STATEMENT JOHN N. MCMAHON, DEPUTY DIRECTOR OF CENTRAL INTELLIGENCE SENATE SELECT COMMITTEE ON INTELLIGENCE HEARING 4 DECEMBER 1985 OVERVIEW ON TECHNICAL COUNTERINTELLIGENCE AND SECURITY
Document Type:
Collection:
Document Number (FOIA) /ESDN (CREST):
CIA-RDP86M00191R000300590009-0
Release Decision:
RIPPUB
Original Classification:
S
Document Page Count:
23
Document Creation Date:
December 22, 2016
Document Release Date:
November 23, 2010
Sequence Number:
9
Case Number:
Publication Date:
December 4, 1985
Content Type:
REPORT
File:
Attachment | Size |
---|---|
CIA-RDP86M00191R000300590009-0.pdf | 567.89 KB |
Body:
Declassified in Part - Sanitized Copy Approved for Release 2012/05/25: CIA-RDP86M00191 R000300590009-0
SE E-Ir
0 T--
0
STATEMENT
John N. McMahon, Deputy Director of Central Intelligence
Senate Select Committee on Intelligence Hearing
4 December 1985
Overview on Technical Counterintelligence and Security
Introduction
perspective on resources.
Mr. Chairman, I appear here today as the Administration
representative to make a brief statement on the scope of the topic,
talk about management and coordination, give a general description of
some of the authorities for working in this area, and provide a
This is the fourth in your current series. of hearings on
counterintelligence and security and the comments today should be
Declassified in Part - Sanitized Copy Approved for Release 2012/05/25: CIA-RDP86M00191 R000300590009-0
Declassified in Part - Sanitized Copy Approved for Release 2012/05/25: CIA-RDP86M00191 R000300590009-0
? SECRET ?
considered as an extension and an elaboration of views previously
presented in this series.
In his statement on 1 November, the DCI noted the increased
cooperation among CIA, NSA, and the State Department on providing
greater security to our embassies, an area where technology-based
collection efforts of the Soviets have been heavily concentrated. We
are improving our understanding of our vulnerabilities and the
strengths of the adversary. The Soviets are further ahead than we
thought and we must redress the balance.
The DCI also noted the damage done by recent espionage cases. The
assessments of these cases are yet to be completed, but they clearly
demonstrate that man is the weak link, and that the most effective way
to break through an adversary's technical defenses continues to be
through human penetrations.
2
SECRET
Declassified in Part - Sanitized Copy Approved for Release 2012/05/25: CIA-RDP86M00191 R000300590009-0
Declassified in Part - Sanitized Copy Approved for Release 2012/05/25: CIA-RDP86M00191 R000300590009-0
0
Scope
This hearing is entitled technical counterintelligence and
security, not a term widely used in the Intelligence Community. At
your request, however, individual department and agency speakers will
deal with security measures to counter Soviet and other hostile
technical threats to our communications, personnel, information
systems, installations, and equipment.
The opposition intelligence services--especially the KGB--clearly
place a high priority on the use of technology to aid in their
collection efforts. Our defensive measures have been stimulated
by the scope of the Soviet effort
9 X1
25X1
Declassified in Part - Sanitized Copy Approved for Release 2012/05/25: CIA-RDP86M00191 R000300590009-0
Declassified in Part - Sanitized Copy Approved for Release 2012/05/25: CIA-RDP86M00191 R000300590009-0
0 SECRET ?
Our countermeasures against the hostile technical threats include
the full range of counterintelligence and security disciplines:
-- countering the human, collection threat;
-- surveillance and countersurveillance;
-- physical and technical penetration of facilities;
-- technical surveillance countermeasures (i.e.,
prevention of bugging, telephone system exploitation,
etc.);
-- communications security (COMSEC);
-- emission security (TEMPEST);
SE&T
Declassified in Part - Sanitized Copy Approved for Release 2012/05/25: CIA-RDP86M00191 R000300590009-0
Declassified in Part - Sanitized Copy Approved for Release 2012/05/25: CIA-RDP86M00191 R000300590009-0
-- computer security (WMPUSEC) ;
-- physical security;
-- information security;
-- personnel security;
-- industrial security. (C)
2'25X1
SE 5 T
Declassified in Part - Sanitized Copy Approved for Release 2012/05/25: CIA-RDP86M00191 R000300590009-0
Declassified in Part - Sanitized Copy Approved for Release 2012/05/25: CIA-RDP86M00191 R000300590009-0
SECRET
Technical
improvement in the security of information processing and storage
equipment in our embassies may be negated if we leave that equipment
exposed to foreign nationals inside the embassies or in support
facilities. Our expensive, technical security measures must be
accompanied by a full range of appropriate personnel investigations and
physical security systems.
Management and Coordination
I note from your letter to the DCI on this hearing that you
continue to be concerned about the need for a comprehensive and
integrated security program, with a permanent structure for planning
and analysis to protect information and activities that have the
6
SECRET
Declassified in Part - Sanitized Copy Approved for Release 2012/05/25: CIA-RDP86M00191 R000300590009-0
Declassified in Part - Sanitized Copy Approved for Release 2012/05/25: CIA-RDP86M00191 R000300590009-0
? .
SECRET
greatest strategic importance"; and that you indicate your awareness
of recurrent proposals for a government-wide systems security budget."
In his overview comments at your first session on 1 November, the
DCI discussed the Administration's principal organization for
developing national counterintelligence and countermeasures policies
and decisions.
I do not want to repeat all that the SIG-I and its two IGs
do--one for counterintelligence and one for countermeasures--and the
related roles of various top committees and councils such as the
Intelligence Research and Development Council (the IR&DC), the National
Telecommunications and Information Systems Security Committee, the
DCI's Security Committee and his Information Handling Committee. Vat
I would like to stress is that overarching policy and strategy is
developed and enunciated pragmatically by the IGs and SIG-I. Strategy
7
SECRET
Declassified in Part - Sanitized Copy Approved for Release 2012/05/25: CIA-RDP86M00191 R000300590009-0
Declassified in Part - Sanitized Copy Approved for Release 2012/05/25: CIA-RDP86M00191 R000300590009-0
? SECRET 0
and policy for each security discipline, e.g., COMSEC, is produced by
committee/council structures tailored to the needs of the security
community for that discipline. Use of 'executive agents" and "lead
agencies' that vary with the security discipline involved is a further
manifestation of an avoidance of unnecessary and unwieldy layering. F
Central management of security resources has no Community
support. Each department's or agency's security program, of necessity,
is adapted to its operational and programmatic needs. Indeed, central
resource management could be detrimental. The IGs and the SIG-I, in
their required periodic evaluation of the effectiveness of US
counterintelligence and countermeasures against hostile intelligence
threats, can and do provide guidance with respect to desired changes in
the overall level of resources required to meet changing conditions. F
The system we have does provide coordinated policy and resource
SECRET
Declassified in Part - Sanitized Copy Approved for Release 2012/05/25: CIA-RDP86M00191 R000300590009-0
Declassified in Part - Sanitized Copy Approved for Release 2012/05/25: CIA-RDP86M00191 R000300590009-0
guidance. It may need jacking up from time to time, as is true of any
bureaucratic system. But, it works and is generally effective.
Let me now discuss the authorities for many of the security
disciplines separately.
Authorities
COMSEC--In October 1952 President Truman issued a classified
directive that established the National Security Agency as well as the
US Communications Security Board, and gave the responsibility for
OOMSEC to the NSA. President Carter's national security advisor, Dr.
Brzezinski, signed a Presidential Directive (PD/NSC-24) in November
1977 to establish a new Telecommunications Protection Policy. Two
years later, in June 1979, Defense Secretary Brown, as the Executive
SE& ET
Declassified in Part - Sanitized Copy Approved for Release 2012/05/25: CIA-RDP86M00191 R000300590009-0
Declassified in Part - Sanitized Copy Approved for Release 2012/05/25: CIA-RDP86M00191 R000300590009-0
0 SECRET 0
Agent for COMSEC, issued a National Communications Security Directive
that set up the National Communications Security Committee (NCSC), the
precursor to the National Telecommunications and Information Systems
Security Committee (NTIS SC), which dates from September 1984 with the
signing by President Reagan of National Security Decision Directive
145, "National Policy on Telecommunications and Automated Information
Systems Security."
Additionally, in November 1983, NSDD-113 was signed by the
President. It involves protection of communications systems used by
key government officials in the Washington, D.C. area. This directive
was triggered by the collection and exploitation efforts of the Soviets
and their Bloc surrogates, especially with regard to mobile
communications.
SET
Declassified in Part - Sanitized Copy Approved for Release 2012/05/25: CIA-RDP86M00191 R000300590009-0
Declassified in Part - Sanitized Copy Approved for Release 2012/05/25: CIA-RDP86M00191 R000300590009-0
TEMPEST deals with the phenomenon of compromising emanations that
was first recognized in the 1940s. It was the subject of policy
directives in 1957 and 1963, but it was only in 1976, with the issuance
of US CUMSEC BOARD (USCSB) Policy 11-76, that NSA formally was assigned
responsibility as manager of the nation's TEMPEST security program.
The USCSB was replaced by the NCSC, and the NCSC by the NTISSC, but NSA
continues to manage this program. Current national policy in the field
of TEMPEST is contained in NCSC Policy No. 4, dated 16 January 1981,
and will remain in effect until cancelled or modified by the NTISSC.
ODMPUSEC-The DoD Computer Security Center was established at NSA
in January 1981 in response to DoD Directive 5215.1. Under NSDD-145
that center became the National Computer Security Center, and the
Director of NSA became the National Manager for Telecommunications and
Automated Information Systems Security. He operates under the guidance
of an executive-level Steering Group, chaired by the Assistant to the
11
SECRET
Declassified in Part - Sanitized Copy Approved for Release 2012/05/25: CIA-RDP86M00191 R000300590009-0
Declassified in Part - Sanitized Copy Approved for Release 2012/05/25: CIA-RDP86M00191 R000300590009-0
President for National Security Affairs and including the Secretaries
of State, Defense, and Treasury; the Attorney General; the Director of
OMB; and the DCI. The three-pronged program of the center is directed
toward:
a. improving the security of existing systems;
b. encouraging industry to develop new and better computer
security products; and
.c. undertaking and sponsoring research to improve the state of
knowledge about computer security. 25X1
COMSEC, TEMPEST, and COMPUSEC: NSDD-145--As the DCI and the
Director, NSA noted on 1 November, NSDD-145 makes substantial
improvements in the administration's policy and organizational
SE&iET
Declassified in Part - Sanitized Copy Approved for Release 2012/05/25: CIA-RDP86M00191 R000300590009-0
Declassified in Part - Sanitized Copy Approved for Release 2012/05/25: CIA-RDP86M00191 R000300590009-0
. 0
structure with regard to COMSEC, CO!4USEC, and emission security. It
continues to provide a policy for the national security sector, and
adds a policy on security for the civil elements of the government as
well. Moreover, it recognizes that protection of our automated
information and telecommunications systems are not just the concerns of
government agencies, but are important to the private sector as well.
It recognizes that large quantities of government and defense industry
communications and information, which individually and in isolation may
be unclassified, in the aggregate can reveal classified and other
sensitive information. We know from multiple sources that the Soviet
Bloc collects large quantities of "unclassified" information and
communications. We also know that they have successfully and
effectively sorted such bulk information for the important intelligence
elements contained therein.
13
SECRET
Declassified in Part - Sanitized Copy Approved for Release 2012/05/25: CIA-RDP86M00191 R000300590009-0
Declassified in Part - Sanitized Copy Approved for Release 2012/05/25: CIA-RDP86M00191 R000300590009-0
0
TSCM}-NSDD-145.cites the DCI as executive agent of technical
surveillance countermeasures for detecting, neutralizing, or preventing
hostile technical penetrations. Director of Central Intelligence
Directive MID) 1/22, establishes policy and procedures for the
conduct and coordination of TSCM.
are formulated for the DCI by the Technical Surveillance
Countermeasures Subcommittee of the DCI Security Committee (SECI)M).
I wish to place into the record as part of my statement a
publication
14
SET
25X1
25X1 `
i
Declassified in Part -Sanitized Copy Approved for Release 2012/05/25: CIA-RDP86M00191 R000300590009-0
Declassified in Part - Sanitized Copy Approved for Release 2012/05/25: CIA-RDP86M00191 R000300590009-0
0 SECRET 0
This document lists finds, hazards, and other technical
security anomalies submitted for analysis during this period. I
believe the 22 finds--a substantial number of successful
detections--reflect a reasonably healthy and active TSCM program.
Physical Security standards for SCI facilities have been set by
NFIB,4 FIC 9.1/47 as a result of the leadership of the DCI and his
Security Committee in the SCI field. The National Security Act, 1947,
as amended, implies authority to impose physical security requirements
for information that reveals intelligence sources and methods. E.O.
12333, 'United States Intelligence Activities," 4 December 1981, calls
for protection of the security of installations, activities,
information, property, and employees of various agencies. And it
assigns to the DCI the responsibility to ensure the establishment by
the Intelligence Oommunity of common security and access standards for
managing and handling foreign intelligence systems, information, or
SEET
25X1
25X1
Declassified in Part - Sanitized Copy Approved for Release 2012/05/25: CIA-RDP86M00191 R000300590009-0
Declassified in Part - Sanitized Copy Approved for Release 2012/05/25: CIA-RDP86M00191 R000300590009-0
S
products and to ensure the programs are developed that protect
intelligence sources, methods, and analytical procedures.
The legal authority to impose physical security measures for
those departments and agencies not concerned with SCI matters is
implied in the authority of their heads to protect the operations and
property of their respective organizations. In some instances,
however, policy for physical protection and security is recognized or
compelled by law or Executive order. For example, Title 18 USC,
Sections 8422 and 1382, imposes criminal penalties for violations of
the 'Physical Security of Sensitive Conventional Arms...,' and
'Security of Military Installations and Resources.' E.O. 12356,
"National Security Information," 2 April 1982, and Information Security
Oversight office Directive No. 1, 25 June 1982, provide safeguarding
policy for the protection of classified information. And, Atomic
Energy Act, 1954, Section 143 implies authority to impose specific
physical security requirements for Restricted Data.
SE ET
Declassified in Part - Sanitized Copy Approved for Release 2012/05/25: CIA-RDP86M00191 R000300590009-0
Declassified in Part - Sanitized Copy Approved for Release 2012/05/25: CIA-RDP86M00191 R000300590009-0
? SECRET 0
Overflight Security--In October 1983 the President signed
NSDD-107 to improve security from the technical-collection threat posed
by hostile-country diplomatic and commercial aircraft that overfly the
United States. The Overflight Security Committee established under
this directive has been active in identifying flight routes to minimize
the threat, and in establishing procedures for notification of pending
overflight for sensitive government and military installations. The
committee has also served an advisory role to the Department of State
as it discusses bilateral commercial-aircraft agreements with Soviet
Bloc countries.
Countermeasures Resources--A Macro View
I have been talking up to now about definitions and policy
SECRET
Declassified in Part - Sanitized Copy Approved for Release 2012/05/25: CIA-RDP86M00191 R000300590009-0
Declassified in Part - Sanitized Copy Approved for Release 2012/05/25: CIA-RDP86M00191 R000300590009-0
? ?
SECRET
authorities to provide you with a broad insight into the scope of the
technical counterintelligence and security problem. To round out this
picture and underline its importance, I would like to give you some
very rough estimates of the size of the resources involved in the
various security disciplines, and to discuss in brief how they are
managed.
These estimates based largely on 1983 data are intended to be
only a macro view. Security functions are decentralized management
responsibilities funded by unlike program elements in different
budgets. A precise tabulation of expenditures is unavailable.
Therefore the figures that are available are quite soft, greatly
limiting their utility for budget analysis.
SE ET
?r,X1
25X1
Declassified in Part - Sanitized Copy Approved for Release 2012/05/25: CIA-RDP86M00191 R000300590009-0
Declassified in Part - Sanitized Copy Approved for Release 2012/05/25: CIA-RDP86M00191 R000300590009-0
0 SECRET ?
Almost all of these resources are outside the
National Foreign Intelligence Program, and are not centrally managed.
The three big-ticket security disciplines are:
-- Industrial Security,
-- Physical Security
-- Communications Security
Security disciplines with much lower expenditures,
-- Emission Security;
19
SECRET
25X11
225X1
,,25X1
25X11
2_i25X1
n c v
25X1
Declassified in Part - Sanitized Copy Approved for Release 2012/05/25: CIA-RDP86M00191 R000300590009-0
Declassified in Part - Sanitized Copy Approved for Release 2012/05/25: CIA-RDP86M00191 R000300590009-0
-- Computer Security;
-- Personnel Security; and
-- Information Security.
`'ti'll
25X1
The IG/Cxf and the SIG-I have been reviewing the general
countermeasures-resources situation since early this year.
Accordingly, the heads of the appropriate departments and agencies
involved have been asked to review their respective resource
management systems and procedures for countermeasures, especially
where large sums are involved, with the objective of determining
SE NET
Declassified in Part - Sanitized Copy Approved for Release 2012/05/25: CIA-RDP86M00191 R000300590009-0
Declassified in Part - Sanitized Copy Approved for Release 2012/05/25: CIA-RDP86M00191 R000300590009-0
whether modifications to their countermeasures programs are
indicated. The DCI intends to have a SIG-I review with department
and agency managers later on.
Two tentative conclusions may already be drawn, however.
-- The importance of personnel security, when viewed
against the background of recent espionage
disclosures and in the context of the total
countermeasures-resource spectrum, would seem to
require greater funding support, including for
behavioral research leading to new ways of detecting
problems with employees.
-- Funding for TSCM, given the seriousness of the
-hostile technical threat to usf has been insufficient
SEET
Declassified in Part - Sanitized Copy Approved for Release 2012/05/25: CIA-RDP86M00191 R000300590009-0
Declassified in Part - Sanitized Copy Approved for Release 2012/05/25: CIA-RDP86M00191 R000300590009-0
SECRET 0
and is now being increased. Nevertheless, there is much more
that needs to be done, which will require a further growth in
funding by an order of magnitude.
Those who
will be testifying next regarding CIA, DoD, NSA, and State will be
prepared to respond to.any questions you may have concerning the
plan
Conclusion
The testimony today will provide you useful insight into the
many programs designed to protect against hostile
technical-intelligence threats to US communications, information
22
SECRET
Declassified in Part - Sanitized Copy Approved for Release 2012/05/25: CIA-RDP86M00191 R000300590009-0
Declassified in Part - Sanitized Copy Approved for Release 2012/05/25: CIA-RDP86M00191 R000300590009-0
0 SECRET ?
systems, equipment and facilities--both at home and abroad--but
especially abroad. I suggest that we begin with the Department of
State representative, who will discuss the department's intentions
for implementing Inman Panel recommendations on technical
penetrations, and then proceed to hear from the CIA, NSA, and DoD
representatives.
23
SECT
Declassified in Part - Sanitized Copy Approved for Release 2012/05/25: CIA-RDP86M00191 R000300590009-0