Several US PACCOM Global Information Grid 3.0 Design Presentations from 2010 through 2011.
Tag Archive for Department of Defense
Department of Defense
Restricted U.S. Military Multi-Service Brevity Codes Manual
This publication will ease coordination and improve understanding during multi-Service operations. A Brevity code is a code which provides no security but which has as its sole purpose the shortening of messages rather than the concealment of their content (Joint Publication 1-02).
Department of Defense
Restricted U.S. Military Multi-Service Special Operations Forces Interoperability Manual
This multi-Service tactics, techniques, and procedures (MTTP) publication provides a comprehensive reference for commanders and staffs at the operational and tactical levels with standardized techniques and procedures to assist in planning and executing operations requiring integration of conventional forces and special operations forces (CF/SOF) occupying the same operational environment (OE). This MTTP publication serves as a reference to ensure coordinated multi-Service operations for CF/SOF integration and interoperability (I&I) in order to generate timely actions and increased opportunities while reducing the potential for fratricide. The guidance provided in this publication addressing command and control, maneuver, fire support, and force capabilities fills a doctrinal void and provides a single source document that will enhance effectiveness and improve inter-Service coordination.
Department of Defense
DoD Email Discussing Anwar al-Awlaki’s 2002 Presentation at the Pentagon
Anwar Awlaki is the Imam at Dar Al-Hijrah in Falls Church, Va, which is one of the largest Islamic Centers in the United States. He is currently working on his PhD in Human Resource Development at George Washington University, received a Master of Education Leadership from San Diego state University and his BS in Civil Engineering from Colorado State University. He completed Islamic Studies in Yemen. He has been doing extensive public speaking on the above topics, especially since the events on September 11. Mr. Nihad Awad, President of the Counsel of American-Islamic Relations has also expressed interest in attending. Mr. Amr Moussa, the Secretary General of the Arab League, will be in D.C. on February 4th and 5th, although I don’t think that our luncheon will have the clout to get his attendance!
Department of Defense
(U//FOUO) U.S. Government Shutdown DoD Contingency Plan April 2011
This document provides guidance for identifying those missions and functions of the Department of Defense that may continue to be carried out in the absence of available appropriations. The information provided in this document is not exhaustive, but rather illustrative, and is intended primarily to assist in the identification of those activities that may be continued notwithstanding the absence of available funding authority in the applicable appropriations ( excepted activities). Activities that are determined not to be excepted, and which cannot be performed by utilizing military personnel in place of furloughed civilian personnel, will be suspended when appropriated funds expire. The Secretary of Defense may, at any time, determine that additional activities shall be treated as excepted.
Corporate, Department of Defense
HBGary DoD Cyber Warfare Support Work Statement
Cyber Warfare is warfare in the Cyberspace domain, which is defined by the SECDEF as “a global domain within the information environment consisting of the interdependent network of information technology infrastructures, including the internet, telecommunications networks, computer systems and embedded processors and controllers.” Cyber Warfare encompasses Computer Network Operations (e.g. Attack, Defend and Exploit,) Information Assurance, and the network operations that encompass Command, Control, Communications, Intelligence, Surveillance and Reconnaissance (C4ISR) and Information Operations (IO) functions that occur within the Cyberspace domain. This includes Computer Network Operations (CNO) against automated systems (e.g. C4ISR), and the interaction between the physical, social and biological networks that define human-machine interaction.
Department of Defense
DoD Manual for Civil Emergencies
This Manual assigns responsibilities, prescribes procedures, and provides guidance by which the Department of Defense responds to ALL HAZARDS in accordance with 42 U.S.C. 5121, et seq., as amended (hereafter referred to as the Stafford Act, reference (f)). Under the authority of the Civil Defense Act of 1950, 50 U.S.C. App. 2251, et seq., (reference (a)) and National Security Directive 66 (dated March 16, 1992) (reference (m)) this Manual supports the National civil defense policy and Federal and State civil defense programs in cooperation with the Federal Emergency Management Agency (FEMA).
Department of Defense, Department of Homeland Security
DHS-DoD Memorandum of Agreement on Cybersecurity October 2010
The purpose of the Agreement is to set forth terms by which DHS and DoD will provide personnel, equipment, and facilities in order to increase interdepartmental collaboration in strategic planning for the Nation’s cybersecurity, mutual support for cybersecurity capabilities development, and synchronization of current operational cybersecurity mission activities. Implementing this Agreement will focus national cybersecurity efforts, increasing the overall capacity and capability of both DHS’s homeland security and DoD’s national security missions, while providing integral protection for privacy, civil rights, and civil liberties.
Department of Defense
DoD Defense Support to Civil Authorities Handbook
The most legally sensitive function in DSCA is Military Law Enforcement. Consequently, to prevent violations of the law, all military personnel should be educated on MLE. The main legal obstacle to the use of the military for law enforcement is the Posse Comitatus Act (PCA), discussed briefly in Section 2.3.1 of this chapter. (For more detail on PCA, see Annex A.) The PCA affects National Guard (either in State Active Duty (SAD) or Title 32) and federal forces (Title 10) differently. Thus, it is very important to understand the status of military personnel prior to mission assignment.
Corporate, Department of Defense
DoD Biometrics HIIDE Device User Guide
The HIIDE includes two separate cameras for imaging an individual’s irises and face, and a sensor pad for scanning fingerprints. These three sensors capture the minute details of a subject’s iris, fingerprint and face, as digital photographs, or “scans.” The HIIDE™ translates the photographic data into a binary code and links that code to biographic data about the individual, such as name and a personal identification number. The HIIDE then processes the code and biographic data and builds a portfolio for the individual that is stored in a database. Once an individual has had a record created, or has been “enrolled,” that individual is part of the HIIDE database. One can “recognize,” or confirm that individual’s identity in the future by comparing a live scan of the subjects: iris, fingerprints and/or face to the biometrics contained in the database.
Department of Defense
(U//FOUO) Joint Battle Management Command and Control (JBMC2) Roadmap Version 1.0
This roadmap will be the vehicle for prioritizing, aligning, and synchronizing Service JBMC2 architectural and acquisition efforts. Where policy and other acquisition initiatives are defined to drive JBMC2 developments and related activities, the specific means of application to JBMC2 will be via updates to this roadmap and decisions made by the Under Secretary of Defense for Acquisition, Technology, and Logistics (USD(AT&L)) and U.S. Joint Forces Command (USJFCOM) to ensure overall harmonization across affected efforts and programs. This roadmap provides a strategy with three major parts for integrating current and planned JBMC2 capabilities.
Department of Defense
Defense Readiness Reporting System Software User Manual 4.5.12
The Secretary of Defense directed that DRRS reflect a “transformational” response to significant changes in the strategic environment leading to increasing focus on capabilities-based operations and the rapid tailoring of resources. This transformation provides a unique and timely opportunity to change how the Department measures, assesses, and reports its readiness, and how it uses readiness information in planning and contingency response. Current global operations reinforce the urgent need for a readiness system that can provide accurate, relevant, and timely information to support operational planning as well as offer risk assessments of multiple simultaneous contingencies in the context of the Defense Strategy.
Department of Defense
DoD Afghan Economic Sovereignty, Mineral Wealth Briefing
DoD Afghan Economic Sovereignty, Mineral Wealth Briefing, June 14, 2010.
Department of Defense
Iraq/Afghanistan Business Development and Outreach Program (SDOP) SOP
The purpose of the Business Development and Outreach Program (BDOP) Standard Operating Procedures (SOP) is to define the BOOP mission, roles and responsibilities of the Business Development Consultants (SOC) and the J3lDirector, BDOP, U.S. Government contracting procedures, ethical guidelines, BDOP initiatives, education, training and consulting support, vendor engagements, local engagement with government and business leaders, and cultural orientation for u.s. Forces Iraq/Afghanistan and Iraqi/Afghan interlocutors.
Department of Defense
DoD Theater Army Operational & Organizational (O&O) Concept (v5.4)
This Organization and Operations plan (O&O) is based upon a revised operational concept for Theater Army developed as a result of analysis, discussion, and decisions made by senior Army leaders under Army Campaign Plan (ACP) Decision Point 129 (DP 129), Global Command & Control (C2) Laydown, and DP 123, Division, Corps, and Theater Army Design Refinement. The new Army strategy for global command and control of Army forces relies on the Modular Corps headquarters to C2 major operations instead of theater armies. Under the revised operational concept, theater armies no longer require large Operational Command Posts (OCP) to serve as the base organization for the formation of Joint Task Force (JTF) or Joint Force Land Component Command (JFLCC)/Army Force (ARFOR) headquarters to command and control major operations.
Department of Defense
DoD Network Quantitative Capability Delivery Increments (QCDI) Overview
FOUO DoD Network Quantitative Capability Delivery Increments (QCDI) Overview, May 12, 2010.
Department of Defense, U.S. Forces Iraq
(U//FOUO) U.S. Forces – Iraq Armed Civilian Contractor Oversight Operations Order
Eight FOUO documents comprising the U.S. Forces – Iraq Armed Civilian Contractor Oversight Operations Orders from January-March 2010.
Iraq, Multi-National Corps Iraq, U.S. Forces Iraq
U.S. Forces – Iraq Private Security Contractors (PSC) Registration Requirements
1. (U) SITUATION: USF-I, DEPARTMENT OF STATE AND NUMEROUS OTHER ENTITIES IN IRAQ HAVE CONTRACTED SECURITY OPERATIONS FOR FORWARD OPERATING BASES (FOB) AND PERSONAL SECURITY DETAILS (PSD) TO PRIVATE SECURITY CONTRACTORS (PSC). GOVERNMENT OF IRAQ, MINISTRY OF INTERIOR (MOI) HAS IN RECENT MONTHS INDICATED THAT CONTRACTED SECURITY COMPANIES ARE NOT OPERATING WITH THE THE PURVIEW OF ESTABLISHED LAW.
Joint Chiefs of Staff
Operation Northwoods
Operation Northwoods was a plan circulated in the U.S. government in 1962 to stage false flag terrorist attacks inside the U.S. and abroad to provoke “military intervention in Cuba”. The plan called for Central Intelligence Agency (CIA) or other operatives to commit genuine acts of terrorism in U.S. cities and elsewhere. These acts of terrorism were to be blamed on Cuba in order to create public support for a war against that nation, which had recently become communist under Fidel Castro. One part of the Operation Northwoods plan was to “develop a Communist Cuban terror campaign in the Miami area, in other Florida cities and even in Washington.”
Joint Chiefs of Staff
Joint Publication 3-07.2 Antiterrorism
This publication has been prepared under the direction of the Chairman of the Joint Chiefs of Staff. It sets forth joint doctrine to govern the activities and performance of the Armed Forces of the United States in operations and provides the doctrinal basis for interagency coordination and for US military involvement in multinational operations. It provides military guidance for the exercise of authority by combatant commanders and other joint force commanders (JFCs) and prescribes joint doctrine for operations and training. It provides military guidance for use by the Armed Forces in preparing their appropriate plans.
Department of Defense
Mine Resistant Ambush Protected (MRAP) Vehicle Safety
• The concern: Theater tactical vehicle mishaps
• CENTCOM vehicle accident data Jan 2003 – Aug 2008
• 246 fatalities
• 900 serious injuries
• MNC-I data for CY05
• 384 rollovers
• 71 fatalities
Department of Defense
DoD Seeking Radar Commonality: Multifunctional Phased Array Radar
Impact of the Radar JAT
• Designated specific radar acquisition programs as Special Interest
– USMC Ground/Air Task Oriented Radar
– USMC AN/TPS-59 Radar Product Improvement Program
– USAF Three Dimensional Expeditionary Long Range Radar
• Directed Radar Open Systems Architecture Defense Support Team stand-up.
Department of Defense
Commercial SATCOM Protection Performance Criteria
DoD Commercial SATCOM Study
• Conducted from March 2004-March 2005, under sponsorship of:
– Undersecretary of the Air Force/DoD Executive Agent for Space
– Commander, U.S. Strategic Command
– Assistant Secretary of Defense (Networks & Information Integration)
• Deliverables
– ASD(NII) –Revised DoD Commercial SATCOM Fixed Satellite Services policy
– NSSO and USSTRATCOM
Department of Defense
National Security Space Acquisition Policy DoD Interim Guidance
The acquisition of DoD space systems results from the interaction of three complementary processes: the Joint Capabilities Integration and Development System under the authority of the Chairman of the Joint Chiefs of Staff; the Planning, Programming, Budgeting, and Execution process under the authority of the DoD Comptroller; and the NSS acquisition process under the authority of the DoD Space MDA. To work effectively, the acquisition process requires constant coordination among these processes and their authorities.
U.S. Army
Army Distributed Common Ground System (DCGS A) Commander’s Handbook
Access to the Intelligence Enterprise is through the Distributed Common Ground System-Army (DCGS-A). This Commander’s Handbook is an overview of the capabilities DCGS-A is providing to the commander. It addresses the benefits of employment of DCGS-A as a whole, rather than any particular fielded version. DCGS-A, as a component to the DoD Distributed Common Ground/Surface System Mission Area program, is greatly contributing to the Joint and combined Warfighter needs.