If you support secrecy. You deny God and Country. No Exceptions...
Secrecy defies the first two principles on which the Constitution is based. They are the right to and responsibility for oversight.
Our Nation and World -- Fear and Secrecy Are the Root of EVERY Human Failure in History -- Wake Up America -- Open the Money Flow and End All Secrets in Government -- Ephesians 5:13 But everything exposed by the light becomes visible — and everything that is illuminated becomes a light.
Wednesday, October 23, 2013
Guess Which Country Has
What Nation
- Been in more armed conflicts than any other nation
- Spends more on technology that kills or destroys than any other nation
- Spends more on arming others to kill than any other nation
- Has a higher rate of it's citizens incarceration than any other nation
- Makes more than 80% of the worlds weapons
- Been in more armed conflicts than any other nation
- Spends more on technology that kills or destroys than any other nation
- Spends more on arming others to kill than any other nation
- Has a higher rate of it's citizens incarceration than any other nation
- Makes more than 80% of the worlds weapons
Tuesday, October 22, 2013
The Freemason's Eyes Are Closed, Pray For Them
Freemasons, Secrecy, Fear, and Division Within Our Nation
God has made me witness to many things and told me to speak sternly to the leaders. I have had a hard time accepting it and dropped many things on the floor due to the total rejection of man on the topics, because people fear their weakness being exposed, by a few, fear of financial loss by some, fear of the unknown by many as well as fear of exposed lies by many. The fundamental cause of the issue is the Hidden Plutocracy that truly runs our country. The good ole boy secret society. Here the term use of Freemasons is a catchall for secret society in general for whom ever it applies. All are apart of the destruction of our nation. Secret society promotes and uses fear, this creates division among our people. We are a wicked nation, not the people but the system, but we have neglected our responsibility to oversight of our government. So turn and repent and seek the Lord's forgiveness, and step up and help do your part in overseeing this nation. Secrets must go as they violate the constitution not to mention God's Law. But the later is all that matters, and the former is used simply to prove we are wrong by our own laws.Where It Started and What Is It
The issues date back to 1613, exactly 400 years ago this year Pocahontas was taken captive and married a English Freemason named John Rolfe. We proceeded to exile the Indians and plundered their land. We have and almost al the coal and natural gas. Recently we gave them a business that God sees as an abomination, ill gotten gains from casinos God will not accept.We created terrorism with our attempts to control our voracious appetite for gas and fighting the cold war. Al Qaida leaders came out of the Mahujadeen, a group our CIA funded, trained, and equipped in the 30 years ago to fight the Soviets under a false flag. Trying to pretend it was not us. This is a common tactic used today in terrorism. Little Bush coined the term the Axis of Evil, as you will see that may be more appropriately applied to the US. It is worth noting that the Freemason network permeates the CIA, NSA, FBI,...
If you look at the history of our nation the Freemasons were heavily involved from the beginning. George Washington and all of his generals were freemasons, answer many who signed the declaration of independence and the Constitution. The layout and architecture is very symbol oriented and due to masonic influence (so I have heard). But in 1983 the Pope declared that Freemasons could not partake of Holy Communion.
US Blind To Our Actions
We break our laws, both constitutionally and war crimes. The first Amendment states Congress shall make no law that respects an establishment of religion. Basically telling the creator of the universe He is not welcome. A clear violation of the second commandment. Additionally our standard security practice brings curses as defined in Deut 27, 28.November 4 1995, Yitzhak Rabin was assassinated by a zealot Zionist. It was believed, based on an Israeli lawsuit and articles that it was an inside job as the Shin-Bet had a relationship with the assassin. Two months and one day later a Palestinian was assassinated in flamboyant act of provocation. It appears clear that it was geared to get a response, and it did, a few bombings killed nearly 60 Israeli's and injured hundreds just before the election of Rabin's replacement. Following this killing they bulldozed his home denying justice to his fatherless child and his widow, coupled with moving a boundary stone. Killing him in secret and denying him justice that makes it 5 curses in Deut 27. A trusted Christian co-worker in the office of K512 at NSA, revealed this story to get it off his chest in 1996 just before I left the Agency. I thoroughly corroborated it about a year ago in the media. The real question is would God have His people use cursed techniques to reclaim their land. No. Which brings to the forefront was the 1948 entry into the land of man or God. God does entries to the day, and I can find no historical significance or precedent for 1948.
Further 1 John 2:22 states anyone who denies Jesus is the Messiah is an antichrist. So our support Israel given our understanding of Christ seems to imply were supporting the enemy of Christ. So it is hypocritical at best, and seems to imply we are an antichrist. God says you cannot serve two masters. Who among Christians support Israel in an unnatural way, i.e., with irrationally strong support? Freemasons certainly fit this. Senate and House voting records would likely reveal freemason membership based on staunch support for Israel. But that is just a theory about the voting records.
Associated Networks
The underlying issues involve the CIA/NSA/Military/Freemason/GOP war machine, as well as the courts, banks, and churches. The harassment by the freemasons and military is amazing. They are truly cowards. If you recall from history the British fought like men, face to face on the battlefield. But we hid behind trees. We created gorilla warfare, terrorism too. God curses cowardly killing Deuteronomy 27. We kill in secret because it is more secure. Translation we are cowards. Our men need to learn to be men. Quit hiding and carrying on in secret. I have lost all respect for our military as their secrecy and actions toward me show that they are so cowardly that they hide their secrets by not talking to me but destroying me in secret. If they are what America is about I am not interested in furthering this behavior. I have to believe that their eyes are closed and that is not their true character. But all I can do is pray their eyes to be opened.On the morning of 9/11/2001, nineteen men mostly from Saudi Arabia piloted the planes into the buildings. We invaded 3 other nations. These actions are beyond comprehension to me at this point. But I like you did nothing at that time. I was a coward. But God has shown me the error of our ways. In Iraq we lost 4000, and we took out 120,000. This results in a kill ratio of 30 to 1, We are darn efficient at killing. Perhaps because of our huge investment in death technology, 37% of each years tax dollars is at least what is published. Habakkuk 2 -Woe to he who builds a city on bloodshed.
Issue 1: US Wealthiest Areas Driven By Death
In 2012 the richest 4 counties in the US were Arlington VA, Louden VA, Howard MD, Fairfax VA. These correspond to the-Pentagon-Arlington,
-Defense Contractors-Louden,
-NSA-Howard,
-CIA-Fairfax.
Additionally 9 of the top 13 weapons producers are US companies. Cursed is he who leads the blind astray, Deut 27. Our leaders create massive secret structures that bring curses on our country.
Issue 2: False god
There are two types of energy in this world, creation and destruction. As God is all about creation, or positive energy, then the United States being focused so heavily on destruction makes us an antichrist, our system is the problem, as it is a false god. We host the synagogue of satan Revelations 2:9, 3:9, i.e., CIA/NSA/Military/Freemason/GOP war machine. The freemasons are the elders, DC is the holy city, the Whitehouse and/or the Capitol is it's holy places. Idolatry of our False god, the US Government war machine is exemplified by:- We rely on it in time of war
- We tithe to it, more than to God
- We sacrifice our youth to it
- We make graven images to it's leaders and it's dead
- We pledge to a symbol of it
- We salute a symbol of it
- We make holidays to honor it
- We basically submit, bow down, rely on, pay reverence to i.e., we worship it
Root Issue: Secrecy is a Problem
Secrecy has destroyed us from the inside. Classification was to protect the lives of patriots who were spreading democracy. It seemed noble, but it has grown into a monster that has putt us $16 trillion dollars in debt. We have consumed the land, as 60% of our natural gas must be traced, i.e. squeezed from stone. My daughter did a research report and found with current rates of usage increase we have 35 years of coal left. So we are the locusts of Joel 1.Now consider how the 'men' have neglected the women. Not sure if there is a correlation between the pro life votes in government and the freemason/secret society membership, but is is worth considering. Regardless there is no intention to bash a certain group.
Just shine a light on blind hurtful behavior that is done in the name of something good. As I am positive that the freemasons are one such group, I have no doubt about anything I say in this document. It is fact. The powers that be have had a smear campaign against me and an investigation starting n 1992, while I worked at NSA. It involved my divorce, and I have been targeted unofficially by special interest groups based on some truth, but many more lies and fabrications that are never cleared due to secrecy. But it is not my circumstances that were the main point, but the fact that the structure of our government actually alienates God. This has turned our government into a a false god, causing us to be guilty of idolatry. The core features that cause this is our first amendment and the fact that secrecy in government violates our Constitution and God's Laws. Turns out that Fear is a key element in all human failures in the history of man. There are secret groups that cause these things to propagate, they are our secret societies. But the powers in the flow of money. I received a banking lesson while in Canada. Two banks are in the north. It is interesting but what is important is that money flow needs to be exposed.
Conclusion
These secret societies permeate every inch of our social, religious, and government groups. Banking was invented by the Freemasons during the crusades. Religion seemed to take a dive underground when in 1613, as the German Jews were exiled and plundered. Could they have important documents recovered from the Jewish plunder? So their influence is felt in banking, in the courts, and essentially creating slavery as they try to control women's right to choose among many other issues. Not even God limits sin, if indeed their choice is sin. Any man who tries to control another's sin is elevating himself as a god. God grants us free will. I am not saying abortion is right. It is a sin in some cases but as all sin is between that person and God, it is not a man's to say for any other that their wife and children. Who controls the courts, well nearly every judge is a freemason, so I have heard (this I admit is complete hear-say). So the women have been force to protect themselves. And now they are in fact in fear of the men's network, the good ole boys. I feel their pain. I also see clearly why the freemasons hide their membership.Satan uses a 5 pointed star (Pentagram, Pentagon).
God uses a 6 pointed star. (Star of David)
God says you can't serve two masters.
So choose, NOW.
Do you side with God or Satan?
We lead the world into the mess we have today. Decide now to lead the world back to God.
Pray for the men who are freemasons or any other similar group. They have good intentions but have been tricked as all have been to one degree or another. Pray for open eyes and for justice and forgiveness as God sees fit.
Tuesday, August 27, 2013
Our Perspective of the World
Our Perspective of the World
Truth, Deception, Difference of Opinion, and Bias or Perception.
Perspective is based on all the information our senses collect, have seen, heard, or otherwise collected and interpreted throughout our life. One's perspective can be thought of as the glasses prescription they see the world with. This can range from the rare unbiased clear lensed type to a pair of kaleidoscope glasses. It all depends on what you experiences have been in life. Our past can easily be seen to determine our actions. Through understanding we grow.Senses Processing Memory Output Model of a Human |
Our paradigm of life is based entirely on our prior experiences,i.e. Perspective being our Senses, Brain, Memory, and Output. So any misinformation or missing information in a persons past experiences, a persons environment, even the sequence of exposure to experiences has an impact. So having a broad unbiased experience in life is key to having a unbiased view of the world. For example, post 9/11/2001 the United States vilified the Muslim people. But as many US citizens had never met a Muslim what they saw on the news was 100% of their exposure. So to know only the memories of 9/11, it is reasonable to have a biased view. But how we responded to that event came from bias and fear.
In the human fear response there are over 20 hormones released to prepare the body for fight or flight. The effect is to multiply the processing in the system by a huge gain, or equivalently lowering response thresholds making our response all on or off, fight or flight. The result is over reaction.
Now take two parties interacting together. If they truly understand each other, fear will never come in. But if their knowledge of one another is limited, then fear can come into play. As you can see the system is a loop with the output of one person or group feeding the second person or group. The output of the second feeds the input to the first. As is easily seen if the gain through the loop is greater than one, the system will blow up, i.e., go unstable. This is what happens in a PA system when the mic and speaker get to close. When one part of the system becomes afraid, the other must compensate, else the system will blow up.
So given this model we can see how a person who grew up with a different experience would see and react differently. And that full knowledge removes unknowns and fear, therefore leading to a more stable relationship. Also bias is of concern as bias of an input will accumulate in ones memory until it turns the perception toward one direction, such that regardless of the other's input it is interpreted in the direction of the bias.
This bias accumulation, or incomplete or inaccurate communication can be seen in any number of places in todays world.
So given this model we can see how a person who grew up with a different experience would see and react differently. And that full knowledge removes unknowns and fear, therefore leading to a more stable relationship. Also bias is of concern as bias of an input will accumulate in ones memory until it turns the perception toward one direction, such that regardless of the other's input it is interpreted in the direction of the bias.
This bias accumulation, or incomplete or inaccurate communication can be seen in any number of places in todays world.
- In Marriages where spouses do not talk. Their missed expectations has added up to the point of division and destroyed trust effectively destroying the marriage.
- Political parties have not communicated, and are driven by fear of an uneducated but vocal voter. They dig their heels in and make a good show, for their supporters.
- Some politicians seems to have the policy that they are God and know better than others. Social Justice groups resort to social terrorism, ex Occupy. Groups like this may have noble intention. But their aggressive in your face techniques, ignore others in their zeal to make their views truth.
- The freemasons and other religious political secret groups. These groups have taken a limited set of scripture and ignored all that condemns their actions, like intentional sin of testing(deception) and judging (rejecting), which are inequity. Not to mention the second commandment.
- Our vilification of the Muslims post 9/11. Most did not know Muslims but based on the experience we had we were easily swayed to believe they were more like our visions from 9/11 than not.
- In our voter political military media system has bias due to secrecy in government and ratings driven programming.
Monday, August 26, 2013
Where's The Money
Where is the additional $1 Trillion Dollars of expenses by the US going each year?
Tax Income and Outlay from Whitehorse Website. |
So This Shows An Additional $1 Trillion per Year Being Spent. Where is it Going? |
Why Does This Exist? Is this part of ObamaCare? Is this the Money Sink. |
ExactlyWhat Was Approved on 23 March 2010 |
Sunday, August 25, 2013
Disrespect for God from the Start
We The People Violated God's Commandments From Day 1
The Word of God |
Our History Has Been a Continuation of the Tyranny of Europe in the 1600s
Our founding fathers, as great as they were, failed to recognize that the very thing they sought to protect against, fear, was factor in a flaw that slipped into our Declaration of Independence and Constitution. The flaw being the alienation of God. As secrecy and fear permeated the minds of those who had been so vexed by the church tyranny of that day. Their decision to separate the two sounded reasonable at first glance. But it is wrong as it alienates God, not the men of the church that actually caused the tyranny. The only true freedom comes through God. But by alienating God we have not had His protection. The 2nd Commandment says we shall not serve, bow down, worship or place faith in any other god. Or make images of things from heaven or earth. By declaring a separation of church and state we created a God free zone, and by relying on it, in times of war, economic need we pace our faith into a false god. Further we do not seem to recall what is said about taking oaths, judging, and worried.
Both before and after we have made a list of horrific mistakes, but we feel we do not have responsibility. But this is simply not true. This list includes enslaving the blacks, persecuting exile and plunder of the American Indians. Our support of the death around the world from war and terror. We are responsible as We The People have a representative government. Meaning the responsibility for out country falls in our lap as well.
Brief Overview of God's Commandments.
Christ's Commandments, Matthew 22:36-40 (Geneva 1599 Bible)
36 Master, which is the great commandment in the Law?37 Jesus said to him, Thou shalt love the Lord thy God with all thine heart, with all thy soul, and with all thy mind.
38 This is the first and the great commandment.
39 And the second is like unto this, Thou shalt love thy neighbor as thyself.
40 On these two commandments hangeth the whole Law and the Prophets.
The 10 Commandments, Deuteronomy 5:6-21 (Geneva 1599 Bible)
- Second Commandment: 2 Thou shalt have none other gods before my face.
- Third Commandment: 8 Thou shalt make thee no graven image or any likeness of that that is in heaven above, or which is in the earth beneath, or that is in the waters under the earth (Deuteronomy 4:16 ...whether it be the likeness of male or female). 9 Thou shalt neither bow thyself unto them, nor serve them:
- Sixth Commandment: 17 Thou shalt not kill.
- Ninth Commandment: 20 Neither shalt thou bear false witness against thy neighbor
The wording of the Constitution violates the 2nd of God's Commandments given to Moses.
The Declaration of Independence: A Transcription
IN CONGRESS, July 4, 1776.
The unanimous Declaration of the thirteen united States of America,
When in the Course of human events, it becomes necessary for one people to dissolve the political bands which have connected them with another, and to assume among the powers of the earth, the separate and equal station to which the Laws of Nature and of Nature's God entitle them, a decent respect to the opinions of mankind requires that they should declare the causes which impel them to the separation.
Saturday, August 24, 2013
Where the Spirit of the Lord is, there is Liberty
Liberty is to dream big and live with passion to seek it.
Liberty is to never be concerned what others might think.
Liberty is to never be told you cant do that.
Liberty is to never be concerned over privacy.
Liberty is to live in a glass house and be naked. (either metaphorically or in reality)
Liberty is to live the way you desire and not be criticized.
Liberty is to live for a purpose that you define.
Liberty is to give to others, naturally because it feels good.
Liberty is to give and receive love.
Liberty is unique to each person, therefore you cannot judge another.
Liberty is only achieved through a relationship with God.
Now the Lord is the Spirit, and where the Spirit of the Lord is, there is Liberty. 2 Corinthians 3:17 (1599 Geneva Bible)
We Have Lost our Liberty because
Liberty is to never be concerned what others might think.
Liberty is to never be told you cant do that.
Liberty is to never be concerned over privacy.
Liberty is to live in a glass house and be naked. (either metaphorically or in reality)
Liberty is to live the way you desire and not be criticized.
Liberty is to live for a purpose that you define.
Liberty is to give to others, naturally because it feels good.
Liberty is to give and receive love.
Liberty is unique to each person, therefore you cannot judge another.
Liberty is only achieved through a relationship with God.
Now the Lord is the Spirit, and where the Spirit of the Lord is, there is Liberty. 2 Corinthians 3:17 (1599 Geneva Bible)
Matthew 4:5 Then the devil took him up into the holy city, and set him on a pinnacle of the Temple. ... "And said to him, All these will I give thee, if thou wilt fall down, and worship me. 10 Then said Jesus unto him, Avoid Satan: for it is written, Thou shalt worship the Lord thy God, and him only shalt thou serve."
We Have Lost our Liberty because
We Have Lost Sight of the Lord God.
Thou shalt worship the Lord thy God,
and him only shalt thou serve.
Friday, August 23, 2013
DoD Suppression Theory
DoD Targeted Investigation
Dupes Less Experienced, JTTF Elements Like EPA, HHS, Whitehouse Human Trafficking Task Force, into unjustly harassing an ex employee.The employee is me and I feel I am the target of a woefully unjust attack. The surveillance has been overwhelming. More like harassment it also seems to involve secret socioeties. Leading me to wonder who is in control of the NSA. Some say a picture is worth a thousand words. But here I use the term NSA to refer to No Such Association. Because the NSA I knew would not do something like this. Who is calling the shots on this?DoD Targeted Judicial Manipulation
Inverted reality and constitutional rights were witheld and even blocked. Court was a show.I have witnessed huge denials of civil liberties, including privacy, due process, right to contract, present evidence, give testimony,...
DoD Targeted Surveillance
What appears to be pervasive surveillance, by groups including Church Citizen Justice types, Marine Reservists, Army Special Operations, Contractors including Northrop, SAIC, Boeing, and FCI, persons from DoD, NSA, DIA, EPA, CIA, FIS, NGA, ...A large component of the surveillance included a 9/11 component.
There has been a strong spiritual component. I have been told many things that point to a religious bloodline. Just not sure if the things are real or gas-lighting, or PSYOP induced.
Asian Pacific special interest groups, women's rights groups, human trafficking.
NSA Targeted PSYOP - Psychological Operation
There is a Joint military command located in Pennsylvania. This group is responsible for the military PSYOP operations. Have been approached my many military and civilian psychologists. Have had countless PSYOPs ran in my presence, meant to destabilize a person. In the 1950's Margaret Singer showed that gas-lighting can be used to cause schizophrenia.
NSA Targeted Profile Likely a Problem
What could be so important to cause this much energy to be spent on one person.
NSA Targeted me because I know what started the fear and hate cycle that lead to 9/11.
Maybe more to the point is who makes the calls on operations.
A large component of the surveillance included a 9/11 component. I know what may be the event that started a wave of terror that lead to 9/11, and the US supported it.
There has been a strong spiritual component. I have been told many things that point to a religious bloodline. Just not sure if the things are real or gas-lighting, or PSYOP.
Asian Pacific special interest groups, women's rights groups, human trafficking.
After the divorce was over and the harassment continued, some research revealed something important. It should have been highly classified. But: war crimes cannot be classified.
The DoD referred me to the FBI.
The FBI (Baltimore) told me it was not classified. Refused to allow me to speak to his supervisor.
The FBI (Richmond) referred me to Baltimore FBI.
Loudoun County VA Sheriff's office JTTF component said JTTF would not invetigate this, even though it is a murder and possibly war crime. They refused to supply a report.
True Freedom Requires We Open Our Eyes
We The People need to take responsibility for our actions. Demand transparency and open communications in all our relationships, because nothing good comes from darkness. It states in Ephesians 5:12 It is shameful even to mention what the disobedient do in secret. 13 But everything exposed by the light becomes visible—and everything that is illuminated becomes a light. Here the intention is exactly that. To try and gently expose without judging what appears to be the issue with our country, society, and people. That is the lack of transparency and open communications that exists at all levels from interpersonal to between nations is lacking and results in the fear - hate - terror cycle the world exists in today. I fear that this may be a grand delusion that the Lord speaks of in 2 Thessalonians 2:11. We The People have been indulgent and have allowed our government to overreact in the war on terror.
From Galatians 5 we know that we must love our neighbor as ourselves. That includes our spouses and other nations and cultures. The only thing that counts is faith expressing itself through love. Love displaces all fear. So if we simply follow one simple rule we can solve the wolds problems. The true physical and spiritual cliff will be overwhelming.
In 2 Timothy 2:25 says that we should gently advise them not following his word. 26 That they will come to their senses and escape from the trap of the devil. This is my intention here. Because Christ says to love your neighbor as yourself, you have fulfilled the law, and are saved. So to love your neighbor we cannot persecute him, judge him, torture him, spy on him, or kill him. Yet we continue to support many of these exact things. Please repent for your own sake, and that of our country and our children.
God warns us about not following his will. One such warning relates to the haughty women of Zion, in Isaiah 3:16 Moreover the LORD said, Because the daughters of Zion are haughty, and walk with stretched forth necks and wanton eyes, walking and mincing as they go, and making a tinkling with their feet. 17 Therefore the Lord will strike with a scab the crown of the head of the daughters of Zion. … 25 Your men shall fall by the sword, and your mighty in the war.
We must lead by example and demonstrate to the world the love of our God, the God, through the way Christ gave us with his sacrifice. I feel that a bold demonstration of leadership by Love is the only way to survive. We may never achieve world peace but when we cease to try we become agents of evil. Before we can ever love we must first understand.
NSA, CIA, Secrecy and Fear in Classified Government
NSA, CIA, Secrecy and Fear in Classified Government
The CIA and NSA were products of fear. They are by definition secret organizations. There are others that are even more secret. But there is an entire subculture that runs on this concept. Classification was meant to protect and save the lives of those who were willing to risk their life for freedom. Now it has become a shield for those who seek to destroy freedom.On Sept 11, 2001 we had an eye opening event as high-jackers fed up with the actions of our government in their backyard tried desperately to get our attention. They even state in their last words recorded and mailed to the news that, they were trying to let us know. The felt that it was our government out of control and that the people would not stand for it. Those tapes disappeared and our response was shaped by a system of secrecy. They also said that specifically they were troubled by the support of Israel against the Palestinians. This was supported by several:
- FBI Special Agent Fitzgerald in testimony to the 9/11 Commission
- Osama Bin Laden's statements
- Hi-Jackers last words recordings
Our support of Israel
- Jimmy Carter stated Israel's actions against Palestine were Genocide
- Use of cursed techniques by Israeli military to secure land
- Bulldoze Palestinian homes: Deut 27:17 Cursed be he that removeth his neighbor's landmark. 19 Cursed be he that perverteth the justice due to the stranger.
- Assassinations: Deut 27:24 Cursed be he that smiteth his neighbour in secret.
- Shin-Bet ( שב״כ) were supported by the NSA in a 1996 Assassination that steered Israel away from peace (see previous post).
There are two forces at work in the world, God and evil.
To be continued...
FBI Spying on Citizensn using eGuardian
FBI Spying on Citizens - eGuardian
DoD, JTTF, FBI eGuardian spying on citizens sound familiar?
It should. 1940s Nazi Germany.
It should. 1940s Nazi Germany.
DoD Surveillance of Citizens - eGuardian
Department of Defense
INSTRUCTION
NUMBER 2000.26
November 1, 2011
USD(P)
SUBJECT: Suspicious Activity Reporting
References: See Enclosure 1
1. PURPOSE. This Instruction:
a. In accordance with the authority in DoD Directive 5111.1 (Reference (a)) and Deputy
Secretary of Defense Memorandum (Reference (b)), establishes DoD policy, assigns
responsibilities, and prescribes procedures for the documentation, storage, and exchange of
suspicious activity reports (SAR) through law enforcement channels to improve the protection of
DoD personnel, facilities, and forces in transit.
b. Delegates authorities for the effective administration of this policy.
c. Supersedes and cancels Directive-Type Memorandum 10-018 (Reference (c)).
d. Implements the Secretary of Defense Memorandum (Reference (d)) establishing the
eGuardian system to serve as the DoD law enforcement SAR system.
2. APPLICABILITY. This Instruction applies to:
a. OSD, the Military Departments, the Office of the Chairman of the Joint Chiefs of Staff
and the Joint Staff, the Combatant Commands, the Office of the Inspector General of the DoD
(IG, DoD), the Defense Agencies, the DoD Field Activities, and all other organizational entities
within the DoD (hereinafter referred to collectively as the “DoD Components”).
b. DoD law enforcement officers (LEOs), including police officers, investigators, criminal
intelligence analysts, and their supporting antiterrorism and force protection planning personnel
who are assigned, attached, or detailed to law enforcement agencies.
c. DoD contractors who, on behalf of a DoD Component and sponsored by a law
enforcement official, are involved in the SAR process, including operating a system of records as
defined in the Glossary and any of the activities associated with maintaining a system of records DoDI 2000.26, November 1, 2011
related to SARs, such as collecting and disseminating records, but only to the extent specified by
the terms of the relevant contractual vehicle.
3. DEFINITIONS. See Glossary.
4. POLICY. It is DoD policy that:
a. DoD efforts to counter terrorism and terrorist threats shall address protection of DoD
personnel, facilities, and activities.
b. The eGuardian system shall serve as the exclusive DoD law enforcement SAR system and
shall be employed by DoD LEOs, analysts, and technical contractors assigned, attached, or
detailed to law enforcement agencies. The eGuardian system may not be employed by non-DoD
LEO personnel as defined in the Glossary.
c. SARs and other force protection threat information guide DoD efforts to:
(1) Identify and address threats to the DoD at the earliest opportunity.
(2) Implement information-driven and risk-based detection, prevention, deterrence,
response, and protection efforts immediately.
(3) Identify persons involved in terrorism-related activities and threats to the DoD.
d. To strengthen DoD efforts to fight terrorist threats:
(1) Those responsible for protecting DoD resources must have timely access to properly
acquired force protection threat information, particularly information that indicates a potential
threat regarding those who want to attack the United States, their plans, capabilities, and
activities, and the targets that they intend to attack.
(2) SAR and force protection threat information shall be immediately available to,
administered by, and shared among appropriate DoD law enforcement and security personnel in
support of DoD missions to the maximum extent permitted by law, regulation, Executive order
(E.O.), and DoD issuances for force protection purposes.
(3) This information shall be made available to other DoD personnel to the maximum
extent permitted by law, regulation, E.O., and DoD issuances for force protection purposes.
e. Personally identifiable information concerning individuals shall be handled in strict
compliance with section 552a of title 5, United States Code (U.S.C.) also known as “The Privacy
Act of 1974” (Reference (e)), DoD Directive 5400.11, and DoD 5400.11-R, (References (f) and
(g)), other applicable laws, and regulations and policies in accordance with Director of
Administration and Management (DA&M) Memorandum (Reference (h)). The collection, use,
maintenance, and dissemination of information critical to the success of the DoD efforts to
2DoDI 2000.26, November 1, 2011
3
counter terrorist threats must comply with all applicable laws, regulations, and policies regarding
the safeguarding of personal freedoms, civil liberties, and information privacy.
f. When proposing, developing, and implementing DoD-proposed legislation or DoD
issuances pertaining to suspicious activity reporting that retain or enhance a particular authority,
the DoD Component shall balance the need for the authority with the need to protect privacy and
civil liberties; provide adequate guidelines and oversight to confine properly its use; and ensure
adequate protections and training exist to protect privacy and civil liberties in accordance with
applicable law, including Public Law 110-53 (Reference (i)).
g. This policy does not affect existing policies governing:
(1) DoD intelligence and counterintelligence component activities. DoD intelligence and
counterintelligence components collect, retain, and disseminate information concerning U.S.
persons pursuant to procedures set forth in DoD 5240.1-R (Reference (j)) and E.O. 12333
(Reference (k)).
(2) DoD Component acquisition of information concerning non-DoD personnel and
organizations and the sharing of terrorism information in accordance with DoD Directive
5200.27 (Reference (l)) and E.O. 13388 (Reference (m)).
5. RESPONSIBILITIES. See Enclosure 2.
6. PROCEDURES. See Enclosure 3.
7. RELEASABILITY. UNLIMITED. This Instruction is approved for public release. It is
available on the Internet from the DoD Issuances Website at http://www.dtic.mil/whs/directives.
8. EFFECTIVE DATE. This Instruction is effective upon its publication to the DoD Issuances
Website.
Enclosures
1. References
2. Responsibilities
3. eGuardian Procedures
4. Categories of Suspicious Activities
GlossaryDoDI 2000.26, November 1, 2011
TABLE OF CONTENTS
ENCLOSURE 1. REFERENCES ...................................................................................................5
ENCLOSURE 2. RESPONSIBILITIES .........................................................................................7
UNDER SECRETARY OF DEFENSE FOR POLICY (USD(P)) ............................................7
ASSISTANT SECRETARY OF DEFENSE FOR HOMELAND DEFENSE AND
AMERICAS’ SECURITY AFFAIRS (ASD(HD&ASA))……………………….. ....……7
DA&M .......................................................................................................................................7
IG, DoD......................................................................................................................................7
GENERAL COUNSEL OF THE DoD .....................................................................................7
HEADS OF THE DoD COMPONENTS WITH LAW ENFORCEMENT
AGENCIES OR ACTIVITIES ............................................................................................8
SECRETARY OF THE ARMY……………………………………………………… ............9
COMMANDERS OF THE GEOGRAPHIC COMBATANT COMMANDS. .........................9
ENCLOSURE 3. eGUARDIAN PROCEDURES ........................................................................10
SYSTEM DESCRIPTION .......................................................................................................10
ACCESS PROCEDURES .......................................................................................................10
REPORTING SUSPICIOUS ACTIVITY ...............................................................................11
REVIEW PROCESS ................................................................................................................12
ENCLOSURE 4. CATEGORIES OF SUSPICIOUS ACTIVITY ...............................................14
GLOSSARY ..................................................................................................................................16
PART I. ABBREVIATIONS AND ACRONYMS ................................................................16
PART II. DEFINITIONS ........................................................................................................16
4 CONTENTS DoDI 2000.26, November 1, 2011
ENCLOSURE 1
REFERENCES
(a) DoD Directive 5111.1, “Under Secretary of Defense for Policy (USD(P)),”
December 8, 1999
(b) Deputy Secretary of Defense Memorandum, “Delegations of Authority,”
November 30, 2006
(c) Directive-Type Memorandum 10-018, “Law Enforcement Reporting of Suspicious
Activity,” October 1, 2010 (hereby cancelled)
(d) Secretary of Defense Memorandum, “Law Enforcement Suspicious Activity Reporting
(SAR) System – eGuardian,” May 20, 2010 (hereby cancelled)
(e) Sections 552a, 5541, and 8401(17)(A) and (17)(D)iii of title 5, United States Code
(f) DoD Directive 5400.11, “DoD Privacy Program,” May 8, 2007
(g) DoD 5400.11-R, “Department of Defense Privacy Program,” May 14, 2007
(h) Director of Administration and Management Memorandum, “Safeguarding Against and
Responding to the Breach of Personally Identifiable Information (PII),” June 5, 2009
(i) Public Law 110-53, “Implementing Recommendations of the 9/11 Commission Act of
2007,” August 3, 2007
(j) DoD 5240.1-R, “Procedures Governing the Activities of DoD Intelligence Components
That Affect United States Persons,” December 1, 1982
(k) Executive Order 12333, “United States Intelligence Activities,” December 4, 1981, as
amended
(l) DoD Directive 5200.27, “Acquisition of Information Concerning Persons and
Organizations not Affiliated with the Department of Defense,” January 7, 1980
(m) Executive Order 13388, “Further Strengthening the Sharing of Terrorism Information to
Protect Americans,” October 25, 2005
(n) DoD Instruction 5025.01, “DoD Directives System,” October 28, 2007
(o) DoD 5400.7-R, “DoD Freedom of Information Act Program,” September 4, 1998
(p) Chapter 47 of title 10, United States Code (also known as “The Uniform Code of Military
Justice”)
(q) Sections 641 and 930 of title 18, United States Code
(r) “Federal Bureau of Investigation (FBI) System of Records Notice,” November 23, 20081
(s) “Federal Bureau of Investigation Privacy Impact Assessment,” November 25, 20082
(t) Executive Order 13526, “Classified National Security Information,” December 29, 2009
(u) Chapter 36 of title 50, United States Code (also known as “The Foreign Intelligence
Surveillance Act,” as amended)
(v) Section 1220.32e of title 36, Code of Federal Regulations
(w) DoD Directive 5015.2 “DoD Records Management Program,” March 6, 2000
(x) Department of Homeland Security, “Baseline Capabilities for State and Major Urban Area
Fusion Centers,” September 20083
1
Available at http://www.fbi.gov/
2
Available at http://www.fbi.gov/
3
Available at http://www.dhs.gov/files/programs/gc_1296491960442.shtm
5 ENCLOSURE 1 DoDI 2000.26, November 1, 2011
6 ENCLOSURE 1
(y) Joint Publication 1-02, “Department of Defense Dictionary of Military and Associated
Terms,” current edition
(z) Program Manager for Information Sharing Environment (PM-ISE), “Information Sharing
Environment (ISE) Functional Standard (FS) Suspicious Activity Reporting (SAR) Version
1.5,” May 21, 20094
4
Available at http://www.ise.gov/docs/ISE-FS-200_ISE-SAR_Functional_Standard_V1_5_Issued_2009.pdfDoDI 2000.26, November 1, 2011
ENCLOSURE 2
RESPONSIBILITIES
1. UNDER SECRETARY OF DEFENSE FOR POLICY (USD(P)). The USD(P) shall establish
policies and procedures implementing this Instruction consistent with the policies and procedures
in References (e) through (m).
2. ASSISTANT SECRETARY OF DEFENSE FOR HOMELAND DEFENSE AND
AMERICAS’ SECURITY AFFAIRS (ASD(HD&ASA)). The ASD(HD&ASA), under the
authority, direction, and control of the USD(P), as the principal civilian advisor to the USD(P)
and the Secretary of Defense for homeland defense activities, shall:
a. Provide DoD policy oversight for eGuardian, consistent with Enclosure 3, including
developing and overseeing policy for access and account management controls for the eGuardian
system.
b. Develop and manage standardized DoD information-sharing policies and procedures to
provide a mechanism for sharing SARs and force protection threat information among all DoD
Components and personnel who support the force protection and antiterrorism mission, including
the Defense Intelligence Components (DIC).
c. In consultation with the Under Secretary of Defense for Intelligence, establish policies and
procedures to analyze SAR data and for the fusion of SAR data with other intelligence reporting.
d. Interface with the Federal Bureau of Investigation (FBI) on matters related to eGuardian
policies and procedures.
e. Consult with the DA&M on the requirements of References (e) through (i), (n), and (o) to
facilitate compliance by DoD Components.
3. DA&M. The DA&M shall advise the ASD(HD&ASA) on the requirements of References (e)
through (i), DoD Instruction 5025.01 (Reference (n)), and DoD 5400.7-R (Reference (o)), and
facilitate compliance by the DoD Components.
4. IG, DoD. The IG, DoD shall monitor compliance with this Instruction as it relates to the
Defense criminal investigative organizations (DCIOs).
5. GENERAL COUNSEL OF THE DEPARTMENT OF DEFENSE. The General Counsel of
the Department of Defense shall provide advice and assistance on all legal matters, including the
7 ENCLOSURE 2 DoDI 2000.26, November 1, 2011
review and coordination on all proposed policies, DoD issuances, and proposed exceptions to the
DoD policies regarding the eGuardian system.
6. HEADS OF THE DoD COMPONENTS WITH LAW ENFORCEMENT AGENCIES OR
ACTIVITIES. The Heads of the DoD Components with law enforcement agencies or activities
shall:
a. Provide adequate funding and personnel to establish and support an effective program for
the use of the eGuardian system.
b. Provide for the management of the Component’s eGuardian program and the oversight of
Component law enforcement reporting of suspicious activity. The DoD Component Head shall
ensure that the procedures in this instruction are implemented.
c. Establish procedures, as well as rules of conduct necessary to implement this Instruction,
to ensure Component compliance with the requirements of References (f) through (m) and
Reference (o) and such rules and regulations as may be established by the Department of Justice
for the use of the eGuardian system.
d. Develop and conduct training, consistent with the requirements of this Instruction and
References (e) through (m) and (o), for assigned, employed, and detailed personnel prior to
initial access to eGuardian, including contractor personnel and individuals having primary
responsibility for implementing the eGuardian system.
e. Establish Component procedures to ensure only law enforcement personnel and analysts
who are assigned, attached, or detailed to law enforcement activities are granted account access
to the eGuardian system, and ensure that all assigned personnel with access to eGuardian
maintain the authorization to access the system.
f. Establish Component procedures to monitor the Component’s use of the eGuardian system
for compliance with use requirements and audit the reports submitted into eGuardian to ensure
its use is in compliance with all applicable laws, regulations, and policies.
g. Submit to the eGuardian system all SARs dealing with information regarding a potential
threat or suspicious activity, such as those listed in Enclosure 4, that are related to DoD
personnel, facilities, or forces in transit.
h. Develop Component quality assurance procedures to ensure DoD information reported to
the eGuardian system does not violate the parameters established in paragraphs 3.b. and 3.c. of
Enclosure 3, and to ensure the information is as complete and useable as possible.
i. Develop Component-specific suspicious activity awareness campaigns to enhance
detection, prevention, and protection efforts.
8 ENCLOSURE 2 DoDI 2000.26, November 1, 2011
9 ENCLOSURE 2
7. SECRETARY OF THE ARMY. The Secretary of the Army, in addition to the
responsibilities in section 6 of this enclosure, shall:
a. Provide overall program management for DoD’s use of the eGuardian system.
b. Report violations and investigative findings of Reference (h) to ASD(HD&ASA).
c. Coordinate with DoD Component Heads to ensure compliance with the eGuardian system
account management requirements and establish procedures for the execution of bi-annual audits
of all DoD Component accounts to ensure eGuardian system access is limited to authorized
personnel.
d. Establish guidance and procedures as necessary to ensure that the DoD Components and
DoD personnel with access to the eGuardian system receive training in the proper use of and
safeguards for the eGuardian system.
e. Establish and maintain a Secret Internet Protocol Router website for sharing eGuardian
SAR and force protection threat information with DICs in accordance with the legal and
regulatory requirements in References (f) through (m).
f. Through the ASD(HD&ASA):
(1) Engage with the FBI on matters related to eGuardian procedures and training.
(2) Coordinate and identify funding requirements from DoD Components for the use of
the eGuardian system and ancillary technical support to the FBI.
g. Coordinate with the FBI eGuardian Management Unit for the suspension of individual
eGuardian system access for failure to comply with paragraphs 7.b. and 7.c. of this enclosure,
until the responsible DoD Component provides evidence of remediation.
8. COMMANDERS OF THE GEOGRAPHIC COMBATANT COMMANDS. The
Commanders of the Geographic Combatant Commands, in addition to the responsibilities in
section 6 of this enclosure, shall conduct analysis of SAR and force protection threat
information, including fusing suspicious activity reporting with all source intelligence and
counterintelligence reporting. Combatant Commands will utilize this analysis to formulate
protective measures and implement information-driven notification and risk-based detection,
prevention, deterrence, response, and protection efforts immediately. DoDI 2000.26, November 1, 2011
ENCLOSURE 3
eGUARDIAN PROCEDURES
1. SYSTEM DESCRIPTION
a. All reports in the eGuardian system shared data repository (SDR) are viewable through
Guardian, the FBI’s classified threat reporting system. DoD personnel assigned to joint
terrorism task forces (JTTFs) and the National Joint Terrorism Task Force (NJTTF) have access
to Guardian.
b. Guardian and eGuardian are not emergency reporting systems. Users must contact their
chain of command and local JTTF in accordance with local procedures for any urgent matters
with a potential link to terrorism. After emergency reporting is conducted, information may be
submitted to the eGuardian system, as appropriate.
c. The eGuardian system functions as an alert, recording, and reporting system, not as a
long-term data repository. Decisions regarding the status of eGuardian reports will be made
promptly so that data can move quickly through the system.
2. ACCESS PROCEDURES
a. Access to the eGuardian system is via Law Enforcement Online. DoD personnel whose
law enforcement responsibilities require access to the eGuardian system must first establish
access to Law Enforcement Online by applying directly to the FBI for access via the Law
Enforcement Online website at http://www.leo.gov/.
b. Applications for eGuardian access shall be routed through the respective DoD
Component. The DoD Component shall validate and forward access requests to the FBI
eGuardian Management Unit (e-guard-mod@leo.gov) for approval. DoD access is limited to
law enforcement personnel and analysts assigned, attached, or detailed to support DoD law
enforcement organizations. DoD law enforcement personnel and analysts assigned, attached, or
detailed to a DoD law enforcement agency supporting force protection, counterintelligence, and
intelligence activities are eligible for eGuardian system accounts and unrestricted access due to
their law enforcement status. Information acquired through the eGuardian system by DoD law
enforcement personnel may be shared with counterintelligence and intelligence agencies
conducting force protection and counterterrorism missions in compliance with the requirements
of References (e) through (m).
c. Initial access to the eGuardian system requires completion of a training module that
addresses standards for reporting and protection of privacy and civil liberties. All new account
holders must complete this training and sign in to the eGuardian system within 30 days of being
granted access to the system or their access will be terminated by the FBI. The DoD
Component will monitor user training status and deactivate accounts of untrained personnel.
10 ENCLOSURE 3 DoDI 2000.26, November 1, 2011
d. All eGuardian system users must sign the FBI Information Technology and Information
Systems Rules of Behavior for General Users Agreement Form. Violations of the user
agreement will result in the termination of access privileges and could result in disciplinary
action under chapter 47 of title 10, U.S.C., also known as “The Uniform Code of Military
Justice (UCMJ)” (Reference (p)), or other applicable provisions of law, and result in other
adverse personnel actions.
e. Information obtained through eGuardian shall not be disseminated outside of the DoD
without the approval of the originating agency, a representative of a fusion or intelligence
center, a member of the JTTF, or an FBI eGuardian administrator. The misuse, theft, or
conversion of eGuardian records for personal use or the use of another person is a criminal
violation of section 641, chapter 31 of title 18, U.S.C. (Reference (q)).
f. There are four distinct types of eGuardian accounts approved for use by DoD personnel:
user, supervisor, approver, and read-only. The DoD Component will establish procedures to
grant the appropriate level of access to Component personnel.
(1) User account privileges include the ability to draft SARs in the eGuardian system
and the ability to view reports in the eGuardian SDR.
(2) Approver account privileges include the same privileges as user accounts as well as
the ability to approve draft SARs in the eGuardian system that are drafted by assigned user
account holders.
(3) Supervisor account privileges include the same privileges as user accounts as well as
the ability to edit a report and return it to the user for corrections prior to referral to the
approver.
(4) Read-only accounts only allow the ability to view reports in the eGuardian SDR.
g. Access to and use of information contained in the eGuardian system shall be consistent
with the authorized purpose of eGuardian as identified in the applicable FBI System of Records
Notice (Reference (r)) and Privacy Impact Assessment (Reference (s)).
3. REPORTING SUSPICIOUS ACTIVITY
a. The DoD Components with law enforcement agencies and activities shall use the
eGuardian system exclusively for reporting, storing, and sharing unclassified SARs dealing with
information regarding a potential threat or suspicious activity related to DoD personnel,
facilities, or forces in transit (see Enclosure 4).
b. No entry may be made into eGuardian based on a person’s ethnicity, race, religion, or
lawful exercise of rights or privileges guaranteed by the Constitution or Federal law, including
First Amendment-protected freedoms of religion, speech, press, and peaceful assembly and
11 ENCLOSURE 3 DoDI 2000.26, November 1, 2011
protest, unless there exists reasonable suspicion of a direct relationship between such
information and a specific criminal act or behavior that may pose a threat to DoD personnel,
facilities, and forces in transit.
c. The following specific categories of information are not permitted to be entered into
eGuardian: classified information pursuant to E. O. 13526 (Reference (t)); information that
divulges sensitive methods and techniques information derived in accordance with chapter 36 of
title 50, U.S.C., also known as “The Foreign Intelligence Surveillance Act” (Reference (u));
grand jury information; Federal taxpayer information; sealed indictments; sealed court
proceedings; confidential human source and witness information; and any other information the
dissemination of which is prohibited by law. DoD Components will assign personnel to
monitor the system to ensure that these categories of information are not included in eGuardian
reports.
d. Only DoD law enforcement personnel or analysts within DoD law enforcement
organizations will enter SARs into the eGuardian system. SARs may be reported to law
enforcement from private citizens, DoD personnel, or may come directly from law enforcement
personnel who observe or investigate activities.
e. DoD Components without organic law enforcement organizations or entities will report
SARs to their supporting DoD law enforcement element.
f. Once entered, draft eGuardian reports are viewable to the initial drafter, the drafter’s
supervisor, and the approval authority within the drafter’s DoD Component.
4. REVIEW PROCESS
a. DoD Components will establish a workflow that includes a review of draft eGuardian
reports written by the eGuardian system users within their Component. Approval authority will
not be below the level of the Component DCIO or designated law enforcement program office.
DoD Components without a DCIO or designated law enforcement program office may request
that local fusion centers or the FBI Guardian Management Unit serve as the responsible entity
to approve eGuardian drafts submitted by Component personnel. All reviews will ensure that
the draft eGuardian report complies with the standards established within this Instruction.
b. When suspicious activity is reported, if the initial investigative process by the reporting
law enforcement agency, which will include coordination with the supporting FBI JTTF or
NJTTF, finds no link to terrorism, the SAR will be deleted from the system and not be added to
the eGuardian SDR. If a clear determination is made of a link to terrorism, the information will
be passed to the eGuardian SDR for further dissemination and on to Guardian for analysis. If
no clear determination can be made regarding a link to terrorism but it cannot be discounted, the
information will be added to the eGuardian SDR for pattern and trend analysis. These reports
will be retained in the eGuardian SDR for a period of 5 years.
12 ENCLOSURE 3 DoDI 2000.26, November 1, 2011
13 ENCLOSURE 3
c. Suspicious activity, incidents, and threats that are believed to warrant investigation due to
the possibility they are an indicator of potential terrorist activity will be referred to the local FBI
JTTF and the appropriate DoD criminal investigative unit supporting the DoD Component.
d. SARs entered into the eGuardian SDR and resolved as having no clear link to terrorism
as a result of FBI JTTF or DCIO investigation will be removed from the eGuardian system after
180 days.
e. The FBI considers all reports submitted to the eGuardian system to be the property of the
submitting agency; therefore, should a submitting DoD Component desire that a report be
removed from the system prior to the 5-year mark, the report will be removed. All records
created or received must be maintained per authorized records schedules in accordance with
section 1220.32e of title 36, Code of Federal Regulations, and DoD Directive 5015.2
(References (v) and (w)). DoDI 2000.26, November 1, 2011
ENCLOSURE 4
CATEGORIES OF SUSPICIOUS ACTIVITY
This enclosure describes the potential categories to consider when evaluating suspicious activity.
a. Acquisition of Expertise. Unjustified attempts to obtain or conduct specialized training in
security concepts, military weapons or tactics, or other unusual capabilities such as specialized
transport or handling capabilities that would cause a reasonable person to perceive a threat to
DoD personnel, facilities, or forces in transit.
b. Breach or Attempted Intrusion. Unauthorized entry or attempted entry into a restricted
area or protected site; impersonation of authorized personnel (e.g., police, security, or janitorial
personnel).
c. Eliciting Information. Suspicious questioning of personnel by any means about particular
DoD structures, functions, personnel, or procedures at the facility or infrastructure.
d. Expressed or Implied Threat. A threat to DoD personnel or threatened damage to or
compromise of a DoD facility or infrastructure.
e. Flyover or Landing. Suspicious overflight of or landing near a DoD facility or
infrastructure by any type of flying vehicle (e.g., airplane, helicopter, unmanned aerial vehicle,
hang glider).
f. Materials Acquisition or Storage. Acquisition of unusual quantities of precursor material
(e.g., cell phones, pagers, fuel, and timers); unauthorized or unlicensed individual or group
attempts to obtain precursor chemicals, agents, or toxic materials; or rental of storage units for
the purpose of storing precursor material, chemicals, or apparatuses for mixing chemicals.
g. Misrepresentation. Misusing or presenting false insignia, documents, or identification or
engaging in any other activity to misrepresent one’s affiliation.
h. Recruiting. Building operations teams and developing contacts, or collecting personnel
data, banking data, or travel data under circumstances that would cause a reasonable person to
perceive a threat to DoD personnel, facilities, or forces in transit.
i. Sabotage, Tampering, or Vandalism. Damaging, manipulating, or defacing part of a DoD
facility, infrastructure, or protected site. Acts of vandalism committed by DoD civilian
employees, Service members, or their dependents should not be reported as suspicious activity
unless those acts relate to a pattern of criminal activity or otherwise would cause a reasonable
person to perceive a threat to DoD personnel, facilities, or forces in transit.
j. Surveillance. Monitoring the activity of DoD personnel, facilities, processes, or systems,
including showing unusual interest in a facility, infrastructure, or personnel (e.g., observation
14 ENCLOSURE 4 DoDI 2000.26, November 1, 2011
15 ENCLOSURE 4
through binoculars, taking notes, drawing maps or diagrams of the facility, and taking pictures or
video of a facility, infrastructure, personnel, or the surrounding environment) under
circumstances that would cause a reasonable person to perceive a threat to DoD personnel,
facilities, or forces in transit.
k. Testing of Security. A challenge to, or a series of interactions with DoD installations,
vessels, personnel, or systems that could reveal physical, personnel, or capabilities
vulnerabilities.
l. Theft, Loss, or Diversion. Theft or loss associated with a DoD facility or infrastructure
(e.g., of badges, uniforms, identification cards, emergency vehicles, technology, or documents,
whether classified or unclassified) that are proprietary to the facility, or a diversion of attention
from a DoD facility or infrastructure that is related to a theft or loss associated with that facility.
m. Weapons Discovery. Discovery of weapons or explosives, as defined in section 930 of
Reference (q). The discovery of personal weapons legally owned by DoD civilian employees,
Service members, or their dependents should not be reported as suspicious activity if the
discovery is solely the result of the owner’s failure to properly store or secure the weapons.
n. Unexplained Absences of International Military Students. International military students
who are unexpectedly absent from scheduled activities when the absence is without proper
authorization and lasts more than 24 hours, and an appropriate official with the host DoD
organization determines that the absence is not due to a misunderstanding in scheduling, to
sickness, or to another similar reason. DoDI 2000.26, November 1, 2011
GLOSSARY
PART I. ABBREVIATIONS AND ACRONYMS
ASD(HD&ASA) Assistant Secretary of Defense for Homeland Defense and Americas’
Security Affairs
DA&M Director of Administration and Management
DCIO Defense criminal investigative organization
DIC Defense Intelligence Component
E.O. Executive order
FBI Federal Bureau of Investigation
GS General Schedule
IG, DoD Inspector General of the Department of Defense
JTTF joint terrorism task force
LEO law enforcement officer
NJTTF National Joint Terrorism Task Force
SAR suspicious activity report
SDR shared data repository
UCMJ Uniform Code of Military Justice
U.S.C. United States Code
USD(P) Under Secretary of Defense for Policy
PART II. DEFINITIONS
Unless otherwise noted, these terms and their definitions are for the purpose of this Instruction.
DoD law enforcement organizations. Organizations, agencies, entities, and offices of the
Military Departments and Defense Agencies and the DoD Inspector General that perform a law
enforcement function for those departments and agencies and are manned by DoD LEOs.
DoD LEO. In accordance with sections 5541 and 8401(17)(A) and (17)(D)iii of Reference (e),
the DoD LEOs defined here are considered Federal LEOs.
16 GLOSSARY DoDI 2000.26, November 1, 2011
17 GLOSSARY
Military police (Army and Marine Corps), security forces (Air Force), and Masters-at-Arms
(Navy) who wear a military uniform with police identification while on duty; and DoD
Component civilian police (General Schedule (GS) 0083 series or equivalent, consistent with the
definitions of “law enforcement officer” in Reference (e)) when credentialed to perform those
duties in accordance with the UCMJ.
Military and civilian (GS 1811, consistent with the definitions of “law enforcement officer”
in Reference (e)) criminal investigators (special agents).
eGuardian. The FBI unclassified, law enforcement-centric threat reporting system. It provides a
means to disseminate SARs dealing with information regarding a potential threat or suspicious
activity rapidly throughout the national law enforcement community.
fusion center. Defined in Baseline Capabilities for State and Major Urban Area Fusion Centers
(Reference (x)).
individual. In accordance with section 522a (a) (2) of Reference (e), a citizen of the United
States or an alien lawfully admitted for permanent residence.
non-DoD LEO personnel. The following categories of DoD personnel are not considered to be
DoD LEOs or Federal LEOs:
DoD intelligence, analytical, personnel security, and contractor personnel who are not
employed in support of DoD law enforcement agencies.
Antiterrorism and force protection officers who are not assigned, attached, or detailed to law
enforcement activities.
Persons conducting counterintelligence activities in the Military Department
Counterintelligence Organizations, Defense Agencies, Combatant Commands, or DoD Field
Activities.
Corrections specialists who are not DoD LEO.
personnel. Defined in Joint Publication 1-02 (Reference (y)).
suspicious activity. Defined in Information Sharing Environment Functional Standard
Suspicious Activity Reporting Version 1.5 (Reference (z)).
system of records. In accordance with section 522a (a) (5) of Reference (e), a group of any
records under the control of any agency from which information is retrieved by the name of the
individual or by some identifying number, symbol, or other identifying particular assigned to the
individual.
Subscribe to:
Posts (Atom)