21st Century U.S. Military Documents: Air Force Criminal Investigations, Technical Surveillance Countermeasures, Counterintelligence, Protective Service Matters - Special Investigations

Nonfiction, History, Military, United States
Cover of the book 21st Century U.S. Military Documents: Air Force Criminal Investigations, Technical Surveillance Countermeasures, Counterintelligence, Protective Service Matters - Special Investigations by Progressive Management, Progressive Management
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Progressive Management ISBN: 9781310098291
Publisher: Progressive Management Publication: November 8, 2013
Imprint: Smashwords Edition Language: English
Author: Progressive Management
ISBN: 9781310098291
Publisher: Progressive Management
Publication: November 8, 2013
Imprint: Smashwords Edition
Language: English

Five U.S. Air Force instructions and directives provide unique information on criminal investigations and countermeasures:

Criminal Investigations Program * Protective Service Matters - Special Investigations * The Air Force Technical Surveillance Countermeasures Program * Counterintelligence * Criminal Investigations and Counterintelligence

Chapter 1 * RESPONSIBILITIES * 1.1. The Air Force Office of Special Investigations (AFOSI) Commander * 1.2. USAF Special Investigations Academy (USAFSIA) * 1.3. Investigations, Collections and Operations Nexus (ICON) * 1.4. AFOSI Field Investigative Units * 1.5. Commanders/Directors * 1.6. Installation Defense Force Commander (DFC) * Chapter 2 * INVESTIGATIONS PROGRAM * 2.1. Determining AFOSI and Security Forces Spheres of Influence * 2.2. Masking Rank * 2.3. Using Emergency and Extraordinary Expense Funds (E-Funds) * 2.4. Defense Clearance and Investigations Index (DCII) * 2.5. Fingerprints * 2.6. Deoxyribonucleic Acid (DNA) Samples * 2.7. Department of Justice (DoJ) Referrals * 2.8. Law Enforcement Collection of Information on Non-DoD US Persons * 2.9. AFOSI and JA Collaboration * 2.10. Suspicious Activity Reports (SARs) * 2.11. Enemy Prisoner of War (EPW)/Detainee information * 2.12. Obtaining Information from Financial Institutions * 2.13. Setting Up Joint Drug Enforcement Teams (JDETs) * 2.14. Investigation of Illegal Drug Use and Distribution * 2.15. Death Investigations of Active Duty Military Members * 2.16. Adultery, Fraternization and Sexual Harassment * 2.17. Sexual Assaults * 2.18. Investigating Fraud Offenses * 2.19. Contractor Disclosure Program * 2.20. Environmental Crime * 2.21. Crimes that Involve Air Force Computer Systems * 2.22. Processing Requests to Intercept Wire, Oral, or Electronic Communications for Law Enforcement Purposes * Chapter 3 * SPECIALIZED INVESTIGATIVE SERVICES * 3.1. Polygraph and Credibility Assessment (PCA) Techniques * 3.2. Forms

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

Five U.S. Air Force instructions and directives provide unique information on criminal investigations and countermeasures:

Criminal Investigations Program * Protective Service Matters - Special Investigations * The Air Force Technical Surveillance Countermeasures Program * Counterintelligence * Criminal Investigations and Counterintelligence

Chapter 1 * RESPONSIBILITIES * 1.1. The Air Force Office of Special Investigations (AFOSI) Commander * 1.2. USAF Special Investigations Academy (USAFSIA) * 1.3. Investigations, Collections and Operations Nexus (ICON) * 1.4. AFOSI Field Investigative Units * 1.5. Commanders/Directors * 1.6. Installation Defense Force Commander (DFC) * Chapter 2 * INVESTIGATIONS PROGRAM * 2.1. Determining AFOSI and Security Forces Spheres of Influence * 2.2. Masking Rank * 2.3. Using Emergency and Extraordinary Expense Funds (E-Funds) * 2.4. Defense Clearance and Investigations Index (DCII) * 2.5. Fingerprints * 2.6. Deoxyribonucleic Acid (DNA) Samples * 2.7. Department of Justice (DoJ) Referrals * 2.8. Law Enforcement Collection of Information on Non-DoD US Persons * 2.9. AFOSI and JA Collaboration * 2.10. Suspicious Activity Reports (SARs) * 2.11. Enemy Prisoner of War (EPW)/Detainee information * 2.12. Obtaining Information from Financial Institutions * 2.13. Setting Up Joint Drug Enforcement Teams (JDETs) * 2.14. Investigation of Illegal Drug Use and Distribution * 2.15. Death Investigations of Active Duty Military Members * 2.16. Adultery, Fraternization and Sexual Harassment * 2.17. Sexual Assaults * 2.18. Investigating Fraud Offenses * 2.19. Contractor Disclosure Program * 2.20. Environmental Crime * 2.21. Crimes that Involve Air Force Computer Systems * 2.22. Processing Requests to Intercept Wire, Oral, or Electronic Communications for Law Enforcement Purposes * Chapter 3 * SPECIALIZED INVESTIGATIVE SERVICES * 3.1. Polygraph and Credibility Assessment (PCA) Techniques * 3.2. Forms

More books from Progressive Management

Cover of the book Lord's Resistance Army (LRA) and Joseph Kony: American Efforts to Counter the LRA in Central Africa, Uganda, Central African Republic (CAR), Congo, and South Sudan by Progressive Management
Cover of the book Crossing the Line of Departure: Battle Command on the Move, A Historical Perspective - Ancient Times, Genghis Khan, Yorktown, Civil War, World War I and II Industrial Age, Vietnam, Gulf War, Iraq War by Progressive Management
Cover of the book 2011 Nuclear Power Plant Sourcebook: Plutonium Radioisotope, Radiation Health Effects and Toxicological Profile, Medical Impact, Fukushima Accident Radioactive Release by Progressive Management
Cover of the book In A Moment's Notice: Surge Capacity for Terrorist Bombings - Challenges and Proposed Solutions, Lessons from Madrid and London Bombings by Progressive Management
Cover of the book 21st Century U.S. Military Manuals: The Army Field Manual (FM 1) The Soldier's Creed, The Army and the Profession of Arms, Army Organization (Professional Format Series) by Progressive Management
Cover of the book 21st Century Guide to the Federal Reserve System: Purposes and Functions - Detailed Look at the Structure, Responsibilities, and Operations of the Fed, Monetary Policy, America's Central Bank by Progressive Management
Cover of the book Punishment, Revenge, and Retribution: A Historical Analysis of Punitive Operations - Justifications for War, British Army Somaliland, U.S. Punitive Expedition 1916, El Dorado Canyon Libya 1986 by Progressive Management
Cover of the book 21st Century NBC WMD CBRN Weapons and Terrorism: Guidelines for Mass Casualty Decontamination During a HAZMAT/Weapon of Mass Destruction Incident (Two Volumes) by Progressive Management
Cover of the book Chinese Cyber Espionage: A Complementary Method to Aid PLA Modernization - Hacker Groups, Hactivists, PLA Modernization, Information Warfare Militias, Document 27 Blueprint, Military Platforms by Progressive Management
Cover of the book 21st Century Essential References: Federal Firearms Regulations Reference Guide - Gun Control Act, National Firearms Act, NICS Background Checks, Handguns, Ammunition, Pistols, Revolvers by Progressive Management
Cover of the book China's Role in Counter-Piracy Operations: Gulf of Aden (GOA), Southeast Asia, Cooperating with Other Navies, PLAN Modernization, ASEAN Economic Relationship, Somali Piracy, Mahanian Philosophy by Progressive Management
Cover of the book Conduct of the Persian Gulf War: Final Report To Congress - Invasion of Kuwait, Saddam Hussein, Operation Desert Shield and Desert Storm, Maritime Interception, Air and Ground Campaign by Progressive Management
Cover of the book Endgame in the Pacific: Complexity, Strategy, and the B-29 - World War II Technological Solution to Attacking Japan, Bomber's Unintended Consequences in Chaos, Atomic Bombing of Hiroshima, Nagasaki by Progressive Management
Cover of the book Deepwater Horizon Gulf of Mexico Oil Spill: 2011 U.S. Coast Guard Report of the Investigation into the Explosion, Fire, and Sinking aboard the Mobile Offshore Drilling Unit (April 20, 2010) by Progressive Management
Cover of the book CIA Sherman Kent Center for Intelligence Analysis Papers: Practice of Analytic Tradecraft in the Directorate of Intelligence, Transnational Threats, Profession of Intelligence Analysis by Progressive Management
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy