AR 525-13 PDF

provide extensive information about AR ( ). this important Program. This officer’s responsibilities and required training are outlined in AR Every effort should be made to provide as much continuity . AR (The Army Combating Terrorism Program). AR (Operations Security (OPSEC)). CNFINST H (Staff Organization and Regulation Manual).

Author: Kekus Mezibei
Country: Gabon
Language: English (Spanish)
Genre: Sex
Published (Last): 28 April 2010
Pages: 399
PDF File Size: 9.87 Mb
ePub File Size: 1.78 Mb
ISBN: 937-7-41656-874-1
Downloads: 4107
Price: Free* [*Free Regsitration Required]
Uploader: Tausida

Act normal If you are a high-risk source, avoid saying anything or doing anything after submitting which might promote suspicion.

(U//FOUO) U.S. Army Regulation –13 Antiterrorism | Public Intelligence

Policies, procedures, and responsibilities for execution of the AT program. Army Regulation was posted to a website associated with the State of Montana. The following is the address of our secure site where you can anonymously upload your documents to WikiLeaks editors. Even those who mean well often do not have the experience or expertise to advise properly.

Submit documents to WikiLeaks

If you need help using Tor you can contact WikiLeaks for assistance in setting it up using our simple webchat available at: Department of the Army AT tasks b. On-site elements or USACIDC elements will be utilized to safeguard evidence, witness testimony, and related aspects of the criminal investigation process pending arrival of the FBI response force.

  ADAGIA ERASMUS PDF

WikiLeaks publishes documents of political or historical importance that are censored or otherwise suppressed. We are the global experts in source protection — it is a complex field.

(U//FOUO) U.S. Army Regulation 525–13 Antiterrorism

What computer to use If the computer you are uploading from could subsequently be audited in an investigation, consider using a computer that is not easily tied to you. If you used flash media to store sensitive data, it is important to destroy the media. Contact us if you have specific problems If you have a very large submission, or a submission with a complex format, or are a high-risk source, please contact us.

We also advise you to read our tips for sources before submitting. See here for a detailed explanation of the information on this page.

Facility managers whose facility has been identified as a HRT will be 552-13, and will ensure facility security plans are formulated on this basis. If you are at high risk and you have the capacity to do so, you can also access the submission system through a secure operating system called Tails.

Personal tools Log in. Department of the Army AT standards. You can find more details at https: Submit documents to WikiLeaks.

US Army Regulation Military Operations, Antiterrorism, – WikiLeaks

If you are a high-risk source, avoid saying anything or doing anything after submitting which might promote suspicion. If you have similar or updated material, see our submission instructions. You can only access this submissions system through Tor. Leaks News About Partners. Is of political, diplomatic, ethical or historical significance. Views Page discuss View source. If you have a very large submission, or a submission with a complex format, or are a high-risk source, please contact us.

  GUARESCHI DON CAMILO PDF

Was classified, confidential, censored or otherwise withheld from the public before release. In particular, you should try to stick to your normal routine and behaviour. Our submission system works hard to preserve your anonymity, but we recommend you also take some of your own precautions. Advanced users, if they wish, can also add a further layer of encryption to their submission using our public PGP key.

If you can use Tor, but need to contact WikiLeaks for other reasons use our secured webchat available at http: Contact us to discuss how to proceed. If a legal action is brought against you as a result of your submission, there are organisations that may help you.

Commanders will exercise the attack warning system and ensure personnel are trained and proficient in recognition. This includes other media organisations.