.com/photos/michaelimage/ izahorsky – http://www.flickr.com/photos/ingmar/ taimambi – http://www.flickr.com/photos/taimambi/ hoyasmeg – http://www.flickr.com/photos/emeryjl/
Bilderberg Participant Lists
2011 Bilderberg Meeting Participant List
Official list of participants for the 2011 Bilderberg Meeting in St. Moritz, Switzerland. The 59th Bilderberg Meeting will be held in St. Moritz, Switzerland from 9 – 12 June 2011. The Conference will deal mainly with Challenges for Growth: Innovation and Budgetary Discipline, the Euro and Challenges for the European Union, the role of Emerging Economies, Social Networks: Connectivity and Security Issues, New Challenges in the Middle East, Conflict Areas, Demographic Challenges, China, Switzerland: Can it remain successful in the future?
Syria
List of Martyrs/Victims of the Syrian Revolution
List of Martyrs/Victims of the Syrian Revolution produced by the Committee of Martyrs of 15 March Revolution.
U.S. Army
US Army Apache Longbow AH-64D Attack Helicopter Operator’s Manual
US Army Apache Longbow AH-64D Operator’s Manual from July 26, 2005.
Congressional Research Service
The Federal Bureau of Investigation and Terrorism Investigations
The Federal Bureau of Investigation (FBI, the Bureau) is the lead federal law enforcement agency charged with counterterrorism investigations. Since the September 11, 2001 (9/11) attacks, the FBI has implemented a series of reforms intended to transform itself from a largely reactive law enforcement agency focused on investigations of criminal activity into a more proactive, agile, flexible, and intelligence-driven agency that can prevent acts of terrorism.
Intelligence Fusion Centers, Michigan
(U//FOUO) Michigan Fusion Center Restaurant Inspection Scam Warning
Restaurants in multiple states, including Michigan, are reporting phone calls from individuals claiming to be from the Health Department. Throughout Michigan, the scammers are requesting to schedule an inspection at the food establishment, as well as sensitive information about the business. According to the Better Business Bureau, this was a widespread occurrence in Minnesota and North Dakota in 2010.
Open Source Center
Open Source Center Blackwater Personnel Staying in Abbottabad Guesthouses January 2010
Mysterious guesthouses have been established in Abottabad’s famous residential area. It has been revealed that Blackwater officials are living there. Important persons regularly visit these guesthouses, and there are fears that the peace and stability in Abottabad may be affected. According to the details received, there are many guesthouses in Abottabad where immoral activities take place at night and meetings in the name of NGOs are arranged during the day. As soon as the night falls, suspicious persons start coming to these guesthouses.
Afghanistan, U.S. Army
Human Terrain System Report: Local Governance in Rural Afghanistan
This paper is designed to act as a guide for working with local communities in rural Afghanistan at the wuluswali (district) level, primarily in the east and south. Afghan society has always been extremely diverse from district to district, requiring a flexible, multi-faceted approach to governance. This multi-faceted approach blended tribes, Islam and the state. The political upheaval of the past 40 years has disrupted Afghan society and the traditional structures which historically provided governance and social order, not just the Kabul-based government. It is important that the information in this guide is not seen as absolute or universally applicable, but rather as a baseline guide for understanding the complexities of local governance, or the lack thereof, in rural Afghanistan. There is no standard formula for success in Afghanistan due to its diversity; the only constant is the need for flexibility.
Florida
Florida Fuel Pump Credit Card Skimmer Warning
On December 16, 2010, at approximately 1736 hours, the Melbourne Police Department responded to reports of fraud at the RaceTrac gas station located at 4641 W Eau Gallie Blvd, in Melbourne (MP10-83795). An investigation revealed there was a credit card skimmer installed inside one of the fuel pumps that had been attached with Velcro. Victims began reporting fraudulent charges on their credit card accounts on December 14, 2010 and there have been fourteen (14) reports to date that are believed to be linked with this trend. At this time, it is unknown as to how long the skimmer had been inside the pump. It is estimated that over 600+ credit card numbers have been compromised. The stolen credit card numbers have been used multiple times at bank ATM’s in New York City, most frequently at the Actors Federal Credit Union.