CHAPTER IV

                          DOCUMENTS SECURITY

INTRODUCTION:

     The application of this chapter will be based on the following main
principles:

     1.    It is essential that some official information be given top
protection in order to safeguard the capability of the nation to protect
itself against all hostile and destructive actions.

     2.    It is also essential that the citizens of the nation be informed
as much as possible on the activities of the government.

     3.    This chapter should not be interpreted in any way as trying to
withhold information that otherwise could be publicly disseminated.

GENERAL:

A.   DEFINITION OF DOCUMENT SECURITY: The degree of protection given to
certain official information for the safekeeping of the nation's capability to
protect itself against hostile or destructive actions.

B.   All personnel must be aware that the above-mentioned principles are the
fundamental factors that govern military security and must be deeply
indoctrinated so as to be inherent with the routine performance of their
tasks.

C.   ORGANIZATION:

     1.    Categories of Classification

           a.   The official information requiring protection in the
interest of national defense will be limited to three categories of
classification, which are, in order of importance, TOP SECRET, SECRET and
CONFIDENTIAL. No other designations shall be used to classify information of
national defense.

     2.    Other Definitions

           a.   Information of Defense. It pertains the official information
that requires protection in the interest of national defense that is not of
common knowledge, y which could be valuable military information for a
potential enemy, to plan or sustain war or insurgency against us or our
allies.

           b.   Classified Material. It is the official information which
has been classified and marked with one of the categories mentioned above.

LN324-91 c. Access to Classified Material. It allows access to classified material only to those persons authorized to work with classified information and need to know such information to be able to accomplish their official duties. d. Custody. Is the person in possession or that has the responsibility of protecting and accounting for classified material. e. Inventory. It is the procedure used to account for classified material by control of entry and record of the document, or entry of destruction record, or by signed receipts. f. Document. Is any recorded information, without considering its form or characteristics, and includes, without being limited to, the following: (1) Handwritten, typewritten or printed material. (2) All drawn, painted or engraved material. (3) All sound recordings, voices, tapes or records. (4) All types of photographs and films, in negatives or processed, fixed or in motion. g. Authority for Derived Classification: It is the authority to classify material as a result of being connected to, or in response to other material related to the same subject of an already classified material. h. Material: Means any document, product or substance, on or within which information can be recorded or included. i. Properly authorized person: It is a person who has been authorized to work with classified information, according to the established norms. 3. TOP SECRET Information. Top Secret classification is limited to the information of defense or material that require the highest degree of protection. TOP SECRET information will be applicable only to that kind of information or material that is extremely important for defense, and the unauthorized disclosure of which would result in serious danger for the nation, as for example: a. Definite severance of diplomatic relationships, that would damage the defense of the nation; [leading) to an armed attack against them or their allies or to a war. 63
LN324-91 b. Compromise the military defense plans, or the operations of military intelligence, or technical or scientific developments vital for the national defense. c. As examples of this type of information, there are: (1) A strategic plan that documents the complete operations of war. (2) The documents for war planning. (3) Plan of operations for an independent operation, or for a series of coordinated operations. (4) Documents of military intelligence containing complete information of a nature that would reveal a big effort of military intelligence activities by the nation, and that would enable unauthorized persons to evaluate the success obtained by the military intelligence services of the nation. (5) Plans or programs to carry out operations of military intelligence, or other special operations, when the knowledge of a particular plan, program or operation would result extremely damaging for the nation. (6) Important information regarding equipment (war materiel) extremely important and radically new, whose technical development constitute vital information for the defense of the nation. 4. SECRET Information. The use of SECRET classification will be limited to defense or material information whose unauthorized dissemination could result in serious damage for the nation, such as: a. Jeopardize international relations of the country. b. Endanger the effectiveness of a program or policy vitally important for the national defense. c. Compromises important military plans for the defense or the technical development for the national defense. d. Reveals important operations of military intelligence. e. Examples of this type of information are: (1) A war plan or a complete plan for a future war operation not included under the TOP SECRET classification, and documents that indicate the disposition of our forces, whose unauthorized publication, by itself, could compromise such secret plans. 64
LN324-91 (2) Defense plans and other military plans not included under the TOP SECRET classification, or in the previous paragraph, that contain plans and development programs or acquisitions, although they do not necessary include all the emergency plans. (3) Specific intelligence that, by itself, could reveal the military capability of degree of preparation of the Armed Forces, but does not include information whose unauthorized disclosure could compromise a TOP SECRET plan. (4) Intelligence that reveals the strength of our forces involved in war operations; quantity or quality of equipment, or the quantity or composition of the units in a theater of operations or other geographic area where our forces might be involved in war operations. During peacetime, the information that would reveal the strength, identify, composition or situation of units usually would not require SECRET classification. (5) Military intelligence or other information whose value depends on concealing the fact that the nations possesses it. (6) Details or specific information related to new material, or modification of material that reveal important military advances, or new technical development that has direct application of vital importance for the national defense. (7) Security measure for communication or cryptographic material that reveals vitally important information for the national defense. (8) Intelligence of vital importance for the national defense, with regard to amounts of war reserves. f. CONFIDENTIAL INFORMATION. The use of CONFIDENTIAL classification will be limited to defense information and to the material whose unauthorized disclosure could be damaging to the interests of the national defense. As examples of this type of material, there are: (1) Reports of operations and battles that might have valuable information for the enemy (The Essential Elements of Friendly Information). (2) Reports that contain military intelligence, no matter what type of information. (3) Frequencies of military radios and call signals that have special meaning assigned, or those that are frequently changed because of security reasons. (4) Devices and material related to the communications security. 65
LN324-91 (5) Information that indicates the assets of our ground, sea and air forces in national territory or abroad, or the composition of the units, or que quantity of specific equipment units that belong to them. During peace time a defense classification is not necessary unless such information reflects the numbers of the total assets or quantity of weapons whose characteristics are themselves classified. (6) The documents or manuals that contain technical information used for training, maintenance or inspection of classified war material. (7) Doctrine of tactical or technical operations. (8) The investigation, development, production and acquisition of war materiel. f. Handling of classified documents (1) Protection of classified material in the hands of persons that are travelling. (a) A person receiving travel orders, and who is authorized to carry classified material, will protect such material by the following methods: 1- He will contact his commander in order to obtain, if available, the corresponding means of protection, according to the particular classification of the material, or; 2- Will keep the material under his personal control continuously. It is the responsibility of the carrier of classified material to use his best judgement for his actions, in order to avoid risky situations that might compromise the classified material. (b) The personnel on travel mission will not carry classified material when crossing international borders where the classified material might be subject to scrutiny by Customs inspectors or other "unauthorized" persons. Such material, when forwarded previously by diplomatic pouch or by mail, will not encounter any obstacles on its way. (2) Covers of classified material. The cover of classified material is used to call the attention of the personnel handling it, to the fact that it is a classified document, and to protect it against unauthorized scrutiny. The cover shall have the stamp identifying the classification of the document. (3) Destruction in case of emergency. 66
LN324-91 (a) Plans The commanders and chiefs that are responsible for the protection of classified material will make formal plans for the destruction or safe transfer of all classified material under its jurisdiction, in case of civilian disturbance, disaster, or enemy action. (b) On board aircraft or ships If the aircraft carrying classified material is forced to land, or a ship runs aground in unfriendly or neutral territory where capture seems imminent, or in other circumstances when it appears that the material should be destroyed so as not to be recognized, it is preferable to burn it or destroy it in a way that will not be recognizable. (4) Security of the typewriter ribbons: The typewriter ribbons, whether made of cotton, rayon, paper, or silk, which are used to write classified information are not safe until they have been written over twice. Presently, many of the ribbons for typewriter machines can only be used once, therefore have in mind that the impression of letters remain in the ribbons and these are significantly valuable for the enemy as is the paper in which the information was typed. These ribbons should be protected accordingly. (5) Classified trash: Trash such as drafts, minutes, notes, dictaphone recordings, or other recordings, typewriter ribbons, carbon paper, rolls of film, and similar articles, containing information of national defense, shall be protected by a responsible person, according to their classification, until they can be destroyed in an orderly fashion the same as for material of similar classification. It is necessary to have a certificate of destruction. 67
LN324-91 CHAPTER V LIAISON INTRODUCTION: The purpose of this chapter is to enable you to plan and carry out Liaison with Government and civilian Agencies for collection of information/intelligence required, in compliance with the commanders requirements, without losing a mutual confidence with the Source. GENERAL: A. Before carrying out a Liaison, it has to be determined first which agency or source will be contacted and the purpose for the contact: 1. Liaison could be carried out with the following sources or agencies: a. Government agencies b. Military units or agencies c. Civilian agencies and industry 2. The purposes for carrying out the liaison are: a. To establish a relationship of mutual confidence between the various government agencies. b. To develop sources of information for immediate or future exploitation. c. To collect and exchange information that might be useful for future investigation. d. To obtain assistance in investigations or CI operations. B. With this in mind, there are two forms or types of Liaison that can be carried out: FORMAL LIAISON and INFORMAL LIAISON 1. Formal liaison is carried out to obtain: a. Specific information for an ongoing investigation. b. Information related to security violations. c. Information of threats to the national security. 2. Informal Liaison is carried out to: 68
LN324-91 a. Establish a relationship of mutual confidence. b. Develop Sources. c. Obtain information related to specific investigations. d. Obtain information that has not been requested specifically but is related to one or more incidents or investigations. e. Maintain friendly relationship among the Sources of information and the CI agents. C. Before starting a liaison, you should review the SOP of the unit to determine the proper Liaison procedure in your area of operations. D. Upon reviewing the SOP you should determine the requirements and establish priorities according to the SOP. Some of these areas are: 1. The priority of intelligence requirements are selected by the Commander, higher authority or by the mission. 2. The requirements are generated by the direction taken by the investigation. 3. The priorities that have been established based on the recommendations by the Commander or the urgency of the mission. E. Once the requirements have been reviewed, you can establish the liaison contact. 1. There are three basic methods to establish a contact, and these are: a. Personal Approach: This is done by the person (Agent) actually carrying out the liaison with the Source. This individual (Agent) introduces personally the new Agent to the Source. This method is preferred because it has the advantage of transferring the credibility and confidence of the old Agent directly to the new Agent or contact. b. Introductory letter: In this method the new Agent obtains a letter of introduction from a person or old Agent that knows the Source. This letter is presented to the Source during the first contact. The other method of introduction letter is to send a letter to the Source indicating that you wish to visit him. c. Cold Approach. This is the least effective method since it involved making the initial contact with a strange person. The first visit of this approach should always be on a social level and must be a short one. 69
LN324-91 2. When you have not done any personal contact with the Source, you must take into consideration the following: a. The Agent must introduce himself and present his official credentials identifying him as a Special Agent of Officer of Military Intelligence. b. Indicate the purpose of the visit. c. Based on your personal observation of the Source's reaction, determine if a casual conversation is appropriate. d. As the Agent you must be alert all the time to the signals by the Source that might indicate what kind of approach is better to use with the Source. e. The Agent must be cordial, professional and sincere. f. Must show respect for the position or profession of the Source. 3. If there has been a previous personal contact with the Source, the actions of the Agent could be more relaxed (calm) according to the relationship established by previous contacts. F. During the liaison, you must establish a Relationship of Mutual Confidence in order to: 1. Establish cooperation between you and the Source. A great deal of precaution should be used to develop the Source's willingness to cooperate, because you do not want to compromise the Source. 2. Have in mind that you can obtain information from previous liaison reports and other documentation that may assist you in determining the type of approach that would be best for the Source in particular in order to: a. Adopt the proper attitude. b. Be ready to change attitude if it is necessary. As the Source calms down and starts to cooperate, a more relaxed attitude could be helpful. 3. One of the techniques that you can use is to deal with subjects of mutual interest. EXAMPLE: "If a person is a football fanatic, he would very receptive to talk about that sport instead of another sport that he does not know, or does not care to about." 70
LN324-91 4. During the liaison contact you must show sincere interest in the Source's opinions. If the Agent shows that his (Agent's) opinion is better than the Source's, you might lose the Source's confidence. 5. It is important, also, that you study well the capabilities of the Source before asking him for information. This might embarrass the Source if a request is made that he cannot fulfill. 6. You must always be aware of the jealousy existing among the various Agencies. And remember always that you do not have to compare the effectiveness of one Agency against the other, this could cause a serious problem because the Source could also be providing information to other agencies where you might also have another contact. 7. During the Liaison contact, maintain always your position as a CI Special Agent and do not fall into discussion of military ranking; this is very important because you are a direct representative of the government. 8. If you do not have any previous knowledge of the Source, establish the contact and mutual confidence in the manner already discussed. In this situation, maintain flexibility and allow the circumstances to dictate on the approach that can be used with the Source. G. During the liaison contact there will be instances when information of mutual interest will be exchanged. 1. Before exchanging such information, first determine if that information can be divulged. Consider the following points as basis for such exchange: a. Whether the information does not violate the SOP stipulations. b. Whether it is classified and cannot be divulged among other agencies, even if they are part of the Government. NOTE: The exchange of information is important because if you only obtain information and does not offer certain information in return there is the possibility of losing the Source's confidence. 2. The Liaison contact can be considered successful when: a. both parts involved in the Liaison decide or discuss the exchange of information. b. both parts can use the information exchanged to their advantage. 71

Chapter 6

[Back to SOAW Home Page]    [Send email to SOAW]    [SOA Manuals]