FM30 17 (1972)
FM30 17 (1972)
FM 30-17
^ /T? ^3 y "6 Ô _
COUNTERINTELLIGENCE
OPERATIONS
IANUARY1972
#
m
;Popy 2 *FM 30-17
VlANUAL \
Field Manual HEADQUARTERS
DEPARTMENT OF THE ARMY
-17
No. 30-1 ) Washington, DC, 2U January 1972
COUNTERINTELLIGENCE OPERATIONS
Paragraph Pase
CHAPTER 1. INTRODUCTION 1-1—1-6 1-1
2. ORGANZATION AND EMPLOYMENT
Section I. General 2-1—2-3 2-1
II. CONUS and theaters of operation 2-4—2-7 2-1
III. Military intelligence group (Counterintelli-
gence) ASCOM 2-8—2-13 2-4
CHAFTES 3. INVESTIGATIVE LEGAL PRINCIPLES
Section I. General 3-1—3—4 3-1
II. Obtaining evidence 3-6—3-11 3-2
III. The sworn statement 3-12—3-28 3-8
CHAPTER 4. BASIC INVESTIGATIVE TECHNIQUES
AND PROCEDURES
Section I. Introduction 4-1—4-3 4-1
II. Records examination 4—4—4-6 4-2
III. Interviews 4-7—4-15 4-6
IV. Interrogations 4-16—4-18 4-12
V. Elicitation 4-19—4-22 4-14
VI. Surveillance 4-23—4-30 4-15
VII. Collection and handling of physical evidence .. 4-31—4-35 4—27
VIII. The special agent as a witness 4-36—4-38 4-30
IX. Special situations 4-39—4-40 4-32
CHAPTER 6. TECHNICAL INVESTIGATIVE SERVICES
Section I. General 5-1—6-2 5-1
II. Audio surveillance 5-3—6-5 6-2
III. Surreptitious entry and Investigative photo-
graphy 5-6—5-9 5-5
IV. False documentation and secret writing 5-10—5-11 5-7
V. The polygraph 5-12—5-20 5-8
CHAPTER 6. SOURCES OF INFORMATION
Section I. General 6-1—6-2 6-1
II. Human sources 6-3—6-5 6-1
III. Documentary sources 6-6—6-9 6-2
IV. Technical/materiel sources 6-10—6-11 6-3
V. Liaison 6-12—6-15 6-3
CHAPTER 7. INVESTIGATIVE REPORTS
Section I. Introduction 7-1—7-4 7-1
II. Purpose and use of counterintelligence
investigative reports 7-5—7-11 7-2
CHAPTER 8. PERSONNEL SECURITY INVESTI-
GATIONS
Section I. General • 8-1—8-2 8-1
II. Conduct of background investigations 8-3—8-19 8-1
Chapter 9. COMPLAINT TYPE INVESTIGATIONS
Section I. General- 9-1—9-4 9-1
II. Sabotage investigations 9-5—9-7 9-2
III. Espionage investigations 9-8—9-12 9-3
IV. Treason investigations 9-13—9-16 9-6
CHAPTER 1
INTRODUCTION
1—1. Purpose and Scope synonymous and include officers with MOS Code
a. This manual provides operational guidance 9666—Counterintelligence Officer, warrant
for Army counterintelligence personnel and out- officers with MOS Code 971A—Counterintel-
lines standard investigative procedures for em- ligence Technician, enlisted men with MOS Code
97B—Counterintelligence Agent and DA civilians
ployment by counterintelligence elements and
units of the United States Army. who have been accredited as Special Agents by
the Chief of Personnel Operations, Department
b. This manual includes a general orientation of the Army, and who are assigned to duty for
on several types of counterintelligence elements the performance of counterintelligence functions.
existing within the Army and describes in Accreditation includes issuance of identifying
greater detail the basic techniques and proce- badge and credentials in accordance with AR
dures employed by Army counterintelligence per- 640-20.
sonnel in both peace and wartime situations. Spe-
cific applications of these techniques and proce-
1—3. Scope of Counterintelligence Activities
dures are covered in those chapters which deal
with counterintelligence investigations and ser- The mission of counterintelligence elements and
vices. units is to support the commander through the
detection of treason, espionage, sabotage, sedi-
c. Material in this manual is limited to those
tion, subversive activity, and disaffection, and the
aspects of counterintelligence which are the spe-
prevention and neutralization of espionage and
cific responsibilities and functions of counterin-
sabotage for the protection of the US Army. In
telligence personnel and units in accordance with
the fulfillment of this mission, counterintel-
AR 381-103.
ligence personnel and units engage in a broad
d. The material presented herein is applicable range of operational activities, with direction and
in both nuclear and nonnuclear warfare and in guidance from higher authority, within the areas
chemical, biological, radiological and internal de- of its jurisdiction to include those activities res-
fense environments as well as to peacetime coun- ponsible for—safeguarding defense information;
terintelligence operations. protecting Army functions and property such as
facilities which have classified defense contracts
e. Users of this manual are encouraged to sub- or that have been designated as key defense in-
mit recommended changes or comments to im-
stallations ; conducting personnel security investi-
prove the manual. Comments should be keyed to gations for Army personnel and contractor em-
the specific page, paragraph, and line of the text ployees under the Defense Industrial Security
in which the change is recommended. Reasons
Program ; conducting counterintelligence surveys,
should be provided for each comment to insure services, and inspections ; and conducting investi-
understanding and complete evaluation. Com- gative activities authorized in connection with
ments should be prepared using DA Form 2028 civil disturbances within the United States, the
(Recommended Changes to Publications) and District of Columbia, the Commonwealth of
forwarded direct to the Commanding Officer, US Puerto Rico, and the United States territories
Army Combat Developments Command Intellig-
and possessions. Counterintelligence operations
ence Agency, Fort Huachuca, Arizona 85613. may be divided into the following three catego-
ries:
1—2. Counterintelligence Personnel
a. Counterintelligence Investigations. This op-
As used in this manual, the terms "counterin- erational category constitutes the bulk of the
telligence personnel" and "Special Agents" are counterintelligence workload worldwide, and in-
1-1
3©— H ^
11—2
FM 30-17
a. Conformance to Mission. The basic mission the use of additional investigative techniques, by
requires that every counterintelligence operation consulting additional sources of information, and
support the commander, contribute to the secur- by regularly testing the reliability of those
ity of the US Army, and be within the scope of sources which are utilized over an extended pe-
activities prescribed in the mission of counterin- riod of time. Confirmation of small details, which
telligence units and personnel of the US Army. in themselves appear insignificant, is fundamen-
tal to all investigations and will often prove the
b. Avoidance of Publicity. The "golden word of
only reliable means of establishing the true sta-
intelligence is silence." This is an established tus of a person suspected of participation in hos-
principle in all intelligence operations, and one tile intelligence activities. However, reporting of
that is especially applicable to counterintelligence
information to permit initiation of preventative
activities. There will be occasions when it is de- action, when an immediate threat to security ap-
sirable to publicize successfully completed inves- pears probable, should not be delayed pending
tigations of espionage or other activities to deter confirmation.
others from engaging in such activities, or to en-
courage voluntary reporting of information (i.e., e. Offense. One of the most important princi-
publicizing the location where information of ples of counterintelligence operations is a well-
counterintelligence interest may be reported). In planned positive program of offensive actions to
this, however, counterintelligence personnel must thwart actions of the opposition. The neutraliza-
exercise discretion and avoid individual publicity. tion of hostile espionage and subversive organiza-
tions is especially dependent on positive, offensive
c. Objectivity. Counterintelligence elements are actions for success. Offensive counterespionage
primarily factfinding agencies whose purpose is details are discussed in FM 30-17A, the classified
to collect and report factual data upon which res- supplement to this manual.
ponsible commanders may base decisions relative
to the security of their commands. It is absolutely /. Flexibility. Each counterintelligence ele-
essential that counterintelligence operations be ment, from the individual to the largest opera-
planned, executed, and reported in a completely tional unit, must be able to respond immediately
objective manner. The principle of objectivity is and positively to changes in the situation, e.g., a
perhaps most important in the reporting phase of sudden influx of large numbers of refugees or a
operations. All information pertinent to the issue, rapid change from a peacetime to a hostile envi-
whether favorable or unfavorable to an individ- ronment.
ual or organization, whether consistent with or g. Continuity. Continuity of action in counter-
contrary to previously reported information, intelligence investigations is imperative particu-
must be recorded and reported accurately and ob- larly in connection with case control personnel.
jectively. However, important derivative infor- Continuity can be realized only through meticu-
mation, indicators and/or leads must not be over- lous efforts to have detailed results of investiga-
looked or ignored because they are not based on tions properly recorded in official files. The full
factual information at the time. Such leads may status of any investigation at any given time
be confirmed or substantiated in the future, or should be as clear to successors as to those who
may contribute significantly in other ways to the originally obtained or processed the information
successful conclusion of the investigation. collected or received.
d. Confirmation. Regardless of the probable re- h. Coordination. In all counterintelligence in-
liability of the source of any item of counterintel- vestigations and operations, coordination consist-
ligence information, independent confirmation ent with security considerations and the policy of
will always be sought in all counterintelligence the command is maintained with units and agen-
investigations. Confirmation may be achieved by cies having a direct interest.
1-3
1
+
FM 30-17
CHAPTER 2
Section I. GENERAL
2—4. The US Army Intelligence Command the supervision of the Chief of Staff, Department
The US Army Intelligence Command of the Army, is responsible for the tasking and
(USAINTC), Fort Holabird, Maryland, under controlling of all Army CI activities in support of
2-1
FM 30-17
the CONUS-basèd major commands, Puerto Rico Army in CONUS, counterintelligence operations
and the US Virgin Islands on a geographic area consist primarily of security investigations and
basis. USAINTC exercises control office functions services conducted throughout the geographic
for personnel security investigations which origi- area of responsibility. Figure 2-1 illustrates the
nate in United States Army, Europe (USA- organization of the USAINTC with its subordi-
REUR) ; United States Army, Pacific (USAR- nate MI groups. Figure 2-2 is a chart of the func-
PAC) ; United States Army, Alaska (USARAL), tional organization of a typical CONUS MI
and United States Army, Southern Command group. Subordinate elements of the group—re-
(USARSO). It also performs other intelligence- gions, field offices and resident offices—are stra-
counterintelligence functions as assigned by De- tegically located throughout each of the geo-
partment of the Army and makes recommenda- graphic areas of responsibility. The regional
tions to higher and collocated echelons on these office or headquarters is the principal operational
matters. Military Intelligence Groups (CI) are element of most CONUS groups and normally is
assigned to USAINTC as operating elements responsible for a specific geographic area; this
with the mission of providing CI support to all area may correspond to a single political subdivi-
designated US Army operations in specific geo- sion such as a county, or be comprised of multiple
graphic areas. An MI group is collocated with political subdivisions such as a group of counties,
each of the headquarters of CONUS armies and or portions of one or more states.
the Military District of Washington. The area of
responsibility of a MI group normally coincides 2-5. Tactical Counterintelligence Elements
with the geographic area of the Army to which it The concept of integration of all intelligence spe-
is assigned. Because of the Delimitations Agree- cialists at tactical levels is contained in FM 30-9.
ment and the limited intelligence mission of the Assigned to the field army is a MI battalion or
CG
US ARMY
INTEL COMD
"f
2-2
FM 30-17
CO
D(:o
B&F LN
REGION
group which has subordinate MI units attached accomplished within the area of jurisdiction of
to corps, divisions, and separate brigade-sized the five MI groups in CONUS and, at times, cross
units to provide intelligence support. These units one or more jurisdictional boundaries. Special
contain CI tactical support elements. Military in- Agents of these units will normally notify the ap-
telligence units supporting corps, divisions, and propriate MI groups and/or the senior intellig-
separate brigades/armored cavalry regiments will ence staff officer of the major command of their
move with the supported units when restationed presence in the area and, when permissible, state
or deployed overseas. All tactical intelligence their mission.
units are controlled by the commander of the unit
to which they are attached, with general staff su- 2—7. Theaters of Operation
pervision exercised by the intelligence officer,
S2/G2 or the Assistant Chief of Staff, Intellig- The employment, functions, and operational con-
ence. The CI elements of these units are opera- cept of counterintelligence elements in a theater
tionally restricted to the confines of the military of operations are prescribed in FM 30-9. Coun-
reservation where they are stationed ; however, in terintelligence units must maintain a close work-
CONUS local jurisdictional agreements between ing relationship with other intelligence agencies,
these units and the CONUS MI groups facilitate both civilian and military, with civil affairs and
accomplishment of the mission. with military police elements at all echelons
within the theater in accordance with existing
2-6. Special Counterintelligence Units theater policies. Counterintelligence operations
may be divided into two levels of activity, theater
The Department of Defense, the US Continental army and field army.
Army Command and the US Army Intelligence
Command have assigned counterintelligence per- a. Theater Army. Counterintelligence missions
sonnel and units over which they exercise opera- and activities do vary considerably between the-
tional control. The operations of these units are aters of operation and between peacetime and pe-
2-3
riods of hostilities. Differences are based on the ords facility which will serve all security and in-
number of installations and troop strengths telligence elements of both theater army, and
within a theater, the nature and magnitude of the field army, as well as elements of other US mili-
hostile threat in the area, and the relations and tary services.
agreements with host country and allied govern-
ments. Some situations may require deviations b. Field, Army. The field army is provided coun-
from the general principles of organization and terintelligence support by a CI company organic
control, although deviation is not the normal pro- to the field army MI battalion and by CI elements
cedure. Fundamentally, theater army is a plan- organic to the military intelligence units attached
ning and coordination headquarters that retains to corps, divisions and separate brigade-sized or-
for itself only those functions which cannot be ganizations. However, military intelligence units
accomplished efficiently by lower echelons. The- attached to corps and divisions are controlled by
ater army may delegate the responsibility for the corps and division commanders, respectively,
rear areas to Theater Army Support Command with general staff supervision exercised by the
(TASCOM). The mission of rear area security in- respective G2. The field army has a rear area se-
cludes all aspects of counterintelligence. To ac- curity mission, including all aspects of counterin-
complish the counterintelligence portion of rear telligence, similar to theater army. The CI com-
area security, a MI Group (CI), (sec III), cons- pany assigned to the MI Battalion (Field Army)
isting predominantly of counterintelligence per- normally will have the counterintelligence mis-
sonnel, will be assigned to TASCOM or other res- sion from division rear to the field army rear
ponsible command. To provide area coverage, boundaries. The unit may have several stations
subordinate companies, detachments, or regions strategically located to facilitate control and com-
will be located strategically throughout the area. munication with a number of small mobile teams
Included in this MI Group (CI) is a central rec- working out of each station.
2-4
FM 30-17
Ml Gp, Cl
Imagery | MID
HHC Ml Co, CI*
Intpr i Cen Ree Fac
Legend:
i- —->
L _ . j Augmentation, os required
* One per SGP
operations through direct liaison with the MI conduct reconnaisssance patrols or other combat
Battalion (Field Army) ; the MI group, theater missions against guerrilla forces.
army; and other services or joint intelligence and
c. The MI Group (CI), assists TASCOM unit
security elements at theater level. This group
commanders in the exercise of their security res-
maintains liaison with intelligence and security
ponsibilities and will conduct interviews, inquir-
services of host governments, allied nations, and
ies and other actions necessary to meet
the United States, as well as with military police
USAINTC requirements on PSI and CTI. This
and civil affairs (CA) units which may be pri-
group will exercise control and management of
mary sources of intelligence information. Host
such investigative activities conducted by its sub-
government agencies may be responsible for
ordinate units. This group also exercises central-
providing information on which to base clearance
ized control and management of personnel secur-
actions on indigenous labor force personnel re-
ity actions. The MI group headquarters depends
quested by a TASCOM unit, depending on perti-
on the theater common-user signal system for
nent status of forces agreements, or other appro-
communication with subordinate elements and on
priate agreements.
the personnel and administration (P&A) battal-
ion, ASCOM, for the production of P&A reports
b. The HQ, MI Group (CI), ASCOM, (fig 2-4)
and the maintenance of P&A records.
is organized and trained to operate against the
hostile clandestine threat. It exercises centralized d. The MI Group (CI), has no imagery inter-
control and management of counterespionage, pretation capability. When an air reconnaissance
countersabotage, and countersubversive opera- and surveillance unit is assigned to ASCOM, a
tions within TASCOM. Further, the group is res- cellular-type (TOE 30-600) MI detachment with
appropriate imagery processing and interpreta-
ponsible for unified planning and operations
tion capabilities can be assigned to the group.
against hostile elements whose activities tran-
scend ASGP boundaries. As a result of these op-
erations, this group can collect intelligence infor- 2-10. Military Intelligence Detachment
mation on guerrilla forces. The MI Group (CI), (Central Records Facility)
ASCOM, is not organized, equipped, or trained to The MI Detachment (Central Records Facility),
2-5
FM 30-17
Gp HQ
(fig 2-5) maintains files on personnel of intellig- b. Opening new dossiers and updating existing
ence interest to theater army and provides direct dossiers with incoming reports.
support (DS) to theater army intelligence units.
The detachment performs its mission by— c. Maintaining a central index and a dossier
file.
a. Receiving, screening, extracting, and filing
reports from detachments of the MI Group (CI), d. Responding to queries from within the group
and other intelligence units of the theater and and from other theater army intelligence units,
field armies. conducting file searches and providing support to
Ml Det
Cen Ree Foc
2-6
FM 30-17
2-11. Functions
The MI Detachment (Central Records Facility),
normally is in the immediate vicinity of the MI HQ Sec Op Pit HQ Field Ofc
Tm
Group headquarters and depends on the head-
quarters for its administrative communication
and logistical support. The detachment operates
under the direct supervision of the group S3. It
maintains its own message center and teletype
terminal and provides its own control of classified Per Scty Instl Scty Sp Op
Sec Sec Sec
documents.
2-7
FM 30-17
CHAPTER 3
Section I. GENERAL
3-1
FM 30-17
evidence do not apply, necessarily. In their stead ence of evidentiary problems that arise in the
evidence will be accorded weight consistent with course of an investigation. A general explanation
its relevancy and materiality value. of the rules of evidence is contained in the Man-
b. Counterintelligence personnel are not ex- ual for Courts-Martial, United States, 1969 (Rev.
pected to be experts on rules of evidence nor need Ed.). Specific questions or problems should be di-
they be. However, they must have sufficient rected to a staff judge advocate or other legal of-
knowledge of these rules to recognize the exist- ficer.
3-2
FM 30-17
missible in court, as it must be shown that the to stopping the interrogation may be
suspect, in fact, understood his rights. used against you.)
(2) The explanation of rights will not suffice (2) Any statement you make, oral
if delivered in an off-hand or ambiguous manner. or written, may be used as evidence
Nor should the tone of the interrogator's voice against you in the event of a criminal
suggest that the explanation is a meaningless for- trial or administrative proceeding.
mality. It also would be improper for the interro- (3) (a) For military: You have
gator to "play down" the seriousness of the inves- the right to counsult with a lawyer and
tigation or "play up" the benefits of cooperating. to have a lawyer present with you dur-
In short, the interrogator must not, by words, ac- ing questioning. You may hire a lawyer
tions, or tone of voice, attempt to induce the indi- at your own expense, or a military law-
vidual to waive his right to remain silent or his yer will be appointed for you at no ex-
right to counsel. Such action will be denounced by pense to you. He will be a military law-
the courts as overreaching and contrary to the yer of your own selection if he is reason-
purpose of the explanation of rights requirement. ably available. (You have the right to
The same result will occur if the interrogator ac- both a civilian lawyer at your own ex-
cidentally misstates or confuses the provisions of pense and a military lawyer at the gov-
the explanation. Even in a purely administrative ernment's expense. Your military law-
hearing, it will tend to cast Special Agent in a yer will either be someone you choose,
very unfavorable light; this, in turn, could dam- provided he is reasonably available, or
age his own credibility before the board. In addi- someone appointed who is acceptable to
tion, all other evidence offered will become sus- you.)
pect, for besides excluding illegally obtained (b) For civilians: You have the
statements, the courts may reject, and the boards right to consult vñth a lawyer before
are free to reject, any evidence which is not the being asked any questions and to have
logical product of legally obtained statements. the lawyer present with you during
However, tricking, deceiving, or emphasizing the questioning. If you can/not afford a
benefits of cooperating with the government have lawyer and want one, a lawyer will be
not been declared illegal per se. The methods appointed for you.
used must merely be directed toward obtaining a
(4) Even if you decide to answer
voluntary and trustworthy statement and not to-
questions now without a lawyer present
ward vitiating an otherwise proper Article 31
you may stop answering questions at
and fifth amendment explanation of rights.
any time or stop answering questions
c. The Explanation of Rights. The Special until you consult with a lawyer. (You do
Agent will administer the following explanation not have to answer any of my questions.
of rights, making use of the parenthetical expla- You can answer some, and refuse oth-
nation when the suspect appears confused or in ers. You can stop the interrogation
doubt. Any further explanations which are neces- whenever you wish. If you tell me that
sary should be given as well : you do not want to answer any more
Before I ask you any questions, you questions, I will not ask you any more
must understand your rights. You are questions and we will end the interview
accused or suspected of right there.) Also, you may request a
(offense) by/for (facts lawyer at any time during questioning.
supporting offense). d. Explanation of Rights. If the interviewee in-
(1) You have the right to re- dicates that he wishes to consult with counsel for
main absolutely silent. (You do not have any reason, no further attempt to question him
to answer my questions and you do not will be made until he has conferred with counsel,
have to make any statement. Your deci- or has been afforded the opportunity to do so. If
sion to remain silent cannot be held he decides to waive any right, such as his right to
against you. If you decide to speak, but have counsel present at the interrogation or his
later change your mind, you can assert right to remain silent, he will be informed that
this right at that time and the interro- he may reassert the right at any time. Under no
gation will stop immediately. However circumstances will he be questioned until the in-
any statement you may have made prior terrogator is satisfied that the individual under-
3-3
FM 30-17
stands his rights. An effort will be made to have (1) Do you understand that you have the
him sign a "Waiver Certificate" (part I, DA right to have a lawyer of your choice here at this
Form 2820, Statement of Accused or Suspect Per- interrogation to advise and assist you?
son). If the suspect cannot afford a lawyer, the (2) Do you also understand that your right
interrogation cannot resume until he has been to a military counsel means a professional lawyer
furnished with a qualified counsel. If the suspect and not just an officer or military superior?
refuses an appointed counsel, he must have a rea-
sonable basis for that refusal, e.g., obvious incom- (3) Do you understand that the Army will
petency, but he may not arbitrarily declare the provide you with a military lawyer free of
counsel unacceptable. charge ?
(1) Military Suspects. If the individual is (4) Do you understand that you have the
suspected of an offense under the Uniform Code right to remain silent?
of Military Justice, and is himself subject to the (5) Do you understand that if you decide to
Code, he is entitled to be represented by an attor- answer questions that you may stop whenever
ney at government expense, either an Army law- you choose?
yer of his own choice, or if he is not reasonably
(6) Do you understand that anything you
available, any detailed lawyer from the local
say will be made a matter of written record and
JAG office. The suspect may also retain a civilian
can be used against you in a court of law?
lawyer at his own expense. If the suspect re-
quests his own civilian lawyer, the interrogator f. The Waiver.
must allow him the opportunity to retain one be- (1) Evidence that the suspect made a con-
fore continuing the interrogation. The interroga- scious and knowledgeable decision to answer
tor should assist the individual in obtaining ac- questions without a lawyer (or to speak with the
ceptable counsel. The interrogator may not limit assistance of a lawyer) also should be obtained in
the suspect to one telephone call or otherwise in- writing and through the use of the following ap-
terfere in his assertion of his rights to counsel. answering my questions ?
(2) Civilian Suspects. Civilians generally are (a) Do you understand each right that I
not entitled to have counsel provided for them by have just explained?
the armed services. If a civilian suspect demands (5) Do you have any questions about your
an attorney, the interrogator must permit him to rights ?
retain his own counsel. If he has no lawyer, the
(c) Do you want a lawyer to assist you in
interrogator should aid him in obtaining legal
answering my questions.
counsel by providing him with the names and ad-
{d) Do you want to answer my questions
dresses of local agencies that provide legal ser-
without the assistance of a lawyer?
vices. Such organizations as Legal Aid and the
Lawyer's Referral Service are generally listed in (2) Any written waiver should state explic-
local telephone directories. It is to the interroga- ity:
tor's advantage to aid the suspect, for the interro- (a) I (do, do not) want counsel at this
gation can only continue when the suspect is pro- time.
perly represented. All questions about legal rep- (b) I (do, do not) want to make a state-
resentations should be directed to the local Staff ment or answer questions.
Judge Advocate.
g. Halting Interrogation After Waiver Ob-
e. Understanding of Rights. The interrogator tained.
should be prepared to question the suspect about
each right. Whenever possible a verbatim record- (1) If, at any time and for any reason, the
ing of these questions and answers should be suspect indicates in any manner that he does not
made. If this is not possible, the interrogator want to answer any more questions or wants to
should ask the suspect to acknowledge both the see a lawyer, the interrogation should stop imme-
explanation of rights and his understanding of diately. No attempt should be made to persuade
his rights in writing. It is highly desirable to ob- him to change his mind.
tain oral and written acknowledgements. With (2) If the suspect does not want to stop the
evidence of both oral and written acknowledge- interrogation entirely, but chooses to refuse to
ments, the interrogator is well prepared to rebut answer some questions while answering others,
any charge that the suspect did not understand the interrogator is under no obligation to con-
his rights. Appropriate questions are : tinue but should certainly do so in most cases.
3-4
FM 30-17
However, the interrogator must not end the in- suspicion, report, or good reason to suspect, and
terrogation in a manner calculated to intimidate, it must have been obtained legally. Any evidence
induce, or trick the suspect into answering ques- found as a result of an illegal search or seizure is
tions that he does not care to answer. Under no inadmissible in any civil or military trial and
circumstances should the interrogator ask the might well taint other evidence derived from the
suspect why he decided to reassert his rights. material found, thus precluding further judicial
action.
h. Evidence Obtained Involuntarily From a
Suspect or Accused Person. Article 31 also prohi- b. Legal Search.
bits any use of coercion, unlawful influence, or (1) General.
unlawful inducement in obtaining any other evi- (a) The legality of each search necessarily
dence from a suspect or accused. One general rule depends upon all of the facts in each situation.
is that evidence which requires a suspect to exer- ( b ) A search may be overt or covert.
cise his mental faculties may not be compelled.
Conversely, acts which do not require such exer- (2) Types of legal searches.
cise of the faculties may be compelled provided (а) Search warrant. A search conducted
the means of coercion fall within the limits of in accordance with the authority granted by pro-
fundamental decency and fairness. Each of these per search warrant is lawful. The warrant must
rules is often quite difficult to apply unless guid- be issued from a court having jurisdiction over
ance is obtained from a legal officer or judge ad- the place searched.
vocate. (б) Incident to lawful arrest or apprehen-
sion. A search of an individual's person or the
i. Improper Explanation of Rights. If a suspect clothing he is wearing, and of the property in his
has been interrogated without a proper explana- immediate possession or custody is lawful when
tion of rights, it is possible to cure the defect and conducted as an incident to the lawful apprehen-
proceed after a valid explanation of rights; how- sion of such persons.
ever, he must be told that his previous state- (c) To avoid removal of criminal goods. A
ment(s) cannot be used against him. If the sus- search is lawful when made under circumstances
pect has not been told that his previous state- necessitating the taking of "Immediate Action"
ments cannot be used against him, subsequent ad- to prevent the removal or disposal of property be-
missions might be the result of his belief that his lieved on reasonable grounds to be criminal
earlier admissions were still of use to the Govern- goods.
ment. If the Special Agent does not know (d) Consent search. A search is legal
whether a prior statement was properly obtained, when made with the freely given consent of the
he should give this curative explanation of owner in possession of the property searched.
rights, and he may succeed in producing useful
However, such consent must be the result of a
evidence notwithstanding the irregular procedure knowing and willing waiver of the rights of the
(para 140a, Manual for Courts-Martial, 1969
individual concerned and not the mere peaceful
(Rev. Ed.)).
submission to apparent lawful authority. Circum-
stances may dictate the need to obtain written
3—7. Search and Seizure permission of the owner to avoid later denials
a. Search. The Manual for Courts-Martial and that permission was "freely given." Figure 3—1,
the fourth amendment protect individuals against provides a format which incorporates the legal
"unreasonable searches and seizures of their per- requirements for consent of the owner.
sons, houses, papers and effects" and prescribes (e) United States property.
that this right will not be violated. The fourth 1. A commanding officer having juris-
amendment forms the basis for this right in our diction over the place wherein is situated property
federal, state, and military court systems. An owned or controlled by the United States and
"unlawful search" is one made of a person or of under the control of an armed force may lawfully
his house, papers, or effects without probable authorize the search of such property. It is im-
cause to believe that thereon or therein are lo- material whether or not the property is located
cated certain objects which are subject to lawful in the United States or a foreign country. Such a
seizure. "Probable cause" means evidence from search must also be based upon probable cause.
which a reasonable, prudent, and responsible in- 2. For most purposes, routine personnel
dividual would conclude that an offense has been security investigations and routine investigations
or is being committed; it means more than mere of military or civilian personnel when entering or
3-5
FM 30-17
CONSENT TO SEARCH
DATE:
PLACE :
TIME:
^ Sb , fully understanding
my right to refuse, doo h^ret
hereby voluntarily authorize Special Agent(s)
J-Sl.
paragraph 152 of the Manual for Courts-Martial, 1969 (Rev. Ed.) and
WITNESS :
leaving military areas are not considered to be 3. If possible, requests for authority to
"searches" but are treated as legitimate adminis- search should be in writing and should state suf-
trative measures. Contraband {e.g., narcotics, ficient factual information to support a conclu-
other illegal goods, etc.) may be seized when dis- sion that an offense has been committed and that
covered during a legitimate administrative certain property used in committing the offense,
inspection by gate guards or other personnel. or obtained as a result of the offense, is located at
3-6
FM 30-17
or within the place or property to be searched. band as evidence) or an illegal seizure during a
Permission to search should be granted by in- legal search.
dorsement to such request. (2) In any given judicial procedure, the first
c. Search Procedures. The law of search and point of inquiry will be the legality of the search.
seizure must always be related to the actual cir- If it was illegal, there will be no need to go any
cumstances ; the advice of a staff j udge advocate further; only if the search was legal will it be-
or legal officer should be obtained in any doubtful come necessary to determine the legality of the
case. The following procedures however, are seizure.
valid for any search: f. Seizure. If the search is lawful, certain ob-
(1) The Special Agent secures all available jects may be seized and admitted in evidence
evidence that an offense has been committed and against the suspect:
that property relating to the offense is located at (1) Contraband. Property which is prohi-
a specific place. bited by law. Narcotics and untaxed liquor are
(2) The Special Agent submits this evidence examples.
to the person with authority to order a search of (2) Fruits of the crime. Property which has
the place or property. If the place or property is been wrongfully taken or possessed.
located in a civilian community in the United
States, the evidence is submitted to the judge or (3) The tools or means by which the crime
court with authority to issue a search warrant. If was committed.
the place or property is located in a foreign coun- (4) Other evidence of the crime, such as clo-
try, or occupied territory and is owned, used, or thing.
occupied by persons subject to military law or the
law of war, the evidence is submitted to a com- 3—8. Apprehension
manding officer of the US Armed Forces who has
a. "Apprehension" (called "arrest" in many ci-
jurisdiction over personnel subject to military
vilian jurisdiction) is the taking of a person into
law or to the law of war in the place where the
custody. A person has been taken into custody or
property is located. If the place where the prop-
apprehended when his freedom of movement is
erty is owned or controlled by the United States
restricted in any substantial way.
is under the control of an armed force wherever
located, the evidence is submitted to the com- h. Authorized individuals may apprehend per-
manding officer having j urisdiction over the place sons subject to the UCMJ upon reasonable belief
where the property is located. that an offense has been committed and that the
(3) The person with authority to order a person arrested committed the offense. This is ap-
search must find in the evidence probable cause to prehension for probable cause.
believe that the specified place or property con-
c. The authority of the Special Agent to appre-
tains specified objects subject to lawful seizure. If
hend is specified in Article 7, UCMJ ; paragraph
the person finds probable cause, he may then law- 19a, Manual for Courts-Martial, United States,
fully authorize the search.
(Rev. Ed.), and AR 381-103.
(4) Having been so authorized, the Special
Agent may search the specified place or property d. To cause the apprehension of a DOD affili-
for the specified objects. ated civilian suspect, counterintelligence person-
nel must establish liaison with civilian police who
d. Civilian Search Warrants. To obtain a have arrest authority. The basis for arrest by ci-
search warrant from a civilian court, counterin- vilian police will depend on the particular juris-
telligence personnel must establish liaison with diction concerned. In general, civilian police make
local civilian police agencies who are authorized arrests either by a warrant upon a showing of
to request search warrants and perform the probable cause to a magistrate or without a war-
search. rant, but for probable cause, when a felony or
e. Search and Seizure as Separate Factors. misdemeanor is committed or attempted in their
presence, or if a reasonable belief exists that the
( 1 ) It is possible to have a legal seizure dur-
person committed the offense.
ing an illegal search (e.g., the seizure of contra-
band is always legal, although the illegality of e. Incident to a lawful apprehension, the sus-
the search will prevent the use of such contra- pect's person, clothing that he is wearing, and
3-7
FM 30-17
property in his immediate possession or control violates an individual's rights is usually a com-
may be searched. Any weapon or means of escape plex and technical determination. Advice should
may be lawfully seized in addition to those ob- be obtained from the local judge advocate or as
jects specified in 3-70(2). specified by the unit in its SOP. The mere fact
that such an object is not related to the purpose
3—9. Results of Unlawfully Obtained for which the search was undertaken does not
Evidence necessarily make the seizure unlawful.
Evidence unlawfully obtained through any of the
ways covered in this section is inadmissible as ev- 3—11. Authority to Search
idence against the suspect or accused; any other
evidence subsequently obtained as a result of this a. All searches, overt or covert, require prior
evidence is likewise inadmissible. approval from the unit headquarters or as speci-
fied by SOP.
3—10. Unlawful Seizures b. Agent Reports revealing covert searches will
Whether the use of a particular item in evidence be classified at least CONFIDENTIAL.
3-8
FM 30-17
a. The name of the person making the state- rights, if the sources offer information which
ment (called the "affiant"), his social security ac- tends to incriminate them. At that time, the in-
count number, military unit, or civilian address. terview will be suspended until a full explanation
of rights has been given and a valid Waiver Cer-
b. The place at which the oath affirming the
tificate (part 1, DA Form 2820) has been ob-
statement was administered (the city and state is
tained.
sufficient).
c. When a witness or informant confesses be-
c. The date the statement was affirmed.
fore he was considered a suspect, the Special
d. An acknowledgment, if appropriate, that a Agent may have to explain in court why no ex-
full explanation of rights was given. planation of rights was administered. His expla-
nation will be satisfactory if he can clearly show
e. Statements, if appropriate, showing that any
that at the time of the confession :
decision not to exercise a legal right was made
with full knowledge of the nature of the suspi- (1) the Special Agent did not suspect the
cion, accusation, or investigation, without any subject of a crime,
coercion, unlawful influence, or unlawful induce- (2) the atmosphere in which he was ques-
ment. tioned was not coercive, or
(3) that the confession came as a spontane-
/. An association paragraph (similar to that
ous outburst from the subject.
found in the accompanying Agent Report).
d. Elicitation of information from unsuspecting
g. Relevent probative facts (the body of the
suspects by undercover agents need not be ex-
statement).
posed by the administration of an explanation of
h. A concluding statement (technically the "af- rights as long as such elicitation was not direct
fidavit") by the affiant, supplemented by his ini- questioning of the suspected offense and because
tials at the bottom of each page, acknowledging they normally do not take place in a coercive at-
that he has written, read, or (if blind or illiter- mosphere. However, in cases where it is impor-
ate) heard the statement, understands it, affirms tant to gain competent evidence, the advice of a
it to be true, has approved (by initialing) all judge advocate should be first solicited, as this
corrections, and (if not stated previously) makes area of law is subject to changing technical rules.
the statement freely without hope of benefit or
reward, fear of punishment, and without being 3—17. Waiver of Legal Rights
subject to coercion, unlawful influence, or unlaw-
a. If the subject, suspect, or accused person
ful inducement.
does understand his rights, the Special Agent
i. Signature of the affiant. should then specifically ask him :
j. A statement (technically the "jurat") by the (1) "Do you want counsel?"
official administering the oath attesting that the (2) "Do you consent to being questioned?"
statement was "sworn to and subscribed before
b. If it is desired to obtain competent evidence,
me this day of 19 ,
the person questioned should always complete a
at ".
"Waiver Certificate" (Part 1 of DA Form 2820).
k. Signature of the Special Agent administer- The Special Agent should also establish in the re-
ing the oath. cord of the interview (i.e. through Agent Re-
ports, witnesses, and/or tape recordings) : that
I. Special Agent's authority to administer such
the full explanation of rights was given; that it
oath (Article 136(b), UCMJ).
was understood by the subject, suspect, or ac-
cused person (by his own acknowledgment) ; and
3—16. Explanation of Rights—To Whom that the waiver of a legal right, if any, was made
Given freely, with full knowledge of the charges, the
a. The Constitution and the Uniform Code of consequence of not remaining silent, and with the
Military Justice require that an explanation of awareness that the right or rights waived could
rights be administered to all subjects, suspects, have been reasserted at any time during the in-
and accused persons prior to questioning. terrogation.
b. Sources, such as listed and developed charac- c. The interrogator should ask the following
ter references, will be given an explanation of question of the individual prior to questioning
3-9
FM 30-17
and will include the question in Part II, Sworn d. It is important that any statement obtained
Statement, immediately following the word contain as much detail as possible to minimize the
"oath risk that the statement could be explained or re-
QUESTION : Before you make any statement I pudiated later to avoid criminal implications.
■would like to ask you if you
understand that the word "counsel"
used in Part I, above, means lawyer 3-19. Initials, Marks, and Margins
or attorney or attorney-at-law and
do you understand that by stating The initials of the affiant at appropriate places on
"I do not want counsel" you mean the face of the statement insure against repudia-
that you do not want a lawyer or tion at a later date. By initialing the statement
an attorney or an attorney-at-law
present during your questioning, the affiant adopts it as his own. Typewritten
even though such an attorney or statements prepared by the Special Agent should
lawyer would be furnished to you
free of charge, and if you state "I be initialed—before the first and after the last
do want counsel" it means you word of the statement on each page ; above or be-
want a lawyer or an attorney or
an attomey-at-law present during side each erasure, correction, or crossout; and at
your questioning. Do you also un- the bottom of each page. Handwritten statements
derstand that the words "military
counsel" as used in Part I, above, need not be initialed, except where crosscuts,
means lawyer or attorney in the corrections, and erasures occur. Further, to avoid
military service and not a "military
superior?" charges of tampering, the Agent should type
ANSWER: close to all margins, line out unused spaces, and
draw in margins as appropriate. It is further
suggested that the affiant initial lined-out areas.
3—18. Format
a. All sworn statements should be written in 3—20. Rumor, Second-Hand Information,
the first person. The vocabulary and grammar of and Potential Hearsay
the affiant should be used throughout even if it is
Sworn statements should be requested primarily
vulgar. Parenthetical expressions, official sound-
from persons who have direct, personal knowl-
ing abbreviations, military-style data, and inves-
edge of the facts. If the information offered was
tigative jargon or capitalization (such as "fnu",
"SUBJECT", etc.) should be avoided. This prac- told to the affiant by someone else, the Special
Agent will attempt to obtain a sworn statement
tice insures that the writing reflects the witness'
from the originator. When the Special Agent has
intentions and therefore it is more likely that
courts and administrative agencies will give the opportunity to assist the affiant in preparing
weight to its contents. the statement, he should tactfully attempt to
have the statement distinguish between first-
b. Sworn statements can be written in several hand and second-hand information and state
formats, including: the narrative, the question- clearly the sources of all information. At the
answer, and the combined question-answer-narra- same time, the Agent should not refuse to accept
tive. Sworn statements prepared by or for sworn statements prepared by the affiant which
sources (such as listed or developed character fail to make this distinction. Inadmissible re-
references) usually will be written in the narra- marks can be edited out by the judge or law
tive. This technique is the least time-consuming officer before the statement is read to the jury or
for the Special Agent and the easiest for the court-martial. To assist other investigators and
source who normally is asked to complete a hand- loyalty and suitability adjudicators, however, the
written statement before the interview is termi- Agent should question the affiant about each
nated. When the source tends to be vague in his source of information and note the source in the
expression of crucial information, the Special accompanying agent report.
Agent will employ the question-answer technique
to the extent necessary to assure an accurate and 3-21. Opinions and Conclusions
complete statement.
Opinions and conclusions tend to discredit the re-
c. In all sworn statements prepared for sub- liability of a sworn statement. The function of a
jects, suspects, and accused persons, the Special court-martial, jury, or other adjudicativo board is
Agent will use the question-answer or the ques- to form its own opinion and its own conclusions
tion-answer-narrative format, thereby assuring a from verifiable facts. Therefore, conclusions
substantially verbatim record for use at subse- about the subject's suitability for a "position of
quent adjudications and trials. trust and responsibility" have no place in a sworn
3-10
FM 30—17
statement. Similarly, speculations by the source make the translation. An appropriate certifica-
about the subject's possible motives, income, ac- tion is: "I affirm that I am fully conversant in
tivities, etc., should be avoided whenever possible. both the English and languages and
Instead, the Special Agent should attempt to ob- that my interpretation and translation in prepa-
tain the facts upon which such opinons are based, ration of this sworn statement have been accur-
and persuade or guide the affiant to substitute the ate and complete." The Special Agent must ad-
facts for the opinions. In this way, the fact-find- minister the oath of truthfulness (para 3-27) to
ers are not distracted by irrelevant conclusions the interpreter-translator and attest to its admini-
and the subject, suspect, or accused person is stration by signing a jurat (the "Sworn to and
guaranteed a fair administrative or judicial deci- subscribed before me. ..." paragraph) which will
sion. Following this procedure in no way ham- be entered on the sworn statement following the
pers the investigation; opinions and conclusions interpreter-translator's certificate.
are recorded in the Agent's Report.
3—25. Oath of Truthfulness
3—22. Handwritten Statements
a. Prior to asking the affiant any questions, but
A statement taken at the time of the interview or following the explanation and acknowledgment
interrogation should be in the affiant's own hand- of legal rights, the Special Agent will administer
writing (DA Forms 2820 and 2823 should be the oath. An appropriate oath is: "Do you affirm
used). Nevertheless, typewritten statements are that the statements you are about to make are the
preferred for administrative convenience. There- truth, the whole truth, and nothing but the
fore, if the handwriting of the affiant is difficult truth?" Additional remarks such as "So help you
to read, the Special Agent should have it typed God" are unnecessary and may, in the case of an
and return it to the affiant for his signature, agnostic or an atheist, be offensive.
under oath. Once this is accomplished, the two
statements should be included in the record of the b. If the affiant brings in a sworn statement of
investigation. Under no circumstances should the his own making, the Special Agent will adminis-
original handwritten statement be destroyed. ter the following oath : "Do you affirm that the
statement you are about to sign is the truth, the
whole truth, and nothing but the truth?"
3—23. Statement Taken in Foreign Countries
The procedures for taking statements of US per-
3-26. Unsworn Statements
sonnel outside the United States do not differ
from those employed for taking statements in If a person refuses to make the statement under
CONUS. When statements are taken form the na- oath, the Special Agent should not attempt to per-
tionals of a host country for use by that country suade him to change his mind. However, the
as well as by the United States, the statements Agent may discuss the meaning of the oath and
should conform to that country's requirements as explain that there are severe penalties for false
well. In such instances it should be remembered swearing or making a false official statement, and
that it is the completeness, and not the form, that that an unsworn statement also may be used as
determines the validity of a sworn statement evidence. In a loyalty action every effort should
under American law. A judge advocate should be be made to obtain a sworn statement from the
contacted as to the procedures and legal limita- subject involved.
tions involved in administering an oath to foreign
nationals. 3-27. Unsigned Statements
When a person makes a oral statement under
3-24. Statements in a Foreign Language
oath but refuses to sign a statement prepared
When a sworn statement is taken from a person from his remarks, the Special Agent should not
who does not speak English, an interpreter-trans- attempt to persuade him to change his mind. The
lator must be used. He will assist in the prepara- Agent should explain, however, that it is the
tion of copies of the sworn statement in each lan- oath, and nöt the signature, that makes a state-
guage. Both statements must include a certifica- ment a sworn statement. Therefore, if the affiant
tion by the interpreter-translator that his rendi- has any reservations about the accuracy or com-
tions of the affiant's statements and the Special pleteness of the sworn statement he gave orally,
Agent's questions are accurate and complete and he should consider making another statement
that the interpreter-translator is competent to under oath for the purpose of extending or clari-
3-11
FM 30-17
fying his remarks. If the affiant chooses to make the Special Agent make detailed and accurate
a supplementary sworn statement, the Agent notes for use as support testimony in court.
should repeat the explanation of rights and ob-
tain another completed waiver form. An oral con-
3—28. Examples
fession or admission can be used in court if it is
corroborated even though not sworn to or re- The following are examples of properly executed
duced to writing. It is absolutely necessary that sworn statements.
3-12
FM 30-17
STATEMENT (Continued)
AFFIDAVIT
'■ (Enter Deponent1« Name) HAVE READ OR HAVE HAD READ TO ME THIS STATE-
MENT WHICH BEGINS ON PAGE 1 AND ENDS ON PAGE5 I FULLY UNDERSTAND THE CONTENTS OF THE ENTIRE STATEMENT
MADE BY ME. THE STATEMENT IS TRUE. I HAVE INITIALED ALL CORRECTIONS AND HAVE INITIALED THE BOTTOM OF EACH PAGE
CONTAINING THE STATEMENT. I HAVE MADE THIS STATEMENT FREELY WITHOUT HOPE OF BENEFIT OR REWARD, WITHOUT THREAT
OF PUNISHMENT. AND WITHOUT COERCION, UNLAWFUL INFLUENCE, OR UNLAWFUL INDUCEMENT.
Self-explanatory
(Signature of Person Making Statement)
WITNESSES:
(Signature) Subscribed and sworn to before me. a person authorized by law
to administer oaths, this day of , 19
(NAME TVPRH) at City and State
(SpeMal Agp.nt or 1 f rlvtHan, givp arfHrpgc)
ORGANIZATION OR ADDRESS
(S/A Signature)
fSignarure of Pereon Adminiatering Oath)
Figure 8-2—Continued.
3-14
FM 30-17
l\
Figure 3-2—Continued.
3-15
m m-17
v
INTERROGATOR: WITNESS: ¿¿CCif cJC.
(Signature) (Signature,)
Elliot À. Ness, 116th MI Group
ST A-TEMEN T (Continued)
cclflent. You did not list this arrest on your Statement of Personal History, DD Form
398, dated 10 November 1970. The purpose of this interview is to determine why you
omitted this arrest. Do you understand the purpose of this interview?
I do.
Q: I now show you a copy of DD Form 398 dated 10 November 1970. Do you recall prepar-
ing this form? :
A Yes, I do.
Q Is this your signature on this form?-
m M
L
AFFIDAVIT
Alfred E. Neuman have TO ME THIS STATE-
MENT WHICH BEGINS ON PAGE 1 AND ËNDS ON PAGE 2 I FULLY UNDERSTAND ENTIRE STATEMENT
MADE BY ME. THE STATEMENT IS TRUE. I HAVE INITIALED ALL CORRECTIONS AND TOM OF EACH PAGE
CONTAINING THE STATEMENT. I HAVE MADE THIS STATEMENT FREELY WITHOUT HOPE OF BENEFIT OR REWARD, WITHOUT THREAT
OF PUNISHMENT, AND WITHOUT COERCION, UNLAWFUL INFLUENCE, OR UNLAWFUL INDUCEMENT.
Figure 3-3—Continued.
3-17
FM 30-17
WITNESS STATEMENT
For use of this form, see AR 195-10 - TB PMG 3; the proponent agency is Office of the Provost Marsha I Genera).
PLACE DATE TTIME FILE NUMBER
Fort Huachuca, Arizona RSftn n Tan 77 ! 1300 AB 971-666
LAST NAME, FIRST NAME, MIDDLE NAME SOCIAL SECURITY ACCOUNT NO. I GRADE
FINK. Leonard D. 014-30-7963 i PAC. GS-12
ORGANIZATION OR ADDRESS
Fort Huachuca Security and Plans Office
SWORN STATEMENT
T.pnnarH D. F^nV WANT TO MAKE THE FOLLOWING STATEMENT UNDER OATH
I first met CPT Robert H. Humphrey in May 1965 when I was assigned to the Fort
Huachuca Security and Plans Office. He was the Plans Officer for the Office.
We worked together until August 1968 when he was reassigned somewhere in Asia.
I have not seen him since and we have not communicated in any way. While he
was stationed at Fort Huachuca, we visited in each others homes on an alternate
weekly basis. One day in January 1968, I saw Humphrey placing classified
defense information, to include SECRET material, into his briefcase. I questioned
the necessity of taking classified defense information home, and I pointed out
that it was in violation of^nost regulations. Humphrey told me that he frequently
worked on plans at home that he would not have to work at the office at night,
but Humphrey assured me tn*t he secured the material in his home so that no
unauthorized personnel could\ead or obtain copies of it. I did not repeat this
to our superior, COL WillfcsuB^A. Custer, Chief, Security and Plans, because I was
confident that Humphrey was careiyi with the handling of classified defense
information while it was out of kmt office. I also knew that Humphrey's hobby
was photography with miniature Jamaras and that he maintained his own darkroom
in a storage closet of his quarters? Additionally, I was aware that in August
1968 when Humphrey was departing from SortAHuachuca that the classified cage
easily cleared him and that he had no pM^tjanding documents charged to him. I
am unaware of any altered certificates] o\lcfestruction during any period in which
he was the Destruction Officer for the)Fort»Huachuca Security and Plans Office.
I know of no foreign friends or relatives that he may have. I consider Humphrey
to be an honest, loyal officer in the US Army.^^W^
i/ß
DA 1^.2823
STATSMENT fConiinuôd;
S
A)
fK
AFFIDAVIT
i, Leonard D. Fink HAVE READ OR HAVE HAD READ TO ME THIS STATE-
MENT WHICH BEGINS ON PAGE 1 AND ENDS ON PAGE 2 » FULLY UNDERSTAND THE CONTENTS OF THE ENTIRE STATEMENT
MADE BY ME. THE STATEMENT IS TRUE. I HAVE INITIALED ALL CORRECTIONS AND HAVE INITIALED THE BOTTOM OF EACH PAGE
CONTAINING THE STATEMENT. I HAVE MADE THIS STATEMENT FREELY WITHOUT HOPE OF BENEFIT OR REWARD, WITHOUT THREAT
rww iINDUCEMENT
OF PUNISHMENT, AND WITHOUT COERCION, UNLAWFUL INFLUENCE, OR UNLAWFUL n uui. cracn i p.
AU
(Signature
Ignature ol
o/ Parson Making Statement)
Sis
WITNESSES:
Subscrlbod ond sworn to baforo m«, o person authorised by low
illiam R. Cot! to administer oaths, this 13tMoy of January » 19 7 2
Fort Huachucat Arizona
ORGANIZATION OR ADDRESS
(Signature o/ Parson Adkninlstering Oath)
115th MI Group
Glenn F. Beach
(Typed JYame of Parson Administering Oath)
ORGANIZATION OR ADDRESS Article 136 (M . UCMJ
(Authority To Administer Oathe)
INITIALS OF PERSON MAKING STATEMENT
z
Figure S-U—Continued.
3-19
FM 30-17
CHAPTER 4
Section {. INTRODUCTION
4-1
FM 30-17
4—4. General documentary form does not in itself insure its re-
liability. Many recorded facts, particularly items
The systematic employment of records examina- of biographical data of interest in complaint-type
tion is particularly adaptable and important to and personnel security investigations, are merely
the broad scope of most counterintelligence inves- repetitions of unsubstantiated information
tigations. The full exploitation of records exami- provided by the subject himself. Reliability of
nation as an investigative tool is dependent upon records will vary considerably according to the
several factors which must be considered by the area, the status of the agency or organization
Special Agent : keeping the records, and many other intangible
a. Types of Records Available. The counterin- factors. For example, records to be found in
telligence specialist must know what, where, by highly industrialized Western Europe will be
whom, and for what purpose records are main- more extensive and far more reliable than those
tained throughout the area in which he is operat- of underdeveloped areas of Southeast Asia. Until
ing. The initial orientation of a Special Agent, experience with a certain type of record has been
upon his assignment to an operational unit, sufficient to establish a basis for evaluating their
should stress thorough familiarity with records reliability, it is necessary to treat information
which can be of assistance in investigations. from these records with skepticism.
d. Legal Aspects. If the record of interest is to
b. Methods of Gaining Access to Records. Most
be used in a court or board proceeding, the man-
records will be available to the Special Agent on
ner in which the record is copied, extracted, or
an official request basis. In some cases, however,
preserved will have a bearing on its use as evi-
access will be contingent upon the ability of the
dence.
investigator to obtain discreet cooperation of the
custodian of the records. Such cooperation will be e. Value of Negative Information. In counterin-
enhanced by mature, professional conduct and at- telligence investigations, for example, the ab-
titued, effective liaison, and mutual assistance. If sence of a record is often just as important as the
all efforts to obtain the desired information fail it existence of a record. This is especially important
must be recognized that such information or rec- in the investigation of biographical data fur-
ords are not obtainable by a subpoena if a legal nished by the subject of a complaint-type investi-
proceeding has not been initiated. A search war- gation. Another example is the systematic and
rant could compromise an investigation even if meticulous examination of records to confirm or
the required probable cause, in the legal sense, refute a suspect's story is very often the best
could be shown. Consequently, there will be occa- means of breaking and enemy intelligence agent's
sions when documentary information or evidence cover story.
will have to be obtained through other investiga-
tive means. 4—5. Types of Records of Counterintelligence
c. Reliability of Recorded Data. The possibility Interest
of intentional deception or false information in The types of records and amount of detail of
both official and unofficial records must always be their content will vary markedly with the area of
considered. The fact that data is recorded in some operation. Regardless of the area, it is important
4-2
FM 30-17
for the Special Agent to be aware of the types of world. The residence record may be for tax pur-
records he may be able to use in the conduct of poses, in which case it probably will be found on
investigations. The following are some of the file at some local fiscal or treasury office; when
major types of records which often will be of the residence record is needed for police and se-
value for information or for leads. curity purposes, it is usually kept in a special sep-
arate police file. Residence directories, telephone
a. Police and Security Agencies. Local, re-
books, and utility company records may also be
gional, and national police agencies of most na-
used. In other countries, the village chief may
tions maintain extensive personality files on crim-
maintain these records which may double as a re-
inals, suspects, victims, and other persons who
cord of vital statistics reflecting births, mar-
have come to the official attention of police in
riages, and deaths.
connection with some actual or alleged criminal
activity. Police interest in precise descriptive de- e. Education. Both public and private schools
tails, often including photographs and fingerprint at all levels, from primary grades through uni-
cards, makes police records particularly valuable versities, will have records which may serve for
and usually more reliable than comparable records purposes of background verification. The school
of other agencies. Police and security agency files yearbook or comparable publiaction at most
are usually divided into subcategories ; it is im- schools will contain a photograph and brief re-
portant for the Special Agent to become familiar sume of the activities of each graduating class
with the records system concerned to insure that member, a record of value both for verification
all pertinent files have actually been checked. and as an aid to locating leads. Registrar records
normally contain a limited amount of biographi-
b. Intelligence Agencies. Because the reliability
cal data and a detailed account of academic activ-
and validity of records checks with allied intellig-
ities.
ence agencies will often depend to a large degree
on the personal relationship between the counter- /. Employment. Official and Business records
intelligence representative and the custodian of related to employment of individuals may be of
the records of interest, such examinations nor- value.
mally will be the assigned responsibility of a liai- (1) Personnel records. Personnel records
son officer. This may also be necessary with other usually contain information on dates of employ-
agencies when the volume of records examina- ment, positions held, payment recieved, efficiency,
tions dictates the need for a single representative reason for leaving, attendance record, special
of the counterintelligence element. At times it skills, and biographical and identifying data. Ac-
may be necessary, due to the sensitivity of a par- cess to such records for the Special Agent will be
ticular investigation, to conceal specific interest relatively simple in the United States but may
in a person whose name is to be checked. In this prove difficult in some overseas areas. In such
instance, the name of the individual may be sub- areas it may be possible to obtain the records
mitted routinely in the midst of a lengthy list of through liaison with local civil authorities, or
persons of routine interest who are to be checked. through private credit and business rating firms.
c. Vital Statistics. The recording of births, (2) Unemployment, and social security rec-
deaths, and marriages is mandatory in nearly ords. Depending upon the area of operation, there
every nation, either by national or local law. This may be either local, regional, or national offices
information may only be maintained in family for the administration of unemployment and so-
journals or Bibles in newly developing countries cial security programs. Records of these offices
or in the case of very old records. In any case, often will contain extensive background material
confirmation of such dates may be important in on individuals, but in most cases these data will
many types of investigations. The records sought represent unsubstantiated information provided
may be filed at local level, as is usually the case by the applicant and cannot necessarily be re-
in overseas areas, or they may be kept at state or garded as confirmation of other data obtained
regional level, such as with state bureaus of vital from the same individual. It must be noted, how-
statistics in the United States. Rarely will origi- ever, that the records of the US Social Security
nal vital statistics records on individuals be Administration can only be obtained by the De-
maintained centrally with a national agency. partment of Justice by written request in cases
involving high level security investigations.
d. Residence. Some form of official registration
of residence is required in most nations of the g. Citizenship. Immigration, naturalization,
4-3
FM 30-17
passport, and similar records of all nations con- larly if the individual has had national guard or
tain data regarding1 the citizenship status of in- reserve status as a commissioned or warrant
dividuals. In most instances, independent investi- officer. This would, however, be the exception
gation has been undertaken to verify background rather than the rule.
information contained in such records, and thus (d) Army hospital records which have
these are generally more reliable than other been retired are filed by hospital, by year, by
types. The records of both official and private re- name; consequently, the hospital name and year
fugee welfare and assistance agencies will also will be required.
provide extensive details relating to the citizen- (2) Foreign records. Access to foreign mili-
ship status of persons of counterintelligence in- tary records in overseas areas may be very diffi-
terest. As a general rule, refugee records (partic- cult. In cases where it is not possible to arrange
ularly those of private welfare groups) should be for examination of official records, leads or perti-
used as a source of leads rather than for verifica- nent information may be obtained from unofficial
tion of factual data inasmuch as they have been unit histories and similar documents which have
found to be unreliable in nearly all areas of oper- been published commercially and also from files
ation. on various veteran organizations. Since military
h. International Travel. A system of access to service is a convenient means of accounting for
records of international travel is especially im- periods of time spent in intelligence activities, or
portant to counterintelligence operations in over- periods of imprisonment, it is frequently a criti-
seas areas. Records of interest include customs cal item in dealing with suspected enemy agents.
records, passport and visa applications, passenger Special efforts may be made to locate some form
manifests of commercial carriers, currency ex- of records which will either confirm or deny an
change files, transient residence registrations, individual's service in a particular unit or the ex-
private and government travel agency records, istence of the unit at the time and place he claims
and frontier control agency (e.g., border police) to have served. Order of battle and personality
files. Records of foreign travel of US citizens are files of various intelligence services also may be
maintained by the State Department and such in- helpful.
formation is available by means of a National j. Miscellaneous Organizational Affiliation.
Agency Check in accordance with AR 381-130. Many organizations maintain records which may
i. Military Service. Records of current and past be of value to a particular investigation. Exam-
members of the armed services of most nations ples are labor unions, social, scientific, sport
are detailed and are usually accurate : groups, cultural and subversive organizations.
Although it is important for the Special Agent to
(1) US records. Counterintelligence special- consider such organizations when seeking sources
ists will encounter no difficulty in obtaining ac-
of information, he must be thoroughly familiar
cess to US military service records on an official
with the organization before attempting to ex-
request basis. If a serviceman changes branches, ploit it. Organizations are often established as
has a break in service, or is hospitalized, certain front groups or cover vehicles for hostile intellig-
elements of information must be furnished to the ence operations.
control office so these records can be located for
review if necessary :
4—6. Access to Records
(a) For those personnel who have changed
branches of service, the control office will need Having determined which records may include in-
the man's former service number, social security formation pertinent to an investigation, the Spe-
account number, full name, and date and place of cial Agent must select the best means of gaining
birth. access to the records for purposes of examining
(&) When an individual has had a break or copying. In general, access to records will be
in service, his field 201 file is retired, and to ob- accomplished by the following methods :
tain it for review, the control office will need the a. Official Inquiry. The Special Agent must con-
individual's full name, and any former service tact the custodian of the records; identify him-
numbers. self as a Special Agent of Military Intelligence,
(c) In addition, The Adjutant General's United States Army, using his credentials; state
Office, or control branch files may be more com- the purpose of the inquiry ; and ask for any infor-
plete than the individual's field 201 file, particu- mation available. This procedure is most com-
4-4
FM 30-17
monly employed in personnel security investiga- c. Check of National Agencies. The records of
tions, but it may be employed in certain phases of national agencies in the United States are
complaint type investigations. checked by forwarding a request for a National
b. Liaison. This process involves reciprocal co- Agency Check through channels on DD Form
operation between the agency whose records are 1584. Normally, these checks will have been ini-
of interest and the unit. Such liaison may include tiated by the control office concurrently with as-
authorization for the liaison representative to ar-
signing the investigative tasks to subordinate lev-
range for records checks on an exchange basis
within limitations imposed by higher headquar- els. Results of such checks, when they have a
ters. Liaison of this type normally will be the res- bearing on the investigative tasks being con-
ponsibility of a designated liaison officer, or it ducted at the operational level, will be forwarded
may be an additional duty for counterintelligence through channels to the investigating officer.
specialists.
4-5
FM 30-17
4-6
FM 30-17
4-7
l^ívl 1/
who are identified as associates of the subject. leads before the conduct of the interview. Ques-
Names, locations, and associations of such per- tions for each interview will be carefully pre-
sons with the subject should be obtained during planned, with the advice and assistance of supe-
interviews of references or developed sources. riors. The subject matter of the interview should
be reviewed carefully to insure that only infor-
j. Leave a Good Impression. Regardless of the
mation specifically authorized by the control office
nature of the reception by the interviewee, the
is released to the subject during the interview.
Special Agent should be courteous. When the
Under no circumstances will the subject be al-
Special Agent encounters hostility, he should try
lowed access to any portion of his intelligence
to dissipate it by maintaining a courteous but
file. When directed by Department of the Army,
businesslike manner, tactfully citing reasons for
or when, from facts available, it is considered
the interview. He should express his appreciation
likely that a recommendation for removal or
for the interviewee's time and courtesy.
elimination wil result, verbatim transcripts will
be made of the interview or of any oral state-
4—12. liraüeirvDews Subjjedfs ®{? C®(yjirîiieir=
ments. There is usually no obligation to furnish
5iratf®0DG§jeiraGe OüwesftDgpoiifcGís the interviewee with a copy of the transcript or
When authorized by proper authority, the subject recording or of a statement made by him, but he
of a PSI or of a CTI may be interviewed (AR will be permitted to inspect the official transcript
381-130). In all interviews of subjects of a coun- of his interview of statement. The Special Agent
terintelligence investigation where the subject is must then explain to him that, if he is called to
accused or suspected of violating the law, the appear before a field board of inquiry or a civil-
subject must be properly advised of his rights ian security hearing board, a copy of the inter-
under the provisions of the Fifth Amendment to view will be provided on his request. If the sub-
the Constitution of the United States or of Arti- ject participates in the interview or signs a tran-
cle 31 of the Uniform Code of Military Justice script or statement conditional upon obtaining a
and of his right to counsel. It is emphasized that copy of same, a copy will be furnished, unless res-
questions concerning religious beliefs, racial mat- trictions of AR 380-5 on the release of classified
ters, politics, labor affiliations, or personal and information apply. The copy furnished the sub-
domestic matters should also be avoided in sub- j ect will not bear a protective marking but should
ject interviews; however, when such information contain a statement substantially as follows: "A
has a direct bearing on the investigation the Spe- copy of (describe) is furnished at your request.
cial Agent will phrase and time his queries so as The official copies of this document will be pro-
to establish clearly that they are relevant to the tected to safeguard your confidence and will be
investigation. used for official purposes only."
a. Subject's Right to Counsel. A suspected or c. Precepts. The Special Agent acts as a repre-
accused subject has the right to legal advice at sentative of the US Army. His every statement,
question, or contact will be regarded by the sub-
any time prior to, during, or following the inter-
j ect as part of the official proceedings, whether so
view (3-6).
intended or not. There will be no off-the-record or
b. Preparation for the Subject Interview. The unofficial phases in the interview. Special Agents
subject shall be contacted and informed of the will make no promises or commitments to the
precise reason for the interview. He will be ad- subject which are beyond their authority to ful-
vised that the interview offers him the opportu- fill. Special Agents will avoid statements or rep-
nity to refute questionable and/or misleading in- resentations which might be misunderstood and
formation or circumstances; to provide informa- comments which might be construed as expres-
tion not otherwise obtainable ; or to remain silent, sions of opinion or advice to the subject concern-
neither affirming nor denying the information. If ing his past, present or future action's. Special
the subject expresses a willingness to be inter- Agents will not argue with subjects or express
viewed, arrangements should be made for the personal viewpoints on any matter.
time, date, and place of interview. Should the d. Female. When the subject to be interviewed
subject refuse to be interviewed or to answer per- is female, female witnesses must possess the ap-
tinent questions, this refusal must be made a propriate security clearance. Any immoral or ab-
matter of official record by the Special Agent in normal behavior allegations by the WAG must be
verbatim form. The Special Agent must accumu- referred to the WAG commander for action. In
late all available information and all pertinent the absence of a WAG commander, such allega-
4-i
FM 30-17
tions must be referred to the command WAC ad- (12) When appropriate, ask the subject if he
visor. If personal questions are to be asked that is willing to submit to a polygraph examination.
may prove to be embarrassing, the female should (13) If appropriate, obtain a handwritten
be so warned in advance (para 4-17ci(3)). sworn statement before terminating the inter-
e. Steps of the Interview. The Special Agent view.
conducting a subject interview should take the (14) If appropriate, make arrangements for
following actions in the sequence listed : obtaining the subject's signature on a typewritten
(1) Dictate identifying data into the tape re- sworn statement.
corder prior to the subject's arrival. Turn off the (15) Thank subject for his cooperation, re-
machine. mind him that his statements will be held in con-
(2) Identify and welcome subject, identify fidence and used for official purposes only.
self, and present credentials. (16) Terminate the interview.
(3) Explain the general purpose and confi-
dential nature of the interview. 4—13. Interviews of "Walk-Ins" or
(4) Obtain subject's permission to record the Volunteers
interview, explaining that the recording will fa- a. General. Persons who volunteer information
cilitate the preparation of a written transcript of of intelligence interest usually do so for some
the interview which subject will have an oppor- personal motive. When interviewing such per-
tunity to review, correct, and sign under oath. sons, the Special Agent must consider the
(5) Turn on the tape recorder. (If the sub- source's motive (nationalism; personal gain; pro-
ject objects to the tape recorder, (e.g., "Those tection of self, family, and belongings; vindictive-
machines make me nervous") but is willing to ness; or revenge). The source's motive(s) may be
proceed without the tape recording, the Special invaluable in evaluating the information or in de-
Agent should proceed taking verbatim notes. termining the nature and extent of his knowl-
Lack of a tape recording is an administrative in- edge. Motivation may not always be known, and
convenience, but will not unduly hamper the tak- may be other than that stated by the source. The
ing of the Sworn Statement and the preparation Special Agent's primary concern is to obtain all
of the Agent Report.) information of both intelligence and counterintel-
(6) Ask the subject to state, for the record, ligence value. If, however, the source volunteers
information which is not within the jurisdiction
his name, rank, social security account number,
of Military Intelligence, the source will be re-
and other identifying data as appropriate.
ferred to the local police or local office of the
(7) If appropriate, administer a full expla- FBI. If the source refuses such referral, the in-
nation of rights as outlined in paragraph 3-6. formation will be obtained and immediately fur-
(8) If the explanation of rights was given, nished to the proper office. Upon request, the
request subject complete "Waiver Certificate" identity of a source will be protected. This proce-
(part I, DA Form 2820) on which he acknowl- dure will also apply to anonymous telephone call-
edges receipt of the explanation of rights and de- ers or written messages.
cides to exercise or waive his rights to remain si-
b. Method of Interview. Differences in types of
lent and to consult counsel.
information and in motivation dictate the need
(9) If the subject chooses to waive his right for varied techniques. A story of an incident can-
to remain silent, ask him if he is willing to take not be examined in quite the same manner as a
the oath. (If he is not, ask him if he is willing to story involving a subversive organization. A re-
answer questions or make a statement without luctant source will require a different technique
taking the oath. If he is, remind him that the from a willing source. Despite these differences,
statements and answers still can be used as evi- the following steps in the order given are basic to
dence against him. If he is still willing to be in- the interview of sources volunteering informa-
terviewed, proceed.) tion :
(10) Administer the oath in accordance with (1) Put the source at ease. The Special
paragraph 3-27. Agent's initial attitude frequently affects the suc-
(11) Conduct the interview using prepared cess of the interview. The atmosphere should be
questions designed to elicit narrative answers. pleasant; the Special Agent should be courteous
4-9
FM 30-17
but professional. Effort should be made to avoid (3) Adapt himself to the source's intellectual
taking up more of the source's time than neces- level.
sary. Care must be exercised to prevent compro- (4) Exercise utmost discretion and avoid
mising the source by indiscreet questioning in the controversial discussions.
presence of others.
(5) Secure all names of other individuals
(2) Let the source tell his own story. The who may have knowledge of the same informa-
source should be encouraged to tell his story in tion.
his own way. Premature questions may be discon-
certing or may reveal the Special Agent's suspi- (6) Remember security regulations and
cious attitude, thus alarming the source and caus- make no commitments which cannot be fulfilled.
ing him to limit his information to vague gener-
alities. If the source strays too far from the basic 4—14. Interviewing a Witness
story, the Special Agent should tactfully steer a. General. The nature of the information from
him back to the main topic. Throughout this first a witness dictates the need for special considera-
narration by the source, the Special Agent should tion in the manner of interview. The importance
make mental notes of the salient points to guide of a witness is that he can provide direct evi-
him in the subsequent review of the story. dence. A witness may also provide data and leads
(3) Review the story and take notes. Once which, although they may not be usable in a legal
the source has completed his basic story, he gen- proceeding, may serve to aid further investiga-
erally has little reluctance to answering specific tion. In many respects, the general principles ob-
questions on the details. Given the assurance that served in interviewing voluntary sources are also
his information will be kept in strict confidence, applicable in interviewing witnesses; however,
he will now be less apprehensive of notetaking. there are a few additional factors which have a
The story should now be reviewed critically in its bearing on the questioning technique.
entirety. Disparities, contradictions, and gaps in
b. Basic Psychology. The reputation, social
the story must be clarified. Every lead must be
standing, and profession of the witness, plus the
noted accurately.
fact that his statements are generally recorded
(4) Obtain background information. To as- for possible use in court, cause understandable
sist in the evaluation of the source's information, psychological reactions. A normal person may be
something must be known about the source him- unable to prevent personal prejudice from caus-
self. The source's identity, his origin, past activi- ing distortion of his thinking and presentation of
ties, present and past addresses, occupation, in- the facts, and a less conscientious person may not
terests, and motives are pertinent facts which even attempt to be objective. The witness may not
may throw light on his reliability. be aware that he is capable of distorting facts un-
(5) Develop secondary information. The wittingly, or that forgotten details might be re-
source's story and background frequently indicate placed with the product of his imagination. The
that he may have further information of signifi- misgivings of a conscientious witness, who must
cant intelligence interest. make incriminating statements against another
(6) Termination of the interview. When the person, are understandable. The longer the lapse
Special Agent is certain the source has no further between the incident and the interview, the
information, he should close the interview in a greater the possibilities that imagination may
manner calculated to leave a favorable impres- alter the facts. These psychological effects occa-
sion. If future contact with the source is a possi- sionally reveal themselves in the form of a wit-
bility, at least tentative arrangements should be ness' resistance to questioning and his refusal to
made. The Special Agent should be sure to ex- testify. It may become necessary to apply interro-
press his appreciation. gation techniques to witnesses who are unwilling
to respond to questions asked during the inter-
c. Precepts. In preparing for and conducting an
view (para 4-16 through 4-18). The witness may
interview of volunteers, the Special Agent feel that once his testimony becomes public
should— knowledge and he is identified, his personal af-
(1) Check, or initiate check of, the files of fairs may be affected adversely. In some in-
his unit for possible information on the source. stances, the witness may visualize with misgiv-
(2) Attempt to make arrangements to avoid ings a courtroom scene in which he will be the
interruption. butt of a sarcastic lawyer's barbs and public ridi-
4-10
FM 30-17
cule. These concerns may cause the witness to lie (2) Some witnesses are eager to demonstrate
in an attempt to avoid association with the case. their knowledge and to prove to themselves that
they are indispensable members of society. They
c. Circumstances or Conditions Affecting Ques- may be braggarts ; they may talk too much ; they
tioning Witnesses. There are certain circum-
may know it all. The Special Agent must be pa-
stances and conditions which may be present and tient, weigh critically everything that is said,
which may aflfect the evaluation of the informa-
separate truth from fiction by asking pertinent
tion received from a witness. questions, and analyze the information carefully
(1) The physical and mental qualifications by comparing with other known facts.
and condition of a witness are the most accurate (3) Some witnesses are timid and others
gauge of his value. The accuracy of the witness'
may be suffering from emotional stress and ner-
observations may be affected; for example, if a vous tension. The Special Agent must attempt to
witness stated that he observed something at a quiet their fears by being patient and under-
distance of 100 yards, the condition of his eyes standing. There may be occasions when the Spe-
would have to be considered in evaluating his tes- cial Agent will gain much by asking questions
timony. when the witness is extremely vocal due to his
(2) Witnesses must have the capacity to ob- emotional condition; however, after the witness
serve, comprehend, and report. The qualifications has calmed down, he should be requestioned. Ex-
of a scientist, for example, to testify on scientific perience indicates that some witnesses offer the
matters within his field of interest would differ most factual information during periods of emo-
considerably from those of a layman. tional upset because their normal mental pro-
(3) Categorical statements regarding the sex cesses, which would have permitted them to ra-
of a witness as a basis for evaluation are mislead- tionalize events and color their stories, are not
ing. A woman's emotional traits may differ from functioning.
those of a man, but instability is a characteristic (4) A habitual liar obviously is a poor type
not peculiar to either sex. These facts notwith- of witness, but there are occasions when such a
standing, the Special Agent must not ignore the person is the only possible source of direct evi-
fact that some women frequently rely upon intui- dence against a suspect. In such an instance, the
tion rather than critical analysis. Special Agent cannot ignore the witness because
(4) A categorical statement with respect to of his weakness. Habitual liars usually contradict
age as a qualification for the competence Of a wit- themselves ; if the witness can be made to repeat
ness also is not justified. Once a child has at- his story often enough, the truth may emerge.
tained the age of reason, his testimony may be (5) A drunk witness should be questioned on
just as valid as that of a mature person. There the spot if possible. At the risk of being led
are psychological patterns which fit certain age through a conversational maze, the Special Agent
groups. The likelihood that children will falsify should talk with the witness and strive to ex-
the facts in a deliberate attempt to influence the tract, by use of flattery, boastful disclosures
situation is relatively slight; on the other hand, which the witness might not make if sober.
their vivid imaginations are not hampered by the Later, these statements may be used as a basis
demands of logic and they tend to exaggerate. for a formal interview or interrogation of the
witness.
d. Special Cases. The Special Agent's task is
further complicated because he may deal with e. Method of Interview. (1) The Special
witnesses whose attitudes require a change in Agent should, as soon as possible, but preferably
technique. The following are types of cases which prior to the interview, check his unit files for in-
require special treatment. formation about the witness. He also should be
thoroughly familiar with all available facts of
(1) There are witnesses who are indifferent
the case.
to the problems of the Special Agent. Others
flatly refuse to talk because of possible danger to (2) The approach must include an attempt to
themselves. The Special Agent should attempt to anticipate and overcome the witness' objections,
stimulate their cooperation by appealing to their if any, to talking. As with a volunteer source, the
patriotism, by pointing out that it is to their per- witness should be put at ease.
sonal interest to talk, or by leading them into a (3) The witness should be encouraged to tell
logical path of reasoning. his story in his own way.
4-11
FM 30-17
(4) During the formal questioning on salient 4-15. Evaluating a Potential Witness
points of the story, the Special Agent must at-
The judge, jury, or other factfinding body will
tempt to separate positive evidence from infer-
judge the credibility of a witness according to his
ence, fact from fiction.
persuasive effect. The probable persuasive effect
(5) He must take precise notes on the data of a potential witness can be assessed in advance
received. of his appearance before the factfinding body by
(6) The nature of the information and its consideration of several factors:
possible use in a legal proceeding make it neces- a. Capacity for Observation, Recollection, and
sary for the Special Agent to verify the full iden- Narration. The witness who perceives all the de-
tity of the witness. tails of what he observes and is able to recall
(7) The Special Agent must determine these details and communicate the circumstances
whether the witness has information of collateral to a listener will have a very persuasive effect on
or secondary interest or information of interest any factfinding body. The degree to which these
to other intelligence and security agencies. In capacities have been developed can be tested in
some instances, it may be advisable to refer the any number of ways to assist in the evaluation of
witness to another agency for questioning; at a potential witness in advance of his appearance
other times, joint questioning may be advanta- before a factfinding body.
geous. b. Appearance. The physical appearance of an
(8) In terminating the interview, the confi- individual who may be used as a witness will
dential nature of the matter must be impressed have a decided influence on his presuasive effect.
upon the witness to prevent endangering his per- If he appears immature or his countenance con-
sonal safety, to avoid causing the witness embar- stantly reflects doubt or lack of comprehension,
assment, and to avoid possible compromise of the he is not likely to appear highly credible to the
investigation. It may be desirable to make ar- jury or other factfinding body.
rangements for contacting the witness at a future c. Prejudice. If a witness holds some prejudice
time in the event developments indicate that he which may influence or color his testimony, this
may be of further assistance. should be considered in advance of his use as a
/. The Sworn Statement. In many instances, witness.
particularly when the witness' statements are d. Agency Checks. In some cases, it will be nec-
significant to the case, the Special Agent must at- essary to have local and/or national agency
tempt to obtain a sworn statement. The procedure checks conducted on potential witnesses in an at-
outlined in chapter 3 of this manual is applicable. tempt to determine their reliability.
4-12
FM 30-17
4-13
FM 30-17
(/) Arrangements must be made for the (8) A final appeal, planned as a sustained
suspect to be held in custody or provided billeting and convincing attack on the suspect's wall of re-
accommodations, if appropriate. sistance, should be built up. Eloquent and persua-
sive reasoning, with presentation of all the facts
e. The Interrogation Proper. The basic tech-
of the case, may succeed where piecemeal consid-
niques and procedures of interrogation given in
eration of evidence has failed to bring a confes-
FM 30-15 will be applied, as appropriate. The
sion. This appeal may be based on overwhelming
following points are particularly important in in-
evidence, contradictions, or discrepancies in the
terrogations of suspects :
suspect's story, or the suspect's emotional weak-
(1) Use background questioning to provide nesses.
an opportunity to study the suspect face to face.
(2) Avoid misinterpretation and impulsive f. The Confession. If the suspect desires to
conclusions. The fact that the subject is a suspect make a confession, a syrorn statement, if possible,
may in itself create reactions of nervousness and will be obtained and the procedures of chapter 3
emotion. will apply. As long as the suspect has been given
(3) Do not permit notetaking to interfere an explanation of rights, any unsworn statement
with observation of the suspect's reactions. normally can be used in court against him. If the
suspect is neither a citizen nor a member of the
(4) Seek all details concerning the suspect's
Armed Forces, reiiuirements will be stipulated in
implication in prohibited activity.
the unit's SOP.
(5) Concentrate on the details of the story to
detect flaws. Each statement of the suspect must
be examined for its plausibility, relationship to 4—18. The Polygraph
other statements made or to facts known, and The polygraph is frequently used as an aid to
factual completeness. Discrepancies called to the counterintelligence interrogations. The operation
suspect's attention which require adjustment fre- of the polygraph and its general application are
quently weaken the suspect's position. discussed in FM 30-15. The conditions under
(6) Every cover story has a weakness; find- which polygraph examinations are conducted
ing it is frequently the key to a successful inter- within the Department of the Army are set forth
rogation. in AR 195-6. Chapter 5 of this manual covers the
(7) Treatment required by Geneva Conven- application of the polygraph in counterintel-
tions must be strictly followed, as applicable. ligence investigations.
Section V. ELICITATION
4-14
FM 30-17
ity on a particular topic, his opinions may be so- 4—22. The Conversation
licited. a. Once the approach has sucessfully opened
the conversation, techniques must be employed to
c. By adopting an unbelieving attitude, it may
channel and direct the conversation about the
be possible to induce the subject to expound on
area-of-interest. Some common techniques in-
the correct view or to answer out of irritation.
clude :
Exercise caution so as not to provoke the subject
to the point that rapport is broken. (1) Attempt to obtain more information by a
vague, incomplete, or too generalized response.
d. By inserting bits of factual information on a (2) Elicit additional information in areas in
particular topic, it may be possible to induce the which the subject's response is unclear (i.e., "I
subject to confirm and further expound on the agree ; however, what did you mean by. . .?").
topic. This approach does not lend itself to spon- (3) Present a hypothetical situation which
taneity. can be associated with a thought or idea ex-
pressed by the subject. Many people will express
e. By offering sincere and valid assistance to
an opinion on hypothetical situations, who would
the subject, it may be possible to determine his
make no comment concerning an actual situation.
specific area-of-interest.
b. To be successful, the elicitor must be re-
/. By exhibiting an area of mutual or common sourceful ; use initiative and imagination ; and be
interest, the subject may talk freely on the mat- unusually perceptive. He must be persistent with-
ter. (The elicitor must have more than superficial out being obnoxious, and remain in complete con-
knowledge of the subject matter.) trol of the conversation at all times.
4-15
subject remains unaware that he is under obser- mation on the area in which a surveillance is to
vation. Although every effort is made to gain as take place should be studied and analyzed. The
much information as possible, the paramount areas in which the subject lives, works, and
consideration is that the subject not become spends leisure time must be considered. If possi-
aware of the surveillance. Generally, the guiding ble a reconnaissance should be made of the road,
rule is to discontinue surveillance rather than transportation, and traffic systems in areas in
risk actions which make the subject aware of the which a moving surveillance is anticipated. The
surveillance. nature, location, and types of buildings likely to
(2) Close. A close surveillance is one in be encountered during a surveillance should be
which maintaining constant observation of the considered. Study of the subject should include
subject is the paramount objective, even though physical description, manner of dress (with em-
he may become aware of the surveillance. Sur- phasis on peculiarities contributing to ready iden-
veillance to provide protection is frequently of tification under various conditions, particularly
this nature inasmuch as the subject is generally from the rear), habits, interests, probable degree
the person to be protected. of suspicion that he might be under surveillance,
type of transportation generally used, names and
b. Category as to Method. addresses of likely contacts, financial status,
(1) Fixed. A fixed surveillance is one in walking gait, and other factors which will aid in
which the surveillant (s) remains in a relatively pinpointing problems to be encountered by the
fixed position to observe the activities at a specific surveillants. More extensive preparations, includ-
location. ing such things as renting a room or an office in
the area, studying the physical characteristics of
(2) Moving. In a moving surveillance, the
the building, procuring technical equipment for
surveillant(s) follows the subject from place-to-
observation and communication, and establishing
place to maintain continuous watch over his ac-
a cover or plausible reason for being in the area
tivities. The movement may be by foot, or by ve-
will be required if the fixed surveillance is to con-
hicle, to include land, water and air, or any com-
bination of these. tinue over an extended period of time.
(3) Technical. Technical surveillance is ac- b. Surveillance Plan. Once surveillance has
complished by the use of technical visual devices, been directed and the area and target have been
electronic equipment, and photography. Chapter studied, a plan for execution should be developed.
5 and the classified supplement to this manual, The plan must establish the number and type of
FM 30-17A, discuss techniques and procedures personnel required, the general and specific in-
employed for this and other investigative pur- structions for the surveillants to insure that the
poses. overall objective of the surveillance is under-
(4) Combination or Mixed. A combination of stood, and the, operational limitations or special
technical, fixed and moving surveillances are usu- instructions which may have been imposed. The
ally the most expensive in terms of money and plan must assign specific tasks to teams or indi-
vidual surveillants, provide for administrative
personnel but will usually achieve the best re-
and logistical support, prescribe communication
sults. Two of the most common are the progres-
sive and checkpoint surveillance. methods and procedures, and establish necessary
control measures. The degree of complexity of
the operation and the time available will deter-
4!—IPir®|j3xaiir<saftD@ifi) fee SmurwsíllDeüiñKS© mine whether the plan is formal or informal, oral
Regardless of the purpose, sensitivity, or method or written. The plan should be sufficiently de-
of a surveillance, the degree of success or amount tailed to prevent misunderstanding and confu-
of information obtained is generally proportion- sion, but it should not be so restrictive as to elim-
ate to the thoroughness of advance planning and inate all flexibility or to preclude the exercise of
preparation. Although short advance notice of all initiative by individual surveillants. Every
the requirement for a surveillance is sometimes possible contingency should be visualized in plan-
necessitated by the sensitivity or critica'ity of the ning and preparing for a surveillance; however,
information to be obtained, the follow ing plan- mobile surveillants, in particular, must not be ov-
ning and preparatory measures should be taken erburdened with special equipment.
to the extent time permits.
c. Selection of Personnel. Selection of person-
a. Area and Target Study. All available infor- nel to participate in a surveillance must be done
<3-11 &
FM 30—17
with care, as an unqualified person can readily ing together. Practice surveillances serve to per-
compromise the task and perhaps make other fac- fect the.coordination of team members.
ets of the investigation even more difficult. If a
d. Personnel Limitations.
choice must be made between conducting a sur-
veillance with an inadequate number of qualified (1) In overseas areas, it frequently will be
surveillants and a full complement which in- necessary to use indigenous personnel as surveil-
cludes several unqualified personnel, the former lants since US personnel in some areas or locales
choice is preferable. The principal qualifications would be conspicuous. These natives should have
of surveillants include : the appropriate physical characteristics, customs,
dialects, economic status, and other characteris-
(1) An inconspicuous appearance. An other-
tics necessary in the area concerned.
wise qualified person must be disqualified from
participation if he has some outstanding physical (2) When indigenous personnel are used, US
feature or possesses mannerisms which will draw personnel should be used as the control and su-
attention to his person. pervisory element of the surveillance team, as
well as for other broad aspects of the surveil-
(2) Ability to remain unnoticed. The surveil- lance effort. These indigenous personnel should
lant must be able to blend with his surroundings also be full-time employees of the MI unit. This
in a wide variety of environmental conditions. will insure, as fully as possible, their loyalty to
Thorough area and target study contribute to the the unit. Their association with the unit must not
surveillant's success in adapting himself to vary- be well-known to avoid compromise and should
ing circumstances without attracting attention to not be normally used in surveillances involving
himself. American personnel.
(3) Resourcefulness. The surveillant must be (3) The US surveillance team commander
able to meet unexpected situations with poise and should participate in the surveillance for control
presence of mind. Resourcefulness is especially purposes but he should stay in the background.
valuable when it is necessary to locate a subject The team commander should be familiar with the
who has eluded or otherwise become lost to the language, racial characteristics, and other social
surveillant(s). aspects of the area. He must train the indigenous
(4) Patience and physical stamina. Nearly surveillants in his general method of operation.
every surveillance will include long periods of
e. Administrative and Logistical Arrange-
relative inactivity during which the surveillant ments. These arrangements will require advance
must remain alert and prepared for an eventual-
planning and preparation to support a surveil-
ity.
lance. They include, but are not limited to, the
(5) Keen sensory perception and retention following :
memory. The surveillant must develop the ability
(1) Relief from other duties and issuance of
to examine systematically what he sees or hears
appropriate orders, when required, for surveil-
so that details will register clearly in his mind.
lance personnel.
Opportunities for making notes may be limited,
and a good memory for details is a very valuable (2) Procurement of any special documenta-
attribute. tion which may be required.
( 6 ) Prior surveillance experience. It is essen- (3) Provision of funds to cover projected
tial that a maximum number of participating and contingency expenditure.
personnel have previous experience in surveil- (4) Arrangements for transportation for
lance. The details and techniques required, par- moving surveillance as well as transportation to
ticularly for team operations, cannot be learned and from fixed observation points.
completely from textbooks or by participating in
a few exercises. Experience must be gained in sim- (5) Special supplies, such as special clo-
ple surveillance of less sensitive subjects and in thing, photographic equipment, audio and com-
protective surveillance operations of a more rou- munications equipment, and similar logistical
tine nature. A CI unit in an area where surveil- items.
lance can be anticipated should maintain one or (6) Arrangements for the surveillants to
more surveillance teams of Special Agents. The eat, if it would be unwise for them to enter res-
success of a team surveillance is frequently de- taurants, or if they cannot get to an eating estab-
pendent on the experience gained through work- lishment.
4-17
PWi g®-! F
41—11®
FM 30-17
x
«'f
i i
1
vl
I
i
-O --y *-0 v
4-19
FM 30-1IJ
m
•Ni
^¡3
éteK ^vt«
h Approaching intersection 2. Subject turns right
«/.-ti
& te
rôViî ®*5
üy.
«»íí éO-
m aj I
m «JS
»«iTfi
Wái-ál M
azi1
!«»sï
JCW&feSiVÍ
m Left Tu rn Tu rn
3. Subject turns Deft 4. Mew positions
:l§:
(c) One-man method. A one-man surveil- packages on the rear window ledge or removing
lance should be avoided in a moving surveillance them from the ledge, or similar changes. In addi-
because it does not provide for flexibility. Its best tion, frequent changes of cars must be considered.
employment is in a fixed surveillance. If a moving Radio communication between surveillance cars
one-man surveillance must be resorted to then the is normally available (FM 30-17A). If radios are
surveillant should operate to the rear of the sub- not available, a set of visual signals must be ar-
ject when on the same side of the street, and keep ranged to coordinate the movement of the cars.
as close to the subject as possible to observe his Care must be exercised to prevent use of the
actions. Crowd and street conditions normally radio equipment from attracting undue attention.
dictate the appropriate distance to be maintained When the driver is the only surveillant in the
between the subject and the surveillant, however, car, it may be useful to place a small tape re-
consideration must be given to the prevailing corder in the car with him which he can use for
light conditions, the subject's evasive actions, and his notes instead of a distracting pad and pencil.
the Special Agent's personal desires. As a general Advance coordination of a vehicular surveillance
rule, the more people on the street, the closer the with other agencies, particularly the police, is de-
surveillant stays to the subject. If the subject sirable and essential in some areas. The police
turns a corner in an uncrowded area the surveil- need be informed only to a degree commensurate
lant should continue across the intersecting with security of the activity. To aid in identify-
street. By glancing up the streeet in the direction ing subject's vehicle under adverse traffic,
the subject traveled he can note the subject's po- weather, or light conditions, it may be possible to
sition and actions, and act accordingly. The surv- equip the subject's vehicle with some recognition
eillant can then operate across the street from device which the subject will not notice. For ex-
the subject, recrossing the street at his leisure to ample, reflective tape could be placed on the vehi-
fall back in behind the subject. When the subject cle's undercarriage, or one taillight could be re-
turns a comer on a crowded street, the surveil- placed with one of higher intensity. Under cer-
lant should stop at the corner and unobtrusively tain conditions, it may be possible to use surveil-
observe the subject's actions. Unless the subject lance vehicles with direction-finding radio equip-
is standing just around the corner, the surveil- ment, e.g., attaching a small transmitter to the
lance can be continued from the same side of the subject's vehicle and thereby following or locat-
street. Whatever the conditions, however, the in- ing his vehicle by the transmitted signal. Vehicu-
vestigator should not turn a corner immediately lar surveillance must be practiced to achieve any
behind the subject. When operating from across degree of professionalism. The driver must gain
the street, circumstances will dictate whether to experience so that he depends mainly on the
operate forward, to the rear, or abreast of the other occupants of his car for observation, thus
subject. It is best if the surveillant can be abreast devoting his attention to the driving. Again, the
of the subject when he turns a corner to enable ABC method is highly preferred, but in cases
the observation of any contact made or an entry where only two vehicles can be employed, both
into a building. vehicles should follow the subject at different dis-
(2) Vehicular surveillance. Under most con- tances on the same street, (fig 4-2) as in the AB
ditions, two or more vehicles are required to con- method of foot surveillance. This technique can
duct a vehicular surveillance, although, traffic be varied by having one vehicle going in the same
conditions permitting, one may suffice for a short direction as the subject on a parallel street while
period of time. The first car should remain some receiving radio-transmitted directions from the
distance behind the subject with not more than surveillants directly behind the subject. This
one or two vehicles between it and the subject's technique is more flexible than the one-vehicle
vehicle if the traffic is at all heavy. The second surveillance in that two vehicles can exchange
car should be further behind or following a par- places from time-to-time, or one vehicle can pre-
allel route one or two blocks away (fig 4-1, 4-2). cede the subject. If more vehicles and people are
At times, one car may precede the subject; in any available, other techniques can be planned that
event, the surveillance cars should alternate posi- are even more flexible. When one vehicle is used
tions frequently to reduce the chances of subject's for surveillance it must remain far enough be-
recognition of the surveillance cars. These "pro- hind to escape detection. When the subject's vehi-
files" can be changed by shifting occcupants cle turns a corner, the surveillants may continue
(front-to-rear or rear-to-front), adding or drop- to follow, or they may make one of two possible
ping an occupant, changing license plates, placing moves to help break up the following pattern (fig
4-21
FM 30-17
4-3). They may continue in the original direc- c. Mixed or Checkpoint Surveillance. When the
tion, cross the intersecting street and make a daily pattern of activity of a subject under inves-
U-tum ; the subject will take little interest in a ve- tigation is relatively constant, a checkpoint sur-
hicle turning into a streeet behind him coming veillance can be employed. It consists of placing
from a direction that is opposite to that which he mobile, fixed, or technical surveillants at strate-
was traveling before turning the corner. An al- gic points to mark the subject's progress from
ternate move would be to continue in the original one point to another along routes normally used
direction, crossing the intersecting street and by the subject. Foot or vehicular surveillants, de-
continuing around the block. The subject will not pending on subject's mode of transportation, can
expect to be under surveillance by a vehicle ap- be placed to the rear and/or front of the subject
proaching him from a frontal direction. but at a greater distance than is normally used in
JS
m
m %
m
m
an & m ¡SL
wnsm
r-i
« n
m «m mmm
A A ï-t
w
\7
3
S I B I
22 &
A
A «c-.
i £3 m
m
4-22
FM 30-17
a discreet surveillance. When the subject deviates directions of a passer-by, or merely pausing to
from his normal pattern, these floating surveil- light a cigarette are examples of natural actions
lants would then proceed into a normal discreet which may allay the suspicions of the subject.
surveillance. Many variations of this technique Minor changes in dress to present a new pattern
can be used. of appearance also contribute to maintaining an
inconspicuous appearance. Such things as putting
d. Progressive Surveillance. Progressive sur-
a rolled up newspaper in a topcoat pocket, chang-
veillance is employed in cases when the experi-
ing from a necktie to a bowtie, wearing or remov-
ence and caution of an important subject make
ing a hat or spectacles require little time and are
extreme care mandatory. Whether or not he not-
very effective in altering an appearance outline of
ices any evidence that he is being followed and
the individual.
because of the importance of his mission, the sub-
ject will resort to every technique and subterfuge c. Encountering Acquaintances. During a sur-
to elude possible surveillance. By following the viellance over an extended period of time, a surv-
subject only a short distance each day, the surv- eillant may encounter acquaintances or even
eillant minimizes the probability of detection by members of his own family while he is engaged
the subject. This type of subject will be most cau- in following the subject. The general rule in such
tious when emerging from his home or office, and cases is to avoid recognition and ignore the pres-
for the first several blocks, or comparable dis- ence of the acquaintance or relative if at all pos-
tance, will take measures to elude surveillance. sible. If this cannot be done the surveillant must
After subject's residence, office, or other starting be prepared with some acceptable excuses for
point has been located, the surveillants, generally limiting the encounter to a brief natural ex-
by trial and error from day-to-day, pick up the change which will permit him to continue the
subject some distance from the starting point and surveillance without interference. Encounters of
follow or observe him only a short distance on this nature are to be expected and prior plans
the first day. On the second day, the surveillants must be made through prearranged signals to
endeavor to pick up the subject at the time and those assisting for any changes that may be re-
place they left off the day before, and then follow quired.
or observe him a short distance to a new point. If
d. Eye Contact. Normally the surveillant
the subject varies his daily routine once in a
should avoid any direct eye contact with the sub-
while, this method will be painuflly slow, but it
ject, since the impression made on his subcon-
will eventually lead the surveillants to those con-
scious mind may be manifested in later recogni-
tacts which the subject is trying to keep secret.
tion and consequent suspicion. However, a hasty
deliberate move to turn aside when confronting
4—28. Surveillance Techniques
the subject is an unnatural and obvious action,
Although no predetermined solution can be estab- which may make a deeper impression than direct
lished for all situations encountered during sur- eye contact.
veillance, there are several general guidelines
which will aid in determining action to be taken e. Using Conveyances.
in situations which are commonly encountered. (1) Taxicab. If the subject enters a taxi, the
a. Identification. The subject should be pointed sruveillant should attempt to obtain another cab
out to all members of a surveillance team, al- or vehicle in which to follow. In a large metro-
though in some cases a picture or detailed de- politan area, it is possible that any taxi driver
scription must suffice for identification purposes. will accept instructions to follow another car
Each surveillant must study the subject's physi- without question or evidence of special interest,
cal appearance and mannerisms so that identifi- particularly if his efforts are rewarded with a
cation under all conditions will be facilitated. Do more substantial tip. However, the surveillant
should be prepared in all cases to provide the
not rely on subject's dress for identification.
driver with some innocuous but logical explana-
b. Remaining Inconspicuous. The surveillant tion if the driver is reluctant to comply with the
must be constantly aware of his surroundings to request. If necessary, the presentation of creden-
be able to proceed with an apparently natural tials or badge for this purpose may be effective,
and deliberate act if the subject should approach but this procedure will be governed by prior in-
him directly or evince undue interest in his ac- structions from the unit controlling the surveil-
tions. Entering a business establishment, asking lance. If the surveillant is unable to obtain any
4-23
FM 30-17
vehicle to follow subject's taxi, he should note the ject are significant considerations in determining
name of the cab company, the cab number, license further action.
tag number, and the time and place of loading.
(1) Small building. If the building has exits
This information should be relayed to the surveil-
which can be kept under observation from a dis-
lance control point as soon as possible, to deter- creet outside position, the surveillant normally
mine, if required, subject's route and destination
should not enter. However, if the previous pat-
through the appropriate cab company and/or au-
tern of activity indicates that the subject may
thorities.
make a contact or engage in some other action
(2) Bits or streetcar. The surveillant should pertinent to the investigation, the surveillant
try to enter the same conveyance as the subject should enter by an entrance other than that used
and position himself to the rear of the vehicle by the subject, or otherwise convey the impres-
and behind the subject. If he misses the bus or sion that he has arrived at the building from a
streetcar, he may be able to use a taxicab or other different direction than the subject.
means to overtake and board the bus or streetcar (2) Large building. A surveillant normally
at a subsequent stop. will follow the subject into a large building such
(3) Plane, bus, or railroad. If the subject en- as a department store or office building. Within
ters a station or terminal and purchases a ticket, the building, the surveillant must take advantage
the surveillant should discreetly attempt to ob- of the building layout to observe subject without
tain as much information as possible regarding attracting attention to himself. Magazine and
the trip. A position in line one place removed cigar counters in office building lobbies will often
from the subject will often afford the opportunity afford cover for the surveillant's actions immedi-
to overhear the discussion between the subject ately after he enters the building. If the subject
and the clerk without any indication of obvious enters an elevator, the surveillant should also
interest. The limits imposed on the surveillance enter if there are passengers and the subject is
will govern whether or not the surveillant pur- unsuspecting. The surveillant may ask for the
chases a ticket and follows subject on his trip. In floor below or above that requested by the sub-
many cases, an air shuttle will arrive sooner than ject. In the latter case, the surveillant should
a scheduled airline and can be used in getting to then use the stairs to reach the same floor as the
the destination ahead of the subject for resump- subject in order to resume his observation. If the
tion of the surveillance or for boarding the same elevator is used and the surveillant gets off on the
aircraft with subject. The ease of boarding air same floor as the suspect, the surveillant should
shuttles will alleviate certain surveillance re- immediately move to a particular counter or de-
quirements. If the surveillant is not to follow partment on that floor. Loiterers are conspicuous.
subject, he should attempt to obtain as much of If the subject enters an elevator as an only pas-
the following data as possible so that the surveil- senger, the surveillant should remain in the lobby
lance may be resumed by another counterintel- and determine subject's destination by watching
ligence unit either en route to or at subjects' des- the floor indicator. Surveillance can then be re-
tination : sumed by using either the stairs or the elevator
(a.) Description of subject's dress, empha- to reach the same floor as the subject.
sizing outstanding items which might facilitate (3) Hotel. If the subject registers at a hotel,
recognition. the surveillant should attempt to ascertain the
(b) Description of hand baggage and hold room number by observation of the registration
baggage. process from a discreet distance. Since the room
(c) Date and time of departure and date, keys are normally maintained on a numbered
time, and place of arrival at destination. board or in boxes directly behind the clerk, it is
(d) Name and number of the train, plane usually possible to observe which key is with-
flight, or bus and type of accommodations (coach, drawn and given to the subject. The surveillant
sleeper, first class, etc.). should exercise caution in seeking the assistance
(e) Any other details which will facilitate of hotel staff personnel to obtain a room adjacent
resumption of surveillance en route to or at des- to the subject, monitor his mail, obtain a record
tination. of incoming calls or telegrams, examine the regis-
ter, or take any other action connected with the
/. Entering Buildings. The size, nature, and investigation. In overseas areas in particular,
surrounding locale of buildings entered by sub- hotel staff personnel frequently have ties with in-
4-24
FM 30-17
telligence and subversive organizations. The unit lent opportunity to find a suitable point from
SOP or policy on such matters must be known which to make a photograph, if required, as the
thoroughly by the surveillant. subject emerges from the booth.
(4) Motel. If the subject's vehicle enters a g. Subject is Lost. If the subject is lost during
motor court, the surveillant should not follow im- the surveillance, the first action is to report this
mediately, but from a discreet distance he should fact to the surveillance control point. Relocating
attempt to observe if the subject registers and to the subject is most often accomplished by study-
which cabin or unit he proceeds. Should it then ing the pattern of his prior actions and establish-
be determined advisable for the surveillant to ing temporary fixed surveillance at points he is
also register, he must exercise caution. He has most likely to visit. If the loss-of-contact took
not only the problem of remaining inconspicuous place during a moving vehicular surveillance, it
himself but he must keep his vehicle from at- is often possible to resume observation by system-
tracting subject's attention. Many motels are sim- atically searching the general area where subject
ilar to hotels ; in such instances, the same guide- disappeared, using lookouts at major intersec-
lines will apply. tions, and giving special attention to parking
(5) Restaurant. When the subject enters a lots and sidestreets. Subject may also reappear in
restaurant, the surveillant must seat himself out the area where he was last seen. Pretext calls to
of the direct view of the subject but with a view his home or office may also locate his wherea-
of the subject. If the subject is accompanied by bouts. The use of a square or box pattern in the
others, and thier conversation is deemed to be of area where the subject was last seen may also
probable interest to the investigation the surveil- yield results if radio communications are availa-
lant should attempt to place himself within hear- ble for reassembling the surveillance team should
ing distance. The surveillant must give attention subject be located by a single surveillant. Assist-
to the type of service ordered by the subject and ance from police or other authorities should not
govern his own order accordingly to insure that be requested without approval from the surveil-
he will be able to pay his check and depart from lance control point.
the restaurant without disrupting the surveil- h. Compromise of Surveillant. If the subject of
lance when the subject leaves. In some instances, a discreet surveillance clearly indicates by his ac-
the departure of the subject can be anticipated, tions that he has become aware of the surveil-
and it may be advantageous to pay the check and lance, the surveillant should withdraw from the
leave ahead of the subject, provided that this can area, discontinue the surveillance, and notify the
be done without attracting the subject's atten- control point. The surveillant should insure that
tion. his departure from the area is conducted in an
(6) Telephone booth. When the subject en- unobtrusive and natural manner, regardless of
ters a phone booth, the surveillant must consider the degree of his certainty of compromise. The
the following possibilities of gaining information surveillant must always be prepared to offer a
which may contribute to the investigation : logical response if confronted by the subject and
(a) It may be possible to use a adjoining accused of following him. In such case, a good of-
booth to overhear the conversation of the subject. fense is often the best defense; a belligerent de-
(b) The subject may leave the phone book nial of the allegation, coupled with a threat to
open to the page containing the name of the per- summon police, may succeed in deceiving the sub-
son called, or he may note the number on the ject. If an incident or occurrence draws the sub-
phone booth wall or a slip of paper which can be ject's attention to one or more of the surveillance
retrieved by the surveillant. team members, those members must drop from
(c) The surveillant may be able to ascer- the team and withdraw from the area. Possible
recognition of a team member or members at a
tain the number called by observing the dialing
later date could be avoided by this action. Eye
action of the subject. If the number of coins de-
contact between a surveillant and the subject is
posited indicates that the call is long distance,
the surveillant should note the exact time of the usually sufficient cause for the surveillant to drop
call and obtain the telephone number of the booth from the team.
from which the call was placed to aid in an at-
tempt to trace the call. 4-29. Detecting Surveillance
(ef) The time spent in the phone booth by It is important for the Special Agent to know
the subject will afford the surveillant an excel- various means of detecting surveillance so that he
4-25
FM 30-17
will recognize such action when taken by the sub- (2) The subject may leave the conveyance in
ject of a surveillance, but also so that he may em- an area with little pedestrian or vehicular traffic
ploy these devices himself en route to covert and then loiter in the area to determine if a sus-
meetings, cover locations, or other locations when pected surveillant dismounts at the same stop, or
he desires to insure himself against surveillance. the next one.
Some of the most common and effective means of (3) The subject may board several succes-
determining if a surveillance is in progress are— sive conveyances along a single route within a
a. Use of a "Convoy". A person who suspects short period of time and watch for faces which
he is under surveillance, or who anticipated sur- reappear.
veillance, may employ the services of one or more
g. Automobile Tactics. If the subject of surveil-
colleagues to follow him at a distance to deter-
lance is driving an automobile, he may use traffic
mine if he is being followed. The assistant is
signals and other controls to advantage to deter-
termed a "convoy" or countersurveillant. This
mine the presence of surveillance vehicles. For
means is one of the most effective in detecting
example, he may time his approach to a traffic
surveillance.
light so that he will pass through the intersection
b. Retracing Course. By changing direction of just as the light turns to red and then watch the
movement several times in a short span of time rearview mirror to determine if any other vehicle
and retracing his course, a person who suspects commits a deliberate traffic violation in order to
surveillance may be able to determine if he is follow him. He may also drive the wrong way on
being followed. This procedure is equally effec- a one-way street, feign motor trouble in a
tive for detecting foot or vehicular surveillance. sparsely traveled area, or employ a wide variety
of other tactics to test for surveillance.
c. Window Reflections. In business districts, a
subject concerned about a possible surveillance
may pause in front of a large show window for 4—30. Eluding Surveillance
the ostensible purpose of window shopping, and Many subjects who suspect surveillance, or be-
then observe the reflections of passers-by to spot cause of the clandestine nature of their activities,
indications of surveillance. expect it, will take steps to elude the observation.
Common and effective measures for eluding sur-
d. Use of Bait. The subject may throw away a
veillance include—
scrap of paper, an envelope, or some similar item
which would be of interest to anyone following a. Entering and Leaving Crowded Buildings. In
him. He will then use window reflections or a business areas, a person seeking to evade surveil-
similar means of observation to determine if any- lance can usually succeed with little difficulty by
one retrieves the bait. hurrying in and out of crowded buildings and
e. Change of Pace. In areas where pedestrian taking advantage of multiple entrances and exits
and vehicular traffic is relatively sparse, the sub- found in larger buildings.
ject may detect surveillance by moving very b. Concealment. The subject may elude his sur-
slowly for a distance, then changing to a very veillance by dodging into an available entrance
rapid pace, and later again changing to a slow immediately upon rounding a corner and disap-
pace. The subject may couple this procecure with pearing. Entry into apartment buildings for this
a sudden stop after turning a corner in order to purpose can usually be gained by pressing a num-
observe the actions of those behind him. These
ber of bells to the various apartments. At least
procedures may be encountered in both a foot
one person will usually respond and release the
surveillance and a vehicular surveillance.
entry latch, after which the subject may enter,
/. Actions on Public Conveyances. On convey- remain concealed, and later depart by using a
ances, a person who suspects or anticipates sur- rear entrance.
veillance may employ a variety of actions to test
for the presence of surveillance. c. Use of Decoy. The subject may engage a sub-
(1) The subject may board the conveyance, stitute of like physical appearance to act as a
pay the fare, and then get off just as the vehicle decoy to mislead the surveillants. This technique
starts to move, observing the actions of others can be employed most effectively when the decoy
who have boarded at the same stop to see if any- is put into service from the subject's place of res-
one attempts to follow. idence or of employment, as surveillants are less
4-26
FM 30-17
likely to doublecheck identification at such points. forced to rely on color of clothing or silhouette to
d. Change of Appearance. The same tactic em- maintain contact.
ployed by a surveillant to avoid becoming con-
e. Dodging. Pursuing an erratic course through
spicuous can be equally effective for the subject
seeking to elude surveillance. Changing appear- dense pedestrian or vehicular traffic is effective,
ance is particularly effective where, because of particularly when traffic controls are used to the
crowds or limited visibility, the surveillants are maximum advantage.
4-27
FM 30-17
4-28
FM 30-17
made with indelible or invisible ink, may provide (1) Inner wrapper. The sealed container is
valuable clues in identification. Police usually wrapped and properly sealed. The following in-
maintain records which can help with this type formation should be placed on the wrapper : full
of identification. adress and return address of the transmitting
/. Detective Dyes. Police at times employ dyes agency ; when appropriate, the notation "evidènce
and fluorescent powders which can be dusted or —to be opened by laboratory personnel only" ;
sprayed on items likely to be handled by suspects. and the classification of contents. Except for the
Some of these are virtually indelible; others, in- addresses, these notations are placed on all six
visible, but susceptible to detection under ultravi- sides of the package. An envelope containing two
olet light for prolonged periods after contact. additional copies of the evidence receipts, two
copies of security receipts, plus two copies of the
letter of transmittal, should be affixed to the
4-34. Handling of Physical Evidence
inner wrapper.
a. All counterintelligence personnel should be
familiar with the material on evidence or eviden- (2) Middle wrapper. The package is then
tiary property contained in FM 19-20. A guide to wrapped and sealed a second time. The markings
the procedures for handling physical evidence is are the same as for the inner wrapper except that
outlined in figure 4-4. The Special Agent acquir- no notation is made that the package contains ev-
ing items of physical evidence is personally res- idence.
ponsible for their safekeeping until he turns (3) Outer wrapper. The package is then
them over to the designated custodian of unit evi- wrapped a third time and again sealed. The outer
dence. The custodian is, thereafter, responsible wrapper bears only the two addresses. However,
for control of and accounting for such items. a special handling notation must be made if the
Normally an officer of the counterintelligence evidence is perishable, flammable, fragile, explo-
unit will be designated as custodian of evidence sive, corrodible, or corrosive.
as an additional duty. For obvious reasons, evi-
dence must be securely stored and protected from d. The letter of transmittal for shipment of ev-
the time it is acquired to the time of its use in idence to a laboratory will be prepared in accord-
legal or other proceedings. When applicable, suf- ance with instructions contained in FM 19-20
ficient quantities of evidentiary materials must be and the appropriate PMG technical bulletin. The
acquired to permit laboratory analysis and use in following items are typical of appropriate data
court. For physical evidence to be admissible in a for inclusion in letters of transmittal of this
court of law, it is often necessary to establish type—
that the evidence was part of, and found at, a (1) Warning that the package contains evi-
particular place. For this reason photographs dence.
should be taken of the scene showing the position
of the evidence in relation to that scene. The (2) Brief summary of the case.
value of photography as evidence and pertinent (3) Brief history of the evidence.
rules are discussed in chapter 5. (4) Specific list of items and their classifica-
b. Maintaining the chain of custody of evidence tion.
is important in that it permits proof that the
(5) Clear statement of request explaining
piece of evidence collected at the scene is the
reasons for transmittal of the evidence.
same as that presented in court, that it was col-
lected at the time specified, and that it was not (6) Statement as to whether the evidence
tampered with or handled by unauthorized per- submitted has already been subjected to examina-
sons. The chain of custody is maintained by a re- tion.
ceipt system for items of evidence. (DA Form (7) Special considerations or instructions.
19-31 (Military Police Receipt for Property)). In
addition to DA Form 19-31, classified items will
also be covered by a security receipt. The use of 4—35. Release of Evidence
DA Form 19-23 (Military Police Property Identi-
Items of evidence will be released or disposed of
fication Tag), will provide for easy identification
in accordance with AR 190-22 and, in the case of
and inventory of property in custody.
classified items, in accordance with regulations
c. For transmittal of classified evidence three governing the handling or release of classified
wrappers should be used. material.
4-29
FM 30-17
COLLECTION
A. ADEQUATE 0. TAGGING OR
SAMPLING LABELING
B. STANDARD OR I E. EACH ITEM
KNOWN SAMPLE SEPARATELY WRAPPED
C. MARKING FOR OR PLACED IN
IDENTIFICATION ENCLOSURE
HANDLING
CD
<
A. CARE B. GOOD JUDGMENT
O PACKING
v
u
< A. USE SUITABLE B. INCLOSE EVIDENCE
u. CONTAINER ' AND SECURITY RECEIPTS
O
C. SEAL CONTAINER
z
< WRAPPING
X
u C. THREE WRAPPER SYSTEM
(1) INNER (2) MIDDLE (3) OUTER
A. SEAL EACH WRAPPER ADDRESSES ADDRESSES ADDRESSES
B. WARNING ON WRAPPERS , CLASSIFICATION CLASSIFICATION
IF NEEDED. EXAMPLE, EVIDENCE WARNING
HANDLE WITH CARE,' «te. LETTER OF TRANSMITTAL
EVIDENCE RECEIPTS
SECURITY RECEIPTS
POSSESSION
u
ujz A. TRANSPORTATION
O C. STORAGE
> B. LABORATORY
COURT PRESENTATION
TERMINATION OF CASE
DISPOSITION OR RELEASE OF EVIDENCE
4-30
FM 30-17
ness, the Special Agent must be cognizant of what counsel for both sides of the case with equal res-
to expect when called to appear, and he must also pect and must not lose his temper, regardless of
be familiar with the procedures for taking testi- how trying the questioning may become.
mony from a witness.
b. Response to Questioning. On both direct and
4—37. Procedures for Taking Testimony cross-examination, the witness must answer only
questions asked by counsel and not volunteer
a. Direct Examination. The side which calls an other information. During cross-examination, in
individual as a witness may elicit the information particular, the witness should be cautious in re-
only by a direct examination of that individual. sponding to questions which might tend to place
The direct examination has the sole purpose of him in an equivocal position with the intent of
bringing out the facts within the personal knowl- diminishing his persuasive effect on the factfind-
edge of the witness so far as that information is ing body. Ordinarily, the witness must be positive
admissible under the rules of evidence. In gen- in his answers, testify openly, and admit frankly
eral, the questions on direct examination cannot when he does not know the answer to a question.
be leading ; that is, they cannot suggest the form He should be especially cautious in answering
of the answer, assume a fact not testified to, or questions involving judgment, such as passage of
contain a conclusion of counsel. time, speed of a moving vehicle, distance between
b. Cross-Examination. After his direct exami- objects, and similar questions. Because the an-
nation, a witness may be cross-examined by the swer to such a question is nearly always an esti-
attorney for the opposing side. Cross-examination mate or approximation, the Special Agent should
of a witness is a legal right and its denial is phrase his answer so as to make it clear that it is
highly prejudicial to a criminal defendant. The an estimate and not an exact answer. A positive,
purpose of cross-examination is to place direct categorical assertion in answer to such a question
testimony in its true context to avoid misleading may place the witness in a position where he will
the factfinding body, and to establish contradic- be made to appear ridiculous under cross-exami-
tions and improbabilities in the direct testimony nation. If asked, the Special Agent should ac-
in an effort to diminish or destroy the credibility knowledge that he has discussed the case with
of the witness. If a witness has indicated in a the attorney of the side which called him as a
previously sworn statement that one fact exists, witness. This is normal procedure and does not
and on the witness stand tells a different story, imply collusion.
the cross-examining attorney may point out the
c. Use of Memoranda and Notes. Sometimes a
inconsistency during cross-examination and
witness does not remember an incident when he
thereby attempt to impeach the credibility of that
is questioned regarding it in a courtroom. He is
witness.
permitted in such circumstances to refresh his
4—38. Appearance of the Special Agent memory from notes, statements, sketches, or
as a Witness other records he may have made at the time of
the investigation of the incident. If his memory is
a. Physical Appearance and Demeanor. When a refreshed, he then testifies of his independent
Special Agent is called to appear as a witness, his recollection, answering the question posed. The
physical appearance should be faultless, not only witness must, however, be prepared to submit
in his personal grooming, but also in posture and such memoranda or notes for inspection by the
physical attitude when on the witness stand. He court of counsel.
should adhere to all the normal courtesies of the
particular tribunal and should maintain a profes- d. Classified Information. Legally, if evidence
sional manner and bearing. When testifying, he is relevant and material to the prosecution or the
should speak clearly and distinctly so that his defense of a case before a court, board, or other
testimony will be heard and understood. He must tribunal of the United States, its disclosure can-
take his time in answering questions, especially not be avoided on grounds of security. It is true
during cross-examination, so that he will phrase that courts, boards, or tribunals would not force
his reply clearly and concisely, thereby affording the individual to commit a violation (unautho-
the attorney of the side which called him an op- rized disclosure of classified defense informa-
portunity to object to a question not proper under tion), and in most instances the possibility or
the rules of evidence. To be effective and persua- probability that testimony may involve classified
sive as a witness, the Special Agent must treat information can be predetermined. In all such in-
4-31
FM 30-17
stances, guidance must be sought by the Special made at Department of the Army level. In any
Agent through his command channels from De- event, as soon as he can anticipate being called as
partment of the Army level. In counterintel- a witness involving classified information, the
ligence cases, the decision to prosecute a case or Special Agent must seek specific guidance and in-
to institute proceedings may involve weighing the structions. A legal proceeding does not relieve the
effects of information disclosure against security Special Agent of his obligations under the provi-
consequences. Normally such a decision would be sions of AR 380-5.
4-32
FM 30-17
CHAPTER 5
Section I. GENERAL
5-1
FM 30-17
able to take acceptable photographs under nor- cal support and assistance in the detection of these
mal conditions as well as video recordings and re- techniques normally are available at the MI unit
producing equipment. or higher headquarters.
d. False Documentation and Secret Writing. e. The Polygraph. The use of the polygraph is
Falsified passports, identification cards, and other invaluable as an investigative aid, but it should
papers used by hostile intelligence agents to es- never be used as a substitute for further investi-
tablish their cover and facilitate movement must gation. The conditions under which polygraph ex-
be detected in order to enhance security. Of equal aminations may be conducted are set forth in AR
importance is the detection of secret writing used 195-6. Trained polygraph examiners normally
to transmit information and instructions between are assigned to military intelligence and counter-
enemy agents and their control elements. Techni- intelligence units.
5—3. Audio Surveillance Systems cealed, and used in a covert or clandestine man-
ner with variations, limited only by the ingenuity
a. Any audio surveillance device, including
of the technician. They can be incorporated into
those employed by hostile intelligence services, existing electrical or communications wiring or
will consist of three basic components—
electronic equipment, concealed in building cavi-
(1) Pickup device. A typical system involves ties or conduits, hidden inside office equipment, or
a transducer, such as a microphone or similar de- placed in furniture or clothing. The listening post
vice, to pick up the sound and convert it to electr- can be any secure location from a broom closet to
ical impulses. a hotel suite. It may be located within the same
(2) Transmission link. The impulses created building as the listening device, if a metallic link
by the pickup device are carried by a pair of con- is employed, or it may be in a separate building
ductors, such as wires, conductive paint or tape, some distance away, if a radio signal is involved.
directly to the listening post, or to a transmitter
which converts the electrical impulses to a modu- 5—4. Characteristics of Audio Surveillance
lated radio frequency (RF) signal and transmits Equipment
the signal to the listening post.
Items of equipment which can be used in audio
(3) Listening post. The listening post con- surveillance systems vary greatly in size, physi-
tains the necessary equipment to receive the sig- cal appearance, and capacity. Many items are
nals from the transmission link and process them identical to, and interchangeable with, compo-
for monitoring and/or recording. nents of commercially available telephones and
(a.) Detection and amplification equip- radios. Indeed, audio surveillance and counter-
ment. Weak signals from the metallic transmis- measures equipment is available on the open mar-
sion links are amplified and applied to the moni- ket, although many firms limit the sale to law en-
toring and/or recording equipment. Radio signals forcement or security agencies.
must first be received on a radio receiver and con-
verted to audio frequency before being applied to a. Microphones. Microphones can be obtained
the amplifying and monitoring equipment. in practically any size and form. Various types
are available for specialized application and may
(b) Monitoring and recording equipment.
be disguised to appear as such common items as
Audio signals from the amplifier may be moni-
fountain pens, tie clasps, brooches, wristwatches,
tored on headphones or by visual indicators
or various household or office fixtures. Dimen-
and/or recorded on electronic recording devices to
sions vary from the relatively large carbon mi-
provide a permanent record. In special circum-
crophones to those as small as 1/4 inch in diame-
stances, the audio from the amplifier may be ap-
ter. Generally microphones must be placed in
plied to a higher powered transmitter and re-
such a position that air movement generated by
transmitted directly to a remote listening post at
sound waves will strike the diaphram of the mi-
an operational headquarters.
crophone. However, access to the area desired
b. The components described above are illus- may be attained by means of a hollow tube, usu-
trated in figures 5-1 and 5-2. They are available ally of plastic, which transmits the sound waves
in miniaturized form and can be disguised, con- to the microphone itself. This tube or the micro-
5-2
FM 30-17
••
co
Tape Recorder
¿7
Transmission Line oo oo
y
Microphone
Amplifier
Earphones
I
3 Microphone
Speaker
Radio Signal
O O i_
TT T •• O O
OO fi 00
Transmitter
CD
Receiver/Amplifier
5-3
FM 30-17
phone may be concealed behind a wall, under a preclude reception by ordinary household radios
floor, or above a ceiling, with a small hole bored and television receivers, transmitters are de-
to permit entrance of sound waves. Another type signed to operate on frequencies not normally as-
of microphone, the contact microphone, does not signed to commercial broadcast bands. Receivers
require air movement to actuate the diaphram, are small enough to be carried in briefcases and
but is placed against a solid which is vibrating as may be battery operated. They are equipped with
a result of sound waves striking its surface. The earphones as well as with output jacks to permit
solid may be a wall, ceiling, door, window, pipe, connecting a recorder.
or wire conduit1 which will transmit the vibra-
e. Recorders. Many commercially available
tions from the desired area to the location of the
wire and magnetic tape recorders may be em-
microphone.
ployed in audio surveillance systems. Some of
b. Transmission Systems. The simplest trans- these have such advantageous features as auto-
mission system is a pair of metallic conductors to matic start and stop (by a sound-actuated relay
carry the audio from the microphone to the lis- operating at voice frequencies), extended play
tening post. These conductors may be conven- and variable tape speeds to permit longer record-
tional wires installed and concealed for this spe- ing time, automatic volume control, and remote
cific purpose. Any existing conductors, such as control to permit turning off and on from a re-
unused electrical wire or ungrounded electrical mote location (by means of a radio signal). Min-
conduits or similar existing facilities may be iaturization of components and use of transistors
used. Special devices such as conductive paint or has led to production of recorders which are ex-
conductive tape may also be employed as well as tremely light in weight, compact, and self-pow-
existing power or telephone systems. However, ered, with extended recording time.
wires are not essential. Development of miniature
f. Other Items. Cavity resonators (self-con-
electronic components permits a microphone to be
tained monitoring units requiring no internal
connected to a very small radio transmitter
power source) and infrared transceivers (use of
which can be easily concealed. Such transmitters
invisible beam of light to transmit sound) are no
may operate from standard power sources of HO
longer new. The use of a parabolic reflector with
or 220 volts, or they may be battery operated. Re-
a microphone attached to a preamplifier to moni-
gardless of power source, they are small enough
tor conversations out-of-doors from a remote
to be concealed easily in floors, walls, electrical
point is now available. The rapidly advancing
outlets, lamp fixtures, or in recesses of uphol-
state-of-the-art of audio surveillance and counter-
stered furniture, and may have the capability of
measures equipment dictates the need for audio
remote control to permit operations from distant
surveillance countermeasures technicians to in-
locations. A battery-powered transmitter may be
crease their proficiency by continuous assignment
concealed on a person without being noticeable.
in their technical fields and continued study of
c. Amplifiers. The weak signal from a metallic new developments.
transmission link must be fed through an ampli-
fier prior to employing monitoring or recording 5—5. The Telephone
equipment. An amplifier, more correctly called a
Monitoring of telephone conversations is among
preamplifier, is normally a solid state miniature
the most productive means of surreptitious collec-
device capable of operating for an extended pe-
tion of information. Federal statutes regulate the
riod of time on a set of batteries.
use of electronic eavesdropping devices, and court
d. Receivers. A receiver is required to detect decisions have held unconstitutional the use of in-
the signal from a RF transmission link and con- formation derived from such devices as evidence.
vert it to audio frequency before it is applied to Questions regarding the evidentiary value of in-
the amplifier and the monitoring equipment. RF formation so obtained should be referred to a
links provided by normal commercial equipment judge advocate. Frequent use of the telephone
usually employ frequency modulation (FM) tech- tends to reduce alertness to the security threat
niques. Other forms of transmission include sin- posed by the instrument. Almost all telephones
gle side band (SSB), amplitude modulation are susceptible to "bugging" and "tapping." A
(AM), or pulse modulation. The radio signal may "bug" is a modification of the telephone instru-
be capable of continuous transmission or re- ment which permits monitoring of both sides of a
motely keyed. Any radio receiver may be used telephone conversation and also allows the pickup
provided it is compatible with the transmitter. To of conversation in the vicinity of the monitored
5-4
FM 30-17
telephone, even when the handset is on the cra- test set, a miniature telephone monitoring device,
dle. "Bugging" may be accomplished by adding of a radiation type transmitter, or even a telephone
a wire to the existing normal set, internal altera- number recording device. Indirect tapping of a
tion or modification of the telephone instrument, line (requiring no physical connection to the line
or concealing a microphone inside the telephone itself) may be accomplished by means of an in-
instrument. A telephone "tap" is a device con- duction coil in conjunction with an amplifier. It
nected to the telephone instrument or line which must be realized that all of these methods are not
permits both sides of a telephone conversation to readily recognized on sight. The use of technical
be monitored. "Tapping" may be accomplished by equipment and a high degree of proficiency are
connecting a device to the wires from an instru- required for the audio surveillance countermea-
ment at any point along the line, at connector sures technician to check telephones or systems
blocks, junction boxes, or the multiwire cables for security. The most thorough check is not ab-
leading to a telephone exchange. A device used solute insurance against the monitoring of tele-
for this purpose may be a telephone lineman's phones.
5-5
FM 30-17
Location: Date:
Camera Positions:
Paper:
Description of Area:
Remarks:.
5-6
FM 30-17
of view of miniaturization and quality of photog- photographs must have been made in accordance
raphy, tend to increase the importance of surrep- with the following general rules :
titious photography to intelligence operations. a. The represented object must be material to
c. Photographs of Individual Items as Evi- the case under trial.
dence. Both documents and other physical items b. The photograph must be free of distortion.
of evidence may be photographed in connection
with investigations. c. The photography must be verified by a per-
son who is personally acquainted with the local-
d. Specific Techniques for Analysis of Docu- ity, object, person or thing represented, and who
ments. Photography may be used to copy impres- is able to state that the photograph represents
sions on paper, carbon paper, or chemical era- the appearance of the subject matter in question.
sures. This type of photography normally re-
quires the services of the trained photographic d. Nothing must be removed or altered at the
technician and laboratory facilities. scene of an incident prior to the taking of the
photograph unless absolutely necessary; then a
note should be made indicating the reason for the
5—8. Photography as Evidence
removal or alteration.
A photograph may be valuable as evidence since
e. Although not a prerequisite for admissibility
it—
as evidence, photographs should be supported by
a. Presents facts in pictorial form and creates notes made at the time of photography to provide
mental impressions more vivid and realistic than a description of whát the photograph includes,
those achieved by words alone. case number of name of the subject, time and
b. Presents evidence in pictorial form more ac- date, lighting and weather conditions ; plate, film,
curately than the verbal description. lens and type of camera; time of exposure and
stop used; specific reason for taking the picture;
c. Permits consideration of evidence which, be-
location of the camera; compass direction; and
cause of size, bulk, weight, or condition, cannot
specific reference to all important objects por-
be brought into the courtroom.
trayed. Any one of these details may be of impor-
d. Reduces the need for lengthy descriptions tance during a trial, particularly if the photo-
and explanations. graph is challenged. The notes should be retained
by the investigator (photographer) on a format
5-9. Rules Pertaining to Photographs as similar to the Photo Data Card as shown in
Evidence figure 5-3. All photographs must be marked for
In order to qualify for admissibility as evidence, identification purposes as explained in FM 19-20.
5-7
fM 30-17
e. Obtain the facts after a test has indicated c. Mental Illness. Mentally deficient and in-
the possibility that a person is attempting decep- sane persons cannot be examined. Persons of very
tion. low intelligence may be difficult to examine suc-
cessfully. Often they display little moral sense or
fear of being caught in a lie or an offense. It may
5—14. Polygraph Examinations
be difficult or impossible for them to understand
a. General. The examination consists of a pre- the difference between the truth or a lie, or to un-
test discussion during which the examiner ex- derstand the purpose and procedures of the ex-
plains the operation of the instrument and re- amination. If the examiner believes a subject is
views the questions to be asked during the exami- mentally deficient, insane, or physically ill, he
nation ; the test proper, during which questions to must so inform the agency or office requesting the
be asked and the subject's physiological changes examination so that action can be taken to have
to his responses are recorded; and the post-test the subject examined by competent medical au-
interview, during which the examiner discusses thorities.
5-8
FM 30-17
d. Other Considerations. A person who has (3) Stress the professional qualifications
been treated or questioned improperly prior to and the impartiality of the polygraph examiner.
the examination may not be a fit subject for the
examination. A person who is emotionally upset 5-17. Preparation for a Polygraph
or under the influence of a depressant, narcotic, Examination
stimulant or other drug capable of materially ef-
a. Planning Examination Questions.
fecting physiological responses, should not be ex-
amined while he is in such a condition. A person (1) The examiner prepares the actual exam-
who is unduly afraid of the test may also present ination questions from information provided by
a problem. Proper treatment and a clear explana- the investigator. General facts, theories, and sus-
tion of the examination will usually overcome picions are not enough; the examiner needs de-
these difficulties. tailed facts.
e. Pretended Ills. Some persons may seek to (2) Whenever possible, the investigator
evade or postpone the examination by pretending should inform the examiner of the unpublicized
a mental or physical illness or some other defect facts of the offense, particularly those known
which they feel will make it difficult or impossi- only to the victim, the offender, and the investi-
ble for them to be examined. gator.
/. Use of Drugs. The use of certain drugs by a b. The Setting for Examination.
person may affect his reactions on the polygraph. (1) The examination must be conducted in a
The examiner should be alert for symptoms quiet, private place. If possible, two rooms should
which may indicate that the subject is under the be provided : one as the examination room proper,
influence of drugs. When an investigator has ad- and the other as a combination waiting room and
vance knowledge that the subject has injested office. The examination room should be plainly
drugs, he should so advise the examiner prior to furnished with only a desk, chair for the subject,
the investigation. (See app E for guidance.) and chair for the examiner. The subject's chair
should face a blank wall or one free from distrac-
5—16. Treatment of the Subject tions. The room should be soundproof to elimi-
nate extraneous noises. If the setting is in a
Success of a polygraph examination depends in
warm climate, air conditioning should be in-
part on how the subject was treated before he
stalled. A two-way mirror should be placed in one
was asked to take the examination, the manner in
wall to allow for observation when a witness is
which he was asked to take the examination, and
needed. However, AR 195-6 states that the sub-
his treatment while awaiting the examination.
ject must be informed of the two-way mirror and
a. Routine Questioning. A proper interview the existence of audio recording equipment.
seldom affects the examination results. However, (2) The waiting room should contain com-
the investigator should use common sense as to fortable chairs, a desk for the examiner, and
the length and persistence of questioning. The in- other equipment which creates a professional im-
vestigator should not reveal details of an offense pression.
to a person who may be asked to take a poly-
graph examination. (3) The ideal setting for a polygraph exami-
nation will be impossible to achieve in some situ-
h. Asking a Person To Take the Polygraph ations. It is suggested that an effort be made to
Examination. The Special Agent should— approach as closely as possible the conditions de-
(1) Ask the person to be examined if he is scribed above. The examiner will be able to ascer-
willing to take the polygraph examination and in- tain quickly whether the setting is adequate to
form him that if he refuses," no adverse action permit a successful examination.
will be taken against him. Further, advise him c. Arrangements for Witnesses. Normally,
that no information concerning an individual's only the examiner and the subject should be pre-
refusal either to submit to or volunteer for a po- sent in the examination room during the exami-
lygraph examination will be recorded in any per- nation. When the subject is a woman, there
sonnel file. should be a witness to the examination. Depend-
(2) Attempt no explanation of the poly- ing on the circumstances, the witness may be pre-
graph instrument or of the examination as this is sent in the room or may observe the examination
the sole responsibility of the polygraph examiner. through a two-way mirror (with the subject's
5-9
FM 30-17
knowledge) and listen to the examination by days prior to the polygraph examination, and
means of a monitoring device (also with subject's made available during the examiner's consulta-
knowledge). tions with the Special Agent.
c. It is imperative to inform the examiner,
5—18. Use of Interpreters when known, that the subject is overly emotional,
uses alcohol to excess, may be under the influence
a.. At times, the investigator will have to ar- of sedatives or drugs, may be addicted to nar-
range for an interpreter to work with the esxam- cotics or marijuana, suffers some mental abbera-
iner. The interpreter must be fluent in the two tion, or possesses other disabilities or defects
languages to be used so that the translations will which may cause abnormal responses.
be accurate and in the proper idiom. The inter-
preter should also have some experience in inves- d. He must consult with the examiner when in
tigative questioning. doubt as to the person's fitness to take the exami-
nation. If there is still doubt, consult the individ-
b. The interpreter must have a security clear- ual exercising command or operational supervi-
ance equivalent to the security classification of sion for further determination and appropriate
the matter to be discussed during the examina- action.
tion or such material as may be revealed as a re-
e. He should never describe the polygraph in-
sult of the examination.
strument as infallible.
c. The interpreter must understand how the f. The polygraph is used solely as an investiga-
examination works and what can be accomplished tive aid and does not determine guilt or innoc-
by it. The examination should be practiced in pri- ence.
vate until the interpreter thoroughly understand
the procedure. The interpreter should be briefed
beforehand on the facts with which he must deal 5—20. Reports, Records, and Charts
in his interpretation.
a. Reports and Records. The report forms to be
d. All examination questions should be pre- used, records to be maintained, and distribution
pared and translated prior to the examination. are prescribed in AR 195-6. The Special Agent
Procedures for using an interpreter are similar to will coordinate with the examiner in the prepara-
those followed in interviews and interrogations tion of portions of the form having to do with the
except that the interpreter asks the prepared background of the investigation.
questions at a predetermined signal from the ex-
aminer who is operating the instrument. b. Polygraph Examination Results. Polygraph
examination reports obviate the necessity for pre-
paring a detailed Agent Report, DA Form 341,
5—19. Avoidable Mistakes except that the Agent Report may be used as a
cover sheet to transmit the material. No mention
Most unsatisfactory polygraph examinations are of the results of the examination or of the infor-
due mainly to unfitness of the subjects and the mation obtained will appear in the Agent Report
lack of preparation by examiners and investiga- (chap 7).
tors. The Special Agent must bear the following
in mind : c. Statistical Data. Polygraph examiners will
maintain monthly statistics of all examinations
a. It is Department of the Army policy that conducted. The data collected will not contain the
counterintelligence investigations shall be based names of persons examined. In addition, a log of
on evidence, rather than on self-disclosure in- persons examined, by name, may be maintained
duced by polygraph examinations. All other in- provided that the results of the examination are
vestigative techniques should be exhausted prior not indicated or keyed to the names.
to granting authorization for the use of the poly-
graph examination. d. Statement of Consent. The Polygraph Ex-
amination Statement of Consent (DA Form
b. He must be thoroughly familiar with the 2801) will be read and signed by each person
case file to include subject's background. This in- prior to submitting to polygràph examination.
formation, including the dossier, if available, Prior to signing the statement, examinees must
should be provided the examiner at least two be given an explanation of rights under Article
5-10
FM 30-17
31 of the Uniform Code of Military Justice and polygraph examinations are admissible which
the Fifth Amendment to the Constitution and would be an incorrect assumption. Polygraph ex-
their right to counsel (chap 3) since the answers aminations are not reliable enough to be admissi-
to the examiner's questions can be introduced into ble in a court of law. The procedures outlined in
evidence against him. This is not to imply that AR 195-6 apply.
5-11
FM 30-17
CHAPTER 6
SOURCES OF INFORMATION
Section I. GENERAL
6-1
FM 30-17
(4) Others. Any individual, by virtue of his be relied upon only for that information which is
position and knowledge, may possess vital or spe- routinely available to him, and normally there is
cial information of CI interest. Normally, such no assurance that he would not furnish the same
sources are contacted for a specific purpose and information to any other agency requesting it.
continuous contact is not anticipated. The infor-
c. Official Sources. Individuals who, by virtue
mation provided may be either wittingly or un-
of their official positions, are expected or obli-
wittingly disclosed by the source, and the nature
gated to provide intelligence information openly
and circumstances of the type information ob-
to counterintelligence units in the normal course
tained determine the need for protection of his id-
of their duties are termed official sources. Certain
entity. These types of incidental sources are—
government officials, police officers, and technical
(a) Defectors.
experts are examples of official sources. Foreign
(b) Escapees.
government officials and representatives may also
(c) Refugees and displaced persons.
fall within this category, depending upon the cir-
(d) Repatriated personnel and expellees.
cumstances and agreements in effect. Continuing
(e) Detainees.
contact with offiical sources over a period of time
(/) Captured enemy personnel.
will frequently result in a relationship where the
(fir) Expatriates and members of minority degree of cooperation with the counterintel-
groups. ligence unit extends beyond that inherent in the
(h) Tourists and other transient person- official's position. In such cases, measures must be
nel/ taken to protect his connection and identity with
(i) Attendees at international gatherings. the information provided.
U) US citizens living abroad.
(k) Local nationals employed by US 6—5. Confidential Source
forces.
A confidential source is an individual whose iden-
(I) US military personnel, active, re-
tity and association with US intelligence for per-
serves, or retired, and their families.
sonal, business, official, or other reasons must be
b. Casual Sources. A casual source is one who, afforded security protection. In the field of coun-
by his social or professional position, possesses or terintelligence, confidential sources are generally
has access to information of continuing interest, employed in special operations, counterespionage,
and who willingly provides this information to countersabotage, and countersubversion activi-
the counterintelligence unit, either in response to ties. Confidential sources used in counterintel-
a specific request or on his own initiative. A cas- ligence special operations must be administered
ual source is under no obligation to furnish infor- and registered in compliance with appropriate
mation and normally is subjected to only as much directives. For a detailed explanation of confiden-
control as he is willing to accept. He usually can tial sources, see FM 30-17A.
6-2
FM 30-17
the publications available. Propaganda efforts of individuals, agencies and governments. As ex-
hostile and opposition forces, such as leaflets, plained in chapter 4, the files and records main-
newspapers and magazines, and trade publica- tained in the offices of the numerous federal,
tions, also assist in planning and conducting state, and local agencies, both military and civil-
counterintelligence investigations and operations. ian, are constantly utilized by the Special Agent
The mass media approach to the collection of in- during the course of investigations. Counterparts
telligence information requires a great deal of of our national, local, state, and private agencies
manpower and time to evaluate the worth of the also exist in most overseas areas. Although the
material. Differences between developed and un- scope and operations of these various overseas
developed societies usually mean a corresponding agencies will vary from their American counter-
difference in the quantity of publications that parts, in most cases, their recorded information
might provide information concerning the work- will parallel or even exceed that information
ings of a society and its people. available in similar agencies in the United States.
The reliability of recorded information obtained
from overseas agencies will vary depending upon
6-8. Scientific and Technical Documents/
the country and agency involved. Such informa-
Data
tion must be closely analyzed and evaluated be-
Exploitation of documents and data pertaining to fore being accepted as established evidence or
scientific and technical matters may reveal ad- fact. Important sources of information to the
vances and weaknesses of,a country. FM 30-16 Special Agents are those documents obtained
contains guidance on the handling, of scientific from local and higher intelligence headquarters;
and technical documents. these include such publications as intelligence
summaries (INTSUM), periodic intelligence re-
ports (PERINTREP), intelligence studies, direc-
6-9. Correspondence, Documents and
tives, and SOPs. Through judicious use of availa-
Records
ble records and files, investigation can be reduced
Perhaps the most widely and often used type of greatly and information verified. Leads can be
documentary source is correspondence or other provided indicating the existence and location of
documents legally and overtly exchanged between information which can be exploited.
Section V. LIAISON
6-3
FM 30-17
tact with designated military and civil agencies be aware that, whether of an official or informal
will be necessary. nature, liaison is a two-way street. The person
contacted by the Special Agent is usually from
c. In addition to national agencies maintaining
some other intelligence, law enforcement, or se-
or processing records and information of CI in-
curity agency, US or foreign, and expects to re-
terest, there exists numerous local agencies
ceive information from the Special Agent as well
which may also provide assistance to CI activities
as to provide information. Counterintelligence
and operations. Counterintelligence personnel
personnel involved in liaison duties must be fa-
must be familiar with available agencies and the
miliar with pertinent local directives and SOP,
type and scope of information which they can
A 380-5, AR 381-115, and other pertinent ARs
provide. Chapter 4 discusses the principal types
of the 380- and 381-series. The general rule
and locations of pertinent records that will often
("third agency rule") is that information will
be of CI interest.
not be passed to another or third agency without
the consent of the originating agency. Liaison po-
6—13. National Agencies in CONUS sitions differ in complexity from those involving
Liaison activities at the national level with mili- only records checks or exchange of documented
tary, Department of Justice, Treasury Depart- material to those involving detailed coordination
ment, State Department, Central Intelligence of all types of counterintelligence investigations
Agency (CIA), Civil Service Commission, Veter- and operations. The skilled liaison officer must
ans Administration (VA), and the Office of Selec- recognize his own limitations and bring other
tive Service are normally conducted at Depart- counterintelligence personnel into contact with
ment of Defense or Department of the Army other agencies when the occasion demands.
level. Information contained in the reports and
c. Additional overseas agencies include :
files of these agencies is usually received as a re-
sult of a National Agency Check (NAC). For (1) US official agencies.
further information, see FM 30-17A. (a) US embassies, legations, or consulates.
6—14. Local Agencies in CONUS (ft) Other intelligence and tactical units
in the area.
Liaison with military, civilian, private agencies,
and with offices of national agencies at local lev- (c) Local Judge Advocate General offices.
els is usually accomplished by a Special Agent (d) Intelligence advisors to host country
designated by his unit to establish direct, per- military forces.
sonal contact. In addition to Federal agencies rep-
resented at the local level, other agencies that ( e) Special Forces units.
should be contacted include : (/) Military Assistance Advisory Groups
a. Military G2/S2, personnel sections and pro- (MAAG).
vost marshals of units in the area. (g) Labor service battalions.
b. Civilian agencies such as state and local po-
(h) US Operations Missions (USOM).
lice or sheriffs' offices, bureaus of vital statistics,
state crime commissions, state adjutants general, (i) Civil Affairs units or staff sections.
state boards of education, motor vehicle bureaus,
and local courts. (j) Psychological warfare elements.
c. Private agencies such as chambers of com- (k) Provost Marshal and US Army Crimi-
merce, credit agencies, and public utilities. nal Investigation Command (USACIDC).
(I) USASA units.
6—15. Agencies Overseas
(2) Host country official agencies. Regard-
a. Liaison is essential to the success of counter- less of the status of US elements in the host coun-
intelligence exploitation of information in over- try, liaison personnel must exert all possible ef-
seas areas of operation. Many US agencies and
forts to establish personal rapport with their mil-
counterpart agencies of host country and allied
itary and civilian counterpart agencies at na-
forces will be found in overseas areas.
tional and local levels. In overseas areas, liaison
b. Personnel engaged in liaison activities must functions normally are assigned to full-time liai-
6-4
FM 30-17
son personnel who should possess local language gaged in tactical operations in conjunction with
capabilities, have broad professional background, armed forces of allied nations, close and contin-
and possess personal characteristics of maturity ued liaison must be established with the respec-
and good judgment. tive counterintelligence and other intelligence
(3) Allied forces. When US forces are en- agencies.
6-5
FM 30-17
CHAPTER 7
INVESTIGATIVE REPORTS
Section I. INTRODUCTION
7-1
FM 30-17
d. Clarity. Material included in investigative to the point. Although conciseness does imply
reports must be clearly phrased so that it will be brevity, it does not dictate the length of the re-
easily understood and cannot be misinterpreted. port. This will be dependent upon the number of
Clear phrasing is the result of clear thinking. pertinent facts to be reported. Conciseness is
Emphasize main ideas in a direct, uncomplicated achieved by eliminating nonpertinent information
style; arrange paragraphs in logical order; and and irrelevant explanatory detail.
write in simple, standard, grammatical English
so that anyone using the report can understand
7-4. Protection of Investigative Reports
it.
Case files and dossiers pertaining to counterintel-
e. Impartiality. An impartial or unbiased re-
ligence investigations conducted in accordance
port is one in which the Special Agent has been
with AR 381-130 and individual leads or respon-
completely impartial and objective in reporting
ses containing significant derogatory information
all pertinent information, regardless of whether
concerning an identifiable person will be marked :
it is favorable or unfavorable to the subject of
"FOR OFFICIAL USE ONLY" and annotated
the investigation. The report must not include
that it is excluded from automatic termination
words which reveal or arouse feelings, except
(AR 340-16). Case files, dossiers, and other docu-
where such words are a direct quotation from the
ments containing classified defense information
source. Even then, the individual's reasons for
will be classified CONFIDENTIAL or higher in
using such words should be ascertained and re-
accordance with AR 380-5. Individual leads and
corded.
favorable responses to individual leads should be
/. Conciseness. A concise report goes straight marked "FOR OFFICIAL USE ONLY."
7-2
FM 30-17
rant recommendations adverse to the interest of support, speakers, autographs, drill teams, bands,
the person investigated. and even escorts for festivals and homecomings.
(3) All personnel security investigations of In these cases, characterizations may be re-
such importance or complexity that it is felt that quested for use in determining the appropriate
DA Form 2784 (Request for Results of Personnel response or course of action.
Security Action) would not furnish an adequate
summary of the rests. 7—9. Request for and Results of Personnel
Security Actions (DA Form 2784)
b. Prior to the completion of an investigation :
(1) In urgent situations which require im- Request for and Results of Personnel Security
mediate precautionary or preventive measures. Action (DA Form 2784) provides a standard for-
mat for requesting a background investigation,
(2) In cases of treason, espionage, sabotage,
limited investigation, review of previous investi-
or sedition, when the initial ROI is prepared
gations in order to validate an existing clearance,
within 30 days of initiation of the investigation,
or a check of intelligence files for any purpose.
regardless of the status of the case. Subsequent
Its use is restricted to actions involving individu-
reports of investigation will be submitted as nec-
als. Control offices will utilize DA Form 2784 to
essary and upon completion of the investigation.
notify requesters of the results of investigation.
(3) Whenever the investigation is sus- When the results of a background investigation
pended, canceled, or transferred to another jur- are completely favorable, the investigative re-,
isdiction. ports will not be furnished the requester (action
agency) unless specifically requested. This form
7—8. Summary of Information (DA Form will not be used to request a National Agency
568) Check (NAC) or Entrance National Agency
The Summary of Information (SOI) is used to Check (ENTNAC) only. (See AR 381-130 for
present a concise history or summary of the in- distribution and instructions for completion of
formation available concerning an individual, or- DA Form 2784.)
ganization or an incident. A SOI may be used as a
basis for some decisions (e.g., a decision to ini- 7—10. Department of Defense National
tiate an investigation), but is never used as a Agency Check Request (DD Form
basis for direct action against an individual. It 1584)
is used as a means of transmitting information Department of Defense National Agency Check
between commands and offices, including counter- Request (DD Form 1584) will be used to request,
intelligence offices. It is not intended to replace control, conduct, and return results of a National
other forms, such as the ROI, Agent Reports, or Agency Check (NAC) or Entrance National
Lead Sheet, and it is not used to report original Agency Check (ENTNAC). For details in pur-
information. The SOI normally is used to transmit pose, preparation, and distribution, see AR
the following types of information: 381-130.
a. A summary of files or records.
7—11. Spot Reports
b. Information which is considered of impor-
In addition to the five basic investigative reports,
tance to any government agency which has a pro-
any information obtained by counterintelligence
per interest in the facts.
personnel which requires immediate dissemina-
c. Characterizations are biographic sketches of tion to user agencies (tactical or nontactical) will
individuals or organizations who routinely ser- be submitted so that the responsible command
vice Army installations or make requests to and, if appropriate. Headquarters, Department of
Army elements and officials. These requests may the Army, may be promptly advised. Transmittal
be for a variety of reasons. For example, requests of such information is normally in the form of a
may be for admittance to installations as for civic spot report (AR 381-130).
7-3
FM 30-17
CHAPTER 8
Section I. GENERAL
8—3. Scope of Background Investigation c. There are times when the period of coverage
may be extended to any period of the individual's
a. Most counterintelligence investigations are
life :
background investigations (BI). Their scope en-
compasses fourteen component parts and gener- (1) In the event that such a step is necessary
ally covers the last 15-year period of the individ- to substantiate or disprove derogatory informa-
ual's life to the date of the investigation, or from tion.
the subject's 18th birthday to the date of investi- (2) When extended coverage is required by
gation, whichever is shorter. competent authority.
b. The education and birth records checks, (3) When the individual is 17 to 19 years of
which are considered important parts of the BI, age (the investigation will embrace coverage
are conducted without regard to the time and back to age 15).
date of birth limitations indicated above. The res-
triction on the 15-year coverage, or the individ-
8—4. Components of a Background
ual's 18th birthday, concerns the Special Agent
Investigation
only in that he is not required to deliberately seek
information not within the usual period of cover- There are fourteen minimum components or re-
age unless a discrepancy develops during the in- quirements of a BI, all of which are significant in
vestigation. determining} an individual's loyalty and suitabil-
8-1
FM 30-17
ity. These components are prescribed in AR rural areas, may be accepted. Baptismal and
381-130 and AR 604-5 and are discussed individ- church records may provide verification, as would
ually below. entries in an old family Bible. In cases of adop-
tions or of illegitimate births, the verification
8—5. National Agency Check may require a check of court records, or inter-
a. A National Agency Check (NAC) consists views with parents, guardians, or lawyers. In
verifying birth data, the Special Agent must be
of a search of the records and files of appropriate
careful that the information obtained is a verifi-
national agencies for information bearing on the
cation and not merely a repetition of the original
loyalty, trustworthiness, and suitability of indi-
source of information.
viduals under the investigative jurisdiction of the
DOD establishment. Whether used as the basis
for a clearance or as a part of a BI, the procedure 8-7. Education
is the same. The types of National Agency a. Time spent in high school or college repre-
Checks, national agencies of concern, location of sents a formative period of an individual's life,
specific records, conditions under which these rec- and much can be learned which may not be re-
ords will be examined, and pertinent administra- flected in the school records. It is important that
tive instructions are described in detail in AR in addition to a check of school records, personal
381-130. interviews be conducted with teachers or others
connected with the school who may have an inti-
b. The designation and processing of NACs are
mate knowledge of the subject's activities. Teach-
administrative responsibilities of the control
ers at high school and college level generally
office; however, if during the course of an investi-
have about four different classes every day, and
gation there is indication that additional specific
the composition of these classes usually changes
agencies should be checked, the Special Agent
every 6 months. It can be expected that a teacher
should recommend that such checks be made.
may not be certain that he knows the subject.
c. The control office will extend the inquiry to Most schools publish yearbooks with individual
obtain additional information as necessary in the photographs of students which can be used as an
event that derogatory or adverse information is aid in identification. Some teachers may have
received in reply to an inquiry or developed dur- more significant information than others, and
ing the conduct of the investigation. these should be searched out. The Special Agent
should not be satisfied with broad statements
8—6. Birth Records such as "John was a good student," or "George
showed subversive tendencies." He must obtain
Examination of birth records is normally not in-
facts and details; he should determine what the
cluded in a BI. If, however, in the course of the
subject said or did that led to a conclusion con-
investigation a discrepancy is noticed in the date
cerning his character, integrity, and loyalty. In
and place of birth as listed by subject on his DD
some areas, juvenile delinquency is not recorded
Form 398, (Statement of Personal History), spe-
on criminal records, but it may be found in school
cial effort is made to determine which informa-
records.
tion is correct. In establishing the correct date
and place of birth, the best information is ob- b. Extracurricular activities, as well as aca-
tained from an official birth certificate or vital demic achievements of the subject, should be con-
statistics records maintained by municipal, state, sidered. Not only the names of organizations, but
or other government agencies. The appropriate the subject's degree of interest and participation
agency varies in different areas. Birth records should be determined. Mere membership in a sub-
may be kept by a bureau of vital statistics, de- versive organization is not conclusive evidence of
partment of health, or similar agency, and may disloyalty. For example, some individuals are
be maintained at state, county, city, or township "professional joiners" and become affiliated with
level. Other methods of verifying birth informa- every club, society, or activity possible. Often
tion may be resorted to when no official records they have little idea of the purpose or func-
are available. In such cases, the investigator at- tions of these organizations and may have become
tempts to find the best information obtainable. members of subversive or front organizations
Records of doctor, midwife, or a hospital may be without actual knowledge of that fact. No conclu-
used. The vital statistic files of a newspaper sive opinion can be based on the mere fact of
which carry birth announcements, especially in membership in such an organization. The Special
8-2
FM 30-17
Agent should intensify and extend the investiga- dren, etc., who may be, for various reasons, omit-
tion so as to prove or disprove any alleged sub- ted from DD Forms 398. Relatives of subject will
versive connections of the subject. Among the not be interviewed as listed or developed refer-
facts to be determined are subject's contributions, ences unless special circumstances warrant.
activities, degree of association, and acceptance
d. Most people, when told the subject is under
of the organization's principles.
consideration for a position of trust and responsi-
bility with the US Government or the Army, feel
8—8. Employment a moral obligation to be truthful. They are fre-
Employment records are examined in order to quently more honest in appraising a subject than
verify the period of employment and to determine he may have anticipated when he listed them as
details regarding the subject's duties and general rferences.
reliability. The reasons for termination of em-
ployment are significant. Data extracted from 8—10. Neighborhood or Residence
employment records should be substantiated by Investigations
obtaining additional information from individu- The interview of persons residing in the vicinity
als familiar with circumstances reflected in re- of the subject's residence may be conducted when
cord entries, e.g., a coworker, supervisor, or em- considered necessary to the completion of the in-
ployer. In addition, such persons may provide in- vestigation.
formation concerning subject's loyalty, character,
behavior traits, and reputation. Unions and labor 8—11. Criminal Record
activities are primary targets for subversive ele- When appropriate, or when information devel-
ments, and subject's participation in union activi- oped from a NAC is not considered adequate, it
ties may provide information concerning his par- may be necessary to check the records of police
ticular views and attitudes. However, member- departments and other law enforcement agencies
ship in a union known to have been infiltrated by in the vicinity of subject's past and present resid-
subversive personnel is not in itself evidence that ences and employment. Such checks are com-
the subject subscribes to objectives inimical to monly referred to as local agency checks. In all
the United States. In such instances, an ex- records checks, attempts are made to substantiate
tremely careful and sensitive investigation of the or verify the recorded information with testi-
subject's participation and affiliation in union ac- mony, evidence, and statements. Police records
tivities is essential, in order for responsible au- may show possible involvement in a crime, but
thorities to reach objective and valid conclusions court records may reveal that the subject was ac-
concerning its significance. quitted. On the other hand, acquittal may be
based upon a legal technicality or upon a faulty
8—9. References indictment. Scrutiny of the actual trial record is
important to obtain significant information; it
It can be assumed, in most cases, that listed ref-
may be derogatory to the subject or provide leads
erences will be prejudiced in favor of the subject.
for further inquiry. While the Special Agent
Obviously, the subject selects as listed character
seeks the best evidence, facts, and definite infor-
references those people on whom he can best rely
mation, he is also interested in rumor, hearsay,
to furnish favorable information.
and opinion, if they are pertinent to the investi-
a. Listed references may unwittingly reveal gation and lend themselves to further develop-
derogatory or adverse information during the in- ment as leads.
terview concerning subject's background, charac-
ter, or activities, thinking that they are flattering 8—12. Military Service
the subj ect. The service of an individual in the Armed Forces,
b. Listed references are usually sources of and the type(s) of discharge will be verified. The
leads to individuals who have knowledge of sub- verification of an individual's present sérvice is
ject's background and associates, but who are not accomplished by a check of the local and major
listed as references. unit's personnel files and by interviewing the im-
mediate supervisor and coworker when required.
c. Listed and developed character references Past service and type(s) of discharge received
are also the best sources for obtaining informa- are components of the NAC and will be accom-
tion regarding spouses, former spouses, or chil- plished by the control office. It is possible under
8-3
FM 30-17
8-4
FM 30-17
b. Subversive elements make concerted efforts may be conducted when essential to fair and pro-
to infiltrate and penetrate all groups and organi- per resolution of the case.
zations, to include educational institutions, labor
unions, veteran groups, and fraternal organiza- 8—19. Derogatory Information
tions. In view of this fact, all such associations by a. Suitability. If, during the course of a BI, ,
the subject should be reported. This serves not credible information is received or developed
only to determine subject's friends' associates, which reflects adversely on the character, integ-
and possible activities or ideologies, but also to rity, morals, or discretion of the subject, the con-
provide a reference for future checks should any trol office may change the case category to that of
of these organizations later be determined to an expanded BI. AR 604-5 lists a number of suit-
have subversive tendencies or membership. ability criteria; but information indicating that
c. The frequent explanation that participation the subject has engaged in conduct falling within
in subversive activities was due to immaturity, these criteria does not necessarily mean that he is
misplaced ideals, exercise of intelligence freedom, unsuitable. It is only upon completion of appro-
youthful impulsiveness, etc., is no basis for fail- priate inquiry of investigation and review of all
ure of the Special Agent to report such informa- pertinent facts that a positive determination can
tion. The Special Agent must report all informa- be made.
tion reflecting on the subject. b. Loyalty. If, during the course of a BI, credi-
ble information is received or developed which
8—18. Divorce Records reflects adversely on the subject's loyalty to the
Appropriate court records will be reviewed for US, the control office may change the case cate-
verification of pertinent information when the gory to that of a CTI. Chapter 9 explains th*»
subject has been divorced. Further investigation types and conduct of CTI.
8-5
FM 30-17
CHAPTER 9
Section I. GENERAL
9-1. Definition and Purpose port the loss of defense information by the mili-
A complaint-type investigation (CTI) is one in tary custodian of such information.
which sabotage, espionage, treason, sedition, sub-
9—3. Complaint Type Case Categories
versive activity, or disaflfection is suspected be-
cause of the receipt or development of credible All complaint cases, whether incident or personal
derogatory information. The primary purpose of subject type, will be assigned a specific case cate-
each CTI is to produce information of such a na- gory for control, reporting, and statistical pur-
ture, form, and reliability that the requesting poses. (See AR 381-125, and AR 381-130 for ex-
agency (action agency) may determine the extent planation and definitions.) These categories are—
and nature of action, if any, necessary to insure a. Sabotage
the security of the Army.
b. Espionage
9—2. Incident and Personal Subject Cases
c. Treason
Complaint-type investigations may be either inci-
dent or personal subject cases. d. Sedition
e. Subversive activity
a. Incident Cases. Incident cases concern acts
or activities which are committed by, or involve, /. Disaffection
an unknown person or group of persons. Exam-
ples of incident cases are— 9-4. Conduct and Control
(1) Fire of suspicious origin in a sensitive a. Instructions concerning the control and di-
military installation. rection of complaint investigations are prescribed
(2) The theft of classified documents from a in AR 381-130 and AR 604-10.
military office by person or persons unknown. b. Investigation of cases which contain allega-
(3) The distribution of subversive or sedi- tions that, if proved, would constitute offenses
tious literature within a military installation by under civil or military law are conducted with a
unknown persons. view toward developing information of sufficient
(4) Damage to equipment or supplies which probative value to permit its use in the appro-
is obviously mànmade and malicious in nature. priate civil or military court. However, such in-
vestigations should not be limited to the produc-
b. Personal Subject Cases. Personal subject tion of evidence, and the investigative reports
cases involve one or more known persons. Exam- should include all relevant and material informa-
ples of activities or individuals which might re- tion inadmissible in a civil or military court of
sult in the conduct of personal subject complaint law.
investigations include—
c. The scope of knowledge and skills which the
(1) Membership or affiliation with one or
Special Agent must possess to successfully con-
more subversive organizations by a member of
duct CTIs encompasses all aspects of the tech-
the US Army.
niques and procedures described in chapters 3
(2) Collaboration with the enemy, or mis- through 7. Special Agents assigned to conduct
conduct as a prisoner, by a member of the US complaint-type investigations must also have a
Army in prisoner-of-war status. thorough understanding of the objectives and op-
(3) Negligent loss or failure to promptly re- erations of hostile espionage, sabotage, and sub-
9-1
[FM 3®—1)7
versive organizations (FM 30-17A). Extensive greater in importance when conducting counter-
counterintelligence investigative experience is espionage operations is the need for an individual
usually an essential requirement for Special with training and/or experience in MOS
Agents designated to conduct CTIs. Equally or 9668/972A/97C.
©-2
FM 30-17
ing the incident and his reasons for doing so must further damage to the target and to safeguard
be established. The facts connected with the re- classified information or material.
ported discovery of the sabotage must be deter- (3) Interview witnesses and attempt to ob-
mined and examined for possible discrepancies. tain written statements before the witnesses have
(2) Examine the incident scene as quickly as had a chance to forget details or compare stories.
possible. The Special Agent should attempt to (4) Based on facts determined from incident
reach the scene before possible witnesses have scene examination and interview of witnesses,
dispersed and evidence has been disturbed. Upon check all pertinent files. Files of particular im-
arrival at the scene, he should employ the stan- portance may include unit modus operand! files,
dard crime-scene investigative procedures, to in- partisan, guerrilla, or insurgent activity files,
clude the following steps : local police files on arsonists, local police modus
(a) Protect the scene from mutilation by operandi files, and Provost Marshal files. File
removing all unauthorized personnel from the checks should include personality checks on wit-
area, roping off the area if necessary, and posting nesses and the person who discovered and re-
one or more guards to deny entrance and prevent ported the act of sabotage.
anything from being removed.
(5) Interrogate suspects. All available infor-
(b) Locate all possible witnesses, record mation such as evidence, technical and laboratory
their names and addresses, and if feasible, hold reports, statements of witnesses, and information
them for questioning. Witnesses held should be from informants should be compiled and studied
segregated. in preparation for interrogation of suspects. In
(c) Preserve the incident scene by taking some instances, discreet surveillance may be em-
notes, causing detailed sketches to be made, and ployed prior to detention and interrogation of
taking pictures. suspects.
(d) Obtain the assistance of technical ex- c. Additional Aid. FM 19-20 contains investi-
perts to search the scene of the sabotage act, col- gative guidance particularly applicable to the in-
lect and preserve physical evidence, and obtain vestigation of incendiary sabotage; is a valuable
all possible clues. Arson specialists, explosives ex- aid in the conduct of complaint investigations in
perts, or other types of technicians may be re- which explosive sabotage is alleged or suspected;
quired. and provides excellent guidance for the protec-
(e) Take any steps necessary to prevent tion, search, and processing of the incident scene.
9-3
FM 30-17
of a foreign nation. The salient aspects of the Each facet, grossly negligent loss and failure to
Federal Espionage Act, Title 18, United States promptly report, is a separate and distinct crime.
Code, Sections 793-796, are summarized as fol- b. The espionage investigation must be directed
lows : toward the collection of information and evidence
Whoever for the purpose of obtaining informa- to show—
tion respecting the national defense— (1) That national defense information was
involved.
a. With the intent or reason to believe that the
information is to be used to the injury of the (2) That there was an intent or reason to be-
United States or to the advantage of a foreign na- lieve that the United States would be injured, or
tion: that a foreign nation would benefit.
(1) Goes into a place connected with the na- (3) That one or more of the acts enumerated
tional defense, for the purpose of obtaining de- in the statute actually occurred.
fense information, or—
9-11. Spying, Article 106, Uniform Code
(2) Copies anything connected with the na- of Military Justice
tional defense, or—
a. Although the crime of spying as defined in
(3) With either lawful or unlawful posses- Article 106, UCMJ, differs from espionage, com-
sion, delivers national defense information to one plaint-type investigations based on Article 106
not entitled to receive it, or fails to deliver on de- will be categorized as espionage cases for report-
mand to one entitled to receive it, or— ing and statistical purposes.
(4) Receives or obtains any writing con- b. Spying is strictly limited to a wartime mili-
nected to the national defense with reason to be- tary situation because of the requirements of in-
lieve that it was obtained contrary to law, or— ternational law, particularly the provision of the
b. With intent to communicate to the enemy Geneva Conventions. There are four elements to
during time of war, collects, communicates, or at- the crime; all four must be present to constitute
tempts to elicit information pertaining to the the crime of spying—
public defense, or— (1) Breach of our lines and apprehension
within US zone-of-operations.
c. With lawful possession, permits national de-
fense information to be lost, stolen, or ab- (2) Clandestine operations or false preten-
stracted ; or having knowledge of such loss, theft, ses.
or abstraction fails to make a prompt report of (3) Obtaining or seeking information to
the same will have committed espionage. communicate to the enemy.
(4) Specific intent to so communicate.
9—10. Investigative Guidelines in Espionage
Cases 9—12. Conduct of Espionage Investigations
a. Analysis of the statute and of pertinent Because of the wide variety of circumstances
court decisions permit the following conclusions under which espionage cases may originate, the
to be drawn with respect to proof of espionage. many different elements that may constitute the
(1) "National defense information" is infor- crime of espionage, and the fact that it may not
mation of military significance which has not always be desirable to direct the course of the in-
been published for public consumption; i.e., not vestigation toward the arrest and prosecution of
distributed in public channels. It need not be clas- the offender, no single set of investigative proce-
sified defense information as defined in AR 380-5. dures can be recommended as applicable to the
The critical points are that it relates to the na- conduct of espionage investigations. It is essential
tional defense and has been restricted to autho- that Special Agents responsible for such an in-
rized channels. vestigation have a thorough and up-to-date
knowledge of all espionage and counterespionage
(2) "Any foreign nation" means the nation
methods and procedures discussed in FM 30-17A.
involved need not be a declared enemy, as in trea-
Any or all of the investigative techniques de-
son.
scribed in this manual and FM 30-17A may be
(3) Loss through gross neglect requires no employed in espionage cases. Records examina-
positive act because it is a crime of omission. tions can be used to break the cover story of an
9-4
FM 30-17
espionage suspect. Visual or technical surveil- Investigation, explains why arrest and prosecu-
lance can be used to obtain leads or evidence. tion are not always the objectives of espionage in-
Confidential sources or undercover operations can vestigations :
be used to locate and identify suspects. Investiga-
tive photography can be used to provide evidence In a criminal case the identification and arrest
of an attempt to transmit national defense infor- of the wrongdoer are the ultimate objectives. In
an espionage case the identification of the wrong-
mation to a foreign nation. The techniques em- doer is only the first step. What is more impor-
ployed must be determined in each individual tant is to ascertain his contacts, his objectives,
his sources of information and his methods of
case through continuing study and analysis of all communication. Arrest and public disclosure are
known information developed throughout the steps to be taken only as a matter of last resort.
It is better to know who these people are and
course of the investigation. The following quota- what they are doing, and to immobilize their
tion from testimony in February 1950 by Mr. J. efforts, than it is to expose them publicly and
then go through the tireless efforts of identifying
Edgar Hoover, Director of the Federal Bureau of their successors.
9-5
FM 30-17
9—15. Aiding the Enemy, Article 104, and proving the overt act by two witnesses which
Uniform Code of Military Justice are essential under the Federal treason statute do
not apply.
Investigations conducted by counterintelligence
personnel to prove or disprove charges brought c. Korean War Cases Under Article 104. Arti-
against an individual subject to the UCMJ under cle 104 was used in the majority of the courts-
Article 104, Aiding the Enemy, may in some martial cases arising from the Korean prisoner
cases by categorized as treason cases (AR of war incidents. Most of the specifications in
381-130). The article provides that "any person these cases concerned the third act listed above
who (1) aids, or attempts to aid, the enemy with and specifically that part of the act making corre-
arms, ammunition, supplies, money, or other spondence, without proper authority, a crime.
things or (2) without proper authority know- The Court of Military Appeals established in
ingly harbors or protects or gives intelligence to, these cases that there are only three types of
or communicates, or corresponds with or holds communication with the enemy which may be
any intercourse with the enemy, either directly or made with "proper authority" under military
indirectly, shall suffer death or such other pun- law, regardless of the motives which prompt the
ishment as a court-martial or other military com- communication :
mission may direct." (1) A communication disclosing name, rank,
a. Physical Acts Which Constitute Aiding the SSN, and date of birth.
Enemy. From the wording of the article and (2) A communication concerning the necessi-
from interpretation by the Court of Military Ap- ties of life.
peals, there are three physical acts which consti-
(3) A communication concerning regulations
tute the crime of aiding the enemy. Any one of
and orders of the place of confinement.
these acts with general criminal intent is a viola-
tion of the article—
9—16. Conduct of Treason Investigations
(1) Aiding the enemy with ammunition,
arms, supplies, or other things. Records examination, interview, and interroga-
(2) Harboring or protecting the enemy with- tion normally will be the principal investigative
out proper authority. techniques employed in treason complaint cases.
The Special Agent must give particular attention
(3) Giving intelligence to, communicating
to the legal requirements governing the collection
with corresponding with, or holding any inter-
and preservation of evidence, especially the tak-
course with the enemy without proper authority.
ing of statements from witnesses and suspects.
b. Proof Requirements Under Article 104. He must be careful to sort out fact from rumor or
(1) It is necessary to prove only that one or hearsay when taking testimony from witnesses
more of the prohibited acts actually occurred. and when reporting the results of investigations.
In many cases, it will be necessary for the inves-
(2) The enemy need not be a declared enemy tigator to consult regularly with legal authorities
but may be a "substantial" enemy as in the case during the course of the investigation to insure
of the Communist forces in the Korean War or in that the elements of proof are being fulfilled and
the Vietnam conflict. that all applicable legal conditions and restric-
(3) The requirements of proving allegiance tions are met.
9-6
FM 30-17
volving sedition may occur with equal frequency Act will necessarily be directed toward proving
in either peacetime or periods of hostilities. that the oral or written material involved in-
tended to incite listeners or readers to take ac-
9-18. Seditious Conspiracy tion.
Section 2384 of Title 18, US Code, makes it a spe-
cific crime to conspire to overthrow the Govern- 9—20. Mutiny and Sedition, Article 94,
ment of the United States. Unlike the general Uniform Code of Military Justice
conspiracy statute, which makes it a crime to Counterintelligence personnel may be directed to
conspire to commit any Federal crime, the sedi- investigate sedition or (less frequently) mutiny
tious conspiracy statute does not require the com- cases. Such complaint-type case may be either
mission of an overt act toward fulfillment of the personal subject or incident type.
conspiracy's objective. The crime of seditious con-
a-. Mutiny. Mutiny is defined as a collective ef-
spiracy is complete when two or more persons
fort to overthrow lawful military authority. It
have entered into agreement to overthrow the
Government, or to prevent, hinder, or delay the also includes, under Article 94, the individual
execution of any law of the United States. It creation of a riot or disturbance with the intent
should be noted that seditious conspiracy is a con- to overthrow lawful military authority. The of-
spiracy to actually overthrow, as distinct from a fenses may be committed in two ways : by several
conspiracy to advocate overthrow. persons acting in concert to refuse to obey orders
from proper authority, and with intent to over-
9-19. Advocacy of the Overthrow of the ride military authority ; or by a person, with sim-
ilar intent, acting either alone or in concert with
US Government
others, creating a violence or disturbance. The in-
Section 2385 of Title 18, US Code, also known as vestigation of incidents of mutiny normally will
the Smith Act, enumerates four specific types of not be assigned to counterintelligence personnel
activity which, if done with intent to cause the unless the mutiny is believed to be related to hos-
overthrow of the Government by force or vio- tile intelligence or subversive activities.
lence, constitute sedition. The prohibited acts
are : advocating or teaching thé duty or necessity b. Sedition. Article 94 makes it a crime for any
of such overthrow; or printing, publishing, sell- person, with intent, to cause the overthrow or de-
ing, or distributing written matter advocating or struction of lawful civil authority, or to create in
teaching the duty or necessity of such overthrow ; concert with any other person a revolt, violence,
or organizing a society or group whose purpose is or other disturbance against such authority. The
to advocate or teach the duty or necessity of such investigation of charges of sedition under Arti-
overthrow ; or being or becoming a member of, or cle 94 normally will be assigned to counterintel-
affiliating with, such society or group knowing ligence personnel.
the purpose thereof. Court decisions relative to
advocacy of overthrow have established that the 9—21. Conduct of Sedition Complaint
advocacy must be calculated to incite persons to Investigations
take action toward the violent overthrow of the Covert investigative techniques are likely to be
Government. The mere advocacy or teaching of applicable to the conduct of sedition investiga-
forcible overthrow of government as an abstract tions. The standard techniques of interview and
principle, divorced from any effort to instigate interrogation will also be important. A thorough
action to that end, does not constitute the crime knowledge of subversive activities, individuals,
of sedition under the Smith Act. The requirement and organizations in the area usually will be an
for the advocacy to "incite persons to take ac- essential attribute for Special Agents conducting
tion" is of particular significance to the Special sedition complaint cases. FM 30-17A provides ad-
Agent, and it can be expected that considerable ditional investigative techniques likely to be appl-
effort in any case alleging violation of the Smith icable to the conduct of sedition investigations.
9-7
FM 30-17
verse loyalty information developed during rou- a. Determine what act occurred,
tine background investigations; reports submit-
b. Show, based on evidence of probative value,
ted by military units under AR 381-12, reports
that the activity was detrimental to the national
from other intelligence and security agencies;
security, and
and leads obtained directly from sources used in
counterintelligence special operations (AR c. Show that the activity did not rise to the
381-47 and FM 30-17A). Because neither subver- level of treason, sedition, espionage, or sabotage.
sive activity nor disaffection, as such, is defined
AR 604-10 and AR 690-1 include specific guid-
as a specific crime in either the Federal criminal
ance regarding the conduct of complaint-type in-
code or the UCMJ, the objective of such com-
vestigation of alleged subversive activities on the
plaint-type investigations usually will be to deter-
part of uniformed or civilian personnel of the De-
mine if there is a need for some administrative
partment of the Army.
action ; e.g., removal from the sensitive assign-
ment to protect the security of the military com-
mand. 9—24. Disaffection
Disaffection, as defined in AR 381-130, is a state
9—23. Subversive Activity of mind and, although the disaffected person may
have criminal intent, there is no conduct in-
AR 381-130 defines subversive activity as all will-
volved. Hence, disaffection is noncriminal in na-
ful acts which do not fit the categories of sabo-
ture. However, a person within the military es-
tage, espionage, treason, or sedition, but which
tablishment possessing such a state of mind
are intended to lend aid, comfort, or moral sup-
creates a vulnerable spot in the national security
port to individuals, groups, or organizations ad-
and is most susceptible to approach by persons
vocating the overthrow of the United States Gov-
whose objectives are inimical to the United
ernment by force or violence, or are otherwise in-
tended to be detrimental to the national security States. The Special Agent must show the requis-
of the United States. Since this area is very nebu- ite mental attitude for disaffection through such
lous and there are no statutory standards which tangible indications as oral statements, written
the actor's conduct must meet, the investigation statements in personal correspondence, published
must: statements, or published textual material.
9—3
FM 30-17
CHAPTER 10
10-1
FM 30-17
10-2
FM 30-17
is invited to the physical security checklist con- Each checklist must be modified by additions,
tained in FM 19-30. (Physical measures should changes, or deletions before it can be applied to
be included in the physical security conducted by any one installation. Even then, the application
military police units under the control of the pro- of good investigative techniques can be expected
vost marshal.) to extend the survey beyond the detail contained
in the checklist. See appendix D for a checklist
(2) Specific checklist. A specific checklist is
which may be used as a guide for conducting a CI
one that applies to a particular installation or a
survey.
unique type of installation. An expample would
be a checklist prepared for use at US Army Air
10—5. The Escort Officer
Defense Command installations. In many res-
pects, all of these installations are alike. Usually, a. From the standpoint of both the Special
these sites occupy the same amount of real estate, Agent team and the installation, it is desirable
operate at the same echelon of command, have that an escort be provided by the installation to
the same equipment, the same number and type accompany the survey personnel during the con-
of troops, and, in most cases, operate under the duct of the survey. Preferably, this escort should
same policy from an operational and security be a representative of the installation's intellig-
point of view. When there is a requirement to ence or security office. In any event, he should be
surevy a number of these installations, it would a person conversant with all security practices
be worthwhile to prepare a specific checklist and procedures in effect at the installation.
which would apply to these sites. Specific check- b. The escort officer serves as a guide to the
lists normally include more detail than general Special Agent or survey team as they proceed
checklists. through the installation conducting the survey. He
b. A checklist, either general or specific, is used identifies the surveying personnel to those per-
sons who will give information and makes ar-
only as a guide. It is improper to assume that any
rangements to satisfy their operational require-
checklist will provide a complete basis for action
ments. The escort officer is present to gain timely
in completing the survey. Each installation has notice of any outstanding hazards discovered,
its own particular security problems. These dif- provide information pertaining to previous at-
ferences may have their origin in size, location, tempts to correct such hazards, and make such
mission, or surrounding area of the installation. on-the-spot corrections as possible.
10—6. Preliminary Exterior and Interior population, has or could have upon the security of
Checks the installation. The CIDC Crime Prevention Sur-
As soon after the initial briefing as possible, the vey (External) may assist greatly in this area.
survey team should conduct a tour of the area The team should also tour the interior of the in-
stallation to determine those areas, buildings, or
surrounding the installation. The purpose of such
an inspection is to gain a general knowledge of offices which will require additional security con-
those elements outside the installation which do siderations or which are considered to be sensi-
or could conceivably have a direct or indirect in- tive. After the inspection, it may be necessary to
confirm the findings by arranging for an inter-
fluence upon the security of the installation ei-
view with staff officers of the installation to learn
ther in peacetime, under actual war conditions, or
in case of riot, strikes, or other domestic disor- the operational importance of particular areas of
buildings.
ders. It is in these areas adjacent to the installa-
tion that many of the installation personnel
gather for relaxation or entertainment, often 10—7. History of the Organization and
under circumstances conducive to "loose talk." Installation
The survey team should also check geographical When survey personnel have completed a check
features: terrain, road and railroad networks, of the surrounding area of the installation and a
bridges, and natural or manmade hazards near preliminary survey of the interior of the installa-
the installation. They should also determine, to tion, they should be ready to commence the. actual
the greatest extent possible, what influence the survey. The team should first determine the his-
10-3
FM 30-17
tory of the organization to be surveyed and of the congested residential, urban in nature, or
installation on which it is located. In most cases, sparsely populated. The type of surrounding area
the history, background information, or both are may offer favorable natural cover to enemy es-
readily available in printed form. From a secur- pionage or sabotage agents. Consideration should
ity point of view, the survey personnel are inter- also be given to the area's transportation facili-
ested in the history of the organization and in- ties and to natural hazards which may arise from
stallation from its inception. There frequently is the surrounding area such as flood, forest fires, or
information in the history of the organization or adjacent flammable storage areas.
installation which directly affects the current se-
d. Security Classification of Information. One
curity situation (abandoned tunnels or sewer
of the major points for consideration in evaluat-
lines).
ing the sensitivity of an installation is the classifi-
cation of the information stored, used, and
10—8. Establishment of the Installation's created there. Logically, information which is of
Sensitivity greater importance to national defense required
At this point, the security needs of the installa- greater safeguarding from all standpoints. While
tion in relation to its sensitivity and importance Army Regulations establish some safeguarding
must be determined. During the preliminary sur- requirements, comparable measures will very
vey the survey team has had an opportunity to likely be required in areas of consideration not
make a rough evaluation of the installation's im- specifically established by regulations. When con-
portance to national defense and its vulnerability sidering the classification of information, the
or value as an espionage or sabotage target. An amount of classified information present must be
accurate appraisal must be made prior to the in- determined.
vestigation in order that specific recommenda-
e. Number of Like Installations. In determin-
tions commensurate with the actual security
ing the overall importance of an installation, con-
needs of the installation can be presented to the
sideration must be given to installations or activi-
commander and his staff. The following points
ties which are capable of absorbing the functions
should be considered in determining sensitivity:
of the surveyed installation in order to maintain
a. Mission. The first consideration is the mis- mission continuity, in the event the surveyed in-
sion of the organization being surveyed. It must stallation were neutralized or destroyed. If no
be determined if the mission is continuous or of other organization is capable of assuming these
short duration, unclassified or classified, and if duties, the importance of the surveyed installa-
technical or highly skilled personnel are neces- tion would be increased immeasurably. However,
sary for its successful operation. the mere fact that similar installations or activi-
ties exist may not significantly lower the critical
b. Cost of Replacement. In estimating the cost rating. Similar installations may be in no position
of replacement of the installation, a comparative to absorb the mission of another, or, if the mis-
analysis, not a dollar and cents figure, is ob- sion is primarily devoted to a defined geographi-
tained. The time necessary to replace personnel, cal area, there may be no substitution regardless
documents, and materiel in the event the installa-
of how many similar installations exist. In con-
tion were neutralized or destroyed is estimated.
sidering the substitution or replacement of an in-
Further consideration is given to potential
sources of personnel of similar experience and stallation or its mission, due consideration must
knowledge and to a source of copies of essential be given to the time factor. What will be the time
and critical documents which would be required consumed before the changeover or substitution is
in replacing or reactivating the installation. The effected? Are the facilities of the alternate in-
financial cost of replacing the installation may stallation of such a nature as to achieve an oper-
then be considered. ating efficiency comparable to the previous level?
If the alternate installation cannot operate at an
c. Location. Consideration must be given to the
location of the installation and the effect the ele- acceptable level of efficiency, how long would it
ments surrounding it have upon its security. Most take to attain this desired level. Will this transi-
of the information concerning this aspect is de- tion period affect the national defense effort to a
termined from file checks and examination of the great degree? All of these questions must be con-
surrounding area before actually commencing the sidered concerning the number and adaptability
investigation. The area may be highly industrial, of like installations.
10-4
FM 30-17
f. Importance to the Defense Effort. In some survey personnel available, personnel capability,
instances, evaluation of the installations impor- and choice. Since three types of security are in-
tance may be made locally based upon a joint ef- volved (document and information, personnel,
fort between the CI survey team, the installation and physical) and will be reported in separate
commander, and his staff. Other knowledgeable portions of the survey report, it may be easier but
persons within the installation and command and more time-consuming to attack each of the types
an evaluation and correlation of available infor- as a separate problem (i.e., gather all the infor-
mation from other agencies, adjacent commands, mation pertaining to physical measures first and
and the agency utilizing the end product are also then return over the same ground gathering in-
of prime importance. In most instances this eval- formation pertaining to personnel security). If
uation has been made at higher echelons of com- more than one Special Agent is available, it is
mand or at Department of the Army level. The better for a two-man team to investigate jointly
basic consideration is how important is this in- than to use individuals in separate areas. If sub-
stallation and its mission, functions, and produc- teams of two or more investigators are assigned
tion to the national defense effort. The mission of to separate portions of the survey to'facilitate its
the installation affords a fairly good indication of accomplishment, extensive coordination is re-
its importance. However, when the mission is quired during the information-gathering portion
compared with the cost of replacement, location and the evaluation portion because of the interac-
of the installation, existence of like installations tion between the types of security or areas being
which could absorb the operations, and classifica- considered.
tion of the installation's activities and informa-
tion, the overall importance of the surveyed in- 10—10. Document and Ihformation Security
stallation may be higher or lower than antici-
pated. This is the information the survey team The document and information security phase is
requires before it can determine the actual secur- probably the most important part of the CI sur-
ity needs of the particular installation. When this vey. Accordingly, this portion of the survey must
sensitivity rating is compared with the installa- be minutely detailed. In addition to using a
tion's current security situation, the investigator checklist, survey personnel must examine, ana-
will be in a position to offer recommendations to lyze, check and cross-check always, seeking to cor-
either raise or lower the level of security on the rect weaknesses and discrepancies. Each survey
installation in consonance with its sensitivity or team member must visualize the security proce-
importance to the national defense effort. dures employed from a viewpoint of an enemy
agent. Many aspects of document and information
security appear to be mechanical in nature, but
10—9. Determination of Existing Security
these appearances are misleading. Security, in all
Measures
its phases, must be an alert, live process in order
a. The foundation having been laid, the survey to constitute an effective defense against enemy
personnel can devote themselves to examination agents attempting to penetrate or destroy the in-
of the existing security situation at the installa- stallation. With these ideas in mind, the survey
tion. This portion oí the survey is a minute exam- team can effectively inspect the procedures used,
ination of all factors pertaining to personnel se- evaluate the security situation, and recommend to
curity, physical measures, and document and in- the commander corrective measures necessary to
formation security. It is: a collection of factual eliminate weaknesses and gaps in existing proce-
data that will, when reported, show what exists dures. Conduct of the survey of document and in-
at this installation that affects security, without formation security will include consideration of
regard for its being labeled as a hazard or a pre- the following specific areas :
caution. Much of the security situation will not
be based upon existing written requirements. a. Organizational Structure. The survey team
Therefore, much of what is examined will not must first have a clear understanding of the or-
have been officially determined to be hazardous or ganizational structure of the installation or unit
precautionary in nature. The survey team must being surveyed in order to check the security and
arrive at its own conclusions that these factors flow of classified information. This can best be
will be reflected in its recommendations. determined by interviewing individuals who
likely have a thorough knowledge of the struc-
b. The techniques of conducting this portion of ture and operational relationship between the in-
the survey are dependent upon the number of stallation and the units stationed thereon. Organ-
10-5
FM 30-17
izational charts obtained from the facility and classified information while insuring flexibility of
units to be surveyed are also of great assistance command that is vital to successful combat opera-
in this respect. tions.
b. Flow of Classified Documents. The inflow of b. Records on Security Clearances. The clear-
classified information generally commences at the ance level required by each TOE or TD position
higher headquarters and continues down through must be determined; this information should ap-
intermediate offices to lower units. The outflow of pear on a roster or manning table used by all
classified information usually follows the reverse staff sections for planning purposes. A compari-
pattern. The suggested apprqach is to examine all son of the actual clearance level of personnel as-
applicable items at each message center or classi- signed and the clearance required by the position
fied document control or storage point before pro- occupied will indicate the effectiveness of the pro-
ceeding on to the next point to be checked. gram being surveyed. Each unit or installation
should maintain a file on each individual assigned
c. Document Records. Classified document reg- to the command to include forms executed and
isters, receipts, retirement records, and destruc- correspondence received or forwarded in connec-
tion certificates are accounting records. They are tion with the personnel security clearance pro-
part of a protective system designed to overcome gram (AR 340-18-series). A reference card file
human error by assisting individuals to systemat- indicating the full name, date and place of birth,
ically handle classified information in a secure social security number, and duty assignment of
manner. Accountability records are also detective all personnel possessing a security clearance
in nature, for discrepancies may indicate loss, should be maintained in the intelligence office.
theft, or possible compromise of the information. The system employed to insure the accurate and
Such records may also indicate by their accuracy up-to-date status of the card file should be
and completeness, the attitude of the individuals checked by the survey team.
administering the records toward security.
(1) The distinction between the clearance
level of an individual and the level of access to
10—11. Personnel Security classified information authorized should be made
Personnel security, from the viewpoint of the clear. Surveying personnel should emphasize that
conduct of a CI survey, may be divided into two a person may possess a Top Secret clearance, but
separate categories, security clearances and se- in applying the "need-to-know" principle, a com-
curity education. The security clearance program mander may limit access to that level of classified
is discussed below; security education is covered information consistent with the duty assignment
separately in paragraphs 10-19 through 10-22. of the individual.
a. Security Clerance Program. The personnel (2) General efficiency of the personnel se-
clearance procedures for an installation or unit curity program in the overall operation of the
must be carefully audited. AR 380-5 established command is often indicated in the personnel as-
that the basic requirement for dissemination of signment section. Each set of orders prepared on
classified information is a "proper clearance" and an individual should, whenever necessary, indi-
a "need-to-know." A proper clearance is obtaina- cate the clearance status of the person concerned.
ble only upon initiation of appropriate adminis- A duplicate of the card file system in the intellig-
trative action by the command in accordance with ence office may be maintained in the personnel as-
AR 604-5. The system for initiating a request to signment section. If so, the administrative proce-
a higher headquarters, to include all administra- dures practiced to insure that the duplicate set is
tive measures and forms, should be carefully re- always current should be examined by surveying
viewed. Internal methods for supervision of prep- personnel.
aration of requests, suspense files, tracers, and (3) Military personnel who have been
verifications of clearance status of incoming per- cleared should have a valid DA Form 873 (Cer-
sonnel should be clearly outlined in the installa- tificate of Clearance and/or Security Determina-
tion or unit SOP. In those cases where the activi- tion under EO 10450) in their 201 files. The
ties of a unit with a tactical capability are being clearance certificate of a civilian employee is filed
surveyed, careful attention must be given to the in his official personnel folder. A signed copy of
security portion of the tactical SOP. A personnel DD Form 98, (Armed Forces Security Question-
security program under tactical conditions must naire) for military personnel and DA Form 1111,
be designed to insure maximum protection for (Statement of Nonaffiliation with Certain Organ-
10-6
FM 30-17
izations) for civilian personnel must be a part of tions which relate directly to counterintelligence
the permanent records of all military and civilian security requirements, emphasis will be placed on
personnel of the Department of the Army. The examination of physical security factors which
DA Form 66 (Officer Qualification Record) and directly affect classified storage areas, restricted
the DA Form 2Q (Enlisted Qualification Record) areas, or sensitive locations. When the entire in-
must indicate the date of completion of the inves- stallation's physical security system is essential
tigations, type investigation and level of security to the protection of classified documents or mate-
clearance granted. rial, the survey must be expanded to include these
additional physical security safeguards.
10-12. Physical Security d. Counterintelligence surveys and inspections
a. Physical security is understood to be a dis- by CI units, and SIGSEC surveys conducted by
tinct type of security differentiated from docu- USASA units complement each other. Coordina-
ment and information security and personnel se- tion through G2/S2 channels of these efforts
curity in that it comprises a system of controls, serve to maximize the overall security posture of
barriers, and other devices and procedures to the installation.
prevent destruction, damage, and unauthorized
access to Army facilities/activities. Counterintel- 10—13. The Exit Briefing
ligence surveys, conducted to assess the counter-
intelligence effectiveness of physical security After the survey team has completed its investi-
plans and procedures, is not understood to include gation and has arranged the results of its work
primary staff interest of the provost marshal in in draft form prior to departing the installation,
physical security surveys as described and defined it should determine if the commander and his
in FM 19-20 and FM 19-30. staff desire a final conference or exit briefing. The
Special Agent-in-Charge should discuss with the
b. In the event the installation/activity being commander and any other individuals designated
surveyed already has on record a physical secur- by the commander the findings and tentative rec-
ity survey performed by military police person- ommendations. The recommendations are based
nel, a statement referring to the report is deemed
on facts developed during the survey and cover
sufficient, providing those deficiencies noted
the safeguards which should be established to ad-
which directly affect the security of classified equately protect the installation against espion-
documents and material have been corrected. If age, sabotage, and subversion. The recommenda-
this has not been accomplished, appropriate rec- tions should be tempered with reason, taking into
ommendations will be made in the written report. consideration cost, time, manpower, availability
c. If there is no record of a previously con- of materials, etc. For each item which the survey
ducted physical security survey, coordination team establishes as a hazard, there must be a rea-
with the local provost marshal will be conducted sonable, practical recommendation. A successful
in order to coordinate and schedule a physical se- final critique with the commander and his staff
curity survey to be accomplished in conjunction can, in most cases, insure that the survey team's
with the CI survey. Counterintelligence personnel recommendations are realistic and can be imple-
must, nevertheless, be familiar with, and pre- mented with minimum difficulty. The team is not
pared to examine and assess the counterintel- limited to the number of recommendations which
ligence effectiveness of, barriers, controls, and can be made to eliminate any one hazard. Pri-
other protective devices, as well as the physical mary and alternative recommendations can be
security plans and procedures of the installation made to insure correction of the hazard by the al-
concerned. When the facility being surveyed is of ternative means if the primary recommendation
the "open post" type with few physical restric- cannot be implemented.
10-7
FM 30-17
10-8
FM 30-17
10-9
FM 30-17
personnel. The security indoctrination of an indi- poses, to divide personnel into various groups:
vidual can be successful only when he consciously clerks and stenographers, custodial personnel,
accepts security as his personal responsibility. staff members, security forces, and operational
Security consciousness is a state of mind imply- groups. In establishing the status of security
ing an understanding of security objectives, prin- training within a command, the general attitude
ciples and measures, and denoting a willingness of all personnel toward this training and security
and desire on the part of the individual to reach in general should also be established. Care must
these objectives. be taken to insure that the attitude of the com-
mand toward security is not the opinion of key
10—20. Planning a Security Education Program personnel alone. A cross-sectional survey of the
In planning a security education program for a entire command must be obtained in order to rec-
command, many factors must be taken into con- ommend an effective program.
sideration for the program to be successful. The
security requirements of commands will vary, as e. Survey of Surrounding Areas. A survey of
will the role of the counterintelligence unit in as- the area surrounding the command should be
sisting the command in establishing a security made to establish the location and type of recrea-
education program. If the unit has been requested tional facilities frequented by members of the
to suggest a security education program for a command during off-duty hours.
particular command, a preliminary appraisal is
mandatory. Scheduled meetings with the com- 10—21. Phases of a Security Education
mander, his staff, and key personnel will aid the Program
unit in planning an effective program. Planning
A security education program should be cycled
considerations include the following:
and suited to the requirements of a particular
a. Mission. The mission of the command will group. The number of phases required is depen-
usually indicate potential targets for hostile acts dent upon the number of people concerned, status
of sabotage, espionage, or subversion. The mis- of training, amount of time available, physical
sion should be studied carefully to insure that the facilities available, and funds allocated the com-
recommendations for a security education pro- mand for security purposes. Whenever practica-
gram are realistic, pertinent, and in harmony with ble, elements of this program, particularly the
the mission. initial interview and debriefing (a and g below),
b. Standing Operating Procedures. All SOPs, will be incorporated in unit SOP. In addition to
including personnel security, document and infor- the time spent in the actual education of person-
mation security, and physical security, must be nel, a complete and balanced security education
examined to ascertain what security measures are program must also include indirect methods of
in effect. After the review of these procedures, in- approach which will require additional utiliza-
terviews with members of the command should tion of supervisory and security personnel.
provide a reliable means of assessing the degree
of compliance with these established procedures. a. Initial Interview. The first phase of a com-
plete and appropriately cycled security education
The interviewees should remain anonymous in
order to encourage full participation. Personnel program is the initial interview. The initial inter-
view is usually the first contact that new mem-
should be observed performing their duties to de-
termine whether they are complying with the es- bers of the command will have with security, and
tablished security procedures. it is imperative that the approach to this inter-
view be conducted in a serious an professional
c. File Checks. A perusal of the counterintel- manner. The interview may be supplemented by
ligence unit's files as well as those of allied fed- issuance of security regulations and written
eral or civil investigative agencies must be made directives. The initial interview is designed to ac-
to determine if any special security factors or
complish four purposes:
hazards are to be considered.
(1) Impress the individual with the signifi-
d. Status of Security Training. During the pre-
liminary appraisal, the status of the command's cance and value of the information with which he
security training must be established. Not all per- will be entrusted.
sonnel will have received the same amount or (2) Stress the importance of security to the
type of security training. Since their require- command, the US Army, and to the individual
ments vary, it will be necessary, for training pur- himself.
10-10
FM 30-17
(3) Explain to the individual the penalties (2) Increases the security consciousness of
involved if he carelessly or negligently mishan- the command through group participation.
dles the information with which he has been en- /. Special Interviews. The sixth phase is the
trusted. special interview. Supervisory personnel should
(4) Insure that the individual fully under- be given a special interview. This special inter-
stands that anee he has had access to, and knowl- view should be accomplished in order to obtain
edge of, classified information, he assumes, at the the following objectives:
time of receipt of this information, the responsi- (1) A supervisor should recognize and make
bility for its safeguarding. on-the-spot corrections of faulty or careless prac-
b. Training Conference. The second phase of a tices.
security education program is the training com- (2) The supervisor should set the example in
ference or conferences. The length of time in- sound security practices and procedures.
volved depends on the complexity of security re- (3) The supervisor should demonstrate a
quirements pertaining to the individual's particu- healthy attitude toward security.
lar duties. The training conference should be held
during the normal training or orientation period g. Debriefing. The last phase of a security edu-
for new members of the command. It should be cation program is debriefing. Security debriefing
an integral part of training to emphasize that se- is required whenever a person who has had ac-
curity is one of the important requirements and cess to classified information leaves the com-
conditions of employment. Individuals should be mand. Consideration should also be given to con-
grouped together according to their positions ducting a debriefing upon the completion of spe-
within the command and each group should be cific classified projects. The security debriefing
treated accordingly. During these conferences, it serves two purposes :
may be appropriate to distribute various regula- (1) Special notice to the individual of his
tions, such as a security guide, or extracts from continuing responsibility to protect classified in-
the command's security SOP. formation of which he has knowledge.
c. Refresher Conference. The third phase is the (2) Command assurance that all classified
refresher conference or conferences. These documents and other classified material with
should last at least 30 minutes and should occur which the individual was charged have been pro-
every 6 months or, as a minimum, yearly. The re- perly accounted for.
fresher conference should be designed to satisfy
three requirements: 10-22. Sources of Material
(1) Remind the individuals of their continu- In order for any security lecture or security con-
ing security responsibilities. ference to be effective, appropriate and pertinent
(2) Answer the questions which individuals material must be presented to the participants of
may have about security practices or procedures. the conference or lecture. There are many sources
(3) Serve as a vehicle for explaining new of material available to the average counterintel-
changes or requirements in the field of security. ligence unit. A wealth of information can be ex-
tracted from the files of the unit itself. In the se-
â. Security Reminders. The fourth phase is the lection of this material, it is necessary that only
use of security reminders. As an indirect ap- facts of educational value and motives of interest
proach to indoctrination, security reminders to the audience be selected. If actual cases are used
bring to the attention of individuals their secur- as examples, they must be condensed, sanitized,
ity responsibilities during the normal course of and approved for release. Newspaper articles as
their duties. well as the dead files of local newspapers provide
e. Security Promotion. The fifth phase is secur- a wealth of information that can be used in se-
ity promotion. An active security promotion pro- curity lectures or conferences. A large number of
gram vigorously supported by the command is an books and articles concerning intelligence, espion-
effective method of maintaining security aware- age, and security have been published. Carefully
ness. Security promotion fulfills two require- selected extracts from these books make the se-
ments : curity lecture interesting as well as pertinent. Se-
(1) Provides the command with a method curity skits are particularly effective because
for recognition of individual achievement in they can be tailored individually to fit any given
promoting security. situation.
10-11
FM 30-17
CHAPTER 11
Section I. GENERAL
11-1
FM 30-17
11-2
FM 30-17
11-7. Discovery of Clandestine Surveillance have an impact extending to the highest national
and Listening Devices levels.
When discovery of a clandestine surveillance and
11—8. Reports
listening device is made, a report should be sub-
mitted immediately as outlined in AR 38Í-14. Counterintelligence technical survey and inspec-
Counterintelligence units should have a SOP tion reports are prepared in accordance with re-
which will delineate the action to be taken by porting procedures discussed in chapter 10. These
counterintelligence personnel upon discovery of a reports will include technical data which contrib-
clandestine surveillance device. It is essential uted to the conclusions reached in the technical
that all audio surveillance countermeasures tech- survey or inspection. An additional section, "Lim-
nicians be thoroughly familiar with the instruc- itations," is normally added to the five sections
tions contained in AR 381-14. The discovery of a discussed in chapter 10. A sample report of a CI
clandestine surveillance or listening device may technical survey is contained in appendix C.
11-3
FM 30-17
CHAPTER 12
Section I. INTRODUCTION
12-1
FM 3®-117
112—4. ©peraîSemis in Perweaird Areas civil affairs personnel, and G2/S2 staffs on hostile
intelligence activity and modus operandi.
a.. Offensive Operations.
(2) Enemy guerrilla forces activities and op-
(1) In the attack, emphasis must be placed erations against installations, supply points, lines
on the neutralization and/or exploitation of CI of communications, and other critical areas will
targets which are known to exist in enemy-held increase during defensive operations.
areas as reflected in target lists (see FM
(3) In the defense, forward area counterin-
30-17A). To accomplish this task effectively,
telligence elements may initiate certain special
counterintelligence personnel supporting combat
units may be deployed to forward elements as re- operations designed to collect intelligence infor-
mation or assist the commander in a specific oper-
quired by the mission. Initial advance by combat
ation directed against enemy forces. These opera-
troops through the objective area may be desired
prior to the commitment of counterintelligence tions require careful and detailed planning (FM
30-17A) and will be controlled and monitored by
personnel in forward areas. Flexibility must be
higher commands. Examples are as follows :
maintained in order to obtain maximum use and
(a) Recruitment of confidential sources
effectiveness. Counterintelligence needs and re-
and their injection into refugee groups and pris-
quirements vary constantly and personnel may be
oner of war channels.
deployed from one unit to another and from for-
ward to rear areas as these conditions change. (&) Exploitation of known enemy intellig-
ence agents.
(2) Counterintelligence personnel operating (c) Use of deceptive information as di-
with forward combat units perform their mission rected by higher commands.
within the existing boundaries of the supported
unit. When rear boundaries are advanced, control c. Retrograde Operations.
of the relinquished area will be assumed by the (1) Counterintelligence operations must be
counterintelligence elements gaining responsibil- compatible with the courses of action taken by
ity for the area. All documents and files pertinent the supported combat unit. In a retrograde move-
to the area will be physically transferred, as will ment, the security of troop movements and lines
any personnel held in custody. The gaining ele- of communication is a paramount consideration.
ment must be thoroughly briefed on affairs of CI Other considerations include :
interest in the relinquished area. (a) Evaluation of white and black list
(see para 12-9) personnel.
b. Defensive Operations. In the defense, coun-
(b) Evaluation of prisoners of war of CI
terintelligence elements in forward tactical areas
will be most active in combating enemy intellig- interest.
ence efforts to obtain information and intelligence (c) Evaluation of confidential sources who
concerning US Forces. Enemy intelligence activi- cannot remain behind for either operational or
ties may take many forms during this phase of security reasons.
operations. (2) In conjunction with military police, rigid
controls over civilians and refugees must be ap-
(1) Deployment of counterintelligence per-
plied to detect persons posing a threat to the se-
sonnel normally will differ from that undertaken
curity of friendly operations. Command post
in the attack. In most cases, deployment will be
areas which have been evacuated will be in-
in rear areas rather than forward with the com-
spected by counterintelligence personnel to insure
bat units ; however, counterintelligence personnel
that no information or material has been left be-
will be prepared to operate whenever and wher-
hind which might benefit hostile forces.
ever indications of enemy activities require a
counterintelligence effort. In the defense, empha- (3) During retrograde operations, the trans-
sis will be placed on such functions as : fer of areas of responsibility occurs in reverse of
(a) Civilian and prisoner of war screening that for offensive operations. The forward ele-
and interrogation. ment will establish contact with that element res-
ponsible for the CI coverage of the rear area
(ö) Development of effective human
which it will occupy; receive a briefing concern-
source programs (FM 30-17A).
ing operations in that area; and receive applica-
(c) Security of critical installations and ble files, documents, and personality information1
activities. on sources and other persons of potential CI
(e?) Continued briefings of military police. value within the area.
12-2
FM 30-17
12-3
FM 30-17
(3) Areas in which targets of known enemy mission during the planning and preparation
high-priority collection tasks (or interest) are lo- phase. Measures to be considered include :
cated.
(1) Increased emphasis on counterespionage
activities (FM 30-17A).
12—6. Other Tactical Operations
(2) Increased security indoctrination and
а. Counterintelligence personnel may be re-
training to include CI security and technical
quired to provide CI support for other tactical op-
inspections.
erations. Normally, CI elements will be attached
to the supported unit for the duration of the op- (3) Rigidly controlled security measures to
eration and tailored to meet the demands of the include restriction of personnel, if necessary.
specific operation. Airborne, amphibious, separate
(4) Security of training, logistical and re-
task force, and internal defense/development op-
connaissance activities as well as other prepara-
erations (chap 13) will require varying degrees
tions or activities which could indicate pending
of CI support and participation. In addition, CI
operations.
support and assistance may contribute materially
to the success of unconventional warfare opera- (5) Security of assembly and departure
tions by furnishing timely and accurate informa- areas to preclude infiltration of unauthorized per-
tion related to enemy-occupied terrritory into sonnel, and provide for maximum reduction of
which operations are planned. casual observation opportunities.
б. In most special tactical operations, the se- c. During the operation itself, the amount and
curity of the operation itself, from the time of in- type of CI support required will be influenced by
ception to the time of initiation, is of utmost im- the size and scope of the operation, the objective
portance. Counterintelligence efforts, in conjunc- area and the location and availability of CI tar-
tion with G3 personnel will be directed toward gets. The deployment of counterintelligence per-
denying the enemy access to information concern- sonnel will be dependent upon the targets to be
ing the time, destination, and objectives of the neutralized or exploited in the objective area.
12-4
FM 30-17
12-5
[?ÍVS 3©-ll^
112—<£>
FM 30-17
have been located or detained, the physical formation of immediate tactical interest to
guarding or control of the target is turned over friendly forces, and to make these persons availa-
to guard personnel or the service or agency with ble for interrogation by other agencies. Black and
primary interest in the target. How and when gray list personalities are not expected to be
troops are assigned specific guard functions cooperative under interrogation; however, coun-
around these CI targets will be influenced by terintelligence personnel should be alert to indi-
local requirements. In some instances, guard per- cations that these individuals may cooperate in
sonnel may accompany Special Agent teams to return for preferential treatment.
the target area ; in other cases, they may rendez-
c. Target Installations. The exploitations of in-
vous with the teams in the target area. It must be
stallation targets may be accomplished immedi-
understood, however, that the tactical effort, ex-
ately following the neutralization of the installa-
cept in unusual cases, takes precedence over CI
tion by counterintelligence personnel, or at a
target neutralization and exploitation. If tactical
later date if exploitation is not immediately possi-
troop augmentation is not possible, the CI ele-
ble due to the tactical situation or for other rea-
ment may have to rely on its own limited capabil-
sons. During the exploitation phase, the installa-
ities to neutralize or exploit the targets.
tion will be searched thoroughly for documents,
(2) Civil police support. Counterintelligence equipment, and materiel of intelligence or CI in-
elements involved in tactical operations may re- terest. Disposition instructions concerning docu-
quest and receive support from civil police agen- ments and materiel captured by counterintel-
cies in friendly controlled territories. Normally, ligence personnel while involved in tactical oper-
this support is arranged through the G2 in coor- ations will be found in command SOP or in FM
dination with the G3 or G5. Civil police may be 30-16. Documents, to include files and records,
utilized to accompany Special Agent teams on should be evacuated only through intelligence
target neutralization missions, assist in appre- channels. In some instances, it may be advisable
hensions of target personalities, and provide or desirable for the documents or materiel to re-
guards for installations which have been neutral- main within the installation, building, office, or
ized. Considerable time and effort may be saved billet where found until such time as they can be
in the performance of the counterintelligence thoroughly examined or analyzed by other coun-
mission if good liaison and working relationships terintelligence or technical intelligence personnel.
can be established with the local civil police
forces. 12—11. Tactical Counterintelligence
Interrogations
b. Target Personalities. The processing of tar-
get personalities apprehended by CI elements op- a. General. The circumstances of combat and
erating in tactical areas will generally be accom- the counterintelligence operations in tactical
plished according to procedures established by areas complicate the task of the Special Agent in-
field army. In most cases prisoners of continuing terrogator. There may be overwhelming numbers
CI interest apprehended in forward combat areas of people who are looked upon as threats to se-
will be evacuated as soon as possible to higher curity, perhaps solely due to their presence in the
echelons. It is essential that such prisoners not be combat zone. The number of suspect personnel
lost in the stream of other prisoners captured by will vary, but it frequently will be large enough
the tactical units. The tactical situation may not to preclude detailed interrogation of all but a se-
permit the immediate routing or "evacuation of lected few. Counterintelligence personnel will be
target personalities, but it may be possible to partly dependent on such agencies as the provost
temporarily secure the prisoner in a local jail or 'marshal, Civil Affairs (CA) units, and prisoner
prison. Counterintelligence prisoners should not of war interrogators to identify suspect persons
be permitted to come into contact or associate or persons of CI interest. In some situations, the
number of persons volunteering information to
with the other prisoners. A record of prisoners
counterintelligence personnel will be large
incarcerated temporarily must be forwarded to
enough to necessitate a preliminary screening op-
field army so that action may be taken, when the
eration to permit concentration on those of the
tactical situation permits, to interrogate and greatest potential interest or value. Most suspects
make disposition of the prisoners. Target per- are apprehended as they try to enter or leave a
sonalities often prove to be valuable sources of zone of operations. If they are in fact enemy
combat and strategic intelligence information. agents, they will have cover stories closely paral-
Action should be taken to promptly elicit all in- leling their true environments and identities. The
12-7
FM 30-17
Special Agent's success in such interrogations (2) In detailed interrogations, the Special
will be dependent primarily on his questioning Agent detects enemy agents with espionage or
skill, linguistic ability, knowledge of the area of sabotage missions.
operations and adjacent areas, and familiarity (3) The wide range of his activities permits
with the intellectual, cultural, and psychological the Special Agent to collect information of value
peculiarities of the persons encountered. to other intelligence and security agencies and
b. Types of Subjects. As the battle lines in the planners of military operations. He must be
combat change, entire segments of the population especially alert to obtain and report information
may be overrun. The local population in any area of immediate tactical value which was not
may be swelled by refugees and displaced persons gleaned from the refugee by prisoner of war in-
(persons from other lands conscripted by enemy terrogators.
forces for labor). The following categories of
e. Indicators Warranting Suspicion. Because
persons are of CI interest :
the Special Agent usually lacks positive evidence
( 1 ) Refugees and displaced persons. and obtaining confirmation of a suspect's story is
(2) Line crossers. an improbability, he must be alert during interro-
gations for indications of espionage or agent ac-
(3) Deserters from enemy units.
tivity. Indications which separately or collec-
(4) Civil prisoners and enemy prisoners of tively may give rise to the suspicion that a sub-
war. ject is in the employ of, or acting in sympathy
(5) Inmates of concentration camps. with, enemy forces are as follows :
(6) Repatriated prisoners of war and escap- (1) Access to information or targets. A
ees. prospective espionage or sabotage agent must
(7) Members of underground resistance or- have access to the information desired by the
ganizations seeking to join friendly forces. enemy or the target installation to be destroyed
(8) Collaborators with the enemy. in order to carry out his mission. Hence, the in-
terrogation should establish a subject's accessibil-
(9) Target personalities, such as black,
ity to potential targets, including his location at
gray, or white list personalities.
the time he was apprehended.
(10) Volunteer informants.
(2) Technical skills. Proficiency in certain
(11) Persons who must be questioned because
technical skills is frequently an attribute of an
they are under consideration for employment
espionage or sabotage agent. The subject who has
with US Forces or for appointment as civil
a mastery of one or several foreign languages, a
officials by CA units.
knowledge of radio operation or of cryptography
c. Other Interrogations. If the security of US should be questioned carefully on the nature and
personnel, units, installations, and military oper- purpose of his training in those fields. His practi-
ations is to be maintained, the threat posed by cal experience and his work in those fields during
the civil population must be ascertained. Rela- or shortly prior to the war should give the Spe-
tively large scale interrogations of civilians may cial Agent cause for strong suspicion, and the in-
be necessary to ferret out concealed enemy dividual's story must be closely examined. Tech-
agents. Civilians are also a source of tactical and nical advice for the interrogation of such individ-
strategic intelligence as well as counterintel- uals should be obtained from USASA elements.
ligence information. In a combat area persons are (3) Documents and funds. An overabund-
often eager to denounce neighbors or acquaint- ance of documents and "new" documents of ques-
ances for personal reasons or gain ; much of this tionable authenticity give reason for doubt and
information may be of little value. should be the basis for detailed questioning. Dis-
d. Objectives of Counterintelligence Interroga- crepancies in document's contents or conflicts be-
tions. The counterintelligence interrogation in tween data and the subject's story have fre-
combat areas assists in the accomplishment of quently led to detection of hostile agents. Unex-
three major objectives. plainable possession of large amounts of money,
(1) In the screening process, the Special valuable jewelry, or other items of great value
Agent helps remove from the battlefield the refu- should be questioned carefully.
gees whose very presence threatens overall secur- (4) Pro-enemy background. Residence or
ity. travel in enemy territory, membership in a hos-
12-8
FM 30-17
12-9
[Fí^l 3©-ï ^
In large scale screening operations, shortage of 112—12. HirtvesîDgeiîDeirDs eamid inffennall Seewüßy
time may be a critical factor. It may be advanta- Funsíiomis
geous to have the subjects fill out forms if they
There are certain unique additional problems
are able to do so. A study of the form with ques-
that may confront counterintelligence personnel
tions on any suspicious entries must follow ; how-
while conducting investigations and services in a
ever, well trained professional agents will rarely
tactical environment.
be exposed by use of this technique. If detailed in-
terrogation appears to be warranted, the subject a. Indigenous Personnel.
is isolated for evacuation or transportation to the (1) Counterintelligence elements are respon-
appropriate interrogation site. This rule applies sible for conducting security investigations of in-
not only to suspects but to persons with an abun- digenous personnel retained in their official civil-
dance of information of counterintellxgence or in- ian positions and of other civilian personnel to be
telligence interest. A copy of the screening report employed by the US Army in a theater of opera-
should accompany the subject to the next interro- tions. The scope of investigation normally will
gation site. depend on the position or job for which the per-
son is applying and the degree of sensitivity and
g. Detailed Interrogation. Detailed CI interro- access to classified defense information. AR
gations may be conducted in joint interrogation 604-5 discusses details concerning the conditions
centers (FM 30-15) or at interrogation sites es- under which indigenous employees may be
tablished by intelligence units (usually at field granted access to classified defense information.
army or higher level). Detailed interrogation The final decision on employment clearance re-
does not differ radically from the preliminary in- mains a command responsibility. Difficulty may
terrogation except that attention is now focused be often encountered by the Special Agent be-
on individuals who are suspect or who are known cause of lack of files, records, and other reposito-
to have extensive information of interest. A study ries of civilian police and other investigative
of the preliminary interrogation or screening re- agencies which have been destroyed or displaced
port, examination of the subject's documents and as a result of tactical operations. Every attempt
belongings, and checks of available files and in- must be made to check all files and records which
formation must be conducted and analyzed in may be available. Utilization of indigenous per-
preparation for the interrogation. The Special sonnel by US Forces presents a definite security
Agent then proceeds with the interrogation using threat because of enemy penetration efforts utiliz-
techniques discussed in FM 30-15. ing indigenous civilian employees who are sympa-
(1) Details of the subject's personal history thetic with, or may be coerced into serving, the
must be reviewed. Should the subject confess that enemy cause. Caution must be exercised by all
he is an enemy agent, he becomes an important using units to preclude compromise of classified
source of information on hostile intelligence information. A threat just as serious is posed by
methods of operation and, perhaps, on identities the capability of employees to collect volumes of
of other hostile agents, unless, of course, he is a unclassified information on planned movements
confusion agent. This will lead to exhaustive in- or tactical operations of US units. Any indication
terrogations on such issues as hostile intelligence, of disloyalty or other suspicious conduct on the
operations, identities of agents, the manner of his part of the indigenous employee will be reported
recruitment, training he received, missions he immediately to the intelligence officer of the com-
was assigned, and those he accomplished. mand through appropriate channels. Once a labor
(2) The suspect or any person being interro- pool of cleared indigenous personnel has been es-
gated may also be an important source of infor- tablished in the command, units normally will
mation of intelligence value, strategic or tactical. hire only from this pool. The command should
publish an SOP concerning hiring, utilization,
(3) The questioning usually should follow a
and control of indigenous personnel. Civil affairs
logical sequence to avoid confusing the subject
under the staff supervision of the Assistant Chief
and to facilitate reporting. An illogical sequence of Staff for Civil-Military Operations (G5) has
may be used as a technique to purposely confuse the responsibility for providing labor for mili-
the subject so that he will inadvertently contra- tary forces and coordinating with CI elements
dict himself. The Special Agent must be alert for concerning measures to provide necessary secur-
discrepancies. He must retain his psychological ity screening of indigenous personnel considered
advantage. for employment. Counterintelligence elements
12-1®
FM 30-17
will maintain a close working relationship with the movement itself, its purpose, implications,
CA elements and Civil-Military Operations staffs and organization. Counterintelligence personnel
at all echelons within the theater. The security may be called upon to provide advice and assist-
problem does not end with clearances. A close ance in the planning and conduct of troop move-
continuing watch or check on employees must be ments. Some of the services which may be pro-
maintained. vided by counterintelligence personnel include—
(2) Counterintelligence personnel fre- (а) Acting in an advisory capacity or as
quently must rely on qualified indigenous civil- assistants to the G2/S2 in the preparation of the
ians or members of allied forces to serve as inter- CI portion of the movement plan.
preters and translators. Properly utilized and (б) Conducting CI surveys and inspec-
controlled, indigenous interpreters have proved tions, recommending measures for maximum se-
to be of great value to CI operations. They are ca- crecy, and providing assistance in instructions to
pable of detecting dialect differences and discrep- unit personnel concerning troop movement secur-
ancies in civilian accounts of incidents or circum- ity.
stances and are frequently more discerning in in- (c) Observing the move to report and in-
terrogations dealing with local civilians and hos- vestigate security violations or other security
tile intelligence agents. They familiarity with the threats.
country in terms of regional, religious, social and
(2) Regardless of the type and mode of
political schisms, attitudes, and prejudices repre-
transportation utilized for the move, the follow-
sents skills not easily developed by counterintel-
ing security measures must be considered :
ligence personnel from a different environment.
On the other hand, these same advantages may (a) Mail censorship.
influence interpreters' work and color their re- (b) Monitoring or restriction of communi-
ports. Indigenous employees of CI elements must cation facilities.
be strictly controlled by Special Agents. Over- (c) Emphasis on security education pro-
familiarity, lack of restraint, freedom of move- grams.
ment, and independent actions on the part of the {d) Establishment of curfew hours or res-
indigenous employees are unacceptable. FM trictions.
30-15 discusses the use of interpreters and the (e) Conduct of surveillances of areas and
necessity for security clearances. facilities which military personnel frequent dur-
ing off-duty hours and where "loose talk" may be
b. Riots and Civil Disturbances. FM 19-15 out- prevalent.
lines the responsibilities of the major commander (/) Removal of identifying marks and in-
and the utilization of troops when riots and civil signia from clothing, equipment, and vehicles.
disturbances occur in territories where US troops (g) Arrangements for storage or destruc-
are stationed by agreement or consent, or in areas tion of personal diaries, letters, telegrams, and
occupied as a consequence of belligerent actions. other documents or papers.
Effective counterintelligence, however, may pre- (h) Prevention of unauthorized press re-
clude riots and disturbances. Continuous efforts leases.
by counterintelligence with close coordination (-i) Posting of security guards at loading
with the Provost Marshal and the G5 must be or embarkation areas, critical or congested areas
made to determine the probable causes of riots along the route, and off-loading or debarkation
and disturbances, locations where they may sites.
occur, types, and number of people involved, 0) Crating, covering, and guarding mate-
identities of leaders, and whether the riots or dis- rial and equipment to conceal its identity and
turbances are enemy sponsored and directed. provide protection from unauthorized access dur-
With this knowledge, the commander can take ing the move.
necessary action to eliminate potential causes of a (k) Examination of departed areas to in-
riot or civil disturbance. sure that no information of intelligence value has
been left behind which might disclose the destin-
c. Troop Movement Security.
ation, identity, and mission of the unit.
(1) Troop movement security is designed to (I) Examination of the intended destina-
prevent espionage or sabotage from interfering tion for physical security hazards when possible.
with the movement of US Forces, insure the ele- (m) Dissemination of false information
ment of surprise, and deny information regarding designed to deceive or mislead the enemy as to
12-11
FM 30-17
the actual intentions of the move, when approved 12—13. Files and Reports
by the theater commander or higher authority. Counterintelligence elements engaged in tactical
d. Special Weapons Security. operations are responsible for developing and
maintaining their own operational files. These
(1) Special weapons systems require many files will be transferred to the CI element gaining
sensitive components, as well as ancillary equip- area responsibility as tactical elements displace.
ment and supporting documents. The security,
a. Operational Files. Information concerning
classification and the sensitivity of these systems, individuals, organizations, and other subjects of
related equipment, and documents dictate the ne- CI interest is assembled and maintained by CI
cessity for strict security measures. Counterintel- elements engaged in tactical operations for the
ligence personnel assist special weapons unit purpose of furthering the investigative and se-
commanders and others with responsibility for curity mission. This information should be kept
these systems in establishing adequate security to a minimum, consistent with operational needs.
measures at special weapons sites for moves of Operational files maintained may include, but are
special weapons and munitions, and at storage not limited to—
depots. This assistance is provided in the form of (1) Personality files on individuals of cur-
CI surveys and inspections, monitoring of ship- rent or future CI interest.
ments and deliveries to sites or depots, aid in (2) Impersonal files such as dossiers on or-
conducting effective security education programs, ganizations and groups of current or future CI
and coordinating with other units (e.g., military interest.
police) responsible for providing security for (3) Correspondence and other reports con-
these systems. cerning current or pending operations and inves-
tigations.
(2) Regulations governing security require-
ments for special weapons systems provide mini- (4) Hold files containing essentially a collec-
mum security standards and criteria for safe- tion or summary of all CI operational activities
and information assembled during the period in
guarding the weapons and their components.
which the unit has operated in a particular geo-
Counterintelligence personnel involved in special graphic area.
weapons security must be familiar with these
regulations, particularly as they pertain to coun- b. Reports. Counterintelligence units and ele-
terintelligence responsibilities (see AR 50-2, AR ments involved in tactical operations will use
50-3, AR 190-60, and AR 611-15). standard reports and message forms. The basic
forms of CI reports are explained in chapter 7
(3) Special weapons systems are prime tar- and appendix B.
gets for sabotage. Counterintelligence personnel
conducting investigations of sabotage or sus- 12—14. Special Operations
pected sabotage of special weapons systems The planning and conduct of CI special opera-
should request assistance, as required, of techni- tions is included in the classified supplement to
cally qualified personnel. this manual, FM 30-17A.
12-12
FM 30-17
cussed below. These operations normally are con- apparatus, CI personnel must be thoroughly con-
ducted with other elements such as military po- versant with their methods of operation, policies,
lice (MP), combat troops, civil affairs and psy- objectives, offices and suboffices, schools, officials,
chological operations teams, and they require and known agents.
close coordination and joint planning. 3. Enemy order-of-battle (OB). Every
b. Counterintelligence Screening. Refugee and member of the CI team should know which units
prisoner of war screening by counterintelligence of the enemy his unit is facing and which units
personnel is conducted with the view to intercept- are in its area of operations. He should be aware
ing hostile intelligence agents, saboteurs, and of their disposition, strength, weaknesses, compo-
subversives trying to infiltrate friendly lines. sition, training, equipment, activities, history,
personalities, and commanders. Current OB in-
( 1 ) Coordination. Planning for these screen- formation should be maintained by the team for
ing operations is accomplished, as far as possible,
possible exploitation of prisoners of war and for
in conjunction with the following elements:
assistance to OB analysts. Counterintelligence
(a) Combat commander. The commander personnel are not OB interrogators but they must
is concerned with channelizing refugees and pris- be capable of expeditiously recognizing, detect-
oners of war through his area of operations, par- ing, exploiting and reporting tactical and OB
ticularly in the attack, to prevent any impedi- data.
ments to his unit's movement, or any adverse ef-
fect on the unit's mission. 4. Enemy-held area. CI personnel
should also become familiar with the area in
(b) Military Police (MP). MP elements
which they are operating; particularly geogra-
are responsible for the control and evacuation of
phy, landmarks, distances, and travel conditions.
prisoners of war and refugees through the differ-
Knowledge of such pertinent information as the
ent echelons.
political, social and economic traditions, customs
(c) Civil Affairs (CA). CA elements,
and racial problems of the area is essential.
under the G5, are responsible for the proper dis-
position of refugees and prisoners of war. (b) Black lists and information sheets
(d) Psychological Operations (PSYOP). listing indicators of CI interest should be distrib-
PSYOP elements, under the G5, contribute to uted to the troops, MP, or other personnel assist-
screening operations by informing the refugees ing with the screening operation. A form should
of the need for their displacement. They also as- be made up and passed out to the individuals to
sist the MP in maintaining control. be screened requiring them to record personal
(e) Civil authorities. Civil authorities are data. This form will aid in formulating the type
included in planning only if control has been re- of questions to be asked and in determining the
turned to them. informational areas needed to fulfill EEI or OIR.
The following data, plus anything else deemed
(2) Preparation.
pertinent, should be included on the form :
(a) Before any screening operation, the
CI teams involved should become intimately fa- 1. Full name, other names, date and
miliar with all available information on indica- place of birth, current and permanent residences,
tors as covered in paragraph 12-lle, as well as and current citizenship of the individual.
the following: 2. The same information as above con-
1. Regulations in the enemy area. To cerning the father, mother, and siblings, includ-
have any success, CI personnel must become fa- ing the occupation and whereabouts of each.
miliar with all restrictions placed on the civilian 3. If married, the names of spouse (in-
population within the enemy-held area, to include cluding female maiden name), date and place of
curfews, travel restrictions, rationing, draft or birth, nationality, occupation and personal data
conscription regulations, mobilization orders for on spouse's family.
civilian labor forces, required political organiza- 4. The individual's education and
tional memberships, etc. Knowledge of these reg- knowledge of languages.
ulations may help the CI screener to detect dis- 5. Details of the individual's career to
crepancies, discern changes in enemy activity, include schools, military service, technical and
and maintain control. professional qualifications, political affiliations
2. Enemy intelliegnce, political infra- and countries visited.
structure and organizations. In order to identify 6. Point of departure, destination and
agents of the enemy intelligence or infrastructure purpose.
12-13
[FÍW ZU-Ï7
(3) Initial screening. Prisoners of war and those who conduct the preliminary or screening
refugees enter prisoner of war and refugee interrogations. The PIR, therefore, should reflect
streams rearward at the forward edge of the bat- as much data as possible under these four head-
tle area (FEBA) where the troops channelize ings:
them after a search for weapons and documents. (a) Identity. Persons should be searched
(Fig 12-1 depicts the prisoner of war and refu- for possible identifying documents in the form of
gee flow.) Couriers, walking wounded, and empty ID cards, ration cards, draft cards, driver's li-
trucks or convoys traveling rearward toward the cense, auto registration, travel documents, pass-
brigade control points can be used as guards port, and the like. If a man is, or has been, a sol-
and/or transport for the prisoners of war and re- dier, his rank, service number, and unit should be
fugees. At this point MP will take custody and recorded. All this information can be checked
responsibility for the prisoners of war and refu- against the form previously filled out by the in-
gees, and initial CI screening will take place. terrogée.
This will consist of, as a minimum, interrogation (b) Background. The use of the form will
by intelligence interrogation personnel. These aid in obtaining the information required; how-
personnel will refer suspects to the CI team for ever, certain informational areas on the forms
further interrogations and possible detention. At will have to be clarified, especially if data indi-
this level, suspects are separated from the pris- cate a suspect category or the person's knowl-
oner of war and refugee streams, exploited if pos- edgeability of intelligence information.
sible, and evacuated to division by MP. Detained
(c) Recent activities. The activities of an
prisoners of war and refugees will be interro-
individual during the days prior to his detain-
gated, further exploited at division prisoner of
ment or capture should be examined. What was
war collecting points or civilian detention cen-
he doing to make a living? What connection, if
ters, and then evacuated to field army civilian de-
any, has he had with the enemy? Why was he in
tention centers or prisoner of war cages for de-
the area? This line of questioning may bring out
tailed interrogation and exploitation, if applica-
particular skills such as those associated with a
ble. Those refugees found to be innocent of any
radio operator, linguist, photographer, etc. Physi-
wrongdoing will be rerouted to the civilian as-
cal checks can be made of certain types of cal-
sembly areas. Those prisoners of war and refu-
louses, bruises, or stains to corroborate or dis-
geees not detained will follow the refugee flow to
prove his story. Sometimes soil on shoes will not
the division control points where more detailed
match that from the area he claims to have come
CI screening is conducted similar to that system
from.
at brigade. Those not detained will be collected
and routed to the field army civilian assembly (d) Journey or escape route. CI personnel
area or prisoner of war cage. should determine the route the individual took to
get to US lines or the checkpoint. The individual
(4) Conduct of screening. Since it is impos- should be further questioned closely on time, dis-
sible to interrogate everyone because of time and tance, and method of travel so that the screener
the usually large number of people to be interro- will be allowed the opportunity to quickly calcu-
gated, civilians moving about the combat area late whether or not the trip was feasible during
have to be subjected to brief inquiries on a selec- the period of time stated and with the mode of
tive basis by MI, CA, PSYOP, and MP personnel. transportation used. Discrepancies in travel time
Such brief inquiries are designed to locate and and distances can be the key to the discovery of
separate suspicious persons from the masses and an infiltrator whose cover story is very shallow.
should be thought of as a preliminary interroga- By ascertaining what an individual observed en
tion. These selected persons are detained for fur- route, the screener can either check the person's
ther CI interrogation. If the interrogée is to be story or pick up intelligence information concern-
referred to a rear echelon for the detailed inter- ing the enemy forces.
rogation, a preliminary interrogation report
(PIR) is furnished the MP who accompanies the (5) Indicators. The following indicators can
interrogée to the rear. The MP will take both the be used in an attempt to identify hostile infiltra-
detainee and the PIR to the next echelon CI team. tors.
The mechanics of this referral procedure will be (a.) Persons of military age.
a matter of operational orientation. Personnel (b) Persons traveling alone or in pairs.
who conduct the detailed interrogations at rear (c) Persons without identification.
area interrogation centers will not be the same as (d) Persons with unusual documents.
12—M
• •
$ Y
m > t.
> >
fS Ji ! %
'ft £
iV «
Division Interrogation
Team
(e) Persons possessing large amounts of or on foot, briefly selects individuals at random
money, precious metals, or gems. or systematically, e.g., every fifth person, to be
(/) Persons displaying any peculiar activ- stopped and questioned. These checkpoints could
ity. be located at various points for periods not to ex-
(g) Persons trying to avoid detection or ceed 1 day.
questioning. (b) Static checkpoints are those manned
( h) Persons using enemy MO. permanently by MP or troops at the entrance to a
(i) Persons having a pro-enemy back- brigade, town gate, river crossing, or similar stra-
ground. tegic point.
0") Persons with a suspicious story. (3) Mobile and static checkpoints are used
(k) Persons with a family in enemy by counterintelligence to :
areas. (a) Detect and prevent enemy infiltration
(0 Persons with a technical skill or spe- of espionage, sabotage, or subversive agents into
cial knowledge. the area.
(m) Persons who have collaborated. (b) Gather information of immediate in-
(n) Persons who violate regulations in telligence value, both tactical and counterintel-
enemy areas. ligence, from refugees and other persons from
(6) Other screening methods. In addition to enemy-controlled areas.
interrogation, the following methods of screening (c) Gather other information not other-
prisoners of war and refugees can be used. wise available to intelligence units.
(a) Black, grey, and white lists.
(4) The preparation needed for static and
(b) Low-level informants inserted into
mobile checkpoints is identical to other screening
the prisoner of war or refugee screens, cages, or
operations, and the indicators will remain basi-
centers.
cally the same.
(c) Sound equipment placed in suspect
holding areas or cages. d. Port and Harbor Security. Port and harbor
{d) Polygraph examinations. security normally is conducted jointly between
(e) Specialized identification equipment, the MP and MI units assigned to the logistical
e.g., metal-trace detection kit. command under which the port is operated.
Counterintelligence elements normally will con-
c. Mobile and Static Checkpoints. This type of
centrate their efforts in the following areas :
CI screening requires that counterintelligence
personnel prepare black and grey lists, indica- (1) Special operations. Those special opera-
tors, and some specialized equipment such as tions described in FM 30-17A, the classified sup-
metal detection kits to be used by screening plement to this manual, will be targeted against
teams. These teams will provide the initial the surrounding and internal areas with special
screening and will detain and refer suspects to emphasis on hostile sabotage and subversion ele-
the MI control element for detailed interrogation ments.
and possible exploitation. (2) Physical security. Normal CI procedures
( 1 ) Screening teams can be made up of com- will be established for port and harbor areas as
bat troops, military police, civil affairs, intellig- are set forth for installations, except that con-
ence interrogators, counterintelligence agents, or trols must also be established for ships and crews
any mix thereof. in port, particularly those under a foreign flag.
(2) Checkpoints are placed at strategic loca- e. Border Security. Border Security is con-
tions where there is sufficient space for assem- ducted by CI element to minimize infiltration of
bling people under guard and for parking vehi- men and supplies into the area of operations—
cles for search and investigation and are set up particularly hostile intelligence or elements
ideally as shown in figure 12-2 as either mobile which will engage in sabotage and subversive ac-
or static missions. Local security must be posted tivities against the friendly war effort. To accom-
to protect the checkpoint and a sufficient amount plish this, CI elements must determine hostile
of personnel must also be posted to the front and methods of operation to establish indicators and
rear to apprehend anyone attempting to avoid must determine infiltration and exfiltration points
the checkpoint. to successfully capture or neutralize infiltration.
(a) A mobile checkpoint can be used as a The indicators will be furnished those friendly
moving system whereby the team, either mounted elements in contact with the border areas, and to
12-16
FM 30-17
Woods
4*¿^Va > A
y .o
<p
A
n ft * Q>
■^s Y
$<§tâïH£*x Ä
£'C,f Barricade or cS O
Roadblock
•y t _■ ■
V^sí
Security elements.
12-17
FM 30-17
other MI elements. In addition the friendly mili- cators when engaged in aerial surveillance or
tary forces, to include MP and CA elements, may image interpretation missions. Information thus
utilize those indicators received from the inter- received can go into planning for neutralization
ception of radio communications when conducting and exploitation operations, or use of detection
border surveillance and making documentation powders at possible infiltration points as well as
checks at mobile and static checkpoints (c) interrogation of border area residents and travel-
above). Other MI units can make use of the indi- ers.
FM 30-17
CHAPTER 13
STABILITY OPERATIONS
Section I. INTRODUCTION
13-1
FM 30-17
Army CI elements, as part of the US Forces, will porting the host country counterintelligence and
arrive in the host country by request or invita- security services. However, with the participation
tion. Counterintelligence activities of US person- of US Forces in stability operations, the normal
nel may be limited to training, advising, and sup- CI support of these forces must be provided.
13—3. Personnel Security Operations friendly and insurgent elements among the host
country populace magnifies the problem of "loose
Personnel security investigations will be con-
talk." Loose and careless discussion of unclassi-
ducted in accordance with this manual and AR
fied military information presents an even
381-130. Security investigations of local nation-
greater problem inasmuch as the absence of a se-
als involve additional problems.
curity classification gives free license to discus-
a. Subjects may be from Communist- or insur- sion. Such unclassified bits of information in the
gent-controlled areas, within or outside the host hands of insurgents lead to ambushes, surprise
country, where investigation cannot be conducted. raids, and acts of terrorism. The security train-
Special notice must be taken of a subject's listed ing and education of troops must stress that dis-
residences to determine if they were or are in in- closure of unclassified information may be as
surgent-controlled areas. dangerously detrimental as disclosure of classi-
fied information. The indigenous employees of US
b. There may be an absence of reliable and
Forces facilitate the insurgent's acquisition of in-
current records of all types, particularly in newly
formation on our activities, both military and
emerging nations, thus reducing the effectiveness
personal.
of background investigation.
c. Measures which screen the staging, group-
c. In most instances, host country intelligence
ing, training for, and planning of military actions
and security agencies, which may be penetrated
from the observation of the insurgents and the
by the insurgents, will be responsible for investi-
population are extremely important. Troops must
gating and clearing local personnel; capabilities
be warned against patterns of conduct which re-
of local agencies will vary from excellent to non-
veal the tactical intentions of their units. They
existent.
must be reminded that the populace is the pri-
d. The volume of clearance actions on local na- mary source of intelligence information for the
tionals (military, cooks, maids, drivers, interpret- insurgents. Counterintelligence personnel must
ers, laborers) who have frequent access to US in- learn to distinguish what patterns of conduct are
stallations and the probability of limited person- used by the insurgent as indicators and rapidly
nel for conducting background investigations report these indicators to the responsible com-
may dictate the necessity for limiting the scope of mand.
investigations. Employment of local nationals is
discouraged for security reasons, and, when nec- 13—5. Physical Security
essary, should be kept to a minimum. Under these
a. The effective protection of military installa-
conditions, steps may be taken to prevent undue
tions, personnel, and activities from the threat of
risk. One step is to obtain the specific indorse-
espionage and sabotage is based on security mea-
ment of the loyalty of a subject by persons whose
sures implemented and practiced as a result of CI
loyalty and reliability have already been estab-
surveys and inspections and the physical security
lished (the "guarantor system").
surveys conducted by the MP. Counterintelligence
surveys provide recommendations on security
13—4. Security of Information
measures designed to fit specific installations, fa-
a. US Army activities involve daily contact cilities, or activities. A checklist for conducting
with host country personnel over whom US CI surveys is contained in appendix D. A check-
Forces exercise no security control. This unavoid- list for conducting physical security surveys is
able security risk must be balanced with strict se- contained in FM 19-30. In all surveys, particular
curity discipline and effective application of basic emphasis should be given to a check of :
principles of safeguarding military information.
(1) The natural topographic features exist-
b. The difficulty in distinguishing between ing at the periphery of the installation to deter-
13-2
FM 30-17
mine whether they afford direct observation into (1) Duty details for emergency conditions.
the installation, afford a concealed or covered (2) Immediate availability of adequate wea-
path of approach into the installation, or other- pons and munitions for immediate defense of the
wise adversely affect the security of the installa- installation.
tion. (3) An installation warning system to sound
(2) Organizations (political, labor, frater- the alert.
nal, social) in the area which may present a se- (4) Defense plans indicating posts for all
curity threat. members in the event of an assault, and a fire
(3) Places of entertainment (bars, restaur- plan for all weapons.
ants, night clubs) in proximity of the installation (5) Liaison with local security organizations
to determine whether there have been or may be and tactical units to provide support in case of at-
attempts to solicit information from the soldiers. tack, to include such items as a prearranged fire
support plan by artillery elements.
b. Periodic CI inspections must be conducted at
great frequency in an insurgency environment. (6) Emergency destruction plan for defense
Close attention must be given to: information and equipment.
(1) Close examination of the defensive sys- (7) Security discipline and standards of con-
tem to insure that every possible means of access duct to be observed.
or path of approach has been considered in estab- (8) Duties of security guards and patrol ar-
lishing the physical perimeter security. Particu- rangements indicating frequent changes of tim-
lar attention must be given to culverts, gulleys, ing and methods of patrolling, location of guard
and streambeds which could provide means of ac- posts, and changing of the guards. No discernible
cess to guarded areas. pattern in time or method should be established.
(2) Designation of all sensitive areas of the d. All security measures should be viewed and
installation as restricted areas and posting of undertaken with the knowledge that in stability
"off-limits" signs in both English and the local operations there is no rear area ; the enemy is on
language. Access to restricted areas by local hire all sides.
personnel such as janitors, cooks, guards, trans-
lators, and clerks should be prohibited or permit- 13—6. Populace and Resources Control
ted only when properly escorted by authorized a. A significant factor in stability operations is
personnel. It may be advisable to conduct periodic the implementation of measures to watch and
technical inspections of restricted areas to pre- control the movement channels and patterns nec-
clude or detect the presence of electronic listen- essary for support, communication, and opera-
ing devices which may be planted by opposition tions of insurgent forces. Prior to implementation
elements. Additionally, the periodic shifting of of any control measures, a public information
key installation locations, e.g., command post, program must be initiated to inform the popula-
radio room, will aid overall security. tion of the reason for the controls. Imposition of
(3) A strict visitor control system for han- excessive or unnecessary restrictions on move-
dling the constant security threat posed by the ment will result in the buildup of a strong resist-
presence of laborers, local tradesmen, and rela- ance from the people and should be avoided. To
tives of camp personnel. Security considerations the maximum extent possible, populace and re-
may dictate making the entire base area a res- sources control should be implemented and per-
tricted area into which no civilians are allowed. formed by host country agencies. This is a matter
Laborers should be closely checked and prevented of practicality, but there are also legal and psy-
from loitering near sensitive areas. chological implications. US Army counterintel-
(4) The location of sanitary fills, washing ligence specialists should participate in the plan-
areas, and other troop-associated facilities. Wher- ning stage of a populace and resources control
ever possible, such facilities should be within the program and provide advice and assistance to the
cantonment. host country.
c. A unit security SOP must be prepared at all b. Some examples of populace control tech-
echelons, and all members of the unit must be fa- niques are :
miliar with established security procedures and (1) Nation-wide registry and issuance of
practices. As a minimum, a security SOP must identification cards to all residents and supple-
provide for: mental family registration program.
13-3
FM 30-17
(2) Division of communities or areas into insurgents into a bordering country for sanctuary
blocks with appointed, trusted, and loyal resi- and also restrict materiel and manpower support
dents as block leaders to report on insurgent ac- to the insurgents. Prior to implementation of con-
tivities. trol measures, a thorough study and analysis is
(3) Use of police patrols to detect sources of made of the terrain, vegetation, and human envi-
insurgent support, insurgent sympathizers, and ronment along the border areas. Factors to consi-
routes used by insurgents. der are the activities, intents, and haunts of bor-
der residents, illegal border crossers, and smug-
(4) Establishment of checkpoints to screen
glers and the locations of natural geographic fea-
and control movement of individuals into and out
tures which are impediments to human travel.
of zones of operation or other specified areas.
(5) Employment of travel restrictions to de- e. Of primary concern to CI elements involved
tect violators and nonlocal residents; frequent in border or frontier control during stability op-
change of restrictions and travel bans at certain erations is the infiltration of hostile sabotage, es-
pionage, and subversive elements into and out of
hours of the day.
the host country. This infiltration can be by sea,
(6) A well regulated and controlled curfew land or air. These routes must be detected and
should be employed during hours of darkness to neutralized. The following EEI frequently will be
reduce terrorist and sapper attacks. standard in border or frontier control :
(7) Censorship. (1) Infiltration-point locations.
(8) Prevention of illegal political meetings (2) Exfiltration-point locations.
and rallies. (3) Methods of operation.
(9) Search operations are conducted to clear (4) Indicators of hostile infiltration/exfil-
a built-up area, search watercraft, apprehend tration.
guerrillas, and seize illegal arms, communication
means, medicines, and other items of a critical /. In planning for implementation of a border
nature. A search operation is conducted as a control operation, the following points should be
preventive measure against the accumulation of covered :
critical items by the population, the harboring of (1) Location of authorized road and rail
insurgents, and in accomplishing administrative crossing points along the frontier.
control measures previously established. (2) Establishment of frontier control points
(10) Block control (para h below). to determine identities of persons attempting to
enter or leave and to check their documents.
c. Some examples of resources control tech-
niques are: (3) Provision to apprehend anyone attempt-
ing to evade control restrictions.
(1) Control of production, storage, and dis-
tribution of foodstuffs, and protection of food- (4) Control of frontier area residents.
producing areas. (5) Provisions for interrogation and disposi-
(2) Control of the possession of arms, am- tion of apprehended suspects.
munition, demolitions, drugs, medicine, and (6) Security control of refugees and dis-
money. placed persons attempting to cross the frontier.
(3) Decreeing the possession of such chemi- (7) Liaison with border control authorities
cal combinations as arsenic sulfate and potassium of neighboring countries, if they are friendly.
chlorate, which create explosives, as illegal with-
(8) Mobile and static checkpoints.
out a special permit.
(9) Neutralization and exploitation opera-
(4) Control of certain imports, e.g., 82mm
tions.
pipe which can be converted into mortars while
permitting import of other pipes, i.e., 77mm con- (10) Travel permits.
struction pipe. (11) Documentation checks.
d. In stability operations, border or frontier (12) Imagery interpretation reports on possi-
control must be an integral part of the populace ble infiltration/exfiltration points.
and resources control program. Border control (13) Restricted zones enforced by air strikes/
measures can prevent or impede the movement of artillery fires.
13-4
FM 30-17
(14) Detection powders laid on possible infil- of the most effective and economical means of po-
tration points. pulace and resources control; however, the sys-
(15) Surveillance, to include use of illumina- tem takes considerable time to establish and, by
tion, radars, night vision devices, and ground sen- its nature, operates more effectively under civil
sors. authority than under military control.
13-5
m 3®-117
the use and deployment of sentry dogs, night vi- graphs 12-15 and 12-16 is a type of offensive CI
sion devices, anti-intrusion devices, and alarm measure.
systems to list a few, counterintelligence person- (3) Cordon and search operations.
nel qualified in the DAME, DASE, and photo-
(«.) General. In stability operations, cor-
graphic specialities can be of assistance to any
don and search operations may be employed to
MP element without this specialized training.
ferret out the insurgent infrastructure as well as
(3) Internal security measures. Counterin- individual unit elements which may use a com-
telligence must assume the greater responsibility munity or area as cover for their activities and/or
for education in the area of internal security as a support base. These operations should be
measures. SAEDA lectures in conjunction with conducted in conjunction with host country forces
MP classes on other aspects of security such as and organizations, not as unilateral US efforts.
fire prevention, arms control, and safety, will Ideally US Forces, to include CI personnel,
take up most of this aspect of physical security. should provide support and the entire operation
(4) Perimeter measures. A prime MP area, should be directed by a host country official. Host
perimeter measures consists of advice to the com- country personnel should, as a minimum, be part
mander on such things as outer perimeter patrol- of the screening and sweep elements on any cor-
ling, barriers, protective lighting, and clear zone. don and search operation.
Counterintelligence and police intelligence infor- (b) Preparation. Before conducting a com-
mant nets near and within the activity, when pro- munity or area cordon and search operation,
perly integrated, will also be needed for proper counterintelligence personnel must:
protection of the installation. 1. Coordinate with local officials to so-
(5) Control measures. This widely overlap- licit their support and cooperation in the opera-
ping area is shared by counterintelligence with tion.
the MP element, and includes such measures as 2. Coordinate with the host country area
population control in and around the activity; ve- coordination center, if established, or if not, the
hicular, personnel and package control into the host country intelligence and police organiza-
activity; and restricted areas. tions : To obtain their participation in the opera-
tion ; to update existing black and gray lists ; to
b. Offensive Measures. The primary objective
arrange to have insurgent defectors, agents, and
should be the identification and neutralization of
other knowledgeable personnel present to iden-
specific members of the insurgent infrastructure
tify insurgents and their supporters; to update
through systematic intelligence collection and
all intelligence on the community or area.
analysis with complete documentation concerning
3. Coordinate with US and host country
the activities of each individual. The ultimate ob-
CA and psychological warfare teams for enter-
jective being to allow the host country to prove
tainment and civic services.
the individual's illegal activity once he is appre-
4. Coordinate with the unit commanders
hended. This will require that CI personnel work
who will be involved in the operation for details
very closely with host country agencies. Liaison
on the conduct of the operations.
and exchange of information with the area coor-
5. Update all intelligence on the com-
dination centers, if they have been established ; or
munity or area.
with the civilian police, military and civilian in-
telligence agencies in absolutely necessary to in- (c) Conduct of the operation. The senior
sure that offensive CI measures are completely tactical unit commander will be the individual
effective. Since the host country agencies will responsible for the conduct of the operation. He
have the prime responsibility for identification will plan, with advice from CI, CA, and psychol-
and neutralization of the infrastructure, US CI ogical warfare personnel, the cordon, which is
activities should complement those of the host usually deployed at night, and the search, which
country. CI personnel should be the focal point normally begins at first light.
for exchange of information concerning the in- 1. The basic operation is the community
frastructure, between the US units and host cordon and search operation (fig 13-1). As the
country organizations. collection/screening station (fig 13-2) is set up by
the screening element, the sweep element escorts
(1) HUMINT, as discussed in FM 30-17A the residents toward the collection/screening sta-
and FM 30-31A should be used offensively. tion, leaving behind one resident to care for fam-
(2) Mobile checkpoints as discussed in para- ily belongings, if required by law. The search ele-
H 3—<2>
FM 30-17
ment follows behind the sweep element searching any immediately recognizable enemy. These in-
houses, storage areas, cemeteries, etc., with dogs formants will be provided with a means by which
and metal detection equipment, if available. Each to notify a nearby guard or a screener of the
search element should include an interrogator spotted enemy member who will be immediately
with a blacklist to screen persons left behind segregated and interrogated. At the specific
to watch family belongings. In the collection/ screening stations the residents will be asked for
screening station, the residents are brought identification, checked against blacklists,
to the collection area (or holding area) and searched for incriminating evidence or "body-
then systematically led to specific screening marks" or, if available, checked by electronic
stations. En route to the screening station, each equipment. If found suspect or guilty of enemy
individual will be searched for weapons and will activity, persons are moved on for photograph-
pass by the mayor or community leader, enemy ing, further interrogation or put in the screening
defectors or cooperating prisoners hidden from area detection point to be taken back to a base
view so that they can uncompromisingly identify area or area coordination center interrogation fa-
I
I Search Elements Sweep Elements Security Elements
13-7
FM 30-17
SVtRRPrî Í
- Additional »
Interrogation
Detention Area
Í
m
eaâÂfisAessfta Initial
<£7 Interrogation
Enemy Defectors
I
!
i
r 11
i
;
it
Post- Interrogation Area I /w, it
Et
% O
Ci I)
Included in this area is
!>
MEDCAP, Water, Food, It
Entertainment, and Resident Search and <)
PSYOPS. Collection Area
C <>
13-8
FM 30-17
cility for detailed interrogation upon completion (4) Neutralization operations, as discussed
of the operation. Innocent residents are passed in paragraph 12-10, chapter 12, is another offen-
through to the post screening area where they sive CI measure.
are provided medical assistance and other civic (5) Raids and searches.
assistance, as well as entertainment and friendly
propaganda. Any persons caught attempting to (6) Planned tactical interception (ambush).
escape or break through the cordon are immedi- (7) Traps.
ately returned to the detention area. When the
operation is terminated, all innocent individuals 13-11. Indigenous Support Personnel
are allowed to return to their homes and the
a. The language communication barrier in most
enemy suspects are removed under guard for fur-
nations with potential insurgency is a major han-
ther interrogation. All members of the commun-
dicap to CI operations. The employment of indig-
ity will be photographed for compilation of a vil-
enous personnel with English language ability
lage packet, (see FM 30-17A) which will be used
will be essential. These persons will serve not
in future operations.
only as interpreters but as intermediaries in con-
2. The second type of cordon and search tacting and developing sources of information. To
operation is very frequently referred to as the minimize the security risks involved in employ-
"soft" or area cordon and search. This operation ment of indigenous personnel, the following pre-
includes the cordoning and searching of a rather cautionary measures must be considered :
vast area, for example, a village area incorporat-
ing a number of hamlets, boroughs, towns, or vil- (1) Employment of indigenous personnel
lages which are subdivisions of a political area who are members of the host country military or
beneath county level. This type of operation re- police services.
quires a multibattalion military force to cordon (2) Quartering and messing of indigenous
off the area, a pooling of all paramilitary, police, employees within the US base area for purposes
CA and intelligence resources to conduct search of activity and movement control.
and screening, and a formidable logistical (3) Use of polygraph examination for initial
backup. This kind of operation extends over a pe- pre-employment check and periodic re-examina-
riod of days and may take as long as a week or tion.
possibly longer. It will generally appear as illus-
trated in figure 13-3. While screening and search b. In many cases, it will be difficult to find
teams systematically go from community to com- enough indigenous personnel who are proficient
munity within the area and screen all residents, in the English language. To avoid misunderstan-
military forces sweep the area outside the com- ding or misinterpretation caused by limited lan-
munities over and over again to seek out anyone guage proficiency, US counterintelligence person-
avoiding screening. As each resident is screened, nel and indigenous personnel must work as teams
counterintelligence agents will insure documents with the US personnel providing the professional
testifying tó the fact that he was screened and, if guidance and direction. Reports from indigenous
necessary, allowing him restricted travel within personnel must be closely scrutinized for reliabil-
the area. Other population and resources control ity and accuracy of content. Obscure points must
measures are used as well, and such an opportu- be questioned to insure accuracy. Sociological fac-
nity may allow the chance to issue new ID cards tors must be considered to determine the extent
and photograph all of each hamlet's residents. to which ties of blood, race, language, locality, re-
As each community screening proceeds, individu- ligion, or tradition may affect the substance of
als who were designated for further interroga- translated information.
tion are sent to an interrogation center set up at
a centralized point in the cordoned area where CI 13—12. Pattern Analysis
personnel will work with intelligence interroga- A discussion on methods of pattern analysis on
tion personnel, both US and indigenous, and with insurgent groups is contained in FM 30-17A, the
police and other security service interrogators. classified supplement to this manual.
Besides field files and other expedient facilities,
located at the interrogation center is a quick
13—13. Records and Files
reaction force ready to react immediately to intel-
ligence developed during the interrogations and a. Principal sources of information for counter-
from informants planted among detainees. intelligence personnel in stability operations are
13-9
FM 30-17
-o
LEGEND
13-110
FM 30-17
the documents and records maintained by the (5) Political and Religious Sources. Political
host government offices and civilian organiza- organizations and religious sects, particularly in
tions. One of the initial tasks of counterintel- newly developing countries, will often operate in-
ligence personnel in an insurgency area is locat- telligence networks for their benefit. At times, a
ing, gaining access to, and establishing continu- third country, such as the US, may be allowed ac-
ing access to the documentary sources available. cess to information from these networks. Such in-
Generally, the records maintained in the newly formation, particularly on the insurgent, may be
emerging countries are more limited and much very accurate, but it must always be viewed as
less reliable than those in longer-established na- suspect since that organization may slant the in-
tions. formation for its furtherment.
b. Some of the more important types of records (6) Miscellaneous organizational records.
pertinent to CI operations are : Membership lists may be available.
(1) Police and security agency records. c. Efficient and effective CI operations require
Counterintelligence personnel must become thor- the establishment and maintenance of a complete
oughly familiar with the local records systems to system of files and records on all known or sus-
insure that all pertinent files are checked in each pected sympathizers of the insurgency movement.
instance. Variant spellings of local names must be cross-
referenced.
(2) Intelligence agency records. In many
newly emerging nations, intelligence capabilities
and operations are limited or confined to activi- 13—14. Use of Standard Procedures and
ties which are primarily political in nature. Utili- Techniques
zation of US intelligence personne^ with fluency Experience indicates that the procedures and
in the local language and having ^related ethnic techniques outlined in this manual are generally
background is highly desirable. effective in all types of situations and environ-
ments when used appropriately and with common
(3) Residence or family records. Normally
sense. Every attempt must be made to use these
these records are maintained by local police sta-
procedures and techniques, adapting or modify-
tions.
ing them when the situation so demands. Con-
(4) Immigration and travel records. Such versely, the development of new techniques
records may be incomplete, but they are of value should be reported expeditiously (para 1-le) to
to CI operations. permit appropriate expansion of doctrine.
13-11
#
#
FM 30-17
CHAPTER 14
INTERRELATIONSHIPS
Section I. INTRODUCTION
14-1
FM 30-17
14-2
FM 30-17
14—10. General with the impact of organized crime on the war ef-
fort as well as the ties top criminals might have
Counterintelligence and MP units have many par-
with local political leaders, political parties, labor
allel functions and responsibilities which, in some
unions, legitimate businesses, and governmental
cases, may overlap; therefore, close coordination
is essential for both units to be fully effective. agencies.
c. Sabotage. Terrorism through sabotage is a
14—11. Specific criminal act as well as a coordinated enemy ef-
fort.
Counterintelligence and MP units have mutual
interest in the following areas ; primary responsi- d. Refugee Screening. Military Police have con-
bility may be vested in either unit. trol and evacuation responsibilities and can, with
the assistance of furnished indicators, assist CI
a. Intelligence. Military Police develop police
in spotting hostile intelligence, agents, saboteurs,
intelligence based on criminal and operational in-
subversives, and other dissident groups using the
telligence. Criminal intelligence pertains to indi-
refugee and prisoner of war streams as a cover.
viduals and organized crime activities while oper-
ational intelligence pertains to security and other e. Rear Area Security. Both MP and CI ele-
MP activities. Both CI and MP units frequently ments can develop offensive and defensive mea-
will develop information of mutual interest sures in the ASCOM and TASCOM areas of the
which should be shared at the lowest practical US Forces to deny the enemy information and
level consistent with command policy on coordi- materiel for hostile actions.
nation. /. Harbor Security. Military Police elements
b. Subversion. Military Police are concerned can either organize or conduct patrols, security
14-3
FM 30-17
surveys, or surveillance of suspected criminal police intelligence and practice mob, riot, and
groups in harbor areas. crime control measures during civil disturbances.
g. Circulation Control. Military Police can de- k. Others. Many other areas exist, which would
vise registration and identification systems for require coordination between MP and CI ele-
the populace, set curfews, establish checkpoints, ments, such as espionage incident to the investi-
devise a pass system, and collect and analyze the gation of a crime, raids, or cordons and searches
modus operandi for criminal and hostile elements conducted jointly by MP and CI for various pur-
within the area of operation. poses; and mobile and static checkpoints manned
jointly for either MP control purposes or CI spot
h. Physical Security. Miliary Police set up
checks for infiltrators.
physical security measures including but not lim-
ited to the following: barriers, sentry dogs,
alarm and anti-intrusion systems, guards, res- 14—12. Reciprocal Intelligence
tricted areas, and perimeter lighting of key in- The areas above indicate the extreme need for re-
stallations. ciprocal intelligence and close coordination be-
tween MP and CI elements. For instance, the MP
i. Border Security. Military Police are respon-
need intelligence on impending or actual refugee
sible for setting up anti-infiltration methods de-
movements. This reciprocal intelligence can be
signed to keep the border secure from infiltration
obtained formally through staff elements or on a
by enemy, neutral, and criminal elements.
liaison type basis between operations officers or
j. Civil Disturbances. Miliary Police develop liaison personnel.
14-4
FM 30-17
b. Other MI elements can also assist CI ele- (3) Technical Intelligence (TI). TI person-
ments in fulfilling their mission : nel can keep the CI element advised on changes
in equipment and equipment capabilities.
(1) Imagery Interpretation (II). II elements
can interpret imagery designed to confirm a (4) Signal Intelligence (SIGINT). SIGINT
source's information or furnish imagery designed assists the CI effort by deriving information from
for briefings and debriefings of sources. the intercept, direction finding, and analysis of
enemy communications, including clandestine
(2) Order of Battle (OB). OB personnel can transmissions. Details on SIGINT support to CI
keep the CI element updated on changing unit operations are contained in FM 32-1 (to be pub-
designations, compositions, and dispositions. , lished).
14-5
FM 30-17
APPENDIX A
REFERENCES
A—1
FM 30-17
A-2
FM 30-17
A—3
FM 30-17
APPENDIX B
INVESTIGATIVE REPORTS
Section I. GENERAL
B-1. Introduction these reports are general enough so that very lit-
The basic format for Agent Reports, Reports of tle deviation therefrom would be necessary in the
Investigation and Summaries of Information will field unless unusual situations exist. Since all re-
be completed as described in the appropriate sec-
tions of this appendix and chapter 7. Figures are ports presented herein are standardized, a report
used to show graphically how each type of report prepared by a Special Agent in one part of the
is to be completed. world will be understood by a Special Agent in
B-2. Application another part of the world if all rules are fol-
The purpose, use and rules of preparation of lowed.
B-1
FM 30-17
AGENT REPORT
(AR iH-130! FM 30-17)
1. NAME OF SUEJECT OR TITLE OF INCIDENT 3. DATE SUBMITTED
DOAKES, John Q. 14 December 1971
MSG, 458-58-5821 3. CONTROL SYMBOL OR FILE NUMBER
AKA: GREEN, Anthony G. 458-58-5821
DPOB: 18 March 1923, Richmond, Virginia
4. «POIT or FINDINGS
(2 Line Spaces)
(START ON THIS LINE) This line is started on the third line from the
above black line. Indent five spaces from left margin to type phase designa-
tion. Keep left margin no more than one letter space from left margin. Leave
right margin a minimum of 3/4". This leaves enough space to enter the word
LEAD, if applicable. (LEAD)
(1 Line Space)
When there is more than one paragraph in the report, double-space between
paragraphs. Exhibits will be shown in the body of the report as (EXHIBIT ).
The number is omitted by t^e">Çpecial Agent in the field, and a Roman numeral will
be entered by the Control ice.
(1 Line Space)
(HEARSAY INFORMATION) nomally contained in a separate paragraph of the
report.
/ Line Spaces)
AGENT'S NOTES: Indent five spaces^^(l| begin two spaces below the body of
the report.
(5 Line Spa
(SECOND AGENT REPORT ON SAME PAGE) When more tlian one Agent Report appears
on the same page, five spaces will separate the reports.
(2 Line Spaces)
(continued) if necessary
DA ' 341 REPLACES WD AGO FORM 341. 1 JUN 47. WHICH MAY H USED.
occupation, and address. Elements of a proper United States of America (US) and the Union of
name which cannot be determined from source or Soviet Socialist Republics (USSR) will not be ab-
from telephone books, directories, and similar breviated.
references will be indicated by: "fnu" (first name h. Abbreviations. Abbreviations should be kept
unknown) in lieu of the given name, "NMN" for to a minimum. Standard military abbreviations,
No Middle Name, "10" for Initial Only, and as outlined in AR 310-50, or standard civilian ab-
"LNU" (Last Name Unknown) in lieu of the sur- breviations as given by a "desk" or "collegiate"
name. Names will be written in accordance with dictionary may be used in an address or as a
the custom of the country of which the person is means of identity; e.g., CPT for Captain (no pe-
native. (For example, some oriental names are riod is used) or Dr. for doctor (a period is used).
written with the surname first.) When brevity is appropriate, the title should be
(3) Once a person has been identified fully, spelled out when used the first time in the report
as indicated above, he or she will be referred to and the abbreviation or short title placed in par-
thereafter only by surname (without any titles entheses directly after it; thereafter, throughout
such as Mr., Mrs., Dr., or Professor), unless the report the abbreviation or a short title may
there is more than one person with the same sur- be used without parentheses ; e.g., Johns Hopkins
name mentioned in the same Agent Report. University (JHU), and later only JHU.
c. Numbers. Numbers from one to ten, inclu- i. Standard Capitalization. The initial letters of
sive, except in dates, addresses, or military unit proper nouns should be capatalized, such as
designations, will be spelled out. All other num- James H. Brown, Captain, Infantry, 01925940,
bers will be written in arabic numerals. In the Commanding Officer ; William F. Jones, Professor
case of money, numerals will be used regardless of English; Howard Snow, Vice-President, the
of the amount. Rather than writing $10.00, write University of Missouri; SUBJECT joined the
$10. Progressive Party; SUBJECT studied English,
d. Time. The military form will be used (e.g., French, political science, history, and philoso-
1605 hours). phy; HE moved to the West Coast; in the Sum-
mer of 1959, HE entered the US Army, but HE
e. Dates. The military form will be used (e.g., received a discharge in the Fall of 1959.
26 January 1967). The names of months will be
spelled out in full. Significant conflicts in dates j. Units of Measure. Units of measure used in
will be resolved by investigation before cases are reports will be those given by the source. An ap-
considered complete. Unexplained overlap in proximation of conversion of the indicated mea-
dates sometimes occurs when persons completing sures stated in terms of the United States system
personal history statements and persons main- of weights and measures will follow in par-
taining employment, education, and similar rec- entheses. Whenever measurements must be made
ords, fail to show part-time employment, part- or estimated by the Special Agent, they will be
time attendance at educational institutions, stated in terms of the United States system of
breaks in employment, residences, etc. weights and measures.
/. Addresses. Addresses will be as complete as k. Titles and Foreign Terms. In titles of publi-
possible and written in the manner in which they cations, ships and plays, capitalize the first and
are written in the United States. The names of all words except articles, prepositions and con-
cities, towns, counties, or other political subdivi- junctions. Foreign terms normally should be
sions less than a state, will be written out in full. avoided; however, if used, they should have the
In foreign countries the use of UTM coordinates English translation placed within parentheses
for cities, towns, or other locations is encouraged following the first usage ; e.g., Arbeitsamt (Labor
when necessary for positive identification. Repeti- Office). When printed, foreign words and
tious or unnecessary use of coordinates shoùld be phrases, titles of books, plays, magazine names,
avoided. newspaper names, and names of ships are itali-
cized, but when typewritten, they are underlined.
g. States and Countries. The name of a state
will be spelled out when it first appears in a re- I. Reporting Interviews. Statements made by
interviewees normally will be reported in sub-
port. Subsequently, the state may be abbreviated
if it is used as part of an address, except that a stance.
state name with five letters or less will not be ab- m. Quotations. Quotations present exceptions to
breviated. The names of countries other than the the foregoing items. Whenever a verbatim quota-
B-3
FM 30-17
tion is placed in a report, it will be written ex- items being tabulated. Use open punctuation ; i.e.,
actly as it was stated by source except that SUB- no end punctuation should be used in any tabula-
JECT'S last name or a substitute which refers to tions. The left-hand column of items should be in-
SUB JECT will be in upper case letters. When dented five spaces from the left margin. If any
taken from a document, the quotation will be cop- tabulated item in this column requires more than
ied exactly, including misspellings or grammati- one line, the additional line or lines are indented
cal errors which will be called to the reader's at- three additional letter spaces within the column.
tention by the use of the Latin word "sic," mean- The right-hand column of items should be typed
ing "thus," immediately after the error. two spaces to the right of the longest item in the
left-hand column. Any item in this column which
n. Hearsay Statements and Opinions. State-
requires more than one line will be typed without
ments of this nature should be used primarily as
additional indentation. Subparagraph numbers or
the basis for further investigation, and if rele-
letters are not used with the items being tabu-
vant and material to the issue, should be con-
lated (fig B-2).
firmed or disproved if possible.
o. Physical Descriptions. When it is necessary B-4. Format
to physically describe individuals mentioned in DA Form 341, the Agent Report form, has been
Agent Reports, a complete physical picture of the designed to facilitate recording the results of in-
individual should be presented (FM 19-20). Be- vestigative activity in a uniform, well-organized
cause the information and characteristics for complete fashion.
identifving persons lends itself well to tabulation,
a. Block No. 1, Title Block. The title block for
the following format may be used:
an Agent Report is always the same as the title
Name: block of the pertinent request for investigation
Age: except that any aliases or other essential data de-
veloped as a result of the investigation also will
Sex: be inserted. All cases which are closely related
Race: should bear cross-references. Such cross-refer-
Height : ences are entered in Agent Reports as prescribed
by local procedures. Leads or other information
Weight:
reported in an Agent Report do not affect the
Build : title block. If a Special Agent originates an
Other specific information or physical character- Agent Report in cases where there is no pertinent
istics may be woven into this sequence or added Lead Sheet or other request for investigation, an
to the sequence when data is available. In addi- appropriate subject or title will be inserted. The
tion if an Identikit was used, the montage codes subject block of the Agent Report will be pre-
can be tabulated to permit any other agency to pared as follows :
reassemble the composite likeness of the subject. (1) Persons. Subject blocks will contain in
All the montages used in the composite must be columnar arrangement: SUBJECT'S name, rank
listed. Offices not having an Identikit may be and social security number (SSN), any other
able, through liaison, to have another investiga- names (i.e., aliases, pen names, etc.), and date
tive or intelligence agency to reassemble the com- and place of birth (all on one line) as in the fol-
posite. lowing examples :
p. Tabulated Material. Although Agent Re- (a) BURNS, John E.
ports normally are written in narrative style, LTC, 561-54-6706
there are times when material can best be pre- AKA: Green, Anthony T.
sented in tabulated form. Descriptions, certain DPOB : 25 December 1925, Athens,
records checks, and lists of persons and ad- Ohio
(5) JONES, Mary Ann
dresses, for example, may be tabulated to the ad-
NEE : Williams
vantage of both writer and reader. All 201-file
SSN : 212-40-2306
checks and birth records checks should be re-
DPOB : 10 September 1945, Reno, Ne-
ported in tabulated form. Tabulated material will
vada
be presented in the following manner: One line
space will be provided between the body of the Open punctuation is used in the subject block.
report and the tabulation, but none between the (2) Organizations. In the investigation of or-
B-4
FM 30-17
AGENT REPORT
(AR 381-130: FM 30-17)
1. NAME OF SUBJECT OR TITLE Of INCIDENT 2. DATE SUBMITTED
DOAKES, John A. 14 December 1971
MSG, 458-58-5821 3. CONTROL SYMBOL OR FILE NUMBER
AKA: GREEN, Anthony G. 458-58-5821
DPOB: 18 March 1923, Richmond, Virginia
4. REPORT OF FINDINGS
(LISTED CHARACTER REFERENCE)*
(DEVELOPED CHARACTER REFERENCE)*
b. INTERVIEWEE
c. OCCUPATION
d. RESIDENCE
g. Length of Acquaintance.
h. Type of Contact
1. Degree of Association M
j. Last Seen
1. Marital Status
m. Residences L
n. Education
o. Employment E
t. Political Proclivities
(continued)
DA sr.. 341 REPLACES WD AGO FORM 341, 1 JUN 47. WHICH MAY SE USED.
AGENT REPORT: (LCR) RE: Subject's name; DPOB; Date of Report, (Names
of Interviewee(s))
4. REPORT OF FINDINGS:
u. Organizations
v. Foreign Travel
x. Loyalty
z. Throw Offs
S
aa. Remarks
(\
ganizations, the subject block will contain the lead, it is recommended that the following items
name and, if applicable, the address of the organ- of identity be included at least once in the body of
ization. The name will be written entirely in the report:
upper case letters and may be followed by an ab- (a) Full title in English alphabet charac-
breviation or short title to be used in the report ters and in native writing (for non-Latin names
as a substitute for the organization's name. Care only).
should be taken to insure that the abbreviation or (ft) English translation (for all foreign
short title chosen is not ambiguous or misleading. languages) and short title, when appropriate.
When a foreign organization is the subject of an (c) Former name or names (when defi-
investigation, or when it appears as a possible nitely known).
B—6
FM 30-17
(d) Address (headquarters, branch, or graphs of classified reports will be marked in ac-
office, as applicable). cordance with AR 380-5. Numbering of reports
(e) Nationality, when needed for better normally will be done by the office preparing the
understanding. Report of Investigation (fig B-3).
(3) Incident. The investigation of an inci- (2) Phase designation. In background inves-
dent is a specialized type of investigation. The in- tigations, the first item in the first paragraph of
cident case title should answer three questions in the Agent Report will be the designation of the
the following order: what, where, and when. In phase of the investigation most applicable to that
incident cases, normal capitalization will be used report. Normally, the Agent Report is the writ-
for each word except that prepositions, articles, ten result of a single investigative activity; that
and conjunctions, when not the first word of a is, one report will be devoted to each source of in-
title, will not be capitalized. Although incident formation. Occasionally, reports concerning
cases eventually may involve known persons, or sources that satisfy the same investigative phase
perpetrators may be revealed, the initial title of may be included on the same form. For example,
an incident case should not be changed. This does a verification of education by records check and
not preclude opening a separate case with a new an interview with a former teacher or classmate
individual title on a person mentioned in an inci- —both activities conducted by the same agent at
dent case if the new case concerns activity not a the same school—may be included on the same
part of the incident case. form since both concerned the education phase.
Where more than one such report appears on a
b. Block No. 2, Date Submitted. The date the
page, five spaces will separate the reports, and
report is prepared by the Special Agent is en-
each will begin with the phase designation. There
tered in normal military style without abbrevia-
is an exception to the requirement that one Agent
tions.
Report will be a record of a single investigative
c. Block No. 3, Control Symbol or File Number. activity ; when interviews of several persons
This space will contain the file or dossier number (again satisfying the same investigative phase)
of the investigation as prescribed by AR 381-45 concerning the same individual or the same inci-
and assigned by the Control Office. dent produce substantially the same favorable in-
formation, these interviews may be combined into
d. Block No. U, Report of Findings.
one Agent Report. Each interviewee must be com-
(1) Format. The report will start on the pletely identified, and the duration and extent of
third line space from the black line at the top of his knowledge of SUBJECT or of the incident
block No. 4, thus leaving two blank lines at the must be stated. However, when adverse, deroga-
top of block No. 4. Also, when the report is too tory, or conflicting information is obtained, each
long to be contained on a single page, two blank report will be recorded on a separate report form.
lines must be left at the bottom of the page, and The first paragraph of each report will begin
additional DA Forms 341 may be used or plain with the phase designation in upper case letters
bond paper 8 x 10 1/2 can be used as illustrated enclosed in parentheses. Generally, the phase des-
in figure B-2. A margin of no more than one let- ignation covers that part of SUBJECT'S life of
ter space from the vertical black line on the left which the source has most knowledge. Following
side of the page and a minimum 3/4-inch margin are some of the standard phase designation head-
from the black line on the right side of the page ings:
will be maintained at all times. The first line of a
(NATIONAL AGENCY)
paragraph should be indented five spaces from
(NATIONAL AGENCIES)
the left margin; a double space is left between (LOCAL AGENCY)
paragraphs. Proper paragraphing and spacing (LOCAL AGENCIES)
are illustrated in sample reports included as fig- (MILITARY SERVICE)
ures to this appendix. The blocks Nos. 1, 2, 3, 5, (MEDICAL RECORDS)
and 6 will be completed in full on all pages if DA (201-FILE CHECK)
Form 341 is used. If bond paper is used, the ex- (CIVILIAN PERSONNEL RECORDS)
ample as shown in figure B-2 is mandatory. A (CITIZENSHIP)
system for numbering of pages may be prescribed (BIRTH)
(LISTED CREDIT REFERENCE)
in the unit SOP. Unless otherwise instructed, (DEVELOPED CREDIT REFERENCE)
Special Agent will not number Agent Reports or (LISTED CHARACTER REFERENCE)
the paragraphs of the report; however, para- (DEVELOPED CHARACTER REFERENCE)
B—7
FM 30-17
AGENT REPORT
(AR 381-130; FM 30-17)
I. NAME OF SUBJECT OR TULE OF INCIDENT 2. DATE SUBMITTED
GREER, John A. II 15 January 1971
DAC, Adm Asst, GS-12; Gl, SSAN: 063-36-2179 3. CONTROL SYMBOL OR FILE NUMBER
DPOB: 7 May 1924, Bayside, New York 063-36-2179
4. REPORT OF FINDINGS
(EDUCATION) On 14 January 1964, the following, persons were Interviewed,
separately, concerning John A. GREER II, at the College of Business, Middle State
University, 2460 Hyde Park Boulevard, Chicago, Illinois, and they furnished sub-
stantially the same information:
James J. Collins, Assistant Professor, 319 Edward Street, Chicago, who knew
SUBJECT from 1946 to 1950 as a classmate.
Henry C. Adams, Admijaistrator, 217 Oakdale Avenue, Chicago, who knew SUBJECT
as a classmate from 194(/tCT 1950.
Sources had no social corftàat with SUBJECT and were only associated with HIM
in an educational capacity, vheyxiave neither seen nor corresponded with GREER
since the Summer of 1951 when they met at. a class reunion on the university campus.
SUBJECT was an exceptional studenn/and received an award in HIS senior year for
wr
iting an article on "cost-plus" construction. HE was well liked by students and
faculty. HE belonged to no organization. Whibe at college, HE held a part-time
job with a construction firm in Chicago. Adnitironal information concerning HIS
employment is not known. I
SUBJECT'S closest associate while at school Was Harry L. Waldrop, 4433 West
Alameda Parkway, Des Moines, Iowa, who was an accounting major with whom HE did
much of HIS research at the university. HE was alca closely associated with
Barbara M. Koncher, 320 South Beach Street, Atlanta, Georgia, a member of the Chi
Alpha sorority, whom HE dated frequently. (LEAD)
(continued)
S. TYPED NAME AND ORGANIZATION OF SPECIAL AGENT 6. SIGNATURE OF SPECIAL AGENT
JOSEPH S. ANDERS, 113th MI Group /s/ Joseph S. Anders
DA -„341 REPLACES WD AGO FORM 341, I JUN 47. WHICH MAY BE USED.
AGENT REPORT: (EDUCATION) RE: GREER, John A. II, DPOB: 7 May 1924,
Bayside, New York, dated 15 January 1964 (Interviewees: Collins, Adams,
Williford).
Figure B-3.—Continued.
B-9
FM 30-17
The Special Agent will occasionally have need for tion of record ; office or other location ; name and
phase titles to fit particular situations such as position of the person who sought the record or
(NEIGHBORHOOD CHECK), (SURVEIL- made it available (Special Agent must indicate
LANCE), or (SUBJECT INTERVIEW). To fa- whether he personally examined the record or if
cilitate review the agent may have need of multi- the information was orally furnished to him),
ple phase titles, such as (BIRTH—EDUCA- full identity of the record; i.e., volume, title,
TION), (EMPLOYMENT—DEVELOPMENT page, date, or similar appropriate information
CHARACTER REFERENCE), or (EMPLOY- when available (fig B-4).
MENT COWORKER). 5. Raids, searches and seizures. The date
(3) The body of the Agent Report. Here is of the activity; identity of persons and/or units
recorded the information obtained by investiga- conducting such activity; and authority for such
tive effort. The Special Agent must organize the activity. In searches or seizures, the name of the
facts and present the information in a clear and witnessing officer (usually the individual's com-
logical manner, insuring that the information is manding officer or his designated representative)
accurate, complete, pertinent, clearly phrased, will be included.
unbiased, and concise. 6. Attempt. Phase designation; date of
(a) Introductory element. The first sen- attempt; identity of intended interviewee or re-
tence or paragraph of each Agent Report is cord (as above) ; identity of person(s) spoken to;
known as the introductory element. The introduc- reason why intended interviewee or record was
tory element must contain, as appropriate, the not available; and any possible leads. The expla-
complete identities of the individuals interviewed, nation should clearly indicate that all possibili-
the custodians of files checked, the records them- ties to locate the intended source of information
selves, official and home addresses, and accurate were exhausted (fig B-5, B-6).
locations of files checked. A secondary purpose of 7. Confidential source. Confidential
the introductory element is to permit the retrac- sources who have been coded for security pur-
ing of any previous investigative effort at a later poses will not be identified nor will information
date should it be necessary. An introductory ele- or phraseology tending to identify, pinpoint, or
ment will include specific items of information compromise them appear in investigative reports.
arranged in the following manner : Confidential sources will be referred to only by
1. Interviews (background investiga- their designated code or symbol, e.g., source
tions). The phase designation; date of interview; R-S-17. The source of the information will be
identity of interviewee (to include full name, oc- mentioned only once in the Agent Report and
cupation, complete address, SSN, and, in the case that will be in the introductory element. To assist
of military personnel, full name, grade, branch of in the evaluation and adjudication processes, the
service for officers, SSN, position or job title, and Special Agent will indicate by word picture the
complete official address) ; and place of interview degree of reliability of the source when submit-
if other than address listed. The period of knowl- ting information derived from them. Where the
edge, and the relationship of the interviewee to word picture proves inadequate in determining
SUBJECT will be stated briefly. reliability, additional clarifying comments may
2. Interviews (incident investigations). be made in the introductory element or in Agent's
Date of interview; complete identity of source; Notes. The word picture, which may be used only
place of interview; and, if applicable, the reason for coded confidential sources, may be as outlined
for interview. below though not necessarily confined to these
3. Surveillance. The date, duration, type, examples :
name of subject of surveillance (if other than (a) Source, who has furnished reli-
SUBJECT, and all possible identifying data con- able information in the past . . .
cerning the person or persons under surveil- (b) Source, who has furnished infor-
lance) ; place; and identity of person or persons mation corroborated in part or in whole by other
conducting the surveillance. If the situation ne- sources . . .
cessitates protection of the identity of the person (c) Source, whose reliability is un-
or persons other than Special Agents conducting known, but who has been an acquaintance of
the surveillance, a coded reference will be pre- SUBJECT for the past 5 years . . .
scribed. (b) Information obtained. Following the
i. Record checks. Phase designation (in introductory element, a new paragraph will con-
background investigations); date of check; loca- tain the information obtained by the investigative
B—10
FM 30-1/
AGENT REPORT
(AR 381-130; FM 30-17)
1. NAME OF SUBJECT OS TITLE OF INCIDENT 3. DATE SUBMITTED
DOAKES, John A. 15 December 1970
MSG, 458-58-5821 3. CONTROL SYMBOL OR FILE NUMBER
DPOB: 18 March 1923, Richmond, Virginia 458-58-5821
4. REPORT OF FINDINGS
/\
JAr341 DEPLACES WD AGO FORM 341, I JUN 47. WHICH MAY BE USED.
AGENT REPORT
(AR 331-130; FM 30-17)
1. NAME OF SUBJECT OR TITLE OF INCIDENT 2. DATE SUBMITTED
DOAKES, John A. 14 December 1970
MSG, 458-58-5821 3. CONTROL SYMBOL OR FILE NUMBER
DPOB: 18 March 1923, Richmond, Virginia 458-58-5821
4. REPORT OF FINDINGS
S
A
AGENT REPORT
(AR 381-130; FM 30-17)
1. NAME OF SUBJECT OR HUE OF INCIDENT 2. DATE SUBMITTED
DOAKES, John A. 14 December 1970
MSG, 458-58-5821 3. CONTROL SYMBOL OR FILE NUMBER
DPOB: 18 March 1923, Richmond, Virginia 458-58-5821
4. REPORT OF FINDINGS
EL
DA.'»?» 341
efforts of the Special Agent. In the case of per- derogatory information is furnished in the course
sonnel security investigation (SPI) interviews, a of an interview, pertinent and relevant state-
definite and logical pattern should be followed. ments made by interviewees should be quoted
1. Relationship paragraph. The report verbatim, or as near verbatim as possible. In all
of interview should begin with a complete and such cases, after obtaining all available informa-
thorough treatment of the relationship between tion, the Special Agent should ask the inter-
the interviewee and the subject. This information viewee whether he is willing to—
may be contained in a separate paragraph re- (a) Submit a sworn statement.
ferred to as the "relationship paragraph." More (b) Have his information made
specifically, under what circumstances, to what known to the subject.
extent, and exactly when the interviewee knew (c) Be identified to the subject as the
the subject. A simple but effective way to begin a source of the information.
relationship paragraph would be, "Source first (d) Appear before a proceeding in
met ABLE in April 1958 . . ." Then complete the open or closed session.
relationship paragraph concisely with appro- Interviewee's answers to the above questions will
priate factual statements pertaining only to the be included in the narrative report of interview.
nature, degree, and duration of the association A sworn statement will be obtained if possible
between Source and ABLE, and conclude with a and attached as an exhibit to the Agent Report.
concise statement as to when Source last saw In those cases where the answers to any of the
ABLE or communicated with HIM. The purpose above questions are negative, an attempt should
of a good relationship paragraph is to permit the be made to determine and record the reason for
reader to form an opinion as to the general relia- refusal. When the source who has given deroga-
bility of the information which should follow. tory information about the subject requests anon-
2. Background information. In most PSI ymity, the investigative effort must be extended
interviews, background information pertinent to to further develop such information and to safe-
the subject is obtained. This may be placed in a guard the identity of the source. A key sheet, DA
paragraph immediately following the relation- Form 2357-R (fig B-7) which will be locally re-
ship paragraph. Background information should produced on 8- x 10 1/2-inch paper, will be pre-
be reported chronologically. This background pared and forwarded as a separate element of the
data may verify or give basis to doubt informa- investigative file; access to it will be limited to
tion reported by the subject on his statement of adjudicating authorities and review boards or
personal history. A discrepancy between state- panels. The source will be referred to by code in
ments of source and SUBJECT will require addi- the Agent Report. Should the interviewee provide
tional investigative effort. Confinement of this hearsay information or rumors, the original
type of information to a separate paragraph per- source of which cannot be determined or to which
mits the Special Agent to devote the remainder of confirming or refuting leads cannot be developed,
the report to a full treatment of the information a separate paragraph, clearly labeled as hearsay,
regarding loyalty, integrity, discretion, morals, will be included in the Agent Report. The para-
and character with which the BI is primarily graph will be started with the words (HEAR-
concerned. More than one paragraph pertaining SAY INFORMATION) in upper case letters and
to background information may be needed in cer- inclosed in parentheses.
tain cases. Recommendation paragraph. The last
3. Narrative report of interview. Com- paragraph of background investigation interview
plete reporting is achieved only by a thorough ex- reports will contain the interviewee's recommen-
pository treatment of the subject's loyalty, integ- dation concerning the advisability of appointing
rity, discretion, morals, and character, in addi- the subject to a position of trust and responsibil-
tion to a routine chronology of personal history. ity with the US Army. The Special Agent should
The element of loyalty will be stressed in all make every effort to obtain a definite positive or
background investigations and, where applicable, negative recommendation from the interviewee
in complaint investigations. Subject's financial and avoid qualifying remarks. If interviewee dec-
responsibility, emotional stability, and social hab- lines to give any recommendation, his reasons
its should also be determined. Questions concern- will be a part of the last paragraph as will any
ing religious, racial, or political matters should restriction he places on the use of his information
not be raised unless absolutely necessary and per- and his willingness to testify at board hearings.
tinent to the purpose of the investigation. When In certain cases when the subject has demon-
FM 30-17
CLASSIFICATION
KEY SHEET
(AR 331-131)
1. SUBJECT a. DATE OF BIRTH b. PLACE OF BIRTH
CODE
5. NAME OF SOURCE 6. POSITION OF SOURCE IN RELATION.
SHIP TO SUBJECT
8. REASON FOR CODING (Check one and add further explanation if necessary)
Divulging the identity of Source will have an adverse effect on
£U national security (Confidential Source).
strated his unreliability (e.g., AWOL and defec- the concluding paragraph of the report. Agent's
tors) a recommendation is not required from in- notes are used to aid the reviewing officers in
terviewees. Instead, a statement will be included their study and evaluation of the information re-
to the effect that source will notify proper military ported and to draw attention to pertinent discrep-
authorities should additional pertinent informa- ancies. Agent's notes should contain only com-
tion arise. ments and opinions of the Special Agent; all in-
(4) Agent's notes. Agent's notes are an ad- formation obtained by investigation must be
dendum to the Agent Report and are placed after stated in the body of the report. The reasons for
B-15
FM 30-17
the Special Agent's opinions should be evident ; if by the Special Agent in contacting the source, un-
not, the reasons must be made clear. Comments less this reflects on the source's reliability.
will be presented as concisely as possible. 5. Refer to internal correspondence or
(a) Agent's notes may be used to— forms peculiar to the local unit.
1. Call attention to, and set forth rea- 6. Indicate recommendations.
sons why, the Special Agent did not, or why oth- (c) When used, agent's notes will be
ers should not, follow up an obvious lead if not placed at the conclusion of the Agent Report to
otherwise apparent. which they pertain. The designation will be typed
2. Give facts from the Special Agent's in upper case letters, i.e., "AGENT'S NOTES,"
knowledge of the area or situation, otherwise not followed by a colon. Agent's notes are indented
apparent, which might help to clarify an issue. five spaces and are contained in one paragraph
3. Give pertinent information concern- regardless of the diversity of the contents.
ing the source, which for any reason is not in- Agent's notes will begin two spaces below the last
cluded in the body of the report, e.g., adverse line of the Agent Report to which they pertain.
comments concerning the reputation, competency, e. Block No. 5, Typed Name and Organization
or credibility of the source, or competency in the of Special Agent. The reporting Special Agent's
language in which the interview was conducted, name will be typed in upper case letters in nor-
if relevant. mal order followed by the intelligence unit desig-
■4. Give the Special Agent's opinion of nation.
the interviewee (bias, prejudice, senility, etc.) or
of the information obtained, if necessary for clar- /. Block No. 6, Signature of Special Agent. The
ification or proper evaluation. This should be investigating Special Agent's signature will
stated as an opinion, never as a fact. appear as typed in block No. 5. The agent will per-
5. Point out discrepancies in subject's sonally sign in ink all copies of the Agent Report
statement of personal history, conflicting infor- when it contains adverse or derogatory informa-
mation submitted in other reports, and cross-ref- tion or concerns a complaint type investigation.
erence to related material. Variations of this policy may be authorized by
6. Point out the condition of records, if the investigating unit in individual cases for unu-
this might affect their validity or reliability. sual circumstances. Agent Reports not concerned
7. Explain any unusual terms or words with complaint type investigations and contain-
in the paragraph if such explanation requires ing no derogatory or adverse information may be
more than one word placed in parentheses after signed for the investigating Special Agent by an
the term. individual responsible for thé authenticity of the
8. Draw attention to conflicts or discre- reports.
pancies in different accounts of the same matter
and state the Special Agent's opinion, supported B—5. Leads
by his reasons, as to which is the more reliable a. A lead is any information collected during
version. an investigation which may require further de-
9. Indicate whether two sources having velopment of investigation. It may be the name,
the same last name are related. address, or location of a person, firm, or organiza-
10. Make reference to other related re- tion. It is usually a source which can furnish fur-
ports in the same case. ther information on the case or which can lead to
(&) Agent's notes will not be used to— additional information. Leads are included in the
1. Provide a catchall for nonpertinent Agent Report paragraph as information obtained.
information.
b. Initially, the Control Office extracts leads
2. Call attention to minor discrepancies
from subject's statement of personal history.
in dates of employment or education and in house
Normally, these initial leads are distributed by
numbers of listed street addresses. It is prefera-
means of DA Form 339 (Lead Sheet) (AR
ble in such cases to focus attention by underlin-
ing the information at variance. 381-130) to the MI units that will conduct the in-
vestigation. The leads noted on Lead Sheets or
3. Take the place of a negative report.
contained in Agent Reports must be specific and
When effort by the Special Agent fails to locate
complete, so that the investigative activities may
an interviewee or a record, this effort will be re-
be conducted intelligently and thoroughly.
corded in a separate Agent Report as an attempt.
í. Describe the difficulties experienced c. Leads collected during an investigation, e.g..
B—16
FM 30-17
"throwoffs" or other developed references not be inserted by the Control Office when the assem-
contained in a Lead Sheet, are subsidiary leads. bled Agent Reports and exhibits are organized
Normally, the reporting unit is authorized to de- for review and forwarding to the action agency.
velop all subsidiary leads within its own area of Exhibits must supplement, not replace, Agent Re-
jurisdiction. Therefore,, if the lead can be devel- ports.
oped by the reporting agent or by someone within a. In preparing paragraphs concerning ex-
the jurisdiction, of the command, no formal indi- hibits, the following procedures apply :
cation of the lead is necessary. This type lead is
(1) When the source of information is a
referred to as a "jurisdictional lead." However,
written record, it must be identified by office, lo-
when the lead is outside the jurisdiction of the
cation, title, volume, page number, and date. A
reporting command, necessitating communication
copy of a portion of a record included as a part of
with an MI group in another command, the Spe-
an Agent Report will be designated as an "ex-
cial Agent will formally indicate the lead in the
tract." Care will be exercised in making extracts
Agent Report in the following manner : The word
to insure that divorcing the passage from its con-
"(LEAD)", typed in upper case letters and en-
text does not alter its meaning. A complete copy
closed in parentheses, will be placed in the 3/4-
of a record will be designated as an "exhibit" and
inch marginal space on the right of the Agent
attached to rather than incorporated into the
Report on the line in which the lead is first men-
Agent Report. If the source of information ob-
tioned. The closing parentheses will be flush to
tained from written records is classified, or if the
the back vertical line on the form. This type of
revelation of such source would compromise
lead is referred to as an "indicated lead." Leads
counterintelligence operations or embarrass the
naming persons, firms, or organizations known to
agency furnishing such records, the material in
the reporting Special Agent as being suspect or
the reports may be paraphrased and the source
subversive are also indicated. The reason for in-
referred to by code designation. The exact refer-
dicating such leads will be reported in Agent's
ence to the source will be maintained in a manner
Notes.
consistent with the security considered necessary
by the responsible counterintelligence unit or ap-
B-6. Exhibits propriate Control Office. This information should
To amplify or to confirm information contained be accessible, however, if required by further de-
in Agent Reports, particularly if they prove or velopments in the case.
disprove derogatory information, or provide evi- (2) When the exhibit is a copy of an affida-
dence of the nature of incidents and the manner vit, a letter, or other document, the Special Agent
in which they were caused, the Special Agent must include all information which reveals how,
must submit available documentary and physical where, when, from whom, and under what cir-
evidence. This evidence must be in the form of cumstances the exhibit was obtained. The sub-
records, identification documents, affidavits, state- stance of information contained in the exhibit
ments, photographs, transcripts of interviews, will be included in the body of the Agent Report.
photostats, sketches (made by either the Special The Special Agent must not omit any detail which
Agent or other persons), documents, pamphlets, indicates the value the exhibit has in relation to
newspaper clippings, and sound recordings. Ex- the purpose of the investigation. Facts which later
hibits or objects of physical evidence which are may have a bearing on its probative or adjudica-
to be presented in legal proceedings must be tivo value must be reported fully.
maintained in a continuing chain of custody. Cop- (3) The Special Agent will state in his re-
ies will be attached to the Agent Report as EX- port, or on the copies of the exhibits, the exact lo-
HIBITS. In the body of the report, the designa- cation, name, and title of the custodian of the
tion should follow immediately after references original evidence. In some instances, the originals
to the item attached. Example: "SCHMIDT are not obtainable and copies must suffice, but the
wrote a letter (EXHIBIT I) to Charles B. location of the original must be given in the re-
Walker, Beverage Salesman, Tasty Beverage port. In such a situation, the names and addresses
Company, 666 Dundalk Avenue, Baltimore, of two persons who could testify to the authentic-
Maryland 21219." Or: "Attached hereto is EX- ity and existence of the original should also be
HIBIT I, (three pages) sworn statement, pre- stated in the Agent Report. In the case of docu-
pared by Jones dated 9 January 1960." Normally ments or copies of documents which are obtained
in a PSI, the exhibit is not numbered by the Spe- covertly, the Agent Report transmitting them to
cial Agent; the numbers (Roman numerals) will higher headquarters must contain sufficient iden-
B-17
m
tifyingf information to enable case officers to pro- umentary information is developed on a subject
perly appraise their validity and importance. or when favorable documentary data is obtained
(4) In the case of physical evidence, if the which wholly or partially refutes adverse infor-
nomenclature of the material will not serve as a mation, certified true, photostatic, or other au-
description, the Special Agent should describe thentic copies or extracts will be obtained to ac-
generally the equipment or the apparatus so that company and substantiate the report information.
the reader will be able to comprehend the physi- When it is impossible to accomplish the forego-
cal characteristics and utilization of the material ing, the Special Agent should personally verify
to which reference is made. the information in the documents and so state in
the Agent Report. If the documents are not made
b. In preparing exhibits to be attached at the available for verification, a signed sworn state-
end of an Agent Report, the following procedures ment by the document custodian will be obtained,
apply : if possible, concerning the contents. Lacking this,
(1) The identifying data for each exhibit the Special Agent will obtain full identifying
will be typed on the cover sheet. Cover sheets will data concerning the custodian.
contain the exhibit number, subject, file num- (7) Extreme care will be exercised in citing
ber (s), designation of the preparing unit, date of any local intelligence studies or reports which
the Agent Report to which the exhibit(s) applies, have not received Department of the Army evalu-
and, when applicable, security classification. ation. Reports or studies which have not been so
(2) If an original documentary exhibit re- evaluated normally will be referred to in Agent
quires a security classification, the classification Reports only as an aid to supervisory and investi-
may be stamped on a backing sheet, a cellophane gative control personnel in directing further in-
or other envelope, a permanent folder, or other vestigation. Agent Reports containing such une-
means used which will keep the security classifi- valuated reports or studies will not be included
cation on or near the exhibit without defacing it. with the Report of Investigation prepared upon
Duplicates of documentary exhibits are marked conclusion of an investigation. Properly evalu-
with the proper security classification in accord- ated data from local intelligence studies or re-
ance with the provisions of AR 380-5. Newspa- ports may be entered in Agent Reports included
pers and other public periodicals will not be clas- with the Report of Investigation, provided the
sified, but the file may be classified to prevent dis- original source can be identified and his reliabil-
closure of MI interest in this area. ity established.
(3) Original copies of documentary exhibits,
which have been received from other sources, B—7. DrsfomsslfoQifii ©bifoiiraedl from ©©vemmemi
will not be marked in any way. Agjemieios
E-S. F®irinnioif smd FVepeiirsilfeira The accumulated Agent Reports are ar-
The Report of Investigation is prepared accord- ranged in a logical order and each report is num-
ing to the following procedures : bered in a single series with Arabic numerals.
HS-li
FM 30-17
This numeral is placed in the five-space indenta- (3) "Investigative Data," the last major di-
tion of the introductory element of each attached vision of DA Form 342 is composed of blocks 19
Agent Report. The logical order of the Agent Re- through 25.
ports will vary as follows (fig B-8) : (a) Block 22 indicates the status of the in-
(1) In background investigations, the se- vestigation. The status indicated must be one of
quence of phase designations stated in AR the following :
381-130 should be used. 1. Closed. An investigation is indicated
(2) In complaint type investigations and in- as closed when no further investigative activity is
cident investigations the scope and nature are so necessary to enable proper authorities to make a
varied that no sequence can be prescribed. The se- final determination.
quence should logically present the development 2. Terminated. An investigation is indi-
of the investigation. cated as terminated when the investigation is
ended for some reason other than completion,
b. The exhibits prepared for the investigation e.g., withdrawal of the request for investigation,
are arranged in numerical order using Roman nu- transfer of investigative jurisdiction, etc.
merals. Exhibits are numbered in the order in
3. Susvended. An investigation is indi-
which they are mentioned in the numerically ar-
cated as suspended when the findings are incon-
ranged Agent Reports and are placed as a group
clusive and all tangible leads have been ex-
following the Agent Reports. Exhibits are never
hausted, yet there remains a possibility that new-
interspersed among the Agent Reports. Originals
information will be available at some future time.
of exhibits will be retained by the control office
with the open case file until required by the ac- Jf. Pending. An investigation is indicated
tion agency or higher authority. However, origi- as pending when the investigation is continuing.
nals will be included, if possible, in the closed (ft) Block 23, the Synopsis, is written in a
case file which is forwarded to the US Army In- narrative style and contains the essence of the
vestigative Records Repository (IRR), Fort Hol- pertinent information in the collected Agent Re-
abird, Maryland 21219. In instances when re- ports. It is a concise summary of the who, what,
sults of polygraph examinations are used as ex- when, where, why, and how of the investigation.
hibits, instructions contained in AR 195-6 will Each statement of fact in the synopsis contains
apply. parenthetical references to the appropriate num-
bered Agent Reports or exhibits. Any recommen-
c. DA Form 342 is prepared as follows : dations, reviewer's opinions, or conclusions
(1) "Identifying Data" is the first major di- deemed appropriate should be noted on the letter
vision of DA Form 342, and is composed of blocks of transmittal accompanying the Report of Inves-
1 to 15. Definite entries are made in blocks 1 tigation ; no such comments should be included in
through 10 when the subject of an investigation the Report of Investigation. The margins will be
is a known person or organization. The letters the black lines at the sides of the page, and the
"NA" (not applicable) are entered in blocks 11 text will begin on the third line of block 23. Two
through 15 in this case. When the investigation blank spaces are left at the bottom of the page. If
deals with an incident in which the person or additional space is needed, block 23 will be con-
persons concerned are not known, blocks 11 tinued on a plain sheet of white bond paper,
through 15 will contain definite entries identify- using normal margins. At the top of the continu-
ing the incident, and the letters "NA" entered in ation sheet the title will be placed on the left and
blocks 1 through 10. the date and file reference on the right. The text
(2) "Control Data," the second major divi- is continued on the third line below the file refer-
sion of DA Form 342, is composed of blocks 16 ence. (See AR 381-130 for the distribution of the
through 18. Report of Investigation.)
B-19
FM 30-17
In 191x2, BROWN moved to New York, New York, with HER husband who was appointed
an assistant professor at New York University. In 191x3, BROWN'S husband left his
position at New York University to devote his entire time to Communist propaganda
activities (3, 19, 20). SUBJECT'S ideas marked HER as a militant Communist, and in
191x3, SHE was issued Communist Party Membership Card No. 679UNE (7). BROWN was a
secretary of a Communist front organization and an active member of many Communist
2M. DISTRIBUTION
3 - CG, Sixth US Army, 1 - File
2». REVIEWED BY
TYPED «AME ANO TITLE SIGNATURE
ROBERT C. HALL.Colonel. GS JiÀ. /s/ Robert C. Hall
DA 1 APR 92 342 REPLACES WO AGO FORM 392,. X JUN 97, WHICH MAT BE USED. SPO »MBB»
(CLASSIFICATION)
sponsored groups (8,18,19). In 1944 BROWN made a speech in which SHE berated
labor "for playing into the hands of the capitalists" (6). According to a
neighbor SUBJECT and HER husband entertained frequently in their home, but these
occasions were quiet and reserved. This neighbor described SUBJECT as friendly
and patriotic(11).
In March 1944, when SUBJECT'S husband was inducted into the US Army, he
listed his political affiliations as "Communist." In December 1945, he was
discharged at Fort Dix, New Jersey (12). One year after HER husband's
discharge, BROWN joined the WAC in the grade of second lieutenant. SHE is
currently assigned duties at the Stockton Ordnance Depot (13, 14, 15).
SUBJECT'S Commanding Officer and four co-workers noticed no manifestations
of left-wing activity oj^pf sympathy for left-wing causes on the part of
BROWN (13, 14, 15, 16^17). BROWN's name appeared on a membership list of
the National Committee rör Human Welfare, a Communist front organization
(EXHIBIT I) (18, 25). JnJ1958, BROWN's daughter, a Communist Party youth
director in Stockton, married/k suspected Communist Party organizational
leader (20). The Browns receájgXCommunist literature at their home in
Stockton (8, 21). They have/corresponded or spoken on the telephone with
three recognized Communists (22, 23, 24).
El
(CLASSIFICATION)
Figure B-8—Continued.
8-21
FM 30-17
the extreme right portion of the space labeled the source may be identified in such identification
"preparing office." is necessary for complete understanding of the
facts. When the source is not identified, an indica-
b. The subject of the summary must be identi-
tion of the nature of the source's accessibility to
fied as thoroughly as possible. Rules for comple-
the information may be included in the summary.
tion of the subject block for the Agent Report
When Summaries of Information are prepared in
also apply for the Summary of Information.
which sources are not identified, the file copy
c. The text of the Summary of Information will which remains in the office of origin should be
start on the third line from the black line at the annotated to show the sources, using code number
top of the block titled "Summary of Informa- of sources whose identity requires protection. A
tion," leaving two blank spaces at the top of this bibliography may be attached to the file copy
block. The black lines will be used as the left when multiple sources are used in the prepara-
margin for all items. tion of the Summary of Information.
d. Paragraphing and subparagraphing should
follow the rules of military correspondence (AR B—11. Information from Other Government
340-15). Paragraphs are numbered at the time of Agencies
preparation. Each paragraph should be limited to Information obtained from government agencies
information from one major source only (i.e., one other than the Department of Defense will not be
file, one agency, etc.), but not necessarily from included in Summaries of Information prepared
one ultimate source (i.e., each person inter- for a requesting or receiving agency outside of
viewed, each report of a records check, etc.), and the Department of Defense or the Federal Bu-
should contain all information from that source reau of Investigation without first securing the
pertinent to the subject ot the Summary of Infor- approval of the originator or source. When a
mation. Summary of Information contains information
from other government agencies, such informa-
e. Each paragraph of the Summary of Infor-
tion will be underlined and capitalized. Such
mation will be evaluated, using the standard sys-
Summaries of Information will contain the fol-
tem of evaluation ratings (FM 30-5), taking into
lowing statement :
consideration the evaluation (s), if any, of the
original report(s). When pertinent, evaluation Information derived from sources other than
Army Sources is included in this summary. This
should be made of subparagraphs or sentences. information will not be passed to any agency
outside the Department of Defense or the Federal
/. If additional space is needed, two lines will Bureau of Investigation.
be left at the bottom of the form, and the text This statement will appear as a final, but unnum-
will be continued on a plain sheet of white paper; bered, paragraph in the summary.
normal margins will be used. At the top of the
continuation sheet the subject will be placed on B—12. Format and Preparation
the left side and the date and file references on
the right; the text is continued on the third line A Summary of Information could be used as a
below these items. characterization; however, many occasions arise
where a biographic sketch of an individual or or-
gr. The Summary of Information is not signed; ganization will satisfy the needs of the requester.
however, the file copy will have the name of the Characterizations may be prepared from existing
individual who prepared the summary typed in records in the US Army Investigative Records
the upper-right hand corner of the DA Form 568. Repository, the Office of the Assistant Chief of
Staff for Intelligence, DA, or the Federal Bureau
B—10. Limitation on Identification of Sources of Investigation. If not available from these
sources the information will only be obtained
The sources of information normally should not through authorized liaison with local, state, and
be revealed in a Summary of Information sent federal authorities, and from public sources, such
outside intelligence channels. However, if the as reputable news media or libraries (fig B-10,
summary is to remain in intelligence channels. B-ll, B-12).
B—22
FM 30-17
Information derived from sources other than Army sources is included in this
summary. This information will not be passed to any agency outside the Department of
Defense or the Federal Bureau of Investigation.
01STRIBUTI0N
Tucson Office, FBI, Tucson, AZ - 2 copies
File - 1 copy
A FORM ETCQ (Formerly REPLACES WD AGO FORM 568. I JUH 47.
Jr\ I DEC 51 OOO DA AGO) MAY BE USED.
WHICH MA
1. Raffel D. NOMAN, born 30 February 1900, City, Utah, retired from the US Army in
1952, with rank of Colonel, NOMAN was decorated for HIS service in World Wars I and
II.
01 STRIBUTION
J
I A A FORM CßQ (Formerly REPLACES WD AGO FORM S'.B. I JI.'N 47.
Uf\ t DEC 51 OOO DAACOJ WHICH MAY BE USED.
2. Although the RCH management staff is composed entirely of civilians, the patron-
age of RCH is entirely military. Approximately 30-A0 individuals reportedly attend
SUBJECT nightly.
3. Activities at RCH center around "rap sessions" and military, counseling. Trained
counselors, both civilian and military, advise and assist servicemen to seek service
discharges on grounds of conscientious objector status. RCH patrons discuss and
plan a variety of disruptive actions against the Army.
01STRIeUTION
DA 568
B-25
FM 30-17
PERSONALITY CHARACTERIZATION
Dossier No
As of Date
4. Current Residenc
-s
5. Current Employment : PHOTOGRAPH AS OF:
6. Education:
A
7. Previous Residences:
8. Previous Employment: M
9. Military Service:
OTHER INFORMATION
B—26
FM 30-17
APPENDIX C
C-l
nage, sabotage and the unauthorized access to, or disclosure of, classi-
fied defense information.
Section II. SCOPE
8. This survey included the following (elements, offices, sections, etc) of
(re-identify the unit).
(List the sections or sub-elements surveyed.)
9. (Use this paragraph to indicate the amount and classification of docu-
ments and materiel on hand either by number and type or in linear feet
and type.)
Section III. FINDINGS AND RECOMMENDATIONS
10. Security of Information:
a. Receipting: (Narrate the entire procedure used in receipting for all
classified documents within the unit being surveyed and follow with ap-
propriate recommendation (s). An alternate method would be to subpara-
graph where required, as in example below.)
(1) TOP SECRET: (Narrate)
(a) Recommendation: (Follow the narration with appropriate rec-
ommendation (s). Use a similar procedure for subsequent paragraphs
throughout the report, varying as necessary to adapt survey findings to
this report format.)
( b ) Recommendation :
(2) SECRET: (Narrate)
(a) Recommendation:
( b ) Recommendation :
(c) Recommendation:
(3) CONFIDENTIAL: (Narrate)
(a) Recommendation:
( 6 ) Recommendation :
b. Storage. (Narrate in detail facilities and procedures employed in
storing classified matter.)
Recommendation ( s )
c. Distribution: (Narrate in detail procedures employed for internal
distribution of classified matter.)
Recommendation ( s)
d. Preparation : (Narrate in detail how classified matters are generated
and prepared, to include drafts.)
Recommendation ( s )
e. Marking: (Narrate in detail how prepared classified matters are
marked for proper safeguarding, to include drafts, stenographer's notes,
etc, and also authority.)
Recommendation ( s )
/. Reproduction: (Narrate in detail how classified matters are repro-
duced and how marked.)
Recommendation ( s )
g. Regarding: (Narrate in detail procedure for reviewing and regrading
classified matter; include responsibility.)
Recommendation (s)
h. Transmission: (Narrate in detail procedure employed for transmit-
ting classified matter out of the surveyed unit to include responsibility and
accountability. )
Recommendation (s)
i. Normal Destruction: (Narrate in detail procedure employed for ac-
complishing normal destruction of classified matter and waste; include
responsibility, records, etc.)
Recommendation (s)
j. Emergency Evacuation and Destruction of classified material:
(Narrate in detail what measures are established to include plan in effect,
personnel assigned specific duties, etc.)
Recommendation (s)
11. Security of Personnel :
a. Key Personnel :
(1) The (enter title of individual who heads the surveyed unit; i.e.,
commanding officer, branch chief, section chief, etc.) of the installation is
(enter title or rank, first name, middle initial, last name, branch of service,
service, social security number or GS rating in case of civilians). He (or
she) has occupied this position since (date).
(2) The Security Officer of this installation is (enter title or rank,
first name, middle initial, last name, branch of service, social security
number or GS rating in case of civilians). He has occupied this position
since (date) upon orders issued by (identify authority and date).
(3) The officer having staff responsibility for crime prevention at this
installation is the Provost Marshal (or appropriate title), (enter rank,
first name, middle initial, last name, branch of service, and social security
account number). He has occupied this position since- (enter date) upon
orders issued by (identify authority and give date of orders).
(4) (Use additional subparagraphs, as needed, to identify other indi-
viduals in surveyed unit who are considered to be "key" personnel and
show the degree of clearance and time each has held his present position.)
Recommendation (s)
b. Clearance Program: (Describe in detail the procedure used for ob-
taining clearance for assigned personnel and describe accuracy of the
clearance roster.)
Recommendation ( s )
c. Security Education: (Describe in detail the security education pro-
gram that is established and conducted ; include responsibility, frequency of
security lectures, subjects covered, attendance records, effectiveness, etc.)
Recommendation ( s )
d. Labor Turnover, Absentee Rate, Morale: (Describe how these factors
affect the security of surveyed unit.)
Recommendation (s)
12. Physical Security: (Describe in detail the controls, systems, facilities,
and utilities identified in the following subparagraphs. If the unit being
surveyed already has on record a Physical Security Survey (PSS) per-
formed by MP personnel, a statement in this paragraph referring to the
report is deemed sufficient, provided those deficiencies noted which directly
affect the security of classified documents and material have been corrected.
If this has not been accomplished, appropriate recommendations should be
made. If there is no record of a PSS and the MP representatives are un-
able to perform the physical security portion while the CI Survey is being
conducted, this portion will be accomplished by counterintelligence person-
nel, if directed to do so, following the format outlined below (chap 10).
a. Perimeter Barriers:
post fences, gates, locks, key control, perimeter lighting;
building building surfaces, doors, locking devices, key control,
windows, protective lighting;
office wall surfaces, doors, locking devices, key control
windows.
Recommendation ( s )
b. Guards and Guard Systems:
post type and number of guards, their procurement train-
ing, their employment and supervision, equipment
and communications ;
building same as above;
office same as above.
Recommendation ( s )
c. Personnel Control and Identification: Control of assigned personnel
by post, in building, and in office; control of visitors by post, in building,
and in office.
Recommendation ( s )
d. Vehicular Control and Identification : Vehicles of assigned personnel,
their registration, identification and control on post; visiting vehicles and
their control.
Recommendation ( s )
e. Anti-Intrusion Alarms Systems:
Recommendation ( s )
/. Firefighting Facilities:
post fire department and its personnel, type and number,
procurement and training, employment and supervi-
sion ; equipment and its inspection ; communications ;
reserve fire fighting personnel;
building fire plan; fire marshal and wardens, equipment and
its inspection; communications; training and educa-
tion of personnel ;
office same as for building.
Recommendation ( s )
g. Communication Facilities : Primary, alternate, and emergency facili-
ties that are available on post and to surveyed unit; personnel employed
to operate and maintain communications facilities to include their type
and number, procurement and clearance, employment and supervision.
Recommendation ( s )
h. Utilities :
(1) Electrical Power.
(Source, emergency provisions, protection, etc.)
(2) Water Supply.
(Source, emergency provisions, safeguard, etc.)
(3) Heat and Fuel.
(Facilities and type, source of fuel, emergency provisions, safe-
guards, etc.)
Recommendation (s)
Section IV. COMMENTS
13. (Use this section to record weaknesses and any other comments con-
sidered pertinent. As a part of the survey, inquiries into the following
areas will also be made and if they are found to be adequate, appropriate
remarks to that effect will be made in this section.
а. An evaluation of the completeness and correctness of the unit's se-
curity SOP.
б. Examination of sensitive areas, classified conference rooms and po-
tential or actual restricted areas, to include their actual designation as
such or the requirement for a counterintelligence technical service. If these
areas are found to be inadequate from the standpoint of published regula-
tions, directives, and implementation thereof, the discussion should be
placed in section III, above, followed by appropriate recommendation (s).
When weaknesses as described in chapter 10 are noted, discussion and rec-
ommendation (s) will appear in this section.)
Section V. EXIT BRIEFING
14. All findings and recommendations were discussed during an exit brief-
ing on ( ) for the following unit representatives:
(List as necessary using rank or title, first name, middle initial, last
name, and position.)
SIGNATURE BLOCK
(Signature of authorized group
representative, not necessarily
the Agent-in-Charge. )
EXAMPLE 2
(CLASSIFICATION)
REPORT OF COUNTERINTELLIGENCE TECHNICAL SERVICE
OF
(UNIT AND LOCATION)
(Requestor Control Number) (Date)
Section I. INTRODUCTION
1. ( ) A counterintelligence technical (survey/inspection assistance) was
conducted during the period by the following repre-
sentative (s) of Region , ( ), MI Group.
(List as necessary using title, first name, middle initial, and last name.)
2. ( ) The serviced area was considered by the requester to be a (enter
secure conference facility, or other sensitive area). A description of the
area is contained in EXHIBIT I.
3. ( ) An examination of records regarding previous counterintelligence
technical services in the area reveal that: (check as appropriate)
( ) There is no record of a previous technical service.
( ) A counterintelligence technical (identify) was completed on
(CLASSIFICATION)
(date of service and unit that conducted it).
Section II. SCOPE
4. (U) The scope of this technical service is outlined in EXHIBIT II.
Section III. LIMITATIONS
5. (U) The limitations of this service are outlined in EXHIBIT II.
Section IV. FINDINGS AND RECOMMENDATIONS
6. ( ) Repeated or uncorrected findings: (enter here any repeated or
uncorrected findings. If there were none, enter, none).
7. ( ) (If technical surveillance devices were not detected and no techni-
cal security hazards were found, state : "The service did not locate or indi-
cate the presence of technical surveillance devices or technical surveillance
security hazards.")
8. ( ) (If technical surveillance devices were not detected, but technical
security hazards were found, state as follows:
a. The service did not locate or indicate the surveillance devices.
b. The serviced area does not meet the criteria for sensitive areas and
is not considered secure for the discussion of sensitive classified informa-
tion until corrective action is taken on the following technical security
hazards :
(1) Finding: (Record findings and follow each with an appropriate
recommendation. Paragraph citations will be indicated at the end of each
finding. When an appropriate finding cannot be attributed to an appropriate
directive, a parenthetical caveat (NONCITABLE HAZARD) will be en-
tered at the end of such findings. )
(2) Finding:
( Recommendation : )
Section V. COMMENTS
9. ( ) (Use this section to record any additional pertinent explanatory
remarks that do not properly fit into any of the other sections).
Section VI. EXIT BRIEFING
10. ( ) All findings, recommendations, and limitations of the service were
discussed during an exist briefing on for the following
unit representatives:
(List as necessary using rank or title, first name, middle initial, last
name, and position.)
SIGNATURE BLOCK
(Signature of authorized group
representative, not necessarily
the Agent-in-Charge.)
REPORT OF COUNTERINTELLIGENCE TECHNICAL SERVICE
OF
DESCRIPTION OF SERVICED AREA
1. ( ) Primary use of serviced area-highest classification and frequency
of discussion of classified defense information.
(CLASSIFICATION)
(CLASSIFICATION)
2. ( ) Brief, general description of the area to include construction of
walls, floors, ceilings, penetrations of those structural members, and the
relationship of the area to all (including above and below) adjacent areas :
3. ( ) Security controls in effect to restrict access to the serviced area
both during duty and nonduty hours:
4. ( ) Security controls of janitorial and service personnel ; to include
indication of clearance or lack of clearance for nonescorted personnel :
5. ( ) Brief, general description of heating, ventilation, electrical, and
communications equipment or systems that service or penetrate the serv-
iced area :
EXHIBIT I Page 1
SCOPE OF TECHNICAL SERVICE ( )
1. (U) Unless otherwise indicated, this service was conducted to detect
the presence of technical surveillance equipment; to determine the exist-
ence of technical security hazards which would permit the employment of
such equipment; and to recommend technical security measures designed
to prevent the successful employment of technical surveillance monitoring
systems.
2. ( ) This service consisted of selected application of comprehensive
visual, physical, audio, electronic, and radio frequency checks and included
an examination of the factors checked below:
( ) a. All exterior building surfaces, utility poles, wires, and other
associated paraphernalia.
( ) b. Vulnerability of hostile visual surveillance.
( ) c. All areas adjacent to the serviced area including those areas
above and below.
( ) d. The interior of room areas to include wall, floor, and ceiling
mounted items, furniture, artifacts, and equipment.
( ) e. The interior and exterior surfaces and internal structure of
walls, floors, ceilings, and other structural objects.
( ) f. All electric or electronic equipment or circuits and component
parts of accessories thereof, to include detailed examination of all wiring
and utility channels or recesses.
( ) g. Other:
EXHIBIT II Page 1 of 2 pages
LIMITATIONS OF TECHNICAL SERVICE (U)
Counterintelligence technical services of the type conducted indicate the
technical security status of the area or equipment examined at the conclu-
sion of the examination, within the capabilities of the equipment utilized
and the operational techniques employed. Attention is invited to the fact
that the security afforded by this service WILL BE IMMEDIATELY
NULLIFIED BY:
a. Admission to the serviced area of persons who do not have the proper
security clearance or who are not under proper escort.
b. Failure to maintain continuous and effective surveillance and control
of the serviced area.
(CLASSIFICATION)
(CLASSIFICATION)
c. Allowing repairs or alterations to or within the serviced area without
the supervision of qualified and responsible personnel.
d. The introduction of new furnishings or equipment into the serviced
area prior to a thorough inspection of such items.
e. Other limitations:
EXHIBIT II Page 2
(CLASSIFICATION)
FM 30—17
APPENDIX D
D—1
FM 30-17
ments, if any, are known to cater to individuals (3) Determine whether these areas have
who harbor ideologies inimical to the best inter- been designated as restricted areas or off-limits
ests of our government. areas.
(3) Determine whether there have been
b. Determine the location of the motor pools.
known incidents in these establishments to solicit
information concerning the installation and/or its (1) Check whether they are properly safe-
activities. guarded. Are any areas designated for authorized
(4) Monitor establishments to determine personnel only?
whether military personnel discuss defense infor- (2) What types of vehicles are located in the
mation while on the premises. motor pools? Are vehicles frequently checked for
possible mechanical sabotage ?
D—3. Critical Areas
c. Determine whether airstrips and/or heli-
a. Determine the locations of such critical ports have been established.
areas as the communication centers, power trans-
former stations, fuel storage sites, POL dumps, (1) Check whether the installation has as-
and ammunition dumps. signed aircraft and pilots.
(1) Check the measures taken to protect (2) Are aircraft properly safeguarded?
these areas. (3) Are airstrips and/or heliports clearly
(2) Determine their relationship to, and dis- designated? If there are neither, determine
tance from, sensitive areas. whether there are large enough areas.
D—4. D-7.
a. Examine the history of the installation. Consider the vulnerability of the location of the
installation and what effect the surrounding ele-
b. Check the history of the installation as it
ments have upon its security, based on factors de-
pertains to the construction of tunnels, caves,
veloped in section I above.
sewers, underground facilities, entrances and
exits, or any other construction that would have
D-8.
an adverse effect on the security of an installa-
tion. Consider the classification of the information
stored, used, and created at the installation.
D-5.
WTiat is the mission of the installation being sur- D—9.
veyed? Is it classified or unclassified, and is it of Determine the number of like installations that
long or short duration? How does the mission are capable of absorbing the functions of the sur-
contribute to the defense effort? Is the mission veyed installation if it were destroyed.
extremely sensitive or nonsensitive?
D—10.
D—6.
Determine the overall importance of the installa-
Determine the cost of replacement. tion commander and examine higher command or
DA policy to establish a partial basis for the de-
a. What would it cost in terms of money, man-
termination. Evaluate items in paragraphs 4
power, material, and time to replace this installa-
through 9, above. It is extremely important that
tion if it were destroyed ?
this determination be made prior to the survey so
b. How would this affect the defense effort? that feasible recommendations may be rendered.
FM 30-17
D—11/ Amount of Classified Documents and protection as required for at least the highest cat-
Material egory of information in any of the containers?
Consider the overall classification of a compila-
many linear feet of each category of classi-
tion of the material that would be available to
fiec| information are stored in the surveyed instal-
anyone gaining access to the record of combina-
lation ?
tions.
D— ll?. Message Center f. Has the dissemination of combinations been
held to the minimum consistent with efficient op-
Is a message center used for distribution of all in-
erations? Explain.
coming'.correspondence and dispatch of all outgo-
ing correspondence? If so : g. Is a properly completed part 1 of DA Form
727 (Classified Container Information) affixed to
a. How many personnel are employed in the
the outside of each container in which classified
message center?
information is stored? Check for accuracy.
b. In relation to the classification of informa-
h. Are all personnel listed on part 1 of DA
tion handled, are the message center personnel
Form 727 currently responsible for the security
adequately cleared ?
of the container on which the form is posted ?
c. Is the message center declared a Restricted
i. Is part 2 of DA Form 727 properly executed
Area? If so who is authorized access? What
and attached to an envelope containing the com-
identification system is used?
bination recorded on part 3 of DA Form 727?
d. What storage facilities are available in the Have these been filed in a central location at the
message center? next higher echelon ? Where ?
f. How much information of a classified nature j. Is part 3 of DA Form 727 placed in an
is stored in the message center ? opaque envelope? Is it possible to read the combi-
nation through the envelope? Is the envelope
D—13. Storage Facilities sealed?
a. How are SECRET and CONFIDENTIAL k. Is part 3 of DA Form 727 classified at least
materials stored? Describe the containers to in- as high as the highest category of defense infor-
clude size, weight, type of locking device, and ap- mation stored in the container? Consider the
proximate delay time. need for a higher classification due to the effect
of a compilation of the information in the con-
b. If containers with steel locking bars and
tainer.
hasps are used (as an interim measure until re-
quired containers are received), are the hasps ad- I. Is the envelope containing part 3 of DA
equately secured to the containers? Are the lock- Form 727 marked with the same classification as
ing bars attached to the containers in such a way the form inclosed?
that material cannot be removed from the draw-
m. What procedure is followed to insure that
ers when the container is locked ?
combinations are not written on calendar pads or
c. If a field safe is used for storage, is it se- carried in wallets?
cured to the building or guarded to prevent unau- n. Is a properly executed DA Form 672 (Safe
thorized removal? Describe the safe and locking or Cabinet Security Record) affixed to each con-
device. tainer in which classified information is stored?
d. When, or under what circumstances, are Check for accuracy. (Note any discrepancies
combinations to combination locks used on classi- found on DA Form 672.)
fied containers changed ? o. Is an entry made on DA Form 672 each time
e. Is an up-to-date record of all safe combina- the container is opened and closed? Do the ini-
tions maintained in a central location, together tials in the "UNLOCKED BY" column coincide
with information necessary to identify and locate with the names listed on part 2 of DA Form 727
all containers? If so, where? Who has access to as having knowledge of the combination?
the combinations? Are the combinations afforded p. Is the person who checked the container at
D—3
FM 30-17
the end of the day different from the person who /. Does the register indicate how documents en-
locked the container? tered therein were disposed of (receipt, dispatch,
downgrading, destruction) ?
q. Is the container checked every working day,
even if it has not been opened? g. Is the register current and accurate? Spot
check 5 to 20 percent of the documents entered.
r. If a container remains open, is it attended by
a properly cleared, responsible person? Explain. h. Are all documents originated by the unit en-
tered in the register and is there disposition indi-
s. When a container equipped with combination
cated ?
padlock (interim arrangement) remains open
during duty hours, how is the padlock safe-
D— 15. Receipting
guarded ?
Is SECRET material, CONFIDENTIAL ma-
t. Are containers in which classified informa- terial, if required (local policy will dictate proce-
tion is NOT to be stored clearly marked with in-
dure), covered by a receipt? Explain the system
structions to this effect if prescribed by local se- used.
curity SOP? Explain.
b. What receipt form is used? Is a file copy re-
u. Are personnel aware of the action required
tained for all classified documents sent out of the
when a container is found open and unattended unit?
after duty hours or classified material is found
unattended and out of a container? Query per- c. Is the unit making proper use of DA Forms
sonnel and report results. 631 (Classified Multiple Document Receipt or
Tracer), 1203 (Classified Document Mail Control
v. When removed from the installation is clas- Record and Receipt), and 1204 (Classified Docu-
sified material kept under personnel physical con- ment Receipt and/or Tracer) ? Explain.
trol of authorized personnel at all times or se-
cured in the type of storage facility required by d. Do receipt forms contain any classified infor-
the particular classification? mation ? Spot check.
w. How is information annotated "FOR OFFI- e. If all receipt forms have not been returned
CIAL USE ONLY" stored? for documents sent out of the unit, have they
been traced through use of proper forms? Report
x. Are NATO, CENTO, or SE ATO documents results of any tracers sent out since the last sur-
clearly identified and segregated from US docu- vey of inspection.
ments in storage?
f. Are receipt forms being disposed of in ac-
D—14. Classified Document Register cordance with AR 340-18-series (file # 504-08)
a. Is a classified document register maintained or AR 340-2 (file # 501- ) ? Explain.
for classified material charged to the unit sur- g. Who is designated to receipt for classified
veyed? (Dependent on local policy, a register material that is received by surveyed units?
may or may not be maintained for CONFIDEN-
TIAL and SECRET material.) Describe the reg- D-16. Dissemination
ister utilized for such material.
a. Are supervisory officials taking proper steps
b. Does the register bear an overall classifica- to prevent unauthorized dissemination of classi-
tion based on the presence of classified informa- fied information? Explain.
tion contained therein rather than on the pres-
b. Is a conscious effort made by holders of clas-
ence of references to classified information? Spot
check for accuracy. sified documents to insure that requesters have
proper clearance and a bona fide need-to-know?
c. Are individual pages of the register classi-
c. Do requesters of classified information in-
fied according to the classification of long titles
sure that they have a proper clearance and ac-
contained thereon? Spot check for accuracy.
tually need the information in the performance
d. Do the entries fully identify the documents? of their official duties?
Cross check the register entries with documents.
d. Are classified document cover sheets used to
e. Who is responsible for maintaining the reg- cover classified documents when they are out of
ister? Who has access to the register? containers and not being used?
D—4
FM 30-17
e. How are requirements for safeguarding cer- sion are used? (Mail, courier. Armed Forces Cou-
tain documents from foreign nationals being im- rier Service, State Department?)
plemented ?
b. What receipt form is used? How are docu-
/. Is classified material removed from contain- ments accounted for while in transit?
ers at night for work purposes? If so, what prov-
c. If classified material is mailed, is the double
isions for proper safeguarding are in effect?
envelope system properly used? Is a file of Post
g. Are individuals within the unit required to Office Department Registry receipts maintained?
leave a receipt for classified information they re- d. If a courier is used to transmit classified ma-
move from containers? If so, what receipt form terial, does he have a clearance at least as high as
is used? Who controls the documents within the the information entrusted to him?
various offices of the unit?
e. Is the classified material adequately pro-
D—17. Preparation of Reproduction tected from view when carried by the courier?
How?
a. Is any classified material originated in the
unit surveyed? If so, do responsible officials have /. How is material prepared for transmittal by
written authority to classify? Include details. Armed Forces Courier Service or State Depart-
ment diplomatic pouch?
b. Are persons using, extracting from, reprod-
ucing, incorporating, or responding to informa- D-19. Classification and Marking
tion already classified, carrying out their obliga-
tions to apply the classification decisions deter- a. Do files or groups of physically connected
mined by the originating authority? Explain. documents bear the overall classification of the
highest classified components? Consider the ef-
c. Are documents classified according to their fect of a compilation on the overall classification.
own content?
b. Are letters of transmittal classified as high
d. Are cotton, rayon, silk, and paper typewriter as the highest classified inclosure? If the letter
ribbons properly handled when used to prepare of transmittal contains no classified information,
classified material? How? are regarding instructions included?
e. Are stencils containing classified information c. Are extracts or portions of classified docu-
properly handled? How? ments properly marked with the security classifi-
cation? Spot check.
/. If Verifax, Thermo-Fax, or photostatic re-
producing processes are used for classified infor- d. Is the defense classification of paragraphs,
mation, what precautions are taken to insure that sections, chapters, indorsements, annexes, inclo-
master copies, negatives, waste, etc. are properly sures, subjects or titles properly indicated? Spot
protected ? check.
D—5
FM 30-17
k. Do ail reproductions of classified material i. Note any discrepancies found in the destruc-
bear the same markings as the original? Spot tion certificates.
check. j. How is classified material destroyed?
I. Are transmitíais of investigative reports con-
taining counterintelligence information annotated D—22. Emergency Plan
in accordance with AR 381-130 if transmitted a. Destruction (in overseas areas).
outside intelligence channels? Spot check.
(1) Are these provisions for emergency de-
struction of classified material stored by the unit
D—20. Regrading and Dedassification
surveyed? Explain.
a. What procedure is being used for prompt re- (2) Have specific responsibilities been as-
view of all classified documents for regrading signed to individuals for implementation of the
purposes? emergency destruction plan? Identify the person-
b. Are regrading instructions placed on all nel. Are they aware of their responsibilities and
classified documents? the provisions of the emergency plan?
c. How are holders of classified documents in- (3) What facilities are available for emer-
formed of nonautomatic regrading instructions? gency destruction?
d. Have documents been properly regraded ac- (4) Where are the collection points located?
cording to the automatic or nonautomatic regrad- (5) Is a system of priority marking of docu-
ing instructions? Spot check 5 to 20 percent of ments and material utilized in the unit? Explain.
the documents on hand. b. Evacuation.
e. Do regraded or declassified documents bear ( 1 ) Are there provisions for emergency evac-
proper authentication when required? Spot uation of classified material stored by the unit
check. surveyed ? Explain.
/. If the unit has regraded or declassified origi- (2) Have specific responsibilities been as-
nal document, are recipients of the original dis- signed to individuals for implementation of the
tribution notified? How? emergency evacuation? Identify the personnel.
Are they aware of their responsibilities and the
g. How is authority obtained for regrading doc-
provisions of the emergency plan?
uments deemed incorrectly classified?
(3) What vehicles or facilities are available
h. How is material designated FOR OFFICIAL
for emergency evacuation ?
USE ONLY marked?
(4) Where are the collection points located?
(5) Is a system of priority marking of docu-
D—21. Destruction
ments and material utilized in the unit? Explain.
a. Who is the person authorized to destroy clas-
sified material? Cite the authority. D—23. Procedure for Handling TOP SECRET
b. Who is selected to serve as a disinterested The following will apply only if the unit sur-
witness to destruction? Is he truly disinterested? veyed stores or handles TOP SECRET informa-
Explain. tion or material.
c. Do the destruction officer and witness meet а. Have a Top Secret Control Officer and an Al-
the criteria established by AR 380-5? ternate Top Secret Control Officer been appointed
d. Is the witness for SECRET destruction on competent orders? Identify them and cite the
named on orders? paragraph number, orders number, date, and
e. Are appropriate records of destruction main- issuing headquarters.
tained? Who keeps them? Is the authority for б. Does the Top Secret Control Officer maintain
destruction cited?? a current roster of all personnel authorized ac-
/. Cross check the certificates of destruction cess to TOP SECRET material ? Include a copy if
with the classified documents register to see that available.
they are accurate. Does the register reflect all de- c. How is transfer of accountability accom-
structions ? plished upon change of Top Secret Control
g. Is a record made of destruction of CONFI- Officer?
DENTIAL material? Explain. d. Does the Top Secret Control Officer maintain
h. If a classified title is used, does the certifi- a permanent register of DA Form 2133 (TOP
cate of destruction bear the proper marking? SECRET Control Record) or DA Form 455 (Mail
D—6
FM 30-17
and Document Register), as appropriate, reflect- (Note. Personnel on orders, such as the TOP SE-
ing receipt, dispatch, downgrading, or destruction CRET custodian, do not have to sign the form since access
of all TOP SECRET material for which he is res- is assumed.)
ponsible? Check all for accuracy. r. Explain in detail any discrepancies revealed
in the last annual inventory of TOP SECRET
e. Using the register, account for all TOP SE-
material.
CRET material in the unit.
f. How is the transfer or receipt of TOP SE- D—24. Procedures for Handling Registered
CRET material documented? Documents and Material
g. Are all copies of TOP SECRET documents a. Has a custodian of registered documents
properly numbered for accounting purposes? Ex- been appointed on competent orders? Does he
plain. possess a TOP SECRET clearance? Identify the
custodian and cite the paragraph, orders number,
h. Are results of annual inventory reported
date, and issuing headquarters of the orders ap-
through channels to the major command or DA
pointing him.
agency on or about 1 April each year? How is
this accomplished? Check file copy(ies). b. If an alternate custodian is appointed, in-
clude the same information as required for the
i. How is TOP SECRET material transmitted
in the clear? How is it transmitted when en- custodian.
crypted ? c. If there has been a change in custodians, has
a transfer certificate been accomplished? Spot
j. How is the TOP SECRET material stored?
Explain. check.
D—7
FM 30-17
D—25. Procedures for Handling RESTRICTED c. Are all RESTRICTED DATA or FOR-
DATA MERLY RESTRICTED DATA classified at least
The following will apply only if the unit sur- CONFIDENTIAL?
veyed stores or handles RESTRICTED DATA.
d. How are the RESTRICTED DATA docu-
a. Are semiannual physical inventories of TOP
SECRET documents containing RESTRICTED ments marked?
DATA submitted as of 30 June and 31 Decem-
ber? Check to be sure. e. Is each paragraph containing RESTRICTED
b. What action will be taken in the event of DATA or FORMERLY RESTRICTED DATA
compromise or possible compromise? properly annotated?
(3) Do the IIO and the SCO have additional I. Is a copy of the request for clearance or re-
duties that tend to hinder or interfere with the quest for PSI maintained in the personnel rec-
performance of their duties as IIO or SCO ? If so, ords of the individuals concerned to prevent du-
explain them. plicate requests?
(4) Identify the IIO and SCO assistants, to m. What system is used to insure cancellation
include qualifications and time in the position. of investigations when the SUBJECT is trans-
ferred, discharged, or for any reason has no need
D—27. Personnel Security Clearances for a clearance?
Administration n. Are final and interim clearances entered on
a. Who maintains the roster of cleared person- the appropriate form in the individual's person-
nel? nel records? (DA Forms 20 and 66)
b. What information is included in the roster? o. Are the clearances in accordance with exist-
ing policies and directives?
c. List any personnel who have access pending
p. Are separate name files maintained on mili-
clearance. Indicate the degree of access and na-
tary and civilian personnel on whom investiga-
ture of their duties.
tions are pending under AR 604-10 and AR
d. Who maintains certificates of clearance? 690-1, respectively?
D—8
FM 30-17
q. Is there a checklist or SOP to insure proper j. Does the debriefing process incorporate posi-
handling or processing of security risks? De- tive instructions to preclude release of classified
scribe it. defense information to unauthorized persons?
r. Are all records of military personnel consid- k. Is a copy of the Attorney General's list of
ered a security risk properly flagged ? Who main- organizations whose interests are in conflict with
tains the DA Forms 268 (Report for Suspension those of the United States posted conspicuously?
of Favorable Personnel Action) ?
I. Are all appropriate personnel receiving a
s. Are the records of all newly assigned person- SAEDA orientation? (AR 381-12)
nel screened to insure a valid DD Form 98
m. Are all appropriate military and DAC per-
(Armed Forces Security Questionnaire) ? Spot
sonnel receiving an orientation on the threat
check.
posed by, and procedure to counter, use of clan-
t. Is the number of clearances in excess of the destine listening devices by hostile agencies?
minimum consistent with the needs of the com- (AR 381-14)
mander concerned to carry out his mission?
D—29. Emergency Plan
D—28. Security Education Does the installation have an emergency plan
Is there a formal training program for security? with provisions for action in case of enemy at-
If so: tack, disaster, dispersion, evacuation, blackout,
air raid, riots, or civil disturbances?
a. How often is training conducted? Who con-
ducts the training? a. Are all personnel familiar with the provi-
sions of this plan?
b. What subjects are included in security train-
ing? b. Have practice alerts been held to test the ef-
fectiveness of the plan and the proficiency of per-
c. What is the average length of the training
sonnel in implementing it? When was the last
lecture ?
practice alert? What were the results?
d. Is attendance mandatory at security training
c. Is there an SOP for dissemination of air raid
lectures? How is attendance insured?
warning messages? Explain.
e. Is a current and correct local security policy
d. Are personnel familiar with this SOP and
in published form available to all personnel ?
the audible air raid signal?
Does it contain sufficient details and references?
Are all personnel required to read and become fa- e. Does the emergency plan include procedures
miliar with the policy? How is this enforced? for maintaining security during an emergency?
f. Are security posters available ? If so :
D—30. Morale
(1) Are they adequate in number and em-
phasis? Where are they used? a. Based upon interviews and observations, is
there any indication of low morale? Explain.
(2) Do the posters contain "eye appeal"?
b. If there are indications of low morale, deter-
(3) How frequently are security posters
mine the cause or source.
changed ?
c. Has there been any trouble of a racial, reli-
(4) Where are security posters produced?
gious, labor or political nature traceable to any
g. Are personnel required to read Army Regu- source or reason of security significance? Ex-
lations pertaining to security periodically? How plain.
often? Hpw is this enforced?
d. Is there a labor union or organization repre-
h. What type security orientation is given sented by employees of the installation? If so, in-
newly hired or assigned personnel? Who con- dicate the name and address of the local head-
ducts this orientation? quarters.
i. What debriefing program is utilized for per- e. Have there been any instances which appear
sonnel terminating their assignment or employ- to involve intentional or deliberate work delays
ment? by personnel ? If so, explain in detail.
D-9
FM 30-17
Section V. C<
D—32. Cort|munications System connecting boxes, cables, etc., protected and fre-
quently inspected for indications of wiretapping?
a. What is the primary means of communica-
How?
tions utilized on the installation?
(12) Is auxiliary power available in the event
b. What additional systems are used? of a power failure? Explain.
D—33. Security Measures (13) Are auxiliary parts available for re-
pairs?
a. Does the installatiôn have its own telephone
system or does it use a commercial system? If it (14) What measures are taken to prevent dis-
has its own system : cussion of classified information over the tele-
phone ?
( 1 ) Where are switchboards located ?
b. Is there an approved circuit on the installa-
(2) Are switchboards adequately guarded?
tion?
(3) Have switchboards been declared Res-
( 1 ) Who was the approving authority ?
tricted Areas ?
(2) Describe the approved circuit.
(4) Are operators civilian or military?
(3) What parties are connected by the cir-
(5) If civilian, how are they procured?
cuits?
(6) Are operators cleared? To what degree?
(4) When and by whom is the circuit in-
(7) Are maintenance personnel civilian or spected for sabotage or tapping?
military?
(5) What preventive measures are taken to
(8) If civilian, how are they procured? secure the circuit?
(9) Are maintenance personnel cleared? To c. If the installation uses a commercial tele-
what degree ?
phone system :
(10) Are lines overhead or underground? ( 1 ) What company provides the service ?
(11) Are open wires, terminal boxes, cross (2) What measures are taken to prevent dis-
D—10
FM 30-17
cussion of classified information over the tele- (3) Has the message center been declared a
phone? Restricted Area? Give details.
(3) What measures are taken to prevent or (4) Are message center personnel military
detect wiretapping? or civilian? If civilian, where and how are they
(4) When were previous CI technical sur- procured ?
veys or inspections conducted ? (5) Are the message center personnel
cleared? To what degree? Is this sufficient for
d. Does the installation/activity have radio the category of information handled?
communications? If so :
(6) Is someone on duty in the message center
(1) What type information is sent by radio? all times? Give details.
If classified, are code systems available? Has it
been approved by USASA ? (7) What category of classified information
is handled in the message center?
(2) Are the operators familiar with security
requirements of radio transmissions ? (8) What storage facilities are available?
(9) How is distribution made by the message
e. Is teletype or telegraph used on the installa- center? Individual pickup, courier, delivery sys-
tion ? If so : tem?
( 1 ) Where is it located ?
j. Does the installation/activity utilize a courier
(2) What security measures are taken to in- service ?
sure that classified information is not sent in the
(1) Are the couriers military or civilian?
clear?
(2) Are the couriers cleared? To what de-
/. What measures are taken to insure that op- gree?
erators are adequately cleared ?
(3) What category of classified material is
g. When are inspections conducted by USASA? carried by the couriers?
(4) Are couriers armed? With what
h. Describe other communications media used
weapon ?
on the installation. Include the safety precautions
exercised to prevent unauthorized disclosure of (5) What transportation is utilized by the
classified information. couriers ?
(6) Are couriers familiar with procedures to
i. Does the installation/activity have a message
be followed in an emergency, such as an at-
center ? If so :
tempted or actual theft of classified material, ve-
( 1 ) Where is the message center located ? hicular accident, or other incident(s) ?
(2) Give a detailed description of the mes- k. What provisions for communications in the
sage center, including measures taken to secure it event of an emergency have been made ? Describe
from unauthorized access. in detail.
D—11
FM 30-17
(1) Where is (are) the powerhouse(s) ? e. What is the water demand on the installa-
(2) How are they protected from unautho- tion?
rized access/sabotage ? f. Is the source adequate when compared to the
(3) Is the amount of power generated suffi- demand?
cient to provide an ample reserve beyond the
peak load demand ? g. What is the water pressure on the mains?
(4) Where are the substations? How are h. Are pumping stations protected? How?
they protected ? Where are they located ?
(5) Who is responsible for maintenance of 1 Are the pumps frequently inspected? When?
the power system ? By whom ?
(6) When and by whom is the power system j. Are mains, control valves, by-pass valves
checked and inspected ? protected ? How ?
(7) Explain any other measures to protect
k. How often is water tested for purification?
the power system from sabotage.
By whom ? How is the test made?
d. What is the emergency power supply? Can I. Is an emergency water source available? De-
it be actuated immediately? scribe it to include location, capacity, potability.
(1) What activities are supplied with emer-
m. What type sewer system is used? Does it
gency power? Is the emergency source sufficient
appear adequate for the needs of the
to provide the key facilities with electricity ?
installation/activity ?
(2) Who is responsible for emergency
power? Include maintenance and inspection. D-36. Heat
(3) Is the emergency power source located in
a. What is the source of heat for activities on
a secure area? Describe.
the installation/activity?
e. Is there a main blackout switch on the b. Is central heating provided? If so, where are
installation/activity? Who controls it? How is it the plants located and how are they protected ?
protected ? Where is it located ?
c. Is the heating system periodically inspected?
When, by whom ?
D—35. Water
d. Who is responsible for the heating system?
a. What is the source of water for the
Are maintenance personnel cleared if they are to
installation/activity ?
have access to sensitive areas?
b. Is the source reasonably safe ? Explain. e. Is there an emergency heating system? De-
c. If a public source is used, what is the diame- scribe it in detail.
ter of the main and where does it enter the /. Where is fuel procured ? Is it inspected to de-
installation/activity ? tect contamination? When, by whom? How is it
d. If a private system, reservoir, or tank is stored ? Where ?
used, what is its capacity, water level, pressure, g. If rooms are individually heated, what pre-
and condition? How is it secured? cautionary measures are taken to prevent fires?
D—12
FM 30-17
APPENDIX E
E—1
FM 30-17
with the dosages normally used in medical prac- panic. This variability of hallucinogenic drug ef-
tice, it does occur with the excessive doses used fect is a definite danger to users. The spontaneous
by drug abusers. A tolerance is also developed. occurrence of "flash backs" of prior hallucina-
Withdrawal symptoms usually are far more dan- tions is another harmful effect of certain hallu-
gerous than those resulting from narcotics with- cinogens, particularly LSD.
drawal. In addition to the strictly depressant
drugs, another group of drugs, tranquilizers, par- d. Narcotics. This group of drugs consists of
ticularly those in the phenothiazine derivative opium, coca leaves, as well as any preparation,
group, are frequently sought after and abused. salts and compounds of these, and synthetics de-
While they will not cause sleep except in high rived from these basic drugs. Narcotics are used
dosages, and are not purely depressive or stimula- medically to relieve pain and produce sleep or
tory, they will impair an individual's judgment drowsiness. Heroin and codeine, both of which
even to the point of complete disregard for any are derivatives of opium, are the most common
applicable security requirements. drugs in this category. Heroin is found in varying
shades from snow white to light brown, is odor-
c. Hallucinogens. This group consists of the less, and has a bitter taste; however, suspicious
so-called psychotomimetic agents, and are so white powders should not be tasted by any Spe-
named because they may produce hallucinations cial Agent as a check on the narcotic. Heroin is
or illusions of the various senses. When experi- usually taken intravenously (mainlined) but it
encing an hallucination or illusion, a person's can also be taken orally or by inhalation. An ad-
ability to perceive is based not upon objective re- dict or user who mainlines normally will have in
ality but upon distortion or imagination. Most of his possession, or accessible, the "paraphernalia"
the hallucinogenic drugs, such as lysergic acid necessary for mainlining. This normally includes
diethylamide (LSD), in illicit channels of distri- a spoon with a bent handle, matches, medicine
bution are manufactured in clandestine laborator- dropper, hypodermic needle, and maybe a rubber
ies. Legitimate chemical manufacturers do prod- tube which he will use as a tourniquet to make
uce some of the hallucinogenic drugs, but only for his vein stand out for easier injections. Dosage
investigational purposes. Some of these drugs can begin as small as 2mg a day and work up to
have been diverted to the illicit market through 450mg a day. The mere possesssion of parapherna-
thefts of illegal purchases. Although openly and lia will give civilian police and CIDC "probable
irresponsibly promoted as a means of expanding cause" to detain the suspect. An addict or user on
consciousness, the hallucinogens have yet to be heroin can manifest the following symptoms:
proven valuable medically. Hence, there are nei- lethargy, drowsiness, constricted pupils, itchi-
ther standard dosage forms nor markings which ness, constipation, upset stomach, watering eyes,
make visual identification possible. Illicit labora- runny nose. With hard narcotics, there are four
tories produce hallucinogens in the form of cap- " factors which will cause addiction. These factors
sules, tablets, powders, or liquids, which peddlers are :
and users often disguise in common personal ( 1 ) Compulsion—desire for the drug.
items, such as sugar cubes, candy, paper, aspirin,
(2) Tolerance—the increasing limits of con-
jewelry, liquor, cloth, or even postage stamps.
sumption.
Usually hallucinogens distort or intensify the
user's sense perceptions and lessen his ability to (3) Physical—the craving for the drug
discriminate between fact and fantasy. A user which will result in withdrawals when taken
may speak of "seeing" sound and "hearing" col- away.
ors. He will appear to be in a trance-like state, (4) Psychological—the belief that the drug
and will have an increase in heart rate, blood is necessary.
sugar and blood pressure. His pupils are dilated
and sensitive to light. Perceptual changes in all E-4. Indicators
senses may occur, and he may become fearful and a. Since drugs are found in common usage in
experience terror. Restlessness and sleeplessness solid, powder, and liquid forms, and taken in var-
are common until the drug wears off. The user ious forms, an investigation of a purely drug use
can have nausea, chills, flushing, irregular brea- case should be performed by qualified personnel
thing, sweating and trembling hands. Mental ef- from the local CIDC office. The CIDC has auto-
fects of the drugs are unpredictable and include matic jurisdiction over drug use, which is a crim-
illusions, exhilaration, withdrawal from society, inal offense, unless security matters override,
'ideas of violence or self-destruction, or sheer which should be rare. Indications are that be-
I
E-2
FM 30-17
cause of the control problems presented by an ad- to 10 hours and may be detected by various tests.
dict or user, hostile intelligence services will not One of the tests is a urinalysis. However, in addi-
recruit a user except on a one-time job. However, tion, there are field test kits which can be pur-
to determine if a person might be a security chased for testing of a suspicious liquid or sub-
threat as a result of drug use, the following indi- stance, but these kits will not prove the existence
cators are given : of a particular drug. They will only indicate the
(1) The physical characteristics as described possibility of its existence. Also, the average life
under each category above. expectancy of some kits is only 30 to 90 days.
(2) When a person hides pills or liquids Other drugs, like LSD, will floresce when sub-
which appear to be legitimate. jected to ultraviolet light. Special training is
needed before becoming qualified to depend on the
(3) Old prescription bottles are suspect.
various tests as accurate indicators for detection
^ (4) A name different from the suspect's on a of drugs in the body
prescription bottle.
(5) Strong odors emulating from cigarettes. E—6. Marihuana
(6) "Tracks" or tatoo appearing scars on the
arms, wrists, feet or hands which could be a re- Marihuana and cocaine are both classed as nar-
sult of mainlining. cotics from a lawenforcement standpoint and will
impose a psychological dependence on the abuser,
(7) A redness or swelling in the partition of
the nose. but marihuana is a hallucinogen while cocaine is
a stimulant for all practical purposes. Neither
(8) A sallow complexion, trembling hands,
are known to cause physical dependence or de-
dilated eyes, going on the nod or sleeplessness.
velop a tolerance; however, both are dangerous if
(9) Long periods of time in the latrine at
abused. Marihuana can cause hallucinations simi-
regular intervals, such as every 4 or 8 hours.
lar to LSD, and can produce symptoms such as
(10) Wearing of sunglasses. distortion of depth and time perception. While
(11) Sloppy appearance. under the drug, the eyes may become pink. Abu-
(12) Uncontrollable temper. sers are difficult to identify unless under the in-
(13) Long shirt sleeves on hot days. fluence of the drug. Under the influence, they
(14) Indebtedness. may appear animated and hysterical which may
(15) Unexplained affluency. be expressed by loud talk and laughter. Mari-
(16) Theft. huana will cause a loss of coordination, distortion
of visual and auditory sensations, impairment of
(17) Constant borrowing of money from co-
judgment and memory, confusion and delusions.
workers.
Hashish is a concentrated marihuana which has
(18) Inattention to dress or personal hygiene.
been created by obtaining the resin from the
(19) Association with drug users. growing plant or a similar method. Marihuana
(20) Personality changes. the drug is obtained from the plant Cannabis sa-
(21) Gaiety followed by marked depression. tiva L., and consists of the leaves, flowers, stems,
(22) Cold skin. and seeds but not the stalk. Marihuana plants are
(23) Possession of blank or undated prescrip- bisexual, and can be positively identified under a
tion forms. microscope since it is profusely covered with fine
hair, but better identification can be made from
b. It must be remembered at all times that the leaves, seeds, and seed hull even if the plant
some individuals have a legitimate need and use has been finely crushed. The most distinctive
for drugs such as a diabetic, or an individual identification is the cystolith hair on the upper
with thyroid problems. Any suspicious activity on
side of the leaflet consisting of a stalectic and a
the part of an employee or soldier where doubt
gradular hair. Visually, identification can be
still remains should not be investigated by mili-
made by inspecting the plant. Basically, the
tary intelligence but by the CIDC.
leaves are compound, and normally consist of
from five to eleven leaflets with seven an average.
E—5. Detection
The stalk will grow from 3 to 16 feet in height
Drugs in the usual dosages taken by addicts will with an average height of 4 to 6 feet. The leaves
remain within the individual's system for about 8 are jagged in appearance.
E—3
FM 30-17
INDEX
lndex-1
FM 30-17
Index—2
FM 30-17
lndex-3
FM 30-17
lndex-4
FM 30-17
Index—5
FM 30-17
Index—6
FM 30-17
Index—7
FM 30-17
lndex-8
By Order of the Secretary of the Army:
W. C. WESTMORELAND,
General, United States Army,
Official : Chief of Staff.
VERNE L. BOWERS,
Major General, United States Army,
The Adjutant General.
Distribution :
To be distributed in accordance with DA Form 12-11 requirements for Counterintelligence Op-
erations, Intelligence Corps, US Army.
V-
m
m'f
ïl^-
=0
¡1^
15
=0
SO
iO
-en