The current Department of Defense manual on the procedures for intercepting wire, electronic and oral communications for law enforcement. The manual also discusses “access to electronic communications in electronic storage or in a remote computing service.”
Joint and Coalition Operational Analysis (JCOA) Reducing and Mitigating Civilian Casualties: Enduring Lessons
The United States has long been committed to upholding the Law of Armed Conflict (LOAC) and minimizing collateral damage, which includes civilian casualties (CIVCAS) and unintended damage to civilian objects (facilities, equipment, or other property that is not a military objective). In support of these goals, the U.S. military developed capabilities for precision engagements and accurately identifying targets, such as the development of refined targeting processes and predictive tools to better estimate and minimize collateral damage. These capabilities permitted the conduct of combat operations with lower relative numbers of civilian casualties compared to past operations. However, despite these efforts, and while maintaining compliance with the laws of war, the U.S. military found over the past decade that these measures were not always sufficient for meeting the goal of minimizing civilian casualties when possible. Resulting civilian casualties ran counter to U.S. desires and public statements that the United States did “everything possible” to avoid civilian casualties, and therefore caused negative second-order effects that impacted U.S. national, strategic, and operational interests.
The Democratic People’s Republic of Korea (DPRK) remains one of the United States’ most critical security challenges in Northeast Asia. North Korea remains a security threat because of its willingness to undertake provocative and destabilizing behavior, including attacks on the Republic of Korea (ROK), its pursuit of nuclear weapons and long-range ballistic missiles, and its willingness to proliferate weapons in contravention of its international agreements and United Nations Security Council Resolutions. North Korean aspiration for reunification – attainable in its mind in part by expelling U.S. forces from the Peninsula – and its commitment to perpetuating the Kim family regime are largely unchanged since the nation’s founding in 1948, but its strategies to achieve these goals have evolved significantly. Under Kim Jong Il, DPRK strategy had been focused on internal security; coercive diplomacy to compel acceptance of its diplomatic, economic and security interests; development of strategic military capabilities to deter external attack; and challenging the ROK and the U.S.-ROK Alliance. We anticipate these strategic goals will be consistent under North Korea’s new leader, Kim Jong Un.
The CERP was formally established by the Coalition Provisional Authority in July 2003 to provide U.S. military commanders in Iraq with a stabilization tool that benefitted the Iraqi people. The program supported urgent, small-scale projects that local governments could sustain, that generally cost less than $25,000, and that provided employment. DoD defined urgent as “any chronic and acute inadequacy of an essential good or service that, in the judgment of the local commander, calls for immediate action.” Among other things, CERP funds were used to: build schools, health clinics, roads, and sewers; pay condolence payments; support economic development; purchase equipment; and perform civic cleanup. DoD used CERP as a “combat multiplier” whose projects helped improve and maintain security in Iraq through non-lethal means. The program was considered “critical to supporting military commanders in the field in executing counterinsurgency operations” and its pacification effects important to saving lives.
Defending U.S. territory and the people of the United States is the highest priority of the Department of Defense (DoD), and providing appropriate defense support of civil authorities (DSCA) is one of the Department’s primary missions. This Strategy for Homeland Defense and Defense Support of Civil Authorities orients the Department towards an increasingly complex strategic environment. It emphasizes innovative approaches, greater integration, deepening of external partnerships, and increased effectiveness and efficiencies in DoD’s homeland activities. It applies the vital capabilities of the Total Force – in the Active and Reserve Components – to make the nation more secure and resilient. Finally, the Strategy guides future decisions on homeland defense and civil support issues consistent with the Defense Strategic Guidance and the Quadrennial Defense Review (QDR).
Establishes DoD policy, assigns responsibilities, and provides procedures for DoD support to Federal, State, tribal, and local civilian law enforcement agencies, including responses to civil disturbances within the United States, including the District of Columbia, the Commonwealth of Puerto Rico, the U.S. Virgin Islands, Guam, American Samoa, the Commonwealth of the Northern Mariana Islands, and any territory or possession of the United States or any other political subdivision thereof in accordance with DoDD 3025.18 (Reference (c)).
A 2009 document from the Office of the Director of National Intelligence and the Department of Defense creating performance standards for “successful” and “outstanding” employee performance within the U.S. intelligence community.
The following videos were released by Joint Task Force Guantanamo Public Affairs on March 1, 2013. They depict detainees in Camp 5 and 6 as well as the Expeditionary Legal Complex. Videos and photos of detainees held at Guantanamo are…
The policy of the U.S. Government is that all classified information must be appropriately safeguarded to assure the confidentiality, integrity, and availability of that information. This document provides procedural guidance for the protection, use, management, and dissemination of Sensitive Compartmented Information (SCI), and is applicable to the Department of Defense (DoD) to include DoD components and Government contractors who process SCI.
This Study Plan outlines the background, scope, strategic assumptions, study objectives, analysis methodology, scenario considerations, timeline, and management responsibilities in conducting the Homeland Defense and Civil Support Capabilities-based Assessment (HD/CS CBA) to include production of the Functional Area Analysis (FAA), Functional Needs Analysis (FNA) and a Joint Capabilities Document (JCD). This CBA, through the execution of the FAA, FNA. And JCD; identifies, describes, documents, and prioritizes DOD’s capability gaps and excesses in the HD/CS mission areas (to include the Mission Assurance (MA) function).
Joint and Coalition Operational Analysis (JCOA) Decade of War: Enduring Lessons from the Past Decade of Operations
In general, operations during the first half of the decade were often marked by numerous missteps and challenges as the US government and military applied a strategy and force suited for a different threat and environment. Operations in the second half of the decade often featured successful adaptation to overcome these challenges. From its study of these operations, JCOA identified overarching, enduring lessons for the joint force that present opportunities for the US to learn and improve, best practices that the US can sustain, and emerging risk factors that the US should address. These lessons were derived from JCOA’s 46 studies during this past decade and vetted through the Joint Staff J7-sponsored Decade of War working group in May 2012; input from working group members was consolidated into this report. This initial effort is envisioned to be the first volume in a sustained, multi-phased effort to identify critical, high-level lessons for the joint force.
Several tables displaying the current Department of Defense unmanned aircraft systems (UAS) inventory levels (FY2012 budgeted inventory) and planned inventory through FY2017. The information in the tables was taken from the recent Department of Defense Report to Congress on Future Unmanned Aircraft Systems Training, Operations, and Sustainability.
The Department of Defense (DoD) continues to increase its investment in unmanned aircraft systems (UAS) to meet battlefield commanders’ demand for their unique capabilities. The emphasis on long-endurance, unmanned intelligence, surveillance and reconnaissance (ISR) assets -many with strike capabilities – is a direct reflection of recent operational experience and further Combatant Commander demands. This increase in demand has resulted in a large number of UAS capable of a wide range of missions. This large number of fielded UAS has also driven a strong demand for access within the National Airspace System (NAS). This need for airspace access to test new systems, train operators, and conduct continental United States (CONUS)-based missions has quickly exceeded the current airspace available for military operations. The situation will only be exacerbated as units return from overseas contingencies.
The following map depicts the approximate locations of current and planned Department of Defense unmanned aircraft systems (UAS) activities inside the U.S. The locations, service branches, and types of UAS flown were obtained from several publicly released DoD presentations. If…
While reliance on UAS continues to grow, the ability to integrate UAS into the National Airspace System (NAS) to support operations, training, and testing has not kept pace. Routine access to exercise and execute Combatant Command (COCOM)-tasked missions, and to support broader military and civil missions such as Homeland Security (HLS), Homeland Defense (HD), and Defense Support of Civil Authorities (DSCA) is necessary. Current NAS access for UAS is greatly limited under interim FAA policies that govern UAS operations in the NAS. Currently, DoD UAS operations conducted outside of Restricted, Warning and Prohibited areas are authorized under a temporary Certificate of Waiver or Authorization (COA) from the Federal Aviation Administration (FAA) or under limited conditions outlined in the 2007 DoD-FAA Memorandum of Agreement (MoA). Although DoD has been able to facilitate a small number of flights through the COA process, DoD has not been able to obtain the level of airspace access necessary to accomplish the wide range of DoD UAS missions at current and projected operational tempos.
This is the first report of progress in producing a NextGen Unmanned Aircraft Systems Research, Development and Demonstration Roadmap (NextGen UAS RD&D Roadmap). The activity was established to enable a responsive, efficient, timely, coordinated multiagency Research and Development (R&D) effort that will enable the U.S. to realize fully the benefits of Unmanned Aircraft Systems (UAS) in the National Airspace System (NAS).
U.S. and allied combat operations continue to highlight the value of unmanned systems in the modern combat environment. Combatant Commanders (CCDRs) and warfighters value the inherent features of unmanned systems, especially their persistence, versatility, and reduced risk to human life. The U.S. military Services are fielding these systems in rapidly increasing numbers across all domains: air, ground, and maritime. Unmanned systems provide diverse capabilities to the joint commander to conduct operations across the range of military operations: environmental sensing and battlespace awareness; chemical, biological, radiological, and nuclear (CBRN) detection; counter-improvised explosive device (C-IED) capabilities; port security; precision targeting; and precision strike. Furthermore, the capabilities provided by these unmanned systems continue to expand.
The President is authorized by the Constitution and laws of the United States to employ the Armed Forces of the United States to suppress insurrections, rebellions, and domestic violence under various conditions and circumstances. Planning and preparedness by the Federal Government and the Department of Defense for civil disturbances are important due to the potential severity of the consequences of such events for the Nation and the population.
This report provides an assessment of Department of Defense (DoD) efforts over the past two years to implement requirements set forth in the 2009 DoD Instruction 3000.05, Stability Operations. It highlights significant initiatives currently underway or planned throughout DoD and provides recommendations and key findings to achieve further progress.
Several reports from the Department of Defense’s Joint Spectrum Center were originally published in April 2010 by a small blog called DoD Leaks. The blog published less than a dozen documents over a two month span and then ceased all activity. The blog’s description states that it was created in response to Cryptome’s call for more publication of “for official use only” documents that are available in the public sphere. These documents relate to frequency allocation and electromagnetic interference tests conducted in relation to datalinks used by Predator drones.
Operational experiences in Iraq and Afghanistan support the continued need to eliminate barriers to information sharing that currently exist on DoD’s multiple networks. A concerted effort to unify the networks into a single information environment providing timely information to commanders will improve command and control, thus increasing our speed of action. Providing an information technology (IT) / National Security Systems (NSS) infrastructure that is accessible anywhere and anytime is key to ensuring the agility of the Department and allowing our most valuable resources, our people, nearly instant access to the information they need to make decisions in the execution of their missions. In turn, the Global Information Grid (GIG) must be designed and optimized to support warfighting functions of advantaged and disadvantaged users, to include mission partners, across the full range of military and National Security operations in any operational environment. The GIG must also be resilient and able to support the missions despite attacks by sophisticated adversaries.
The purpose of the NLW Reference Book is to provide a single source document that contains key information about NLW descriptions, effects, characteristics, concepts of employment, and associated operational parameters and considerations to enhance NLW education and training.
This handbook provides an understanding of the processes and procedures being employed by joint force commanders (JFCs) and their staffs to plan, execute, and assess counter threat finance (CTF) activities and integrate them into their joint operation/campaign plans. It provides fundamental principles, techniques, and considerations related to CTF that are being employed in the field and are evolving toward incorporation in joint doctrine.
Declassified DoD Inspector General Report on NSA Thinthread and Trailblazer Systems from December 15, 2004.
This multi-Service tactics, techniques, and procedures (MTTP) publication facilitates multi-Service coordination, integration, and regulation of airspace during exercises and operations where more than one Service shares airspace for operational use.