Coast Guard National Intelligence Activities Instruction Manual
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Course Catalog
UNITED STATES COAST GUARD ACADEMY NEW LONDON, CONNECTICUT CATALOG OF COURSES 2014-2015 Catalog of Courses 5 201 - UNITED STATES COAST GUARD ACADEMY 2014 NEW LONDON, CT OURSES C ALOG OF AT C U. S. Coast Guard Academy Reservation of Rights his Catalog primarily reflects information regarding the Cadet Under- Tgraduate Program for the Class of 2017. The statements set forth in this catalog are for informational purposes only and may not be construed as the basis of a contract between a cadet and the U.S. Coast Guard Academy. Any conflict between this catalog and the applica- ble statutes or regulations shall be resolved by reference to language of the statute or regulation only. The Academy reserves the right to change programs of study, academic requirements, course offerings, regulations, teaching staff, Critical Dates Cal- endar, and other matters described in the catalog without prior notice, in accor- dance with established procedures. The U.S. Coast Guard Academy endeavors to maintain the accuracy of all information provided in this catalog. However, it is the responsibility of the cadets to be aware of the current regulations, cur- riculum, and graduation requirements for their class and chosen major. Human Relations Statement The United States Coast Guard Academy is an equal opportunity employer guided by applicable Federal laws and regulations. The Academy is committed to the principles of fair treatment and equal opportunity. We recruit, educate, train and employ personnel based on merit so that each individual can excel and reach his or her maximum potential without regard to gender, race, color, religion, national origin, reprisal, sexual orientation and/or where applicable, age (over 40) and/or physical or mental disability. -
A General Model of Illicit Market Suppression A
ALL THE SHIPS THAT NEVER SAILED: A GENERAL MODEL OF ILLICIT MARKET SUPPRESSION A Dissertation submitted to the Faculty of the Graduate School of Arts and Sciences of Georgetown University in partial fulfillment of the requirements for the degree of Doctor of Philosophy in Government. By David Joseph Blair, M.P.P. Washington, DC September 15, 2014 Copyright 2014 by David Joseph Blair. All Rights Reserved. The views expressed in this dissertation do not reflect the official policy or position of the United States Air Force, Department of Defense, or the U.S. Government. ii ALL THE SHIPS THAT NEVER SAILED: A GENERAL MODEL OF TRANSNATIONAL ILLICIT MARKET SUPPRESSION David Joseph Blair, M.P.P. Thesis Advisor: Daniel L. Byman, Ph.D. ABSTRACT This model predicts progress in transnational illicit market suppression campaigns by comparing the relative efficiency and support of the suppression regime vis-à-vis the targeted illicit market. Focusing on competitive adaptive processes, this ‘Boxer’ model theorizes that these campaigns proceed cyclically, with the illicit market expressing itself through a clandestine business model, and the suppression regime attempting to identify and disrupt this model. Success in disruption causes the illicit network to ‘reboot’ and repeat the cycle. If the suppression network is quick enough to continually impose these ‘rebooting’ costs on the illicit network, and robust enough to endure long enough to reshape the path dependencies that underwrite the illicit market, it will prevail. Two scripts put this model into practice. The organizational script uses two variables, efficiency and support, to predict organizational evolution in response to competitive pressures. -
THE NAVAL SERVICE.Tif
CHAPTER TWELVE THE NAVAL SERVICE Ninety percent of the world's commerce travels by sea; the vast majority of the world's population lives within a few hundred miles of the oceans; nearly three quarters of the planet is covered by water. Seapower protects the American way of life. -A Cooperative Strategy for 21st Century Seapower Every danger of a military character to which the United States is exposed can be met best outside her own territory-at sea. -Rear Admiral Alfred Thayer Mahan n 2007 the U.S. Coast Guard, Marine Corps, and Navy issued A Cooperative Strategy for 21st Century Seapower, representing the first time the three services I jointly crafted a maritime strategy. The document stresses the naval services' mutual commitment to protecting the homeland and winning and preventing wars. Proliferation of weapons and information technology to transnational threats and rogue states poses an increasing range of threats to U.S. security interests. In addition to threats from kinetic weapons, hybrid warfare threats (e.g., financial, cyber) pose new challenges for the sea services, demanding a coordinated strategy and response. To better understand how responsibility for security in the maritime domain is shared among the sea services, this chapter describes organization, mis sion, and capabilities of each. 157 158 Naval Officer's Guide The Department of the Navy The Department of the Navy (DON) is to "be organized, trained, and equipped primarily for prompt and sustained combat incident to operations at sea'' (Navy Regulations art. 0202). The National Security Act of i947, as amended in i949, gov erns the role of the Navy in national defense. -
U. S. Coast Guard Marine Safety Program
EnhancingEnhancing MaritimeMaritime OutreachOutreach Captain Steve Metruck Captain of the Port Puget Sound National Harbor Conference Seattle, WA May 12, 2008 May 23, 2007 Sector Seattle Vision Statement: “Multi-Mission Professionals safeguarding the Pacific Northwest’s maritime domain through dynamic leadership, partnership and stewardship.” 1 ToTo MultiMulti--missionmission SectorsSectors 2 ““SectorizedSectorized”” LegacyLegacy UnitsUnits Each with their own stakeholders 3 Area of Responsibility 4 5 New York Boston San Francisco Miami LA/LB San Diego Puget Sound: Size Comparison with other Major U.S. Ports Puget Sound: Size Comparison with other Major U.S. Ports PugetPuget SoundSound ChallengesChallenges 3500 sq. miles 15 Billion Gallons of Oil Moved Annually International Border with Canada. US Navy Strategic Port - 3rd Largest Domestic Port 1.3 Million Recreational Boating Population. Washington State Ferry System - 366,000 Washington State -largest in the nation registered (2007) -500+ transits on 10 routes daily ~5000 Deep Draft Ships Growing Cruise Ship Industry: Transits per year - 735K Cruise Ship Passengers in 2007, 200+ vessel arrivals Alaskan Fishing Fleet in 2007, 200+ vessel arrivals Homeport 4.1M TEU containers thru Seattle & Tacoma; 3rd largest in nation; SEA ‘05’s fastest growing U.S. port. 6 A Sector Commander wears many hats, including: Captain of the Port (Jurisdiction/Authorities) Federal Maritime Security Coordinator (HLS) Federal On-Scene Coordinator (Pollution) Officer in Charge of Marine Inspection Search -
The Multimission U.S. Coast Guard Ready, Aware, and Responsive – with Renewed Focus on Mission Execution
03 The Multi-Mission 16.08.2006 7:46 Uhr Seite 96 NAVY PROFILE GORDON I. PETERSON AND SCOTT C. TRUVER1 THE MULTIMISSION U.S. COAST GUARD READY, AWARE, AND RESPONSIVE – WITH RENEWED FOCUS ON MISSION EXECUTION The U. S. Coast Guard is a unique gov- ‘SENTINELS OF THE SEA’ responsibilities over the past two centuries – ernment agency – one whose 216-year becoming what Adm. Thad W. Allen, the history continues to exert a dominant The Coast Guard originated when the U.S. service’s current Commandant, has described as Congress created the Revenue Cutter Service in a ‘clearing house’ for multiple maritime mis- influence on its character, values, and 1790 as a component of the U.S. Treasury sions. The modern Coast Guard came into being mission performance. Owing to its mil- Department. It was Secretary of the Treasury in 1915 when the U.S. Life-Saving Service was itary structure, law-enforcement author- Alexander Hamilton who first referred to the combined with the Revenue Cutter Service. The ity, and humanitarian functions, the youthful service as ‘sentinels of the sea’ for its 1930s saw the Lighthouse Service become part crew of a distinctively painted orange- law-enforcement responsibilities enforcing U.S. of the Coast Guard, and in 1942 the Bureau of striped, white-hulled Coast Guard cutter tariff laws, protecting shipping from pirates, and Marine Inspection was realigned under the Coast will not find it unusual to perform a intercepting smuggled good – including human Guard (which was placed under Department of wide variety of maritime and naval mis- contraband. -
NSA's Efforts to Secure Private-Sector Telecommunications Infrastructure
Under the Radar: NSA’s Efforts to Secure Private-Sector Telecommunications Infrastructure Susan Landau* INTRODUCTION When Google discovered that intruders were accessing certain Gmail ac- counts and stealing intellectual property,1 the company turned to the National Security Agency (NSA) for help in securing its systems. For a company that had faced accusations of violating user privacy, to ask for help from the agency that had been wiretapping Americans without warrants appeared decidedly odd, and Google came under a great deal of criticism. Google had approached a number of federal agencies for help on its problem; press reports focused on the company’s approach to the NSA. Google’s was the sensible approach. Not only was NSA the sole government agency with the necessary expertise to aid the company after its systems had been exploited, it was also the right agency to be doing so. That seems especially ironic in light of the recent revelations by Edward Snowden over the extent of NSA surveillance, including, apparently, Google inter-data-center communications.2 The NSA has always had two functions: the well-known one of signals intelligence, known in the trade as SIGINT, and the lesser known one of communications security or COMSEC. The former became the subject of novels, histories of the agency, and legend. The latter has garnered much less attention. One example of the myriad one could pick is David Kahn’s seminal book on cryptography, The Codebreakers: The Comprehensive History of Secret Communication from Ancient Times to the Internet.3 It devotes fifty pages to NSA and SIGINT and only ten pages to NSA and COMSEC. -
Coast Guard Awards CIM 1560 25D(PDF)
Medals and Awards Manual COMDTINST M1650.25D MAY 2008 THIS PAGE INTENTIONALLY LEFT BLANK. Commandant 1900 Half Street, S.W. United States Coast Guard Washington, DC 20593-0001 Staff Symbol: CG-12 Phone: (202) 475-5222 COMDTINST M1650.25D 5 May 2008 COMMANDANT INSTRUCTION M1625.25D Subj: MEDALS AND AWARDS MANUAL 1. PURPOSE. This Manual publishes a revision of the Medals and Awards Manual. This Manual is applicable to all active and reserve Coast Guard members and other Service members assigned to duty within the Coast Guard. 2. ACTION. Area, district, and sector commanders, commanders of maintenance and logistics commands, Commander, Deployable Operations Group, commanding officers of headquarters units, and assistant commandants for directorates, Judge Advocate General, and special staff offices at Headquarters shall ensure that the provisions of this Manual are followed. Internet release is authorized. 3. DIRECTIVES AFFECTED. Coast Guard Medals and Awards Manual, COMDTINST M1650.25C and Coast Guard Rewards and Recognition Handbook, CG Publication 1650.37 are cancelled. 4. MAJOR CHANGES. Major changes in this revision include: clarification of Operational Distinguishing Device policy, award criteria for ribbons and medals established since the previous edition of the Manual, guidance for prior service members, clarification and expansion of administrative procedures and record retention requirements, and new and updated enclosures. 5. ENVIRONMENTAL ASPECTS/CONSIDERATIONS. Environmental considerations were examined in the development of this Manual and have been determined to be not applicable. 6. FORMS/REPORTS: The forms called for in this Manual are available in USCG Electronic Forms on the Standard Workstation or on the Internet: http://www.uscg.mil/forms/, CG Central at http://cgcentral.uscg.mil/, and Intranet at http://cgweb2.comdt.uscg.mil/CGFORMS/Welcome.htm. -
Canada's Communications Security Establishment: from Cold War to Globalization
CANADA’S COMMUNICATIONS SECURITY ESTABLISHMENT: FROM COLD WAR TO GLOBALISATION Martin Rudner OCCASIONAL PAPER No 22 – 2000 CANADA’S COMMUNICATION SECURITY ESTABLISHMENT: FROM COLD WAR TO GLOBALISATION Martin Rudner OCCASIONAL PAPER No 22 – 2000 The Norman Paterson School of International Affairs Carleton University 1125 Colonel By Drive Ottawa, Ontario K1S 5B6 Telephone: 613-520-6655 Fax: 613-520-2889 www.carleton.ca/npsia This series is published by the Centre for Security and Defence Studies at the School and supported by a grant from the Security Defence Forum of the Department of National Defence. The views expressed in this paper do not necessarily represent the views of the School or the Department of National Defence. TABLE OF CONTENTS Abstract ii Abbreviations iv INTRODUCTION 1 THE BEGINNINGS OF CANADIAN SIGINT 2 CANADA’S SIGINT COLLECTION EFFORT 6 COLD WAR SIGINT OPERATIONS 8 CANADA AND THE UKUSA AGREEMENT 11 SATELLITE COMMUNICATIONS AND ECHELON 13 SIGINT TECHNOLOGY ACCESS AND SHARING 16 CANADA’S POST-COLD WAR SIGINT AGENDA 18 THE ECONOMIC INTELLIGENCE CONUNDRUM 22 FUTURE CHALLENGES 25 Notes 34 About the Author 41 LIST OF OCCASIONAL PAPERS 42 i ABSTRACT The Communications Security Establishment (CSE) is Canada’s largest, best funded and most highly secretive intelligence agency, and is the main provider of foreign intelligence to the Canadian government. CSE collects, analyses and reports on signals intelligence (SIGINT) derived from interceptions of foreign electronic communications, radio, radar, telemetry, and other electromagnetic emissions. In fulfilment of its foreign intelligence function, CSE collaborates closely in a special SIGINT sharing arrangement with the United States, United Kingdom, Australia and New Zealand known as UKUSA. -
Les Centres De Fusion Dans Les Pays Sélectionnés, 2013 : Document De Discussion Et Bibliographie Commentée
Les centres de fusion dans les pays sélectionnés, 2013 : Document de discussion et bibliographie commentée par Elaine Koren RAPPORT DE RECHERCHE : 2015-R040 DIVISION DE LA RECHERCHE www.securitepublique.gc.ca Title [Topic/ Discussion of X/ X Guide/ Summary of X Evaluation/ Synthesis of X] Sub-title [A Literature Review/ An Les points de vue exprimés dans le présent document sont ceux de l’auteure et Annotated Bibliography/ A Meta- ne reflètent pas nécessairement le point de vue de Sécurité publique Canada. La présente étude prend appui sur les sources de données les plus récentes en date de 2013. Tout changement depuis 2013 par Author Name(s) ne s’y reflète pas. Rapport no 038 RAPPORT DE RECHERECHE : 2015-RXXX © Sa Majesté la Reine du chef du Canada, 2016 No au catalogue : PS14-26/2014E No ISBN : 978-1-100-23213-3 LES CENTRES DE FUSION DANS LES PAYS SÉLECTIONNÉS SÉCURITÉ PUBLIQUE CANADA 1 Table des matières Résumé ................................................................................................................................ 4 Principales constatations ...................................................................................................... 5 1.0 Introduction ............................................................................................................................................ 7 2.0 Méthodologie ......................................................................................................................................... 8 2.1 Questions de recherche.................................................................................................... -
Intelligence Training, Comdtinst 1500.26
Commandant 2100 Second Street, S.W. Stop 7360 United States Coast Guard Washington, DC 20593-7360 Staff Symbol: CG-21 Phone: (202) 372-2830 Fax: (202) 372-2956 COMDTINST 1500.26 05JUL2012 COMMANDANT INSTRUCTION 1500.26 Subj: INTELLIGENCE TRAINING Ref: (a) Mandatory Use of the Training Management Tool, COMDTINST 5270.2 (series) (b) Military Personnel Data Records (PDR System), COMDTINST M1080.10 (series) (c) U. S. Coast Guard Competency Management System Manual, COMDTINST M5300.2 (series) (d) Personnel Qualification Standards for Intelligence Personnel, COMDTINST M3870.2 (series) (e) Personnel Qualification Standards for Intelligence Processors and Disseminators, COMDTINST M3870.3 (series) 1. PURPOSE. This Instruction establishes minimum training and qualification policies, procedures and requirements mandated by Commandant for all Coast Guard Intelligence coded billets and other billets located at intelligence units requiring intelligence training. 2. ACTION. All Coast Guard unit commanders, commanding officers, officers-in-charge, deputy/assistant commandants, and chiefs of headquarters staff elements shall comply with the provisions of this Instruction. Internet release is authorized. 3. DIRECTIVES AFFECTED. None. 4. DISCUSSION. This Instruction is intended to be the Intelligence workforce’s (officer, civilian and enlisted) resource for all training requirements mandated by Headquarters. However, the policies, herein, do not prevent area, district, sectors or units from specifying additional training requirements for personnel at the local level. The burden of funding a new/additional training initiative lies with the organization that mandates it. The Intelligence Master Training List (MTL), referred to within, is a living document that supports this Instruction and will be updated as new training requirements are identified and approved. -
KY-58 (Vinson)
KY-58 (Vinson) The KY-57/58 is a member of the VINSON family. The VINSON family consists of wideband secure voice (WBSV) units developed by the National Security Agency to provide line of sight half-duplex voice and data encryption at 16 Kbps. The KY-57/58 provides security for AM/FM, VHF, UHF, half-duplex PTT combat net radios and tactical wireline systems when used with the HYX-57. Also used by non-tactical users for high-level communications in the local wideband telephone networks and wideband satellite terminals. The KY-57 is the manpack/vehicular model and the KY-58 is the airborne/shipborne version. The KY-57/58 is certified to pass data up to TOP SECRET and accepts key from the family of Common Fill Devices and also incorporates remote keying. KY-57/58 production was completed in 1993. No further production is planned. KY-58 photo by Tim Tyler Tim Tyler comments."The photo above depicts the KY-58 unit inside a USCG HH-65C 'Dolphin' helicopter taken in September 2008. It is currently configured just for use on their 225-400MHz aircraft band radio. Supposedly, they're in the process of upgrading the HH-65 helos into an MH-65 (Special Ops capable) configuration which will have APCO P-25 compliant radios (with AES crypto, for talking to other DHS agencies) as well as ANDVT / KY-100 type crypto for communicating with the military-side of USCG ops". The photo above depicts a KY-58 RCU installation in an A-10 attack aircraft. -
A History of U.S. Communications Security (U)
A HISTORY OF U.S. COMMUNICATIONS SECURITY (U) THE DAVID G. BOAK LECTURES VOLUME II NATIONAL SECURITY AGENCY FORT GEORGE G. MEADE, MARYLAND 20755 The information contained in this publication will not be disclosed to foreign nationals or their representatives without express approval of the DIRECTOR, NATIONAL SECURITY AGENCY. Approval shall refer specifically to this publication or to specific information contained herein. JULY 1981 CLASSIFIED BY NSA/CSSM 123-2 REVIEW ON 1 JULY 2001 NOT RELEASABLE TO FOREI6N NATIONALS SECRET HA~mLE YIA COMINT CIIA~HJELS O~JLY ORIGINAL (Reverse Blank) ---------- • UNCLASSIFIED • TABLE OF CONTENTS SUBJECT PAGE NO INTRODUCTION _______ - ____ - __ -- ___ -- __ -- ___ -- __ -- ___ -- __ -- __ --- __ - - _ _ _ _ _ _ _ _ _ _ _ _ iii • POSTSCRIPT ON SURPRISE _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ I OPSEC--------------------------------------------------------------------------- 3 ORGANIZATIONAL DYNAMICS ___ -------- --- ___ ---- _______________ ---- _ --- _ ----- _ 7 THREAT IN ASCENDANCY _________________________________ - ___ - - _ -- - _ _ _ _ _ _ _ _ _ _ _ _ 9 • LPI _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ I I SARK-SOME CAUTIONARY HISTORY __ --- _____________ ---- ________ --- ____ ----- _ _ 13 THE CRYPTO-IGNITION KEY __________ --- __ -- _________ - ---- ___ -- ___ - ____ - __ -- _ _ _ 15 • PCSM _ _ _ _ _ _ _ _ _ _ _ _ _ _