Page images
PDF
EPUB

(B) From subsection (d)(1) through (d)(5) because granting access to records in this system of records could inform the subject of a counterintelligence operation or investigation of an actual or potential criminal violation or the existence of that operation or investigation; of the nature and scope of the information and evidence obtained as to his/her activities; or of the identity of confidential sources, witnesses and intelligence personnel and could provide information to enable the subject to avoid detection or apprehension. Granting access to such information could seriously impede or compromise an operation or investigation; endanger the physical safety of confidential sources, witnesses, intelligence personnel and their families; lead to the improper influencing of witnesses; the destruction of evidence or the fabrication of testimony and disclose investigative techniques and procedures. In addition, the agency is required to protect the confidentiality of sources who furnished information to the Government under an expressed promise of confidentiality or, prior to September 27, 1975, under an implied promise that the identity of the source would be held in confidence. This confidentiality is needed to maintain the Government's continued access to information from persons who otherwise might refuse to give it.

(C) From subsection (e)(1) because it is not always possible to detect the relevance or necessity of specific information in the early stages of an investigation or operation. Relevance and necessity are often questions of judgement and timing, an it is only after the information is evaluated that the relevance and necessity of such information can be established. In addition, during the course of the investigation or operation, the investigator may obtain information which is incidental to the main purpose of the investigative jurisdiction of another agency. Such information cannot readily be segregated. Furthermore, during the course of the investigation or operation, the investigator may obtain information concerning violations of laws other than those which are within the scope of his/her jurisdiction. In the interest of effective intelligence oper

ations and law enforcement, military intelligence agents should retain information, since it an aid in establishing patterns of criminal or intelligence activity and provide valuable leads for other law enforcement or intelligence agencies.

(D) From subsection (e)(4)(G), (e)(4)(H), and (f) because this system or records is being exempt from subsections (d) of the Act, concerning access to records. These requirements are inapplicable to the extent that this system of records will be exempt from subsections (d)(1) through (d)(5) of the Act. Although the system would be exempt from these requirements, the Deputy Chief of Staff for Intelligence has published information concerning its notification, access, and contest procedures because under certain circumstances, the Deputy Chief of Staff for Intelligence could decide it is appropriate for an individual to have access to all or a portion os his/her records in this system of records.

(E) From subsection (e)(4)(I) because it is necessary to protect the confidentiality of the sources of information, to protect the privacy and physical safety of confidential sources and witnesses and to avoid the disclosure of investigative techniques and procedures. Although the system will be exempt from this requirement, the Deputy Chief of Staff for Intelligence has published such a notice in broad, generic terms.

(27) A0381-100aDAMI.

(i) System name: Intelligence/Counterintelligence Source Files.

(ii) Exemption: All portions of this system of records that fall within the scope of 5 U.S.C. 552a(k)(1), (k)(2), or (k)(5) may be exempt from the provisions of 5 U.S.C. 552a(c)(3), (d)(1) through (d)(5), (e)(1), (e)(4)(G), (e)(4)(H), and (e)(4)(I), and (f).

(iii) Authority: 5 U.S.C. 552a(k)(1), (k)(2), and (k)(5).

(iv) Reasons: (A) From subsection (c)(3)because disclosing the agencies to which information from this system has been released could reveal the subject's involvement in a sensitive intelligence or counterintelligence operation or investigation of an actual or potential criminal violation, or intelligence operation or investigation; or the existence of that investigation or

operation. Granting access to such information could seriously impede or compromise an investigation or operation; endanger the physical safety of participants and their families, confidential sources, witnesses, intelligence personnel, and their families; and lead to the improper influencing of witnesses; the destruction of evidence or the fabrication of testimony and disclose investigative techniques and procedures.

(B) From subsection (d)(1) through (d)(5) because granting access to records could inform the subject of an intelligence or counterintelligence operation or investigation of an actual or potential criminal violation or the existence of that operation or investigation; or the nature and scope of the information and evidence obtained, or of the identity of confidential sources, witnesses and intelligence personnel. Granting access to such information could seriously impede or compromise an operation or investigation; endanger the physical safety of confidential sources, witnesses, intelligence personnel and their families; lead to the improper influencing of witnesses; the destruction of evidence or the fabrication of testimony; disclose investigative techniques and procedures; invade the privacy of those individuals involved in intelligence programs and their families; compromise and thus negate specialized techniques used to support intelligence programs; and interfere with and negate the orderly conduct of intelligence and counterintelligence operations and investigations. In addition, the agency is required to protect the confidentiality of sources who furnished information to the Government under an expressed promise of confidentiality or, prior to September 27, 1975, under an implied promise that the identity of the source would be held in confidence. This confidentiality is needed to maintain the Government's continued access to information from persons who otherwise might refuse to give it.

(C) From subsection (e)(1) because it is not always possible to detect the relevance or necessity of specific information in the early stages of an investigation or operation. Relevance and necessity are often questions of judgment

and timing, and it is only after the information is evaluated that the relevance and necessity of such information can be established. In addition, during the course of the investigation or operation, the investigator or operative may obtain information which is incidental to the main purpose of the investigative jurisdiction of another agency. Such information cannot readily be segregated. Furthermore, during the course of the investigation or operation, the investigator may obtain information concerning violations of law other than those which are within the scope of his/her jurisdiction. In the interest of effective intelligence operations and law enforcement, military intelligence agents should retain information, since it is an aid in establishing patterns of criminal or intelligence activity and provides valuable leads for other law enforcement or intelligence agencies.

(D) From subsection (e)(4)(G), (e)(4)(H), and (f) because this system of records is being exempt from subsection (d) of the Act concerning access to records. These requirements are inapplicable to the extent that this system of records will be exempt from subsections (d)(1) through (d)(5) of the Act. Although the system would be exempt from these requirements, the Deputy Chief of Staff for Intelligence has published information concerning its notification, access, and contest procedures because under certain circumstances, the Deputy Chief of staff for Intelligence could decide it is appropriate for an individual to have access to all or a portion of his/her records in this system of records.

(E) From subsection (e)(4)(I) because it is necessary to protect the confidentiality of sources of information, to protect the privacy and physical safety of participants and their families, confidential sources, and witnesses and to avoid the disclosure of specialized techniques and procedures. Although the system will be exempt from this requirement, the Deputy Chief of Staff for Intelligence has published such a notice in broad generic terms.

(28) A0381-1006DAMI

(i) System name: Technical Surveillance Index.

(ii) Exemption: All portions of this system of records which fall within the scope of 5 U.S.C. 552a(k)(1), (k)(2), and (k)(5) may be exempt from the provisions of 5 U.S.C. 552a(c)(3), (d)(1) through (d)(5), (e)(1), (e)(4)(G), (e)(4)(H), and (e)(4)(I).

(iii) Authority: 5 U.S.C. 552a(k)(1), (k)(2) or (k)(5).

(iv) Reasons: (A) From subsection (c)(3) because disclosing the identities of agencies to which information from this system has been released could inform the subject of an investigation of an actual or potential criminal violation or intelligence operation; of the existence of that investigation or operation; of the nature and scope of the information and evidence obtained as to his/her activities or of the identify of confidential sources, witnesses, and intelligence or law enforcement personnel and could provide information to enable the subject to avoid detection or apprehension. Granting access to such information could seriously impede or compromise an investigation; endanger the physical safety of confidential sources, witnesses, intelligence or law enforcement personnel, and their families; lead to the improper influencing of witnesses; the destruction of evidence or the fabrication of testimony and disclose investigative techniques and procedures. In addition, granting access to such information could disclose classified and sensitive sources and operational methods and could constitute an unwarranted invasion of the personal privacy of others.

to

(B) From subsection (d)(1) through (d)(5) because granting access records in this system of records could inform the subject of an investigation of an actual or potential criminal violation; of the existence of that investigation; of the nature and scope of the information and evidence obtained as to his/her activities; or of the identity of confidential sources, witnesses and intelligence or law enforcement personnel and could provide information to enable the subject to avoid detection or apprehension. Granting access to such information could seriously impede or compromise an investigation; endanger the physical safety of confidential sources, witnesses, intelligence or law enforcement personnel

and their families; lead to the improper influencing of witnesses; the destruction of evidence or the fabrication of testimony and disclose investigative techniques and procedures. In addition, granting access to such information could disclose classified, sensitive sources and operational methods and could constitute an unwarranted invasion of the personal privacy of others.

(C) From subsection (e)(1) because it is not always possible to detect the relevance or necessity of specific information in the early stages of an investigation or operation. Relevance and necessity are often questions of judgment and timing, and it is only after the information is evaluated that the relevance and necessity of such information can be established. In addition, during the course of the investigation or operation, the investigator may obtain information which is incidental to the main purpose of the investigative jurisdiction of another agency. Such information cannot readily be segregated. Furthermore, during the course of the investigation or operation, the investigator may obtain information concerning violation of laws other than those which are within the scope of his/her jurisdiction. In the interest of effective intelligence operations and law enforcement, criminal law enforcement investigators and military intelligence agents should retain this information, since it can aid in establishing patterns of criminal or intelligence activity and can provide valuable leads for other law enforcement or intelligence agencies.

(D) From subsections (e)(4)(G) and (e)(4)(H) because this system of records is being exempt from subsections (d) of the Act, concerning access to records, these requirements are inapplicable to the extent that this system of records will be exempt from subsections (d)(1) through (d)(5) of the Act. Although the system would be exempt from these requirements, the Deputy Chief of Staff for Intelligence and the U.S. Army Criminal Command Investigations have published information concerning its notification, access, and contest procedures for their respective areas because, under certain circumstances,

the Deputy Chief of Staff for Intelligence or the U.S. Army Criminal Investigations Command could decide it is appropriate for an individual to have access to all or a portion of his/her records in this system of records.

(E) From subsection (e)(4)(I) because it is necessary to protect the confidentiality of the sources of information, to protect the privacy and physical safety of confidential sources and witnesses and to avoid the disclosure of investigative techniques and procedures. Although the system will be exempt from this requirement, the Deputy Chief of Staff for Intelligence and the U.S. Army Criminal Investigations Command have published such a notice in broad, generic terms.

(29) A0601-141 DASG.

(i) System name: Army Medical Procurement Applicant Files.

(ii) Exemption: All portions of this system of records which fall within the scope of 5 U.S.C. 552a(k)(5) may be exempt from the provisions of 5 U.S.C. 552a(d).

(iii) Authority: 5 U.S.C. 552a(k)(5).

(iv) Reasons: It is imperative that the confidential nature of evaluations and investigatory material on applicants applying for enlistment furnished to the US Army Recruiting Command under an express promise of confidentiality, be maintained to insure the candid presentation of information necessary in determinations of enlistment and suitability for enlistment into the United States Army.

(30) A0601-210aUSAREC.

(i) System name: Enlisted Eligibility Files.

(ii) Exemption: All portions of this system of records which fall within the Scope of 5 U.S.C. 552a(k)(5) may be exempt from the provisions of 5 U.S.C. 552a(d).

(iii) Authority: 5 U.S.C. 552a(k)(5).

(iv) Reasons: It is imperative that the confidential nature of evaluations and investigatory material on applicants applying for enlistment furnished to the US Army Recruiting Command under an express promise of confidentiality, be maintained to insure the candid presentation of information necessary in determinations of enlistment and suitability for enlistment into the United States Army.

(31) A0601-222USMEPCOM.

(i) System name: ASVAB Student Test Scoring and Reporting System.

(ii) Exemption: All portions of this system of records which fall within the scope of 5 U.S.C. 552a(k)(6) may be exempt from the provisions of 5 U.S.C. 552a(d).

(iii) Authority: 5 U.S.C. 552a(k)(6).

(iv) Reasons: An exemption is required for those portions of the Skill Qualification Test system pertaining to individual item responses and scoring keys to prelude compromise of the test and to insure fairness and objectivity of the evaluation system.

(32) A0608-18DASG.

(i) System name: Family Advocacy Case Management.

(ii) Exemption: All portions of this system of records which fall within the scope of 5 U.S.C. 552a(k)(2) and (k)(5) may be exempt from the provisions of 5 U.S.C. 552a(d).

(iii) Authority: 5 U.S.C. 552a(k)(2) and (k)(5).

(iv) Reasons: Exemptions are needed in order to encourage persons having knowledge of abusive or neglectful acts toward children to report such information and to protect such sources from embarrassment or recriminations as well as to protect their right to privacy. It is essential that the identities of all individuals who furnish information under an express promise of confidentiality be protected. In the case of spouse abuse, it is important to protect the privacy of spouses seeking treatment. Additionally, granting individuals access to information relating to criminal and civil law enforcement could interfere with on-going investigations and the orderly administration of justice in that it could result in the concealment, alteration, destruction, or fabrication of information, could hamper the identification of offenders or alleged offenders, and the disposition of charges, and could jeopardize the safety and well-being of parents, children, and abused spouses.

(33) A0614-115DAMI.

(i) System name: Department of the Army Operational Support Activities. (ii) Exemption: All portions of this system of records that fall within the scope of 5 U.S.C. 552a(k)(1), (k)(2), or

(k)(5) may be exempt from the provisions of 5 U.S.C. 552a(c)(3), (d)(1) through (d)(5), (e)(1), (e)(4)(G), (e)(4)(H), and (e)(4)(I), and (f).

(iii) Authority: 5 U.S.C. 552a(k)(1), (k)(2), and (k)(5).

(iv) Reasons: (A) From subsection (c)(3)because disclosing the agencies to which information from this system has been released could reveal the subject's involvement in a sensitive intelligence or counterintelligence operation or investigation of an actual or potential criminal violation, or intelligence operation or investigation; or the existence of that investigation or operation. Granting access to such information could seriously impede or compromise an investigation or operation; endanger the physical safety of participants and their families, confidential sources, witnesses, intelligence personnel, and their families; and lead to the improper influencing of witnesses; the destruction of evidence or the fabrication of testimony and disclose investigative techniques and procedures.

(B) From subsection (d)(1) through (d)(5) because granting access to records could inform the subject of an intelligence or counterintelligence operation or investigation of an actual or potential criminal violation or the existence of that operation or investigation; of the nature and scope of the information and evidence obtained, or of the identity of confidential sources, witnesses and intelligence personnel. Granting access to such information could seriously impede or compromise an operation or investigation; endanger the physical safety of confidential sources, witnesses, intelligence personnel and their families; lead to the improper influencing of witnesses; the destruction of evidence or the fabrication of testimony; disclose investigative techniques and procedures; invade the privacy of those individuals involved in intelligence programs and their families; compromise and thus negate specialized techniques used to support intelligence programs; and interfere with and negate the orderly conduct of intelligence and counterintelligence operations and investigations. In addition, the agency is required to protect the confidentiality of sources who fur

nished information to the Government under an expressed promise of confidentiality or, prior to September 27, 1975, under an implied promise that the identity of the source would be held in confidence. This confidentiality is needed to maintain the Government's continued access to information from persons who otherwise might refuse to give it.

(C) From subsection (e)(1) because it is not always possible to detect the relevance of specific information in the early stages of an investigation or operation. Relevance and necessity are often questions of judgment and timing, and it is only after the information is evaluated that the relevance and necessity of such information can be established. In addition, during the course of the investigation or operation, the investigator or operative may obtain information which is incidental to the main purpose of the investigative jurisdiction of another agency. Such information cannot readily be segregated. Furthermore, during the course of the investigation or operation, the investigator may obtain information concerning violations of law other than those which are within the scope of his/her jurisdiction. In the interest of effective intelligence operations and law enforcement, military intelligence agents should retain information, since it is an aid in establishing patterns of criminal or intelligence activity and provides valuable leads for other law enforcement or intelligence agencies.

(D) From subsection (e)(4)(G), (e)(4)(H), and (f) because this system or records is being exempt from subsections (d) of the Act, concerning access to records. These requirements are inapplicable to the extent that this system of records will be exempt from subsections (d)(1) through (d)(5) of the Act. Although the system would be exempt from these requirements, the Deputy Chief of Staff for Intelligence has published information concerning its notification, access, and contest procedures because under certain circumstances, the Deputy Chief of Staff for Intelligence could decide it is appropriate for an individual to have access to all or a portion os his/her records in this system of records.

« PreviousContinue »