COMMENTS ON S. 653
Document Type:
Collection:
Document Number (FOIA) /ESDN (CREST):
CIA-RDP77M00144R000800140018-3
Release Decision:
RIPPUB
Original Classification:
K
Document Page Count:
9
Document Creation Date:
December 12, 2016
Document Release Date:
December 18, 2001
Sequence Number:
18
Case Number:
Content Type:
MF
File:
Attachment | Size |
---|---|
![]() | 560.11 KB |
Body:
D
Approved For Release 2002/01/10: CIA-RDP77M0014
A
F
MB iBR NDUM FOR: Legislative Counsel
SUBJECT : Comments on S.653
j
1. This memorandum sets forth our views on S. 653, a bill to amend
Budget and Accounting Act, 1921, to provide for audits by the Ueneral Accounting
Office of expenditures by intelligence agencies of the Government. The bill
would provide that notwithstanding the provisions of section 8(b) of the
Central Intelligence Agency Act of 1949 (50 U.S.C.408j(b)) or any other pro-
visions of law, the accounts and operations of each intelligence agency shall
be audited pursuant to the provisions of this statute and under such rules
at.-id regulations as may be prescribed by the Comptroller General. The audit
would be done at the request of any Congressional committee having legislative
jurisdiction over any intelligence agency or the appropriation therefor, and a
report submitted to such requesting committee, joint committee or subcommittee.
2. Section 8(b) of the CIA Act of L1949 has provided the Director of Central
Intelligence broad authority to expend monies on his certification alone without
the usual audit by the General Accounting Office. Section $(b) states.:
(b) The sums made available to the Agency may be expended
,without regard to the provisions of law and regulations relating to
the expenditure of Government funds;"" and for objects of a con-
fidential, extraordinary, or emergency nature, such expenditures to
be accounted for solely on the certificate of the Director 4'~ and
every such certificate shall be deemed a sufficient voucher for the
amount therein certificd."
Approved For Release 2002/01/10 : CIA-RDP77M00144R000800140018-3
Approved For Release 2002/01/10 : CIA-RDP77M00144R000800140018-3
3. It is important to make clear what are and what are not the reasons
for the presence of Section 8(b), and to do this it is necessary to describe
how the intelligence function differs in its decurity requirements from other
government situations requiring protectioncf information. In most situations
it is the substantive nature of the information that requires protection. Thus,
in the military fiekis the flight chargcteristics of a fighter plane, the accuracy
of a ballistic missile,or war plans and troop movements may require protection until
such information is known to be in the hands of an enemy or is otherwise put in the
public domain. S ,r , In the diplomatic field the substance of diplomatic
negotiations may require protection to preserve important international rela-
tionships. Similarly, in the intelligence field substantive information may
also require protection as when information is obtained on enemy intentions
or capabilities which he believes are not known, thus enabling effective
counter-measures. Safequarding this type of information, however, does not
require different accounting and reporting procedures for dealing with confid-
ential funds.
4. The intelligence community, however, m#st protect another kind of
information -- intelligence sources and methods. In some situations this is
a simple problem to grasp. Thus, a secret agent operating abroad in a hostile
climate must be protected, not only so that he can continue supplying the
intelligence involved, but also becau;-e his freedom, and on vicesion, his
.
l fe, is at stake. The agent is living a false life and his cover mustCin7
inienetrable. Such things as identity cards, credit references, family
relationships, and various other details are vital to his existence. No
outsider can even guess that an apparent insignificant fact may endanger his
cover.
5. Other intelligence activities do not have such obvious security require--
menu. Foreign liaison, that is liaison with foreign intelligence and security
agencies, is extremely important in fields of both positive inteLligence and
Approv d For Release 2002/01/10 : CIA-RDP77M00144R000800140018-3
Approved For Release 2002/01/10 : CIA-RDP77M00144R000800140018-3
counter-intelligence. Such Liaisons, to be effective, depend on the confidence
of each service that the other will protect the mere fact of the relationships
as well as its sources and methods and sensitive information. Compromise of informat-
ion brings not only protests from the foreign liaison services, but in some cases,
a lessening or even cessation of their cooperation.
6. Covert action operations are by their nature complex and invlve the
covert cooperation of at least a few and occasionally a large number of personnel.
here aga4in their cooperation depends on their confidence that the intelligence
service they are aiding can protect such cooperation and again, no outsider or
one not thoroughly familiar with the activities is capable of determining what
fact, however insignificant, may expose the covert relationship with the intelligence
activity. Such exposn#e would, of course, not only negate an effort determined
by high authority to be in the national interest, but might in many cases
endanger the fortunes, liberties, or even the lives of the participants. Even
overt activities have their own security problems. Thus, many U.S. citizens and
others willing to provide sensitive information to overt intelligence unitslon
condition that their cooperation in this respect is absolutely protected.
7. In the field of technical intelligence collection, such as the intercept
of communication (COMINT), the obvious security problem is that if the foreign
country is aware that an intelligence service is able to read its com unications,
it will take measures to baffle such collection so an important source of intel-
li.gence may be lost. Less obvious aspects of the technical collection field (SIGINT).
are the need to protect new techniques of collection and to take all the necessary
and sometimes most complicated steps to put such techniques into successful operation
These may involve the most secret negotiations with foreign countries for the
establishment of secret collection sites. These countries may wish to cooperate
but cannot do so openly due to conflicting international or domestic poltical
considerations. The agreements so to cooperate must, therefore, be negotiated in
Approv d For Release 2002/01/10 : CIA-RDP77M00144R000800140018-3
Approved For Release 2002/01/10 : CIA-RDP77M00144R000800140018-3
absolute confidence , and the cooperating country will insist that the fact of its
cooperation must be protected.
8. Another technique for carrying out some of these as well as other
intelligence activities and covert operations is the use of what are called
"proprietary entities;'
9. The need for spedial protection of intelligence sources and methods
has been well recognized by officials in the Executive, Judicial, and Congressional
branches of our Governmit. For example, the Comptroller General of the United
States, Mr. Lindsay C. Warren,when requested to approve pr-opsaed legislation
which subsequently was enacted as the CIA Act of 1949 examined the provision
granting the Director of Central Intelligence the power to certify the expen-
diture of confidential funds. Mr. Warren stated that while he believed it
provided "for the grantingoS of much wider authority than I woibld ordinarily
recommend for Government agencies generally, the purposes sought to be obtained
by the establishment of the Central Intelligence Agency are believed to be of such
paramount importance as to justify the extraordinary measures proposed therein;~F
Mr. Warren went on to state that the"necessity for secrecy in such matters is
apparent and the Congress apparently recognized this fully in that it provided
in section 102(d) 3 of Public Law 253, that the Director of Central Intelligence
shall be responsible for protecting intelligence sources and methods from un-
authorized disclosure. Under these condLLtions, I do not feel called upon to
object to the proposals advanced...."
Approved F
Approved For Release 2002/01/10: CIA-RDP77M90144predates
10. Statutory authority for the employment o co
passage of the CI Act of 19/p9.
The secret journals of the Continen-A
tal Congress record numerous appropriations
nsft romilitary'expeditions
where the provisions for accounting were discretion or entirely omitted.
Section 107 of Title 31 of the United States Code, derived from
an original Act of February 9, 1793 (C. 4, Section 2, 1 Stat. 300),
permits the President to settle annually with the General Accounting
Office such appropriations for foreign intercourse or treaties as he
considers may be. made public; with respect to those which he may
think it advisable not to specify, he is authorized to direct the
Secretary of State to prepare a certificate of the amount. Such a
certificate is to be deemed.a sufficient voucher for the sum expended.
Section 107(a) of Title 31 allows the Secretary of State since
January 5, 1946, to delegate to subordinates the authority vested in
him by Section 107.
Section 108 of the same Title 31, deriving from an Act of August
29, 1916 (39 Stat. 557), established the procedure for the Secretary
of the Navy to account, without publicly disclosing, for expenditures
from appropriations for obtaining information. from home or abroad.
His certificate is to be "deemed a sufficient voucher for the sum
therein expressed to have been expended."
-~ a 7Tnr TT L.yi~A
1~. From the very beginning of World War II the need for unvouchered
expenditures grew enormously. Perhaps the best example of this need
for purposes of this study would be the experience of the Office of
Strategic Services. Originally its confidential funds were obtained
from an appropriation for the Executive Office of the President, but
later it received specific appropriations as an independent executive
agency. Obviously, only a portion of its operations were sufficiently
secret to require exception from the ordinary 'rules governing 'audit
of Government funds. For this reason, a portion of the total appro-
priation each year was earmarked for expenditure for objects of a
confidential nature, such expenditure to beaccounted
dicaresolely on
the certificate of the Director and every such
deemed a sufficient voucher for the amount therein certified. With
the cooperation of the Treasury, the Bureau of the-Budget and the
Comptroller General, this system proved workable for wartime pur-
poses.
Approved For Release 2002/01/10 : CIA-RDP77MOO144R000800140018-3
1 ApKgvt J tnC1 i7 ~c~4 3 c 'allowing use
has been exercised to such a degree that certain activities, not in themselves
sensitive but conducted solely in support of highly confidential operations, are
funded under general authorities without invoking the PCI's special authority
to make final accounting therefor.
13. All expenditures of the Agency have been and xt are still subject to the
this Agency's activities, it could have been correctly argued that all of the
funds of the Agency should be expended under the authority of Section 8(b) so that
none of them would be subject to outside audit. Nevertheless, it has been the
policy of the Agency since its creation to limit the exercise of this special
authority to those activities which in the national interest should have the
maximum security protection. To the extent possible Agency funds have been expended
under the other provisions of the let CIA Act C fa eec
eperrt ?=~^~?p ~Lnan ~varlalrr3e-tzr-i;Z4 Geiser This policy
of unvouchered expenditures. Moreover, given the close interrelation of all of
strictest kind of internal control and auditing by the Agency audit staff and
by the Office of Management and Budget. In addition, from its inception all CIA
"vouchered" expenditures were made available to and were subject to a voucher
audit by representatives of the General Accounting Office. Use of the voucher
audit procedure allowed the GAAI to examine expenditure and collection vouchers
and related documents to determine wehether expenditures are made legally and
solely for the objects for which appropriations are made. Use of'the voucher
audit procedure also allowed the CIA. to protect those activities of a confidential,
extraordinary or emergency nature.
14. Subsequent to the enactment of the CIA legislation, GAO changed its
audit procedures and adopted what it termed a "comprehensive audit approach" This
review includes' a determination that the expenditure of funds and the utilization
of property and personnel are in the furtherance only of authorized programs or
activities and that the programs and activities are conducted in an effective, eff-
Approve
Approved For Release 2002/01/10 : CIA-RDP77M00144R000800140018-3
ic:ient, and economical manner; an examination of Organization structure and
a review of Agency policies for conformance with legislative intent and
applicability to Agency activities; and includes. an examination of Agency
practices and procedures in carrying out such policies.
15. In 1959, the GAO raised with the CIA Subcommittee of the House Committee
on Armed Services the desirability of an expanded audit of Agency activities
more in line with the regular comprehensive audit approach. At the same time
the Comptroller General stated that he did "not recommend any change in section
10 (now section 8) of the Central Intelligence Agency Act" and that "any broad-
ening of our audit activities should not include an evaluation of the intelligence
activities of tie Agency." Allen Dulles, then Director of Central. Intelligence
agreed that` the GAO shold expand its current audit activities in a considerable
portion of the Agency, cautioning only that the comprehensive audit would have
to be limited so as to remain outside the area of sdnsitive security operations
for which by law the Director's certificate shall be deemed a sufficient voucher
for the amound therein certified.
16. By 1961 the Comptroller General informed the CIA Subcommittee that it
planned to discontinue the GAO audit of CIA activities. The Comptroller General
acknowledged that "various steps were taken by the CIA to place the General
Accounting Office in a position to make a comprehensive audit of the overt
activities of CIA." He stated , however, that GAO "cannot effectively review and
evaluate activities of the Support Component beca,ie the confidential and overt
activities of this compenent are integrated to such an extent that we cannot make
,reason4y comprehensive audits." He further stated "we have been given sufficient
access to ,make reasonably comprehensive reviews of the overt activities of the
Intelligence Component, but such reviews, in our opinion will not be productive
of significant evaluations because we cannot feasibly evaluate the extent to which
needed overt information is available for collection or determine the need for the
intelligence information selected for collation and use in the production of
Approvedj For Release 2002/01/10 : CIA-RDP77M00144R000800140018-3
Approved For Release 2002/01/10 : CIA-RDP77M00144R000800140018-3
intelligence reports." In short, the Comptroller General was arguing that the
philosophy underlying GAO's comprehensive audit approach woihld not tolerate a
distinction betw4en ovdrt and covert activities and expenditures.
17. Both the DCI and Mr. Vinson, ChairmanvT of the House Committee on
Armed Services requested the Comptroller General to continue to audit -thu
Agency affairs on a limited basis.
c on of As intelligence activities
and should be maintained. Also, Mr. '
McLane has
informed us that among the reorganizational steps
he has carried out is a major
comptroller and internal audit functiionsninthe the
Agency. Consequently, I believe you have met the
objectives of my letter of May 18, 1961, which
recommended that you continue your work at that time,
and since you feel confirmed in your opinion that it is
not a worthwhile effort, I am agreeable that you with-
draw from further audit activities in the Central
Intelligence Agency.
... the restrictions you met with in the Central
Intelligence Agency are necessary, I believe, for
the proper rote 4 - 4
P8* GAO continued its limited audit of CIA for about
one year. On 21 June 1962 the Comptroller General wrote
Chairman Vinson expressing his continued view that security
restrictions precluded an effective audit of CIA. The Comp-
troller General stated his belief that to conduct a maximum
effective audit, "it would be necessary to have nearly complete access to CIA a-for ctivit esGAO/ audit staff
u
that it would be possible to perform "reasonably c11 omp Yle pre h hensi e psi ed
perform reviews... if... permitted complete access to the administrative
activities, such as financial, procurement, property, and
personnel management and internal review activities that are
Performed in support of both sensitive and nonsensitive opera-
tions of CIA. {Emphasis added. )
19. Upon consideration of the audit problems as expressed
in the Comptroller General's latest letter, Chairman Vinson
agreed that GAO withdraw from further audit of CIA activities. In
a letter to the Comptroller General, which was drafted by the
Agency, Mr. Vinson said.
a vhnrn? r1 \ly A, th , p hra s 3\ot audited MA---k-,.-r-
m y 4iz~~E~ Auc!it Staff ancl~
a-, Agenci proprietar
CP Y
A
y
fir
i
Approved For Release 2002/01/10 : CIA-RDP77MOO144R000800140018-3
np ,%Fy e ,2qRCdkWhgARPPaUM9A44M0 14f W A ncy
continues to believe that GAO ought to be included in the CIA audit process.
We Agree with the views thn 31 Comp. Gen. 193L that the Director's special powers under
section 8(b) do not pertain to the normal administrative or operating problems
which confront the ordinary Government agency and each succeeding Director of
Central Intelligence has been assiduous in limiting the exercise of this speical
authority to those activities requiring special protection. As in the past,
our only concern is to protect sensitive intelligence sources and methods.
Approved F