32 C.F.R. PART 149—POLICY ON TECHNICAL SURVEILLANCE COUNTERMEASURES


Title 32 - National Defense


Title 32: National Defense

Browse Previous

PART 149—POLICY ON TECHNICAL SURVEILLANCE COUNTERMEASURES

Section Contents
§ 149.1   Policy.
§ 149.2   Responsibilities.
§ 149.3   Definitions.


Authority:  E.O. 12968 (60 FR 40245, 3 CFR 1995 Comp., p. 391.)

Source:  63 FR 4583, Jan. 30, 1998, unless otherwise noted.

§ 149.1   Policy.
top

(a) Heads of federal departments and agencies which process, discuss, and/or store classified national security information, restricted data, and sensitive but unclassified information, shall, in response to specific threat data and based on risk management principles, determine the need for Technical Surveillance Countermeasures (TSCM).

To obtain maximum effectiveness by the most economical means in the various TSCM programs, departments and agencies shall exchange technical information freely; coordinate programs; practice reciprocity; and participate in consolidated programs, when appropriate.

§ 149.2   Responsibilities.
top

(a) Heads of U.S. Government departments and agencies which plan, implement, and manage TSCM programs shall:

(1) Provide TSCM support consisting of procedures and countermeasures determined to be appropriate for the facility, consistent with risk management principles.

(2) Report to the Security Policy Board, attention: Chair, Facilities Protection Committee (FPC), for appropriate dissemination, all-source intelligence that concerns technical surveillance threats, devices, techniques, and unreported hazards, regardless of the source or target, domestic or foreign.

(3) Train a professional cadre of personnel in TSCM techniques.

(4) Ensure that the FPC and Training and Professional Development Committee are kept apprised of their TSCM program activities as well as training and research and development requirements.

(5) Assist other departments and agencies, in accordance with federal law, with TSCM services of common concern.

(6) Coordinate, through the FPC, proposed foreign disclosure of TSCM equipment and techniques.

(b) The FPC shall advise and assist the Security Policy Board in the development and review of TSCM policy, including guidelines, procedures, and instructions. The FPC shall:

(1) Coordinate TSCM professional training, research, development, test, and evaluation programs.

(2) Promote and foster joint procurement of TSCM equipment.

(3) Evaluate the impact on the national security of foreign disclosure of TSCM equipment or techniques and recommend policy changes as needed.

(4) Develop guidance for use in obtaining intelligence information on the plans, capabilities and actions of organizations hostile to the U.S. Government concerning technical penetrations and countermeasures against them.

(5) Biennially, review, update and disseminate the national strategy for TSCM.

§ 149.3   Definitions.
top

Classified National Security Information (CNSI). Information that has been determined pursuant to Executive Order 12958 (60 FR 19825, 3 CFR 1995 Comp., p. 333) or any predecessor order to require protection against unauthorized disclosure and is marked to indicate its classified status when in documentary form.

Restricted Data (RD). All data concerning design, manufacture or utilization of atomic weapons; the production of special nuclear material; or the use of special nuclear material in the production of energy, but shall not include data declassified or removed from the RD category pursuant to section 102 of the Atomic Energy Act of 1954, as amended.

Sensitive but Unclassified. Any information, the loss, misuse, or unauthorized access to or modification of which could adversely affect the national interest or the conduct of federal programs, or the privacy to which individuals are entitled under 5 U.S.C. 552a, but which has not been specifically authorized under criteria established by an Executive Order or an Act of Congress to be kept secret in the interest of national defense or foreign policy.

Technical Surveillance Countermeasures (TSCM). Techniques and measures to detect and nullify a wide variety of technologies that are used to obtain unauthorized access to classified national security information, restricted data, and/or sensitive but unclassified information.

Browse Previous






















chanrobles.com


ChanRobles Legal Resources:

ChanRobles On-Line Bar Review

ChanRobles Internet Bar Review : www.chanroblesbar.com

ChanRobles MCLE On-line

ChanRobles Lawnet Inc. - ChanRobles MCLE On-line : www.chanroblesmcleonline.com