This book has been manually flagged by NARA as being obtained through exploits. Its contents and existence should not be taken seriously.
"SECCOM" by snoopyfun
Page 1 of 22
ARMY SECURITY DIVISION
SECDIV disciplines and technical capabilities and tactical task, and SECDIV integrated function.
===================
Page 2 of 22
Page 3 of 22
Page 4 of 22
Chapter 1
-------------------Security Division operations are divided into 4.
A. SECDIV Intelligence
Operations.
1. Collect
informations.
2. Conduct information
analysis.
Page 5 of 22
B. Security and Mobility
Support
1. Conduct movement
support to mobility
operations.
2. Conduct a route
reconnaissance.
3. Conduct
resettlement
operations.
4. Control
reconnaissance.
5. Conduct
surveillance.
Page 6 of 22
6. Conduct
operational area
security.
7. Conduct installation
defense.
8. Conduct critical
asset security.
9. Provide protective
service for
selected individuals.
10. Conduct response
force operations.
Page 7 of 22
11. Secure lines of
communication,
supply routes
and convoys.
12. Perform support
area damage
control.
13. Apply
antiterrorism
measures.
14. Implement physical
security
procedures.
Page 8 of 22
15. Perform logistics
security.
16. Perform crime
prevention.
17. Provide military
working dogs.
C. Detention Operations
1. Confine V.N. military
(army) prisoners.
2. Conduct detainee
operations.
Page 9 of 22
D. Military (Army) Law
Enforcement
Operations.
1. Perform military
(army) law
enforcement.
2. Conduct criminal
investigation.
3. Provide support to
civil law
enforcement (with
permission).
Page 10 of 22
4. Employ forensic
analysis or
biometric
identification
capabilities.
Page 11 of 22
A - 1
Collection efforts range from conducting tactical reconnaissance and surveillance operations to processing information specific to SECDIC operations and investigations. Military (army) law enforcement collect and analyze
Page 12 of 22
information in response to requests for information, reviews of records and reports, assessments and inspections, complaints, criminal statistics, incidents, inquiries, biometric data, forensic evidence, and surveys of military (army) law enforcement
Page 13 of 22
and criminal environments. Military (army) law enforcements specifically obtains information from:
a) Law enforcement
agencies.
b) Intelligence
agencies.
c) Personal security
vulnerability
assessments.
Page 14 of 22
d) Crime threat
analysis.
e) Logistics security
threat
assessments.
f) Criminal
investigations.
g) Interviews and
interrogations.
A - 2
Within a deployed operational
Page 15 of 22
environment, military (army) law enforcement leaders continuously collect, organize, and interpret law enforcement/criminal information. Military (army) law enforcement units continuously update internal tracking systems and report analyzed information
Page 16 of 22
and SECDIV intelligence to higher, lower, and other relevant units to facilitate the operations process. Data that is provided through analysis is used by military (army) law enforcement within the intelligence preparation of the battlefield process to
Page 17 of 22
continuously analyze the threat and other aspects of the operational environment. The military (law) enforcement unit will:
a) Update the
previous law
enforcement/
criminal estimates.
b) Identify new or
potential criminal
Page 18 of 22
threat, network, or
trends in the area
of operations.
c) Recommend
protection level
changes to the
supported
commander.
d) Notify adjacent
units of the
potential criminal
threat, network, or
trend
Page 19 of 22
that may affect
their forces.
e) Repriotize military
(army) law
enforcement
operations and
support to the
identified threat
area.
f) Share the
information with
local police and
other agencies
Page 20 of 22
as appropriate.
When reporting tactical information obtained from an operation, the military (army) law enforcement unit will:
a) Forward the
information to the
higher
headquarters.
b) Forward the
information to the
SECDIV
Page 21 of 22
chain of command,
which integrates it
into the military
(army) law
enforcement
portion of the
intelligence
preparation of the
battlefield
process and takes
appropriate
actions.
c) Notify
Page 22 of 22
other relevant
units of the
potential threat
that may affect
their forces.