NATIONAL OPERATIONS SECURITY PROGRAM
Document Type:
Collection:
Document Number (FOIA) /ESDN (CREST):
CIA-RDP89B01356R000300420004-7
Release Decision:
RIPPUB
Original Classification:
S
Document Page Count:
33
Document Creation Date:
December 23, 2016
Document Release Date:
December 5, 2012
Sequence Number:
4
Case Number:
Publication Date:
October 9, 1987
Content Type:
MISC
File:
Attachment | Size |
---|---|
![]() | 1.27 MB |
Body:
1
Declassified in Part - Sanitized Copy Approved for Release 2012/12/05: CIA-RDP89B01356R000300420004-7
v ?
1 Ulf
DRAFT
Revision 10/9/87
National Security Decision
Directive Number ATTACHMENT `Q
NATIONAL OPERATIONS SECURITY PROGRAM
OBJECTIVE
Security programs and procedures already exist to protect classified
matters. However, unclassified information generally available to the public
as well as certain detectable activities exist that provide indications
concerning classified or sensitive information or undertakings. Such
indicators may be exploited by those seeking to neutralize or to take
advantage of US Government actions that affecrnational security. Application
of the Operations Security (OPSEC) process promotes operational effectiveness
by guarding against the inadvertent compromise of sensitive or classified US
Government activities, capabilities, or intentions.
BACKGROUND
The operations security process involves five steps: identification of
critical information, analysis of the threat, ,Inr!lysis of the vulnerabilities,
assessment of the risks, and application of apprupriate countermeasures. It
begins with an examination of the totality of an activity to determine what
'exploitable but essentially unclassified indicators could be acquired in light-.
of the known collection capabilities of potential adversaries. Indicators
usually evolve from openly available data and other debectable actions.
Certain of these indicators may be pieced together or interpreted to
UNCLASSIFIED
Declassified in Part - Sanitized Copy Approved for Release 2012/12/05: CIA-RDP89B01356R000300420004-7
Declassified in Part - Sanitized Copy Approved for Release 2012/12/05: CIA-RDP89B01356R000300420004-7
UNCLASSIFIED
discern critical information. Indicators most often stem from the routine
administrative, physical, or technical actions taken to prepare for or execute
a plan or activity. Once the indicators are identified, they are analyzed
against the threat to determine the extent to which they could reveal critical
information.
Commanders and managers then use these threat and vulnerability analyses
in their risk assessment to assist in selecting and applying practical
countermeasures to mitigate or nullify selected indicators. Indicators may be
controlled or protected, as appropriate, using the full range of OPSEC
measures. These OPSEC measures may include, but are not limited to:
counterimagery; cover, concealment, and deception; and physical, information,
personnel, signals, computer, communications, and electronic security.
OPSEC is, thus, a systematic and proved process by which the US Government
and its supporting contractors can deny to potential adversaries information
about capabilities and intentions by identifying, controlling, and protecting
generally unclassified indicators associated with the planning and execution
of sensitive government activities.
APPLICATION
Indicators and vulnerabilities are best identified before activities start
through detailed OPSEC planning. They may also be identified during or after
the conduct of routine functional activities by analyzinp how functions are
2
UNCLASSIFIED
Declassified in Part - Sanitized Copy Approved for Release 2012/12/05: CIA-RDP89B01356R000300420004-7
Declassified in Part - Sanitized Copy Approved for Release 2012/12/05: CIA-RDP89B01356R000300420004-7
urfuLiA331r tt)
actually performed and what procedures are used. Planning and analysis
proceed from the adversaries' perspectives. To assist in OPSEC planning and
analysis, OPSEC planning guidance must be developed jointly by those most
familiar with the operational aspects of a particular activity together with
their supporting intelligence elements.
OPSEC planning guidance should consider those critical aspects of an
activity that should be protected in light of US and adversary goals,
estimated key adversary questions, probable' adversary knowledge, desirable and
harmful adversary appreciations, and pertinent intelligence threats, as well
as an outline of projected OPSEC measures.
In the OPSEC process, it is important to distinguish between the threat
and vulnerability analysis phases and the phase in which OPSEC measures are
applied. Recommendations on the use of OPSEC measures are based on the joint
operational-intelligence analyses, but ultimate decisions on their
implementation
are made by commanders, supervisors, or program managers who
determine what aspects will be protected.
responsibility for mission accomplishment
total authority for determining where and
POLICY
The decisionmaker with ultimate
and resource management must have
how OPSEC will be applied.
A National Operations Security Program is hereby established. Each
department and agency assigned or supporting national security missions with
3
UNCLASSIFIED
Declassified in Part - Sanitized Copy Approved for Release 2012/12/05: CIA-RDP89B01356R000300420004-7
Declassified in Part -Sanitized Copy Approved for Release 2012/12/05: CIA-RDP89B01356R000300420004-7
? uNuu-km ILD
classified or sensitive activities shall establish a formal OPSEC program with
the following common features:
o Specific assignment of responsibility for OPSEC direction and
implementation.
Specific requirements to plan for and implement OPSEC in anticipation
of, and where appropriate during, department or agency activity.
o Direction to use OPSEC analytical techniques- to assist in identifying
vulnerabilities and to select appropriate OPSEC measures:
o Institution of positive measures to ensure that all personnel,
commensurate with their positions and security clearances, are aware
of hostile intelligence threats and understand the OPSEC process.
o Instructions to conduct an internal annual OPSEC review that will
Outline the current OPSEC program of a department or agency and
highlight successes or problem area; that may aid other OPSEC
programs.
o Provisions for support of and cooperation with other departments and
agencies in their OPSEC programs.
4
UNCLASSIFIED
Declassified in Part - Sanitized Copy Approved for Release 2012/12/05: CIA-RDP89B01356R000300420004-7
Declassified in Part - Sanitized Copy Approved for Release 2012/12/05: CIA-RDP89B01356R000300420004-7
1LLJ
Agencies with minimal activities that could impact on national security
need not establish a formal OPSEC program; however, they must cooperate with
other departments and agencies to minimize damage to national security when
OPSEC problems arise.
RESPONSIBILITIES
Heads of departments and agencies assigned or supporting national security
missions. Establish organizational OPSEC Programs; issue, as appropriate,
OPSEC policies, procedures, and planning guidance; and designate departmental
and agency planners for OPSEC Advise the NSC on OPSEC measures -required of
other departments and agencies in order to achieve and maintain effectiveness
in operations or activities. JCS should advise the NSC of the impact of
nonmilitary US policies on the effectiveness of OPSEC measures taken by the US
military and recommend to the NSC policies that would minimize any adverse
effects.
Chairman, Senior Interagency Group for Intelligence (SIG-I)
The SIG-I is designated as the NSC's instrumentality for national OPSEC
policy formulation, resolution of conflicting interagency OPSEC issues,
guidance on national-level OPSEC training, technical OPSEC support, and advice
to individual agencies. The National Operations Security Advisory Committee
(N0/\C), as part of the SIG-I structure and functioning under the aegis of the
Interagency Group for Countermeasures (Policy), will:
5
UNCLASSIFIED
Declassified in Part - Sanitized Copy Approved for Release 2012/12/05: CIA-RDP89B01356R000300420004-7
? Declassified in Part - Sanitized Copy Approved for Release 2012/12/05: CIA-RDP89B01356R000300420004-7
LLLJ
o Provide the SIG-I structure with advice and recommendations
concerning measures and methods for reducing OPSEC vulnerabilities
and propose corrective measures.
o As requested, consult with and provide advice and recommendations to
the various departments and agencies concerning OPSEC vulnerabilities
and corrective measures.
o On an ad hoc basis, chair forums for two or.more agencies having
competing interests or responsibilities with OPSEC implications that
may affect national security interests. Analyze the issues and
prepare advisory memorandums and recommendations for the competing
agencies. In the event of an impasse, make appropriate
recommendations to the SIG-I structure for resolution of the dispute.
o Bring to the attention of the SIG-I those major unresolved OPSEC
vulnerabilities and deficiencies that may arise within designated
programs and activities of the executive branch.
o Articulate to the SIG-I national-level requireMents for intelligence
and counterintelligence support to OPSEC.
6
UNCLASSIFIED
Declassified in Part - Sanitized Copy Approved for Release 2012/12/05: CIA-RDP89B01356R000300420004-7
? Declassified in Part - Sanitized Copy Approved for Release 2012/12/05: CIA-RDP89B01356R000300420004-7
Nothing in this Directive:
o Is intended to impinge on the authorities and responsibilities of the
DCI to protect intelligence sources and methods, nor those of any
authorized agency or department to conduct intelligence-related
activities.
o Implies any authority on the part of the SIG-I, Interagency
Group/Countermeasures (Policy), or' the NOAC,to examine the facilities
or operations of any department or agency wtthout the approval of the
head of such department or agency.
7
UNCLASSIFIED
Declassified in Part - Sanitized Copy Approved for Release 2012/12/05: CIA-RDP89B01356R000300420004-7
Declassified in Part - Sanitized Copy Approved for Release 2012/12/05: CIA-RDP89B01356R000300420004-7
,
...,rtl..t,:. THE UNDE R SECRETARY ')F" DE FENS/ ....7 ...?..
'.. .'.
WASIIIN(.1()N I) C .'0.41) I
t
1
s4rfl1 ATTACHMENT ___J___: ______
i
13 NU n66
POLICY
MEMORANDUM FOR THE CHAIRMAN, NAT1ONAI, OPERATIONS SECURITY ADVISORY
COMMITME (NOAC)
SUBJECT: Civil Satellite Remote S4 sing Proprams
Under section 101 of the Land Rvtiote-Sensing Commerciali-
zation Act of 1984, (Tal) A), the Congress declared that,
among other things, the national interest of the US lies in
maintaining international leadership in civil remote sensing
and in broadly promoting the beneficial use of remote-sensing
data. The Congress declared, also, that land remote sensing
conce'rns of the US.
by.. .private parties of the US affecm...national security
Section 402 of ,the Act prohibits any US person from
operating any private remote-sensing,syst.em without a
license (issued by the Secretary of Comme,:ce).
Section 607 of the Act requires the Secretary of Commerce
to consult with the Secretary of DeFese on all matters
under the Act affecting national secuttity (including the
issuance of the requisite license); aTi, the Secretary of
Defense shall determine the conditions necessary to meet
national security concerns.
The National Oceadic and Atmospheric Administration
(NOAA), under the Department of Commeribe, issued a Notice of
Proposed Rulemakinp (51 Fed. Reg. 9971, March 24, 1986) (Tab
B) which, accordirip to the Radio-Televlision News Directors
Association (RTNDA), would violate thel First Amendment. The
thrust of RTNDA objections to the Notice is that the rules
are unconstitutionally vague and. would authorize NOAA to
impose impermissible prior restraint. According to RTNDA,
the question is not whether NOAA Can take action to protect
national security, hut what standards must it use when doing so.
Given that commercial multispectril imaging resolution
of other countries, such :is France and Japan, is at least as
pood now as the US, and over the years along with US commercial
satellites, will achieve even better rc'solution, the question
becomes, "How does the US accommodate necessary and inevitable
commercial growth in
space
infomation?" and still protect US sensitive
Declassified in Part - Sanitized Copy Approved for Release 2012/12/05: CIA-RDP89B01356R000300420004-7 _
Declassified in Part - Sanitized Copy Approved for Release 2012/12/05: CIA-RDP89B01356R000300420004-7
It seems to rte that,
(1) The Department_ of Defense needs to develop and
publish clear, defendable standards for the guidimce of rho
Secretary of Commerce in applying the national security
concerns of the Secretary of Defense to his licensing criteri
Without these standards, there is a possibility that, on the
grounds of vagueness, the plea "national security" would
not, in and of itself, be sufficient to forestall issuance
of a license.
(2) As the department with the greatest enuitv in
overflight security, the DOD nevertheless should develop iis
standards in coordination with the entire counterintullipenc
community. (in this connection, all departwents and agencies
should recognize that their sensitive otiLduor ricCiviieS, at
least, are vulnerable HOW to overhead collectiop and will
become more so as technology advanc(s.)
Accordingly, I ask that your committee undertake an
interapency review of the.subject and recommend 'to the
Secretary of Defense standards for the guidance of the
Secretary of Commerce in meeting the necessary national
security concerns in the licensing process.
Aide
Declassified
Declassified in Part - Sanitized Copy Approved for Release 2012/12/05: CIA-RDP89B01356R000300420004-7
25X1
Declassified in Part - Sanitized Copy Approved for Release 2012/12/05: CIA-RDP89B01356R000300420004-7
Declassified in Part - Sanitized Copy Approved for Release 2012/12/05: CIA-RDP89B01356R000300420004-7
Declassified in Part - Sanitized Copy Approved for Release 2012/12/05: CIA-RDP89B01356R000300420004-7
? (.71s.r.' 7".
2
(U) Satellites could be used extensively to "monitor"
status of US developmental efforts in controversial areas
of research and development. Much is published in open
sources which indicates where (in general terms) such research
is done. This initial targeting data could be used for the
periodic "looks" by the media's overhead systems. Consequently,
if not already in place, steps would have to be taken routinely
at these locations to avoid observation by the systems.
(U) There are very significant dollar/time costs
associated with avoiding overhead platforms at research and
development locations. Some tests can be conducted only under
certain weather or atmospheric conditions. It is misleading to
assume that the use of avoidance countermeasures will always
work because the costs of postponement may be prohibitive and
test preparations cannot always be hidden.
(U) The difficulty of hiding a large-scale military
operation would be complicated by adding to the list of
potential intelligence collectors. Large numbers of troops,
equipment, and supplies must be massed at the decisive time
and place. Barring the availability of ground, ship, or
airplane observation posts, satellites provide the best means
of verification. Low resolution systems are sufficient for
detecting mass buildup.
Indirect Threats
(U) Media publication of "facts" they gather about
their targets' (military, economic, or political) capabilities,
problems, or intentions might give hostile intelligence services
an insight into true US intelligence assessments.
.(U) FrienOly intelligence collection could be
affected by foreign efforts to accelerate their counterimagery
programs based upon the added threat .to their operations
posed by increased US satellite activity.
(U) Target antisatellite efforts could be accelerated
to the detriment of US military capabilities since media
satellites would also have to be taken out in early stages of
war or preparation for war. (On the other hand, a US-licensed
commercial system could augment US capabilities.)
MEASURES 'AVAILABLE TO PROTECT NATIONAL SECURITY
Notification
(U) The key ingredient to achievement cif protection from
any overhead threat, including that of a postulated MEDIASAT,
is notification, the necessary elements of which are tracking
and reporting.
Declassified in Part - Sanitized Copy Approved for Release 2012/12/05: CIA-RDP89B01356R000300420004-7
25X1
Declassified in Part - Sanitized Copy Approved for Release 2012/12/05: CIA-RDP89B01356R000300420004-7
Declassified in Part - Sanitized Copy Approved for Release 2012/12/05: CIA-RDP89B01356R000300420004-7
Declassified in Part - Sanitized Copy Approved for Release 2012/12/05: CIA-RDP89B01356R000300420004-7
UrLtWiNTIVii
4
Licensing Provisions
(U) The Land Remote-Sensing Commercialization Act of
1984 (15 USC 4277) requires the Secretary of Defense to
determine the conditions necessary to Meet national security
concerns with respect to issuance by the Secretary of Commerce
of the requisite license for a remote Sensing system in space,
such as a MEDIASAT.
(U) The NOAC recognizes that the conditions of licensing
under 15 USC 4277 of the act are for the sole determination
of the Secretary of Defense; and, the NOAC understands that
the current DoD position on the subject is that the DoD must
have the "widest possible latitude" in determining the national
security concerns. The NOAC, therefore, merely suggests the
following possibilities for consideration of the cognizant,
DoD officials:
(U) When the Secretary of Defense, after conferring
with the Chairman of the Joint Chiefs of Staff, declares
that the disclosure of data collected from particular orbits
during a particular time frame would pose a serious and
immediate threat to distinct and compelling national security,
that data shall be withheld from public distribution or
disclosure for so long as the threat exists or until the same
data can no longer be held undisclosed because of actual
public disclosure by other means, e.g., a military action has
been launched and reported.
(U) Discussion: There are two principal methods
for imposing ad hoc limitations as suggested above:
a. Imposing constraints on the timeliness of data dissemina-
tion in specific situations or specific geographic
areas where directed for national security reasons. In
peacetime such constraints should be in writing and
limited to specific periods of time, or to the specific -
situation.
b. Imposing constraints on the collection of imagery in
such specific situations or specific geographic areas.
(U) Either method will probably be subject to legal challenges
by an applicant for a MEDIASAT license as a violation of the
First Amendment of the Constitution, and specifically as an
iMpositiOn of impermissible prior restraint. S4Juld the
MEDIASAT concept become a reality, this issue could be expected
ultimately to go to the Supreme Court for resolution.
(U) (Our initial advice is that the second method may be more
defensible because, i) it does not involve the prior restraint
rrhiA proF-rrr
1?3::?,?
Declassified in Part - Sanitized Copy Approved for Release 2012/12/05: CIA-RDP89B01356R000300420004-7
25X1
Declassified in Part - Sanitized Copy Approved for Release 2012/12/05: CIA-RDP89B01356R000300420004-7
Declassified in Part - Sanitized Copy Approved for Release 2012/12/05: CIA-RDP89B01356R000300420004-7
Declassified in Part - Sanitized Copy Approved for Release 2012/12/05: CIA-RDP89B01356R000300420004-7
. ? ,
6
equipment which is available today, some of which is approved
by the Government. The prevention of loss may well be worth
the price of protection to the applicants who may consider
incorporation of protection in any satellite system.
ADDITIONAL CONSIDERATIONS
(U) In the preceding sections the NOAC working group has
addressed the narrow issue of protecting sensitive Defense
information from reconnaissance by overhead satellites.
There remain two different kinds of problems that, in the
view of the working group, need to be 1ponsidered by the
Department of Defense: i) Guidelines For review of license
applications and, ii) Guidelines for determination as to the
need for imposition of controls on an Operating system.
1
Guidelines for Review of License Applications.
(U) A primary concern should the completeness of the
information provided according to the Rules, including,
1
The date of intended commencement of operations
and the expected duration of such operations;
The method of launch, and the name and location
of the operator of the launch vehicle and the launch site;
The range of orbits and altitudes requested for
authorized operation;
The range of spatial resolution or instantaneous
field of view requested;.
The spectral bands requeste8 for authorized
operation; and
Timeliness of reporting.
(U) (Whether or not a .resolution limitation is to be imposed
will be determined by National Space Policy, revision of
which is under White House study.)
(U) In deciding later whether national security interests
are involved, timeliness of dissemination of the imagery
will be a factor.
Guidelines for Determination of' the Need for Imposition
of Controls on an Operating System.
rfPl
dz.t.t 1LIJ
Declassified in Part - Sanitized Copy Approved for Release 2012/12/05: CIA-RDP89B01356R000300420004-7
? Declassified in Part - Sanitized Copy Approved for Release 2012/12/05: CIA-RDP89B01356R000300420004-7
o.?
UNCLASSIFIE5
7
(U) Once a license has been granted and the system is
operational, consideration of what spatial resolution "ought
to be" is no longer pertinent. The problem now is the
determination of how, when, and in what manner any controls
that the national security requires may be imposed.
(U) As has been indicated, control may be either i)
prior restraint on the release of information already obtained
or ii) constraints on collection so that the sensitive imagery
is not obtained in the first instance. Both of these methods
raise constitutional questions but the latter course seems to
be the more reasonable. The obvious OPSEC problem with the
latter course, however, is "tipping one's hand" since the
media--and, through them, the whole world--could he warned
both as to the geographic area and the timing in which something
the Department of Defense considers very important is about
to occur.
OVERSIGHT
(U) Notwithstanding the availability of remedies other than
license conditions as discussed above (notification, concealment,
and deception), the working group perceives the need to
establish in the Department of Defense a single operational
entity--an executive agent--with oversight responsibility for
all matters arising from US media-controlled satellite imaging.
The terms of reference for the executive agent should be
established well ahead of the first application for a license
and may include the following elements:
a. (U) Who, specifically, is to be responsible for
following the situation eo continuously and so carefully as
to be able to identify situations in which a MEDIASAT could
endanger-the national security?
(U) (Note( Knowledgeable DoD working group members
suggest the possibility of designating the Chairman of the
Joint Chiefs of Staff as executive agent with the day to day
responsibility--perhaps through a special group in the
NMCC/NMIC--of advising the Secretary of Defense when the
Secretary of Commmerce needs to be notified of the application
of predetermined controls. It is belieVed that an OSD staff
element is too far out of the operational environment to
fulfill this role.)
b. (U) How is the determination by the Secretary of
Defense that action is needed to be conveyed to the responsible
official in the Department of Commerce, the official who will
actually impose the controls? Procedures in this area need
t t
Allr!PrI
Declassified in Part - Sanitized Copy Approved for Release 2012/12/05: CIA-RDP89B01356R000300420004-7
Declassified in Part - Sanitized Copy Approved for Release 2012/12/05: CIA-RDP89B01356R000300420004-7
-UNCLASSIFIE6
to be quite carefully spelled out sinc there could be
situations in which time would be of the essence; delays of
as little as 1 hour in initiating the proper reaction might
make the whole exercise one of futility.
c. (U) What policy decisions
handling of applications for licensing
8
need. to be addressed for
of remote sensing systems?
d. (U) What policy decisions must be addressed as a
basis for recommendations as to how and under what circumstances
imaging controls would be imposed on a MEDIASAT because the
Secretary of Defense had "determined" that the national
security required those controls?
SUMARY
(U) The NOAC working group believes that the following three
statements summarize the thrust of this report:
a. Realistic protection from overhead imagery is through
notification and OPSEC measures.
b. Given the current commercial imaging capabilities,
constraints on spatial resolution by the US Government are
not an effective control.
c. The Department of Defense should consider the designation
of an executive agent to be responsible for all matters
arising from US media-controlled satellite imaging.
11.Plr:rcri';i
Declassified in Part - Sanitized Copy Approved for Release 2012/12/05: CIA-RDP89B01356R000300420004-7
Declassified in Part - Sanitized Copy Approved for Release 2012/12/05: CIA-RDP89B01356R000300420004-7
TERMS OF REFERENCE FOR NATIONAL OPERATIONS
SECURITY ADVISORY COMMITTEE
MEDIASAT WORKING GROUP
Review of Security Implications of Civil
Satellite Remote Sensing Programa
I. TASK The Department of Defense has asked the NOAC to
review the US Civil Satellite Remote Sensing Program
and recommend to the Secretary of Defense standards for
the guidance of the Secretary of Commerce in meeting the
necessary national security concerns in the licensing
process.
II. BACKGROUND
- Under section 101 of the Land Remote-Sensing Commerciali-
zation Act of 1984, the Congress declared that, among other
things, the national interest of the US lies in maintaining
international leadership in civil remote sensing and in
broadly promoting the beneficial use of remote-sensing data.
The Congress declared, also, that land remote sensing by...
private parties of the US affects...national security
concerns of the US.
- Section 402 of the Act prohibits any US person from
operating any private remote-sensing system without a
license (issued by the Secretary of Commerce).
- Section 607 of the Act requires the Secretary of Commerce
to consult with the Secretary of Defense on all matters
under the Act affecting national security (including the
issuance of the requisite license); and, the Secretary of
Defense shall "determine the conditions necessary to meet
national security concerns.
- The National Oceanic and Atmospheric Administration
(NOAA), under the Department of Commerce, issued a Notice
of Proposed Rulemaking (51 Fed. Reg. 9971, March 24, 1986)
which, according to the Radio-Television News Directors
Association (RTNDA), would violate the First Amendment.
The thrust of RTNDA objections to the Notice is that the
rules are unconstitutionally vague and would authorize
NOAA to impose impermissible prior restraint. According to
RTNDA, the question is not whether NOAA can take action to
protect national security, but what standards must it use
when doing so. NOAA has responded to the comments and has
issued Final Regulations effective August 10, 1987,
(52 Fed. Reg. 25970, July 10, 1987)
Declassified in Part - Sanitized Copy Approved for Release 2012/12/05: CIA-RDP89B01356R000300420004-7
Declassified in Part - Sanitized Copy Approved for Release 2012/12/05: CIA-RDP89B01356R000300420004-7
- Given that commercial multispectral imaging resolution
of other countries, such as France and Japan, is at least
as good now as the US, and over the years along with US,
commercial satellites will achieve even better resolution,
the question becomes, "How does the US accommodate necessary
and inevitable commercial growth in apace and still protect
US sensitive information?"
III SCOPE OF REVIEW
- What are the national security implications of an
extensive media use of high-resolution satellite imaging
capabilities?
- What measures are available to protect national security
concerns relative to media use of civil satellite imaging
systems, both US and foreign? (Responds to first bullet,
above.)
+ Notification a la SATRAN (Satellite Reconnaissance
Advanced Notice) and FRNDSAT
+ Concealment and military deception
+ Licensing provisions unaer section 607 of the Act.
IV REPORT
a. Scope Consistent with the NOAC charter, para-
graph 2.c., the mediasat working group should limit
its report to discussion of the national security
implications, that is, the OPSEC vulnerabilities,
and to corrective measures to overcome those vulner-
abilities. ,
b. Disposition. The report should be forwarded to the
Chairman, NOAC, who will decide its further disposition.
That is, if he concurs in the report, provide its advice
and recommendations concerning OPSEC vulnerabilities
and corrective measures to the Secretary of Defense,
ATTN: DUSD/P, Washington, D.C. 20301-2??0.
Declassified in Part - Sanitized Copy Approved for Release 2012/12/05: CIA-RDP89B01356R000300420004-7
Declassified in Part - Sanitized Copy Approved for Release 2012/12/05: CIA-RDP89B01356R000300420004-7 I
TAB B
National Operations Security Advisory Committee
MEDIASAT Working Group and Advisers*
John Hoover ODUSD/P, Chair
Major General Jack Thomas, USAF-Re t . C3I*
A. R. Cinquegrana, D0J-0IPR*
Mark Evans, DoJ-0IPR
697-7641
697-2720
633-5604
633-5607
Peter Modley, State, INR*
Alan Brown, Commerce
MAJ Bill Puddy, Army/DAMO-OD
LCDR Bob Golding, JCS/J33
647-8651
377-1 722
694-8199
695-1653
CPT Mary Moffitt, ODUSD/P/CI&IP
fl
697-9586
STAT
STAT
STAT
Declassified in Part - Sanitized Copy Approved for Release 2012/12/05: CIA-RDP89B01356R000300420004-7
25X1
Declassified in Part - Sanitized Copy Approved for Release 2012/12/05: CIA-RDP89B01356R000300420004-7
R
Next 5 Page(s) In Document Denied
Declassified in Part - Sanitized Copy Approved for Release 2012/12/05: CIA-RDP89B01356R000300420004-7
Declassified in Part - Sanitized Copy Approved for Release 2012/12/05: CIA-RDP89B01356R000300420004-7
o
OFFICE OF THE ASSISTANT SECRETARY OF DEFENSE
FOR COMMAND, CONTROL, COMMUNICAT IONS
AND INTELLIGENCE
Date June 5, 1987
Memoftw Mr. Latham
Attached is the background paper you asked
for in preparation for your TV interview with
Nodding Carter on "Use of imaging satellites by
news media."
All pertinent information in the tabs has
been summarized in the paper itself. The only
real, written policy of the U.S. Government on
this topic is Public Law 98-365, "Land Remote-
Sensing Commercialization Act of 1984," and
NSDD-42, "National Space Policy," from 1982.
DoD's only written position on this is a DUSD(P)
letter to NOAA commenting on their proposed
rules for implementing PL 98-365.
I have included some other information on
current activities, some discussion of possible
national security concerns, and some potential
pitfalls that might come your way during the
interview. Your staff expert on this issue is
,MGEN Jack Thomat, X72720, in DASD(I). He
provided most of the information here.
?
Jan HOdanyi sent me an audio tape of Mr.
Carter's interview with Mr. Sims, done on 2 June
1987. It might be good preparation, if you are
interested.
Je ey ?. S er, LtCol, USAF
Mi itary Assistant for Space
Policy Development
Declassified in Part - Sanitized Copy Approved for Release 2012/12/05: CIA-RDP89B01356R000300420004-7
Declassified in Part - Sanitized Copy Approved for Release 2012/12/05: CIA-RDP89B01356R000300420004-7
? V
Background Paper
for
MacNeil-Lehrer Interview on
"Use of Imaging Satellites by News Media (MEDIASAT)"
INTERVIEW SPECIFICS
ASD(C31) to do interview (tentatively 1630, June 5, 1987)
with Mr. Hodding Carter for MacNeil-Lehrer Newshour.
They want DOD/Administration spokesman to discuss DoD
concerns over possible security problems when media uses
remote sensing satellites (i.e., SPOT).
What is potential for abuse when media uses remote
sensing satellite information?
Are there legitimate national security concerns?
If so, what are they?
Examples?
OUTLINE
Paper is structured as follows:
I. Current Policy Framework
O General Observations.
o -Public Law
o Presidential Directives/Policies
o- Department of Defense Directives/Policies
Current Activities/Ongoing Actions
o NOAA Licensing Rule Development
III. National Security Concerns/Issues
o Specific Interview Questions (as above)
IV. Cautions/Potential Pitfalls
V. Classified Addendum
PREPARED BY: LtCol Shaver/X50210/4 Jun 87
Page 1
Declassified in Part - Sanitized Copy Approved for Release 2012/12/05: CIA-RDP89B01356R000300420004-7
Declassified in Part - Sanitized Copy Approved for Release 2012/12/05: CIA-RDP89B01356R000300420004-7
I. CURRENT POLICY FRAMEWORK
o General Observations
Current policy framework appears limited in scope.
Public law (PL 98-365, "Land Remote Sensing
Commercialization Act of 1984") really only aimed at
getting U.S.G. out of funding LANDSAT system;
recognized potential national security implications,
but.did not really anticipate MEDIASAT type
developments (i.e., use of satellite remote-sensing
for collection of "intelligence-like" information
for rapid dissemination to the public through the
media).
Presidential policy (NSDD-42, "National Space
Policy") establishes goal of expanding private-
sector involvement in space and space-related
activities, and requires U.S.G. to provide climate
conducive to this expanded private-sector
involvement, with due regard for national security;
not very clear on how resolution is achieved when
commercial interests, first amendment rights and
national security interests collide.
DoD Space Policy, February 4, 1987, concentrates on
military space program policies, but recognizes as a
contributory goal the need for a strong technology
base and a healthy space industry; policy requires
DoD to cooperate with civil and commercial sectors
for mutual benefit.
Only official DoD written poiition specific to issue
of land remote sensing is DUSD(P) letter of January
22, 1987, to ,NOAA commenting on NOAA's proposed
rules for licensing private remote sensing space
systems; rules have not been finalized, so we do not
know if contents of this letter have been accepted
by NOAA (i.e., do not know if this position will
become U.S.G. policy).
Current policy framework (PL 98-365, NSDD-42) does not
appear to have kept pace with new issues in satellite
remote sensing; policy apparently did not anticipate:
Speed of technology developments related to civil/
commercial remote sensing systems and capabilities;
Extent of growth of commercial medip interest in
exploiting capabilities of such systems;
Page 2
Declassified in Part - Sanitized Copy Approved for Release 2012/12/05: CIA-RDP89B01356R000300420004-7
Declassified in Part - Sanitized Copy Approved for Release 2012/12/05: CIA-RDP89B01356R000300420004-7
I. CURRENT POLICY FRAMEWORK (Continued)
Significant growth of foreign remote sensing
satellite capabilities beyond the reach of potential
U.S. regulatory constraints
o Public Law
Public Law 98-365, "Land Remote-Sensing
Commercialization Act of 1984", July 17, 1984 (Tab A)
Lawmakers recognized value of commercial remote
sensing capabilities, but also recognized existence
of impacts on national security and expressly
required protections for preservation of national
security.
"TITLE I-DECLARATION OF FINDINGS, PURPOSES AND
POLICIES
FINDINGS
Sec. 101. The Congress finds and declares that--...
(1) the continuous civilian collection and utilization of
land remote-sensing data from space are of major
benefit in managing the Earth's natural resources and
in planning and conducting many other activities of
economic importance;...
(4) land remote sensing by the Government or private
parties of the United States affects international
commitments and policies and national security
concerns of the United.States;...
(13) certain Government oversight must be maintained
to assure thatprivate sector activities are in the national
interest and that the international commitments and
FcTirgof the United States are honored;....
PURPOSES
Sec. 102. The purposes of this act are to--...
(2) maintain the United States worldwide leadership in
civil remote sensing, preserve its national security, and
fulfill its international obligations;....
Page 3
Declassified in Part - Sanitized Copy Approved for Release 2012/12/05: CIA-RDP89B01356R000300420004-7
1
Declassified in Part - Sanitized Copy Approved for Release 2012/12/05: CIA-RDP89B01356R000300420004-7
I. CURRENT POLICY FRAMEWORK (Continued)
POLICIES
Sec. 103....(c) It shall be the policy of the United States
both to commercialize those remote-sensing space
systems that properly lend themselves to private sector
operation and to avoid competition by the Government
with such commercial operations, while continuing to
preserve our national security, to honor our
international obligations, and to retain in the
Government those remote-sensing functions that are
essentially of a public service nature."
[Underlines added]
Law establishes Secretary of Commerce as manager of
commercialization program; gives Secretary licensing
authority for private remote-sensing space systems;
establishes conditions for operation of such
systems.
"TITLE IV-LICENSING OF PRIVATE REMOTE SENSING
SPACE SYSTEMS
GENERAL AUTHORITY
Sec. 401. (a)(1) In consultation with other appropriate
Federal agencies, the Secretary is ,authorized to license
private sector parties to operate private remote-sensing
space systems for such period as the Secretary may
specify and in accordance with the provisions of this
title.
CONDITIONS FOR OPERATION
Sec. 402. (a) No person who is subject to the
jurisdiction or control of the United States may, directly
or through any subsidiary or affiliate, operate any
private remote-sensing space system without license
pursuant to section 401.
(b) Any license issued pursuant to this title shall
specify, at a minimum, that the licensee shall comply
with all of the requirements of this Act and shall--
(1) operate the system in such manner as to preserve
and promote the national security of the United States
and to observe and implement the international
obligations of the United States in accordance with
section 607;...." ,t
[Underlines added]
Page 4
Declassified in Part - Sanitized Copy Approved for Release 2012/12/05: CIA-RDP89B01356R000300420004-7
Declassified in Part - Sanitized Copy Approved for Release 2012/12/05: CIA-RDP89B01356R000300420004-7
(ISCOM)
ATTACHMENT -- ---
SENIOR INTERAGENCY GROUP (INTELLIGENCE)
INTERAGENCY GROUP/COUNTERMEASURES (POLICY)
WASHINGTON. D.C. 20505
9 November 1987
ANNUAL REPORT
OF THE
INFORMATION SECURITY COMMITTEE (ISCOM)
SECTION I
A. This section of the annual report,of the ISCOM is based on
the ISCOM charter, minutes, and special reports of the ISCOM.
1. The ISCOM charter was approved Ly the chairman of the
Interagency Group/Countermeasures (Policy) (IG/CM(P)) on_2 Decem-
ber 1986. The charter piovides an authoritative basis for the
ISCOM, and sets forth its mission, functions, responsibilities,
composition and organization.
2. In its first year of operation, the ISCOM met four times;
the meeting dates were 21 August 1986, 13 November 1986, 3 Feb-
ruary 1987, and 22 July 1987. (The next meeting is set for 18
November 1987.)
3. Some of the activities of the first year were devoted to
establishing a charter document that would be acceptable to the
many diverse interests represented by ISCOM departments and
agencies, namely:
Department of Defense
Department of Army
Department of Navy
Department of Air Force
Defense Intelligence Agency
National Security Agency
Federal Bureau of Investigation
Department of State
National Security Council Staff
Central Intelligence Agency
Department of Justice
Department of Commerce
Department of Energy
Department of Treasury
Information Security Oversight Office
Intelligence Community Staff
However, most of the ISCOM's first-year effort was devoted to the
task of determining the disposition of the many significant recom-
mendations contained in the so-called IG/CM(P) "collated list of
action items" dated 24 October 1986. Of the 95 action items, the
Declassified in Part - Sanitized Copy Approved for Release 2012/12/05: CIA-RDP89B01356R000300420004-7
Declassified in Part - Sanitized Copy Approved for Release 2012/12/05: CIA-RDP89B01356R000300420004-7
ISCOM initially was assigned 38 for actio. In the process of
disposing of most of those, the ISCOM made contributions to the
solution of other recommendations, including input to the Person-
nel Security Committee for the recommendations on government-wide
training objectives, use of the polygraph for counterintelligence
purposes within the Department of Defense, and reimbursement to
the government for personnel security investigations based on
false information. The ISCOM reported its progress on the col-
lated list of action items on 30 March 1987, 7 April 1987, and
9 October 1987; only a few of the action items remain to be
addressed.
SECTION II
B. This section of the annual report pertain g to the ISCOM'
projected activities for its second year of operation.
1. The ISCOM's course for its second year of operations has
been set to some extent 'by past events. It is clear that the
following will have to be addressed:
a. Dispositon of the remaining action items from the
collated listing cited above. (Included are the recommendations
to ensure that plans are developed to maintain the security
awareness of the public at large and the possible significance of
foreign contacts, and closing out action on other recommendations
such as welcoming the opportunity for joint discussions between
Congress and the Executive Branch to examine various approaches
to legislation regarding unauthorized disclosure of classified
information.)
b. Address the many information security questions con-
cerning the STU-III that is about to be placed in wide-spread
use. (It is likely that this will become a tasking derived from
the "1987 National Assessment of the Hostile Intelligence Threat
and U.S. Countermeasures.")
c. Ways and means to stimulate and provide better clas-
sification management. (The initial decision to classify infor-
mation drives all other classified information security counter-
measure programs.)
d. support and guide implementation of the 13 initia-
tives of the Information Security Oversight Office. (Approval of
these by the President is anticipated soon.)
2. The ISCOM can and should play a larger role as a forum
where department and agency representatives can exchange views,
problems, and solutions that impact both interagency and internal
settings. The cumulative expertise represented in the ISCOM is
enormous and this national resource should be used to the fullest
extent, and in harmony with, the Information Security Oversight
2
Declassified in Part - Sanitized Copy Approved for Release 2012/12/05: CIA-RDP89B01356R000300420004-7
Declassified in Part - Sanitized Copy Approved for Release 2012/12/05: CIA-RDP89B01356R000300420004-7
Office. The ISCOM should be more active in its second year. It
is anticipated that the ISCOM will meet six times, at least, and
may form working subcommittees to address particular matters such
as the STU-III.
3
Declassified in Part - Sanitized Copy Approved for Release 2012/12/05: CIA-RDP89B01356R000300420004-7
Declassified in Part - Sanitized Copy Approved for Release 2012/12/05: CIA-RDP89B01356R000300420004-7
?
ATTACHMENT
SENIOR INTERAGENCY GROUP (INTELLIGENCE)
INTERAGENCY GROUP/COUNTERMEASURES (POLICY)
WASHINGTON, D.C. 20505
Physical Security Committee Report
November 10, 1987
MEMORANDUM FOR: Chairman,
Interagency Group/Countermeasures (Policy)
VIA: Director,
Community Counterintelligence and Security
Countermeasures Staff/IC Staff
FROM:
Chairman,
Physical Security Committee
SUBJECT: Status of the Physical Security Committee
Efforts
The attached synopsizes the current status of this
Committee's activities in regard to the initiatives raised by
the President's and SSCI reports on counterintelligence and
security countermeasures. A summary of our other efforts and
planned action is also discussed.
Attachment:
As stated.
Regraded Unclassified when
Separated from the
Classified Attachment
Doc. 43 Brandt
SECRET/NOFORN
DECL:OADR
25X1
Declassified in Part - Sanitized Copy Approved for Release 2012/12/05: CIA-RDP89B01356R000300420004-7
1
Declassified in Part - Sanitized Copy Approved for Release 2012/12/05: CIA-RDP89B01356R000300420004-7
SECRET/NOFORN
November 10, 1987
Physical Security Committee Progress Report
1. Synopsis:
The Committee's Charter was approved by the sitting membership
at its third meeting, on May 22, 1987, and forwarded to the IG/CM
(P) for approval and dissemination. The Committee has held seven
meetings since its inception and has gathered consensus in
establishing direction and priorities. Currently we are actively
involved in the combination lock initiative, determining existing
centers of excellence, and reviewing the GSA Interagency Committee
on Security Equipment (IACSE) master plan. Action initiatives from
the President's Report may soon become an active issue for the
Committee to address because of the budget's impact on certain of
the recommendations. A summary of our progress in each of these
areas follows.
The President's and SSCI Reports:
Enclosure 1 is the most recent report of the Physical Security
Committee's efforts on implementation of the initiatives stemming
from the President's and the SSCI Reports. To summarize our efforts:
The SSCI recommended in item 103 of their report that
intelligence agencies be given the opportunity to
participate in the planning and oversight of new office
building construction efforts, the CIA should strive for
timely involvement in,this endeavor, and long-range
security plans for East Bloc missions should be
accelerated. CIA and other interested intelligence
agencies have personnel assigned to the Foreign Buildings
Office. These elements continue to participate in the
planning, design and construction phases of new building
work. The CIA has taken the lead role to ensure timely
participation and response by the intelligence community.
Current initiatives in this arena are focusing on the need
for the long-range plans of the intelligence community to
be vetted early by the Foreign Buildings Office.
The President's Report stressed the need for the community
to sustain Congressional funding of programs developed from
the Advisory Panel on Overseas Security (The Inman
Report). The current fiscal restraints required to meet
SECRET/NOFORN
DECL:OADR
Declassified in Part - Sanitized Copy Approved for Release 2012/12/05: CIA-RDP89B01356R000300420004-7
Declassified in Part - Sanitized Copy Approved for Release 2012/12/05: CIA-RDP89B01356R000300420004-7
SECRET/NOFORN
-2-
reduced funding level projections will impact continuance
of security enhancement work in the physical security
area. Without an increased Base in FY 1989, the Department
of State will only be able to sustain a base program and
maintain security postures at a portion of the missions
overseas requiring service and support. No new
enhancements will be fundable. We will fall short by
roughly 60 posts from meeting the Secretary of State's goal
of a standard level of security for all our Missions,
world-wide.
This matter will be raised at the next Physical Security
Committee meeting to determine what support may be
solicited from others who have involvement in the foreign
arena and would stand to benefit from maintaining the
enhancement program to completion.
The most recent action by the Congress to use Diplomatic
Security Capital Funding for temporary off-setting of
reduced S&E funding levels may impact compliance with the
SSCI Report item 1020, implementation of the Inman Panel
recommendations for relocation of our most vulnerable
overseas facilities. The Panel's original listing has
already been payed back for budget as well, as real estate
reasons. We can not predict the impact of further
reductions until the Congress produces an FY 1988
appropriation. At that time the Department of State will
reopen and review the list.
3. Combination Lock Initiative:
Development of new specifications and test criteria for dial
combination locks is underway. GSA has received an adequate level
of commitment to funding from other agencies to fund the NCEL lock
program. The Committee will request quarterly status from NCEL on
this project.
The Department of State, working with the CIA, has initiated a
contract with Sargent & Greenleaf (S&G) Locks Company to produce a
modified S&G 8500 series combination lock unit that will address the
vulnerability to technically assisted manipulation. S&G is
evaluating several different approaches and will be reporting their
findings shortly.
SECRET/NOFORN
DECL:OADR
Declassified in Part - Sanitized Copy Approved for Release 2012/12/05: CIA-RDP89B01356R000300420004-7
Declassified in Part - Sanitized Copy Approved for Release 2012/12/05: CIA-RDP89B01356R000300420004-7
SECRET/NOFORN
-3-
The Lock Initiative Subcommittee of this Committee is
responsible for the lock initiatives effort. Their next agenda will
involve determining the need for criteria and standards and
certification of a testing facility, commercial or government, and
the process for support, qualification and certification of
commercial vendor security equipment.
4. The Master Plan:
A representative of GSA briefed this Committee in September on
that agency's efforts to develop and implement a Master Plan to
standardize security equipment terminology, and testing and
certification standards and processes in meeting the common needs of
the Government. To this end, the GSA formed the Interagency
Advisory Committee on Security Equipment (IACSE). The IACSE
prepared a Master Program Plan of 13 taskings and contracted for
support of the effort to Dynatrend, Inc. Enclosure 2 is a
background and status report on the IACSE.
According to the GSA brief to this Committee:
The Master Program Plan was projected as a $3.4 million
three-year effort but only partially funded for start-up.
Full funding was never budgeted by GSA.
The Contractor had completed some of the taskings and
reported their findings to IACSE.
GSA would maintain its responsibility for specification and
standards but did not have the expertise required to manage
such a technically specific program. GSA would have to
remain dependent on user agencies to fund and drive such
efforts.
The Physical Security Committee is currently reviewing the
IACSE initiated Master Program Plan to determine the need and
feasibility of continuing the Plan. The general consensus of this
Committee is to continue the Master Plan. In the next meeting we
will be determining the taskings and priorities, and the contract
support required to continue the plan or portions of the plan
considered applicable to the Committee's Charter.
Doc. 44 Brandt
SECRET/NOFORN
DECL:OADR
Declassified in Part - Sanitized Copy Approved for Release 2012/12/05: CIA-RDP89B01356R000300420004-7