Wednesday, May 16, 2012

Internment/Resettlement Operations FM 3-39.40



Overall Contents for All Blogs and Posts

http://unclesamenterstheendgamepart1.blogspot.com/
  Most posts are alphabetized by subject starting at the bottom of each blog except for the first one.  To get a feel of the overall intent of the blogs and posts please read the first post below. 
Introduction and an Idea of how to navigate through the blogs and posts.
Contents for Sources of Funding for New World Order
From Soft to Hard Tyranny  
Government Officials Speak out on Corruption and/or the New World Order Part 1
Government Officials Speak out on Corruption and/or the New World Order Part 2
Contents for Health Care Trends  
Contents for Hidden Powers, Hidden Interests
Introduction
Links to Corruption, Tyranny and Trends Toward A New World Order Part 1
Links to Corruption, Tyranny and Trends Toward A New World Order Part 2

http://unclesamenterstheendgamepart2.blogspot.com/
Published 2014 (1) 
Immigration

Published 2012 (1)
Internment/Resettlement Operations  FM 3-39.40

Published 2011 (2)
Links to Corruption, Tyranny and Trends Toward A New World Order Part 3
National Debt
The above 3 posts Links to Corruption, Tyranny and Trends Toward a New World Order, Part 1, 2 and 3 contain just the links from all the posts with very little political commentary or analysis.

http://unclesamenterstheendgamepart3.blogspot.com/
News About the Fed, Banking and Finance Part 1
News About the Fed, Banking and Finance Part 2
Quotes Over Time About Monetary Policy and Banking and Finance in Relationship to Liberty and Tyranny
Slow Response/Gulf Oil Spill
Social Security and Other Entitlements
Solutions
Symbols of Occult Power
The Modern Art and Science of Enslaving Others
The Constitution Verses Tyranny
The Relationship Between The Military Industrial Media Complex, Defense Spending, Semi-permanent and Permanent War and the Rise of Tyranny  

http://unclesamenterstheendgamepart4.blogspot.com/
Trends Toward a Tyrannical New World Order Part 1
Trends Toward a Tyrannical New World Order Part 2
Trends Toward a Tyrannical New World Order Part 3
The United Nations in Relationship to the New World Order Part 1
The United Nations in Relationship to the New World Order Part 2


http://unclesamenterstheendgamepart5.blogspot.com/
Barter and Local Currency Survey
Members, Activities and Meeting Times


http://unclesamenterstheendgamepart6.blogspot.com/
The War on Food
The War on Food Part  2  This section has a lot more in depth scientific studies.



In all the blogs the titles for each of the articles are colored coded red, orange, green or black based on my subjective belief of how likely they are to be true.
Red title and bold font means I believe the article is very likely to be true and is very important!
Red title and regular font means I believe the article is very likely to be true but is less important.
Orange title and bold font means the article is likely to be true and is important!
Orange title and regular font means the article is likely to be true but is less important.
Green title and bold font means I believe the article could be true and is very important!
Green title and regular font means I believe the article could be true but is less important.
Black title and bold font means I have no opinion on the article because I have not researched it so I have no opinion on its veracity.  However it is important!
Black title and regular font means I have no opinion on the article because I have not researched it so I have no opinion on its veracity or truthfulness.  It is of lesser importance.  



Contents
Internment and Resettlement Operations FM 3-39.40
Overview
Introduction Why I am profoundly Upset
With this document  Recent Prior Events                 7
The link to the entire document Internment and Resettlement Operations FM 3-39.40                5
Places where this formally classified document can be found.                                                      5
Letter from George Casey Secretary of the Army                                                                          6
The Constitution Allows Our Government to Take Our Rights, Fifth Amendment Under Certain
Conditions            7
Obama’s NDAA 2012, Signing Statement  Government already has right to detain Americans without trial long before NDAA 2012.  This law does not break new ground.           7
Senator Lindsey Graham, America is battleground so citizens can be detained indefinitely without due process or trial by president or military and courts have upheld this right.        8
Senator McCain and other government officials express views on NDAA 2012.          8
ACLU adamantly opposes NDAA 2012                   8
Congressman Bill Hefner’s Note admitting existence of civilian detention camps on Army bases.    9
Halliburton subsidiary gains contracts to build detainee camps in America for emergency influx of refugees.                         9
Former Congressional Representative Dan Hamburg speaks out on Halliburton contract to build dentention camps in united States.  Article covers other bills prior to NDAA 2012 that allow government to  detain Americans without trial.        9
Army and National Guard Websites Advertise for Internment Specialist, etc               9
Legislation passed over time eroding Constitution and legalizing tyrannical state.       10
Legislation passed over time setting up a secretive unaccountable police state             10.
Evidence of false flags to manipulate the public into costly wars over time and to deprive us of
liberties.        10


Notes on how to navigate through the
Document                11
Introduction
Chapter 1 Chapter 1 defines the objectives and principles of I/R operations and describes U.S. policies on the protection and care of all detainees, U.S. military prisoners, and DCs.  It stresses humane treatment of detainees.  In this section all but young children can be separated from their mothers.  Fathers are separated from families.
Page 1-4. Detainee children can be separated from their parents                11
Section 1-40, 46, 47.  U.N and other international involvement in internment resettlement camps     12
Section 1-51.  Security requirements, intelligence and interrogation operations.   13
Sections 1-54, 55.  Roles and duties of military police    14

Chapter 2 describes the handling of detainees and the army’s role in the process.  The main objective is to protect detainees and keep them out of the way of combat operations
Section 2-18,  Rationale for internment/resettlement camps       14
Section 2-20 -2-25.  Rationale for why large amounts of people need to be detained
During insurgencies.   15
Section 2-26.  Rationale for need for reeducation in camps.     15
Section 2-29.  Excellent description of an efficient police state.   16
Section 2-33.  U.N. plays increasing role in our government without our consent.    16
Section 2-34.  U.S. government agencies most involved in setting up and running   
Internment and resettlement camps. 17

Page 2
Chapter 3 describes the roles and responsibilities of staff members at
internment/resettlement camps
Section 3-1 and 3-2.  It is not clear in these sections whether these camps will or will not be established in the united States. Section 10:40 is also ambiguous in that regard in chapter 10.    17
Section 3-10.  Support commanders world wide to develop detainee experts to help in camps.      18
Section 3-15.  Commander develops multidiscipline custody and control oversight team with various intelligence agents, behavioral scientists and legal experts.      18
Section 3-33-3-35.  Use of military working dogs.     18
Sections 3-55-3-56  PSYOP officials introduces detainees or DC s to U.S. and multinational policy; Identifies malcontents, trained agitators, and political leaders within the facility who may try to organize  resistance or create disturbances; Develops and executes indoctrination programs to reduce or remove antagonistic attitudes and identifies political activists.   19
Section 3-59  Roles and Responsibilities of Counterintelligence Agents   20
Section 3-64.  Multinational representatives.        20

Chapter 4 describes the capture, initial screening and detention of detainees
4-33. Upon capture, Soldiers must process detainees using the “search, silence, segregate, speed, safeguard, and tag (5 Ss and T)” technique.        21
4-34.  To ensure accountability, each detainee is tagged by the capturing unit using DD Form 2745. Military police at DCPs and DHAs check each tag for—      21
·       Date and time of capture. 􏰀
·       Capturing unit. 􏰀
·       POC. 􏰀
·       Circumstances of capture.
4-35. Decisions regarding a detainee’s current and future status are based on the initial processing at the POC. Proper processing ensures that U.S. armed forces can take the appropriate action to release, detain, transfer custody, prosecute, or adjudicate detainees.          22

Chapter 5 describes  detainee operations.
Opening Paragraph   To successfully conduct war on terror facilities must be set up to handle large numbers of detainees!   22 
5-63. Detainee visitations will be conducted like visitations with inmates.  22

Chapter 6 describes  detainee facilities site planning and selection
6-5. Facilities must be planned and built far in advance of hostilities.  24
6-7.  …The U.S. Army Corps of Engineers contains plans, specifications, and material requirements for detainee facilities based on the anticipated detainee population.    24
6-8. Facility construction  includes, but is not limited to clear zones, guard towers, lights, patrol roads, sally ports and communications.    25
6-15. Silence enforced on detainees    25
6-52. Internment Serial Numbers given to classify, track and control detainees  25
6-57. Detainee identification bands   26
6-52-5-65. Theater internment facilities to house detainees permanently or for extended periods.   26
6-116-6-117. Preventing escapes  Final option is to shoot.   26
6-131 Strategic internment facilities house the most recalcitrant or those of highest intelligence value.  27
 
Chapter 7 describes confinement of military prisoners
Opening Paragraph describes that more permanent facilities for military prisoners must be built.  Why?
7-21. Meals     27
7-54-7-59. Preventing Escape with the final option, shoot.  27-28

Chapter 8 describes rehabilitation of U.S. military prisoners and detainees.
Opening Paragraph describes reeducation process.  28

Page 3
8-1. Rehabilitation extensively studied      28
8-3. Detention highly structured    28
8-15. Employment    28
8-22 - 8-27. Importance of proper identification, assessment, segregation and structure    28-29
8-51.  Behavioral (Mental Health) screen/Potential for abuse is high!    29

Chapter 9 describes transitioning military prisoners and detainees back into their societies.
9-49. The key objectives of the transition of detainee operations are numerous and complex. Key players within this transition plan include many U.S. and U.N. players.    30

Chapter 10 describes resettlement options
Opening Paragraph describes an overview of the process of resettling detainees and military prisoners.  The last 2/3 of the paragraph still show that the resettlement process will be highly controlled containing many characteristics of a totalitarian police state!     30
10-2. Objectives of resettlement program    30
10-3. Planning Resettlement  Note various players involved in process.      31
10-33. The role of Internment Serial Numbers ISN’s in the resettlement process.    31
10-40.  The relationship between the Secretary of Defense, The Posse Comitatus Act and the establishment of Internment/resettlement camps in the united States.   31
10-55. Police intelligence activities in resettlement areas.   32
10-57. The ease of using the detainee reporting system and access to the national detainee reporting center to classify, control and track detainees in the resettlement process.    32
10-67. The resettlement facility commander publishes, enforces and updates rules for the resettlement facility.  Sample of rules posted during Hurricane Katrina in New Orleans Posted      32
10-69.            The resettlement facility commander takes positive action to establish daily or periodic routines and responses that are conducive to good discipline and control.     33

Appendixes I included aspects of the various appendixes that highlight the dangerous totalitarian aspects of these internment resettlement camps and other interesting information. 

Appendix D  Application of Geneva Convention to Internment and Resettlement Operations.
D-1.            DOD (Department of Defense) policy is to apply the Geneva Conventions in all military operations unless directed otherwise by competent authority, usually at the theater level or above (the same level of authority that designates hostile forces).         33


Appendix E  Detailed description of agencies involved in the internment and resettlement process.            33

Appendix H The Use of force and other riot control measures.
H-2 – H-3. Levels of resistance and levels of force        33
H-40 – H-50 Riot control and crowd behavior              34-35
Appendix J Detailed description of facility designs and Sustainment Considerations
J-51  Media access to Internment/Resettlement camps tightly controlled.       36
Appendix K  Detailed description of psychological operations support for internment and resettlement camps.
K-9. The tactical PSYOP detachment utilized various media to pacify detainees and military prisoners. 37
K-13. PSYOP team involvement in initial interviews of detainees.  37

Page 4
K-14. Information gained sent to others for analysis to develop products to aid in pacification of detainees and prisoners.      37
K-15.  Info used to classify detainees as malcontents, political agitators, collaborators etc.    37
K-19 Enclosure Team works closely with detainee and prisoner populations on morale building and do other things to gain the trust of detainees.  Often they will be recreational staff. They do not openly work with military police or other authoritarian structures but directly with detainees to win their trust.  However they do report their findings to the authorities!  These ones are the ultimate secret police!     38
K-24 – K-25. Audio-visual team employs various media to help the PSYOP team.      38-39
Scary PSYOP Technology for Propaganda/Washington Post      39

Appendix M Biometrics-.Detailed measurable physical and behavioral characteristics that enable the establishment of verification of an individual’s identity.  The term biometrics include: but is not limited to finger, face, hand, eye, voice and DNA characteristics.
M-1 – M-4. Describe  biometric measurements and the process of collection through use to classify detainees etc.  The most important aspect of the collection process is that material can easily be collected on each detainee without his or her knowledge.     39
M-6 reemphasizes the ability of personnel to easily collect data on individuals without their consent or knowledge.
M-7, 12, 13, 19, describe how the information is used stored and analyzed.        40
M-21 – M-22. Discuss the Detainee Reporting System and how info is stored and utilized in the National Detainee Reporting system.  Internee serial numbers are also briefly discussed.    41
M-22 – M-23. Detainee Tracking from initial capture until final placement and how detainees are classified throughout the internment process.     41
M-24.  It is necessary to collect as much information as possible to determine whether detainee is to be released, detained locally for intelligence exploitation, or transferred to a facility for internment. This provides a basis and foundation of documentation that will follow the detainee from initial capture to final internment in a facility.     41


Glossary of Military Acronyms           42


 Definitions                                        44

Just Say No Poem                             44




  Page 5

 INTERNMENT AND RESETTLEMENT OPERATIONS FM 3-39.40  Overview   
Specific Detailed Procedures for setting up and Operating Detainment Camps in the U.S. and Abroad!

The implications of this leaked military document are profound and extremely frightening.  My comments are in red.  Comments will be sparse because the document speaks for itself.

I am honored to present this information because I believe we live in a historic time.  One can actively or silently collaborate with these tyrannical ones or one can take a stand against this.  I am taking a stand here and now in front of you and God.  If I am asked to go to an internment I hope I can refuse or hide.  I prefer hiding in the mountains even if it means starvation and death.  If I am forced at gunpoint to go, then I shall but I shall not eat one drop of food until I am free or dead.  I was born free I shall die free God willing!

The document is dated February 12, 2010.

A short video has been produced summarizing some of the startling findings within the document.  One I may have missed is that the document states such camps can be set up in the United States on page 38.  In the complete document in the link above the documentation is actually on page 2-8  in the 2 paragraphs under the sub heading called Support to Civil Support Operations.  To find this video on You tube google,  Leaked Document Military Internment Camps in U.S. to be Used for Political Dissidents. http://www.youtube.com/watch?feature=player_embedded&v=FfkZ1yri26s#!

This publication is available at Army Knowledge Online (www.us.army.mil) and General Dennis J. Reimer Training and Doctrine Digital Library at (www.train.army.mil).
This document is classified as shown by the following.
DISTRIBUTION RESTRICTION: Distribution authorized to the DOD and DOD contractors only to protect technical or operational information from automatic dissemination under the International Exchange Program or by other means. This determination was made on 8 December 2008. Other requests for this document must be referred to the Commandant, U.S. Army Military Police School, ATTN: ATZT-TDD-M, 320 MANSCEN Loop, Suite 270, Fort Leonard Wood, Missouri 65473- 8929.
DESTRUCTION NOTICE: Destroy by any method that will prevent disclosure of contents or reconstruction of the document.

This publication applies to the Active Army, the Army National Guard/the Army National Guard of the United States, and the U.S. Army Reserve unless otherwise stated.  Page VIII of Perface

On the last page of the document is a letter that looks pretty much like the one on the next page.


 Page 6



                                                                                     FM  3-39.40
                                                                               12 February 2010





By Order of the Secretary of the Army
 



                                                                           

                                                                           GEORGE W. CASEY, JR.
                                                                             General, United States Army
                                                                                      Chief of Staff




Official:





JOYCE E. MORROW
Administrative Assistant to the
Secretary of the Army 1002201



 Page 7


DISTRIBUTION:
Active Army, Army National Guard, and United States Army Reserve: To be distributed in accordance with the initial distribution number (IDN) 115851, requirements for FM 3-39.40.
Introduction
Why Am I Profoundly Upset By this Document?  Recent Prior Events
Before going deeply into this document I need to defend my fears for within the internment/resettlement camp article, it is ambiguous as to whether such camps would be set up in the united States.  See sections 3-1 and 3-2 in chapter 3 below.  Section 10:40 of chapter 10 also seem to imply that these camps can be set up in the u.S.  Remember, this document was written before the passage of NDAA 2012.  If these camps are only intended for foreign enemies the document is still unsettling.  What if they are also intended for us?  Even in the Constitution of the United States, under certain conditions, our government is allowed to deprive us of all liberties including the right to trial before being imprisoned or executed.  According to the actions of certain government officials described below, I believe these internment/resettlement camps may be intended for us!

Two pertinent questions must be addressed before exploring this leaked military document!  Does our government have the right to deprive us of Habeas Corpus?  Also does our government have the right to set up such camps in the united States to house detained Americans without trial?  The Constitution is ambiguous on these questions.  Read the 5th amendment.
Amendment V
No person shall be held to answer for a capital, or otherwise infamous crime, unless on a presentation or indictment of a Grand Jury, except in cases arising in the land or navel forces, or in the Militia, when in actual service in time of War or public danger, nor shall any person be subject for the same offence to be twice put in jeopardy of life or limb; nor shall be compelled in any criminal case to be a witness against himself, nor be deprived of life liberty or property, with out due process of law; nor shall private property be taken for public use without just compensation.

In times of invasion or rebellion The Constitution allows the executive to detain individuals whom it deems a threat as prisoners of war, without trial or due process, until hostilities cease.  In the recently passed NDAA 2012, sections 1021 and 1022 allow the military to detain anyone they deem as a threat without trial or due process.  The link shows how the courts often uphold the governments position in this regard.  http://tenthamendmentcenter.com/2012/02/06/ndaa-sections-1021-and-1022-scary-potential/   Obama in his signing statement after signing the NDAA into law stated he was uncomfortable with the above provisions but they were already covered by the 2001 Authorization for Use of Military Force (AUMF) (Public Law 107-40: 50 U.S.C. 1541 and that these provisions did not break new ground. http://www.whitehouse.gov/the-press-office/2011/12/31/statement-president-hr-1540  

Page 8
Thus this latest curtailment of our liberties is just the latest example of a long list of dictatorial bills passed by Congress.

Here is another dangerous aspect of NDAA 2012.  America has been declared a battle zone in sections 1031 and 1032.  Because of this law and others, legally under our Constitution we are now at war so the military and the executive branch now have the authority to seize and detain you or worse, without trial or due process until the end of hostilities.  This war on terrorism is our longest war.  Do you think it will end anytime in the near future?

Senator Lindsey Graham on CSPAN 2 5:29 P.M. uploaded 11/29/2011, declared since America is a battle zone, under section 1032, American Citizens and Resident Aliens cannot be seized by the military.  However under Section 1031 American citizens can be seized by the military and held without trial if the military believes that the American citizens aided the enemy as described in Section 1031.  The meaning of aiding the enemy, is not clearly defined.  If I believe that the American government played a major role in facilitating terrorists against the U.S., could I be detained for giving aid and comfort to the enemy? 

Also according to the Senator, Joseph Padilla an American citizen, was held by the military for several years without trial and the 4th Circuit Court of Appeals upheld the right of the military to hold him because they deemed him to be an enemy combatant since the military declared him a threat.  Thus the precedent has been set for the military to seize citizens and hold them without due process.  http://www.youtube.com/watch?v=fzFygkHgi34 

In the following clip Senator McCain one of the sponsors of the NDAA 2012 bill speaks out why he supports the bill. http://www.youtube.com/watch?v=GsNEOXQ4RZw

In the video clip, The final loss of freedom in America NDAA (monkart), at the end of this paragraph, several government officials discuss possible implications of the bill.  Paul Craig Roberts served as an Assistant Secretary of the Treasury in the Reagan Administration and also testified before Congress on more than 30 occasions.  In addition, he was an editor and columnist for the Wall Street Journal, Business Week and Scripps Howard News Service.  Roberts criticized both Republican and Democratic administrations for various actions.  See the following link for more info on him http://en.wikipedia.org/wiki/Paul_Craig_Roberts 
At the 9 minute and 54 second mark in the next clip, Roberts claimed the following.  “The Pentagon, FBI, DIA, Director of National Intelligence, and the head of the Justice Department National Security, told the Senate, don’t vote for this bill.  It is a very bad.”  However the Senate approved the bill and President Obama codified it into law and signed it on the night of December 31, 2011.

The ACLU strongly opposes the NDAA bill. http://www.aclu.org/blog/tag/ndaa  I include this link because opposition to this bill is very strong on the right and left side of the political spectrum.

Page 9
The following clip from infowars is interesting because it describes other bills passed by the Federal legislature that have eaten away at our liberties before the passage of the NDAA 2012.  Like the Health care bill recently passed, this NDAA bill was very long, over 2,000 pages and both the Senate and the House were pressured into passing it before they had a chance to read through it.  What are the chances any actually read the entire bill? http://www.youtube.com/watch?v=56uByJAxXLg

Having read the above, understand that alternative media sources for years, claimed that elements of the United States government and military in alliances with foreign powers over threw our Constitutional Republic.  They believe at some point the economy will collapse and these sources claim then the ones who engineered the collapse will see no other way to protect themselves other than to enslave us completely. 

Here are some other media sources that show these camps may already exist.
The first is a note to someone from Congressman Bill Hefner on March 24, 1997


Halliburton Subsidiary Gets Contract to Add Temporary Immigration Detention Centers In U.S. http://www.nytimes.com/2006/02/04/national/04halliburton.html

Press Release  http://www.kbr.com/Newsroom/Press-Releases/2006/01/24/KBR-Awarded-US-Department-of-Homeland-Security-Contingency-Support-Project-for-Emergency-Support-Services/

Former Congressional Representative Dan Hamburg also speaks out on Halliburton Contracts for Detention Camps.  The article refers to several other Congressional bills passed allowing the executive branch of the government to imprison citizens without due process or trial during unclearly defined emergencies.  http://www.sfgate.com/cgi-bin/article.cgi?f=/c/a/2008/02/04/ED5OUPQJ7.DTL#ixzz0oFnbVDia

See also Army Regulation 210-35 Civilian Inmate Labor Program  http://armypubs.army.mil/epubs/pdf/r210_35.pdf

See the following Army and National Guard websites advertizing for internment specialists I presume would be employed at such camps. www.goarmy.com/careers-and-jobs/browse-career-and-job-categories/legal-and-law-enforcement/internment-resettlement-specialist.html  The 

Page 10
following national guard website has a video under military police that gives a good description of some of the duties of an internment specialists. http://www.nationalguard.com/careers/mos-guard-jobs?mos_code=31E


To get a better sense of legislation passed over time gradually destroying the Constitution and legalizing tyranny see this link. http://unclesamenterstheendgamepart3.blogspot.com/2011/09/constitution-and-tyranny.html

To get a sense of how our government may be setting up this hidden police state refer to the following links.  http://projects.washingtonpost.com/top-secret-america/articles/frontline-video/
To see more government and media links describing how the military, industrial, media, scientific complex is covertly and overtly establishing a tyrannical state see the websites below.  In these websites there is also evidence that our government used false flags to manipulate the public to support various costly tragic wars. http://unclesamenterstheendgamepart3.blogspot.com/2011/09/relationship-between-military.html   In the following link there are many senators, congressmen, governors and other government officials that suggest or imply that many aspects of 9/11 were hidden from us and some imply it was a false flag engineered to take away more of our liberties and involve us in further costly wars.  There is ample evidence as well that our attack on Iraq was based on false intelligence thus I consider that intelligence as part of a false flag to initiate that war. http://unclesamenterstheendgamepart1.blogspot.com/2011/09/contents-for-government-officials-imply.html pages 7-11. Perhaps terrorist false flags will be employed to set up these vast detention camps and resettlement camps described below.


Earlier I discussed how some of the alternative media believe that those who control our government will turn against the American people if our economy collapses because of irresponsible financial policies.  Perhaps in order to protect themselves, the internment/resettlement camps described below will be one of their weapons to deprive us of our rights and enslave us!  Below are excerpts from FM 3-39.40


 Page 11
Notes and Selected Passages from Document FM 3-39.40: Internment and Resettlement Operations

Notes to Help Navigate Through This Document
Pages VII and VIII of Perface give a good overview of the chapters in the document followed by an introduction.
In the document, the military utilizes lots of acronyms representing different organizations or procedures.  To gain a better understanding of what is being discussed you might want to download and print the 3 page glossary which list the acronyms in alphabetical order along with some definitions at the end as a reference. You can go to the end of the link below to the glossary.  http://info.publicintelligence.net/USArmy-InternmentResettlement.pdf
I also have the list of acronyms at the end of this abbreviated document if the link becomes unusable.

The numbering system in FM 39. 40, is different than that found in regular documents or books.   The document is divided into 10 chapters then several alphabetical appendixes.  In chapter 1 the pages are numbered 1-1, 1-2, 1-3, etc.  The pages in chapter 2 are numbered 2-1, 2-2, 2-3, etc.  In the appendixes in the back, the pages in Appendix a are numbered a-1, a-2, a-3, etc.  In Appendix b, the pages are numbered b-1, b-2, b-3 and so on.  I selected sections of the document that I felt were tyrannical or interesting.  The document itself was over 320 pages, what I put below covers about 25 pages excluding my comments.


Chapter 1 defines the objectives and principles of I/R operations and describes U.S. policies on the protection and care of all detainees, U.S. military prisoners, and DCs.  It stresses humane treatment of detainees.  However abuses are likely to occur.  In Guantanamo and other detainment camps run by the U.S. now, 92 tapes showing the CIA’s so called enhanced interrogation techniques were destroyed.  The following documents were released to the ACLU after they sued in court, showing heavily redacted documents explaining the CIA’s rationale for destroying the tapes.  Do you believe them? http://www.aclu.org/files/assets/cia_release20100415_p01-09.pdf  If the link becomes unusable google  tot: 251945z Oct 02

Page 1-4 of chapter 1.  In the section Segregation, the following quote gives the authorities permission to separate children from their families. Juveniles within the I/R population are typically segregated from the general population.
In this section they discuss how minimum force needs to be utilized for control and ways to guard against escapes.  I/R stands for Internment/Resettlement Camp.

Page 12
Section 1-40  Note all the different organizations involved in the internment and resettlement processes with the United Nations listed near the top.
1-40. External involvement in I/R missions is a fact of life for military police organizations. Some government and government-sponsored entities that may be involved in I/R missions include—
·       International agencies
·       U.N.
·       International Committee of the Red Cross (ICRC)
·       International Organization of Migration

·       The following are U.S. agencies
·       Local U.S. embassy
·       Department of Homeland Security
·       U.S. Immigration and Customs Enforcement (ICE)
·       Federal Emergency Management Agency

Reading through the above sections it looks as though the military is preparing for war but where?  Is it in the U.S. or elsewhere?

On page 1-13 note how the U.N. and other international organizations are immersed in the operations of these detention centers.  If you note recent wars the U.S. has fought, this makes sense because the U.N. has been involved with most of them.
1-46. A detailed description of nonmilitary U.S. government agencies typically involved in I/R operations is contained in appendix E. The non-U.S. government organizations most likely to be encountered during I/R operations are international humanitarian organizations. These are impartial, neutral, and independent
organizations whose mission is to assist and protect victims of conflict. This group includes organizations such as the ICRC, the International Federation of the Red Cross (IFRC), and the Red Crescent Societies. They carefully guard their neutrality and do not desire to be associated with or dependent on the military for fear of losing their special status in the international community that allows them to fulfill their mission. The two principal types of non-U.S. government civilian organizations are—
·       IOs. IOs are established by international agreements and operate at the nation-to-nation level. IOs (International Organizations) include the UN, the UN Development Program, the UN Office for the Coordination of Humanitarian Affairs, the UN World Food Program, and the International Medical Corps. The UN High Commissioner for Refugees is a key player in international detainee operations.
·       Nongovernmental organizations (NGOs). NGOs are voluntary organizations that are not normally funded by governments. They are primarily nonprofit organizations that self-define their missions and philosophies. This independence from political interests is the key attribute of NGOs and can be a great benefit in rebuilding relations when political dialog has failed or is not practicable. They are often highly professional in their field, extremely well motivated, and prepared to take physical risks in appalling conditions. Examples of NGOs include Save the Children, Medecins Sans Frontières (Doctors without Borders), Catholic Relief Services, and Catholic Bishops Council. NGOs are classified as mandated or nonmandated as described below:
·       A mandated NGO has been officially recognized by the lead IO in a crisis and is authorized to work in the affected area. The ICRC is an example of a mandated NGO.
·       A nonmandated NGO has no official recognition or authorization and, therefore, works as a private concern. These organizations may be subcontracted by an IO or mandated NGO. In other cases, they obtain funds from private enterprises and donors. Catholic Relief Services is an example of a nonmandated NGO.

Page 13
􏰀 􏰁      􏰁      UNITED NATIONS
1-47. The UN is involved in the entire spectrum of humanitarian-assistance operations, from suffering prevention to relief operations. Typically, UN relief agencies establish independent networks to execute their humanitarian-relief operations. The UN system delegates as much as possible to the agency’s elements located in the field; supervisory and support networks are traced from those field officers back to UN headquarters. Military planners must familiarize themselves with UN objectives so that these objectives are considered in planning and executing military operations. (See appendix E.)

Page 1-14  discusses military protection, security and protection of detainees from battles as well as evacuation plans.  Are they preparing for war in our country?  See security requirements under section 1-51
Security requirements. To the maximum extent possible, I/R facilities will be protected from the hazards of the battlefield. To protect the I/R population, commanders— 􏰁
·       Manage the control of captured protective equipment that could be used to meet requirements.
·       Ensure that when planning for individual protective measures and facility protection, the potential presence of detainees is considered. As a general rule, detainees should derive the same benefit from protection measures as do members of the detaining force.
·       Use-of-force training. Planning and preparing for the use of force is a necessary element in maintaining order. Personnel assigned the mission of providing for the control of detainees, U.S. military prisoners, and DCs and the security of I/R facilities should be issued and trained on RUF that are specific to that mission. Theater rules of engagement (ROE) remain in effect for defending an I/R facility from an external threat.
·       Safety and evacuation plans. When controlling large I/R populations, commanders must develop thorough safety and evacuation plans to evacuate, shelter, protect, and guard (as appropriate) U.S. armed forces personnel and I/R populations from fire, combat hazards, natural elements, and nonbattle injuries. Safety plans must be incorporated into I/R facility standing operating procedures (SOPs) and refined through continuous risk assessments and mitigation. Commanders must ensure that safety and evacuation plans are routinely trained and rehearsed.

Page 1-15 discusses intelligence and interrogation operations and U.S. armed forces operating in camps as part of section 1-51.
Intelligence and interrogation operations. The U.S. armed forces operating the I/R facility need to plan for human intelligence (HUMINT) collection operations, which require close cooperation with HUMINT collectors and counterintelligence agents. Further consideration must be given to ensure that interrogation operations in the facility are conducted according to applicable U.S. laws and regulations, international laws, operation orders, FRAGOs, and other operationally specific guidelines (DOD policies). The internment facility commander is responsible for ensuring proper care and treatment for detainees. (For a detailed discussion of responsibilities and support relationships dictated by DOD policies and for more information on HUMINT operations see FM 2-22.3.)
In this section it is noted that detainees were formally called prisoners of war.  See the underlined part of the quote below this!  The term detainee I guess linguistically sounds better than prisoner of war.  Note the blend of national and international rules here.  It is subtle but throughout the document I perceive a loss of U.S. sovereignty over time.  See the quote below.
Strategic reporting. Strategic reporting of detainees and DCs (Displaced citizens) requires adherence to the Detainee Reporting System (formerly known as the Branch Prisoner of War Information System) procedures. The timely and accurate reporting of data is critical to ensuring detainee and DC accountability and compliance with U.S. and international laws.

Page 14
Page 1-16  Description of Military Police Roles and Duties Interesting.  I listed a few here.  I underlined sections that sound more like activities that occur in prisons or prison like situations.
1-54. When performing I/R operations, 31B personnel bring a variety of skill sets, inculcated through their training. These skills include—
·       Interpersonal communications.  
·       Use-of-force guidelines and standards.  
·       Civil disturbance operations.  
·       Use of NLWs (Non lethal weapons) in any environment.
·       Custody, control, and audit maintenance requirements for I/R operations.  
·       Police investigations.  
·       Cultural awareness.
1-55. Military police personnel within the 31E MOS (Military occupation specialty) are specifically trained to conduct I/R operations across the full range of potential environments. They provide technical capabilities specific to I/R, making them the subject matter experts in full-scale I/R operations. These skills include—
·       Interaction and use of U.S., third world country and local national interpreters during I?R operations
·       I/R facility operations (cell blocks, recreation areas, shower areas, latrines, mess areas).
·       Safe and proper take-downs techniques to ensure the well-being of all personnel involved.
·       Proper and effective movement techniques when moving an individual from one location to another.
·       Use of NLW in any environment.
·       Cultural awareness.

.Internment and Resettlement Operations and the Operational Environment
·       Riot control measures, to include the use of riot control agents and dispersers.
·       Quick-reaction force actions inside and outside the facility.
·       Search techniques, to include the use of electronic detection devices.
·       Detainee treatment standards and applicable provisions of the law of war.
·       Current, approved interrogation techniques.
When you read the underline sections in 1-54 and 1-55 discussing military police rules and duties is this facility more like a library or mall where you have more freedom of movement or more like a prison?

Chapter 2
This chapter discusses handling of detainees and the army’s role in detainment camps.  The main problem is how to get civilians out of the way of military operations in times of war.
Section 2-18.  Here is one fantastic rationale for setting up detainment camps.  This is why this document is so scary.
2-18. During stability, the nature of the threat can often inhibit the ability of friendly forces to differentiate between a hostile act and hostile intent or between insurgents and innocents within the civilian community. For this reason, military commanders and forces must have the authority to detain civilians and an acceptable framework to confine, intern, and eventually release them back into the OE (operational environment). This authority has the most legitimacy when sanctioned by international mandate or when it is bestowed or conveyed from the local or regional governmental power. The initial or baseline authority granted to military forces to use force and detain civilians will ultimately determine the status of the persons they detain. The status of detainees will further determine the manner in which they are processed, the degree of due process they are afforded, and whether their offense is military or criminal in nature. Detainee status and identification will also help develop and determine eventual rehabilitative, reconciliatory, and release strategies.

Page 15
Sections 2-20 – 2-25 describe counter insurgency.  Section 2-23 gives rationale why large numbers of people need to be detained.  During the Vietnam War, millions of Vietnamese civilians were relocated to so called safe areas.  They were uprooted from their ancestral lands to areas where the military could protect them from insurgents.  One of the goals of Agenda 21 is to relocate citizens to urban areas allowing vast portions of the environment to revert to a wild state.  Perhaps a hidden agenda is to locate people in areas where they can be more easily controlled.
2-23. The need for information is so crucial in counterinsurgency operations that it typically leads to an increased number of detainees. The time-sensitive nature of information and intelligence in counterinsurgency often leads to detentions based on incomplete or inaccurate information that makes determining detainee status and identification difficult and complex. The process of detainee identification and assessment is continuous and begins at the POC (Point of contact); is actively monitored during the period of detainee internment; and significantly impacts custody, control, and release decisions and strategies.
2-24. Detainee operations play a significant role in counterinsurgency efforts because large detainee populations can become fertile ground for insurgent, extremist, and criminal recruitment, development, and growth if they are not processed quickly and effectively. The development and growth of insurgent and/or criminal networks, if not identified and mitigated, can pose significant threats to I/R cadre and the detainee/DC population.
2-25. Detainee populations grow incrementally as counterinsurgency operations endure, or they can increase very rapidly during surge operations, reflecting the episodic nature of counterinsurgency. Captured insurgents display a propensity to continue recruitment, assassination, and intimidation inside TIFs, (Theater internment facility) making it incumbent upon forces supporting detainee operations to focus their efforts on countering that portion of the insurgency within the facility, while synchronizing their efforts with military operations outside the detention facility.

Section 2-26 discusses Rationale for need for re-education camps.  Again this reminds me of the problems faced in Vietnam when we were attempting to pacify and win the hearts and minds of the Vietnamese people.  Perhaps the military practiced honing these skills in Iraq and Afghanistan where they faced hostile populations.  If they face hostile Americans they may prove to be a formidable foe based on all the practice they have had in prior wars.
COUNTERING THREATS WITHIN THE FACILITY
2-26. Prisons can provide insurgents with a large pool of discontented persons that may facilitate recruitment efforts by insurgent, criminal, or other irregular actors. These threats are not confined to internment operations; they are just as likely to propagate within resettlement or conventional prison operations. These irregular threat actors may also attempt to infiltrate detention or resettlement facilities to intimidate or assassinate political opponents or their supporters. The facility commander develops procedures designed to identify and defeat insurgent efforts to organize escape, harm the guard force and other detainees, or degrade the effectiveness of the facility threat operation in general. These efforts may be linked to an overarching counterinsurgency effort in the theater or may be locally initiated efforts to gain control within the facility population. The identification of a linkage to an external effort may be accomplished through and coordinating and sharing police information with an external multifunctional headquarters such as the military police command or a joint detainee task force. The military police command or joint detainee task force coordinates and synchronizes support with MI, (Military intelligence) civil affairs (CA), PSYOP and linguists; medical, legal, HN, and 

Page 16
interagency personnel; and local leaders in an effort to defeat insurgency within the facility. Procedures or tactics, techniques, and procedures to defeat the internal threat networks and efforts within the facility may include—􏰀 Developing deliberate procedures for detainee identification, categorization, and continual assessment.
·       Using multifunctional boards to assess detainees and develop reconciliation plans
·       Identifying and designating dedicated teams with specific skill sets through mission analysis for each major compound. (The teams are organized to identify and mitigate threats within the facility and will include bilingual bicultural and advisors; intelligence officers; counter intelligence agents; and others as required.
·       Allowing detainee participation in their own adjudication and rehabilitation destiny.
·       Empowering detainee leaders to leverage their support through incentives.
·       Ensuring that the informational needs of detainees are met and that rules and/or disciplinary
·       actions are understood.

Section 2-27 contains interesting quotes that support our transition from democracy to tyranny.  According to many founding fathers and famous dictators including Lenin, Stalin, Mao and Hitler, democracy was indispensable in order for them to set up their totalitarian states.
…Former combatants may participate in the process when offered some level of due process involvement linked to corrective behavior modification. Commanders must seek legal assistance as they balance regulatory operations security and detainee privacy entitlements with the transparency necessary for supporting democratic institutions and national values…

Section 2-29 is a good description of an efficient police state. 
…Additional tasks include enforcing curfews, restricting movement, checking travel permits and registration cards, operating checkpoints, instituting amnesty programs, and conducting inspections. The level of control is drastically different from that used during detainee operations. During resettlement operations, DCs are allowed the freedom of movement as long as such movement does not impede operations.
2-31. Controlling DCs is essential during military operations because uncontrolled masses of people can seriously impair the military mission. Commanders plan measures to protect DCs in the AO (Area of operations) and to prevent their interference with the mission.
2-32... A special category of personnel arises when Internment/Resettlement operations require the housing of Displaced Civilians that are detained against their will…

Section 2-33 reinforces my view that the United Nations is involved in the plan to detain large numbers of U.S. citizens in Internment camps.  This also reinforces my view that the United Nations plays an increasing role in our government.      
In a semi-permissive environment, the UN mandate or ROE (Rules of Engagement) may include the authority to detain civilians that are a threat to a secure and stable environment. Military police units may be required to establish CI Civilian internee) detention facilities for this purpose.

Section 2-34 describes the U.S. government agencies that will be most active in setting up the camps.  Alternative news sources have charged that the Department of Homeland Security has led the effort in setting up the camps.

Page 17
Note. Resettlement conducted as a part of civil support operations will always be conducted in support of another lead agency (Federal Emergency Management Agency, Department of Homeland Security).

It is likely that some, hopefully most American military will resist if these camps are set up and become operational in the united States.  Sections 2-35 and 36 describe the housing of military prisoners.  An interesting procedure is that military prisoners will be housed in separate camps from civilian detainees.
2-36. …U.S. military prisoner confinement operations parallel, but are separate from, the other types of I/R operations. No member of the U.S. armed forces may be placed in confinement in immediate association with a detainee who is not a member of the U.S. armed forces…
Rationale for setting up detainment camps. 2-37. Population and resource control denies adversaries or insurgents access to the general population and resources and prevents incidental civilian activity from interfering with military operations…
2-47. Typically, a TIF (Theater internment facility) or SIF (Strategic internment facility) is established at the theater level. (See paragraph 6-59.) A TIF or SIF is a permanent or semi-permanent facility that is normally within the regional area of combat operations and designed to hold large numbers of detainees for extended time periods. All TIFs and SIFs are operated under military police C2, (Command and Control) with augmentation and support of many of the military disciplines. The decision may be made to establish a TIF or SIF outside the theater of operations that is not under the authority of a theater commander.  The bold print and underlining was added by me to emphasize these points.

Chapter 3
Chapter 3 deals with the roles and responsibilities of staff members at the Internment camps.  There are many detailed highly complex jobs in this vast complex military industrial prison complex.  The military has learned a great deal from internment of Japanese Americans, Vietnamese farmers as well as their more recent wars in Iraq and Afghanistan.  Section 3-1 and 3-2 is ambiguous concerning whether such camps could be set up in the united States.  However, many laws seemed to be supportive of such action and the Constitution is also ambiguous on this point.  See the introduction at the beginning of my document.
3-1.            The NDRC (National Detainee Reporting Center) a Headquarters, DA (Department of Army) organization assigned to the OPMG (Office of the Provost Marshall General) is responsible for— 􏰀
·       Assigning and forwarding blocks of ISNs to the designated theater and the continental United States (CONUS) as required  
·       Obtaining and storing information concerning detainees and their confiscated personal property.
·        Preparing reports for the protecting power.  
·       Providing accountability information to the ICRC central tracing agency.  
·       Acting as the proponent office for the Detainee Reporting System and detainee management software.
3-2.  The TDRC (Theater detainee reporting center) is a modular organization that is comprised of 32 personnel who are capable of deploying as a full organization in major combat operations as a team or a combination of up to 4 teams to support small-scale operations. It functions as the field operations agency for the CONUS-based NDRC. (National Detainee Reporting Center)  Remember CONUS stands for Continental United States.
The last underlined sentence below is interesting and scary.

Page 18
3-10. The U.S. Army Corrections Command mission is to exercise C2 (Command and Control) and operational oversight for policy, programming, resourcing, and support of Army Corrections System facilities and table of distribution and allowances elements worldwide. On order, the U.S. Army Corrections Command coordinates the execution of condemned military prisoners. Strategic objectives include—
·       􏰀 Providing a safe environment for the retributive incarceration of prisoners.  
·       Protecting communities by incarcerating prisoners.  
·       Deterring those who might fail to adhere to discipline laws and rules.  
·       Providing rehabilitation services to prepare prisoners for release as civilians or for return to duty with the prospect of being productive Soldiers/citizens. 􏰀
·       Supporting commanders world wide by developing detainee experts through experiential learning in a prison environment in a prison environment.

Section 3-15 has a lot of bullets.  One paragraph shows the complexity and interdisciplinary approach to working with detainees involving the use of behavioral scientists.
The interrogation chain of command’s coordination on the interrogation plan with the CDO. The CDO (in conjunction with the MI commander) may convene a multidiscipline custody and control oversight team including, but not limited to, military police personnel, MI personnel, a behavioral science consultant (if available), and legal representatives. The team can advise and provide measures to ensure that effective custody and control is used and compliant with the requirements of applicable U.S. laws and regulations, international laws, execution orders, FRAGOs, and other operationally specific guidelines. Guards do not conduct intelligence interrogations and will not set the conditions for interrogations. Guards may support interrogators as additional security (for example, for combative detainees) according to JP 3-63, FM 2-22.3, and the approved interrogation plan.

As I read through the next group of sections human care of detainees is emphasized.  Procedures are in place where complaints can be filed and in various places Geneva Convention rules are posted so detainees recognize their rights.  This next sections concerning employing dogs is interesting. 
MILITARY WORKING DOGS
3-33. MWDs offer a psychological and actual deterrent against physical threats presented by I/R populations. (See FM 3-19.17.) They may be used—
·      To reinforce exterior security measures against penetration and attack by small enemy forces.
·       As patrol dogs to track escaped prisoners.
·       As perimeter security patrols.
·       For narcotic and /or explosives detection.
·       To deter escapes during external work details

3-34. MWD employment compliance and oversight capabilities typically exist at the MPC and military police brigade levels. Responsibilities, to include those for kennel masters, should be embedded within those organizations to ensure that proper mission-oriented taskings for MWDs are implemented.
3-35. At the battalion level, the MWD program provides the capabilities of two patrol explosive detection dogs and one patrol narcotic detection dog. These MWDs are normally employed exclusively at the TIF/SIF levels.

WARNING
MWDs, contracted dogs, or any other dog in use by a government agency will not be used to guard detainees, U.S. military prisoners, or DCs. Additionally, dogs may not be used as part of an interrogation approach, nor to harass, intimidate, threaten, or coerce a detainee for interrogation purposes.  THIS HUMANE WARNING IS FOUND ON PAGE 3-12.

 Page 19
As you get deeper into the document tyrannical aspects of these internment camps manifest especially under the heading STAFF DUTIES AND RESPONSIBILITIES IN SUPPORT OF INTERNMENT AND RESETTLEMENT.  However even in this part the fist 20 sections or so describe various jobs where the workers protect rights of detainees. Unfortunately most people won’t have the discipline to get deep into this section where the mischief occurs starting with the Psychological Operations Officer in section 3-55.  I underlined the sections most disturbing to me.
PSYCHOLOGICAL OPERATIONS OFFICER
3-55. The PSYOP officer in charge of supporting I/R operations serves as the special staff officer responsible for PSYOP. The PSYOP officer advises the military police commander on the psychological impact of military police or MI actions to prevent misunderstandings and disturbances by detainees and DCs. The supporting I/R PSYOP team has two missions that reduce the need to divert military police assets to maintain security in the I/R facility. (See appendix J.) The team—
·       Assists the military police force in controlling detainees and 1.  
·       Introduces detainees or DC s to U.S. and multinational policy.
3-56. ThePSYOP team also supports the military police custodial mission in the I/R facility. The team—
·       The team develops PSYOP products that are designed to pacify and acclimate detainees or DCs to accept PSYOP U.S. I/R facility authority and regulations.
·       Gains the cooperation of detainees  or DC s to reduce the number of guards needed.  
·       Identifies malcontents, trained agitators, and political leaders within the facility who may try to organize  resistance or create disturbances.  
·       Develops and executes indoctrination programs to reduce or remove antagonistic attitudes.
·       Identifies political activists.
·       Provides loudspeaker support (such as administrative announcements and facility instructions when necessary).  
·       Helps the military police commander control detainee and DC populations during emergencies
·       Plans and executes a PSYOP program that produces an understanding and appreciation of U.S.  policies  and actions.
Note. PSYOP personnel use comprehensive information, reorientation, and educational and vocational programs to prepare detainees and DCs for repatriation.
When North Koreans and Chinese soldiers captured American prisoners they broke down the vast majority of them and brainwashed them so they no longer supported the American mission in Korea but supported the Chinese and North Korean goals.  Often the same happened with American prisoners captured by the North Vietnamese soldiers.  I suspect our military has learned the techniques from our communist enemies and may try to apply these techniques to American resisters arising in our country.  In terms of developing products to pacify detainees I have read that the Nazis and Soviets found that adding fluoride to inmate’s water caused them to become more docile.  It is likely that drugs and other substances can be added to food and water to pacify detainees.  Here is a link to more medical studies on fluoride. http://answers.yahoo.com/question/index?qid=20111202061928AAH01qP   I do not vouch for their accuracy or validity.  What is scary about some of the fluoride studies is their claim that the most absorption of fluoride is not through drinking water or the toothpaste but it is most efficiently absorbed through are skin while we take showers.

Notice they talk about working with political agitators and malcontents providing them indoctrination to reduce or eliminate antagonistic attitudes.  These processes were well established in the communist nations.  The 2012 NDAA act compliments the internment camps because the military can detain anyone they deem as a threat without trial or due process.

3-57. The PSYOP officer is an integral part of the I/R structure. The PSYOP officer often may work in close conjunction with the behavioral science consultation team, if available, for behavioral assessments and recommendations. The 

Page 20
behavioral science consultation team may develop behavioral management plans and perform many other functions to assist the PSYOP officer if directed. The I/R facility commander may designate a location in which PSYOP personnel can conduct interviews of the various categories of people associated with I/R. This location must be separate and away from the interrogation areas. 
Masters of control realize negative reinforcement is least affective in controlling others because it breeds anger and resentment.  If you can truly understand a persons needs, apply the proper behavioral strategies, propaganda and rewards as well as secretly adding drugs or substances to food and water the vast majority of people can be controlled without threats or intimidation.  Those that don’t respond to these strategies can be easily contained, discredited or isolated from others.  If the system is efficient enough it will be rare that a malcontent will have to be destroyed because of being a threat to the governing system.  If this becomes necessary however, then poisonous substances can be administered to the subject, causing the subject to die from what looks like natural causes.  If an autopsy is performed the offending substances will be broken down so it will seem like the subject died from natural causes.

COUNTERINTELLIGENCE AGENTS
3-59. Counterintelligence agents may be attached or in direct support of a mission to an I/R battalion or military police brigade to assist the facility commander with intelligence requirements for the facility and surrounding area and to ensure the safety and security of personnel operating in and around the facility.
Note. Counterintelligence agents may serve as a central repository for information and intelligence on safety and security issues related to the facility.
3-60. Such responsibilities may include— 􏰀
·       Identification of detainee agitators, leaders, and their followers.  
·       Identification of existing clandestine detainee organizations, to include—
·       Strength. 􏰁 Objectives. 􏰁      Member identity.
·       Identification of existing underground communication ssystems􏰁     
·       Between compounds and internment facilities. 􏰁     
·       With indigenous civilian personnel. 􏰁     
·       For overt attempts by detainees or local indigenous people to communicate with each other.
·        Identification of suspicious activities by local people near the internment facility (such as photographing or sketching the facility).
·       􏰀Identification of the existence of fabricated weapons, stores of food, and supplies of clothing in the compound.
·       Identification of plans by detainees to conduct demonstrations, to include— 􏰁     
·       Date and time. 􏰁     
·       Number of detainees involved, by compound. 􏰁     
·       Nature of the planned demonstration (passive, harassing, or violent).
·       Identification of detainee objectives, propaganda, and attempts to weaken or test internment facility authority and security, establish control in individual compounds, and orchestrate mass escapes.

In my sixth grade history class when we talks about such people we had a special name for them, secret police.  Every brutal totalitarian system had them from Stalin, Mao, Hitler, Saddam Husseien to Kim Sung Ill in North Korea.  Once they are in place no body talks to anyone else for fear of being turned in.  Do you really want to go there?

MULTINATIONAL REPRESENTATIVE
3-64. The multinational representative coordinates visits, to include inspections of conditions for detainees captured by their forces and coordinating with the detention facility commander and JIDC (joint interrogation  and debriefing center) commander before they participate in interviews or interrogations.

What is this multinational representative?  Is it a go between his or her prison camp and those prison camps of other nations?  Will these representatives get together with other international representatives from time to time to share what strategies and techniques are most effective in dominating and controlling detainees?  Will they over time develop a system of best practices for their scientific control?  Perhaps a four point rubric to judge the prison camps will be developed.   A level 1 camp is a camp where the detainees are not under complete control.  In fact negative methods of 

Page 21
control backfire leading to rebellions.  In a level 2 camp incentives and propaganda are used to infrequently to control the slaves although from time to time the masters resort to negative reinforcement to control the slaves.  A level 3 camp employs a lot more propaganda, additives in the food and water, and positive reinforcement to manipulate the slaves.  There is no open rebellion thus no negative reinforcement or terror to control the slaves.  People at times show some discontent but over all they are satisfied with their lot.  A camp scoring a 4 on their rubric relies entirely on propaganda and positive systems of incentives to control the slaves.  In such a camp the slaves are happy and believe they live in paradise and willing work long hard hours for they have been completely brainwashed to love their slavery!  The masters effectively employed the best practices necessary to bring about what the slaves believe is utopia on earth.  All the slaves are united in the vision of the masters and there is no dissent or dissatisfaction!

Chapter 4 Capture, Initial Detention and Screening
All detainees will be treated according to the GPW and GC unless directed otherwise by competent authority.  Does this mean a competent authority can override the Geneva convention and other rules of war?  Is this an example of rule of man or rule of law?
DETAINEE PROCESSING TECHNIQUE
4-33. Upon capture, Soldiers must process detainees using the “search, silence, segregate, speed, safeguard, and tag (5 Ss and T)” technique. This technique provides a structure to guide Soldiers in conducting detainee operations until they transfer custody of detainees to another authority or location. Complete the “5 Ss and T” technique as follows:
·       Search. Neutralize a detainee and confiscate weapons, personal items, and items of potential intelligence and/or evidentiary value.
·       Silence. Prevent detainees from communicating with one another or making audible clamor such as chanting, singing, or praying. Silence uncooperative detainees by muffling them with a soft, clean cloth tied around their mouths and fastened at the backs of their heads. Do not use duct tape or other adhesives, place a cloth or either objects inside the mouth, or apply physical force to silence detainees.
·        Segregate. Segregate detainees according to policy and SOPs (standing operating procedures) (segregation requirements differ from operation to operation). The ability to segregate detainees may be limited by the availability of manpower and resources at the POC. At a minimum, try to segregate detainees by grade, gender, age (keeping adults from juveniles and small children with mothers), and security risk. MI and military police personnel can provide additional guidance and support in determining the appropriate segregation criteria.
·       Speed. Quickly move detainees from the continuing risks associated with other combatants or sympathizers who may still be in the area of capture. If there are more detainees than the Soldiers can control, call for additional support, search the detainees, and hold them in place until reinforcements arrive.
·       Safeguard. Protect detainees and ensure the custody and integrity of all confiscated items. Soldiers must safeguard detainees from combat risk, harm caused by other detainees, and improper treatment or care. Report all injuries. Correct and report violations of U.S. military policy that occur while safeguarding detainees. Acts and/or omissions that constitute inhumane treatment are violations of the law of war and, as such, must be corrected immediately. Simply reporting violations is insufficient. If a violation is ongoing, a Soldier has an obligation to stop the violation and report it.
·       Tag.  Ensure that each detainee is tagged using DD Form 2745.  Confiscated equipment, personal items, and evidence will be linked to the detainee using the DD Form 2745 number. When a DA Form 4137 is used to document confiscated items, it will be linked to the detainee by annotating the DD Form 2745 control number on the form.
Note. Segregation is not intended to be used as an interrogation technique. (See FM 2-22.3.)  In a detention facility, segregation should only be used for security reasons or to separate groups required to be grouped by the Geneva Conventions (grade, nationality, family).
4-34.  To ensure accountability, each detainee is tagged by the capturing unit using DD Form 2745. Military police at DCPs and DHAs check each tag for—

Page 22
·       Date and time of capture. 􏰀
·       Capturing unit. 􏰀
·       POC. 􏰀
·       Circumstances of capture.
4-35. Decisions regarding a detainee’s current and future status are based on the initial processing at the POC. Proper processing ensures that U.S. armed forces can take the appropriate action to release, detain, transfer custody, prosecute, or adjudicate detainees.

Chapter 5 Detainee Operations
This is the opening paragraph for chapter 5.  Combat operations and stability operations in the war on terrorism continue to result in the detention of criminals, combatants, and civilians as military forces seek to support emerging democracies, mitigate the threat from terrorists, and quell insurgencies. A common lesson is the requirement to prepare for and conduct detainee operations as an integral part of full spectrum operations. Modern military actions, whether in a contiguous or noncontiguous environment characteristic of the war on terrorism, result in the capture of many and varied detainees. The war-on- terrorism detainee differs significantly from traditional EPWs of past conflicts and presents a potentially different and greater type of security threat during processing, escorting, and handling. 

Senator Lindsey Graham in the introduction stated on C-SPAN that with the passage of the NDAA 2012 that all of the United States is now part of a battlefield so that the military can detain anyone without trial or due process until the war on terror is declared over.  In addition, American citizens have already been detained and the right of the military to do this has been up held by the American courts.  So it is very possible that detainment facilities for such citizens will be set up in America. 

If you have any doubt that detainees are not being treated like prisoners consider the visitation procedures.
VISITATION
5-63. Detainee visitations are a deliberate operation, resource-intensive, and a significant IO (International organizational)  builder. The detention facility commander may grant visitation privileges depending upon the detainee’s conduct and disposition while in detention. Visitation must be formally requested and scheduled with the fixed facility detainee visitation office by the person(s) wishing to visit with a detainee. Scheduled visitation is based on the number of visitations that may be accommodated for a specific visitation day. Visitors requesting to visit with a detainee must provide or obtain their own transportation to the fixed facility on the specific day that a visitation is scheduled. Visitation staff and guard forces must know in advance who was scheduled for visitation, and security measures must be put in place. Visitations take place within the site and require the following security measures before visitors can be granted access:
·       Visitors are only allowed to arrive and request permission to enter through a specific gate. They must check in with the U.S. guards manning the visitation security gate access point.
·       Guard forces must verify that personnel requesting visitation are scheduled and that they provide a legitimate form of identification before access is granted. Upon verification of identity and scheduled visitation for that particular day, visitors move to the visitor holding area that immediately follows the visitor access point.
·       Once inside the facility, the visitor’s identification is checked a second time by the visitation staff.
·        Visitation staff members used interpreters to explain visitation procedures to visitors.
·       Visitors are required to submit to physical searches and biometrics enrollment using the Biometrics Automated Toolset before they are allowed to move to the next phase of visitation processing.
·       If a visitor refuses to be searched or fails biometrics enrollment/verification, the visitor should not be authorized to visit the detainee and should be escorted off the compound by security personnel. Additionally, if a visitor refuses to complete in processing requirements, the visitation staff records it.
·       Once biometrics enrollment and verification is complete, visitors, are seated in a lobby and provided a visitor orientation.

Page 23
·       When detainees are removed from fixed facility compounds, detainee ISNs are verified by the compound guard commander, and the detainee’s ISN is entered into the Detainee Management System. As detainees are removed from compounds, they are secured and then escorted to the bus that transports them to the visitation area.
·       Separate bus or truck guards are used to control the detainees after they are placed on vehicles. When all detainees are on buses or trucks, they are transported to the visitation area under escort. Escorts are used to prevent detainees from talking to or intimidating each other, coordinating, or planning any subversive action against guard forces.
·       At the visitation area, guards remove detainees from buses and escort them to a secure holding area out of sight of visitors. When all detainees are in the secure compound and an accurate headcount of detainees is complete, they are searched a second time by guard forces who are conducting the escort. Detainees are left in the secure holding area, under guard, until removed and escorted to the building where the visitation takes place. Guards escort all detainees receiving visitations in the same building at the same time.
·       Generally only eight to ten detainees are allowed to conduct visitations in the same building at a time. Three visitation buildings are used at a time for visitations. The guard-to-detainee coverage is mission variable-dependent but averages one guard to every six detainees. HN corrections officers assist in guarding and observing visitations in each individual visitation building. Detainees are escorted into the visitation building and seated by position on the visitation roster. Once seated and briefed on visitation rules, guards escort the visitors and position them across from the visited detainee. The visitation building is split down the middle by a wall with open window cutouts to allow visitors and detainees to sit across from, and maintain view of, one another.
·       During the visitation session, visitors are not allowed to have any physical contact with the detainee or pass anything through the opening without the expressed consent of the guards. Any detainee caught attempting to have physical contact or take something from a visitor without proper consent is immediately removed from the visitation site, searched, and escorted back to the holding area.
Note. Detainee visitors are not be allowed to interact with, view, or overhear conversations of MI personnel (and their associated colleagues) or any other U.S. or multinational person who is waiting to interact with, or detainees. When planning the layout of interrogation rooms (visiting booths and areas in the immediate vicinity of corridors leading to and from these areas) commanders and staffs must keep detainee visitors isolated from other individuals who are working in the I/R facility, specifically MI personnel and their associated colleagues. Finally, when establishing an SOP for interrogations and detainee visits, consideration for precluding the interaction of detainee visitors and MI personnel and their associated colleagues are carefully addressed.
5-64. Visitations normally last between 1 and 2 hours, depending on the number of visitations scheduled. While detainees are conducting visitations, guard forces strictly monitor visitation events and conversations. Guards and interpreters should observe detainee or visitor verbal and nonverbal actions. Additionally, guards should look for gestures that may be used as codes or actions that may be symbolic of some sort of clandestine communications method.
Note. Guard forces and fixed-facility staff reserve the right to end visitation sessions any time the threat environment within the fixed facility increases for any reason. In the event this occurs, detainees are to be placed back into the holding area and visitors are escorted back to the visitation processing center and then offsite through the visitation gate.
5-65. Following visitation, detainees are placed back in a holding area and searched. At the same time, visitors are returned to the visitation reception area, searched, and escorted to the gate for release from the
compound. Throughout the entire visitation process, detainees and visitors must be treated with precise respect and courtesy. Local customs are upheld as much as possible, unless they become an issue with security requirements set forth by the detainee visitation policy.
5-89. Security planning must be continuous and complete to reflect current intelligence relating to the nature and characteristics of the individuals under custody and control. Specific planning must be completed to ensure that capabilities are available to prevent and thwart group disobedience, uprisings, outbreaks, and escapes. Planners must provide for an immediate response that is capable of meeting any
internal or external threat to the security of the specific facility. Military police should never forfeit their ability to maintain positive control.

Page 24
5-90. The physical construction of the DCP, DHA, or TIF and the presence of guard personnel create the most obvious means of providing security, internally and externally. The use of existing structures is ideal for conducting detainee operations. The facility commander plans for and executes effective perimeter security operations for the internment facility. Planners should enforce a double-barrier system along external perimeters (sally ports, access control points). At a sally port, where there are two means of entry, both entry points should never be open at the same time. Security forces should implement random security and search measures inside cells and in other areas where detainees congregate. Military police should strictly enforce weapons discipline by adhering to weapons clearing and turn-in procedures.

Chapter 6 Detainee Facilities
SITE PLANNING AND SELECTION
6-5.  …The first requirement is to ensure that the correct number and type of personnel and construction material are on the ground, well in advance of the start of hostilities, to conduct the operation…  Many alternative news sources in the united States believe that the economic collapse of our nation was engineered by the elites long ago.  Knowing that trouble might occur once the collapse is well underway, camps plus the rules for their operation have been in place for many years if members of our population become unruly.  Some sources claim 800 internment camps already exist throughout the country capable of holding millions of individuals.

6-7.  …The U.S. Army Corps of Engineers Theater Construction Management System contains basic plans, specifications, and material requirements for detainee facilities based on the anticipated detainee population. 6-8.            When constructing a facility, planning considerations may include, but are not limited to—

·       Clear Zones. As appropriate, mission variables determine the clear zone surrounding each facility that houses detainees. Construct at least two fences (interior and exterior) around the detainee facility and ensure that the clear zone between the interior and exterior fences is free of vegetation and shrubbery.
·       Guard towers. Locate guard towers on the perimeter of each facility. Place them immediately outside the wall or, in case of double fencing, where they permit an unobstructed view of the lane between the fences. The space between towers must allow overlapping observation and fields of fire. During adverse weather, it may be necessary to augment security by placing fixed guard posts between towers on the outside of the fence. Towers must be high enough to allow an unobstructed view of the compound and low enough to permit an adequate field of fire. The tower platform should have retractable ladders and should be wide enough to mount crew-served weapons. Another consideration involves using nonlethal capabilities from guard towers.
·       Lights. Provide adequate lighting, especially around compound perimeters. Illuminating walls and fences discourages escapes, and illuminating inner strategic points expedites the handling of problems caused by detainees. Lights should be protected from breakage with an unbreakable glass shield or a wire mesh screen. Ensure that lights on the walls and fences do not interfere with the guards’ vision. Provide secondary emergency lighting.
·       Patrol roads. Construct patrol roads for vehicle and foot patrols. They should be adjacent to outside perimeter fences or walls.
·       Sally ports. A sally port is required to search vehicles and personnel entering and leaving the main
              compound. It is recommended that a sally port be placed at the back entrance to the facility.
·       Communications Ensure that communication between the towers and the operation headquarters is reliable. Telephones are the preferred method; however, ensure that alternate forms of communication (radio and visual or sound signals) are available if telephones are inoperable.

DETAINEE COLLECTION POINT
6-10. DCPs are generally nothing more than a guarded, roped-off (with razor or concertina wire) area or a secured building (see figure 6-2). The capture rate and the number of detainees determine the size of the DCP. The use of existing structures (vacant schools, apartments, warehouses) is encouraged to conserve resources and provide protection for detainees. Detainees are treated humanely and as EPWs (enemy prisoners of war) until their status is determined 

Page 25
according to DOD policy. More data to suggest facilities meant to be prisons.

Segregate. Segregating detainees should be done according to policy and SOPs. Segregation requirements differ from operation to operation. The ability to segregate detainees may be limited by the availability of manpower and resources. MI personnel and military police can provide additional guidance and support in determining appropriate segregation criteria. Establish and maintain segregation based on mission variables. Within the DCP, detainees are further segregated into the following categories.
·       Leaders (perceived status and positions of authority).     
·       Hostile elements (hostile religious, political, ethnic groups).     
·       Security risks (agitators, radicals, uncooperative detainees).  
·       Civilian.  
·       Military by grade (officers, NCOs, enlisted).      
·       Deserters.
·       Those who surrendered from those who resisted capture.  
·       Minors.      
·       Females (if possible, keep small children with their mothers).  
·       Males.      
·       Groups of CIs (Civilian Internees)
·       RP, (Retained Personnel) and enemy combatants if known.  
·       Nationality.      
·       Suspected criminals.      
·       Other persons (those not in one of the above categories).  Note again families are split up and children are taken away from parents except small children stay with mothers.  It is not clear if families are reunited at some later point while in internment camps.

6-16. Military police must not speak to detainees except to give orders or directions. Do not let detainees talk to or signal each other during the processing phase at any echelon. This prevents them from plotting ways to counter security, planning escapes, or orchestrating other undesirable activities. Detainees who refuse to be silent may require a muffle (an item used to prevent speech or outcry without causing injury to the detainee, such as cloth) in certain tactical situations.

INTERNMENT SERIAL NUMBERS
6-52. The ISN is the DOD-mandated identification number used to account for and/or track detainees. (See figure 6-6, page 6-16.) Once an ISN is assigned, it is used on all documentation, including medical records. The ISN is generated by the Detainee Reporting System. The Detainee Reporting System is the only approved system for maintaining detainee accountability. It is the central data point system used for reporting to the national level and sharing detainee information with other authorized agencies. ISNs are normally issued within 14 days of capture, regardless of where detainees are held, or according to applicable policy. The ISN is comprised of the—
·       Capturing power (a two-digit alpha character code representing the capturing power). Only country codes found in the Defense Intelligence Agency manual (DIAM) 58-12 are used.
·       Theater code (a one-digit number representing the command/theater under which the detainee came into U.S. custody).
·        Power served (a two-digit alpha character code representing the detainee’s power served [the country the detainee is fighting for]). Only country codes found DIAM 58-12 are used.
·       Sequence number (a unique six-digit number assigned exclusively to an individual detainee). The Detainee Reporting System assigns these numbers sequentially. If a detainee dies, is released, is repatriated, is transferred, or escapes, the detainee’s number is not reissued during the same conflict.
·       Detainee classification (a two- or three-digit alpha character code representing the detainee’s classification). Current classifications are CI, RP, and enemy combatants. Enemy combatants are further divided into EPWs and members of armed groups.

Page26
·     US9AF-000234RP  An Example of a ISN Code.  Every detainee has one!
·         Every detainee will have a 13 character identification consisting of numbers and letters.  From the above bullets and the state of our technology it seems like a highly effective way to keep track of detainees!
6-57. The detainee identification band permits the rapid and reliable identification of each detainee. Identification bands enhance facility administration and operation. The Detainee Reporting System can create identification bands that show the ISN number, name, and photo of the detainee. If the Detainee Reporting System is not available, record the detainee’s ISN and last name on the identification band and secure it to the detainee’s left wrist. If appropriate bands are not available, use a medical wristband or something similar.  These are nicer than the number tattoos the Nazis gave in their camps!

THEATER INTERNMENT FACILITY
6-59. The TIF is a permanent or semi-permanent facility (normally located at the theater level) that is capable of holding detainees for extended periods of time. A TIF is a long-term internment facility that is operated according to all applicable laws and policies…
6-60. The TIF is the first location where detainees may be held for extended periods of time…
6-64. Choosing locations for TIFs is critical during the planning phase. The location of each facility will affect its ability to receive supplies.  Another reason permanent camps were built long ago.
6-65. Planning for operations at the TIF is a much greater challenge than at lower echelons. Planning the amount of support, ranging from medical to engineer, is time-consuming and critical to ensuring successful detainee operations. Proper planning before operations commence is vital. The planning should focus
across the DOTMLPF domain to ensure that all requirements are met. Synchronization with adjacent staff elements and commands is another important element.

Escape Prevention and Early Detection at Prison Camps
6-116. Detainee escapes can be kept to a minimum through proper security precautions. These precautions include—
·       Conducting periodic, unannounced, and systematic searches of internment facility areas to detect evidence of tunneling and to discover caches of food, clothing, weapons, maps, money, or other valuables.
·       Maintaining strict accountability for tools and equipment used by or accessible to detainees.
·       Inspecting perimeter fencing daily to detect cut wire evidence or other weaknesses in the fence.
·       Assessing lighting systems during hours of darkness to detect poorly lit areas along the perimeter. Immediately replace any burned out or broken light bulbs.
·       Conducting training, to include refresher training, to ensure that guard and security personnel are thoroughly familiar with security precautions, techniques, and procedures.
·        Searching vehicles and containers taken into or out of the internment facility.
·       Closely supervising the disposition of unconsumed rations in the internment facility and on work details to prevent the caching of food supplies.
6-117. Conduct ISN counts and head counts on a regular and an unannounced basis Conduct roll calls at least twice daily, preferably early in the morning and again before “lights out. Conduct other head counts independent of roll calls.  Appropriate times for additional detainee head counts might be immediately following a mass disturbance, the discovery of an open tunnel, or the detection of a hole or break in the fence.
The following measures will assist in the early detection of escape attempts:
Conduct head counts at frequent intervals while on work details and en route to another internment facility.

STRATEGIC INTERNMENT FACILITY
6-131.            A SIF is a facility, designated by the Secretary of Defense or a designee, with the capability to further detain and/or exploit detainees who hold strategic intelligence or who pose a continuing threat to the U.S. or U.S. interests. Detainees are normally noncompliant and may pose a high security risk to the United States.  A SIF will usually resemble a TIF with respect to the operating procedures implemented and stated in the section above, but it is task-organized for  specific detainees.  This type of facility holds the most dangerous detainees that challenge the power structure.

Page 27
Chapter 7 Confinement of U.S. Military Prisoners
Aside from the normal and continuing mission for confinement of U.S. military prisoners at Fort Leavenworth and other permanent locations, there is a requirement to be prepared for confinement outside established facilities. In a mature theater, military police may be required to operate a field detention facility (FDF) and/or a field confinement facility (FCF) to hold or confine U.S. military prisoners for short terms. This short term may be as part of pretrial or post trial confinement. Post trial confinement may include temporary custody until the prisoner is evacuated from the theater to a permanent confinement facility or short-term sentences as determined by the combatant commander.  This is the beginning over the opening paragraph of chapter 7.  For over 200 years we have confined military prisoners at permanent facilities.  All of a sudden we need to build more facilities to confine more military prisoners?  Anybody else smell a dead rat here?

MEALS
7-21. Prisoners are provided with wholesome and sufficient food prepared from the Army Master Menu. They are normally supplied with the full complement of eating utensils. (The FCF commander must approve the nonissue of eating utensils for security or other reasons. Prisoners in close confinement and those with loss of privileges associated who have approved disciplinary action may be denied supplemental rations described on the Army Master Menu.) Alternate meal control procedures may be authorized by the FCF ( Field Confinement Facility) commander or a designated representative as a means to prevent staff and prisoner injury when a prisoner may have tampered with food. These procedures require documentation on DA Form 3997 and the concurrence of a medical officer. Meal control procedures will not exceed 7 days.

ESCAPE
7-54. Each guard is provided with a whistle or another suitable means of audible alarm. Using firearms to prevent an escape is justified only when there is no other reasonable means to prevent escape. (See AR 190-14.)  (Does this apply to all prisoners, even ones that are not dangerous such as displaced civilians?  In the event that a prisoner attempts to escape from the confines of the FCF, the guard takes action according to the following priorities:
·       Alerts other guard personnel of the attempted escape by blowing three short blasts on a whistle or by sounding another suitable alarm signal.
·       Orders the prisoner to halt three times in a loud voice.  
·       Fires only when the prisoner has passed all barriers of the FCF (Field confinement facility) and is continuing the attempt to escape.  Does this apply to all prisoners or just the dangerous ones?
7-55. The location of barriers is determined by the physical arrangement of the FCF. Normally, barriers include fences or walls enclosing athletic, drill, recreational, and prisoner housing areas and administrative buildings.
7-56. A guard does not fire on an escapee if the action of firing will endanger the lives of other persons. When firing is necessary, the guard directs shots at the prisoner with the intent to disable rather than to kill. Guidelines for the use of firearms by guards escorting prisoners outside the FCF are generally the same as those for the use of firearms at the FCF. (See AR 190-47.)
7-57. The FCF commander ensures that guards are trained to use the weapons with which they are armed. All personnel are thoroughly trained on policies regarding the use of force and the provisions of AR 190- 14. Only 12-gauge shotguns with cylinder (unchoked) barrels are issued for use by FCF guards, and barrels will not exceed 20 inches in length. Authorized ammunition for armed guards (perimeter and escort guards) is Number 9 shot in trap loads of 23⁄4 drams equivalent of power and 11⁄8 ounces of shot. Tower guards may use 00 buckshot ammunition.
7-58. Tower guards and escort guards are instructed that the shotgun will not be fired at a range of less than 20 meters to prevent prisoner escapes. Such instructions will appear in prisoner guard training programs and in special instructions prepared for guard personnel.

Page 28
7-59. The M9 pistol and M16 and/or M4 rifles are used when prisoners are under escort. Machine guns and submachine guns are not to guard U.S. military prisoners. Weapons are not taken inside controlled areas of the FCF, except at the expressed direction of the FCF commander.

Chapter 8 Rehabilitation of U.S. Military Prisoners and Detainees
The rehabilitation of U.S. military prisoners has long been practiced, but it has only recently become a focus for detainees. Lessons learned have highlighted this critical requirement, and military police have been actively involved in a complete reengineering of apprehension, detention, and release procedures for detainees as a result. These new detention procedures are based on rehabilitation and reeducation programs for Islamic extremists developed in Singapore and Saudi Arabia and incorporate lessons learned from Abu Ghraib and other recent and historical U.S. involvement with detainee operations. The rehabilitation procedures also draw from established policies and procedures for rehabilitation that are already effectively employed for U.S. military prisoners. The rehabilitation of detainees plays a critical role in counterinsurgency operations and benefits the overall counterinsurgency strategy.  This is the opening paragraph of chapter 8.  The military has been working very hard to win the hearts and minds of the people that oppose them.  They have been involved in counterinsurgency operations in Vietnam, Iraq and Afghanistan.  They have learned a great deal and some day they maybe forced to apply this knowledge against people at home who may wish to reestablish the former Constitutional Republic.

8-1 Issues of apprehension, incarceration, recidivism, and programs to curb violent behavior in released persons is a long-studied subject by generations of scholars. Entire organizations are built around these issues and take years of in-depth analysis to reach conclusions for policy application. This is further complicated by the conditions in a combat zone.

8-3 Detention or imprisonment can be a period of transitory idleness where the U.S. military prisoner or detainee simply endures the period of his internment and contemplates the humiliation or perceived injustice of his condition. Conversely, it can be one of the most productive and auspicious rehabilitative measures that society can provide the individual and his respective society…  Perhaps with the above in mind prisoners have been kept busy in many ways.  One is through employment.  Also classes along with counseling and mental health programs are offered.

8-15. Another element of the correctional program involves employing U.S. military prisoners. (See AR 190-47 for more information on U.S. military prisoner employment.) Several considerations involved with employment include—
 Nature of work. Prisoners are employed in maintenance and support activities that provide work of a useful, constructive nature that is consistent with their custody grade, physical and
mental condition, behavior, confining offense, sentence status, previous training, individual correctional requirements, and installation or facility needs. In general, prisoners are employed through a standard 40-hour workweek… 

8-22. The complexity of TIF operations associated with long-term rehabilitation begins with the identification and assessment of who is being detained within the fixed I/R (Internment/Resettlement) facilities. This assessment starts at the POC by conventional and special operations forces and continues throughout the internment of those detained, up to and through the reconciliation process. The former doctrinal segregation of officers, enlisted, civilians, and females now extends to ethnic groups, tribes, behaviors, religious sects, juveniles, and other categories. An inaccurate assessment can have immediate and significant effects that could result in injury or death to detainees, contribute to insurgency ideals, and cause major custody and control problems within the fixed I/R facilities

8-24. Throughout the custody process, the methods used to identify and segregate insurgents and those susceptible to their recruiting efforts are important. Interrogators and investigators should realize the operational advantages that can be gained through reengaging detainees and continuously assessing the information available within the fixed I/R facility. The development of enduring processes that exploit information gleaned from the population inside the facility 

Page 29
is critical to the safety and security of the facility cadre and detainees, and can provide information actionable intelligence to support ongoing operations outside the facility. This source of intelligence can be especially relevant in support of a counterinsurgency effort.
8-25. U.S. forces conducting detention operations must balance several requirements for fair and humane treatment with security and protection efforts within the facility. Cultural considerations may further complicate the conduct of operations and how personnel interact with detainees. The following factors are considered when implementing detention policy: …
8-27. Detention facility commanders and detention cadre should ensure that detainee schedules are rigid, predictable, and filled with educational, life skills, and vocational instruction. Account for time for􏰁
instruction on a broad range of subjects, with a curriculum coordinated with the HN (Host Nation). Beyond basic education for the younger or poorly educated detainees, the curriculum may also include HN politics, HN constitution, and the structure of the HN government. Other worthwhile periods of instruction may include money management, job applications, basic computer skills, basic communication skills, hygiene, first aid, reporting crimes and suspicious activity reporting, and community familiarization and awareness.
I am in the process of highlighting both interesting details and the totalitarian aspects of this document.  If you read the document in its entirety you will see that the military bends over backward to provide rules and procedures to safe guard fair and humane treatment of prisoners and detainees.  Unfortunately once a country becomes an empire and engages in constant war to protect its possessions, it creates the conditions where liberty dies and totalitarianism flourishes.  After reading the above four sections even the most enlightened liberty loving staff cannot avoid creating monstrous totalitarian internment/resettlement camps.  Note in the last section 8-27 every aspect of the prisoners and detainee’s lives are controlled.  The staff structures the environment in this way for its own and the prisoner’s protection.  However, the characteristic that elevates totalitarianism from all other forms of tyranny is that all aspects of the citizen’s lives are controlled.

8-51. All detainees will receive a behavioral health screen when in-processing and before distribution into the general population. A translator will be used to translate between the screener and the detainee. The behavioral health screen will be conducted by a behavioral health team member. Each detainee will be screened individually to maximize privacy. The behavioral health screen will include whether the detainee has a present suicide ideation, the history of suicidal behavior, the history of (or current) psychotropic medication use, current behavioral health complaints, the history of behavioral health treatment, and/or the history of treatment for substance abuse. During the behavioral health screen, each detainee will be observed for general appearance and behavior; evidence of abuse and/or trauma; and current symptoms of
psychosis, depression, anxiety, and/or aggression. After screening, each detainee will be recommended for placement into the general population, placement into the general population with appropriate referral to behavioral health, or referral to behavioral health for an emergency assessment prior to placement into the general population. The screening will begin with an introduction and explanation of the nature and purpose of the screen. Each question will be asked by the screener and translated by the translator. Under no circumstance will a translator conduct the screen. Behavioral health screening forms will not be presigned, and detainees will not be screened in groups. The original completed screen will be placed in the detainee’s individual medical record.  I included this because on paper and if implemented correctly, it would be helpful to all!  However this process can be easily abused and such abuse was raised to an art form in the former Soviet Socialist Republics and other communist nations where political dissidents were routinely diagnosed as being mentally ill and incarcerated indefinitely in mental hospitals.  To examine this barbaric practice in greater detail see the writings of the dissident Alexander Solzhenitsyn.  Also according to the following report from Seton Hall University School of Law, Policy Center, dangerous drugs already have been given to detainees at Guantanamo. http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1846784   Can also google Drug Abuse: An Exploration of the government’s use of mefloquine at Guantanamo if the link becomes unusable.


Chapter 9 Transitioning Detainees Into their Societies.
The following section caught my eye, because it shows that various Federal and international groups involved in building, running and dismantling the internment/resettlement camps.
9-49. The key objectives of the transition of detainee operations are numerous and complex. Key players within this transition plan include—
·        Department of the State officials, to include public diplomacy personnel. 􏰀
·        Department of Justice. 􏰀

Page 30
·        DOD. (Department of Defense) 􏰀
·       U.S. Agency for International Development.
·        Foreign governments. 􏰀
·        NGOs and international organizations. 􏰀
·        Private contractors. 􏰀
·       Ministry of interior and local justice and police personnel.

Chapter 10 Resettlement Operations
Although security restrictions are less once prisoners and civilians are resettled there are still many aspects reflecting a police like state.  Here is the introductory paragraph to chapter 10.  Even after inmates are resettled there are many totalitarian aspects to this process.  I underlined them below.
Resettlement operations occur across the spectrum of military operations. Such operations include civil support operations and foreign humanitarian assistance operations. Events under the category of resettlement operations include relief, CBRNE, (Chemical, biological, radiological, nuclear and high yield explosive) civil laws, and community assistance operations. Military police provide support to resettlement operations, which include establishing and operating facilities and supporting CA (civil affairs) efforts to ensure that supply routes remain open (mainly linked to the maneuver and mobility support function) and clear to the maneuver commander. Additional tasks that support resettlement operations (conducted within the law and order function) include curfew enforcement, movement restrictions, the use of travel permits and registration cards, proper checkpoint operations, amnesty programs, and inspections. The level of control is typically drastically different from that of most interned persons during detainee operations. During detainee operations, the level of control and supervision is high, based on the significant and evident security risks. During resettlement operations, DCs are allowed freedom of movement as long as such movement does not impede operations. Security risks will always be present, but they should be reduced in most resettlement operations. Counterinsurgency operations may affect, or be affected by, resettlement operations; and ongoing insurgency operations will tend to blur the lines between internment operations and resettlement operations.
Note*  I found the acronym for the events detainees face, chemical, biological, radiological, nuclear and high yield explosive as telling.  It is public knowledge although not well known that depleted uranium weapons causing low level radiation are employed in our present conflicts.  Even the proponents of such weapons admit we don’t know the longterm impact of the weapons on the soldiers or the locals.  This link has more research in depleted uranium weapons. http://unclesamenterstheendgamepart3.blogspot.com/  Go to the article U.S. Military Openly Utilizes Low Grade Nuclear Weapons (Depleted Uranium) That May Kill For Billions of Years In Afghanistan, Balkans and Iraq!  These Weapons Over Time May Also Kill the Soldiers Exposed to Them pages 42-55.

10-2. Often, the primary objective of resettlement operations is to minimize civilian interference with military operations, and this is typically linked to the maneuver and mobility support function. However, the primary or supporting objectives of resettlement operations may also be to—
·       Protect DCs from combat operations.  
·       Prevent and control the outbreak of disease.  
·       Relieve human suffering.  
·       Centralize masses of DCs.
·       It is now public knowledge that scientists only need to manipulate a few genes in the bird flu virus to create a virus that could kill up to 90% of the people exposed to it.  One of the fears of the alternative media is that such a virus will be released in various places.  Governments throughout the world could then placed the people in these camps and severely restrict their movements in order to protect them from exposure to it.  We would never know if such a thing happened if it was performed by terrorist or whether governments facilitated it to gain more power at our expense

Page 31
10-3. The specific planning focus of resettlement operations may differ at each level of command and will vary depending on the type and nature of detainee operation being performed and other relevant aspects of
the OE (operational environment). All commands and national and international agencies involved must have clearly defined responsibilities. When planning and executing resettlement operations, consider the following actions:
Coordinate with the Department of State, the UN Office for the Coordination of Humanitarian Affairs, and HN civil and military authorities to determine the appropriate levels and types of aid required and available.
·       Minimize outside contributions (issue basic needs items only) until DCs become self-sufficient, and encourage DCs to become as independent as possible.
·       Review the effectiveness of humanitarian responses, and adjust relief activities as necessary.
·        Coordinate with CA units to ensure the use of U.S., HN, international, and other organizations (UN Children’s Fund, Cooperative for Assistance and Relief Everywhere). Receiving assistance from these organizations capitalizes on their experience and reduces the requirements placed onU.S. armed forces. 􏰀
·       Apply security restrictions, as required, for DCs.  Under international laws, DCs  have the right to freedom of movement; but in the event of a mass influx of DCs, security considerations may require restrictions.  I include this section to emphasize the international nature of these processes.

10-33.            Military police will typically be required to account for DCs and report to higher headquarters. This may require the issuance of ISNs or control numbers that are specific to DCs.  See section 6-52 to find out more about the internment serial number given to every detainee!  Commanders conducting resettlement operations ensure a proper understanding of the ISN issuance policy before assigning an ISN to a DC. Even in civil support operations where social security numbers may be used, a supporting system will be required for those without social security numbers.

10-40. Resettlement operations typically include controlling civilian movement and providing relief to human suffering. These operations may be performed as domestic civil support operations (due to natural or man-made disasters), stability operations (due to noncombatant evacuation operations, humanitarian- assistance operations), or DC operations (due to combat operations). The authority to approve resettlement such operations within U.S. territories is at the Secretary of Defense level and may require a special exception to Title 18, USC (Posse Comitatus Act). The Posse Comitatus Act prohibits the U.S. military from enforcing civilian laws within the United States or its territories without specific authorization. The U.S. Constitution and other federal, state, and local laws may directly and significantly affect operations in the U.S. and its territories if the enforcement of civilian laws are required according to Title 10, USC. U.S. military forces conducting law enforcement functions in such cases require an authorization through a congressional act (for example, Title 10 USC, Sections 331 through 334 [Insurrection Statues]) or a constitutional authorization (for example the President invoking his executive authority under Article 2 of the Constitution). U.S. Army National Guard Soldiers operating in a nonfederal status are not restricted by the Posse Comitatus Act. (See Title 32, USC, and JP 3-28.)  Interesting parts underlined.

This section seems to imply that camps can be set up on u.S territories!  Of course this was written before the passage of the National Defense Authorization Act of 2012.  In this act in sections  10-21. 10-22 and 10-31 and 10-32 give the military permission to detain Americans without trial.  If that is so, then camps need to be available to detain them!

If you google  The National Detainee Reporting Center or go to the following website http://www.bethesda-afcea.org/Events/LEIT_2009/Presentations/MSG_Bragg.pdf  you are given a simple powerful presentation of how detainees are labeled in the camps where our Anglo-American Corporate Empire is engaged in various wars.

10-55. Active police intelligence operations conducted within and around the resettlement facility are critical to maintaining order and security. Through active and passive collection activities, criminals, agitators, enemy plants, and other disruptive elements can be identified early and measures taken to mitigate (or remove) these elements and their activities prior to significant negative impacts on the facility and the personnel living and operating within the facility.  Might be proper and necessary to protect troops in foreign nations but could be used against us in united States for those attempting to restore a Constitutional Republic?

Page 32

10-57.            The NDRC (National Detainee Reporter Center) has the ability to assist commanders in establishing an automated Detainee Reporting System to process DCs. (See chapter 1. and chapter 6)  See also the website above.  This portable Detainee Reporting System (jump kits) will assist in processing identification cards, ISNs, and demographic information. An identification card is used to facilitate the identification of a DC. It contains the DC’s name, photograph, and control number. The control number may be an ISN or a sequenced control number specific to the DC. Identification cards or bands permit identification by categories. (See chapter 1. and chapter 6) An identification band permits rapid, reliable identification of an individual and may also be used in resettlement operations. While DCs cannot be prevented from removing or destroying identification bands, most will accept their use for identification purposes. When identification bands or cards deteriorate, replace them immediately.  The American military to control hostile populations in conjunction with other international forces such as NATO has plenty of experience in Bosnia, Iraq and Afghanistan utilizing these identification strategies to control hostile populations.  Legislation passed through Congress allows camps to be set up on U.S. soil if authorities deem they are necessary during times in civil strife that may occur if our economy collapses.  The question is will the American military follow rules in violation of our Constitution?

10-67. The resettlement facility commander publishes, enforces, and updates the rules of conduct as necessary. The commander serves as the single point of contact, coordinating all matters within the
resettlement facility and with outside organizations or agencies. Facility rules are brief, but clear, and kept to a minimum. The rules in figure 10-1 are similar to those used in support of Operation New Arrivals in August 1975 at Indiantown Gap, Pennsylvania. They also parallel the rules posted in support of Panama’s Operations Just Cause and Promote Liberty and Hurricane Katrina relief operations in New Orleans.





Figure 10-1. Sample facility rules (Resettlement Facilities)
1.        Do not move from assigned barracks without permission.
Note. Military police in an I/R facility assign individuals to designated barracks. Only the administrative staff can change barracks assignments. Occupants desiring to change barracks must request permission from the area office.
2.                  Maintain the sanitary and physical condition of the barracks. Note. Barracks chiefs organize occupants to perform these tasks.
3.                  Empty and wash trash cans daily, and put the trash into the trash dumpsters in the barracks area.
4.                  Do not bring food or cooking utensils into the barracks. Do not take food from the dining area (other than baby food and fruit).
5.                  Do not have weapons of any kind in the barracks and in the surrounding facility.
6.                  Do not have pets in the barracks. Pets are contained in the animal compound.
7.                  Observe the barracks lights-out time of 2300. Barracks indoor lights are turned out at 2300 each night. Do not play radios or compact disc players after 2300.
8.                  Do not allow children to play on the fire escape because it is very dangerous.
9.                  Watch children carefully, and do not allow them to wander out of the residence areas.
10.                  Do not throw diapers or sanitary napkins in toilets. Place these items in trash cans.
11.                  Do not allow children to chase or play with wild animals. These animals may bite and carry diseases.
12.                  Obtain necessary barracks supplies from the barracks chief.
13.                  Do not smoke, use electrical appliances for heating or cooking, or have open fires in the barracks. Military police should designate a location for cooking and/or heating food.

10-69.            The resettlement facility commander takes positive action to establish daily or periodic routines and responses that are conducive to good discipline and control. Resettlement facility personnel—
·        Enforce policies and procedures that provide the control of facility residents.
·        Give reasonable, decisive orders to DCs in a language they understand.  

Page 33
·       Post facility rules, regulations, instructions, notices, orders, and announcements that facility residents are expected to obey in an easily accessible area. This information is printed in a language understood by the DCs.
·       Those individuals who do not have access to the posted copies will be given a copy.
·       Ensure that DCs obey orders, rules, and directives. 
·        Report DCs who refuse or fail to obey an order or regulation.
·        Not fraternize with DCs.  
·        Not donate gifts or receive gifts from or engage in any commercial activity with DCs.
. 􏰀


I included sections 10-67 and 10-69 to illustrate that re-settlement camps although more free than the internment camps still because of their nature will control large parts of the civilians lives and maintain many elements of a police state.  Even though the document calls for detainees to play an ever increasing role in governing themselves, I do not believe they can escape the tyrannical stains. 

In the document they also talk about temporary less than 6 months to semi-permanent and permanent facilities that can last many years.  Although staff may have the best intentions of returning detained persons back to their homelands, factors beyond their control may make such a dream impossible.  In the Israeli war for independence in 1948 thousands of Palestinians were displaced from their homes and many entered refugee camps where they still reside 64 years later.  According to a 1993 study, at that time 43 million were refugees from war throughout the world. http://www.ncbi.nlm.nih.gov/pubmed/8331759   Some never return home while others are displaced in refugee camps for years!  Thus the idea of contemplating internment camps within the U.S. or anywhere is abhorrent.

This ends the chapters.  The rest of the paper contains the various appendixes describing various items in greater detail. 
Appendix D
Application of the Geneva Conventions to Internment and Resettlement Operations
In Appendix D more fully describing treatment of detainees according to The Geneva Convention and other international agreement.  The first section that is applied to U.S. soldiers says volumes!
D-1.            DOD (Department of Defense) policy is to apply the Geneva Conventions in all military operations unless directed otherwise by competent authority, usually at the theater level or above (the same level of authority that designates hostile forces).

Appendix E
Agencies Concerned With Internment and Resettlement Operations
In Appendix E you can see both the Federal government and International organizations involved with this process.  I have no way of knowing how involved they were or if they had similar views to what is expressed in the leaked Army document.

Appendix H
Use of Force and Riot Control Measures
H-2.            Planning and preparing for the use of force is a necessary element in maintaining order. Commanders ensure that detainee facility security personnel are prepared for the effective use of force when necessary to protect themselves, other members of the force, or detainees. Commanders also ensure that the RUF (rules for use of force) continuum is applied when force is required to control detainees. Personnel assigned the mission of controlling detainees and providing security of the detention facility are issued and trained on the RUF specific to that mission. Theater ROE (rules of engagement) remain in effect for defending the detention facility from external threat. The RUF continuum is used in determining the appropriate amount of force needed to compel compliance. (See figure H-1, page H-2.) The use of deadly force against detainees is always considered a measure of last resort. Its use is authorized when no other means of suppressing the dangerous activity (attack, escape) is feasible. Furthermore, the use of deadly force is preceded by warnings appropriate to the circumstances. The continuum recognizes five basic categories:

Page 34
·       Lethal.Attempts to kill or inflict serious injury (using knives, clubs, objects, firearms).
·        Assaultive. Attempts to attack or inflict injury (striking with hands or feet, biting).  
·       Actively resistant.Does not follow orders and offers physical resistance, but does not attempt to inflict  harm (bracing or pulling away, attempting to flee).  
·       Passivelyresistant.Does not follow orders,but offers no physical resistance toattempts to gain control (going limp).  
·       Compliant. Offers no resistance to instruction and complies with directions.
H-3. The continuum also incorporates five levels of force. (See figure H-1) Ideally, the service member starts at Level 1 and progressively moves up the continuum until the detainee complies. However, the use of force is dictated by the actions of the subject during the encounter. Subject actions may escalate or deescalate rapidly, possibly skipping one or more levels. There is no requirement for the following levels of force to be applied in order:
·       Level 1: Cooperative controls. Used to direct a compliant person (verbal direction, hand gestures).
·       Level 2: Soft controls. Used when cooperative control fails and the level of force required escalates. They are designed with a low probability of causing injury (compliant or noncompliant escort positions, use of hand and/or leg restraints).
·       Level 3: Hard controls. Used when escort positions fail and the level of force required escalates. They have a slightly greater possibility of causing injury (pressure points, joint locks, oleoresin capsicum spray [such as pepper spray], electronic stun devices).
·       Level 4: Defensive techniques. Used when hard controls fail and the level of force required escalates. They also have a higher probability of causing injuries. (empty-hand strikes and blocks, baton strikes and blocks, NLWs, (nonlethal weapons) and MWDs) (military working dogs).
·       Level 5: Deadly force. Used as a last resort when all lesser means have failed or would be impractical. Used to prevent death or serious injury to self or others; to prevent the theft, damage or destruction of resources vital to national security or dangerous to others; or to terminate an active escape attempt (firearms and strikes with nonlethal weapons should be directed at vital points of the body).  Quite a bit of time is used to describe non lethal weapons NLW to control populations while reducing the chance of permanently injuring or killing detainees.

Riot Control
H-40... Plans must contain information on how the riot control agents are employed to cover the target area with a cloud of sufficient strength to produce decisive results. Once the proper concentration is reached, the control force must maintain that concentration until the rioters are channeled into the predetermined area. When dispersers are used, the dispersal team maintains the concentration by moving the disperser along the release line at an even rate. They maintain the concentration by repeating the application as necessary.

H-43. During a nonlethal engagement, the use of designated marksmen provides confidence and safety to those facing a riot. If a lethal threat is presented, the designated marksmen in over watch positions (armed with appropriate sniper weapons mounted with high-powered scopes) can scan a crowd and identify agitators and riot leaders for apprehension and fire lethal rounds if warranted.

H-45. Simply being part of a crowd affects a person… People look to others for cues and disregard their own background and training. Only well-disciplined persons or persons with strong convictions can resist conforming to a crowd’s behavior...

H-49. Control force members are also susceptible to crowd behavior. They may become emotionally stimulated during a tense confrontation, and facility commanders must counteract this… Rigorous training, firm and effective leadership, and complete awareness and understanding of the RUF and ROI (rules of interaction) are necessary to offset the effect of crowd contagion upon the control force.

Page 35
Appendix J
Facility Designs and Sustainment Considerations

This section has detailed drawings (architectural blueprints) of the various buildings in the facilities as well as distances between inner and outer fences.  A lot of thought went into securing detainees and minimizing the possibility of unwanted individuals getting out or into the camps.
J-4.            Lessons learned have resulted in design modifications to the internment facility. (See figure J-1, page J-2.) The facility is designed to be expandable in 1,000-person increments. The initial facility is constructed with the administrative area and one 1,000-person enclosure and then expanded by adding (a maximum of 3) additional 1,000-person enclosures. Each 1,000-person enclosure must be self-contained, with electric and water capabilities, and available for occupation immediately upon completion.

J-5. Figure J-1 shows a TIF comprised of four 1,000-person enclosures, each with two 500-person compounds. Each 500-person compound is further divided into four 125-person compounds. This configuration allows each compound to be isolated and approached from all sides. Compounds are
separated by an appropriate distance to provide an avenue of approach to each, while providing a safe standoff distance from other compounds. The distance allows enough space for security to patrol between compounds and for reaction forces to employ riot control formations and NLWs in response to disturbances.

CLEAR ZONE
J-22. The 12-foot clear zone must be free of vegetation and shrubbery. The clear zone is constructed around the circumference of the facility, between the inside and outside perimeter fences. A minimum 20-foot clear zone will be maintained on the exterior of the outermost perimeter fence. The use of concertina or razor wire as additional barrier protection at the top and bottom of perimeter fencing is authorized.

FENCING
J-23. Double exterior fencing will be installed around facility recreation, exercise, and work yard areas. Fencing will be constructed of a type indicated in FM 5-34. It will be at least 12 feet tall with an 18- to 24- inch top guard (preferably spring-type) constructed on all vertical perimeter fences and on interior fences when added security is desirable. Based on local determination, some fencing may require the installation of a double overhang (overhang fencing outward and inward). Razor or concertina wire may be substituted for overhangs when determined appropriate by the facility commander.




GUARD TOWERS
J-26. Guard towers must be located on the perimeter of each facility and compound (optional for DC facilities). Guard towers must be—
Built so that they are portable and require minimal effort to move.  Built with a roof.
Built high enough (20 feet from the ground to the floor of the tower) from the ground to permit an unobstructed view of the compound, but low enough to permit an adequate field of fire. Placed immediately outside the wall or, in case of double fencing, placed in such a manner as to permit an unobstructed view of the distance between the fences.
Spaced to allow for overlapping observation and fields of fire. During adverse weather, it may be necessary to augment security by placing fixed guard posts between towers on the outside of the fence. Equipped with platforms sufficiently wide enough to mount crew-served weapons. Equipped with retractable ladders.
Spaced so that guards have an uninterrupted view of 200 yards in any direction along the perimeter fence. Located so that the entire perimeter and all parts of the billeting and recreation areas can be observed.

PATROL ROADS
J-28. Construct patrol roads for vehicle or foot patrols adjacent to the outside perimeter fence or walls. Security forces conduct patrols on patrol roads, while maintaining communications with the force at all times.

Page 36

J-39. When dining facilities are not available, feed detainees field rations (U.S. or captured). These rations (for example, meals, ready-to-eat) are easily stored and require no additional dietary supplements. However, when perishable food supplies (such as fresh vegetables or fruits) are available, they should be substituted for nonperishable items. This prevents the detainees from stockpiling rations for escapes.   Underlining is mine.  Understand these people are planning for almost every contingency.  If we allow them to commit false flag operations to set up such camps it will be very difficult to regain what liberties we still possess.  The I/R units that operate these facilities are designed to have detainees prepare their own meals under the supervision of U.S. armed forces. (See AR 190-8.) Sufficient drinking water (this means no less than what U.S. armed forces receive) and latrine facilities are provided for the detainees.

As part of J-51 a bullet describes Media coverage. Planners should develop a media plan and provide guidance on media operations to all personnel involved in detention operations. All media plans must be approved by the Office of the Secretary of Defense.  This is a form of censorship especially if camps set up in Continental united States.  The bullet is on page J-15

Appendix K
Psychological Operations Support to Internment and Resettlement Operations
I include this section because psychological techniques are very important in controlling populations but these processes are poorly understood so people can be easily manipulated.

K-2.            To effectively support I/R operations, tactical PSYOP units perform essential tasks that include— Developing a PSYOP program and conducting PSYOP to pacify, obtain cooperation from, and
condition the I/R facility population to accept U.S. authorityMedia perform that function for us now.  Assisting the guard force control of I/R populations during emergencies and inter compound
transfers. Collecting, analyzing, and reporting PSYOP-relevant intelligence. Examples of PSYOP-relevant intelligence includes, but are not limited to—       Identification of PSYOP vulnerabilities.  The Mafia, North Koreans, Chinese and Russians taught our intelligence agencies a lot about exploiting the weaknesses of others.  I believe these adversaries we will soon face will be very cunning and resourceful.
Indications of the effectiveness of themes, symbols, products, and current and previous PSYOP operations.  It is sort of what politicians, and marketers to gain advantage over opponents or make gains for their products.  It will be used against us to manipulate us in these camps.  It has been employed through the centuries to manipulate populations to war against others.
Verification of PSYOP targeting effectiveness (determine if PSYOP is reaching the intended target audience and if PSYOP operations are having collateral effects on intended or unintended target audiences).
Testing PSYOP products as directed by the PSYOP task force or PSYOP support element. Developing and providing PSYOP products in support of PSYOP task force operations, such as
recorded detainee surrender appeals. Collecting and confirming or denying demographic information about PSYOP target audiences. Ascertaining targets and objectives of propaganda  I believe our government acquired great knowledge observing Hitler’s and other communistic propaganda  campaigns and now have the most effective propaganda system in the world.  Determining the effectiveness of enemy internal propaganda, such as propaganda directed at
opposing forces. Planning and conducting PSYOP to achieve other multinational and/or joint PSYOP task force or PSYOP support element objectives, such as reorienting or reeducating the I/R facility
population or setting the stage for acceptance of future operations.Again our media and politicians are pretty good at preparing us to go to war.  Look what they did in Iraq and Iraq did not even attack us!  Assisting in improving relations with the local population (in the vicinity of the I/R facility) to
prevent or minimize interference with I/R facility operations. Conducting tactical PSYOP missionsas directed by the PSYOP task force or support element, or the supported commander.

K-9. The tactical PSYOP detachment conducts operations based on command information and PSYOP pacification 

Page 37
programs using a variety of media. Music and news (from approved sources), I/R facility rules, and in-processing instructions are broadcast using facility loudspeaker systems augmented by loudspeaker systems organic to the tactical PSYOP detachment. If available, supporting audiovisual teams produce and disseminate audio and/or video products. Printed products will be produced by attached print teams or contracted print support, or through reachback capabilities. Products not directly related to I/R facility command information are subject to the PSYOP task force established approval process.  Wow maybe the internment camps won’t be so bad in that the media is doing PSYOPs and propaganda to us right now.  The fact that we got the longest war ever going on no big deal.  The fact that the banks robbed an incredible amount of wealth and paid pennies on the dollar, no big deal.  See the article, The High Cost of Denial or Why the Banking Settlement Signed by 49 States is Such a Travesty on page 70 of http://unclesamenterstheendgamepart3.blogspot.com/2011/09/news-about-fed-banking-and-finance-part_25.html The fact that the debt dog and pony show by the democrats and republicans in Congress won’t even make a dent in the debt.  No big deal.  See the article Brainwashed and/or My Devilish Impulse.  What the Politicians and the Media are Not Telling Us About the Debt.  Go to page 28. http://unclesamenterstheendgamepart2.blogspot.com/2011/09/national-debt.html  The fact that our Constitution has been overturned and we are now under U.N. control.  So what?    See http://unclesamenterstheendgamepart3.blogspot.com/2011/09/constitution-and-tyranny.html  We have been well pacified.  It makes sense though because a few corporations own all the media outlets in the U.S. and it is in their interest to pacify us to their agenda.  No big deal.  Keep drinking and brushing with your fluoride because it will make you feel better and you won’t care!

INTERVIEW TEAM  Classic Police State
K-13. The interview team is comprised of tactical PSYOP detachment personnel who are trained to conduct interviews. If available, interview teams should be augmented with qualified MOS(military occupational specialty) 97E interrogators to increase team effectiveness. The interview team normally operates in the I/R facility processing area, screening all or a representative sample of incoming detainees and DCs. Although MI units will likely be present in the facility, it is important for the interview team to maintain a separate operation. Nevertheless, the team must coordinate closely with MI personnel and other assets to obtain any PSYOP-relevant information gathered in interrogations and must provide information of intelligence value gained from passive collection by PSYOP personnel.
K-14. The team uses interview notes and database software to collect information about each detainee and DC. The data is compiled and forwarded to the tactical PSYOP detachment or support element or directly to the PSYOP task force for TA analysis. Information gained in PSYOP product pretests may be reported directly to the CONUS-based product development company to accelerate the product development and approval process. Information collected in PSYOP interviews should include the following information about detainees and DCs:
·       Race or Ethnicity
·       Sex and Age
·       Political Religious and Geographical affiliation and/or origin
·       Education level
·       Length, depth, and type of involvement in the conflict
·       Previous or current occupation along with Standard of living and financial state
·       Previous military training along with Political and military indoctrination
·       PSYOP vulnerability and susceptibility

K-15. The initial interview, conducted on arrival at the I/R facility, should include a numerical score or code that indicates the desirability to conduct a follow-up interview as time and the situation permit. Detainees and DCs who are 

Page 38
cooperative or possess information, skills, or characteristics of interest to the tactical PSYOP detachment should be interviewed in depth. The interview team specifically looks for—
·       Malcontents, rabble-rousers, trained agitators, and political officers who may attempt to organize resistance or create disturbances within the I/R facility. Once these individuals are identified, guards will normally confine them in isolated enclosures to deny them access to the general population.
·       Detainees and DCs willing to cooperate in setting up informant networks. These detainees and DCs should be referred to MI counterintelligence personnel, since as it is their responsibility to run informant networks within the I/R facility. (Police State)
·       Detainees and DCs willing to assist with product development, such as taping audio surrender appeals.
·       Detainees and DCs willing to participate in PSYOP product testing.
K-16. Access to members and former members of the designated PSYOP target audiences allows the interview team to conduct product testing that provides accurate, meaningful feedback to the PSYOP task force and product development company. Data collected during the surveys is passed to the PSYOP task force through the tactical PSYOP detachment and the PSYOP support element. The interview team must maintain secure, reliable communications with higher headquarters and ensure the timely, secure transport of product prototypes and testing results.
K-17. The interview team, along with other facility personnel, must take precautions to safeguard the identities of cooperative detainees and DCs to protect them from reprisals. PSYOP personnel must always exercise discretion when dealing with cooperative detainees and DCs. Guards must be thoroughly briefed on proper handling procedures.

This section below displays the covert treachery of how the PSYOPS techniques can be employed against those attempting to restore a Constitutional Republic, if the emerging police state gains complete power.

ENCLOSURE TEAM  I underlined parts I felt most important.
K-19. The tactical PSYOP detachment assigned as an enclosure team conducts face-to-face PSYOP and collects vital information within the I/R facility. To perform its mission, members of the enclosure team must have unrestricted access to the I/R population. The enclosure team conducts close coordination with the guard force commander to ensure that its activities do not jeopardize the safe operation of the I/R facility and to ensure that they are safe.
K-20. The enclosure team builds a rapport with detainees and DCs by distributing recreational equipment, conducting morale support activities, and performing other actions designed to gain the trust of detainees or DCs. Although it is important for the enclosure team to maintain close communication with other PSYOP team elements, such communication should be discreet and conducted away from the view of the I/R population. The enclosure team will usually enjoy a greater rapport with the I/R population if it is not identified with the authoritarian elements of the facility administration.  It is beautiful.  The spies gain the confidence of the people and maybe help them a little bit to keep their trust but what a lovely covert way to keep control over the detainees.
K-21. The enclosure team capitalizes on its access to the I/R population to collect information about individuals and to watch for potential problems. The enclosure team should look for—
·       Formal and informal leaders
·       Individuals who are the center of attention in a group as well as loners.
·       Unusual groups
·       Items passed from one person to another.
·       Contrasting soil in the compound.  I don’t understand the need for this.
·       Lookouts and signal codes. 
·       Individuals who move from one group to another and whose presence forces the topic of conversation to change.
·       Individuals who speak for a group but maintain eye contact with another person in the group.
·       Individuals who immediately make friends with the military police guards.
·       Detainees and DC”s who express interest in I/R facility construction or materials and equipment  used in facility construction.
AUDIOVISUAL TEAM
K-24. The audiovisual team can support three or more tactical PSYOP detachments when supporting I/R operations. Theaudiovisual team uses organic equipment to produce and disseminate products to the I/R facility population. The team supports the facility PSYOP program by disseminating entertainment products, such as videos and music. This team gives the tactical PSYOP detachment the ability to influence detainee and DC behavior by providing or withholding something of value to the population. When directed, the team disseminates products that support other PSYOP task force programs (reeducation, reorientation, posthostility themes).
K-25. At a minimum, the audiovisual team should have the capability to edit audio and video products in digital 

Page 39
formats, provide edited audio products in compact disc and minidisc formats, disseminate video products in video home system and digital video disc formats, project video with sound to large audiences within the facility, record and edit digital still photographs, and print limited numbers of PSYOP products in various sizes for use within the internment facility.  Seems strikingly similar to our main stream corporate controlled media.

This discusses how a scientist using a computer program using voice recognition and facial recognition can create a video of that person saying what you want them to say.  Then it can be broadcast through the internet as if the person actually said what was on the video.  Because of the face and voice recognition program the computer can program what ever you want the person to say and the program will have the person give that speech.

Appendix M
Biometrics  The Study and Understanding of this field is essential for either setting up or resisting the Police State.
Biometrics are measurable physical and behavioral characteristics that enable the establishment and verification of an individual’s identity. The term biometrics includes, but is not limited to, finger, face, hand, eye, voice, and DNA characteristics. Biometrics are integrated to achieve the management, protection, and control of identity information for friendly, neutral or unknown, and adversary personnel. This appendix provides an overview for the employment of biometrics and highlights them as key enablers in support of I/R operations.
M-1.            A biometric is a measurable physical characteristic or personal behavioral trait used to recognize the identity or verify the claimed identity of an individual. Biometrics is the process of recognizing an individual based on measurable anatomical, physiological, and behavioral characteristics. (JP 2-0.)
M-3… This technology is also leveraged by HUMINT personnel within the MI community. There are two major types of biometric data that are especially useful to military police and HUMINT collectors. These are personal identification data (fingerprint, palm print) and other biological information (voiceprint, facial scan, retinal scan). This data is documented in databases that can be compared to identify the individual upon collection of biological data/evidence at a later date. Another type is biometric data that indicates source truthfulness (polygraph data). Polygraph evidence requires certified polygraph operators to administer and interpret the data.
M-4. Biometric-enabled intelligence operations integrate biometrics applications with operational and tactical missions to fulfill identified protection requirements. Several key activities are conducted when applying biometric technology. These activities are typically conducted independently of one another; however, they are all interconnected and interdependent. For example, an analyst at the strategic level may conduct analysis by querying databases and establishing linkages and patterns while at the tactical level, a
Soldier on a patrol may be collecting biometric data on individuals subsequent to a raid or criminal apprehension. All activities depend on each other for success. The activities include—
·        Collect. Capture biometric and related contextual data from an individual, with or without his or her knowledge.  Create and transmit a standardized, high-quality biometric file consisting of a biometric sample and contextual data, to a database for recording or matching.
·        Match. Accurately identify or verify the identity of an individual by comparing a standardized biometric file to an existing source of standardized biometrics data and scoring the level of confidence of the match.
·         Store. Enroll/input, update, and maintain biometric files to provide standardized, current biometric information of individuals when and where required. Biometrics files are enrolled or updated before they are stored.
·        Share. Exchange standardized biometric files and match results among DOD, interagency, and multinational partners according to applicable laws and policies.
·        Analyze. The analyze activity provides the answer to the “so what” question of all other activities. Link an individual’s biometric file with available associated information in an effort to identify patterns and linkages, clarify status, and better inform the decision making process.

Page 40
·        Reference. Access data bases of information on individuals for the purposes of analysis.  Decide/act. Decide/act is the response by the operations owner (automated or human-in-the- loop) to the results of the analysis of biometrics and referenced associated information described in the DOD biometric process. Personnel reaching a conclusion and take action based on the analysis results of biometric data, combined with corroborating analysis or non-biometric information on individuals
·           I think my underlined segment under collect is highly significant.  Data can be collected without our knowledge or consent.  This point is reemphasized in the first part of M-6 below
M-6. Collection begins with the user requirement to capture a biometric sample (finger, face, hand, eye, voice, or DNA prints) and related contextual data from an individual (with or without the individual’s knowledge) with a biometric collection system.  A biometric collection system may be a manual or automated tool for measuring and evaluating a biometric for the purpose of human recognition. Contextual data are elements of biographical and situational information (who, what, when, where, how, why) that are associated with a collection event and permanently recorded as an integral component of the biometric file. Collection can occur at the point of contact with a target individual or as the result of biometric partners sharing biometric samples. The individual data sets that result from a collection action (biometric sample and contextual data) are referred to as a biometric file and are structured according to appropriate standards. The objective is to collect standardized, high-quality biometric files.
M-7.            The execution of a collection action must be simple enough that any Service member, DOD civilian, or contractor can complete it with minimal training and equipment…  No need for search warrants anymore!
M-12. Referencing is integral to the successful analysis of biometrics data. It is the process of querying various databases of collected, associated information on individuals (intelligence, medical, human resources, financial, security, education, law enforcement) for the purpose of analysis. As described in paragraph L-5, associated information can, where applicable, be linked to a biometric file. This linkage can be placed within the biometric file in the form of a prompt and can occur outside of a collection event.  These data bases will include everything about a detainee as you can see from my underlined material.
M-13. Sharing is the exchange of biometric files (biometric samples, contextual data) or match results with other organizations. For the purpose of this manual, authorized sharing of biometric files among entities is applied as follows:
·       Among DOD approved sources to ensure consistency across the enterprise.
·       Among DOD interagency, multinational partners as appropriate  I included these 2 bullets so you can see the potential international nature of this process.

M-19. Detainees within a detention facility are a lucrative source of information. Detention facilities use the Biometrics Automated Toolset as the primary biometric collection and storage device. Biometrics data that is captured during collection can be rapidly searched and is continually accessible through an automated comparison process for new subject data files and access control. The recent employment of Biometrics Automated Toolset has generated a significant number of reports from information provided by the detainees within detention facilities, much of it corroborated by other intelligence reporting. This unprecedented body of information has expanded our understanding of terrorist organizations and continues to prove invaluable. It has provided insights into their leadership structures, recruiting practices, funding mechanisms, and relationships; and the cooperation between terrorist groups and training programs; and plans for attacking the U.S. and other countries. Military police forces must leverage existing biometrics technologies to support the overall mission through enhanced situational understanding and support to the commander’s decision cycle.  This nugget of information perhaps is the primary reason terrorists can’t launch large scale attacks in the u.S.  With slight modifications it can be employed to subvert and destroy those attempting to restore and protect our former Constitutional Republic.  Another question not addressed in this document is did any elements within our government fund terrorist activities?  Is it possible such funding occurred just so a police state could be gradually imposed on the unsuspecting civilians?

M-20. The in-processing into an internment facility is a two-part process. It involves enrollment into the Detainee Reporting System and Biometrics Automated Toolset Systems. Elements of detainee in-processing operations include the following—

Page 41
·       The process begins in a Secure Internet Protocol Router Biometrics Automated Toolset System to conduct an identity check. Based on the results of the identity check, a decision has to be made.
·       The detainee may have been enrolled at a lower echelon prior to being transported to the next level internment facility, or he or she may have been previously enrolled into the biometric database.
DETAINEE REPORTING SYSTEM
M-21. The first task is to enroll the detainee into the Detainee Reporting System. The Detainee Reporting System will create an ISN that needs to be exported to the unclassified Biometrics Automated Toolset System where it will be imported as a text file into the enrollment wizard. As detainees are collected and processed, international laws require that such information be forwarded to the appropriate authorities. The NDRC is the executive agent designated by the OPMG as the recipient and archive for all detainee information.  An ISN code is a series of numbers and letters that identifies each detainee.  See more info on ISN codes in chapter 6 in section 6-52, Chapter 10 in section 10-33 and in Appendix M starting in M-22 under the title Detainee Tracking
M-22.The NDRC’s principal responsibility is to the ensure collection, storage, and appropriate dissemination of detainee information as required by AR 190-8 and DODD 2310.10E. The NDRC provides detainee information to the ICRC to fulfill U.S. obligations under the Geneva Conventions of 1956. The NDRC directs the development of the Detainee Reporting System. It issues blocks of ISNs to the TDRC.
DETAINEE TRACKING
M-23. Detainee tracking is a continual process, from capture to incarceration. The detainee tracking program is a web application that allows for the tracking of new detainees from the very first day of capture. This initiative was started by Marine Corps elements in Iraq. A web-based application that ties into the Biometrics Automated Toolset database allows the processing of individuals to determine their detention necessity. The detainee tracker was developed to address the specific needs of managing a transient population of temporarily detained individuals in short-term facilities (those where detainees are generally held for up to 14 days). It complements the Detainee Management System, which was developed to manage larger, long-term internment populations.
M-24. It is necessary to collect as much information as possible to determine whether detainee is to be released, detained locally for intelligence exploitation, or transferred to a facility for internment. This provides a basis and foundation of documentation that will follow the detainee from initial capture to final internment in a facility.













 Page 42
 Glossary
The glossary lists acronyms/abbreviations and terms with Army or joint definitions, and other selected terms. Where Army and joint definitions are different, (Army) follows the term. Terms or acronyms for which FM 3-39.40 is the proponent manual (the authority) are marked with an asterisk (*).

5SandTE search, silence, segregate, speed, safeguard, and tagCTION I
AFI   Air Force instruction     
AJP   Allied joint publication (NATO)       
AO    area of operations        
AR    Army regulation
BCTCBiigade Combat Team
 C2      Command and Control
 C-2X   Coalition force human intelligence and counter intelligence staff element
CA      Civil Affairs
CBRN  Chemical, biological, radiological, and nuclearO
 CBRNE Chemical, biological, radiological, and nuclear and high yield explosivesON

CDO   YCommander, detainee operations
CI    MSCivilian detainee
CID        Criminal investigation divisionNY
CJCS    MChairman of the Joint Chiefs of Staff
CJCSIS Chairman of the Joint Chiefs of Staff instruction N
CONUS     Continental United States
CTA      DCommon table of allowances
DCABBDislocated Civilian
DAEVIADepartment of the Army
DCP         Detainee collection point
DD         TDepartment of Defense
DFAS-IN TDepartment of Finance and Accounting Service IndiannaF
DHA          Detainee Holding Area
DIAM      Defense Intelligence Agency Manual
DNA anddeoxyribonucleic acidA
DODcco Department of Defense
DODDnti Department of Defense directive
DODISON Department of Defense instruction
DOTMLPF   doctrine, organization, training, materiel, leadership and education personnel, and
                           facilities.S

EP            engineer publication           
EPW            enemy prisoner of war
FBI            Federal Bureau of Investigation      
FCF   field confinement facility    
FDF   field detention facility
FM            field manual        
FRAGO            fragmentary order
G-1            assistant chief of staff, personnel
G-2            assistant chief of staff, intelligence           
G-2X             assistant chief of staff, human intelligence and counterintelligence
G-4            assistant chief of staff, logistics         
G-9            assistant chief of staff, civil affairs operations
GC            Geneva Convention IV Relative to the Protection of Civilian Persons in Time of War
GPW            Geneva Convention III Relative to the Treatment of Prisoners of War

Page 42
GWS            Geneva Convention I for the Amelioration of the Condition of the Wounded and Sick in Armed Forces in the Field
GS            general schedule
GWS SEA Geneva Convention II for the Amelioration of the Condition of Wounded, Sick and Shipwrecked Members of Armed Forces at Sea
HIV            human immunodeficiency virus
HN            host nation
HUMINT            human intelligence
ICE            Immigration and Customs Enforcement
ICRC            International Committee of the Red Cross
IFRC            International Federation of the Red Cross
IO            international organization
I/R            internment and resettlement
ISN            internment serial number
J-2X            joint force human intelligence and counterintelligence staff element
JFTR            joint federal travel regulations
JIDC            joint interrogation and debriefing center
JP            joint publication
MCM            Manual for Courts-Martial
MEB            maneuver enhancement brigade
MI            military intelligence
MOS            military occupational specialty
MPC            military police command
MWD            military working dog
MTTP multi-Service tactics, techniques, and procedures
NATO North Atlantic Treaty Organization

Glossary-3
NCO   noncommissioned officer
NDRC National Detainee Reporting Center
NGO  nongovernmental organization
NLW   nonlethal weapon
OA    operation area
OCONUS   outside the continental United States
OE   operational environment
OPMG   Office of the Provost Marshal General
PM    provost marshal
PMG   Provost Marshal General
POC    point of capture
POW   prisoner of war
PSYOP   psychological operations
ROE   rules of engagement
ROI   rules of interaction
RP   retained personnel
RUF   rules for use of force
S-2X   human intelligence and counterintelligence staff officer
S-4   logistics staff officer
S-9   civil affairs staff officer
SF    standard form
SIF   strategic internment facility
SJA  staff judge advocate
SOP   standing operating procedure
STP   Soldier training publication
TB MED technical bulletin, medical
TDRC   theater detainee reporting center
TIF   theater internment facility

Page 44
UCMJ   Uniform Code of Military Justice
UN   United Nations
UNHCR United Nations High Commissioner for Refugees
USC    U.S. Code

 DefinitionsSECTION II – TERMS AND DEFINITIONS

*enemy prisoner of war
A detained person who, while engaged in combat under orders of his or her government, was captured by the armed forces of the enemy.

*internment and resettlement operations
Conducted by military police to shelter, sustain, guard, protect, and account for populations (detainees or dislocated civilians) as a result of military or civil conflict, natural or man-made disaster, or to facilitate criminal prosecution. Internment involves the detainment of a population or group that pose some level of threat to military operations. Resettlement involves the quartering of a population or group for their protection. These operations inherently control the movement and activities of their specific population for imperative reasons of security, safety, or intelligence gathering.

*[members of] armed groups
Persons who engage in or support acts against the United States or its coalition partners in violation of the laws and customs of war during an armed conflict that do not meet the criteria of prisoners of war as defined within the Geneva Convention Relative to the Treatment of Prisoners of War.

*lawful enemy combatant
A person entitled to protection under the Geneva Conventions, combatant immunity, and immunity from prosecution for lawful acts as a belligerent.

*U.S. military prisoner
A person sentenced to confinement or death during a court-martial and ordered into confinement by a competent authority, whether or not the convening authority has approved the sentence.