TERMS OF REFERENCE, NSSD 2-82 COUNTERMEASURES ORGANIZATIONAL STUDY
Document Type:
Collection:
Document Number (FOIA) /ESDN (CREST):
CIA-RDP87B01034R000300060003-7
Release Decision:
RIPPUB
Original Classification:
K
Document Page Count:
10
Document Creation Date:
December 22, 2016
Document Release Date:
March 13, 2009
Sequence Number:
3
Case Number:
Publication Date:
January 19, 1983
Content Type:
MEMO
File:
Attachment | Size |
---|---|
![]() | 457.78 KB |
Body:
Approved For Release 2009/03/13 :CIA-RDP87B01034R000300060003-7
Office of Security
fv~
t~ ~tti~ ~~
Approved For Release 2009/03/13 :CIA-RDP87B01034R000300060003-7
Approved For Release 2009/03/13 :CIA-RDP87B01034R000300060003-7
ROUTING AND RECORD SHEET
SUBJECT: (Optional)
Terms of Reference, NSSD-2/82 Countermeasure Organizational
Study
_
FROM: ~ Z ~4
/
EXTENSION
NO.
Group
Policy and Plans
DATE
TO: (Officer designation, room number, ord
ildin
)
b
DATE
OFFICER'S
COMMENTS (Number each comment to show from whom
g
u
INITIALS
fo whom. Draw a line across column after each comment.)
RECEIVED
FORWARDED
1.
C/Policy Branch/PPG
~/
a~
~
The Director of Security asked
t TOR
b
f S
i
l
.
jec
s o
u
ys
for an ana
s
AC/PPG
~~
~
It was necessary to consult
NSSD-2/82 and the "Capabilities
ence
lli
I
t
il
H
h
g
n
e
e
ost
e
Against t
3
Threat - 1983-1988" paper, both
DD/PF~M
,~3; 83
~
TS documents . They are not
ti
id
ng
crea
attached - to avo
4'
~/~
another TS paper -and are
DD/Security
~~`~
~`~ .~ ~~~~
3
-
available in PPG if needed.
s.
Note 18 January deadline for
D/Security
`17?oe
~
designation of a principal
representative.
a
has expressed a
desire to un ertake this assign-
~
ment and I so r
8.
9.
~'
t o.
~n ~ , lY>n)
11.
~^
12.
13.
14.
15.
FORM ~~ O USE PREVIOUS
I-79 EDITIONS
Approved For Release 2009/03/13 :CIA-RDP87B01034R000300060003-7
Approved For Release 2009/03/1(3 : CIA-RDP87B01034R000300060003-7
~~~ 1~
MEMORANDUM FOR: Director of Security
FROM:
SUBJECT:
REFERENCE:
Po icy and Plans Group
Terms of Reference, NSSD 2-82
Countermeasures Organizational Study
IG/CM I~~lemorandum of 11 January 83, same subj
1. The study is related to NSSD 2 tasking which called for
assessment of_ the organizational and managerial framework to
determine "the most effective application of budgetary and
personnel resources" to combating/negating "espionage and other
threats and activities by foreign intelligence services against
the United States." The entire NSSD ?_ exercise was directed
toward a perception that determined and extensive activities on
the part of hostile services, combined with an eroded U. S. capa-
bility to counter these activities, presented an "increasingly
significant" threat to the national security.
?. The preface to "Capabilities .Against the Hostile
Intellience Threat, 1983 - 1988," reflects agreement (with the
NSC) that the above-mentioned tasking, along with related con-
sideration concerning a possible central, all-source database and
analysis capability, be deferred for study at a later date. The
cited publication noted that these separable subjects would be
afforded a good basis for later review through its (the publica-
tions's) findings. Reference does not specify that a central,
all-source database will be studied; however, the concept is
included in the overall NSSD 2 approach to an organizational
study.
3. The study will he submitted to the SIG-I and forwarded
to the President through the NSC. It is most unlikely that any
organizational change in the NSC will be addressed and a poor
bet that the SIG-I will be studied in terms of disestablishment
or major organizational/functional change. The structure of the
IG/CM and IG/CI probably will be reviewed with a view to
responsibilities, membership, subcommittees and input to a
discrete budget exercise dedicated to resources needed for
classical .counterintelligence and protective security.
ALL PORTIONS OF THIS DOCUMENT
ARE CLASSIFIED SECRET
Approved For Release 2009/03/13: CIA-RDP87B01034R000300060003-7
Approved For Release 2009/03/13: CIA-RDP87B01034R000300060003-7
JtLKt ~
4. The thrust of the study expressed in reference involves
"fine tuning" (of) existing countermeasures structures and
relationships." The attached "Outline for National Security
Study Directive 2/82 Study" illustrates shared responsibility
of agencies and, in some instances, specifies the CIA directorate
concerned. The outline indicates that the study will feature
comprehensive analysis of the internal organizational structure
and responsibilities of the separate agencies and a compilation
of the overall capability of the major topics mentioned in
Section V of the TOR. The study director. can establish working
groups composed of knowledgeable specialists in each category of
paragraphs B, C and D of Section V. The individual you will
appoint as the principal representative/focal point will not
necessarily participate in the selection of working groups
rTiernbers but should be prepared to do so. This will involve
complete familiarity with the organizational makeup of the
Agency and of key personnel qualified to represent the various
disciplines.
5. It is suggested that the "principal representative/focal
point" be selected from the senior managers of the Office and,
for representational purposes, at as a high a level as possible.
He should be well-grounded in PTAS functions and conversant with
personnel security. Also, the appointee should have that knowl-
edge of .Agency operations anc] activities to which the senior
Office managers are privy.
Approved For Release 2009/03/13: CIA-RDP87B01034R000300060003-7
Approved For Release 2009/03/13: CIA-RDP87B01034R000300060003-7
27 April 1982
Chief, Office of Security, Policy & Plans, P&M
SUBJECT: National Security Study Di_r_ective 2/82
1. Attached for your information are an "Outline for
National Security Study Directive 2/82 Study" and "Definitions
for Terms of Reference and Qutline for NSSD 2/82 Study".
2. Additional information on ^ISSD 2/82 will be forwarded
to you in th An questions re ardin the Study may
Attachments:
As Stated
p Fig.::'"';
Approved For Release 2009/03/13: CIA-RDP87B01034R000300060003-7 --~-
Approved For Release 2009/03/13 :CIA-RDP87B01034R000300060003-7
Next 1 Page(s) In Document Denied
Q
Approved For Release 2009/03/13 :CIA-RDP87B01034R000300060003-7
Approved For Release 2009/03/13: CIA-RDP87B01034R000300060003-7
Attachment A
DEFIfJITIOtiS FOR 7ERt?1S OF REFEREfdCE AfdD
OUTLIfJE FOP, fVSSD 2/82 STUDY
Threat or Intelligence Threat: The combination of capability and intent
on the part of a foreign country to engage in an intelligence activity inimical
to the United States. ~ .
Multidisciplinar Threat: The aggregate, irrespective of collection .
method or technique, of all the intelligence threats posed by a given country
or country group.
Vulnerability: The potential for. information to be acquired through
intelligence activity. Vulnerability is independent of the threat, i.e., a
vulnerability may exist even though no capability or intent exists to exploit
it.
Security: Establishment and maintenance of protective measures Vrhich are
intended to ensure a state of inviolability from hostile acts or influences_
Security requirements typical]y establish a required level of protection based
on vulnerability rather-than threat.
Communications Security: The application of security to deny un-
authorized persons information which might be derived from telecommunica-
tions or to ensure the authenticity of telecommunications.
Personnel Security: The application of security to assure that
persons granted access' to information are loyal and trusttirorthy.
~sical Security: The use of guards, barriers, containers, alarms
and other physical means to protect material, facilities or documents from
damage, theft or unauthorized access.
Document Security: The protection of documents through the use of
classification designators and their associated access controls.
Computer Securit,Zr (.also Automatic Data Processing Security); The
protection of computers and data processing equipment and the in~orm~tion
they contain through a combination of physical, personnel and co~~,runica-
tior~s security, as well as hardware, software and management controls.
Operations Security: The protection of an operation, project or program
from hostile intelligence activities. Operations security establishes pro-
tective requirements based upon a comparison of vulnerabilities and the multi-
disciplinary threat. Operations security differs from other security programs
in that it focuses on the threat.
Approved For Release 2009/03/13: CIA-RDP87B01034R000300060003-7
Approved For Release 2009/03/13 :CIA-RDP87B01034R000300060003-7
Counterintelli eg nce: "--:information gathered and activities conducted to
protect against espionage,.other intelligence activities, sabotage or assas-
sinations conducted for or on behalf of foreign po~?rers, organizations or persons,
or international terrorist activities, but not including personnel, physical,
document or communications security programs." (E.O. 12333) Counterintelli-
gence differs from. security in that it is normally directed against a specific
known or postulated threat.
,_
Intelligence Countermeasures: The aggregate of all measures taken to
provide protection from the intelligence activities, irrespective of method or~
technique, of foreign countries. Intelligence countermeasures include counter-
intelligence, operations security, and security. (Also called multidisciplinary
counterintelligence). ..~
_Active t~{ea.sures: A Soviet term for activities beyond traditional diplomacy
which are used to achieve Soviet foreign policy objectives. Active measures -
are most frequently carried out by the intelligence services and are intended
to influence the policies of foreign governments, disrupt relations between
other nations, undermine confidence in foreign leaders and institutions or
discredit opponents. ?
Approved For Release 2009/03/13: CIA-RDP87B01034R000300060003-7
SECRET
Interagency Group/Countermeasures
Washington, D.C. 20505
MEMORANDUM FOR: Members and Invitees
Interagency Group/Countermeasures
FROM: General Richard G. Stilwell, USA (Ret.)
Chairman
SUBJECT: Terms of Reference, NSSD-2/82 Countermeasure
Organizational Study
1. The OCI, in his capacity as Chairman, NSC/SIG-I, has directed me to
conduct a study of the organizational and structural impediments to achieving
required capabilities for? detecting, analyzing and countering the non-HUMINT
foreign intelligence threat to the United States. This study is to be
submitted to the SIG-I which, after appropriate consideration, will forward it
to the NSC and the President.
?_. I have named) of the Intelligence Community Staff's
Community Counterintelligence Staff as Study Director, to be assisted by
representatives to be designated by recipient addressees. It is expected that
agency representatives will vary depending on the particular study topic being
addressed, but each agency should initially identify a principal
representative/focal point by 18 January 1983.
3. Draft terms of reference and study outline are attached. Your
representatives should be prepared to discuss these at an initial.meetina of
the overall Study Group which will be scheduled later in January 1983.
i a , . i we 1
Attachment:
a/s
Approved For Release 2009/03/13: CIA-RDP87B01034R000300060003-7
Approved For Release 2009/03/13 :CIA-RDP87B01034R000300060003-7
Next 7 Page(s) In Document Denied
Q
Approved For Release 2009/03/13 :CIA-RDP87B01034R000300060003-7