skip to main content
Visitante
Meu Espaço
Minha Conta
Sair
Identificação
This feature requires javascript
Tags
Revistas Eletrônicas (eJournals)
Livros Eletrônicos (eBooks)
Bases de Dados
Bibliotecas USP
Ajuda
Ajuda
Idioma:
Inglês
Espanhol
Português
This feature required javascript
This feature requires javascript
Primo Search
Busca Geral
Busca Geral
Acervo Físico
Acervo Físico
Produção Intelectual da USP
Produção USP
Search For:
Clear Search Box
Search in:
Busca Geral
Or select another collection:
Search in:
Busca Geral
Busca Avançada
Busca por Índices
This feature requires javascript
Tipo de recurso
criteria input
qualquer lugar do registro
no título
como autor
no assunto
Data de publicação
lsr01
lsr02
lsr03
lsr04
Orientador
Show Results with:
no título
Show Results with:
qualquer lugar do registro
no título
como autor
no assunto
Data de publicação
lsr01
lsr02
lsr03
lsr04
Orientador
Mostra resultados com:
criteria input
que contêm minhas palavras de busca
com a frase exata
começa com
Mostra resultados com:
Índice
criteria input
E
OU
NÃO
This feature requires javascript
Administrative Actions with a Counterintelligence Twist
McCullough, Timothy M
The Army Lawyer, 2020-09 (5), p.39-41
Charlottesville: Judge Advocate General's School
Texto completo disponível
Citações
Citado por
Exibir Online
Detalhes
Resenhas & Tags
Mais Opções
Nº de Citações
This feature requires javascript
Enviar para
Adicionar ao Meu Espaço
Remover do Meu Espaço
E-mail (máximo 30 registros por vez)
Imprimir
Link permanente
Referência
EasyBib
EndNote
RefWorks
del.icio.us
Exportar RIS
Exportar BibTeX
This feature requires javascript
Título:
Administrative Actions with a Counterintelligence Twist
Autor:
McCullough, Timothy M
Assuntos:
Armed forces
;
Army
;
Classification
;
Criminal investigations
;
Defense contracts
;
Espionage
;
Evidence
;
Federal employees
;
Government agencies
;
Intelligence gathering
;
Intelligence service
;
Interviews
;
Law enforcement
;
Laws, regulations and rules
;
Management
;
Military administration
;
Military aspects
;
Military intelligence
;
National security
;
Personnel management
;
Separation
É parte de:
The Army Lawyer, 2020-09 (5), p.39-41
Descrição:
"1 This authority is further delegated through Army channels to the Commander of U.S. Army Intelligence and Security Command (INSCOM); it is formalized, in part, in Army Regulation (AR) 381-12, Threat Awareness and Reporting Program.2 In AR 381-12, Tables 3-1 through 3-4 set forth a series of indicators that Soldiers should report to 1-800-CALL-SPY or a number of other resources described.3 Through authorities from INSCOM- and as described in AR 381-20, Army Counterintelligence Program-CI agents examine these tips and generate CI reports that could serve as the basis for additional investigation.4 These investigations are designed to: identify activities that may constitute national security crimes; substantiate or refute allegations or indications of spying; protect Army personnel, installations, and property; and acquire evidence to assist in the prosecution by competent authorities.5 The collection of information about a subject of an investigation is further limited by the procedures outlined in DoD Manual 5240.01.6 During a CI investigation, generally, non-public information about a U.S. person7 can only be intentionally collected without consent when the individual is believed: to be engaged in intelligence activities on behalf of a foreign power or their agent; be engaged in international terrorist activities; or be acting on behalf of an international terrorist.8 Given the subject matter and predicate for CI investigations, it is common for the investigations to include information, classified at various levels, from a number of other agencies. Using CI Evidence for Separation With the robust quality of CI investigations, it is tempting to simply use the CI investigation for a traditional administrative action.9 While the CI investigation may resemble-or in some cases parallel-a CID investigation, the CI investigation is intelligence driven and governed by intelligence oversight procedures;10 on the other hand, the CID investigation is for an express law enforcement purpose.11 This distinction most commonly manifests as a JA's inability to use all the evidence in the CI file for the separation process due to intelligence considerations such as the incidental disclosure of sources and methods.12 In originally classifying a piece of information, the agency head-whether DoD, Army, or other agency-is making a determination about the potential harm the release of that information could have on the national security of the United States. Since intelligence from non-Army agencies may carry additional caveats or limitations on its distribution or use, derivative classification can make it difficult to include a summary of classified material in a separation packet.15 With the difficulty in sharing intelligence with the target of that intelligence, it is often necessary to find alternate methods for separation. [...]when a subject fills out their Standard Form 86,17 or conducts an interview with the Office of Personnel Management, those files are accessible by the individual through the Privacy Act.18 Additionally, if there is inconsistent data between these sources and other available sources, such as Federal Bureau of Investigation or U.S. Customs and Immigration Service (USCIS) interviews, it is possible to justify separation without referencing sensitive materials.19 Finally, when a separation authority is reviewing the separation action, consider reading that commander into the CI investigation.
Editor:
Charlottesville: Judge Advocate General's School
Idioma:
Inglês
This feature requires javascript
This feature requires javascript
Voltar para lista de resultados
This feature requires javascript
This feature requires javascript
Buscando em bases de dados remotas. Favor aguardar.
Buscando por
em
scope:(USP_PRODUCAO),scope:(USP_EBOOKS),scope:("PRIMO"),scope:(USP),scope:(USP_EREVISTAS),scope:(USP_FISICO),primo_central_multiple_fe
Mostrar o que foi encontrado até o momento
This feature requires javascript
This feature requires javascript