Naval Operations. This estimate was prepared by the Joint Intelligence Com- mittee of the Joint Chiefs of Staff and formed the basis of the task force Conmander's estimate of enemy capabilities. The task force was considered to be primarily vulnerable to 1) inadvertent release of classified information through failure of personnel to observe security precautions, 2) espionage, through penetration of subversive personnel into the task force, or by defection of personnel within the task force and 3) sabotage, accomplished by penetration of subversives into the task force or by defection of person~ nel within the task force, Reconnaissance by means of aircraft, submarines or surface ships, and attack by any combination of military forces were considered as capabilities but their employment was considered as a remote possibility; the former being extremely limited capabilities for obtaining vital information, and the latter being considered only as an adjunct to the outbreak of open hostilities, (3) Plans were established to ensure the prompt reporting and early evaluation of contacts in the PPG; however, none of the contacts re- ported was believed to have its origin in hostile forces, b. Security (1) In accordance with directives of the Joint Chiefs of Staff, CUIF SEVEN reported to CINCPAC for movement ccntrel and general security with respect to the tax force and the PPG. The PPG was clesed to all personnel, ships, and aircraft except those participating in the operations and providing logistic support, and access to the area was controlled by CINCPAC Letter FF-1, Al6-1, Serial 020 dated 1 April 1952. was used to control travel of personnel within the PPG. (2) A badge system ContED/Doe JTF SEVEN security policy was designed to counter enemy capa- bilities to gain information on the activities of the task force, Head- quarters, JTF SEVEN Standing Operating Procedures were published to provide instructions relative to basic security indoctrination, personnel clearances, badge identification systems, official photography, and departure security procedures, In addition to these standing instructions, specific security in- structions were issued to cover special events. An extensive security poster program was conducted, and a movie program consisting of short security films was employed. 22

Select target paragraph3