Tag Archive for For Official Use Only

CNSS Wireless Communications Policy: Protecting National Security Information

The Committee on National Security Systems (CNSS) is issuing this policy to help agencies better safeguard National Security Information (NSI) during wireless transmission and delivery, while stored on mobile systems, and while stored on fixed systems that can be accessed by wireless media. It addresses the use of wireless technologies in areas where NSI is discussed or processed. It also assigns responsibilities for improving the security posture of the Executive Departments and Agencies (D/A), and provides references for a minimum set of security measures required for the use of wireless technologies in a national security environment.

Classified Coalition Forces List of Iraqi Detainees with Photos

More than 1200 pages listing individual dossiers of detainees currently being held by Coalition Forces inside of Iraq. Each dossier contains a list of reasons for detention, along with the time and place that the individual was detained. The dossiers range in classification level from “For Official Use Only” to “Secret” and are believed to be current as of April 14, 2010. This document was originally made available by the pro-Islamic, Arabic News site al-raeed.net.

(U//FOUO) Center for Army Lessons Learned “How the Taliban Take a Village”

A current method used by the Taliban in Afghanistan to gain control of an area deemed of strategic interest to the Taliban leadership, which operates from safe havens in Pakistan or within Afghanistan, is to identify and target villages to subvert. The Taliban have recognized the necessity to operate with the cooperation of the local population, with their modus operandi being to gain villagers’ cooperation through indoctrination (preferred) or coercion (when necessary).

(U//FOUO) CNA Report: Patrol Base Armagh Attack, Helmand Province, July-August 2008

In early July 2008, a British infantry company based in Sangin set up a patrol base south of the town, along a major insurgent transit route. Within days, the insurgents attacked the outpost, known as Patrol Base Armagh, and attempted to cut it off from the company headquarters downtown. They laid IEDs along the outpost’s supply routes and harassed its troops by firing small
arms and RPGs from different directions. The insurgents managed to pin British forces down in the outpost and move around the position to the south.

(U//FOUO) TACTICOMP/Ku SATCOM Procurement Report

Under DA Authorization, TRADOC and Rapid Equipment Fielding (REF) purchased TACTICOMP and Ku SATCOM systems for the 1-23 IN, 3/2 SBCT for use during a National Training Center (NTC) mission readiness exercise and future deployment. TRADOC Spiral Development Division tasked USAIC Infantry Futures and the SBL to observe the unit and their employment of these systems. The observation team was a compilation of personnel from the SBL Futures Branch, TSM-SB C4ISR, and DCD Battle Command Division.

(U//FOUO) USMC Intelligence: Helmand Provincial Politics and Corruption Report

Helmand Province‟s political scene is perhaps unique in Afghanistan due to several atypical tribal dynamics produced by the unintended consequences of Western development activities. Projects, like the Helmand Valley Development Authority, led to an uneven tribal resettlement process that introduced outsider ethnic groups into the central portion of the province where they had never resided previously. Second, the potential wealth of the illegal opium industry associated with the reclaimed land from the development project and tribal desires to control it has also been a factor in the development of conflict.

(U//FOUO) Captured Taliban 2009 Mujahideen Rules and Regulations Booklet

The recent capture of the Taliban’s code of conduct manifesto, “Rules and Regulations for Mujahidin,” has offered analysts critical clues into how the Taliban intend to operate as well as how the movement is structured according to the Taliban. Importantly, the new document provides Coalition and Afghan forces a catalog of weak points, vulnerabilities and fears currently entrenched within the Taliban organization and its top echelon of leadership. A thorough examination of the document reveals the Taliban’s attempt to wage a guerrilla campaign implementing a rudimentary population-centric strategy; while calling upon elements of Pashtunwali and Shariat (Islamic) Law into the doctrine as well.

(U//FOUO) Synchronized Predeployment & Operational Tracker Government Organization User Workbook

The Department of Defense (DoD) has implemented the Synchronized Predeployment & Operational Tracker (SPOT) as the single source to track deployed personnel supporting DoD military operations worldwide. SPOT is a scalable, net-centric, Web-based application that provides the capability to maintain accountability and report status for deployed personnel across the military, civilian, and contractor communities.

IMF Report: Fiscal Rules for Sustainable Public Debt

The sharp increase in fiscal deficits and public debt in most advanced and several developing economies has raised concerns about the sustainability of public finances and highlighted the need for a significant adjustment over the medium term. This paper assesses the usefulness of fiscal rules in supporting fiscal consolidation, discusses the design and implementation of rules based on a new data base spanning the whole Fund membership, and explores the fiscal framework that could be adopted as countries emerge from the crisis.

(U//FOUO) U.S. Forces – Iraq Money as a Weapons System (MAAWS) SOP March 2010

OIF is a dynamic, full spectrum operation encompassing both kinetic and non-kinetic operations and is arguably the most complex and challenging fiscal environment in our nation’s history. The dollar amounts spent supporting or are substantial and represent the treasure of our nation. Leaders must know what funding resources are available and how to best apply them in order to gain the maximum operational effectiveness. This “Money as a Weapons System” (MAAWS) SOP is published to educate and advise you on how to financially resource operations here in Iraq. It will serve as a financial road map to assist you in navigating the myriad of funding challenges and issues that will arise during your time in Iraq.. recommend you keep a copy readily available, and ensure the appropriate leadership in your organizations has access to a copy as necessary.

USDA Information Technology Services (ITS) Security Policy Manual

This policy manual establishes policy for the management and administration of information technologies for the United States Department of Agriculture (USDA) Office of the Chief Information Officer (OCIO), Information Technology Services (ITS) that supports the Farm Service Agency (FSA), Natural Resources Conservation Service (NRCS), and Rural Development (RD) including Large Offices (Beltsville, Fort Collins, Fort Worth, Kansas City, Lincoln, Portland, Salt Lake, St. Louis, and Washington D.C. — hereafter referred to as “Large Offices”) and Service Centers (including State, District, Area, County, and Local Field Service Offices — hereafter referred to as “Field Offices”), and their partners.

(U//FOUO) U.S. Marine Corps Information Operations April 2010

Information Operations (BOTTOM LINE)

•IT IS NOT:
–All about technology
–Focused on individual capabilities, i.e., PYSOP, EW, CNO, etc
–Strategic Communication
–Public Affairs

•IT IS:
–All about influencing key decision makers and populations through operations within and affecting the information environment
–The art of integrating lethal and non-lethal capabilities to affect the information environment (supports combat operations)
–Employed across the spectrum of conflict and throughout every phase (0-5) of operations
–Consistent with strategic communication goals and synchronized with public affairs

(U//FOUO) FBI VoIP Server Intrusions in North Carolina Banks and Businesses

(U//FOUO) This SIR has been produced in an effort to alert federal, state, and local law enforcement agencies of criminal activity with a nexus to North Carolina. The Charlotte Division has observed two similar occurrences of compromised Voice over Internet Protocol (VoIP) servers used to facilitate vishing attacks. Vishing attacks, a deviation from the term phishing attacks, use voice and text messages rather than email in attempts to trick victims into providing personal and financial account information.