DEFINITIONS FOR TERMS OF REFERENCE AND OUTLINE FOR NSSD 2/82 STUDY

Document Type: 
Collection: 
Document Number (FOIA) /ESDN (CREST): 
CIA-RDP89B00739R000400060027-3
Release Decision: 
RIPPUB
Original Classification: 
S
Document Page Count: 
4
Document Creation Date: 
December 20, 2016
Document Release Date: 
December 18, 2007
Sequence Number: 
27
Case Number: 
Publication Date: 
April 16, 2003
Content Type: 
REPORT
File: 
AttachmentSize
PDF icon CIA-RDP89B00739R000400060027-3.pdf334.36 KB
Body: 
Approved For Release 2007/12/18: CIA-RDP89B00739R000400060027-3 ? ? Attachment A va.r DEFINITIONS FOR TERMS OF REFERENCE AND. OUTLINE FOR NSSD 2/82 STUDY Threat or Intelligence Threat: The combination of capability and intent on the part of a foreign country to engage in an intelligence activity inimical .to the United States. 'Multidisciplinary Threat: The aggregate, irrespective 'of collection, method or technique, of all the intelligence threats posed by a given country or country group.. Vulnerability: The potential for information to be acquired through intelligence activity. Vulnerability is independent of the threat, i.e., a vulnerability. may exist even though no capability or intent exists to exploit it. ? Security: Establishment and maintenance of protective measures which are intended to ensure a state of inviolability from hostile acts or influences. Security requirements typically establish a required level of protection based on. vulnerability rather-than threat. Communications Security: The application of security to deny un- authorized persons information which might be derived from telecommunica- tions or to ensure the authenticity of telecommunications. Personnel Security: The application of security to assure that persons granted access to information are loyal and trustworthy. Physical Security:. The use of"guards, barriers, containers, alarms and other physical means to protect material, facilities or documents from damage, theft or unauthorized access. Document Security: The protection of documents through the use of classification designators and their associated access controls. Computer Security (.also Automatic Data Processing Security): The protection of computers and data processing equipment and the information they contain through a combination of physical, personnel and coi'mmunica- tions security, as well as hardware, software and management controls. Operations Security: The protection of an operation, project or program from hostile intelligence activities. Operations security establishes pro- tective requirements based upon a comparison of vulnerabilities and the multi- disciplinary threat. Operations security differs from other security programs in that it focuses on the threat. Approved For Release 2007/12/18: CIA-RDP89B00739R000400060027-3 Approved For Release 2007/12/18: CIA-RDP89B00739R000400060027-3 Counterintelligence: "..:information gathered and activities conducted to protect against espionage,. other intelligence activities, sabotage or assas- sinations. conducted for or on behalf of foreign porters, organizations or persons, or international terrorist activities, but not includi-ng personnel, physical, document or communications security programs." (E.O. 12333) Counterintelli- gence differs from security in that it is normally directed against a specific known or. postulated threat. - Intelligence Countermeasures: The aggregate of all measures taken to provide protection from the intelligence activities, irrespective of method or- technique,.of foreign countries. Intelligence countermeasures. include counter- -. intelligence, operations security, and security. (Also called multidisciplinary counterintelligence): Active Measures: A Soviet term for activities beyond traditional diplomacy which are used to achieve Soviet foreign policy objectives. Active measures - are most frequently carried out by the intelligence services and are intended to influence the policies of foreign governments, disrupt relations between other nations, undermine confidence in foreign leaders and institutions or discredit opponents. ---------------- ------ ---------- ---- .... -- --------------------------------------------------- ::::::::::::- - Approved For Release 2007/12/18: CIA-RDP89B00739R000400060027-3 '"' ===='~ "'=: Approved For Release 2007/12/18: CIA-RDP89B00739R000400060027-3 GUIDANCE FOR NATIONAL SECURITY STUDY DIRECTIVE 2/82 ON "DETECTING AND COUNTERING THE FOREIGN INTELLIGENCE THREAT TO THE UNITED STATES" o An Executive Summary of no more than a dozen pages will be. prepared. A supporting paper of greater detail but limited to manageable length. The threat capabilities and deficiencies assessments should be drawn to the extent feasible from previously prepared studies and submitted in summary form in order that the emphasis can-be placed on the sufficiency of U.S. countermeasures and what added resources are needed. o To minimize redundancy, discussions should be separate for each discipline and include only the most significant aspects of.the threat within that, discipline. The USSR and the PRC are to be treated individually; other countries or blocs can be cited as is deemed appropriate, i.e., Warsaw Pact, Communist Bloc Asia, Cuba, "friendlies," etc. o For all disciplines, the key hostile intelligence services targets are to be cited and a summary judgment made as to the state of U.S. capabilities to protect these targets. o The Human Sources discipline is to consider such key aspects as the legal presence, illegals, visitors, overt collection, recruitments/penetrations, etc. o Countermeasures against SIGINT, Imagery and Acoustic Intelligence threats. are to include operational component countermeasures, specifying why and how and the effect. 0 The Active Measures discipline is to deal with aspects of media manipula- tion-, -Front organizations, agents of influence, and the like. 'o Projected resource needs are to be detailed and specific in terms of manpower and Funding and phase-in periods. Anticipated results should. be related to projected requirements. SECRET Approved For Release 2007/12/18: CIA-RDP89B00739R000400060027-3 _ --=- Approved For Release 2007/12/18: CIA-RDP89B00739R000400060027-3 Iq Next 1 Page(s) In Document Denied Approved For Release 2007/12/18: CIA-RDP89B00739R000400060027-3