File: Joint Task Force Guantanamo (JTF-GTMO) standard operating procedures (SOP) for Camp Delta (Guantanamo Bay. Guantanamo Standard Operating Procedure. Facebook · Twitter · Reddit · Email · Print · Download Legal Document · DHS: Stop Harassing Airport Travelers Like. The official website for the Joint Task Force Guantanamo.

Author: Zugar Kajishicage
Country: Anguilla
Language: English (Spanish)
Genre: Spiritual
Published (Last): 25 April 2018
Pages: 352
PDF File Size: 10.10 Mb
ePub File Size: 3.30 Mb
ISBN: 805-9-94740-459-3
Downloads: 63185
Price: Free* [*Free Regsitration Required]
Uploader: Negal

Although the camp was reported to have been closed, Human Rights Watch reported in Zop that it currently houses non-compliant detainees.

Whistles, if clipped on a guard pocket, must now be clipped to the left pocket.

If Koran damaged or destroyed by a detainee, the chaplain and interpreter will take the Koran from the detainee for at least 10 days. Put into practice, neither manual complies with the Geneva conventions.

Camp Delta Standard Operating Procedures

Camp three is one of the camps that held detainees classified as ” enemy combatants in extrajudicial detention. If you have sopp issues talk to WikiLeaks.

Was classified, confidential, censored or otherwise withheld from the public before release.

Donate to WikiLeaks Unless otherwise specified, the document described here: The extent and detail of these changes reveals the extent of problems gitmp detainees — and also, the extent to which the military went to cover them up.

If a legal action is brought against you as a result of your submission, there are organisations that may help you.

How to contact WikiLeaks? In particular, hard drives retain data after formatting which may be visible to a digital forensics team and flash media USB sticks, memory cards and SSD drives retain data even after a secure erasure.

This page was last edited on 11 Decemberat You can only access this submissions system through Tor. Personal tools Log in. Reasons for redacting mail removed from this chapter, instead reference is given to the new OPSEC section, appearing elsewhere in the document. It is the responsibility of all personnel to protect and safeguard the contents of this SOP and ensure appropriate distribution thereof.


Addition to guidelines for passive intelligence collection by guards All book requests must now go through the interrogator and be approved by the interrogator.

Previously a random headcount in every 2-hour shift. Were haircuts used as punishment? Tor is an encrypted anonymising network that makes it harder to intercept internet communications, or see where communications are coming from or going to. Detainee Behavioral Management 12 Chapter 9: If you are a high-risk source and the computer you prepared your submission on, or uploaded it from, could subsequently be gitom in an investigation, we recommend that you format and dispose of the computer hard drive and any other storage media you used.

Drills now to take place at least once per every eight hour shift. Both manuals assert that detainees will be treated in accordance with the “spirit” of the Geneva conventions “to the degree consistent with military needs”, but never assert that the conventions are actually being followed at Guantanamo.

Camp Delta (Guantanamo Bay) – Wikipedia

Contact us to discuss how to proceed. Please review these basic guidelines. What links here Related changes Special pages Printable version Permanent link.

Public Affairs 32 Chapter Detainees in camps 1, 2, 3 may now remove orange suit top while in cell or exercise. If sp cannot use Tor, or your submission is very large, or you have specific requirements, WikiLeaks provides several alternative methods. This is the primary document for the operation of Guantanamo bay, including the securing and treatment of detainees.


Camp Delta (Guantanamo Bay)

If you used flash media to store sensitive data, it is important to destroy the media. Chaplain disempowered in section on chaplain requests Supply Operations 35 Chapter Submit documents to WikiLeaks. The general tone is given by the concluding line: Technical users can also use Tails to help ensure you do not leave any records of your submission on the computer. Technical users can also use Tails to help ensure you do not leave any records of your submission on the computer.

Tuesday December 3, Contents 1 See 2 Pervasive changes 2. What computer to use If the computer you are uploading from could subsequently be audited in an investigation, consider using a computer that is not easily tied to you.

They ban, among other things, “organized physical fitness”. Detention Facility Operations 9 Chapter 6: See our Tor tab for more information. Go to page 1 2 gito 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 giymo 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99