1 2 3 4
individual's name, spouse's name, number and names of dependents, addresses, and telephone numbers. A unit will have a certain number printed and issued to company commanders, platoon sergeant, quarters managers, and some staff sections. They should be controlled and kept out of sight.
5 6 7 8 9 10 11
Manning Boards. Just about every unit has a manning board. Kept either by the S-1 or commander, it is broken down by the individual's name, duty position, squad, platoon, etc., in view for anybody who walks in the office during duty or non-duty hours. Some commanders go as far as to have a picture of each individual. All a person would have to do is walk in and take a picture of it, and he has the whole breakdown of the unit. If possible, don't use manning boards. If used, cover them up when not in use. Keep the office locked during non-duty hours.
12 13 14 15 16
Housing Assignments. Names can be easily obtained from the billeting office, especially overseas where you might employ indigenous personnel. Security managers are responsible for ensuring billeting offices establish procedures to prevent unauthorized disclosure of personal information. It is your responsibility to make sure the security managers are doing their job.
17 18 19 20
Telephone Books. Telephone books are another good source for obtaining names. You not only get the individual's name, but his address and the post he lives on as well. If you must be listed in a telephone book, request that only your name and number be included, no address or rank.
21 22 23 24
A Who's Who Book. Although good for obtaining names of VIPs, naturally, privates or 2nd lieutenants would not be listed in a Who's Who. Don't feel left out. You are safer if your name is not listed. Lots of units and schools also publish a Who's Who book. Your best bet is not to be in one.
25 26 27
Penetrations Into Home or Office. Whenever you suspect surreptitious entry, have your home and place of work searched for electronic eavesdropping equipment and bombs. If possible, conduct periodic spot searches.
Past Identification Files. Files kept by any source should be destroyed by the person responsible for them. Help yourself by making sure they are destroyed.
Duty Rosters. Duty rosters for staff duty, driver, details, etc., should be destroyed, not thrown away, when they become obsolete.
32 33 34 35
Mail. Discarded mail can easily be picked up and used to identify you, the person who wrote to you, and the place from which it was sent. This information could be used to start a dossier on a person and used later should he become a hostage. Either keep the mail or destroy it when you are through reading.
MCRP 3-02E Terrorism
The Individual's Guide for Understanding and Surviving