This file is available on a Cryptome DVD offered by Cryptome. Donate $25 for a DVD of the Cryptome 10-year archives of 35,000 files from June 1996 to June 2006 (~3.5 GB). Click Paypal or mail check/MO made out to John Young, 251 West 89th Street, New York, NY 10024. Archives include all files of cryptome.org, cryptome2.org, jya.com, cartome.org, eyeball-series.org and iraq-kill-maim.org. Cryptome offers with the Cryptome DVD an INSCOM DVD of about 18,000 pages of counter-intelligence dossiers declassified by the US Army Information and Security Command, dating from 1945 to 1985. No additional contribution required -- $25 for both. The DVDs will be sent anywhere worldwide without extra cost.


26 May 2000. Thanks to American Investigator and SA.
Source: Seven GIF images from http://ai-tv.com/freeh.htm


SECRET

March 8, 1999

MEMORANDUM FOR: LOUIS J. FREEH
                                        DIRECTOR
                                        FEDERAL BUREAU OF INVESTIGATION

FROM:                            THE ATTORNEY GENERAL

SUBJECT:                       National Security List (U)

The Federal Bureau of Investigation in conjunction with the Department of Justice and the Department of State, has submitted a proposed National Security List (NSL) for 1999/2000 pursuant to section II.A. of the Attorney General Guidelines for FBI Foreign Intelligence Collection and Counterintelligence Investigations (FCIG). (U)

Based on that submission, I hereby designate the following countries as country threats under the NSL for 1999-2000: Russian Federation, People's Republic of China, Cuba, People's Democratic Republic of Korea (North Korea), Federal Republic of Yugoslavia, Republic of Srpska (the Serb-controlled region of Bosnia under the Dayton Accords), Socialist Republic of Vietnam, Syria, Iraq, Iran, Libya, Sudan, and Taiwan. (S)

Also based on the FBI's submission, I hereby designate the following categories of activities as being threats under the NSL:

1. Terrorism - activities that:

(1) involve violent acts dangerous to human life that are a violation of the criminal law of the United States or any State, or that would be a criminal violation if committed within the jurisdiction of the United States or any State;



Classified by:  Frances Frages Townsend, Counsel for Intelligence Policy
                        Department of Justice
Reason:           1.5(c)
Declassify on: X1

SECRET


SECRET

(2) appear to be intended:

(a) to intimidate or coerce a civilian population;

(b) to influence the policy of a government by intimidation or coercion; or

(c) to affect the conduct of a government by assassination or kidnaping; and

(3) occur totally outside the United States, or transcend national boundaries in terms of means by which they are accomplished, the persons they appear intended to coerce or intimidate, or the locale in which their perpetrators operate or seek asylum. (U)

2. Espionage - foreign power-sponsored or coordinated intelligence activity directed at the U.S. Government, or U.S. corporations, establishments or persons, which involve the identification, targeting and collection of U.S. national defense information. (U)

3. Proliferation - foreign power-sponsored or coordinated intelligence activity directed at the U.S. Government, or U.S. corporations, establishments or persons, which involves:

(1) the proliferation of weapons of mass destruction to include chemical, biological, and nuclear weapons, and delivery systems of those weapons; or

(2) the proliferation of advanced conventional weapons. (U)

4. Economic Espionage - foreign power-sponsored or coordinated intelligence activity directed at the U.S. Government, or U.S. corporations, establishments or persons, which involves:

(1) the unlawful or clandestine targeting or acquisition of sensitive financial, trade, or economic policy information, proprietary economic information, or critical technologies, or

(2) the unlawful or clandestine targeting or influencing of sensitive economic

SECRET


SECRET

policy decisions. (U)

5. Targeting the National Information Infrastructure - foreign power-sponsored or coordinated intelligence activity directed at the U.S. Government, or U.S. corporations, establishments or persons, which involves the targeting of facilities, personnel, information, or computer, cable, satellite or telecommunications systems, which comprise or are associated with the National information infrastructure. The national information infrastructure is the electronic backbone for the storage, processing and communication of information for nearly every sector of U.S. society. Proscribed intelligence activities include:

(1) denial or disruption of computer, cable, satellite or telecommunications services;

(2) unauthorized monitoring of computer, cable, satellite or telecommunications systems;

(3) unauthorized disclosure of proprietary or classified information stored or transmitted through computer, cable, satellite or telecommunications systems;

(4) unauthorized modification or destruction of computer programming codes of information, computer network databases, stored information or computer capabilities; or

(5) manipulation of computer, cable, satellite or telecommunications services resulting in fraud, financial loss or other federal criminal violations. (U)

6. Targeting the U.S. Government - foreign power-sponsored or coordinated intelligence activity directed at the U.S. Government, or U.S. corporations, establishments or persons, which involves the targeting of government programs, information, or facilities, or the targeting of personnel of:

(1) the U.S. intelligence community;

(2) the U.S. foreign affairs, economic or financial community; or

(3) the U.S. defense establishment and related activities of national preparedness. (U)

7. Perception Management - foreign power-sponsored or coordinated intelligence

SECRET


SECRET

activity directed at the U.S. Government, or U.S. corporations, establishments or persons, which involves manipulating information, communicating false information, or propagating deceptive information and communications (domestically and internationally), or of U.S. Government officials regarding U.S. policies, ranging from foreign policy to economic strategies. (U)

8. Foreign Intelligence Activities - activity directed at the U.S. Government, or U.S. corporations, establishments or persons, that is not described by or included in any other issue threats. (U)

The reconsideration and review of these lists should begin no later than March 2000 in order that reapproval may be accomplished before December 1, 2000. (U)






SECRET


NFIP INVESTIGATIVE PRIORITIES

The National Security Threat List (NSTL) is the FBI's National Security Division's investigative strategy. The strategy is detailed in eight investigative priorities set forth below. It should be noted that while the priorities are of necessity set forth in sequential order, this should not be interpreted as a rigid order of precedence, rather, the list should be looked upon as a collective list of priorities.

Terrorism: The protection from anti-US activity intended to intimidate or coerce a government, the civilian population, or any segment thereof, in furtherance of political goals conducted by groups or individuals.

Espionage: The protection of the national security of the United States through investigation to detect and thwart espionage activities directed against the United States.

Proliferation: Cooperative investigative efforts directed toward the prevention of unauthorized acquisition, by or on behalf of foreign powers, of technology, information or materials which could be used in the development, manufacture, or delivery of nuclear or chemical/biological weapons.

Economic Espionage: The protection from foreign power-sponsored or coordinated intelligence activity directed at the US Government, or US corporations, establishments or persons, which involves: the unlawful or clandestine targeting or acquisition of sensitive financial, trade, or economic policy information, proprietary economic information, or critical technologies; or the unlawful or clandestine targeting or influencing of sensitive economic policy decisions.

Targeting the National Information Infrastructure: The defense mechanism used to detect foreign power-sponsored or coordinated intelligence activity directed at the US Government, or corporations, establishments or persons, which involve the targeting of facilities, personnel, information, computer, cable, satellite or telecommunications systems, which comprise or are associated with the National information infrastructure.

Targeting the US Government: This involves foreign power-sponsored or coordinated intelligence activity directed at US corporations, establishments or persons, which involves the targeting of US government programs, information, or facilities, or personnel of the US intelligence community (IC); the US foreign affairs, economic or financial community; or, the US defense establishment and related activities of national preparedness.

Perception Management: Involve protection from foreign power-sponsored or coordinated intelligence activity directed at the US Government, or US corporations, establishments or persons, which involves manipulating information, communicating false information, or propagating deceptive information and communications (domestically and internationally), or of US Government officials regarding US policies, ranging from foreign policy to economic strategies.

Foreign Intelligence Activities: Involves foreign power-sponsored or coordinated intelligence activity conducted in the United States or directed against the US Government, or US corporations, establishments or persons, that is not described by or included in any other issue threats.

-2-


SECRET/NOFORN

NSTL COUNTRY THREAT LIST

CUBA

IRAQ

IRAN

LIBYA

NORTH KOREA

PEOPLE'S REPUBLIC OF CHINA (PRC)

RUSSIAN FEDERATION

SUDAN

SYRIA

TAIWAN

VIETNAM

SECRET/NOFORN


NATIONAL SECURITY DIVISION

--INVESTIGATIVE PRIORITIES--

_____________________________

THE NATIONAL SECURITY THREAT LIST (NSTL) is the FBI's National Security Division's investigative strategy. The strategy is defined by eight investigative priorities:

Terrorism

Espionage

Proliferation

Economic Espionage

Targeting the National Information Infrastructure

Targeting the US Government

Perception Management

Foreign Intelligence Activities

These investigative priorities will apply to the activities of all foreign nations, with special attention given to those countries determined to be a strategic national security threat.




HTML by Cryptome.