ja_mageia

  • Increase font size
  • Decrease font size
  • Default font size
Home Facts SOA Manuals Counter Intelligence Chapters 15-16
Chapters 15-16 PDF Print E-mail
LN324-91

CHAPTER XV

INSURRECTION AND ESPIONAGE INTERVIEWS AGAINST
THE ARMED FORCES (SEAAF)

INTRODUCTION:

In criminal cases, the identity and the capture of the person is the
main objective. In espionage cases the identity of the person is only the
first step. The most important thing is the knowledge of his contacts,
objectives, information sources and communication methods. The capture and
public news of the incident must be the last resource used by the counter
intelligence agencies. It is better to identify these persons, what they are
doing, and stop the movement of their efforts than to expose them to the
public and then try to find out who are their successors.

GENERAL FACTS:

A. Receiving the source.

1. The counter intelligence agent must be professional and courteous
with the source.

2. Identify yourself and show your badge.

3. Obtain identification facts about the source.

NOTE: Establish harmony, be friendly and alert, this will help the source to
feel confident. Once the harmony has been established with the source, you
must be able to hold this confidence during the interview.

4. Determine the purpose and intention of the source.

a. An unscheduled source is a person who comes to a counter
intelligence agency to offer information he believes is of interest to
military intelligence.
b. The information the source provides must fall within the
intentions of SEAAF.

5. Once you obtain the identify data from the source you must start
the review of files to:







128


--------------------------------------------------------------------------------

LN324-91

a. Determine if the source appears in the nuisance files.

b. Determine if the Military Police or other agencies have
information about the source.

6. If the review of files reveal that the source is in the nuisance
files you must:

a. Thank the source for the information.

b. Close the interview and say goodbye to the source.

7. If the files do not have information about the source, continue
the interview.

B. Carry out the interview.

1. First ask permission to the source to use a tape recorder to
record the content of the interview. Explain that the tape recorder will help
you to prepare the final report as a verbal transcription which the source
will have the opportunity to review, correct and sign.

2. Turn on the tape recorder "only" if the source agrees to let you
use it.

3. Give the source the oath of truth.

4. Have the source tell you the incident.

a. Encourage the source to tell you the incident in their own words.

b. Be alert and listen to the source and take mental notes of
important points to explore these points during the review of the incident
with the source.

c. DO NOT write notes while the story of the incident is told.

d. DO NOT interrupt the source while telling the incident.

NOTE: If the source goes of f the incident theme he is telling, tactfully
make the source return to the main theme.









129


--------------------------------------------------------------------------------

LN324-91

NOTE: If during the interview the source tells you information outside your
jurisdiction, ask the source to go to the appropriate agency. If the source
does not wish to go to that agency, continue the interview and collect the
information and send it to the proper agency.

C. Carrying out the review of the incident.

1. Assure the source that the information will be kept in strict
confidentiality.

2. Review the incident with the source point by point to clarify
discrepancies, contradictions, and holes in the information.

3. Write with precision the additional sources.

D. Obtain history information about the source to help you evaluate
the information of the source. The history information must include:

1. Identify
2. Date and place of birth
3. Citizenship
4. Addresses (past and present)
5. Occupation
6. Reasons that motivated the source to provide information

E. Develop secondary information. Frequently the information and the
source's history could indicate that he could have more significant
information and it could be of value or interest to military intelligence.

F. Obtain a sworn declaration.

G. Advice the source that the interview has an official nature and
that he must not tell about the incident or nature of the incident to any
other person.















130


--------------------------------------------------------------------------------

LN324-91

H. Closing the interview.

1. Notify the source that the investigation could require a
subsequent interview and new contacts with him.

2. Make arrangements to have new contact with the source.

3. Again notify the source about the official nature of the
interview.

4. Close the interview in a friendly note.

5. Exit or say goodbye to the source.

I. Start the evaluation of the incident to make sure that it is in
your jurisdiction.

J. Prepare the appropriate reports.

1. Prepare an initial report for SEAAF.

NOTE: Make an effort to send a detailed complete report. If a detailed report
takes much time, submit an intermediate report with the available information.
Afterwards submit the complete report.

2. Classify the SEAAF report according to the Normal Operation
Procedures.

NOTE: All SEAAF reports will receive limited distribution.

3. Write down the unit that will receive the SEAAF report.

4. Write down the unit that sent the report.

5. Write down the instructions to send the report.

NOTE: All the SEAAF reports require one of the following sending
instructions: "Required Night Actions" or "Hand during the first hours of the
day".

6. Complete paragraph A and 1-6 of the SEAAF report.








131


--------------------------------------------------------------------------------

LN324-91

a. Write down the references in A.

b. Write down the date of the incident in paragraph 1.

c. Write down the place of the incident in paragraph 2.

d. Write down the following information from all the involved persons
in paragraph 3:

1. Complete name (father's last name, mother's last name, first name
and initial)

2. Date of birth

3. Place of birth

4. Identity card

5. Unit assignation

6. Position

7. Day when separated from the Armed Forces

8. Type of access to classified information

e. Write down in the subsequent paragraphs to paragraph 3:

1. All the sources

2. All the witnesses

3. All persons who have knowledge about the SEAAF incident.

NOTE: If there is more than one person written down in any of the categories
mentioned above, write down as #1, #2, etc. (Example: Source 1, Source 2).

NOTE: If the data identification from the witnesses or suspects are not
known, write down a physical description available.







132


--------------------------------------------------------------------------------

LN324-91

4. The description must include:

a. Age
b. Sex
c. Nationality/citizenship
d. Complexion
f. Height
g. Weight
i. Hair color
j. Eye color
k. Appearance
1. Physical built
m. Outstanding characteristics.

f. Write down in paragraph 4, a detailed description of the incident
as described by the source(s). Start the paragraph with details in regard to
as how the source came to the attention of your agency.

g. In paragraph 5, write down all actions taken, such as review of
files or interviews.

NOTE: You will not carry out more actions except as directed by a proper
higher agency.

h. In paragraph 8, write down any commentary or pertinent
recommendation about the source, suspect or the incident.

K. If applicable prepare the Agent Report with the appropriate
exhibits.

1. Send copy or the original and a copy directly to the appropriate
higher agency.

2. Send copy of the information, when instructed by the higher
investigation elements to the chain of command.

3. Do not do anything else, nor spread information unless it is
addressed to the appropriate higher agency.












133


--------------------------------------------------------------------------------

LN324-91

CLASSIFICATION
REPORT ABOUT INCIDENTS
____________________________________________________________________
PAGE______FROM_____ DATE AND TIME_______PRECEDENT_______________________
___________________________________________________
FROM:

TO:

INFO:

INSTRUCTIONS FOR SENDING:

(CLASSIFICATION)

TITLE OF REPORT:

REFERENCES:
1. ( ) DATE OF INCIDENT:
2. ( ) PLACE OF INCIDENT:
3. ( ) PERSON(S) INVOLVED:
A. ( ) SOURCE(S):
B. ( ) WITNESS(SES):
C. ( ) OTHERS WHO HAVE KNOWLEDGE:
D. ( ) SUSPECT(S):
4. ( ) NARRATION:
5. ( ) ACTIONS TO BE TAKEN:
6. ( ) COMMENTARIES:
7. ( ) POINT OF CONTACT:
____________________________________________________________________NAME,
ORGANIZATION SPECIAL INSTRUCTIONS
AND TITLE OF ORIGINATOR
_____________________________________________________________
NAME, ORG., REVIEWER'S TITLE, TELEPHONE NUMBER

_____________________________________________________________
SIGNATURE OF REVIEWER REVIEW DATE

_____________________________________________________________


134


--------------------------------------------------------------------------------

LN324-91

CLASSIFICATION









































135


--------------------------------------------------------------------------------

LN324-91

( )
REPORT ABOUT INCIDENTS
____________________________________________________________________
PAGE______FROM______ DATE AND TIME__________PRECEDENT_______________
____________________________________________________________________
FROM:

TO:

INFO:




















___________________________________________________________________NAME,
ORGANIZATION SPECIAL INSTRUCTIONS
AND TITLE OF ORIGINATOR
_____________________________________________________________NAME, ORG.,
REVIEWER'S TITLE, TELEPHONE NUMBER
_____________________________________________________________
SIGNATURE OF REVIEWER REVIEW DATE
_____________________________________________________________
( )








136


--------------------------------------------------------------------------------

LN324-91

CHAPTER XVI

ESPIONAGE INVESTIGATIONS

INTRODUCTION:

As counter intelligence special agent you must have specific knowledge
of the aspects of an espionage investigation to get security information for a
Commander of the Armed Forces responsible for the safety of his command. You
as espionage agent must always have in mind that all information must be
developed in detail, even though the information is favorable or unfavorable
for the SUBJECT.

GENERAL FACTS:

A. Preliminary Sheet (Figure 1).

1. Review the preliminary sheet (PS), found in the control office for
the investigation requirements. The PS has specific leads or leads that must
be investigated.

a. A PS has collected information during an investigation and could:

(1) Require a development of more investigative leads.

(2) Identify a source that will provide additional information about
the case or leads about additional sources that could have information.

b. Areas of interest in the PS are: (Figure 2)

(1) Block 1, SUBJECT: Contains information about the identity of the
SUBJECT of the investigation.

(2) Block 4, TYPE AND REASON FOR THE INVESTIGATION: Contains the
specific leads or the leads that must be developed. This block also contains
information of history and special instructions that will help the special
agent in the requirements to develop the leads.












137


--------------------------------------------------------------------------------

LN324-91

(c) SIGNATURE BLOCK: Make sure that each PS is signed with the
signature of the official in charge of the case or authorized person.

(d) BLOCK 8, CONVINCING DOCUMENTS: Identify all convincing documents
that are not considered necessary to the development of the required leads.

2. Review the initial report prepared by the personnel of the Armed
Forces (AF) involved or who have knowledge of the incident or situation.

NOTE: With the exception of obtaining the initial details of the incident and
submitting the priority report, only elements of counter intelligence are
authorized to investigate SEAAF cases without the approval of the higher
department.

3. Start the espionage investigation when you have the approval from
the higher control office, based on the leads originated from various
information sources, including:

a. Reports from confidential sources.

b. Reports from other intelligence agencies, security, or police
agencies or national guard.

c. OPSEC evaluations, CI technical inspections or reviews.

d. The review of refugees, border crossers, displaced persons, PGE
and other similar groups.

e. Routine security personnel investigations.

B. Identify the type of security investigation that you will conduct.

1. Incident investigations

a. These are activities or specific actions.

b. Implications are suspected from acts of espionage.












138


--------------------------------------------------------------------------------

LN324-91

c. This case will be kept as Type of Incident during the
investigation, although, the identity of the person implied will be
established at a later date.

2. The Personal SUBJECT investigations.

a. Imply one or more known person.

b. They originate allegations about the specific activities of the
person.

c. This case will be kept as personal SUBJECT investigation, although
information has developed about an act or specific activity.

3. Investigative jurisdiction. The jurisdiction for the CI section
will take place according to the SOP laws.

C. Review of legal statutes which applied to the espionage acts.

1. Espionage - Is the act of obtaining, giving, transmitting,
communicating or receiving information regarding the national defense with the
intention or reason to believe that the information is going to be used to
harm a national government or for the benefit or advantage of a foreign
country.

a. Any person or persons with legal or illegal possession, access,
control over, has been given confidential information regarding the national
defense, which the person in possession has reason to believe the information
could be used to harm the national defense and for the benefit or advantage of
a foreign country, voluntarily communicates, transmits, or tries to
communicate, or transmit this information, to any person who is not authorized
to receive it, is guilty of an espionage act.

b. Any person or persons in charge, or in legal possession and
control over national defense information, who by negligence allows the same
to be lost, stolen, displaced, destroyed, or removed from the place of
safekeeping, or gives this information in violation of faith and trust, is
guilty of a espionage act.















139


--------------------------------------------------------------------------------

LN324-91

D. Review the operative methods (OM) of the hostile intelligence
agents regarding the activities of the espionage acts.

1. Review the types of hostile operations.

a. Legal Operations. Involve espionage networks which are controlled
by a representative from the foreign country who is official charge and is
sanctioned by the host country. Frequently, the person possibly has diplomatic
immunity, and is not subject to inspections, detentions, or trials for ilegal
activities committed.

b. Ilegal Operations. Involve espionage networks that are not in
direct contact or relations with the foreign country. Most of these persons
are native of the country or of another country. Ilegal operations are more
difficult to detect and have the advantage that the operation is continued
during war time or in countries that do not have diplomatic relations.

2. Review the control methods of the hostile intelligence.

a. The centralized control procedures require approval from the
central headquarters from all the espionage activities. Many countries for
security reason regarding the espionage activities have a central control
point.

b. The internal control method. Involve operations conducted totally
within the host country. All hostile agents are controlled by a general
headquarter or by a residence that has been established in the same country.
This method is the most outstanding in the external method.

c. The external control method. Involve operations conducted within
the host country controlled by another country. This is the safest method to
control personnel.

3. Review the type of hostile agents used in a hostile operation.

a. Penetrating Agents have direct access to the information required
by the hostile country.


140


--------------------------------------------------------------------------------

LN324-91

b. Recruited agents in massive form are badly trained and belong to
echelon of low category; these agents are infiltrated within the country in
great numbers when there are favorable opportunities within that country.

c. Confusion agents are used to deceive the intelligence agencies to
waste their efforts in useless investigations.

d. Provoking agents are used to provoke the intelligence agencies to
take inappropriate actions for their disadvantage.

e. Sleeping agents are kept inactive for a long time until the
hostile country has a mission for them.

4. Review the espionage network used by the hostile country.

a. The single system of agents involves collective intelligence
efforts from a person. These agents operate only with the support of the
administrative personnel, but only one person is involved in the collective
operations.

b. The echelon system are networks that provide security when great
number of agents are being used in operation. Only the leader of the network
knows the identities of all the members of the network. Contact is initiated
only by the higher echelon and code names are normally used. There is no
lateral contact because the members of the network do not know each other.

c. The cell system could be simple or complex depending in the number
of agents that each cell has. The members of a cell know the identities and
the places of each member involved in espionage acts. They have the liberty of
coming in contact with each other and as minimum a member of a cell keeps
contact with the supervisor. It may or may not be that they have arrangements
for unilateral contacts.

d. The echelon network could degenerate in emergencies in a cell type
system. Unilateral contact could develop and a member of a segment could be
instructed to establish contact with members of another segment.













141


--------------------------------------------------------------------------------

LN324-91

NOTE: Most of the hostile intelligence services use more than one espionage
network to cover or operate in the same area.

5. Review the hostile recruitment methods

a. Acquisition techniques are used to find a person who has been
coerced or made to accept recruitment by force.

b. The analysis of sources/potential recruits makes a detailed study
of the files and information of past history to identify the potential the
person has as agent and his reactions to contacts or possible methods of
contact. The motivation of the recruitment also is determined (ideology,
money, coercion and selfishness).

c. The recruitment by contact is used to obtain contact with the
person and through him obtain his cooperation and involve him in espionage
acts. The contact could occur in the person's own country or while the person
is traveling in a communist country. The customary way of hostile agents is to
allow another person to make the contact and not to involve the agents that
did the consecutive process and the analytical steps.

NOTE: The "Small Hook" is the favorite method used by the hostile
intelligence service to prepare the potential agent. In this method, the
subject is requested to provide innocent information and material of no value
to intelligence or classification.

6. Review of the hostile camouflage method.

a. The natural camouflage is the way of legal residence or entry to a
country, the use of a real name frequently, occupation or legal ways. The
local persons who are recruited normally operate under the natural camouflage
because they have established in the community and are employed in the
country.

b. The artificial camouflage involves the fabrication of history and
position of an agent and the falsification of identification documents in a
way that matches the fabrication of history and camouflage history.












142


--------------------------------------------------------------------------------

LN324-91

7. Review the hostile communication method.

a. Conferences are normally kept to the minimum, but when used, these
conferences take place in public areas so as not to arouse the public
curiosity.

b. Official messengers are used to transport information to the
control official. Diplomatic bags are considered as the safest method to carry
material obtained for espionage acts.

c. The post is used to carry information, using codes, secret writing
and microfiche.

d. Radios or communications systems are mainly used during operations
in war time, but instructions could be transmitted to agents using lateral
communication systems at any time such as CB radios or Motorola. The
communications through cryptographic systems are used to transmit messages in
a safe way.

e. "Mail drops" are hidden secret places used to transmit or safekeep
information and material. Most of the services of hostile intelligence put
considerable emphasis in the use of "mail drops".

NOTE: Always keep in mind that mail drops could be done by a middlemen and
moved to another mail drop to provide necessary security to the controlling
officer.

8. Review the Financing Method for espionage activities.

a. Limited or unlimited resources are normally available for
espionage operations to the hostile agent.

b. The financial resources will come from the hostile country.

c. The financial resources will be obtained by organizations or
hidden business.

d. The financial resources will we obtained by ilegal activities
(black market, drugs, etc).














143


--------------------------------------------------------------------------------

LN324-91


e. The financial resources or money of the target country are
transferred to the country by diplomatic bags, official messengers, or by
hostile agents.

f. Bank accounts are established in the target country for the access
of the agent.

E. Prepare an interrogatory plan (Figure 2)

NOTE: Depending on the type of investigation that will be conducted, the
available time, the investigation plan could require only a mental study, or
could be a written formal document requiring approval previous to the
continuation of the investigation.

1. Plan an investigative agenda detailed for each step of the
operation to:

a. Define the requirements of the information.

b. Define the pertinent aspects to be considered.

c. Prevent unnecessary investigative efforts.

2. When the plan develops, consider:

a. The reason or purpose for the investigation.

b. The assigned phases of investigation.

c. The investigation type (open, covered).

d. Priority and suspension time.

e. The restrictions or special instructions.

f. A definition of the problem.

g. The methods and sources that could be used (review of files,
interviews, etc.)










144


--------------------------------------------------------------------------------

LN324-91

NOTE: There is no fixed procedure that could be recommended for treatment of
an espionage investigation. One must determine the specific method to each
individual case based upon the circumstances of the case.

h. The coordination requirements.

3. Update the investigation plan.

a. When new data is discovered.

b. As a result of continuous analysis.

F. Conduct an investigation of the incident based upon the
type, if appropriate.

1. Go to the incident's place.

2. Protect and safeguard the incident place giving appropriate orders
and isolating the place physically. All non-authorized persons must be taken
out of the place.

3. Find out the circumstances of the incident by visual observation
to determine the investigative approach that will be most appropriate.

4. Identify and segregate the witnesses.

5. Obtain photographs of the place, if required, provide a series of
photographs to give the maximum amount of useful information and to help the
reviewer to understand what had happened.

6. Search the place and collect evidence, if appropriate. Evidence is
defined as articles or material found in connection with the investigation or
that could help establish the identity of the person or circumstances that
caused the incident, in general, facts that will help uncover the events.

7. Control the evidence obtained.

G. Coordinate and conduct ties with other investigation
agencies. Coordination is a continuous activity during many of the espionage
cases.

H. Interview the witnesses.

1. Conduct interviews of witnesses in the place, if appropriate, to
obtain all the pertinent information.







145


--------------------------------------------------------------------------------

LN324-91

2. During investigations of the subject, conduct interviews of all
the witnesses who could have pertinent information or knowledge of the case.

NOTE: The most time-consuming part of the investigation is the interview,
because through the interview we obtain the greatest part of the information
sources.

I. Conduct the review of files.

J. During investigations of incident type, it will be desirable
to make contact with the confidential sources for any information that comes
to your attention.

NOTE: Information regarding the espionage incidents or the present espionage
investigations will be limited only to few persons and only to persons who
need to know the information.

K. Conduct the investigative analysis of the facts of the case.
Although, an investigation is basically a collection of facts, the secondary
function is also important; the analysis of the facts. The analysis is
established in the review and comparison of facts from the case to develop a
hypothesis and come up with conclusions regarding the identity of the
suspects, circumstances surrounding the incident, and future actions.

NOTE: There are no established procedures to analyze the information from the
case to come up with a solution. One method could work as well as another
method. All must include the basic function of review, comparison, and
hypothesis.

1. Review all information available of the case.

a. Placement and correlation of all information.

b. Examine the information to identify the pertinent facts.

c. Determine the dependability of the information.

d. Determine the truth of the information.

2. Compare the information already known. (Figure 6)

a. Compare the available information with the legal espionage
elements.

(1) Identify the information that supports or show the legal espionage
elements.

(2) Identify the holes in the information that could be completed with
further investigations.



146


--------------------------------------------------------------------------------

LN324-91

b. Compare the information obtained from witnesses to the information
from other witnesses or sources.

c. Identify the possible suspects by comparison of the information.

(1) Identify persons with connection to the incident.

(2) Identify the "opportunity" forpossible suspects.
("Opportunity"--the physical possibility that a suspects has of committing
espionage acts).

(3) Develop information to prove the motive of each suspect.

(4) Develop information that proves the intent of each suspect.

(5) Develop all the circumstantial evidences and associations of
each suspect.

NOTE: In cases of personal subject, the suspect, or possible suspect, is
identified therefore. Therefore all efforts are directed to identify his
connections in espionage acts, his opportunities, motives, and intents. Show
all information and evidence in terms of elements of required evidences to
support the charges.

3. Show one or more hypotheses. Hypotheses are theories that explain
the facts and that could be examined in later investigations. The best
hypotheses are selected to resolve the problem between the information
available.

a. Apply inductive or deductive reasoning to show the hypotheses.



















147


--------------------------------------------------------------------------------

LN324-91

(1) Inductive reasoning involves moving the specific and the
general. Develop generalities, from observations that explain the relationship
between events under examination.

(2) Deductive reasoning involves procedures from general to
specific. Starting with the general theory and applying it to the particular
incident to determine the truth contained in the theory of the incident.

NOTE: In both processes, the steps must follow a logical manner point by
point.

b. If you come to a point where the deductive reasoning is not
productive, consider using the intuition. Intuition is the quick, unexpected
act which clarifies a problem when the logical process and experimentation has
stopped. Intuition must not be ignored, particularly in difficult cases where
little progress is evident.

c. Put your hypothesis to a test of considerations of probability,
additional information of the witnesses and other known facts.

d. Eliminate various possibilities systematically considering each
hypothesis between:

(1) The opportunity

(2) The motive

(3) Observed activities

(4) Corroboration of the alibi.

e. Select the best hypothesis based in the consistency with the known
facts and the high degree of probability.

f. Examine the hypothesis objectively.

g. Modify and refute the hypothesis if contradictions to the evidence
are discovered.

4. Determine the direction of the future investigation
activities.










148


--------------------------------------------------------------------------------

LN324-91

a. Identify future actions that will examine or verify the selection
of the hypothesis.

b. Ask approval from the higher control office to complete the
identified actions.

L. Conduct vigilance, if appropriate.

M. Conduct interviews of the SUBJECT, if appropriate.

N. Conduct interrogations of the SUBJECT, if appropriate.

0. Prepare the appropriate reports.

P. Consider an investigation successful when:

1. All information and pertinent material or allegations from the
case are discovered.

2. The physical evidence available is completely handled.

3. All witnesses were appropriately interviewed.

4. The suspect, if he allows, is interrogated in an effective way.

5. The report of the case was understood, clear and detailed.























149


--------------------------------------------------------------------------------

LN324-91

EXAMPLE #1

PRELIMINARY SHEET
_____________________________________________________________________
PRELIMINARY SHEET DATE/START OF INVESTIGATION
_____________________________________________________________________
1. SUBJECT 2. DATE
NAME: RANK, RANK NUMBER
IDENTITY BADGE: 3. CONTROL NUMBER:
PLACE/DATE OF BIRTH:
_____________________________________________________________________
4. TYPE AND PURPOSE OF INVESTIGATION:




5. LEADS TO BE VERIFIED:




6. INFORMATION FROM HISTORY:




7. SPECIAL INSTRUCTIONS:



______________________________________________________________7.AGENCY
REQUESTING INFORMATION AGENCY PREPARING REPORT
______________________________________________________________
OFFICE OFFICE
______________________________________________________________
SIGNATURE (AUTHORIZATION) SIGNATURE (AUTHORIZATION)
______________________________________________________________
PERSON'S NAME NAME OF AUTHORIZED PERSON
______________________________________________________________
ADDITIONAL DOCUMENTS ENCLOSED ADDITIONAL DOCUMENTS ENCLOSED
______________________________________________________________


150


--------------------------------------------------------------------------------

LN324-91

EXAMPLE #2
INVESTIGATIVE PLAN

1. REASON FOR INVESTIGATION:

2. TYPE OF INVESTIGATION: LIMITED

3. INVESTIGATION WILL BE CONDUCTED: DISCRETELY (Safety will be t h e

main

factor

during

the

invest

igatio

n).
4. PRIORITY:

5. SPECIAL INSTRUCTIONS:

a.

b.

6. INFORMATION GIVEN:

7. SEQUENCE OF INVESTIGATION:

a. Conduct review of local files.


b. Examine the subject's military and medical files.


c. Interview the following persons:

(1) Carry out the review the neighborhoods

(2) Carry out the review of the financial or credit reports.

NOTE: The plan mentioned above must have flexibility, it is only a guide.
Each case must be treated individually. Your plan could be similar, shorter or
longer, but this will depend upon the requirements dictated in the Preliminary
sheet.







151
 

Contact us

SOA Watch
5525 Illinois Ave. NW
Washington, DC 20011

phone: 202-234-3440
email: info@soaw.org