158
tion media, film, and photographic equipment
used in the office; maintenance of personnel
clearance records of persons authorized access
to AEC controlled areas; and the preparation
of a monthly list of arrival and departure dates
of personnel in travel status to and from the
Proving Ground. It was originally estimated
that 8,000 badges would be required for REDWING; however, since difficulty was encoun-

tered in obtaining information for badging other
task group personnel, often necessitating that
duplicate badges be prepared, a total of 12,783
was issued. The Pass and Badge Office was
operated in accordance with procedures established by the AEC Security Office of ALOO.

INFORMATION SECURITY.
The scope of H&N activities during Operation REDWING, the number of personnel
requiring access to classified information, and
the necessity of transferring a voluminous
amount of classified documents between the
various departments within the Home Office and
between the Home Office and the PPG called
for controlled procedures and practices. In
December 1954, the H&N Security Procedures
Manual was published, which covered basic
security matters relative to safeguarding classified information, instructions for classifying
documents, changes ofclassification, preparation

for transmission and the accountability production, storage, and distribution of classified
documents.

Joint Task Force SEVEN Standard Operating Procedure 205-2, issued on 1 February

CHAPTER III, SECTIONS 7 and 8

1956, pertained to security education and required that indoctrination letters be read and
followed by an examination. One letter was pre-

pared for key personnel in supervisory positions
or above and one for lower echelon employees.

The men who took security examinations during
Operation CASTLE were exempt from the examination but required to sign a certificate of
compliance; all others were given a written
examination based on the test of the indoctrination letters. Notations were made in all H&N
personnel records to reflect that an examination
had been taken or a certificate of compliance
signed.
A log of security activities was inaugurated
on 18 October 1955, in accordance with a directive issued by CJTF-7. This log was maintained on a weekly basis and served as a chronological history of all security activities.
All employees terminating in the Home
Office were given a lecture and required

to execute a security termination statement,

Form AEC-136, which included certain provisions of the Atomic Energy Act of 1954
and U.S. Code Title 18. Jobsite employees
were given a termination security lecture prior
to their departure from the Proving Ground
and were also required to sign Form AEC-136.
Upon arrival at their places of hire-whether it
was Honolulu, San Francisco or Los Angeleseach terminating employee was again given a
security lecture and required to sign Form
AEC-136. He was reminded at this time of his
responsibility to notify the Atomic Energy
Commission of any anticipated foreign travel.

SECTION 8
COMMUNICATIONS
The tasks assigned to Holmes & Narver for
Operation REDWINGincluded the responsibility for all communications of TG 7.1 and TG
7.5 and the interatoll communications service
for the Task Force. This was considerable expansion in functional responsibilities over that
of previous Operations at the Proving Ground
and led to the establishment of a Communications Department within the Contractor's
Administration Division. During the peak of
the Operation, 30 teletype operators were required to cover all channels. These men, with a
relatively short period of on-the-job indoctrin-

ation, were readily able to adapt themselves to

the procedures involved. In general, a high
quality service was provided, with errors and
security violations being very few.
Indoctrination of personnel was facilitated
by the issuance of a Communication Operation
and Instruction Plan. This plan covered the

communication system capabilities and the
standard procedures which outlined definite
practices and methods for the in-station handling of messages. Particular emphasis was placed
on security, accuracy and speed-of-message
handling.
Page 3-45

Select target paragraph3