FOR YOUR INFORMATION, I HAVE ENCLOSED A PORTION OF AN UNCLASSIFIED ADDRESS BY FORMER GENERAL COUNSEL ROBERT M. MCNAMARA, JR. BEFORE THE ABA STANDING COMMITTEE ON LAW AND NATIONAL SECURITY ON 1 DECEMBER 2000.
Document Type:
Collection:
Document Number (FOIA) /ESDN (CREST):
06230271
Release Decision:
RIPPUB
Original Classification:
U
Document Page Count:
14
Document Creation Date:
December 28, 2022
Document Release Date:
June 26, 2018
Sequence Number:
Case Number:
F-2008-01274
Publication Date:
January 7, 2002
File:
Attachment | Size |
---|---|
![]() | 652.6 KB |
Body:
Approved for Release: 2018/05/16 C06230271
OFFICE OF
CONGRESSIONAL AFFAIRS
DATE: 7 Jarman/ 2002
TO: Mr. Andrew Napoli
Office of The Honorable Christopher H. Smith
PHONE: (202) 225-3765
FAX NO.: (202) 225-7768
FROM:
PHONE:
FAX NO.
COMMENTS:
(b)(3)
For your information, I have enclosed a portion of an unclassified
address by former General Counsel Robert M. McNamara, Jr., before the ABA
Standing Committee on Law and National Security on 1 December 2000. The
document provides useful background information on unauthorized disclosure
legislation and the damage caused by unauthorized disclosures. As required
by Sec. 310 of H.R. 2883, the Intelligence Authorization Act for Fiscal Year
2002, the Attorney General, in consultation with the DCI and other heads of
U.S. government departments and agencies, is currently conducting a review of
the laws and regulations governing unauthorized disclosures and whether
modifications to law or regulation are required to prevent future unauthorized
'disclosures.
I hope this information is useful to Representative Smith in responding
to his constituents. If you need additional information or would like to speak
with me further, feel free to call me on
(b)(3)
NO. OF PAGES PLUS COVER: 5
Approved for Release: 2018/05/16 C06230271
* *
' DATE TIME ADDRESS
TRANApproved for Release: 2018/05/16 C06230271
FW-1-QMI�k JHri. r.delud 3:38PM ) * * *
TTI OFFICE OF PUBLIC AFF
MODE TIME PAGE RESULT PERS. NAME FILE
P. 1
JAN. 7. 3:35PM
202 225 7768 TES 2'29" P. 5 OK
# :
BATCH
C
:
CONFIDENTIAL
$ :
TRANSFER
P
:
POLLING
M :
MEMORY
L
:
SEND LATER
:
FORWARDING
E
:
ECM
:
STANDARD
D
:
DETAIL
F:
FINE
>
:
REDUCTION
820
Approved for Release: 2018/05/16 C06230271
LSPEEt54 ABA Nat'l Securi Dec 00.doc
Approved for Release: 2018/05/16 CO6230271
National Security Law in a Changing World:
The Tenth Annual Review of the Field
American Bar Association
Standing Committee on Law and National Security
Capital Hilton
Washington, D.C.
1-2 December 2000
Panel I: Round Table Discussion
(1 December 2000)
Survey of New Developments In National Security Law: Executive
Branch Perspectives
(Moderator: Elizabeth Rindskopf Parker. Panelists:
Jane Dalton JCS, Bob Dietz NSA GC, Bob McNamara CIA GC,
Larry Parkinson FBI GC, James Thessin DoS)
Introduction
Thank you, Elizabeth. I appreciate your warm introduction,
and am happy to serve on this panel again with my esteemed
colleagues.
I have been General Counsel of the Central Intelligence
Agency (CIA) for three years now and the issues we face remain as
challenging, if not more so, as the day I arrived. Some of the
issues we discussed last year--such as intelligence collection in
the information age, or intelligence support to war crimes
tribunals--continue to occupy much of our time and energy.
Meanwhile, additional issues have come to the forefront,
including how best to address the continuing problems of
unauthorized leaks of classified information, and the use of
intelligence to support United States law enforcement activities
abroad.
We attorneys, like the intelligence agencies we represent,
must be responsive to the enduring challenges and creative in
addressing the new ones. We have to be willing to move beyond
the "tried and true" to get to solutions that will work in the
Approved for Release: 2018/05/16 C06230271
SPEECH ABA Nat'l OO.doc
Approved for Release: 2018/05/16 C06230271
new millennium, but maintain as a constant the rule of law.
I would like to briefly discuss four issues of concern,
namely:
How to address the continuing and serious problem of leaks
of classified information
How best to support international law enforcement within the
boundaries of our own authorities
How to employ new collection technologies under the law in
the Internet era, and
How best to provide support to international war crimes
tribunals, without needlessly risking our sources or
methods in the course of multinational litigation.
Leaks
As you know, on November 4th the President vetoed the FY
2001 Intelligence Authorization Act, because of what he termed
"one badly flawed provision" on leaks. The leaks legislation was
intended to stem the tide of unauthorized leaks of classified
information that have caused serious damage to both technical and
human sources.
Over the last two years, CIA's Center for Security has
opened more than 150 investigations of alleged leaks. Although I
cannot cite specific examples, let me assure you that the lives
of covert sources have been placed in jeopardy and the
Intelligence Community's ability to collect vital intelligence
has been seriously impaired by these leaks--many of which are
simply not covered by the existing espionage laws.
As the President's veto statement made clear, he viewed the
provision as overbroad and one which would unnecessarily chill
legitimate activities. In large part, the President's concerns
were reflected by critics of the draft legislation who derided
the proposal as an attempt to enshrine into American law an
Official Secrets Act, and who claimed that such a statute was
unnecessary in light of the current espionage laws. Many
commentators also raised the specter that the Government could
subpoena a reporter in an attempt to discover the source of the
leak, and asserted that the provision would somehow
unconstitutionally infringe the freedom of the press.
Approved for Release: 2018/05/16 C06230271
SPEECH ABA Nat'l Security Dec.00.doc �\
Approved for Release: 2018/05/16 CO6230271
The Department of Justice (DoJ) had worked closely with the
Intelligence Committees and the Intelligence Community, including
the National Security Council and Department of State, to fashion
a narrowly constructed prohibition. DoJ reviewed the final
proposal and determined that it was constitutional since it was
directed only at Government employees and contractors, and there
is no constitutional right of an employee or contractor to breach
his trust and to leak classified information.
With respect to the issue of press freedom, there exists
current authority to subpoena reporters during an investigation
under 18 U.S.C. �793, however it is long-standing DoJ policy to
prevent the issue of a subpoena to a reporter without specific
approval from the Attorney General--and such an approval has
never been granted.
In the meantime, the existing laws by which the Government
may deter and punish leakers who put lives at risk remain
limited. The simple fact is that existing law protects only
information relating to the national defense, cryptographic
information, and the identities of intelligence officers and
agents. But information regarding some covert action programs,
our liaison relationships with foreign governments, intelligence
on narcotics trafficking and money-laundering, and our
counterintelligence capabilities are not protected by the terms
of the existing criminal statutes.
Administrative sanctions are not the answer. Administrative
sanctions--such as firing, reprimand or leave without pay--may be
imposed upon current government employees if they are found to
have leaked classified information. Those avenues, however, are
not available to discipline former employees or contractors.
At most, an individual's continued access to classified
information may be withdrawn--a deterrent to be sure, but an
insufficient one, especially when the leak jeopardizes the life
of an asset, compromises a sensitive foreign intelligence
relationship, or results in the loss of a critical intelligence
capability.
Clearly, any consensus on this issue will be hard to
achieve, but we must work together to find a workable solution.
Some have suggested that we limit any new statute to protect only
Sensitive Compartmented Information, which is clearly the most
closely held set of information, but any statute so limited would
exclude, for example, information derived from certain liaison
Approved for Release: 2018/05/16 C06230271
SPERM ABA Wart Security Dec 00.doc
Approved for Release: 2018/05/16 C06230271
relationships with foreign governments, details on how we
establish and run CIA proprietary companies, information on
sensitive counter-intelligence targets--each of which, if
disclosed, still can damage our ability to collect foreign
intelligence which is needed by the policymakers and the war
fighters to do their jobs.
In the course of discussions on the proposed statute, some
have suggested imposing a requirement that the Government must
prove actual harm from a disclosure in order to obtain a
conviction. I do not support that approach, for it seems to me
that the result would be to require the Government to disclose
even more classified information in order to prove its case,
thereby compounding the damage from the original leak. This
approach would also encourage defendants to attempt a "graymail"
defense. In other situations, it may not be possible immediately
to quantify the harm or to assess the damage because of the
long-term effect of the leak itself.
As an alternative to a requirement that the Government show
harm from a specific disclosure, the suggestion has been made
that the Government simply establish that the defendant intended
by the disclosure to harm the US. But intent to cause harm is
not really the issue in these types of leaks--it is the fact that
regardless of intent, these leaks, simply put, can get our
sources killed or negate our capabilities. It is little solace
to the families of those assets, or to our, national intelligence
effort, that the leaker, who often is far removed from any
appreciation of the consequences of his or her actions, did not
intend that result.
As I said earlier, we need to find a solution that both
protects properly classified information from unlawful disclosure
and ensures that the press remains free and robust. The
compromise of either of these critical values is not an
acceptable solution.
International Law Enforcement
As the world shrinks, the reach of criminal law systems of
both nations and international organizations has grown. One
trend that we expect to continue is the increase in
extraterritorial application of US criminal laws. For example,
the 1.996 Antiterrorism and Effective Death Penalty Act
criminalized certain terrorist actions no matter where in the
world they occur.
Approved for Release: 2018/05/16 C06230271
SPEECH ABA Nat'l Security Dec 00.doc
Approved for Release: 2018/05/16 C06230271
And other nations, of course, have enacted criminal laws
relating to terrorist attacks by or against their own citizens.
Our intelligence activities in this area require coordination and
cooperation with the various Federal law enforcement agencies,
especially those like the FBI that have both law enforcement and
intelligence components.
A prime example of the growing convergence of foreign (W(1 )
intelligence and international law enforcement is the work of the(b)(3)
two communities in the field of counterterrorism. As you know,
An instance in which the interaction of law enforcement and
intelligence operations became critical was the period
surrounding the Millennium celebrations in January of this year.
Just as in years past when the Olympic Games were an obvious
terrorist target, the Millennium celebrations could have
generated huge audiences for terrorist attacks. Many threats
against US citizens and interests arose around the world during
that time.
One individual was arrested by US Customs officials while
crossing the US border between Canada and the state of Washington
with bomb-making materials in his car. Others were arrested in
the Middle East by Jordan, which subsequently announced that the
persons in custody had planned attacks on popular tourist sites
there. Additional information about threats came from numerous
individual informants volunteering their knowledge.
In all these cases, the collection and evaluation of
intelligence had to be done in coordination with law enforcement
interests and authorities. The intelligence mission was to
gather and provide timely warning information to US policy makers
Approved for Release: 2018/05/16 C06230271
TLESILI A136�...laSiaatij29,919.J22_
Approved for Release: 2018/05/16 C06230271
so that future attacks could be prevented, disrupted, or
mitigated. In addition to those goals, the law enforcement
mission sought to capture and subject to criminal trial those
persons conspiring to or carrying out terrorist attacks. This
required additional efforts to preserve information for possible
use as evidence in future prosecutions.
In these areas and others where the intelligence and law
enforcement communities have had to work together to acquire
information, particularly overseas, we have had to asked
ourselves whether information is potential evidence or does it
have value as intelligence? More often now, the answer is both.
And it is critical that the information be exploited for both
purposes--we will look to prosecute past criminal acts and foil
future ones.
Fortunately, we now understand that and work to preserve the
value of what we collect to satisfy both governmental needs.
Although I cannot comment in detail about the current
investigation into the attack on the USS COLE in Aden harbor, I
can say that the same considerations are in play, as they were
during the bombings of the east African embassies in 1998.
As you all know, documentary evidence requires use of
originals. Intelligence analysis does not. You can see that in
this instance the US Government can preserve an original document
for possible evidentiary use while permitting the intelligence
community to use a duplicate to satisfy intelligence needs.
While this may seem like an obvious solution, I can tell you that
just a few short years ago, this duality was not easily
satisfied. So we have come a long way.
Countering foreign terrorists has both intelligence and law
enforcement components. We do have some statutory schemes that
erect a legal line between the two, such as the Foreign
Intelligence Surveillance Act. In an increasing number of
activities overseas, however, the complementary and overlapping
nature of the efforts are striking. Although the National
Security Act prohibits CIA from exercising any law enforcement
powers or internal security functions, it may support law
enforcement activities of other Federal agencies by providing
intelligence, expert personnel, and specialized equipment.
The FBI is a law enforcement agency. Yet it has a full
division devoted to counterterrorism that is both an avid
consumer and producer of foreign intelligence information. The
Millennium celebrations showed that international terrorist
Approved for Release: 2018/05/16 C06230271
SPEECH ABA Nat'l Security Dec 00.doc
Approved for Release: 2018/05/16 C06230271
threats do not fall into neat categories of domestic or foreign,
law enforcement or intelligence, diplomatic or military.
Countering terrorist threats is thus a seamless endeavor for much
of the US government.
Intelligence Collection in the Internet Age
2 Another issue that we are grappling with is whether the
legal and regulatory framework developed in the late 1970's and
early 1980's is sufficiently flexible to address foreign
intelligence issues that arise in the context of the new global
information infrastructure.
For years, the dual criteria of geography and status were
sufficient to dictate the rules and differentiate the
authorities. Is the person inside or outside the US; is he a US
person or not? As an example, the CIA lawfully may collect
foreign intelligence information about non-US persons overseas.
At the same time, we are prohibited by law from engaging in
technical surveillance within the United States or collecting
against US persons overseas unless the Attorney General has
approved.
In the relatively recent past, it was fairly easy to apply
these rules, by determining where the target was located and
where the information would be collected. But this is not always
the case in today's environment--electrons flow seamlessly across
borders; user identities and nationalities are often cloaked;
technical attacks against US computers may be made from
undetermined locations anywhere in the world--or the US.
Overseas attackers have been known to establish an illicit
presence on Us networks and launch attacks from overseas
locations, but masquerade as if they are attacking from sites in
the United States. Responding to these challenges can be
similarly complex, yet our statutes and regulations implementing
the Fourth Amendment's protections against unreasonable searches
and seizures are still driven by common law concepts developed in
an age when all communications relied on telephone lines and in
which geography is a critical component.
Complicating the issue of legal authority based upon
location is the fact that cyber attacks against the US
simultaneously raise issues of law enforcement and foreign
intelligence. These issues are not purely theoretical. Several
years ago, the Clinton administration was seriously considering
Approved for Release: 2018/05/16 C06230271
1PEEC4 AB,A Nat'l Secyrity Dec 00.doc
'Approved for Release: 2018/05/16 C06230271
authorizing a military response to certain actions undertaken by
Iraq. As possible US military responses were being discussed in
the media, a significant number of unclassified Department of
Defense (DoD) sites were subjected to a coordinated series of
cyberattacks. A significant number of these attacks appeared to
originate from an internet service provider in the Middle East.
DoD obviously was concerned about its ability to wage
warfare, and explored actions it legally could take to identify
and take action against the perpetrators. DoJ and the FBI wanted
to preserve the ability to prosecute the cyberattackers for what
was a clear violation of US law. The fact pattern also indicated
the possibility of state sponsorship. In that particular case,
the computer network defense community, led by DoD computer
incident response teams and by the DoJ, was able to trace the
attacks back to northern California.
The perpetrators were teenagers who suffered from a severe
case of bad timing. Despite the initial concerns, this
particular case remained almost exclusively a law enforcement
activity. However, it should be emphasized that not all attacks
are so benign; not all attackers are as easily identified; and
not all such activities fall so clearly within law enforcement's
exclusive jurisdiction.
Not only do these issues require effective deconfliction
with law enforcement, but from an Intelligence Community
perspective, it matters greatly whether a US system is under
attack by an organized foreign sponsored collection team, or by
computer savvy teenagers in the US. It is important to remember
that, even in this emerging area, we remain a government of
limited powers. The CIA specifically is not authorized to engage
in law enforcement activities.
As we work through these issues in today's
telecommunications environment, lawyers in the intelligence
community are developing close working relationship across the
community. Lawyers involved in this area also are working
closely with the operators and are becoming much more
knowledgeable on the way the global information infrastructure
works. The attorneys in my office, in close coordination with
the FBI's National Infrastructure Protection Center (NIPC), the
Department of Justice, and attorneys throughout the Intelligence
Community and DoD, are grappling with these issues on a daily
basis.
In addition to playing a role in protecting the US
Approved for Release: 2018/05/16 C06230271
3PEECH ABA Nat'l Security Dec 00.-cla
�
Approved for Release: 2018/05/16 C06230271
infrastructure, we also continue to have as our primary mission
the collection of foreign intelligence information that is of
value to high-level policy makers. The information explosion has
made collection of intelligence information much more
complicated. The sheer volume of information presents a daunting
challenge from both the collection and the processing point of
view.
Our guiding standard continues to be Executive Order 12333
and implementing regulations that have been approved by the
Attorney General. This regulatory framework governs the way in
which the intelligence community collects, processes and retains
information that may contain incidentally collected US person
information. To date, these guidelines have proven sufficiently
flexible that they remain relevant and useful notwithstanding the
changed global telecommunications environment. These remain
cutting-edge issues that will continue to make life interesting
and challenging for intelligence community lawyers for the
foreseeable future.
Support to International Tribunals
As I indicated the last two years, as international
tribunals continue to be created, we anticipate that more demands
will be made for intelligence support. Already there are
tribunals for the former Yugoslavia and Rwanda, the Scots are
trying the Lockerbie defendants as we speak, and although the
United States has not acceded, there soon will be an
International Criminal Court. There is talk of tribunals to
address war crimes issues in Iraq, Thailand, Sierra Leone,
Cambodia, and Indonesia.
The Intelligence Community's support to the US Government
effort in identifying the perpetrators of war crimes and other
atrocities in Bosnia, Kosovo, and Rwanda has been significant.
There has also been an increase in requests for information which
would assist the War Crimes Tribunals in bringing persons
indicted for war crimes to justice. Generally, these requests
for intelligence support are of three types: requests for
background information, requests for leads, and requests for
testimony and or evidence.
The nature of the requests also has changed: we now are
being asked to authorize the use of sensitive intelligence
information for trial, sometimes in the form of unclassified
products derived from our technical collection systems. We have
Approved for Release: 2018/05/16 C06230271
_VSPEECI-I-ABA Nat'l Security Dec 00.doc
-Approved for Release: 2018/05/16 C06230271
worked hard to solve the technical problems of creating products
that are both useful to the Tribunal and do not reveal
intelligence sources and methods. In this effort, we have also
had to address equally difficult legal problems. As much as we
need to support these tribunals, we may not enjoy the same
protections for our sources and methods in those settings as we
do in American courts.
While we continue to look for intelligence information that
will aid in the indictment and prosecution of war criminals, we
also are required by law to ensure that sources and methods are
protected from unlawful disclosure. All of this is being done
within the legal environment of Tribunal's rules of evidence and
practice, which, while on the one hand promise confidentiality,
also guarantee that certain information will be disclosed to the
defendants. That said, both the Scottish panel trying the
Lockerbie defendants, and the International Criminal Tribunal of
the former Yugoslavia (ICTY), have developed processes and
procedures to protect intelligence information. We are impressed
by these efforts, but note that their true effectiveness remains
to be determined.
Perhaps the most remarkable example of CIA support to a
foreign criminal tribunal is that which CIA provided to the
Scottish prosecution of the
two Libyan intelligence officers on trial for the December 1988
bombing of Pan Am Flight 103 over Lockerbie. Because the case is
ongoing, my comments have to be a bit limited.
Colin Boyd, the Lord Advocate of Scotland, has informed me
that Scottish law frowns greatly on commentary on the evidence in
a trial before that trial is concluded. I intend to honor his
wishes. The Agency has invested too much time and effort to this
case to do otherwise. Nevertheless, I can give you some detail
of what I believe to be extraordinary support the CIA has
provided in this case.
Just two weeks ago, the prosecution in the trial rested its
case. The CIA made available to the Scottish prosecution, dozens
of classified operational cables, several classified CIA
laboratory reports, and several officers as witnesses. The
laboratory reports and many of the cables were redacted for
introduction as evidence or disclosed to the defense. Several
officers and a former source have testified to date. Because of
the legal and operational security complexities, CIA assigned
lawyers and a senior Directorate of Operations officer to
support the case. All this is unprecedented.
(b)(3)
Approved for Release: 2018/05/16 C06230271
rSPEEc,'H ABA Nat'l Securit Dec 00.doc
�Approved for Release: 2018/05/16 C06230271
Page 11
The "Law of the Tribunal" is developing, and not always in a
comfortable direction. One case before the Yugoslav war crimes
tribunal is of particular interest because it raises a number of
critical issues. This last summer, the Trial Chamber issued a
very troubling opinion that would extend the Tribunal's
jurisdiction to organizations such as NATO and the UN
Stabilization Force (SFOR), would compel the production of
information by SFOR and its member States concerning the
apprehension of persons indicted for war crimes, and would compel
the testimony of senior US military personnel in their personal
capacity for matters related to their service with SFOR.
In the last year the US also had a very instructive
experience with a truly independent prosecutor. When allegations
were made against the NATO bombing campaign in Yugoslavia, we
were in the unusual and uncomfortable position of having to wait
while Carla Del Ponte, the ICTY prosecutor, conducted a
preliminary inquiry of the allegations. Fortunately, Mme. Del
Ponte concluded that no further action was required by her
office. Nonetheless, this incident was instructive and may
forecast our relationship with other international tribunals,
such as the International Criminal Court.
Our intelligence is also used in parallel public diplomatic
efforts on war crimes issues. When intelligence is used
publicly, our policymakers must be cognizant of the impact of the
public use of intelligence on war crimes prosecutions. For
instance, using intelligence information to publicize suspected
war crimes may, if the public release is premature, cause the
destruction of the very evidence necessary to prosecute those who
committed these crimes.
Finally, I should add a word of caution. Prosecutors,
whether domestic, foreign or international, have to be sensitive
to the fact that intelligence may not provide the evidence they
seek and that intelligence should not be treated as "ordinary
evidence". Although much of our intelligence may support
individual prosecutions, it remains the case that in general our
intelligence collection is designed to learn the capabilities and
intentions of nations, groups, or elements, particularly those
potentially hostile to the US.
Generally speaking, intelligence collection is not
specifically tuned to the collection of information which would
help determine individual culpability. Collection on issues of
individual culpability may occur as a by-product of our
Approved for Release: 2018/05/16 C06230271
SPEECH ABA Nat'l Security Dec 00.dwpproved for Release: 2018/05/16 C06230271
�
intelligence collection efforts, but not as their primary focus.
Also, we often do not have the full story. Consequently, our
analysis and conclusions are often based on hypothesis--supported
by facts. Although the bases for our conclusions may be
sufficient for a US policymaker to make a decision, they may fall
somewhat short of the standard of proof required in a criminal
case.
Conclusion
These issues clearly pose substantial challenges. There are
no easy solutions, and if there were, this job would be much less
interesting.
Approved for Release: 2018/05/16 C06230271