ANNUAL REPORT BY THE PERMANENT SELECT COMMITTEE ON INTELLIGENCE 95TH CONGRESS, 1ST SESSION

Document Type: 
Collection: 
Document Number (FOIA) /ESDN (CREST): 
CIA-RDP81M00980R003000090048-8
Release Decision: 
RIFPUB
Original Classification: 
K
Document Page Count: 
73
Document Creation Date: 
December 15, 2016
Document Release Date: 
February 26, 2004
Sequence Number: 
48
Case Number: 
Publication Date: 
January 1, 1978
Content Type: 
REPORT
File: 
AttachmentSize
PDF icon CIA-RDP81M00980R003000090048-8.pdf5.59 MB
Body: 
Approved For Release 2004/03/25 : EII O DF?b DFN0390048-8 95TH CONGRESS I HOUSE OF REPRESENTATIVES REPOxT 2d Session J No. 95-1795 ANNUAL REPORT PURSUANT TO SECTION 3 OF HOUSE RESOLUTION 658, 95TH CONGRESS, 1ST SESSION REPORT BY THE PERMANENT SELECT COMMITTEE ON INTELLIGENCE OCTOBER 14, 1978.-Committed to the Committee of the Whole House on the State of the Union and ordered to be printed U.S. GOVERNMENT PRINTING OFFICE 39-008 WASHINGTON : 1978 Approved For Release 2004/03/25 : CIA-RDP81 M00980R003000090048-8 Approved For Release 2004/03/25 : CIA-RDP81 M00980R003000090048-8 U.S. HOUSE OF REPRESENTATIVES, PERMANENT SELECT COMMITTEE ON INTELLIGENCE, Hon. THOMAS P. O'NEILL, Jr., D.C., October 14,1978. ., Speaker of the House, Washington, D.C. DEAR MR. SPEAKER: Pursuant to section 3 of House Resolution 658 (95th Cong., 1st secs.), I submit the following report on behalf of the Permanent Select Committee on Intelligence. The report contains an account of the committee's work in overseeing the intelligence and intelligence-related activities of the U.S. Government, as well as the results of its investigation into specific areas of concern detailed in House Resolution 658. The committee intends to submit similar reports periodically to the -House on the intelligence and intelligence-related activities or the Government. With every good wish, I am Sincerely yours, EDWARD P. BOLAND, Chairman. REPORT TO THE HOUSE OF REPRESENTATIVES BY TIIE PERMANENT SELECT COMMITTEE ON INTELLIGENCE For the past sixteen months, the House of Representatives, through its Permanent Select Committee on Intelligence, has beeii- conducting a thorough, ongoing examination of the intelligence and intelligence- related activities of the United States Government. This marks the first time such a continuous monitorinm of intelligence operations has been performed by a full committee ofthe House. In establishing the Permanent Select Committee, (H. Res. 658, 95th Cong., 1st sess.), the House charged it with responsibility for overseeing and making con- tinuing studies of the intelligence and intelligence-related activities of the government. In addition, the House directed the Select Com- mittee to assure that the Executive and Legislative Branches receive informed and timely intelligence to support them in making sound decisions affecting the security and vital interests of the nation. One of the major functions of the new intelligence committee is to produce annually a budget authorization bill for all the intelligence and intelli- gence-related activities of the government. Recognizing the importance of both its oversight and legislative responsibilities and the complex and diverse nature of our intelli-- Approved For Release 2004/03/25 : CIA-RDP81 M00980R003000090048-8 Approved For Release 2004/03/25 : FIA-RDP81 M00980R003000090048-8 gence services, the Committee created four subs )mmittees to reach across and into all aspects of the activities of theitellgence agencies. Those subcommittees are : Program and Budget Authorization Bill D. Burlison, (Democrat, Missouri), Chair ian. Norman Y. Mineta (Democrat, California). Edward P. Boland (Democrat, Massachusett. ). J. Kenneth Robinson (Republican, Virginia). Legislation Morgan F. Murphy, (Democrat, Illinois), Cher: rman. Roinano L. Mazzoli (Democrat, Kentucky). Edward P. Boland (Democrat, :Massachusetts Robert McClory (Republican, Illinois). Oversight Les Aspin, (Democrat, Wisconsin), Chairman Clement J. Zablocki (Democrat, Wisconsin). Edward P. Boland (Democrat, Massachusetts Bob Wilson (Republican, California). Evaluation of Per f ormanee Charles Rose, (Democrat, North Carolina), CF: iarman. Wyche Fowler, Jr. (Democrat, Georgia). Edward P. Boland (Democrat, Massachusetts John M. Ashbrook (Republican, Ohio). To support the Committee and its four sub( )mmittees, a small, highly professional staff has been hired. At presex there are fourteen professionals and thirteen support staff. The staff acludes people with experience in Congressional oversiglit, experienc within the Execu- tive Branch in evaluating the performance of i telligence activities and experience within the intelligence communit;,: as budget analysts and technical experts. The Select Committee moved quickly to fulfil': its mandate. Even before the President submitted his fiscal year 1.979 budget to the Congress, the Program and Budget Authorizat on Subcommittee of the Permanent Select Committee on Intelligence-, chaired by Repre- sentative Bill D. Burlison (Democrat, Missouri, began a series of informational hearings on the National Foreign I. itelligence Program totaling some 32 hours, in order to familiarize t).e Members in detail with the activities of our nation's most sensitive foreign intelligence and counterintelligence activities. Once the fish 1 year 1979 budget arrived on the Hill, the Subcommittee began wha turned out to be one of the most thorough examinations ever given -:he intelligence and intelligence-related budgets. In all, some 55 hours of hearings were held on the fiscal year 1979 budget. Recognizing that one of its weightiest function; is to ensure that the intelligence components of our government opera +e within the bounds of our laws, the Oversight Subcommittee, chair( l by Representative Les Aspin (Democrat, Wisconsin), in November ' 977 initiated a com- prehensive series of hearings-many of them op, ,n to the public-on the Central Intelligence Agency's relationship '-ith the media. The Oversight Subcommittee has also delved deeply i :ito the CIA's covert activities program and the mechanism whereby Congress is kept in- Approved For Release 2004/03/25 : CIA-RDP81 M00980R003000090048-8 Approved For Release 2004/03/2$: CIA-RDP81 M00980R003000090048-8 formed of such activities. In its examination of covert operations, the Subcommittee inspected several intelligence stations abroad, reviewing their programs closely. Another key aspect of the Select Committee's responsibilities is to consider all legislation which may impact on the intelligence and intel- ligence-related activities of the government. This past year saw the introduction, consideration and passage of the Foreign Intelligence Electronic Surveillance Act (H.R, 7308) which established procedures for conducting electronic surveillance inside the United States for the purpose of gathering foreign intelligence. This is the first major piece of legislation to result from the extensive hearings in 1975 and 1976 by the Church and Pike Committees. The Legislation Subcommittee, chaired by Representative Morgan Murphy (Democrat, Illinois), carried the responsibility for preparing this legislation for consideration by the Committee and the house. The question of legislative charters for the components of the intel- ligence community continues to be closely examined by the Committee which recognizes that this would be one of the most significant pieces of legislation ever to affect the intelligence activities of our government. The full Committee realized from its inception that one of its most difficult tasks would be to assure that the intelligence community pro- vided high quality and timely support to those who need such support. The Evaluation Subcommittee, chaired by Representative Charles Rose (Democrat, North Carolina), has attacked this problem by pur- suing a variety of studies focused on key aspects of the intelligence process. A constant thread running through virtually all of the Sub- committee's efforts has been the problems which have arisen from the vast increase in recent years in amounts of data being collected, primarily by highly technical systems. Processing and evaluating this immense flow of data has presented the intelligence community with certain technical difficulties and with even more intransigent man- agerial problems. The Evaluation Subcommittee has held a series of briefings and hearings an automated data processing and both Mem- bers and staff have spent many hours visiting automated data. process- ing facilities and in discussions with managers of such systems in an effort to ensure improved management through more commanality and less duplicative efforts in this field. The full Committee expressed its concern over these matters in the classified annex to the bill authorizing appropriations for fiscal year 1979 (H.R. 12240; H. Rept. 95-1075, Public Law 95-370). The annex which is incorporated by reference in the statute has the force and effect of law. The Committee has also interested itself in a wide variety of other issues which impact on the effectiveness of our intelligence services. These issues range from an investigation into the steps the Executive Branch is taking to protect the communications of both private citizens and the government from being intercepted by foreign powers operat- ing within the United States to an examination of the possible adverse impac t on the intelligence services of certain provisions of the Civil ervice Reform Act. The Committee has b een working closely with the Executive Branch in an effort to develop a joint approach to stemming the flood of unauthorized disclosures of classified and sensitive intel- ligence information. The Committee has also focused its attention on Approved For Release 2004/03/25 : CIA-RDP81 M00980R003000090048-8 Approved For Release 2004/03/25 : CIA-RDP81 M00980R003000090048-8 the problems of foreign terrorism, international -arcotics traffic and the entry of known or suspected terrorists and KGB agents into the United States. That is a brief summary of the major actions take-i by the Permanent Select Committee during the past sixteen months. Further details are provided in the body of the report. The Committee recognized from the first that in order to do the job the House had given it, an atmosphere of trust ht:.I to be develop be- tween the Committee and officials of the intelligent + agencies. Without that trust, the Committee realized it would have a irtually impossible task in getting the information it would need. At the same time, the Committee realized that n order to exercise vigorous oversight over the intelligence activities >f the government, there must, of necessity, be an adversarial relati nship between the Committee and the intelligence agencies. One key element of the relationship of trust w(. ild be the way the Committee would go about picking a staff; anothe would be the way the Committee would handle classified information. The Chairman has insisted on a full background investigation by the Federal Bureau of Investigation of each prospective staff member befc-e he grants a TOP SECRET clearance. He has also made certain tha each staff member who is granted access to sensitive intelligence in ormation has met requirements comparable to those established by t) lo Director of Cen- tral Intelligence for Executive Branch employees' access to such in- formation. In addition, each staff member as a condition of employ- ment must execute an agreement with the Comma tee not to disclose any classified information acquired while an empl yee of the Perma- nent Select Committee on Intelligence except as authorized by the Committee in accordance with clause 7 of House tule XLVIII (H. Res. 658) and the Committee rules. As to physical security, the Committee invited t (3 Director of Cen- Ual Intelligence's Chief of Security to inspect its s+ pure storage facili- ties and to certify that they meet the Director of Ct itral Intelligence's requirements for the storage of sensitive intellige tee material. That certification was acquired. Thus far, the heads of most intelligence entitit have been forth- coming in their dealings with the Committee and ` hey have provided the Committee information that has been request, A, although there have been one or two occasions where it required st eral efforts before the requested information was forthcoming. The Committee will con- tinue to insist that it be given access to all the in rormation which it needs in order to carry out the responsibilities as zgned to it by the House of Representatives. The National Security Council and the White House Staff have taken the position that they will not turn over to th Committee copies of Presidential decision memoranda on intelli -'nce activities al- though they will allow Committee Members and staff to read such decision memoranda and to make notes on them. The Committee ap- preciates the offer to allow its Members and staff to read such docu- ments which are key to an understanding of the President's intelli- Approved For Release 2004/03/25 : CIA-RDP81 M00980R003000090048-8 Approved For Release 2004/03/255 CIA-RDP81 M00980R003000090048-8 gence policies. The Committee believes, however, that it would be more in the spirit of the President's own Executive Order 12036 for such documents to be provided to the Committee for its reference and use. H. Res. 658 which created the Select Committee also directed it to conduct a study consisting of some eight separate components. Section 3. (a) of House Resolution 658 states that: The Permanent Select Committee on Intelligence shall make a study with respect to the following matters, taking into consideration with respect to each such matter, all relevant aspects of the effectiveness of planning, gathering, use, security, and dissemination of intelligence : (1) the quality of the analytical capabilities of United States intelligence and intelligence-related activities and means for integrating more closely analytical in- telli ence and policy formulation; (2) the extent and nature of the authority of the de- partments and agencies of the executive branch to en- gage in intelligence and intelligence-related activities and the desirability of developing charters for each in- telligence agency or department; (33 the organization of intelligence and intelligence- related activities in the executive branch to maximize the effectiveness of the conduct, oversight, and accountabil- ity of intelligence and intelligence-related activities; to reduce duplication or overlap; and to improve the morale of the personnel of the intelligence and intelli- gence-related agencies; (4) the conduct of covert and clandestine activities and the procedures by which Congress is informed of such activities; (5) the desirability of changing any law, House rule or procedure, or any Executive order, rule or regulation to improve the protection of intelligence secrets and pro- vide for disclosure of information for which there is no compelling reason for secrecy ; (6) the desirability of establishing a joint committee of the Senate and the House of Representatives on intel- ligence and intelligence-related activities in lieu of hav- ing separate committees in each House of Congress, or of establishing procedures under which separate com- mittees on intelligence and intelligence-related activities of the two Houses of Congress would receive joint brief- ings from the intelligence and intelligence-related agencies and coordinate their policies with respect to the safeguarding of sensitive intelligence information ; (7) the authorization of funds for the intelligence and intelligence-related activities of the Government and whether disclosure of any of the amounts of such funds is in the public interest; and Approved For Release 2004/03/25 : CIA-RDP81 M00980R003000090048-8 Approved For Release 2004/03/25 : FIA-RDP81 M00980R003000090048-8 (8) the development of a uniform sc of definitions for terms to be used in policies or guidelin?s which may be adopted by the executive or legislative I ranches to gov- ern, clarify, and strengthen the operatio of intelligence and intelligence-related activities. (b) The Permanent Select Committee on Intelligence shall report the results of the study pros ded for by this section to the House, together with any rs-11ommendations for legislative or other actions as it dee .Ys appropriate, not later than the close of the Ninety-fif Congress. The following is submitted in response to the al we direction. The Subcommittee on Evaluation, chaired by Re ,resentative Charles Rose (Democrat, N.C.), has taken the lead for tbb: full. Committee in assessing the quality of the analytic capabilities of cur intelligence and intelligence-related activities and in examining mans for integrating more closely analytic intelligence and policy fornrnilation. This is an enormous and complex subject and obviously tl,.> Committee in its little more than one year in existence has only scri: -ched the surface in reviewing all the analytic capabilities of the govei iment's-intelligence activities. Thus far, the Committee has focused on organiz tional and manage- ment issues as they impact on the efficiency and effectiveness of intel- ligence to provide support to its users. It has also xamined a number of substantive intelligence products such as the l itional Intelligence Estimates and reviewed reporting on such troubl,, spots as Somalia/ Ethiopia and most recently Nicaragua. While it finds the reporting generally responsive to user requirements,- it has a so found that there may be considerable room for improvement-espE -dally in such areas as estimating, forecasting and trend analysis reporting. It plans a detailed study of this problem during the cominj= year. Having examined the relationship among collet ion, processing and analysis in selected areas, the Committee notes tha the attention of the intelligence community appears to be directed pri 7arily to increasing collection, while other fundamental problems go rc atively unattended. These include analytical problems which cannot I attributed to lack of data. The Subcommittee on Evaluation has, however, examined several topic areas in depth, areas chosen because thei,- scope and impact affect a wide range of intelligence and policy matte s. One such area is called "Warning", i.e., the r = age of intelligence collection, processing, analysis and reporting of da "a which is intended to provide our policy makers sufficient lead time be 'ore an event occurs to develop our own course of action to either det r, alter or respond to the. impending development. The Subcommit :-,e on Evaluation's study of the performance of warning intelligent has examined the warning process in some detail, focusing on lessoi , learned from past crises such as Pearl Harbor, the Korean War, theCuba Missile Crisis, the Soviet invasion of Czechoslovakia and the 1973 Tid-East War. One major conclusion of this study is that great impi vements have been made in the collection, processing and dissemine ! ion of data useful Approved For Release 2004/03/25 : CIA-RDP81 M00980R003000090048-8 Approved For Release 2004/03/2: CIA-RDP81 M00980R003000090048-8 in the warning process but that improvements in analysis and the inte- gration of analysis with policy formulation have lagged far behind. By sharing the findings of the Subcommittee with the Executive Branch, and entering into a dialogue on these issues the Committee has already seen a positive step taken to provide a icadership focus for warning in the intelligence community. This was a direct result of the Committee calling this inadequacy to the attention of the Di- rector of Central Intelligence. During its inquiries into the quality of intelligence, the Committee has found one continuing and persistently troubling issue wherever it has looked-namely what is the requirement for any particular intelligence activity? To make a judgment as to whether or not a spe- cific component of the intelligence community is performing its func- tion adequately, it is imperative to know what requirements the user has levied on that component. The Committee has found to be ineffec- tive the efforts of the Executive Branch to identify gaps in, and take steps to satisfy requirements for, collection or analysis. The Department of Defense has created a new position, that of the Deputy Under Secretary for Policy, who is charged with the valida- tion of intelligence requirements. The Intelligence Community Staff is also studying this problem on behalf of the Director of Central Intelligence. Likewise, the Policy Review Committee of the National Security Council is charged by Executive Order 12036 with establish- ing "requirements and priorities for national foreign intelligence." The Committee will be looking closely during the coming year at those Executive Branch efforts which attempt to determine requirements and upon which an evaluation of the effectiveness of our intelligence activities can be built. The Committee also notes that the subject of requirements is an enormously complex one and one which the steps taken to date by the Executive Branch may not resolve. The Committee points for example, to the fact that the National Security Council's Policy Review Com- mittee is restricted to establishing requirements and priorities for "na- tional" intelligence. Responsibility for assigning priorities among requirements for both tactical military and "national" intelligence apparently has not been assigned to any official or group of officials within the Executive Branch nor is there any provision for the rapid and smooth transition from a peacetime environment to a wartime footing where intelligence requirements and management is concerned. The Committee intends to look deeper into these issues in the coming year. LF,GTSTATIVE CHARTERS A key aspect of the present structure and functioning of the nation's foreign intelligence activities is the fact that only the Central Intel- ligence Agency of all the elements engaged in foreign intelligence has been" created by legislation. The National Security Agency and the Defense Intelligence Agency have been operating for years without legislative charters. Further, the CIA charter consists only of a few paragraphs in the National Security Act of 1947 and a subsequent CIA Act of 1949 which largely addressed itself to administrative de- tails. For the most part, authority for the conduct of foreign intel- ligence and counterintelligence collection, dissemination, and analysis Approved For Release 2004/03/25 : CIA-RDP81 M00980R003000090048-8 Approved For Release 2004/03/25 : CIA-RDP81 M00980R003000090048-8 is contained in Executive Order 12036 signed by i president Carter on January 26, 1978. After its own examination of f his issue, the Senate Select Committee on Intelligence found a need for legislation which would authorize the activities of the various inte 'igence elements of the United States Government, and which would restrict or prohibit certain specific activities. To that end, the Senaf 11 ? Select Committee introduced a comprehensive legislative charters bill in 1978 (S. 2525). An identical bill, H.R. 11245, was introduced in the. House. The House Permanent Select Committee on Intel `igence believes this subject is important enough to deserve a thorough eview. To that end, a thorough staff examination has been scheduld I to examine this matter in detail. Additional briefings and a full complement of hear- ings will be scheduled in the next Congress. Once the Committee has completed its investigations and hearings, it wil be able to decide what legislation to recommend to the full House. IMPROVE MAN AGESiENT Executive Order 12036 attempted to establish et'ective mechanisms within the Executive Branch for overseeing the in a elligence activities of the government by establishing an Intelligenc Oversight Board and by assigning specific, responsigilities to the. In Bettors General of the intelligence agencies. It also acknowledged tl' role of Congres- sional oversight committees. In addition, Executive Order 12036 gave greater responsibility and authority to the Direct< n of intelligence information about a foreign power and which is ignificant to the national security, foreign relations, or economic interests of the United States, and which is provided by a government agew y that is assigned All intelligence mission (i..e., an intelligence agency;.. (Also see intel- ligence cycle.) Foreign intelligence service: An orgnaization of It foreign govern- ment which engages in intelligence activities. Foreign materiel (FORMAT) intelligence: Intelligence derived from the exploitation of foreign materiel. Foreign official: A person acting in an official c.pacity on behalf of a foreign power, attached to a foreign diplomatic establishment or an establishment under the control of it foreign pow. or employed by .a public international organization. Forward-looking infrared (FLIR) system : An ; rtfrared imagin system which raster scans the scene viewed by internal means both horizontally and vertically; it can be spaceborne, ai a borne, sea orne mounted on a ground vehicle, or placed at a fixed r ite; and its field of view is determined by the optics used, the scanning,. mechanism, and the dimensions of the detector array. Fusion : The blending of intelligence informatio t from multiple sources to produce a single intelligence product. .Fusion center : A term used within the Departn tent of Defense referring to an organization having the responsibility, if blending both .compartmented intelligence information with all. of -er available in- formation in order to support military operations. (Ako see actionable intelligence and tactical intelligence.) General Defense Intelligence Program (GDIP) : $ re National For- eign Intelligence Program. Geographic (al) intelligence : Foreign intelligence '.ealing with the location, description, and analysis of physical and cultural factors of the world, (e,g., terrain2 climate, natural resources, transportation, boundaries, population distribution) and their than , s through time. General medical intelligence (GMI) : See medica .intelligence. Guidance* : Advice which identifies, interprets, cll. Pies, and/or ex- pands upon an information need. (Also see informat, n need.) Human intelligence (HUMINT) : A category of intelligence in- formation derived from human sources. (Also see iumc: a source report- ing and human resources collection.) Approved For Release 2004/03/25 : CIA-RDP81 M00980R003000090048-8 Approved For Release 2004/03/2539 CIA-RDP81 M00980R003000090048-8 Human resources collection : All activities which attend collection of intelligence information from human sources. (See human intelligence and human source.) Human Resources Committee (HRC) : See Director of Central In- telligence Committee. (Also see DCID 1/17.) Duman source: A person who wittingly or unwittingly conveys by any means information of potential intelligence value to an intelligence activity. Human source reporting : The flow of intelligence information from those who gather it to the customer; it may come from information gathering activities either within or outside the Intelligence Com munity. (A form of the term is also used to denote an item of informa- tion being conveyed, as in human source report). (Also see human intelligence.) Illegal: An officer or employee of an intelligence organization who is dispatched abroad and who has no overt connection with the intel- ligence organization with which he is connected or with the govern- ment operating that intelligence organization. Illegal agent : An agent operated by an illegal residency or directly by the headquarters of an intelligence organization. (Also see illegal residency.) Illegal communication : An electronic communication or signal made without the legal sanction of the nation where it originates. Illegal residency : An intelligence apparatus established in a foreign ^.ountry and composed of one or more intelligence officers, and which as no apparent connection with the sponsoring intelligence organiza- on on or with the government of the country operating the intelligence ganization. (Also see legal residency.) Illicit communication : An electronic communication or signal origi- ted in support of clandestine operations; it is a type of clandestine nmunication. Imagery: Representations of objects reproduced electronically or optical means on film, electronic display devices, or other media. 'magery intelligence (IMINT) : The collected products of imagery erpretation processed for intelligence use. (Also see imagery inter- Aation below.) Lmagery interpretation (II) The process of locating, recognizing, ratifying, and describing objects, activities, and terrain represented imagery; it includes photographic interpretation. nitative communications deception : See communications deception. iitative deception : The introduction into foreign channels of elec- agnetic radiations which imitate his own emissions. idications and warning (I&W) : Those intelligence activities in- ed to detect and report time-sensitive intelligence information on ign developments that could involve a threat to U.S. or allied mili- T, political, or economic interests, or to U.S. citizens abroad. It en- passes forewarning of: enemy hostile actions or intentions; the ninence of hostilities; serious insurgency; nuclear/nonnuclear at- ,'&: on the U.S., its overseas forces, or allied nations; hostile reactions U.S. reconnaissance activities, terrorist attacks; and other similar ,its. ;iformation : Unevaluated material of every description, at all levels eliability, and from any source which may contain intelligence in- nation. (Also see intelligence information.) e Appendix B, Alternate Definitions. Approved For Release 2004/03/25 : CIA-RDP81 M00980R003000090048-8 Approved For Release 2004/03/240 CIA-RDP81 M00980R003000090048-8 Information handling : Management of data or ii r formation which may occur in connection with any step in the intelligence cycle; such management may involve activities to transform, x::cnipulate, index, code, categorize, store, select, retrieve, associate or di play intelligence materials; it may involve the use of printing, photo aphic, computer or communications equipment, systems or network:: it may include software programs to operate computers and proces data and/or in- formation; and may include information contained in reports, files, data bases, reference services and libraries. Information security: Safeguarding knowledge s~_=ainst unauthor- ized disclosure; or, the result of any system of admit strative policies and procedures of identifying, controlling, and pr cting from un- authorized disclosure or release to the public, information the protec- tion of which is authorized by executive order or sts. nte. Information need: The requirement of an official involved in the policymaking process or the intelligence produeticm process for the best available information and intelligence on whitiiI to base policy decisions, recommendations, or intelligence productii i. Infrared imagery : A likeness or impression prodtx !d as a result of sensing electromagnetic radiations emitted or reflect. d from a given target surface in the infrared portion of the electrom .rnetic spectrum. Integration* : A process in the production stop of the intelligence cycle in which a pattern is formed through the selecti~ n and combina- tion of evaluated intelligence information. (Also' ee intelligence cycle.) Intelligence*: (1) A body of evidence and the co elusions drawn therefrom which is acquired and furnished in resporE;e to the know ; or perceived requirements of customers; it is often d rived from in formation which is concealed or not intended to be .,:ailable for us by the acquirer; it is the product of a cyclical process.. (Also see intc ligence cycle.) Examples : Policy development requires good intelligence. Timely intelligence is important to informed ecisionmakin (2) A term used to refer collectively to the functio,us, activities, organizations which are involved in the process of planning, gathc ing, and analyzing information of potential value to flecisionmake and to the production of intelligence as defined in (1) , Bove. (Also Ff foreign intelligence and foreign counterintelligence.) Examples : Human source collection is an important intelr Bence activ Central Intelligence Agency. Intelligence is a demanding profession. Intelligence activity (ies) * : A generic term used to encompass a or all of the efforts and endeavors undertaken by intelligence orgy zations. (Also see intelligence organization.) Intelligence agency : A component organization of i ie Intelliger Community. (Also see Intelligence Community.) Intelligence assessment: A category of intelligence roduction th' encompasses most analytical studies dealing with sul sects of poli significance ; it is thorough in its treatment of subject: utter-as d tinct from building-block papers, research projects, and refere i Approved For Release 2004/03/25 : CIA-RDP81 M00980R003000090048-8 Approved For Release 2004/03/2541 CIA-RDP81 M00980R003000090048-8 aids-but unlike estimative intelligence need not attempt to project future developments and their implications; it is usually coordinated within the producing organization but may not be coordinated with other intelligence agencies. (Also see estimative intelligence). Intelligence asset : Any resource-person, group, instrument, instal- lation, or technical system-at the disposal of an intelligence organiza- tion. Intelligence collector : A phrase sometimes used to refer to an organi- zation or agency that engages in the collection step of the intelligence cycle. (Also see intelligence cycle.) Intelligence Community (IC) : A term which, in the aggregate, re- fers to the following Executive Branch organizations and activities : the Central Intelligence Agency (CIA) ; the National Security Agency (NSA) ; the Defense Intelligence Agency (DIA) ; offices within the Department of Defense for the collection of specialized national foreign intelligence through reconnaissance programs; the Bureau of Intelligence and Research (INR) of the Department of State; intel- ligence elements of the military services; intelligence elements of the Federal Bureau of Investigation (FBI) ; intelligence elements of the Department of Treasury; intelligence elements of the Department of Energy; intelligence elements of the Drug Enforcement Administra- tion; and staff elements of the Office of the Director of Central Intelligence. Intelligence Community Staff (IC Staff) : A term referring to an organization under the direction and control of the Director of Cen- tral Intelligence (DCI) formed to assist the DCI in discharging his responsibilities relating to the Intelligence Community. Intelligence consumer : See customer. Intelligence cycle* : The processes by which information is acquired and converted into intelligence and made available to customers..Chere are usually five steps in the cycle : a. Planning and direction-determination of intelligence require ments, preparation of a collection plan, issuance of orders and requests to information collection entities, and a continuous check on the pro- ductivity of collection entities. b. Collection*-acquisition of information or Intelligence informa- tion and the provision of this to processing and/or production elements. c. Processing*-conversion of collected information and/or intelli- gence information into a form more suitable for the production of intelligence. d. Production*-conversion of information or intelligence informa- tion into finished intelligence through the integration, analysis, evalu ation, and/or interpretation of all available data and the preparation of intelligence products in support of known or anticipated customer requirements. e. Dissemination*-conveyance of intelligence in suitable form to customers. Intelligence estimate* : The product of estimative intelligence. Intelligence information* : Information of potential intelligence value concerning the capabilities, intentions, and activities of any foreign power, organization, or associated personnel. Approved For Release 2004/03/25 : CIA-RDP81 M00980R003000090048-8 Approved For Release 2004/03/25 : CIA-RDP81 M00980R003000090048-8 42 Intelligence Information Handling Committee (I} C) : See Director of Central Intelligence Committee. (Also see DCID 1 4.) Intelligence information report : A product of the ollection step of the intelligence cycle. (Also see intelligence report.) Intelligence officer : A professional employee of an t atelligence orga- nization who is engaged in intelligence activities. Intelligence organization : A generic term used to i"fer to any orga- nization engaged in intelligence activities; it may in(' tide, either an in- telligence agency or a foreign intelligence service, o4. both. (Also see intelligence agency and foreign intelligence service. Intelligence Oversight Board (IOB) : A body f~ozned by appoint- ment of the President to provide him and the Attoz ey General with reports and advice on the legality and propriety of i 1, itelligence activ- ities; membership and duties are expressed in Exe,. ative Order No. 12036. Intelligence producer : A phrase usually used to ref ' r to an organiza- tion or agency that participates in the production s' p of the intelli- gence cycle. (Also see intelligence cycle. Intelligence related activities (IRA) : Those acti~ ities specifically excluded from the National Foreign Intelligence Pry !;gram which : re- spond to departmental or agency tasking for time-s nsitive informa- tion on foreign activities, respond to national Intellig once Community advisory tasking of collection ca abilities which hat a primary mis- sion of supporting departmental or agency missioi, or operational forces, of training personnel for intelligence duties, ,,r are devoted to research and development for intelligence and relatec5 capabilities. Intelligence report* : A product of the production -tep of the intel- ligence cycle. (Also see intelligence information rep ,rt.) Intelligence requirement*: Any subject, general ;tr specific, upon which there is a_need for the collection of intelligen information or the production of intelligence. (Also see collection requirement.) Intelligence Research and Development Council (1 UDC.) : See Di- rector of Central Intelligence Committee. (Also see .f )CID 1/12.) Intelligence user : See customer. Interagency Defector Committee (IDC) : See Di] ctor of Central Intelligence Committee. (Also see DCID 4/1.) Interagency intelligence memorandum (IIM) : 11, national intel- ligence assessment or estimate issued by the Director of Central In- telligence with the advice of appropriate National Foi' ign Intelligence Board components. Intercept (ion) * : Acquisition for intelligence pur )oses of electro- magnetic signals (such as radio communications) by electronic collec- tion equipment without the consent of the signallers. Intercept station: A station which intercepts comunications or non-communications transmissions for intelligence pi rposes. International lines of communications (ILC) : Those communica- tions services which are under the supervision of Cie International Telecommunication Union and which carry paid pt: Alic communica- tions traffic between different countries; also known s: International Civil Communications, International Commercial Communications, Internationally-Leased Communications, Internati nal Service of Public Correspondence, and commercial communications. Approved For Release 2004/03/25 : CIA-RDP81 M00980R003000090048-8 Approved For Release 2004/03/25 :931A-RDP81 M00980R003000090048-8 International terrorist activity* : The calculated use of violence, or the threat of violence, to attain political goals through fear, intimida- tion or coercion; usually involves a criminal act, often symbolic in nature, and is intended to influence an audience beyond the immediate victims. International terrorism transcends national boundaries in the carrying out of the act, the purpose of the act, the nationalities of the victims, or the resolution of the incident; such an act is usually de- signed to attract wide publicity in order to focus attention on the existence, cause, or demands of the perpetrators. Interpretation : A process in the production step of the intelligence cycle.. in which the significance of information or intelligence informa- tion is weighed relative to the available body of knowledge. Also see intelligence cycle.) Joint Atomic Energy Intelligence Committee (JAEIC) : See Di- rector of Central Intelligence Committee. (Also see DCID 3/3.) Joint intelligence: (1) (Military context.) Intelligence produced by elements of more than one military service of the same nation. (2) (In- telligence Community context.) Intelligence produced by intelligence organizations of more than one country. Laser intelligence (LASINT) : Technical and intelligence informa- tion derived from laser systems; it is a subcategory of electro-optical intelligence. (See electro-optical intelligence.) Legal residency : An intelligence apparatus in a foreign country and composed of intelligence officers assigned as overt representatives of their government but not necessarily identified as intelligence officers. (Also see illegal residency.) Manipulative communications cover : Those measures taken to alter or conceal the characteristics of communications so as to deny to any enemy or potential enemy the means to identify them. Also known as communications cover. Manipulative communications deception : See communications deception. Manipulative deception : The alteration or simulation of friendly electromagnetic radiations to accomplish deception. Measurement and signature intelligence* (MASINT) : Scientific and technical intelligence information obtained by quantitative and qualitative analysis of data (metric, angle, spatial, wavelength, time dependence, modulation, plasma, and hydromagnetic) derived from specific technical sensors for the purpose of identifying any distinctive features associated with the source, emitter, or sender and to facilitate subsequent identification and/or measurement of the same. Medical intelligence* (MEDINT) : Foreign intelligence related to all aspects of foreign natural and man-made environments which could influence the health of military forces; it incorporates general medical intelligence which is concerned with foreign biological medical capa- bilities and health situations, and medical scientific and technical intel- ligence which assesses and predicts technological advances of medical significance, to include defense against Chemical, Biological, Radio- logical Warfare; it applies to both tactical and strategic planning and operations, including military and humanitarian efforts. (Also see biographical intelligence.) Approved For Release 2004/03/25 : CIA-RDP81 M00980R003000090048-8 Approved For Release 2004/03/21%: CIA-RDP81M00980R003000090048-8 Military intelligence (MI) : Basic, current, or e, .imative intelli- gence on any foreign military or military-related sitution or activity. Monitor : To observe, listen to, intercept, record, o transcribe any form of communication or media for collection of intelligence infor- mation or communications security purposes, either ov rtly or covertly. Multi-level security: (For automatic data process:rig (ADP) sys- tems.) Provisions for the safeguarding of all infor ration within a multilevel information handling system. The multih-vel information handling system permits various levels, categories, vv. id/or compart- ments of material to be concurrently stored and .processed in a remotely accessed resource-sharing ADP system, while= ~imulta.neously permitting material to be selectively accessed and m= riipulated from variously controlled terminals by personnel having ;cl ffe.rent security clearances and access approvals. Security measures are -herefore aimed at ensuring proper matches between information sects=: ity and person- nel security. (Also see uni-level security) National estimate: See national intelligence estimate National Foreign Assessment Center (NFAC) 2,,n organization established by and under the control and supervision of the Director of Central Intelligence, which is responsible for produw ion of national intelligence. National Foreign Intelligence Board (NFIB) : Aaody formed to provide the Director of Central Intelligence (DCI) ith advice con- cerning: production, review, and coozdimlation of ntional foreign intelligence; the National Foreign Intelligence Program budget; inter- agency exchanges of foreign intelligence information : arrangements with foreign governments on intelligence matters; U1. . protection of intelligence sources or methods; activities of common; concern; and such other matters as are referred to it by the DCI. It is composed of the DCI (chairman), and other appropriate officers if the Central Intelligence Agency, the Office of the DCI, Departure. t of State, De- partment of Defense, Department of Justice, Departm it of the Treas- ury, Department of Energy, the offices within the )epartment of Defense for reconnaissance programs, the Defense Int, lligence Agen- cy, the National Security Agency, and the Federal Bu . >au of Investi.- gation ; senior intelligence officers of the Army, Navy, and Air Force participate as observers; a representative of the Assista it to the Presi- dent for National Security Affairs may also attend sIieetings as an observer. National Foreign Intelligence Program (NFIP) Includes the programs listed below, but its composition shall be subj~ _:t to review by the National Security Council and modification by the President. (a) The programs of the Central Intelligence Agency (b) The Consolidated Cryptologic Program, the U neral Defense Intelligence Program, and the programs of the offices within the De- partment of Defense for the collection of specialized national foreign intelligence through reconnaissance except such elemen as the Direc- tor of Central Intelligence and the Secretary of Defei: agree should be excluded; (c) Other programs of agencies within the Intelli..::ence Commu- nity designated jointly by the Director of Central Ii, =;.elligence and the head of the department or by the President as national foreign intelligence or counterintelligence activities ; Approved For Release 2004/03/25 : CIA-RDP81 M00980R003000090048-8 Approved For Release 2004/03/2,44 CIA-RDP81 M00980R003000090048-8 (d) Activities of the staff elements of the Office of the Director of Central Intelligence. (e) Activities to acquire the intelligence required for the planning and conduct of tactical operations by the United States military forces are not included in the National Foreign Intelligence Program. National intelligence* : Foreign intelligence produced under the aegis of the Director of Central Intelligence and intended primarily to be responsive to the needs of the President, the National Security Council, and other Federal officials involved in the formulation, and execution of national security, foreign political, and/or economic policy. National intelligence asset: An intelligence asset funded in the Na- tional Foreign Intelligence Program, the primary purpose of which is the collection or processing of intelligence information or the pro- duction of national intelligence. (Also see intelligence asset and na- tional intelligence.) National Intelligence Estimate* (NIE) : A thorough assessment of a situation in the foreign environment which is.relevant to the formu- lat'son of foreign, economic, and national security policy, and which projects probable future courses of action and developments; it is structured to illuminate differences of view within the Intelligence Community; it is issued by the Director of Central Intelligence with the advice of the National Foreign Intelligence Board. (Also see Spe- cial National Intelligence Estimate.) National Intelligence Officer (NIO) : The senior staff officer of the Director of Central Intelligence (DCI) and the DCI's Deputy for National Intelligence for an assigned area of substantive responsi- bility; he manages estimative and interagency intelligence production on behalf of the DCI; he is the principal point of contact between the DCI and intelligence consumers below the cabinet level; he is charged with monitoring and coordinating that portion of the National For- ei;n Assessment Center's production that involves more than one office or that is interdisciplinary in character; and is a primary source of national-level substantive guidance to Intelligence Community planners, collectors, and resource managers. National Intelligence Tasking Center (NITC) : The central orga- nizational mechanism established under the direction, control and management of the Director of Central Intelligence for coordinating and tasking national foreign intelligence collection activities, and for providing advisory tasking to other intelligence and information gathering activities. National security : The territorial integrity, sovereignty, and inter- national freedom of action of the United States. (Intelligence activi- ties relating to national security encompass all the military, economic, political, scientific and technological, and other aspects of foreign de- velopments which pose actual or potential threats to U.S. national interests.) National/tactical interface : A relationship between national and tactical intelligence activities encompassing the full range of fiscal, technical, operational, and programmatic matters. Near-real-time: The brief interval between the collection of infor- mation regarding an event and reception of the data at some other Approved For Release 2004/03/25 : CIA-RDP81 M00980R003000090048-8 Approved For Release 2004/03/25 46CIA-RDP81 M00980R003000090048-8 location, caused by the time required for processin_r, communications, and display. Net assessment: A comparative review and analysis of opposing na- tional strengths, capabilities, vulnerabilities, and v x~aknesses. (An in- telligence net assessment involves only foreign cou tries.) Nuclear intelligence (NUCINT) : Intelligence de-ived from the col- lection and analysis of radiation and other effects re citing from radio- active sources. Nuclear proliferation intelligence : Foreign inte. 'igence relating to (1) scientific, technical, and economic capabilities nd programs and the political plans and intentions of nonnuclear weapons states or foreign organizations to acquire nuclear weapons ar,.l/or to acquire the requisite special nuclear materials and to carry on research, develop- ment, and manufacture of nuclear explosive device , and; (2) the at- titudes, policies, and actions of foreign nuclear su -plier countries or organizations within these countries toward provis(,ia of technologies, facilities, or special nuclear materials which coui assist nonnuclear weapon states or foreign organizations to acquire r develop nuclear explosive devices. O$icial : See foreign official. Official information: Information which is subjei t to the control of the United States Government. Open source information: A generic term descr_bing information of potential intelligence value (i.e., intelligence info)cmation) which is available to the general public. Operational control OPCON) : (military conte t) The authority delegated to a commander to direct forces assignee so that the conm- mander may accomplish specific missions or tasks vhich are usually limited by function, time, or location ; to deploy the forces concerned ; and to retain or assign tactical control of those fore . (It does not, of itself, include administrative or logistic control.) Operational intelligence* (OPINTEL) : Intellig :nce required for planning and executing operations. Operations security (OPSEC) : Those measures & -signed to protect information concerning planned, ongoing, and core Meted operations against unauthorized disclosure. Optical intelligence (OPTINT) : That portion of ~xlectro-optical in- telligence that deals with visible light. (Also soe electro-optical intelligence.) Order of battle (OB) : Intelligence pertaining to identification, strength, command structure, and disposition of thy- personnel, units, and equipment of any foreign military force. (.zA ]so see technical intelligence.) Overt: Open; done without attempt at concealmen Overt collection : The acquisition of intelligence a iformation from public media, observation, government-to-governmendialogue, elicita- tion, and from the sharing of data openly acquired.. the process may be classified or unclassified; the target and host goN ~rnments as well as the sources involved normally are aware of the)eneral collection activity although the specific acquisition, sites, and Processes may be successfully concealed. Penetration: (1) (clandestine operations.) Tl recruitment of agents within or the infiltration of agents or introdution of technical Approved For Release 2004/03/25 : CIA-RDP81 M00980R003000090048-8 Approved For Release 2004/03/25417C1A-RDP81 M00980R003000090048-8 monitoring devices into an organization or group or physical facility f or. the purpose of acquiring information or influencing its activities (2) (automatic data processing (ADP) operations.) The unauthor- ized extraction and identification of recognizable information from a protected ADP system. .. Personnel security : The means or procedures-such as selective in- vestigations, record checks, personal interviews, and supervisory con- trols-designed to provide reasonable assurance that persons being con- sidered for or granted access to classified information are loyal and trustworthy. Photographic intelligence (PHOTINT) : The collected products of photographic interpretation classified and evaluated for intelligence use ; it is a category of imagery intelligence. Photographic interpretation (PI) : The process of locating, rec- ognizing, identifying, and describing objects, activities, and ter- rain represented on photography; it is a category of imagery interpretation. Physical security* : Physical measures-such as safes, vaults, pe- rimeter barriers, ouard systems, alarms and access controls-designed to safeguard installations against damage, disruption or unauthorized entry; information or material against authorized access or theft; and specified personnel against harm. Plain text* : Normal text or language, or any symbol or signal, that conveys information without any hidden or secret meaning. Planning and direction : See intelligence cycle. Policy Review Committee (As pertains to intelligence matters) (PRC (I) ) . A committee established under the National Security Council which when meeting under the chairmanship of the Director of Central Intelligence is empowered to establish requirements and prior- ities for national foreign intelligence and to evaluate the quality of the intelligence product; it is sometimes referred to as the Policy Re- view Committee ( Intelligence) ; its specific duties are defined in Ex- ecutive Order No. 1203&. Political intelligence* : Intelligence concerning the dynamics of the internal and external political affairs of foreign countries, regional groupings, multilateral treaty arrangements and organizations, and foreign political movements directed against or impacting upon estab- lished goverenments or authority. Positive intelligence : A term of convenience sometimes applied to foreign intelligence to distinguish it from foreign counterintelligence. Priority : A value denoting a preferential rating or precedence in position which is used to discriminate among competing entities; the term normally used in conjunction with intelligence requirements in order to illuminate importance and to guide the actions planned, being planned, or in use, to respond to the requirements. Processing* : See intelligence cycle. Product : (1) An intelligence report disseminated to customers by an intelligence agency. (2) In SIGINT usage, intelligence information derived from analysis of 'SIGINT materials and published as a report or translation for dissemination to customers (Also see production in Appendix B.) Approved For Release 2004/03/25 : CIA-RDP81 M00980R003000090048-8 Approved For Release 2004/03/254gCIA-RDP81 M00980R003000090048-8 Production* : See intelligence cycle. Proprietary : A business entity owned, in whole ~ r in part, or con- trolled by an intelligence organization and operated to provide private commercial cover for an intelligence activity of that organization. (Also see cover.) Radar intelligence (RADINT) : Intelligence information derived from data collected by radar. Radiation intelligence* (RINT) : The functions vend characteristics derived from information obtained from uninten ional electromag- netic energy emanating from foreign devices; excludes nuclear detona- tions or radioactive sources. Raw intelligence: A colloquial tern meaning col tooted intelligence information which has not yet been converted into atelligence. (Also see intelligence information.) Reconnaissance (RECCE or RECON) : An operation undertaken to obtain by visual observation or other detection methods information relating to the activities, resources or forces of a fox ='ign nation; or to secure data concerning the meteorological, hydrrgraphic, or geo- graphic characteristics of a particular area. Recruitment-in-place: A person who agrees to bei,,me an agent and retain his position in his organization or government while reporting on it to an intelligence or security organization of a 'oreign country. RED/BLACK Concept : The separation of electr i.>al and electronic circuits, components, equipment, and systems whicl- handle classified plain language information in electric signal form (I ZED) from those which handle encrypted or unclassified information BLACK) ; RED and BLACK terminology is used to clarify speci fi, criteria relating to and differentiating between such circuits, components, equipment, and systems and the areas in which they are contained. Refugee : A person who is outside the country or; d ,ea of his former habitual residence and who, because of fear of being persecuted or be- cause of hostilities in that country or area, is unwr ing or unable to return to it. (Also see defector and emigre.) Report : See intelligence report and intelligence in t'ormation report. Requirement* : See intelligence requirement or collection requirement. Residence : See illegal residency and legal residency. Sabotage: Action against material, premises or utilities, or their production, which injures, interferes with, or obsti Picts the national security or ability of a nation to prepare for or ca.t ;-y on a war. Safe house : A house or premises controlled by an intelligence or- ganzation that affords--at least temporarily-securit _y for individuals involved or equipment used in clandestine operations,:. Sanitization : The process of editing or otherwis7 - altering intelli- gence information or reports to protect sensitive int=-lligence sources, methods, capabilities, analytical procedures, or privil-ged information in order to permit wider dissemination. Scientific and technical (S&T) intelligence*:Intilligence concern- ing foreign developments in basic and applied scientific and technical research and development including engineering and production tech- niques, new technology, and weapon systems and thei r capabilities and characteristics; it also includes intelligence which squires scientific Approved For Release 2004/03/25 : CIA-RDP81 M00980R003000090048-8 Approved For Release 2004/03/25 :4191A-RDP81 M00980R003000090048-8 or technical expertise on the part of the analyst, such as medicine, physical health studies, and behavioral analyses. Scientific and Technical Intelligence Committee (STIC) : See Di- rector of Central Intelligence Committee. (Also see DCID 3/5.) Security : Establishment and maintenance of protective measures which are intended to ensure a state of inviolability from. hostile acts or influences. Security classification : See, classification. Security Committee (SECOM) : See Director of Central Intel- ligence Committee. (Also see DCID 1/11.) Sensitive* : Requiring special protection from disclosure to avoid compromise or threat to the security of the sponsor. Sensitive compartmented information* (SCI.) : All information and material requiring special controls for restricted handling within com- partmented intelligence systems and for which compartmentation is established. (Also see compartmentation.) Sensitive intelligence sources and methods: A collective term for those persons, organizations, things, conditions, or events that provide intelligence information and those means used in the collection, proc- essing, and production of such information which, if compromised, would be vulnerable to counteraction that could reasonably be expected to reduce their ability to support U.S. intelligence activities. Service Cryptologic Agency(ies) (SCA) : See Service Cryptologic Elements. Service Cryptologic Elements : A term used to designate separately or together those elements of the U.S. Army, Navy, and Air Force which perform cryptologic functions; also known as Service Crypto- logic Agencies and Service Cryptologic Organizations. Service Cryptologic Organizations (SCO) : See Service Cryptologic Elements. Sensor : (1) A technical device designed to detect and respond to one or more particular stimulae and which may record and/or transmit a resultant impulse for interpretation or measurement; often called a technical sensor. (2) Special sensor: An unclassified term used as a matter of convenience to refer to a highly classified or controlled tech- nical sensor. Side-looking airborne radar (SLAR) : An airborne radar, viewing at right angles to the axis of the vehicle, which produces a presenta- tion of terrain or targets. SIGINT activity : Any activity conducted for the purpose of produc- ing signals intelligence. (Also see SIGINT-related activity.) SIGINT Committee : See Director of Central Intelligence Com- mittee. (Also see DC JD 6/1.) SIGINT-related activity : Any activity primarily intended for a purpose(s) other than signals intelligence (SIGINT) but which can be used to produce SIGINT, or which produces SIGINT as a by- product of its principal function(s). (Also see SIGINT activity.) SIGINT technical information : Information concerning or derived from intercepted foreign transmissions or radiations which is com- posed of technical information (as opposed to intelligence) and which is required in the further collection or analysis of signals intelligence. Approved For Release 2004/03/25 : CIA-RDP81 M00980R003000090048-8 Approved For Release 2004/03/250: CIA-RDP81 M00980R003000090048-8 Sib ial* : Anything intentionally transmitted by visual and other electromagnetic, nucrear, or acoustical methods for e Cher Gommunica- tions or non-communications purposes. Signals intelligence* (S.IGINT) : Inteligence info! oration compris- ing either individually or in combination all communications intel- ligence, electronics intelligence, and foreign instruX:ientation signals intelligence, however transmitted. Signals security (SIGSEC) : A term which includes communica- tions security and electronics security and which enco ipasses measures intended to deny or counter hostile exploitation of ele tronic emissions. Signals security acquisition and analysis: The ae 1uisition of elec- tronic emissions and subsequent anlysis to determiner; empirically the susceptibility of the emission to interception and explotation by hostile intelhoence services; it includes cataloging the transi..uission spectrum and ti&ing signal parametric measurements as requited, but does not include acquisition of information carried on the sy, a_em, it is one of the techniques of signals security surveillance. (44) see signals se- curity surveillance.) Signals security surveillance: The systematic exai ination of elec- tronic emissions to determine the adequacy of sigmils security mea- sures, to identify signals security deficiencies, to pa ovide data from which to predict the effectiveness. of proposed signals security measures, and to confirm the adequacy of such measures after implementation. Source* : A person, device, system, or activity from which intel- ligence information is obtained. (Also see human soi:?ce and sensitive intelligence sources and methods.) Special activities : As defined in Executive Order o. 12036, activi- ties conducted abroad in support of national foreign policy objectives which are designed to further official United Statt programs and policies abroad and which are planned. and executed so that the role of the United States Government is not apparent or acknowledged publicly, and functions in support of such activities, but not including diplomatic activity or the collection and production of intelligence or related support functions; also known as covert action. (Also see covert action.) Special Activities OfRco(r) (SAO) : A control 1o..-oint for certain categories of compartmented information. (The acraLym is often used to refer to the compartmented information itself.) Special Coordination Committee (SCC) : A coma .attee established under the National Security Council which deals in _er alia with the oversight of sensitive intelligence activities, such a covert actions, which are. undertaken on Presidential authority. Special intelligence (SI) : An unclassified term use i to designate a category of sensitive compartmented information (ACI). (Also see sensitive compartmented information.) Special intelligence conmunications* (SPINTCOIIf 1Z) : A commu- nications network for the handling of all special into! !igence and con- sisting of those facilities under the operational and 9 ,,clinical control of the chief of intelligence of each, of the military dcgc irtments, under the management of the Defense Intelligence Agency, and under the Approved For Release 2004/03/25 : CIA-RDP81 M00980R003000090048-8 Approved For Release 2004/03/255JCIA-RDP81 M00980R003000090048-8 technical and security specification criteria established and monitored by the National Security Agency. Special National Intelligence Estimate (SNIE) : National Intel- ligence Estimates (NIEs) which are relevant to specific policy prob- lems that need to be addressed in the immediate future. SNIEs are generally unscheduled, shorter, and prepared more quickly than NIEs and are coordinated within the Intelligence Community to the extent that time permits. (Also see National Intelligence Estimate.) Special Security Office (r) (SSO) : A control point for security pro- cedures within any activity authorized access to sensitive compart- mented information. Special sensor* : See sensor. Strategic intelligence : Intelligence which is required for the formu- lation of policy and military plans at national and international levels; it differs primarily from tactical intelligence in level of use, but may also vary in scope and detail. Strategic warning Intelligence information or intelligence regard- ing the threat of the initiation of hostilities against the U.S. or in which U.S. forces may become involved; it may be received at any time prior to the initiation of hostilities. Su ort for the Analysts' File Environment (SAFE) : A joint CIA/DIA project to develop a now computer/microfilm in system to support production analysts in reading, filing, and routing cable traffic ; building and searching private and central files; and writing, editing, and routing intelligence memoranda and reports. Surveillance : Tie systematic observation or monitoring of places, persons, or things by visual, aural, electronic, photographic, or other means. Tactical intelligencc* (TACINTEL) : Foreign intelligence pro- duced under the aegis of the Secretary of Defense and intended pri- marily to be responsive to the needs of military commanders in the field to maintain the readiness of operating forces for combat operations and to support the planning and conduct of combat operations. (Also see combat intelligence.) Tactical intelligence asset: An intelligence asset funded in Depart- ment of Defense programs, the primary purpose of which is the col- lection or processing of intelligence information or the production of tactical intelligence. (Also see tactical intelligence and intelligence asset.) Target : A country, area, installation, organization, weapon system, military force, situation (political or economic), signal, person, or other entity against which intelligence operations are conducted. Target intelligence : Intelligence which portrays and locates the com- ponents of a target or target complex and indicates its identification, vulnerability, and relative importance. Tasking : The assignment or direction of an individual or activity to perform in a specified way to achieve an objective or goal. Technical intelligence (TI) : Intelligence on the characteristics and performance of foreign weapons and equipment; a part of scientific and technical intelligence and distinct from order of battle. Technical sensor : See sensor. Approved For Release 2004/03/25 : CIA-RDP81 M00980R003000090048-8 Approved For Release 2004/03/2 CIA-RDP81 M00980R003000090048-8 Technical SIGINT: Intelligence information wh-.?-h provides a de- tailed knowledge of the technical characteristics o r a given emitter and thus permits estimates to be made about its primary function, capabilities, modes of operation (including malfun(! ions), and state- of-the-art, as well as its specific role within a comply c weapon system or defense network; it is a contributor to technical 34itelligence. Telecommunications: Any transmission, emission, or reception of signs, signals, writing, images, and sounds or inf ,rtnation of any nature by wire, radio, visual, or other electromagnet c systems. Telemetry intelligence (TELINT) : Technical anal intelligence in- formation derived from intercept, processing, and a?a.l.ysis oT foreign telemetry; a subcategory of foreign instrum-!ritation signals intelligence. Teleprocessing : The overall function of an informa. ion transmission system which combines telecommunications, automati: data processing, and man-machine interface equipment and their into raction as an in- tegrated whole. TEMPEST: An unclassified term referring o technical in- vestigations for compromising emanations from elec' :-ically operated, information processing equipment; they are conduct d in support of emanations and emission security. Terrorist organization : A group that engages in to rorist activities. (Also see international terrorist activity.) Traffic analysis (TA) : The cryptologic disciplirim which develops information from communications about the compo Lion and opera- tion of communications structures and the organiz.+ ions they serve. The process involves the study of traffic and relates materials, and the reconstruction of communication plans, to produce signals intelligence. Transmission security (TRANSEC) : The comport. at of communi- cations security which results from all measures deigned to protect transmissions from interception and from exploitation by means other than cryptanalysis. Unauthorized disclosure : See compromise. Uni-level security: (For automatic data processing systems) Provi- sion for the safeguarding of all material within a sin:--le information handling system in accordance with the highest level of classification and most restrictive dissemination caveats assigned o any material contained therein, as distinguished from multilevel set urity. (Also see multi-level security.) United States Signals Intelligence System (USSS) An entity that is compromised of the National Security Agency (inn.?uding assigned military personnel) ; those elements of the military d partments and the Central Intelligence Agency performing signals in; elligence activ- ities; and those elements of any other department or agency which may from time to time be authorized by the National security Coun- cil to perform signals intelligence activities durin the ime when such elements are so authorized; it is governed by the United States Signals Intelligence Directives (USSID) system. Upgrade: To determine that certain classified infori_iation requires, in the interest of national security, a higher degre. of protection against unauthorized disclosure than currently providi i, coupled with *See Appendix B, Alternate Definitions. Approved For Release 2004/03/25 : CIA-RDP81 M00980R003000090048-8 Approved For Release 2004/03/25 : CIA-RDP81 M00980R003000090048-8 53 a changing of the classification designation to reflect such higher de- gree. (Also see classification.) User : See customer. Validation : A process normally associated with the collection of intelligence information which provides official status to an identified requirement and confirms that the .re uirement is appropriate for a given collector and has not previously been satisfied. (Also see collec- tion requirement.) Walk-in : A person who on his own initiative makes contact with a representative of a foreign country and who volunteers intelligence information and/or requests political asylum. (Also see disaffected person.) Weapon and Space Systems Intelligence Committee (WSSIC) : See Director of Central Intelligence Committee. (Also see DCID 3/4.) ACINT-Acoustical Intelligence (Naval acronym; see definition.) ACOUSTINT-Acoustical Intelligence. ASCI-Assistant Chief of Staff/Intelligence (Army or Air Force). CA-Cryptanalysis. CAMS-COMIREX Automated Management System. CCF-Collection Coordination Facility. CCP-Consolidated Cryptologic Program. CCPC-Critical Collection Problems Committee. 0--Counterintelligence. CIA-Central Intelligence Agency. CI AP-Central Intelligence Xgency Program. CIFAX-Enciphered Facsimile. C.[:PHONY-Enciphered Telephone. CIRIS-Consolidated Intelligence Resources Information System. CIVISION-Enciphered Television. COINS-Community On-Line Intelligence System. COMEX-Committee on Exchanges. COMINT-Communications Intelligence. COMIREX-Committee on Imagery Requirements and Exploitation. COMSEC-Communications Security. CONTEXT-Conferencing and Text Manipulation System. CRITIC-Critical Intelligence Message. CRITICOMM-Critical Intelligence Communications System. CRYPTO-CRYPTO. (See definition.) D AO-Defense Attache Office. DCI-Director of Central Intelligence. DCID-Director of Central Intelligence Directive. DEA-Drug Enforcement Administration. DEFSMAC-Defense Special Missile and Astronautic Center. DF-Direction Finding. DIA-Defense Intelligence Agency. DNI-Director of Naval Intelligence. ECCM-Electronic Counter-Countermeasures. ECM-Electronic Countermeasures. EEI-Essential Elements of Information. E & E-Evasion and Escape. Approved For Release 2004/03/25 : CIA-RDP81 M00980R003000090048-8 Approved For Release 2004/03/25 : CIA-RDP81 M00980R003000090048-8 54 EIC--Economic Intelligence Committee. ELECTRO-OPTINT-Electro-optical Intelligen e. ELINT-Electronic Intelligence. ELSEC-Electronic Security. EMSEC-Emanations Security. EOB-Electronic Order of Battle. ESM-Electronic Warfare Support Measures. MW'-Electronic Warfare. FBI-Federal Bureau of Investigation. FBIS-Foreign Broadcast Information Service. FCI-Foreign Counterintelligence. FI-Foreign Intelligence. FIS-Foreign Instrumentation Signals. FISINT-Foreign Instrumentation Signals Intel] ;ence. FLIR, Forward-looking infrared. FORMAT-Foreign Materiel. G-DIP-General Defense Intelligence Program. GMI-General Medical Intelligence. HPSCI-House Permanent Select Committee on Intelligence. HRC--Human Resources Committee. HUMINT-Human Intelligence. IC Intelligence Community. ICRS--Imagery Collection Requirements Subcommittee (COMIREX). IDC-Interagency Defector Committee. IIIC-Intelligence Information Handling Committee. II-Imagery Interpretation. IIM-Interagency Intelligence Memorandtmm. ILC-International Lines of Communications. 1MINT-Imagery Intelligence. INR--Bureau of Intelligence and Research, Depa . went of State. IOB-Tntelligence Oversight Board. IRA-Intelligence-Related Activities. IR&DC-Intelligence Research & Development Cou cil. I&W-Indications and Warning. TAEIC-Joint Atomic Energy Intelligence Commits e. JINTACCS-Joint Interoperability Tactical Coma and and Control System. LASINT-Laser Intelligence. MASINT-MMeasurement and Signature Intelligence. MEDINT-Medical Intelligence. MI-Military Intelligence. NFAC-National Foreign Assessment Center. NFIB-National Foreign Intelligence Board. NFIP-National Foreign Intelligence Program. NIl+}-National Intelligence Estimate. NIO-National Intelligence Officer. NITC-National Intelligence Tasking Center. NMIC-National Military Intelligence Center NOIWON-National Operations and Intelligence Watch Officers Network. NPIIR-National Foreign Intelligence Plan for Hurd ran. Resources. Approved For Release 2004/03/25 : CIA-RDP81 M00980R003000090048-8 Approved For Release 2004/03/2555 CIA-RDP81 M00980R003000090048-8 NPIC-National Photographic Interpretation Center. NSA-National Security Agency. NSCID-National Security Council Intelligence Directive. NSOC-National SIGINT Operations Center. NSRL-National SIGINT Requirements List. NTPC-National Telemetry Processing Center. NUCINT-Nuclear Intelligence. OB--Order of Battle. OPCON-Operationa1 Control. OPINTEL-Operational Intelligence. OPSEC-Operations Security. OPTINT-Optical Intelligence. PARPRO-Peacetime Airborne Reconnaissance Program. PHOTINT-Photographic Intelligence. PI-Photographic Interpretation or Photographic Interpreter. PRC.(I)-Policy Review Committee (Intelligence). RADINT---Radar Intelligence. RECCE or RECON-Reconnaissance. RINT-Radiation Intelligence. S&T-Scientific and Technical. SA-Signals Analysis. SAFE---Support for the Analysts' File Environment. SAO-Special Activities Office. SCA-Service Cryptologic Agencies. SCC-Special Coordination -Committee. SCI-Sensitive Compartmented Information or Source Code Indicator. SCO-Service Cryptologic Organizations. SECOM--security Committee. SI-Special Intelligence. SIGINT-Signals Intelligence. SIGINT Committee-Signals Intelligence Committee. SIGSEC-Signals Security. SIRVES-SIGINT Requirements Validation and Evaluation Sub- committee (of SIGINT Committee). SLAR-Side-Looking Airborne Radar. SNIE-Special National Intelligence Estimate. SOSUS-Sound Surveillance System. SOTA-SIGINT Operational. Tasking Authority. SPINTCOMM-Special Intelligence Communications. SSCI-Senate Select Committee on Intelligence. SSO-Special Security Officer. STIC-Scientific and Technical Intelligence Committee. TA-Traffic Analysis. TACINTEL-Tactical Intelligence. TI-Technical Intelligence. TELINT-Telemetry Intelligence. TRANSEC-Transmission Security. USSID-United States Signals Intelligence Directive. USSS-United. States Signals Intelligence System. WSSIC--Weapon and Space Systems Intelligence Committee. WWMCCS-Worldwide Military Command and Control Systems. Approved For Release 2004/03/25 : CIA-RDP81 M00980R003000090048-8 Approved For Release 2004/03/25 : qA-RDP81 M00980R003000090048-8 APPENDIX B-ALTEENATE DEFINIT, CN5 Acoustial intelligence: The technical and inte' igence information derived from foreign sources which generate wn yes. (Dictionary of Military and Associated Terms, Dept. of Defense j), the Joint Chiefs of Staff, 3 Sep 74 (U)). Agent: (1) An individual who acts under the ci rection of an intel- ligence agency or security service to obtain, or a&v in obtaining, in- formation-for intelligence or counterintelligence=irposes. (Final Re- port, Senate Select Committee on Intelligence, 26.. pril 1976). (2) In intelligence usage, one who is authorized or instrtx ted to obtain or to assist in obtaining information for intelligence or counterintelligence purposes. (Dictionary of Military and Associated'i erms, Dept. of De- fense (U), the Joint Chiefs of Staff, 3 Sep 74. (U)),, Agent of influence : An individual who can b used to influence covertly foreign officials, opinion molders, organi::ations; or pressure groups in a way which will generally advance Uni ed States Govern- ment objectives, or to undertake specific action in support of United States Government objectives. (Final Report, Sen.;.te Select Commit- tee on Intelligence,, 26 April 1976). Analysis: In electronic warfare, a study of elee`roma etic radia- tions to determine their technical characteristics w;d their tactical or strategic use. (Glossary of Communications-Elect,-ones Terms (U), JCS, Dec 74). Assessment : Judgment of the motives, qualifica:4.ions, and charac- teristics of present or prospective employees or "Ag nts." (Dictionary of Military and Associated Terms, Dept. of Defer -:e (U), the Joint Chiefs of Staff, 3 Sep 74. (U) ). .Asset: Any resource--a person, group, relationship, instrument, in- stallation, or supply-at the disposition of an intelligence agency for use in an operational or support role. The term is normally applied to a person who is contributing to a CIA clandestine -mission, but is not a fully controlled agent of CIA. (Final Report, Senate Select Com.- mittee' on Intelligence, 26 April 1976.) Basic intelligence: (1) General reference materia: for use in plan- ning concerning other countries which pertains to capabilities, re- sources or potential theaters of operations. See al;--intelligence-. (Dictionary of Military and Associated Terms, Dept of Defense (U), the Joint Chiefs of Staff, 3 Sep 74. (U)). (2) Facti?l, fundamental, and generally permanent information about all aspi.ts of a nation- physical, social, economic, political, biographical, ant' cultural-which is used as a base for intelligence products in support o.- f planning, poli- cymaking, and military operations. (Final Report, S( nate Select Com- mittee on Intelligence, 26 April 1976). (3) "Fundana ,ital intelligence concerning the general situation, resources, capabil ies and vulner- abilities of foreign countries or areas which may be .;ed as reference material in the planning of operations at any level ajid in evaluating subsequent information relating to the same subject.'' (Recommended Changes to JCS Pub 1, 25 July 1977). Case officer : A staff employee of the CIA who is reel>onsible for han- dling agents. (Final Report, Senate Select Committee: on Intelligence, 26 April 1976). Approved For Release 2004/03/25 : CIA-RDP81 M00980R003000090048-8 Approved For Release 2004/03/25;, CIA-RDP81 M00980R003000090048-8 Cipher: Any cryptographic system in which arbitrary symbols or groups of symbols represent units of plain text. (Final Report, Senate Select Committee on Intelligence, 26 April 1976). Clandestine operations: (1) Intelligence, counterintelligence, or other information collection activities and covert political, economic, propaganda and paramilitary activities, conducted so as to assure the secrecy of the operation. (Final Report, Senate Select Committee on Intelligence, 26 April 1976). (2) Activities to accomplish intelligence, counterintelligence, and other similar activities sponsored or conducted by Governmental departments or agencies, in such a way as to assure secrecy or concealment. (It differs from covert operations in that em- phasis is placed on concealment of the operation rather than on con- cealment of identity of sponsor.) (Dictionary of Military and Asso- ciated Terms, Dept. of Defense (U), the Joint Chiefs of Staff, 3 Sep 74. (U)). Classified information : "Classified information" means information or material (hereinafter collectively termed "information") that is owned by, produced for or being in the possession of or under the control of the United States Government that has been determined by proper authority to require protection against unauthorized disclosure in the interest of national security and is so designated. Classification and Declassification of National Security Information and Material; (Executive Order No. 11652 as amended, Nov 1977). Code : A system of communication in which arbitrary groups of symbols represent units of plain text. Codes may be used for brevity or for security. Final Report, Senate Select Committee on Intelligence, 26 April 1976). Code word : (1) A word which has been assigned a classification and a classified meaning to safeguard intentions and information regarding, a Manned operation. (Final Report, Senate Select Commit- tee on Tntelhence, 26 April 1976). (2) A word which has been as- signed aclassification and a classified meaning to safeguard intentions and information regarding a classified plan or operation. (Communica- tions Electronics Terminology (U), U.S. Dept, of the Air Force, 15 Nov 73, (U) ). (3) A word which conveys a meaning other than its conventional one. Prearranged by the correspondents. Its aim is to increase security. (Glossary of Communications-Electronics Terms (U), CS, Dec 74). CODEWORD: (1) A cryptonym used to identify sensitive intelli- gence data. (Glossary of Communications-Electronics Terms (U), JCS, Dec 74). (2) A single word selected from those listed in joint Army, Navy, Air Force publication (JANAP) 299 and subsequent volumes, and assigned a classified meaning by appropriate authority to insure proper security concerning intentions, and to safeguard infor- mation pertaining to actual, real world military plans or operations classified as Confidential or higher. (Modern Data Communications Concepts, Language and Media (U), Willaim P. Davenport, Hayden Book Co.. Inc.. 1.971, (U) ). Collection: (1) Any one or more of the gathering, analysis dissemi- nation or storage of non-publicly available information without the informed express consent of the subject of the information. (USSID 18, Limitations and Procedures in Signals Intelligence Operations of Approved For Release 2004/03/25 : CIA-RDP81 M00980R003000090048-8 Approved For Release 2004/03/25 : GI3A-RDP81 M00980R003000090048-8 the USSS (U), NSA, 26 May 76). (2) The act,,f employing instru- ments and/or equipment to obtain qualitative r quantitative data from the test or operation of foreign systems. (.?efense Intelligence Collection Requirements Manual (C), DIA, 21' Jan 75). (3) Used ELINT to mean the gathering or collection of ; fie unevaluated and uninterpreted information about the enemy or pot( utial enemy, Specif- ically the collection of data from noncommunie ions radiators such as radars, navigation aids or countermeasures equal inents. (Basic Man- ual (U), ELIIT Collection Analysis Guide (U), ational Cryptologic School, 1965, (S)). Communications intelligence (COMINT) : (1) T'echnical and intel- ligence information derived from foreign comm tnications by other than the intended recipients. COMINT is produr 'd by the collection and processing of foreign communications passel by electromagnetic means, with specific exceptions stated below, and i y the prooe$sin~g of foreign encrypted communications. However transmitted, COMINT shall not include : 1. Intercept and processing of unencrypted vritten communica- tions, except the processing of written plai t text versions of communications which have been encrypted ~ r are intended for subsequent encryption. 2. Intercept and processing of press, propaganda. and other public broadcasts, except for processing en .ryted or "hidden meaning" passages in such broadcasts. 3. Oral and wire interceptions conducted tu_der DoD Directive 5200.24. 4. Censorship. (Signals Intelligence (SIGII _T) (U), DOD, 25 Jan. 73). (2) Technical and intelligence information derived from foreign communications by other than the intended recipie as: A. Foreign Communications are all communications except : (1) Those of the governments of the U.S. and the British Common- wealth, (2) Those exchanged among private organizations and nationals, acting in a private capacity of the V'.5, and the' British Commonwealth, (3) Those of nationals of tht U.S. and British Commonwealth appointed or detailed by thr governments to serve in the international organizations. B. COMINT activities are those which pro, Iuce COMINT by collecting and processing foreign communicatiM is passed by radio, wire, or other electromagnetic means, and by the processing of foreign encrypted communications. However t~ ansmitted, cofec- tion comprises search, intercept, and direction 1=riding. Processing comprises range estimation, transinitter/open.I:or it~lentafication, signal analysis, traffic analysis, cryptanalysis, decryption, study of the nlaint.ext, the fusion of these processes3 iitd the reporting of results. C. Exceptions to COMINT and COMINT ,, ivities COOMINT and COMINT activities a defined here do not include: (1) Inter- cept and processing of unencrypted written cer imutrieations, ex- cept written plaintext versions of communicatiat. = which have been encrypted or are intended for subsequent ence lytion, (2) Inter- cept and processing of press, propaganda and tai Iter public broad- casts, except for encrypted or "hidden meaning passages in such Approved For Release 2004/03/25 : CIA-RDP81 M00980R003000090048-8 Approved For Release 2004/03/2559CIA-RDP81 M00980R003000090048-8 broadcast. (3)' Operations conducted by U.S., U,IC. or Common- wealth security authorities. (4) Censorship. (5) The interception and study of non-communications transmissions (ELINT). (USSID 3, SIGINT Security (U), NSA, 24 Aug. 72). (3) Technical and intelligence information derived from foreign communications by someone other than the intended recipient. It does not include foreign press, propaganda, or public broadcasts. The term is sometimes used interchangeably with SIGINT. (Final Report, Sen- ate Select Committee on Intelligence, 26 April 1976). Communications security (COMSEC) : (1) Protective measures taken to deny unauthorized persons information derived from tele- communications of the United States Government related to national security and to ensure the authenticity of such telecommunications. (U.S. Intelligence Activities, Executive Order No. 12036, January 1978.) (2) The protection of United States telecommunications and other communications from exploitation by foreign intelligence serv- ices and from unauthorized disclosure. COMSEC is one of the mission responsibilities of NSA. It includes cryptosecurity, transmission se- curity, emission security, and physical security of classified equipment, material, and documents. (Final Report, Senate Select Committee on Intelligence, April 26, 1976). (3) The protection resulting from the application of cryptosecurity, transmission security, and emission se- curity measures to telecommunications and from application of phys- ical security measures to COMSEC information. These measures are taken to deny unauthorized persons information of value which might be derived from the possession and study of such telecommunications or to insure the authenticity of such telecommunications. (Glossary of Communications Security and Emanations Security Terms (U), U.S. Communications Security Board, Oct. 74). (4) The protection result- ing from all measures designed to deny unauthorized persons informa- tion of value which might be derived from the possession and study of telecommunications, or to mislead unauthorized persons in their in- terpretation of the results of such possession and study. Also called COMSEC. Communications security includes : A. Cryptosecurity : B. Transmission Security : C. Emission Security : and D. Physical Secur- 4tv of Communications Security materials and information : A. Cryptosecurity-The component of communications security which results from the provision of technically sound cryptosys- tems and their proper use. B. Transmission Security-The component of communications security which results from all measures designed to protect trans- missions from interception and exploitation by means other than cryptanalysis. C. Emission Security-The component of communications se- curity which results from all measures taken to deny unauthorized persons information of value which might be derived from inter- cept and analysis of compromising emanations from cryptoequip- ment and telecommunications systems. D. Physical Security-The component of communications se- curity which results from all physical measures necessary to safe- guard classified equipment, material, and documents from access thereto or observation thereof by unauthorized persons. (Diction- ary of Military and Associated Terms, Dept. of Defense (U), the Joint Chiefs of Staff, 3 Sep. 74. (U) ). Approved For Release 2004/03/25 : CIA-RDP81 M00980R003000090048-8 Approved For Release 2004/03/256bCIA-RDP81 M00980R003000090048-8 Compartmentation : (1) The practice of establishii (, special channels for handling sensitive intelligence information. 'i'he channels are limited to individuals with a specific need for suel. information and who are therefore given. special security clearances in order to have access to it. (Final Report, Senate Select Committi. ;, on Intelligence, 26 April 1976). (2) 1. In SIGINT, special protec.:ion given to the production and distribution of SIGINT material o especially sensi- tive nature because of its source, method of proce sing, or content. 2. In COMSEC, restricting the use of specific primal y cryptovariables to specific operational units grouped together on l Cie basis of their geographical area or their common participation in a mission or opera- tion for the purpose of limiting the information l.'otected by these cryptovariables and thus limiting the adverse impac of a compromise of these variables. (Basic Cryptologic Glossary (U', NSA, 1971. (3) 1. Establishment and management of an intelligence.; organization so that information about the personnel, organization, (. activities of one component is made available to any other component t)nly to the extent required for the performance of assigned duties. (D itionary of Mili- tary and Associated Terms, Dept. of Defense (U), tl Joint Chiefs of Staff,3Sep74 (U)). Compromise : (1) The loss of control over any CO:.1NT or informa- tion related to COMINT or COMINT activities resul ing in a reasona- ble assumption that it could have, or confirmation o' the fact that it has, come to the knowledge of an unauthorized pe -on. (USSID 3, SIGINT Support to 'Military Commanders (U), NSA, 1 Jul 74). (2) The known or suspected exposure of classified ink unation or mate- rial in whole or in part to unauthorized persons th uugh loss, theft, capture, recovery by salvage, defection of individu, Is, unauthorized viewing, or 1971). any other means. (Basic Cryptologic Glo nary (U), NSA, Computer security : The protection resulting from all measures de- signed to prevent either deliberate or inadvertent t iauthorized dis- closure, acquisition, manipulation, or modification of classified infor- mation in a computer system. (Basic Cryptologic Gla.;ary (U), NSA, 1971). Consumer: An obsolete term for customer. (B. -:ic Cryptologic Glossary (U), NSA, 1971). Counterintelligence: (1) Information gathered an I. activities con- ducted to protect against espionage and other clande ine intelligence activities, sabotage, international terrorist activities (,r assassinations conducted for or on behalf of foreign powers, organizaIions or persons, but not including personnel, physical, document, or communications security programs. (U.S. Intelligence Activities, Exec -ztive Order No. 12036,,Tan 1978.) (2) Information concerning the prot etion of foreign intelligence or of national security information and it; collection from detection or disclosure. (USSID 18, Limitations aw Procedures in. Signals Intelligence Operations of the USSS (U), N' `A, 26 May 76). (3) That phase of intelligence covering all. activity det rated to destroy- mg the effectiveness of inimical foreign intelligence ictivities and to the protection of information against espionage, personnel against subversion, and installations or material against sal. )tage. See also counterespionage, countersabotage, countersubversion. (Dictionary of and Associated Terms, Dept. of Defense (U), the Joint Approved For Release 2004/03/25 : CIA-RDP81 M00980R003000090048-8 Approved For Release 2004/03/2561CIA-RDP81 M00980R003000090048-8 Chiefs of Staff, 3 Sep 74). (4) That aspect of intelligence activity which is devoted to destroying the effectiveness of inimical foreign intelligence activities and to the protection of information against espionage, individuals against subversion, and installations or material against sabotage. See also counterespionage, countersabotage, counter- subversion. (Dictionary of Military and Associated Terms, Dept. of Defense (U), the Joint Chief's of Staff, 3 Sep 74 (U) ). Critical intelligence : Intelligence which is critical and requires the immediate attention of the commander. It is required to enable the commander to make decisions which will provide a timely and appro- Eriate response to actions by the potential/actual enemy. It includes but it is not limited to the following : A. Strong indications of the imminent outbreak of hostilities of any type (warning of attack) : B. Aggression of any nature against a friendly country : C. Indications or use of nuclear-biological chemical weapons (targets) : and D. Significant events within potential enemy countries that may lead to modification of nuclear strike plans. (Dictionary of Mili- tary and Associated Terms, Dept. of Defense (U), the Joint Chiefs of Staff, 3 Sep 74. (U)) . Critical intelligence message (CRITIC) : A message containing in- formation indicating a situation or pertaining to a situation which affects the security or interests of the United States or its allies to such an extent that it may require the immediate attention of the President. (Defense Special Security Communications System (DSSCS) Operating Instructions System Procedures (U), NSA, 6 Feb 73). Cryptography : The enciphering of plain text so that it will be unintelligible to an unauthorized recipient. (Final Report, Senate Select Committee on Intelligence 26 April 1976). Cryptomaterial: All COMSEC material bearing the marking CRYTO or otherwise designated as incorporating cryptographic in- formation. Classified cryptoequipments, their classified subdivisions and keying material are considered cryptomaterial even though they do not bear the CRYPTO marking. (Communications-Electronics Terminology (U), U.S. Dept. of the Air Force, 15 Nov. 73). Current intelligence : Summaries and analyses of recent events. (Final Report, Senate Select Committee on Intelligence, 26 April 1976). Defector : A person who, for political or other reasons, has repudi- ated his country and may be in possession of information of interest to the United States Government. (Final Report, Senate Select Commit- tee on Intelligence, 26 April 1976). Defense Intelligence Community : The Defense Intelligence Agency, National Security Agency, and the intelligence components of the uni- fied and specified command. (IDHS Glossary of Common Acronyms, Codes, Abbreviations, and Terms Used in Dept. of Defense Intelli- gence Data Handling Systems (IDHS) Documents (U), DIA, 1970). Departmental intelligence : (1) Intelligence which any department or agency of the Federal Government requires to execute its own mis- sion. (Dictionary of Military and Associated Terms, Dept. of Defense .(U), the Joint Chiefs of Staff, 3 Sept. 74. (U) ). (2) The intelligence Approved For Release 2004/03/25 : CIA-RDP81 M00980R003000090048-8 Approved For Release 2004/03/255~CIA-RDP81 M00980R003000090048-8 which Government departments and agencies genes ate in support of their own activities. (Final Report, Senate Select Gmmittee oil Intel- ligence, 26 April 1976). Dissemination : The distribution of information _ntelligence prod- ucts (in oral, written, or graphic form) to departr ental and agency intelligence consumers. (Final Report, Senate Se) ct Committee on Intelligence, 26 April 1976). Double agent : Agent in contact with two opposin ;. intelligence serv- ices only one of which is aware of the double agent contact or quasi- intelligence services. (Dictionary of Military and ,ssociated Terms, Dept. of Defense (U), the Joint Chiefs of Staff, 3 .ept. 74. (U) ). Economic intelligence : Intelligence. regarding foa ign economic re- sources,- activities, and policies. (Final Report, Sena I e Select Commit- tee on Intelligence, 26 April 1976). Electronic intelligence (ELINT) : (1) That tec): nical and intelli- gence information derived from foreign electromagnetic noncom- munications transmissions by other than the inn 'nded recipients. (Glossary of Communications-Electronics Terms (, ), JCS, Dec. 74). (2) The intelligence information product of activit.!s engaged in the collection and processing for subsequent intelligene purposes of for- eign noncommunications electromagnetic radiation:; emanating from other than nuclear detonations and radioactive sours . (Basic Crypto- logic Glossary (U), NSA, 1971). (3) Technical and artelligence infor- mation derived from the collection (or interception) rnd processing of foreign electromagnetic radiations (noncommunications) emanating from sources such as radar. ELINT is part of the } >A/CSS Signals Tntelligence Mission. (Final Report, Senate Select ..'ommittee on In telligence, 26 April 1976). Electronic order of battle (EOB) : A document summarizing the deployment of enemy noncommunications and conmiunications emit- ters in a given area. In addition to deployment, the IOB also contains data as to the function of each emitter. (Basic Man 3 ial (U), ELINT Collection Analysis Guide (U), National Cryptolog School, 1965). Electronic security : The detection, identification.. evaluation, and. location of foreign electromagnetic radiations. (Fin ,.l Report, Senate Select Committee on Intelligence, 26 April 1976). Electronic surveillance : Surveillance conducted ar{ a person, group, or other entity by electronic equipment which is oft a n highly sophis- ticated and extremely sensitive. (Final Report, Sena,. Select Commit- tee on Intelligence, 26 April 1976). Encipher : To convert a plain text message into urn intelligible form by the use of a cipher system. (Final Report, Senate :;elect Committee on Intelligence, 26 April 1976). Encrypt : To convert a plain text message into in f intelligible form by means of a cryptosystem; this term covers the mea 1 Zings of encipher and encode. (Final Report, Senate Select CommittC, on Intelligence,. 26 April 1976). Espionage : Clandestine intelligence collection act . vity : This term . is often interchanged with "clandestine collection." (Final Report, Senate Select Committee on Intelligence, 26 April 1974). Evaluation: (1) Appraisal of an item of inforrrm=tion in terms of credibility, reliability, pertinency, and accuracy. Appraisal is accom- plished at several stages within the intelligence prof : ss with progres- Approved For Release 2004/03/25 : CIA-RDP81 M00980R003000090048-8 Approved For Release 2004/03/243 CIA-RDP81 M00980R003000090048-8 lively different contexts. Initial evalutions made by case officers and report officers are focused upon the reliability of the source and the accuracy of the information as judged by data available at or close to their operational levels. Later evaluations by intelligence analysts are primarily concerned with verifying accuracy of information and may, in effect, convert information into intelligence. Appraisal or evaluation ,of items of information or intelligence is indicated by a standard letter- number system. The evaluation of the reliability of sources is ,designated by a letter from A through F, and the accuracy of the in- formation is designated by numeral 1 through 6. These are two entirely independent appraisals, and these separate appraisals are indicated in accordance with the system indicated below. Thus, information ad- judged to be "probably true" received from a "usually reliable source" is designated "B-2" or "B2" while information of which the "truth ,cannot be judged" received from a "usually reliable source" is des- ignated "B-6" or "B6": Reliability of source: A-Completely reliable; B-Usually reliable; C-Fairly reliable; D-Not usually reliable; E-Un- reliable; F-Reliability cannot be judged. Accuracy of information: 1-Confirmed by other sources; 2- Probably true; 3-Possibly true; 4-Doubtful; 5-Improbable; 6-Truth cannot be judged. (Dictionary of Military and Associ- ated Terms, Dept. of Defense (U), the Joint Chiefs of Staff, 3 Sep 74. (U)) . (2) In intelligence usage, appraisal of an item of information in terms of credibility, reliability, pertinency, and accuracy. Appraisal is accomplished at several stages within the intelligence cycle with progressively different contexts. (Recommended Change to JCS Pub 1, 25 July 197T). Exploitation : In SIGINT, the production of information from messages that are encrypted in systems whose basic elements are known. Exploitation includes decryption, translation, and the solution of specific controls such as indicators and specific keys. (Basic Cryp- tologic Glossary (U), NSA, 1971). Foreign intelligence : (1) Information relating to the capabilities, intentions and activities of foreign powers, organizations or persons, but not including counterintelligence except for information on inter- national terrorist activities. (U.S. Intelligence Activities, Executive Order No. 12036, Jan. 1978.) (2) a. Information concerning the capabilities, intentions and activities of any foreign power, or of any non-United States person, whether within or outside the United States or concerning areas outside the United States. b. Information relating to the ability of the United States to protect itself against actual or potential attack or other hostile acts of a foreign power or its agents. c. Information with respect to foreign powers or non-United States persons which because of its importance is deemed essential to the security of the United States or to the conduct of its foreign affairs. d. Information relating to the ability of the United States to protect itself against the activities of foreign intelligence services. (USSID 18, Limitations and Procedures in Signals Intelligence Operations of the TTSSS (U), NSA, 26 May 76). (3) Intelligence concerning areas not under control of the power sponsoring the collection effort. (Dictionary of Military and Associated Terms, Dept. of Defense (U), the Joint Chiefs of Staff, 3 Sep 74. (U)) . Approved For Release 2004/03/25 : CIA-RDP81 M00980R003000090048-8 Approved For Release 2004/03/25 jfIA-RDP81 M00980R003000090048-8 Guidance : The general direction of an intell genre effort, par- ticularly in the area of collection. (Final Report, enate Select Com- mittee on Intelligence, 26 April 1976). Integration : In photography, a process by whirl the average radar picture seen on several scans of the time base inn., be obtained on a print, or, the process by which several photograpl c images are com- bined into a single image. (Dictionary of Milita y and Associated Terms, Dept. of Defense (U), the Joint Chiefs of St riff, 3 Sep 74. (U) ). Intelligence: (1) Foreign intelligence and counte? intelligence. (U.S. Intelligence Activities, Executive Order No. 12013(3, Jan 78.) (2) The product resulting from the collection, collation, e aluation, analysis,. integration, and interpretation of all collected inforr,lation. (Final Re- port, Senate Select Committee on Intelligence, 26 Aril 1976). (3) The product resulting from the collecting and process ig of information concerning actual and potential situations and coi ltions relating to foreign activities and to foreign or enemy-held arc.s. This processing includes the evaluation and collation of the informa 1 ion obtained from all available sources, and its analysis. synthesis, r id interpretation. (Basic Cryptologic Glossary (U); NSA, 1971). ( The product re- sulting from the collection, evaluation, analysis, intt ration, and inter- pretation of all available information which cons -rns one or more aspects of foreign nations or of areas of operation and which is im- mediately or potentially significant to military planing and opera- tions. (Dictionary of Military and Associated Term , Dept. of Defense (U) the Joint Chiefs of Staff, 3 Sep 74 (U) ). Intelligence activities: Sec. 14. (a) As used in 1 uis resolution, the term "intelligence activities" includes (1) the collecion, analysis, pro- duction, dissemination, or use of information wb _1i relates to any foreign country, or any government, political gf ou, a, party, miE tary- force, movement, or other association in such for gn country, and which relates to the defense foreign policy, nation 4 security, or re- lated policies of the United States, and other ae, vity which is in support of such activities; (2) activities taken toc aunter similar ac- tivities directed against the United States; (3) cou 1rt or clandestine activities affecting the relations of the United State : with any foreign government, political group, party, military force, r ovement or other association; (4) the collection, analysis, production. dissemination, or use of information about activities of persons within he United States, its territories and possessions, or nationals of the United States abroad whose political and related activities pose, or may be ,onsidered by any department, agency, bureau, office, division, instrniientality, or em- ployee of the United States to pose, a threat to the sternal security of the United States, and covert or clandestine activit.ic directed against such persons. Such term does not include tactical foreign military in- telligence serving no national poli.cymaking funct.ior:. (Senate Resolu- tion 400, June 1977. ) Intelligence cycle : (1) The steps by which informs '.ion is assembled, converted to intelligence, and made available to use. These steps are in four phases : A. Planning and direction : Determination c f. intelligence re- quirements, preparation of a collection plan, i- uance of orders and requests to information collection agencies, ,nd a continuous check on the productivity of collection agencies. Approved For Release 2004/03/25 : CIA-RDP81 M00980R003000090048-8 Approved For Release 2004/03/25 6bA-RDP81 M00980R003000090048-8 B. Collection : The exploitation of sources of information by collection agencies and the delivery of this information to the proper intelligence processing unit for use in the production of intelligence. C. Processing : The step whereby information becomes in- telligence through evaluation, analysis, integration, and interpretation. D. Dissemination : The conveyance of intelligence in suitable form (oral, graphic, or written) to agencies needing it. (Dic- tionary of Military and Associated Terms, Dept. of Defense (U), the Joint Chiefs of Staff, 3 Sep. 74. (U) ). (2) The steps by which information is assembled, converted into intelligence, and made available to consumers. The cycle is composed of four basic phases : (1) direction: the determination of intelligence requirements, preparation of a collection plan, tasking of collection agencies, and a continuous check on the productivity of these agencies; (2) collection: the exploitation of information sources and the delivery of the collected information to the proper intelligence processing unit for use in the production of intelligence; (3) proc- essing : the steps whereby information becomes intelligence through evaluation, analysis, integration, and interpretation; and (4) dissemination: the distribution of information or intelligence products (in oral, written, or graphic form) to departmental and agency intelligence consumers. (Final Report, Senate Select Com- mittee on Intelligence, April 26,1976). Intelligence estimate : An appraisal of the elements of intelligence relating to a specific situation or condition with a view to determining the courses of action open to the enemy or potential enemy and the probable order of their adoption. (Dictionary of Military and Asso- ciated Terms, Dept. of Defense (U), the Joint Chiefs of Staff, 3 Sep 74. (U)). Intelligence information: (1) In SIGINT, information which is of intelligence use to customers whose primary mission does not include SIGINT operations of technical SIGINT information. (Basic Cryp- tologic Glossary (U), NSA (P1, 1971). (2) The unevaluated and uninterpreted information about the enemy or potential enemy. (Basic manual (U), ELINT Collection Analysis Guide (U), National Cryp- tologic School, 1965). Intelligence report : A specific report of information, usually on a single item, made at any level of command in tactical operations and disseminated as rapidly as possible in keeping with the timeliness of the information. Also called INTREP. (Dictionary of Military and Associated Terms. Dept. of Defense (U), the Joint Chiefs of Staff, 3 Sep. 74. (U) ). Intelligence requirement : A consumer statement of information needed which is not already at hand. (Final Report, Senate Select Committee on Intelligence, 26 April 1976). Interception : The act of searching for and listening to and/or recording communications and/or electronic transmissions for the purpose of obtaining intelligence. (Glossary of Communications- Electronics Terms (U), JCS, Dec. 1974). International terrorist activities : Means any activity or activities which : (a) involves killing, causing serious bodily harm, kidnapping, Approved For Release 2004/03/25 : CIA-RDP81 M00980R003000090048-8 Approved For Release 2004/03/256 CIA-RDP81 M00980R003000090048-8 or violent destruction of property, or an attempt or i-redible threat to commit such acts; and (b) appears intended to end anger a protectee of the Secret Service or the Department of State or to further political, social, or economic goals by intimidating or coercing civilian popula- tion or any segment thereof influencing the policy o1 a government or international organization by intimidation or coere.on, or obtaining widespread publicity for a group or its cause; and ( ) transcends na- tional boundaries in terms of the means by which it. is accomplished, the civilian population, government, or internation: a organization it appears intended to coerce or intimidate, or the locate in which its per- petrators operate or seek asylum. (U.S. Intelligence ?,etivities, Execu- tive Order No. 12036, 26 Jan. 1978.) Measurement and signature intelligence (MASIN I'): MASINT is obtained by quantitative and qualitative analysis of data (metric, angle, spatial, wavelength, time dependent, modulaN. on, plasma, and hydromagpetic) derived from sensing instruments )ther than those normally associated with human communications, electronics intelli- gence (HUMINT, COMINT, ELINT) or imagery ollection. MAS- INT includes, but is not limited to, the following d ciplines : Radar intelligence (RADINT) : Nuclear intelligence (NUCINT) : Uninten- tional Radiation intelligence (RINT) : Acoustic ir elligence (Non- Compressible fluids-ACINT: Compressible fluids-ACOUS- TINT) : Electro-Optic intelligence (El.eetro-OPT ' NT) : Even-re- lated dynamic measurements photography (OPTL,'T) : and debris collection. Telemetry intelligence (TELINT) is a sh 'cial category of signals intelligence (SIGINT) that provides meal