Naval Operations.
This estimate was prepared by the Joint Intelligence Com-
mittee of the Joint Chiefs of Staff and formed the basis of the task force
Conmander's estimate of enemy capabilities.
The task force was considered
to be primarily vulnerable to 1) inadvertent release of classified information through failure of personnel to observe security precautions, 2) espionage,
through penetration of subversive personnel into the task force, or by defection of personnel within the task force and 3) sabotage, accomplished by
penetration of subversives into the task force or by defection of person~
nel within the task force,
Reconnaissance by means of aircraft, submarines
or surface ships, and attack by any combination of military forces were
considered as capabilities but their employment was considered as a remote
possibility; the former being extremely limited capabilities for obtaining
vital information, and the latter being considered only as an adjunct to the
outbreak of open hostilities,
(3)
Plans were established to ensure the prompt reporting and
early evaluation of contacts in the PPG; however, none of the contacts re-
ported was believed to have its origin in hostile forces,
b. Security
(1)
In accordance with directives of the Joint Chiefs of Staff,
CUIF SEVEN reported to CINCPAC for movement ccntrel and general security
with respect to the tax force and the PPG.
The PPG was clesed to all
personnel, ships, and aircraft except those participating in the operations
and providing logistic support, and access to the area was controlled by
CINCPAC Letter FF-1, Al6-1, Serial 020 dated 1 April 1952.
was used to control travel of personnel within the PPG.
(2)
A badge system
ContED/Doe
JTF SEVEN security policy was designed to counter enemy capa-
bilities to gain information on the activities of the task force,
Head-
quarters, JTF SEVEN Standing Operating Procedures were published to provide
instructions relative to basic security indoctrination, personnel clearances,
badge identification systems, official photography, and departure security
procedures,
In addition to these standing instructions, specific security in-
structions were issued to cover special events.
An extensive security poster
program was conducted, and a movie program consisting of short security films
was employed.
22