61
FM 30-17 APPENDIX A R~FERENCES A-l. Army Regulations (AR) 15-6 Procedure for Investigating Officers and Boards of Officers Conducting Investigations. 27-45 Releaseof Information and Appearance of Witnesses. 50-2 Nuclear Weapon Accident and Incident Control (NAIC). 50-3 Personnel Security Standards for Nuclear Weapons Duty Positions. 55-203 Movement of Nuclear Weapons, Nuclear Components, and Related Classi- fied Non-nuclear Materiel. 105-31 MessagePreparation and Processing. 135-380 Releaseof Classified Information to Army National Guard, United States Army Reserve, and Reserve Officers' Training Corps. 190-22 Search, Seizure, and Disposition of Property. 190-60 Physical Security Standards for Nuclear Weapons. 195-6 Department of the Army Polygraph Activities. 195-10 Military Police Criminal Investigative Activities. 230-2 PersonnelPolicies and Procedures. 310-25 Dictionary of United States Army Terms. 310-50 Authorized Abbreviations and Brevity Codes. 340-2 Maintenanceand Disposition of Records in TOE Units of the Active Army and the Army Reserve. 340-15 Preparing Correspondence. 340-16 Safeguarding "For Official Use Only" information. 360-28 Guidance for Conduct of Information Actions in Support of Army Air Defense Command Missile Program. 360-65 Establishment and Conduct of Field Press Censorship in Combat Areas. 360-81 Command Information Program Ob,iectives and Policies, Publications, and Armed Forces Radio and Television. 380-series Security. 381-series Military Intelligence. 405-10 Acquisition of Real Property and Interests Therein. 600.,.3 Women's Army Corps-General Provisions. 600-20 Army Command Policy and Procedure. 600-31 Flag Control Proceduresfor Military Personnelin National Security Cases and Other Investigations of Proceedings. 604-series Personnel Security Clearance. 606-series Personnel Identification. 611-15 Nuclear Duty Position Reliability Program (Reports Control Symbol OPO-133). " (0)614-31 Assignment and ~ravel Restrictions. (C) 614-32 Restrictions of fssignment and Travel of PersonnelHaving Access to Spe- cial Intelligence (U). A-1

APPENDIX A R~FERENCES - Murdercube.com Arms/fm30_17part4.pdfField Wire and Field Cable Techniques. ... Techniques (U). Special Forces Operations-US Army Doctrine. Special Forces Operations-US

  • Upload
    hangoc

  • View
    219

  • Download
    0

Embed Size (px)

Citation preview

FM 30-17

APPENDIX A

R~FERENCES

A-l. Army Regulations (AR)

15-6 Procedure for Investigating Officers and Boards of Officers ConductingInvestigations.

27-45 Release of Information and Appearance of Witnesses.50-2 Nuclear Weapon Accident and Incident Control (NAIC).50-3 Personnel Security Standards for Nuclear Weapons Duty Positions.55-203 Movement of Nuclear Weapons, Nuclear Components, and Related Classi-

fied Non-nuclear Materiel.105-31 Message Preparation and Processing.135-380 Release of Classified Information to Army National Guard, United States

Army Reserve, and Reserve Officers' Training Corps.190-22 Search, Seizure, and Disposition of Property.190-60 Physical Security Standards for Nuclear Weapons.195-6 Department of the Army Polygraph Activities.195-10 Military Police Criminal Investigative Activities.230-2 Personnel Policies and Procedures.310-25 Dictionary of United States Army Terms.310-50 Authorized Abbreviations and Brevity Codes.340-2 Maintenance and Disposition of Records in TOE Units of the Active Army

and the Army Reserve.340-15 Preparing Correspondence.340-16 Safeguarding "For Official Use Only" information.360-28 Guidance for Conduct of Information Actions in Support of Army Air

Defense Command Missile Program.360-65 Establishment and Conduct of Field Press Censorship in Combat Areas.360-81 Command Information Program Ob,iectives and Policies, Publications, and

Armed Forces Radio and Television.380-series Security.381-series Military Intelligence.405-10 Acquisition of Real Property and Interests Therein.600.,.3 Women's Army Corps-General Provisions.600-20 Army Command Policy and Procedure.600-31 Flag Control Procedures for Military Personnel in National Security Cases

and Other Investigations of Proceedings.604-series Personnel Security Clearance.606-series Personnel Identification.611-15 Nuclear Duty Position Reliability Program (Reports Control Symbol

OPO-133). "

(0)614-31 Assignment and ~ravel Restrictions.(C) 614-32 Restrictions of fssignment and Travel of Personnel Having Access to Spe-

cial Intelligence (U).

A-1

FM 30-17

633-50633-51640-20640-98

690-1(0)700-65710-2930-5

Prisoners of War; Administration, Employment and Compensation.Civilian Internees Administration, Employment and Compensation.U.S. Army Intelligence Badges and Credentials.Filing of Adverse Suitability Information in Individual Records and Re-

view of Intelligence Files Consulted Prior to Taking Personnel Action.Civilian Applicant and Employee Security Program.Nuclear Weapons and Nuclear Weapons Materiel.Materiel Management for Using Unit, Support Units, and Installations.American National Red Cross Service Program and Army Utilization.

,

Army Subject Schedule (ASubjScd)

19-29 Collection and Preservation of Evidence.

A-3. Department of the Army Pamphlets (DA Pam)

27-1 Treaties Governing Land Warfare.27-100-series Military Law Review.27-161-1 International Law, Volume I.108-1 Index of Army Motion Pictures and Related Al1dio- Visual Aids.310-1 Index of Administrative Publications.310-3 Index of Doctrinal, Training, and Organizational Publications.310-4 Index of Technical Manuals, Technical Bulletins, Supply Manuals, Supply

Bulletins, and Lubrication Orders.380-1 Commander's Handbook on Security.

'.

Field Manuals (FM)

3-103-125-205-255-30(C)5-3111-4019-series20-3221-621-2621-3021-3121-4021-5024-1824-2030-series31-1631-20(C)31-20A31-21(S)31-21A

Employment of Chemical and Biological Agents.Operational Aspects of Radiological Defense.Camouflage.Explosives and Demolitions.Engineer Intelligence.Booby traps (U).Signal Corps Pictorial Operations.Military Police.Landmine Warfare.Techniques of Military Instruction.Map Reading.Military Symbols.Topographic Symbols.Chemical, Biological, Radiological and Nuclear Defense.Ranger Training and Ranger Operations.Field Radio Techniques.Field Wire and Field Cable Techniques.Military Intelligence.Counterguerrilla Operations.Special Forces Operational Techniques.Special Forces Operational Techniques (U).Special Forces Operations-US Army Doctrine.Special Forces Operations-US Army Doctrine (U).

FM 30-17

31-22

(8)31-22A(C)31-4031-73

31-85(8)32-1

(C)32-5

(8)32-1041-5

41-10

100-series

101-series

u.s. Army Counterinsurgency Forces.U.S. Army Counterinsurgency Forces (U).Tactical Cover and Deception (U).Advisor Handbook for Stability Operations.Rear Area Protection Operations.Signal Intelligence, U.S. Army Doctrine (U). (To be published.)Signal Security (SIGSEC) (U).USASA in Support of Tactical Operations (U).Joint Manual for Civil Affairs.Civil Affairs Operations.Field Service Regulations.Staff Officers.

A-6.

Other References

(C) SR 380-350-2TB (PMG-series)TM 11-401TM 30-seriesTOE 30-series

Captured Enemy Documents (U).Provost Marshal General.Elements of Signal Photography.Military Intelligence.Military Intelligence.

A-3

FM 30-17

APPENDIX B

INVESTIGA riVE REPORTS

Section I. GENERAL

these reports are general enough so that very lit-

tle deviation therefrom would be necessary in thefield unless unusual situations exist. Since all re-

ports presented herein are standardized, a reportprepared by a Special Agent in one part of theworld will be understood by a Special Agent inanother part of the world if all rules are fol-

lowed.

8-1. IntrodudionThe basic format for Agent Reports, Reports ofInvestigation and Summaries of Information willbe completed as described in the appropriate sec-tions of this appendix and chapter 7. Figures areused to show graphically how each type of reportis to be completed.

8-2. ApplicationThe purpose, use and rules of preparation of

Section II. THE AGENT REPORT (DA FORM 341)

B-3. Rules of Preparation

a. General. Each Special Agent will write hisown reports. Supervisors may edit for clarity, butmust not alter the basic meaning or intent. Over-printed Agent Report forms with spaces to befilled in with appropriate data may be used to ex-pedite the reporting of routine records checksand, in completely favorable cases, the recordingof results of interviews with listed and developedcharacter references. Agent Reports are normallywritten in narrative style, third person, simplepast tense, and active voice, except when quotingthe source or indicating a state of mind or condi-tion. The use of simple, direct, standard Englishfacilitates comprehension and reduces the risk ofmisinterpretation. Slang expressions, colloquial-isms, vulgarisms, and technical or trade termsshould be avoided. Expressions which reflect ap-proval or disapproval by the Special Agent of theoccurrences, persons, or objects being describedshould not be used. Statements should be suchthat they may be verified through independent in-vestigation by checking records or other crediblesources of information. Agent Reports must indi-cate what the Special Agent determined, notwhat he did. The detailed techniques and proce-dures used to develop the information will not bedescribed in the Agent Report; they will be madea matter of local record through operational re-

porting procedures prescribed by the unit com-mander (fig B-1).

b. Identity of Persons or Organizations.

(1) The surname of the person, or the name,abbreviation, or short title of the organizationwhich is the subject of an investigation will bewritten in upper case letters throughout all re-ports. The word "SUBJECT" written in uppercase letters may be used as a substitute for thename of person or organization in the body of thereport. When personal pronouns are used whichrefer to SUBJECT (e.g., HE or SHE) the pron-ouns will be written in upper case letters. Thenames of persons and organizations not the sub-ject of investigation will be written with normalcapitalization. After first being fully identified,the person being interviewed may be referred toas "Source." The word "Source" in this usage isalways a proper noun.

(2) Each investigative document will posi-tively identify persons who are the subjects of in-vestigations or who are of sufficient intelligenceinterest to be considered cosubj ects as defined inAR 381-45 by including full name, aliases,maiden names, sex, date and place of birth, andsocial security account number, occupation, andaddress. All other persons mentioned in investi-gative documents will be identified by full name,

B-1

FM 30-17

(AR 3'1-130; FAr 30017)---"-"--~.

2. DATE SUlMlnED

14 December 1971~. CONTa~ $YM'Ol oa filE HUM'Ea

458-58-5821

I -Of $utJ£CT oa TITLE Of INCIDENT

DOAKES, John Q.MSG,458-58-5821'AKA:

GREEN, Anthony G.DPOB: 18 March 1923, ,Richmond,_y.J::.!:.~~~4 RfroRT 0' '~1NG5

(2 Line Spaces)

(START ON THIS LINE) This line is started on the third line from theabove black line. Indent five spaces from left margin to type phase designa-tion.. Keep left margin no more than one letter space from left margin. Leaveright margin a minimum of 3/4". This leaves enough space to enter the wordLEAD, if applicable. (LEAD)

(1 Line Space)When there is more than one paragraph in the report, double-space between

paragraphs. Exhibits will be shown in the body of the report as (EXHIBIT~.The number is omitted by t~peCial Agent in the field, and a Roman numeral willDe entered by the Control 't;ir:g.

(' ~ ~~

(HEARSAY INFORMATION), .,.

report.

(1

Line Space)contained in a separate paragraph of the

AGENT'S NOTES:the report.

'- Line Spaces)Indent five spaces \1' begin two spaces below the body of

(5 Line spa~

E

When the report is too long to be contained on a singlepage, two line spaces must be left at the bottom of thepage. The word (continued) will be typed in the lower

right-hand corner of Block No.4.

(2 Line Spaces)

(continued)

if necessary

S. TYPfD NAM( AND OAGANIZATION Of $PfCI~ AGfNf

JOHN Q. AGENT, 11Sth MI Group

6. $IGNATUaE Of $PE(IAI. AGENT

/s/ John Q. Agent

D

A fORMI .'. ~2 U'lACES WD ACO fO... 3". 1 JUN 47. WHICH MAY IE USEP

Figure B-1, Agent Report Format.

B-2

FM 30-17

occupation, and address. Elements of a propername which cannot be determined from source orfrom telephone books, directories, and similarreferences will be indicated by: "fnu" (first nameunknown) in lieu of the given name, "NMN" forNo Middle Name, "10" for Initial Only, and"LNU" (Last Name Unknown) in lieu of the sur-name. Names will be written in accordance withthe custom of the country of which the person isnative. (For example, some oriental names arewritten with the surname first.)

(3) Once a person has been identified fully,as indicated above, he or she will be referred tothereafter only by surname (without any titlessuch as Mr., Mrs., Dr., or Professor), unlessthere is more than one person with the same sur-name mentioned in the same Agent Report.

c. Numbers. Numbers from one to ten, inclu-sive, except in dates, addresses, or military unitdesignations, will be spelled out. All other num-bers will be written in arabic numerals. In thecase of money, numerals will be used regardlessof the amount. Rather than writing $10.00, write$10.

d. Time. The military form will be used (e.g.,1605 hours).

e. Dates. The military form will be used (e.g.,26 January 1967). The names of months will bespelled out in full. Significant conflicts in dateswill be resolved by investigation before cases areconsidered complete. Unexplained overlap indates sometimes occurs when persons completingpersonal history statements and persons main-taining employment, education, and similar rec-ords, fail to show part-time employment, part-time attendance at ed'ucational institutions,breaks in employment, residences, etc.

f. Addresses. Addresses will be as complete aspossible and written in the manner in which theyare written in the United States. The names ofcities, towns, counties, or other political subdivi-sions less than a state, will be written out in full.In foreign countries the use of UTM coordinatesfor cities, towns, or other locations is encouragedwhen necessary for positive identification. Repeti-tious or unnecessary use of coordinates should beavoided.

g. States and Countries. The name of a statewill be spelled out when it first appears in a re-port. Subsequently, the state may be abbreviatedif it is used as part of an address, except that astate name with five letters or less will not be ab-breviated. The names of countries other than the

United States of America (US) and the Union ofSoviet Socialist Republics (USSR) will not be ab-breviated.

k. Abbreviatiom. Abbreviations should be keptto a minimum. Standard military abbreviations,as outlined in AR 310-50, or standard civilian ab-breviations as given by a "desk" or "collegiate"dictionary may be used in an address or as ameans of identity; e.g., CPT for Captain (no pe-riod is used) or Dr. for doctor (a period is used).When brevity is appropriate, the title should bespelled out when used the first time in the reportand the abbreviation or short title placed in par-entheses directly after it; thereafter, throughoutthe report the abbreviation or a short title maybe used without parentheses; e.g., Johns HopkinsUniversity (JHU), and later only JHU.

i. Standard Capitalization. The initial letters ofproper nouns should be capatalized, such asJames H. Brown, Captain, Infantry, 01925940,Commanding Officer; William F. Jones, Professorof English; Howard Snow, Vice-President, theUniversity of Missouri; SUBJECT joined theProgressive Party; SUBJECT studied English,French, political science, history, and philoso-phy; HE moved to the West Coast; in the Sum-mer of 1959, HE entered the US Army, but HEreceived a discharge in the Fall of 1959.

j. Units of Measure. Units of measure used inreports will be those given by the source. An ap-proximation of conversion of the indicated mea-sures stated in terms of the United States systemof weights and measures will follow in par-entheses. Whenever measurements must be madeor estimated by the Special Agent, they will bestated in terms of the United States system ofweights and measures.

k. Titles and Foreign Terms. In titles of publi-cations, ships and plays, capitalize the first andall words except articles, prepositions and con-j unctions. Foreign terms normally should beavoided; however, if used, they should have theEnglish translation placed within parenthesesfollowing the first usage; e.g., Arbeitsamt (LaborOffice). When printed, foreign words andphrases, titles of books, plays, magazine names,newspaper names, and names of ships are itali-cized, but when typewritten, they are underlined.

l. Reporting Interviews. Statements made byinterviewees normally will be reported in SUD-stance.

m. Quotatiom. Quotations present exceptions tothe foregoing items. Whenever a verbatim quota-~

B-3

FM 30-17

items being tabulated. Use open punctuation; i.e.,no end punctuation should be used in any tabula-tions. The left-hand column of items should be in-dented five spaces from the left margin. If anytabulated item in this column requires more thanone line, the additional line or lines are indentedthree additional letter spaces within the column.The right-hand column of items should be typedtwo spaces to the right of the longest item in theleft-hand column. Any item in this column whichrequires more than one line will be typed withoutadditional indentation. Subparagraph numbers orletters are not used with the items being tabu-lated (fig B-2).

tion is placed in a report, it will be written ex-actly as it was stated by source except that SUB-JECT's last name or a substitute which refers toSUB.JECT will be in upper case letters. Whentaken from a document, the quotation will be cop-ied exactly, including misspellings or grammati-cal errors which will be called to the reader's at-tention by the use of the Latin word "sic," mean-ing "thus," immediately after the error.

n. Hmrsay Statements and Opinions. State-ments of this nature should be used primarily asthe basis for further investigation, and if rele-vant and material to the issue, should be con-firmed or disproved if possible.

o. Physical Descriptions. When it is necessaryto physically describe individuals mentioned inAgent Reports, a complete physical picture of theindividual should be presented (FM 19-20). Be-cause the information and characteristics foridentifving persons lends itself well to tabulation,the following format may be used:

Name:

Age:

Sex:

Race:

Height:

Weight:

Build:

Other specific information or physical character-istics may be woven into this sequence or addedto the sequence when data is available. In addi-tion if an Identikit was used, the montage codescan be tabulated to permit any other agency toreassemble the composite likeness of the subject.All the montages used in the composite must belisted. Offices not having an Identikit may beable, throuf{h liaison, to have another investiga-tive or intelligence agency to reassemble the com-posite.

p. Tabulated Material. Although Agent Re-ports normally are written in narrative style,there are times when material can best be pre-sented in tabulated form. Descriptions, certainrecords checks, and lists of persons and ad-dresses, for example, may be tabulated to the ad-vantage of both writer and reader. All 201-filechecks and birth records checks should be re-ported in tabulated form. Tabulated material willbe presented in the following manner: One linespace will be provided between the body of thereport and the tabulation, but none between the

8-4.

Format

DA Form 341, the Agent Report form, has beendesigned to facilitate recording the results of in-vestigative activity in a uniform, well-organizedcomplete fashion.

a. Block No.1, Title Block. The title block foran Agent Report is always the same as the titleblock of the pertinent request for investigationexcept that any aliases or other essential data de-veloped as a result of the investigation also willbe inserted. All cases which are closely relatedshould bear cross-references. Such cross-refer-ences are entered in Agent Reports as prescribedby local procedures. Leads or other informationreported in an Agent Report do not affect thetitle block. If a Special Agent originates anAgent Report in cases where there is no pertinentLead Sheet or other request for investigation, anappropriate subject or title will be inserted. Thesubject block of the Agent Report will be pre-pared as follows:

(1) Persons. Subject blocks will contain incolumnar arrangement: SUBJECT's name, rankand social security number (SSN), any othernames (i.e., aliases, pen names, etc.), and dateand place of birth (all on one line) as in the fol-lowing examples:

(a) BURNS, John E.LTC, 561-54-6706AKA: Green, Anthony T.DPOB: 25 December 1925, Athens,

Ohio(b) JONES, Mary Ann

NEE: WilliamsSSN: 212-40-2306DPOB: 10 September 1945, Reno, Ne-

vadaOpen punctuation is used in the subject l;~\)rk.

(2) Organizations. In the investigation of or-

B-4

FM 30-17

AGENT REPORT.--(AR 381-130; FM 3D-17)

2. DATE SUBMITTED

14 December 1971.3. CONTROL SYMBOl OR Fll£ NUMB£R

i 458-58-5821

) NAMf Of SUIJECT OR TITLE Of INCIDENT

DOAKES, John A.MSG, 458-58-5821AKA: GREEN, Anthony G.~POB:

18-.-J:!~h1923,.Richmond,

y!rp;inia

.RfPO~T OF FINDINGS

(LISTED CHARACTER REFERENCE) *(DEVELOPED CHARACTER REFERENCE) *

DATE INTERVIEW CONDUCTED:a.

b. INTERVIEWEE :

OCCUPATION

c.

d.

h.

Type of Contact

1.

Degree of Association

p

j.

Last Seen

k.

Names

of Parents & Siblings

1.

Marital Status L

Residencesm.

Educationn.

EEmploymento.

p.

Character & Reputation

q. Honesty and Integrity

r.

Personal & Financial Habits

s.

Mental Stability and Maturity

t. Political Proclivities

(continued)

$. TYPED NAME AND ORGANIZATION Of SPECIAL AGENT

JOHN Q. AGENT, 115th MI Group6. SIGNATURE Of SPECIAL AGENT

/s/ John Q. Agent

DA 1'~:"52 341 REPLACES WD AGO fORM 3.1.1 JUN .7, WHICH MAY IE USED

Figure B-1. Columnized Agent Report.

8-5

FM 30-17

AGENT REPORT: (LCR) RE:of Interviewee(s»

Subject's name; DPOB; Date of Report, (Names

4. REPORT OF FINDINGS:

Organizationsu.

Foreign Travelv.

w. Relatives in Foreign Countries

Loyalty

x.y.z.

aa.

~Use only

E

page

2 ofSignature of Special Agent,

Fig~re B-!. Continued.

ganizations, the subject block will contain thename and, if applicable, the address of the organ-ization. The name will be written entirely inupper case letters and may be followed by an ab-breviation or short title to be used in the reportas a substitute for the organization's name. Careshould be taken to insure that the abbreviation orshort title chosen is not ambiguous or misleading.When a foreign organization is the subject of aninvestigation, or when it appears as a possible

lead, it is recommended that the following itemsof identity be included at least once in the body ofthe report:

(a) Full title in English alphabet charac-ters and in native writing (for non-Latin namesonly).

(b) English translation (for all foreignlanguages) and short title, when appropriate.

(c) Former name or names (when defi-nitely known).

B-6

FM 30-17

graphs of classified reports will be marked in ac-cordance with AR 380-5. Numbering of reportsnormally will be done by the office preparing theReport of Investigation (fig B-3).

(2) PhMe designation. In background inves-tigations, the first item in the first paragraph ofthe Agent Report will be the designation of thephase of the investigation most applicable to thatreport. Normally, the Agent Report is the writ-ten result of a single investigative activity; thatis, one report will be devoted to each source of in-formation. Occasionally, reports concerningsources that satisfy the same investigative phasemay be included on the same form. For example,a verification of education by records check andan interview with a former teacher or classmate-both activities conducted by the same agent atthe same school-may be included on the sameform since both concerned the education phase.VVhere more than one such report appears on apage, five spaces will separate the reports, andeach will begin with the phase designation. Thereis an exception to the requirement that one AgentReport will be a record of a single investigativeactivity; when interviews of several persons(again satisfying the same investigative phase)concerning the same individual or the same inci-dent produce subs~ntially the same favorable in-formation, these interviews may be combined intoone Agent Report. Each interviewee must be com-pletely identified, and the duration and extent ofhis knowledge of SUBJECT or of the incidentmust be stated. However, when adverse, deroga-tory, or cdnflicting information is obtained, eachreport will be recorded on a separate report form.The first paragraph of each report will beginwith the phase designation in upper case lettersenclosed in parentheses. Generally, the phase des-ignation covers that part of SUBJECT's life ofwhich the source has most knowledge. Followingare some of the standard phase designation head-ings:

(NATIONAL AGENCY)(NATIONAL AGENCIES)(LOCAL AGENCY)(LOCAL AGENCIES)(MILITARY SERVICE)(MEDICAL RECORDS)(201.FILE CHECK)(CIVILIAN PERSONNEL RECORDS)(CITIZENSHIP)(BIRTH)(LISTED CREDIT REFERENCE)(DEVELOPED CREDIT REFERENCE)(LISTED CHARACTER REFERENCE)(DEVELOPED CHARACTER REFERENCE)

(d) Address (headquarters, branch, oroffice, as applicable).

(e) Nationality, when needed for betterunderstanding.

(3) Incident. The investigation of an inci.dent is a specialized type of investigation. The in-cident case title should answer three questions inthe following order: what, where, and when. Inincident cases, normal capitalization will be usedfor each word except that prepositions, articles,and conjunctions, when not the first word of atitle, will not be capitalized. Although incidentcases eventually may involve known persons, orperpetrators may be revealed, the initial title ofan incident case should not be changed. This doesnot preclude opening a separate case with a newindividual title on a person mentioned in an inci-dent case if the new case concerns activity not apart of the incident case.

b. Block No.2, Date Submitted. The date thereport is prepared by the Special Agent is en-tered in normal military style without abbrevia-tions.

c. Block No.9, Control Symbol or File Number.This space will contain the file or dossier numberof the investigation as prescribed by AR 381-45and assigned by the Control Office.

d. Block No.4, Report of Findings.

(1) Format. The report will start on thethird line space from the black line at the top ofblock No.4, thus leaving two blank lines at thetop of block No.4. Also, when the report is toolong to be contained on a single page, two blanklines must be left at the bottom of the page, andadditional DA Forms 341 may be used or plainbond paper 8 x 10 1/2 can be used as illustratedin figure B-2. A margin of no more than one let-ter space from the vertical black line on the leftside of the page and a minimum 3/4-inch marginfrom the black line on the right side of the pagewill be maintained at all times. The first line of aparagraph should be indented five spaces fromthe left margin; a double space is left betweenparagraphs.

Proper paragraphing and spacingare illustrated in sample reports included as fig-ures to this appendix. The blocks Nos. 1, 2, 3, 5,and 6 will be completed in full on all pages if DAForm 341 is used. If bond paper is used, the ex-ample as shown in figure B-2 is mandatory. Asystem for numbering of pages may be prescribedin the unit SOP. Unless otherwise instructed,Special Agent will not number Agent Reports orthe paragraphs of the report; however, para-

8-7

FM 30-17

~:J30IPM 30-11)I ', DATE SUIMITTEO

15 J~nu~1;:..v~~1. NAM! Of SUBJECT OR ToTtE Of INCIDENT

GREER, John A. IIDAC, Adm Asst, GS-12; G1, SSAN: 063-36-2179DPOB:

7 May 1924, Bayside, New York3. CONTRO( SYM80( OR FKE NUMBER063-36-2179

4. REPORT Of fINDINGS

(EDUCATION) On 14 January 1964, the following persons were interviewed,separately, concerning John A. GREER II, at the College of Business, ~1iddle StateUniversity, 2460 Hyde Park Boulevard, Chicago, Illinois, and they furnished sub-stantially the same information:

James J. Collins, Assistant Professor, 319 Edward Street, Chicago, who knewSUBJECT from 1946 to 1950 as a classmate.

Henry C. Adams,as a classmate from:

.217 Oakda1e Avenue. Chicago. who knew SUBJECT

1950.

John R. Williford, ~onne1. Director, 1 Wilson Avenue, Chicago, who knewSUBJECT as a student from 1946~to 1950.

Sources had no social; with SUBJECT and were only associated with HIMin an educational capacity. .neither seen nor corresponded with GREERsince

the Sununer of 1951 when they m;.t at;. a class reunion on the university campus.

received an award in HIS senior year for.HE was well liked by students and

ITH-, at college. HE held a part-time~onal information concerning HIS

SUBJECT was an exceptional &:tudejwriting an article on "cost-plus" '.faculty. HE belonged to no organization.job with a construction firm in Chicago.employment is not known.

,

SUBJECT's closest associate while at school '~as Harry L. Waldrop, 4433 WestAlameda Parkway, Des Moines, Iowa, who was an acc lunting major with whom HE didmuch of HIS research at the university. HE was a~closely associated withBarbara M. Koncher, 320 South Beach Street, Atlanta, Geor~ia, a member of the ChiAlpha

sorority, whom HE dated frequently. (LEAD)

,ESources had no reason to question GREER'S moral cnaracter, honesty or trust-worthiness. SUBJECT never made any statement or performed any act, in Sources'

presence, that would be considered inimical to the best interests of the UnitedStates. HE indulged in the moderate use of alcholic beverages. Sources had noknowledge of SUBJECT'S financial reliability; however, they have never heardanything unfavorable concerning HIS financial status. To the best of Sources'knowledge, SUBJECT has never traveled outside the United States and HE has norelatives or financial interests in any foreign country.

(continued)

5. TYI'ED NAME AND ORGANIZATION Of SflECIAI. AGENT

JOSEPH S. ANDERS, 113th MI Group Isl Joseph S. Anders

D A fORMI ..PR 52 REPLACES WD AGO FORM 3.', 1 JUN .7, WHICH MAY IE USED

Figure B-3. Example of a completed Agent Report.

8.-8

FM 30-17

7 May 1924,Collins, Adams,

AGENT REPORT: (EDUCATION) RE: GREER, John A. II, DPOB:Bayside, New York, dated 15 January 1964 (Interviewees:Williford).

Sources recommended that John A. GREER II be considered for assignmentto a position of trust and responsibility with the US Army.

K

pL

E.

Page 2 of 2Signature of Special Agent,

Figure B-8.-Continued.

8-9

FM 30-17

tion of record; office or other location; name andposition of the person who sought the record ormade it available (Special Agent must indicatewhether he personally examined the record or ifthe information was orally furnished to him),full identity of the record; i.e., volume, title,page, date, or similar appropriate informationwhen available (fig B-4).

5. Raids, searches and seizures. The dateof the activity; identity of persons and/or unitsconducting such activity; and authority for suchactivity. In searches or seizures, the name of thewitnessing officer (usually the individual's com-manding officer or his designated representative)will be included.

6. Attempt. Phase designation; date ofattempt; identity of intended interviewee or re-cord (as above); identity of person(s) spoken to;reason why intended interviewee or record wasnot available; and any possible leads. The expla-nation should clearly indicate that all possibili-ties to locate the intended source of informationwere exhausted (fig B-5, B-6).

7. Confidential source. Confidentialsources who have been coded for security pur-poses will not be identified nor will informationor phraseology tending to identify, pinpoint, orcompromise them appear in investigative reports.Confidential sources will be referred to only bytheir designated code or symbol, e.g., sourceR-S-17. The source of the information will bementioned only once in the Agent Report andthat will be in the introductory element. To assistin the evaluation and adjudication processes, theSpecial Agent will indicate by word picture thedegree of reliability of the source when submit-ting information derived from them. Where theword picture proves inadequate in determiningreliability, additional clarifying comments maybe made in the introductory element or in Agent'sNotes. The word picture, which may be used onlyfor coded confidential sources, may be as outlinedbelow though not necessarily confined to theseexamples:

The Special Agent will occasionany have need forphase titles to fit particular situations such as(NEIGHBORHOOD CHECK), (SURVEIlrL.\NCE), or (SUBJECT INTERVIEW). To fa-cilitate review the agent may have need of multi-ple phase titles, such as (BIRTH-EDUCA-TION), (EMPLOYMENT-DEVELOPMENTCHARACTER REFERENCE), or (EMPLOY-MENT COWORKER).

(3) The body of the Agent Report. Here isrecorded the information obtained by investiga-tive effort. The Special Agent must organize thefacts and present the information in a clear andlogical manner, insuring that the information isaccurate, complete, pertinent, clearly phrased,unbiased, and concise.

(a) IntrodJuctory element. The first sen-tence or paragraph of each Agent Report isknown as the introductory element. The introduc-tory element must contain, as appropriate, thecomplete identities of the individuals interviewed,the custodians of files checked, the records them-selves, official and home addresses, and accuratelocations of files checked. A secondary purpose ofthe introductory element is to permit the retrac-ing of any previous investigative effort at a laterdate should it be necessary. An introductory ele-ment win include specific items of informationarranged in the fonowing manner:

1. Interviews (bMkground investigartions). The phase designation; date of interview;identity of interviewee (to include fun name, oc-cupation, complete address, SSN, and, in the caseof military personnel, fun name, grade, branch ofservice for officers, SSN, position or job title, andcomplete official address) ; and place of interviewif other than address listed. The period of knowl-edge, and the relationship of the interviewee toSUBJECT will be stated briefly.

2. Interviews (incident investigations).Date of interview; complete identity of source;place of interview; and, if applicable, the reasonfor interview.

9. Surveillance. The date, duration, type,name of subject of surveillance (if other thanSUBJECT, and an possible identifying data con-cerning the person or persons under surveil-lance); place; and identity of person or personsconducting the surveillance. If the situation ne-cessitates protection of the id~ntity of the personor persons other than Special Agents conductingthe surveillance, a coded reference will be pre-scribed.

(a) Source, who has furnished reli-able information in the past. ..

(b) Source, who has furnished infor-mation corroborated in part or in whole by othersources. ..

(c) Source, whose reliability is un-known, but who has been an acquaintance ofSUBJECT for the past 5 years. ..

(b) Information obtained. Following theintroductory element, a new paragraph will con-tain the information obtained by the investigative

4. Record checks. Phase designation (inbackground investigations) ; date of check; loca...

R-10

FM 30-17

c A~tUTDtDnDTrAGENT REPORT

---(AR 381-130; FM 3~11) ~.I

~, OATE sua.-mEO

15 December 19703. CONTaOL $YMIOL O. fiLE NUMIER

458-58-5821

I NAME Of SuaJECT 01 TITlE Of INCIDENTDOAKES, John A.MSG,

458-58-5821DPOB: 18 March 1923. Richmond. Virginia

4 REPORT Of f~INGS

(LOCAL AGENCY) On 15 December 1963, records checks concerning John A. DOAKESwere conducted at the following listed agencies with the results as indicated:

Police

Department, Baltimore, Maryland

No

Record

Baltimore

Office, FBI, Baltimore. Maryland

No

Record

Provost Marshal's Office, Ft. Holabird, Md. No Record

~J

L

S. TYP!O NAME ANO OtGANIZATION Of $PECIAL AGENT

JOHN Q. AGENT, lO9th MI Group

O. SIGNATURE Of SPECIAL AGENT

/s/ John Q. Agent

D

A fORMI A" 52 REPLACES WD AGO fORM 30'. I JUN 07. WHICH MAY IE USED

Figure B-1,. Example of a LAC-Type agent report.

8-11

FM 30-17

AGENT REPORT(AR 381-130; FM 30-11)

~~-

2. O.T£ SUaMITT£O14 December 1970

3. CONTROl SYM&Ol OR filE NUMIER

458-58-5821

1 NA'" Of SUIJICT 01 Tlllf Of INCIOfNT

DOAKES, John A.MSG, 458-58-5821DPOB:

18 March 1923, Richmond, Virginia

4 RE'OIT Of fNOINOS

(LISTED CHARACTER REFERENCE) On 14 December 1970, an attempt was made tointerview Mr. Leslie J. Warren, 2317 St. Paul Court, Seattle, t~ashington, concern-ing John A. DOAKES. Mrs. Ray Smallwood, owner of the building, 2317 St. PaulCourt, Seattle, stated that Warren had moved from that address in February 1969.His forwarding address is 516 Flagstone Avenue, E1 Paso, Texas. (LEAD)

,"',~""-'...

f\

p--

S. rv'£D NAME AND oaGANIZATION Of SP£CIAI. AGENT

JOHN Q. AGENT, 115th MI Group6 SIGNATURE Of SPECiAl AGENT

/s/ John Q. Agent

DA fORMI APR 52 REPLACES WD AGO fORM 341,1 JUN 47, WHI"" ~~y I: :lSi;.,

Figure B-5. Ezample of an attempt-type agent report (Lead).

8-12

FM 30-17

(AR 381-130/ FM 30-11)

2. DATE SUtMITTED

14 December 19703. CONTROL SYM80L OR FILE NUM8ER

458-58-5821

I NAM! Of SUaJ£CI 01 TII~£ Of INCIO£NT

DOAKES. John A.MSG.458-58-5821DPOB:

18 March 1923. Richmond. Virginia

4. REPORT Of FINOI~S

(NEIGHBORHOOD CHECK) On 10 April 1962, a neiKhborhood check was conducted inthe vicinity of 3709 Grand Avenue, Oasis, California, in an attempt to locate per-sons with a knowledge of SUBJECT. Joe Jenkins, landlord of 3709 Grand Avenue,stated that he purchased the property in 1958 and did not have a list of thetenants who lived in this property at the time of SUBJECTtS residence. Jenkinsdid not know SUBJECT and could not suggest anyone with knowledge of HIM.

~

L

5. TYPED NAME AND OAOANllATION Of SPECIAl. AGENT

JOHN Q. AGENT, 11Sth MI GroupO. SIGNATURE Of SPECIAl AGENT

/s/ John Q. Agent

D A FORMAPA '2

Figure B-6. Ezample of an attempt-type agent report (No-Lead).

B-13

FM 30-17

derogatory information is furnished in the courseof an interview, pertinent and relevant state-ments made by interviewees should be quotedverbatim, or as near verbatim as possible. In allsuch cases, after obtaining all available informa-tion, the Special Agent should ask the inter-viewee whether he is willing to--

(a) Submit a sworn statement.(b) Have his information made

known to the subject.(c) Be identified to the subject as the

source of the information.(d) Appear before a proceeding in

open or closed session.

Interviewee's answers to the above questions willbe included in the narrative report of interview.A sworn statement will be obtained if possibleand attached as an exhibit to the Agent Report.In those cases where the answers to any of theabove questions are negative, an attempt shouldbe made to determine and record the reason forrefusal. When the source who has given deroga-tory information about the subject requests anon-ymity, the investigative effort must be extendedto further develop such information and to safe-guard the identity of the source. A key sheet, DAForm 2357-R (fig B-7) which will be locally re-produced on 8- x 101/2-inch paper, will be pre-pared and forwarded as a separate element of theinvestigative file; access to it will be limited toadjudicating authorities and review boards orpanels. The source will be referred to by code inthe Agent Report. Should the interviewee providehearsay information or rumors, the originalsource of which cannot be determined or to whichconfirming or refuting leads cannot be developed,a separate paragraph, clearly labeled as hearsay,will be included in the Agent Report. The para-graph will be started with the words (HEAR-SAY INFORMATION) in upper case letters andinclosed in parentheses.

1,. Recommendation paragraph. The lastparagraph of background investigation interviewreports will contain the interviewee's recommen-dation concerning the advisability of appointingthe subject to a position of trust and responsibil-ity with the US Army. The Special Agent shouldmake every effort to obtain a definite positive ornegative recommendation from the intervieweeand avoid qualifying remarks. If interviewee dec-lines to give any recommendation, his reasonswill be a part of the last paragraph as will anyrestriction he places on the use of his informationand his willingness to testify at board hearings.In certain cases when the subject has demon-

efforts of the Special Agent. Ia the case of per-sonnel security investigation (SPI) interviews, adefinite and logical pattern should be followed.

1. Rekttionship paragraph. The reportof interview should begin with a complete andthorough treatment of the relationship betweenthe interviewee and the subject. This informationmay be contained in a separate paragraph re-ferred to as the "relationship paragraph." Morespecifically, under what circumstances, to whatextent, and exactly when the interviewee knewthe subject. A simple but effective way to begin arelationship paragraph would be, "Source firstmet ABLE in April 1958 ..." Then complete therelationship paragraph concisely with appro-priate factual statements pertaining only to thenature, degree, and duration of the associationbetween Source and ABLE, and conclude with aconcise statement as to when Source last sawABLE or communicated with HIM. The purposeof a good relationship paragraph is to permit thereader to form an opinion as to the general relia-bility of the information which should follow.

2. Background infor1n4tion. In most PSIinterviews, background information pertinent tothe subject is obtained. This may be placed in aparagraph immediately following the relation-ship paragraph. Background information shouldbe reported chronologically. This backgrounddata may verify or give basis to doubt informa-tion reported by the subject on his statement ofpersonal history. A discrepancy between state-ments of source and SUBJECT will require addi-tional investigative effort. Confinement of thistype of information to a separate paragraph per-mits the Special Agent to devote the remainder ofthe report to a full treatment of the informationregarding loyalty, integrity, discretion, morals,and character with which the BI is primarilyconcerned. More than one paragraph pertainingto background information may be needed in cer-tain cases.

S. Narrative report of interview. Com-plete reporting is achieved only by a thorough ex-pository treatment of the subject's loyalty, integ-rity, discretion, morals, and character, in addi-tion to a routine chronology of personal history.The element of loyalty will be stressed in allbackground investigations and, where applicable,in complaint investigations. Subject's financialresponsibility, emotional stability, and social hab-its should also be determined. Questions concern-ing religious, racial, or political matters shouldnot be raised unless absolutely necessary and per-tinent to the purpose of the investigation. When

8-14

FM 30-17

CLASSIFICATION

KEY SHEET

(AR 331-131)

1.

SUBJECT a. DATE OF BIRTH b. PLACE OF BIRTH

3. DATE FORWARDED2. DOSSIER NUMBER

4.

KEY SYMBOL IDENTITY

CODE

5.

NAME OF SOURCE 6. POSITION OF SOURCE IN RELATION.SHIP TO SUBJECT

7.

EVALUATION OF SOURCE AND INFORMATION GIVEN

8.

REASON FOR CODING (Check one and odd further explanation if necessary)

// Divulging the identity of Source will hove an odverse effect onL-/ national security (Confidential Source).

r-7 The Source refuses to be confronted and wishes ta remain anonymous.L--/ Include reason, if giyen.

THIS SHEET IS HOT PART OF THE IHVESTIGATIVE FILE.

DA FORM 2357.R, 1 SEP 60

CLASSIFICATION

Figure B-7. DA Form f357-R, key 8keet.

the concluding paragraph of the report. Agent'snotes are used to aid the reviewing officers intheir study and evaluation of the information re-ported and to draw attention to pertinent discrep-ancies. Agent's notes should contain only com-ments and opinions of the Special Agent; all in-formation obtained by investigation must bestated in the body of the report. The reasons for

strated his unreliability (e.g., AWOL and defec-tors) a recommendation is not required from in-terviewees. Instead, a statement will be includedto the effect that source will notify proper militaryauthorities should additional pertinent informa-tion arise.

(4) Agent's notes. Agent's notes are an ad-dendum to the Agent Report and are placed after

8-15

FM 30-17

~..by the Special Agent in contacting the source, un-less this reflects on the source's reliability.

5. Refer to internal correspondence orforms peculiar to the local unit.

6. Indicate recommendations.(c) When used, agent's notes will be

placed at the conclusion of the Agent Report towhich they pertain. The designation will be typedin upper case letters, i.e., ..AGENT'S NOTES,"followed by a colon. Agent's notes are indentedfive spaces and are contained in one paragraphregardless of the diversity of the contents.Agent's notes will begin two spaces below the lastline of the Agent Report to which they pertain.

e. Block No.5, Typed Name and Organizationof Special Agent. The reporting Special Agent'sname will be typed in upper case letters in nor-mal order followed by the intelligence unit desig-nation.

f. Block No.6, SigMture of Special Agent. Theinvestigating Special Agent's signature willappear as typed in block No.5. The agent will per-sonally sign in ink all copies of the Agent Reportwhen it contains adverse or derogatory informa-tion or concerns a complaint type investigation.Variations of this policy may be authorized bythe investigating unit in individual cases for unu-sual circumstances. Agent Reports not concernedwith complaint type investigations and contain-ing no derogatory or adverse information may besigned for the investigating Special Agent by anindividual responsible for the authenticity of thereports.

the SpeciaJ Agent's opinions shouJd be evident; ifnot, the reasons must be made clear. Commentswill be presented as conciseJy as possibJe.

(a) Agent's notes may be used to--1. Call attention to, and set forth rea-

sons why, the Special Agent did not, or why oth-ers should not, follow up an obvious lead if nototherwise apparent.

2. Give facts from the Special Agent'sknowledge of the area or situation, otherwise notapparent, which might help to clarify an issue.

9. Give pertinent information concern-ing the source, which for any reason is not in-cluded in the body of the report, e.g., adversecomments concerning the reputation, competency,or credibility of the source, or competency in thelanguage in which the interview was conducted,if relevant.

4. Give the Special Agent's opinion ofthe interviewee (bias, prejudice, senility, etc.) orof the information obtained, if necessary for clar-ification or proper evaluation. This should bestated as an opinion, never as a fact.

5. Point out discrepancies in subject'sstatement of personal history, conflicting infor-mation submitted in other reports, and cross-ref-erence to related material.

8. Point out the condition of records, ifthis might affect their validity or reliability.

7. Explain any unusual terms or wordsin the paragraph if such explanation requiresmore than one word placed in parentheses afterthe term.

8. Draw attention to conflicts or discre-pancies in different accounts of the same matterand state the Special Agent's opinion, supportedby his reasons, as to which is the more reliableversion.

8-5. Leads

a. A lead is any information collected duringan investigation which may require further de-velopment of investigation. It may be the name,address, or location of a person, firm, or organiza-tion. It is usually a source which can furnish fur-ther information on the case or which can lead toadditional information. Leads are included in theAgent Report paragraph as information obtained.

b. Initially, the Control Office extracts leadsfrom subject's statement of personal history.Normally, these initial leads are distributed bymeans of DA Form 339 (Lead Sheet) (AR381-130) to the MI units that will conduct the in-vestigation. The leads noted on Lead Sheets orcontained in Agent Reports must be specific andcomplete, so that the investigative activities maybe conducted intelligently and thoroughly.

c. Leads collected during an investigation, e.g.,

9. Indicate whether two sources havingthe same last name are related.

10. Make reference to other related re-ports in the same case.

(b) Agent's notes will not be used to--1. Provide a catchall for nonpertinent

information.2. Call attention to minor discrepancies

in dates of employment or education and in housenumbers of listed street addresses. It is prefera-ble in such cases to focus attention by underlin-ing the information at variance.

9. Take the place of a negative report.When effort by the Special Agent fails to locatean interviewee or a record, this effort will be re-corded in a separate Agent Report as an attempt.

4. Describe the difficulties experienced

8-16

FM

"throwoffs" or other developed references notcontained in a Lead Sheet, are subsidiary leads.Normally, the reporting unit is authorized to de-velop all subsidiary leads within its own area ofjurisdiction. Therefore, if the lead can be devel-oped by the reporting agent or by someone withinthe jurisdiction of the command, no formal indi-cation of the lead is necessary. This type lead isreferred to as a "jurisdictional lead." However,when the lead is outside the jurisdiction of thereporting command, necessitating communicationwith an MI group in another command, the Spe-cial Agent will formaIly indicate the lead in theAgent Report in the foIlowing manner: The word"(LEAD)", typed in upper case letters and en-closed in parentheses, wiIl be placed in the 3/4-inch marginal space on the right of the AgentReport on the line in which the lead is first men-tioned. The closing parentheses will be flush tothe back vertical line on the form. This type oflead is referred to as an "indicated lead." Leadsnaming persons, firms, or organizations known tothe reporting Special Agent as being suspect orsubversive are also indicated. The reason for in-dicating such leads wiIl be reported in Agent'sNotes.

8-6. Exhibits

To amplify or to confirm information containedin Agent Reports, particularly if they prove ordisprove derogatory information, or provide evi-dence of the nature of incidents and the mannerin which they were caused, the Special Agentmust submit available documentary and physicalevidence. This evidence must be in the form ofrecords, identification documents, affidavits, state-ments, photographs, transcripts of interviews,photostats, sketches (made by either the SpecialAgent or other persons), documents, pamphlets,newspaper clippings, and sound recordings. Ex-hibits or objects of physical evidence which areto be presented in legal proceedings must bemaintained in a continuing chain of custody. Cop-ies will be attached to the Agent Report as EX-HIBITS. In the body of the report, the designa-tion should follow immediately after referencesto the item attached. Example: "SCHMIDTwrote a letter (EXHIBIT I) to Charles B.Walker, Beverage Salesman, Tasty BeverageCompany, 666 Dundalk Avenue, Baltimore,Maryland 21219." Or: "Attached hereto is EX-HIBIT I, (three pages) sworn statement, pre-pared by Jones dated 9 January 1960." Normallyin a PSI, the exhibit is not numbered by the Spe-cial Agent; the numbers (Roman numerals) will

be inserted by the Control Office when the assem-bled Agent Reports and exhibits are organizedfor review and forwarding to the action agency.Exhibits must supplement, not replace, Agent Re-ports.

a. In preparing paragraphs concerning ex-hibits, the following procedures apply:

(1) When the source of information is awritten record, it must be identified by office, lo-cation, title, volume, page number, and date. Acopy of a portion of a record included as a part ofan Agent Report will be designated as an "ex-tract." Care will be exercised in making extractsto insure that divorcing the passage from its con-text does not alter its meaning. A complete copyof a record will be designated as an "exhibit" andattached to rather than incorporated into theAgent Report. If the source of information ob-tained from written records is classified, or if therevelation of such source would compromisecounterintelligence operations or embarrass theagency furnishing such records, the material inthe reports may be paraphrased and the sourcereferred to by code designation. The exact refer-ence to the source will be maintained in a mannerconsistent with the security considered necessaryby the responsible counterintelligence unit or ap-propriate Control Office. This information shouldbe accessible, however, if required by further de-velopments in the case.

(2) When the exhibit is a copy of an affida-vit, a letter, or other document, the Special Agentmust include all information which reveals how,where, when, from whom, and under what cir-cumstances the exhibit was obtained. The sub-stance of information contained in the exhibitwill be included in the body of the Agent Report.The Special Agent must not omit any detail whichindicates the value the exhibit has in relation tothe purpose of the investigation. Facts which latermay have a bearing on its probative or adjudica-tive value must be reported fully.

(3) The Special Agent will state in his re-port, or on the copies of the exhibits, the exact lo-cation, name, and title of the custodian of theoriginal evidence. In some instances, the originalsare not obtainable and copies must suffice, but thelocation of the original must be given in the re-port. In such a situation, the names and 'addressesof two persons who could testify to the authentic-ity and existence of the original should also bestated in the Agent Report. In the case of docu-ments or copies of documents which are obtainedcovertly, the Agent Report transmitting them tohigher headquarters must contain sufficient iden-

FM 30-17

umentary information is developed on a subjector when favorable documentary data is obtainedwhich wholly or partially refutes adverse infor-mation, certified true, photostatic, or other au-thentic copies or extracts will be obtained to ac-company and substantiate the report information.When it is impossible to accomplish the forego-ing, the Special AJ!'ent should personally verifythe information in the documents and so state inthe Agent Report. If the documents are not madeavailable for verification, a signed sworn state-ment by the document custodian will be obtained,if possible, concerning the contents. Lacking this,the Special Agent will obtain full identifyingdata concerning the custodian.

(7) Extreme care will be exercised in citingany local intelligence studies or reports whichhave not received Department of the Army evalu-ation. Reports or studies which have not been soevaluated normally will be referred to in AgentReports only as an aid to supervisory and investi-gative control personnel in directing further in-vestigation. Agent Reports containing such une-valuated reports or studies will not be includedwith the Report of Investigation prepared uponconclusion of an investigation. Properly evalu-ated data from local intelligence studies or re-ports may be entered in Agent Reports includedwith the Report of Investigation, provided theoriginal source can be identified and his reliabil-ity established.

B-7. Information Obtained from Government

Agencies

Charges or allegations of counterintelligence sig-nificance against personnel subject to Departmentof the Army jurisdiction are often received in thecourse of interviews or records checks from othergovernment agencies. These charges or allega-tions, together with the evaluation of the sourceas given by the contributing agency, should be in-cluded in the Agent Report. When the agency re-porting these charges is another investigativeagency, no new investigation will be institutedwithout the approval of the reporting agency.This coordination will preclude the possibility ofcompromise to any investigation currently inprogress.

tifying information to enable case officers to pro-perly appraise their validity and importance.

(4) In the case of physical evidence, if thenomenclature of the material will not serve as adescription, the Special Agent should describegenerally the equipment or the apparatus so thatthe reader will be able to comprehend the physi-cal characteristics and utilization of the materialto which reference is made.

b. In preparin.~ exhibits to be attached at theend of an Agent Report, the following proceduresapply:

(1) The identifying data for each exhibitwill be typed on the cover sheet. Cover sheets willcontain the exhibit number, subject, file num-ber(s), designation of the preparing unit, date ofthe Ag-ent Report to which the exhibit(s) applies,and, when applicable, security classification.

(2) If an original documentary exhibit re-quires a security classification, the classificationmay be stamped on a backing sheet, a cellophaneor other envelope, a permanent folder, or othermeans used which will keep the security classifi-cation on or near the exhibit without defacing it.Dtlplicates of documentary exhibits are markedwith the proper security classification in accord-ance with the provisions of AR 380-5. N ewspa-pers and other public periodicals will not be clas-sified, but the file may be classified to prevent dis-closure of MI interest in this area.

(3) Original copies of documentary exhibits,which have been received from other sources,will not be marked in any way.

(4) Documentary exhibits normally will beprepared or mounted on 8- x 101!2-inch paper.Exhibits larger than 8- x 10 1/2 inches will befolded to such size, if this can be done without af-fecting their value. Where the exhibit is an iden-tity document, pass, sample of stationery or itemof possible counterintelligence operational use,the exhibit should be placed unfolded in a cleanenvelope after data identifying the exhibit hasbeen placed on the envelope.

(5) Sworn statements are obtained in ac-cordance with chapter 3.

(6) In all cases when serious derogatory doc-

Section III. REPORT OF INVESTIGATION (DA FORM 342)

a. The accumulated Agent Reports are ar-ranged in a logical order and each report is num-bered in a single series with Arabic numerals.

8-8. Format and Preparation

The Report of Investigation is prepared accord-ing to the following procedures:

8-18

FM 30-17

(3) "Investigative Data," the last major di-vision of DA Form 342 is composed of blocks 19through 25.

(a) Block 22 indicates the status of the in-vestigation. The status indicated must be one ofthe following:

1. Closed. An investigation is indicatedas closed when no further investigative activity isnecessary to enable proper authorities to make afinal determination.

2. Terminated. An investigation is indi-cated as terminated when the investigation isended for some reason other than completion,e.g., withdrawal of the request for investigation,transfer of investigative jurisdiction, etc.

9. Suspended. An investigation is indi-cated as suspended when the findings are incon-clusive and all tangible leads have been ex-hausted, yet there remains a possibility that newinformation will be available at some future time.

4. Pending. An investigation is indicatedas pending when the investigation is continuing.

(b) Block 23, the Synopsis, is written in anarrative style and contains the essence of thepertinent information in the collected Agent Re-ports. It is a concise summary of the who, what,when, where, why, and how of the investigation.Each statement of fact in the synopsis containsparenthetical references to the appropriate num-bered Agent Reports or exhibits. Any recommen-dations, reviewer's opinions, or conclusionsdeemed appropriate should be noted on the letterof transmittal accompanying the Report of Inves-tigation; no such comments should be included inthe Report of Investigation. The margins will bethe black lines at the sides of the page, and thetext will begin on the third line of block 23. Twoblank spaces are left at the bottom of the page. Ifadditional space is needed, block 23 will be con-tinued on a plain sheet of white bond paper,using normal margins. At the top of the continu-ation sheet the title will be placed on the left andthe date and file reference on the right. The textis continued on the third line below the file refer-ence. (See AR 381-130 for the distribution of theReport of Investigation.)

This numeral is placed in the five-space indenta-tion of the introductory element of each attachedAgent Report. The logical order of the Agent Re-ports will vary as follows (fig B-8) :

(1) In background investigations, the se-quence of phase designations stated in AR381-130 should be used.

(2) In complaint type investigations and in-cident investigations the scope and nature are sovaried that no sequence can be prescribed. The se-quence should logically present the developmentof the investigation.

b. The exhibits prepared for the investigationare arranged in numerical order using Roman nu-merals. Exhibits are numbered in the order inwhich they are mentioned in the numerically ar-ranged Agent Reports and are placed as a groupfollowing the Agent Reports. Exhibits are neverinterspersed among the Agent Reports. Originalsof exhibits will be retained by the control officewith the open case file until required by the ac-tion agency or higher authority. However, origi-nals will be included, if possible, in the closedcase file which is forwarded to the US Army In-vestigative Records Repository (IRR), Fort Hol-abird, Maryland 21219. In instances when re-sults of polygraph examinations are used as ex-hibits, instructions contained in AR 195-6 willapply.

c. DA Form 342 is prepared as follows:(1) "Identifying Data" is the first major di-

vision of DA Form 342, and is composed of blocks1 to 15. Definite entries are made in blocks 1through 10 when the subject of an investigationis a known person or organization. The letters"NA" (not applicable) are entered in blocks 11through 15 in this case. When the investigationdeals with an incident in which the person orpersons concerned are not known, blocks 11through 15 will contain definite entries identify-ing the incident, and the letters "N A" entered inblocks 1 through 10.

(2) "Control Data," the second major divi-sion of DA Form 342, is composed of blocks 16through 18.

8-19

FM 30-17

REPORT OF INVESTIGATION i GATE SU8MITTED(B.cklround or Co-.l.int) I'

(AR '81-1'0) 1 April 1971SCO,( (If '.et",ou"d) N/A

CJ lAC .-CASE CLASSIfICATION

~G~C

CJ '81-

I ~TI FYI.O DATACJ C81

1.

LA$T N4ME -FIR$T NAME -MIOOt:E M4ME

BROWN, ~~rgaret, Nee: ROE

2.

SVC NO. (MI.I)

207-24-3003

,.

RACECau

'I. GRADE

ICaptain

.ARII OR SYC

WAC

7.

OAT[ OF BtRTH10 June 1920

8.

PLACE Of 81RTHJJc~hyille~Tennessee,. DUTY OR 0101 ASSIGNMENT

~inis~e Asst~~4 Section

9.

DUTY STATtON OR eUSIN£SS AODR£SSStockton Ordnance Depot_~tockt~Califo~nia

10.

HOME OR QUARTERS AOORESS

1526 Center StreetStockton. Ca1i.fo!n~~.

11.

TITl£ 0' INCIDENT ('Ire. e.~leeloft. etc.)

L2.

DATE (1"eicte"' ceee. o"ly) 11', TIME (1ae/cte"' e o"ly)

~h-N/A ~IA

1'1.

lOCATION (1".t.ll.tJ.". ..Jt. ..JldJ"4)

N/A """"'L5. SERIAL NUM8ERS OF EQUIPMENT. TANKS, £TC.

N/A

COInol DATA~

16.

CONTROL SYN80l 4NO Fll£ NO.

207-24-3003

IIYESTltATIYE DATA20.~s fOR INVESTIGATION

To d mine whether SUBJECT is or ever was ame be f an organization inimical to theUnited St~ or in sympathy with such anorganizat~on.1

19.

INVESTIGATION REQUESTED 8YCommanding GeneralSixth US Army, Presidio of SanFrancisco, San Francisco, Calif.-

21.

DATE IIVESTIGATIDI.-COMMENCED CO~'lET(O--

~22. STATUS CJ TERMIMATED

~S'E.OEO

CJ PENDING

23.

$'.0'$1$ ~BROWN was born on 10 June 1920 in Nashville, Tennessee

~ 2). From 1937 to

1941, SUBJECT attended the University of Kentuc~, Lexingto Kentuc~ (2). During

HER senior year at the university, SHE wrote a paper in whi HE voiced strongMarxist sentiments (3). In 1941, SUBJECr married William R r Brown, a Universityof Kentuc~ instructor. The Brown residence became a center of leftist activitiesat the university. In 1942, BRCJtlN'S husband was dismissed from the faculty of the

University of Kentucky because of Communist activities and propagandism (3,4, 19,20).

In 1942, BRa,.,'N moved to ~Iew York, New York, with HER husband who was appointedan assistant professor at New York TJniversity. In 1943, BROV~i'S husband left hisposition at !.Jew York TJniversity to devote his entire time to Communist propagandaactivities

(5, 19, 20). SUBJECT'S ideas marked HER as a militant Communist, and in1943, SHE was issued ComMunist Party ~{embership Card No. 6794NE (7). BRawN was asecretary of a Communist front organization and an active member of many ComMunist-~-~--

2'1.

DI5TR'.UTION3 -CG, Sixth US Army, 1 -File

~21!--

T"[O

*.M[ .NO TITL[_~9BERTC.~)

SIGNA1UA£Isl Robert C. Hall

D

A 1 ~'2 342 R[PlAC[S WD AiD '~.?~.2..'1_~~."1. W"IC" NAY I[ ~S[D. .0 .t

Figure B-8. Example 01 an BOI.8-20

FM 30-17

(CLASSIFICATION)

SUBJECT:BROWN,

Margaret, Nee: ROE

Date:

1 April 1971Control Symbol: 207-24-3003

sponsored groups (8t18t19). In 1944 BROWN made a speech in which SHE beratedlabor !'for playing into the hands of the capitalists" (6). According to aneighbor

SUBJECT and HER husband entertained frequently in their hornet but theseoccasions were quiet and reserved. This neighbor described SUBJECT as friendlyand patriotic(ll).

--\INOTE:

a.b.be

checked.c.

E

(CLASSIFICATION)

Figure B-8-Continued.

Section IV. SUMMARY OF INFORMATION (DA FORM 568)

Summary of Information are as follows (figB-9):8-9. Format and Preparation

Ai Summary of Information should contain con-cise statements of both derogatory and favorableinformation so that the perspective will not bedistorted. Rules relative to the preparation of a

a. The date of preparation and the preparingoffice must be recorded in the appropriate spaces.A file number, if appropriate, may be entered in

8-21

In March 1944, when SUBJECT's husband was inducted into the US Army, helisted his political affiliations as "Communist." In December 1945, he wasdischarged at Fort Dix, New Jersey (12). One year after HER husband'sdischarge, BROWN joined the WAC in the grade of second lieutenant. SHE iscurrently assigned duties at the Stockton Ordnance Depot (13, 14, 15).SUBJECT's Commanding Officer and four co-workers noticed no manifestationsof left-wing activity ~ f sympathy for left-wing causes on the part ofBROWN (13, 14. 15. 16, 17). BROWN's name appeared on a membership list ofthe National Committee Human Welfare, a Communist front organization(EXHIBIT I) (18, 25). n 1958. BROWN's daughter. a Communist Party youthdirector in Stockton. married ~ ' suspected Communist Party organizational

leader (20). The Browns rec ..Communist literature at their home inStockton (8, 21). They have cor sponded or spoken on the telephone withthree recognized Communists (22, 23. 24).

FM 30-17

the source may be identified in such identificationis necessary for complete understanding of thefacts. When the source is not identified, an indica-tion of the nature of the source's accessibility tothe information may be included in the summary.When Summaries of Information are prepared inwhich sources are not identified, the file copywhich remains in the office of origin should beannotated to show the sources, using code numberof sources whose identity requires protection. Abibliography may be attached to the file copywhen multiple sources are used in the prepara-tion of the Summary of Information.

8-11 .Information from Other Government

Agencies

Information obtained from government agenciesother than the Department of Defense will not beincluded in Summaries of Information preparedfor a requesting or receiving agency outside ofthe Department of Defense or the Federal Bu-reau of Investigation without first securing theapproval of the originator or source. When aSummary of Information contains informationfrom other government agencies, such informa-tion will be underlined and capitalized. SuchSummaries of Information will contain the fol-lowing statement:

Information derived from sources other thanArmy Sources is included in this summary. Thisinformation will not be passed to any agencyoutside the Department of Defense or the FederalBureau of Investigation.

This statement will appear as a final, but unnum-bered, paragraph in the summary.

8-12. Format and Preparation

A Summary of Information could be used as acharacterization; however, many occasions arisewhere a biographic sketch of an individual or or-ganization will satisfy the needs of the requester.Characterizations may be prepared from existingrecords in the US Army Investigative RecordsRepository, the Office of the Assistant Chief ofStaff for Intelligence, DA, or the Federal Bureauof Investigation. If not available from thesesources the information will only ,be obtainedthrough authorized liaison with local, state, andfederal authorities, and from public sources, suchas reputable news media or libraries (fig B-IO,B-l1,B-12).

the extreme right portion of the space labeled"preparing office."

b. The subject of the summary must be identi-fied as thoroughly as possible. Rules for comple-tion of the subject block for the Agent Reportalso apply for the Summary of Information.

c. The text of the Summary of Information willstart on the third line from the black line at thetop of the block titled "Summary of Informa-tion," leaving two blank spaces at the top of thisblock. The black lines will be used as the leftmargin for all items.

d. Paragraphing and subparagraphing shouldfollow the rules of military correspondence (AR340-15). Paragraphs are numbered at the time ofpreparation. Each paragraph should be limited toinformation from one major source only (i.e., onefile, one agency, etc.), but not necessarily fromone ultimate source (i.e., each person inter-viewed, each report of a records check, etc.), andshould contain all information from that sourcepertinent to the subject ot the Summary of Infor-mation.

e. Each paragraph of the Summary of Infor-mation will be evaluated, using the standard sys-tem of evaluation ratings (FM 30-5), taking intoconsideration the evaluation (s), if any, of theoriginal report(s). When pertinent, evaluationshould be made of subparagraphs or sentences.

f. If additional space is needed, two lines willbe left at the bottom of the form, and the textwill be continued on a plain sheet of white paper;normal margins will be used. At the top of thecontinuation sheet the subject will be placed onthe left side and the date and file references onthe right; the text is continued on the third linebelow these items.

g. The Summary of Information is not signed;however, the file copy will have the name of theindividual who prepared the summary typed inthe upper-right hand corner of the DA Form 568.

B-10. Limitation on Identification of Sources

The sources of information normally should notbe revealed in a Summary of Information sentoutside intelligence channels. However, if thesummary is to remain in intelligence channels,

&-22

FM 30-17

.SUMMARY,.O!..~~~_~RMATIOH ICATE --,(AR 38J-J31) I r

---

palPAalM& OFFICE

~~!~ US ARMY INTE~LIGENCE~OMMAND.. ~ort Holabird Maryland ~~~CODE FOR USE IN INDIVIDUAL PARAGRAPH EVALUATION

OF SOURCE: OF INFORMATION:COMPl£1ElY R!llA8lE A CON~IRI4EO 8Y OTHER SOURCES.lUSUAllY RELIA8lE B PROBABLY TRUE. 2FAIRLY RElIABl£ C POSSIBLY TRUE. JMOT USU-LlY RELIABLE. ...0 OOU8TFUlLY TRUE. 11UMRELIA8L~ E IMPROBABLE ..,RELIABlllTYUNKMOWII , TR~TH CANNOT BE ~UOGEO ...6

SUB" £CTDOE. John JosephDPOB: 3 August 1936. Hometown. AZ

SSAN: 216-52-3724

SUIIIIART OF INFORIIATION

1. On 1 March 1972, a source who has provided reliable information in the pastreported the following: On 28 February 1972, John Joseph DOE, DAC, 1969 TucsonAvenue, Bisbee, AZ, had dinner with Alex A. Smith in the Longhorn Restaurantin Douglas. AZ. The two men ate quietly in an isolated part of the restaurantand exchanged several pieces of paper before departing company. They were together

from 1700-1900 hours. '(B-3)

2. Investigative reports concerning Alex A. Smith on file at this headquartersrevealed the following: Smith was born on 28 October 1930, in Portland, ON. Hewas graduated from Central High School in 1949, and then attended the University ofCalifornia at Berkley, where h~graduated magna cum laude in 1953 with adegree in international affair e has been an active sympathizer with theCommunist Party, USA. He was dra d into the U.S. Army in June 1953. Throughouthis term of service in the Arm ith was known as an agitator, trouble-maker, andCommunist ~ympathizer. Basing his a

~ ns upon minor or imaginary grievances against

military service, he made numerous a e ts to organize protest meetings among

military personnel. (Information co er ng Smith's Army activities was obtained inten interviews with members of his m lita y unit. Sworn statements attesting tothese activities are filed at the US Army 1. 'sti tive Records Repository, Fort

Holabird, Maryland 21219.) Smith received Ii ..1 discharge in January 1955.Smith is considered unacceptable for furth£!r rni~, t ry service. Smith has beenliving in Mexico since 1970 following federa cnar 'es of destruction and theft of

government property. (B-1)

3. An investigative report concerning John Joseph ~';?n file at this headquartersrevealed the following: DOE was born on 3 August 1916, in Hometown, AZ. HE attendedHometown High School from 1951 to 1955 and was gradua~ed

~ alutatorian of HIS class.

After graduation, HE attended World Electronics School in hicago, Illinois for twoyears. HE then applied and was accepted for a job with th Fort Huachuca Communica-

tions-Electronics Agency. Throughout the Vietnam War HE expressed strong oppositionto the War on the grounds that the American involvement ~n Indo-~Mnnr was forterritorial gain. He is suspected of having aided U.S. Army dese1~rs in their flightto Canada. (B-3)

4. A source considered to be usually reliable reported that in February 1972, DOEapplied for a sensitive position with another government agency. (B-2)

.Information derived from sources other than Army sources is included in thissummary. This information will not be passed to any agency outside the Department ofDefense

or the Federal Bureau of Investigation.

DISTRIBUTION, Tucson Office, FBI, Tucson, AZ -2 copies

Xile::J ('-"DA FORM 568 (Form.rl,

1 DEC 51 DA AGO)R£PLACES WD AGO FOR" 5F,S 1 JUN 47.WHICH MAY BE USED.

Figure B-9. E:tample of an SOl.

B-23

FM 30-17

PREP~RIN6 OFFICE

HEADQUARTERS. US__~~I~!ELLIGB:!CE ~OMMAND. Fort. Holabird .~Maryland

21219

CODE FOR USE IN INDIVIDUAL PARAGRAPH EVALUATIONOF SOURCE: OF tHFORMATIOH:

COMPlETElY R~l'AalE A COIIFIRMEO 8Y OTHER SOURCES.lUSUAllY RElIA8lE 8 PR08A8lY TRUE. 2fAIRlY RElIA8lE C POSSI8lY TRUf )"OT USU41.lY RElIA8lE 0 OOU8TFUI.I.Y TRUE. U"REI.IA8I.E E IMPRO8A8lE ..,

RE~A~llITY UN~"OWII F TRUTH CANNOT8E .JUOGED ...6

SU8" ECT

NOMAN, Raffel DoDPOB: 30 February 1900, City, UtahSSAN: 100-00-000

SUMMARY OF INFORMATION

1.

Raffel D. NOMAN, born 30 February 1900, City, Utah, retired from the US Army in1952, with rank of Colonel. NOMAN was decorated for HIS service in World Wars I andII.

2. NOMAN is a legitimate collector of autographs and photographs, especially fromprominent military. political and industrial persons.

p

DISTRIBUTION

REPl~CES WD ~GO FORM sr.&. I JU'i (7.WHICH M~Y BE USED.

DA FORM 568 (Former!,.1 DEC 51 DA AG~)

Figure B-10. Example of a characterization.-individual, SOl format.

8-24

FM 30-17

~IIUUA~~ t\C 'UCt\D...TI nu CATE- rSUMMARY ,.O! ..~~~.~RMATI ON .~ l~EMa!ch 1977~(AR 381-131) .-~- .-

PREPARING O"IC!HE US ARMY INTELLIGENCE COMMAND Fort Holabird Mar land 21219

SU8.JECT COot FOR USE IN INDIYIDUAL PARAGRAPH EYALUATION

RETREAT COFFEE HOUSE OF SOURCE: OF INFORMATION:200 R 11 bi d A COMPLE1£lY R!llA8l! A CON'IRMEO 8Y OTHER SOURC£S.l0 Y r venue USUAllY R!lIA8l£ 8 PR08A8lY TRUE. ] ,2

Baltimore, Maryland FAIRLY IIElIA8l! ..., ..C POSSI8lY TRUE. , JNOT USU-llY R!lIA8l£ ., ..0 OOU8T'UllY TRU£ ~UNR!lIA8L£ f IMPRO8A8L£.,...,. ."R!I.IA8IlIT.Y _UNKNOWN.. '-~' TRUTH CANNOT 8E,JUOGEO -' ,,6

~UMMARY OF IMFORMATION

1. The RETREAT COFFEE HOUSE (RCH). 200 Rollybird Avenue. Baltimore. Maryland. opened28 February 1977. to provide a meeting place for dissident military personnel in theBaltimore and surrounding area. RCH was organized by the No Military Action Group(NMAG). a corporation which has established coffee houses near major US Army installa-tions for the purpose of generating and supporting military dissidence.

2. Although the RCH management staff is composed entirely of civilians, the patron-age of RCH is entirely military. Approximately 30-40 individuals reportedly attend

SUBJECT nightly.

3. Activities at RCH center around "rap sessions" and military counseling. Trained

counselors, both civilian and military, advise and assist servicemen to seek servicedischarges on grounds of conscientious objector status. RCH patrons discuss andplan a variety of disruptive actions against the Army.

p

OlSTRI8UTION

DA IF~E~M~1 568

Figure B-ll. Example of a characterization--organization, SOl format.

B-2S

FM 30-17

PERSONALITY CHARACTERIZATIONDossier No:As of Date:

1.NAME:DPOB:ASN:SSAN:12.

PHYSICAL DESCRIPTIONSEX:RACE:HEIGHT:WEIGHT:EYES:HAIR:OTHER:

2.

Aliases:

3.

Marital Status:

4.

5.

PHOTOGRAPH AS OF:

6.

Education:

7. Previous Residences:

8.

Previous Employment:

~9. Military Service:

10.

Arrest Record:e

11.

Foreign Travel:

OTHERINF9~'JJ9B

Figure B-11.. E~ample of a charactenzation-individual on bond paper.

8-26

FM 30-17

APPENDIX C

COUNTERINTELLIGENCE SERVICES REPORTS

Example 1. Fonnat-Report of Counterintelligence Survey.Example 2. Format-Report of Counterintelligence Technical Service.

EXAMPLE 1REPORT OF COUNTERINTELLIGENCE SURVEY

OF(UNIT AND LOCATION)

(Requester Control Number) (Date)

Section I. INTRODUCTION

1. A counterintelligence survey was conducted (during the periodto ) or (on -) by the following

representative(s) of (Region -), ( ) Military IntelligenceGroup:

(List as necessary using title, first name, middle initial, and last name.)2. The following unit representatives accompanied the counterintelligencesurvey team:

(List as necessary using rank or title, first name, middle initial, lastname, and position.)3. (Indicate whether or not there is any record of a previous counterin-telligence survey having been conducted on the above installation.)4. The mission of (identify the surveyed unit completely) is (discussbriefly the complete mission of the surveyed unit).5. Based on the factors discussed below (maximum, medium, minimum)degree of security is required for the surveyed unit.

a. (Discuss effect of the mission of the surveyed unit on the level of

security required.)

b. (Statement of cost of replacement.)

c. (Briefly discuss location of the installation.)

d. (Give number and names of like installations.)e. (State the security classification of information and/or materiel.)

f. (Discuss other factors relating to the overall importance of the sur-veyed unit.)6. Command directives for this installation are promulgated by (enteridentification of surveyed unit's major command) through (enter commandechelons, if any, between major command and surveyed unit). The intelli-gence directives are disseminated to this installation by (enter source ofdirectives) through (enter the intelligence echelons, if any, between majorcommand and the surveyed unit».7.

This survey was conducted to assist the commander in establishing thesecurity requirements necessary to protect his installation against espio-

C-1

FM 30-17

nage, sabotage and the unauthorized access to, or disclosure of, classi-fied defense information.

Section II. SCOPE8. This survey included the following (elements, offices, sections, etc) of(re-identify the unit).

(List the sections or sub-elements surveyed.)9. (Use this paragraph to indicate the amount and classification of docu-ments and materiel on hand either by number and type or in linear feetand type.)

Section III. FINDINGS AND RECOMMENDATIONS

10. Security of Information:

a. Receipting: (Narrate the entire procedure used in receipting for allclassified documents within the unit being surveyed and follow with ap-propriate recommendation(s). An alternate method would be to subpara-graph where required, as in example below.)

(1) TOP SECRET: (Narrate)

(a) Recommendation: (Follow the narration with appropriate rec-ommendation(s). Use a similar procedure for subsequent paragraphsthroughout the report, varying as necessary to adapt survey findings tothis report format.)

(b) Recommendation:(2) SECRET: (Narrate)

(a) Recommendation:

(b) Recommendation:

(c) Recommendation:

(3) CONFIDENTIAL: (Narrate)

(a) Recommendation:

( b) Recommendation:b. Storage. (Narrate in detail facilities and procedures employed in

storing classified matter.)

Recommendation(s)c. Distribution: (Narrate in detail procedures employed for internal

distribution of classified matter.)

Recommendation (s)d. Preparation: (Narrate in detail how classified matters are generated

and prepared, to include drafts.)

Recommendation (s)e. Marking: (Narrate in detail how prepared classified matters are

marked for proper safeguarding, to include drafts, stenographer's notes,etc, and also authority.)

Recommendation (s)

f. Reproduction: (Narrate in detail how classified matters are repro-duced and how marked.)

Recommendation (s)

g. Regarding: (Narrate in detail procedure for reviewing and regradingclassified matter; include responsibility.)

C-2

FM 30-17

Recommendation (s)

h. Transmission: (Narrate in detail procedure employed for transmit-ting classified matter out of the surveyed unit to include responsibility andaccountability. )

Recommendation (s)

i. Normal Destruction: (Narrate in detail procedure employed for ac-complishing normal destruction of classified matter and waste; includeresponsibility, records, etc.)

Recommendation (s)

j. Emergency Evacuation and Destruction of classified material:(Narrate in detail what measures are established to include plan in effect,personnel assigned specific duties, etc.)

Recommendation (s)

11. Security of Personnel:

a. Key Personnel:

(1) The (enter title of individual who heads the surveyed unit; i.e.,commanding officer, branch chief, section chief, etc.) of the installation is(enter title or rank, first name, middle initial, last name, branch of service,service, social security number or GS rating in case of civilians). He (orshe) has occupied this position since (date).

(2) The Security Officer of this installation is (enter title or rank,first name, middle initial, last name, branch of service, social securitynumber or GS rating in case of civilians). He has occupied this positionsince (date) upon orders issued by (identify authority and date).

(3) The officer having staff responsibility for crime prevention at thisinstallation is the Provost Marshal (or appropriate title), (enter rank,first name, middle initial, last name, branch of service, and social securityaccount number). He has occupied this position since (enter date) uponorders issued by (identify authority and give date of orders).

(4) (Use additional subparagraphs, as needed, to identify other indi-viduals in surveyed unit who are considered to be "key" personnel andshow the degree of clearance and time each has held his present position.)

Recommendation (s)b. Clearance Program: (Describe in detail the procedure used for ob-

taining clearance for assigned personnel and describe accuracy of theclearance roster.)

Recommendation (s)c. Security Education: (Describe in detail the security education pro-

gram that is established and conducted; include responsibility, frequency ofsecurity lectures, subjects covered, attendance records, effectiveness, etc.)

Recommendation (s)

d. Labor Turnover, Absentee Rate, Morale: (Describe how these factorsaffect the security of surveyed unit.)

Recommendation (s)12. Physical Security: (Describe in detail the controls, systems, facilities,and utilities identified in the following subparagraphs. If the unit beingsurveyed already has on record a Physical Security Survey (PSS) per-formed by MP personnel, a statement in this paragraph referring to thereport is deemed sufficient, provided those deficiencies noted which directly

C-3

FM 30-17

affect the security of classified documents and material have been corrected.If this has not been accomplished, appropriate recommendations should bemade. If there is no record of a PSS and the MP representatives are un-able to perform the physical security portion while the CI Survey is beingconducted, this portion will be accomplished by counterintelligence person-nel, if directed to do so, following the format outlined below (chap 10).

a. Perimeter Barriers:post fences, gates, locks, key control, perimeter lighting;building building surfaces, doors, locking devices, key control,

windows, protective lighting;office wall surfaces, doors, locking devices, key control

windows.Recommendation (s)b. Guards and Guard Systems:

post type and number of guards, their procurement train-ing, their employment and supervision, equipmentand communications;

building same as above;office same as above.

Recommendation (s)c. Personnel Control and Identification: Control of assigned personnel

by post, in building, and in office; control of visitors by post, in building,and in office.

Recommendation (s)d. Vehicular Control and Identification: Vehicles of assigned personnel,

their registration, identification and control on post; visiting vehicles andtheir control.

Recommendation (s)e. Anti-Intrusion Alarms Systems:

Recommendation (s)

f. Firefighting Facilities:post fire department and its personnel, type and number,

procurement and training, employment and supervi-sion; equipment and its inspection; communications;reserve fire fighting personnel;

building fire plan; fire marshal and wardens, equipment andits inspection; communications; training and educa-tion of personnel;

office same as for building.

Recommendation (s)

g. Communication Facilities: Primary, alternate, and emergency facili-ties that are available on post and to surveyed unit; personnel employedto operate and maintain communications facilities to include their typeand number, procurement and clearance, employment and supervision.

Recommendation (s)h. Utilities:

(1) Electrical Power.

(Source, emergency provisions, protection, etc.)(2) Water Supply.

C-4

FM 30-17

(Source, emergency provisions, safeguard, etc.)(3) Heat and Fuel.

(Facilities and type, source of fuel, emergency provisions, safe-guards, etc.)

Recommendation (s)

Section IV. COMMENTS13. (Use this section to record weaknesses and any other comments con-sidered pertinent. As a part of the survey, inquiries into the followingareas will also be made and if they are found to be adequate, appropriateremarks to that effect will be made in this section.

a. An evaluation of the completeness and correctness of the unit's se-curity SOP.

b. Examination of sensitive areas, classified conference rooms and po-tential or actual restricted areas, to include their actual designation assuch or the requirement for a counterintelligence technical service. If theseareas are found to be inadequate from the standpoint of published regula-tions, directives, and implementation thereof, the discussion should beplaced in section III, above, followed by appropriate recommendation (s) .When weaknesses as described in chapter 10 are noted, discussion and rec-ommendation(s) will appear in this section.)

Section V. EXIT BRIEFING14. All findings and recommendations were discussed during an exit brief-ing on ( ) for the following unit representatives:

(List as necessary using rank or title, first name, middle initial, lastname, and position.)SIGNATURE BLOCK(Signature of authorized grouprepresentative, not necessarilythe Agent-in-Charge.)

EXAMPLE 2

(CLASSIFICATION)REPORT OF COUNTERINTEU.,IGENCE TECHNICAL SERVICE

OF(UNIT AND LOCATION)

(Requestor Control Number) (Date)

Section I. INTRODUCTION

1. ( ) A counterintelligence technical (survey/inspection assistance) wasconducted during the period by the following repre-sentative(s) of Region --, ( ), MI Group.

(List as necessary using title, first name, middle initial, and last name.)2. ( ) The serviced area was considered by the requester to be a (entersecure conference facility, or other sensitive area). A description of thearea is contained in EXHIBIT I.

3. ( ) An examination of records regarding previous counterintelligencetechnical services in the area reveal that: (check as appropriate)

( ) There is no record of a previous technical service.( ) A counterintelligence technical (identify) was completed on

C-5

FM 30-17

( CLASSIFICATION)(date of service and unit that conducted it).

Section II. SCOPE

4. (U) The scope of this technical service is outlined in EXHIBIT II.

Section III. LIMIT A TIONS

5. (U) The limitations of this service are outlined in EXHIBIT II.

Section IV. FINDINGS AND RECOMMENDATIONS6.

( ) Repeated or uncorrected findings: (enter here any repeated oruncorrected findings. If there were none, enter, none}.7.

( ) (If technical surveillance devices were not detected and no techni-cal security hazards were found, state: "The service did not locate or indi-cate the presence of technical surveillance devices or technical surveillancesecurity hazards.")8.

( ) (If technical surveillance devices were not detected, but technicalsecurity hazards were found, state as follows:

a. The service did not locate or indicate the surveillance devices.b. The serviced area does not meet the criteria for sensitive areas and

is not considered secure for the discussion of sensitive classified informa-tion until corrective action is taken on the following technical securityhazards:

(1) Finding: (Record findings and follow each with an appropriaterecommendation. Paragraph citations will be indicated at the end of eachfinding. When an appropriate finding cannot be attributed to an appropriatedirective, a parenthetical caveat (NONCITABLE HAZARD) will be en-tered at the end of such findings.)

(2) Finding:(Recommendation: )

Section V. COMMENTS

9. ( ) (Use this section to record any additional pertinent explanatoryremarks that do not properly fit into any of the other sections).

Section VI. EXIT BRIEFING

10. ( ) All findings, recommendations, and limitations of the service werediscussed during an exist briefing on for the followingunit representatives:

(List as necessary using rank or title, first name, middle initial, lastname, and position.)

SIGNATURE BLOCK(Signature of authorized grouprepresentative, not necessarilythe Agent-in-Charge.)

REPORT OF COUNTERINTELLIGENCE TECHNICAL SERVICEOF

DESCRIPTION OF SERVICED AREA1. ( ) Primary use of serviced area-highest classification and frequencyof discussion of classified defense information.

(CLASSIFICATION)

C-6

FM 30-17

(CLASSIFICATION)2. ( ) Brief, general description of the area to include construction ofwalls, floors, ceilings, penetrations of those structural members, and therelationship of the area to all (including above and below) adjacent areas:3. ( ) Security controls in effect to restrict access to the serviced areaboth during duty and nonduty hours:

4. ( ) Security controls of janitorial and service personnel; to includeindication of clearance 01" lack of clearance for nonescorted personnel:5. ( ) Brief, general description of heating, ventilation, electrical, andcommunications equipment or systems that service or penetrate the serv-iced area:

EXHIBIT I Page 1

SCOPE OF TECHNICAL SERVICE ( )

1. (U) Unless otherwise indicated, this service was conducted to detectthe presence of technical surveillance equipment; to determine the exist-ence of technical security hazards which would permit the employment ofsuch equipment; and to recommend technical security measures designedto prevent the successful employment of technical surveillance monitoringsystems.2. ( ) This service consisted of selected application of comprehensivevisual, physical, audio, electronic, and radio frequency checks and includedan examination of the factors checked below:

( ) a. All exterior building surfaces, utility poles, wires, and otherassociated paraphernalia.

( ) b. Vulnerability of hostile visual surveillance.( ) c. All areas adjacent to the serviced area including those areas

above and below.

( ) d. The interior of room areas to include wall, floor, and ceilingmounted items, furniture, artifacts, and equipment.

( ) e. The interior and exterior surfaces and internal structure ofwalls, floors, ceilings, and other structural objects.

( ) f. All electric or electronic equipment or circuits and componentparts of accessories thereof, to include detailed examination of all wiringand utility channels or recesses.

( ) g. Other:EXHIBIT II Page 1 of 2 pages

LIMITATIONS OF TECHNICAL SERVICE (U)

Counterintelligence technical services of the type conducted indicate thetechnical security status of the area or equipment examined at the conclu-sion of the examination, within the capabilities of the equipment utilizedand the operational techniques employed. Attention is invited to the factthat the security afforded by this service WILL BE IMMEDIATELYNULLIFIED BY:

a. Admission to the serviced area of persons who do not have the propersecurity clearance or who are not under proper escort.

b. Failure to maintain continuous and effective surveillance and controlof the serviced area.

(CLASSIFICATION)

C-7

FM 30-17

~_.

(CLASSIFICATION)

c. Allowing repairs or alterations to or within the serviced area withoutthe supervision of qualified and responsible personnel.

d. The introduction of new furnishings or equipment into the servicedarea prior to a thorough inspection of such items.

e. Other limitations:EXHIBIT II Page 2

(CLASSIFI CA TION)

C-8

FM 30-17

APPENDIX D

COUNTERINTElliGENCE SURVEY CHECKLIST

Note. The Provost Marshal's role in security is related to the prevention ofunauthorized entry, control of entry, circulation and exit of personnel and vehicles,perimeter barriers and approach areas, protective lighting and alarm systems, passand badge systems, and prevention and detection of crime. To accomplish thisresponsibility, Physical Security Surveys (PSS) are conducted periodically by MilitaryPolice personnel. A copy of a PSS may be attached to the report of counterintelligencesurvey, and appropriate references to the PSS should be incorporated into the report.When the time lapse is extensive, or when there is no record of a prior PSS,arrangements should be made to have a PSS conducted concurrently with thecounterintelligence survey (chap 10). In the event that this is not possible, FM 19-30,contains a checklist that should be used by counterintelligence personnel conductingthe physical security portion of the survey.

Section I. PRELIMINARY CHECK

0-1.

Topography

Check the natural topographic features existingat the periphery of the installation.

a. Determine whether these natural featureshave an adverse effect on the security of the in-stallation. Explain.

b. Determine whether these features can be uti-lized as deterrents to unauthorized entry. Whatadditional physical security measures are neces-sary for these features to be of value as bar-riers?

c. Determine whether potential intruders orespionage/sabotage agents can utilize these topo-graphic features as possible cover and conceal-ment. What measures are necessary to deny useof these features by potential intruders?

D-2. Surrounding Area

a. Check the population surrounding the instal-lation to determine whether there is any aspectthat would have an adverse effect on the securityof the installation.

(1) Determine the ethnic derivation of thepopulation. Do these people present any threat tothe security of the installation?

(2) Determine whether there are any racialproblems. Will racial riots have adverse effectsupon the security of the installation?

(3) Determine whether any group favors

ideologies not consistent with the best interest ofthe United States or of the nations with whichthe US enjoys an amicable relationship.

(4) Determine the crime rate. What types ofcrimes predominate? Do these criminal acts pre-sent threats to the security of the installation?

b. Check the area surrounding the installationfor any organization which may present threatsto the security of the installation. Determinewhether there are any political, labor, fraternal,or social organizations which are engaged in ac-tivities inimical to the best interests of our gov-ernment. Identify officials and members of suchorganizations. What is their platform? Are theysupported by subversive organizations?

c. Check the industries essential to the functionof the installation?

(1) Are any of the industries essential to thefunction of the installation?

(2) Determine whether strikes and riots willhave adverse effects on the operations and secur-ity of the installation and how.

d. Check places of entertainment such as bars,restaurants, nightclubs located in the proximityof the installation.

(1) Determine whether these places of enter-tainment are frequented by personnel of the in-stallation.

(2) Determine which of these establish-

D-1

FM 30-17

(3) Determine whether these areas havebeen designated as restricted areas or off-limitsareas.

ments, if any, are known to cater to individualswho harbor ideologies inimical to the best inter-ests of our government.

(3) Determine whether there have beenknown incidents in these establishments to solicitinformation concerning the installation and/or itsactivities.

(4) Monitor establishments to determinewhether military personnel discuss defense infor-mation while on the premises.

b. Determine the location of the motor pools.

(1) Check whether they are properly safe-guarded. Are any areas designated for authorizedpersonnel only?

(2) What types of vehicles are located in themotor pools? Are vehicles frequently checked forpossible mechanical sabotage?

c. Determine whether airstrips and/or heli-ports have been established.

(1) Check whether the installation has as-signed aircraft and pilots.

(2) Are aircraft properly safeguarded?(3) Are airstrips and/or heliports clearly

designated? If there are neither, determinewhether there are large enough areas.

0-3. Critical Areas

a. Determine the locations of such criticalareas as the communication centers, power trans-former stations, fuel storage sites, POL dumps,and ammunition dumps.

(1) Check the measures taken to protectthese areas.

(2) Determine their relationship to, and dis-tance from, sensitive areas.

Section II. HISTORY AND SENSITIVITY OF THE INSTAllATION

D-4. D-7.Consider the vulnerability of the location of theinstallation and what effect the surrounding ele-ments have upon its security, based on factors de-veloped in section I above.

a. Examine the history of the installation.

b. Check the history of the installation as itpertains to the construction of tunnels, caves,sewers, underground facilities, entrances andexits, or any other construction that would havean adverse effect on the security of an installa-tion.

D-8.Consider the classification of the informationstored, used, and created at the installation.

D-S.What is the mission of the installation being sur-veyed? Is it classified or unclassified, and is it oflong or short duration? How does the missioncontribute to the defense effort? Is the missionextremely sensitive or nonsensitive?

D-9.Determine the number of like installations thatare capable of absorbing the functions of the sur-veyed installation if it were destroyed.

D-l0.Determine the overall importance of the installa-tion commander and examine higher command orDA policy to establish a partial basis for the de-termination. Evaluate items in paragraphs 4through 9, above. It is extremely important thatthis determination be made prior to the survey sothat feasible recommendations may be rendered.

D-6.

Determine the cost of replacement.

a. What would it cost in terms of money, man-power, material, and time to replace this installa-tion if it were destroyed?

b. How would this affect the defense effort?

0-2

FM 30-17

Section III. SECURITY OF INFORMATION

D-11. Amount of Classified Documents andMaterial

How many linear feet of each category of classi-fied information are stored in the surveyed instal-lation?

D-12. Message Center

Is a message center used for distribution of all in-coming correspondence and dispatch of all outgo-ing correspondence? If so :

a. How many personnel are employed in themessage center?

b. In relation to the classification of informa-tion handled, are the message center personneladequately cleared?

c. Is the message center declared a RestrictedArea? If so who is authorized access? Whatidentification system is used?

d. What storage facilities are available in themessage center?

f. How much information of a classified natureis stored in the message center?

D-13. Storage Facilities

a. How are SECRET and CONFIDENTIALmaterials stored? Describe the containers to in-clude size, weight, type of locking device, and ap-proximate delay time.

b. If containers with steel locking bars andhasps are used (as an interim measure until re-quired containers are received), are the hasps ad-equately secured to the containers? Are the lock-ing bars attached to the containers in such a waythat material cannot be removed from the draw-ers when the container is locked?

c. If a field safe is used for storage, is it se-cured to the building or guarded to prevent unau-thorized removal? Describe the safe and lockingdevice.

d. When, or under what circumstances, arecombinations to combination locks used on classi-fied containers changed?

e. Is an up-to-date record of all safe combina-tions maintained in a central location, togetherwith information necessary to identify and locateall containers? If so, where? Who has access tothe combinations? Are the combinations afforded

protection as required for at least the highest cat-egory of information in any of the containers?Consider the overall classification of a compila-tion of the material that would be available toanyone gaining access to the record of combina-tions.

f. Has the dissemination of combinations beenheld to the minimum consistent with efficient op-erations? Explain.

g. Is a properly completed part 1 of DA Form727 (Classified Container Information) affixed tothe outside of each container in which classifiedinformation is stored? Check for accuracy.

h. Are all personnel listed on part 1 of DAForm 727 currently responsible for the securityof the container on which the form is posted?

i. Is part 2 of DA Form 727 properly executedand attached to an envelope containing the com-bination recorded on part 3 of DA Form 727?Have these been filed in a central location at thenext higher echelon? Where?

j. Is part 3 of DA Form 727 placed in anopaque envelope? Is it possible to read the combi-nation through the envelope? Is the envelopesealed?

k. Is part 3 of DA Form 727 classified at leastas high as the highest category of defense infor-mation stored in the container? Consider theneed for a higher classification due to the effectof a compilation of the information in the con-tainer.

l. 1s the envelope containing part 3 of DAForm 727 marked with the same classification asthe form inclosed?

m. What procedure is followed to insure thatcombinations are not written on calendar pads orcarried in wallets?

n. Is a properly executed DA Form 672 (Safeor Cabinet Security Record) affixed to each con-tainer in which classified information is stored?Check for accuracy. (Note any discrepanciesfound on DA Form 672.)

o. Is an entry made on DA Form 672 each timethe container is opened and closed? Do the ini-tials in the "UNLOCKED BY" column coincidewith the names listed on part 2 of DA Form 727as having knowledge of the combination?

p. Is the person who checked the container at

0-3

FM 30-17

f. Does the register indicate how documents en-tered therein were disposed of (receipt, dispatch,downgrading, destruction)?

g. Is the register current and accurate? Spotcheck 5 to 20 percent of the documents entered.

h. Are all documents originated by the unit en-tered in the register and is there disposition indi-cated?

D-1 S. Receipting

a. Is SECRET material, CONFIDENTIAL ma-terial, if required (local policy will dictate proce-dure), covered by a receipt? Explain the systemused.

b. What receipt form is used? Is a file copy re-tained for all classified documents sent out of theunit?

the end of the day different from the person wholocked the container?

q. Is the container checked every working day,even if it has not been opened?

r. If a container remains open, is it attended bya properly cleared, responsible person? Explain.

s. When a container equipped with combinationpadlock (interim arrangement) remains openduring duty hours, how is the padlock safe-guarded?

t. Are containers in which classified informa-tion is NOT to be stored clearly marked with in-structions to this effect if prescribed by local se-curity SOP? Explain.

u. Are personnel aware of the action requiredwhen a container is found open and unattendedafter duty hours or classified material is foundunattended and out of a container? Query per-sonnel and report results.

v. When removed from the installation is clas-sified material kept under personnel physical con-trol of authorized personnel at all times or se-cured in the type of storage facility required bythe particular classification?

w. How is information annotated "FOR OFFI-CIAL USE ONLY" stored?

x. Are NATO, CENTO, or SEATO documentsclearly identified and segregated from US docu-ments in storage?

c. Is the unit making proper use of DA Forms631 (Classified Multiple Document Receipt orTracer), 1203 (Classified Document Mail ControlRecord and Receipt), and 1204 (Classified Docu-ment Receipt and/or Tracer)? Explain.

d. Do receipt forms contain any classified infor-mation? Spot check.

e. If all receipt forms have not been returnedfor documents sent out of the unit, have theybeen traced through use of proper forms? Reportresults of any tracers sent out since the last sur-vey of inspection.

f. Are receipt forms being disposed of in ac-cordance with AR 340-18-series (file # 504-08)or AR 340-2 (file # 501- )? Explain.

g. Who is designated to receipt for classifiedmaterial that is received by surveyed units?

D-16. Dissemination

a. Are supervisory officials taking proper stepsto prevent unauthorized dissemination of classi-

fied information? Explain.

b. Is a conscious effort made by holders of clas-sified documents to insure that requesters haveproper clearance and a bona fide need-to-know?

c. Do requesters of classified information in-sure that they have a proper clearance and ac-tually need the information in the performanceof their official duties?

d. Are classified document cover sheets used tocover classified documents when they are out ofcontainers and not being used?

0-14. Classified Document Register

a. Is a classified document register maintainedfor classified material charged to the unit sur-veyed? (Dependent on local policy, a registermayor may not be maintained for CONFIDEN-TIAL and SECRET material.) Describe the reg-ister utilized for such material.

b. Does the register bear an overall classifica-tion based on the presence of classified informa-tion contained therein rather than on the pres-ence of references to classified information? Spotcheck for accuracy.

c. Are individual pages of the register classi-fied according to the classification of long titlescontained thereon? Spot check for accuracy.

d. Do the entries fully identify the documents?Cross check the register entries with documents.

e. Who is responsible for maintaining the reg-ister? Who has access to the register?

D-4

FM 30-17

e. How are requirements for safeguarding cer-tain documents from foreign nationals being im-plemented?

f. Is classified material removed from contain-ers at night for work purposes? If so, what prov-isions for proper safeguarding are in effect?

g. Are individuals within the unit required toleave a receipt for classified information they re-move from containers? If so, what receipt formis used? Who controls the documents within thevarious offices of the unit?

sion are used? (Mail, courier, Armed Forces Cou-rier Service, State Department?)

b. What receipt form is used? How are docu-ments accounted for while in transit?

c. If classified material is mailed, is the doubleenvelope system properly used? Is a file of PostOffice Department Registry receipts maintained?

d. If a courier is used to transmit classified ma-terial, does he have a clearance at least as high asthe information entrusted to him?

e. Is the classified material adequately pro-tected from view when carried by the courier?How?

f. How is material prepared for transmittal byArmed Forces Courier Service or State Depart-ment diplomatic pouch?

D-17. Preparation of Reproduction

a. Is any classified material originated in theunit surveyed? If so, do responsible officials havewritten authority to classify? Include details.

b. Are persons using, extracting from, reprod-ucing, incorporating, or responding to informa-tion already classified, carrying out their obliga-tions to apply the classification decisions deter-mined by the originating authority? Explain.

c. Are documents classified according to theirown content?

d. Are cotton, rayon, silk, and paper typewriterribbons properly handled when used to prepareclassified material? How?

e. Are stencils containing classified informationproperly handled? How?

f. If Verifax, Thermo-Fax, or photostatic re-producing processes are used for classified infor-mation, what precautions are taken to insure thatmaster copies, negatives, waste, etc. are properlyprotected?

g. If a printing press is used for reproducingclassified material, how are matrices, master cop-ies, excess copies, waste, etc., protected from un-authorized disclosure?

h. What protective measures are in effect to in-sure that carbon paper used in preparing classi-fied information is properly stored and pro-tected?

i. Are drafts of documents containing classifiedinformation properly protected? Explain in de-tail.

D-19. Classification and Marking

a. Do files or groups of physically connecteddocuments bear the overall classification of thehighest classified components? Consider the ef-fect of a compilation on the overall classification.

b. Are letters of transmittal classified as highas the highest classified inclosure? If the letterof transmittal contains no classified information,are regarding instructions included?

c. Are extracts or portions of classified docu-ments properly marked with the security classifi-cation? Spot check.

d. Is the defense classification of paragraphs,sections, chapters, indorsements, annexes, inclo-sures, subjects or titles properly indicated? Spotcheck.

e. Is the defense classification of documentsproperly indicated? Spot check.

f. Are documents and paragraphs containingRESTRICTED DATA or FORMERLY RES-TRICTED DATA properly marked? Spot check.

g. Do the prescribed special handling noticesappear on documents that must not be released toforeign nationals? Spot check.

h. How are photographs, films, recordings,charts, maps and drawings containing classifiedinformation marked?

i. How is the classification indicated on mate-rial, products, or their containers?

j. How is material for training purposesmarked? Spot check.

D-18. Transmission

a. Is classified material transmitted outside,theunit surveyed? If so, what methods of transmis-

D-S

FM 30-17

i. Note any discrepancies found in the destruc-tion certificates.

j. How is classified material destroyed?

k. Do all reproductions of classified materialbear the same markings as the original? Spotcheck.

l. Are transmittals of investigative reports con-taining counterintelligence information annotatedin accordance with AR 381-130 if transmittedoutside intelligence channels? Spot check.

D-20. Regrading and Declassification

a. What procedure is being used for prompt re-view of all classified documents for regradingpurposes?

b. Are regrading instructions placed on allclassified documents?

c. How are holders of classified documents in-formed of nonautomatic regrading instructions?

d. Have documents been properly regraded ac-cording to the automatic or nonautomatic regrad-ing instructions? Spot check 5 to 20 percent ofthe documents on hand.

e. Do regraded or declassified documents bearproper authentication when required? Spotcheck.

f. If the unit has regraded or declassified origi-nal document, are recipients of the original dis-tribution notified? How?

g. How is authority obtained for regrading doc-uments deemed incorrectly classified?

h. How is material designated FOR OFFICIALUSE ONLY marked?

D-22. Emergency Plan

a. Destruction (in overseas areas).(1) Are these provisions for emergency de-

struction of classified material stored by the unitsurveyed? Explain.

(2) Have specific responsibilities been as-signed to individuals for implementation of theemergency destruction plan? Identify the person-l;1el. Are they aware of their responsibilities andthe provisions of the emergency plan?

(3) What facilities are available for emer-gency destruction?

(4) Where are the collection points located?(5) Is a system of priority marking of docu-

ments and material utilized in the unit? Explain.

b. Evacuation.(1) Are there provisions for emergency evac-

uation of classified material stored by the unitsurveyed? Explain.

(2) Have specific responsibilities been as-signed to individuals for implementation of theemergency evacuation? Identify the personnel.Are they aware of their responsibilities and theprovisions of the emergency plan?

(3) What vehicles or facilities are availablefor emergency evacuation?

(4) Where are the collection points located?(5) Is a system of priority marking of docu-

ments and material utilized in the unit? Explain.

D-23. Procedure for Handling TOP SECRET

The following will apply only if the unit sur-veyed stores or handles TOP SECRET informa-tion or material.

a. Have a Top Secret Control Officer and an Al-ternate Top Secret Control Officer been appointedon competent orders? Identify them and cite theparagraph number, orders number, date, andissuing headquarters.

b. Does the Top Secret Control Officer maintaina current roster of all personnel authorized ac-cess to TOP SECRET material? Include a copy ifavailable.

c. How is transfer of accountability accom-plished upon change of Top Secret ControlOfficer?

d. Does the Top Secret Control Officer maintaina permanent register of DA Form 2.133 (TOPSECRET Control Record) or DA Form 455 (Mail

D-21. Destruction

a. Who is the person authorized to destroy clas-sified material? Cite the authority.

b. Who is selected to serve as a disinterestedwitness to destruction? Is he truly disinterested?Explain.

c. Do the destruction officer and witness meetthe criteria established by AR 380-5?

d. Is the witness for SECRET destructionnamed on orders?

e. Are appropriate records of destruction main-tained? Who keeps them? Is the authority fordestruction cited??

f. Cross check the certificates of destructionwith the classified documents register to see thatthey are accurate. Does the register reflect all de-structions?

g. Is a record made of destruction of CONFI-DENTIAL material? Explain.

h. If a classified title is used, does the certifi-cate of destruction bear the proper marking?

D-6

FM 30-17

(Note. Personnel on orders, such as the TOP SE-CRET custodian, do not have to sign the fonD since accessis assumed.)

r. Explain in detail any discrepancies revealedin the last annual inventory of TOP SECRETmaterial.

and Document Register), as appropriate, reflect-ing receipt, dispatch, downgrading, or destructionof all TOP SECRET material for which he is res-ponsible? Check all for accuracy.

e. Using the register, account for all TOP SE-CRET material in the unit.

f. How is the transfer or receipt of TOP SE-CRET material documented?

g. Are all copies of TOP SECRET documentsproperly numbered for accounting purposes? Ex-plain.

h. Are results of annual inventory reportedthrough channels to the major command or DAagency on or about 1 April each year? How isthis accomplished? Check file copy (ies) .

i. How is TOP SECRET material transmittedin the clear? How is it transmitted when en-crypted?

j. How is the TOP SECRET material stored?Explain.

k. If a guard is used, is he properly cleared?How is he armed?

l. Does the TOP SECRET register reflect de-struction of any TOP SECRET material? If so,are the number and date of the destruction certif-icate included?

m. How is the TOP SECRET material de-stroyed ?

n. Who destroys the TOP SECRET material?Who witnesses the destruction? Do these person-nel meet the requirements established by AR380-5? Is the witness named on orders? E~plain.

o. Is each TOP SECRET document entered in-dividually on the destruction certificate? Are thedestruction certificates serially numbered in an-nual series for accounting purposes? Are DAForms 546 (Destruction of Classified Records)and 1207 (Record of Destruction for ClassifiedMessages) used to record the destruction of TOPSECRET documents?

p. Do all TOP SECRET documents have properinstructions regarding reproduction? Is properauthority obtained prior to extracting materialfrom a TOP SECRET document? Explain.

q. Are all TOP SECRET documents covered bya properly executed DA Form 969 (Top SecretDocument Record)? Does the DA Form 969clearly identify the document to which attached?Does the DA Form 969 reflect the names of ALLpersons having access to the document and thedate of such access?

D-24. Procedures for Handling RegisteredDocuments and Material

a. Has a custodian of registered documentsbeen appointed on competent orders? Does hepossess a TOP SECRET clearance? Identify thecustodian and cite the paragraph, orders number,date, and issuing headquarters of the orders ap-pointing him.

b. If an alternate custodian is appointed, in-clude the same information as required for thecustodian.

c. If there has been a change in custodians, hasa transfer certificate been accomplished? Spotcheck.

d. Was an annual report of possession made asof 1 April? Check file copy.

e. Are references to registered documents in re-ports of destruction by short title, register num-ber, and date, only? Spot check all documents.

f. Is DA Form 454 (SemiannualInventory jReport of Transfer of non-Army Reg-istered Documents) used for all transfers, or re-ports of semiannual inventory of registered docu-ments?

g. Are the DA Forms 454 properly executedand distributed? Check all of them.

n. Is a proper receipt of DA Form 454 in theplace of any registered document charged to theunit but not physically present?

i. Do all documents in which a long title ap-pears bear a classification equivalent to the de-fense information contained in the long title?Spot check.

j. Are registered documents destroyed on re-ceipt of authority from the Adjutant General?

k. Are copies of destruction certificates fur-nished the office of record?

l. How are registered documents stored? Mustbe stored according to security classification asprescribed in AR 380-5.

m. Conduct a check to insure that all pages ofregistered documents are physically present.

n. Did the last semiannual inventory reveal anydiscrepancies? If so, explain in detail.

0-7

FM 30-17

c. Are all RESTRICTED DATA or FOR-MERLY RESTRICTED DATA classified at leastCONFIDENTIAL?

d. How are the RESTRICTED DATA docu-ments marked?

e. Is each paragraph containing RESTRICTEDDATA or FORMERLY RESTRICTED DATAproperly annotated?

D-25. Procedures for Handling RESTRICTEDDATA

The following will apply only if the unit sur-veyed stores or handles RESTRICTED DATA.

a. Are semiannual physical inventories of TOPSECRET documents containing RESTRICTEDDATA submitted as of 30 June and 31 Decem-ber? Check to be sure.

b. What action will be taken in the event ofcompromise or possible compromise?

Section IV. PERSONNEL SECURITY

D-26. Key Personnel

a. Identify (name, rank/grade, SSN) the keypersonnel, to include the commander, deputy com-mander, and any staff officers whose functionshave a direct bearing upon security. Show the de-gree of clearance and time each has held his pre-sent position.

b. Identify any other persons considered essen-tial to the efficient operations of the unit, includ-ing the person's qualifications, degree of clear-ance, and time in this position.

c. Identify the Installation Intelligence Officer(nO) and the Installation Security ControlOfficer (SCO).

(1) Indicate the date, paragraph number,and issuing headquarters of the orders appoint-ing the no and the SCO.

(2,) What are the qualifications of the noand SCO?

(3) Do the no and the SCO have additionalduties that tend to hinder or interfere with theperformance of their duties as no or SCO? If so,explain them.

(4) Identify the no and SCO assistants, toinclude qualifications and time in the position.

e. Are clearances properly executed on DAForm 873 (Certificate of Clearance and/or Secur-ity Determination under ED 10450)? Spot check.

f. Who executes the clearance certificates?

g. Does the person authorized to grant clear-ances possess a TOP SECRET clearance him-self?

k. Does the "Remarks" section of clearancecertificates reflect the results of any reviews con-ducted?

i. How frequently are clearances reviewed?

j. Is a security oath attached to each interimand final cryptologic clearance certificate?

k. What criteria or prerequisites must be metfor issuance of a clearance? Spot check 5 to 20percent of the personnel records to substantiatethat appropriate investigation was conducted inaccordance with AR 604-5.

l. Is a copy of the request for clearance or re-quest for PSI maintained in the personnel rec-ords of the individuals concerned to prevent du-plicate requests?

m. What system is used to insure cancellationof investigations when the SUBJECT is trans-ferred, discharged, or for any reason has no needfor a clearance?

n. Are final and interim clearances entered onthe appropriate form in the individual's person-nel records? (DA Forms 20 and 66)

o. Are the clearances in accordance with exist-ing policies and directives?

p. Are separate name files maintained on mili-tary and civilian personnel on whom investiga-tions are pending under AR 604-10 and AR690-1, respectively?

D-27. Personnel Security ClearancesAdministration

a. Who maintains the roster of cleared person-nel?

b. What information is included in the roster?

c. List any personnel who have access pendingclearance. Indicate the degree of access and na-ture of their duties.

d. Who maintains certificates of clearance?

D-8

FM 30-17

j. Does the debriefing process incorporate posi-tive instructions to preclude release of classifieddefense information to unauthorized persons?

k. Is a copy of the Attorney General's list oforganizations whose interests are in conflict withthose of the United States posted conspicuously?

l. Are all appropriate personnel receiving aSAEDA orientation? (AR 381-12)

m. Are all appropriate military and DAC per-sonnel receiving an orientation on the threatposed by, and procedure to counter, use of clan-destine listening devices by hostile agencies?(AR 381-14)

q. Is there a checklist or SOP to insure properhandling or processing of security risks? De-scribe it.

r. Are all records of military personnel consid-ered a security risk properly flagged? Who main-tains the DA Forms 268 (Report for Suspensionof Favorable Personnel Action)?

8. Are the records of all newly assigned person..nel screened to insure a valid DD Form 98(Armed Forces Security Questionnaire)? Spotcheck.

t. Is the number of clearances in excess of theminimum consistent with the needs of the com-mander concerned to carry out his mission?

D-28. Security Education

Is there a formal training program for security?If so:

a. How often is training conducted? Who con-ducts the training?

b. What subjects are included in security train-ing?

D-29. Emergency Plan

Does the installation have an emergency planwith provisions for action in case of enemy at-tack, disaster, dispersion, evacuation, blackout,air raid, riots, or civil disturbances?

a. Are all personnel familiar with the provi-sions of this plan?

b. Have practice alerts been held to test the ef-fectiveness of the plan and the proficiency of per-sonnel in implementing it? When was the lastpractice alert? What were the results?

c. Is there an SOP for dissemination of air raidwarning messages? Explain.

d. Are personnel familiar with this SOP andthe audible air raid signal?

e. Does the emergency plan include proceduresfor maintaining security during an emergency?

D-30. Morale

a. Based upon interviews and observations, isthere any indication of low morale? Explain.

b. If there are indications of low morale, deter-mine the cause or source.

c. Has there been any trouble of a racial, reli-gious, labor or political nature traceable to anysource or reason of security significance? Ex-plain.

d. Is there a labor union or organization repre-sented by employees of the installation? If so, in-dicate the name and address of the local head-quarters.

e. Have there been any instances which appearto involve intentional or deliberate work delaysby personnel? If so, explain in detail.

c. What is the average length of the traininglecture?

d. Is attendance mandatory at security traininglectures? How is attendance insured?

e. Is a current and correct local security policyin published form available to all personnel?Does it contain sufficient details and references?Are all personnel required to read and become fa-miliar with the policy? How is this enforced?

f. Are security posters available? If so:

(1) Are they adequate in number and em-phasis? Where are they used?

(2) Do the posters contain "eye appeal"?

(3) How frequently are security posterschanged?

(4) Where are security posters produced?

g. Are personnel required to read Army Regu-lations pertaining to security periodically? Howoften? How is this enforced?

h. What type security orientation is givennewly hired or assigned personnel? Who con-ducts this orientation?

i. What debriefing program is utilized for per-sonnel terminating their assignment or employ-ment?

D-9

FM 30-17

b. What is the organization of theinstallation/activity? (Include a chart if applica-ble.)

.c. How many foreign nationals areemployed/assigned to the installation/activity?

(1) Do any foreign nationals engage in clas-sified work or have access to classified informa-tion? How many?

(2) Indicate the date, degree of access, andapproving authority of the authorization for ac-cess.

(3) Are any of the foreign nationals em-ployed members of or in sympathy with subver-sive organizations or activities? If so, give de-tails.

f. Is a record maintained of continuous or re-peated spoilage, negligence, errors in judgment,or similar instances that may cover subtle sabo-tage? Include an explanation of any such occur-rences on record.

g. Are there any records of indications of dis-affection? Explain and give details.

h. Is there an excessive amount of absenteeismamong civilian employees? If so, what is thecause?

i. Is a record kept of monthly absenteeism?Spot check to determine if any individual is ab-sent an excessive amount of time.

j. Is the monthly turnover excessive? If so, isit traceable to any reason or source of securitysignificance? Explain.

d. Have requirements of AR 604-20 been metfor individuals engaged in information and edu-cation work? Spot check.

D-31. Personnel Security, General

a. How many personnel are employed/assignedat the installation/activity? Give a breakdown ofofficers, enlisted men, and civilians.

e. Have requirements of AR 50-3 been met forindividuals with nuclear weapon responsibilities?

Section V. COMMUNICATIONS

D-32. Co~munications Systema. What is t!.le primary means of communica-

tions utilized on the installation?

b. What additiona) systems are used?

connecting boxes, cables, etc., protected and fre-quently inspected for indications of wiretapping?How?

(12) Is auxiliary power available in the eventof a power failure? Explain.

(13) Are auxiliary parts available for re-pairs?

(14) What measures are taken to prevent dis-cussion of classified information over the tele-phone?

b. Is there an approved circuit on the installa-tion?

(1) Who was the approving authority?

(2) Describe the approved circuit.(3) What parties are connected by the cir-

cuits?

(4) When and by whom is the circuit in-spected for sabotage or tapping?

(5) What preventive measures are taken tosecure the circuit?

c. If the installation uses a commercial tele-phone system:

(1) What company provides the service?(2) What measures are taken to prevent dis-

D-33. Security Measures

a. Does the installation have its own telephonesystem or does it use a commercial system? If ithas its own system:

(1) Where are switchboards located?

(2) Are switchboards adequately guarded?

(3) Have switchboards been declared Res-tricted Areas?

(4) Are operators civilian or military?(5) If civilian, how are they procured?

(6) Are operators cleared? To what degree?

(7) Are maintenance personnel civilian ormilitary?

(8) If civilian, how are they procured?

(9) Are maintenance personnel cleared? Towhat degree?

(10) Are lines overhead or underground?

(11) Are open wires, terminal boxes, cross

D-10

FM 3G-17

cussion of classified information over the tele-phone?

(3) VVhat measures are taken to prevent ordetect wiretapping?

(4) When were previous CI technical sur-veys or inspections conducted?

~

d. Does the installation/activity have radiocommunications? If so:

(1) What type information is sent by radio?If classified, are code systems available? Has itbeen approved by USASA?

(2) Are the operators familiar with securityrequirements of radio transmissions?

e. Is teletype or telegraph used on the installa-tion? If so :

(1) Where is it located?

(2) What security measures are taken to in-sure that classified information is not sent in theclear?

f. What measures are taken to insure that op-erators are adequately cleared?

g. When are inspections conducted by USASA?

h. Describe other communications media usedon the installation. Include the safety precautionsexercised to prevent unauthorized disclosure ofclassified information.

i. Does the installation/activity have a messagecenter? If so :

(1) Where is the message center located?

(2) Give a detailed description of the mes-sage center, including measures taken to secure itfrom unauthorized access.

(3) Has the message center been declared aRestricted Area? Give details.

(4) Are message center personnel militaryor civilian? If civilian, where and how are theyprocured?

(5) Are the message center personnelcleared? To what degree? Is this sufficient forthe category of information handled?

(6) Is someone on duty in the message centerall times? Give details.

(7) What category of classified informationis handled in the message center?

(8) What storage facilities are available?

(9) How is distribution made by the messagecenter? Individual pickup, courier, delivery sys-tem?

j. Does the installation/activity utilize a courierservice?

(1) Are the couriers military or civilian?(2) Are the couriers cleared? To what de-

gree?

(3) What category of classified material iscarried by the couriers?

(4) Are couriers armed? With whatweapon?

(5) What transportation is utilized by thecouriers?

(6) Are couriers familiar with procedures tobe followed in an emergency, such as an at-tempted or actual theft of classified material, ve-hicular accident, or other incident(s) ?

k. What provisions for communications in theevent of an emergency have been made? Describein detail.

Section VI. UTILITIES

D-34. Electricity

a. What is the source of the electrical powerfor the installation/activity?

b. If purchased from a commercial source:

(1) Does power enter the installationthrough underground cable or overhead lines?Where do the lines enter the installation?

(2) What measures are taken to protect thepower lines from tampering or sabotage?

(3) What is the peak load demand? Is the

power received sufficient to provide an ample re-serve beyond the peak load demand?

(4) Where is (are) the primary transformerstation(s) ? How are they protected?

(5) Where are substations? How are theyprotected?

(6) Who is responsible for maintenance ofthe power system?

(7) How frequently and by whom is thepower system checked and inspected?

c. If power is generated on the installation:

FM 30-17

e. What is the water demand on the installa-tion?

f. Is the source adequate when compared to thedemand?

g. What is the water pressure on the mains?

h. Are pumping stations protected? How?Where are they located?

i. Are the pumps frequently inspected? When?By whom?

j. Are mains, control valves, by-pass valvesprotected? How?

k. How often is water tested for purification?By whom? How is the test made?

l. Is an emergency water source available? De-scribe it to include location, capacity, potability.

m. What type sewer system is used? Does itappear adequate for the needs of theinstallation/activity?

(1) Where is (are) the powerhouse(s)?(2) How are they protected from unautho-

rized access/sabotage?(3) Is the amount of power generated suffi-

cient to provide an ample reserve beyond thepeak load demand?

(4) Where are the substations? How arethey protected?

(5) Who is responsible for maintenance ofthe power system?

(6) When and by whom is the power systemchecked and inspected?

(7) Explain any other measures to protectthe power system from sabotage.

d. What is the emergency power supply? Canit be actuated immediately?

(1) What activities are supplied with emer-gency power? Is the emergency source sufficientto provide the key facilities with electricity?

(2) Who is responsible for emergencypower? Include maintenance and inspection.

(3) Is the emergency power source located ina secure area? Describe.

e. Is there a main blackout switch on theinstallation/activity? Who controls it? How is itprotected? Where is it located?

D-35. Water

a. What is the source of water for theinstallation/activity?

b. Is the source reasonably safe? Explain.

c. If a public source is used, what is the diame-ter of the main and where does it enter theinstallation/activity?

d. If a private system, reservoir, or tank isused, what is its capacity, water level, pressure,and condition? How is it secured?

D-36. Heat

a. What is the source of heat for activities onthe installation/activity?

b. Is central heating provided? If so, where arethe plants located and how are they protected?

C. Is the heating system periodically inspected?When, by whom?

d. Who is responsible for the heating system?Are maintenance personnel cleared if they are tohave access to sensitive areas?

e. Is there an emergency heating system? De-scribe it in detail.

j. Where is fuel procured? Is it inspected to de-tect contamination? When, by whom? How is itstored? Where?

g. If rooms are individually heated, what pre-cautionary measures are taken to prevent fires?

Section VII. RECOMMENDATIONS

to continue, and solutions must be presented tocorrect them. Positive and concrete recommenda-tions as opposed to suggestions should always beused.

0-37. Recommendations

Careful consideration must be given to recom-mendations that are presented to the commanderduring the final briefing and when written in theCounterintelligence Survey Report. Recommenda-tions must be feasible, realistic, and consistentwith the overall sensitivity and importance of theinstallation or activity. Deficiencies in securityshould be concisely stated in pointing out whateffect they may have on the command if allowed

D-38. Inspections

All items listed under Security of Informationand Personnel Security may be used in a Counter-

intelligence Inspection.

D-12

FM 30-17

APPENDIX E

NARconc AND DRUG ABUSE GUIDE

of time. Amphetamines are prescribed for over-weight patients, to reduce their appetites; incases of narcolepsy, a disorder characterized byan overwhelming desire for sleep; for Parkin-son's disease; and in some cases of minor mentaldepression. Because the body develops a toleranceto amphetamines, abusers increase their dosagesgradually, which exaggerates the normal effects ofthese drugs and results in excitability, talkative-ness, and can cause dryness of mouth, bad breath,tremor of the hands, enlarged pupils and heavyperspiration. Delusions and hallucinations canoccur if used in a large quantity. In serious cases,a drug psychosis resembling schizophrenia devel-ops with a psychic or emotional dependence onthese drugs. Continued abuse of amphetamines cancause a person to exhibit dangerous, aggressive,antisocial behavior. Its physiological effects in-clude high blood pressure, abnormal heart rhy-thms, and even heart attacks.

E-1. General

Narcotic investigations should only be handled byCriminal Investigators of the USACIDC withinthe Army establishment except under exceptionalcircumstances which involve high level nationalsecurity. Such instances should be coordinated atthe highest practical level to determine if thecase should continue under military intelligencejurisdiction, military police jurisdiction, or jointauspices.

b. Depressants. This group includes the barbi-turates, the most widely abused among the de-pressants. Barbiturates depress the central ner-vous system and are prescribed in small doses torelieve tension or to induce sleep. They are alsovaluable in cases of acute anxiety, hyperthyroid-ism, epilepsy, and high blood pressure. Becauseof their sedative but nonanalgesic effects, barbitu-rates are used in treating both physical and men-tal illnesses. Continued and excessive dosages ofbarbiturates result in slurring of speech, stagger-ing, loss of balance and falling, quick temper, di-lated pupils, and a quarrelsome disposition. Over-doses, particularly when taken in conjunctionwith alcohol result in unconsciousness and death,unless given proper medical treatment. While anunsteady gait and speech problems may be signsof neurological disorders, such as multiple sclero-sis, such diseases are uncommon among youngmen. Usually, the appearance of drunkennesswithout an alcoholic breath indicates barbiturateintoxication but it must also be noted that manydiseases will manifest such an appearance; there-fore, this should only be used as an indicator. Al-though physical dependence does not develop

E-2. ApplicationThe most common instances when military intel-ligence Special Agents will require some knowl-edge of narcotics are:

a. Inductees who have qualified their DD Form398 as pertaining to the use of narcotics.

b. When polygraph tracings indicate the use ofa narcotic.

c. In routine or complaint type investigationswhere witnesses indicate the subject has useddrugs and a subject interview becomes necessary.

d. When a human source has unexplainedlapses of memory or other peculiar characteris-tics are demonstrated.

e. During the conduct of a special investigationinvolving unexplained affluence or indebtednessof a person in a sensitive or critical position re-quiring a security clearance.

E-3. Pharmacology of Drugs

Drugs are normally subdivided into four basiccategories-depressants, stimulants, hallucino-gens and narcotics-and each have general char-acteristics of their own within these basic group-ings.

a. Stimulants. This group of drugs, which in-cludes the amphetamines, directly stimulates thecentral nervous system, producing excitation,alertness, increased initiative and activity, and anability to go without sleep for protracted periods

E-1

FM 30-17

panic. This variability of hallucinogenic drug ef-fect is a definite danger to users. The spontaneousoccurrence of "flash backs" of prior hallucina-tions is another harmful effect of certain hallu-cinogens, particularly LSD.

d. Narcotics. This group of drugs consists ofopium, coca leaves, as well as any preparation,salts and compounds of these, and synthetics de-rived from these basic drugs. Narcotics are usedmedically to relieve pain and produce sleep ordrowsiness. Heroin and codeine, both of whichare derivatives of opium, are the most commondrugs in this category. Heroin is found in varyingshades from snow white to light brown, is odor-less, and has a bitter taste; however, suspiciouswhite powders should not be tasted by any Spe-cial Agent as a check on the narcotic. Heroin isusually taken intravenously (mainlined) but itcan also be taken orally or by inhalation. An ad-dict or user who mainlines normally will have inhis possession, or accessible, the "paraphernalia"necessary for mainlining. This normally includesa spoon with a bent handle, matches, medicinedropper, hypodermic needle, and maybe a rubbertube which he will use as a tourniquet to makehis vein stand out for easier injections. Dosagecan begin as small as 2mg a day and work up to450mg a day. The mere possesssion of parapherna-lia will give civilian police and CIDC "probablecause" to detain the suspect. An addict or user onheroin can manifest the following symptoms:lethargy, drowsiness, constricted pupils, itchi-ness, constipation, upset stomach, watering eyes,runny nose. With hard narcotics, there are fourfactors which will cause addiction. These factorsare:

with the dosages normally used in medical prac-tice, it does occur with the excessive doses usedby drug abusers. .A tolerance is also developed.Withdrawal symptoms usually are far more dan-gerous than those resulting from narcotics with-drawal. In addition to the strictly depressantdrugs, another group of drugs, tranquilizers, par-ticularly those in the phenothiazine derivativegroup, are frequently sought after and abused.While they will not cause sleep except in highdosages, and are not purely depressive or stimula-tory, they will impair an individual's judgmenteven to the point of complete disregard for anyapplicable security requirements.

c. Hallucinogen.s-. This group consists of theso-called psychotomimetic agents, and are sonamed because they may produce hallucinationsor illusions of the various senses. When experi-encing an hallucination or illusion, a person'sability to perceive is based not upon objective re-ality but upon distortion or imagination. Most ofthe hallucinogenic drugs, such as lysergic aciddiethylamide (LSD), in illicit channels of distri-bution are manufactured in clandestine laborator-ies. Legitimate chemical manufacturers do prod-uce some of the hallucinogenic drugs, but only forinvestigational purposes. Some of these drugshave been diverted to the illicit market throughthefts of illegal purchases. Although openly andirresponsibly promoted as a means of expandingconsciousness, the hallucinogens have yet to beproven valuable medically. Hence, there are nei-ther standard dosage forms nor markings whichmake visual identification possible. Illicit labora-tories produce hallucinogens in the form of cap-sules, tablets, powders, or liquids, which peddlersand users often disguise in common personalitems, such as sugar cubes, candy, paper, aspirin,jewelry, liquor, cloth, or even postage stamps.Usually hallucinogens distort or intensify theuser's sense perceptions and lessen his ability todiscriminate between fact and fantasy. A usermay speak of "seeing" sound and "hearing" col-ors. He will appear to be in a trance-like state,and will have an increase in heart rate, bloodsugar and blood pressure. His pupils are dilatedand sensitive to light. Perceptual changes in allsenses may occur, and he may become fearful andexperience terror. Restlessness and sleeplessnessare common until the drug wears off. The usercan have nausea, chills, flushing, irregular brea-thing, sweating and trembling hands. Mental ef-fects of the drugs are unpredictable and includeillusions, exhilaration, withdrawal from society,ideas of violence or self-destruction, or sheer

(1) Compulsion-desire for the drug.(2) Tolerance-the increasing limits of con-

sumption.(3) Physical-the craving for the drug

which will result in withdrawals when takenaway.

(4) Psychological-the belief that the drugis necessary.

E-4. Indicators

a. Since drugs are found in common usage insolid, powder, and liquid forms, and taken in var-ious forms, an investigation of a purely drug usecase should be performed by qualified personnelfrom the local CIDC office. The CIDC has auto-matic jurisdiction over drug use, which is a crim-inal offense, unless security matters override,which should be rare. Indications are that be-

E-2

FM 30-17

to 10 hours and may be detected by various tests.One of the tests is a urinalysis. However, in addi-tion, there are field test kits which can be pur-chased for testing of a suspicious liquid or sub-stance, but these kits will not prove the existenceof a particular drug. They will only indicate thepossibility of its existence. Also, the average lifeexpectancy of some kits is only 30 to 90 days.Other drugs, like LSD, will floresce when sub-jected to ultraviolet light. Special training isneeded before becoming qualified to depend on thevarious tests as accurate indicators for detectionof drugs in the body

E-6. Marihuana

Marihuana and cocaine are both classed as nar-cotics from a lawenforcement standpoint and willimpose a psychological dependence on the abuser,but marihuana is a hallucinogen while cocaine isa stimulant for all practical purposes. Neitherare known to cause physical dependence or de-velop a tolerance; however, both are dangerous ifabused. Marihuana can cause hallucinations simi-lar to LSD, and can produce symptoms such asdistortion of depth and time perception. Whileunder the drug, the eyes may become pink. Abu-sers are difficult to identify unless under the in-fluence of the drug. Under the influence, theymay appear animated and hysterical which maybe expressed by loud talk and laughter. Mari-huana will cause a loss of coordination, distortionof visual and auditory sensations, impairment ofjudgment and memory, confusion and delusions.Hashish is a concentrated marihuana which hasbeen created by obtaining the resin from thegrowing plant or a similar method. Marihuanathe drug is obtained from the plant Cannabis sa-tiva L., and consists of the leaves, flowers, stems,and seeds but not the stalk. Marihuana plants arebisexual, and can be positively identified under amicroscope since it is profusely covered with finehair, but better identification can be made fromthe leaves, seeds, and seed hull even if the planthas been finely crushed. The most distinctiveidentification is the cystolith hair on the upperside of the leaflet consisting of a stalectic and agradular hair. Visually, identification can bemade by inspecting the plant. Basically, theleaves are compound, and normally consist offrom five to eleven leaflets with seven an average.The stalk will grow from 3 to 16 feet in heightwith an average height of 4 to 6 feet. The leavesare jagged in appearance.

, ,\ ~,, '.

cause of the control problems presented by an ad-dict or user, hostile intelligence services will notrecruit a user except on a one-time job. However,to determine if a person might be a securitythreat as a result of drug use, the following indi-cators are given:

(1) The physical characteristics as describedunder each category above.

(2) When a person hides pills or liquidswhich appear to be legitimate.

(3) Old prescription bottles are suspect.(4) A name different from the suspect's on a

prescription bottle.(5) Strong odors emulating from cigarettes.(6) "Tracks" or tatoo appearing scars on the

arms, wrists, feet or hands which could be a re-sult of mainlining.

(7) A redness or swelling in the partition ofthe nose.

(8) A sallow complexion, trembling hands,dilated eyes, going on the nod or sleeplessness.

(9) Long periods of time in the latrine atregular intervals, such as every 4 or 8 hours.

(10) Wearing of sunglasses.(11) Sloppy appearance.(12) Uncontrollable temper.(13) Long shirt sleeves on hot days.(14) Indebtedness.(15) Unexplained affiuency.(16) Theft.(17) Constant borrowing of money from co-

workers.(18) Inattention to dress or personal hygiene.(19) Association with drug users.(20) Personality changes.(21) Gaiety followed by marked depression.(22) Cold skin.(23) Possession of blank or undated prescrip-

tion forms.

b. It must be remembered at all times thatsome individuals have a legitimate need and usefor drugs such as a diabetic, or an individualwith thyroid problems. Any suspicious activity onthe part of an employee or soldier where doubtstill remains should not be investigated by mili-tary intelligence but by the CIDC.

E-5. Detection

Drugs in the us'ual dosages taken by addicts willremain within the individual's system for about 8

E-3

FM 30-17

INDEX

Paragraph

11-2,

12-116

Theawr 2-7aArrest, authority 3-8

ASCOM (area support command) :

MI Company (CI) (fig 2-6) --

MI Detachment (CRF) (fig

2-5) MI Group (CI) (fig 2-3) HQ MI Group (CI) (fig 2-4) --

Audio surveillance (fig 5-1, 5-2) -

Equipment Augmentation:

Civil police Tactical troops Background Investigations:

Components ,,-Scope :.

B d ed " t ' -'. a cr 1 ~--

,Barbiturates ---~;BI kl "

t '"ac IS c

Page

11-1,12-82-33-7

Paragraph Page

4-184-27b

4-181-13-2

3-113-1, 3-2,

4-23-2, 5-8

8-5

3-2, 3-9,

4-8,5-10

II ABC" method of surveillance

(fig 4-1) II AB" method of surveillance

(fig 4-2) Accreditation of special agent ---

Accused person, Rights of Administration of oaths Administrative proceedings2-72-12

2-102-82-95-2a,5-35-4,11-2

5-1,5-2,1Admissions Adverse information

Advising of rights --

4-27b1-2

3-6

3-27

3-2b,3-4,3-6b,4-3e

3-6,5-128-19

3-6,3-16,4-12,5-20d

-12-10a

-12-10a12-612-6

9-'7B-1

Advocating overthrow of US

Governrnent 9-19

Affidavit app B

Agent:

Notes ' Report --.;... ' Special --" ."'~ -,,- Agreernent:

Delirnitations ,. Status of forces ~-

Aiding the enerny Air reconnaissance and

surveillance Allied forces Arnphetarnines Announced counterintelligence

inspections Apprehension ;

8-18-18-4E-1

12-5,12-813-5

8-4"--- 8-3

8-16c..' Eapp

12-9a,12-11b

1~h

B-17-2, B-1

1-1

-appB-7-5, app B-1-2

1-21-2-

9-6

1-4a1-4c9-15 13-.'3

12-16,14-4

13-5

5-4

6-2

Block controlBorder:

Control -

Security

-13-6-12-1.6e,

14-11i-13-10-5-5

-6-4b

--2-9d

--6-100

--app E

2-56-4E-l

10-83-7,3-8,

4-13

Base camp security (, ..,

"Bugging" ;

Casual source Central Intelligence Agency

(CIA) 8-15bCentral records facility (fig 2-5) --2-10Characterization 7-8

Individual i~~ app B

Organization ---;; app BChecklist 10-4,

11-4,app D

~--- 4-2704 12-16c,

14-11kSurveillance 4-27cStatic (fig 12-2) "--:.~--- 12-16c,

14-11k-, r 14-110 .1-;: 8-13

2-7,2-9,..12-9,

12-12a12-16,14-1,14-214-8

1.0-16~3-8,3-14,

4-17d8-42-57-3

B-1B-1

10-2,11-2,D-14-22

12-16,14-44-22

12-16,14-4

14-48-4

2-3, 2-4,12-5,

12-10,12-12,14-1,14-3,

4-14

4-64-214-9

2-4 2-1

12-5a,13-912-3,13-52-7 2-3 Checkpoint ---

Mobile ---

2-42-42-7

-2-8-2-8a-'2-12

Approach:

To elicitation ~ To interviews Area:

Army, organization Coverage " Rear Area support:

Command Group MI Company (CI) (fig 2-6) -

MI Detachment (CRF) (fig

2-5) MI Group (CI) (fig 2-8,

2-4)

2-10 2-5 Circulation control

Citizenship Civil affairs

2-8 2-4

2-12-4

4-27,10-1,10-7,

Army:Area organization Field Security Agency -2-4

-2-7b

-4-82b,

lO-ld,10-12d,

Index-I

2-52-42-45-21-1

FM 30-17

P~e

12-11,14-4

12-612-1,14-2

11-32-4

4-15

E-1

4-18,4-27

4-27

Paragraph Page

10-14 10-73-6a, 3-2,

12-11 12-74-7, 4-10, 4-5, 4-6,

4-12, 4-8,app B B-1

1-3a, 4-1, 1-1, 4-1,4-16, 4-12,12-12a 12-10,app E E-l

1-3 1-11-4 1-21-3 1-11-5e 1-31-2 1-12-2 2-11-5 1-21-2 1-11-36 1-21-3c 1-27-11 7-313-1 13-110-1, 10-1,

app C, C-l,app D D-l

12-3, 12-6 12-1, 12-412-4a 12-211-16 11-1,

11-2d, 11-211-36

11-1a, 11-1,11-2c, 11-211-3a

9-7 9-29-23 9-88-16 8-4

Civil disturbancesInspection --.InterrogationsCivil police, augmentation

Civil security Interviews

Clandestine listening devices Clearances, indigenous labor force

Close surveillance Cocaine CodesInvestigations

Para/traph

12-12b,14-11;

12-1Oa12-3b,

14-711-72-90-4-25aapp E4-26/, 4-32b

.

4-81

12-114-25b, 4-27c

12-74-15,

4-224-1810-1

Collection of physical evidence

Combat counterintelligence

interrogations ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~

Combination surveillance ~ ---

4-261,4-27b10-1d

Communications Communications security

Complaint investigation:

Categories --

Conduct

9-39-7,9-10,

9-12, 9-16,9-21

9-Za9-2b

9-19-2, 9-4,

9-6,9-79-19-1

Jurisdiction -~::~ -.Limitations -.,", -'7 -.M ' , "."

Isslon Offensive : -~ _.

Officer Organization ---~ -

Principles Personnel ---~~ Services Special operations -

Spot reports Stability operations

Survey

Incident Personal Components of a Background

Investigation Compromise of surveillance --

Confessions

8-44-28h3-6, 3-14

3-16c,4-1715-12

6-53-7b14-14a9-18

8-14-25

3-2, 3-8,3-9,

4-14,5-8

6-23-5

14-49-7

Tactical operations -

Target lists Technical inspection

Technical surveys

Countersabotage ~-

Countersubversion Credit, bad j Crime:

Definition Prevention surveys 3-310-3,

10-6,app D

3-110-2,10-3,

D-l2-46-13

2-16-4

Criminal Investigation Command,US Army 6-15c,

10-6,app E

5-15d,app E

6-4,10-3,

E-1

5-9,E-1

2-6

2-3

'2-26-1, B-1

4-154-26

2-56-4, app B4-224-29a

Depressant

Confidential source Consent search (fig 3-1) Consolidation operations Conspiracy, seditious CONUS (Continental United

States)Military Intelligence group

(fig 2-2) National agencies Special counterintelligence

units Tactical counterintelligence

elements Conventional source Conversation "Convoy" Cordon and search operations

(fig 13-1, 13-2, 13-3) Assistance from PSYOP --

With military police Counsel, refusal of Counterespionage:

Conduct Investigations Counterintelligence:

Area coverage

Derogatory infonnation:Loyalty 8-19bSuitability 8-19aRebutted 3-13a

Detecting surveillance c- --4.J29Detection equipment 11-5Directives, National Security ---14Disaffection 9-24Disclosure of official infonnation --4-11gDiscreet surveillance 4-25aDocwnent:

Security 10-10Transfer "::"'- 12-4a

Docwnentary :Evidence 4-32Source 6-6

8-58-53-8

4-2511-21-29-84-7

4-15

13-10b14-14h14-11k3-6d

13-614-414-43-8

9-129-10

9-49-4

12-5a, 13-8 12-3,13-512-6

1-1, 2-1

12-8,12-12

10-512-2

A ugrnentation

EmploymentIndications --

12-101-8, 2-3

12-116,12-16

4-276-2

Index-2

FM 30-17

Paragraph

12-8a,12-10c

5-2d 5-10,

Page

12-4,12-7

5-2, 5-7

Paragraph

4-12d,4-17d

Page

4-8,4-13

Targets -- Female, interview -

Files:Counterintelligence -2-10,

12-13-1'2-100-4-25b,

4-27a

Foreign travel --_':_' 8--15b

Format:

Agent Report (fig B-1-

B-6) Report of Investigation (ROI)

(fig B-8) Summary of Information

(SOl) (figB-9-B12) Survey and inspection reports-

2-5,12-1212-7

4-16,4-18

8-4

Documentation, false DOD affiliated:

Organizations 1-5d

Persons, arrest of 3-8d

Persons, definition 1-5d

Drugs 5-15d,f,

app E

Education, security , 10-19

Electronic Security --~ 10-ld

Elicitation:

Approach Preparation for Eluding surveillance Entry, surreptitious Equipment, detection Escort officer Espionage Incident to a crime Investigative guide Statutes Evaluation of witness Evidence

1-33-71-3

5-9,E-1

10-910-1

Evacuation of --Fixed surveillance ---

.

app B

B-1

app B

B-1

app B10-17,

10-18,app C

B-110-9,C-1

Sworn Statement (fig 3-?'-3-4)

3-12,

app B

3-8,

B-1Technical Survey and Inspec-

tion Reports 11-8,app C

12-413-6

12-9a,12-11b

11-8,C-l

12-213-3

12-5,12-8

Foward areas --Frontier Control

Gray list

Administrative proceedingsAffidavit Collection Documentary Illegal search and seizure --

Group Military Intelligence (fig

2-2, 2-3) Group, target Guidelines, espionage investiga-

tions Hallucinogens app E

Harbor security 12-16d,

14-11{Hashish app E

Hearsay infonnation app B

Host country 6-150,13-10b

Human sources 6-3

Illiterates, interviews of 4-40

Imagery interpretation 2-9d,

14-15Incident complaint investigations -9-2a

Incidental source ~Indicators, counterintelligence ---12-116,

12-16,13-10,

13-40,

'-' :.. app E

2-4, 2-812-9

2-1, 2-412-5

9-10 9-4

E-l12-16,

14-3E-lB-16-4,

13-66-1

4-322-5,

14-49-16-1

12-8,12-12,

13-113-2,E-l

4-1714-113-3

12-1014-114-2

Involuntary Lawfully obtained Photography Physical (fig 4-4) ,

Release of Rules of Search for t..-'-_.

StateD1ent " TestiD1onial " Transmittal of Unlawfully obtained Examination of records Access :--.

Reliability :C' Types :-

-4-21 4-14-4-20 4-14-4-30 4-26-5-2b, 5-6 5-1, 5-5-ll-5 11-2-10-5 10-3-9-8 9-3-14-llk 14-4-9-10 9-4-9-9 9-3-4-15 4-12-3-2, 4-31, 3-1, 4-27,

4-33 4-~-3-2b, 3-4 3-1-4-3a, app B 4-2, B-1-4-3e 4-2-4-32 4-27

-3-7a, 3-5,3-10 3-8

-3-611, 3-5-3-2b 3-1-5-8 5-7-4-31 4-27-4-35 4-29-3-4 3-1-3-7c,3-14 3-7,3-8-app B B-1-4-37 4-31-4-34c 4-29-3-9 3-8-4-4, app B 4-2, B-1-4-4b, 4-6 4-2, 4-4-4-4c 4-2-4-4a, 4-5, 4-2, 13-9

13-13-app B B-1-10-13 10-7

Exhibits Exit briefing Explanation of Rights:

Acknowledgment of 3-4,5-103-93-23-33-53-2

3-2, 3-9,4-83-2

5-2, 5-7

By undercover agents Failure to give How given Improper Manner in which given --.

To whom given

3-6e,5-20d

3-16d3-6a3-6c3-6i3--6b3-6, 3-16,

4-123-6a

5-2d, 5-10

Indigenous persons as surveillants -4-26dAttitudes 14-5In an insurgency 13-5bInvestigations 12-12Loyalties 14-4Procurement and recruitment 14-6

Information:Classified release of 4-38dDerogatory 8-19Hearsay ~ app B

4-318-5B-1

Waiver of False documentation Federal Bureau of Investigation

(FBI) 1-4a, 4-13a 1-2, 4-9

Index-3

FM 30-17

Paragraph Page Paragraph

9-2412-12a,

14-41-49-20a8-2, 8-58-1, 13-3,

app E12-12b1-3a9-1\8,

9-20b9-16

Page

9-812-10,

14-11-29-7

8-1, 8-28-1, 13-2,

E-112-11

1-19-7

Obtained from Government

AgenciesDisaffection Indigenous persons "

6-15b,app B4-11010-10,

13-414-40

6-4,B-14-710-5,

13-214-1

Official disclosure of Security ofLimitations of Mutiny National Agency Check Personnel Security

-10-16a-10-14-10-16c-10-17,

11-8,app C-11-1b,

11-2d11-3b

-10-16b

10-810-710-810-9.

11-3.C-1

11-1.11-2

Riots and civil disturbancesSecurity Seditious conspiracy

Infrastructure '-- Inspection:

Announced Counterintelligence --.

Penetration Reports

..

9-6

Technical

Treason Investigative:

Agencies 6-15Guides 9-10Jurisdiction 1-5d,

13-9Legal principles 3-1Photography 5-2c, 5-7Plan 4-2Procedures 9-7,9-12,

9-16,9-121

Reports app BTechniques ~ 4-3

Involuntary evidence ~ 3-6Involuntary statement 3-6

Judge Advocate General (JAG) --3-4b,3-6Jurisdiction 1-3,13-2,

13-9

Key Sheet (fig B-7) " app B

Lawfully obtained evidence 3-2b, 5-2cLead 4-l1.i,

app BFrom Government agencies --6-15b,

app BFrom records 4-3aJurisdictional app BSheet app BSubsidiary app B"Throw Offs" -~-- ---'- " app B

Legal principles 3-1Liaison ~ 4-6b,

6-12Allied forces " --6-15c,

14-1Civil affairs ~ ---14-1, 14-2CONUS agencies 6-13,6-14Host country 6-15cImagery interpretation 14-15Military police , --14-1,

14-10Order of battle ,--- 14-15Overseas agencies 6-15Psychological warfare 14-1, 14-8Signal intelligence 14-15Technical intelligence 14-15"Third agency rule" 6-15b

Limitations, Counterintelligence --1-4Local agency check 8-11

6-49-4

1-3,

13-5

3-1

5-1, 5-5

4-1

9-2, 9-4,

9-6,

9-7B-1

4-1

3-23-2

3-21-1, 13-1,

13-5

B-1

3-1, 5-1

4-7,

B-1

6-4,

B-1

4-1

B-1

B-1

B-1

B-1

3-1

4-5,

6-8

6-4,

14-1

14-1

6-46-4

14-4

14-1,

14-3

14-4

6-414-1

14-4

14-4

6-4

1-28-3

10--8

-'- 12-910-813-10

12-510-413-5

6-13, 6-152-4, 2-9c

11-56-11,

14-15

6-42-1, 2-5,

11-26-8,14-4

Unannounced Installation:

Target " Sensitivity Security ~ Intelligence:

Agencies Command (fig 2-1) -.

Technical

14-8 14-814-114, 14-12 14-8,

14-48-11,4-82,5-10,

12-10,18-94-12

8-2, 4-12,5-8,9-2

12-74-14

12-104-1812-98-4

4-5, 4-64-6

B-14-84-54-64-84-9

4-104-82

Collection potential of CivilAffairs Police, reciprocal

Interpreters 3-24,"..,., 4-39,

5-18,12-12a,13-11

4-16r--- 3-6,4-17,

5-12,9-7b

12-11-~-- 4-176--.,- 12-110

4-17d

12-1113-604-7,4-104-9app B4-12d4-8

4-904-124-134-144-40

Interrogation Accused and suspects

8-2 8-19-1, app E 9-1, E-l9-10, 9-12 9-44-1 4-19-7 9-29-23 9~

Cornbat Conduct of Detailed Preparation for --

Screening Halting of Interviews Approach ':"--

Atternpts Fernales '

Preparation for "-

Rapport Subject "

W lk ' ..ia omsW '

t I neBsIII '

t te 'I era s " --I t ' t ' .0'

nves Iga Ion:

Background Cornplaint Counterespionage -

Counterintelligence

Countersabotage --

Countersubversion

Index-4

FM 30-17

Paragraph Page Paragraph

2-22-612-92-7a

Page

2-12-3

12-52-3

Lysergic acid diethylamide(LSD) app E

Marijuana app EMaterial sources 6-10Material targets 12-9Media analysis 14-14dMilitary Intelligence Battalion ---2-9Military Intelligence Group:

CONUS (fig 2-2) 2-4ASCOM (fig 2-3) 2-8

Military Police 2-9a,l0-4a,10-12,13-10,14-1,14-10,14-11,app C,appD,app E

E-1

E-16-3

12-514-1

2-4

2-4 2-1

13-1212-5b10-16c

18-9

12-810-8

2-1'2-4

2-4,10-2,10-7,13-5,14-1,14-3,

9-2b6-9

9-16-3

12-9wI.1-212-9a12-12a4-1, 8-1,

13-3

1:4-1,

Principles Special elements Target Theater Army US Army Intelligence Com-

mand (fig 2-1) Pattern:

Analysis Behavorial Penetration inspections Personnel:

Complaint investigation Docuooaent source Personnel:

Blacklist Counterintelligence Gray list Indigenous Security Investigation

C-l,D-l,E-l1-1

Selection for surveillance tar-get 4-26a,

12-80,White list 12-9a

Personnel Security Investigations(PSI) 8-1

Components of 8-4In stability operations 13-3Indigenous personnel 12-12a~uest for app BScope 8-3Sworn Statements in app B

Photography, investigative (fig5-3) ~

4-16,12-412-5

Mission, Counterintelligence 1-3Misuse of Counterintelligence

personnel 5-6aMixed surveillance 4-25b,

4-270Moving surveillance -_.:_--~ 4-27bMutiny 9-20aNarcotics ' 5-15d,

app ENational Agency Check 8-2,8-5National Security Check 7-10National Security Directives 1-4bNaval Investigative Service 1-4aNegative information 4~Notes:

Agent ~ Taking -~ "

5-54-16,4-224-189-7

5-9,E-1

8-1, 8-57-81-21-24-2

8-18-1

13-2

12-10

B-18-1

B-1

5-2c, 5-7,5-8

4-3110-12,

11-3 ,12-16d,

13-5,14-11h,app D

5-1, 5-5,5-7

4-2710-7,11-2,

12-16,13-5,14-4,D-l

Physical evidence (fig 4-4) -.Physical securityapp B

4-11,4-13b

Oaths, administration of 3-25, 3..J27Offensive counterespionage 1-56Office of Special Investigation

(OSI) 1-4Officer, Counterintelligence 1-2Official sources 6-4c,

6-15c

B-14-7,4-9

3-111-3

Planning:

Investigation Tactical operations --

Political apparatus study

Polygraph

1-21-16-2,6-4

4-2 4-1~- -.12-7, 13-1 12-4, 13-1---13-10 13-1

4-18, 4-14,5-.26, 5-2,5-12, 5-8,app E E-1

-, ..13-6, 13-3,14-14b 14-4

Port security ~--- 12-16d 12-16Private document source 6-9 6-3Priority target ,.,.".-- 12-8 12-4Progressive surveillance 4-27d 4-23Propaganda:

Black , 14-141Grey ,--, 14-141Subversive 14-14g

Protection of:Of investigative reports 7-4, 11-3Of sources 6-4,6-5,

app B

4-27b 4-18One vehicle/man method of sur-

veillance (fig 4-3) Operations:

Defensive 1-56CHfensive 1-56Other "---'---'--"- 12-6Screening 12-16Special ~-~ ~ 1-30Stability 13-1Tactical 12-4,

12-5,12-15

Order of Battle liaison 14-15Organization:

ASCOM 2-8CONUS 2-4,2-5Field Army '-' 2-7b

1-31-3

12-412-12

1-213-1

12-2,12-3,

12-1214-4

Populace control

14-414-414-4

2-42-1, 2-2

2-4

7-2, 11-26-1, 6-2,

B-1

Index-5

12-5

1-112-52-10

8-1,13-2

FM 30-17

Page

10-1,

10-2,

10-7,11-1

12-11,

ParagraphParagraph

10-1c,10-3b,l0-4a,10-12,11-2,12-12bapp C,app D

1'2-16,14-1,14-6b,14-13

1-5b

4-3d,14-11k.4-90

12-5,14-116

Provost MarshalB-1

7-2 11-2,7-1

13-312-11

app B7-4, 11-37-213-6a12-12b

C-l,D-l

12-12,14-1,14-2,14-4

1-3

4-2,14-414-6

12-3,14-3

Characteriza ti on -0 rga niza-

tion (fig B-ll) Classification of Types Resources, Control of Riots Rights, explanation of:

Acknowledgment of ,.-. 3-4,5-103-93-?-

3-33-53-2

3-2, 3-9,4-83-23-1

9-29-29-2,14-36-3

-3-6e,5-20d

-3-16d

-3-6a

-3-60

-3-6i

-3-6b

-3-6, 3-16,

4-12-3-6a

-3-4

-9-5

-9-7

-9-6,

14-11a

Scientific source 6-8Scope:

Counterintelligence activities -

Counterintelligence inspec-tions Personnel security investi-

gations Indigenous investigations Technical surveys and inspec-

tions Screening (fig 12-1)

Psychological Warfare

Publicity, avoidance

Raids and searches -

By undercover agents -

Failure to give How given Inlproper Manner in which given

To whonl given

Rapport Rear area security

4-2, 4-48-28-48-88-58-28-3

12-74-2,B-14-84-24-34-4

4-4,8-38-44-28-4

4-2,13-9

Records:Access to Birth Credit ~...

;

Criminal ~:.Diverse Education Employment ---

Evacuation of -

Examination of

VVaiver of Rules of evidence Sabotage Investigative procedures

Types of

1-8 1-1

10-15

4-4b, 4-68-68-168-118-188-78-812-1004-4,

app B4-5~4-4d4-5/4-5i4-5i,

8-128-174-408-13, 8-154-4a,4-5,

18-18

8-114-1

8-314-4

-11-2

-12-11/,12-16

11-1

12-9,12-12

Foreign Legal aspects of

Limitation Military hospital

Military service -

OrganizationalReliability of -Travel Types :

8-83-53-8

3-5, 5-1,5-4

3-5, 3-73-7B-13-73-7

4-27,5-2, 5-7

Search:Authority Consent (fig 3-1)

Covert Illegal

-3-11-3-7b

-3-11

-3-74, 5-2c,5-5

-3-7b, 3-78

-3-7c

-app B

-3-71-3-7c, d

-4-32c, 5-2d,5-10b

Legal Procedures

Report ofSeiz11re ---Warrant --

Secret writing

4-312-12,

14-33-3

14-44-294-2

4-5112-16,

14-11d3-6d14-14c4-354-4c

US Social Security Admin.

istration Refu.gee screening (fig 12-1) --

Security:Agency, US Army7-9 7-3

7-10 7-3

7-37-2, B-1

7-112-12,

B-110-9,11-8,0-17-8

Base campBorder ---

7-97-7, app B7-112-13,

app B10-17,

11-8,app C

7-11

Refusal of counsel Reeducation ~---~

Release of evidence Reliability of records Request for, and Results of, Per-

sonnel Security Action Request for National Agency

Check Request for personnel security

action Report of Investigation (ROI) ---

Reports Investigation

Services

Civil Clearance program Directives, National Document and information

Education Forces Installation ",, Investigations --~:-

Spot Characteriza ti on- lndi vidual

(fig B-1O, B-12)

-4-82b, 10-ld, 4-27,10-12d, 11-2, 10-1,12-116 10-7,

11-1, 12-8-13-10. 13-5-12-166, 14-11i 12-16,

14-4-12-3b 12-1-10-11a 1~-1-4b 1-2-10-10,13-4 10-5, 13-2-10-19 10-9-13-10a 13-5-13-10 13-5-1-3a, 13-3 1-1,13-2B-1app B

FM 30-17

Paragraph Page

10-11, app E 10-6,

E-11()-12, 11-2, 10-7,

12-16d, 11-1,13-5 12-16,13-2

12-16d,14-11f 12-16,14-8

12-5b 12-3

1-8b 1-2

12-3b, 12-12d 12-1,

12-1212-12c 12-11

9-17,9-20b 9-6,9-79-18 9-7

3-7b, 3-8e, 3-5, 3-7,3-10, 3-8, B-1

appB12-8

12-3b

appB

Paragraph Page

3-20 3-103-13,3-18, 3-8,

3-22,3-28 3-10-3-12

3-27 3-113-26,4-17 3-11,4-123-14 3-8

Personnel -- Other than direct testimonyPreparation of

Physical

Unsigned --,

Unsworn --,Use of ,

Statutes:Espionage --,Liaison ,

Stimulant ,

Port and harbor

Rear area --"-,services Special weapons

9-9 9-3

9-14 9-5

5-15d, app E 5-9,

E-1

3-6a, 4-12 3-2,4-8

9-23, 14-46, 9-S,

14-5, 14-11b, 14-1,14-14e, 14-3,

14-14g 14-4

8-19a 8-5

Subject Interview -

Subversive activity

Troop movement ,

Sedition Seditious conspiracy Seizure

12-412-1B-1

7-8, app B

7-3,

B-114-1510-12d

14--410-7

B-1

app B

Suitability Summary of Information (SOl):

Format (fig B-9) Char acteriza ti on-In di vidual

(fig B-10, B-12) Characte riza ti on-Organiza-

tion (fig B-11) Surreptitious entry Survey, counterinrelligence ChecklistI .

t .t .':"",..

m Ia Ion ';-_.

Preparation ~_.

Report ~ ~

4-51 4-3

6--4b 6-26-5 6-26--4,7-7, 6-1,7-2,

app B B-16-6, 13-13b 6-2, 13-116-3 ~16--4a 6-16-7 6-26-10 6-36--4c, 13-13b 6-2,

13-11-app E E-1-6-9 6-3-13-13b 13-11-6-9 6-3

-13-13b 13-11-6-8 6-3

-6-8,6-10 6-3-6--4a 6-1-4-13a 4-9

Selection, target ,..

Sensors, unattended ground ,

Sheet, key (fig B-7) ,-,

Signal:

Intelligence Security Social Security Administration,

lJS Sources:

Casual Confidential Conventional '

DocwnentaryHwnan Incidental ---

Mass media -

Material Official

app B B-15-2b, 5-6 5-1, 5-510-1 10-110-4, app D 10-2, D-110-2 10-110-8 10-210-17, app C 10-9,

C-1Surveillance ::. --4-23 4-15

ABC method (fig 4-1) 4-27b 4-18AB method (fig 4-2) 4-27b 4-18Audio 5-2a,5-3 5-1,5-2Checkpoint 4-27d 4-18Close ~--- 4-25a 4-15Combination or mixed 4-25b 4-16Communications 4-261 4-18Compromise 4-28h 4-25Detecting :~-- 4-29 4-25Discreet 4-25a 4-15Eluding 4-30 4-26Encounters with friends 4-28c 4-23Equipment 5-4 5-2Fixed 4-25b,4-26a 4-16Moving 4-25b,4-26a 4-16Objectives 4-24 4-15One-man/vehicular method --4-27b 4-18Personnel selection 4-26c 4-16Preparation for 4-26 4-16Progressive 4-27d 4-23Team commander 4-26d 4-17Technical 4-25b 4-16Techniques 4-28 4-23Types 4-25 4-25Use of indigenous personnel -4-26d 4-17Vehicular (fig 4-1, 4-2, 4-3) -4-27b 4-18

Survey, physical security appD D-1Survey, technical:

Conduct of 11-3Equipment 11-5Report appC

1-1,4-302-31-2,

12-1612-3b, 12-12d 12-1,

12-121-17-39-4

13-1

On drugs Personnel document Political Private documents Religious Scientific Technical ---~ -~-U O

tt O (:nWl mg --'-' o i'c

Walk-Ins -_:".': Special:

ligent Counterintelligence units

Operations

-1-2, 4-36

-~-1-3c, 12-16d

Special weapons securityI

1-27-11

9-1113-1

Specialist, Counterintelligence -

Spot Report Spying Stability operations Standard Operating Procedures

(SOP) Statement, sworn Contents Formal (fig 3-2, 3-3, 3-4) _.

In foreign countries Opinions and conclusions --.

13-53-12,

3-153-183-23,3-21

13-23-8,4-10

3-83-103-113-10

11-211-2C-1

Index-7

4-14

3-24

FM 30-17

PageParagraph

Suspect:Interrogation " 4-17,9-7b 4-12,9-2Rights of 3-6,4-12a 3-2,4-8Civilian 3-6d 3-3Military * 3-6d 3-3

Sworn Statement 3-12,4-14 3-8,4-10Contents 3-15 3-8Formal (fig 3-2, 3-3, 3-4) ---3-18 3-10In foreign countries 3-23,3-24 3-11Opinions and conclusions 3-21 3-10Other than direct testimony --3-20 3-10Preparation of 3-13,3-18, 3-8,

3-22 3-10-,3-28 3-12

Unsigned --,-- 3-27 3-11Unsworn ---' 3-26,4-17 3-11,4-12Use of ~ 3-14 3-8

Tactical operations 12-4, 12-5, 12-2-12-6,12-15 12-4,

12-12Tactical troop augmentation 12-10a 12-6"Tapping" 5-5 5-4

Target, counterintelligence:Document and material 12-9dFiles 12-10cInstallation 12-9bLists ' " ---12-4a

Organization and group 12-9cPersonalities 12-9a, 12-Ub

Paragraph P..Theater Army "- 2-7a,2-8a 2-3,2-4"Third Agency Rule" 6-15b, app B 6-4, B-1"Throw-offs" " 4-11i, app B 4-7, B-1Tranquilizers app E E-lTransfer of docuDlents 12-4a 12-2Translators:

Qualifications and use of 12-12a 12-10U sed with stateDlents 8-24 8-11Working with ~ 13-11 13-9

TransDlittal of evidence 4-.'34c 4-29Treason 9-13 9-5Troop MoveDlent Security 12-120 12-11Type:

Records 4-4a,4-5, 4-2,13-13 13-9

Sabotage 9-6 9-2Surveillance " 4-24 4-15

Unattended ground sensors 12-3b 12-1Units, special counterintelligence -2-6 2-.'3Unannounced counterintelligence

inspection 10-16b 10-8Units, special counterintelligence -2-6 2-3Unlawfully obtained evidence 3-9 3-8Unwitting source 6-4a 6-1US Army Security Agency 4-.'32b,10-1d, 4-27,

10-12d, 11-2, 1{}-1,12-11e 10-7,

11-1, 12-8

12-612-712-512-212-612-5,

12-812-712-4

9-7

3-2, 3-4,3-9,4-13

4-9, 6-1

12-1Oc12-8

US Government, advocating over-throvv 9-19

Waiver 3-6a,3-6f,3-17,4-17d

"Walk-ins" 4-13a,6-4aWarrant, search:

Civilian Military White list "

Records Selection and priorities Technical:

Inspection --"-

8-7d8-7c12-9a,

12-11b

3-73-712-5,

12--8

Intelligence -..

Source Surveillance --.

Survey

-ll-lb,11-2d, 11-1,11-3b 11-2

-6-11,14-15 6-3,14-4-6-8, 6-10 6-3-4-25b 4-16-11-1a, 11-2c, 11-1,

11-3a 11-2Technicians, counterintelligence --1-2 1-1

Techniques:Investigative 4-3Surveillance 4-28

Termination of interview 4-13bTestimony 4-37

Witness:Arrangements for 5-17c 5-9Evaluation 4-15 4-12Interview 4-14 4-10Special Agent 4-36, 4-38 4-30, 4-31

Writing, secret 4-32c,5-2d, 4-27,5-10b 5-2,5-7

4-14-23

4-94-81

Index-8

By Order of the Secretary of the Army:

W. C. WESTMORELAND,General, United States Army,Chief of Staff.Official:

VERNE L. BOWERS,Major General, United States Army,The Adjutant General.

)Distribution:

To be distributed in accordance with DA Form 12-11 requirements for Counterintelligence Op-erations, Intelligence Corps, US Army.

~

* u.s. GOVERNMENT PRINTING OFFICE: 1972-714-212/5088