Overall Contents for All Blogs and Posts
http://unclesamenterstheendgamepart1.blogspot.com/
Most posts are alphabetized by subject starting at the bottom of each blog except for the first one. To get a feel of the overall intent of the blogs and posts please read the first post below.
Introduction and an Idea of how to navigate through the blogs and posts.
Contents for Sources of Funding for New World Order
From Soft to Hard Tyranny
Government Officials Speak out on Corruption and/or the New World Order Part 1
Government Officials Speak out on Corruption and/or the New World Order Part 2
Contents for Health Care Trends
Contents for Hidden Powers, Hidden Interests
Introduction
Links to Corruption, Tyranny and Trends Toward A New World Order Part 1
Links to Corruption, Tyranny and Trends Toward A New World Order Part 2
http://unclesamenterstheendgamepart2.blogspot.com/
Published 2014 (1)
Immigration
Published 2012 (1)
Internment/Resettlement Operations FM 3-39.40
Published 2011 (2)
Links to Corruption, Tyranny and Trends Toward A New World Order Part 3
National Debt
The above 3 posts Links to Corruption, Tyranny and Trends Toward a New World Order, Part 1, 2 and 3 contain just the links from all the posts with very little political commentary or analysis.
http://unclesamenterstheendgamepart3.blogspot.com/
News About the Fed, Banking and Finance Part 1
News About the Fed, Banking and Finance Part 2
Quotes Over Time About Monetary Policy and Banking and Finance in Relationship to Liberty and Tyranny
Slow Response/Gulf Oil Spill
Social Security and Other Entitlements
Solutions
Symbols of Occult Power
The Modern Art and Science of Enslaving Others
The Constitution Verses Tyranny
The Relationship Between The Military Industrial Media Complex, Defense Spending, Semi-permanent and Permanent War and the Rise of Tyranny
http://unclesamenterstheendgamepart4.blogspot.com/
Trends Toward a Tyrannical New World Order Part 1
Trends Toward a Tyrannical New World Order Part 2
Trends Toward a Tyrannical New World Order Part 3
The United Nations in Relationship to the New World Order Part 1
The United Nations in Relationship to the New World Order Part 2
http://unclesamenterstheendgamepart5.blogspot.com/
Barter and Local Currency Survey
Members, Activities and Meeting Times
http://unclesamenterstheendgamepart6.blogspot.com/
The War on Food
The War on Food Part 2 This section has a lot more in depth scientific studies.
In all the blogs the titles for each of the articles are colored coded red, orange, green or black based on my subjective belief of how likely they are to be true.
Red title and bold font means I believe the article is very likely to be true and is very important!
Red title and regular font means I believe the article is very likely to be true but is less important.
Orange title and bold font means the article is likely to be true and is important!
Orange title and regular font means the article is likely to be true but is less important.
Green title and bold font means I believe the article could be true and is very important!
Green title and regular font means I believe the article could be true but is less important.
Black title and bold font means I have no opinion on the article because I have not researched it so I have no opinion on its veracity. However it is important!
Black title and regular font means I have no opinion on the article because I have not researched it so I have no opinion on its veracity or truthfulness. It is of lesser importance.
Contents
Internment and
Resettlement Operations FM 3-39.40
Overview
Introduction
Why I am profoundly Upset
With this
document Recent Prior Events
7
The link to the entire
document Internment and Resettlement Operations FM 3-39.40
5
Places where this formally classified
document can be found.
5
Letter from George Casey
Secretary of the Army
6
The Constitution Allows Our
Government to Take Our Rights, Fifth Amendment Under Certain
Conditions
7
Obama’s NDAA 2012, Signing
Statement Government already has
right to detain Americans without trial long before NDAA 2012. This law does not break new ground. 7
Senator Lindsey Graham,
America is battleground so citizens can be detained indefinitely without due
process or trial by president or military and courts have upheld this right. 8
Senator McCain and other
government officials express views on NDAA 2012. 8
ACLU adamantly opposes NDAA
2012
8
Congressman Bill Hefner’s
Note admitting existence of civilian detention camps on Army bases. 9
Halliburton subsidiary
gains contracts to build detainee camps in America for emergency influx of
refugees.
9
Former Congressional
Representative Dan Hamburg speaks out on Halliburton contract to build
dentention camps in united States.
Article covers other bills prior to NDAA 2012 that allow government
to detain Americans without trial. 9
Army and National Guard
Websites Advertise for Internment Specialist, etc
9
Legislation passed over
time eroding Constitution and legalizing tyrannical state. 10
Legislation passed over
time setting up a secretive unaccountable police state
10.
Evidence of false flags to
manipulate the public into costly wars over time and to deprive us of
liberties. 10
Notes on how
to navigate through the
Document
11
Introduction
Chapter 1 Chapter
1 defines the objectives and principles of I/R operations and describes U.S.
policies on the protection and care of all detainees, U.S. military prisoners,
and DCs. It stresses humane
treatment of detainees. In this section
all but young children can be separated from their mothers. Fathers are separated from families.
Page 1-4. Detainee children
can be separated from their parents
11
Section 1-40, 46, 47. U.N and other international involvement
in internment resettlement camps 12
Section 1-51. Security requirements, intelligence and
interrogation operations. 13
Sections 1-54, 55. Roles and duties of military police 14
Chapter 2 describes
the handling of detainees and the army’s role in the process. The main objective is to protect
detainees and keep them out of the way of combat operations
Section 2-18, Rationale for internment/resettlement
camps
14
Section 2-20 -2-25. Rationale for why large amounts of
people need to be detained
During insurgencies. 15
Section 2-26. Rationale for need for reeducation in
camps. 15
Section 2-29. Excellent description of an efficient
police state. 16
Section 2-33. U.N. plays increasing role in our
government without our consent. 16
Section 2-34. U.S. government agencies most involved
in setting up and running
Internment and resettlement
camps. 17
Page 2
Chapter 3 describes
the roles and responsibilities of staff members at
internment/resettlement camps
Section 3-1 and 3-2. It is not clear in these sections
whether these camps will or will not be established in the united States.
Section 10:40 is also ambiguous in that regard in chapter 10. 17
Section 3-10. Support commanders world wide to
develop detainee experts to help in camps. 18
Section 3-15. Commander develops multidiscipline
custody and control oversight team with various intelligence agents, behavioral
scientists and legal experts. 18
Section 3-33-3-35. Use of military working dogs. 18
Sections 3-55-3-56
PSYOP officials introduces detainees or DC s to U.S. and
multinational policy; Identifies malcontents, trained agitators, and political
leaders within the facility who may try to organize resistance or create disturbances; Develops and executes
indoctrination programs to reduce or remove antagonistic attitudes and identifies
political activists. 19
Section 3-59 Roles
and Responsibilities of Counterintelligence Agents 20
Section 3-64.
Multinational representatives. 20
Chapter 4 describes the capture, initial screening and
detention of detainees
4-33. Upon capture, Soldiers must process detainees using the
“search, silence, segregate, speed, safeguard, and tag (5 Ss and T)” technique. 21
4-34. To ensure
accountability, each detainee is tagged by the capturing unit using DD Form
2745. Military police at DCPs and DHAs check each tag for— 21
· Date and time of capture.
· Capturing unit.
· POC.
· Circumstances of capture.
4-35. Decisions regarding a
detainee’s current and future status are based on the initial processing at the
POC. Proper processing ensures that U.S. armed forces can take the appropriate
action to release, detain, transfer custody, prosecute, or adjudicate
detainees. 22
Chapter 5 describes detainee operations.
Opening Paragraph To successfully conduct war on
terror facilities must be set up to handle large numbers of detainees! 22
5-63. Detainee visitations
will be conducted like visitations with inmates. 22
Chapter 6 describes
detainee facilities site planning and selection
6-5. Facilities must be
planned and built far in advance of hostilities. 24
6-7. …The U.S. Army Corps of Engineers
contains plans, specifications, and material requirements for detainee
facilities based on the anticipated detainee population. 24
6-8. Facility construction includes, but is not limited to clear
zones, guard towers, lights, patrol roads, sally ports and communications. 25
6-15. Silence enforced on
detainees 25
6-52. Internment Serial
Numbers given to classify, track and control detainees 25
6-57. Detainee
identification bands 26
6-52-5-65. Theater internment
facilities to house detainees permanently or for extended periods. 26
6-116-6-117. Preventing
escapes Final option is to shoot. 26
6-131 Strategic internment
facilities house the most recalcitrant or those of highest intelligence value. 27
Chapter 7 describes
confinement of military prisoners
Opening Paragraph describes
that more permanent facilities for military prisoners must be built. Why?
7-21. Meals 27
7-54-7-59. Preventing
Escape with the final option, shoot.
27-28
Chapter 8 describes
rehabilitation of U.S. military prisoners and detainees.
Opening Paragraph describes
reeducation process. 28
Page 3
8-1. Rehabilitation
extensively studied 28
8-3. Detention highly
structured 28
8-15. Employment 28
8-22 - 8-27. Importance of
proper identification, assessment, segregation and structure 28-29
8-51. Behavioral (Mental Health) screen/Potential for abuse is high! 29
Chapter 9 describes
transitioning military prisoners and detainees back into their societies.
9-49. The key objectives of the transition of detainee operations
are numerous and complex. Key players within this transition plan include many
U.S. and U.N. players.
30
Chapter 10 describes resettlement options
Opening Paragraph describes
an overview of the process of resettling detainees and military prisoners. The last 2/3 of the paragraph still
show that the resettlement process will be highly controlled containing many
characteristics of a totalitarian police state! 30
10-2. Objectives of
resettlement program
30
10-3. Planning
Resettlement Note various players
involved in process. 31
10-33. The role of
Internment Serial Numbers ISN’s in the resettlement process. 31
10-40. The relationship between the Secretary
of Defense, The Posse Comitatus Act and the establishment of
Internment/resettlement camps in the united States. 31
10-55. Police intelligence
activities in resettlement areas.
32
10-57. The ease of using
the detainee reporting system and access to the national detainee reporting center
to classify, control and track detainees in the resettlement process. 32
10-67. The resettlement
facility commander publishes, enforces and updates rules for the resettlement
facility. Sample of rules posted
during Hurricane Katrina in New Orleans Posted 32
10-69. The
resettlement facility commander takes positive action to establish daily or
periodic routines and responses that are conducive to good discipline and
control. 33
Appendixes I
included aspects of the various appendixes that highlight the dangerous
totalitarian aspects of these internment resettlement camps and other
interesting information.
Appendix D Application of Geneva
Convention to Internment and Resettlement Operations.
D-1. DOD
(Department of Defense) policy is to apply the Geneva Conventions in all
military operations unless directed otherwise by competent authority, usually
at the theater level or above (the same level of authority that designates
hostile forces). 33
Appendix E Detailed description of agencies
involved in the internment and resettlement process.
33
Appendix H The
Use of force and other riot control measures.
H-2 – H-3. Levels of
resistance and levels of force 33
H-40 – H-50 Riot control
and crowd behavior
34-35
Appendix J Detailed
description of facility designs and Sustainment Considerations
J-51 Media access to Internment/Resettlement
camps tightly controlled. 36
Appendix
K Detailed description of
psychological operations support for internment and resettlement camps.
K-9. The tactical PSYOP
detachment utilized various media to pacify detainees and military prisoners.
37
K-13. PSYOP team
involvement in initial interviews of detainees. 37
Page 4
K-14. Information gained
sent to others for analysis to develop products to aid in pacification of
detainees and prisoners. 37
K-15. Info used to classify detainees as
malcontents, political agitators, collaborators etc. 37
K-19 Enclosure Team works
closely with detainee and prisoner populations on morale building and do other
things to gain the trust of detainees.
Often they will be recreational staff. They do not openly work with
military police or other authoritarian structures but directly with detainees
to win their trust. However they
do report their findings to the authorities! These ones are the ultimate secret police! 38
K-24 – K-25. Audio-visual
team employs various media to help the PSYOP team. 38-39
Scary PSYOP Technology for
Propaganda/Washington Post 39
Appendix M
Biometrics-.Detailed
measurable physical and behavioral characteristics that enable the
establishment of verification of an individual’s identity. The term biometrics include: but is not
limited to finger, face, hand, eye, voice and DNA characteristics.
M-1 – M-4. Describe biometric measurements and the process
of collection through use to classify detainees etc. The most important aspect of the collection process is that
material can easily be collected on each detainee without his or her knowledge. 39
M-6 reemphasizes the
ability of personnel to easily collect data on individuals without their
consent or knowledge.
M-7, 12, 13, 19, describe
how the information is used stored and analyzed. 40
M-21 – M-22. Discuss the
Detainee Reporting System and how info is stored and utilized in the National
Detainee Reporting system.
Internee serial numbers are also briefly discussed. 41
M-22 – M-23. Detainee
Tracking from initial capture until final placement and how detainees are
classified throughout the internment process. 41
M-24. It is necessary to collect
as much information as possible to determine whether detainee is to be
released, detained locally for intelligence exploitation, or transferred to a
facility for internment. This provides a basis and foundation of documentation
that will follow the detainee from initial capture to final internment in a
facility. 41
Glossary of
Military Acronyms
42
Definitions
44
Just Say No
Poem
44
Specific Detailed Procedures for setting up and Operating Detainment
Camps in the U.S. and Abroad!
The implications of this leaked military document are profound and
extremely frightening. My comments
are in red. Comments will be
sparse because the document speaks for itself.
I am honored to present this information because I believe we live
in a historic time. One can
actively or silently collaborate with these tyrannical ones or one can take a
stand against this. I am taking a
stand here and now in front of you and God. If I am asked to go to an internment I hope I can refuse or
hide. I prefer hiding in the
mountains even if it means starvation and death. If I am forced at gunpoint to go, then I shall but I shall
not eat one drop of food until I am free or dead. I was born free I shall die free God willing!
The complete document can be found at http://info.publicintelligence.net/USArmy-InternmentResettlement.pdf
The document is dated February 12, 2010.
A short video has been produced summarizing some of the startling findings within the document. One I may have missed is that the document states such camps can be set up in the United States on page 38. In the complete document in the link above the documentation is actually on page 2-8 in the 2 paragraphs under the sub heading called Support to Civil Support Operations. To find this video on You tube google, Leaked Document Military Internment Camps in U.S. to be Used for Political Dissidents. http://www.youtube.com/watch?feature=player_embedded&v=FfkZ1yri26s# !
A short video has been produced summarizing some of the startling findings within the document. One I may have missed is that the document states such camps can be set up in the United States on page 38. In the complete document in the link above the documentation is actually on page 2-8 in the 2 paragraphs under the sub heading called Support to Civil Support Operations. To find this video on You tube google, Leaked Document Military Internment Camps in U.S. to be Used for Political Dissidents. http://www.youtube.com/watch?
This publication is available at Army Knowledge Online
(www.us.army.mil) and General Dennis J. Reimer Training and Doctrine Digital
Library at (www.train.army.mil).
This document is classified as shown by the following.
DISTRIBUTION
RESTRICTION: Distribution authorized to the DOD and
DOD contractors only to protect technical or operational information from
automatic dissemination under the International Exchange Program or by other
means. This determination was made on 8 December 2008. Other requests for this
document must be referred to the Commandant, U.S. Army Military Police School,
ATTN: ATZT-TDD-M, 320 MANSCEN Loop, Suite 270, Fort Leonard Wood, Missouri
65473- 8929.
DESTRUCTION NOTICE: Destroy by any method that will prevent disclosure of contents or
reconstruction of the document.
This publication applies to
the Active Army, the Army National Guard/the Army National Guard of the United
States, and the U.S. Army Reserve unless otherwise stated. Page VIII of Perface
On the last page of the
document is a letter that looks pretty much like the one on the next page.
FM 3-39.40
12 February 2010
By Order of the Secretary of the Army
GEORGE W. CASEY, JR.
General, United States Army
Chief of Staff
Official:
JOYCE E. MORROW
Administrative
Assistant to the
Secretary of the Army
1002201
DISTRIBUTION:
Active Army, Army National Guard, and
United States Army Reserve: To be distributed in accordance
with the initial distribution number (IDN) 115851, requirements for FM 3-39.40.
Introduction
Why Am I Profoundly
Upset By this Document? Recent
Prior Events
Before going deeply into this document I need to defend my fears for
within the internment/resettlement camp article, it is ambiguous as to whether
such camps would be set up in the united States. See sections 3-1 and 3-2 in chapter 3 below. Section 10:40 of chapter 10 also seem
to imply that these camps can be set up in the u.S. Remember, this document was written before the passage of
NDAA 2012. If these camps are only
intended for foreign enemies the document is still unsettling. What if they are also intended for
us? Even in the Constitution of
the United States, under certain conditions, our government is allowed to
deprive us of all liberties including the right to trial before being
imprisoned or executed. According
to the actions of certain government officials described below, I believe these
internment/resettlement camps may be intended for us!
Two pertinent questions must
be addressed before exploring this leaked military document! Does our government have the right to
deprive us of Habeas Corpus? Also
does our government have the right to set up such camps in the united States to
house detained Americans without trial? The Constitution is ambiguous on these questions. Read the 5th amendment.
Amendment V
No person shall be held to answer for a
capital, or otherwise infamous crime, unless on a presentation or indictment of
a Grand Jury, except in cases arising in the land or navel
forces, or in the Militia, when in actual service in time of War or public
danger, nor shall any person be subject for the same offence to be twice
put in jeopardy of life or limb; nor shall be compelled in any criminal case to
be a witness against himself, nor be deprived of life liberty or property,
with out due process of law; nor shall private property be taken for public
use without just compensation.
In times of invasion or rebellion The Constitution allows the
executive to detain individuals whom it deems a threat as prisoners of war,
without trial or due process, until hostilities cease. In the recently passed NDAA 2012,
sections 1021 and 1022 allow the military to detain anyone they deem as a
threat without trial or due process. The link shows how the courts often uphold the governments
position in this regard. http://tenthamendmentcenter.com/2012/02/06/ndaa-sections-1021-and-1022-scary-potential/
Obama in his signing statement after signing the NDAA into law stated he
was uncomfortable with the above provisions but they were already covered by
the 2001 Authorization for Use of Military Force (AUMF) (Public Law 107-40: 50
U.S.C. 1541 and that these provisions did not break new ground. http://www.whitehouse.gov/the-press-office/2011/12/31/statement-president-hr-1540
Page 8
Thus this latest curtailment of our liberties is just the latest
example of a long list of dictatorial bills passed by Congress.
Here is another dangerous aspect of NDAA 2012. America has been declared a battle zone
in sections 1031 and 1032. Because
of this law and others, legally under our Constitution we are now at war so the
military and the executive branch now have the authority to seize and detain
you or worse, without trial or due process until the end of hostilities. This war on terrorism is our longest
war. Do you think it will end
anytime in the near future?
Senator
Lindsey Graham on CSPAN 2 5:29 P.M. uploaded 11/29/2011, declared since America
is a battle zone, under section 1032, American Citizens and Resident Aliens
cannot be seized by the military.
However under Section 1031 American citizens can be seized by the
military and held without trial if the military believes that the
American citizens aided the enemy as described in Section 1031. The meaning of aiding the enemy, is not
clearly defined. If I believe that
the American government played a major role in facilitating terrorists against
the U.S., could I be detained for giving aid and comfort to the enemy?
Also
according to the Senator, Joseph Padilla an American citizen, was held by the
military for several years without trial and the 4th Circuit Court
of Appeals upheld the right of the military to hold him because they deemed him
to be an enemy combatant since the military declared him a threat. Thus the precedent has been set for the
military to seize citizens and hold them without due process. http://www.youtube.com/watch?v=fzFygkHgi34
In
the following clip Senator McCain one of the sponsors of the NDAA 2012 bill
speaks out why he supports the bill. http://www.youtube.com/watch?v=GsNEOXQ4RZw
In the video clip, The final loss of
freedom in America NDAA (monkart), at the end of this paragraph, several
government officials discuss possible implications of the bill. Paul Craig Roberts served as an
Assistant Secretary of the Treasury in the Reagan Administration and also testified
before Congress on more than 30 occasions. In addition, he was an editor and columnist for the Wall
Street Journal, Business Week and Scripps Howard News Service. Roberts criticized both Republican and
Democratic administrations for various actions. See the following link for more info on him http://en.wikipedia.org/wiki/Paul_Craig_Roberts
At the 9 minute and 54 second mark
in the next clip, Roberts claimed the following. “The Pentagon, FBI, DIA, Director of National Intelligence,
and the head of the Justice Department National Security, told the Senate,
don’t vote for this bill. It is a
very bad.” However the Senate
approved the bill and President Obama codified it into law and signed it on the
night of December 31, 2011.
The ACLU strongly opposes the NDAA bill. http://www.aclu.org/blog/tag/ndaa I include this
link because opposition to this bill is very strong on the right and left side
of the political spectrum.
The following clip from infowars is
interesting because it describes other bills passed by the Federal legislature
that have eaten away at our liberties before the passage of the NDAA 2012. Like the Health care bill recently
passed, this NDAA bill was very long, over 2,000 pages and both the Senate and
the House were pressured into passing it before they had a chance to read
through it. What are the chances
any actually read the entire bill? http://www.youtube.com/watch?v=56uByJAxXLg
Having read the above, understand that alternative media sources for
years, claimed that elements of the United States government and military in
alliances with foreign powers over threw our Constitutional Republic. They believe at some point the economy
will collapse and these sources claim then the ones who engineered the collapse
will see no other way to protect themselves other than to enslave us completely.
Here are some other media sources that show these camps may already
exist.
The first is a note to someone from Congressman Bill Hefner on March
24, 1997
http://www.greaterthings.com/News/Concentration_Camps/images/congress.jpg or at the following with a larger copy
of the letter. http://libertyforlife.com/jail-police/us-concentration-camps-Congressman-Bill-Hefner.htm
Halliburton
Subsidiary Gets Contract to Add Temporary Immigration Detention Centers In U.S. http://www.nytimes.com/2006/02/04/national/04halliburton.html
Press Release http://www.kbr.com/Newsroom/Press-Releases/2006/01/24/KBR-Awarded-US-Department-of-Homeland-Security-Contingency-Support-Project-for-Emergency-Support-Services/
Former Congressional
Representative Dan Hamburg also speaks out on Halliburton Contracts for
Detention Camps. The article
refers to several other Congressional bills passed allowing the executive
branch of the government to imprison citizens without due process or trial
during unclearly defined emergencies. http://www.sfgate.com/cgi-bin/article.cgi?f=/c/a/2008/02/04/ED5OUPQJ7.DTL#ixzz0oFnbVDia
See also Army Regulation 210-35 Civilian Inmate Labor Program http://armypubs.army.mil/epubs/pdf/r210_35.pdf
See the following Army and National Guard websites advertizing for
internment specialists I presume would be employed at such camps. www.goarmy.com/careers-and-jobs/browse-career-and-job-categories/legal-and-law-enforcement/internment-resettlement-specialist.html The
Page 10
following national guard website has a video under
military police that gives a good description of some of the duties of an
internment specialists. http://www.nationalguard.com/careers/mos-guard-jobs?mos_code=31E
To get a better sense of legislation passed over time gradually
destroying the Constitution and legalizing tyranny see this link. http://unclesamenterstheendgamepart3.blogspot.com/2011/09/constitution-and-tyranny.html
To get a sense of how our government may be setting up this hidden
police state refer to the following links. http://projects.washingtonpost.com/top-secret-america/articles/frontline-video/
To see more government and media
links describing how the military, industrial, media, scientific complex is
covertly and overtly establishing a tyrannical state see the websites
below. In these websites there is also
evidence that our government used false flags to manipulate the public to
support various costly tragic wars. http://unclesamenterstheendgamepart3.blogspot.com/2011/09/relationship-between-military.html In the
following link there are many senators, congressmen, governors and other
government officials that suggest or imply that many aspects of 9/11 were
hidden from us and some imply it was a false flag engineered to take away more
of our liberties and involve us in further costly wars. There is ample evidence as well that
our attack on Iraq was based on false intelligence thus I consider that
intelligence as part of a false flag to initiate that war. http://unclesamenterstheendgamepart1.blogspot.com/2011/09/contents-for-government-officials-imply.html pages 7-11. Perhaps terrorist false flags will be employed
to set up these vast detention camps and resettlement camps described below.
Earlier I discussed how some of the alternative media believe that
those who control our government will turn against the American people if our
economy collapses because of irresponsible financial policies. Perhaps in order to protect themselves,
the internment/resettlement camps described below will be one of their weapons
to deprive us of our rights and enslave us! Below are excerpts from FM 3-39.40
Notes and Selected
Passages from Document FM 3-39.40: Internment and Resettlement Operations
The entire document can be found at http://info.publicintelligence.net/USArmy-InternmentResettlement.pdf
Notes to Help
Navigate Through This Document
Pages VII and VIII of Perface give a good overview of the chapters
in the document followed by an introduction.
In the document, the military utilizes lots of acronyms representing
different organizations or procedures.
To gain a better understanding of what is being discussed you might want
to download and print the 3 page glossary which list the acronyms in
alphabetical order along with some definitions at the end as a reference. You
can go to the end of the link below to the glossary. http://info.publicintelligence.net/USArmy-InternmentResettlement.pdf
I also have the list of acronyms at the end of this abbreviated
document if the link becomes unusable.
The numbering system in FM 39. 40, is different than that found in
regular documents or books. The document is divided into 10 chapters
then several alphabetical appendixes.
In chapter 1 the pages are numbered 1-1, 1-2, 1-3, etc. The pages in chapter 2 are numbered
2-1, 2-2, 2-3, etc. In the
appendixes in the back, the pages in Appendix a are numbered a-1, a-2, a-3,
etc. In Appendix b, the pages are
numbered b-1, b-2, b-3 and so on.
I selected sections of the document that I felt were tyrannical or
interesting. The document itself
was over 320 pages, what I put below covers about 25 pages excluding my
comments.
Chapter 1 defines the objectives and principles of I/R
operations and describes U.S. policies on the protection and care of all
detainees, U.S. military prisoners, and DCs. It stresses humane treatment of detainees. However abuses are likely to
occur. In Guantanamo and other
detainment camps run by the U.S. now, 92 tapes showing the CIA’s so called
enhanced interrogation techniques were destroyed. The following documents were released to the ACLU after they
sued in court, showing heavily redacted documents explaining the CIA’s
rationale for destroying the tapes.
Do you believe them? http://www.aclu.org/files/assets/cia_release20100415_p01-09.pdf If the link becomes unusable google tot: 251945z Oct 02
Page 1-4 of chapter 1.
In the section Segregation, the following quote gives the authorities
permission to separate children from their families. Juveniles within the I/R population are
typically segregated from the general population.
In this section they discuss how minimum force needs to be utilized
for control and ways to guard against escapes. I/R stands for Internment/Resettlement Camp.
Section 1-40 Note all
the different organizations involved in the internment and resettlement
processes with the United Nations listed near the top.
1-40. External involvement in I/R missions is a fact of life for
military police organizations. Some government and government-sponsored
entities that may be involved in I/R missions include—
· International agencies
· U.N.
· International Committee of the Red Cross (ICRC)
· International Organization of Migration
· The following are U.S. agencies
· Local U.S. embassy
· Department of Homeland Security
· U.S. Immigration and Customs Enforcement (ICE)
· Federal Emergency Management Agency
Reading through the above sections it looks as though the military
is preparing for war but where? Is
it in the U.S. or elsewhere?
On page 1-13 note how the U.N. and other international organizations
are immersed in the operations of these detention centers. If you note recent wars the U.S. has
fought, this makes sense because the U.N. has been involved with most of them.
1-46. A detailed description of nonmilitary U.S. government
agencies typically involved in I/R operations is contained in appendix E. The
non-U.S. government organizations most likely to be encountered during I/R
operations are international humanitarian organizations. These are impartial,
neutral, and independent
organizations whose mission is to assist and protect victims of
conflict. This group includes organizations such as the ICRC, the International
Federation of the Red Cross (IFRC), and the Red Crescent Societies. They
carefully guard their neutrality and do not desire to be associated with or
dependent on the military for fear of losing their special status in the
international community that allows them to fulfill their mission. The two
principal types of non-U.S. government civilian organizations are—
· IOs. IOs are established by international agreements and operate at
the nation-to-nation level. IOs (International Organizations) include the UN, the UN Development Program, the UN Office for the
Coordination of Humanitarian Affairs, the UN World Food Program, and the
International Medical Corps. The UN High Commissioner for Refugees is a key
player in international detainee operations.
· Nongovernmental organizations (NGOs). NGOs are voluntary organizations that are not
normally funded by governments. They are primarily nonprofit organizations that
self-define their missions and philosophies. This independence from political
interests is the key attribute of NGOs and can be a great benefit in rebuilding
relations when political dialog has failed or is not practicable. They are
often highly professional in their field, extremely well motivated, and
prepared to take physical risks in appalling conditions. Examples of NGOs include
Save the Children, Medecins Sans Frontières (Doctors without Borders), Catholic
Relief Services, and Catholic Bishops Council. NGOs are classified as mandated
or nonmandated as described below:
· A mandated NGO has been officially recognized by
the lead IO in a crisis and is authorized to work in the affected area. The
ICRC is an example of a mandated NGO.
· A nonmandated NGO has no official recognition or
authorization and, therefore, works as a private concern. These organizations
may be subcontracted by an IO or mandated NGO. In other cases, they obtain
funds from private enterprises and donors. Catholic Relief Services is an
example of a nonmandated NGO.
UNITED NATIONS
1-47. The UN is involved in
the entire spectrum of humanitarian-assistance operations, from suffering
prevention to relief operations. Typically, UN relief agencies establish
independent networks to execute their humanitarian-relief operations. The UN
system delegates as much as possible to the agency’s elements located in the field;
supervisory and support networks are traced from those field officers back to
UN headquarters. Military planners must familiarize themselves with UN
objectives so that these objectives are considered in planning and executing
military operations. (See appendix E.)
Page 1-14 discusses
military protection, security and protection of detainees from battles as well
as evacuation plans. Are they
preparing for war in our country?
See security requirements under section 1-51
Security requirements. To the maximum extent possible, I/R facilities will be protected
from the hazards of the battlefield. To protect the I/R population, commanders—
· Manage the control of captured protective
equipment that could be used to meet requirements.
· Ensure that when planning for individual
protective measures and facility protection, the potential presence of
detainees is considered. As a general rule, detainees should derive the same
benefit from protection measures as do members of the detaining force.
· Use-of-force training. Planning and preparing for the use of force is
a necessary element in maintaining order. Personnel assigned the mission of
providing for the control of detainees, U.S. military prisoners, and DCs and
the security of I/R facilities should be issued and trained on RUF that are
specific to that mission. Theater rules of engagement (ROE) remain in effect
for defending an I/R facility from an external threat.
· Safety and evacuation plans. When controlling large I/R populations,
commanders must develop thorough safety and evacuation plans to evacuate,
shelter, protect, and guard (as appropriate) U.S. armed forces personnel and
I/R populations from fire, combat hazards, natural elements, and nonbattle
injuries. Safety plans must be incorporated into I/R facility standing
operating procedures (SOPs) and refined through continuous risk assessments and
mitigation. Commanders must ensure that safety and evacuation plans are
routinely trained and rehearsed.
Page 1-15 discusses intelligence and interrogation operations and
U.S. armed forces operating in camps as part of section 1-51.
Intelligence and
interrogation operations. The
U.S. armed forces operating the I/R facility need to plan for human
intelligence (HUMINT) collection operations, which require close cooperation
with HUMINT collectors and counterintelligence agents. Further consideration
must be given to ensure that interrogation operations in the facility are
conducted according to applicable U.S. laws and regulations, international
laws, operation orders, FRAGOs, and other operationally specific guidelines
(DOD policies). The internment facility commander is responsible for ensuring
proper care and treatment for detainees. (For a detailed discussion of
responsibilities and support relationships dictated by DOD policies and for
more information on HUMINT operations see FM 2-22.3.)
In this section it is noted that detainees were formally called
prisoners of war. See the
underlined part of the quote below this!
The term detainee I guess linguistically sounds better than prisoner of
war. Note the blend of national
and international rules here. It
is subtle but throughout the document I perceive a loss of U.S. sovereignty
over time. See the quote below.
Strategic reporting. Strategic reporting of detainees and DCs (Displaced citizens) requires adherence to the Detainee Reporting
System (formerly known as the Branch Prisoner of War Information System) procedures. The timely and accurate reporting
of data is critical to ensuring detainee and DC accountability and compliance
with U.S. and international laws.
Page 1-16 Description
of Military Police Roles and Duties Interesting. I listed a few here.
I underlined sections that sound more like activities that occur in
prisons or prison like situations.
1-54. When performing I/R operations, 31B personnel bring a
variety of skill sets, inculcated through their training. These skills include—
· Interpersonal communications.
· Use-of-force guidelines and standards.
· Civil disturbance operations.
· Use of NLWs (Non lethal weapons) in any environment.
· Custody, control, and audit maintenance
requirements for I/R operations.
· Police investigations.
· Cultural awareness.
1-55. Military police personnel within the 31E MOS (Military occupation specialty) are
specifically trained to conduct I/R operations across the full range of
potential environments. They provide technical capabilities specific to I/R,
making them the subject matter experts in full-scale I/R operations. These
skills include—
· Interaction and use of U.S., third world country
and local national interpreters during I?R operations
· I/R facility operations (cell blocks, recreation
areas, shower areas, latrines, mess areas).
· Safe and proper take-downs techniques to ensure the well-being of all personnel
involved.
· Proper and effective movement techniques when
moving an individual from one location to another.
· Use of NLW in any environment.
· Cultural awareness.
.Internment and
Resettlement Operations and the Operational Environment
·
Riot control measures, to include the use of riot control agents and
dispersers.
·
Quick-reaction
force actions inside and outside the facility.
·
Search
techniques, to include the use of electronic detection devices.
·
Detainee
treatment standards and applicable provisions of the law of war.
·
Current,
approved interrogation techniques.
When you read the underline sections in 1-54 and 1-55 discussing
military police rules and duties is this facility more like a library or mall
where you have more freedom of movement or more like a prison?
Chapter 2
This chapter discusses handling of detainees and the army’s role in
detainment camps. The main problem
is how to get civilians out of the way of military operations in times of war.
Section 2-18. Here is
one fantastic rationale for setting up detainment camps. This is why this document is so scary.
2-18. During stability, the
nature of the threat can often inhibit the ability of friendly forces to
differentiate between a hostile act and hostile intent or between insurgents
and innocents within the civilian community. For this reason, military
commanders and forces must have the authority to detain civilians and an
acceptable framework to confine, intern, and eventually release them back into
the OE (operational environment). This authority has the most legitimacy when
sanctioned by international mandate or when it is bestowed or conveyed from the
local or regional governmental power. The initial or baseline authority granted
to military forces to use force and detain civilians will ultimately determine
the status of the persons they detain. The status of detainees will further
determine the manner in which they are processed, the degree of due process
they are afforded, and whether their offense is military or criminal in nature.
Detainee status and identification will also help develop and determine
eventual rehabilitative, reconciliatory, and release strategies.
Sections 2-20 – 2-25 describe counter insurgency. Section 2-23 gives rationale why large
numbers of people need to be detained.
During the Vietnam War, millions of Vietnamese civilians were relocated
to so called safe areas. They were
uprooted from their ancestral lands to areas where the military could protect
them from insurgents. One of the
goals of Agenda 21 is to relocate citizens to urban areas allowing vast
portions of the environment to revert to a wild state. Perhaps a hidden agenda is to locate
people in areas where they can be more easily controlled.
2-23. The need for information is so crucial in counterinsurgency
operations that it typically leads to an increased number of detainees. The
time-sensitive nature of information and intelligence in counterinsurgency
often leads to detentions based on incomplete or inaccurate information that
makes determining detainee status and identification difficult and complex. The
process of detainee identification and assessment is continuous and begins at
the POC (Point of contact); is actively monitored during the period of
detainee internment; and significantly impacts custody, control, and release
decisions and strategies.
2-24. Detainee operations play a significant role in
counterinsurgency efforts because large detainee populations can become fertile
ground for insurgent, extremist, and criminal recruitment, development, and
growth if they are not processed quickly and effectively. The development and
growth of insurgent and/or criminal networks, if not identified and mitigated,
can pose significant threats to I/R cadre and the detainee/DC population.
2-25. Detainee populations
grow incrementally as counterinsurgency operations endure, or they can increase
very rapidly during surge operations, reflecting the episodic nature of
counterinsurgency. Captured insurgents display a propensity to continue
recruitment, assassination, and intimidation inside TIFs, (Theater internment facility) making it incumbent upon forces supporting
detainee operations to focus their efforts on countering that portion of the
insurgency within the facility, while synchronizing their efforts with military
operations outside the detention facility.
Section 2-26 discusses Rationale for need for re-education
camps. Again this reminds me of
the problems faced in Vietnam when we were attempting to pacify and win the
hearts and minds of the Vietnamese people. Perhaps the military practiced honing these skills in Iraq
and Afghanistan where they faced hostile populations. If they face hostile Americans they may prove to be a
formidable foe based on all the practice they have had in prior wars.
COUNTERING THREATS WITHIN THE FACILITY
2-26. Prisons can provide insurgents with a large pool of
discontented persons that may facilitate recruitment efforts by insurgent,
criminal, or other irregular actors. These threats are not confined to
internment operations; they are just as likely to propagate within resettlement
or conventional prison operations. These irregular threat actors may also
attempt to infiltrate detention or resettlement facilities to intimidate or
assassinate political opponents or their supporters. The facility commander develops
procedures designed to identify and defeat insurgent efforts to organize
escape, harm the guard force and other detainees, or degrade the effectiveness
of the facility threat operation in general. These efforts may be linked to an
overarching counterinsurgency effort in the theater or may be locally initiated
efforts to gain control within the facility population. The identification of a
linkage to an external effort may be accomplished through and coordinating and
sharing police information with an external multifunctional headquarters such
as the military police command or a joint detainee task force. The military
police command or joint detainee task force coordinates and synchronizes
support with MI, (Military intelligence) civil affairs (CA), PSYOP and linguists;
medical, legal, HN, and
Page 16
interagency personnel; and local leaders in an effort
to defeat insurgency within the facility. Procedures or tactics, techniques,
and procedures to defeat the internal threat networks and efforts within the
facility may include— Developing deliberate procedures for detainee
identification, categorization, and continual assessment.
· Using multifunctional boards to assess detainees
and develop reconciliation plans
· Identifying and designating dedicated teams with
specific skill sets through mission analysis for each major compound. (The
teams are organized to identify and mitigate threats within the facility and
will include bilingual bicultural and advisors; intelligence officers; counter
intelligence agents; and others as required.
· Allowing detainee participation in their own
adjudication and rehabilitation destiny.
· Empowering detainee leaders to leverage their
support through incentives.
· Ensuring that the informational needs of
detainees are met and that rules and/or disciplinary
· actions are understood.
Section 2-27 contains interesting quotes
that support our transition from democracy to tyranny. According to many founding fathers and
famous dictators including Lenin, Stalin, Mao and Hitler, democracy was
indispensable in order for them to set up their totalitarian states.
…Former combatants may
participate in the process when offered some level of due process involvement
linked to corrective behavior modification. Commanders must seek legal
assistance as they balance regulatory operations security and detainee privacy
entitlements with the transparency necessary for supporting democratic
institutions and national values…
Section 2-29 is a good description of an efficient police
state.
…Additional tasks include
enforcing curfews, restricting movement, checking travel permits and
registration cards, operating checkpoints, instituting amnesty programs, and
conducting inspections. The level of control is drastically different from that
used during detainee operations. During resettlement operations, DCs are
allowed the freedom of movement as long as such movement does not impede
operations.
2-31. Controlling DCs is
essential during military operations because uncontrolled masses of people can
seriously impair the military mission. Commanders plan measures to protect DCs
in the AO (Area of operations) and to prevent their interference with the
mission.
2-32... A special category
of personnel arises when Internment/Resettlement operations require the housing
of Displaced Civilians that are detained against their will…
Section 2-33 reinforces my view that the United Nations is involved
in the plan to detain large numbers of U.S. citizens in Internment camps. This also reinforces my view that the
United Nations plays an increasing role in our government.
In a semi-permissive
environment, the UN mandate or ROE (Rules of Engagement) may include the authority to detain civilians that are a threat to
a secure and stable environment. Military police units may be required to
establish CI Civilian internee) detention facilities for this purpose.
Section 2-34 describes the U.S. government agencies that will be
most active in setting up the camps.
Alternative news sources have charged that the Department of Homeland
Security has led the effort in setting up the camps.
Page 17
Note. Resettlement conducted as a part of civil
support operations will always be conducted in support of another lead agency
(Federal Emergency Management Agency, Department of Homeland Security).
It is likely that some, hopefully most American military will resist
if these camps are set up and become operational in the united States. Sections 2-35 and 36 describe the
housing of military prisoners. An
interesting procedure is that military prisoners will be housed in separate
camps from civilian detainees.
2-36. …U.S. military
prisoner confinement operations parallel, but are separate from, the other
types of I/R operations. No member of the U.S. armed forces may be placed in
confinement in immediate association with a detainee who is not a member of the
U.S. armed forces…
Rationale for setting up
detainment camps. 2-37. Population and
resource control denies adversaries or insurgents access to the general
population and resources and prevents incidental civilian activity from
interfering with military operations…
2-47. Typically, a TIF (Theater internment facility) or SIF (Strategic internment facility) is established at the theater level. (See paragraph 6-59.) A
TIF or SIF is a permanent or semi-permanent facility that is
normally within the regional area of combat operations and designed to hold
large numbers of detainees for extended time periods. All TIFs and SIFs are operated under military
police C2, (Command and Control) with augmentation and support of many of the
military disciplines. The decision may be made to establish a TIF or SIF
outside the theater of operations that is not under the authority of a theater
commander. The bold print and underlining was added by me to
emphasize these points.
Chapter 3
Chapter 3 deals with the roles and responsibilities of staff members
at the Internment camps. There are
many detailed highly complex jobs in this vast complex military industrial
prison complex. The military has
learned a great deal from internment of Japanese Americans, Vietnamese farmers
as well as their more recent wars in Iraq and Afghanistan. Section
3-1 and 3-2 is ambiguous concerning whether such camps could be set up in the
united States. However, many laws
seemed to be supportive of such action and the Constitution is also ambiguous
on this point. See the
introduction at the beginning of my document.
3-1. The
NDRC (National Detainee Reporting
Center) a Headquarters, DA (Department of Army) organization assigned to the OPMG (Office of the Provost Marshall General) is responsible for—
· Assigning and forwarding blocks of ISNs to the
designated theater and the continental United States (CONUS) as required
· Obtaining and storing information concerning detainees
and their confiscated personal property.
· Preparing reports for the protecting power.
· Providing accountability information to the ICRC
central tracing agency.
· Acting as the proponent office for the Detainee
Reporting System and detainee management software.
3-2. The TDRC (Theater detainee reporting center) is a modular organization that is comprised of 32 personnel who
are capable of deploying as a full organization in major combat operations as a
team or a combination of up to 4 teams to support small-scale operations. It
functions as the field operations agency for the CONUS-based NDRC. (National Detainee Reporting Center) Remember CONUS stands for Continental United
States.
The last underlined sentence
below is interesting and scary.
Page 18
3-10. The U.S. Army Corrections Command mission is to exercise C2 (Command and Control) and operational oversight for policy,
programming, resourcing, and support of Army Corrections System facilities and
table of distribution and allowances elements worldwide. On order, the U.S.
Army Corrections Command coordinates the execution of condemned military
prisoners. Strategic objectives include—
· Providing a safe environment for the retributive incarceration of prisoners.
· Protecting communities by incarcerating
prisoners.
· Deterring those who might fail to adhere to
discipline laws and rules.
· Providing rehabilitation services to prepare
prisoners for release as civilians or for return to duty with the prospect of
being productive Soldiers/citizens.
· Supporting commanders world wide by developing
detainee experts through experiential learning in a prison environment in a
prison environment.
Section 3-15 has a lot of
bullets. One paragraph shows the
complexity and interdisciplinary approach to working with detainees involving
the use of behavioral scientists.
The interrogation chain of
command’s coordination on the interrogation plan with the CDO. The CDO (in
conjunction with the MI commander) may convene a multidiscipline custody and
control oversight team including, but not limited to, military police
personnel, MI personnel, a behavioral science consultant (if available), and
legal representatives. The team can advise and provide measures to ensure that
effective custody and control is used and compliant with the requirements of
applicable U.S. laws and regulations, international laws, execution orders,
FRAGOs, and other operationally specific guidelines. Guards do not conduct
intelligence interrogations and will not set the conditions for interrogations.
Guards may support interrogators as additional security (for example, for
combative detainees) according to JP 3-63, FM 2-22.3, and the approved
interrogation plan.
As I read through the next group of sections human care of detainees
is emphasized. Procedures are in
place where complaints can be filed and in various places Geneva Convention
rules are posted so detainees recognize their rights. This next sections concerning employing dogs is interesting.
MILITARY WORKING DOGS
3-33. MWDs offer a psychological and actual deterrent against
physical threats presented by I/R populations. (See FM 3-19.17.) They may be
used—
·
To reinforce exterior
security measures against penetration and attack by small enemy forces.
· As patrol dogs to track escaped prisoners.
· As perimeter security patrols.
· For narcotic and /or explosives detection.
· To deter escapes during external work details
3-34. MWD employment compliance and oversight capabilities
typically exist at the MPC and military police brigade levels.
Responsibilities, to include those for kennel masters, should be embedded
within those organizations to ensure that proper mission-oriented taskings for
MWDs are implemented.
3-35. At the battalion level, the MWD program provides the
capabilities of two patrol explosive detection dogs and one patrol narcotic
detection dog. These MWDs are normally employed exclusively at the TIF/SIF levels.
WARNING
MWDs, contracted
dogs, or any other dog in use by a government agency will not be used to guard
detainees, U.S. military prisoners, or DCs. Additionally, dogs may not be used
as part of an interrogation approach, nor to harass, intimidate, threaten, or
coerce a detainee for interrogation purposes. THIS HUMANE WARNING IS FOUND ON
PAGE 3-12.
As you get deeper into the document tyrannical aspects of these
internment camps manifest especially under the heading STAFF DUTIES AND
RESPONSIBILITIES IN SUPPORT OF INTERNMENT AND RESETTLEMENT. However even in this part the fist 20
sections or so describe various jobs where the workers protect rights of
detainees. Unfortunately most people won’t have the discipline to get deep into
this section where the mischief occurs starting with the Psychological
Operations Officer in section 3-55.
I underlined the sections most disturbing to me.
PSYCHOLOGICAL OPERATIONS OFFICER
3-55. The PSYOP officer in charge of supporting I/R operations
serves as the special staff officer responsible for PSYOP. The PSYOP officer
advises the military police commander on the psychological impact of military
police or MI actions to prevent misunderstandings and disturbances by detainees
and DCs. The supporting I/R PSYOP team has two missions that reduce the need to
divert military police assets to maintain security in the I/R facility. (See
appendix J.) The team—
· Assists the military police force in controlling
detainees and 1.
· Introduces detainees or DC s to U.S. and multinational
policy.
3-56. ThePSYOP team also supports the military police custodial
mission in the I/R facility. The team—
· The team develops PSYOP products that are
designed to pacify and acclimate detainees or DCs to accept PSYOP U.S. I/R facility authority and regulations.
· Gains the cooperation of detainees or DC s to reduce the number of guards needed.
· Identifies malcontents, trained agitators, and
political leaders within the facility who may try to organize resistance or create disturbances.
· Develops and executes indoctrination programs to
reduce or remove antagonistic attitudes.
· Identifies political activists.
· Provides loudspeaker support (such as
administrative announcements and facility instructions when necessary).
· Helps the military police commander control detainee
and DC populations during emergencies
· Plans and executes a PSYOP program that produces
an understanding and appreciation of U.S.
policies and actions.
Note. PSYOP
personnel use comprehensive information, reorientation, and educational and
vocational programs to prepare detainees and DCs for repatriation.
When North Koreans and Chinese soldiers captured American prisoners
they broke down the vast majority of them and brainwashed them so they no
longer supported the American mission in Korea but supported the Chinese and
North Korean goals. Often the same
happened with American prisoners captured by the North Vietnamese
soldiers. I suspect our military
has learned the techniques from our communist enemies and may try to apply these
techniques to American resisters arising in our country. In terms of developing products to
pacify detainees I have read that the Nazis and Soviets found that adding
fluoride to inmate’s water caused them to become more docile. It is likely that drugs and other
substances can be added to food and water to pacify detainees. Here is a link to more medical studies
on fluoride. http://answers.yahoo.com/question/index?qid=20111202061928AAH01qP
I do not vouch for their accuracy or validity. What is scary about some of the fluoride studies is their
claim that the most absorption of fluoride is not through drinking water or the
toothpaste but it is most efficiently absorbed through are skin while we take
showers.
Notice they talk about working with political agitators and
malcontents providing them indoctrination to reduce or eliminate antagonistic
attitudes. These processes were
well established in the communist nations. The 2012 NDAA act compliments the internment camps because
the military can detain anyone they deem as a threat without trial or due
process.
3-57. The PSYOP officer is
an integral part of the I/R structure. The PSYOP officer often may work in
close conjunction with the behavioral science consultation team, if available,
for behavioral assessments and recommendations. The
Page 20
behavioral science consultation
team may develop behavioral management plans and perform many other functions
to assist the PSYOP officer if directed. The I/R facility commander may
designate a location in which PSYOP personnel can conduct interviews of the
various categories of people associated with I/R. This location must be
separate and away from the interrogation areas.
Masters of control realize
negative reinforcement is least affective in controlling others because it
breeds anger and resentment. If
you can truly understand a persons needs, apply the proper behavioral
strategies, propaganda and rewards as well as secretly adding drugs or
substances to food and water the vast majority of people can be controlled
without threats or intimidation.
Those that don’t respond to these strategies can be easily contained,
discredited or isolated from others.
If the system is efficient enough it will be rare that a malcontent will
have to be destroyed because of being a threat to the governing system. If this becomes necessary however, then
poisonous substances can be administered to the subject, causing the subject to
die from what looks like natural causes.
If an autopsy is performed the offending substances will be broken down
so it will seem like the subject died from natural causes.
COUNTERINTELLIGENCE AGENTS
3-59. Counterintelligence
agents may be attached or in direct support of a mission to an I/R battalion or
military police brigade to assist the facility commander with intelligence
requirements for the facility and surrounding area and to ensure the safety and
security of personnel operating in and around the facility.
Note. Counterintelligence
agents may serve as a central repository for information and intelligence on
safety and security issues related to the facility.
3-60. Such responsibilities may include—
· Identification of detainee agitators, leaders,
and their followers.
· Identification of existing clandestine detainee
organizations, to include—
· Strength. Objectives. Member identity.
· Identification of existing underground
communication ssystems—
· Between compounds and internment facilities.
· With indigenous civilian personnel.
· For overt attempts by detainees or local
indigenous people to communicate with each other.
·
Identification
of suspicious activities by local people near the internment facility (such as
photographing or sketching the facility).
· Identification of the
existence of fabricated weapons, stores of food, and supplies of clothing in
the compound.
· Identification of plans by detainees to conduct demonstrations,
to include—
· Date and time.
· Number of detainees involved, by compound.
· Nature of the planned demonstration (passive, harassing, or
violent).
· Identification of detainee objectives, propaganda, and
attempts to weaken or test internment facility authority and security,
establish control in individual compounds, and orchestrate mass escapes.
In my sixth grade history
class when we talks about such people we had a special name for them, secret
police. Every brutal totalitarian
system had them from Stalin, Mao, Hitler, Saddam Husseien to Kim Sung Ill in
North Korea. Once they are in
place no body talks to anyone else for fear of being turned in. Do you really want to go there?
MULTINATIONAL REPRESENTATIVE
3-64. The multinational
representative coordinates visits, to include inspections of conditions for
detainees captured by their forces and coordinating with the detention facility
commander and JIDC (joint interrogation and debriefing center) commander before they participate in interviews
or interrogations.
What is this multinational
representative? Is it a go between
his or her prison camp and those prison camps of other nations? Will these representatives get together
with other international representatives from time to time to share what
strategies and techniques are most effective in dominating and controlling
detainees? Will they over time
develop a system of best practices for their scientific control? Perhaps a four point rubric to judge
the prison camps will be developed.
A level 1 camp is a camp where the detainees are not under complete
control. In fact negative methods
of
Page 21
control backfire leading to rebellions. In a level 2 camp incentives and propaganda are used to infrequently
to control the slaves although from time to time the masters resort to negative
reinforcement to control the slaves.
A level 3 camp employs a lot more propaganda, additives in the food and
water, and positive reinforcement to manipulate the slaves. There is no open rebellion thus no
negative reinforcement or terror to control the slaves. People at times show some discontent
but over all they are satisfied with their lot. A camp scoring a 4 on their rubric relies entirely on
propaganda and positive systems of incentives to control the slaves. In such a camp the slaves are happy and
believe they live in paradise and willing work long hard hours for they have
been completely brainwashed to love their slavery! The masters effectively employed the best practices necessary
to bring about what the slaves believe is utopia on earth. All the slaves are united in the vision
of the masters and there is no dissent or dissatisfaction!
Chapter 4 Capture, Initial Detention
and Screening
All detainees will be
treated according to the GPW and GC unless directed otherwise by competent
authority. Does this mean a competent authority can override
the Geneva convention and other rules of war? Is this an example of rule of man or rule of law?
DETAINEE PROCESSING TECHNIQUE
4-33. Upon capture, Soldiers must process detainees using the
“search, silence, segregate, speed, safeguard, and tag (5 Ss and T)” technique.
This technique provides a structure to guide Soldiers in conducting detainee
operations until they transfer custody of detainees to another authority or
location. Complete the “5 Ss and T” technique as follows:
· Search. Neutralize a detainee and confiscate weapons, personal items, and
items of potential intelligence and/or evidentiary value.
· Silence. Prevent detainees from communicating with one another or making audible
clamor such as chanting, singing, or praying. Silence uncooperative detainees
by muffling them with a soft, clean cloth tied around their mouths and fastened
at the backs of their heads. Do not use duct tape or other adhesives, place a
cloth or either objects inside the mouth, or apply physical force to silence
detainees.
· Segregate. Segregate detainees according to policy and SOPs (standing operating procedures) (segregation requirements differ from operation
to operation). The ability to segregate detainees may be limited by the
availability of manpower and resources at the POC. At a minimum, try to
segregate detainees by grade, gender, age (keeping adults from juveniles and
small children with mothers), and security risk. MI and military police
personnel can provide additional guidance and support in determining the
appropriate segregation criteria.
· Speed. Quickly move detainees from the continuing risks associated with
other combatants or sympathizers who may still be in the area of capture. If
there are more detainees than the Soldiers can control, call for additional
support, search the detainees, and hold them in place until reinforcements
arrive.
· Safeguard. Protect detainees and ensure the custody and integrity of all
confiscated items. Soldiers must safeguard detainees from combat risk, harm
caused by other detainees, and improper treatment or care. Report all injuries.
Correct and report violations of U.S. military policy that occur while
safeguarding detainees. Acts and/or omissions that constitute inhumane
treatment are violations of the law of war and, as such, must be corrected
immediately. Simply reporting violations is insufficient. If a violation is
ongoing, a Soldier has an obligation to stop the violation and report it.
· Tag.
Ensure that each detainee is
tagged using DD Form 2745. Confiscated
equipment, personal items, and evidence will be linked to the detainee using
the DD Form 2745 number. When a DA Form 4137 is used to document confiscated
items, it will be linked to the detainee by annotating the DD Form 2745 control
number on the form.
Note. Segregation
is not intended to be used as an interrogation technique. (See FM 2-22.3.) In a detention facility, segregation
should only be used for security reasons or to separate groups required to be
grouped by the Geneva Conventions (grade, nationality, family).
4-34. To ensure
accountability, each detainee is tagged by the capturing unit using DD Form
2745. Military police at DCPs and DHAs check each tag for—
Page 22
· Date and time of capture.
· Capturing unit.
· POC.
· Circumstances of capture.
4-35. Decisions regarding a
detainee’s current and future status are based on the initial processing at the
POC. Proper processing ensures that U.S. armed forces can take the appropriate
action to release, detain, transfer custody, prosecute, or adjudicate
detainees.
Chapter 5 Detainee Operations
This is the opening paragraph
for chapter 5. Combat operations and stability operations in
the war on terrorism continue to result in the detention of criminals,
combatants, and civilians as military forces seek to support emerging
democracies, mitigate the threat from terrorists, and quell insurgencies. A
common lesson is the requirement to prepare for and conduct detainee operations
as an integral part of full spectrum operations. Modern military actions,
whether in a contiguous or noncontiguous environment characteristic of the war
on terrorism, result in the capture of many and varied detainees. The war-on-
terrorism detainee differs significantly from traditional EPWs of past
conflicts and presents a potentially different and greater type of security
threat during processing, escorting, and handling.
Senator Lindsey Graham in the
introduction stated on C-SPAN that with the passage of the NDAA 2012 that all
of the United States is now part of a battlefield so that the military can
detain anyone without trial or due process until the war on terror is declared
over. In addition, American
citizens have already been detained and the right of the military to do this
has been up held by the American courts.
So it is very possible that detainment facilities for such citizens will
be set up in America.
If you have any doubt that detainees are not being treated like
prisoners consider the visitation procedures.
VISITATION
5-63. Detainee visitations are a deliberate operation,
resource-intensive, and a significant IO (International organizational) builder. The
detention facility commander may grant visitation privileges depending upon the
detainee’s conduct and disposition while in detention. Visitation must be
formally requested and scheduled with the fixed facility detainee visitation
office by the person(s) wishing to visit with a detainee. Scheduled
visitation is based on the number of visitations that may be accommodated for a
specific visitation day. Visitors requesting to visit with a detainee must
provide or obtain their own transportation to the fixed facility on the
specific day that a visitation is scheduled. Visitation staff and guard forces
must know in advance who was scheduled for visitation, and security measures
must be put in place. Visitations take place within the site and require the
following security measures before visitors can be granted access:
· Visitors are only allowed to arrive and request
permission to enter through a specific gate. They must check in with the U.S.
guards manning the visitation security gate access point.
· Guard forces must verify that personnel requesting
visitation are scheduled and that they provide a legitimate form of
identification before access is granted. Upon verification of identity and
scheduled visitation for that particular day, visitors move to the visitor
holding area that immediately follows the visitor access point.
· Once inside the facility, the visitor’s
identification is checked a second time by the visitation staff.
· Visitation
staff members used interpreters to explain visitation procedures to visitors.
· Visitors are required to submit to physical
searches and biometrics enrollment using the Biometrics Automated Toolset
before they are allowed to move to the next phase of visitation processing.
· If a visitor refuses to be searched or fails
biometrics enrollment/verification, the visitor should not be authorized to
visit the detainee and should be escorted off the compound by security
personnel. Additionally, if a visitor refuses to complete in processing
requirements, the visitation staff records it.
· Once biometrics enrollment and verification is
complete, visitors, are seated in a lobby and provided a visitor orientation.
Page 23
· When detainees are removed from fixed facility
compounds, detainee ISNs are verified by the compound guard commander, and the
detainee’s ISN is entered into the Detainee Management System. As detainees are
removed from compounds, they are secured and then escorted to the bus that
transports them to the visitation area.
· Separate bus or truck guards are used to control
the detainees after they are placed on vehicles. When all detainees are on
buses or trucks, they are transported to the visitation area under escort.
Escorts are used to prevent detainees from talking to or intimidating each
other, coordinating, or planning any subversive action against guard forces.
· At the visitation area, guards remove detainees
from buses and escort them to a secure holding area out of sight of visitors.
When all detainees are in the secure compound and an accurate headcount of
detainees is complete, they are searched a second time by guard forces who are
conducting the escort. Detainees are left in the secure holding area, under
guard, until removed and escorted to the building where the visitation takes
place. Guards escort all detainees receiving visitations in the same building
at the same time.
· Generally only eight to ten detainees are allowed
to conduct visitations in the same building at a time. Three visitation
buildings are used at a time for visitations. The guard-to-detainee coverage is
mission variable-dependent but averages one guard to every six detainees. HN
corrections officers assist in guarding and observing visitations in each
individual visitation building. Detainees are escorted into the visitation
building and seated by position on the visitation roster. Once seated and
briefed on visitation rules, guards escort the visitors and position them
across from the visited detainee. The visitation building is split down the
middle by a wall with open window cutouts to allow visitors and detainees to
sit across from, and maintain view of, one another.
· During the visitation session, visitors are not
allowed to have any physical contact with the detainee or pass anything through
the opening without the expressed consent of the guards. Any detainee caught
attempting to have physical contact or take something from a visitor without
proper consent is immediately removed from the visitation site, searched, and
escorted back to the holding area.
Note. Detainee visitors are not be allowed to interact
with, view, or overhear conversations of MI personnel (and their associated
colleagues) or any other U.S. or multinational person who is waiting to
interact with, or detainees. When planning the layout of interrogation rooms
(visiting booths and areas in the immediate vicinity of corridors leading to
and from these areas) commanders and staffs must keep detainee visitors
isolated from other individuals who are working in the I/R facility,
specifically MI personnel and their associated colleagues. Finally, when
establishing an SOP for interrogations and detainee visits, consideration for
precluding the interaction of detainee visitors and MI personnel and their
associated colleagues are carefully addressed.
5-64. Visitations normally last between 1 and 2 hours, depending
on the number of visitations scheduled. While detainees are conducting
visitations, guard forces strictly monitor visitation events and conversations.
Guards and interpreters should observe detainee or visitor verbal and nonverbal
actions. Additionally, guards should look for gestures that may be used as
codes or actions that may be symbolic of some sort of clandestine
communications method.
Note. Guard forces and fixed-facility staff reserve
the right to end visitation sessions any time the threat environment within the
fixed facility increases for any reason. In the event this occurs, detainees
are to be placed back into the holding area and visitors are escorted back to
the visitation processing center and then offsite through the visitation gate.
5-65. Following visitation, detainees are placed back in a holding
area and searched. At the same time, visitors are returned to the visitation
reception area, searched, and escorted to the gate for release from the
compound. Throughout the
entire visitation process, detainees and visitors must be treated with precise
respect and courtesy. Local customs are upheld as much as possible, unless they
become an issue with security requirements set forth by the detainee visitation
policy.
5-89. Security planning must be continuous and complete to reflect
current intelligence relating to the nature and characteristics of the
individuals under custody and control. Specific planning must be completed to
ensure that capabilities are available to prevent and thwart group
disobedience, uprisings, outbreaks, and escapes. Planners must provide for an
immediate response that is capable of meeting any
internal or external threat to the security of the specific
facility. Military police should never forfeit their ability to maintain
positive control.
Page 24
5-90. The physical
construction of the DCP, DHA, or TIF and the presence of guard personnel create
the most obvious means of providing security, internally and externally. The
use of existing structures is ideal for conducting detainee operations. The
facility commander plans for and executes effective perimeter security
operations for the internment facility. Planners should enforce a
double-barrier system along external perimeters (sally ports, access control
points). At a sally port, where there are two means of entry, both entry points
should never be open at the same time. Security forces should implement random
security and search measures inside cells and in other areas where detainees
congregate. Military police should strictly enforce weapons discipline by
adhering to weapons clearing and turn-in procedures.
Chapter 6 Detainee Facilities
SITE PLANNING AND SELECTION
6-5. …The first requirement is to ensure
that the correct number and type of personnel and construction material are on
the ground, well in advance of the start of hostilities, to conduct the
operation… Many alternative news sources in the united States
believe that the economic collapse of our nation was engineered by the elites
long ago. Knowing that trouble
might occur once the collapse is well underway, camps plus the rules for their
operation have been in place for many years if members of our population become
unruly. Some sources claim 800
internment camps already exist throughout the country capable of holding
millions of individuals.
6-7. …The U.S. Army Corps of Engineers
Theater Construction Management System contains basic plans, specifications,
and material requirements for detainee facilities based on the anticipated
detainee population. 6-8. When
constructing a facility, planning considerations may include, but are not
limited to—
· Clear Zones. As appropriate, mission variables determine the clear zone
surrounding each facility that houses detainees. Construct at least two fences
(interior and exterior) around the detainee facility and ensure that the clear
zone between the interior and exterior fences is free of vegetation and shrubbery.
· Guard towers. Locate guard towers on the perimeter of each facility. Place
them immediately outside the wall or, in case of double fencing, where they
permit an unobstructed view of the lane between the fences. The space between
towers must allow overlapping observation and fields of fire. During adverse
weather, it may be necessary to augment security by placing fixed guard posts
between towers on the outside of the fence. Towers must be high enough to allow
an unobstructed view of the compound and low enough to permit an adequate field
of fire. The tower platform should have retractable ladders and should be wide
enough to mount crew-served weapons. Another consideration involves using
nonlethal capabilities from guard towers.
· Lights. Provide adequate lighting, especially around compound
perimeters. Illuminating walls and fences discourages escapes, and illuminating
inner strategic points expedites the handling of problems caused by detainees.
Lights should be protected from breakage with an unbreakable glass shield or a
wire mesh screen. Ensure that lights on the walls and fences do not interfere
with the guards’ vision. Provide secondary emergency lighting.
· Patrol roads. Construct patrol roads for vehicle and foot patrols. They should
be adjacent to outside perimeter fences or walls.
· Sally ports. A sally port is required to search vehicles and personnel
entering and leaving the main
compound. It is recommended
that a sally port be placed at the back entrance to the facility.
· Communications Ensure that communication between the towers and
the operation headquarters is reliable. Telephones are the preferred method;
however, ensure that alternate forms of communication (radio and visual or
sound signals) are available if telephones are inoperable.
DETAINEE COLLECTION POINT
6-10. DCPs are generally nothing more than a guarded, roped-off
(with razor or concertina wire) area or a secured building (see figure 6-2).
The capture rate and the number of detainees determine the size of the DCP. The
use of existing structures (vacant schools, apartments, warehouses) is
encouraged to conserve resources and provide
protection for detainees. Detainees are treated humanely and as EPWs (enemy prisoners of war) until their status is determined
Page 25
according to
DOD policy. More data to suggest
facilities meant to be prisons.
Segregate.
Segregating detainees should be done according to policy and SOPs. Segregation
requirements differ from operation to operation. The ability to segregate
detainees may be limited by the availability of manpower and resources. MI
personnel and military police can provide additional guidance and support in
determining appropriate segregation criteria. Establish and maintain
segregation based on mission variables. Within the DCP, detainees are further
segregated into the following categories.
· Leaders (perceived status and positions of
authority).
· Hostile elements (hostile religious, political,
ethnic groups).
· Security risks (agitators, radicals,
uncooperative detainees).
· Civilian.
· Military by grade (officers, NCOs, enlisted).
· Deserters.
· Those who surrendered from those who resisted
capture.
· Minors.
· Females (if possible, keep small children with
their mothers).
· Males.
· Groups of CIs (Civilian Internees)
· RP, (Retained Personnel) and
enemy combatants if known.
· Nationality.
· Suspected criminals.
· Other persons (those not in one of the above
categories). Note again families are split up and children are
taken away from parents except small children stay with mothers. It is not clear if families are
reunited at some later point while in internment camps.
6-16. Military police must
not speak to detainees except to give orders or directions. Do not let
detainees talk to or signal each other during the processing phase at any
echelon. This prevents them from plotting ways to counter security, planning
escapes, or orchestrating other undesirable activities. Detainees who refuse to
be silent may require a muffle (an item used to prevent speech or outcry
without causing injury to the detainee, such as cloth) in certain tactical
situations.
INTERNMENT SERIAL NUMBERS
6-52. The ISN is the DOD-mandated identification number used to
account for and/or track detainees. (See figure 6-6, page 6-16.) Once an ISN is
assigned, it is used on all documentation, including medical records. The ISN
is generated by the Detainee Reporting System. The Detainee Reporting System is
the only approved system for maintaining detainee accountability. It is the
central data point system used for reporting to the national level and sharing
detainee information with other authorized agencies. ISNs are normally issued
within 14 days of capture, regardless of where detainees are held, or according
to applicable policy. The ISN is comprised of the—
· Capturing power (a two-digit alpha character
code representing the capturing power). Only country codes found in the Defense
Intelligence Agency manual (DIAM) 58-12 are used.
· Theater code (a one-digit number representing
the command/theater under which the detainee came into U.S. custody).
· Power served (a two-digit alpha character code
representing the detainee’s power served [the country the detainee is fighting
for]). Only country codes found DIAM 58-12 are used.
· Sequence number (a unique six-digit number
assigned exclusively to an individual detainee). The Detainee Reporting System
assigns these numbers sequentially. If a detainee dies, is released, is
repatriated, is transferred, or escapes, the detainee’s number is not reissued
during the same conflict.
· Detainee classification (a two- or three-digit
alpha character code representing the detainee’s classification). Current
classifications are CI, RP, and enemy combatants. Enemy combatants are further
divided into EPWs and members of armed groups.
Page26
·
US9AF-000234RP An Example of a ISN Code. Every detainee has one!
· Every detainee will have a 13
character identification consisting of numbers and letters. From the above bullets and the state of
our technology it seems like a highly effective way to keep track of detainees!
6-57. The detainee identification band permits the rapid and
reliable identification of each detainee. Identification bands enhance facility
administration and operation. The Detainee Reporting System can create
identification bands that show the ISN number, name, and photo of the detainee.
If the Detainee Reporting System is not available, record the detainee’s ISN
and last name on the identification band and secure it to the detainee’s left
wrist. If appropriate bands are not available, use a medical wristband or
something similar. These are nicer than the number tattoos the Nazis
gave in their camps!
THEATER INTERNMENT FACILITY
6-59. The TIF is a permanent or semi-permanent facility (normally
located at the theater level) that is capable of holding detainees for extended
periods of time. A TIF is a long-term internment facility that is operated
according to all applicable laws and policies…
6-60. The TIF is the first location where detainees may be held
for extended periods of time…
6-64. Choosing locations for TIFs is critical during the planning
phase. The location of each facility will affect its ability to receive
supplies. Another reason permanent camps were built long
ago.
6-65. Planning for operations at the TIF is a much greater
challenge than at lower echelons. Planning the amount of support, ranging from
medical to engineer, is time-consuming and critical to ensuring successful
detainee operations. Proper planning before operations commence is vital. The
planning should focus
across the DOTMLPF domain to ensure that all requirements are met.
Synchronization with adjacent staff elements and commands is another important
element.
Escape Prevention and Early Detection at Prison Camps
6-116. Detainee escapes can be kept to a minimum through proper
security precautions. These precautions include—
· Conducting periodic, unannounced, and systematic
searches of internment facility areas to detect evidence of tunneling and to
discover caches of food, clothing, weapons, maps, money, or other valuables.
· Maintaining strict accountability for tools and equipment
used by or accessible to detainees.
· Inspecting perimeter fencing daily to detect cut
wire evidence or other weaknesses in the fence.
· Assessing lighting systems during hours of
darkness to detect poorly lit areas along the perimeter. Immediately replace
any burned out or broken light bulbs.
· Conducting training, to include refresher
training, to ensure that guard and security personnel are thoroughly familiar
with security precautions, techniques, and procedures.
· Searching vehicles and containers taken into or out
of the internment facility.
· Closely supervising the disposition of unconsumed
rations in the internment facility and on work details to prevent the caching
of food supplies.
6-117. Conduct ISN counts and head counts on a regular and an unannounced
basis Conduct roll calls at least
twice daily, preferably early in the morning and again before “lights out. Conduct other head counts
independent of roll calls. Appropriate
times for additional detainee head counts might be immediately following a mass
disturbance, the discovery of an open tunnel, or the detection of a hole or
break in the fence.
The following measures will assist in the early detection of
escape attempts:
Conduct head counts at
frequent intervals while on work details and en route to another internment
facility.
STRATEGIC INTERNMENT FACILITY
6-131. A
SIF is a facility, designated by the Secretary of Defense or a designee, with
the capability to further detain and/or exploit detainees who hold strategic
intelligence or who pose a continuing threat to the U.S. or U.S. interests.
Detainees are normally noncompliant and may pose a high security risk to the
United States. A SIF will usually
resemble a TIF with respect to the operating procedures implemented and stated
in the section above, but it is task-organized for specific detainees.
This type of facility holds
the most dangerous detainees that challenge the power structure.
Chapter 7 Confinement of U.S. Military
Prisoners
Aside from the normal and
continuing mission for confinement of U.S. military prisoners at Fort
Leavenworth and other permanent locations, there is a requirement to be
prepared for confinement outside established facilities. In a mature theater,
military police may be required to operate a field detention facility (FDF)
and/or a field confinement facility (FCF) to hold or confine U.S. military
prisoners for short terms. This short term may be as part of pretrial or post
trial confinement. Post trial confinement may include temporary custody until
the prisoner is evacuated from the theater to a permanent confinement facility
or short-term sentences as determined by the combatant commander. This
is the beginning over the opening paragraph of chapter 7. For over 200 years we have confined
military prisoners at permanent facilities. All of a sudden we need to build more facilities to confine
more military prisoners? Anybody
else smell a dead rat here?
MEALS
7-21. Prisoners are
provided with wholesome and sufficient food prepared from the Army Master Menu.
They are normally supplied with the full complement of eating utensils. (The
FCF commander must approve the nonissue of eating utensils for security or other
reasons. Prisoners in close confinement and those with loss of privileges
associated who have approved disciplinary action may be denied supplemental
rations described on the Army Master Menu.) Alternate meal control procedures
may be authorized by the FCF ( Field
Confinement Facility) commander or a designated
representative as a means to prevent staff and prisoner injury when a prisoner
may have tampered with food. These procedures require documentation on DA Form
3997 and the concurrence of a medical officer. Meal control procedures will not
exceed 7 days.
ESCAPE
7-54. Each guard is provided with a whistle or another suitable
means of audible alarm. Using firearms to prevent an escape is justified
only when there is no other reasonable means to prevent escape. (See AR
190-14.) (Does this apply to all prisoners, even ones that are not
dangerous such as displaced civilians?
In the event that a
prisoner attempts to escape from the confines of the FCF, the guard takes
action according to the following priorities:
· Alerts other guard personnel of the attempted
escape by blowing three short blasts on a whistle or by sounding another
suitable alarm signal.
· Orders the prisoner to halt three times in a
loud voice.
· Fires only when the prisoner has passed all barriers
of the FCF (Field confinement facility) and is continuing the attempt to escape. Does this apply to all prisoners or just the dangerous ones?
7-55. The location of barriers is determined by the physical
arrangement of the FCF. Normally, barriers include fences or walls enclosing
athletic, drill, recreational, and prisoner housing areas and administrative
buildings.
7-56. A guard does not fire on an escapee if the action of firing
will endanger the lives of other persons. When firing is necessary, the guard
directs shots at the prisoner with the intent to disable rather than to kill.
Guidelines for the use of firearms by guards escorting prisoners outside the
FCF are generally the same as those for the use of firearms at the FCF. (See AR
190-47.)
7-57. The FCF commander ensures that guards are trained to use the
weapons with which they are armed. All personnel are thoroughly trained on
policies regarding the use of force and the provisions of AR 190- 14. Only
12-gauge shotguns with cylinder (unchoked) barrels are issued for use by FCF
guards, and barrels will not exceed 20 inches in length. Authorized ammunition
for armed guards (perimeter and escort guards) is Number 9 shot in trap loads
of 23⁄4 drams equivalent of power and 11⁄8 ounces of shot. Tower guards may use
00 buckshot ammunition.
7-58. Tower guards and escort guards are instructed that the
shotgun will not be fired at a range of less than 20 meters to prevent prisoner
escapes. Such instructions will appear in prisoner guard training programs and
in special instructions prepared for guard personnel.
Page 28
7-59. The M9 pistol and
M16 and/or M4 rifles are used when prisoners are under escort. Machine guns and
submachine guns are not to guard U.S. military prisoners. Weapons are not taken
inside controlled areas of the FCF, except at the expressed direction of the
FCF commander.
Chapter 8 Rehabilitation of U.S. Military
Prisoners and Detainees
The rehabilitation of U.S.
military prisoners has long been practiced, but it has only recently become a
focus for detainees. Lessons learned have highlighted this critical
requirement, and military police have been actively involved in a complete
reengineering of apprehension, detention, and release procedures for detainees
as a result. These new detention procedures are based on rehabilitation and
reeducation programs for Islamic extremists developed in Singapore and Saudi
Arabia and incorporate lessons learned from Abu Ghraib and other recent and
historical U.S. involvement with detainee operations. The rehabilitation
procedures also draw from established policies and procedures for
rehabilitation that are already effectively employed for U.S. military prisoners.
The rehabilitation of detainees plays a critical role in counterinsurgency
operations and benefits the overall counterinsurgency strategy. This is the opening paragraph of chapter 8. The military has been working very hard
to win the hearts and minds of the people that oppose them. They have been involved in
counterinsurgency operations in Vietnam, Iraq and Afghanistan. They have learned a great deal and some
day they maybe forced to apply this knowledge against people at home who may
wish to reestablish the former Constitutional Republic.
8-1 Issues of apprehension,
incarceration, recidivism, and programs to curb violent behavior in released
persons is a long-studied subject by generations of scholars. Entire
organizations are built around these issues and take years of in-depth analysis
to reach conclusions for policy application. This is further complicated by the
conditions in a combat zone.
8-3 Detention or
imprisonment can be a period of transitory idleness where the U.S. military
prisoner or detainee simply endures the period of his internment and
contemplates the humiliation or perceived injustice of his condition.
Conversely, it can be one of the most productive and auspicious rehabilitative
measures that society can provide the individual and his respective
society… Perhaps with the above in mind prisoners have been
kept busy in many ways. One is
through employment. Also classes along
with counseling and mental health programs are offered.
8-15. Another element of the correctional program involves
employing U.S. military prisoners. (See AR 190-47 for more information on U.S.
military prisoner employment.) Several considerations involved with employment
include—
Nature of work.
Prisoners are employed in maintenance and support activities that provide work
of a useful, constructive nature that is consistent with their custody grade,
physical and
mental condition, behavior,
confining offense, sentence status, previous training, individual correctional
requirements, and installation or facility needs. In general, prisoners are
employed through a standard 40-hour workweek…
8-22. The complexity of TIF operations associated with long-term
rehabilitation begins with the identification and assessment of who is being
detained within the fixed I/R (Internment/Resettlement)
facilities. This assessment starts at the POC by
conventional and special operations forces and continues throughout the
internment of those detained, up to and through the reconciliation process. The
former doctrinal segregation of officers, enlisted, civilians, and females now
extends to ethnic groups, tribes, behaviors, religious sects, juveniles, and
other categories. An inaccurate assessment can have immediate and significant
effects that could result in injury or death to detainees, contribute to
insurgency ideals, and cause major custody and control problems within the
fixed I/R facilities
8-24. Throughout the custody process, the methods used to identify
and segregate insurgents and those susceptible to their recruiting efforts are
important. Interrogators and investigators should realize the operational
advantages that can be gained through reengaging detainees and continuously
assessing the information available within the fixed I/R facility. The
development of enduring processes that exploit information gleaned from the
population inside the facility
Page 29
is critical to the safety and security of the
facility cadre and detainees, and can provide information actionable
intelligence to support ongoing operations outside the facility. This source of
intelligence can be especially relevant in support of a counterinsurgency
effort.
8-25. U.S. forces conducting detention operations must balance
several requirements for fair and humane treatment with security and protection
efforts within the facility. Cultural considerations may further complicate
the conduct of operations and how personnel interact with detainees. The
following factors are considered when implementing detention policy: …
8-27. Detention facility commanders and detention cadre should
ensure that detainee schedules are rigid, predictable, and filled with
educational, life skills, and vocational instruction. Account for time for
instruction on a broad range of subjects, with a curriculum
coordinated with the HN (Host Nation). Beyond basic education for the younger or
poorly educated detainees, the curriculum may also include HN politics, HN
constitution, and the structure of the HN government. Other worthwhile periods
of instruction may include money management, job applications, basic computer
skills, basic communication skills, hygiene, first aid, reporting crimes and
suspicious activity reporting, and community familiarization and awareness.
I am in the process of highlighting both interesting details and the
totalitarian aspects of this document. If you read the document in its entirety you will see that
the military bends over backward to provide rules and procedures to safe guard
fair and humane treatment of prisoners and detainees. Unfortunately once a country becomes an empire and engages
in constant war to protect its possessions, it creates the conditions where
liberty dies and totalitarianism flourishes. After reading the above four sections even the most enlightened
liberty loving staff cannot avoid creating monstrous totalitarian
internment/resettlement camps. Note in the last section 8-27 every aspect of the
prisoners and detainee’s lives are controlled. The staff structures the environment in this way for its own
and the prisoner’s protection.
However, the characteristic that elevates totalitarianism from all
other forms of tyranny is that all aspects of the citizen’s lives are
controlled.
8-51. All detainees will receive a behavioral health screen when
in-processing and before distribution into the general population. A translator
will be used to translate between the screener and the detainee. The behavioral
health screen will be conducted by a behavioral health team member. Each
detainee will be screened individually to maximize privacy. The behavioral
health screen will include whether the detainee has a present suicide ideation,
the history of suicidal behavior, the history of (or current) psychotropic
medication use, current behavioral health complaints, the history of behavioral
health treatment, and/or the history of treatment for substance abuse. During
the behavioral health screen, each detainee will be observed for general
appearance and behavior; evidence of abuse and/or trauma; and current symptoms
of
psychosis, depression, anxiety, and/or aggression. After
screening, each detainee will be recommended for placement into the general
population, placement into the general population with appropriate referral to
behavioral health, or referral to behavioral health for an emergency assessment
prior to placement into the general population. The screening will begin with
an introduction and explanation of the nature and purpose of the screen. Each
question will be asked by the screener and translated by the translator. Under
no circumstance will a translator conduct the screen. Behavioral health
screening forms will not be presigned, and detainees will not be screened in
groups. The original completed screen will be placed in the detainee’s
individual medical record. I included this because on paper and if
implemented correctly, it would be helpful to all! However this process can be easily abused and such abuse was
raised to an art form in the former Soviet Socialist Republics and other
communist nations where political dissidents were routinely diagnosed as being
mentally ill and incarcerated indefinitely in mental hospitals. To examine this barbaric practice in
greater detail see the writings of the dissident Alexander Solzhenitsyn. Also according to the following report from Seton Hall University
School of Law, Policy Center, dangerous drugs already have been given to
detainees at Guantanamo. http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1846784 Can also google Drug Abuse: An
Exploration of the government’s use of mefloquine at Guantanamo if the link
becomes unusable.
Chapter 9
Transitioning Detainees Into their Societies.
The following section caught my eye, because it shows that various Federal
and international groups involved in building, running and dismantling the
internment/resettlement camps.
9-49. The key objectives of the transition of detainee operations
are numerous and complex. Key players within this transition plan include—
·
Department of the State
officials, to include public diplomacy personnel.
·
Department of Justice.
Page 30
·
DOD. (Department of Defense)
· U.S. Agency for International Development.
·
Foreign governments.
·
NGOs and international organizations.
·
Private contractors.
· Ministry of interior and local justice and police
personnel.
Chapter 10 Resettlement Operations
Although security restrictions are less
once prisoners and civilians are resettled there are still many aspects
reflecting a police like state.
Here is the introductory paragraph to chapter 10. Even after inmates are resettled there
are many totalitarian aspects to this process. I underlined them below.
Resettlement operations occur across the spectrum of military
operations. Such operations include civil support operations and foreign
humanitarian assistance operations. Events under the category of resettlement
operations include relief, CBRNE, (Chemical, biological, radiological, nuclear and high yield
explosive) civil laws, and community
assistance operations. Military police provide support to resettlement
operations, which include establishing and operating facilities and supporting
CA (civil affairs) efforts to ensure that supply routes remain open
(mainly linked to the maneuver and mobility support function) and clear to the
maneuver commander. Additional tasks that support resettlement operations
(conducted within the law and order function) include curfew enforcement,
movement restrictions, the use of travel permits and registration cards, proper
checkpoint operations, amnesty programs, and inspections. The level of control
is typically drastically different from that of most interned persons during
detainee operations. During detainee operations, the level of control and
supervision is high, based on the significant and evident security risks.
During resettlement operations, DCs are allowed freedom of movement as long as
such movement does not impede operations. Security risks will always be
present, but they should be reduced in most resettlement operations. Counterinsurgency
operations may affect, or be affected by, resettlement operations; and ongoing
insurgency operations will tend to blur the lines between internment operations
and resettlement operations.
Note* I found the acronym for the events
detainees face, chemical, biological, radiological, nuclear and high yield
explosive as telling. It is public
knowledge although not well known that depleted uranium weapons causing low
level radiation are employed in our present conflicts. Even the proponents of such weapons
admit we don’t know the longterm impact of the weapons on the soldiers or the
locals. This link has more
research in depleted uranium weapons. http://unclesamenterstheendgamepart3.blogspot.com/ Go
to the article U.S. Military Openly Utilizes Low Grade Nuclear Weapons
(Depleted Uranium) That May Kill For Billions of Years In Afghanistan, Balkans
and Iraq! These Weapons Over Time
May Also Kill the Soldiers Exposed to Them pages 42-55.
10-2. Often, the primary objective of resettlement operations is
to minimize civilian interference with military operations, and this is
typically linked to the maneuver and mobility support function. However, the
primary or supporting objectives of resettlement operations may also be to—
· Protect DCs from combat operations.
· Prevent and control the outbreak of disease.
· Relieve human suffering.
· Centralize masses of DCs.
· It is now public knowledge that scientists only
need to manipulate a few genes in the bird flu virus to create a virus that
could kill up to 90% of the people exposed to it. One of the fears of the alternative media is that such a
virus will be released in various places.
Governments throughout the world could then placed the people in these
camps and severely restrict their movements in order to protect them from
exposure to it. We would never
know if such a thing happened if it was performed by terrorist or whether
governments facilitated it to gain more power at our expense
10-3. The specific planning focus of resettlement operations may
differ at each level of command and will vary depending on the type and nature
of detainee operation being performed and other relevant aspects of
the OE (operational environment). All commands and national and international
agencies involved must have clearly defined responsibilities. When planning and
executing resettlement operations, consider the following actions:
Coordinate with the Department of State, the UN Office for the
Coordination of Humanitarian Affairs, and HN civil and military authorities to
determine the appropriate levels and types of aid required and available.
· Minimize outside contributions (issue basic
needs items only) until DCs become self-sufficient, and encourage DCs to become
as independent as possible.
· Review the effectiveness of humanitarian
responses, and adjust relief activities as necessary.
· Coordinate
with CA units to ensure the use of U.S., HN, international, and other
organizations (UN Children’s Fund, Cooperative for Assistance and Relief
Everywhere). Receiving assistance from these organizations capitalizes on their
experience and reduces the requirements placed onU.S. armed forces.
· Apply security restrictions, as required, for DCs. Under international laws, DCs have the right to freedom of movement;
but in the event of a mass influx of DCs, security considerations may require
restrictions. I include this section to emphasize the
international nature of these processes.
10-33. Military
police will typically be required to account for DCs and report to higher
headquarters. This may require the issuance of ISNs or control numbers that are
specific to DCs. See section 6-52 to find out more about the internment serial
number given to every detainee! Commanders conducting resettlement operations
ensure a proper understanding of the ISN issuance policy before assigning an ISN
to a DC. Even in civil support operations where social security numbers may be
used, a supporting system will be required for those without social security
numbers.
10-40. Resettlement operations typically include controlling
civilian movement and providing relief to human suffering. These operations may
be performed as domestic civil support operations (due to natural or man-made
disasters), stability operations (due to noncombatant evacuation operations,
humanitarian- assistance operations), or DC operations (due to combat
operations). The authority to approve resettlement such
operations within U.S. territories is at the Secretary of Defense level and may
require a special exception to Title 18, USC (Posse Comitatus Act). The Posse
Comitatus Act prohibits the U.S. military from enforcing civilian laws within
the United States or its territories without specific authorization. The U.S. Constitution and other federal, state,
and local laws may directly and significantly affect operations in the U.S. and
its territories if the enforcement of civilian laws are required according to
Title 10, USC. U.S. military forces conducting law enforcement functions in
such cases require an authorization through a congressional act (for example,
Title 10 USC, Sections 331 through 334 [Insurrection Statues]) or a
constitutional authorization (for example the President invoking his executive
authority under Article 2 of the Constitution). U.S. Army National Guard
Soldiers operating in a nonfederal status are not restricted by the Posse
Comitatus Act. (See Title 32, USC, and JP 3-28.) Interesting parts underlined.
This section seems to imply that camps can be set up on u.S
territories! Of course this was
written before the passage of the National Defense Authorization Act of
2012. In this act in sections 10-21. 10-22 and 10-31 and 10-32 give
the military permission to detain Americans without trial. If that is so, then camps need to be
available to detain them!
If you google The
National Detainee Reporting Center or go to the following website http://www.bethesda-afcea.org/Events/LEIT_2009/Presentations/MSG_Bragg.pdf you
are given a simple powerful presentation of how detainees are labeled in the
camps where our Anglo-American Corporate Empire is engaged in various wars.
10-55. Active police intelligence operations conducted within and
around the resettlement facility are critical to maintaining order and
security. Through active and passive collection activities, criminals,
agitators, enemy plants, and other disruptive elements can be identified early
and measures taken to mitigate (or remove) these elements and their activities
prior to significant negative impacts on the facility and the personnel living
and operating within the facility.
Might be proper and necessary
to protect troops in foreign nations but could be used against us in united
States for those attempting to restore a Constitutional Republic?
Page 32
10-57. The
NDRC (National Detainee Reporter
Center) has the ability to assist
commanders in establishing an automated Detainee Reporting System to process
DCs. (See chapter 1. and chapter 6) See also the website above. This portable Detainee Reporting System (jump kits) will
assist in processing identification cards, ISNs, and demographic information.
An identification card is used to facilitate the identification of a DC. It
contains the DC’s name, photograph, and control number. The control number may
be an ISN or a sequenced control number specific to the DC. Identification
cards or bands permit identification by categories. (See chapter 1. and chapter
6) An identification band permits rapid, reliable identification of an
individual and may also be used in resettlement operations. While DCs cannot be
prevented from removing or destroying identification bands, most will accept
their use for identification purposes. When identification bands or cards
deteriorate, replace them immediately.
The American military to
control hostile populations in conjunction with other international forces such
as NATO has plenty of experience in Bosnia, Iraq and Afghanistan utilizing
these identification strategies to control hostile populations. Legislation passed through Congress
allows camps to be set up on U.S. soil if authorities deem they are necessary
during times in civil strife that may occur if our economy collapses. The question is will the American
military follow rules in violation of our Constitution?
10-67. The resettlement facility commander publishes, enforces,
and updates the rules of conduct as necessary. The commander serves as the
single point of contact, coordinating all matters within the
resettlement facility and with outside organizations or agencies.
Facility rules are brief, but clear, and kept to a minimum. The rules in figure 10-1 are similar to those used
in support of Operation New Arrivals in August 1975 at Indiantown Gap, Pennsylvania.
They also parallel the rules posted in support of Panama’s Operations Just Cause
and Promote Liberty and Hurricane Katrina relief operations in New Orleans.
Figure 10-1. Sample
facility rules (Resettlement Facilities)
1. Do
not move from assigned barracks without permission.
Note. Military
police in an I/R facility assign individuals to designated barracks. Only the
administrative staff can change barracks assignments. Occupants desiring to
change barracks must request permission from the area office.
2. Maintain
the sanitary and physical condition of the barracks. Note. Barracks
chiefs organize occupants to perform these tasks.
3. Empty
and wash trash cans daily, and put the trash into the trash dumpsters in the
barracks area.
4. Do
not bring food or cooking utensils into the barracks. Do not take food from the
dining area (other than baby food and fruit).
5. Do
not have weapons of any kind in the barracks and in the surrounding facility.
6. Do
not have pets in the barracks. Pets are contained in the animal compound.
7. Observe
the barracks lights-out time of 2300. Barracks indoor lights are turned out at
2300 each night. Do not play radios or compact disc players after 2300.
8. Do
not allow children to play on the fire escape because it is very dangerous.
9. Watch
children carefully, and do not allow them to wander out of the residence areas.
10. Do
not throw diapers or sanitary napkins in toilets. Place these items in trash
cans.
11. Do
not allow children to chase or play with wild animals. These animals may bite
and carry diseases.
12. Obtain
necessary barracks supplies from the barracks chief.
13. Do
not smoke, use electrical appliances for heating or cooking, or have open fires
in the barracks. Military police should designate a location for cooking and/or
heating food.
10-69. The
resettlement facility commander takes positive action to establish daily or
periodic routines and responses that are conducive to good discipline and
control. Resettlement facility personnel—
·
Enforce policies and
procedures that provide the control of facility residents.
·
Give reasonable, decisive
orders to DCs in a language they understand.
Page 33
· Post facility rules, regulations, instructions,
notices, orders, and announcements that facility residents are expected to obey
in an easily accessible area. This information is printed in a language
understood by the DCs.
· Those individuals who do not have access to the
posted copies will be given a copy.
· Ensure that DCs obey orders, rules, and
directives.
·
Report DCs who refuse or
fail to obey an order or regulation.
·
Not fraternize with DCs.
·
Not donate gifts or receive
gifts from or engage in any commercial activity with DCs.
.
I included sections 10-67 and 10-69 to illustrate that re-settlement
camps although more free than the internment camps still because of their
nature will control large parts of the civilians lives and maintain many
elements of a police state. Even
though the document calls for detainees to play an ever increasing role in
governing themselves, I do not believe they can escape the tyrannical
stains.
In the document they also talk about temporary less than 6 months to
semi-permanent and permanent facilities that can last many years. Although staff may have the best
intentions of returning detained persons back to their homelands, factors
beyond their control may make such a dream impossible. In the Israeli war for independence in
1948 thousands of Palestinians were displaced from their homes and many entered
refugee camps where they still reside 64 years later. According to a 1993 study, at that time 43 million were
refugees from war throughout the world. http://www.ncbi.nlm.nih.gov/pubmed/8331759
Some never return home while others are displaced in refugee camps for
years! Thus the idea of
contemplating internment camps within the U.S. or anywhere is abhorrent.
This ends the chapters.
The rest of the paper contains the various appendixes describing various
items in greater detail.
Appendix D
Application of the
Geneva Conventions to Internment and Resettlement Operations
In Appendix D more fully describing treatment of detainees according
to The Geneva Convention and other international agreement. The first section that is applied to
U.S. soldiers says volumes!
D-1. DOD
(Department of Defense) policy is to apply the Geneva Conventions in all
military operations unless directed otherwise by competent authority, usually
at the theater level or above (the same level of authority that designates
hostile forces).
Appendix E
Agencies Concerned
With Internment and Resettlement Operations
In Appendix E you can see both the Federal government and
International organizations involved with this process. I have no way of knowing how involved
they were or if they had similar views to what is expressed in the leaked Army document.
Appendix H
Use of Force and Riot
Control Measures
H-2. Planning
and preparing for the use of force is a necessary element in maintaining order.
Commanders ensure that detainee facility security personnel are prepared for
the effective use of force when necessary to protect themselves, other members
of the force, or detainees. Commanders also ensure that the RUF (rules for use of force) continuum is applied when force is required to
control detainees. Personnel assigned the mission of controlling detainees and
providing security of the detention facility are issued and trained on the RUF
specific to that mission. Theater ROE (rules of engagement) remain in effect for defending the detention facility from
external threat. The RUF continuum is used in determining the appropriate
amount of force needed to compel compliance. (See figure H-1, page H-2.) The
use of deadly force against detainees is always considered a measure of last
resort. Its use is authorized when no other means of suppressing the dangerous
activity (attack, escape) is feasible. Furthermore, the use of deadly force
is preceded by warnings appropriate to the circumstances. The continuum
recognizes five basic categories:
Page 34
· Lethal.Attempts to kill or inflict serious injury (using knives, clubs, objects,
firearms).
· Assaultive.
Attempts to attack or inflict injury (striking with hands or feet, biting).
· Actively resistant.Does not follow orders and offers physical resistance,
but does not attempt to inflict harm
(bracing or pulling away, attempting to flee).
· Passivelyresistant.Does not follow orders,but offers no physical resistance
toattempts to gain control (going limp).
· Compliant. Offers no resistance to instruction and complies with directions.
H-3. The continuum also incorporates five levels of force. (See
figure H-1) Ideally, the service member starts at Level 1 and progressively
moves up the continuum until the detainee complies. However, the use of force
is dictated by the actions of the subject during the encounter. Subject actions
may escalate or deescalate rapidly, possibly skipping one or more levels. There
is no requirement for the following levels of force to be applied in order:
· Level 1: Cooperative controls. Used to direct a compliant person (verbal
direction, hand gestures).
· Level 2: Soft controls. Used when cooperative control fails and the
level of force required escalates. They are designed with a low probability of
causing injury (compliant or noncompliant escort positions, use of hand and/or
leg restraints).
· Level 3: Hard controls. Used when escort positions fail and the level
of force required escalates. They have a slightly greater possibility of causing
injury (pressure points, joint locks, oleoresin capsicum spray [such as pepper
spray], electronic stun devices).
· Level 4: Defensive techniques. Used when hard controls fail and the level of
force required escalates. They also have a higher probability of causing
injuries. (empty-hand strikes and blocks, baton strikes and blocks, NLWs, (nonlethal weapons) and MWDs) (military working dogs).
· Level 5: Deadly force. Used as a last resort when all lesser means
have failed or would be impractical. Used to prevent death or serious injury to
self or others; to prevent the theft, damage or destruction of resources vital
to national security or dangerous to others; or to terminate an active escape
attempt (firearms and strikes with nonlethal weapons should be directed at
vital points of the body). Quite a bit of time is used to describe non lethal
weapons NLW to control populations while reducing the chance of permanently
injuring or killing detainees.
Riot Control
H-40... Plans must contain information on how the riot control
agents are employed to cover the target area with a cloud of sufficient
strength to produce decisive results. Once the proper concentration is reached,
the control force must maintain that concentration until the rioters are
channeled into the predetermined area. When dispersers are used, the dispersal
team maintains the concentration by moving the disperser along the release line
at an even rate. They maintain the concentration by repeating the application
as necessary.
H-43. During a nonlethal engagement, the use of designated
marksmen provides confidence and safety to those facing a riot. If a lethal
threat is presented, the designated marksmen in over watch positions (armed
with appropriate sniper weapons mounted with high-powered scopes) can scan a
crowd and identify agitators and riot leaders for apprehension and fire lethal
rounds if warranted.
H-45. Simply being part of a crowd affects a person… People look
to others for cues and disregard their own background and training. Only well-disciplined
persons or persons with strong convictions can resist conforming to a crowd’s
behavior...
H-49. Control force members are also susceptible to crowd
behavior. They may become emotionally stimulated during a tense confrontation,
and facility commanders must counteract this… Rigorous training, firm and
effective leadership, and complete awareness and understanding of the RUF and
ROI (rules of interaction) are necessary to offset the effect of crowd
contagion upon the control force.
Appendix J
Facility Designs and
Sustainment Considerations
This section has detailed drawings (architectural blueprints) of the
various buildings in the facilities as well as distances between inner and
outer fences. A lot of thought
went into securing detainees and minimizing the possibility of unwanted
individuals getting out or into the camps.
J-4. Lessons
learned have resulted in design modifications to the internment facility. (See
figure J-1, page J-2.) The facility is designed to be expandable in
1,000-person increments. The initial facility is constructed with the
administrative area and one 1,000-person enclosure and then expanded by adding
(a maximum of 3) additional 1,000-person enclosures. Each 1,000-person
enclosure must be self-contained, with electric and water capabilities, and
available for occupation immediately upon completion.
J-5. Figure J-1 shows a TIF comprised of four 1,000-person
enclosures, each with two 500-person compounds. Each 500-person compound is
further divided into four 125-person compounds. This configuration allows each
compound to be isolated and approached from all sides. Compounds are
separated by an appropriate distance to provide an avenue of
approach to each, while providing a safe standoff distance from other
compounds. The distance allows enough space for security to patrol between
compounds and for reaction forces to employ riot control formations and NLWs in
response to disturbances.
CLEAR ZONE
J-22. The 12-foot clear zone must be free of vegetation and
shrubbery. The clear zone is constructed around the circumference of the
facility, between the inside and outside perimeter fences. A minimum 20-foot
clear zone will be maintained on the exterior of the outermost perimeter fence.
The use of concertina or razor wire as additional barrier protection at the top
and bottom of perimeter fencing is authorized.
FENCING
J-23. Double exterior fencing will be installed around facility
recreation, exercise, and work yard areas. Fencing will be constructed of a
type indicated in FM 5-34. It will be at least 12 feet tall with an 18- to 24-
inch top guard (preferably spring-type) constructed on all vertical perimeter
fences and on interior fences when added security is desirable. Based on local
determination, some fencing may require the installation of a double overhang
(overhang fencing outward and inward). Razor or concertina wire may be
substituted for overhangs when determined appropriate by the facility
commander.
GUARD TOWERS
J-26. Guard towers must be located on the perimeter of each
facility and compound (optional for DC facilities). Guard towers must be—
Built so that they are portable and require minimal effort to
move. Built with a roof.
Built high enough (20 feet from the ground to the floor of the
tower) from the ground to permit an unobstructed view of the compound, but low
enough to permit an adequate field of fire. Placed immediately outside the wall
or, in case of double fencing, placed in such a manner as to permit an
unobstructed view of the distance between the fences.
Spaced to allow for overlapping observation and fields of fire.
During adverse weather, it may be necessary to augment security by placing
fixed guard posts between towers on the outside of the fence. Equipped with
platforms sufficiently wide enough to mount crew-served weapons. Equipped with
retractable ladders.
Spaced so that guards have an uninterrupted view of 200 yards in
any direction along the perimeter fence.␣ Located so that the entire
perimeter and all parts of the billeting and recreation areas can be observed.
PATROL ROADS
J-28. Construct patrol roads for vehicle or foot patrols adjacent
to the outside perimeter fence or walls. Security forces conduct patrols on
patrol roads, while maintaining communications with the force at all times.
Page 36
J-39. When dining facilities are not available, feed detainees
field rations (U.S. or captured). These rations (for example, meals,
ready-to-eat) are easily stored and require no additional dietary supplements. However,
when perishable food supplies (such as fresh vegetables or fruits) are
available, they should be substituted for nonperishable items. This prevents
the detainees from stockpiling rations for escapes. Underlining is mine.
Understand these people are planning for almost every contingency. If we allow them to commit false flag
operations to set up such camps it will be very difficult to regain what liberties
we still possess. The I/R units that operate these facilities are
designed to have detainees prepare their own meals under the supervision of
U.S. armed forces. (See AR 190-8.) Sufficient drinking water (this means no
less than what U.S. armed forces receive) and latrine facilities are provided
for the detainees.
As part of J-51 a bullet describes Media coverage. Planners should develop a media plan and
provide guidance on media operations to all personnel involved in detention
operations. All media plans must be approved by the Office of the Secretary of
Defense. This is a form of censorship especially if camps
set up in Continental united States.
The bullet is on page J-15
Appendix K
Psychological
Operations Support to Internment and Resettlement Operations
I include this section because psychological techniques are very
important in controlling populations but these processes are poorly understood
so people can be easily manipulated.
K-2. To
effectively support I/R operations, tactical PSYOP units perform essential
tasks that include— ␣ Developing a PSYOP program
and conducting PSYOP to pacify, obtain cooperation from, and
condition the I/R facility population to accept U.S. authority. Media perform that function for us now. Assisting the guard force control of I/R populations during
emergencies and inter compound
transfers. ␣ Collecting, analyzing, and
reporting PSYOP-relevant intelligence. Examples of PSYOP-relevant intelligence
includes, but are not limited to— ␣ Identification of PSYOP vulnerabilities. The Mafia, North Koreans, Chinese and Russians taught our
intelligence agencies a lot about exploiting the weaknesses of others. I believe these adversaries we will
soon face will be very cunning and resourceful.
Indications of the effectiveness of themes, symbols, products, and
current and previous PSYOP operations.
It is sort of what
politicians, and marketers to gain advantage over opponents or make gains for
their products. It will be used
against us to manipulate us in these camps. It has been employed through the centuries to manipulate
populations to war against others.
␣ Verification of PSYOP
targeting effectiveness (determine if PSYOP is reaching the intended target
audience and if PSYOP operations are having collateral effects on intended or
unintended target audiences).
␣ Testing PSYOP products as
directed by the PSYOP task force or PSYOP support element. ␣ Developing and providing PSYOP products in support of PSYOP task
force operations, such as
recorded detainee surrender appeals. ␣ Collecting and confirming or denying demographic information about
PSYOP target audiences. ␣ Ascertaining targets and objectives
of propaganda I believe our government acquired great knowledge
observing Hitler’s and other communistic propaganda campaigns and now have the most effective propaganda system
in the world. Determining the effectiveness of enemy internal
propaganda, such as propaganda directed at
opposing forces. ␣ Planning and conducting
PSYOP to achieve other multinational and/or joint PSYOP task force or PSYOP
support element objectives, such as reorienting or reeducating the I/R facility
population or setting the stage for acceptance of future
operations.Again our media and
politicians are pretty good at preparing us to go to war. Look what they did in Iraq and Iraq did
not even attack us! Assisting in improving relations with the local
population (in the vicinity of the I/R facility) to
prevent or minimize interference with I/R facility operations. ␣ Conducting tactical PSYOP missionsas directed by the PSYOP task force
or support element, or the supported commander.
K-9. The tactical PSYOP detachment conducts operations based on
command information and PSYOP pacification
Page 37
programs using a variety of media.
Music and news (from approved sources), I/R facility rules, and in-processing
instructions are broadcast using facility loudspeaker systems augmented by
loudspeaker systems organic to the tactical PSYOP detachment. If available,
supporting audiovisual teams produce and disseminate audio and/or video
products. Printed products will be produced by attached print teams or
contracted print support, or through reachback capabilities. Products not
directly related to I/R facility command information are subject to the PSYOP
task force established approval process.
Wow maybe the internment
camps won’t be so bad in that the media is doing PSYOPs and propaganda to us
right now. The fact that we got
the longest war ever going on no big deal. The fact that the banks robbed an incredible amount of
wealth and paid pennies on the dollar, no big deal. See the article, The High Cost of Denial or Why the Banking
Settlement Signed by 49 States is Such a Travesty on page 70 of http://unclesamenterstheendgamepart3.blogspot.com/2011/09/news-about-fed-banking-and-finance-part_25.html The fact that the debt dog and pony show by the
democrats and republicans in Congress won’t even make a dent in the debt. No big deal. See the article Brainwashed and/or My Devilish Impulse. What the Politicians and the Media are
Not Telling Us About the Debt. Go
to page 28. http://unclesamenterstheendgamepart2.blogspot.com/2011/09/national-debt.html The
fact that our Constitution has been overturned and we are now under U.N.
control. So what? See http://unclesamenterstheendgamepart3.blogspot.com/2011/09/constitution-and-tyranny.html We
have been well pacified. It makes
sense though because a few corporations own all the media outlets in the U.S.
and it is in their interest to pacify us to their agenda. No big deal. Keep drinking and brushing with your fluoride because it
will make you feel better and you won’t care!
INTERVIEW TEAM Classic Police State
K-13. The interview team is comprised of tactical PSYOP detachment
personnel who are trained to conduct interviews. If available, interview teams
should be augmented with qualified MOS(military occupational specialty) 97E interrogators to increase team effectiveness. The interview
team normally operates in the I/R facility processing area, screening all or a
representative sample of incoming detainees and DCs. Although MI units will
likely be present in the facility, it is important for the interview team to
maintain a separate operation. Nevertheless, the team must coordinate closely
with MI personnel and other assets to obtain any PSYOP-relevant information
gathered in interrogations and must provide information of intelligence value
gained from passive collection by PSYOP personnel.
K-14. The team uses interview notes and database software to
collect information about each detainee and DC. The data is compiled and
forwarded to the tactical PSYOP detachment or support element or directly to
the PSYOP task force for TA analysis. Information gained in PSYOP product
pretests may be reported directly to the CONUS-based product development
company to accelerate the product development and approval process. Information
collected in PSYOP interviews should include the following information about
detainees and DCs:
· Race or Ethnicity
· Sex and Age
· Political Religious and Geographical affiliation
and/or origin
· Education level
· Length, depth, and type of involvement in the
conflict
· Previous or current occupation along with
Standard of living and financial state
· Previous military training along with Political
and military indoctrination
· PSYOP vulnerability and susceptibility
K-15. The initial interview, conducted on arrival at the I/R
facility, should include a numerical score or code that indicates the
desirability to conduct a follow-up interview as time and the situation permit.
Detainees and DCs who are
Page 38
cooperative or possess information, skills, or
characteristics of interest to the tactical PSYOP detachment should be
interviewed in depth. The interview team specifically looks for—
· Malcontents, rabble-rousers, trained agitators,
and political officers who may attempt to organize resistance or create
disturbances within the I/R facility. Once these individuals are identified,
guards will normally confine them in isolated enclosures to deny them access to
the general population.
· Detainees and DCs willing to cooperate in
setting up informant networks. These detainees and DCs should be referred to MI
counterintelligence personnel, since as it is their responsibility to run
informant networks within the I/R facility. (Police State)
· Detainees and DCs willing to assist with product
development, such as taping audio surrender appeals.
· Detainees and DCs willing to participate in
PSYOP product testing.
K-16. Access to members and former members of the designated PSYOP
target audiences allows the interview team to conduct product testing that
provides accurate, meaningful feedback to the PSYOP task force and product
development company. Data collected during the surveys is passed to the PSYOP
task force through the tactical PSYOP detachment and the PSYOP support element.
The interview team must maintain secure, reliable communications with higher
headquarters and ensure the timely, secure transport of product prototypes and
testing results.
K-17. The interview team, along with other facility personnel,
must take precautions to safeguard the identities of cooperative detainees and
DCs to protect them from reprisals. PSYOP personnel must always exercise discretion
when dealing with cooperative detainees and DCs. Guards must be thoroughly
briefed on proper handling procedures.
This section below displays
the covert treachery of how the PSYOPS techniques can be employed against those
attempting to restore a Constitutional Republic, if the emerging police state
gains complete power.
ENCLOSURE TEAM I underlined parts I felt most important.
K-19. The tactical PSYOP detachment assigned as an enclosure team
conducts face-to-face PSYOP and collects vital information within the I/R
facility. To perform its mission, members of the enclosure team must have
unrestricted access to the I/R population. The enclosure team conducts
close coordination with the guard force commander to ensure that its activities
do not jeopardize the safe operation of the I/R facility and to ensure that
they are safe.
K-20. The enclosure team builds a rapport with detainees and
DCs by distributing recreational equipment, conducting morale support
activities, and performing other actions designed to gain the trust of
detainees or DCs. Although it is important for the enclosure team to
maintain close communication with other PSYOP team elements, such communication
should be discreet and conducted away from the view of the I/R population. The
enclosure team will usually enjoy a greater rapport with the I/R population if
it is not identified with the authoritarian elements of the facility
administration. It is beautiful. The spies gain the confidence of the people and maybe help
them a little bit to keep their trust but what a lovely covert way to keep
control over the detainees.
K-21. The enclosure team capitalizes on its access to the I/R
population to collect information about individuals and to watch for potential
problems. The enclosure team should look for—
· Formal and informal leaders
· Individuals who are the center of attention in a
group as well as loners.
· Unusual groups
· Items passed from one person to another.
· Contrasting soil in the compound. I don’t understand the need for this.
· Lookouts and signal codes.
· Individuals who move from one group to another and whose
presence forces the topic of conversation to change.
· Individuals who speak for a group but maintain eye contact
with another person in the group.
· Individuals who immediately make friends with the military
police guards.
· Detainees and DC”s who express interest in I/R facility
construction or materials and equipment
used in facility construction.
AUDIOVISUAL TEAM
K-24. The audiovisual team can support three or more tactical
PSYOP detachments when supporting I/R operations. Theaudiovisual team uses
organic equipment to produce and disseminate products to the I/R facility
population. The team supports the facility PSYOP program by disseminating
entertainment products, such as videos and music. This team gives the tactical
PSYOP detachment the ability to influence detainee and DC behavior by providing
or withholding something of value to the population. When directed, the team
disseminates products that support other PSYOP task force programs
(reeducation, reorientation, posthostility themes).
K-25. At a minimum, the audiovisual team should have the
capability to edit audio and video products in digital
Page 39
formats, provide edited
audio products in compact disc and minidisc formats, disseminate video products
in video home system and digital video disc formats, project video with sound
to large audiences within the facility, record and edit digital still
photographs, and print limited numbers of PSYOP products in various sizes for
use within the internment facility.
Seems strikingly similar to
our main stream corporate controlled media.
This discusses how a scientist using a computer program using voice
recognition and facial recognition can create a video of that person saying
what you want them to say. Then it
can be broadcast through the internet as if the person actually said what was
on the video. Because of the face
and voice recognition program the computer can program what ever you want the
person to say and the program will have the person give that speech.
Appendix M
Biometrics The Study and
Understanding of this field is essential for either setting up or resisting the
Police State.
Biometrics are measurable physical and behavioral characteristics
that enable the establishment and verification of an individual’s identity. The term biometrics includes, but is not limited to, finger, face,
hand, eye, voice, and DNA characteristics. Biometrics are integrated to achieve
the management, protection, and control of identity information for friendly,
neutral or unknown, and adversary personnel. This appendix provides an overview
for the employment of biometrics and highlights them as key enablers in support
of I/R operations.
M-1. A
biometric is a measurable physical characteristic or personal behavioral trait
used to recognize the identity or verify the claimed identity of an individual.
Biometrics is the process of recognizing
an individual based on measurable anatomical, physiological, and behavioral
characteristics. (JP 2-0.)
M-3… This technology is also leveraged by HUMINT personnel within
the MI community. There are two major types of biometric data that are
especially useful to military police and HUMINT collectors. These are personal
identification data (fingerprint, palm print) and other biological information
(voiceprint, facial scan, retinal scan). This data is documented in databases
that can be compared to identify the individual upon collection of biological
data/evidence at a later date. Another type is biometric data that indicates
source truthfulness (polygraph data). Polygraph evidence requires certified
polygraph operators to administer and interpret the data.
M-4. Biometric-enabled intelligence operations integrate
biometrics applications with operational and tactical missions to fulfill
identified protection requirements. Several key activities are conducted when
applying biometric technology. These activities are typically conducted
independently of one another; however, they are all interconnected and
interdependent. For example, an analyst at the strategic level may conduct
analysis by querying databases and establishing linkages and patterns while at
the tactical level, a
Soldier on a patrol may be collecting biometric data on
individuals subsequent to a raid or criminal apprehension. All activities
depend on each other for success. The activities include—
· Collect. Capture biometric and related contextual data from an individual,
with or without his or her knowledge. Create and transmit a standardized, high-quality biometric
file consisting of a biometric sample and contextual data, to a database for
recording or matching.
· Match. Accurately identify or verify the identity of an individual by
comparing a standardized biometric file to an existing source of standardized
biometrics data and scoring the level of confidence of the match.
· Store. Enroll/input, update, and maintain biometric files to provide
standardized, current biometric information of individuals when and where
required. Biometrics files are enrolled or updated before they are stored.
· Share. Exchange standardized biometric files and match results among
DOD, interagency, and multinational partners according to applicable laws and
policies.
· Analyze. The analyze activity provides the answer to the “so what”
question of all other activities. Link an individual’s biometric file with
available associated information in an effort to identify patterns and
linkages, clarify status, and better inform the decision making process.
Page 40
· Reference. Access data bases of information on individuals for the purposes
of analysis. Decide/act. Decide/act is the response by the operations
owner (automated or human-in-the- loop) to the results of the analysis of
biometrics and referenced associated information described in the DOD biometric
process. Personnel reaching a conclusion and take action based on the analysis
results of biometric data, combined with corroborating analysis or non-biometric
information on individuals
· I think my underlined segment under collect
is highly significant. Data can be
collected without our knowledge or consent. This point is reemphasized in the first part of M-6 below
M-6. Collection begins with the user requirement to capture a
biometric sample (finger, face, hand, eye, voice, or DNA prints) and related
contextual data from an individual (with or without the individual’s knowledge)
with a biometric collection system. A biometric collection system may be a manual or automated
tool for measuring and evaluating a biometric for the purpose of human
recognition. Contextual data are elements of biographical and situational
information (who, what, when, where, how, why) that are associated with a
collection event and permanently recorded as an integral component of the
biometric file. Collection can occur at the point of contact with a target
individual or as the result of biometric partners sharing biometric samples.
The individual data sets that result from a collection action (biometric sample
and contextual data) are referred to as a biometric file and are structured
according to appropriate standards. The objective is to collect standardized, high-quality
biometric files.
M-7. The
execution of a collection action must be simple enough that any Service member,
DOD civilian, or contractor can complete it with minimal training and equipment… No need for search warrants anymore!
M-12. Referencing is integral to the successful analysis of
biometrics data. It is the process of querying various databases of
collected, associated information on individuals (intelligence, medical, human
resources, financial, security, education, law enforcement) for the purpose of
analysis. As described in paragraph L-5, associated information can, where
applicable, be linked to a biometric file. This linkage can be placed within
the biometric file in the form of a prompt and can occur outside of a collection
event. These data bases will include everything about a
detainee as you can see from my underlined material.
M-13. Sharing is the exchange of biometric files (biometric
samples, contextual data) or match results with other organizations. For the purpose
of this manual, authorized sharing of biometric files among entities is applied
as follows:
· Among DOD approved sources to ensure consistency
across the enterprise.
· Among DOD interagency, multinational partners as
appropriate I included these 2 bullets so you can see the
potential international nature of this process.
M-19. Detainees within a detention facility are a lucrative source
of information. Detention facilities use the Biometrics Automated Toolset as
the primary biometric collection and storage device. Biometrics data that is
captured during collection can be rapidly searched and is continually
accessible through an automated comparison process for new subject data files
and access control. The recent employment of Biometrics Automated Toolset has
generated a significant number of reports from information provided by the
detainees within detention facilities, much of it corroborated by other
intelligence reporting. This unprecedented body of information has expanded our
understanding of terrorist organizations and continues to prove invaluable. It
has provided insights into their leadership structures, recruiting practices,
funding mechanisms, and relationships; and the cooperation between terrorist
groups and training programs; and plans for attacking the U.S. and other
countries. Military police forces must leverage existing biometrics
technologies to support the overall mission through enhanced situational
understanding and support to the commander’s decision cycle. This nugget of information perhaps is the primary reason terrorists
can’t launch large scale attacks in the u.S. With slight modifications it can be employed to subvert and
destroy those attempting to restore and protect our former Constitutional
Republic. Another question not addressed
in this document is did any elements within our government fund terrorist
activities? Is it possible such
funding occurred just so a police state could be gradually imposed on the
unsuspecting civilians?
M-20. The in-processing into an internment facility is a two-part
process. It involves enrollment into the Detainee Reporting System and
Biometrics Automated Toolset Systems. Elements of detainee in-processing
operations include the following—
Page 41
· The process begins in a Secure Internet Protocol
Router Biometrics Automated Toolset System to conduct an identity check. Based
on the results of the identity check, a decision has to be made.
· The detainee may have been enrolled at a lower
echelon prior to being transported to the next level internment facility, or he
or she may have been previously enrolled into the biometric database.
DETAINEE REPORTING SYSTEM
M-21. The first task is to enroll the detainee into the Detainee
Reporting System. The Detainee Reporting System will create an ISN that needs to
be exported to the unclassified Biometrics Automated Toolset System where it
will be imported as a text file into the enrollment wizard. As detainees are
collected and processed, international laws require that such information be
forwarded to the appropriate authorities. The NDRC is the executive agent
designated by the OPMG as the recipient and archive for all detainee
information. An ISN code is a series of numbers and letters
that identifies each detainee. See
more info on ISN codes in chapter 6 in section 6-52, Chapter 10 in section
10-33 and in Appendix M starting in M-22 under the title Detainee Tracking
M-22.The NDRC’s principal responsibility is to the ensure
collection, storage, and appropriate dissemination of detainee information as
required by AR 190-8 and DODD 2310.10E. The NDRC provides detainee information
to the ICRC to fulfill U.S. obligations under the Geneva Conventions of 1956.
The NDRC directs the development of the Detainee Reporting System. It issues
blocks of ISNs to the TDRC.
DETAINEE TRACKING
M-23. Detainee tracking is a continual process, from capture to
incarceration. The detainee tracking program is a web application that allows
for the tracking of new detainees from the very first day of capture. This
initiative was started by Marine Corps elements in Iraq. A web-based
application that ties into the Biometrics Automated Toolset database allows the
processing of individuals to determine their detention necessity. The detainee
tracker was developed to address the specific needs of managing a transient
population of temporarily detained individuals in short-term facilities (those
where detainees are generally held for up to 14 days). It complements the
Detainee Management System, which was developed to manage larger, long-term internment
populations.
M-24. It is necessary to collect as much information as possible
to determine whether detainee is to be released, detained locally for
intelligence exploitation, or transferred to a facility for internment. This
provides a basis and foundation of documentation that will follow the detainee
from initial capture to final internment in a facility.
The glossary lists acronyms/abbreviations and terms with Army or
joint definitions, and other selected terms. Where Army and joint definitions
are different, (Army) follows the term. Terms or acronyms for which FM 3-39.40
is the proponent manual (the authority) are marked with an asterisk (*).
5SandTE search, silence,
segregate, speed, safeguard, and tagCTION I
AFI Air Force instruction
AJP Allied joint publication (NATO)
AO area of operations
AR Army regulation
BCTCBiigade Combat Team
C2 Command and
Control
C-2X Coalition force human intelligence
and counter intelligence staff element
CA
Civil Affairs
CBRN Chemical, biological, radiological, and nuclearO
CBRNE Chemical, biological, radiological, and nuclear
and high yield explosivesON
CDO YCommander, detainee operations
CI MSCivilian detainee
CID Criminal investigation divisionNY
CJCS MChairman of the Joint Chiefs of Staff
CJCSIS Chairman of the Joint
Chiefs of Staff instruction N
CONUS
Continental United States
CTA
DCommon table of allowances
DCABBDislocated
Civilian
DAEVIADepartment
of the Army
DCP Detainee collection point
DD TDepartment of Defense
DFAS-IN TDepartment of Finance and Accounting
Service IndiannaF
DHA Detainee Holding Area
DIAM Defense Intelligence Agency Manual
DNA anddeoxyribonucleic acidA
DODcco Department of Defense
DODDnti Department of Defense directive
DODISON Department of Defense instruction
DOTMLPF doctrine, organization,
training, materiel, leadership and education personnel, and
facilities.S
EP engineer publication
EPW enemy prisoner of war
FBI Federal Bureau of Investigation
FCF field confinement facility
FDF field detention facility
FM field manual
FRAGO fragmentary order
G-1 assistant chief of staff, personnel
G-2 assistant chief of staff, intelligence
G-2X assistant chief of staff, human intelligence and
counterintelligence
G-4 assistant chief of staff, logistics
G-9 assistant chief of staff, civil affairs
operations
GC Geneva Convention IV Relative to the Protection
of Civilian Persons in Time of War
GPW Geneva Convention III Relative to the Treatment
of Prisoners of War
Page 42
GWS Geneva Convention I for the Amelioration of the
Condition of the Wounded and Sick in Armed Forces in the Field
GS general schedule
GWS SEA Geneva Convention II for
the Amelioration of the Condition of Wounded, Sick and Shipwrecked Members of
Armed Forces at Sea
HIV human immunodeficiency virus
HN host nation
HUMINT human intelligence
ICE Immigration and Customs Enforcement
ICRC International Committee of the Red Cross
IFRC International Federation of the Red Cross
IO international organization
I/R internment and resettlement
ISN internment serial number
J-2X joint force human intelligence and counterintelligence
staff element
JFTR joint federal travel regulations
JIDC joint interrogation and debriefing center
JP joint publication
MCM Manual for Courts-Martial
MEB maneuver enhancement brigade
MI military intelligence
MOS military occupational specialty
MPC military police command
MWD
military working dog
MTTP multi-Service tactics,
techniques, and procedures
NATO North Atlantic Treaty
Organization
Glossary-3
NCO noncommissioned officer
NDRC National Detainee Reporting
Center
NGO nongovernmental organization
NLW nonlethal weapon
OA operation area
OCONUS outside the continental United States
OE operational environment
OPMG Office of the Provost Marshal General
PM provost marshal
PMG Provost Marshal General
POC point of
capture
POW prisoner of war
PSYOP psychological operations
ROE rules of engagement
ROI rules of interaction
RP retained personnel
RUF rules for use of force
S-2X human intelligence and counterintelligence staff
officer
S-4 logistics staff officer
S-9 civil affairs staff officer
SF standard form
SIF strategic internment facility
SJA staff judge advocate
SOP standing operating procedure
STP Soldier training publication
TB MED technical bulletin, medical
TDRC theater detainee reporting center
TIF theater internment facility
Page 44
UCMJ Uniform Code of Military Justice
UN United Nations
UNHCR United
Nations High Commissioner for Refugees
USC
U.S. Code
DefinitionsSECTION II –
TERMS AND DEFINITIONS
*enemy prisoner of war
A detained person who, while engaged in combat under orders of his
or her government, was captured by the armed forces of the enemy.
*internment and resettlement operations
Conducted by military police to shelter, sustain, guard, protect,
and account for populations (detainees or dislocated civilians) as a result of
military or civil conflict, natural or man-made disaster, or to facilitate
criminal prosecution. Internment involves the detainment of a population or
group that pose some level of threat to military operations. Resettlement
involves the quartering of a population or group for their protection. These
operations inherently control the movement and activities of their specific
population for imperative reasons of security, safety, or intelligence
gathering.
*[members of] armed groups
Persons who engage in or support acts against the United States or
its coalition partners in violation of the laws and customs of war during an
armed conflict that do not meet the criteria of prisoners of war as defined
within the Geneva Convention Relative to the Treatment of Prisoners of War.
*lawful enemy combatant
A person entitled to protection under the Geneva Conventions,
combatant immunity, and immunity from prosecution for lawful acts as a
belligerent.
*U.S. military prisoner
A person sentenced to confinement or death during a court-martial
and ordered into confinement by a competent authority, whether or not the
convening authority has approved the sentence.