TERROGENCE PRODUCTS & CAPABILITIES. Expert Web Intelligence for Counter-Terrorism.

Size: px
Start display at page:

Download "TERROGENCE PRODUCTS & CAPABILITIES. Expert Web Intelligence for Counter-Terrorism."

Transcription

1 TERROGENCE Expert Web Intelligence for Counter-Terrorism PRODUCTS & CAPABILITIES

2 2 Open Source Web Intelligence for Counter-Terrorism Founded in 2004, Terrogence is a private open source web intelligence company dedicated to exposing terrorist capabilities and intent. Staffed with experienced intelligence professionals, the company has pioneered powerful, web-specific methodologies and tools for collection, analysis and research, enabling us to provide counter-terrorism intelligence of the highest caliber to governments and organizations worldwide. Based on these proven methodologies, the company employs a cutting-edge web intelligence system called HIWIRE, to drive the entire OSINT production lifecycle end-to-end. Ten years at the forefront of OSINT Highly trained linguists: Arabic, Persian, Russian, French, Spanish, Chinese, Turkish etc. Intelligence products by renowned SMEs Unparalleled in-house C-IED and HME expertise Flexible collection for tailored time-sensitive intelligence Expert Virtual HUMINT operations and deep web and Darknet research Our unique intelligence capabilities, coupled with the commercial nature of our company, enable us to accommodate the intelligence and security needs of organizations worldwide.

3 3 Table of Contents Intelligence Reports...4 AL- KHEMIA Forensic Chemical Analysis of Authentic Terrorist HME Recipes...6 MÖBIUS Deep C-IED Intelligence & Terrorist TTPs Exposed...9 TGALERTS Near Real-Time Tactical Alerts with Contextual Analysis...12 HYDRA Tracking Terrorist Trends & Strategic Developments in the World of Jihad...15 Tailored Services...18 Customized Intelligence Reports...19 Corporate Intelligence...19 Training & Workshops...20

4 INTELLIGENCE REPORTS 34

5 35 Covering Terrorism from all Angles Terrogence intelligence reports combat the inherent nature of modern-day terrorism by exposing every facet of online terror activities; from the websites and forums they operate in, to the emerging developments in TTP s and weapons technologies being disseminated and deployed in conflict zones and home-fronts around the world. Today s web-based terror backbone is inherently without geographic boundaries. An untrained terrorist in Spain can download an explosives manufacturing tutorial video posted by a Hezbollah IED expert from Lebanon, and learn how best to conceal it onboard an aircraft by participating in a jihadist forum registered to a server in the Canary HMEs Al - Khemia TTPs TGAlertS Service Islands, with participants from Egypt, Somalia, Algeria and Denmark assessing his methods and plans and offering lessons-learned tips from previous failed attacks. This scenario has played itself out in every major terrorist attack or attempt over the past few years. IEDs Hydra NETWORKS Möbius Terrogence understands that global terrorism is exactly that: global. Terror capabilities and know-how are no longer limited to specific geographies once they reach the web. Terrogence s expert reports provide tactical, technical and strategic insight into terrorist activities worldwide.

6

7 6 AL-KHEMIA Forensic Chemical Analysis of Authentic Terrorist HME Recipes Al-Khemia reports expose and analyze authentic terrorist home-made explosives (HMEs) as they emerge on terrorist forums and knowledge bases. The Al-Khemia Recipe Bank is an unparalleled repository of forensic HME analysis, aimed at rooting out the IED threat at its HME source.

8 7 Overview The rapid dissemination of explosives recipes and manufacture know-how via the web means that as soon as a home-made explosive recipe is perfected and disseminated in one part of the world, the threat becomes real in conflict zones and combat theaters everywhere. In each Al-Khemia report, a real-life HME recipe, harvested from within online forums and websites used by global terrorists and local insurgents, is meticulously synthesized step-by-step in a controlled laboratory setting and analyzed in perfect detail by forensic chemists and explosives experts. Authentic terrorist HME s analyzed include: Nitroglycerin Gelatin Dynamite HDN Astrolite Sorbitol Hexanitrate Mercury Fulminate DDNP C4 More Methyl Ethyl Ketone Peroxide (MEKP)

9 8 Inside Al-Khemia TM A typical Al-Khemia TM report comprises two parts: Authentic Terrorist HME Recipe in Full translation Al-Khemia reports provide full translation of the original terrorist HME recipe (video, image, document attachment, textual explanation etc.), including all stages and instructions, with preliminary notes on how the HME recipe measures up against scientific synthesis of the same explosive, and what it might be used for. Our synthesis reconstruction yielded a highly pure compound that will definitely detonate Laboratory Synthesis Reconstruction Terrogence forensic chemical experts deliver the results of a meticulous step-by-step laboratory re-synthesis of the material, along with an exhaustive assessment of its physical and chemical properties in the context of counter-terrorism efforts.

10

11 9 MÖBIUS Deep C-IED Intelligence & Terrorist TTPs Exposed Möbius exposes current and developing IED capabilities and operational TTPs of terrorists and insurgents worldwide, featuring rigorous technical analysis and expert assessment of real-world terrorist MOs as they develop deep within online terrorist networks.

12 10 Overview As the internet morphs into one vast social network, terrorists work keenly to harness global online collaboration and social networking platforms to share knowledge and improve technological and operational capabilities. Yesterday s jihadi bomb tutorial from Lebanon becomes today s bomb in a radical Londoner s basement, and tomorrow s disaster in Mumbai. Researched and written by expert WTI and C-IED specialists, Möbius reports apprise subscribers of the latest trends in terrorist IEDs and TTPs, as they emerge in online sources including password protected social media platforms where global terrorists seek to recruit, radicalize and plot their next attack. `

13 11 Inside Möbius The typical Möbius digest includes eight individual reports per month, each assigned to one of two categories: The last parcel IED was different to the others a fire bomb without fragmentation Knowledge Base The latest IED developments, instructional materials and technical discussions extracted from terrorist web forums and social networks worldwide. Case Studies Techno-tactical assessments of the most recent IED applications by terrorists globally, often based on videos taken by insurgents on the ground. Each individual CLI is further marked off against six salient categories of tactical intelligence. IED construction Initiation systems Modus operandi Concealment/camouflage Countermeasure awareness Standard weapon utilization

14

15 12 TGALERTS Near Real-Time Tactical Alerts with Contextual Analysis Upon uncovering new and emerging terrorist activities of imminent interest on the web, Terrogence circulates a techno-tactical intelligence alert containing preliminary WTI analysis alongside tactical and contextual relevancy.

16 13 Overview During the course of our strategic web-intelligence operations, Terrogence collection professionals often encounter outright threats or terror-capability developments of imminent interest. These items immediately enter a techno-tactical analysis fast track to be disseminated in near realtime via the TGAlert Service (TGAlertS ). In order to avoid inundating subscribers with the low threshold of just news, TGAlertS digs a level deeper, providing context and interpretation. Though strictly dictated by events, TGAlertS subscribers receive one alert per week. As the events that inspire near real-time TGAlertS develop further, some alerts grow into full-blown intelligence reports worthy of inclusion in our Möbius product.

17 14 Inside the TG Alert Service (TGAlertS ) A typical TGAlertS is structured as follows: Comm. Info & Summary of Intel Brief overview of the intelligence source (platfrom type, affiliation, areas of interest etc.) followed by a summary of the intelligence (e.g. Jihadists on a password-protected forum discuss in detail the synthesis of a unique explosive for the express purpose of downing passenger aircraft). Tactical Assessment & Notes WTI SMEs at Terrogence elaborate on the harvested material, adding expert notes that paint a fuller intelligence picture of the terror activity detected. A brief assessment follows, shedding light on the tactical relevancy of the Intel. TGAlertS Key Benefits: Near real-time delivery upon detection Brief analysis of context and background Assessment of tactical relevancy Due to the availability of erythritol as a natural sweetener and its relative ease of production compared Terrogence Alert Service to PETN, ETN is well suited to terrorist activity Al-Qaeda "Fashion Statement : Waist-Belted PBIEDs Incident Summary Throughout 2013 and into 2014 we have witnessed an expanding al-qaeda (AQ) "fashion statement" of waist-strapped person-borne IEDs (PBIEDs), now not only General Notes sported by suicide bombers. These "personal-use" devices, previously attested to as the traditional garb of Caucasus-based militants, are now frequently documented around the waists of AQ operatives, including high-ranking commanders in Iraq and Syria. These compact belts have recently surfaced in Egypt. Key points Personal waist-strapped PBIED previously seen in the Caucasus now appearing in Syria, Iraq and Egypt PBIED sported by ISIS commanders as both a status symbol and "insurance policy" TTP also employed by field operatives exposed to risk of capture or engaging in close quarters combat (CQC) SVBIED drivers documented using such PBIEDs as a contingency plan No.: TGA0295 HIWIRE II.ID: Publication Date: 14 February 2014 Appeared on the Web: Author: Isaac (Tzachi) Ganor Source: Jihadist social networks Terrogence Alert Service TGA0295 Al-Qaeda "Fashion Statement : Waist-Belted PBIEDs Page 1 of 5 Abu Omar al-shishani (left) and tribal sheikhs in al-raqqah (right) wearing waist-belted PBIEDs (red arrows) and wristwatches (yellow arrows) on their right arms Terrogence Alert Service The Syrian-Iraqi arena has demonstrated an evolution in the personal waiststrapped PBIED fashion among ISIS commanders, who are now seen sporting the belts as: A status symbol Inspiration for others by indicating their willingness to sacrifice their lives A deterrent "insurance policy" in case of capture This trend also appears to be popular among those field operatives wearing the also evidenced in Egypt by the Sinai-based Ansar Bayt al-maqdis in the October 7, 2013 SVBIED Attack against the South Sinai Security Directorate (cf. Möbius report South Sinai Security Directorate Targeted in SVBIED Attack HIWIRE II.ID 13763). There is evidence of the appearance of this compact PBIED in Egypt, as documented on February 9, 2013, in Ismailiyyah, where a militant wearing a PBIED in a fanny-pack was killed during a raid on an IED workshop. Australian suicide bomber standing on his truck SVBIED wearing a waist-belted PBIED, Deir ez-zor, Syria compact waist-belted PBIED who may choose to initiate the device as a last resort when cornered and thus take out their adversaries with them. Iraqi militants have even exhibited the use of thin-layered PBIEDs concealed in compact belts, presumably for the same purpose (cf. Terrogence Alert TGA0285 Low-Signature PBIED Concealed inside Belt - Growing Trend among Iraqi Militants HIWIRE II.ID 13244). In general, these devices are more effective in close proximity targeted killings than mass-casualty terror attacks. Tagged: Waist-belted PBIED, Caucasus, Syria, Iraq, Egypt, AQ, ISIS, Wristwatch worn on right arm, CQC It is worth noting that some SVBIED drivers in Syria were also documented wearing these PBIEDs (cf. Möbius report Australian Suicide-Bomber Initiates Truck SVBIED in Deir ez-zor, Syria HIWIRE II.ID 13353). This suggests that the PBIEDs were intended to be used as a contingency plan for targeting enemy forces in case of SVBIED initiation malfunction. A similar TTP of an SVBIED driver with a PBIED was Abu Wahib with bandolierstyle PBIED (red arrow) and wristwatch (yellow arrow) on his right arm TGA0295 Al-Qaeda "Fashion Statement : Waist-Belted PBIEDs Page 3 of 5 Fanny pack PBIED recovered from a militant in Ismailiyyah, Egypt TGA0295 Al-Qaeda "Fashion Statement : Waist-Belted PBIEDs Page 4 of 5

18

19 15 HYDRA Tracking Terrorist Trends & Strategic Developments in the World of Jihad At the very forefront of the online war against global jihad, Hydra explores the nature, scope and dynamics of extremists use of the Internet, focusing on hardcore jihadist forums and terror activities on social media platforms.

20 16 Overview Hydra -Terrogence s most wide-ranging web intelligence report, monitors terrorist trends and developments as they come to light on the web, where terrorists seek to radicalize, recruit, or plot attacks against religious, cultural and political targets. The report evaluates extremist Islamic propaganda, recruitment and radicalization efforts, deep trends within the evolving world of jihad, while providing strategic WEBINT insights to hard-core global jihadists. Hydra paints a rich picture of extremists use of the Internet, with particular focus on hardcore jihadi peer-to-peer platforms. Each month, the report examines the latest publications, potential targets and underlying motivations of Internet terrorist activists around the world.

21 17 Inside Hydra A typical Hydra report comprises two parts: Highlights of the Jihadi Web Diverse assessments of important technical and non-technical developments within active jihadi networks, e.g. tactics and operational issues, politics & ideology, propaganda, and web communications infrastructure...al-qaeda and al-shabab have come to appreciate the potential benefits of humanitarian aid as a tool for winning public support In Focus A robust dive into trends of special interest in the jihadi world, including tectonic shifts in jihadist politics, deep trends in jihadist tactics and overlooked aspects of jihadist organizations.

22

23 18 TAILORED SERVICES Tailored Intelligence Reports Training & Workshops Corporate Intelligence Terrogence offers a diverse range of intelligence services specializing in all facets of Open Source Web Intelligence (WEBINT). Our service lines are managed by seasoned intelligence and counter-terror experts, delivering the highest quality results to our customers.

24 19 Tailored Intelligence Reports Corporate Intelligence Terrogence has two virtues that place it above all others: The highest caliber intelligence professionals, linguists and SMEs A powerful Web Intelligence system designed to maximize the impact that those professionals, linguists & SMEs have on every Terrogence product. This set-up is highly flexible and very powerful when focused on filling specific customer intelligence gaps. Collection efforts can be trained on a specific geography (e.g. Iraq, Afghanistan, Pakistan, Chechnya, West/East Africa), or on a particular subject (e.g. IEDs, VBIEDs, aviation/maritime threats, cyber-terror, homegrown terror etc.). Terrogence can also hone in on individuals, organizations, corporations, specific activities and more. We often navigate multiple verticals on a single project. Information and timing are everything in business. The Internet represents the greatest collection of information in the history of mankind, and companies that are quick to leverage this mass of information secure a competitive edge on the corporate battlefield. The advanced technology and methods that lend superiority to Terrogence web intelligence operations against terrorists are equally powerful and timely in the realm of corporate OSINT. Provide detailed reports of the political/corporate terrain in veiled territories. Expose hidden agendas, undisclosed assets. Shed light on existing partnerships or potential partnership deals. Reveal public perception of your business. Expose organizations and individuals that harbor ill-will toward your business.

25 20 Training & Workshops Terrogence offers a selection of workshops & training sessions to first responders, military, intelligence and counter-terror professionals covering WEBINT practices, methodologies and terrorism subject-matter in varying levels of depth and scope. The trainers for our Web Intelligence workshops and training sessions come from rich intelligence and operational backgrounds in SIGINT, HUMINT, OSINT and HLS strategy. Introduction to WEBINT (2 days) This course introduces the world of open-source, web-based intelligence, covering the structure of information on the web, WEBINT search practices and terrorist utilization of the web. Virtual HUMINT & Web Intelligence Collection (5 days) Designed for law enforcement and security professionals, this course communicates advanced methods and tools for gathering actionable Web Intelligence from active terrorist sources on the web. Open Source Web Intelligence Operator (3 weeks) A comprehensive training course designed to train an Open Source Web Intelligence operator to fully conduct WEBINT collection, processing and analysis operations. The course includes theoretical training and real-life collection exercises.

26

27

28

(U) Terrorist Attack Planning Cycle A Homeland Case Study

(U) Terrorist Attack Planning Cycle A Homeland Case Study (U) Terrorist Attack Planning Cycle A Homeland Case Study (U) INTRODUCTION (U) This case study is an examination of behaviors that resulted in a disrupted terrorist attack, revealing a cycle of planning

More information

Counter-Improvised Explosive Device Overview

Counter-Improvised Explosive Device Overview Counter-Improvised Explosive Device Overview April 2012 The IED Is a Global Threat //FOR OFFICIAL USE ONLY Mumbai, 13 Jul 2011 Multiple explosions (26 Killed / 130 Wounded) Nigeria, 12 Apr 2012 SVBIED

More information

The Challenging Scope of the. Improvised Explosive Device Battlespace. Commander ADF Counter-IED Task Force Brigadier Wayne Budd.

The Challenging Scope of the. Improvised Explosive Device Battlespace. Commander ADF Counter-IED Task Force Brigadier Wayne Budd. The Challenging Scope of the Improvised Explosive Device Battlespace Commander ADF Counter-IED Task Force Brigadier Wayne Budd Where is the IED threat? Sweden: Suicide Attack, Stockholm, 11 December 2010

More information

Combating Terrorism: Prevention, Protection & Response

Combating Terrorism: Prevention, Protection & Response 13-14 June 2016 Hong Kong Combating Terrorism: Prevention, Protection & Response Nowhere to run, Nowhere to hide Key Benefits of Attending This Workshop: UNDERSTAND why defining and labeling terrorism

More information

TFR-028: YEMEN - COMPLEX ATTACK AGAINST CID BUILDING IN ADEN - 05 NOVEMBER The Triton Report is compiled monthly by highly specialised

TFR-028: YEMEN - COMPLEX ATTACK AGAINST CID BUILDING IN ADEN - 05 NOVEMBER The Triton Report is compiled monthly by highly specialised TFR-028: YEMEN - COMPLEX ATTACK AGAINST CID BUILDING IN ADEN - 05 NOVEMBER 2017 The Triton Report is compiled monthly by highly specialised data collators and former British Military Ammunition Technical

More information

U.S. AIR STRIKE MISSIONS IN THE MIDDLE EAST

U.S. AIR STRIKE MISSIONS IN THE MIDDLE EAST U.S. AIR STRIKE MISSIONS IN THE MIDDLE EAST THE QUANTITATIVE DIFFERENCES OF TODAY S AIR CAMPAIGNS IN CONTEXT AND THE IMPACT OF COMPETING PRIORITIES JUNE 2016 Operations to degrade, defeat, and destroy

More information

I. Description of Operations Financed:

I. Description of Operations Financed: I. Description of Operations Financed: Coalition Support Funds (CSF): CSF reimburses key cooperating nations for support to U.S. military operations and procurement and provision of specialized training,

More information

Intelligence Bulletin Joint FBI-DHS Bulletin No. 348

Intelligence Bulletin Joint FBI-DHS Bulletin No. 348 Intelligence Bulletin Joint FBI-DHS Bulletin No. 348 (U//FOUO) Moscow Metro Bombing March 29, 2010 (U) Handling Notice: Recipients are reminded that FBI and DHS intelligence bulletins contain sensitive

More information

HOMELAND SECURITY PRESIDENTIAL DIRECTIVE 19

HOMELAND SECURITY PRESIDENTIAL DIRECTIVE 19 HOMELAND SECURITY PRESIDENTIAL DIRECTIVE 19 COMBATING TERRORIST USE OF EXPLOSIVES IN THE UNITED STATES FEBRUARY 12, 2007 Purpose (1) This directive establishes a national policy, calls for the development

More information

Defense Strategies Institute professional educational forum:

Defense Strategies Institute professional educational forum: Defense Strategies Institute professional educational forum: Formerly DSI s SOF Symposium December 5-6, 2017: Mary M. Gates Learning Center 701 N. Fairfax St. Alexandria, VA 22314 Program Design & Goal:

More information

International Specialist Training Course for States & Other Stakeholders

International Specialist Training Course for States & Other Stakeholders GRI Training Proposal NATO Approved STANDARD Defense Against Terrorism training 2018 0 International Specialist Training Course for States & Other Stakeholders Background: This NATO approved course is

More information

Proposal for the Suicide Bomb Detector Model # RDS400

Proposal for the Suicide Bomb Detector Model # RDS400 Proposal for the Suicide Bomb Detector Model # RDS400 Presented From: HSS Development 75 S. Broadway White Plains, NY 10601 USA Office: +1-914-304-4333 Web: www.secintel.com info@secintel.com (Email) 2017

More information

AN EVERBRIDGE SOLUTION EVOLVING RISKS FOR CAMPUS EVENTS: CRITICAL CONCEPTS IN COMMUNICATIONS

AN EVERBRIDGE SOLUTION EVOLVING RISKS FOR CAMPUS EVENTS: CRITICAL CONCEPTS IN COMMUNICATIONS EVOLVING RISKS FOR CAMPUS EVENTS: CRITICAL CONCEPTS IN COMMUNICATIONS About the Author Steven M. Crimando is a subject matter expert and trainer specialized in human factors/behavioral sciences in homeland

More information

The FBI s Field Intelligence Groups and Police

The FBI s Field Intelligence Groups and Police The FBI s Field Intelligence Groups and Police Joining Forces By an analyst with the FBI's Directorate of Intelligence ince the terrorist attacks of September 11, 2001, managing and sharing Stimely threat

More information

Total Immersion training at the Spartan Ranch in Maysville, NC

Total Immersion training at the Spartan Ranch in Maysville, NC Mirror Image: From the Edge of Raqqa, The Evolution and Future of ISIS and Their Wilayats Counterterrorism Training June 19-23, 2017 See Special Guest Speakers Total Immersion training at the Spartan Ranch

More information

A Counter-Terrorism Analysis of WikiLeaks:

A Counter-Terrorism Analysis of WikiLeaks: WikiLeaks Project - s War on terrorism through the WikiLeaks prism* By David Bacci, ICT Intern Team** Introduction s war on terrorism spans through several decades. It started abroad, firstly in its exdepartment

More information

COE-DAT Course Catalog. Introduction

COE-DAT Course Catalog. Introduction Introduction The Centre of Excellence Defence Against Terrorism (COE-DAT) is pleased to present the Course Catalog, containing a complete listing of courses and educational programs conducted by COE-DAT.

More information

Regional consultation on the availability and safety of blood transfusion during humanitarian emergencies

Regional consultation on the availability and safety of blood transfusion during humanitarian emergencies Summary report on the Regional consultation on the availability and safety of blood transfusion during humanitarian emergencies WHO-EM/LAB/387/E Tunis, Tunisia 15 16 May 2016 Summary report on the Regional

More information

APPENDIX: FUNCTIONAL COMMUNITIES Last Updated: 21 December 2015

APPENDIX: FUNCTIONAL COMMUNITIES Last Updated: 21 December 2015 FUNCTIONAL Acquisition APPENDIX: FUNCTIONAL COMMUNITIES Last Updated: 21 December 2015 ROLE Plans for, develops, and procures everything from initial spare parts to complete weapons and support systems,

More information

Joint Improvised-Threat Defeat Organization - Mission -

Joint Improvised-Threat Defeat Organization - Mission - Joint Improvised-Threat Defeat Organization - Mission - The Joint Improvised Threat Defeat Organization (JIDO) enables Department of Defense actions to counter improvised-threats with tactical responsiveness

More information

Fiscal Year (FY) 2011 Budget Estimates

Fiscal Year (FY) 2011 Budget Estimates Fiscal Year (FY) 2011 Budget Estimates Attack the Network Defeat the Device Tr ai n the Force February 2010 JUSTIFICATION OF FISCAL YEAR (FY) 2011 BUDGET ESTIMATES Table of Contents - Joint Improvised

More information

1. What is the purpose of common operational terms?

1. What is the purpose of common operational terms? Army Doctrine Publication 1-02 Operational Terms and Military Symbols 1. What is the purpose of common operational terms? a. Communicate a great deal of information with a simple word or phrase. b. Eliminate

More information

HEADQUARTERS DEPARTMENT OF THE ARMY FM US ARMY AIR AND MISSILE DEFENSE OPERATIONS

HEADQUARTERS DEPARTMENT OF THE ARMY FM US ARMY AIR AND MISSILE DEFENSE OPERATIONS HEADQUARTERS DEPARTMENT OF THE ARMY FM 44-100 US ARMY AIR AND MISSILE DEFENSE OPERATIONS Distribution Restriction: Approved for public release; distribution is unlimited FM 44-100 Field Manual No. 44-100

More information

Chemical warfare threat continues to evolve

Chemical warfare threat continues to evolve Chemical warfare threat continues to evolve [Content preview Subscribe to IHS Jane s Intelligence Review for full article] As improvised chemical weapons attacks become increasingly common, greater training

More information

Navy Medicine. Commander s Guidance

Navy Medicine. Commander s Guidance Navy Medicine Commander s Guidance For over 240 years, our Navy and Marine Corps has been the cornerstone of American security and prosperity. Navy Medicine has been there every day as an integral part

More information

Revising the National Strategy for Homeland Security

Revising the National Strategy for Homeland Security Revising the National Strategy for Homeland Security September 2007 The Need for a Revised Strategy Reflect the evolution of the homeland security enterprise since the National Strategy for Homeland Security

More information

Homeland Security Executive Certificate Studies Program Strategies for Homeland Security and Risk Management: Lessons from the World s Top Experts

Homeland Security Executive Certificate Studies Program Strategies for Homeland Security and Risk Management: Lessons from the World s Top Experts Strategies for Homeland Security and Risk Management: Lessons from the World s Top Experts March 18-24, 2018 October 28 - November 3, 2018 Current Security Challenges Terrorism poses an expanding and escalating

More information

ATTACHMENT CISR INCIDENT MANAGEMENT EXERCISE TERRORISM SCENARIO

ATTACHMENT CISR INCIDENT MANAGEMENT EXERCISE TERRORISM SCENARIO ATTACHMENT CISR INCIDENT MANAGEMENT EXERCISE TERRORISM SCENARIO MODULE 1: PRE-INCIDENT A new video is released by a well-known terrorist organization on several internet sites. The video describes striking

More information

TAR IDEAL CONCEPTS LTD.

TAR IDEAL CONCEPTS LTD. COMPANY PROFILE BROCHURE TAR IDEAL CONCEPTS LTD. WORLD LEADER IN SUPPLYING MILITARY AND POLICE EQUIPMENT & TRAINING WWW.TARIDEAL.COM WHO ARE WE? World Leaders in Supplying Military and Police Established

More information

Update Paper - Battle for Mosul and US strategy for Iraq

Update Paper - Battle for Mosul and US strategy for Iraq Ever since the city of Mosul was taken over by the ISIS in June 2014, the Iraqi army along with Turkish and Kurdish Peshmerga forces, assisted by the Coalition forces have made substantial inroads into

More information

GAO WARFIGHTER SUPPORT. Actions Needed to Improve Visibility and Coordination of DOD s Counter- Improvised Explosive Device Efforts

GAO WARFIGHTER SUPPORT. Actions Needed to Improve Visibility and Coordination of DOD s Counter- Improvised Explosive Device Efforts GAO United States Government Accountability Office Report to Congressional Committees October 2009 WARFIGHTER SUPPORT Actions Needed to Improve Visibility and Coordination of DOD s Counter- Improvised

More information

Intro. To the Gulf War

Intro. To the Gulf War Intro. To the Gulf War Persian Gulf War, conflict beginning in August 1990, when Iraqi forces invaded and occupied Kuwait. The conflict culminated in fighting in January and February 1991 between Iraq

More information

The Post-Afghanistan IED Threat Assessment: Executive Summary

The Post-Afghanistan IED Threat Assessment: Executive Summary The Post-Afghanistan IED Threat Assessment: Executive Summary DSI-2013-U-004754-1Rev May 2013 Approved for distribution: May 2013 Dr. Jeffrey B. Miers Director, Operations Tactics Analysis This document

More information

City of Torrance Police Department

City of Torrance Police Department City of Torrance Police Department Testimony of John J. Neu Chief of Police Hearing on Radicalization, Information Sharing and Community Outreach: Protecting the Homeland from Homegrown Terror United States

More information

SHADOW DANGER MOSCOW WITH FSB

SHADOW DANGER MOSCOW WITH FSB B L A C K O P I M M E R S I O N F E D E R A L S E C U R I T Y S E R V I C E SHADOW DANGER MOSCOW WITH FSB ELITE MILITARY EXPERIENCES The only project of its kind providing immersion in the realities of

More information

The NATO Science for Peace and Security (SPS) Programme

The NATO Science for Peace and Security (SPS) Programme The NATO Science for Peace and Security (SPS) Programme Overview of the SPS Programme for Cooperation in Civil Science and Available Grant Opportunities Dr. Deniz Yüksel-Beten, Head Threats & Challenges

More information

Challenges of a New Capability-Based Defense Strategy: Transforming US Strategic Forces. J.D. Crouch II March 5, 2003

Challenges of a New Capability-Based Defense Strategy: Transforming US Strategic Forces. J.D. Crouch II March 5, 2003 Challenges of a New Capability-Based Defense Strategy: Transforming US Strategic Forces J.D. Crouch II March 5, 2003 Current and Future Security Environment Weapons of Mass Destruction Missile Proliferation?

More information

Training and Evaluation Outline Report

Training and Evaluation Outline Report Training and Evaluation Outline Report Status: Approved 18 Feb 2015 Effective Date: 30 Sep 2016 Task Number: 71-9-6221 Task Title: Conduct Counter Improvised Explosive Device Operations (Division Echelon

More information

HOMELAND SECURITY PRESIDENTIAL DIRECTIVE-4. Subject: National Strategy to Combat Weapons of Mass Destruction

HOMELAND SECURITY PRESIDENTIAL DIRECTIVE-4. Subject: National Strategy to Combat Weapons of Mass Destruction [National Security Presidential Directives -17] HOMELAND SECURITY PRESIDENTIAL DIRECTIVE-4 Unclassified version December 2002 Subject: National Strategy to Combat Weapons of Mass Destruction "The gravest

More information

Fighter/ Attack Inventory

Fighter/ Attack Inventory Fighter/ Attack Fighter/ Attack A-0A: 30 Grounded 208 27.3 8,386 979 984 A-0C: 5 Grounded 48 27. 9,274 979 984 F-5A: 39 Restricted 39 30.7 6,66 975 98 F-5B: 5 Restricted 5 30.9 7,054 976 978 F-5C: 7 Grounded,

More information

Helmholtz-Inkubator INFORMATION & DATA SCIENCE

Helmholtz-Inkubator INFORMATION & DATA SCIENCE Helmholtz-Inkubator Incubator INFORMATION & DATA SCIENCE Weiterentwicklung Further developing eines an innovative, neuartigen, association-wide gemeinschaftsweiten approach Ansatzes Last Stand: updated:

More information

USS COLE Commission Report

USS COLE Commission Report D UNCLASSIFIED DoD USS COLE COMMISSION USS COLE Commission Report Learning from the attack on the USS COLE implications for protecting transiting U.S. forces from terrorist attack UNCLASSIFIED DoD USS

More information

San Francisco Bay Area

San Francisco Bay Area San Francisco Bay Area PREVENTIVE RADIOLOGICAL AND NUCLEAR DETECTION REGIONAL PROGRAM STRATEGY Revision 0 DRAFT 20 October 2014 Please send any comments regarding this document to: Chemical, Biological,

More information

Regional meeting of directors of national blood transfusion services

Regional meeting of directors of national blood transfusion services Summary report on the Regional meeting of directors of national blood transfusion services WHO-EM/LAB/386/E Tunis, Tunisia 17 19 May 2016 Summary report on the Regional meeting of directors of national

More information

GLOBAL STRIKE THE INDISPENSABLE CAPABILITY FOR THE 21 ST CENTURY

GLOBAL STRIKE THE INDISPENSABLE CAPABILITY FOR THE 21 ST CENTURY GLOBAL STRIKE THE INDISPENSABLE CAPABILITY FOR THE 21 ST CENTURY Global Strike Global Strike the United States Air Force s unique ability to strike any target in the world at anytime. Global strike, when

More information

Air Force Science & Technology Strategy ~~~ AJ~_...c:..\G.~~ Norton A. Schwartz General, USAF Chief of Staff. Secretary of the Air Force

Air Force Science & Technology Strategy ~~~ AJ~_...c:..\G.~~ Norton A. Schwartz General, USAF Chief of Staff. Secretary of the Air Force Air Force Science & Technology Strategy 2010 F AJ~_...c:..\G.~~ Norton A. Schwartz General, USAF Chief of Staff ~~~ Secretary of the Air Force REPORT DOCUMENTATION PAGE Form Approved OMB No. 0704-0188

More information

Offensive Operations: Crippling Al-Qaeda. MSG H.A. McVicker. United States Army Sergeants Major Academy. Class 58. SGM Feick.

Offensive Operations: Crippling Al-Qaeda. MSG H.A. McVicker. United States Army Sergeants Major Academy. Class 58. SGM Feick. Offensive Operations 1 Running head: OFFENSIVE OPERATIONS: CRIPPLING AL-QAEDA Offensive Operations: Crippling Al-Qaeda MSG H.A. McVicker United States Army Sergeants Major Academy Class 58 SGM Feick 26

More information

Center for Domestic Preparedness (CDP)

Center for Domestic Preparedness (CDP) Center for Domestic Preparedness (CDP) The Center for Domestic Preparedness (CDP) is a vital training component of the Department of Homeland Security, Federal Emergency Management Agency, National Training

More information

5 th Annual EOD/IED & Countermine Symposium

5 th Annual EOD/IED & Countermine Symposium Defense Strategies Institute professional educational forum: 5 th Annual EOD/IED & Countermine Symposium Advancing Counter-IED Capabilities & Decision Support at Home and Abroad November 14-15, 2017 Mary

More information

Introduction to Homeland Security. The Intelligence Community (IC) Director of National Intelligence (DNI) National Intelligence Coord.

Introduction to Homeland Security. The Intelligence Community (IC) Director of National Intelligence (DNI) National Intelligence Coord. Introduction to Homeland Security Chapter 5 Safety & Security: The Intelligence Community The Intelligence Community (IC) Director of National Intelligence (DNI) DDNI National Intelligence Coord. Center

More information

Red Teaming the Terrorist Threat to Preempt the Next Waves of Catastrophic Terrorism

Red Teaming the Terrorist Threat to Preempt the Next Waves of Catastrophic Terrorism Red Teaming the Terrorist Threat to Preempt the Next Waves of Catastrophic Terrorism Dr. Joshua Sinai ANSER Tel: 703/416-3578 joshua.sinai@anser.org 14 th Annual NDIA SO/LIC Symposium & Exhibition 12 February

More information

Threats to Peace and Prosperity

Threats to Peace and Prosperity Lesson 2 Threats to Peace and Prosperity Airports have very strict rules about what you cannot carry onto airplanes. 1. The Twin Towers were among the tallest buildings in the world. Write why terrorists

More information

CHAPTER 7 MANAGING THE CONSEQUENCES OF DOMESTIC WEAPONS OF MASS DESTRUCTION INCIDENTS

CHAPTER 7 MANAGING THE CONSEQUENCES OF DOMESTIC WEAPONS OF MASS DESTRUCTION INCIDENTS CHAPTER 7 MANAGING THE CONSEQUENCES OF DOMESTIC WEAPONS OF MASS DESTRUCTION INCIDENTS Consequence management is predominantly an emergency management function and includes measures to protect public health

More information

Combating Terrorism Threats and Capability to Counter Historical Setting Fragmented groups Professional Subversive Specific Agendas Causes Support War A Few Major Examples First U.S. Aircraft hijacked,

More information

Presentation to the Advanced Planning Briefing for Industry. Dr. Dale Klein

Presentation to the Advanced Planning Briefing for Industry. Dr. Dale Klein Presentation to the Advanced Planning Briefing for Industry Dr. Dale Klein Assistant to the Secretary of Defense for Nuclear and Chemical and Biological Defense Programs April 8, 2003 ATSD (NCB) Organization

More information

Office for Bombing Prevention Bomb Threat Management

Office for Bombing Prevention Bomb Threat Management Bomb Threat Management FOR OFFICIAL USE ONLY Rev: B 1 Second level Third level Fourth level Fifth level Homeland Security Presidential Directive-19 Homeland Security Presidential Directive 19: Establishes

More information

ITTA EOD/C-IED TRAINING

ITTA EOD/C-IED TRAINING ITTA EOD/C-IED TRAINING GENERAL SERVICES ADMINISTRATION / FEDERAL SUPPLY SCHEDULE FOR MOBIS FSC GROUP 874 SPECIAL ITEM NUMBERS: 874-1 CONSULTING SERVICES 874-4 INSTRUCTOR LED TRAINING / COURSE DEVELOPMENT

More information

Middle Eastern Conflicts

Middle Eastern Conflicts Middle Eastern Conflicts Enduring Understanding: Since the fall of the Soviet Union in 1991, the world s attention no longer focuses on the tension between superpowers. Although problems rooted in the

More information

Mirror Image: Training to Combat Terrorism

Mirror Image: Training to Combat Terrorism Mirror Image: Training to Combat Terrorism Register Now for the November 13-17, January 8-12, 2018 and February 26-March 3, 2018 Counter-Terrorism Total Immersion Training Program The Terrorism Research

More information

UNCLASSIFIED. R-1 ITEM NOMENCLATURE PE F: Requirements Analysis and Maturation. FY 2011 Total Estimate. FY 2011 OCO Estimate

UNCLASSIFIED. R-1 ITEM NOMENCLATURE PE F: Requirements Analysis and Maturation. FY 2011 Total Estimate. FY 2011 OCO Estimate Exhibit R-2, RDT&E Budget Item Justification: PB 2011 Air Force DATE: February 2010 COST ($ in Millions) FY 2009 Actual FY 2010 FY 2012 FY 2013 FY 2014 FY 2015 To Complete Program Element 0.000 35.533

More information

UNCLASSIFIED//FOR OFFICIAL USE ONLY

UNCLASSIFIED//FOR OFFICIAL USE ONLY United States Department of Homeland Security Homeland Security Advisory System Increased to Orange for Mass Transit and Passenger Rail July 7, 2005 ATTENTION: Federal Departments and Agencies, State Homeland

More information

Strong. Secure. Engaged: Canada s New Defence Policy

Strong. Secure. Engaged: Canada s New Defence Policy Strong. Secure. Engaged: Canada s New Defence Policy Putting People First Long-term Capability Investments Spending Growth and Financial Transparency Bold New Vision 2 Putting People First People are the

More information

Subj: MARINE CORPS POLICY ON ORGANIZING, TRAINING, AND EQUIPPING FOR OPERATIONS IN AN IMPROVISED EXPLOSIVE DEVICE (IED) ENVIRONMENT

Subj: MARINE CORPS POLICY ON ORGANIZING, TRAINING, AND EQUIPPING FOR OPERATIONS IN AN IMPROVISED EXPLOSIVE DEVICE (IED) ENVIRONMENT DEPARTMENT OF THE NAVY HEADQUARTERS UNITED STATES MARINE CORPS 3000 MARINE CORPS PENTAGON WASHINGTON, DC 20350-3000 MCO 3502.9 POG 15 Jul 2014 MARINE CORPS ORDER 3502.9 From: Commandant of the Marine Corps

More information

IntelCenter. al-qaeda/al-ablaj Threat Assessment v1.0 PUBLIC RELEASE VERSION. 30 May :00:01 EST / 07:00:01 GMT

IntelCenter. al-qaeda/al-ablaj Threat Assessment v1.0 PUBLIC RELEASE VERSION. 30 May :00:01 EST / 07:00:01 GMT al-qaeda/al-ablaj Threat Assessment v1.0 PUBLIC RELEASE VERSION 30 May 2003 02:00:01 EST / 07:00:01 GMT by Ben Venzke (bvenzke@intelcenter.com) http://www.intelcenter.com Page 1 of 9 - v1.0 30 May 2003

More information

The Necessity of Human Intelligence in Modern Warfare Bruce Scott Bollinger United States Army Sergeants Major Academy Class # 35 SGM Foreman 31 July

The Necessity of Human Intelligence in Modern Warfare Bruce Scott Bollinger United States Army Sergeants Major Academy Class # 35 SGM Foreman 31 July The Necessity of Human Intelligence in Modern Warfare Bruce Scott Bollinger United States Army Sergeants Major Academy Class # 35 SGM Foreman 31 July 2009 Since the early days of the Revolutionary War,

More information

Thwarting the Modern Terrorist at Hotels and Special Events

Thwarting the Modern Terrorist at Hotels and Special Events Thwarting the Modern Terrorist at Hotels and Special Events Agenda Introduction Attacks on Special Events Attacks on Hotels Diagnosis of Tactics Utilized Mitigation Strategies Questions Closing Special

More information

Future Strategic Concepts

Future Strategic Concepts Future Strategic Concepts for WMD Related Planning and Operations DTRA01 01 F 0129 Principal Investigators: Dr. Jacquelyn K. Davis and Dr. Charles M. Perry This document contains source sensitive and proprietary

More information

2 Articles on Just Published State Department Country Reports on

2 Articles on Just Published State Department Country Reports on 2 Articles on Just Published State Department Country Reports on Terrorism 2017 Worldwide terrorist attacks decreased by 23 percent in 2017 THE HILL BY JOHN BOWDEN 09/19/18 N i l i l i a l k. a t h a Nathan

More information

UNCLASSIFIED//FOR OFFICIAL USE ONLY

UNCLASSIFIED//FOR OFFICIAL USE ONLY Office of Intelligence 10 November 2011 Warning: This document is (U//FOUO). It contains information that may be exempt from public release under the Freedom of Information Act (5 U.S.C. 552). It is to

More information

Federal Supply Services Authorized Federal Supply Schedule Price List Schedule 084. Contract Number: GS07F5499R

Federal Supply Services Authorized Federal Supply Schedule Price List Schedule 084. Contract Number: GS07F5499R Authorized Federal Supply Schedule 084 Contract Number: GS07F5499R December 1, 2009 through November 30, 2014 Effective through Modification A319 dated July 1, 2013 Triple Canopy, Inc. 12018 Sunrise Valley

More information

M.Khaliq Division of Nuclear Security

M.Khaliq Division of Nuclear Security IAEA Guidance: Overview of the Design Basis Threat (DBT) Methodology and Integration in the Nuclear Security Series M.Khaliq Division of Nuclear Security International Workshop on the Lessons Learned from

More information

The Department of Defense s reliance on

The Department of Defense s reliance on 12 Vertically Synchronizing Operational Contract Support Col. Ed Keller, USAF The Department of Defense s reliance on contractors for the conduct of contingency operations can best be described as significant.

More information

National Defense University. Institute for National Strategic Studies

National Defense University. Institute for National Strategic Studies National Defense University Institute for National Strategic Studies Interim Research Work Plan National Defense University Institute for National Strategic Studies Interim Research Work Plan Contents

More information

Counter Improvised Explosive Devices

Counter Improvised Explosive Devices Counter Improvised Explosive Devices Centre of Excellence Course Catalog 2017 COUNTER IMPROVISED EXPLOSIVE DEVICES CENTRE OF EXCELLENCE INDEX Preface.... 3 C-IED COE Organization.... 4 Milestones... 5

More information

AFCEA Mission Command Industry Engagement Symposium

AFCEA Mission Command Industry Engagement Symposium UNCLASSIFIED/ AFCEA Mission Command Industry Engagement Symposium MG Pete Gallagher Director, Network CFT 3 April 2018 Network CFT Collaboration, Fusion & Transparency WARFIGHTING REQUIREMENTS Army Warfighters

More information

1 Nuclear Weapons. Chapter 1 Issues in the International Community. Part I Security Environment Surrounding Japan

1 Nuclear Weapons. Chapter 1 Issues in the International Community. Part I Security Environment Surrounding Japan 1 Nuclear Weapons 1 The United States, the former Soviet Union, the United Kingdom, France, and China. France and China signed the NPT in 1992. 2 Article 6 of the NPT sets out the obligation of signatory

More information

(U//FOUO) Security Awareness Reminder for the 2011 Holiday Season

(U//FOUO) Security Awareness Reminder for the 2011 Holiday Season (U//FOUO) Security Awareness Reminder for the 2011 Holiday Season 23 November 2011 (U) Scope (U//FOUO) This Joint Intelligence Bulletin provides law enforcement, public, and private sector safety officials

More information

Serving as specialists in cyber communications CRYPTOLOGY TECHNICIAN

Serving as specialists in cyber communications CRYPTOLOGY TECHNICIAN Serving as specialists in cyber communications CRYPTOLOGY TECHNICIAN Analyzing encrypted electronic communications. Jamming enemy radar signals. Deciphering information in foreign languages. Maintaining

More information

Detect, Deny, Disrupt, Degrade and Evade Lethal Threats. Advanced Survivability Suite Solutions for Mission Success

Detect, Deny, Disrupt, Degrade and Evade Lethal Threats. Advanced Survivability Suite Solutions for Mission Success Detect, Deny, Disrupt, Degrade and Evade Lethal Threats Advanced Survivability Suite Solutions for Mission Success Countering Smart and Adaptive Threats Military pilots and aircrews must be prepared to

More information

AIR COMMAND AND STAFF COLLEGE AIR UNIVERSITY UNDERSTANDING THE UNIQUE CHALLENGES OF THE CYBER DOMAIN. Kenneth J. Miller, Major, USAF

AIR COMMAND AND STAFF COLLEGE AIR UNIVERSITY UNDERSTANDING THE UNIQUE CHALLENGES OF THE CYBER DOMAIN. Kenneth J. Miller, Major, USAF AU/ACSC/MILLER/AY10 AIR COMMAND AND STAFF COLLEGE AIR UNIVERSITY UNDERSTANDING THE UNIQUE CHALLENGES OF THE CYBER DOMAIN by Kenneth J. Miller, Major, USAF A Short Research Paper Submitted to the Faculty

More information

Joint Staff J7 / Deputy Director for Joint Training

Joint Staff J7 / Deputy Director for Joint Training Joint Staff J7 / Deputy Director for Joint Training Joint Theater Level Simulation Global Operations Don Weter, CIV Joint Staff J7 Environment Operations Division Program Manager M&S Analysis Larry Hose,

More information

MISSION STATEMENT THE SHIELD PROGRAM HANOVER CRIME TREND AWARENESS. Volume 1 / Issue 8 Monthly Newsletter January 12, 2017

MISSION STATEMENT THE SHIELD PROGRAM HANOVER CRIME TREND AWARENESS. Volume 1 / Issue 8 Monthly Newsletter January 12, 2017 Volume 1 / Issue 8 Monthly Newsletter January 12, 2017 MISSION STATEMENT Through community and multiagency partnerships: receive, analyze, and develop meaningful intelligence to counter crime and extremism

More information

Remarks by Brigadier General Robert Walters Deputy Director for Operations and Intelligence. Delivered at. Pakistan Counter-IED Symposium

Remarks by Brigadier General Robert Walters Deputy Director for Operations and Intelligence. Delivered at. Pakistan Counter-IED Symposium Remarks by Brigadier General Robert Walters Deputy Director for Operations and Intelligence Delivered at Pakistan Counter-IED Symposium May 20, 2013 5000 ARMY PENTAGON, WASHINGTON, DC 20301-5000 / (877)

More information

Keith Weston QPM MA. Senior Research Fellow

Keith Weston QPM MA. Senior Research Fellow Keith Weston QPM MA Senior Research Fellow CONTEST PREVENT terrorism by tackling its underlying causes - violent radicalisation PURSUE terrorists and those that sponsor them- intelligence & investigation

More information

Sep. 11, 2001 Attacks are made against USA

Sep. 11, 2001 Attacks are made against USA 10 Years Later Sep. 11, 2001 Attacks are made against USA Terrorist hijack four commercial aircraft making cross-country journeys and fly two into the World Trade Center in NYC, one into the Pentagon in

More information

Guidelines to Design Adaptive Command and Control Structures for Cyberspace Operations

Guidelines to Design Adaptive Command and Control Structures for Cyberspace Operations Guidelines to Design Adaptive Command and Control Structures for Cyberspace Operations Lieutenant Colonel Jeffrey B. Hukill, USAF-Ret. The effective command and control (C2) of cyberspace operations, as

More information

ALABAMA DEPARTMENT OF HOMELAND SECURITY ADMINISTRATIVE CODE CHAPTER 375-X-2 DUTIES AND RESPONSIBILITIES OF ASSISTANT DIRECTORS TABLE OF CONTENTS

ALABAMA DEPARTMENT OF HOMELAND SECURITY ADMINISTRATIVE CODE CHAPTER 375-X-2 DUTIES AND RESPONSIBILITIES OF ASSISTANT DIRECTORS TABLE OF CONTENTS Homeland Security Chapter 375-X-2 ALABAMA DEPARTMENT OF HOMELAND SECURITY ADMINISTRATIVE CODE CHAPTER 375-X-2 DUTIES AND RESPONSIBILITIES OF ASSISTANT DIRECTORS TABLE OF CONTENTS 375-X-2-.01 375-X-2-.02

More information

Senate Armed Services Committee Statement on Counter-ISIL Campaign. delivered 28 October 2015, Washington, D.C.

Senate Armed Services Committee Statement on Counter-ISIL Campaign. delivered 28 October 2015, Washington, D.C. Ashton Carter Senate Armed Services Committee Statement on Counter-ISIL Campaign delivered 28 October 2015, Washington, D.C. AUTHENTICITY CERTIFIED: Text version below transcribed directly from audio Thank

More information

Expeditionary Force 21 Attributes

Expeditionary Force 21 Attributes Expeditionary Force 21 Attributes Expeditionary Force In Readiness - 1/3 of operating forces deployed forward for deterrence and proximity to crises - Self-sustaining under austere conditions Middleweight

More information

Monday Warm-Up 9/12 What do you know about September 11, 2001?

Monday Warm-Up 9/12 What do you know about September 11, 2001? Monday Warm-Up 9/12 What do you know about September 11, 2001? Know 9/11 Terrorism Al-Qaeda Do Summarize the events of September 11, 2001 by completing a timeline Overview September 11 th, 2001: 19 extremist

More information

Capability Solutions for Joint, Multinational, and Coalition Operations

Capability Solutions for Joint, Multinational, and Coalition Operations USS Ashland patrols waters off coast of Australia during biennial U.S.-Australia bilateral Exercise Talisman Saber 17, Coral Sea, July 21, 2017 (U.S. Navy/Jonathan Clay) Born Multinational Capability Solutions

More information

DSMA NOTICE 01. Military Operations, Plans & Capabilities

DSMA NOTICE 01. Military Operations, Plans & Capabilities DSMA NOTICE 01 Military Operations, Plans & Capabilities Purpose. This Notice aims to prevent the inadvertent disclosure of information which would improve an adversary s knowledge and understanding of

More information

STATEMENT OF: COLONEL MARTIN P. SCHWEITZER COMMANDER, 4 / 82 AIRBORNE BRIGADE COMBAT TEAM UNITED STATES ARMY BEFORE THE

STATEMENT OF: COLONEL MARTIN P. SCHWEITZER COMMANDER, 4 / 82 AIRBORNE BRIGADE COMBAT TEAM UNITED STATES ARMY BEFORE THE STATEMENT OF: COLONEL MARTIN P. SCHWEITZER COMMANDER, 4 / 82 AIRBORNE BRIGADE COMBAT TEAM UNITED STATES ARMY BEFORE THE HOUSE ARMED SERVICES COMMITTEE, TERRORISM & UNCONVENTIONAL THREATS SUB-COMMITTEE

More information

Headquarters Air Mobility Command

Headquarters Air Mobility Command Headquarters Air Mobility Command CCX Version 4-01-05 Operations in a Chemical, Biological, Radiological, and Nuclear Environment AMC Industry Days 1 July 2009 Mr. Larry Magnuson AMC/A3X Counter CBRN PURPOSE

More information

UNCLASSIFIED. UNCLASSIFIED Office of Secretary Of Defense Page 1 of 7 R-1 Line #73

UNCLASSIFIED. UNCLASSIFIED Office of Secretary Of Defense Page 1 of 7 R-1 Line #73 Exhibit R-2, RDT&E Budget Item Justification: PB 2015 Office of Secretary Of Defense Date: March 2014 0400: Research, Development, Test & Evaluation, Defense-Wide / BA 3: Advanced Technology Development

More information

TESTING AND EVALUATION OF EMERGING SYSTEMS IN NONTRADITIONAL WARFARE (NTW)

TESTING AND EVALUATION OF EMERGING SYSTEMS IN NONTRADITIONAL WARFARE (NTW) TESTING AND EVALUATION OF EMERGING SYSTEMS IN NONTRADITIONAL WARFARE (NTW) The Pentagon Attacked 11 September 2001 Washington Institute of Technology 10560 Main Street, Suite 518 Fairfax, Virginia 22030

More information

The Post 9/11 FBI: The Bureau s Response to Evolving Threats

The Post 9/11 FBI: The Bureau s Response to Evolving Threats The Post 9/11 FBI: The Bureau s Response to Evolving Threats Mark F. Giuliano, Assistant Director, FBI Counterterrorism Division April 14, 2011 Statement for the Record The Washington Institute for Near

More information

9 December Strengthened, But More Needs to be Done, GAO/NSIAD-85-46, 5 March

9 December Strengthened, But More Needs to be Done, GAO/NSIAD-85-46, 5 March Lessons Learned on Lessons Learned A Retrospective on the CJCS Joint Lessons Learned Program (JLLP) -----------------------------------------------------------------------------------------------------------

More information

DoD CBRN Defense Doctrine, Training, Leadership, and Education (DTL&E) Strategic Plan

DoD CBRN Defense Doctrine, Training, Leadership, and Education (DTL&E) Strategic Plan i Report Documentation Page Form Approved OMB No. 0704-0188 Public reporting burden for the collection of information is estimated to average 1 hour per response, including the time for reviewing instructions,

More information

2017 National Fusion Center Association. Annual Training Event. At-a-Glance Program

2017 National Fusion Center Association. Annual Training Event. At-a-Glance Program 2017 National Fusion Center Association Annual Training Event At-a-Glance Program At-a-Glance Agenda National Fusion Center Association Annual Training Event Hilton Mark Center Alexandria, Virginia November

More information