The Use of Covert Human Intelligence Sourcescode of Practice

By 7 March 20190 CHIS
The-Use-of-Covert-Human-Intelligence-Sourcescode-of-Practice

The Use of Covert Human Intelligence Sourcescode of Practice

Published on 23rd August 2015
Joseph-de-Saram

Joseph S R de Saram CISSP FBCS MIEEE MIScT MINCOSE MACS Snr CP

Information Security Architect / Intelligence Analyst / Computer Scientist / Human Rights Activist / COMSEC / SIGINT / TSCM
636

Joseph S R de Saram CISSP provides thought-provoking insights into Military Intelligence and Law Enforcement, how they operate beyond (as opposed to above) the law, and how their various antics foreseeably lead to the destruction of Fundamental Human Rights. Updates are in progress so check back regularly – verified articles end with . Please feel free to LIKE and SHARE

THE USE OFCOVERT HUMAN INTELLIGENCE SOURCESCODE OF PRACTICE

Preliminary draft code: This document is circulated by the Home Office inadvance of enactment of the RIP Bill as an indication of current thinking. Itwill be subject to changes and additions. This circulation is not thepublication referred to in clause 69(3) of the Bill, which can only take placeafter enactment.
Joseph-de-Saram

Joseph S R de Saram CISSP FBCS MIEEE MIScT MINCOSE MACS Snr CP

Information Security Architect / Intelligence Analyst / Computer Scientist / Human Rights Activist / COMSEC / SIGINT / TSCM
RHODIUM GROUP