OPERATIONS SECURITY UPDATE - APRIL 1985 KEY PERSONNEL

Document Type: 
Collection: 
Document Number (FOIA) /ESDN (CREST): 
CIA-RDP87M00539R000400540016-9
Release Decision: 
RIPPUB
Original Classification: 
S
Document Page Count: 
58
Document Creation Date: 
December 22, 2016
Document Release Date: 
June 24, 2010
Sequence Number: 
16
Case Number: 
Publication Date: 
April 1, 1985
Content Type: 
REPORT
File: 
AttachmentSize
PDF icon CIA-RDP87M00539R000400540016-9.pdf2.85 MB
Body: 
Sanitized Copy Approved for Release 2010/06/24: CIA-RDP87M00539R000400540016-9 JtUKt I NUt UKN ARMY review completed. L APRIL 1985 Office of Origin: HO Electronic Security Command/DODO San Antonio, TX 78243-5000 Classified by: Multiple Sources Declassify on: OADR r------------~ SECRET NOFORN ~ WARNING NOTICE: Sensitive Intelligence Sources and Methods Involved (WNINTEL) Sanitized Copy Approved for Release 2010/06/24: CIA-RDP87M00539R000400540016-9 Sanitized Copy Approved for Release 2010/06/24: CIA-RDP87M00539R000400540016-9 SECRET FOREWORD (U) The Operations Security Update is published aperiodically by HQ Electronic Security Command. It is intended for use by Air Force OPSEC program managers to assist in the development of local training materials, and promotion of the Air Force OPSEC Program. We encourage subscribers to submit articles, OPSEC poster ideas or comments to improve the publication. Local reproduction of the Update is authorized. Questions concerning the Update or submissions for future publication may be submitted to HQ ESC/D000, San Antonio, Texas 78243, AUTOVON 945-2112. SECRET NOT RELEASABLE TO FOREIGN NATIONALS Sanitized Copy Approved for Release 2010/06/24: CIA-RDP87M00539R000400540016-9 Sanitized Copy Approved for Release 2010/06/24: CIA-RDP87M00539R000400540016-9 SECRET OPERATIONS SECURITY UPDATE - APRIL 1985 *** KEY PERSONNEL *** Commander BGen Paul H. Martin Vice Commander BGen Regis F.A. Urschler DCS/Operations Col John P. Lynch Director, C3CM Operations Col Robert D. Green OPSEC Division Col Marlin L. Logan Editor Mr. Joseph R. Folk **** TABLE OF CONTENTS *** 1. ESC INK Message for 1985 (U) .................................... 1 2. U.S. Military Member Possibly Provoked While in the Soviet ...... Union (U) ....................................................... 2 3. Soviet Activity on the Berlin-Marienborn Autobahn (U)........... 3 4. Soviet Access To Western Computer Networks Through Swedish...... Computer Conference System (S/NF/WN/NC) ......................... 6 5. Electronic Data Processing Security (S/NF/WN/NC) ................ 8 6. Operations Security For Small Computers (U) ..................... 9 7. The HUMINT Threat (U) ........................................... 12 8. HUMINT Threat to Secure AUTOSEVOCOM Facilities (KY-3) (U)....... 21 9. Counterintelligence (U) ......................................... 23 10. TEMPEST and You (U) ............................................. 25 11. COMINT Threat to U.S. AUTOVON and German Bundespost ............. ? Telephone Network (U) ........................................... 26 12. Soviet Military Attache Travel In The U.S. (U) ................... 31 13. Imagery Intelligence (U) ........................................ 35 14. USSR: Technology Transfer (U) .................................. 37 NOCONTRACT WARNING NOTICE SENSITIVE i i INTELLIGENCE SOURCES AND METHODS INVOLVED (WNINTB) SECRET NOT RELEASABLE TO FOREIGN NATIONALS Sanitized Copy Approved for Release 2010/06/24: CIA-RDP87MOO539R000400540016-9 Sanitized Copy Approved for Release 2010/06/24: CIA-RDP87M00539R000400540016-9 SECRET ESC INK MESSAGE FOR 1985 (U) EDITORS NOTE: The following information from our ESC INK folks appeared in their 20150OZ Dec 84 weekly OPSEC Threat highlights message. Those personnel utilizing the INK Services are encouraged to submit their requirements for threat information IAW Para D. A. (C) During 1984, we in the United States again saw further expansion of Communist Signals Intelligence collection capabilities. Year by year, hostile forces continue to increase the numbers and capabilities of intelligence collection platforms directly exploiting virtually all operations within U.S./Allied military forces. B. (S/NF/WN) C. (S) Several other examples highlighted in INK weekly messages come to mind, but needless to say the USSR and its allies have been able to continue to gain and exploit significant information on U.S. military activities by completely overt intelligence collection methods. Given the closed door nature of Soviet Intelligence Services, we cannot completely fathom the scope and success of their operations. D. (C) Therefore, only by continued vigilance and by taking cognizant actions, can we cope with ever improving enemy signals intelligence systems. Description of the threat, and its importance to Operational Security (OPSEC), must receive wide dissemination. Our goal in the coming year is to provide ever increasing detail on the deployment, actions, and capabilities of the hostile signals collection threat. In line with this goal we request your assistance in the coming year to aid in establishing requirements and priorities for evaluating all aspects of this hostile threat to our national security. Your priorities are our priorities. WARNING NOTICE: SENSITIVE INTELLIGENCE SOURCES AND METHODS INVOLVED (WNINTEQ SECRET NOT RELEASABLE TO FOREIGN NATIONALS Sanitized Copy Approved for Release 2010/06/24: CIA-RDP87M00539R000400540016-9 Sanitized Copy Approved for Release 2010/06/24: CIA-RDP87M00539R000400540016-9 SECRET U.S. MILITARY MEMBER POSSIBLY PROVOKED WHILE IN THE-=-F UNION (U) (U) A USAF NCO provided the following information concerning an Embassy support mission flown to Moscow on 13 Jun 84. The NCO served as a steward on the flight mission. A. (U) The Embassy mission took off from Rhein Main AB, with AEROFLOT navigators on board, at approximately 1030L. The AEROFLOT navigators, as in past Moscow flights, did not converse with the airmen except to get something to eat or drink and just prior to entering Soviet air space talked with the pilot to advise him once he was in Soviet air space. Upon landing in Moscow, at approximately 1500L, the aircraft was downloaded and the Defense Attache office (DAO) contact officer took the crew through customs. Source had brought with him a video camera which the customs officials seized, saying he could pick up the camera the next day when they departed. After clearing through customs, the DAO contact officer took the air crew on a short tour of Moscow prior to taking them to a hotel. The crew checked in without any problems. In the past, the air crew had to stand in line with everyone else checking into the hotel, now there is a separate check in line for the air crews. After checking into the hotel the DAO contact took the crew to a restaurant in an out of the way area of Moscow. Upon arriving at the restaurant which was located on the second floor, they found the entrance door locked. The DAO contact officer finally got the attention of an employee in the restaurant and someone came down and unlocked the door to let them in. Source was the last in the door and the door was locked behind them. They lingered at the entrance for a moment and an unknown individual came to the glass door motioning source to come to the door. Source went to the door and the individual asked him in English if he was an American. Source told him he was. The individual then told source he (the individual) had to talk to him. At the same time the individual kept pulling a piece of paper up and down out of his coat pocket. Source did not know what the piece of paper was. Source then told the individual he could not talk to him and backed away going upstairs to the restaurant. Source then informed the DAO contact officer about the incident when the group was upstairs and the contact officer stated he had done the right thing by leaving. The DAO attended the dinner later and was briefed about the individual who approached the subject. As the group exited the restaurant the individual was still outside the door and the DAO talked with the individual. Source's group went back to the hotel for the night. Source and the rest of the crew checked out of the hotel at 0600L SECRET NOT RELEASABLE TO FOREIGN NATIONALS Sanitized Copy Approved for Release 2010/06/24: CIA-RDP87M00539R000400540016-9 Sanitized Copy Approved for Release 2010/06/24: CIA-RDP87M00539R000400540016-9 SECRET and went to the airport to prepare for the return trip. When they processed through customs, source's video camera was returned to him and did not appear to have been tampered with. The mission departed the airport at approximately 0930L with the AEROFLOT navigators on board. They did not converse with the aircrew and they got off the aircraft in Paris. B. (U) OSI Comments: This report is provided to inform U.S. personnel of possible methods of Soviet provocation in order to better prepare them in the event they are faced with similar circumstances. A review of past incidents of similar nature indicated the U.S. person may have been a target of a provocation designed to either embarrass him or to place him in a compromising situation. Frequently, U.S. persons have been asked to do something which appears innocent on the surface but is illegal by law. A prime example of this would be to take any personal correspondence out of the country for Soviet persons; exchanging currency, trading of items such as clothes, books, magazines, or other objects; and to discuss politics which is prejudicial to the Soviet system. The actual intent of the Soviet in the above text is not known; however, whatever the intent, the U.S. person reacted most appropriately. (SOURCE: AFOSI) * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * The following article provided by our ESC/IN office gives a prime example of Soviet methods of contacting U.S. military and DOD civilians who are associated with intelligence activities. Although the geographical area is Germany, the tactics employed by the Soviets are apt to occur In any Eastern Bloc country visited by U.S. personnel. The article stresses the need for education. Personnel must be made aware of how to cope with and report incidents of this nature. ********************************** SOVIET ACTIVITY ON THE BERLIN-MARIENBORN AUTOBAHN (U) A. (C) Members of U.S. Forces traveling over land from West Germany to West Berlin (or reverse), over 100 miles within East Germany, must use the limited access highway between Marienborn and West Berlin. Following processing of personnel and vehicle documents at the allied checkpoints, travelers proceed to the Soviet checkpoint. At the Soviet checkpoint, the travelers must dismount and show their travel orders and personal ID documents to the Soviet sentry. After a SECRET NOT RELEASABLE TO FOREIGN NATIONALS Sanitized Copy Approved for Release 2010/06/24: CIA-RDP87M00539R000400540016-9 Sanitized Copy Approved for Release 2010/06/24: CIA-RDP87M00539R000400540016-9 Sanitized Copy Approved for Release 2010/06/24: CIA-RDP87M00539R000400540016-9 Sanitized Copy Approved for Release 2010/06/24: CIA-RDP87M00539R000400540016-9 SECRET F. (C) Conclusions about the Soviet modus operandi and the checkpoints are: . . . There is a watch system to alert the checkpoint officer when one of his targets is due. Persons waiting in the shack for their paperwork are under some sort of observation. . . . Soviet officers have a standing requirement to the sentry to identify Russian speakers or ethnic Russians determined by the name on the travel orders. An alert mechanism exists that enables the sentry to signal the shack (a burst of light). . . . Soviet officers almost invariably probe for subjects capability to travel to East Berlin. Soviets modus operandi prescribes meetings in East Berlin if possible. Those who say they can't travel to East Berlin or who must travel in groups tend to be identified as intelligence personnel. . . . Persons approached tend to be repeat travelers. The Soviets almost invariably ask about subjects frequency of travel. . . . Soviet officers often give subjects a chance to show their amenability to repeat meetings. G. (C) A profile of "Konstantin" based on descriptions provided during debriefing of U.S. Army personnel reveals that he is a 30 year old Lieutenant, who speaks with a Moscow accent and speaks good German and English. He is in his third year of a five year tour. He claims to be the commander of a "translation platoon" in Magdenburg, East Germany. His wife likes western fashions. He is well spoken and has a well polished delivery. He is alert and quick to respond. Friendly rather than pushy, and in general, quite well suited for the role assigned to him. H. (C) Subjects most likely to be approached can be male or female. "Konstantin" seems to speak more freely with females and doesn't hide his marital status. Those who travel alone after having made three or more trips in the past, those who drive an eye catching car, those having a Russian appearing name on the travel orders and those showing an interest in the literature (Soviet) on the table are likely to be approached. Other indicators for an approach are assigned to a security or intelligence unit, officer or senior NCO, and enlisted linguists from a SIGINT unit on assignment in West Berlin versus West Germany. 1. (C) Some lessons learned indicates that the awareness program needs to be fine tuned. Some people did not report promptly because they did not think it was important. Others failed to report promptly because they feared trouble from U.S. authorities, such as being banned from further travel in their vehicle. Many people did SECRET NOT RELEASABLE TO FOREIGN NATIONALS Sanitized Copy Approved for Release 2010/06/24: CIA-RDP87M00539R000400540016-9 Sanitized Copy Approved for Release 2010/06/24: CIA-RDP87M00539R000400540016-9 SECRET not know how to cope with the approach. Some became hostile while one agreed immediately to meet with the Soviet in principle. "Would you meet me for dinner in East Berlin?" The U.S. Service member replied, "sure, anytime." Personnel with Russian and German language capabilities should not flaunt their skills. Personnel with Russian or Eastern European names should be briefed. School teachers tend to travel frequently and should be briefed as a group. J. (C) The 24 approaches reported equate to an average of one per week during the survey period. Even when one considers the other approaches to the British, French, or U.S. Air Force personnel, this is not a heavy workload for "Konstantin." It must be assumed that he has approached others who have not reported. Soviet checkpoint personnel are obviously under orders to produce leads. These approaches are bold, they are made in the face of a known allied counter intelligence program and they are often directed against intelligence personnel or others of higher rank who would be likely to report such approaches to authorities. This indicates that the Soviets are enjoying some measure of success and that checkpoints are their most readily available conduit into our ranks. There is a clear and present danger that "Konstantin" or one of his colleagues will succeed in contacting a naive, malleable or gullible prospect. K. (C) CITD comment: The Marienborn-West Berlin highway is unique to U.S. forces and allies in West Berlin and provides a controlled environment for Soviet intelligence activities. A good briefing and awareness program about the checkpoints will alert U.S. personnel traveling on the highway of possible approaches by Soviet intelligence personnel. The above study points out that "Konstantin" could possibly succeed in his mission as a result of some approaches not reported to authorities. SOVIET ACCESS TO WESTERN COMPUTER NETWORKS THROUGH SWEDISH COMPUTER C NFERENCE SYSTEM S W. C Source for this report is the director of a computer communications department at a U.S. Academic Institution. A. (S/NF/WN/NC) NOCONTRACT 6 WARNING NOTICE: SENSMVE INTELLIGENCE SOURCES AND METHODS INVOLVED (WNINTE ) SECRET NOT RELEASABLE TO FOREIGN NATIONALS Sanitized Copy Approved for Release 2010/06/24: CIA-RDP87MOO539R000400540016-9 Sanitized Copy Approved for Release 2010/06/24: CIA-RDP87M00539R000400540016-9 Sanitized Copy Approved for Release 2010/06/24: CIA-RDP87M00539R000400540016-9 Sanitized Copy Approved for Release 2010/06/24: CIA-RDP87M00539R000400540016-9 SECRET . S/NF/WN/NC) ELECTRONIC DATA PROCESSING SECURITY (U) The following article indicates some of our allies are concerned over our computer vulnerability and are taking steps to counter hostile exploitation. (S/NF/WN/NC) As of Oct 84, Electronic Data Processing (EDP) Security has become a major concern to most foreign countries as well as to the United States in both governmental and private sectors. Data Security Systems have taken on a new importance due to computer networking and prolification of personal computers that have individual data storage capacities. (Source Comments: The move to National Security Standards and National EDP Security networks will take place in Japan and Western Europe prior to occurring in the U.S. This is due to the governmental or institutional characteristics of Japan and Western Europe. Government organizations and large institutions are in a stronger position than private or commercial computer users to agree on security standards and requirements and to work towards the development of such standards.) NOCONTRACT 8 INWARNIN TELLIGENCE NOTICe SENSITIVE METHODS INVOLVED (WNINTE ) SECRET NOT RELEASABLE TO FOREIGN NATIONALS Sanitized Copy Approved for Release 2010/06/24: CIA-RDP87M00539R000400540016-9 Sanitized Copy Approved for Release 2010/06/24: CIA-RDP87M00539R000400540016-9 SECRET (S/NF/WN/NC) (S/NF/WN/NC) The Japanese Diet committee or security has also tasked the ministry of finance to develop a bank to bank data security network. However, the ministry of finance is encountering some difficulties with the Ministry of International Trade and Industry (MITI) and the Ministry of Posts and Telecommunications. There appears to be a turf battle developing among these three Japanese government organizations. MITI and Ministry of Posts and Telecommunications believe that the national data security network should include not only encryption of bank transactions, but should also include encryption of voice and executive correspondence. (SOURCE: CIA) S/NF/WN/NC OPERATIONS SECURITY FOR SMALL COMPUTERS (U) EDITORS NOTE: The following article submitted by 1Lt Evelyn Rockwell of our OPSEC Education Branch creates an interesting approach to small computer security. The author, presently serving as an 8031 Intelligence Officer, has an extensive background in computer programming. She is a fully qualified 5135b, having previously served as a Small Computer Systems Analyst for Air Training Command. (U) The recent growth of small computers throughout the Air Force has created a new problem for Operations Security Managers. During the mid-1970's and early 1980's when small computers were coming into general Air Force use, many bases acquired first one computer, then another, and another.... TAC has the CROMENCO, ATC the Burroughs 9 WARNING NOTICE: SENSRIVE N O C O N T RAC T INTELLIGENCE SOURCES AND METHODS INVOLVED (WNINTEy SECRET NOT RELEASABLE TO FOREIGN NATIONALS Sanitized Copy Approved for Release 2010/06/24: CIA-RDP87M00539R000400540016-9 Sanitized Copy Approved for Release 2010/06/24: CIA-RDP87M00539R000400540016-9 SECRET XE500, and the Air Force Data Systems Design Office has recently acquired the Z-100 and Z-150 for Air Force-wide use. This is in addition to the IBM's, WANGS, APPLES, TRS-80s, and numerous others already on inventory. How does the average OPSEC Officer/NCO handle the micro-explosion? Absolute security in the average Air Force office is unlikely and probably not necessary. But not making any attempt to minimize the risks is inviting trouble. To begin, let's look at a modified OPSEC process for microcomputers as a cyclic function. ANALYZE f IMPLEMENT T HREAT COUNTERMEASURES ASSIGN PERSONNEL FOR SECURITY ESTABLISH GUIDELINES MODIFY MONITOR WHEN & NECESSARY EVALUATE EFFECTIVENESS If we consider the modified OPSEC process for small computers as a simple application of common sense, each step of the process is easy to analyze. Let's consider the process step by step: a. ASSIGN PERSONNEL FOR SECURITY & ESTABLISH GUIDELINES - This should always he a person familiar with the software and preferably has an office close to the hardware. A person familiar with the equipment will be better able to assess needs and establish guidelines. He should be able to develop a list of authorized users, and insure that only those personnel use the equipment. He must know enough about the hardware to realize if it is being harmed, or if the software is being tampered with. Once he has established a list for security and/or established user guidelines, it will be his responsibility to insure that they are adhered to. One word of advice here, make sure your security person has enough rank to make his policies stick! Use common sense here. The two striper in the office may be your "computer-whiz kid"; however, if the average grade of operator is E-7 or higher the Airman may initially need a considerable amount of support from you, or his supervisors to ensure the necessary procedures are enforced. If you go to the trouble of assigning a security person, then don't defeat your program before you start. Step 1 - Select a qualified person to develop your security, establish your guidelines and protect your office investment - a small computer. b. ANALYZE THREAT - What is small computer threat? Are you looking for people in trench coats stealing classified secrets off SECRET NOT RELEASABLE TO FOREIGN NATIONALS Sanitized Copy Approved for Release 2010/06/24: CIA-RDP87M00539R000400540016-9 Sanitized Copy Approved for Release 2010/06/24: CIA-RDP87M00539R000400540016-9 SECRET your high-tech devices? If you are, you're probably looking for a problem that doesn't exist, or is beyond the scope of this paper. The average office in CONUS is not going to have an alien agent problem in their midst (check with your local OSI), however, if you are running unauthorized classified on your computer you may have a very real TEMPEST problem. You could even have a problem with classified trash or the release of unclassified EEFI. Consider your office trash, within the United States, the majority of offices never worry about what goes in the trash, but let's look at where the trash goes. First, there is the maid that takes it to the dumpster, then there is the dumpster that sits unwatched until the truck comes to take it to the dump. From the dump it could go anywhere. One California base contracted all of its paper waste to be sold as scrap to Thailand. The paper was compressed, boxed, and shipped by the ton straight to Thailand. Let's hope it was all "unclassified." And what about the physical threat? Is your computer in a high traffic area? How easy would it be for that just counseled Airman to "snip" the keyboard cord, or what about that Field Grader who doesn't think the no coke, no smoke rule applies to him. If you have important operational plans, programs, or procedures on your TEMPEST approved Z-150 or unclassified information on your B-25 you could have an Operational Security problem. Your mission could be slowed down or stopped by your dependence on one information device and failure to protect it. Then there is the "accidental" threat areas. Do you have procedures to insure that all disks are "backed up" with copies stored in separate areas. Are the storage areas safe from extreme heat, cold, humidity, or magnetic effects? A floppy disk set next to a telephone can be ruined by one incoming call. When the phone rings, a strong magnet is initiated which will scramble your electronically stored information. Step 2 - Consider your threat from three angles: Hostile Agent Threat; Physical Threat; Accidental Threat. c. Implement Countermeasures - This takes us to the countermeasures area. Once you have defined your threats, know how to counteract them. If you have already prepared for a problem, your operations will not suffer if the problem can be countered quickly and efficiently. Step 3 - Be prepared for a threat problem, and know how your operations might be affected and can be corrected before a problem arises. d. MONITOR AND EVALUATE EFFECTIVENESS. No program will be SECRET NOT RELEASABLE TO FOREIGN NATIONALS Sanitized Copy Approved for Release 2010/06/24: CIA-RDP87M00539R000400540016-9 Sanitized Copy Approved for Release 2010/06/24: CIA-RDP87M00539R000400540016-9 SECRET successful if it remains static. Your program must be a dynamic process, just as your personnel change, your program can change. Consider the everyday office considerations of moving furniture. Maybe when the computer first arrived it had a dedicated spot safe in a quiet corner. Due to office space realities, it now must be moved next to a busy hallway. Your physical security needs have changed. What about office personnel? When the computer first arrived maybe there was a little hostility toward the device. It was new, and meant change to procedures that were familiar and, above all, not well understood. Maybe the small computer is more accepted now, with less need for constant surveillance and more room for creativity on the part of your users. "Accidents" should be less likely and there should be room for more trust. The small computer can be a great office tool. Let your people use it as such. Step 4 - Monitor your program and make sure it stays effective. e. MODIFY WHEN NECESSARY - This takes us to our final stage. Don't be afraid of change. You got the computer for the office - use it, but don't forget to protect it. Step 5 - Learn from experience. If your program fails, make it work; if it works, make it better. That's the OPSEC Small Computer process in a nutshell - five easy steps. You won't find it in any regulation, and the IG will not be there to make sure you use this exact process (they do inspect for other items). But, the Air Force does expect you to keep your small computer system safe from threat and operationally secure. Order copies of, and become familiar with: AFR 300-3, Management of Small Computers; AFR 300-13, Safeguarding Personal Data on Automated Data Processing Systems; and AFR 700-10, Information System Security. This may not be the process for you. Design your own OPSEC system. Implement it and stay with it. Remember, if you don't who will? THE HUMINT THREAT (U) This article was produced by the Air Force Office of Special Investigations to acquaint Air Force OPSEC Officers with the nature and scope of the threat to the resources for which they have protective responsibility. SECRET NOT RELEASABLE TO FOREIGN NATIONALS Sanitized Copy Approved for Release 2010/06/24: CIA-RDP87M00539R000400540016-9 Sanitized Copy Approved for Release 2010/06/24: CIA-RDP87M00539R000400540016-9 Iq Next 1 Page(s) In Document Denied Sanitized Copy Approved for Release 2010/06/24: CIA-RDP87M00539R000400540016-9 Sanitized Copy Approved for Release 2010/06/24: CIA-RDP87M00539R000400540016-9 SECRET requests by U.S. officials in the PRC. 7. (U) Since there are no travel restrictions for East European officials, no closed areas for PRC officials, and since Soviet Officials travel through "closed" areas with special permission, virtually no section of the U.S. is immune from visits by hostile intelligence officers. In addition, there are no travel restrictions on Soviet or PRC tourists, exchange students, or employees of the UN Secretariat. e. (U) Illegals 1. (S) F S NF 3. (C/NF) Since 1973 when the Soviet Union reduced immigration restrictions, especially for Soviet Jews desiring to resettle in Israel, the Soviet immigration population in the U.S. increased dramatically - - by over 20,000 in 1980 alone. The SIS have not overlooked this influx of well-educated and talented Soviet-born immigrants as a cover for infiltrating intelligence operations. 4. (S/NF/WN) f. (C) The intelligence role of the Soviet Journalists. 15 WARNING NOTICE SENSITIVE INTELLIGENCE SOURCES AND METHODS INVOLVED (WNINTEL) SECRET NOT RELEASABLE TO FOREIGN NATIONALS Sanitized Copy Approved for Release 2010/06/24: CIA-RDP87M00539R000400540016-9 Sanitized Copy Approved for Release 2010/06/24: CIA-RDP87M00539R000400540016-9 SECRET Soviet journalists abroad for the most part represent TASS, the Soviet Wire Service; the Novosti Press Agency; Pravda, the CPSU daily; Izvestia, the official government daily; and the State Committee for Television and Radio broadcasting. While their journalistic productivity is less than impressive, in the collection of information, they have notable advantages. Since they are not official representatives of the Soviet Government, their travel in non-communist countries is normally not subject to the restrictions imposed on members of official Soviet missions. They are particularly valuable in the Soviet intelligence effort since their overt role as collectors of information is readily accepted. Many of the Soviet foreign news correspondents assigned abroad may be intelligence officers. g. (S) Communist-nation visitors to U.S.: In 1955 the United States and the Soviet Union began discussion leading to what has become known as the East-West exchange program (EWEP). While the first agreement under the EWEP was signed in 1958, the program witnessed dramatic growth beginning in 1972. Summit conferences that year spawned a series of educational, cultural, commercial and scientific/technical agreements which brought increasing numbers of communist-nation visitors to the United States. Between 1978 and 1980, the number of communist-country commercial and cultural visitors almost doubled (from more than 14,000 to about 28,000). PRC student presence increased almost five fold between 1979 and 1980 (from about 950 to 4,600). The tourist influx from some communist countries almost tripled from 1979 to 1980. These increases, coupled with a parallel growth in communist-nation official presence, provided the USSR an unprecedented opportunity to exploit its access in the U.S. for intelligence purposes. h. (U) Students 1. S They are SECRET NOT RELEASABLE TO FOREIGN NATIONALS I 25X1 Sanitized Copy Approved for Release 2010/06/24: CIA-RDP87M00539R000400540016-9 Sanitized Copy Approved for Release 2010/06/24: CIA-RDP87M00539R000400540016-9 SECRET interest as are the details of school job requirements and hiring practices. 3. (S/NF) Three academic fields accounted for most of the 1980-81 Soviet applicants' courses of study: Computers (18 students), microelectronics (11), materials processing and manufacturing (8). Because of the large number enrolled in scientific and technological fields of study, it is obvious their primary objective is to learn as much as possible about advanced Western technology. i. (U) Merchant Ships 1. (S) There is increasing evidence that Soviet Merchant Ships (merships) engage in intelligence collection activities. The tremendous size and worldwide deployment of the Soviet Merchant Fleet offers a significant maritime intelligence collection potential. State control of this fleet makes it relatively easy for the ships to be tasked with a maritime intelligence role. As of Jan 80, the Soviet ocean-going merchant fleet consisted of about 1800 ships. The Soviet fishing fleet numbers in excess of 3800 units. Augmenting the commercial fleet is a vast special service fleet that includes ice breakers, ocean salvage ships, dredges, and training and scientific units. The extensive trade routes followed by these merchant vessels provides a means of surveillance in areas far removed from the ordinary coverage of other surveillance systems. 2. (S) SECRET NOT RELEASABLE TO FOREIGN NATIONALS Sanitized Copy Approved for Release 2010/06/24: CIA-RDP87M00539R000400540016-9 Sanitized Copy Approved for Release 2010/06/24: CIA-RDP87M00539R000400540016-9 SECRET h) (S) Reporting on Soviet Emigres. c. (U) Western Visitors to USSR. 1. (S) . (S/NF/WN) d. (U) Soviet Trade Activities Abroad 1. (S/NF) 2. (S/NF) WARNING NOTICE SENSR VE INTELLIGENCE SOURCES AND METHODS INVOLVED (WNINTW SECRET NOT RELEASABLE TO FOREIGN NATIONALS 25X1 Q Sanitized Copy Approved for Release 2010/06/24: CIA-RDP87M00539R000400540016-9 Sanitized Copy Approved for Release 2010/06/24: CIA-RDP87M00539R000400540016-9 SECRET 4. (S) Soviet trade activities abroad also include the work of inspectors dispatched to western countries to inspect and receive industrial equipment and materials purchased by Soviet trade organizations. These inspectors may make short trips abroad or may actually be assigned to a factory in the west where the equipment is being produced for the Soviet customers. 5. (U) Soviet trade representatives such as those described above have a significant advantage over personnel assigned as official staff members at Soviet diplomatic establishments. Commercial employees are not normally subject to the travel restrictions imposed upon diplomatic personnel. e. (S/WN) Scientific Conferences and Symposia: Both the KGB and GRU recognize the collection potential represented by conferences, symposia, conventions and congresses sponsored by Western professional and scientific societies. According to a U.S. intelligence agency, while Soviet intelligence officers do not expect to collect classified information, such meetings are regarded as opportunities to identify targets (personnel, materials, projects, industrial firms, governmental agencies, new scientific or technological developments, etc.) for future exploitation. In addition to face-to-face contact with Western scientific and technical personnel, these events afford access to reports, speeches, papers, and technical publications which may not otherwise be easily obtainable by the Soviets. Access to meetings is often obtained by joining the sponsoring society. f. (C) Trade Fairs, Exhibits, and Air Shows: Opportunities to collect scientific and technical data at events open to the public attract the interest of, and attendance by, Soviet Intelligence Officers, co-optees and agents. For example, Director of the KGB First Chief Directorate (responsible for collecting and analyzing scientific data) is reported to maintain special task forces which operate at international trade fairs. Air shows, in particular, attract attention as lucrative targets. Not only do such shows provide an opportunity to scrutinize the latest in Western aviation technology, but they also enable the Soviets to WARNING NOTICE: SENSITIVE 19 INTELLIGENCE SOURCES AND METHODS INVOLVED (WNINT ) SECRET NOT RELEASABLE TO FOREIGN NATIONALS Sanitized Copy Approved for Release 2010/06/24: CIA-RDP87M00539R000400540016-9 Sanitized Copy Approved for Release 2010/06/24: CIA-RDP87M00539R000400540016-9 SECRET gather sales brochures and other literature. These shows also provide an opportunity for face-to-face contacts with aviation personnel possessing direct access to the latest Western aviation developments. The Farnborough Air Show in the United Kingdom, the Paris Air Show, the Hannover Air Show in West Germany, and the Japan International Air Show invariably attract Soviet Visitors. g. (C/NF/WN) Patents and Licenses: Soviet pursuit of Western technology increasingly involves the acquisition of Western patents and licenses. According to a Soviet immigre, it became apparent after the mid-1970's that even by producing Soviet prototypes based on single items of Western equipment - - acquired illegally or by purchase - - the USSR was still at least several years behind the West. Foreign technology presented by patents and licenses needed to be obtained, even at great expense. For this reason, the all-union association (V/0) responsible for export and import of patents was established to acquire high-technology patents from abroad. Patent services were also created in all government ministries and departments. The number of Soviet personnel involved in patent services reportedly almost doubled from 1970 to 1976. h. (U) Open Sources 1. (U) A major source of information continues to be publications available in the public domain. In addition to newspapers, magazines, technical and academic journals, maps, industrial and trade promotional literature, corporate directives and reports, and congressional publications, Soviet institutions and representatives systematically obtain American official and private publications, from organizations such as the National Technical Information System (NTIS). 2. (U) The NTIS bibliographic data file consists of hundreds of thousands of summaries of technical documents prepared by major federal departments and agencies, including the Department of Defense. The Soviets are estimated to collect over 80,000 documents yearly from NTIS. Although NTIS has curtailed its response to overt Soviet requests, the use of third parties as requesters is anticipated. i. (U) Hostile Intelligence Targeting of USAF Personnel 1. (U) During 1981, 894 USAF personnel in the CONUS made reports of contacts responsive to AFR 205-57, "Reporting and Investigating Espionage, Sabotage, Terrorism and Subversion." The majority of contacts reported represented a minimal intelligence threat to the USAF, i.e., solicitations to subscribe to Soviet magazines, Ham radio contacts, correspondence with relatives living 20 WARNING NOTICE SENSITIVE INTELLIGENCE SOURCES AND METHODS INVOLVED (WNINTEL) SECRET NOT RELEASABLE TO FOREIGN NATIONALS Sanitized Copy Approved for Release 2010/06/24: CIA-RDP87M00539R000400540016-9 Sanitized Copy Approved for Release 2010/06/24: CIA-RDP87M00539R000400540016-9 SECRET behind the Iron Curtain, etc. In more than 200 incidents, defense-related information was solicited from USAF personnel by unauthorized individuals and organizations. 2. (U) Requests for information were occasionally received telephonically or by mail; however, the overwhelming majority of requests were made during a personal contact in which the requester approached the USAF member and initiated a conversation. 3. (U) Most incidents involved young, first-term airmen in the grades of E-l through E-4. The individuals approaching USAF members represented both sexes and several racial groups. They range in age from the late teens into the sixties, and many appeared to be U.S. citizens. 4. (S) Some unauthorized requests for information may have represented mere curiosity on the part of the requester or were otherwise attributable to a motive not necessarily inimical to USAF security. AFOSI analysis, however, disclosed that most of the inquiries fell within the parameters of known hostile intelligence collection requirements directed against the USAF. 5. (C) Frequently the timing of the questions corresponded with some significant activity such as an exercise, deployment, alert, ORI, etc. In some instances, AFOSI analysis was able to correlate the time frame of the request or content of specific questions with other known hostile intelligence activities targeting the USAF installation or activity involved. j. (C) This article describes some of the dimensions and complexity of the intelligence threat posed by Communist-Nation Intelligence Services, particularly those of the Soviet Union, to an Air Force target. A clear knowledge of the threat is essential before effective countermeasures can be undertaken. Although OPSEC activities in the Air Force vary, there is a need for aggressive "awareness" programs and effective countermeasures tailored to individual units/situations. (SOURCE: AFOSI) HUMINT THREAT TO SECURE AUTOSEVOCOM FACILITIES (KY-3) (U) (U) A recent message from HQ USAF/SIT (quoted below), emphasizes the HUMINT threat to our secure AUTOSEVOCOM facilities. As the preceding HUMINT article states, the Soviet Intelligence Services and SECRET NOT RELEASABLE TO FOREIGN NATIONALS Sanitized Copy Approved for Release 2010/06/24: CIA-RDP87M00539R000400540016-9 Sanitized Copy Approved for Release 2010/06/24: CIA-RDP87M00539R000400540016-9 SECRET their BLOC representatives seek classified information, scientific and technical data and endeavor to identify targets for future exploitation. A prime target of the Soviets is U.S. cryptography. 1. (S) Ensuring the integrity of keying material against possible exploitation by hostile agents is a vital consideration in the maintenance of a viable COMSEC posture. The National Security Agency has noted an alarming increase in COMSEC insecurities resulting from the loss of two-person integrity of AUTOSEVOCOM Wideband key cards. Although the circumstances of reported COMSEC insecurities differ, the principle cause of the COMSEC insecurities appears to be the same: A. (U) Lack of awareness and sensitivity on the part of users to the importance to the national security of the COMSEC keying material they handle. B. (U) The need for stringent compliance with prescribed physical security safeguards. SECRET NOT RELEASABLE TO FOREIGN NATIONALS Sanitized Copy Approved for Release 2010/06/24: CIA-RDP87M00539R000400540016-9 Sanitized Copy Approved for Release 2010/06/24: CIA-RDP87M00539R000400540016-9 SECRET The following article by Mr. Pat Martin, HQ ESC/CSI appeared previously in our October 1983 edition of the OPSEC Update. We feel the information is worth repeating. COUNTERINTELLIGENCE (U) (U) Counterintelligence is an often misunderstood term both inside and outside the USAF. In order to understand counterintelligence as a term and a practical and integral aspect of OPSEC, a knowledge of the intelligence threat posed by adversary intelligence services is necessary. (U) Intelligence gathering activities currently directed against the United States Air Force are multifaceted. They can generally be divided into two categories: Technical collection efforts (i.e. SIGINT and IMINT) and human collection (HUMINT). Although vast quantities of information can be collected through technical collection efforts, adversary intelligence services have demonstrated time and time again that human acquired information is considered the most reliable indicator of the true workings and details of any specific event. Human collection, while often difficult to initiate, can be specifically targeted, can be extremely difficult to detect, can remain hidden until required (the "sleeper agent"), and can be relatively inexpensive to sustain. The human collector, if properly trained, can also re-direct his/her efforts to meet the needs of the situation and can often provide collateral information while working a specific target. With proper cover and documentation the human agent can penetrate the most secure areas by obtaining employment and gaining trust. If such long term preparation is not considered feasible, the adversary intelligence service can attempt recruitment of an employee in place through monetary or ideological persuasion. All of the factors which make the human so valuable to any system can also be made to work against the system we are trying to protect. (U) One hypothetical example can be given to further illustrate the benefit of HUMINT. Let us assume that ALPHA AFB, anywhere, has SECRET NOT RELEASABLE TO FOREIGN NATIONALS Sanitized Copy Approved for Release 2010/06/24: CIA-RDP87M00539R000400540016-9 Sanitized Copy Approved for Release 2010/06/24: CIA-RDP87M00539R000400540016-9 SECRET recently acquired the F-25 weapons system. Operational elements have determined that day to day sortie generation is susceptible to technical exploitation and have thus ordered that "look-down-shoot- down" radar capability be exercised only during specific and randomly selected times. With strict compliance it is felt that this should severely limit technical intelligence collection against the system. After repeated attempts to establish technical collection against the F-25, an adversary intelligence service concludes ALFA AFB must receive priority HUMINT collection. An assessment of ALFA and its environs is made and the following scenario is created. Local intelligence officers assigned to diplomatic and quasi-diplomatic establishments are instructed to activate their contacts in the local civilian population who. cater to the entertainment needs of ALFA AFB personnel. These contacts are to begin collecting information on personnel who are engaged in excessive drinking, gambling and socializing with members of the opposite sex. They are also instructed to be alert for those military members interested in selling goods from ALFA's BX and commissary. Anger, disgruntlement, and ideological naivete' were also to be reported. After some frustrating false leads, an avionics technician is identified. Through careful targeting and patient waiting, the reward finally comes. The adversary intelligence service obtains the complete tech order of the radar. Cost? Time and $5,000.00 paid to the technician for "services provided." (U) What does the OPSEC manager have at his/her disposal to combat the HUMINT threat? The Air Force Office of Special Investigations. Through AFOSI's counterintelligence efforts, the OPSEC manager can insure his units receive AFR 205-57 briefings (Reporting and Investigating Espionage, Sabotage, and Terrorism), he placed on distribution for Intelligence Information Reports (IIRs) outlining significant counterintelligence and terrorist - threat charges affecting his unit/base, and arrange for specialized AFOSI counterintelligence efforts to work the problems relating to security and protection of significant systems or events. In accordance with AFR 55-30, the OPSEC manager can request a multi-disciplined counterintelligence (MDCI) threat estimate for OPSEC planning. This threat description currently includes the HUMINT threat and the SIGINT threat as provided by HQ ESC/INKC. The OPSEC manager may also contact the AFOSI MAJCOM rep to his/her command for assistance. AFOSI has currently placed MAJCOM reps at HQ MAC, HQ SAC, HQ AFSC, HQ TAC, HQ ESC, and USCENTCOM. Officers assigned to these commands can offer assistance in OPSEC planning in the area of counter-HUMINT and anti-terrorism. They can also provide assistance in understanding MDCI threats and their value in command level OPLANS and CONPLANS. (U) Effective OPSEC cannot become a reality unless the OPSEC manager makes full use of all resources. AFOSI is charged with Air Force counterintelligence and MDCI responsibilities under AFR 23-18. Know your experts in AFOSI. SECRET NOT RELEASABLE TO FOREIGN NATIONALS Sanitized Copy Approved for Release 2010/06/24: CIA-RDP87M00539R000400540016-9 Sanitized Copy Approved for Release 2010/06/24: CIA-RDP87M00539R000400540016-9 SECRET TEMPEST AND YOU (U) (C) TEMPEST is an unclassified short name for the study and control of electromagnetic emanations which can be used to "read" classified information. Emanations are the result of any electrical process either natural or manmade. Lightning strikes and your automobiles spark plugs are examples of natural and manmade electrical processes which are easily detectable on your AM or FM radio. The problem begins when classified information is processed electrically and the information leaves a "fingerprint" on the emanation which can be detected and broken back to the original text. In many cases, the detected emanation is no more difficult to decipher by the trained operator than the word puzzles you find in the Sunday paper. (S) How do we control something which is the natural result of using electricity? The only thing we can do is minimize those signals or if that is not sufficient, contain them. The efforts of the designer, installer and operator are needed to minimize signals. The designer can use several methods to aid him. The most important is low-levels of current and voltage. The lower these levels, the lower the energy of the emanation, and the harder it is to detect. Grounding is very important for both the designer and installer. A good ground will conduct many undesirable signals into the world's biggest conductor, the earth itself, where they cannot be recovered. When all else fails, it is necessary to encase, or shield, the offending component or equipment to prevent leakage of the emanation. Shielding is undesirable because it is difficult to maintain its integrity and it usually requires operational restrictions. These methods will usually reduce the emanation to a level that is only detectable a short distance away from the source and is easily protected by the Control Space. (S) The emanation, if still detectable in the immediate area, will impress itself on any antenna that is available. Telephone lines, conduits, water pipes, air conditioner ducts or any other metal structure can act as the antenna, and then conduct the emanation out of the Control Space on any conductor which is attached. Conducted emanations from a weak emitter can travel many miles when the radiated emanation may only travel a few meters. (C) There are two ways to prevent conducted emanations. The first is to keep all conductors outside the Control Zone. This is not always easy to do, and in some cases may be impractical. A filter or an isolator may be used to stop emanations from being conducted out of the Control Zone. Filters allow desirable signals to pass, and block undesirable signals while isolators block all signals. (U) So, what can you do to help? Just being aware of your TEMPEST responsibilities is a big help. Anytime classified information is or SECRET NOT RELEASABLE TO FOREIGN NATIONALS Sanitized Copy Approved for Release 2010/06/24: CIA-RDP87M00539R000400540016-9 Sanitized Copy Approved for Release 2010/06/24: CIA-RDP87M00539R000400540016-9 SECRET will be processed electrically, TEMPEST must be considered. If you are involved in buying or leasing equipment, you should be aware of all Air Force policies regarding TEMPEST, and you are responsible for including TEMPEST requirements in the contract. Maintenance personnel who install or maintain this equipment are charged with maintaining the TEMPEST integrity of all the equipment they service. (S) Be alert to open cabinet doors or broken wires. A broken shield or a bad ground can ruin several thousand dollars worth of TEMPEST modifications. Also, be aware of the separation requirements between RED equipment (which is used to process classified information) and BLACK equipment (which should never be used to process classified information). The administrative telephone is the worst offender. It makes an excellent antenna, and has a conductor which extends far beyond the bounds of any control space. (U) The best place to go for TEMPEST information is to your local TEMPEST Officer and/or NCO. They have the answers to your questions, or know how to get those answers. (C) You are encouraged to contact them with all your questions. Trying to correct a TEMPEST problem as an afterthought is much more costly in time and money, and exposes our carefully guarded classified information to easy and safe interception. SOURCE: ESC TEMPEST Office, 1Lt Hackett. COMINT THREAT TO U.S. AUTOVON AND GERMAN BUNDESPOST TELEPHONE NETW RK (U) (C/NF) The purpose of this article is to reveal the extensive and sophisticated effort that the Warsaw Pact has dedicated to the collection of information from the highly lucrative, and vulnerable, U.S. AUTOVON and West German Bundespost telephone system. Thousands of AUTOVON calls are made daily by European assigned personnel. Although reminders warning against discussion of classified information are posted on all military phones, Communications Security (COMSEC) monitoring of AUTOVON lines has disclosed that classified information, or information considered hazardous to National Security, is discussed openly over AUTOVON phone lines. These discussions provide Warsaw Pact intelligence services with valuable and sensitive data. SECRET NOT RELEASABLE TO FOREIGN NATIONALS Sanitized Copy Approved for Release 2010/06/24: CIA-RDP87M00539R000400540016-9 Sanitized Copy Approved for Release 2010/06/24: CIA-RDP87M00539R000400540016-9 Sanitized Copy Approved for Release 2010/06/24: CIA-RDP87M00539R000400540016-9 Sanitized Copy Approved for Release 2010/06/24: CIA-RDP87M00539R000400540016-9 SECRET (4) (S/NF) AEROFLOT, the Soviet National Airline, is possibly being used to monitor AUTOVON communications. In Oct 83, three AEROFLOT flights deviated from scheduled takeoff and approach paths to overfly the U.S. Army military facility in Livorno, Italy. This facility consists of an ammunition storage area, a depot area, and the Altano AUTOVON switching center. One of these aircraft was an AN-12 CUB -- a type suspected of conducting covert SIGINT collection. (5) (S/NF) The Chief Intelligence Directorate of the Soviet General Staff (GRU) has technical service elements established in Soviet legal residences throughout the world. These technical service elements conduct continuous COMINT collection against U.S. Communications, to include the AUTOVON network. In Central Europe, COMINT collection occurs at the Soviet trade mission in Brussels, Belgium, the Soviet Embassy in Luxembourg, the Soviet Embassy in Bonn, and probably the Soviet trade mission in Cologne. Exploitation targets include format messages such as Emergency Action Messages (EAM) passed on AUTOVON channels from the CINCEUR, and phone conversations between military personnel both in Europe and the U.S. (6) (S/NF) At the SMLM facility in Frankfurt, two 19-element Yagi Ultra High Frequency (UHF/Very High Frequency (VHF) antennas are pointed towards the Donnersberg and Geldberg, West Germany, AUTOVON switching centers. Intercept of communications emanating from these centers would allow access to a large amount of unencrypted AUTOVON circuits. On 10 Mar 77, a SMLM vehicle from Frankfurt was detailed less than 100 yards from the V Corps Mobile Tactical Command Post (CP). Signal Security (SIGSEC) monitoring of USAREUR phone lines reflected a 4 Mar 84 conversation in which the Corps Tactical CP was indicated to be "700 meters south of the 3rd Armored Division at or near NB414133." There is a possibility the SMLM could have had foreknowledge of the CP location as a result of the AUTOVON monitoring. (7) (S/NF) Microwave communications intercept sites are located throughout East Germany and Czechoslovakia along the West German border. The site at Brocken, East Germany, maintained by an unidentified Soviet SIGINT brigade subordinate to HQ GSF6, is a major Soviet intercept facility tasked with the monitoring of Bundespost and U.S. AUTOVON telephone communications. This site is perfectly placed for the intercept of telephone calls transmitted via microwave links physically located within West Germany. (8) (C/NF) A former senior lieutenant with the Czechoslovak 7th Radio Regiment, a major COMINT organization tasked with radio intercept of CENTAG communications, disclosed that the most lucrative intelligence was derived from monitoring of the U.S. AUTOVON network. He was assigned to an intercept company at Cerchov, Czechoslovakia, intercept site monitoring on a daily basis the super high frequency SECRET NOT RELEASABLE TO FOREIGN NATIONALS Sanitized Copy Approved for Release 2010/06/24: CIA-RDP87M00539R000400540016-9 Sanitized Copy Approved for Release 2010/06/24: CIA-RDP87M00539R000400540016-9 SECRET (SHF) AUTOVON switchboard of the U.S. VII Corps. (9) (C/NF) The 78th Radio Center, a regimental size COMINT collection unit subordinate to the Czechoslovak ministry of National Defense is responsible for the intercept of troposcatter communications between USAREUR and the U.S. Army Berlin Brigade. This intercept of AUTOVON communications transmitted via microwave is conducted at Dylen and Cerchov. Parabolic antennas are used for this intercept. (10) (C/NF) West German Intelligence/Security Services are well aware that Soviet Bloc nations intercept telephone calls made both within West Germany and between West Berlin and West Germany. An official of the Bonn government stated that long distance calls transmitted via microwave are intercepted by the Soviet Bloc using special equipment and then analyzed with the help of sophisticated computers. West German governmental telephone communications are a high intercept target for HOIS. (11) (C/NF) In an effort to limit the success of this monitoring activity, the Bonn government has replaced their conventional telephone cables with fiber-optic cables for their official telephone communications. This will minimize the effect of electromagnetic "bleeding" from the cables making hostile intercept much more difficult. (12) (S/NF) Since the early 1970s, high emphasis has been placed on the intercept of microwave channels owned and operated by the West German Bundespost and leased by the U.S. and West German military. Targets for this intercept include the telephone exchanges at Frankfurt, Kaiserslautern, Munich, and possibly Augsburg. The exploitation of AUTOVON links serving U.S. Corps and division elements, as well as individual units fielding Theater Nuclear Force (TNF), Readiness, exercise plans/results, equipment capabilities, and operational limitations. (13) (S/NF) HOIS also monitor selected AUTOVON circuits carried over U.S. communications satellites. The Defense Satellite Communication System (DSCS) is the principal Super High Frequency (SHF) SATCOM system providing communications among DOD users. The DSCS is responsible for maintaining AUTOVON satellite communications servicing some 130 globally deployed earth terminals. The Soviet Union and other Soviet Bloc nations intercept DSCS Communications Satellites (COMSATS) carrying AUTOVON communications. (14) (S/NF) Of the nine GRU military associated satellite intercept facilities located in the Soviet Union, the site at Vicak USSR, is believed to be tasked with the exploitation of AUTOVON communications carried by the Atlantic DSCS II Satellite. A 16.5 meter parabolic antenna is used to intercept the DSCS. DSCS SECRET NOT RELEASABLE TO FOREIGN NATIONALS Sanitized Copy Approved for Release 2010/06/24: CIA-RDP87M00539R000400540016-9 Sanitized Copy Approved for Release 2010/06/24: CIA-RDP87M00539R000400540016-9 SECRET communications are also probably intercepted at the Lourdes Central SIGINT complex near Torrens, Cuba. The KGB maintains satellite intercept sites in the Soviet Union for the intercept of commercial satellite signals not associated with the U.S. military. (15) (S/NF) The East Germans and the Poles are also believed to possess satellite intercept sites used to monitor U.S. AUTOVON communications between West Germany and the continental U.S. The Czechoslovakian 78th Radio Center also monitors satellite communications in the range of 200 to 400 MHZ and eight GHZ. The Soviets primarily use the Soviet Intelligence Collection Ship (AGI) fleet for mobile COMSAT intercept. Many AGI's are assessed to be capable of intercepting signals in the range of 15 KH3 to 100 GH3, easily covering all DSCS frequencies. (16) (C/NF) Conclusion. At this time, U.S. AUTOVON and West German Bundespost telephone circuits are being consistently exploited for their intelligence value since the reliance on these communications are critical to USAREUR in both peace and war. There is little doubt that HOIS will continue to heavily monitor these circuits. The only methods available for ensuring AUTOVON/Bundespost security from hostile monitoring activities would be to bulk encrypt all communications emanating from the major switching centers or to provide speech encipherment devices at all line terminals (telephones). In the case of the AUTOVON network, this is not feasible in the near future and is cost prohibitive. With regard to the Bundespost system, the cost of total network encryption could not be justified by the West German government based on the philosophy that the Bundespost is a public, as opposed to a military, communication network. (17) (S/NF) A recent defector assigned to a major Czechoslovakian SIGINT unit stated his organization collected their most valuable data by monitoring the phone calls of U.S./NATO flag officers. Since this is the case, it would be appropriate to supply these personnel with speech encipherment devices in lieu of, or attached to, their telephones. A likely candidate for this device would be the STU-2M recently developed by NSA. An addition of more AUTOSEVOCOM terminals throughout the USAREUR command would also help to eliminate the need to "talk around" classified information when a secure telephone is unavailable. (18) (C/NF) The HOIS capability to intercept, process and glean intelligence from the AUTOVON or Bundespost networks is formidable. This capability represents a serious threat to USAREUR and will become an even greater threat in the future as more U.S. military telephone lines are leased from the Bundespost. At the present time, HOIS can accurately determine USAREUR's readiness posture, operational deficiencies, organization, exercise plans/results, and the complete status of the TNF force. The HOIS acquisition of more SECRET NOT RELEASABLE TO FOREIGN NATIONALS Sanitized Copy Approved for Release 2010/06/24: CIA-RDP87M00539R000400540016-9 Sanitized Copy Approved for Release 2010/06/24: CIA-RDP87M00539R000400540016-9 SECRET sophisticated intercept equipment and large scale computers obtained through western technology transfers, will increase USAREUR's vulnerability to hostile collection derived from the monitoring of AUTOVON/Bundespost telephone circuits and poses an even greater threat to Operations Security throughout the command. SOURCE: CINCUSAREUR - Extract from ESC OPSEC Highlights Message 23150OZ Feb 85. SOVIET MILITARY ATTACHE TRAVEL IN THE U.S. (U) The following article was extracted from a U.S. Army Intelligence and Threat Analysis Center Intelligence Brief. It provides a synopsis of Soviet Military attache travel within the United States during 1980-83, and a summary of their overt collection activities. A. (S) As the "main enemy" of the Soviet Union, the U.S. is subjected to pervasive intelligence targeting by the Committee of State Security, or KGB, and the Ministry of Defense's Chief Directorate for Intelligence or GRU. Collection efforts to satisfy this targeting range from legal and overt to illegal and clandestine. This article will provide insight into the intelligence threat posed by one type of Soviet Intelligence Collection Activity: Overt collection by Soviet Military Attaches (SMA) during travel in the B. (S) SMA travel in the U.S. from their Washington DC Embassy base during the period 1980-83 showed little significant change from travel performed in prior years. Travel was invariably in pairs with at least one attache having experience traveling in the U.S. Neither rank nor service affiliation seemed to bear on who was paired with whom. C. (S) Because of the frequency and numbers of SMA and other Soviets who travel the Washington DC - New York City corridor, routine monitoring has been very limited. Information on this route of travel is not included. D. (S) SMA's generally use Soviet-owned vehicles for travel to destinations that lie within about 500 miles of Washington DC. One exception to this rule was an April 1982 trip when they made a round trip drive to Fort Lauderdale FL from Washington DC. The normal mode SECRET NOT RELEASABLE TO FOREIGN NATIONALS Sanitized Copy Approved for Release 2010/06/24: CIA-RDP87M00539R000400540016-9 Sanitized Copy Approved for Release 2010/06/24: CIA-RDP87M00539R000400540016-9 SECRET of travel is public transportation, usually flying to a base city and then using local airlines, buses, or taxies for shorter trips. SMA's are not permitted to rent vehicles. The SMA's have deviated from the schedule outlined'in their travel requests only twice in the past three years. Once they deviated and drove by the Pratt and Whitney Plant in Hartford CT and once they had to remain overnight in Chicago IL because of a cancelled airline flight. E. (S) While traveling by car, the SMA's make numerous stops for food, refueling, picture taking, and driver changes. They are usually safe and careful drivers, having been stopped for speeding only twice in the past three years. When traveling by air, they check their suitcases but never their attache cases. They are also careful to avoid having their cameras x-rayed at airport security check points. F. (S) While traveling, the SMA's invariably carry at least one, and often two, attache cases, which never leave their possession. They also have at least one, and often two, 35mm cameras. They carry what appears to be a normal amount of luggage for the trip to be undertaken. Despite this, they have been observed wearing the same clothing for a four-five day period with a resulting strong body odor. G. (S) Hotel or motel accommodations are made for SMA's in advance. They tend to stay at moderately priced national chain motels. Upon registration, they identify themselves as Soviet diplomats. If asked, they will admit to being Soviet military officers although they always travel in civilian clothing. About half the time they eat their meals in their rooms, combining Russian canned goods they have brought with them with bread, fruit, and vegetables acquired in a local grocery. When they do eat out, it is usually at an inexpensive place and the meal usually consists of pizza or hamburgers. They very often drink beer with both lunch and dinner and usually consume one or two bottles of vodka in their room at night. They will occasionally invite someone they meet by chance in the halls or dining room of the motel to come to their room for drinks. The drinking and conversation often lasts until early in the morning. These guests are always male. On one occasion, the guest was an FBI undercover agent. H. (S) The SMA's have made a total of 10 or 11 major trips each year for the past three years. On each of these trips, the SMA's usually spend one or two nights in different cities on their scheduled itinerary. I. (S) The daily routine of the SMA's while on a trip does not vary greatly. They visit the local chamber of commerce, telephone company, library, book stores, and sometimes a museum, amusement park or art gallery. They acquire information on local employers, maps, a SECRET NOT RELEASABLE TO FOREIGN NATIONALS Sanitized Copy Approved for Release 2010/06/24: CIA-RDP87M00539R000400540016-9 Sanitized Copy Approved for Release 2010/06/24: CIA-RDP87M00539R000400540016-9 SECRET local telephone directory, and any other available information. Most of the material is available free, but the Soviets will pay for the material if required. If the material is not for sale, they will copy it whenever possible. In libraries at state capitols and state universities, the Soviets will sometimes spend hours obtaining materials of a statewide nature. They seem especially interested in heavy industry, power companies, port facilities, and transportation networks. J. (S) The SMA's have been observed taking a large number of pictures during their trips. Often they appear to be merely photographing local tourist attractions. Some of the photography appears to be designed to include microwave towers, radio relay antennas, or local government-related communications antennas in the background. At other times, the SMA's purposely walk to an otherwise insignificant building or areas and carefully position each other for a photograph. This latter type of photography may have any of several purposes: To spot and record suspected surveillants, to provide a mix of general subjects among overt intelligence subjects in case the film gets into the hands of strangers who would otherwise turn it in to U.S. authorities, to get non-mission related photos for family or friends, or, possibly to support mensuration of Soviet overhead photography. K. (S) The SMA's are avid collectors of overt information at nearly every city visited on their itineraries. Examples of information collected include: Local telephone directories Local and statewide business directories Local, state, and regional maps Directories of research facilities Guides to sources of information which businessmen and researchers can use as references Marketing Information Data on local, state, and regional industries Economic profiles of areas visited and manufacturing guides Relocation packets providing local area information, e.g., housing, schools, churches, recreation facilities, and employment Listings of industrial firms SECRET NOT RELEASABLE TO FOREIGN NATIONALS Sanitized Copy Approved for Release 2010/06/24: CIA-RDP87M00539R000400540016-9 Sanitized Copy Approved for Release 2010/06/24: CIA-RDP87M00539R000400540016-9 SECRET Directories from colleges and universities Copies of unclassified military manuals, dealing with basic military subjects, that are available in university libraries. Photographs of landmarks, buildings, and other areas of political, economic, or historical interest. Local chamber of commerce, Federal Information Center, and State Information Center handouts of all types. Local newspapers, especially those that contain items relating to area military bases or prominent Defense contractors. Environmental Impact Statements Zip Code Directories Adult Education Programs. Directories of electronic and light assembly manufacturing plants. Data on Florida ports and International Airports, facilities, docks, tide tables, and warehouses. Directories of research facilities which provide mailing addresses. Published items on the MX missile program. Directories published in 1982 and 1983, of military commanders, public affairs officers, protocol officers, and secretaries (provides lists of individuals by rank, area of assignment, and telephone number). Who's Who in business and professions. Department of Defense or local directories of military officers. L. (S) Attempts to detect and identify surveillants. Great attention to detail in positioning attache cases which could indicate possible short range agent communication activity. SECRET NOT RELEASABLE TO FOREIGN NATIONALS Sanitized Copy Approved for Release 2010/06/24: CIA-RDP87M00539R000400540016-9 Sanitized Copy Approved for Release 2010/06/24: CIA-RDP87M00539R000400540016-9 SECRET libraries, and tourist areas. Brief trips to certain areas where the only observed activity was a telephone call from a public telephone booth. Unexplained, unprovoked periods of apparent tension or great nervousness. Frequent checking of watches. Non-typical periods of inactivity in parks or extended stays in restaurants or movie theaters. Suspicious activities of unknown individuals in the immediate vicinity of SMA's. M. S IMAGERY INTELLIGENCE (U) A multidiscipline threat utilized by Hostile Intelligence Services is Imagery Intelligence (IMINT.) This article explains a few of its capabilities. (U) The importance of imagery interpretation was demonstrated effectively during WWII, Korea, and the Cuban crisis. In WWII, SECRET NOT RELEASABLE TO FOREIGN NATIONALS Sanitized Copy Approved for Release 2010/06/24: CIA-RDP87M00539R000400540016-9 Sanitized Copy Approved for Release 2010/06/24: CIA-RDP87M00539R000400540016-9 SECRET military experts found that almost eighty percent of the intelligence was derived from aerial photography. Imaging sensors can collect information over otherwise inaccessible areas. This is perhaps their most important military advantage. The imagery is a permanent record of the detail within the sensor field of view, and provides a first-hand impression of the target to the expert qualified to interpret it, though he may be many miles distant. The imagery is unprejudiced and reproducible; it can be studied and restudied for various purposes by different users. It can be compared, detail by detail, with other imagery of the same area to provide comparative intelligence. Imagery may be used to map or chart an area as to geographic and cultural detail, and to provide beach and coastal information as well as bottom conditions in the shore area. It can sometimes provide detailed data on shore water depths, but it cannot confirm deep-water soundings. Sensor imagery can provide much detailed military information, such as strength and disposition of enemy forces and general terrain features of areas under his control. CAPABILITIES: (U) ... Imagery interpretation provides an accurate and extensive source of information relative to the strength, disposition, and activities of the enemy in areas not readily accessible to ground observers. (U) ... It provides extensive and detailed information regarding the enemy's installation and equipment and general terrain features of areas under his control, such as vegetation, soil, beaches and water depths. (U) ... It provides a means of detecting errors in bombing, and data from which recommendations can be made for improvement in operational techniques. (U) ... It furnishes indications, as in bomb damage clearance and reconstruction studies, of the enemy's evaluation of the importance of damage inflicted on him. (U) ... It provides target data for operational use, such as annotated plans of enemy installations. (U) ... It can usually detect and see through camouflage designed to confuse the aerial observer or attack pilot. In addition, it makes possible an evaluation of friendly camouflage techniques. (U) ... It provides highly accurate information for the preparation and revision of maps and charts. (U) ... It provides checks on the accuracy of reports from other SECRET NOT RELEASABLE TO FOREIGN NATIONALS Sanitized Copy Approved for Release 2010/06/24: CIA-RDP87M00539R000400540016-9 Sanitized Copy Approved for Release 2010/06/24: CIA-RDP87M00539R000400540016-9 SECRET intelligence sources covering visible objects or activities. (U) ...It provides a means for assessing the physical effectiveness of geographic and cultural detail, and to provide beach and coastal information as well as bottom conditions in the shore area. It can sometimes provide detailed data on shore water depths, but it cannot confirm deep - water soundings. Sensor imagery can provide much detailed military information, such as strength and disposition of enemy force and general terrain features of areas under his control. USSR: TECHNOLOGY TRANSFER (U) A. (S/NF/NC) The Soviet Bloc is using United Nations Programs to gain Western technology. Reportedly, the Soviet Union will use $20,000 of the United Nations Education and Scientific Cooperation Organization (UNESCO) funds to establish a pilot project on microcomputers for their polytechnic schools. Undoubtedly, key features of computer hardware/software, as well as know-how and experience, will flow from the schools to be used in military applications. Normally, UNESCO funds are intended to help transfer new technology to developing countries; however, because a Soviet is directing the microcomputer pilot project, Soviet acquisition of funds was assured. NOCONTRACT WARNING NOTICE SENSITIVE 37 INTELLIGENCE SOURCES AND METHODS INVOLVED (WNINTE ) SECRET NOT RELEASABLE TO FOREIGN NATIONALS Sanitized Copy Approved for Release 2010/06/24: CIA-RDP87M00539R000400540016-9 Sanitized Copy Approved for Release 2010/06/24: CIA-RDP87M00539R000400540016-9 OPSEC UPDATE - APRIL 1985 COMMENTS: Sanitized Copy Approved for Release 2010/06/24: CIA-RDP87M00539R000400540016-9 Sanitized Copy Approved for Release 2010/06/24: CIA-RDP87M00539R000400540016-9 HQ ESC/D000 ATTN: OPSEC UPDATE SAN ANTONIO, TX 7 8 2 4 3- 5 0 0 0 Sanitized Copy Approved for Release 2010/06/24: CIA-RDP87M00539R000400540016-9 Sanitized Copy Approved for Release 2010/06/24: CIA-RDP87M00539R000400540016-9 OPSEC YOUR OPSEC OFFICER IS: Sanitized Copy Approved for Release 2010/06/24: CIA-RDP87M00539R000400540016-9 Sanitized Copy Approved for Release 2010/06/24: CIA-RDP87M00539R000400540016-9 I OPSEC YOUR OPSEC OFFICER IS: Sanitized Copy Approved for Release 2010/06/24: CIA-RDP87M00539R000400540016-9 Sanitized Copy Approved for Release 2010/06/24: CIA-RDP87M00539R000400540016-9 KEEP THE 11D ON EVERYTHING! OPSEC YOUR OPSEC OFFICER IS: Sanitized Copy Approved for Release 2010/06/24: CIA-RDP87M00539R000400540016-9 Sanitized Copy Approved for Release 2010/06/24: CIA-RDP87M00539R000400540016-9 I CAN YOUR OPERATION WEATHER THE STORK"? Sanitized Copy Approved for Release 2010/06/24: CIA-RDP87M00539R000400540016-9 Sanitized Copy Approved for Release 2010/06/24: CIA-RDP87M00539R000400540016-9 Lon 4 / Sanitized Copy Approved for Release 2010/06/24: CIA-RDP87M00539R000400540016-9 Sanitized Copy Approved for Release 2010/06/24: CIA-RDP87M00539R000400540016-9 YOUR OPSEC OFFICER IS: Sanitized Copy Approved for Release 2010/06/24: CIA-RDP87M00539R000400540016-9 Sanitized Copy Approved for Release 2010/06/24: CIA-RDP87M00539R000400540016-9 SgHH! IOMEONE~' F/SalG! 49. SECRET( 9-Z 55 SECRET /)XSECRET( o OPSEC YOUR OPSEC OFFICER IS: V _ .a SECRE Y )~SECeE~ \~'1 Sanitized Copy Approved for Release 2010/06/24: CIA-RDP87M00539R000400540016-9 Sanitized Copy Approved for Release 2010/06/24: CIA-RDP87M00539R000400540016-9 ARE YOU "BREWING UP" AN OPSEC ;YF,,-ASjT; r OPSEC YOUR OPSEC OFFICER IS Sanitized Copy Approved for Release 2010/06/24: CIA-RDP87M00539R000400540016-9 Sanitized Copy Approved for Release 2010/06/24: CIA-RDP87M00539R000400540016-9 A S b C 0 N C E A L `:1 0 M O R M E T G Q N R E S V T 0 P S E C O T S H T E L S B 0 D W L P I L T H R E A T T I C 0 1 T T D A S F B T H B E F P N 0 S G E L S E C C N J S T Y L E C V I 0 P F E L R C P S I C T U 0 L E V I S I N T N N C D C L M A M U C EEFI COMSEC SIGSEC CAMOUFLAGE TIME SIGINT HUMINT CONCEALMENT OPSEC CoMINT PHOTINT INTELLIGENCE ELINT RADINT METHODS ELECTROMAGNETIC STYLE VISINT COUNTERINTELLIGENCE MEDIA FORCES MASKING RADIATION ELSEC THREAT SECURITY EMCON VISUAL TELEPHONE Sanitized Copy Approved for Release 2010/06/24: CIA-RDP87M00539R000400540016-9 Sanitized Copy Approved for Release 2010/06/24: CIA-RDP87M00539R000400540016-9 OPSEC DISTRIBUTION FILE NAME: DISTRO1 DATE OF PRINTING: 24 APRIL 85 1 ALLRESSLES 3 1ST CEG/REOO 5 2BMW/DOC 7 3AF/ESO 9 3D AIR DIVISION 11 5TH AF/DOP 13 8AF/DOXF 15 9TH AF/INS 17 9 STRAT RECON WING/IN 19 12TH AF/DOXE 21 12 ABG/XPR 23 1 E.A F/DOXM 25 16 AF(INS) 2? .17 SUPS/10A 29 20 MWS/DOS 31 23NR/AD 33 31 ARRS/CC 35 38 ARRS/CC 37 40 TACG/IN 39 41 CAMS/CC 41 41 RWRW/INS 43 42NLBW/LO 45 54 WRS 47 60 MAWG/INS/STOP 6 49 71 ARRS/CC 51 102 ARKS 53 140 TAW'/DOX 55 185 TAS 57 317 TAW/DOT 59 435 TAW/INS 61 443 MAW/DOXC 63 6O1TCW/FS :65 160' MAC 5Q 67 1901 ISG/SP 69 1915 ISS/KT 71 1965 ISG 73 19E5 ISS/ASC/SSR 75 2049 ISG 77 2152 ISS 79 2189 ISS/DONA 81 3270TTCP/TTGE 83 3902 AE'W'/XP 85 AFCC/LFT 6 87 AFTC/XRO STOP 31 59 AND/RDI 91 ARMEL FORCES STAFF 2 *DMAAC/SOFA* 4 2AD/INS1 6 2 WS/SQ 8 3ACCS/DOF-B 10 5TH AF/INS 12 7TH WEATHER WING 14 8AF/INS 16 9 STRA T RECON WING 18 10 T'WTR/INS 20 12Th AF/INS 22 13TH AF/DOY 24 15AF/INS 26 16Th SURVLILLANCE SQ 28 178CF(SIT)/DC 30 21 AF/INS/STOP 11 32 30 4 FATHER SQ/DOX 34 33 ARKS 36 39 ARRk/DOI 38 41 A.RRS/CC 40 41 RWR/DO 42 41 1CS/DOI 44 53WRS/CC 46 55 WRS/CC 48 62 MAW/LOXC 50 100/119 TCF/DOT 52 121 TFW/DOX 54 165 TAG/DOI 56 304 AERS/DOI (AFRES) 58 4.16NMS/MAWSM 600 437 MAW/DOXE 62 497 RTG/INS 54 931 AFREEG/DOI 66 1883D ISS 68 1905 ISS 72 1954 RADAR 72 1974 ISG/TPA 74 204E ISC 76 2130 ISS 78 2160 ISS/ATC 80 3246 TEST WG/CCU 82 3395 TAG/TTEOOAF 84 7113 SAS (USAFE/INCES) 86 AFDSCP/SCP 88 AFWL/INS 90 JOINT LIAISAON DET 92 SURVEY SFCT. SHAPE Sanitized Copy Approved for Release 2010/06/24: CIA-RDP87M00539R000400540016-9 Sanitized Copy Approved for Release 2010/06/24: CIA-RDP87M00539R000400540016-9 93 FLEET AIR EEFLAVIK 2 94. US FORCES CAR:RI FEEAN 95 COMMANDI IN CEIFF US 2 96 DEFENSE COMM AGENCY 97 DEL' 257 AFTAC 2 98 DET 1 2046 I SG 99 DFT 1 AECOS 2 122 DET 1 USAF IAWC/DA 101 LET 10 5 WS/CC 2 102 LET 2 SPACE DIVISION/ENI 103 DET 23 17 4:S/CC 2 104 DET 3 23 AF/DA 105 LET 75/ r WFATEER 'eG 2 125 DET 9 37 ARES 107 LIA 2 108 DIA/0S-1C 109 DOL C3CM J.F/IN 2 110 ELECTRONIC SYS DIV/INS 111 FAA ISL/ACS-300 2 112 FFMA REGION 6 113 AFWAL/GLX?S 2 114 FTD/SF 115 HQ 129 A.RES 2 116 HQ 137/I AY. 2 117 EQ 166TAC GP 2 118 EQ 2187 ISG/SF 2 119 HQ 22AF/LGRSS 2 120 ESQ 25. IFAVO 121 HQ 2ND 4;EATHER WING/DCX 2 122 HQ 326 STEAT Y.G/INS 2 123 HQ 314.AD/INS 2 124 EQ 3AF/XN 2 125 HQ 4AF/P0 (AFRES) 2 126 HQ 834. AIRLIFT DIV. 2 127 EQ 914 TAC AIRLIFT GP (AFRES) 2 128 HQ A:AC/POY 2 129 HQ. AAC/INS 2 130 EQ, A.L/INS 2 131 HQ ADCOM/INXS 2 132 E.Q. AF GLOBAL WEA TEER CFNI AL 2 133 HQ AFAFC/LGVS 2 134 EQ.AFCC/DOY 2 135 HQ AFCC/SIMS 2 136 EQ, AFCC/XORIA 2 113? HQ AFCOMS/IGS 2 138 EQ AFDSD?/SCP 2 139 HQ AFISC/LEOF 2 142 HQ AFISC/I:.OEF 2 141 HQ AFIS/INOI 2 142 HQ AFIS/INOI 2 143 HQ AFIS/INSC 2 144 HQ AFIS/INSP.. 50 .145 EQ AFISC 2 146 E:Q AFISC/IGAK 2 147 HQ. AFLC LCC/XOWVj 2 148 HQ AFMCD/SP 2 149 EQ AFOSI/IVOA 2 152 HQ AFOSI/IVOX 2 151 EQ AFOSP 2 152 HQ AFOSP/SPI 2 153 HQ AFOSP/SPO 2 154 HQ AFRLS/L'OXE 2 155 HQ A.FRLS/PCXX 2 156 EQ AFSC/TEOX 2 157 HQ AFSC/INS 2 158 EQ AFTAC/LOR 2 159 EQ AFTPC/CK 2 160 HQ AFTPC/IC 2 161 HQ AMD/PDI 2 162 CiQ A TC/XPR 2 163 HQ AWS/DOJR 2 164 h Q tAC INS/INU 2 165 HO MAC/DOOAS 2 166 HQ PACAF/INS 167 N.Q SAC/LOCCO 2 168 EQ SAC/LOR 2 169 HQ TACOPS/INO 2 170 HQ SPACE COMMAND/DOCE 2 171 HQ SPACE DIVISION 2 172 HQ SPACE DIVISION 2 173 HQ SPACFCM D/DOCE 2 174 EQ TAC/LOXC 2 175 HQ TAC/SIS 25 1'6 EQ USAF/XOEO 42 177 EQ USAFE/DOFF 2 178 HQ USA FE./DOFF 2 179 EQ USAFF/INS/INST 2 180 HQ USAIFRC/CC 2 181 HQ USCENTCOM/CCJ3-OC 2 182 JOINT CRUISE MISSLE PROJECT 2 183 JOINT SPECIAL OPERATIONAL 2 184 LA.NIIRN TEST TEAM 185 NAFCOS (BA.F)/LOXT 2 186 NGE/XOX 18? NSA C/O CIE 2 188 NSA-F61 189 NSA/S-15 2 190 NSA/S112 191 NSA/S114 2 192 OHIO ANG 193 OJCS/NEACP 2 194 PACAF/DOXZ 195 PACOPS/LOX 2 195 SPACE DIVISION/CSI 197 SPACE DIVISION/INS 2 198 SPECIAL SECURITY OFFICER 199 USAF INTL REP (USAFINREP FM) 2 200 USAFF. ELF 1 CMD/INS Sanitized Copy Approved for Release 2010/06/24: CIA-RDP87M00539R000400540016-9 Sanitized Copy Approved for Release 2010/06/24: CIA-RDP87M00539R000400540016-9 201 FAQ ADCOM/J3CE 2 203 HQ USCINCLANT 2 205 HQ USREDCOM 2 207 JEWC 2 209 OJCS/J1 2 211 USCENTCOM 2 213 USCINCPAC J316 2 215 CI DETACHMENT 2 217 DEFENSE NUCLEAR AGENCY 2 219 FAA 2 221 INSTITUTE-DEFENSE ANNALYSIS 2 223 LOS ALAMOS NL 2 225 NR LIRNSA FMDE 1522 NRC 2 227 US DEPT OF STATE 2 229 HQ ESE 2 231 HQ ESP 2 233 HQ ESS 2 235 DET 1 HQ EST 2 237 DET 3 EQ EST 2 239 OLTS. HQ EST 2 241 6906 ESS 2 243 6911 ESG 2 245 6913 ESS 2 24? 6916 ESS 2 249 6918 ESS 2 251 6922 ESS 2 253 6931 ESS 2 255 6947 ESS 2 257 6948 ESS 2 259 6945 ESS 2 261 6952 ESS 2 263 6960 SPS 2 265 6981 ESS 2 267 6988 FSS 2 269 6990 ESG 1 271 6994 ESS 2 273 8075 ESS (AFRES) 2 275 34EOTTG/TTN2 2 277 AFCSC 2 279 JEWC 2 251 HQ ESC/AC 1 283 HQ ESC/DA 1 285 EQ ESC/IF 1 287 HQ FSC/DOC 1 229 HQ ESC/DOQ 1 291 EQ ESC/L;OT 1 293 EQ ESC/DP 1 295 HQ LSC/HO 1 29? HQ ESC/IN 1 299 HQ ESC/PA 1 301 HQ ESC SFI 1 303 1TFW/DO 5 305 4TF4'/DO 5 307 9A.F/DOX 5 202 HQ LSOC 2 204 HQ USEUCOM 2 206 HQ USSOUTECOM 2 208 JEWC/CDC 2 210 OJCS/J3/J33 2 212 USCINCLANT (J625) 2 214 USECENTOCM 2 216 DCA 2 218 DIS 2 220 FEMA. 2 222 JS DEPT OF JUSTICE 2 224 NASA HQ DOD AFFAIRS DIV. 2 226 US DEPT OF ENERGY 2 228 HQ ESA 2 230 DET 1 HQ ESE/SP 2 232 OLYO HQ ESP/5AF 2 234 HQ EST 2 236 DET.2 HQ EST 2 238 OLTE hQ EST 2 240 6903 ESG 2 242 6910 1SW 2 244 6912 ESC 2 246 6915 FSS 2 248 6917 ESG 2 250 6920 ESC 2 252 6924 ESS 2 254 6940 ESW 2 255 DET 1 6947 ESS 2 253 6949 ESS 2 260 6950 FSG 2 262 6960 ES4. 2 264 6964 CPSS 2 266 6985 ESS 2 268 6990 ESG 2 270 6993 ESS/DOGA 2 272 DET 1 6994 ESS 2 274 3420TTG/TTM1 2 276 3480TTW 2. 278 AFEWC 2 280 HQ. FSC/CC 1 282 EQ ESC/AL 1 284 HQ ESC/DC 1 285 HQ ESC/DO 1 288 EQ ESC/LOO 1 290 EQ ESC/DOS 1 292 HQ PSC/DOZ 1 294 HQ ESC/P.C 1 295 HQ F.SC/IG 1 299 EQ ESC/LG 1 300 HQ ESC/SP 1 302 HQ ESC/XP 1 304 3TF'W/IN 5 306 ETFW/IN 5 306 10 AF/R/DOX S Sanitized Copy Approved for Release 2010/06/24: CIA-RDP87M00539R000400540016-9 Sanitized Copy Approved for Release 2010/06/24: CIA-RDP87M00539R000400540016-9 309 15ABW/DOX 310 1ETFW/DOT 311 23AL/LOX 312 231 Fb;/L0 313 24COhiPw/D0 314. 24_A D/D0 ;15 25AD/DOF 316 26 I D/DCX 317 27TF'W/D00 318 31TFW/I:0 319 33TEW'/D0 320 35TFW/D0 321 3?TFW/L0 322 49`11W,/Do 323 51TFW/IN 324 56TTW/LO 325 57FW'W/DO 325 5ETIV/DO 32? 671RW/LO 329 102 FIW/IN 329 108TFW/DO 330 113TFW/D0 331 116TFW/LO 332 11?TRW;/I'0 333 121TFW/D0 334: 122 TFtiv/L0 335 123 TRW;/DO 336 128 TEW/DO 33? 131 TFW/LO 338 132 TFW/DO 339 140 TFW/D0 340 144 FIW/DO 341 174TFW'/DO 342 301 TFW/D0 343 325 FW'W/LO 344 326AD/IOT 345 347TFW/D0 346 354TFW/I:0/IN 347 355TT'W/DO 348 36F'#/D0 349 366TFW/10 350 374TAW/LOX 351 388'1 FW/D0 352 40STTW/D0 353 419 TFW/DO 354 432.TFW/DOC 355 434TFW/IN/D0 356 4351FW/CCA 357 442TFW/D0 3E9 4741FW/D0 359 4?5AB4v/0T F 360 479TTW/LO 361 482TFW/D0 362 507TAIRCW/D0 363 552AWACD/DOX 364 602 AIRCW/D0 365 831AL/CCE 366 832AL/CCE 36? 833D CS6/SPOM 368 833AD/CCV 369 833AD/IGC 370 833AD/IG 371 836AL/CCE 372 5542SW/CC 373 EQ 20TFW 374 EQ A F I /DO 375 SE ROCC INTFLL FACILITY/ 3?6 USAEADWC/D0 37? USAFSO/D0 378.USAFTAWC/L00 379 USAFTAWC/DOX 380 USAETFWC/CS 381 EQ AFOT'FC/CV0 382 EQ AFOTEC/TLF 383 DET 1 AFOTEC 384 DET 2 AFOTEC 385 DET 3 AFOTEC 386 DFT 4 AFOTEC/TSE 38? LET 5 AFOTEC 329 OL-AC AFOTEC 389 OL-AE AFOTEC/OTEA 390 OL-AF AFOTEC 391 01-AI AFOTEC 392 AFOTEC ICBM 393 OL-AN AFOTEC 394 OL-PS AFOTEC 395 CL-AT AFOTEC 396 OL-AW AFOTEC 397 0L-AV AE0TEC 396 OL-f.Y AFOTEC 399 OL-BA AFOTEC (AF/LF) 400 OL-EC AFOTEC 401 OL-BF AFOTEC 402 OL-EW AFOTEC 403 OL-BT AFOTEC 404 OL-DD AFOTEC 405 HQ 1 CEVG/RBOO 406 LET 1. 1CEVG 407 DET 2. 1CEVG 408 DET 4. 1CEVC 409 DET 5. 1CFVG 410 DET 7. 1CFVG 411 DET 8. 1CEVG 412 DET 9. 1CEVG 413 DET 10. 1CEVG 414 DET 11. 1CEVG 415 DFT 12 1CEVG/RBO 416 DET 14 1CEVG Sanitized Copy Approved for Release 2010/06/24: CIA-RDP87M00539R000400540016-9 Sanitized Copy Approved for Release 2010/06/24: CIA-RDP87M00539R000400540016-9 417 DET 16 1CEVG 419 DET 24 1CEVC 419 AFOSI DIST 1 420 AFOSI LIT 102 421 AFOSI DET 106 422 AFOSI DET 109 423 AFOSI DET 110 424 AFOSI DIT 111 425 AFOSI LET 140 426 AFOSI LISTRICT 4 427 AFOSI DET 403 428 AFOSI DET 411 429 AFOSI DET 412 430 AFOSI DET 413 431 AFOSI DET 414 432 AFOS1 DFT 440 433 AFOSI DISTRICT 5 434 AFOSI 105 OL-L 435 AFOSI LET 509 436 A.FOSI DFT 512 437 AFOSI LET 514 438 AFOSI LEI 515 439 AFOSI DET 516 440 AFOSI LET 518 441 AFOSI LET 540 442 AFOSI DISTRICT 7 443 AFOSI DET 707 444 AFOSI LET 709/CC 445 AFOSI DET 710 44.6 AFOSI .DET 711 447 AFOSI LET 712 448 AFOSI DFT 716 449 AFOSI DET 717 450 AFOSI LET 721 451 AFOSI DET 740 452 AFOSI DO? OL-E 453 AFOSI DO7 OL-F 454 AFOSI DISTRICT 8 455 AFOSI DET 810 456 AFOSI LET 811 457 AFOSI DET 812 459 AFOSI LET 813 459 AFOSI DE.T 814 460 AFOSI LIT 815 461 AFOSI DET 816 462 AFOSI BET 840 463 AFOSI DISTRICT 10 464 AFOSI LET 1001 465 AFOSI DET 1008 466 AFOSI DET 1012 467 AFOSI DET 1014 468 AFOSI DET 1016 469 AFOSI DET 1018 470 AFOSI LIT 1042 471 AFOSI DISTRICT 11 472 AFOSI DET 1101 473 AFOSI LET 1103 474 AFOSI DFT 1108 475 AFOSI DET 1110 476 AFOS I LET 1114 47? AFOSI DET 1117 4?B AFOSI LIT 1140 479 AFOSI DISTRICT 13 460 AFOSI DET 1302 481 AFOSI LET 1306 482 AFOSI DET 1312 483 AFOSI DET 1313 484 AFOSI DET 1314 485 AFOSI DET 1340 486 AFOSI DISTRICT 14 487 AFOSI LET 1401 488 AFOSI LET 1402 489 AFOSI DET 1404 490 AFOSI DET 1405 491 AFOSI LET 1406 452 AFOSI DET 1407 493 AFOSI DET 1406 494 AFOSI LET 1440 495 AFOSI DISTRICT 16 496 AFOSI DET 1801 497 AFOSI DET 1802 498 AFOSI DFT 1803 499 AFOSI DET 1810 500 AFOSI LET 1811 501 AFOSI DET 1812 502 AFOSI DET 1815 503 AFOSI DET 1816 504 AFOSI DFT 1817 505 AFOSI LET 1840 506 AFOSI LISTRICT 19 507 AFOSI DET 1901 508 AFOSI DET 1902 509 AFOSI LET 1904 510 AFOSI DET 1905 511 AFOSI DET 1910 512 AFOSI LET 19 OL-C 513 AFOSI DET 1940 514 AFOSI DISTRICT 20 515 AFOSI DET 2001 516 AFOS I LIT 2004 517 AFOSI DET 2006 516 AFOSI DET 2007 519 AFOSI DFT 2010 520 AFOSI LET 2011 521 AFOSI LET 2040 522 AFOSI LISTRICT 21 523 AFOSI DET 2101 524 AFOSI DET 2102 Sanitized Copy Approved for Release 2010/06/24: CIA-RDP87M00539R000400540016-9 Sanitized Copy Approved for Release 2010/06/24: CIA-RDP87M00539R000400540016-9 525 AFOSI LET LET 2103 1 527 AFOSI DET 2105 1 529 AFOSI DISTRICT 42 1 531 AFOSI DET 4203 1 533 AFOSI DISTRCT 45 1 535 AFOSI LET 4503 1 537 AFOSI DET 4506 1 539 AFCSI DET 4540 1 541 AFOSI LET 4606 1 543 AFOSI DEl 4641 1 545 AFOSI DISTRICT 62 OL-B 1 547 AFOSI DET 6203 1 549 AFOSI DET 6205 1 551 AFOSI LET 6207 1 553 AFOSI DET 6209 1 555 AFOSI DF:T 6240 1 557 AFOSI DET 6801 1 559 AFOSI DET 6803 1 561 AFOSI DET 6805 1 563 AFOSI DET 6807 1 565 AFOSI DET 6809 1 567 AFOSI DET 6901 1 569 AFOSI DET 6903 1 571 AFOSI DET 6940 1 573 AFOSI US EMBASSY (D-321) 1 575 AFOSI RA OL-L 1 577 AFCSI DET 7008 1 579 AFOSI DET 7011 1 581 AFOSI DET 7014 1 583 AFOSI DET 7028 1 585 AFOSI 7031 1 587 AFOSI DET 7033 1 589 AFOSI LET 7040 1 591 400 MP P.W. CAMP 2 593 USSASSD BERLIN 2 595 470TH MI GROUP 2 59? COMMANDER 2 599 USASSD WI;ITE SD 2 601 EQ 1ST BN 209TH FA NYARNC 2 623 HQ USA MATERIAL DEVELOPMENT 2 605 HQ VII CORPS 2 607 HQS 7TH SIGNAL COMMAND 2 609 US ARMY COMBINED AREA CTL 2 611 BRAVO COMPANY - 104TH MI BN 2 613 CINCUSNAVEUR 811 2 615 C03 CORPS 2 61? COMMANDER NSG COMMAND/G123 2 619 TEWC 33 2 621 6MR 2DMD FMF 2 623 EQ 25TH COMBAT AVIATION BT 2 625 MILITARY SEALIFT COMMAND 2 627 NIS DIRECTOR 2 629 OPNAV (OP-944) 2 631 USN MOBILE CONST. BAT. 74 2 526 AFOSI LIT 2104 1 526 AFOSI DET 2140 1 530 AT.OSI DET 4201 1 532 AFOSI LISTRICT 44 1 534 AFOSI BET 4502 1 536 AFOSI DET 4504 1 536 AFOSI LET 4507 1 540 AFOSI DISTRICT 45 1 542 AFOS I LET 4607 1 544 AFOSI DISTRICT 52 1 545 AFOSI LET 6202 1 548 AFOSI DET 6204 1 55fc AFOSI DET 6206 1 552 AFOSI LET 6206 1 554 AFOSI DET 6210 1 556 AFOSI DISTRICT 68 1 558 AFOSI LET 6802 1 560 AFOSI DET 6804 1 562 AFOSI DET 6806 1 564 AFOSI LET 6808 1 566 AFOSI DISTRICT 69 1 568 AFOSI 69-CA 1 5700 AFOSI LET 6905 1 572 AFOSI DISTRICT 70/IVOE 1 574 AFOSI OL-G 1 576 AFOSI RA OL-M 1 575 AFCSI DET 7012 1 580 AFOSI LET 7013 1 582 AFOSI DET 7024 1 584 AFCSI LET 7030 1 586 AFOS I LET 7032 1 5#?8 AFOSI DET 7034 1 590 193D MIL INT F.L 592 CDR TRADOC 2 594 USASSD MUNICH 2 596 USASSC USARERU 2 598 USAESD BELVOIR 2 600 COMMANDER USASSD HANCOCK 2 602 EQ LA (LAMI-CIC) 2 604 EQ CTSA INSCOM 2 605 HQ XVIII ABN CORPS 608 SECURITY SPT LET/INSCOM 2 610 3482 TTS/INAF 512 CINCPPCFLI (N234) 614 CO 2ND RADIO BTN 616 USASSD BRAGG 618 FITRON ONE ZERO ThREEE 620 USN MCB 74 622 FCTCLANT 624 HQ NAY MAT. MAT 098 626 NAVAL AIR TEST CENTER 62B NSGP. OPS 35 630 USCINCLANT ----->>>>>>>>>>>> TOTAL # OF COPIES REQUIRED: Sanitized Copy Approved for Release 2010/06/24: CIA-RDP87M00539R000400540016-9 Sanitized Copy Approved for Release 2010/06/24: CIA-RDP87M00539R000400540016-9 Sanitized Copy Approved for Release 2010/06/24: CIA-RDP87M00539R000400540016-9 Sanitized Copy Approved for Release 2010/06/24: CIA-RDP87M00539R000400540016-9 i7LURL I MUFU RI1 r WARNING NOTICE: SECRET NOFORN j Sensitive Intelligence Sources and Methods l I Involved (WNINTEL) 1 I-------------I Sanitized Copy Approved for Release 2010/06/24: CIA-RDP87M00539R000400540016-9