This document specifies the performance of the Baseline and Tactical Persistent Threat Detection System (PTDS). Section 3 specifies the requirements for the Baseline PTDS and Section 4 specifies the requirements for the Tactical PTDS (T-PTDS). Throughout this specification, the acronym PTDS (without B- or T-) applies to both the Baseline PTDS and Tactical PTDS.
A Homeland strike soon after the London attacks is conceivable but unlikely, and if and when it comes, it could just as well be on other “soft targets” as on mass transit. These were the conclusions of 18 leading academic terrorism experts, former senior National Security Council and DHS officials, mass transit security specialists, and other nongovernmental experts and creative thinkers polled by the DHS Analytic Red Cell immediately after the July 7 attacks.
Marine Corps Judge Advocates have been providing wartime legal support to operational commanders since the Vietnam War. Judge Advocates who deployed to Operation DESERT STORM reported an increased need for operational law support and a diminished need for traditional military justice (court-martial) support. Observations by Judge Advocates and infantry commanders who served in OEF/OIF between 2003 and 2006 show that the need for operational law support of ground commanders has continued to expand and is now required on a consistent basis at the infantry battalion level.
Cyberterrorism is an attractive option for foreign-born and domestic terrorists who value its anonymity, potential to inflict massive damage, psychological impact and media appeal. As a new, more computer-savvy generation of terrorists comes of age, the threat of cyber-terror attack is likely to increase.
(U//LES) DoJ “Paths to Radicalization” Briefing, June 2010.
(U) Purpose. This Concept of Operations (CONOP) documents concepts and procedures for the use of biometric technologies to support identity superiority, protection and management in the entire USCENTCOM AOR. This CONOP focuses on the biometrics process and key systemic enablers. This CONOP contains UNCLASSIFIED and CLASSIFIED 100 annexes. The body of the CONOP is UNCLASSIFIED however, Annex E, “HUMINT Biometrics Management”, is CLASSIFIED SECRET//NOFORN.
The magnitude and importance of Afghanistan’s opium economy are virtually unprecedented and unique in global experience —it has been roughly estimated as equivalent to 36% of licit (i.e. non-drug) GDP in 2004/05, or if drugs are also included in the denominator, 27% of total drug-inclusive GDP (see Chapter 2). The sheer size and illicit nature of the opium economy mean that not surprisingly, it infiltrates and seriously affects Afghanistan’s economy, state, society, and politics. It generates large amounts of effective demand in the economy, provides incomes and employment including in rural areas (even though most of the final “value” from Afghan opium accrues outside the country), and supports the balance of payments and indirectly (through Customs duties on drug-financed imports) government revenues. The opium economy by all accounts is a massive source of corruption and undermines public institutions especially in (but not limited to) the security and justice sectors. There are worrying signs of infiltration by the drug industry into higher levels of government and into the emergent politics of the country. Thus it is widely considered to be one of the greatest threats to state-building, reconstruction, and development in Afghanistan.
Barbara Lee, defending her decision as the only representative to vote against the initial funding of the war in Afghanistan (Authorization for Use of Military Force Against Terrorists, 420-1), on September 14, 2001: We must not rush to judgment. For…
The Washington Post has changed significant portions of an article published earlier today regarding the CIA’s payment of large numbers of people within Hamid Karzai’s administration in Afghanistan. These changes occur mostly in the beginning of the article and substantially manipulate its content. Most notable among the changes is the complete elimination of a quote describing how “half of Karzai’s palace” is on the CIA payroll. This quote, from an anonymous U.S. government official, was replaced with a paraphrased statement that “a significant number” of officials in Karzai’s administration are paid by the CIA. This alteration is followed by a quote from a CIA spokesman, which does not appear in the original article, who says that the “anonymous source appears driven by ignorance, malice or both.” Another significant quote from this anonymous source, detailing how Kazai is “blind to about 80 percent of what’s going on below him”, was also completely eliminated from the article. There are also a number of smaller changes all of which are designed to eliminate the perception of ignorance, malfeasance, and public perception that the Afghan government is almost wholly owned by the CIA.
Outlaw Motorcycle (OMG) and Street Gangs have been active for several years in Washington State. Both Outlaw Motorcycle Gangs (OMG) and Street Gangs have now become entrenched in the region. Street Gangs are involved in a variety of crimes to include drug trafficking, fraud, and prostitution, and have formed alliances with other gangs. They often serve as distribution networks for Mexican National Drug Trafficking Organizations (DTOs). Gang membership and affiliation continue to rise in Washington State. Many gangs have infiltrated Indian Country and cooperated with DTOs, which has enabled them to recruit additional members. Both street gangs and OMGs pose a serious threat to the safety of law enforcement personnel and to the safety of local communities.
The purpose of the Multi-Year Training and Exercise Plan (MYTEP) is to provide a follow-on companion document to Florida‟s Domestic Security Strategic Plan. It is a living document that will be updated and refined annually. The MYTEP provides a roadmap for Florida to follow in accomplishing the priorities and goals described in the Florida‟s Domestic Security Strategic Plan. Each State Priority is linked to a corresponding National Priority, and, if applicable, an Improvement Plan (IP) action. The priority is further linked to the associated target capabilities that would facilitate accomplishment of the priority and the training and exercises that will help the jurisdiction obtain those capabilities and achieve that priority.
(U//FOUO) On July 12, 2010, Marion County health officials confirmed mosquitoes have tested positive for West Nile virus. The tested mosquitoes carrying the West Nile Virus were located within the 1800 block of Caribbean Drive in Warren Township. (1st Pool Found in Marion County’s Warren Township, 2010)
Over the course of July and early August 2010, Pakistan experienced the worst monsoon-related floods in living memory. Heavy rainfall, flash floods and riverine floods have devastated large parts of Pakistan since the arrival of seasonal monsoon rains on 22 July. Assessments of losses and damages are ongoing, but estimates place the number of affected people at more than 14 million. Over 1,200 people have died, and at least 288,000 homes have been damaged or destroyed. In Khyber Pakhtunkhwa (KPK) Province, intense rains during the last week of July and in early August were compounded by the swelling of major rivers due to rainwater surging down from the highland areas. The Pakistan Meteorological Department reports that within one week in late July, KPK received 9,000 millimetres of rainfall – ten times as much as the province normally receives in the course of an entire year. Baluchistan, Pakistan-Administered Kashmir and Gilgit Baltistan, also experienced extreme weather, resulting in widespread losses and damages.
Globalization and advances in technology allow criminals to commit crimes across international borders with greater ease than ever before. With criminal methods and tactics changing continuously, the tools used to fight crime also need to keep pace. One area where cutting-edge developments have emerged is that of the use of DNA evidence, meaning that ethics and best practice of DNA profiling now need to be addressed on a global scale. At INTERPOL, we are doing just that; assisting the law enforcement and forensic community by supporting, facilitating, and promoting the use of DNA analysis on a national, regional and international level.
A recent guide from the Department of Justice detailing terms and concepts used by “extremist” groups lists “constitutionalists” and “survivalists” . The 120-page, “Law Enforcement Sensitive” guide to “Investigating Terrorism and Criminal Extremism” describes itself as “a glossary designed primarily as a tool for criminal justice professionals to enhance their understanding of words relating to extremist terminology, phrases, activities, symbols, organizations, and selected names that they may encounter while conducting criminal investigations or prosecutions of members of extremist organizations.” Constitutionalist, which is defined as an “adherent or advocate of constitutionalism or of an existing constitution” by Random House’s 2010 Dictionary, is described in the report as a “generic term for members of the ‘patriot’ movement”. Survivalists are described in the document as fearing a “coming collapse of civilization” and are trying to prepare themselves for this collapse. Such individuals are said to have “typically stockpiled food, water, and weapons, especially the latter, and instructed themselves on topics ranging from first aid to childbirth to edible plants”.
In order for criminal justice professionals to effectively combat terrorism/extremism, it is imperative to obtain as much information as possible. Extremist groups often develop languages of their own. Some have created terms that are unique in the English language, while others have given new or expanded meaning to relatively common words and phrases. In addition, certain symbols, events, organizations, and individuals have particular significance for members of some extremist organizations, none of which may be familiar to an investigator or prosecutor who has not previously been involved with such cases. Investigating Terrorism and Criminal Extremism—Terms and Concepts is a glossary designed primarily as a tool for criminal justice professionals to enhance their understanding of words relating to extremist terminology, phrases, activities, symbols, organizations, and selected names that they may encounter while conducting criminal investigations or prosecutions of members of extremist organizations. Included are terms that may be germane to members of an extremist movement. Also defined are words that are singularly employed by specific extremist groups. Legal terms that have been given new meanings by groups’ adherents are also defined. Similarly, certain terms that describe activities and tactics commonly undertaken by extremists are also included. Significant groups, organizations, movements, and publications that are important for an understanding of terrorism/extremism in the United States and that may be encountered by law enforcement officers and prosecutors are also documented. Inasmuch as this publication is primarily intended to define terms, individuals indexed by name are limited in occurrence. However, there are some people who are of such importance to certain segments of the extremist movement that their very names are equated with that cause. Therefore, some of the better-known terrorists are included.
Marines are personally responsible for all content they publish on social networking sites, blogs, or other websites. In addition to ensuring Marine Corps content is accurate and appropriate, Marines also must be thoughtful about the non-Marine related content they post, since the lines between a Marine’s personal and professional life often blur in the online space. Marines must be acutely aware that they lose control over content they post on the Internet and that many social media sites have policies that give these sites ownership of all content and information posted or stored on those systems. Thus Marines should use their best judgment at all times and keep in mind how the content of their posts will reflect upon themselves, their unit, and the Marine Corps.
**************** UNCLASSIFIED// ****************
Subject: INTERIM GUIDANCE FOR INTERNET-BASED CAPABILITIES
Originator: COMNAVNETWARCOM VIRGINIA BEACH VA(UC)
DTG: 181714Z Mar 10
Tactical combat casualty care (TCCC) is the pre-hospital care rendered to a casualty in a tactical, combat environment. The principles of TCCC are fundamentally different from those of traditional civilian trauma care where most medical providers and medics train. These differences are based on both the unique patterns and types of wounds that are suffered in combat and the tactical conditions medical personnel face in combat. Unique combat wounds and tactical conditions make it difficult to determine which intervention to perform at what time. Besides addressing a casualty’s medical condition, responding medical personnel must also address the tactical situation faced while providing casualty care in combat. A medically correct intervention performed at the wrong time may lead to further casualties. Put another way, “good medicine may be bad tactics,” which can get the rescuer and casualty killed. To successfully navigate these issues, medical providers must have skills and training oriented to combat trauma care, as opposed to civilian trauma care.
ROCIC Law Enforcement Guide to International Names, 2010.
(U//FOUO) U.S. Army Contracting Basics Smartcard, February 2008.
Images from GeoEye. See also: Iran Nuclear Sites: Bushehr Nuclear Power Plant
The unit radio operator (RO) provides platoon- to brigade-level maneuver leaders a command and control capability that is critical to mission success. The RO is more than a Soldier who carries the radio for the commander, serves as the commander’s driver, or provides the commander personal security, although he often serves in these functions. The RO is the commander’s tactical information manager. The process for selecting and training an RO varies widely and is based on the role the unit commander intends the RO to perform; however, there are common factors that every maneuver RO should possess in order to enable effective unit command and control.
Air Force personnel should not access the WikiLeaks website to view or download the publicized classified information. Doing so would introduce potentially classified infonnation on unclassified networks. There has been rumor that the information is no longer classified since it resides in the public domain. This is NOT true. Executive Order 13526, Section 1.1 ( 4)( c) states “Classified Information shall not be declassified automatically as a result of any unauthorized disclosure of identical or similar information …