A monthly report from the Joint Improvised Explosive Device Defeat Organization (JIEDDO) detailing IED usage and casualties statistics from every U.S. combatant command for August 2012.
Tag Archive for For Official Use Only
Customs and Border Protection
(U//FOUO) U.S. Customs and Border Protection Security Policy and Procedures Handbook
The complete U.S. Customs and Border Protection Security Policy and Procedures handbook from August 2009.
U.S. Marine Corps
(U//FOUO) U.S. Marine Corps Infantry Battalion Operations in Afghanistan Lessons Learned Report
The mission of training and mentoring Afghani police was complicated by (1) the need to establish and occupy nine forward operating bases (FOBs) spread over an area of approximately 28,700 square kilometers, while (2) simultaneously maintaining a level of security that (3) permitted identification of suitable candidates for police and training them, since a police force did not exist yet in the areas in which 2/7 operated and (4) accomplishing this without any established support network. The operational environment was more kinetic and austere than conditions generally experienced by recent veterans of Operation Iraqi Freedom (OIF). Companies and platoons were widely dispersed and follow-on units deploying to such areas in Afghanistan must be prepared to operate in a semi-autonomous manner. Training and organization need to be tailored to those conditions and their specific area of operations (AO), and consideration should be given to the proven utility of the MAGTF in such an environment.
Intelligence Fusion Centers, New York
(U//FOUO) New York Fusion Center Historical Pre-Election Terrorist Attacks Analysis
In light of the upcoming 2012 US presidential election, NYSIC is providing a snapshot of four historical cases where terrorists conducted attacks in conjunction with upcoming local or national elections, including the tactics, techniques, and procedures (TTP) used and how the attacks met or failed to meet the terrorists’ goals of altering the outcome of the election.
California, Intelligence Fusion Centers
(U//FOUO) Los Angeles Fusion Center: Liquid Carbon Dioxide Leaks Pose Risks to Public
Within the past year, first responders and members of the public have died of asphyxiation, or fallen ill, following accidental inhalation of concentrated carbon dioxide (CO2) gas in public locations. At least two recent incidents are connected with significant gas leaks caused by the failure of liquid CO2 lines connected to beverage dispensers in commercial facilities. Emergency personnel responding to medical or service calls can use signs and symptoms to determine possible CO2 exposure and correspondent risks to first responders.
U.S. Army
(U//FOUO) U.S. Army Regulation 190–13 Physical Security Program
This regulation implements DOD 5200.08–R and DODI 3224.03. It prescribes policies, procedures, and guidance to plan and implement the Department of the Army Physical Security Program. It provides guidance concerning requirements for and use of physical security equipment; the appointment of physical security officers and inspectors; the conduct of physical security inspections and surveys; the management of physical security credentials; the management and use of identification cards and badges; restricted areas; access control for installations and stand-alone facilities; and security forces.
U.S. Navy
(U//FOUO) U.S. Navy Cloak Blade Inherently Stealthy Micro-Copter Presentation
A presentation accompanied a recent demonstration of the Cloak Blade, a micro-copter developed by Johns Hopkins University Applied Physics Laboratory under contract from the U.S. Navy.
Department of Defense
(U//FOUO) Joint DoDIIS/Cryptologic SCI Information Systems Security Standards Revision 3
The policy of the U.S. Government is that all classified information must be appropriately safeguarded to assure the confidentiality, integrity, and availability of that information. This document provides procedural guidance for the protection, use, management, and dissemination of Sensitive Compartmented Information (SCI), and is applicable to the Department of Defense (DoD) to include DoD components and Government contractors who process SCI.
U.S. Joint Forces Command
(U//FOUO) U.S. Joint Forces Command Military Support to Economic Normalization Draft Handbook
This handbook serves as a bridge between current operational-level doctrine and tactical-level employment at the joint force level. It is intended to inform doctrine writers, educators, and trainers about military support to economic normalization. It supplements, not replaces, existing joint or Service doctrine. The handbook is designed for use by personnel assigned to (or participating in) a joint operation and provides guidance at the operational level on the range of functions required to secure economic stability during or in the immediate post-conflict. Where doctrine is absent, it also presents definitions and constructs from the interagency and international community that have been harmonized with joint doctrine and discusses those ―best practices‖ that have proven of value during on-going military operations, exercises, and experimentation.
Bureau of Alcohol Tobacco Firearms and Explosives
(U//FOUO) U.S. Bomb Data Center Assessment: Criminal Bombers Use Curiosity and Greed to Lure Victims
Some criminal bombers exploited their victims’ sense of greed or general curiosity by hiding improvised explosive devices (IEDs) inside common everyday items and leaving them as discarded merchandise to be found by the victim. Victims then perceived these situations as an unexpected opportunity to obtain an object of value with no associated cost. The devices utilized victim-operated switches rather than command or time switches. While a seemingly discarded working tool or item could be considered an enticement in itself, the lack of a written note or similar enticement distinguished these bombing incidents from other IEDs that utilized written messages to bait the victim. Recent bombing incidents in Phoenix and Glendale, Arizona, might be another example of this tactic.
National Counterterrorism Center
(U//FOUO) National Counterterrorism Center Advisory: Homegrown Violent Extremists Targeting Law-Enforcement Officers
Some homegrown violent extremists (HVE) have targeted US law-enforcement entities and have used publicly available information to counter these entities’ CT tactics and security practices. Law-enforcement entities are being identified by these extremists as both strategic targets and targets of opportunity, mainly because a core element of HVE subculture perceives that persecution by US law enforcement reflects the West’s inherent aggression toward Islam, which reinforces the violent opposition by HVEs to law enforcement.
News
How to Stop Killing Afghan Civilians
The problem of civilian casualties in Afghanistan has presented substantial tactical difficulties for coalition forces according to a recent U.S. Army handbook. Produced by the Center for Army Lessons Learned (CALL) and released to soldiers on a restricted basis in June, the handbook presents best practices for reducing civilian casualties (CIVCAS) and offers strategies for mitigating negative effects from casualties among local populations.
Afghanistan, U.S. Army
(U//FOUO) U.S. Army Afghanistan Civilian Casualty Prevention Handbook
The U.S. military has long been committed to upholding the law of armed conflict and minimizing collateral damage. This includes the killing or wounding of noncombatant civilians — described in this handbook as civilian casualties or CIVCAS — as well as damage to facilities, equipment, or other property. Due to several factors, the impact of CIVCAS has increased to the point that single tactical actions can have strategic consequences and limit overall freedom of action. These factors include: the increased transparency of war, where tactical actions can be recorded and transmitted worldwide in real time; increased expectations for the United States’ conduct of war in light of improved precision and overall capabilities; and the enemy exploitation of CIVCAS to undermine U.S. legitimacy and objectives.
U.S. Central Command
(U//FOUO) CENTCOM Joint Theater Support Contracting Command Ethics Training
U.S. Central Command (CENTCOM) Joint Theater Support Contracting Command ethics training presentation from May 2012.
Louisiana
(U//FOUO) Louisiana Fusion Center Hurricane Isaac Situational Reports
Several Louisiana State Analytical & Fusion Exchange (LA-SAFE) Hurricane Isaac situational reports dated August 29 – 30, 2012.
Afghanistan, U.S. Army
(U//FOUO) U.S. Army Security Force Assistance: Shaping and Mentoring the Afghan Police
Afghanistan presents a unique challenge to U.S. Army forces in the geographical, cultural, economic, political, and security dimensions. Providing protection and security to a unique and diverse tribal population is an essential aspect of our counterinsurgency strategy. The proficiency, integrity, and loyalty of Afghan police forces are essential to accomplishing a secure environment and to sustaining success. The following articles cover a range of issues related to SFA and the training of Afghan national police and border police with the specific intent of establishing best practices and lessons learned. The collection should not be considered all-inclusive. This is an effort to capture relevant articles published in recent professional journals or maintained by the Center for Army Lessons Learned (CALL) and other joint archives to inform Soldiers about relevant observations, insights, and lessons and to provide a historical document for future reference.
Open Source Center
(U//FOUO) Open Source Center Autonomous Kurds in Post-Asad Syria Unlikely
An autonomous or federal Kurdistan within Syria — similar to that which exists in Iraq — is unlikely because of intra-Kurdish conflict and the opposition of Turkey and the Syrian National Council (SNC) — the main external Syrian opposition group.
Department of Homeland Security, FEMA
DHS Special Event and Domestic Incident Tracker Overview Brief
DHS National Protection and Programs Directorate Protective Security Advisors and Special Event Domestic Incident Tracker Overview presented at the FEMA National Preparedness Symposium on August 8, 2012.
U.S. Army
(U//FOUO) U.S. Army Advising Foreign Forces Handbook
The purpose of this special edition is to provide a practical reference guide for individuals and units to use in preparation for missions as trainers and advisors to foreign military units. The publication includes tactics, techniques, and procedures successfully used by both United States Army special operations forces (SOF) and conventional forces in conducting foreign military training (FMT). The final section of the special edition is an explanation of the security assistance process and includes the organizations involved in planning and resourcing foreign training missions and their respective responsibilities.
U.S. Army
(U//FOUO) U.S. Army Security Force Handbook
From 28 Feb 06 to 18 Apr 06, a five-man Combat Arms Assessment Team from the 2-315th Field Artillery Transportation Support Battalion focused on collecting the most current security force convoy tactics, techniques, and procedures (TTP) in the Iraq Theater. The focus of this collection was convoy security force actions before, during, and after convoy operations including personal security detachment, escort of civilian vehicles (convoy security), and self escort of military convoys.
U.S. Army
(U//FOUO) U.S. Army Partnership Handbook: Developing Self-Sustaining Security Force Capabilities
The Multi-National Corps–Iraq logistics staff and the Iraqi Security Forces (ISF) support operations cell, an element of the Iraqi Assistance Group, merged at the operational level to publish plans, policies, and procedures that met the strategic aims of the coalition forces, the national goals of the government of Iraq, and the joint campaign plan published by Multi-National Force–Iraq. Corps sustainment planners published operational objectives for execution at the operational and tactical levels in an effort to develop a sustainment-based system for the ISF. Based on experiences and observations over the past 18 months, the partners, advisors, and planners gathered the best practices for advising and assisting security forces at all levels of the sustainment system. This handbook presents partnering considerations in developing a fundamental base for a self-sustaining, host nation security force.
Department of Homeland Security, Federal Bureau of Investigation
(U//FOUO) DHS-FBI Suspicious Activity Reporting Bulletin: Attempted Breaches/Intrusions
Terrorists may attempt to breach secured perimeters or gain unauthorized access to facilities, sensitive locations, or restricted areas for preoperational activity or to conduct an attack. Timothy McVeigh breached a locked storage shed at a Kansas rock quarry with a battery-operated drill and stole explosives that were later used in the 1995 Oklahoma City bombing. Attempts at intrusion could take the form of trespassing, forced entry, or impersonation of authorized personnel and could possibly involve the assistance of knowledgeable ‘insiders.”
Department of Homeland Security, Federal Bureau of Investigation
(U//FOUO) DHS-FBI Suspicious Activity Reporting Bulletin: Aviation Flyovers
Terrorists may use small aircraft flyovers to conduct preoperational activities such as reconnaissance or rehearsals for planned attacks. When suspicious flyovers occur, law enforcement and first responders should report the key attributes of the flight and the aircraft for timely identification (time of day, location and direction of flight, facility overflown, aircraft size, markings, color scheme, tail number, number of windows, placement of wings or rotor, number of engines, and weather) to the Federal Aviation Administration (FAA) through a local Air Traffic Control facility or office, a local Flight Standards District Office, or directly to the FAA’s Domestic Events Network at 202 493 5107, and the Transportation Security Administration. The FAA is often best able to distinguish between legitimate air traffic and suspicious flight operations that warrant further investigation.
U.S. Marine Corps
(U//FOUO) Center for Naval Analyses Study: The War in Southern Afghanistan 2001-2008
This study examines the history of the fighting in southern and western Afghanistan since 2001. The Marine Corps Intelligence Activity sponsored the study. Its purpose is to give Marines a basic understanding of what has happened in southern and western Afghanistan. Most Marines will operate in that area and we hope a historical reference source will be useful. If the study has any single argument it is that government misrule has been a driving factor behind the continuing violence in southern and western Afghanistan. The Afghan government favored warlords, handicapped competent governors, took part in the poppy trade, and allowed the police to abuse the people. Scarcity of security forces and collateral damage from Coalition operations did not help either. Yet above all, we find it unlikely that the instability in southern and western Afghanistan today could have been averted without addressing government misrule.
Joint Improvised Explosive Device Defeat Organization
(U//FOUO) Joint Improvised Explosive Device Defeat Organization (JIEDDO) Attack the Network Lexicon
This first edition of the Attack the Network (AtN) Lexicon was produced by the Joint Improvised Explosive Device Defeat Organization (JIEDDO). The lexicon contents were developed after extensive interviews with military units who successfully employed AtN principles and practices to reduce the number and effectiveness of Improvised Explosive Devices (IEDs) in the Counter-Insurgency (COIN) environment where they encountered multiple and sometimes interconnected adversary networks. The lexicon contents were further developed and refined by subject matter experts from over fifty organizations across the Departments of Defense, Justice, and Homeland Security.