To locate your presence on the web, search for your name, names of family members, email addresses, phone numbers, home addresses, and social media usernames using Google. Once you have located information that you want removed, record your findings to keep track of the removal process. Please note that the information presented here about how to remove personal details from data aggregators is subject to change.
Tag Archive for Department of Defense
Department of Defense
DoD Online Privacy and Operational Security Smart Cards: Photo Sharing Services
Joint Improvised Explosive Device Defeat Organization
Joint Improvised-Threat Defeat Agency Global IED Reports June 2016
Department of Defense, U.S. Northern Command
DoD-NORTHCOM Defense Support of Civil Authorities Republican National Convention 2016 Presentation
On order and in response to natural/manmade incidents, the Defense Coordinating Officer / Defense Coordinating Element (DCO/DCE) anticipates and conducts Defense Support of Civil Authorities (DSCA) operations coordinating Title 10 forces and resources in support of the Federal Primary Agency (PA) in order to minimize impacts to the American people, infrastructure and environment.
Department of Defense, Joint Chiefs of Staff, U.S. Army
Joint Staff Strategic Assessment: Maneuver and Engagement in the Narrative Space
This paper was produced in support of the Strategic Multi-layer Assessment (SMA) of the Islamic State of Iraq and the Levant (ISIL) led by Joint Staff J39 in support of the Special Operations Command Central (SOCCENT). The paper leverages and melds the latest thinking of academic and operational subject matter experts in fields of organizational and social dynamics, network analysis, psychology, information operations and narrative development, social media analysis, and doctrine development related to aspects of maneuver and engagement in the narrative space.
Department of Defense, Department of Homeland Security, Department of Justice, Office of the Director of National Intelligence
DoD, DoJ, DHS, ODNI Sharing Cyber Threat Indicators and Defensive Measures by the Federal Government
Department of Defense
(U//FOUO) DoD Biometrics Capstone Concept of Operations
A biometric is a measurable physical characteristic or personal behavior trait used to recognize the identity or verify the claimed identity of an individual. Fingerprints are an example of a physical biometric characteristic. Behavioral biometric characteristics like handwriting are learned and acquired over time. Biometrics is the process of recognizing an individual based on measurable anatomical, physiological and behavioral characteristics. Employing biometrics can help positively identify adversaries, allies and neutral persons. This is particularly useful when facing adversaries who rely on anonymity to operate. Biometrics is not forensics even though the two can, and often are, employed in concert. Forensics involves the use of scientific analysis to link people, places, things and events while biometrics involves the use of automated processes to identify people based on their personal traits. Because of the interrelationship between biometrics and forensics, the Department of Defense (DOD) intends to develop a single concept of operation (CONOP) in the future describing how biometrics and forensics can be employed in a complementary manner.
Department of Defense
DoD Phishing Warfare Brochure and Fact Sheet
Department of Defense
(U//FOUO) Department of Defense Mission Analysis for Cyber Operations
This report fulfills the requirement contained in the National Defense Authorization Act (NDAA) for Fiscal Year 2014, Section 933 “Mission Analysis for Cyber Operations of the Department of Defense (DoD).” The Department undertook an accelerated but deliberate process to conduct the analysis, the outcomes of which are contained in this report. The analysis addressed each sub-section of the statute and was fully vetted across the Department. The results of this analysis reflect the Department’s current view of its requirements for successful conduct of cyberspace operations, leveraging a Total Force solution. As cyberspace capabilities, force structure, and command and control (C2) constructs evolve, the Department will conduct periodic reviews of its cyberspace requirements and adjust them as necessary.
United States
American Psychological Association Review of Ethical Guidelines, Interrogations and Torture
In November 2014, the Board of Directors of the American Psychological Association engaged our Firm to conduct an independent review of allegations that had been made regarding APA’s issuance of ethical guidelines in 2002 and 2005, and related actions. These ethical guidelines determined whether and under what circumstances psychologists who were APA members could ethically participate in national security interrogations. The gist of the allegations was that APA made these ethics policy decisions as a substantial result of influence from and close relationships with the U.S. Department of Defense (DoD), the Central Intelligence Agency (CIA), and other government entities, which purportedly wanted permissive ethical guidelines so that their psychologists could continue to participate in harsh and abusive interrogation techniques being used by these agencies after the September 11 attacks on the United States. Critics pointed to alleged procedural irregularities and suspicious outcomes regarding APA’s ethics policy decisions and said they resulted from this improper coordination, collaboration, or collusion. Some said APA’s decisions were intentionally made to assist the government in engaging in these “enhanced interrogation techniques.” Some said they were intentionally made to help the government commit torture.
Department of Defense
Department of Defense Law of War Manual June 2015
The law of war is part of who we are. George Washington, as Commander in Chief of the Continental Army, agreed with his British adversary that the Revolutionary War would be “carried on agreeable to the rules which humanity formed” and “to prevent or punish every breach of the rules of war within the sphere of our respective commands.” During the Civil War, President Lincoln approved a set of “Instructions for the Government of the Armies of the United States in the Field,” which inspired other countries to adopt similar codes for their armed forces, and which served as a template for international codifications of the law of war.
Central Intelligence Agency, Department of Defense, Department of Justice, National Security Agency, Office of the Director of National Intelligence
DoD-DoJ-CIA-NSA-ODNI Inspectors General Report on the President’s Surveillance Program
Department of Commerce, Department of Defense, Department of Energy, Department of Health and Human Services, Department of Homeland Security, Department of Justice, Department of the Treasury, Office of the Director of National Intelligence
DHS Privacy and Civil Liberties Assessment Report on Executive Order 13636
Section 5 of Executive Order 13636 (Executive Order) requires the DHS Chief Privacy Officer and Officer for Civil Rights and Civil Liberties to assess the privacy and civil liberties impacts of the activities the Department of Homeland Security (DHS, or Department) undertakes pursuant to the Executive Order and to provide those assessments, together with recommendations for mitigating identified privacy risks, in an annual public report. In addition, the DHS Privacy Office and the Office for Civil Rights and Civil Liberties (CRCL) are charged with coordinating and compiling the Privacy and Civil Liberties assessments conducted by Privacy and Civil Liberties officials from other Executive Branch departments and agencies with reporting responsibilities under the Executive Order.
Department of Defense
Department of Defense Cyber Strategy April 2015
In concert with other agencies, the United States’ Department of Defense (DoD) is responsible for defending the U.S. homeland and U.S. interests from attack, including attacks that may occur in cyberspace. In a manner consistent with U.S. and international law, the Department of Defense seeks to deter attacks and defend the United States against any adversary that seeks to harm U.S. national interests during times of peace, crisis, or conflict. To this end the Defense Department has developed capabilities for cyber operations and is integrating those capabilities into the full array of tools that the United States government uses to defend U.S. national interests, including diplomatic, informational, military, economic, financial, and law enforcement tools.
Department of Defense
Defense Personnel Security Research Center Counterintelligence Reporting Essentials (CORE) Guide
Supervisors and coworkers are willing to report on behaviors that have a clear connection to security, such as transmitting classified documents to unauthorized personnel, but they are unwilling to report on colleagues’ personal problems, such as alcohol abuse. Because it was difficult to discern which reporting requirements were clearly related to security, there was very little reporting. PERSEREC, in collaboration with counterintelligence professionals, developed a clear, succinct list of “Coworker Reporting Essentials” (CORE) behaviors that could pose a possible threat to national security and thus should be reported if observed. The draft CORE was reviewed and edited by counterintelligence professionals at the Counterintelligence Field Activity (CIFA), and was coordinated by the DoD Investigative Working Group (IWG).
Department of Defense
DoD Cloud Computing Security Requirements Guide (SRG) Version 1
Cloud computing technology and services provide the Department of Defense (DoD) with the opportunity to deploy an Enterprise Cloud Environment aligned with Federal Department-wide Information Technology (IT) strategies and efficiency initiatives, including federal data center consolidation. Cloud computing enables the Department to consolidate infrastructure, leverage commodity IT functions, and eliminate functional redundancies while improving continuity of operations. The overall success of these initiatives depends upon well executed security requirements, defined and understood by both DoD Components and industry. Consistent implementation and operation of these requirements assures mission execution, provides sensitive data protection, increases mission effectiveness, and ultimately results in the outcomes and operational efficiencies the DoD seeks.
Department of Defense
DoD Open Business Model for Unmanned Aircraft Systems Ground Control Stations
Over the past twenty years, the Department of Defense (DoD) has acquired a diverse portfolio of Unmanned Aircraft Systems (UAS) across the Military Services to meet its national security needs. Newly emergent threats and evolving national security requirements are prompting the DoD to re-evaluate its entire portfolio of systems, while at the same time, seeking to reduce the total ownership costs including lifecycle sustainment costs of these systems. The anticipated reduction in defense spending in concert with advances in information technology provides ample opportunity for DoD to rethink how it acquires, designs, and builds its systems. As a result, DoD is adopting and exploiting open system design principles and architectures to increase competition, foster reuse across systems, and increase interoperability. This new acquisition model requires access to multi-vendor solutions to enable rapid insertion of new technologies to counter emerging threats, avoid technology obsolescence, and decrease time to field new capabilities. DoD is adopting an Open Business Model (OBM) to support the implementation of an Open Architecture (OA) for UAS Ground Control Stations (GCS) in order to drive greater acquisition efficiencies and reduce the total ownership costs. This new model is built upon several lessons learned from the Navy’s own open architecture efforts in the submarine community when it radically changed its approach to building weapon systems due to an emerging threat from an adversary in conjunction with declining budget.
Department of Defense
(U//FOUO) DoD Strategy for Defense Critical Infrastructure
The United States currently faces a dynamic, flexible, and very pragmatic adversary. Due to the unconventional nature of the terrorist threat and the asymmetrical tactics demonstrated both at home and abroad by our enemies, we can no longer expect the protection formerly provided by the oceans bordering our coasts to serve as an effective deterrent to attack. The attacks of September 11, 2001, and other events demonstrated that an act of terrorism can cause worldwide infrastructure asset disruption. In the past decade, hurricanes or other violent storms have also revealed that our infrastructure assets are at risk from destruction, degradation, or disruption by natural events. Given scarce resources, this Strategy’s objectives must be balanced against other priorities outlined in the National Defense Strategy.
Department of Defense
DoD Instruction: The Use of the National Guard for Defense Support of Civil Authorities
This instruction establishes policy, assigns responsibilities, and provides procedures for the use of the National Guard for Defense Support of Civil Authorities (DSCA) in accordance with the authority in section 502(f) of Title 32, United States Code (U.S.C.) (Reference (a)), DoD Directive (DoDD) 5111.1 (Reference (b)), and Deputy Secretary of Defense Memorandum (Reference (c)); the responsibilities and functions in accordance with DoDD 5111.13 (Reference (d)); and the guidance in DoDD 3025.18 (Reference (e)).
Department of Defense
DoD Unmanned Systems Integrated Roadmap FY2013-2038
The purpose of this Roadmap is to articulate a vision and strategy for the continued development, production, test, training, operation, and sustainment of unmanned systems technology across DoD. This “Unmanned Systems Integrated Roadmap” establishes a technological vision for the next 25 years and outlines actions and technologies for DoD and industry to pursue to intelligently and affordably align with this vision.
Joint Chiefs of Staff
(U//FOUO) Joint Chiefs of Staff Instruction: No-Strike and the Collateral Damage Estimation Methodology
Department of Defense
DoD White Paper: Anticipating Rare Events
Department of Defense
Defense Science Board Report: Understanding Human Dynamics
Understanding human dynamics is an essential aspect of planning for success across the full spectrum of military and national security operations. While the adage that “warfare is political conflict by other means” is widely recognized, combatants who underestimate the impact of the human element in military operations do so at their risk. During the Second World War and the reconstruction that followed, as well as during the Cold War, understanding human dynamics was considered essential. As conceptualized in this report, the term “human dynamics” comprises the actions and interactions of personal, interpersonal, and social/contextual factors and their effects on behavioral outcomes. Human dynamics are influenced by factors such as economics, religion, politics, and culture. Culture is defined herein as the particular norms and beliefs held by every human, that impacts how individuals, groups and societies perceive, behave and interact.
Department of Defense
DoD Sociocultural Behavior Analysis and Modeling Technologies Presentation
Department of Defense
Sociocultural Behavior Research and Engineering in the Department of Defense Context
Significant progress has been made toward building a DoD capability for understanding sociocultural behavior, and some solutions have been delivered to military end users. However, there is much work to be done. The complexity of human behavior defies easy understanding or reliable forecasting. In the context of irregular warfare, counterinsurgency, post-conflict recovery, or any other mission setting of the Armed Forces, technology—including computational models—is essential to support decision making. That technology must be rooted in well-validated, inter-disciplinary theory, and applied appropriately, with recognition of its strengths and limitations.