Page 56 - NAVAL SCIENCE 3 TEXTBOOK
P. 56
NAVAL OPERATIO NS AN D SU PPORT FU NCTIO NS 61
Forces Courier Service or from special registered publications Another serious case that surfaced in 1994 was that of a for-
vaults. At regular intervals, each of these publications must be mer CIA employee Aldrich Ames and his wife, who were charged
accounted for by the command's registered publications custodian, in that year with obtaining more than $2.5 million from the Soviet
and a report made to higher headquarters. Matter that usually falls and later the Russian governments for espionage activities they
into this category includes code and cipher books, communica- carried out for over nine years. Among other things, they passed
tions books, tactical publications, and intelligence manuals. to the Soviets the identities of hundreds of U.S. agents in Soviet-
Each ship, large aircraft, and naval facility has an emergency controlled countries, some of who were without doubt killed as a
destruction bill for classified materials in the event of inlminent cap- result during these years.
ture by an enemy. Aboard ship, if there is no time for burning or All of these individuals were convicted of security violations
shredding them, documents may be placed in weighted bags with and are presently serving lengthy sentences in federal prisons.
holes and dropped into deep water. Coding devices and other clas- Why would any loyal American, let alone lmiformed naval per-
sified equipment may be smashed and parts scattered in deep water, sonnel, engage in activities so harmful to our country? The answers
or melted by chemical bombs that are ignited by electric batteries. are many, but in the final analysis, they break down into the same
kinds of human flaws that have plagued humanity since tlle begin-
ning of time: lust for power and sex, greed for money and other
Security Clearance material benefits, and the inability to witllstand blackmail or other
Before anyone is allowed to receive, see, or use classified informa- kinds of personal threats. Since these human frailties will always
tion, he or she must have a security clearance. This is a document be with us, it follows that every Navy person should be continually
indicating that the person's background has been properly investi- aware of the damage that a security breach can do to our Navy and
gated by the government and stating for which classification level our nation, and take all precautions possible to safeguard any clas-
the person is cleared. sified material or knowledge tllat may be entrusted to him or her.
Persons who have authorized access to classified information Should any Navy person be contacted for potential espionage
must be of unquestionable loyalty, integrity, trustworthiness, and purposes, or should they wish to report any possible espionage
character. They must have personal conduct and associations that activities or incidents, there is a toll-free phone number that they
will cast no doubt upon their ability to safeguard classified infor- can call anytime to report such suspicions.
mation. The handling of classified material is a matter requir-
ing the utmost trust and confidence, for the welfare of the whole
nation could be at stake.
STUDY GUIDE QUESTIONS
The existence, nature, content, or whereabouts of classified
matter must not be divulged to anyone other than those who are
1. What is the definition of military and political intelligence?
authorized to use it in their official duties. No person is entitled
2. What is the difference between information and intelligence?
access to classified matter solely because of his or her rank, office,
position, or because he or she has a certificate of clearance. The 3. What are the five steps in the intelligence process?
latter only establishes eligibility for access. To whom information 4. What kind of intelligence is naval intelligence prinlarily
can be disclosed is determined not only by the classification of the interested in collecting?
material and the security clearance of the person, but also, above 5. A. What is air intelligence?
all, by whether the person has a need to know the information to
B. How is it gathered?
do a job.
6. What is the U.S. intelligence community?
7. What is the CIA?
Consequences of Security Breaches
8. What new department was created in 2002 to coordinate
There have been several highly publicized incidents of serious secu- national strategy against domestic terrorism?
rity breaches (losses of classified materials or information) in the 9. What is the mission of the Defense Intelligence Agency?
Navy and other government agencies over tlle years. One of the worst
10. What is the mission of U.S. naval and military attaches?
of these involved tlle compromise of secret ballistic missile subma-
11. What is the organization responsible for carrying out the
rine communications systems and other highly classified technology
intelligence mission of the Navy?
by a ring of individuals led by a Navy warrant officer named John
Walker during the 1970s and early 1980s. It was widely concluded 12. If persons in a diplomatic status are caught violating tlleir
trust, what is likely to happen?
that much of the Soviet Navy's rapid advancements in submarine
quiehless technology in the 1980s could be directly related to the 13. What is the loss of classified material or information called?
disclosures of Walker and the other members of his group.

