Reader Ad Slot
Reader Ad Slot placeholder
If you would like to support SpookStack without paying out of pocket, please consider allowing advertising cookies. It helps cover hosting costs and keeps the archive free to browse. You can change this choice at any time.
16th Street Church Bombing — Part 27
Page 71
71 / 101
BH 157~352-5F-2
In order to conserve manpower, the monitoring points
hav = day; therefore, it is
“necessary to either remove all technical equipment after each
shift or secure the equipment within the monitoring location.
Inasmuch as the monitoring points are in-residential_areas,
any unusual activity that varies from the normal behavior of
the residents of the area creates suspicion among the residents.
wal ee es whe ae oe ee ee — a or en
It is believed that thé moving in and out of the amount of
equipment necessary properly monitor the installations
definitely will arouse suspicion and create a security problen.
Furthermore, the constant handling of this equipment is detri-
mental to its effective operation. The alternative, then, is
to leave the equipment within the monitoring Bite. In order
to make this equipment Secure, the following has been done in
each instance where the installation—~is in operation:
(1) All locks ‘on outside doors have been changed.
(2) All windows have been properly secured and locked.
(3) A lock has been placed on the door leading into the
room wherein the equipment is located.
(4) A steel cabinet, 18" deep, 36" wide and 42" high,
having adjustable shelves with a lock in the handle,
Was purchased for the storage of this equipment.
This cabinet has either been bolted to the wall or
to the floor so as to prevent it from being moved
from the premises. A hasp and good grade lock has
been utilized on the doors of the cabinet in addition
to the lock in the handle to afford additional Security.
It would, therefore, be necessary to have a combination
of four keys in order to get to the equipment.
(5) Particular precaution is being taken to be assured
that none of the equipment or any written material
would identify the monitoring installation with the
FBI.
-2~
Reveal the original PDF page, then click a word to highlight the OCR text.
Community corrections
No user corrections yet.
Comments
No comments on this document yet.
Bottom Reader Ad Slot
Bottom Reader Ad Slot placeholder
If you would like to support SpookStack without paying out of pocket, please consider allowing advertising cookies. It helps cover hosting costs and keeps the archive free to browse. You can change this choice at any time.
Continue Exploring
Agency Collection
Explore This Archive Cluster
Broad Topic Hub
Topic Hub
investigation
Related subtopics
Subtopic
Subtopic
Subtopic
Subtopic
Subtopic
Subtopic