Department of Justice Lists Survivalists, Constitutionalists in Extremism Guide

A recent guide from the Department of Justice detailing terms and concepts used by “extremist” groups lists “constitutionalists” and “survivalists” . The 120-page, “Law Enforcement Sensitive” guide to “Investigating Terrorism and Criminal Extremism” describes itself as “a glossary designed primarily as a tool for criminal justice professionals to enhance their understanding of words relating to extremist terminology, phrases, activities, symbols, organizations, and selected names that they may encounter while conducting criminal investigations or prosecutions of members of extremist organizations.” Constitutionalist, which is defined as an “adherent or advocate of constitutionalism or of an existing constitution” by Random House’s 2010 Dictionary, is described in the report as a “generic term for members of the ‘patriot’ movement”. Survivalists are described in the document as fearing a “coming collapse of civilization” and are trying to prepare themselves for this collapse. Such individuals are said to have “typically stockpiled food, water, and weapons, especially the latter, and instructed themselves on topics ranging from first aid to childbirth to edible plants”.

DoJ Terrorism and Criminal Extremism Terms and Concepts Guide

In order for criminal justice professionals to effectively combat terrorism/extremism, it is imperative to obtain as much information as possible. Extremist groups often develop languages of their own. Some have created terms that are unique in the English language, while others have given new or expanded meaning to relatively common words and phrases. In addition, certain symbols, events, organizations, and individuals have particular significance for members of some extremist organizations, none of which may be familiar to an investigator or prosecutor who has not previously been involved with such cases. Investigating Terrorism and Criminal Extremism—Terms and Concepts is a glossary designed primarily as a tool for criminal justice professionals to enhance their understanding of words relating to extremist terminology, phrases, activities, symbols, organizations, and selected names that they may encounter while conducting criminal investigations or prosecutions of members of extremist organizations. Included are terms that may be germane to members of an extremist movement. Also defined are words that are singularly employed by specific extremist groups. Legal terms that have been given new meanings by groups’ adherents are also defined. Similarly, certain terms that describe activities and tactics commonly undertaken by extremists are also included. Significant groups, organizations, movements, and publications that are important for an understanding of terrorism/extremism in the United States and that may be encountered by law enforcement officers and prosecutors are also documented. Inasmuch as this publication is primarily intended to define terms, individuals indexed by name are limited in occurrence. However, there are some people who are of such importance to certain segments of the extremist movement that their very names are equated with that cause. Therefore, some of the better-known terrorists are included.

USMC Online Social Media Guidance for Unofficial Internet Posts

Marines are personally responsible for all content they publish on social networking sites, blogs, or other websites. In addition to ensuring Marine Corps content is accurate and appropriate, Marines also must be thoughtful about the non-Marine related content they post, since the lines between a Marine’s personal and professional life often blur in the online space. Marines must be acutely aware that they lose control over content they post on the Internet and that many social media sites have policies that give these sites ownership of all content and information posted or stored on those systems. Thus Marines should use their best judgment at all times and keep in mind how the content of their posts will reflect upon themselves, their unit, and the Marine Corps.

(U//FOUO) U.S. Army Tactical Combat Casualty Care Handbook

Tactical combat casualty care (TCCC) is the pre-hospital care rendered to a casualty in a tactical, combat environment. The principles of TCCC are fundamentally different from those of traditional civilian trauma care where most medical providers and medics train. These differences are based on both the unique patterns and types of wounds that are suffered in combat and the tactical conditions medical personnel face in combat. Unique combat wounds and tactical conditions make it difficult to determine which intervention to perform at what time. Besides addressing a casualty’s medical condition, responding medical personnel must also address the tactical situation faced while providing casualty care in combat. A medically correct intervention performed at the wrong time may lead to further casualties. Put another way, “good medicine may be bad tactics,” which can get the rescuer and casualty killed. To successfully navigate these issues, medical providers must have skills and training oriented to combat trauma care, as opposed to civilian trauma care.

(U//FOUO) U.S. Army Radio Operator Handbook

The unit radio operator (RO) provides platoon- to brigade-level maneuver leaders a command and control capability that is critical to mission success. The RO is more than a Soldier who carries the radio for the commander, serves as the commander’s driver, or provides the commander personal security, although he often serves in these functions. The RO is the commander’s tactical information manager. The process for selecting and training an RO varies widely and is based on the role the unit commander intends the RO to perform; however, there are common factors that every maneuver RO should possess in order to enable effective unit command and control.

U.S. Air Force Warning Against Accessing WikiLeaks

Air Force personnel should not access the WikiLeaks website to view or download the publicized classified information. Doing so would introduce potentially classified infonnation on unclassified networks. There has been rumor that the information is no longer classified since it resides in the public domain. This is NOT true. Executive Order 13526, Section 1.1 ( 4)( c) states “Classified Information shall not be declassified automatically as a result of any unauthorized disclosure of identical or similar information …

(U//FOUO) U.S. Army “Unit RESET” Redeployment Handbook

For purposes of this handbook, unit RESET is the process a unit uses to plan and execute those critical tasks needed to restore the unit to combat readiness after redeployment. This process must be carefully planned and synchronized by all stakeholders, beginning with actions a unit sets in place before the unit deploys. The unit follows the RESET model published in Army RESET ordersand executes RESET tasks while still in theater to redeploy and return the unit to collective training capability as quickly as possible. This enormous task is complex and requires detailed planning, clear communication and intent, and strong unit leadership not only from the unit conducting RESET but also from those supporting the mission (e.g., garrison, contractors, and other Department of Defense organizations). The goal is returning the unit to combat readiness quickly, efficiently, and—most importantly—safely.

(U//FOUO) Commander’s Emergency Response Program (CERP) Handbook

The Commander’s Emergency Response Program (CERP) has become a critical capability in the commander’s toolbox for conducting stability operations. CERP funds provide tactical commanders a means to conduct multiple stability tasks that have traditionally been performed by U.S., foreign, or indigenous professional civilian personnel or agencies. These tasks include but are not limited to the reconstruction of infrastructure, support to governance, restoration of public services, and support to economic development. This handbook focuses on basic tactics, techniques, and procedures (TTP) for the application of the CERP. Its intended audience is the brigade, battalion, and provincial reconstruction team commander and staff. This handbook is based on lessons learned and best practices in use today in both Iraq and Afghanistan and identifies the training, planning, and operational procedures required to fund projects and services the commander requires during the conduct of stability operations. This handbook also provides the TTP to guide the commander through the regulatory and administrative requirements of the CERP.

Money as a Weapon System Afghanistan (MAAWS-A) SOP

The purpose of the CERP program is to enable commanders to respond to urgent humanitarian relief and reconstruction requirements within their Area of Responsibility (AOR) by carrying out programs that will immediately assist the indigenous population. “Urgent” is defined as any chronic or acute inadequacy of an essential good or service that, in the judgment of the local commander, calls for immediate action. CERP is intended for projects that can be sustained by the local population or government and cost less than $500K per project. Projects equal to or greater than $500K are expected to be relatively few in number. Commanders are required to verify that local, national, donor nation, nongovernmental organizations or other aid or reconstruction resources are not reasonably available before using CERP funds.

Your Cellphone is Tracking You

For some time, it has been apparent that wireless telephone providers are storing location data on all of their customers. This information indicates the location of an individual’s cellular phone signal from its corresponding cellular tower to provide an approximate location of the user at any given time. Wireless providers are paid for supplying this information to law enforcement and the companies work to provide user-friendly guides to potential customers indicating what details they can provide. We have previously published law enforcement subpoena guides from Verizon, Nextel, MetroPCS, T-Mobile, AT&T, Sprint, among other service providers. Many of the companies providing this information to law enforcement take steps to hide the reality of their information retention. One guide in particular, regarding the Verizon Wireless Law Enforcement Resource Team, is labeled as being only distributable among law enforcement personnel. The guide advertises a wide variety of services available to law enforcement, including details on any user’s “cell sites” going back nearly one year. Another subpoena guide produced by Verizon offers a price list for these services including $125 an hour for “expert testimony”. Active surveillance using trap and trace is the most lucrative for Verizon with a price of up to $1000 a month, not including setup fees and other administrative costs.

(U//FOUO) DHS “Inspire” Al-Qaeda Magazine Warning

(U//FOUO) This product is intended to provide perspective and understanding of the nature and scope of potentially emergent threats and to assess the initial public responseto the posting of Inspire Magazine. It is also intended to assist federal, state, local, and tribal government agencies and authorities, the private sector, and other entities to develop priorities for protective and support measures relating to an existing or emerging threat to homeland security.

Foreign Narcotics Kingpin Designation Act Overview

The Kingpin Act blocks all property and interests in property, subject to U.S. jurisdiction, owned or controlled by significant foreign narcotics traffickers as identified by the President. In addition, the Kingpin Act blocks the property and interests in property, subject to U.S. jurisdiction, of foreign persons designated by the Secretary of Treasury, in consultation with the Attorney General, the Director of Central Intelligence, the Director of the Federal Bureau of Investigation, the Administrator of the Drug Enforcement Administration, the Secretary of Defense, and the Secretary of State, who are found to be: (1) materially assisting in, or providing financial or technological support for or to, or providing goods or services in support of, the international narcotics trafficking activities of a person designated pursuant to the Kingpin Act; (2) owned, controlled, or directed by, or acting for or on behalf of, a person designated pursuant to the Kingpin Act; or (3) playing a significant role in international narcotics trafficking.