References

SOURCES USED

These are the sources quoted or paraphrased in this publication.

Joint Publications


1-02. DOD Dictionary of Military and Associated Terms. 1 December 1989.
2.0. Joint Doctrine for Intelligence Support to Operations.
(S)2-01.2. Joint TTP for CI Support to Operations (U).


Army Publications


AR 1-100. Gifts and Donations. 15 November 1983
AR 15-6. Procedures for Investigating Officers and Boards of Officers. 11 May 1988.
AR 25-50. Preparing and Managing Correspondence. 21 November 1988.
AR 27-1. Judge Advocate Legal Service
AR (C)105-2. Electronic Counter-countermeasures (ECCM) - Electronic Warfare Susceptibility and Vulnerability (U). 30 September 1976.
AR 190-6. Obtaining Information from Financial Institutions. 15 January 1982.
AR 190-13. The Army Physical Security Program. 30 September 1993.
AR 190-22. Searches, Seizures, and Disposition of Property. 1 January 1983.
AR 190-53. Interception of Wire and Oral Communications for Law Enforcement Purposes. 1 November 1978.
AR 195-5. Evidence Procedures. 28 August 1992.
AR 195-6. Department of the Army Polygraph Activities. 1 September 1980.
AR 310-50. Authorized Abbreviations and Brevity Codes. 15 November 1985.
AR 380-5. Department of the Army Information Security Program. 25 February 1988.
(O)AR 380-40. Policy for Safeguarding and Controlling COMSEC Material (U). 29 July 1994.
AR 380-53. Communications Security Monitoring. 15 November 1984.
AR 380-67. The Department of the Army Personnel Security Program. 9 September 1988.
AR 381-10. US Army Intelligence Activities. 1 July 1984.
AR 381-12. Subversion and Espionage Directed Against The US Army (SAEDA). 15 January 1993.
(S)AR 381-14. Technical Surveillance Countermeasures (TSCM) (U). 3 October 1986.
AR 381-20. US Army Counterintelligence Activities. 26 September 1986.
(S)AR 381-47. US Army Offensive Counterespionage Activities (U). 30 July 1990.
(C)AR 381-141. Intelligence Contingency Funds (U). 30 July 1990.
AR 525-13. The Army Combatting Terrorism Program. 26 June 1992.


FM 6-20-10. Tactics, Techniques, and Procedures for the Targeting Process. 29 March 1990.
FM 11-65. High Frequency Radio Communications. 31 October 1978.
FM 19-20. Law Enforcement Investigations. 25 November 1985.
FM 19-30. Physical Security. 1 March 1979.
FM 24-16. Communications-Electronics Operations, Orders, Records and Reports. 7 April 1978.
FM 24-17. Tactical Records Traffic System (TRTS). 17 September 1991.
FM 24-18. Tactical Single-Channel Radio Communications Techniques. 30 September 1987.
FM 24-33. Communications Techniques: Electronic Counter-Countermeasures. 17 July 1990.
FM 34-1. Intelligence and Electronic Warfare Operations. 27 September 1994.
FM 34-2. Collection Management and Synchronization Planning. 8 March 1994.
FM 34-3. Intelligence Analysis. 15 March 1990.
(S)FM 34-5. Human Intelligence and Related Counterintelligence Operations (U). 29 July 1994.
FM 34-10. Division Intelligence and Electronic Warfare Operations. 25 November 1986.
FM 34-25. Corps Intelligence and Electronic Warfare Operations. 30 September 1987.
FM 34-25-3. All-Source Analysis System (ASAS). (TBP, June 1995.)
FM 34-35. Armored Cavalry Regiment (ACR) and Separate Brigade Intelligence and Electronic Warfare (IEW) Operations. 12 December 1990.
FM 34-37. Echelons Above Corps (EAC) Intelligence and Electronic Warfare (IEW) Operations. 15 January 1991.
FM 34-52. Intelligence Interrogation. 28 September 1992.
FM 34-130. Intelligence Preparation of the Battlefield. 8 July 1994.
FM 100-5. Operations. June 1993.
FM 100-20. Military Operations in Low Intensity Conflict. 5 December 1990.
FM 101-5. Staff Organization and Operations. 25 May 1984.

DA Pam 25-30. Consolidated Index of Army Publications and Blank Forms. 1 October 1994.

TC 34-55. Imagery Intelligence. 3 October 1988.
(S)TB 380-6-1-4. Signal Security (SIGSEC) Advisors Package-SIGSEC Technical Support (U). 14 January 1985.

Miscellaneous Publications


Constitution of the United States.
Executive Order 10450, Security Requirements for Government Employees.
Executive Order 12333, US Intelligence Activities.
Federal Sedition Statute.
Geneva Conventions.
Joint Tactical Exploitation of National Systems (J-TENS) Manual.
United States Code.
Uniform Code of Military Justice (UCMJ).
United States Manual for Courts-Martial.
United States Message Text Format (USMTF) User's Handbook.
NACSI 4000. Military Rule of Evidence (315(d).
Privacy Act of 1974.
(U) DIAM 58-13. DOD HUMINT Management System, Secret/NOFORN.
DOD Reg 5200.1R. DOD Information Security Program. June 1986.
DODD 4640.6. Communications Security Telephone Monitoring and Recording.
DODD 5000.1. Defense Acquisition.
DODD 5200.27. Acquisition of Information Concerning Persons Organizations Not Affiliated with The Department of Defense.
DODD 5240.5. Department of Defense Technical Surveillance Countermeasures Survey Program.

Miscellaneous Forms

DA 2802. Polygraph Examination Report.
DA 2823. Sworn Statement.
DA 3881. Rights Warning Procedure/Waiver Certificate.
DD 173. Joint Message Form.
DD 398. Personnel Security Questionnaire.
DD 398-2. Personal Security Questionnaire (National Agency Check).

Standardization Agreements (STANAG)*


2033. Interrogation of Prisoners of War.
2044. Procedures for Dealing with Prisoners of War.
2067. Control and Return of Stragglers.
2079. Rear Area Security and Rear Area Damage.
2101. Establishing Liaison.
2363. Security Doctrine.
2844 (Edition Two). Counterintelligence Procedures.

STANAGs can be obtained from the Naval Publications and Forms Center (NPFC), 5801 Tabor Avenue, Philadelphia, PA 19120. Use DD Form 1425 to requisition documents.

Documents Needed

These documents must be available to the intended users of this publications.
DA 2028. Recommended Changes to Publications and Blank Forms.
(S)DIAM DJS-1400-7-85. SATRAN (U).
INSCOM Reg 381-6. United States Army Intelligence and Security Command Polygraph Activities.
DlS 20-1-M. Manual for Personnel Security Investigations.