Tag Archive for Department of Defense

Restricted U.S. Military Multi-Service Special Operations Forces Interoperability Manual

This multi-Service tactics, techniques, and procedures (MTTP) publication provides a comprehensive reference for commanders and staffs at the operational and tactical levels with standardized techniques and procedures to assist in planning and executing operations requiring integration of conventional forces and special operations forces (CF/SOF) occupying the same operational environment (OE). This MTTP publication serves as a reference to ensure coordinated multi-Service operations for CF/SOF integration and interoperability (I&I) in order to generate timely actions and increased opportunities while reducing the potential for fratricide. The guidance provided in this publication addressing command and control, maneuver, fire support, and force capabilities fills a doctrinal void and provides a single source document that will enhance effectiveness and improve inter-Service coordination.

DoD Email Discussing Anwar al-Awlaki’s 2002 Presentation at the Pentagon

Anwar Awlaki is the Imam at Dar Al-Hijrah in Falls Church, Va, which is one of the largest Islamic Centers in the United States. He is currently working on his PhD in Human Resource Development at George Washington University, received a Master of Education Leadership from San Diego state University and his BS in Civil Engineering from Colorado State University. He completed Islamic Studies in Yemen. He has been doing extensive public speaking on the above topics, especially since the events on September 11. Mr. Nihad Awad, President of the Counsel of American-Islamic Relations has also expressed interest in attending. Mr. Amr Moussa, the Secretary General of the Arab League, will be in D.C. on February 4th and 5th, although I don’t think that our luncheon will have the clout to get his attendance!

(U//FOUO) U.S. Government Shutdown DoD Contingency Plan April 2011

This document provides guidance for identifying those missions and functions of the Department of Defense that may continue to be carried out in the absence of available appropriations. The information provided in this document is not exhaustive, but rather illustrative, and is intended primarily to assist in the identification of those activities that may be continued notwithstanding the absence of available funding authority in the applicable appropriations ( excepted activities). Activities that are determined not to be excepted, and which cannot be performed by utilizing military personnel in place of furloughed civilian personnel, will be suspended when appropriated funds expire. The Secretary of Defense may, at any time, determine that additional activities shall be treated as excepted.

HBGary DoD Cyber Warfare Support Work Statement

Cyber Warfare is warfare in the Cyberspace domain, which is defined by the SECDEF as “a global domain within the information environment consisting of the interdependent network of information technology infrastructures, including the internet, telecommunications networks, computer systems and embedded processors and controllers.” Cyber Warfare encompasses Computer Network Operations (e.g. Attack, Defend and Exploit,) Information Assurance, and the network operations that encompass Command, Control, Communications, Intelligence, Surveillance and Reconnaissance (C4ISR) and Information Operations (IO) functions that occur within the Cyberspace domain. This includes Computer Network Operations (CNO) against automated systems (e.g. C4ISR), and the interaction between the physical, social and biological networks that define human-machine interaction.

DoD Manual for Civil Emergencies

This Manual assigns responsibilities, prescribes procedures, and provides guidance by which the Department of Defense responds to ALL HAZARDS in accordance with 42 U.S.C. 5121, et seq., as amended (hereafter referred to as the Stafford Act, reference (f)). Under the authority of the Civil Defense Act of 1950, 50 U.S.C. App. 2251, et seq., (reference (a)) and National Security Directive 66 (dated March 16, 1992) (reference (m)) this Manual supports the National civil defense policy and Federal and State civil defense programs in cooperation with the Federal Emergency Management Agency (FEMA).

DHS-DoD Memorandum of Agreement on Cybersecurity October 2010

The purpose of the Agreement is to set forth terms by which DHS and DoD will provide personnel, equipment, and facilities in order to increase interdepartmental collaboration in strategic planning for the Nation’s cybersecurity, mutual support for cybersecurity capabilities development, and synchronization of current operational cybersecurity mission activities. Implementing this Agreement will focus national cybersecurity efforts, increasing the overall capacity and capability of both DHS’s homeland security and DoD’s national security missions, while providing integral protection for privacy, civil rights, and civil liberties.

DoD Defense Support to Civil Authorities Handbook

The most legally sensitive function in DSCA is Military Law Enforcement. Consequently, to prevent violations of the law, all military personnel should be educated on MLE. The main legal obstacle to the use of the military for law enforcement is the Posse Comitatus Act (PCA), discussed briefly in Section 2.3.1 of this chapter. (For more detail on PCA, see Annex A.) The PCA affects National Guard (either in State Active Duty (SAD) or Title 32) and federal forces (Title 10) differently. Thus, it is very important to understand the status of military personnel prior to mission assignment.

DoD Biometrics HIIDE Device User Guide

The HIIDE includes two separate cameras for imaging an individual’s irises and face, and a sensor pad for scanning fingerprints. These three sensors capture the minute details of a subject’s iris, fingerprint and face, as digital photographs, or “scans.” The HIIDE™ translates the photographic data into a binary code and links that code to biographic data about the individual, such as name and a personal identification number. The HIIDE then processes the code and biographic data and builds a portfolio for the individual that is stored in a database. Once an individual has had a record created, or has been “enrolled,” that individual is part of the HIIDE database. One can “recognize,” or confirm that individual’s identity in the future by comparing a live scan of the subjects: iris, fingerprints and/or face to the biometrics contained in the database.

(U//FOUO) Joint Battle Management Command and Control (JBMC2) Roadmap Version 1.0

This roadmap will be the vehicle for prioritizing, aligning, and synchronizing Service JBMC2 architectural and acquisition efforts. Where policy and other acquisition initiatives are defined to drive JBMC2 developments and related activities, the specific means of application to JBMC2 will be via updates to this roadmap and decisions made by the Under Secretary of Defense for Acquisition, Technology, and Logistics (USD(AT&L)) and U.S. Joint Forces Command (USJFCOM) to ensure overall harmonization across affected efforts and programs. This roadmap provides a strategy with three major parts for integrating current and planned JBMC2 capabilities.

Defense Readiness Reporting System Software User Manual 4.5.12

The Secretary of Defense directed that DRRS reflect a “transformational” response to significant changes in the strategic environment leading to increasing focus on capabilities-based operations and the rapid tailoring of resources. This transformation provides a unique and timely opportunity to change how the Department measures, assesses, and reports its readiness, and how it uses readiness information in planning and contingency response. Current global operations reinforce the urgent need for a readiness system that can provide accurate, relevant, and timely information to support operational planning as well as offer risk assessments of multiple simultaneous contingencies in the context of the Defense Strategy.

Iraq/Afghanistan Business Development and Outreach Program (SDOP) SOP

The purpose of the Business Development and Outreach Program (BDOP) Standard Operating Procedures (SOP) is to define the BOOP mission, roles and responsibilities of the Business Development Consultants (SOC) and the J3lDirector, BDOP, U.S. Government contracting procedures, ethical guidelines, BDOP initiatives, education, training and consulting support, vendor engagements, local engagement with government and business leaders, and cultural orientation for u.s. Forces Iraq/Afghanistan and Iraqi/Afghan interlocutors.

DoD Theater Army Operational & Organizational (O&O) Concept (v5.4)

This Organization and Operations plan (O&O) is based upon a revised operational concept for Theater Army developed as a result of analysis, discussion, and decisions made by senior Army leaders under Army Campaign Plan (ACP) Decision Point 129 (DP 129), Global Command & Control (C2) Laydown, and DP 123, Division, Corps, and Theater Army Design Refinement. The new Army strategy for global command and control of Army forces relies on the Modular Corps headquarters to C2 major operations instead of theater armies. Under the revised operational concept, theater armies no longer require large Operational Command Posts (OCP) to serve as the base organization for the formation of Joint Task Force (JTF) or Joint Force Land Component Command (JFLCC)/Army Force (ARFOR) headquarters to command and control major operations.

U.S. Forces – Iraq Private Security Contractors (PSC) Registration Requirements


Operation Northwoods

Operation Northwoods was a plan circulated in the U.S. government in 1962 to stage false flag terrorist attacks inside the U.S. and abroad to provoke “military intervention in Cuba”. The plan called for Central Intelligence Agency (CIA) or other operatives to commit genuine acts of terrorism in U.S. cities and elsewhere. These acts of terrorism were to be blamed on Cuba in order to create public support for a war against that nation, which had recently become communist under Fidel Castro. One part of the Operation Northwoods plan was to “develop a Communist Cuban terror campaign in the Miami area, in other Florida cities and even in Washington.”

Joint Publication 3-07.2 Antiterrorism

This publication has been prepared under the direction of the Chairman of the Joint Chiefs of Staff. It sets forth joint doctrine to govern the activities and performance of the Armed Forces of the United States in operations and provides the doctrinal basis for interagency coordination and for US military involvement in multinational operations. It provides military guidance for the exercise of authority by combatant commanders and other joint force commanders (JFCs) and prescribes joint doctrine for operations and training. It provides military guidance for use by the Armed Forces in preparing their appropriate plans.

National Security Space Acquisition Policy DoD Interim Guidance

The acquisition of DoD space systems results from the interaction of three complementary processes: the Joint Capabilities Integration and Development System under the authority of the Chairman of the Joint Chiefs of Staff; the Planning, Programming, Budgeting, and Execution process under the authority of the DoD Comptroller; and the NSS acquisition process under the authority of the DoD Space MDA. To work effectively, the acquisition process requires constant coordination among these processes and their authorities.

Army Distributed Common Ground System (DCGS A) Commander’s Handbook

Access to the Intelligence Enterprise is through the Distributed Common Ground System-Army (DCGS-A). This Commander’s Handbook is an overview of the capabilities DCGS-A is providing to the commander. It addresses the benefits of employment of DCGS-A as a whole, rather than any particular fielded version. DCGS-A, as a component to the DoD Distributed Common Ground/Surface System Mission Area program, is greatly contributing to the Joint and combined Warfighter needs.