23 Apr The following version of U.S. Army Regulation was posted to a website associated with the State of Montana. A previous version of the. provide extensive information about AR ( ). AR on the Army program to combat ter- board. In addition, Head- rorism. The revision includes new DOD and new standards and policy will quarters.
|Genre:||Health and Food|
|Published (Last):||24 June 2004|
|PDF File Size:||2.18 Mb|
|ePub File Size:||13.68 Mb|
|Price:||Free* [*Free Regsitration Required]|
The following version of U. The summary is approved by the editorial board. If you have any issues talk to WikiLeaks.
(U//FOUO) U.S. Army Regulation 525–13 Antiterrorism
Any questions about this document’s veracity are noted. Our submission system works hard to preserve your anonymity, but we recommend you also take some of your own precautions. How to contact WikiLeaks? Views Page discuss View source.
(U//FOUO) U.S. Army Regulation –13 Antiterrorism | Public Intelligence
If you need help using Tor you can contact WikiLeaks for assistance in setting it up using our simple webchat available at: On-site elements or USACIDC elements will be utilized to safeguard evidence, witness testimony, and related aspects of the criminal investigation process pending arrival of the 525-3 response force.
If you cannot use Tor, or your submission is very large, or you have specific requirements, WikiLeaks provides several alternative methods. In ag, hard drives retain data after formatting which 52-513 be visible to a digital forensics team and flash media USB sticks, memory cards and SSD drives retain data even after a secure erasure.
What computer to use If the computer you are uploading from could subsequently be audited in an investigation, consider using a computer that is not easily tied to you.
Policies, procedures, and responsibilities for execution of the AT program.
WikiLeaks publishes documents of political or historical importance that are censored or otherwise suppressed. Copy this address into your Tor browser. Tips for Sources After Submitting.
At the garrison level, the plans must tie into other installation response plans. Do not talk about your submission to others If you have any issues talk to WikiLeaks. If you are at high risk and you have the capacity to do so, you can also access the submission system through a secure operating system called Tails.
Donate to WikiLeaks Unless otherwise specified, the document described here: If you can use Tor, but need to contact WikiLeaks for other reasons use our secured webchat available at http: Even those who mean well often do not have the experience or expertise to advise properly.
Embassy and the HN, subject to instructions issued by the combatant commander with geographical responsibility. Facility managers whose facility has been identified as a HRT will be informed, and will ensure facility security plans are formulated on this basis. Remove traces of your submission If you are a high-risk source and the computer you prepared your submission on, or uploaded it from, could subsequently be audited in an investigation, we recommend that you format and dispose of the computer hard drive and any other storage media you used.
Submit documents to WikiLeaks
What links here Related changes Special pages Printable version Permanent link. 5251-3 a legal action is brought against you as a result of your submission, there are organisations that may help you.
This regulation establishes the Army Antiterrorism AT Program to protect personnel Soldiers, members of other Services, Department of the Army DA civilian employees, Department of Defense DOD contractors and Family members of DOD employeesinformation, property, and facilities including civil work and like projects in all locations and situations against terrorism.
A previous version of the document was published by WikiLeaks in Act normal If you are a high-risk source, avoid saying anything or doing anything after submitting which might promote suspicion.
Is of political, diplomatic, ethical or historical significance. Plans will be affordable, effective, and attainable; tie security measures together; and integrate security efforts by assigning responsibilities, establishing procedures, and ensuring subordinate plans complement each other. You can only access this submissions system through Tor.
Implementing guidance for the execution of the AT standards.
If you have a very large submission, or a submission with a complex format, or are a high-risk source, please contact us. If you face legal action If a legal action is brought against 525-133 as a result of your submission, there are organisations that may help you.
Army Regulation was posted to a website associated with the State of Montana. Was first publicly revealed by WikiLeaks working with our source. Contact us to discuss how to proceed.
US Army Regulation Military Operations, Antiterrorism, – WikiLeaks
This includes other media organisations. If you have similar or updated material, see our submission instructions.
We are the global experts in source protection — it is a complex field.