(UNTITLED)
Document Type:
Collection:
Document Number (FOIA) /ESDN (CREST):
02251018
Release Decision:
RIPPUB
Original Classification:
U
Document Page Count:
8
Document Creation Date:
July 13, 2023
Document Release Date:
December 13, 2022
Sequence Number:
Case Number:
F-2017-02494
Publication Date:
August 27, 1971
File:
Attachment | Size |
---|---|
(UNTITLED)[16170840].pdf | 429.38 KB |
Body:
Approved for Release: 2022/12/12 CO2251018 .
Direcw'r of Securi
..�
Os - -
All of us in the DDI who have been
�connected with this problem whbleheartedly
endorse the recoMMendation in the attached.
I suggest that you take the bull by the horns
and go ahead.
27 August 1971
(DATE)
FORM O.
1 AUG 54
101 REPLACES FORM 10- 101
WHICH MAY BE USED.
(47)
Approved for Release: 2022/12/12 CO2251018
Approved for Release: 2022/12/12 CO2251018
. ,
,
PTIAL 1 I ..CIZET
OFFICIAL :ROUTING SLIV'
TO
F T-
--- ArmaRESS AND
NAME
. DATE
INITIALS 1
1_
�
r
1
PREPARE
REPLY
ACTION .
MUT REPLY
APPROVAL
.1 DISPATCH
I RECOMMENDATION
COMMENT
---ji
T FILE
I RETURN
C NCURRENS:',E
1
IHFORMATtDiki
S/GNATURE
Remarks:
OLD HERE TO RETURN TO SENDER
FROM: NAME, ADDRESS AND. PHONE NO.,
UNCLASSIFIED
';'"0�- 237 Use previous editions
DATE
0 AUG17
SECRET
(40)
pproved for Release: 2022/12/12 CO2251018
Approved Approved for Release: 2022/12/12 CO2251018
-
-----w .-
OIFFIICAL ROUTIING SUP ._
TO
NAME AND ADDNESS
DATE
INITIALS
1
1
DDI - 7E44 HQ
(i
tt:'Zi,
2
a
,
[ 0.0E:).0e0Z3
Attached is a
Pforzheimer on the Agency's
to deal retroactively
leaks. Iticoncludes
prepared to undertake
these leaks against
recommends a centralized
1 file, preferably in
Security. I think that
dation is a good one
to believe that we will
long periods .to have
interest and concern
The procedure would
, and demand conscien4ious
all parts of the Agency.
Ur
study by Walter N
capability
with security
that we are poorly
a crash study of
the deadline, and it
Agency leak
the Office of
the recommen-
if there is reason
continue over
very high level
with the subject.
be somewhat costly
compliance by
,
Lif\
FOLD HERE TO RETURN TO SENDER
FROM: 0.772t E. ADDRESS AND PHONE NO.
DATE
H C. EENDISS D/CRS 2E60 HQ
27 Aug
UNCLASSIFIED CONFIDENTIAL 1
SECRET
1,00(1 PO. 037 Use previous editions
1-67 L
GPO 1965 0 - 297-942
(40)
pproved for Release: 2022/12/12 CO2251018
(b)(3)
Approved for Release: 2022/12/12 CO2251018
IIIt/ �
-1,703'3` -7
�,
20 August 1971
MEMORANDUM FOR : Director Central Reference Service
SUBJECT Intelligence Security Leaks
1. During the week of 9 August 1971, CIA was called upon by the
White House to make a crash study of intelligence security leaks in the
press during the Nixon Administration. The study was to be limited to
two newspapers, The New York Times and The Washington Post. The
original request required a reading of every page of those two newspapers
from 20 January 1969 to date. Subsequently, Mr, Osborn, Director of
Security, met with David Young, of the White House staff, who agreed to
modify the requirement to allow CIA to use its clipping files rather than
to undertake a page by page reading of the newspapers themselves.
Further, the Indochina war was excluded, and virtually no attention was
focused on leaks involving DDP activities. In essence, the study con-
cerned itself with leaks on the Warsaw Pact nations, China, and the Arab-
Israeli confrontation. Mr. Helms forwarded the resultant study to Mr.
Ehrlichman at the White House on 16/17 August. Approximately 191 leaks
were selected as containing significant disclosures. It is doubtful that
any were inadvertent.
2. Most of the major leaks are in the field of Soviet weaponry,
overhead reconnaissance and communications intelligence, so respon-
sibility for this study was placed on John Paisley, Acting Chief, Office
of Strategic Research. On 11 August, Mr. Young, of Mr. Ehrlichmangs
staff, sent a list of 19 categories to Mr. Paisley "of the kinds of information
we would hope to be able to gather." A copy of this list is attached. The
resultant effort leads me to make certain comments and suggestions which
you may wish to forward to the DDI for further consideration.
3. The first question one must consider is what is a "leak."
Presumably, from our standpoint, a "leak" is any unauthorized disclosure
of intelligence sources and methods, or disclosure of intelligence estimates,
reports, studies, facts or figures which would tend to reveal either intel-
ligence sources or methods or the extent of our information on a given
subject. An added difficulty is determining which are authorized "leaks"
as opposed to unauthorized "leaks." Unfortunately, the majority of
authorized "leaks" are often as damaging as the unauthorized "leaks,"
if not more so, because of the access to classified material by those who
feel they are authorized to leak.
EmimmiApproved for Release: 2022/12/12 CO2251018
Approved for Release: 2022/12/12 CO2251018
-2-
4. There were several Agency elements in a position to contribute
to this special White House study.
(a) Office of Strategic Research (OSR). For some time now,
OSR has maintained some sort of fib o on security leaks in their
subject area. These have dealt largely with Soviet weaponry and
other military strengths, as well as with the SALT talks. Recently,
OSR has undertaken the quick scanning of The New York Times and
The Washington Post for leaks each morning in order to send the
DDI an evaluation, if possible, prior to the DCI's nine o'clock
meeting. In forwarding their note to the DDI, OSR usually tears
out the article and attaches it to their comment. In many instances,
they do not keep a copy of the article in their own files, but merely
retain an annotated card listing. Therefore, for the present study
they often did not have the original article and had to look at a
copy elsewhere. (The CIA Library reproduced 50-60 articles
for this purpose). - Nor were OSR's own card listings by any means
complete, but were supplemented by HIC and Security in connection
with this study.
The original classified material which formed the basis
of the leak was, or might have been, identified at the time the
leak occurred. Thus, it could be pointed out that a specific leak
originated from a specific issue of the Current Intelligence
Bulletin or a National Intelligence Estimate or a special study.
There have been at least two recent incidents, where members of
the Agency have responded to perfectly legitimate telephone requests
for information from officials outside the Agency who were entitled
to it; but when supplied to these officials, the information has almost
immediately turned up in the press. Nevertheless, OSR has not
maintained many notes of the documentary origins for these leaks,
particularly those originating from CIA material. To go back and
try to reconstruct these origins now would be a major undertaking.
(b) Office of Security (OS). OS maintains some files on leaks.
While I have not seen these files, I gather they are by no means
complete. I believe that OS' strongest files are those involving
CIA personnel who have been blown in the public media. In
addition, where there has been a major leak calling for investiga-
tion of possible source, OS has often made an analysis of the
� ^,��� I," � , .-7-� � n
`
11 ,
111....111.111.............Aoproved for Release: 2022/12/12 CO2251018
Approved for Release: 2022/12/12 CO2251018
�
- 3 -
origins of the leak against a particular document or documents,
as well as trying to ascertain the source. I do not believe that
OS was a major source of information for the present study,
although they made some contribution.
(c) Office of the Assistant to the DCI. Mr. Goodwin's office
has the Agency responsibility for the reading of a considerable
number of newspapers (plus the press clippings on CIA which
they receive from a press clipping service). They also cover
a few major periodicals and receive pertinent extracts of radio
and TV interviews from an outside service. In addition, HIC
and the CIA Library cover a few foreign newspapers and peri-
odicals, as well as additional domestic periodicals, for informa-
tion for HIC's files as well as for Mr. Goodwin's files and
dissemination. Unfortunately, Mr. Goodwin's files, by and large,
are not useful for a crash study on security leaks. Except for
articles on CIA personnel which are filed in folders under the
name of the person mentioned, it is usually necessary to have
a specific date in order to retrieve a given article from the
Goodwin files. While there is a certain amount of area or
subject (Green Berets, National Student Association, Pentagon
Papers) breakdown, everything is filed chronologically and in
such bulk as to make a search of these files time consuming in
the absence of a given date. Basically they do not have any
files dealing with leaks as such, and they were able to contribute
hardly anything to the present study.
(d) Historical Intelligence Collection (HIC). HIC maintains
extensive clipping files of an historical nature, both on CIA and
intelligence. (HIC has virtually the only Agency clippings for
the period 1942-50). It places considerable emphasis on the
reporting of major espionage cases. HIC receives the daily
package of xeroxed clippings from Mr. Goodwin's office, incor-
porating pertinent ones into its files. It also covers certain
British language newspapers and some American and foreign
periodicals for material of interest to HIC. Some of these
clippings which would appear to have a wider interest are given
to Mr. Goodwin for his daily dissemination. HIC files its clip-
pings generally on a broad subject base, i.e. , Overhead
Reconnaissance; Comint; Great Britain: Official Secrets Act;
and within these specialized categories they are filed by date.
7 "
a
pproved for Release: 2022/12/12 CO2251018
Approved for Release: 2022/12/12 CO2251018
-4
HIC also keeps generalized clippings under an area breakdown
such as USSR, China and Cuba. These clippings are on various
aspects of intelligence in those areas and not on pure substan-
tive information. HIC also maintains a broad selection of
clippings in the "General" category dealing with references in
the public media to CIA and intelligence that are more generalized
than those in specific category files. However, it should be noted
that HIC does not file clippings under a "leak" category but
simply has them in the files appropriate to the given subject,
such as Overhead Reconnaissance. Because of the superior
accessibility, content, and breakdown of the HIC clipping
files, the two analysts \ who wrote the
study reviewed appropriate categories of HIC's clippings.
Mr. Paisley advised the DDI that "In particular, the files main-
tained in the Historical Intelligence Collection were heavily
used." One of the analysts told me they had found "about 75"
useful articles here with which they were not familiar; per-
haps this figure is too high, but they did find several dozen
which contributed to the study.
(b)(3)
(b)(6)
5. The reason that I have detailed this background is to illustrate
my view that we are all fairly poorly prepared to undertake a crash study
of intelligence leaks against a tight deadline. The main reason is the
absence of a good, centralized data base. (I had previously found this
true in 1964, when three membersof the DDP and I were locked in a room
for two days to source Wise and Ross' Invisible Government; and,in 1966,
when I edited,and contributed,to the DDI damage assessment comments
on The New York Times series on CIA,for 21 hours straight). The present
study for the White House was comparatively easy because it entailed a
review of only two newspapers - The Times and The Post - and a com-
paratively short time-frame - 20 January 1969 to the present. It also
required no input on the Vietnam war oi Indochina. If the study, even
within the short time-frame, had had to cover all of the published leaks of
which we were aware, it would have taken much more research time to
cover the other newspaper and magazine articles which are included in the
files; at least one other clipping repository, NPIC, would have had to be
consulted.
6. One of the categories (#7) which was requested by the White
House was a comparison of the frequency and gravity of leaks in this
Annroved for Release: 2022/12/12 CO2251018
Approved for Release: 2022/12/12 CO2251018
- 5 -
Administration compared to previous Administrations. Because of the
shortness of time, we did not answer that question in the Agency's initial
reply to the White House. Here again we lack a centralized data base;
it would take a stunning number of manhours to try to work it out, given
the passage of time since the earlier leaks occurred. HIC's files would
carry a major part of that burden, I believe.
7. It would seem to me to be essential that a centralized Agency
"leak" file be created. Whenever an intelligence leak appears in the
public media9 it should be reported to such central repository with a
copy of the article, together with a statement as to the nature of the leak,
any information as to the documentation from which it came, and any
information as to possible source of the leak. It is probably best that
such a file be maintained in the Office of Security, and that all elements
of the Agency, including the DDP, should contribute to it on an all
source basis. (It might be possible to maintain such a file in Mr.
Goodwin's office, but they are not really set up for it.) HIC is an
alternative, but it is highly doubtful that DDP would report sensitive
leak situations here, and at present we are not set up for handling
material higher than COMINT. If such a permanent file is desired, it
will have to have the full backing of the Deputies and the DCI so that
every Office would be responsible for producing an annotated description
and damage assessment of leaks in the field of their particular expertise.
There is hardly anyone in the Agency capable of assessing all the leaks
without expert assistance. In this way, the Agency could keep on top
of the leak situation and evaluate it from time to time.
Walter Pforzhe mer
Curator
Historical Intelligence Collection
Attachment
White House Memo
dated 11 August 1971
re Leak Data Assessment
eV:71,7
."4
Approved for Release: 2022/12/12 CO2251018