Intelligence Components Activities

Intelligence Components Activities in the United States

See more about Intelligence Components here.

Excerpted from: Department of Defense, DoD 5240.1-R, Procedures Governing the Activities of DoD Intelligence Components that Affect United States Persons, December 1982:

D. ELECTRONIC SURVEILLANCE IN EMERGENCY SITUATIONS

Notwithstanding section C. , above, a DoD intelligence component may conduct surveillance directed at a United States person who is outside the United States in emergency situations under the following limitations:

1. Officials designated in section E., below, may authorize electronic surveillance directed at a United States person outside the United States in emergency situations, when securing the prior approval of the Attorney General is not practical because:

a. The time required would cause failure or delay in obtaining significant foreign intelligence or counterintelligence and such failure or delay would result in substantial harm to the national security;
b. A person’s life or physical safety is reasonably believed to be in immediate danger; or

c. The physical security of a defense installation or government property is reasonably believed to be in immediate danger.

2. Except for actions taken under paragraph D.1.b., above, any official authorizing such emergency surveillance shall find that one of the criteria contained in paragraph C.2.a., above, is met. Such officials shall notify the DoD General Counsel promptly of any such surveillance, the reason for authorizing such surveillance on an emergency basis, and the expected results.

3. The Attorney General shall be notified by the General Counsel, DoD, as soon as possible of the surveillance, the circumstances surrounding its authorization, and the results thereof, and such other information as may be required to authorize continuation of such surveillance.

4. Electronic surveillance authorized pursuant to this section may not continue longer than the time required for a decision by the Attorney General and in no event longer than 72 hours.

E. OFFICIALS AUTHORIZED TO REQUEST AND APPROVE ELECTRONIC SURVEILLANCE OUTSIDE THE UNITED STATES

1. The following officials may request approval of electronic surveillance outside the United States under section C., above, and approve emergency surveillance under section D., above:

a. The Secretary and Deputy Secretary of Defense.
b. The Secretaries and Under Secretaries of the Military Departments.

c. The Director and Deputy Director of the National Security Agency/Chief, Central Security Service.

2. Authorization for emergency electronic surveillance under section D. may also be granted by:

a. Any general or flag officer at the overseas location in question, having responsibility for either the subject of the surveillance, or responsibility for the protection of the persons, installations, or property that is endangered; or
b. The Deputy Director for Operations, National Security Agency.

PART 3: SIGNALS INTELLIGENCE ACTIVITIES

A. APPLICABILITY AND SCOPE

1. This procedure governs the conduct by the United States Signals Intelligence System of signals intelligence activities that involve the collection, retention, and dissemination of foreign communications and military tactical communications. Such activities may incidentally involve the collection of information concerning United States persons without their consent, or may involve communications originated or intended for receipt in the United States, without the consent of a party thereto.

2. This part of Procedure 5 shall be supplemented by a classified Annex promulgated by the Director, National Security Agency/Chief, Central Security Service, which shall also be approved by the Attorney General. That regulation shall provide that signals intelligence activities which constitute electronic surveillance, as defined in Parts 1 and 2 of this procedure, will be authorized in accordance with those parts. Any information collected incidentally about United States persons shall be subjected to minimization procedures approved by the Attorney General.

B. EXPLANATIONOF UNDEFINED TERMS

1. Communications concerning a United States person are those in which the United States person is identified in the communication. A United States person is identifi~d when the person’s name, unique title, address or other personal identifier is revealed in the communication in the context of activities conducted by that person or activities conducted by others and related to that person. A reference to a product by brand name or manufacturer’s name or the use of a name in a descriptive sense, as, for example, “Monroe Doctrine,” is not an identification of a United States person.

2. Interception means the acquisition by the United States Signals Intelligence system through electronic means of a nonpublic communication to which it is not an intended party, and the processing of the contents of that communication into an intelligible form but not including the display of signals on visual display devices intended to permit the examination of the technical characteristics of the signals without reference to the information content carried by the signals.

3. Military tactical communications means United States and allied military exercise communications within the United States and abroad necessary for the production of simulated foreign intelligence and counterintelligence or to permit an analysis of communications security.

4. United States person. For purposes of signals intelligence activities only, the following guidelines will apply in determining whether a person is a United States person:

a. A person known to be currently in the United States”will be treated as a United States person unless the nature of the person’s communications or other available information concerning the person gives rise to a reasonable belief that such person is not a United States citizen or permanent resident alien.
b. A person known to be currently outside the United States, or whose location is not known, will not be treated as a United States person unless the nature of the person’s communications or other available information concerning the person give rise to a reasonable belief that such person is a United States citizen or permanent resident alien.

c. A person known to be an alien admitted for permanent residence may be assumed to have lost status as a United States person if the person leaves the United States and it is known that the person is not in compliance with the administrative formalities provided by law that enable such persons to reenter the United States without regard to the provisions of law that would otherwise restrict an alien’s entry into the United States. The failure to follow the statutory procedures provides a reasonable basis to conclude that such alien has abandoned any intention of maintaining status as a permanent resident alien.

d. An unincorporated association whose headquarters are located outside the United States may be presumed not to be a United States person unless the collecting agency has information indicating that a substantial number of members are citizens of the United States or aliens lawfully admitted for permanent residence.

5. United States Signals Intelligence System means the unified organization for signals intelligence activities under the direction of the Director, National Security Agency/Chief, Central Security Service, comprised of the National Security Agency, the Central Security Service, the components of the military services authorized to conduct signals intelligence and such other entities (other than the Federal Bureau of Investigation) as are authorized by the National Security Council or the Secretary of Defense to conduct signals intelligence. FBI activities are governed by procedures promulgated by the Attorney General.

C. PROCEDURES

1. Foreign communications. The United States Signals Intelligence System may collect, process, retain, and disseminate foreign communications that are also communications of or concerning United States persons, but only in accordance with the classified annex to this procedure.

2. Military tactical communications. The United States Signals Intelligence System may collect, process, retain, and disseminate military tactical communications that are also communications of or concerning United States persons but only in accordance with the classified annex to this procedure.

a. Collection. Collection efforts will be conducted in the same manner as in the case of signals intelligence for foreign intelligence purposes and q ust be designed in such a reamer as to avoid to the extent feasible the intercept of communications not related to military exercises.
b. Retention and processing. Military tactical communications may be retained and processed without deletion of references to United States persons who are participants in, or are otherwise mentioned in exercise-related-communications, provided that the communications of United States persons not participating in the exercise that are inadvertently intercepted during the exercise shall be destroyed as soon as feasible.

c. Dissemination. Dissemination of military tactical communications and exercise reports or information files derived from such communications shall be limited to those authorities and persons participating in or conducting reviews and critiques of such exercise.

PART 4: TECHNICAL SURVEILLANCE COUNTERMEASURES

A. APPLICABILITY AND SCOPE

This part of Procedure 5 applies to the use of electronic equipment to determine the existence and capability of electronic surveillance equipment being used by persons not authorized to conduct electronic surveillance. It implements section 105(f)(2) of the Foreign Intelligence Surveillance Act (reference (b)).

B. EXPLANATION OF UNDEFINED TERMS

The term technical surveillance countermeasures refers to activities authorized pursuant to DoD Directive 5200.29 (reference (c)), and, as used in this procedure, refers to the use of electronic surveillance equipment, or electronic or mechanical devices, solely for determining the existence and capability of electronic surveillance equipment being used by persons not authorized to conduct electronic surveillance, or for determining the susceptibility of electronic equipment to unlawful electronic surveillance.

C. PROCEDURES

A DoD intelligence component may use technical surveillance countermeasures that involve the incidental acquisition of the nonpublic communications of United States persons without their consent, provided:

1. The use of such countermeasures has been authorized or consented to by the official in charge of the facility, organization, or installation where the countermeasures are to be undertaken;

2. The use of such countermeasures is limited in extent and duration to that necessary to determine the existence and capability of such equipment; and

3. Access to the content of communications acquired during the use of countermeasures is limited to persons involved directly in conducting such measures, and any content acquired is destroyed as soon as practical or upon completion of the particular use. However , if the content is acquired within the United States, only information which is necessary to protect against unauthorized electronic surveillance, or to enforce Chapter 119 of title 18, United States Code (reference (d)) and Section 605 of the Communication Act of 1934 (reference (e)), may be retained and disseminated only for these purposes. If acquired outside the United States, information which indicates a violation of federal law, including the Uniform Code of Military Justice (reference (f)), or a clear and imminent threat to life or property, may also be disseminated to appropriate law enforcement authorities. A record of the types of communications and information subject to acquisition by the illegal electronic surveillance equipment may be retained.

PART 5: DEVELOPING, TESTING, AND CALIBRATION OF ELECTRONIC EQUIPMENT

A. APPLICABILITY

This part of Procedure 5 applies to developing, testing, or calibrating electronic equipment that can intercept or process communications signals. It also includes research electronic communications as a signal source.

B. PROCEDURES

1. Signals authorized for use.

a. The following may be used without restriction:
(1) Laboratory-generated signals.
(2) Communications signals with the consent of the communicator.

(3) Communications in the commercial or public service broadcast bands.

(4) Communicationstransmitted between terminals located outside of the United States not used by any known United States person.

(5) Noncommunications signals (including telemetry, and radar).

b. Communications subject to lawful electronic surveillance under the provisions of Parts 1, 2, or 3 of this procedure may be used subject to the minimization procedures applicable to such surveillance.

c. Any of the following may be used subject to the restrictions of subsection B.2., below.

(1) Communications over official government communications circuits with consent from an appropriate official of the controlling agency.
(2) Communications in the citizens and amateur-radio bands.

d. Other signals may be used only when it is determined that it is not practical to use the signals described above and it is not reasonable to obtain the consent of persons incidentally subjected to the surveillance. The restrictions of subsection B.2., below, will apply in such cases. The Attorney General must approve use of signals pursuant to this subsection for the purpose of development, testing, or calibration when the period of use exceeds 90 days. When Attorney General approval is required, the DoD intelligence component shall submit a test proposal to the General Counsel, DoD, or the NSA General Counsel for transmission to the Attorney General for.approval. The test proposals shall state the requirement for a period beyond 90 days, the nature of the activity, the organization that will conduct the activity, and the proposed disposition of any signals or communications acquired during the activity.

2. Restrictions.

For signals described in paragraph B.1.c. and d., above, the following restrictions apply:

a. The surveillance shall be limited in scope and duration to that necessary for the purposes referred to in section A., above.
b. No particular United States person shall be targeted intentionally without consent.

c. The content of any communication shall:

(1) Be retained only when actually needed for the purposes referred to in section A. above,
(2) Be disseminated only to persons conducting the activity, and

(3) Be destroyed immediately upon completion of the activity.

d. The technical parameters of a communication (such as frequency, modulation, bearing, signal strength, and time of activity) may be retained and used for the purposes outlined in section A., above, or for collection avoidance purposes. Such parameters q ay be disseminated to other DoD intelligence components and other entities authorized to conduct electronic surveillance or related development, testing, and calibration of electronic equipment provided such dissemination and use are limited to the purposes outlined in section A. or collection avoidance purposes. No content of any communication may be retained or used other than as provided in paragraph B.2.c., above.

PART 6. TRAINING OF PERSONNEL IN THE OPERATION AND USE OF ELECTRONIC COMMUNICATIONS AND SURVEILLANCE EQUIPMENT

A. APPLICABILITY

This part of Procedure 5 applies to the training of personnel by DoD intelligence components in the operation and use of electronic communications and surveillance equipment. It does not apply to the interception of communications with the consent of one of the parties to the communication or to the training of intelligence personnel by nonintelligence components.

B. PROCEDURES

1. Training guidance. The training of personnel by DoD intelligence components in the operation and use of electronic communications and surveillance equipment shall include guidance concerning the requirements and restrictions of the Foreign Intelligence Surveillance Act of 1978 (reference (b)), and E.O. 12333 (reference (a)), with respect to the unauthorized acquisition and use of the content of communications of United States persons.

2. Training limitations

a. Except as permitted by paragraph B.2.b. and c., below, the use of electronic communications and surveillance equipment for training purposes is permitted, subject to the following limitations:
(1) To the maximum extent practical, use of such equipment for training purposes shall be directed against communications which are subject to lawful electronic surveillance for foreign intelligence and counterintelligence purposes under Parts 1, 2, and 3 of this procedure.
(2) The contents of private communications of nonconsenting United States persons may not be acquired aurally unless the person is an authorized target of electronic surveillance.

(3) The electronic surveillance will be limited in extent and duration to that necessary to train personnel in the use of the equipment.

b. Public broadcasts, distress signals, or official U.S. Government communications may be monitored, provided that when government agency communications are monitored, the consent of an appropriate official is obtained.

c. Minimal acquisition of information is permitted as required for calibration purposes.

3. Retention and dissemination. Information collected during training that involves communications described in subparagraph B.2.a. (1), above, shall be retained and disseminated in accordance with minimization procedures applicable to that electronic surveillance. Information collected during training that does not involve communications described in subparagraph B.2.a. (1), above, or that is acquired inadvertently, shall be destroyed as soon as practical or upon completion of the training and may not be disseminated for any purpose. This limitation daes not apply to distress signals.

PART 7: CONDUCT OF VULNERABILITY AND HEARABILITY SURVEYS

A. and B. APPLICABILITY AND SCOPE

This part of Procedure 5 applies to the conduct of vulnerability and hearability surveys by DoD intelligence components.

EXPLANATION OF UNDEFINED TERMS

1. The term vulnerability survey refers to the acquisition of radio frequency propagation and its subsequent analysis to determine empirically the vulnerability of the transmission media to irxterception by foreign intelligence services.

2. The term hearability survey refers to monitoring radio communications to determine whether a particular radio signal can be received at one or more locations and, if reception is possible, to determine the quality of reception over time.

C. PROCEDURES

1. Conduct of vulnerability surveys. Nonconsensual surveys may be conducted to determine the potential vulnerability to intelligence services of a foreign power of transmission facilities of communications common carriers, other private commercial entities, and entities of the federal government, subject of the following limitations:

a. No vulnerability survey may be conducted without the prior written approval of the Director, National Security Agency, or his designee.
b. No transmission may be acquired aurally.

c. No content of any transmission may be acquired by any means.

d. No transmissions may be recorded.

e. No report or log may identify any United States person or entity except to the extent of identifying transmission facilities that are vulnerable to surveillance by foreign powers. If the identities of the users of such facilities are not identical with the identities of the owners of the facilities, the identity of such users may be obtained but not from the content of the transmissions themselves, and may be included in such report or log. Reports may be disseminated. Logs q ay be disseminated only if required to verify results contained in reports.

2. Conduct of bearability surveys. The Director, National Security Agency, may conduct, or may authorize the conduct by other agencies, of hearability surveys of telecommunications that are transmitted in the United States.

a. Collection. When practicable, consent. will be secured from the owner or user of the facility against which the bearability survey is to be conducted prior to the commencement of the survey.
b. Processing and Storage. Information collected during a vulnerability survey must be processed and stored as follows:

(1) The content of communications may not be recorded or included in any report.
(2) No microwave transmission may be demultiplexed or demodulated for any purpose.

(3) No report or log may identify any person or entity except to the extent of identifying the transmission facility that can be intercepted from the intercept site. If the identities of the users of such facilities are not identical with the identities of the owners of the facilities, and their identities are relevant to the purpose for which the bearability survey has been conducted, the identity of such users may be obtained provided such identities may not be obtained from the contents of the transmissions themselves.

c. Dissemination. Reports may be disseminated only within the U.S. Government. Logs may not be disseminated unless required to verify results contained in reports.

Source: http://www.dtic.mil/whs/directives/corres/pdf/d52401_042588/d52401p.pdf
Department of Defense

DIRECTIVE NUMBER 5240.1

April 25, 1988

ASD(C3I)

SUBJECT: DoD Intelligence Activities

References:

(a) DoD Directive 5240.1, “Activities of DoD Intelligence Components that Affect U.S. Persons,” December 3, 1982 (hereby canceled)
(b) Executive Order 12333, “United States Intelligence Activities,” December 4, 1981

(c) Executive Order 12334, “President’s Intelligence Oversight Board,” December 4, 1981

(d) Public Law No. 95-511, “Foreign Intelligence Surveillance Act of 1978,” October 25, 1978

(e) through (i), see enclosure E1.

1. REISSUANCE AND PURPOSE

This Directive:

1.1. Reissues reference (a); implements references (b) through (d); updates policies; and shall be the only authority used as guidance by DoD intelligence components to collect, retain, or disseminate information concerning U.S. persons.

1.2. Continues in effect procedures previously approved by the U.S. Attorney General for use by DoD intelligence components under Presidential Directive NSC-9 (reference (e)).

1.3. Authorizes the publication of DoD 5240.1-R (reference (f)), consistent with DoD 5025.1-M (reference (g)) and this Directive.

2. APPLICABILITY AND SCOPE

This Directive:

2.1. Applies to the Office of the Secretary of Defense (OSD), the Military Departments, the Organization of the Joint Chiefs of Staff (OJCS), the Unified and Specified Commands, and the Defense Agencies (hereafter referred to collectively as “DoD Components”).

2.2. Applies to all intelligence activities of DoD Components.

2.3. Does not apply to authorized law enforcement activities carried out by DoD intelligence components having a law enforcement mission.

3. DEFINITIONS

3.1. Intelligence activities. The collection, production, and dissemination of foreign intelligence and counterintelligence by DoD intelligence components authorized under reference (b).

3.2. Foreign intelligence. Information relating to the capabilities, intentions, and activities of foreign powers, organizations, or persons, but not including counterintelligence except for information on international terrorist activities.

3.3. Counterintelligence. Information gathered and activities conducted to protect against espionage, other intelligence activities, sabotage, or assassinations conducted for or on behalf of foreign powers, organizations, or persons, or international terrorist activities, but not including personnel, physical, document, or communications security programs.

3.4. DoD intelligence components. All DoD Components conducting intelligence activities, including the following:

3.4.1. The National Security Agency Central Security Service (NSACSS).
3.4.2. The Defense Intelligence Agency (DIA).

3.4.3. The offices within the Department of Defense for the collection of specialized national foreign intelligence through reconnaissance programs.

3.4.4. The Office of the Deputy Chief of Staff for Intelligence (ODCSINT), U.S. Army.

3.4.5. The Office of Naval Intelligence (ONI).

3.4.6. The Office of the Assistant Chief of Staff, Intelligence (OACSI), U.S. Air Force.

3.4.7. Intelligence Division, U.S. Marine Corps.

3.4.8. The Army Intelligence and Security Command (USAINSCOM).

3.4.9. The Naval Intelligence Command (NIC).

3.4.10. The Naval Security Group Command (NSGC).

3.4.11. The Air Force Intelligence Agency (AFIA).

3.4.12. The Electronic Security Command (ESC), U.S. Air Force.

3.4.13. The counterintelligence elements of the Naval Security and Investigative Command (NSIC).

3.4.14. The counterintelligence elements of the Air Force Office of Special Investigations (AFOSI).

3.4.15. The 650th Military Intelligence Group, Supreme Headquarters Allied Powers Europe (SHAPE).

3.4.16. Other intelligence and counterintelligence organizations, staffs, and offices, or elements thereof, when used for foreign intelligence or counterintelligence purposes. The heads of such organizations, staffs, and offices, or elements thereof, shall, however, not be considered as heads of DoD intelligence components for purposes of this Directive.

3.5. Special activities. Activities conducted in support of national foreign policy objectives abroad, which are planned and executed so that the role of the U.S. Government is not apparent or acknowledged publicly, and functions in support of such activities, but which are not intended to influence U.S. political processes, public opinion, policies, or media, and do not include diplomatic activities or the collection and production of intelligence or related support functions.

3.6. United States person. A citizen of the United States; an alien known by the intelligence agency concerned to be a permanent resident alien; an unincorporated association organized in the United States or substantially composed of U.S. citizens or permanent resident aliens; or a corporation incorporated in the United States, except for a corporation directed and controlled by a foreign government or governments.

4. POLICY

4.1. All DoD intelligence activities shall be carried out in strict conformity with the U.S. Constitution, applicable law, E.O. 12333 (reference (b)), the policies and procedures authorized herein, and by other relevant DoD Directives, with special emphasis given to the protection of the constitutional rights and privacy of U.S. persons.

4.2. Reference (b) requires that the Department of Defense promulgate procedures to govern the collection, retention, and dissemination of information about U.S persons, and to govern the use of certain information-gathering techniques. These procedures, approved by the Attorney General of the United States, are contained in DoD 5240.1-R (reference (f)). No DoD intelligence component shall request any person or entity to undertake unauthorized activities.

4.2.1. Authority to employ the collection techniques prescribed by DoD 5240.1-R (reference (f)) shall be limited to that necessary to perform functions assigned to the DoD intelligence component concerned. Use of such techniques to collect information about U.S. persons shall be limited to the least intrusive means feasible.
4.2.2. DoD intelligence component employees shall report all intelligence activities that may violate a law, an Executive order, a Presidential Directive, or applicable DoD policy to the Inspector General or General Counsel responsible for the DoD intelligence component concerned, or to the Assistant to the Secretary of Defense (Intelligence Oversight) (ATSD(IO)).

4.3. DoD Components shall not conduct, or provide support for the conduct of, special activities except in times of war declared by the Congress or during a period covered by a report from the President to the Congress under the War Powers Resolution (50 U.S.C. 1541-1548, reference (h)), unless such actions have been approved by the President and directed by the Secretary of Defense.

4.4. Under no circumstances shall any DoD employee engage in, or conspire to engage in, assassination.

5. RESPONSIBILITIES

5.1. The Assistant Secretary of Defense (Command, Control, Communications, and Intelligence) (ASD(C3I)) shall provide overall policy guidance for the conduct of DoD intelligence activities.

5.2. The Deputy Under Secretary of Defense (Policy) (DUSD(P)) shall provide overall policy guidance for the conduct of DoD counterintelligence activities.

5.3. The General Counsel, Department of Defense (GC, DoD), shall:

5.3.1. Serve as the central focal point for contact with, and reporting to, the Attorney General regarding the legal matters arising under this Directive.
5.3.2. Interpret this Directive and DoD 5240.1-R (reference (f)), as may be required.

5.4. The Assistant to the Secretary of Defense (Intelligence Oversight) (ATSD(IO)) shall serve as the central focal point for all contacts with the President’s Intelligence Oversight Board (E.O. 12334, reference (c)) and shall perform the responsibilities assigned in DoD Directive 5148.11 (reference (i)).

5.5. The Heads of DoD Components shall ensure that their intelligence components implement this Directive and reference (f), as appropriate.

6. EFFECTIVE DATE AND IMPLEMENTATION

This Directive is effective immediately. Forward one copy of implementing documents to the Assistant Secretary of Defense (Command, Control, Communications, and Intelligence) and the General Counsel, Department of Defense, within 90 days.

[Signed]
William H. Taft IV
Deputy Secretary of Defense

Enclosures – 1

_____

E1. ENCLOSURE 1

REFERENCES, continued

(e) Presidential Directive NSC-9, March 30, 1977
(f) DoD 5240.1-R, “Procedures Governing the Activities of DoD Intelligence Components that Affect United States Persons,” December 11, 1982, authorized by this Directive

(g) DoD 5025.1-M, “Directives System Procedures,” April 1981, authorized by DoD Directive 5025.1, October 16, 1980

(h) Title 50, United States Code, Sections 1541-1548, “The War Powers Resolution” (87 Stat. 555), P.L. 93-148

(i) DoD Directive 5148.11, “Assistant to the Secretary of Defense (Intelligence Oversight),” December 1, 1982

Department of Defense

DIRECTIVE NUMBER 5200.27

January 7, 1980

USDP

SUBJECT: Acquisition of Information Concerning Persons and Organizations not Affiliated with the Department of Defense

References:

(a) DoD Directive 5200.27, subject as above, December 8, 1975 (hereby canceled)
(b) DoD Directive 5240.1, “Activities of DoD Intelligence Components that Affect U.S. Persons,” November 30, 1979

1. REISSUANCE AND PURPOSE

This Directive reissues reference (a) to establish for the Defense Investigative Program general policy, limitations, procedures, and operational guidance pertaining to the collecting, processing, storing, and disseminating of information concerning persons and organizations not affiliated with the Department of Defense.

2. APPLICABILITY AND SCOPE

2.1. Except as provided by subsection 2.3., below, this Directive is applicable to the Office of the Secretary of Defense, Military Departments, Office of the Joint Chiefs of Staff, Unified and Specified Commands, and the Defense Agencies (hereafter referred to as “DoD Components”).

2.2. The provisions of this Directive encompass the acquisition of information concerning the activities of:

2.2.1. Persons and organizations, not affiliated with the Department of Defense, within the 50 States, the District of Columbia, the Commonwealth of Puerto Rico, and U.S. territories and possessions; and
2.2.2. Non-DoD-affiliated U.S. citizens anywhere in the world.

2.3. This Directive is not applicable to DoD intelligence components as defined by DoD Directive 5240.1 (reference (b)).

2.4. Authority to act for the Secretary of Defense in matters in this Directive which require specific approval are delineated in enclosure E1.

3. POLICY

3.1. Department of Defense policy prohibits collecting, reporting, processing, or storing information on individuals or organizations not affiliated with the Department of Defense, except in those limited circumstances where such information is essential to the accomplishment of the Department of Defense missions outlined below.

3.2. Information-gathering activities shall be subject to overall civilian control, a high level of general supervision and frequent inspections at the field level.

3.3. Where collection activities are authorized to meet an essential requirement for information, maximum reliance shall be placed upon domestic civilian investigative agencies, Federal, State and local.

3.4. In applying the criteria for the acquisition and retention of information established pursuant to this Directive, due consideration shall be given to the need to protect DoD functions and property in the different circumstances existing in geographic areas outside the United States. Relevant factors include:

3.4.1. The level of disruptive activity against U.S. forces;
3.4.2. The competence of host country investigative agencies;

3.4.3. The degree to which U.S. military and host country agencies exchange investigative information;

3.4.4. The absence of other U.S. investigative capabilities; and

3.4.5. The unique and vulnerable position of U.S. forces abroad.

4. AUTHORIZED ACTIVITIES

DoD Components are authorized to gather information essential to the accomplishment of the following defense missions:

4.1. Protection of DoD Functions and Property. Information may be acquired about activities threatening defense military and civilian personnel and defense activities and installations, including vessels, aircraft, communications equipment, and supplies. Only the following types of activities justify acquisition of information under the authority of this subsection:

4.1.1. Subversion of loyalty, discipline, or morale of DoD military or civilian personnel by actively encouraging violation of law, disobedience of lawful order or regulation, or disruption of military activities.
4.1.2. Theft of arms, ammunition, or equipment, or destruction or sabotage of facilities, equipment, or records belonging to DoD units or installations.

4.1.3. Acts jeopardizing the security of DoD elements or operations or compromising classified defense information by unauthorized disclosure or by espionage.

4.1.4. Unauthorized demonstrations on active or reserve DoD installations.

4.1.5. Direct threats to DoD military or civilian personnel in connection with their official duties or to other persons who have been authorized protection by DoD resources.

4.1.6. Activities endangering facilities which have classified defense contracts or which have been officially designated as key defense facilities.

4.1.7. Crimes for which DoD has responsibility for investigating or prosecuting.

4.2. Personnel Security. Investigations may be conducted in relation to the following categories of persons:

4.2.1. Members of the Armed Forces, including retired personnel, members of the Reserve Components, and applicants for commission or enlistment.
4.2.2. DoD civilian personnel and applicants for such status.

4.2.3. Persons having need for access to official information requiring protection in the interest of national defense under the Department of Defense Industrial Security Program or being considered for participation in other authorized Department of Defense programs.

4.3. Operations Related to Civil Disturbance. The Attorney General is the chief civilian officer in charge of coordinating all Federal Government activities relating to civil disturbances. Upon specific prior authorization of the Secretary of Defense or his designee, information may be acquired which is essential to meet operational requirements flowing from the mission assigned to the Department of Defense to assist civil authorities in dealing with civil disturbances. Such authorization will only be granted when there is a distinct threat of a civil disturbance exceeding the law enforcement capabilities of State and local authorities.

5. PROHIBITED ACTIVITIES

5.1. The acquisition of information on individuals or organizations not affiliated with the Department of Defense will be restricted to that which is essential to the accomplishment of assigned Department of Defense missions under this Directive.

5.2. No information shall be acquired about a person or organization solely because of lawful advocacy of measures in opposition to Government policy.

5.3. There shall be no physical or electronic surveillance of Federal, State, or local officials or of candidates for such offices.

5.4. There shall be no electronic surveillance of any individual or organization except as authorized by law.

5.5. There shall be no covert or otherwise deceptive surveillance or penetration of civilian organizations unless specifically authorized by the Secretary of Defense, or his designee.

5.6. No DoD personnel will be assigned to attend public or private meetings, demonstrations, or other similar activities for the purpose of acquiring information, the collection of which is authorized by this Directive without specific prior approval by the Secretary of Defense, or his designee. An exception to this policy may be made by the local commander concerned, or higher authority, when, in his judgment, the threat is direct and immediate and time precludes obtaining prior approval. In each such case a report will be made immediately to the Secretary of Defense, or his designee.

5.7. No computerized data banks shall be maintained relating to individuals or organizations not affiliated with the Department of Defense, unless authorized by the Secretary of Defense, or his designee.

6. OPERATIONAL GUIDANCE

6.1. Nothing in this Directive shall be construed to prohibit the prompt reporting to law enforcement agencies of any information indicating the existence of a threat to life or property, or the violation of law, nor to prohibit keeping a record of such a report.

6.2. Nothing in this Directive shall be construed to restrict the direct acquisition by overt means of the following information:

6.2.1. Listings of Federal, State, and local officials who have official responsibilities related to the control of civil disturbances. Such listings may be maintained currently.
6.2.2. Physical data on vital public or private installations, facilities, highways, and utilities, as appropriate, to carry out a mission assigned by this Directive.

6.3. Access to information obtained under the provisions of this Directive shall be restricted to Governmental Agencies which require such information in the execution of their duties.

6.4. Information within the purview of this Directive, regardless of when acquired, shall be destroyed within 90 days unless its retention is required by law or unless its retention is specifically authorized under criteria established by the Secretary of Defense, or his designee.

6.5. This Directive does not abrogate any provision of the Agreement Governing the Conduct of Defense Department Counterintelligence Activities in Conjunction with the Federal Bureau of Investigation, April 5, 1979, nor preclude the collection of information required by Federal statute or Executive Order.

Comments

Leave a Reply

Your email address will not be published. Required fields are marked *