Page 56 - NAVAL SCIENCE 3 TEXTBOOK
P. 56

NAVAL  OPERATIO NS  AN D SU PPORT  FU NCTIO NS   61

        Forces  Courier  Service  or  from  special  registered  publications   Another serious case that surfaced in  1994 was  that of a for-
        vaults. At  regular  intervals,  each  of these  publications  must be   mer CIA employee Aldrich Ames and his wife, who were charged
        accounted for by the command's registered publications custodian,   in that year with obtaining more than $2.5 million from the Soviet
        and a report made to higher headquarters. Matter that usually falls   and  later  the  Russian  governments  for  espionage  activities  they
        into  this  category includes code and  cipher books,  communica-  carried out for  over  nine years. Among other things,  they passed
        tions books, tactical publications, and intelligence manuals.   to  the Soviets the identities of hundreds of U.S.  agents  in  Soviet-
           Each  ship,  large  aircraft,  and  naval  facility  has  an  emergency   controlled countries, some of who were without doubt killed as a
        destruction bill for classified materials in the event of inlminent cap-  result during these years.
        ture by an enemy. Aboard ship, if there is  no time for burning or   All  of these  individuals were convicted  of security violations
        shredding them, documents may be placed in  weighted bags with   and are presently serving lengthy sentences in federal prisons.
        holes and dropped into deep water. Coding devices and other clas-  Why would any loyal American, let alone lmiformed naval per-
        sified equipment may be smashed and parts scattered in deep water,   sonnel, engage in activities so harmful to our country? The answers
        or melted by chemical bombs that are ignited by electric batteries.   are many, but in the final  analysis, they break down into the same
                                                               kinds of human flaws that have plagued humanity since tlle begin-
                                                               ning of time:  lust for power and sex, greed  for  money and other
        Security Clearance                                     material benefits, and the inability to witllstand blackmail or other
        Before anyone is allowed to receive, see, or use classified informa-  kinds of personal threats. Since  these  human  frailties  will  always
        tion, he or she must have a security clearance. This is a document   be with us, it follows that every Navy person should be continually
        indicating that the person's background has been properly investi-  aware of the damage that a security breach can do to our Navy and
        gated by the government and stating for which classification level   our nation, and take all precautions possible to safeguard any clas-
        the person is cleared.                                 sified material or knowledge tllat may be entrusted to him or her.
           Persons who have authorized access  to classified information   Should any Navy person be contacted for potential espionage
        must be of unquestionable loyalty,  integrity, trustworthiness, and   purposes,  or should  they  wish  to  report  any  possible  espionage
        character. They must have personal conduct and associations that   activities or incidents, there is a toll-free phone number that they
        will  cast no doubt upon their ability to safeguard classified infor-  can call anytime to report such suspicions.
        mation.  The  handling  of classified  material  is  a  matter  requir-
        ing the utmost trust and confidence, for  the welfare of the whole
        nation could be at stake.
                                                               STUDY  GUIDE QUESTIONS
           The  existence,  nature,  content,  or  whereabouts  of classified
        matter must not be divulged to anyone other than those who are
                                                               1.  What is the definition of military and political intelligence?
        authorized  to  use  it in  their official  duties.  No  person  is  entitled
                                                               2.  What is the difference between information and intelligence?
        access to classified matter solely because of his or her rank, office,
        position, or because he  or she  has a certificate of clearance. The   3.  What are the five steps in the intelligence process?
        latter only establishes eligibility for  access. To  whom information   4.  What kind of intelligence is naval intelligence prinlarily
        can be disclosed is determined not only by the classification of the   interested in collecting?
        material and the security clearance of the person, but also, above   5.  A. What is air intelligence?
        all, by whether the person has a need to  know the information to
                                                                  B.  How is it gathered?
        do a job.
                                                               6.  What is the U.S. intelligence community?
                                                               7.  What is the CIA?
        Consequences of Security Breaches
                                                               8.  What new department was created in 2002 to coordinate
        There have been several highly publicized incidents of serious secu-  national strategy against domestic terrorism?
        rity  breaches  (losses  of classified  materials  or information)  in  the   9.  What is the mission of the Defense Intelligence Agency?
        Navy and other government agencies over tlle years. One of the worst
                                                               10.  What is the mission of U.S.  naval and military attaches?
        of these involved tlle compromise of secret ballistic missile subma-
                                                               11.  What is the organization responsible for carrying out the
        rine communications systems and other highly classified technology
                                                                  intelligence mission of the Navy?
        by a ring of individuals led by a Navy warrant officer named John
        Walker during the 1970s and early 1980s. It was widely concluded   12.  If persons in a diplomatic status are caught violating tlleir
                                                                  trust, what is likely to happen?
        that much of the Soviet Navy's  rapid  advancements in submarine
        quiehless  technology in  the  1980s  could  be  directly related  to  the   13. What is the loss of classified material or information called?
        disclosures of Walker and the other members of his group.
   51   52   53   54   55   56   57   58   59   60   61