Preview

Summary: 152nd Theater Information Operations Group

Powerful Essays
Open Document
Open Document
2059 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Summary: 152nd Theater Information Operations Group
1. Background. I, COL Samuel E. Licorish, Jr., was appointed on 22 December 2015, as the investigation officer to conduct a formal investigation IAW AR 15-6 into the facts and circumstances surrounding allegations involving the 152nd Theater Information Operations Group (TIOG). This investigation examines the specific actions of the Brigade S3, MAJ Donald Smith who allegedly improperly made a threat of physical violence against MAJ Jeremy Reed in violation of Article 128, UCMJ, Assault. It investigates if he improperly required subordinates to prepare and process orders, travel authorizations; and improperly directed the preparation of orders for himself in the absence of a valid mission and appropriate funding in violation of DoD Directive …show more content…
The allegation against MAJ Donald Smith, stating that he improperly handled sensitive information transmitting it over non-government means in violation of AR 380-5, paragraph 5-5 and AR 25-2 para 4-20.f(5)&(6) is substantiated.

- According to MSG Michael Behrens’s sworn statement (TAB E, EXHIBIT B1), dated 20160111, “In the September/October time frame I did respond to an email from MAJ Donald Smith where he asked me to send documents that were official Army business to a personal Gmail account. My response was that that was not within Army Regulation and I could not comply. His response was for me to send him the quote from AR 25-2 that prohibited the use of personal email for official Army business, which I did provide.”

- According to MAJ Smith’s oral interview (TAB E, EXHIBIT B2), when asked if he in fact had ever used his personal email to accomplish military duties, he stated, “Absolutely, I sent emails or texts with requests at
…show more content…
MAJ Smith is mission ineffective if he does not have a valid TS level clearance, in accordance with his Military Intelligence Branch requirements. It is highly questionable as to why MAJ Smith did not begin this PSIP until December 2015, when it was brought to his attention in 29 May 2015. This lapse in time is unacceptable, opening a huge set of questions in regards to his mission, his capability to execute missions without updating his TS clearance, and his ability to maintain important military

You May Also Find These Documents Helpful

  • Good Essays

    The amount of Soldiers killed or wounded in action came in a period of just two weeks and was a direct result as a task organization failure. If operation Anaconda’s task organization provided more intelligence sections, the amount of casualties could have been avoided based on accurate reporting of the amount of insurgents in the region.…

    • 913 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    unit 210

    • 516 Words
    • 3 Pages

    1.1 /2 Some mail may contain confidential or private information. This may include personal details or information about the businesses employees or contain business confidentiality information such as names and addresses of customers or information that is relative to the business, customers, and clients. Also, mails and packages have to be checked for suspicious features. Security procedures have to also be followed when dealing with mails and packages.…

    • 516 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    ETH 301 Case Module 1

    • 860 Words
    • 3 Pages

    According to (Standler, 1998), “Reading e-mail during storage on a computer system is prohibited by federal statute, 18 U.S.C. § 2701-2711, Title II of the Electronic Communications Privacy Act (ECPA), provided that the system is "providing an electronic communication service to the public." This means, among other…

    • 860 Words
    • 3 Pages
    Better Essays
  • Powerful Essays

    At the operational level, the doctrinal attributes of mission command and proper integration of other joint functions were not followed during the planning, organizing and execution of Operation HUSKY. Integration by definition is “The arrangement of military forces and their actions to create a force that operates by engaging as a whole.” Three attributes essential to effective mission command not maximized during the operation include commander’s intent, mutual trust, and a command climate of understanding. Not fully integrating the joint functions of fires and intelligence also directly affected the overall effectiveness of the operation.…

    • 1319 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    Eth 301, Module#2

    • 326 Words
    • 2 Pages

    I do not think relatives or anyone else for that matter should have access to information of an individual that supposed to be protected by a company’s privacy act policy unless the member stated in a will that these specific documents should be released to the individuals or if a crime was committed. There is a privacy act statement for a reason. The purpose of the act is to protect the privacy and rights of all people in his email. Although the situation was a sad loss for the family being that they lost a son, policy and privacy acts still apply. Now days prior to establishing accounts with email companies, social networks or any other online corporations they have the individuals read and sign a user agreement in which most if not all talk about how they will protect the individual’s privacy. Privacy is the ability of an individual or group to seclude them or information about themselves and thereby reveal themselves selectively. As being a leader / supervisor in the Army, I have had first-hand experience with this situation. My soldier was killed in vehicle accident and during the Line-of-Duty investigation; the soldier stated to others that he was going to commit suicide. During the investigation, the investigating officer wanted to search the soldier’s computer. The family agreed to it but as the Commander of the soldier, I had to disagree with the family and the investigating officer. If it wasn’t outlined in the last will and testament, the Army didn’t grant his parents access or rights to his email. Even if the soldier is deceased we still have to respect the right of the individual.…

    • 326 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    The article starts off telling the story of Sergeant John M Russell taking the lives of 5 American Soldiers on May 11, 2009. After he pled guilty to this appalling act, more detailed, information surfaced about his mental state. Sgt. Russell was on his third deployment in six years without incident. (Hong) Although…

    • 688 Words
    • 3 Pages
    Good Essays
  • Good Essays

    The whole chain of command failed to perform their expected duties. Which some are now paying the price for their actions and are being discharged from the military. Another aspect to think about is Kenneth Eastride shouldn’t have ever been able to join the military. (He killed his best friend as a child over a Nintendo game; he went into his father’s bedroom loaded a gun and shot his best friend in the chest.) Desperate times call for desperate measures; apparently the military for the past four or so years has not done their job recruiting. By that I mean hiring some people who probably barely passed a psych…

    • 531 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Mail should always be distributed and dispatched correctly to the recipient as this can be important to the business and may contain confidential information which doesn’t need to be disclosed .It has to be dispatched within agreed timescales in order to avoid complaints from customers and potential business clients. The task specified on the email also needs to be completed within the timeframe mentioned.…

    • 2151 Words
    • 9 Pages
    Powerful Essays
  • Satisfactory Essays

    The Blogs of War

    • 429 Words
    • 2 Pages

    Blackfive, a former military blogger, say “Milblogging (another name for military blogging) is the result of an explosion of communications technology throughout the military and an increase in brainpower among the lower ranks(Page 95). Meaning when email and other such ways to communicate came about it became easier for soldiers to keep others updated on what was going on with them. And then someone was genius enough to think well if we can let our loved ones know instantly, why not give the public updates on what’s going on from our own eyes. So military blogs are blogs written by soldiers to keep the public updated on what’s going on in the war from their point of view without sugar coating or exaggerating anything!…

    • 429 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    I work for V.T. Milcom, we are a Department of Defense contractor out of Charleston, SC. Our main corporate office is in Chesapeake, VA, we also have offices in CA and FL. Our main specialty is communications. There is a joke at Milcom, “that for a technology driven Communication Company our inter-company communication is antiquated at best.”…

    • 3144 Words
    • 8 Pages
    Better Essays
  • Satisfactory Essays

    Writing a letter if someone doesn’t have access to email and they need to be informed for example we would send a letter to one of our landlords or tenants if they don’t have access to email.…

    • 289 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Leg 500 Assignment 1

    • 939 Words
    • 4 Pages

    Emails are something that’s getting sent on a daily basis all day every day. With having to set up email accounts, which ask for your social security numbers are basically your fingerprint, is an open door for people to find out any information they want to about you. Typically, some companies use company email addresses for memos that need to get to employees or company executives or any personal emails that need to be shared. With company emails come company email policies that will explain why the emails were provided and what is not acceptable content to pass through email. In the Michael A. Smyth v. The Pillsbury Company case, Mr. Smith and another employee were terminated for exchanging emails that made threats to sales managers and made rude comments about certain company events. Mr. Smith sued the Pillsbury Company for violating public policy by committing a tort known as “invasion of privacy”. In the policy, Pillsbury stated that all employee emails were going to remain confidential and privileged including plaintiff. On these grounds, Smith thought he had a case against the Pillsbury Company, but as the defendant (Pillsbury) pointed out, the company wants to keep their employees safe so the frequent email checks to ensure that…

    • 939 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    TO ILLUSTRATE HOW PRECIOUS E-MAIL IS, CONSIDER THE CASE OF DIANNA ABDALA. IN 2005, ABDALA WAS A RECENT GRADUATE OF SUFFOLK UNIVERSITY’S LAW SCHOOL, AND SHE PASSED THE BAR EXAM. SHE THEN INTERVIEWED WITH AND WAS OFFERED A JOB AT A LAW FIRM STARTED BY WILLIAM KORMAN, A FORMER STATE PROSECUTOR.…

    • 505 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    As a communications tool, email, has facilitated the global exchange of vast amounts of information. It has improved the manner and speed with which we communicate, and individuals from all walks of life are using email for different purposes.…

    • 685 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Afspa

    • 3913 Words
    • 16 Pages

    Briefing: The Armed Forces Special Powers Act (AFSPA) Review Committee takes one step forward and two backwards…

    • 3913 Words
    • 16 Pages
    Powerful Essays

Related Topics