Stasi-Agent Putin Allzeit Bereit in Moskau & Dresden

Bildergebnis für putin stasi


In einem Archiv wurde der Stasi-Ausweis des heutigen russischen Präsidenten Wladimir Putin gefunden. Mit dem Ausweis habe er in Stasi-Dienststellen ein- und ausgehen können. Damit zeigt sich, dass es noch etliche Stasi-Promis gibt, die bis jetzt noch nicht enttarnt wurden. Diese Stasi-“Stars” sind nicht auf der offiziellen Stasi-Liste verzeichnet, die im Hinblick auf Rentenforderungen vor dem Ende der DDR erstellt wurde.

Folgen jetzt noch mehr Enttarnungen ?

Russlands Präsident Wladimir Putin (66) hatte bis zum Mauerfall auch einen Ausweis der Staatssicherheit der DDR. Das Dokument habe jahrelang unbemerkt im Archiv gelegen, sagte der Dresdner Außenstellenleiter der Stasiunterlagenbehörde, Konrad Felber..

Der Ausweis war am 31. Dezember 1985 ausgestellt und bis Ende 1989 immer wieder verlängert worden. Putin war damals als Offizier des sowjetischen Geheimdienstes KGB in Dresden tätig.

Mit dem Dokument habe Putin ohne umfangreiche Kontrolle in den Dienststellen der Stasi ein- und ausgehen können, erläuterte Felber.

“Das heißt aber nicht automatisch, dass Putin für die Stasi gearbeitet hat.” Nein, denn die Stasi hat för Putins KGB gearbeitet und diverse Seilschaftenvor allem in Ostberlin tun dies heute noch – Mord und Cyberkrieg inklusive.

“Zu sowjetischen Zeiten waren der KGB und die Stasi befreundete Dienste. Deshalb ist nicht auszuschließen, dass es auch wechselseitige Ausweise gab”, sagte Putins Sprecher Dmitri Peskow der Agentur Tass zufolge.

Putin war Augenzeuge, als während der friedlichen Revolution am 5. Dezember 1989 rund 5.000 Demonstranten die hermetisch abgeschirmte Dresdner Bezirksverwaltung der Staatssicherheit besetzten. Als sich die Demonstranten der Dienststelle näherten, kam es fast zu gewalttätigen Auseinandersetzungen mit sowjetischen Militärs.

Bildergebnis für putin stasi

 

Aufgrund einer Medienanfrage seien Akten der Abteilung “Kader und Schulung” der ehemaligen Stasi-Bezirksverwaltung Dresden durchforstet worden, sagte Felber. Dabei sei man auf den Ausweis gestoßen.

“Es ist schon eine kleine Sensation. Putins Name war in den Akten, die die Ausgabe der Ausweise an sowjetische Militärangehörige nachweisen, nicht verzeichnet.”

Es zeigt sich wieder einmal, wie die Stasiunterlagenbehörde, die seit Beginn mit Stasi-Agenten durchsetzt war und ist, arbeitet.

Bildergebnis für putin stasi

Wann kommen endlich die längst überfälligen anderen Enttarnungen ?

 

Advertisements

DEA Drug Slang Code Unveiled For Law Personel

This Drug Enforcement Administration (DEA) Intelligence Report contains new and updated information on slang terms and code words from a variety of law enforcement and open sources, and serves as an updated version to the product entitled “Drug Slang Code Words” published by the DEA in May 2017. It is designed as a ready reference for law enforcement personnel who are confronted with hundreds of slang terms and code words used to identify a wide variety of controlled substances, designer drugs, synthetic compounds, measurements, locations, weapons, and other miscellaneous terms relevant to the drug trade. Although every effort was made to ensure the accuracy and completeness of the information presented, due to the dynamics of the ever-changing drug scene, subsequent additions, deletions, and corrections are inevitable. Future addendums and updates to this report will attempt to capture changed terminology to the furthest extent possible. This compendium of slang terms and code words is alphabetically ordered, with new additions presented in italic text, and identifies drugs and drug categories in English and foreign language derivations.…AmphetamineAcelerador; Amy; Amps; Bam; B-Bombs; Beans; Bennies; Benz; Black and Whites; Black Beauties; Black Birds; Black Bombers; Black Mollies; Blacks; Blue Boys; Bombita; Brain Ticklers; Brownies; Bumblebees; Cartwheels; Chalk; Chicken Powder; Chochos; Chocolates; Christina; Chunk; Co-Pilot; Coast-to-Coasts; Crisscross; Cross Roads; Cross Tops; Crosses; Debs; Dexies; Diablos; Diamonds; Diet Pills; Dolls; Dominoes; Double Cross; Drivers; Dulces; Fives; Flour; Footballs; French Blues; Geeked Up; Goofballs; Greenies; Head Drugs; Hearts; Horse Heads; In-Betweens; Jelly Babies; Jelly Beans; Jolly Beans; Jugs; LA Turnaround; Leapers; Lid Poppers; Lightening; Little Bombs; Marathons; Mini Beans; Mini Bennies; Morning Shot; Nuggets; Oranges; Pastas; Pastillas; Peaches; Pep Pills; Pepper; Pingas; Pink Hearts; Pixies; Pollutants; Purple Hearts; Rhythm; Rippers; Road Dope; Roses; Rueda; Snaps; Snow Pallets; Sparkle Plenty; Sparklers; Speed; Splash; Sweeties; Sweets; Tens; Thrusters; TR-6s; Truck Drivers; Turnabouts; Uppers; Wake Ups; West Coast Turnarounds; Wheels; Whiffle Dust; White Crosses; Whites; Zoomers…Cocaine7; 62; 77; 777; 921; A-1; Adidas; All-American Drug; Ancla; Angel Powder; Angie; Animals; Apache; Apodo; Arriba; Audi; Aunt Nora; Azucar; Baby Powder; Barrato; Basuco; Bazooka (cocaine paste mixed with marijuana); Beach; Belushi (cocaine mixed with heroin); Bernice; Bernie’s Flakes; Bernie’s Gold Dust; Big Bird; Big Bloke; Big C; Big Flake; Big Rush; Billie Hoke; Bird; Birdie Powder; Blanca Nieves; Blanco; Blast; Blizzard; Blonde; Blocks; Blow; BMW; Board; Bobo; Bolitas; Bolivian Marching Powder; Bombita (cocaine mixed with heroin); Booger Sugar; Bose; Bouncing Powder; Brisa; Bump; C-Dust; Caballo; Caca; Cadillac; California Pancakes; Calves; Canelon; Candy; Car; Carney; Carrie Nation; Cars; Case; Cebolla; Cecil; Cement; Charlie; Chevy; Cheyenne; Chica; Chicanitas; Chinos; Chiva; Cielo; Clear Kind; Clear Tires; Coca; Coca-Cola; Cocazo; Coconut; Coke; Cola; Colorado; Comida; Comida Dulce; Connie; Cookie; Cosa; Coso; Cosos; Crow; Crusty Treats; Cuadro; Death Valley; Designer Jeans; Devil’s Dandruff; Diamonds; Diente; Dienton; Diesel; Diosa Blanca; Dona Blanca; Double Bubble; Double Letters; Dove; Dream; Dulces; Duracell; Durazno; Duro; Dust; Escama; Escorpino; Falopa; Fef1; Fichas; Fiesta; Fire (cocaine base); Fish (liquid cocaine); Fish Scale; Flake; Flea Market Jeans; Florida Snow; Flour; Food; Foolish Powder; Fox; Freeze; Friskie Powder; Frula; Funtime; Gabacho; Galaxy; Gallos; Gato; Gift of the Sun; Gin; Girl; Girlfriend; Glad Stuff; Gold Dust; Green Gold; Gringa; Gringito; Grout; Guerillo; Gueros; Guitar; H1; Hai Hit; Hamburger; Happy Dust; Happy Powder; Happy Trails; Heaven; Heaven Dust; Heavy One; Hen; Henry VIII; HH; HHJ; High Heat; HMH; Hooter; Hundai; Hunter; Ice Cream; Icing; Inca Message; Izzy; Jam; Jaime Blanco; Jaula; Jeep; Jelly; John Deere; Joy Flakes; Joy Powder; Juguetes; Jump Rope; Junk; K13; King’s Habit; Kordell; La Familia; Lady; Lady Snow; Late Night; Lavada; Leaf; Libreta; Line; Loaf; Love Affair; LV; Maca Flour; Madera; Mama Coca; Mandango; Manita; Maradona; Marbol; Material; Mayback (62 grams); Mayo; Melcocha; Media Lata; Mercedes; Milk; Milonga; Mojo; Mona Lisa; Monte; Morro; Mosquitos; Movie Star Drug; Muchacha; Muebles; Mujer; Napkin; Nieve; Niña; Normal; Nose Candy; Nose Powder; Old Lady; Oyster Stew; Paint; Paloma; Paleta; Palomos; Pantalones; Papas; Paradise; Paradise White; Parrot; Pearl; Pedrito; Perico; Personal; Peruvian; Peruvian Flake; Peruvian Lady; Pescado; Peta; Pez; Pichicata; Pillow; Pimp; Pingas; Pingos; Pintura Blanca; Poli; Pollo; Polvo; Powder; Powder Diamonds; Puma; Puritain; Quadros; Queso Blanco; Racehorse Charlie; Rambo; Refresco; Refrescas; Regular Kind; Regular Work; Reindeer Dust; Richie; Rims; Rocky Mountain; Rolex; Rolex HH; Rooster; Scale; Schmeck; Schoolboy; Scorpion; Scottie; Seed; Serpico; Sierra; Shirt; Ski Equipment; Sleigh Ride; Sneeze; Sniff; Snow; Snow Bird; Snow Cone; Snow White; Snowball; Snowflake; Society High; Soda; Soditas; Soft; Space (cocaine mixed with PCP); Special; Speedball (cocaine mixed with heroin); Stardust; Star Spangled Powder; Studio Fuel; Suave; Sugar; Superman; Sweet Stuff; Tabique; Tablas; Talco; Talquito; Tamales; Taxi; Tecate; Teenager; Teeth; Tequila; Thunder; Tire; Tonto; Toot; Tortes; Tortuga; Toyota; T-Shirts; Tubo; Tucibi (pink variety); Turkey; Tutti-Frutti; Vaquita; Wash; Wet; Whack (cocaine mixed with PCP); White; White Bitch; White Cross; White Dove; White Girl; White Goat; White Horse; White Lady; White Mercedes Benz; White Mosquito; White Paint; White Powder; White Rock; White Root; White Shirt; White T; White Wall Tires; Whitey; Whiz Bang; Wings; Wooly; Work; Yayo; Yeyo; Yoda; Zapato; Zip…LSD (Lysergic Acid Diethylamide)Aceite; Acelide; Acid; Acido; Alice; Angels in a Sky; Animal; Avandaro; Backbreaker (LSD mixed with strychnine); Barrel; Bart Simpson; Battery Acid; Beast; Big D; Black Acid (LSD mixed with PCP); Black Star; Black Sunshine; Black Tabs; Blanco de España; Blotter Acid; Blotter Cube; Blue Acid; Blue Barrel; Blue Chair; Blue Cheer; Blue Heaven; Blue Microdots; Blue Mist; Blue Moon; Blue Sky; Blue Star; Blue Tabs; Bomba; Brown Bomber; Brown Dots; California Sunshine; Cherry Dome; Chief; Chinese Dragons; Cid; Coffee; Colorines; Conductor; Contact Lens; Crackers; Crystal Tea; Cubo; Cupcakes; Dental Floss; Dinosaurs; Divina; Domes; Dots; Double Dome; El Cid; Electric Kool Aid; Elefante Blanco; Ellis Day; Fields; Flash; Flat Blues; Ghost; Golden Dragon; Golf Balls; Goofy; Gota; Grape Parfait; Green Wedge; Grey Shields; Hats; Hawaiian Sunshine; Hawk; Haze; Headlights; Heavenly Blue; Hits; Instant Zen; Jesus Christ Acid; Kaleidoscope; Leary; Lens; Lentejuela; Lime Acid; Live, Spit and Die; Lluvia de Estrellas; Looney Tunes; Lucy; Maje; Mellow Yellow; Mica; Microdot; Micropunto Azul (white tablet with drop of blue LSD); Micropunto Morado (white tablet with drop of purple LSD); Mighty Quinn; Mind Detergent; Mother of God; Mureler; Nave; Newspapers; OrangeBarrels; Orange Cubes; Orange Haze; Orange Micros; Orange Wedges; Owsley; Paper Acid; Pearly Gates; Pellets; Phoenix; Pink Blotters; Pink Panthers; Pink Robots; Pink Wedges; Pink Witches; Pizza; Pop; Potato; Pure Love; Purple Barrels; Purple Haze; Purple Hearts; Purple Flats; Recycle; Royal Blues; Russian Sickles; Sacrament; Sandoz; Smears; Square Dancing Tickets; Sugar Cubes; Sugar Lumps; Sunshine; Superman; Tabs; Tacatosa; Tail Lights; Teddy Bears; Ticket; Uncle Sid; Valley Dolls; Vodka Acid; Wedding Bells; Wedge; White Dust; White Fluff; White Lightening; White Owsley; Window Glass; Window Pane; Yellow Dimples; Yellow Sunshine; Zen…Marijuana420; A-Bomb (marijuana mixed with heroin); Acapulco Gold; Acapulco Red; Ace; African Black; African Bush; Airplane; Alfalfa; Alfombra; Alice B Toklas; All-Star; Almohada; Angola; Animal Cookies (hydroponic); Arizona; Ashes; Aunt Mary; AZ; Baby; Bale; Bambalachacha; Barbara Jean; Bareta; Bash; Bazooka (marijuana mixed with cocaine paste); BC Budd; Bernie; Bhang; Big Pillows; Biggy; Bionic (marijuana mixed with PCP); Black Bart; Black Gold; Black Maria; Blondie; Blue Cheese; Blue Crush; Blue Dream; Blue Jeans; Blue Sage; Blueberry; Bobo Bush; Boo; Boom; Branches; Broccoli; Bud; Budda; Burritos Verdes; Bush; Cabbage; Café; Cajita; Cali; Camara; Canadian Black; Catnip; Cheeba; Chernobyl; Cheese; Chicago Black; Chicago Green; Chippie; Chistosa; Christmas Tree; Chronic; Churro; Cigars; Citrol; Cola; Colorado Cocktail; Cookie (hydroponic); Cotorritos; Crazy Weed; Creeper Bud; Crippy; Crying Weed; Culican; Dank; Devils’s Lettuce; Dew; Diesel; Dimba; Dinkie Dow; Diosa Verde; Dirt Grass; Ditch Weed; Dizz; Djamba; Dody; Dojo; Domestic; Donna Juana; Doobie; Downtown Brown; Drag Weed; Dro (hydroponic); Droski (hydroponic); Dry High; Elefante Pata; Endo; Escoba; Fattie; Fine Stuff; Fire; Flower; Flower Tops; Fluffy; Fuzzy Lady; Gallina; Gallito; Garden; Garifa; Gauge; Gangster; Ganja; Gash; Gato; Ghana; Gigi (hydroponic); Giggle Smoke; Giggle Weed; Girl Scout Cookies (hydroponic); Gloria; Gold; Gold Leaf; Gold Star; Gong; Good Giggles; Gorilla; Gorilla Glue; Grand Daddy Purp; Grass; Grasshopper; Green; Green Crack; Green-Eyed Girl; Green Eyes; Green Goblin; Green Goddess; Green Mercedes Benz; Green Paint; Green Skunk; Greenhouse; Grenuda; Greta; Guardada; Gummy Bears; Gunga; Hairy Ones; Hash; Hawaiian; Hay; Hemp; Herb; Hierba; Holy Grail; Homegrown; Hooch; Hoja; Humo; Hydro; Indian Boy; Indian Hay; Jamaican Gold; Jamaican Red; Jane; Jive; Jolly Green; Jon-Jem; Joy Smoke; Juan Valdez; Juanita; Jungle Juice; Kaff; Kali; Kaya; KB; Kentucky Blue; KGB; Khalifa; Kiff; Killa; Kilter; King Louie; Kona Gold; Kumba; Kush; Laughing Grass; Laughing Weed; Leaf; Lechuga; Lemon-Lime; Leña; Liamba; Lime Pillows; Little Green Friends; Little Smoke; Llesca; Loaf; Lobo; Loco Weed; Loud; Love Nuggets; Love Weed; Lucas; M.J.; Machinery; Macoña; Mafafa; Magic Smoke; Manhattan Silver; Manteca; Maracachafa; Maria; Marimba; Mariquita; Mary Ann; Mary Jane; Mary Jones; Mary Warner; Mary Weaver; Matchbox; Matraca; Maui Wowie; Meg; Method; Mersh; Mexican Brown; Mexicali Haze; Mexican Green; Mexican Red; MMJ; Mochie (hydroponic); Moña; Monte; Moocah; Mootie; Mora; Morisqueta; Mostaza; Mota; Mother; Mowing the Lawn; Muggie; My Brother; Narizona; Northern Lights; Nug; O-Boy; OG; O.J.; Owl; Paja; Palm; Paloma; Palomita; Panama Cut; Panama Gold; Panama Red; Pakalolo; Parsley; Pasto; Pasture; Peliroja; Pelosa; Phoenix; Pine; Pink Panther; Pintura; Plant; Platinum Cookies (hydroponic); Platinum Jack; Pocket Rocket; Popcorn; Porro; Pot; Pretendo; Prop 215; Puff; Purple Haze; Purple OG; Queen Ann’s Lace; Red Hair; Ragweed; Railroad Weed; Rainy Day Woman; Rasta Weed; Red Cross; Red Dirt; Reefer; Reggie; Repollo; Righteous Bush; Root; Rope; Rosa Maria; Salt and Pepper; Santa Marta; Sasafras; Sativa; Shoes; Sinsemilla; Shmagma; Shora; Shrimp; Shwag; Skunk; Skywalker (hydroponic); Smoke; Smoochy Woochy Poochy; Smoke Canada; Sour OG; Spliff; Stems; Sticky; Stink Weed; Sugar Weed; Sweet Lucy; Tahoe (hydroponic); Tangy OG; Terp; Terpenes; Tex-Mex; Texas Tea; Tigitty; Tila; Tims; Top Shelf; Tosca; Train Wreck; Trees; Trinity OG; Tweeds; Valle; Wake and Bake; Weed; Weed Tea; Wet (marijuana dipped in PCP); Wheat; White-Haired Lady; Wooz; Yellow Submarine; Yen Pop; Yerba; Yesca; Young Girls; Zacate; Zacatecas; Zambi; Zip; Zoom (marijuana mixed with PCP)…Psilocybin MushroomsAlice; Blue Meanies; Boomers; Buttons; Caps; Champiñones; Cubes; God’s Flesh; Hongos; Lazers; Liberties; Liberty Caps; Little Smoke; Magic; Mushies; Musk; Pizza Toppings; Psilly Billy; Purple Passion; Silly Putty; Simple Simon; Stemmies; Tweezes…WeaponsAK-47: Chivo; Chopper; Cuerno de Chivo
Firearms: Straps
Handgun: Cuete; Rofi; Shorts
Knife: Filero
Long Weapon: Pantalon
Rifles: Cuernos
Weapon: Bracelet; FierroMiscellaneousBorder Patrol Police: Moscas
Bulk Money In US Currency: Verdes; F; Los Americanos
Checkpoints: Jalapeños
Cocaine About To Be Delivered: Ya terminaron de jugar futbol
Cocaine Shipment: Vuelta
Contacts To Get Something Done: El Tiene Manejo
Coordinates Of Maritime Rendezvous Sites And Smuggling Route: Las Direcciones; Frecuencia
Crossing: Cheap Jump
Cutting Agent: Cortina
Dispatch of a Cocaine Shipment: Encomienda
Drug Courier: Burrero; Burrito; Burro; Camello; Correo; Estafeta; Mochilero; Pasador
Drug Dealer: Arreador; Enviciador, Pinguero
Drug Loads: Niños
Drug Potency: Alcance
Drug Proceeds: Invoices; Jabon; Papel; Paper; Phones; Rent; Tickets
Drug Source of Supply: Fuente; Plug
Drug Stash: Alijo; Canuto; Clavo, Planta
Gang Member: Cholo
Hidden Compartment: Clavo
Hideout for Criminals: Aguantadero
Informant: Alcaucil; Batidor; Madrina
Impression Marking On a Kilogram Of Cocaine: Marquilla
Jail: Churo; Condado; Escuela
Kidnappers: Levantadores
Large Truck Used To Transport Drugs: Mula
Law Enforcement: Cochis, Pitufo
Load Vehicles: Muebles
Maritime Voyage Of 100 Miles: 100 Ida
Maritime Voyage Of 100 Miles to Return: 100 de Regreso
Mexican Soldiers: Wachos
Mexican State Police: Pepos
Mexicans: Mejias
Money: Alguita; Bolas; Bread; Feddy; Feria; Food Stamps; Lana; Luz; Paper
Murder: Boleta
One Million Colombian Pesos: Palo
Overdose: Doblar
Overdosed on heroin (but was revived by EMS): Blew Up a Bag
Person Watching Over Stored Cocaine: La Seguridad
Police: Bandera; Chota; Jura; Paco; Zorillos
Police Car: Licuadora
Poor Quality Product: Chafa
Prison: Cachucha; Gayola


Joint Chief – Cyberspace Operations Revealed

Cyberspace operations (CO) is the employment of cyberspace capabilities where the primary purpose is to achieve objectives in or through cyberspace.

This publication focuses on military operations in and through cyberspace; explains the relationships and responsibilities of the Joint Staff (JS), combatant commands (CCMDs), United States Cyber Command (USCYBERCOM), the Service cyberspace component (SCC) commands, and combat support agencies; and establishes a framework for the employment of cyberspace forces and capabilities.

The Nature of Cyberspace Relationship with the Physical Domains.

Cyberspace, while part of the information environment, is dependent on the physical domains of air, land, maritime, and space.

CO use links and nodes located in the physical domains and perform logical functions to create effects first in cyberspace and then, as needed, in the physical domains. Actions in cyberspace, through carefully controlled cascading effects, can enable freedom of action for activities in the physical domains.

Cyberspace Layer Model. To assist in the planning and execution of CO, cyberspace can be described in terms of three interrelated layers: physical network, logical network, and cyberpersona. Department of Defense (DOD) Cyberspace. The Department of Defense information network (DODIN) is the set of information capabilities and associated processes for collecting, processing, storing, disseminating, and managing information on-demand to warfighters, policy makers, and support personnel, whether interconnected or stand-alone, including owned and leased communications and computing systems and services, software (including applications), data, security services, other associated services, and national security systems.

Connectivity and Access. Gaining access to operationally useful areas of cyberspace, including targets within them, is affected by legal, policy, or operational limitations. For all of these reasons, access is not guaranteed. Additionally, achieving a commander’s objectives can be significantly complicated by specific elements of cyberspace being used by enemies, adversaries, allies, neutral parties, and other United States Government (USG) departments and agencies, all at the same time.

The operational environment (OE) is a composite of the conditions, circumstances, and influences that affect the employment of capabilities and impact the decisions of the commander assigned responsibility for it. The information environment permeates the physical domains and therefore exists in any OE. The information environment is the aggregate of individuals, organizations, and systems that collect, process, disseminate, or act on information.

Given that cyberspace is wholly contained within the information environment and the chief purpose of information operations (IO) is to create effects in the information environment, there is significant interdependency between IO and CO.

Integrating Cyberspace Operations with Other Operations

During joint planning, cyberspace capabilities are integrated into the joint force commander’s (JFC’s) plans and synchronized with other operations across the range of military operations. While not the norm, some military objectives can be achieved by CO alone. Commanders conduct CO to obtain or retain freedom of maneuver in cyberspace, accomplish JFC objectives, deny freedom of action to the threat, and enable other operational activities.

Cyberspace Operations Forces

Commander, United States Cyber Command (CDRUSCYBERCOM), commands a preponderance of the cyberspace forces that are not retained by the Services. USCYBERCOM accomplishes its missions within three primary lines of operation: secure, operate, and defend the DODIN; defend the nation from attack in cyberspace; and provide cyberspace support as required to combatant commanders (CCDRs). The Services man, train, and equip cyberspace units and provide them to USCYBERCOM through the SCCs.

Challenges to the Joint Force’s Use of Cyberspace

Threats. Cyberspace presents the JFC’s operations with many threats, from nation-states to individual actors to accidents and natural hazards. Anonymity and Difficulties with Attribution. To initiate an appropriate defensive response, attribution of threats in cyberspace is crucial for any actions external to the defended cyberspace beyond authorized self-defense.

Geography Challenges. In cyberspace, there is no stateless maneuver space. Therefore, when US military forces maneuver in foreign cyberspace, mission and policy requirements may require they maneuver clandestinely without the knowledge of the state where the infrastructure is located.

Technology Challenges. Using a cyberspace capability that relies on exploitation of technical vulnerabilities in the target may reveal its functionality and compromise the capability’s effectiveness for future missions.

Private Industry and Public Infrastructure. Many of DOD’s critical functions and operations rely on contracted commercial assets, including Internet service providers (ISPs) and global supply chains, over which DOD and its forces have no direct authority.

Globalization. The combination of DOD’s global operations with its reliance on cyberspace and associated technologies means DOD often procures mission-essential information technology products and services from foreign vendors.

Mitigations. DOD partners with the defense industrial base (DIB) to increase the security of information about DOD programs residing on or transiting DIB unclassified networks.

Cyber Hackers Attack U.S. State And Local Authorities

 

Bildergebnis für cyber attack

 

An unidentified cyber actor in mid-March 2018 used GrandCrab Version 2 ransomware to attack a State of Connecticut municipality network and a state judicial branch network, according to DHS reporting derived from a state law enforcement official with direct and indirect access. The municipality did not pay the ransom, resulting in the encryption of multiple servers that affected some data backups and the loss of tax payment information and assessor data. The attack against the state judicial branch resulted in the infection of numerous computers, but minimal content encryption, according to the same DHS report.

(U//FOUO) The unidentified cyber actor introduced the ransomware used against the judicial branch network through a vendor server/host; the ransomware then harvested cached credentials of high-level privileged accounts, according to the same DHS report. The actor then used the credentials to access two servers on the network and propagate the malware via server message block (SMB). Connecticut state cybersecurity officials were able to block the ransomware’s communication with external infrastructure, which prevented the encryption of additional hosts and data loss, according to the same DHS report.

(U) GandCrab Malware

(U) Released in late January 2018, GandCrab, also called “GrandCrab,” is a ransomware variant distributed by exploit kits that requires communication with the ransomware’s command-and-control (C2) server to encrypt files of an infected computer, according to an online technical support site. The developers of GandCrab recently upgraded the original version after Romanian police and BitDefender mitigated infections by recovering its decryption keys, according to a separate article from the same online technical support site. As of 6 March 2018, no free decryption key is available to victims of GandCrab version 2. GandCrab uses NameCoin’s .BIT as its top-level domain (TLD); therefore, variants of the ransomware using the .BIT TLD must also use a domain name server that supports .BIT, according to the same online technical support site. Upon infection, GandCrab will attempt to query the ransomware’s C2 servers on the .BIT domain to establish communication. GandCrab will not encrypt a host’s content with the .CRAB extension if communication is not established with the C2 server, according to the same online technical support site.

Director Of U.S. Intelligence Reveals Cyber Threat Frame



Goals for a Common Approach to Threat Frameworks

Following a common approach helps to:

• Establish a shared ontology and enhance information-sharing since it is easier to maintain mapping of multiple models to a common reference than directly to each other

• Characterize and categorize threat activity in a straightforward way that can support missions ranging from strategic decision-making to analysis and cybersecurity measures and users from generalists to technical experts

• Support common situational awareness across organizations

Key Attributes and Goals in Building a Cyber Threat Framework

• Incorporate a hierarchical/layered perspective that allows a focus on a level detail appropriate to the audience while maintaining linkage and traceability of data

• Employ Structured and documented categories with explicitly defined terms and labels (lexicon)

• Focus on empirical/sensor-derived ‘objective’ data

• Accommodate a wide variety of data sources, threat actors and activity

• Provide as a foundation for analysis and decision-making

The Common Cyber Threat Framework

• Since 2012, the Office of the DNI has worked with interagency partners to build and refine The Common Cyber Threat Framework reflecting these key attributes and goals

• The Common Cyber Threat Framework is not intended to displace or replace an organization’s existing model which is tailored to its specific mission and requirements; rather, it is intended to:

Serve as a viable Universal Translator (a cyber Esperanto or Rosetta Stone) facilitating efficient and possibly automated exchange of data and insight across models once each has been mapped to it and the mappings shared

Provide a Starting Point featuring a simple threat model and value-neutral concepts. It can be customized for any organization as needed—and any deviations from the common approach are readily apparent, facilitating mapping and data exchange.

Download The Full Document Here

 

 

 

Operational Law Handbook For Judges By U.S. Army



The Domestic Operational Law (DOPLAW) Handbook for judge advocates is a product of the Center for Law and Military Operations (CLAMO). The content is derived from statutes, Executive Orders and Directives, national policy, DoD Directives and Instructions, joint publications, service regulations, field manuals, as well as lessons learned by judge advocates and other practitioners throughout Federal and State government. This edition includes substantial revisions. It incorporates new guidance set forth in Department of Defense Directive 3025.18 (Defense Support of Civil Authorities), Department of Defense Instruction 3025.21 (Defense Support of Civilian Law Enforcement Agencies), numerous new National Planning Framework documents, and many other recently updated publications. It provides amplifying information on wildfire response, emergency mutual assistance compacts, the role of the National Guard and Army units in domestic response, and provides valuable lessons learned from major disasters such as Hurricanes Harvey, Irma, and Maria.

The Handbook is designed to serve as a working reference and training tool for judge advocates; however, it is not a substitute for independent research. With the exception of footnoted doctrinal material, the information contained in this Handbook is not doctrine. Judge advocates advising in this area of the law should monitor developments in domestic operations closely as the landscape continues to evolve. Further, the information and examples provided in this Handbook are advisory only. The term “State” is frequently used throughout this Handbook, and collectively refers to the 50 States, Guam, Puerto Rico, U.S. Virgin Islands, and the District of Columbia. The same is often referred to as “the 54 States and territories.” Finally, the content and opinions expressed in this Handbook do not represent the official position of the U.S. Army or the other services, the National Guard Bureau, the Office of The Judge Advocate General, The Judge Advocate General’s Legal Center and School, or any other government agency.

A Dual Status Commander maintains a commission in both a Title 10 and Title 32 capacity which helps to unify the effort of the Federal and National Guard personnel involved in the response to a major disaster or emergency. The National Defense Authorization Act for 201261 stated that when Federal forces and the National Guard are employed simultaneously in support of civil authorities,appointment of a Dual Status Commander should be the usual and customary command and control arrangement. This includes Stafford Act major disaster and emergency response missions. The use of Dual Status Commanders is becoming more common for incident response, and they have been used for planned and special events since 2004. Dual Status Commanders receive orders from both the State and Federal chains of command, and thus serve as a vital link between the two. Dual Status Commanders can be appointed in one of two ways. First, under 32 U.S.C. § 315, an active duty Army or Air Force officer may be detailed to the Army or Air National Guard of a State. Second, under 32 U.S.C. § 325, a member of a State’s Army or Air National Guard may be ordered to active duty. Regardless of method of appointment, the Secretary of Defense must authorize the dual status, and the Governor of the effected State must consent.

c. Participation of DoD Personnel in Civilian Law Enforcement Activities

The Federal courts have enunciated three tests to determine whether the use of military personnel violates the PCA. If any one of these three tests is met, the assistance may be considered a violation of the PCA.

The first test is whether the actions of military personnel are “active” or “passive.” Only the active, or direct, use of military personnel to enforce the laws is a violation of the PCA.
The second test is whether the use of military personnel pervades the activities of civilian law enforcement officials. Under this test, military personnel must fully subsume the role of civilian law enforcement officials.
The third test is whether the military personnel subjected citizens to the exercise of military power that was regulatory, proscriptive, or compulsory in nature. A power “regulatory in nature” is one which controls or directs. A power “proscriptive in nature” is one that prohibits or condemns. A power “compulsory in nature” is one that exerts some coercive force. Note that under DoDD 3025.21, Immediate Response Authority may not be used when it may subject civilians to military power that is “regulatory, prescriptive, proscriptive, or compulsory.” Thus, Immediate Response Authority may not be used to circumvent the PCA.

(iii) Civil Disturbance Statutes

The third type of permitted direct assistance by military forces to civilian law enforcement is action taken pursuant to DoD responsibilities under the Insurrection Act, 10 U.S.C. §§ 251-255. This statute contains express exceptions to the Posse Comitatus Act that allow for the use of military forces to repel insurgency, domestic violence, or conspiracy that hinders the execution of State or Federal law in specified circumstances. Actions under this authority are governed by DoDD 3025.21. The Insurrection Act permits the President to use the armed forces to enforce the law when:

There is an insurrection within a State, and the State legislature (or Governor if the legislature cannot be convened) requests assistance from the President;
A rebellion makes it impracticable to enforce the Federal law through ordinary judicial proceedings;
An insurrection or domestic violence opposes or obstructs Federal law, or so hinders the enforcement of Federal or State laws that residents of that State are deprived of their constitutional rights and the State is unable or unwilling to protect these rights.
10 U.S.C. § 254 requires the President to issue a proclamation ordering the insurgents to disperse within a certain time before use of the military to enforce the laws. The President issued such a proclamation during the Los Angeles riots in 1992.

(iv) Other Authority

There are several statutes and authorities, other than the Insurrection Act, that allow for direct DoD participation in civil law enforcement.64 They permit direct military participation in civilian law enforcement, subject to the limitations within each respective statute. This section does not contain detailed guidance; therefore, specific statutes and other references must be consulted before determining whether military participation is permissible. A brief listing of these statutes includes:

Prohibited transactions involving nuclear material (18 U.S.C. § 831)
Emergency situations involving chemical or biological weapons of mass destruction (10 U.S.C. § 282) (see also 10 U.S.C. §§ 175a, 229E and 233E which authorizes the Attorney General or other DOJ official to request SECDEF to provide assistance under 10 U.S.C. § 282)
Assistance in the case of crimes against foreign officials, official guests of the United States, and other internationally protected persons (18 U.S.C. §§ 112, 1116)
Protection of the President, Vice President, and other designated dignitaries (18 U.S.C. § 1751 and the Presidential Protection Assistance Act of 1976)
Assistance in the case of crimes against members of Congress (18 U.S.C. § 351)
Execution of quarantine and certain health laws (42 U.S.C. § 97)
Protection of national parks and certain other Federal lands (16 U.S.C. §§ 23, 78, 593)
Enforcement of the Magnuson-Stevens Fishery and Conservation Management Act (16 U.S.C. § 1861(a))
Actions taken in support of the neutrality laws (22 U.S.C. §§ 408, 461–462)
Removal of persons unlawfully present on Indian lands (25 U.S.C. § 180)
Execution of certain warrants relating to enforcement of specified civil rights laws (42 U.S.C. § 1989)
Removal of unlawful enclosures from public lands (43 U.S.C. § 1065)
Protection of the rights of a discoverer of a guano island (48 U.S.C. § 1418)
Support of territorial Governors if a civil disorder occurs (48 U.S.C. §§ 1422, 1591)
Actions in support of certain customs laws (50 U.S.C. § 220)
Actions taken to provide search and rescue support domestically under the authorities provided in the National Search and Rescue Plan

Cyber operations are not the future. They are now. The National Guard faces the same constraints in cyberspace as in the traditional kinetic realm. However, cyberspace presents some unique challenges. For instance, most military equipment is not governed by restrictive licensing agreements. However, software-licensing agreements may restrict who may use a cyber-tool kit and how that kit may be used. Additionally, cyberspace activities are generally not linear in nature. For example, one computer does not normally interact directly with another computer. Rather, the data is transferred through multiple routers and servers, all of which may not be in the same town, State or even country. As a result, actions intended to have a domestic effect in cyberspace could have international consequences. Additionally, attribution in cyberspace is not as clear as it is in the kinetic realm. What may appear to be an action taken by a local resident could very well be an action orchestrated by a foreign actor. This complex and evolving battle space requires legal practitioners to have both a basic understanding of how the cyberspace works as well as the laws and policies governing those actions.