ISAF Governance Working Group Brief, May 2010.
Tag Archive for For Official Use Only
Israel Defense Forces
Israel Defense Force IHH Report Alleging Ties to Terrorism
Israel Defense Force IHH Report Alledging Ties to Terrorism, May 30, 2010.
Department of Defense, United States
CNSS Wireless Communications Policy: Protecting National Security Information
The Committee on National Security Systems (CNSS) is issuing this policy to help agencies better safeguard National Security Information (NSI) during wireless transmission and delivery, while stored on mobile systems, and while stored on fixed systems that can be accessed by wireless media. It addresses the use of wireless technologies in areas where NSI is discussed or processed. It also assigns responsibilities for improving the security posture of the Executive Departments and Agencies (D/A), and provides references for a minimum set of security measures required for the use of wireless technologies in a national security environment.
Iraq, Multi-National Corps Iraq
Classified Coalition Forces List of Iraqi Detainees with Photos
More than 1200 pages listing individual dossiers of detainees currently being held by Coalition Forces inside of Iraq. Each dossier contains a list of reasons for detention, along with the time and place that the individual was detained. The dossiers range in classification level from “For Official Use Only” to “Secret” and are believed to be current as of April 14, 2010. This document was originally made available by the pro-Islamic, Arabic News site al-raeed.net.
U.S. Army
(U//FOUO) Center for Army Lessons Learned “How the Taliban Take a Village”
A current method used by the Taliban in Afghanistan to gain control of an area deemed of strategic interest to the Taliban leadership, which operates from safe havens in Pakistan or within Afghanistan, is to identify and target villages to subvert. The Taliban have recognized the necessity to operate with the cooperation of the local population, with their modus operandi being to gain villagers’ cooperation through indoctrination (preferred) or coercion (when necessary).
U.S. Navy
(U//FOUO) CNA Report: Patrol Base Armagh Attack, Helmand Province, July-August 2008
In early July 2008, a British infantry company based in Sangin set up a patrol base south of the town, along a major insurgent transit route. Within days, the insurgents attacked the outpost, known as Patrol Base Armagh, and attempted to cut it off from the company headquarters downtown. They laid IEDs along the outpost’s supply routes and harassed its troops by firing small
arms and RPGs from different directions. The insurgents managed to pin British forces down in the outpost and move around the position to the south.
U.S. Army
(U//FOUO) TACTICOMP/Ku SATCOM Procurement Report
Under DA Authorization, TRADOC and Rapid Equipment Fielding (REF) purchased TACTICOMP and Ku SATCOM systems for the 1-23 IN, 3/2 SBCT for use during a National Training Center (NTC) mission readiness exercise and future deployment. TRADOC Spiral Development Division tasked USAIC Infantry Futures and the SBL to observe the unit and their employment of these systems. The observation team was a compilation of personnel from the SBL Futures Branch, TSM-SB C4ISR, and DCD Battle Command Division.
Florida
(U//FOUO) Florida National Guard Deepwater Horizon Situation Update
(U//FOUO) Deepwater Horizon Situation Update from the Florida National Guard, May 19, 2010.
U.S. Air Force
(U//FOUO) U.S. Air Force 21st Century Threat Guide
(U//FOUO) U.S. Air Force 21st Century Threat Guide, 2009.
U.S. Army
(U//FOUO) Coalition Forces Capture Avoidance/Personnel Recovery Plan Guide
FOUO Coalition Forces Capture Avoidance/Personnel Recovery Plan Guide, January 2007.
Afghanistan, U.S. Marine Corps
(U//FOUO) USMC Intelligence: Helmand Provincial Politics and Corruption Report
Helmand Province‟s political scene is perhaps unique in Afghanistan due to several atypical tribal dynamics produced by the unintended consequences of Western development activities. Projects, like the Helmand Valley Development Authority, led to an uneven tribal resettlement process that introduced outsider ethnic groups into the central portion of the province where they had never resided previously. Second, the potential wealth of the illegal opium industry associated with the reclaimed land from the development project and tribal desires to control it has also been a factor in the development of conflict.
Joint Improvised Explosive Device Defeat Organization
(U//FOUO) JIEDDO Report: Alternative Motivations for IED Use in Afghanistan
(U//FOUO) JIEDDO Report: Alternative Motivations for IED Use in Afghanistan, December 11, 2009.
Central Intelligence Agency
(U//FOUO) CIA Report: Lessons of the Soviet War in Afghanistan
(U//FOUO) CIA Open Source Works Report on Afghanistan: Lessons of the Soviet War, March 27, 2009.
Afghanistan, U.S. Navy
(U//FOUO) Captured Taliban 2009 Mujahideen Rules and Regulations Booklet
The recent capture of the Taliban’s code of conduct manifesto, “Rules and Regulations for Mujahidin,” has offered analysts critical clues into how the Taliban intend to operate as well as how the movement is structured according to the Taliban. Importantly, the new document provides Coalition and Afghan forces a catalog of weak points, vulnerabilities and fears currently entrenched within the Taliban organization and its top echelon of leadership. A thorough examination of the document reveals the Taliban’s attempt to wage a guerrilla campaign implementing a rudimentary population-centric strategy; while calling upon elements of Pashtunwali and Shariat (Islamic) Law into the doctrine as well.
Department of Defense
DoD Network Quantitative Capability Delivery Increments (QCDI) Overview
FOUO DoD Network Quantitative Capability Delivery Increments (QCDI) Overview, May 12, 2010.
Department of Defense
(U//FOUO) Synchronized Predeployment & Operational Tracker Government Organization User Workbook
The Department of Defense (DoD) has implemented the Synchronized Predeployment & Operational Tracker (SPOT) as the single source to track deployed personnel supporting DoD military operations worldwide. SPOT is a scalable, net-centric, Web-based application that provides the capability to maintain accountability and report status for deployed personnel across the military, civilian, and contractor communities.
International Monetary Fund
IMF Report: Fiscal Rules for Sustainable Public Debt
The sharp increase in fiscal deficits and public debt in most advanced and several developing economies has raised concerns about the sustainability of public finances and highlighted the need for a significant adjustment over the medium term. This paper assesses the usefulness of fiscal rules in supporting fiscal consolidation, discusses the design and implementation of rules based on a new data base spanning the whole Fund membership, and explores the fiscal framework that could be adopted as countries emerge from the crisis.
U.S. Forces Iraq
(U//FOUO) U.S. Forces – Iraq Money as a Weapons System (MAAWS) SOP March 2010
OIF is a dynamic, full spectrum operation encompassing both kinetic and non-kinetic operations and is arguably the most complex and challenging fiscal environment in our nation’s history. The dollar amounts spent supporting or are substantial and represent the treasure of our nation. Leaders must know what funding resources are available and how to best apply them in order to gain the maximum operational effectiveness. This “Money as a Weapons System” (MAAWS) SOP is published to educate and advise you on how to financially resource operations here in Iraq. It will serve as a financial road map to assist you in navigating the myriad of funding challenges and issues that will arise during your time in Iraq.. recommend you keep a copy readily available, and ensure the appropriate leadership in your organizations has access to a copy as necessary.
Intelligence Fusion Centers, Texas
(U//FOUO//LES) Texas Fusion Center: Mexican Drug Cartel Warns of Coming Violence
On May 8, 2010, a Spanish-language flyer was placed on a vehicle in Brownsville, Texas, warning that the upcoming weekend of May 15-17, 2010, would be one of the “most violent weekends in all of Mexican history” as members of an unidentified drug trafficking organization allegedly plan to battle an unspecified rival criminal organization.
Department of Agriculture
USDA Information Technology Services (ITS) Security Policy Manual
This policy manual establishes policy for the management and administration of information technologies for the United States Department of Agriculture (USDA) Office of the Chief Information Officer (OCIO), Information Technology Services (ITS) that supports the Farm Service Agency (FSA), Natural Resources Conservation Service (NRCS), and Rural Development (RD) including Large Offices (Beltsville, Fort Collins, Fort Worth, Kansas City, Lincoln, Portland, Salt Lake, St. Louis, and Washington D.C. — hereafter referred to as “Large Offices”) and Service Centers (including State, District, Area, County, and Local Field Service Offices — hereafter referred to as “Field Offices”), and their partners.
Corporate, National Oceanic and Atmospheric Administration
BP Deepwater Horizon Situation Status Maps
BP Deepwater Horizon Oil Spill Situation Status Maps, May 6 – May 11.
National Aeronautics and Space Administration
NASA Geostationary Operational Environmental Satellite-R (GOES-R) Update
NASA Geostationary Operational Environmental Satellite-R (GOES-R) Update, November 3, 2009.
Intelligence Fusion Centers, Utah
(U//FOUO) Utah Statewide Information & Analysis Center Hotel Credit Card Scam
Recently there has been an email circulating regarding a front desk credit card confusion scam. The Statewide Information and Analysis Center is requesting information regarding this scam and if there are any related incidents reported in your area.
U.S. Marine Corps
(U//FOUO) U.S. Marine Corps Information Operations April 2010
Information Operations (BOTTOM LINE)
•IT IS NOT:
–All about technology
–Focused on individual capabilities, i.e., PYSOP, EW, CNO, etc
–Strategic Communication
–Public Affairs
•IT IS:
–All about influencing key decision makers and populations through operations within and affecting the information environment
–The art of integrating lethal and non-lethal capabilities to affect the information environment (supports combat operations)
–Employed across the spectrum of conflict and throughout every phase (0-5) of operations
–Consistent with strategic communication goals and synchronized with public affairs
Federal Bureau of Investigation
(U//FOUO) FBI VoIP Server Intrusions in North Carolina Banks and Businesses
(U//FOUO) This SIR has been produced in an effort to alert federal, state, and local law enforcement agencies of criminal activity with a nexus to North Carolina. The Charlotte Division has observed two similar occurrences of compromised Voice over Internet Protocol (VoIP) servers used to facilitate vishing attacks. Vishing attacks, a deviation from the term phishing attacks, use voice and text messages rather than email in attempts to trick victims into providing personal and financial account information.