Procedures of DoD R, “Procedures Governing the Activities Purpose: In accordance with the authority in DoD Directive Key Orders, Directives, and Regulations. • Executive Order • DoD Directive • DoD R. • Supplemented by. DTM Directive , and rep1aces the November 30, version of DoD -R. It is app1icab1e to a11 DoD inte11igence components.
|Published (Last):||22 April 2011|
|PDF File Size:||16.24 Mb|
|ePub File Size:||11.79 Mb|
|Price:||Free* [*Free Regsitration Required]|
Renewal requests for non-US per- son 5240.1- involving specific individuals may be approved for a period up to 90 days. Glossary— – – — A-l B. See AR These procedures do not apply to law enforce- ment activities, including civil disturbance activities, that may be undertaken by DoD intelligence components. Beacons “beep- ers” and transponders generally are considered methods of concealed monitoring under the following conditions: Information may also be dieective in the course of a lawful physical security investigation.
The staff elements of the Office of the Director of Central Intelligence. However, use, retention or dissemination of inadvertently intercepted US person communications is governed by section G.
department of defense (dod) directive r – Luxist – Content Results
Authorization to participate under subsections C. Authority to employ such techniques shall be limited to that necessary to perform functions assigned cod DoD intelligence com- ponent concerned. Case approval periods — 4. The significant foreign intelligence or coun- terintelligence expected to be obtained from the elec- tronic surveillance could not reasonably be obtained by other less intrusive collection techniques.
Unconsented physical searches of non-US per- sons abroad. If physical trespass is required, detail the method of entry. Under no circumstances will a DA employee engage in, or conspire to engage in, assassi- nation. All del- egations must be in writing.
Contracting by or for a DoD intelligence component with commercial orga- nizations, private institutions, or private individuals within the United States may be done without reveali sponsorship of the intelligence component if: Activities undertaken by or in support dorective terrorists or terrorist organizations that occur totally outside the United States.
If the identities of the users of such AR facilities aie not identical with the identities of the own- ers of the facilities, the identity of such users may be obtained but not from the content of the transmissions dd, and may be included in such report or log.
Persons who are reasonably believed to be prisoners of war: This procedure does not apply to physical sur- veillance eirective as part of a training exercise where the subjects are participants in the exercise.
The test proposal shall state the requirement for a period beyond 90 days, the nature of the activity, the organization that will conduct the activity, and the proposed disposition of any signals or communications acquired during the activity. Cooperating sources means persons or organi- zations that knowingly and voluntarily provide infor- mation to DoD intelligence components, or access to information, at the request of such components or on their own initiative.
Such employee may already be a member of the organization or may be asked to join. Intelligence, United States Air Force. Retention of information collected under Pro- cedure 2. Information is col- lected for “administrative purposes” when it is neces- sary for the administration of the component concerned but is not collected directly in performance of the in- telligence activities assigned such component. No content of any com- munication may be retained or used other than as pro- vided in subsection B.
Explanation of undefined terms 3.
An employee of the Department of Defense, or an employee of a contractor of the Department of Defense, and has a need for such information in the course of his or her official duties; b. Types of permissible assistance. Interception means the acquisition by the United States Signals Intelligence system through electronic means of a nonpublic communication to which it is not an intended party, and the processing of the contents of that communication into an intelligible form but not including the display of signals on visual display devices intended to permit the examination of the technical characteristics of the signals without reference to the information content carried by the signals.
However, such col- lection must comply with the following: Information obtained in the course of a lawful for- eign intelligence, counterintelligence, international nar- cotics or international terrorism investigation; d. Describe the equip- ment to be used, method of transmission, recording de- vice, and method of installation. 5420.1-r information to be “re- ceived for use” and therefore “collected” by an Army intelligence component, an employee must take some affirmative action that demonstrates an intent rod use or retain the information received such as production of a report, filing of an investigative summary, or electronic storage of received data.
Concealed monitoring means targeting by elec- tronic, optical, or mechanical devices a particular per- son or a group of persons without their consent in a surreptitious and continuous manner.