INTELLIGENCE MONOGRAPH SECRECY VS DISCLOSURE: A STUDY IN SECURITY CLASSIFICATION
Document Type:
Collection:
Document Number (FOIA) /ESDN (CREST):
CIA-RDP80-00630A000300010001-6
Release Decision:
RIPPUB
Original Classification:
C
Document Page Count:
118
Document Creation Date:
December 9, 2016
Document Release Date:
January 5, 2001
Sequence Number:
1
Case Number:
Content Type:
STUDY
File:
Attachment | Size |
---|---|
CIA-RDP80-00630A000300010001-6.pdf | 4.8 MB |
Body:
CONFIDENTIAL
Approved For Release 2001/09/04: CIA-RDP80-0063OA000300010001-6
OGC HAS
REVIEWED.
INTELLIGENCE
MONOGRAPH
A STUDY IN SECURITY CLASSIFICATION
a ~ CENTER FOR THE STUDY OF INTELLIGENCE
CENTRAL INTELLIGENCE AGENCY
TR/IM 76-06
Approved For Release 2001/09/04: CIA-RDP80-00630A000300010001-6
CONFIDENTIAL
Approved For Release 2001/09/04: CIA-RDP80-0063OA000300010001-6
THE CENTER FOR THE STUDY OF INTELLIGENCE IN OTR OPERATES
A RESEARCH AND DISCUSSION PROGRAM KEYED TO THE PROCESSES
AND FUNCTIONS OF INTELLIGENCE. THE OBJECTIVE OF THE CENTER
IS TO CONTRIBUTE TO THE PROFESSIONAL UNDERSTANDING AND
TO THE RECORD OF THE ART OF INTELLIGENCE. RESEARCH PROJECTS
ARE UNDERTAKEN BY INTELLIGENCE "FELLOWS"--VOLUNTEER
OFFICERS FROM ACROSS THE AGENCY ON FULL-TIME DETAIL TO
THE CENTER. INQUIRIES ABOUT THE CENTER PROGRAM, OR COMMENTS
ON THIS REPORT ARE INVITED BY THE DIRECTOR/CSI, EXTENSION 2193.
Classified by 031484
Exempt from general declassification schedule
of E.O. 11652, exemption category:
? 5B(2)
Automatically declassified on:
date impossible to determine
Approved For Release 2001/09/04: CIA-RDP80-0063OA000300010001-6
Approved For Release 2001/09/04: CIA-RDP80-0063OA000300010001-6
Page
INTRODUCTION
i
PRINCIPAL CONCLUSIONS AND RECOMMENDATIONS
v
DEVELOPMENT OF THE CLASSIFICATION SYSTEM
1
Criticism of the Classification System
4
THE FUNCTIONING OF CLASSIFICATION WITHIN CIA
12
Misclassification
13
Related Issues
17
Reasons for Misclassification
21
Anomalies in the Handling of Top Secret
23
Material
Exemption, Downgrading, Declassification
26
Impact of Freedom of Information and
30
Privacy Acts
Scope of Noncompliance with E.O. 11652
34
Effect of Classification on CIA
37
The Protection of Sources and Methods
42
Statutory and Constitutional Barriers
51
to Disclosure
CONCLUSIONS AND RECOMMENDATIONS
60
FOOTNOTES
80
ANNEX A - CLASSIFICATION CRITERIA
94
ANNEX B - PRINCIPAL CHANGES EFFECTED BY
102
E.O. 11652
ANNEX C - 13REAKDOWN OF THE CLASSIFICATION
105
OF THIS STUDY
Approved For Release 2001/09/04: CIA-RDP8O-0063OA000300010001-6
Approved For Release 2001/09/04: CIA-RDP80-00630A000300010001-6
CONFIDENTIAL
SECRECY VS. DISCLOSURE - A STUDY IN
SECURITY CLASSIFICATION
"We have an obligation to
provide as much information
as possible on an unclassi-
fied basis, but without
derogation of the necessity
to protect sensitive sources
and methods and to protect
information which truly
requires sensitive treatment."
Director of Central Intelligence
Guiding Ptc,ine.ipte4 6ote the
IfteUigenee Community.
INTRODUCTION
This Study is the first in a series undertaken by the
1
Center on the subject of compartmentation, the basic purpose
of which in the Agency and elsewhere is to preserve secrecy.
The principal technique for doing this, the one on which the
others repose, is the federal classification system. This
Study looks first at the historical development of classifica-
tion, seeking to isolate its endemic problems and to gain a
fresh perspective on a procedure that has become hackneyed
for most of us. The Study then focuses on classification
practices within CIA--a major factor in Agency compartmentation.
CONFIDENTIAL
Approved For Release 2001/09/04: CIA-RDP80-00630A000300010001-6
Approved For Release 2001/09/04: CIA-RDP80-00630A000300010001-6
CONFIDENTIAL
It also looks at the interrelationship of classification
and the Freedom of Information and Privacy Acts, at the
statutory protection of sources and methods, and at the
other legal barriers to the disclosure of foreign intelli-
gence information.* The preservation of secrecy through
classification and the other techniques of compartmentation
ultimately depends ors the legal power to withhold informa-
tion and to deter unauthorized disclosure.
The protection of classified information in our society
has always involved a tug of war between the conflicting
requirements of secrecy and publicity. From the earliest
days there has been conflict between the Executive and the
Legislature over Executive confidentiality. Events, moreover,
since the adoption of the present classification system in
1972--particularly Vietnam, Watergate, and various disclosures
and investigations--have intensified these historical tensions,
generating, both inside and outside the government, sharp
25X1A *The author of this Study was (DDO/AF) assisted
by the staff and fellows of t e Center for the Study of Intel-
ligence. The methodology of the Study involved interviewing key
personnel in the Agency involved with classification and related
matters and extensive research in the available literature.
Congressional hearings and studies are the most important source
of the latter. Although there have been numerous studies of
codeword compartmentation within CIA and the Intelligence
Community, we are not aware of any single, published, compre-
hensive study of the classification system done within the
Intelligence Community. We have, therefore striven for compre-
hensiveness in the Study both as a means of solving the immediate
problems at hand and of facilitating the further research of
others concerned with classification.
Approved For Release 200/:IAIfkbP80-00630A000300010001-6
Approved For Release 2OD1F/IDS:I@I[A-RDP80-00630A000300010001-6
criticism of classification practices. Whenever classification
decisions have lacked an aura of credibility for Congress and
the public, the information they protected has been vulnerable
to disclosure. No statute or Executive order has long sufficed
to protect information that Congress or the public has come to
regard as pseudo-secrets or cover-up of illegality. The amended
Freedom of Information Act (FOIA) and the Privacy Act have
brought the executive branch to the realization that in a
democracy the "right to know" of Congress and the public is
just as imperious as the "need to know" of the bureaucrat.
This counterpoint between secrecy and disclosure and, in a
closely related sense, between secrecy and publicity, is the
main theme of this Study.
The developments referred to above have led the executive
branch to reexamine the full implications of secrecy and clas-
sification. National Security Study Memorandum (NSSM) 229,
dated 16 August 1975, created an ad hoc interagency group,
under the chairmanship of the Deputy Assistant to the
President for National Security Affairs, charged with
making a comprehensive study of the classification system
and submitting, if appropriate, recommendations for the
revision of E.O. 11652 and possible legislation on the
management of classified information. Symptomatic of CIA
concern with classification problems was the establishment
on 13 January 1976 of an interagency group chaired by
Approved For Release 2@/p . RDP80-00630A000300010001-6
Approved For Release 2001/09/04: CIA-RDP80-00630A000300010001-6
CONFIDENTIAL
Dr. Edward Proctor, charged with finding "a basis for designing
a simplified classification system which will provide the neces-
sary protection of intelligence sources and methods and will
facilitate access to the results of the intelligence process
by all consumers who need the intelligence product."* Finally,
E.O. 11905, issued 18 February 1976, directed the DCI "to
establish a vigorous program to downgrade and declassify
foreign intelligence information as appropriate and consistent
with E.O. 11652."
The Center hopes that this Study will contribute to the
efforts of those officers engaged in carrying out the above
orders and will be of use to others interested in the impact
of a vital adjunct of the intelligence process within the CIA.
A summary of its principal conclusions and recommendations is
set forth in the next section. (The full text of the recom-
mendations is contained in the final section.)
In an effort to provide an independent perspective on clas-
sification problems, this Study has not been linked with the
results of the Proctor group.
Approved For Release 20019((4)E-DP80-00630A000300010001-6
Appro ADMINISTIVE01/091/RILR~0-M~OA000300010001-6
PRINCIPAL CONCLUSIONS AND RECOMMENDATIONS
Throughout the history of the classification system,
going back even to its nineteenth century precursors, certain
negative traits--overclassification, unnecessary classifica-
tion, vagueness of the classification criteria, and accumula-
tion of vast quantities of classified paper--have always been
present. Unfortunately, they are all part of the classifica-
tion experience of the CIA today. In recent years, the
negative traits have attracted public and congressional
attention and have resulted in a series of studies, regula-
tions, and reforms intended to improve the system. There
has been some improvement, but not much.
- Although recognizing the primary responsibility
of the National Security Council and the ICRC
in the area of classification, this Study recom-
mends that CIA take a leading role in the develop-
ment of classification theory and in the reform
of the present classification system. In this
sense, six recommendations are offered in the
Study for the reform of E.O. 11652.
Their principal thrust is to:
- increase the specificity of the classification
criteria,
- prevent misclassification for reasons of
administrative privacy,
- replace the ICRC with a greatly strengthened
interagency classification board,
- restrict the establishment of compartments
that have repercussions beyond the originating
department, and
ApprovecfPW; hL i/09/0 .~8W-AbP 10%'M000300010001-6
Approved For Release 2001/09/04: CIA-RDP80-00630A000300010001-6
ADMINISTRATIVE - INTERNAL USE ONLY
- raise the level of classification-consciousness
throughout the government.
The Study finds significant Agency noncompliance with
the provisions of E.O. 11652. The principal areas are over-
and unnecessary classification, excessive use of the exemp-
tion provision, and anomalous handling of Top Secret cables.
Due to bureaucratic pressures and the force of precedent,
classification errors made in the past tend to be perpetuated.
Original classifiers, who are usually busy supervisors, often
abdicate their classification responsibilities to subordinates.
The "play-if-safe" mentality is a powerful contributing factor
to overclassification. As remedies, the Study recommends:
- the establishment of a CIA Classification Board
to replace the present CIA Information Review
Committee,
- new guidance and stepped-up training in
classification,
- the beginning of classification of documents
by section or paragraph,
- the preparation of internal CIA guidelines for
de novo classification of information taken
from raw reports for use in finished intelligence,
- the handling of Top Secret cables in the same
manner as other Top Secret collateral material,
- the abolition of pre-printed Secret forms,
- a thorough review of the number and level of
authorized classifiers within the Agency,
- a new regulation on administrative privacy,
- research into means of controlling the reproduc-
tion of classified paper.
Approved FAq0?jTgqj(p
VQ9/D4rlW8(Q60,00300010001-6
Approved For Release 2001/09/04: CIA-RDP80-00630A000300010001-6
ADMINISTRATIVE - INTERNAL USE ONLY
In assessing the effect of the classification system on
day-to-day operations within CIA, the Study concludes that,
except for Top Secret, the flow of information within the
Agency, even when accompanied by overclassification, is only
slightly impeded in reaching proper users.
- But the cumulative effects of overclassification
are more insidious: Bad secrets devalue good
ones, setting in motion a process of escalating
protection for the "real" secrets which drains
the classification criteria of their prescribed
meaning.
- The regular classification categories have thus
become the underpinning for a vast superstructure
of supplementary protection. The latter includes
not only the codeword compartments, but also the
array of document control markings and the mini-
compartments employed by the Operations Directorate
to protect sources and methods.
The computer system of the Central Reference Service (CRS)
recognizes some 1400 combinations of document control markings.
The latter not only complicate retrieval of information, but
sometimes preclude it altogether when, for reasons of sensitivity,
documents are not indexed in the Agency's central reference
system.
- The Study concludes that a DDO dissemination,
stamped Secret and invested with some of the
more restrictive handling controls, probably
enjoys greater protection than the average
Top Secret collateral or Top Secret codeword
document. These access-limiting and distribu-
tion-control devices, and the special handling
devices within the DDI, have a very tangible
effect on the flow of information within the
Agency.
ADMINISTRATIVE - INTERNAL USE ONLY
Approved For Release 2001/09/04: CIA-RDP80-00630A000300010001-6
Approved For Release 2001/09/04: CIA-RDP80-0063OA000300010001-6
ADMINISTRATIVE - INTERNAL USE ONLY
- Although not taking a stand against these tech-
niques, the Study points out that the lack of
formal criteria for their use and their irregular
application sometimes deprive analysts and operators
of the information they need to do their job.
FOIA and the Privacy Act are having a significant impact
on the Agency and on the functioning of the classification
system within the Agency. The statutory and judicial aspects
of these Acts place a premium on strict compliance with the
classification and exemption provisions of E.O. 11652 and on
quick discernment of overclassification in disputed cases.
In the long run, they should have a corrective influence on
classification abuses.
After examining the origins and judicial history of the
sources-and-methods provision of the 1947 National Security
Act, the Study concludes that, as it stands, the provision is
an imperfect vehicle for protecting intelligence information
from disclosure. Other statutory and constitutional barriers
to disclosure are also examined and found wanting.
- The Study judges that the Atomic Energy Act of
1954 establishing the category of "Restricted
Data" is perhaps the most successful security
program in the government and may have value
as a paradigm for statutory protection of
foreign intelligence information.
The Study recommends, after reviewing legislative pro-
posals for establishing a statutory classification system, as
well as proposals for codifying the Espionage and related
statutes and for strengthening the sources-and-methods
Approved Re1e2QQ1,/Q9/04I lqtAE8HR6MQP0300010001-6
Approved For Release 2001/09/04: CIA-RDP80-00630A000300010001-6
ADMINISTRATIVE - INTERNAL USE ONLY
provision, that the Agency sponsor legislation amending the
sources-and-methods provision, defining it, and establishing
a new category of legally protected information, overlapping
with, but independent of, the classification system.
- It recommends finally that the DCI, acting
within the NFIB structure, create a committee
of legal experts to study the revision of the
Espionage Statutes.
Approv P I s1eI A1/0~/ RC A-RDP80-OO0630A000300010001-6 USE
Approved For Release 2001/09/04: CIA-RDP80-00630A000300010001-6
DEVELOPMENT OF THE CLASSIFICATION SYSTEM
Information has been protected in one way or another from
the very beginning of this country. The Constitutional Con-
vention of 1787 conducted its proceedings in secret, and not
until 1920 were the records of the Convention made public.
The 1775 Articles of War, and legislation since 1776, have
prohibited soldiers from corresponding with the enemy and
civilians from spying in wartime.
During the Civil War, the government suspended habeas
corpus, made numerous political arrests, and censored the
press. After the Civil War, there was a gradual recognition
of the importance of protecting military installations and
the information concerning them from the prying eyes of
foreign intelligence. Up to World War I, there was only
one "classification"--Confidential--used to designate certain
types of defense information requiring protection. But,
unlike its modern namesake, the word "Confidential" had no
prescribed meaning in terms of the contents of a document,
but was rather a means of limiting the distribution to
specified addressees or categories of addressees. Nor was
it generally used to stamp documents.
Influenced by British and French example, the American
Expeditionary Force in 1917 adopted multiple levels of clas-
sification--Secret, Confidential, For Official Circulation
1
Approved For Release 2001/09/04: CIA-RDP80-00630A000300010001-6
Approved For Release 2001/09/04: CIA-RDP80-0063OA000300010001-6
Only--which were soon incorporated in War Department Regulations.
But the use criteria for these document markings were based on
a vague determination that a given piece of information was
"more or less secret" and on a prescribed narrowing of the
addressees according to the determined level of sensitivity.
Though some see in this World War I experience the beginnings
of the present classification system, its lineaments are much
clearer in the 1936 revision of Army Regulations, No. 330-5,
where, for the first time, the levels of classification were
defined in terms of damage to national security, and the
protection of the markings was extended to non-defense
information affecting national security. The category,
Restricted, however, which had now replaced Official Use
Only, was really not a national security marking but rather
a means of ensuring administrative privacy.
Although there are no close parallels to the present
classification system in the pre-World War I period, there
are nevertheless archetypes of several closely related
security practices still in vogue today. Thus, General
Orders, No. 3 of the War Department, 16 February 1912,
prescribed these measures for safekeeping military records
concerning seacoast defenses: They were to be "classed" as
Confidential, kept under lock, given serial numbers, logged,
subject to copy control, shown only to "trusted employees"
according to the "exigencies of service." War Department
Approved For Release 2001/09/04: CIA-RDP80-0063OA000300010001-6
Approved For Release 2001/09/04: CIA-RDP80-00630A000300010001-6
Regulations of 1913 ordered double wrapping of telegrams and
other communications, with Confidential stamped on the inner
envelope only. The Chief of Artillery complained bitterly
in 1907 about the indiscriminate use of Confidential on Army
issuances, citing in particular one that contained the formula
for making whitewash. (This is perhaps the first documented
instance of "unnecessary" classification.)
While the military were protecting their secrets by means
of classification, the State Department, up to 1958, was still
relying on the "housekeeping" statute of 1789 to protect dip-
lomatic secrets. The first Executive order dealing with clas-
sification, President Roosevelt's E.O. 8381 of 1940, was
essentially a wartime measure and had no lasting influence
on classification. President Truman's E.O. 10290 authorized
any government agency to classify "official information the
safeguarding of which is necessary in the interest of national
security and which is classified for such purposes by appropriate
classifying authority." Because of the vagueness of the
"national security" standard, Truman's order was immediately
attacked as an infringement of the First Amendment.
It was superseded two years later by President Eisenhower's
E.O. 10501, issued 5 November 1953, which lasted almost twenty
years until replaced by the present system. It redefined
Confidential, Secret, and Top Secret, reduced the number of
Approved For Release 2001/09/04: CIA-RDP80-00630A000300010001-6
Approved For Release 2001/09/04: CIA-RDP80-00630A000300010001-6
agencies authorized to classify, and set a twelve-year limit,
subject to some exceptions, on maintenance of information in
the Top Secret category. President Kennedy in 1961 (E.O. 10964)
added provisions for automatic downgrading and declassification.
President Nixon ushered in the present system on 8 March 1972
with E.O. 11652 entitled, "Classification and Declassification
of National Security Information and Material."
A National Security Council Directive implementing this
Order was issued on 17 May 1972. The Order itself, which took
effect on 1 June 1972, refined the criteria for the three
levels of classification, replaced the "national defense"
formulation of E.O. 10501 with that of "national security,"
a collective term for "national defense" and "foreign relations,"
established a general declassification schedule with four
exemptions, and created an Interagency Classification Review
Committee (ICRC) to assist the National Security Council
(NSC) in monitoring the system.
Criticism of the Classification System
It is hardly an exaggeration to say that the classifica-
tion systems created by Executive order have been under almost
continuous attack by Congressional and other bodies since
their inception. The chief critic has been the House Sub-
committee on Information, established in 1955, and joined
Approved For Release 2001/09/04: CIA-RDP80-00630A000300010001-6
Approved For Release 2001/09/04: CIA-RDP80-0063OA000300010001-6
later in that role by the Senate Subcommittee on Intergovern-
mental Relations. The Freedom of Information and Privacy Acts
were by-products of this close monitoring of government secrecy.
A principal target of the House subcommittee in its early years
was the functioning of the classification system within the
Department of Defense. Reacting to Congressional pressure,
the Pentagon established the Coolidge Committee to conduct
an in-house investigation. This committee, and others since,
directed attention to shortcomings that are still evident in
classification practices today.
In its report, the Coolidge Committee concluded that the
two major shortcomings of the system at that time were over-
classification and deliberate unauthorized disclosure. The
latter was a reference to the spate of disclosures prompted
by interservice rivalry. The report found a tendency on the
part of Pentagon officials to "play-it-safe" and overclassify;
abuse of security in the classification of administrative
matters; attempts to classify the unclassifiable; confusion
stemming from classification procedures that were based on
shifting foreign policy; and a failure to declassify material
that was no longer secret.
Reflecting the security concerns of the McCarthy era,
the Congress in 1955 established a Commission on Government
Security (known as the Wright Commission) that included
Approved For Release 2001/09/04: CIA-RDP80-0063OA000300010001-6
Approved For Release 2001/09/04: CIA-RDP80-0063OA000300010001-6
classification among the subjects it investigated. The section
of the Commission's 807-page report, issued in 1957, dealing
with classification, recommended "that the Confidential clas-
sification be abolished. The Commission is convinced that
retention of this classification serves no useful purpose
which could not be covered by the Top Secret or Secret clas-
5
sification." It based this recommendation on a finding that
overuse of Confidential was impeding the free exchange of
scientific and technical information and thus hampering
national security. (As will be seen in a later section,
the abuse of Confidential then was similar to the abuse of
the Secret label now.)
The Commission urged also the enactment of legislation
making it a crime to release to an unauthorized person infor-
mation classified Secret or Top Secret, knowing it to have
been so classified, for any reason whatsoever. The bill was
aimed at persons outside the government, such as newsmen,
6
and aroused a storm of protest. Noting that there were
1.5 million employees in the government authorized to
classify documents, the Commission also recommended a major
reduction in the number of classifiers.
Meanwhile, the House Subcommittee on Information (known
as the Moss Committee after its first Chairman, Representative
John E. Moss), having finished its investigation, delivered
Approved For Release 2001/09/04: CIA-RDP80-0063OA000300010001-6
Approved For Release 2001/09/04: CIA-RDP80-00630A000300010001-6
its report in June 1958. The following excerpt is indicative
of the tenor of the report:
In a conflict between the right to know and
the need to protect true military secrets from a
potential enemy, there can be no valid argument
against secrecy. The right to know has suffered,
however, in the confusion over the demarcation
between secrecy for true security reasons and
secrecy for "policy" reasons. The proper
imposition of secrecy in some situations is
a matter of judgment. Although an official
faces disciplinary action for the failure to
classify information which should be secret,
no instance has been found of an official being
disciplined for classifying material which should
have been made public. The tendency to "play it.
safe" and use the secrecy tamp, has, therefore,
been virtually inevitable.
The committee's recommendations, many subsequently embodied in
the present E.O. 11652, called for a reduction in the number
of classifying agencies and individual classifiers, an accelera-
tion of the process of downgrading and declassifying, and
8
establishment of an appeals procedure against misclassification.
The final days of E.O. 10501 were characterized by spec-
tacular leaks and acute administrative difficulties. In
June 1971, a Top Secret study on Vietnam, the "Pentagon
Papers," was published with impunity. This was undoubtedly
the most flagrant and brazen violation of security in the
history of the American classification system. That much
of it was overclassified and that one would be hard put to
prove that the disclosure caused "exceptionally grave damage
to the nation" (to measure it against the then criterion for
Approved For Release 2001/09/04: CIA-RDP80-00630A000300010001-6
Approved For Release 2001/09/04: CIA-RDP80-00630A000300010001-6
Top Secret) is beside the point. In December 1971, there was
a leak in connection with the India-Pakistan war; in early
1972, a National Security Council memorandum revealing policy
conflicts over Vietnam war strategy appeared. All three
instances exemplify unauthorized disclosure motivated by
opposition to government policy. Their counterpart, and
perhaps their inspiration, was the executive branch practice
of selective disclosure and premeditated leaking to promote
government policy.
On the administrative side, Congressman William S.
Moorhead, the new Chairman of the Subcommittee on Government
Operations and Government Information, referred to "mountains
of classified documents" that had accumulated, contending that
"the inevitable was finally recognized in early 1971 as massive
overclassification and other abuses of the system created a
classification crisis and the virtual breakdown of our system."
Although one can doubt that the situation was as cata-
clysmic as this, it was sufficiently serious to prompt
President Nixon to appoint, on 15 June 1971, an interagency
committee charged with making a searching review of the
classification system. The committee was headed by then
Assistant Attorney General, William H. Rehnquist. After
more than a year of study, the committee, early in 1972,
presented a draft issued shortly thereafter as Executive
Order 11652.
8
Approved For Release 2001/09/04: CIA-RDP80-00630A000300010001-6
Approved For Release 2001/09/04: CIA-RDP80-00630A000300010001-6
Since the issuance of E.O. 11652, Congressional criticism
10
has made such points as the following: (These points have
figured prominently in the Congressional hearings on clas-
sification and, as we shall see further on, some of them are
reflected in proposed legislation. The Freedom of Information
and Privacy Acts, also discussed below, embody some of the
thinking implicit in these criticisms.)
- "It confuses the legal meaning of the term
'national defense' and 'national security'
and the terms 'foreign policy' and 'foreign
relations' while failing to provide an
adequate definition of these terms." (The
reference is to the use of the term "national
security" in E.O. 11652 in place of "national
defense" used in E.O. 10501 and similar wording
in Exemption (b)(1) of the Freedom of Informa-
tion Act: "matters under Executive order
required to be kept secret in the interest of
national defense or foreign policy.")
- There are no specific penalties for over-
classification and unnecessary classification.
- It permits defense and foreign policy errors
to be concealed for at least three 4-year
Presidential terms, and up to 30 years or
longer under the exemptions.
- The ICRC is not accountable to Congress.
Section 9 legitimizes and broadens authority
for the use of special categories of "clas-
sification governing access and distribution
Of classified information beyond the three
specified categories." (This refers to the
authorization of supplementary protection
such as codeword compartments and document
control markings.)
- An independent regulatory body, with admin-
istrative, enforcement, and adjudicatory
Approved For Release 2001/09/04: CIA-RDP80-00630A000300010001-6
Approved For Release 2001/09/04: CIA-RDP80-00630A000300010001-6
powers, should be established in the executive
branch to police all aspects of the classifica-
tion system.
- A statutory classification system should replace
the practice of Executive orders governing
classification.
Congressional critics of the classification system have
paid particular attention to the number of authorized clas-
sifiers. Seeing a causal connection between the expanding
volume of classified information and the number of classi-
fiers, they have demanded sharp reductions in the number of
the latter. Thus, the executive branch was induced to reduce
the number of classifiers from 1.5 million in 1957 to 55,000
in 1971, the year prior to the issuance of E.O. 11652. The
55,000 figure consisted of 2,849 Top Secret classifiers,
11
18,029 Secret, and 34,122 Confidential. (The CIA figures
for classifiers, given below, are the reverse of these, with
the Confidential category being the smallest and the Secret
the largest.)
But there is little evidence of a corresponding decline
in the birth rate of classified paper.* Actually, no one
knows the exact number of classified documents in the execu-
tive branch, not even the number of Top Secret ones. But
the order of magnitude is ascertainable. Hearings of the
*We note, however, that the ICRC Progress Report for 1975
claims a 2 percent reduction in the number of classification
actions in 1974 and 6 percent in 1975.
Approved For Release 2001/09/04: CIA-RDP80-00630A000300010001-6
Approved For Release 2001/09/04: CIA-RDP80-0063OA000300010001-6
House Subcommittee on Information in 1971 and 1972 provide some
bench marks: William G. Florence, a retired Air Force clas-
sification official, estimated that the Defense Department had
at least 20 million classified documents and was of the opinion
that 99 percent of them did not merit classification in terms
of a strict interpretation of the Executive order. A State
Department witness gave an estimate of 35 million classified
documents for his department. And Dr. James B. Rhoads, the
United States Archivist, said he was responsible for 470 million
pages of classified material covering the period 1939-1954.
It would probably be safe to say that total classified holdings
of the executive branch at this time have long since passed
the billion mark.
There are grounds, therefore, for questioning the assump-
tion that limiting the number of classifiers necessarily
restrains the accumulation of classified paper. As indicated
later in the CIA context, strong bureaucratic forces tend to
undercut this assumption.
Approved For Release 2001/09/04: CIA-RDP80-0063OA000300010001-6
Approved For Release 2001/09/04: CIA-RDP80-0063OA000300010001-6
CONFIDENTIAL
THE FUNCTIONING OF THE CLASSIFICATION SYSTEM WITHIN CIA
Our retrospective glance at the classification systems
has shown the persistence of the following negative, seemingly
ineradicable, characteristics: overclassification, unneces-
sary classification, vagueness of classification criteria,
unauthorized disclosure, and the relentless accumulation of
vast quantities of classified paper. Unfortunately, these
traits are all relevant to the classification experience of
CIA. In discussing classification within CIA,* the following
questions are addressed:
- What is the incidence of abuses of classification,
and the reasons therefor?
- How do the mandatory review provisions of E.O.
11652 affect the Agency?
- What is the impact of the Freedom of Information
and Privacy Acts on the Agency and on the func-
tioning of classification within the Agency?
To what extent, if any, has the Agency failed to
comply with the Executive order on classification?
- What is the effect of classification on the Agency?
The problem of unauthorized disclosure is considered from two
perspectives:
Faced with the problem of protecting foreign
intelligence information and preventing
unauthorized disclosure, what judicially
enforceable sanctions are available to the
Agency?
*The CIA regulation implementing E.O. 11652 is
revised 11 February 1975.
Approved For Release 2000/M EQI RPP80-00630A000300010001-6
Approved For Release ~OC'lg$/hQN pIA-RDP80-00630A000300010001-6
- What can be done within the Agency to improve
the classification system, its management, and
the protection of foreign intelligence informa-
tion from unauthorized disclosure?
Misclassification
As of 31 December 1975, the CIA had 1,975 original clas-
sifiers, broken down as follows: 553 with Top Secret authority,
1,358 with Secret, and 64 with Confidential. The fact that
the wielders of the Secret stamp are clearly in greatest demand
suggests a positive correlation between the number of Secret
classifiers (which includes also the Top Secret ones) and the
overwhelming number of collateral documents bearing that clas-
sification. Up until about two years ago when the Director
reacted against the wholesale abuse of the Secret classifica-
tion, the use of the Confidential classification was relatively
rare in the Agency. There were offices at that time where one
could not find a Confidential stamp. It had become a reflex
action to place Secret upon a piece of paper. If the officer
forgot to do it, the secretary did so automatically. Given
this automatism, which is far from being extinct, the total
number of authorized classifiers tended to have a minimal
effect on the total amount of classified paper produced.
The hierarchical bias of the Agency suggests that the 1,975
classifiers mentioned above are by and large busy supervisory
personnel who have little time to devote to the subtleties of
Approved For Release 109704 TM -RDP80-00630A000300010001-6
Approved For Release 2001/09/04: CIA-RDP80-0063OA000300010001-6
CONFIDENTIAL
the classification system. They tend to accept the decisions
of the subordinate non-classifiers. The number of de facto
classifiers, therefore, far exceeds the number of authorized
classifiers.
The problem confronting the conscientious classifier,
once he has decided that a document should be classified, is
to determine, according to the Order, whether the unauthorized
disclosure of the information could reasonably be expected to
cause: "exceptionally grave damage to the national security"
(Top Secret), or "serious damage to the national security"
(Secret), or "damage to the national security" (Confidential).
National security is viewed as a hybrid of national defense
and foreign relations. Examples are given in the Order for
Top Secret and Secret, but none for Confidential. "Examples
of 'exceptionally grave damage' include armed hostilities
against the United States or its allies; disruption of foreign
relations vitally affecting the national security; the com-
promise of vital national defense plans or complex cryptologic
and communcations intelligence systems; the revelation of sen-
sitive intelligence operations; and the disclosure of scientific
or technological developments vital to national security." A
strict application of these norms would substantially reduce
the number of Top Secret documents, both collateral and com-
partmented. Persons interviewed have cited such egregious
examples of overclassification as the following: NSA's Top
Approved For Release 2001/09/04: CIA-RDP80-0063OA000300010001-6
CONFIDENTIAL
Approved For Release 2001/09/04: CIA-RDP80-00630A000300010001-6
CONFIDENTIAL
Secret city map of Moscow; a request for a computer terminal
from one CIA component stamped Top Secret; the Top Secret
NSCID 6 dealing with COMINT which, according to an Agency
COMINT specialist, should at most be Secret.
For Secret level classification, the Order gives these
examples of "serious damage to the national security": "dis-
ruption of foreign relations significantly affecting the
national security; significant impairment of a program or
policy directly related to the national security; revelation
of significant military plans or intelligence operations; and
compromise of significant scientific or technological develop-
ments relating to national security." One of the most pro-
lific causes of abuse of the Secret classification is the
widespread use in the Agency of pre-printed forms reading:
"Secret When Filled In." This leads to such patent mis-
classification as Secret time and attendance cards, pay
roll slips, etc. for overt employees. Should the Agency
telephone book containing only the names of overt employees
be classified Secret? Would its disclosure do "serious damage"
to national security, or simply "damage," or no damage at all?
Or should it be simply labeled "Internal Use Only?"
Fitness reports, investigatory reports, the whole field
of administrative correspondence, is a fertile field for over-
classification and often unnecessary classification. In this
field, there is undoubtedly a great deal of confusion between
Approved For Release 2001/09/04: CIA-RDP80-00630A000300010001-6
CONFIDENTIAL
Approved For Release 2001/09/04: CIA-RDP80-00630A000300010001-6
CONFIDENTIAL
the legitimate needs of privacy and the classification criteria
that relate exclusively to the protection of information whose
disclosure would cause some degree of damage to national security.
The Clandestine Service has a propensity for Secret that tends
to blot out the other classifications. Some progress has been
made, it is true, in downgrading most administrative matters to
Confidential, but in the operational domain the Secret classifica-
tion is so ingrained that the use of Confidential is still rela-
tively rare. The mere presence of a cryptonym or pseudonym is
often sufficient to dictate the use of the Secret stamp. Some
analysts in both the DDI and the DDS$T have reported that it
is generally the practice in their shops to publish at the
highest level on the grounds that their high-level customers
have all the clearances and that this gives greater status to
the report. In one instance it was standard practice to
include some codeword material so that the report could be
printed the same day in a quick seventh-floor press setup,
rather than sent to the Printing Shop, which would have
entailed a delay of a day or so. This catalogue can be
concluded by noting that the Confidential NSSM 229, estab-
lishing an ad hoc group to study classification procedures,
is itself an example of unnecessary classification.
The most imprecise of the classifications is Confidential.
The Order gives no explanation of what constitutes "damage" to
national security, the criterion for Confidential. Still, it
Approved For Release 2001/09/04: CIA-RDP80-00630A000300010001-6
CONFIDENTIAL
Approved For Release X00TM n4 J RDP80-00630A000300010001-6
requires little acumen to question the appropriateness of the
Confidential classification on Credit Union statements of overt
employees. Or the use of the Confidential stamp whenever an
analyst expresses an opinion in writing. It is true that some
opinions emanating from an official source could cause damage
to our foreign relations, but it is highly unlikely that this
is routinely the case. One senior DDI officer has expressed
the view that most OCI non-codeword publications could almost
be written at the unclassified level.
But, the reader may ask, what harm is there in overclas-
sifying? The classifications all give protection, and that
is what we are seeking, is it not? Unfortunately, classifica-
tion abuses have side effects, both short-term and long-term,
which cause significant difficulties for the CIA. Before
describing these side effects, some other aspects of mis-
classification must be examined first.
Related Issues
Implicit in the description of the three levels of clas-
sification is the inherent vagueness of the classification
criteria in the Executive order and the consequent play this
offers to the subjectivity of the classifier. "The problem,"
according to Professor Stanley Futterman, "is that the clas-
sification system rests entirely on subjective decisions
13
about contingent political effect." In a section entitled
Approved For Release 11lq%piTFA -RDP80-00630A000300010001-6
Approved For Release 2001/09/04: CIA-RDP80-00630A000300010001-6
CONFIDENTIAL
"Resolution of Doubts," the NSC implementation directive for
E.O. 11652 recognizes the casuistical problems that may con-
front the conscientious classifier: "If the classifier has
any substantial doubt as to which security classification
category is appropriate, or as to whether the material should
be classified at all, he should designate the less restrictive
treatment." As early as 1961, former Defense Secretary Robert
McNamara offered a similar admonition: "...I suggest that we
14
follow this principle: when in doubt, underclassify." There
is unfortunately very little evidence that either of these
precepts has ever had a significant following.
In addition to the problems posed by the criteria as such,
the casuistry of classification must also contend with certain
esoteric aspects of secrecy itself. These revolve largely
around information that is unclassified in itself but for various
reasons, rightly or wrongly, is treated as secret. A safe
combination, not secret in itself, merits that status because
15
of what it gives access to. A Department of Defense affi-
davit given the court in connection with the "Pentagon Papers"
case against the Washington Post stated: "It is sometimes
necessary to classify a document in which no single piece or
16
part is itself classified." This is a valid point if the
organization of the material, the mosaic effect superimposed
on the unclassified pieces, meets the classification criteria.
Often, however, the argument is specious. This is particularly
Approved For Release 2001/09/04: CIA-RDP80-00630A000300010001-6
CONFIDENTIAL
Approved For Release ? Mift0 f - ~At-RDP80-00630A000300010001-6
true of lists and compilations of unclassified items. E.O. 11652
contains this injunction: "Material containing references to
classified materials, which references do not reveal classified
information, shall not be classified." One may also be skeptical
of the contention of one component of the Clandestine Service
that the subjects of certain of its sensitive reports are not
only Top Secret, but so sensitive that they cannot be included
in the index of the Central Reference Service.
There is also secrecy by proximity or relationship, what
17
has been referred to as the "layered secret." A legitimate
secret is surrounded by successive layers of secrecy. One
must in these cases verify continually that the core secret
remains a secret and that the protective layers are necessary
and kept within reasonable limits. Some aspects of overhead
reconnaissance illustrate well both the good and bad features
of the layered secret.
There is the attempt to protect what really can't be
protected: the self-revealing "secret." The launching of
the Department of Defense Program 647 Early Warning and
Surveillance Satellite is a typical example. "No declas-
sification of information regarding the operation of that
important and highly expensive vehicle has been permitted,
even though news media and a Congressional committee have
reported publicly how it functions. The system is so exten-
sive in scope that it exposes itself."
Approved For Release 2001/09/04: CIA-RDP80-00630A000300010001-6
CONFIDENTIAL
Approved For Release 2001/09/04: CIA-RDP80-00630A000300010001-6
CONFIDENTIAL
Finally, there is the "secret" which, through tacit agree-
ment between two countries, is designed to avoid confrontation.
The secret is based on political rather than security considera-
tions. The Soviet Union is aware of our overhead reconnaissance
program, just as it and the whole world is of our connection
with the Glomar Explorer. In neither case, however, does the
government officially acknowledge that connection. In the
latter cases, unlike the situation that prevailed before the
Soviets shot down the U-2 plane, the "secrets" are no longer
bilateral and related to national security, but universally
known "nonsecrets." The wisdom of the decision to avoid
official acknowledgement is not in question, but the for-
malistic use of the classification system to continue to
protect these "nonsecrets" is subversive of the system.
Although original classification for each level is in
principle limited to classifiers designated in writing for
that level by higher authority, there is no restriction on
the proliferation of classified material through carry-over
of classification from one document to another. To take an
extreme case, but not an unusual one, a classified item
representing perhaps one percent of an otherwise unclassified
document will suffice to confer its classification on the
whole document. Both the Order and the implementing directive
are rigid on this point. One can easily see the potential
for overclassification in this procedure. Typically, the
Approved For Release 2001/09/04: CIA-RDP80-00630A000300010001-6
CONFIDENTIAL
Approved For Release F%1 49Lf FAA-RDP80-00630A000300010001-6
CIA analyst producing a piece of finished intelligence will
use information from several sources and, in the process,
often paraphrase or otherwise change the form of the original
information, thus effecting in many cases a de facto sanitiza-
tion of the original material. Yet he must carry over the
original classification and give to the document the highest
classification of the incorporated elements or go through the
time-consuming process of negotiating a change of classifica-
tion with the original classifiers. This problem is compounded
by the Agency's failure to comply with those provisions of the
Order and Directive requiring that, where practicable, docu-
ments be classified by paragraph. Thus a paragraph that
deserves no classification or at most a low one would have
to be taken over bearing the high overall classification of
the document from which it was extracted. Many concerned with
this problem have come to believe that a more rational approach
would be de novo classification of. finished intelligence products.
Reasons for Misclassification
The foregoing discussion has assumed a conscientious,
rational classifier contending with the arcana of classifica-
tion and the rigidities of the present system. Such a clas-
sifier is probably the exception. The persistent phenomena
of overclassification and unnecessary classification can
only be understood in terms of the classifier beset by
Approved For Release VdcJ) T -RDP80-00630A000300010001-6
Approved For Release 2001/09/04: CIA-RDP80-00630A000300010001-6
ADMINISTRATIVE - INTERNAL USE ONLY
bureaucratic pressures and the powerful force of precedent.
Decisions made in the past tend to be perpetuated indefi-
nitely. How much easier it is to take over perfunctorily
the classification of a reference or of similar material
already published or in project files than to deliberate
each time on the degree of damage to national security.
There thus emerges what has been termed "inherited clas-
19
sification." This mindless process probably accounts
for a major portion of misclassified material.
There is also, on the part of some, an exaggerated
conception of sources and methods which tends to see almost
everything connected with the Agency as classified. The
elitism referred to above in connection with publishing for
a very select audience tends to counteract the pressure to
publish at the lowest possible level.
Why is it, one may ask, that these abuses of classifica-
tion are not corrected by the more perceptive in the Agency?
The Order enjoins that if a holder of classified information
believes "that there is unnecessary classification, that the
assigned classification is improper, or that the document is
subject to declassification under this order, he shall so
inform the originator who shall thereupon re-examine the
classification." But, in practice, this is never done.
Instead, there is a kind of vicious circle described in the
Approved fp,~Cgl l g ~~/~p9(04I 1 ~~8g-M6a$AOY00300010001-6
Approved For Release 2001/09/04: CIA-RDP80-00630A000300010001-6
CONFIDENTIAL
illustrations above, with the supervisors too often relying
on their subordinates, and the subordinates on tradition and
precedent.
The basic reason, however, the reason that subsumes all
these considerations, is that the present system is tilted
in favor of overclassification. The calculus of risk for the
classifier in over- or unnecessary classification is less than
in underclassifying. "And since everyone believes that over-
protection has less serious results than under-protection,
overclassification is tolerated and shortfalls in judgment
20
are excused." There are, it is true, pro forma instances
of persons in the Agency who have been notified that their
actions were in violation of the terms of the Order and a
few who have received an "administrative reprimand" for
21
repeated abuse, but the overall effect has been slight.
Nor has the National Security Council, charged with moni-
toring the implementation of the Order, nor the Interagency
Classification Review Committee (ICRC), created to assist
the NSC in this task, been any more successful in rooting
out misclassification. Playing-it-safe has thus become
the rule of the game.
Anomalies in the Handling of Top Secret Material
There are approximately 129,500 collateral (non-codeword)
Top Secret documents in CIA, and the Operations Directorate
Approved For Release T:IA-RDP80-00630A000300010001-6
Approved For Release 2001/09/04: CIA-RDP80-0063OA000300010001-6
CONFIDENTIAL
accounts for more than 90,000 of them. These figures relate
to documents other than cables. (For the latter there are no
reliable estimates since they are not subject to mandatory
logging and copy control.) In the neighborhood of 1100 Top
Secret collateral documents are generated by the Agency each
year. In addition, during 1975 CRS handled 444,870 codeword
disseminations, of which perhaps 20 percent, in any case
many times the number of Top Secret collateral cables, bore
the Top Secret classification.
It is anomalous that the CIA Top Secret Control Officer
has no responsibility whatsoever for Top Secret cables or
codeword material. Once a Top Secret cable leaves the Cable
Secretariat, it ceases to be the responsibility of the latter
and is not subject to centralized record keeping, as are Top
Secret collateral documents. Nor is there mandatory logging
or copy control of Top Secret material within the codeword
compartments. There is a computer program for keeping
track of Top Secret collateral material, but neither Top
Secret cables nor codeword material form part of the pro-
gram. Unlike Top Secret collateral, where the recipient
is supposed to acknowledge by his signature having seen a
document, there is generally no record of those who see code-
word material. If the often-made contention be accepted as
true that Top Secret collateral is better protected than Top
Secret compartmented information, then we have a further
anomaly: a system designed to provide supplementary protection
24
Approved For Release 2001/09/04: CIA-RDP8O-0063OA000300010001-6
CONFIDENTIAL
Approved For ReleaseCfflyfl TACiIA-RDP80-00630A000300010001-6
per Section 9 of the Order providing less rather than more.
How much protection do Top Secret collateral procedures
really provide? When followed to the letter, a considerable
degree. But there are indications of deficiency on several
fronts: First, it is not uncommon for the secretary of a
unit to sign the control sheet of the document, which is then
read anonymously by others in the unit. Copy control is often
subverted by the Xerox machine. This was particularly true
during the Congressional investigations when a considerable
number of unnumbered copies of Top Secret documents were
turned over to the committee investigators, before the prac-
tice was ended. Annual inventorying of Top Secret collateral
documents has, in the past, been somewhat erratic. Even at
present there are more than 16,000 Top Secret documents in
the Agency which can't be located.
This discussion would be incomplete without passing
reference to the pseudo-classification, "Top Secret Sensitive."
Totally devoid of any authoritative basis, its only rationale
is convenience. Circumventing the codeword compartments, it
brings together in one place all-source information in a
collateral format. The uses that have come to the attention
of this Study are the following: The daily cable summary for
the DCI (seen by nine persons in the Agency); the Intelligence
Checklest (until recently sent to five committees of Congress);
and use as a classification on codeword material released to
Approved For Release 2001/09/04: CIA-RDP80-0063OA000300010001-6
Approved For Release 2001/09/04: CIA-RDP80-00630A000300010001-6
CONFIDENTIAL
foreign chiefs of state (when authorized by the DCI on a
highly selective basis). Its proponents argue that it is
the only feasible means, in these and similar situations,
of transcending, in timely fashion, the complexity of cumula-
tive codewords and dissemination controls.
Exemption, Downgrading, and Declassification
In a totalitarian society, downgrading and declassifica-
tion of information have little or no meaning. It is only
when the ideal of an informed citizenry is accepted and acted
upon that these procedures have any chance of catching the
attention of management. The Freedom of Information Act was
passed in 1966, but was relatively ineffective until teeth
were put into it in 1974. Since February 1975, the effective
date of the amended Act, the whole subject of classification,
particularly declassification, has become an important con-
cern of U.S. Government management. The new DCI emphasized
this point on 13 May 1976 in his Guiding Principles for the
Intelligence Community: "We have an obligation to provide
as much information as possible on an unclassified basis,
but without derogation of the necessity to protect sensitive
sources and methods and to protect information which truly
requires sensitive treatment." The Privacy Act (PA), which
became effective on 27 September 1975, has also had the
effect of refining the Agency's perception of classification.
Approved For Release 200~8?/pf - TP80-00630A000300010001-6
D ENT
Approved f$h}T"A~PIVE 9fflINTERNAL USEI66RM00300010001-6
It is against this background that the conscientious clas-
sifier described above must approach another duty prescribed by
E.O. 11652. In addition to determining the degree of damage to
national security that disclosure would entail, he must gauge
how long the information will require this level of protection.
His options are these: to subscribe to the timetable of the
General Declassification Schedule (GDS), to specify a date or
an event earlier than the GDS for declassification, or, judging
that the information requires greater protection than that pro-
vided by the GDS, to exempt it from the operation of the GDS.
This he may do if the information falls into one of four
exemption categories specified in Section 5(B) of the Order
and providing he specifies the category and, unless impossible,
a date for automatic declassification. Exemption 5B(1) protects
confidential information provided by foreign governments or
international organizations; 5B(2) deals with information or
material "specifically covered by statute, or pertaining to
cryptography, or disclosing intelligence sources and methods";
exemption 5B(3), the broadest of the categories, protects
information "disclosing a plan, installation, project or
specific foreign relations matter the continuing protection
of which is essential to the national security"; exemption
5B(4) exempts information "the disclosure of which would
place a person in immediate jeopardy." (Hereafter for con-
venience we shall refer to the exemptions as El, E2, E3, and
Approved 6 1109104NNNP80 D6 PO00300010001-6
Approved For Release 2001/09/04: CIA-RDP80-00630A000300010001-6
ADMINISTRATIVE - INTERNAL USE ONLY
E4.) The Order requires that "the use of the exemption authority
shall be kept to the absolute minimum consistent with national
security requirements..."
Despite the foregoing, downgrading and declassification,
except as triggered by external requests under FOIA, PA, or
under E.O. 11652 for classification review, are relatively rare
within the Agency. This is because almost the entire classified
product of CIA is routinely exempted, usually under El and/or
23
E2. The propriety of this wholesale use of the exemption
clause is difficult to assess directly, but it is at the very
least highly suspect. When few in the Agency can recall ever
having seen a classified piece of CIA paper without E.(1), or
E2 IMPDET on it, there are grounds for doubting that the use
of the exemption authority is being kept to an absolute minimum.
The truth is that the automatism that we found in the case of
classification is even stronger and more prevalent in this
domain. Although the Order stipulates that only a Top Secret
classifier may exempt, it is commonplace throughout the Agency
for secretaries to affix E2 IMPDET to just about every clas-
sified piece of paper they type. Even granting that most of
the paper generated by the Agency deserves to be exempted,
this still leaves a large amount that doesn't, that simply
falls victim to another play-it-safe routine. There is no
gainsaying the short-run advantages of this approach, though
Approved J Ye'9/04 !TA-#MfP6f 6i0O0300010001-6
Approved For Release 2001/09/04: CIA-RDP80-00630A000300010001-6
ADMINISTRATIVE - INTERNAL USE ONLY
contrary to the Order, in terms of convenience, economy of time,
and fool-proof protection of information.
By invoking the exemption authority the classifier by-
passes the automatic downgrading timetable of the GDS (Top
Secret to Secret two full calendar years after origination,
Secret to Confidential two, Confidential to declassified six)
but, in the long run, the exempted material still comes
up against mandatory review for declassification. This may
occur at any time ten years after the date of the document's
origination, upon request of a member of the public or another
department. If the information no longer qualifies for exemp-
tion, it must be declassified. All classified information or
material 30 or more years old must be declassified also unless
the head of the originating department personally determines
in writing that the information requires continued protection
for a specified period. In both instances, the Directive
provides that, if the final departmental decision on declas-
sification is negative, a member of the public may appeal the
decision to the ICRC, and, in that case, "the burden of proof,"
the Directive adds, "is on the originating Department to show
that continued classification is warranted within the terms
of the Order."
The wholesale exemption of information, the failure to
conduct systematic reviews before retiring files to the Records
Center, and the failure to label the unclassified portions of
Approved' P ftI Re1e O'O /09/OBI:TCUNRDPP8JDOBBOA000300010001-6
Approved For Release 2001/09/04: CIA-RDP80-00630A000300010001-6
ADMINISTRATIVE - INTERNAL USE ONLY
documents--these practices have merely served to postpone
decisions that must eventually be made on destruction, historical
preservation, and declassification. With thirty-year review these
decisions come home to roost, but magnified in number and com-
plexity. For several years now a task force has been at work
culling OSS documents that have passed their thirtieth year,
and next year the first CIA documents, dating from 1947, must
be reviewed. In the time frame--1947 through 1966--there are
13,579 cubic feet of records in the Agency Archives. Since
these records are by and large segregated chronologically,
the problem is not so much finding what has to be reviewed,
as perusing thirty years later a vast accumulation of often:
unfamiliar documents and making decisions that could more
easily have been made in the past. Without belaboring the
point, it is clear that the task of the reviewer of old
Agency files would have been considerably less complicated
and less time-consuming if the files had been thinned out
periodically by downgrading and declassification, if worth-
less documents had been destroyed, and if the remaining
documents of historical interest had been sectionally
classified.
Impact of Freedom of Information and Privacy Acts
The following figures for 1975 give some idea of the
scope of the Agency's FOIA/PA program (the figures also
Approved Fri R1 tta ItLOO1/M/04 :IQI RPfi0t63g4p9O300010001-6
Approved For Release 2001/09/04: CIA-RDP80-0063OA000300010001-6
ADMINISTRATIVE - INTERNAL USE ONLY
include requests for information under E.O. 11652): 5,859
requests for information were processed; 100 persons worked
full time processing them; the more tangible costs totalled
24
$1,392,000. Since these are not full-year figures for
either FOIA or PA, the figures for 1976 will probably be
significantly higher. (The amended FOIA took effect in
February 1975 and the PA in September 1975. From February
1975 until September 1975 privacy-type requests were processed
under FOIA.)
Under the Privacy Act any American citizen or resident
alien may levy a request on CIA for information concerning
himself and, unless its disclosure would compromise sources
and methods or cause damage to national security, it must be
granted. On the other hand, anyone anywhere may request
information under the provisions of FOIA and, unless the
information falls in one of nine exempt categories, it must
be released. Six of these categories are particularly rele-
vant to CIA. Exemption (b)(1)--information properly classified
pursuant to an Executive order--in effect gives statutory
recognition to E.O. 11652,; (b)(3) exempts information
specifically exempted from disclosure by statute. The
other four, however, go considerably beyond the Order.
Thus, the following categories of information, whether clas-
sified or not, may be withheld: (b)(2)--personnel rules and
guidance;(b)(5)--records of deliberations; (b)(6)--personnel
Approve AdL ? R E01/09/101: CIA-RDP8E- 063OA000300010001-6
Approved For Release 2001/09/04: CIA-RDP80-00630A000300010001-6
ADMINISTRATIVE - INTERNAL USE ONLY
and medical files; (b)(7)--investigatory files of five speci-
fied types. These exemptions are of interest not only in their
own right, but also because they provide protection for infor-
mation that, as we have seen before, has often been erroneously
classified under E.O. 11652. Seven of the exemptions (all
except (b)(1) and (b)(3)) are discretionary in nature, but
the Attorney General has ruled that information should be with-
held only when it is "necessary or desirable in the national
interest."
Under the terms of both laws, if information is withheld
and the requestor seeks legal redress, the district court may
examine the propriety of both the classification of the infor-
mation withheld and of the exemption invoked. Section 552 (a)
(4)(B) of the FOIA declares that the district court has juris-
diction "to enjoin the agency from withholding agency records
and to order the production of any agency records improperly
withheld from the complainant. In such a case the court shall
determine the matter de novo, and may examine the contents of
such agency records in camera to determine whether such records
or any part thereof shall be withheld under any of the exemp-
tions set forth in subsection(b) of this section, and the
burden is on the agency to sustain its action."
The following table is a breakdown of the action taken
by CIA on the 5,859 requests for information processed during
Approved FA Jog qQ1, ]p9/D4r 1A E8 6%gD0300010001-6
Approvecf99 ",ML1/091%;I I RPPJR~08RQ~000300010001-6
25
1975. (The vast majority of these requests concerned, in
order, the operations Directorate, the Office of Security,
and the Office of Personnel.)
FOIA
PA
EO*
Total Final Responses during
CY1975:
5,479
196
184
a.
Granted in full
300
4
63
b.
Granted in part
428
3
88
c.
Denied in full
174
0
28
d.
No record available, etc.
4,577
189
68
*This includes requests from a member of the public or another
government department under the mandatory review provisions of
Section 5(C) of the Order.
The 886 requests granted in whole or in part involved
declassification of documents that had been classified up
through Top Secret and almost without exception exempt from
downgrading.
As of 30 September 1976, litigation stemming from requests
for information had produced these results at the district
court level: ten cases won (appeals pending on three of them),
none lost. Two dealt with the Agency's refusal to release
information concerning its budget; one with the Glomar Explorer;
one with the "Bay of Pigs"; one with Congressional documents
held by the CIA; and five with requests for information con-
tained in CIA personnel files. Commenting on these results
ADMINISTRATIVE - INTERNAL USE ONLY
Approved For Release 2001/09/04: CIA-RDP80-00630A000300010001-6
Approved For Release 2001/09/04: CIA-RDP80-00630A000300010001-6
CONFIDENTIAL
and our experience to date, an officer who follows these pro-
grams closely remarked: "We've been forthcoming, but haven't
given any secrets away."
The statutory and judicial aspects of FOIA and the Privacy
Act place a premium on strict compliance with the classifica-
tion and exemption provisions of E.O. 11652 and on discernment
of overclassification in disputed cases. The leavening effect
of FOIA/PA should eventually have a remedial influence on the
abuses of classification discussed earlier. But for the
Intelligence Community as a whole, they have created a new
environment dominated by the interaction of three powerful
26
forces: Privacy, Publicity, Secrecy. Any reform of clas-
sification must reckon with these conflicting forces and
attempt to establish a dynamic equilibrium among them.
Scope of Noncompliance with E.O. 11652
This is a convenient point at which to sum up the extent
of Agency noncompliance with the Order and its implementing
Directive and, at the same time, to consider the extent to
26a
which compliance with the Order is feasible. Unless otherwise
indicated, the references below are to sections of the Order.
- Section 1: The failure to interpret strictly
tie definitions of Top Secret, Secret, and
Confidential is the root cause of over- and
unnecessary classification in the Agency.
It does not appear that Top Secret, espe-
cially in the codeword compartments, has been
used with "the utmost restraint."
Approved For Release 2001! : CIARDP80-00630A000300010001-6
Approved For Rye"Fsg&q1TRL04 : CIA-RDP80-00630A000300010001-6
- Section 3: As we have seen, there is practically
no downgrading or declassifying until a member of
the public makes a request for information, or
until the obligatory review of thirty-year-old
documents occurs.
Section 4: This section lays down rules designed
to prevent abuses of classification. Contrary to
this section, a person is rarely held "accountable
for the propriety of the classification attributed
to him." Although the failure to enforce this
section has probably contributed to the spread of
over- and unnecessary classification, it has not
drawn in its wake, as far as we can judge, those
other abuses proscribed by this section: clas-
sifying information "in order to conceal ineffi-
ciency or administrative error, to prevent
embarrassment to a person or Department, to
restrain competition or independent initiative..."
We have seen that the Agency does not show "to
the extent practicable," which "portions" of
documents are classified and which are not
classified, as required by Section 4. The
Directive specifies: "Whenever a classified
document contains either more than one security
category or unclassified information, each
section, part or paragraph should be marked
to the extent practicable to show its clas-
sification category or that it is unclassified."
Although onerous, this requirement is hardly
infeasible. Other departments, especially
the Department of Defense, have substantially
complied with it.
Section 5: There is noncompliance on two counts:
wholesale exemption of information and failure
to declassify promptly exempted material no
longer requiring protection.
Section 6: Subsection (E): There is account-
ability for Top Secret collateral material, but
not uniformly for Top Secret codeword material;
35
CONFIDENTIAL
Approved For Release 2001/09/04: CIA-RDP80-00630A000300010001-6
Approved For Release 2001/09/04: CIA-RDP80-00630A000300010001-6
CONFIDENTIAL
there is accountability generally in trans-
mitting material outside the Agency, but not
generally for Secret and Confidential within
components. Subsection (F): There is no
systematic review of classified material "no
longer needed in current working files or for 77
reference or record purposes" for destruction.
The counterpart of such a review is the iden-
tification of material that should be preserved
and, where appropriate, marked for eventual
declassification.
- Section 7(B)(3): Based on what we have seen
above, the training and orientation programs
for employees concerned with classified infor-
mation appear inadequate; periodic reorienta-
tion programs during employment are generally
nonexistent. (Formal Agency instruction on
classification consists of: 45-60 minutes
given to new employees by the Office of Security;
about 20 minutes of a one-hour lecture also
covering the FOIA and the Privacy Act, in the
Office of Training's Operation Records I course.)
- Section VII of Directive: This section requires
each department to undertake the establishment
of a "Data Index System" for Top Secret, Secret,
and Confidential material of sufficient historical
or other value for preservation (the categories to
be approved by the ICRC). The ICRC has accepted
the AEGIS system of the Central Reference Service
as compliance with this provision. AEGIS, however,
contains only disseminated intelligence; the whole
operational product of the Agency is excluded and,
although much of the latter may not be of historical
interest, this is certainly not true of material
dealing with covert action, and many other types
of operations.
There is evidence of considerable violation of Section
VI G.(4) of the Directive which prohibits the reproduction
of Top Secret information without the consent of the originating
office.
- Section 13 (Administrative and Judicial Action):
The pro forma enforcement of the penalties
Approved For Release 2000Q4JEptAgWP80-00630A000300010001-6
Approved For ReleaseR1PB:I~l~-RDP80-00630A000300010001-6
prescribed by this section--notification and
administrative reprimand--has been noted above.
Effect of Classification on the Agency
In terms of the classification Directive and Order, there
are clearly shortcomings in the Agency's compliance. But, in
terms of the collection and production of intelligence, what
impact do our classification practices have? Do they sig-
nificantly undercut the effective performance of our mission?
One observer of the classification system has written that
there "is no threat to the Republic in the overclassification
28
of trivia." Does this dispose of the question? We have
seen that indirectly, through statutory requests for informa-
tion from members of the public, the effect on the Agency's
classification practices has been considerable; and we have
seen that henceforth review of Agency documents on their
thirtieth anniversary will be immensely complicated. But
what has been the effect on day-to-day operations? In an
organization where everyone is Top Secret-cleared, simple
classification, with the exception of Top Secret, restricts
only slightly the flow of paper. In terms of access and
storage, there is not much difference in the handling of
Secret and Confidential documents. And the relative paucity
of Top Secret collateral documents limits their quotidian
impact. In this restricted context overclassification is
probably not a "threat to the Republic."
Approved For Release o (*. 4 -RDP80-00630A000300010001-6
Approved For Release 2001/09/04: CIA-RDP80-0063OA000300010001-6
CONFIDENTIAL
There is, however, another context in which the effects,
although subtle and elusive, are cumulatively more serious.
In the long run overclassification saps the defenses of clas-
sification. Bad secrets depreciate good secrets. Thus, many
within the Agency have come to believe that Secret alone has
lost much of its meaning and some, out of zeal for security,
buttress an item requiring only the protection of Secret with
supplementary controls and markings or even find a way of
insinuating it into one of the codeword compartments. This
escalating protection accorded the "real" secrets, tends to
drain the classification criteria of their prescribed meaning.
Simple classification has become the scaffolding for
labyrinthine systems of supplementary protection. Paradoxi-
cally, the cause is not just overclassification, but also the
permissive language of Section 9 of E.O. 11652 which, as we
saw above, sanctions additional protection. In this context
we think immediately of the codeword compartments, but there
are other techniques, such as document control markings and
the mini-compartments erected by the Operations Directorate
to protect intelligence sources and methods, which are highly
29
effective and, sometimes, more so than the former.
The automatic data processing system of the Central
Reference Service (CRS) recognizes some 1400 permutations
of document control markings used in the Intelligence
30
Community or by our allies. This, despite the fact that
Approved For Release 2001/09/04: CIA-RDP80-0063OA000300010001-6
CONFIDENTIAL
Approved For Releast3R~ B Q IA-RDP80-00630A000300010001-6
DCID 1/7, dated 5 October 1975, prescribes only five restric-
tive markings: ORCON, NFIB Departments Only, NOCONTRACT,
PROPIN, and NOFORN. Of these, ORCON-"DISSEMINATION AND
EXTRACTION OF INFORMATION CONTROLLED BY ORIGINATOR"- is the
most restrictive and the most controversial. It impinges not
only on Agency customers who complain vociferously about it,
but also, to a lesser degree, on CIA producers of intelli-
gence. The markings in their totality have complicated
enormously the job of CRS. A CIA Inspector General team
concluded in a 1973 study that "the various elements of the
Agency, in observing or instituting the handling restrictions
affixed on intelligence documents, have compromised the
retrievability of a significant amount of paper by excluding
it from the Agency's central reference system. Such with-
holding has tended to assume a permanent character, without
reference to either the changing sensitivity of the particular
operation or the paper produced by it, or CRS's ability to
31
ensure the application of the most stringent controls."
Considerably more constricting are the DDO procedures
for protecting sensitive information. These include: "RYBAT"
for "highly sensitive operational correspondence," the
"Prescribed and Limited Distribution" (P and L) for "excep-
tionally sensitive material," and "Restricted Handling" (RH),
not covered by regulation but set forth in a book dispatch
Approved For Release 1Jc3 1Z A-RDP80-00630A000300010001-6
Approved For Release 2001/09/04: CIA-RDP80-00630A000300010001-6
CONFIDENTIAL
for field stations, for the most sensitive material. The
distinctive feature of the latter is that incoming traffic
is not processed by the Cable Secretariat, but held by the
32
Signal Center for pickup by designated persons. Only a
small number of persons, sometimes not more than 20 in the
Agency whose names are entered on a bigot list, have access
to RH traffic on a sensitive operation. The objective is to
protect not only the identity of the source, but the very
existence of the operation. (There has been considerable
erosion in the effectiveness of the RYBAT procedure and some
would add in that of P and L also.) Up to this point RYBAT,
P and L, and RH concern primarily the DDO. But the intelli-
gence information generated by the operations these procedures
protect must be disseminated. This, in turn, gives rise to
an array of access-limiting techniques that include multiple
source descriptions, the "Particularly Sensitive Report" that
is handcarried to addressees and receipted for, quasi-com-
partments with codewords for authorized recipients.
"Exclusive For" reports can be as restrictive or more
restrictive than P and L or RH-generated disseminations.
The IG study mentioned above estimated that between 1,500
and 3,000 reports a year emanating from P and L and RH cases
fail to reach the CRS because of sensitivity. This poses a
serious retrieval problem, since this information is usually
not indexed in CRS either.
Approved For Release 20(C'4Q/QAEAF DP80-00630A000300010001-6
Approved For Release 2001/09/04: CIA-RDP80-00630A000300010001-6
CONFIDENTIAL
Summing up, we come to the ironical conclusion that a
DDO dissemination stamped Secret and surrounded by some of
the more restrictive devices described above probably enjoys
greater protection than the average Top Secret collateral or
Top Secret compartmented document. In. contrast with simple
classification, these access-limiting and distribution-control
devices have a very palpable effect on the flow of information
within the Agency and on the production of intelligence. They
are outgrowths, at least in part, of the lack of flexibility
of the classification system and of the failure to use it
correctly. These DDO devices and the special handling ones
within the DDI and DDSFTT restrict information to small numbers
of officers, to certain classes of employees, even to certain
elements within Divisions or Offices. This is not to say that
they should not be used, but merely to emphasize that their
inevitable spotty application and the absence of formal
criteria for their use can and has led to situations in which
analysts and operators lack the information needed to do their
jobs.
Approved For ReleascC? 1I/ /MM 1J54A-RDP80-00630A000300010001-6
Approved For Release 2001/09/04: CIA-RDP80-00630A000300010001-6
ADMINISTRATIVE - INTERNAL USE ONLY
THE PROBLEM OF DISCLOSURE
The Protection of Sources and Methods
The classification system applies to the executive branch
as a whole, but the protection of "sources and methods" applies
33
to CIA in a very special, almost unique way. It overlaps
with classification, but has an independent life; it is another
means of protecting foreign intelligence information. Its
statutory basis is Section 102(d)(3) of the National Security
Act of 1947: "And provided further, that the Director of
Central Intelligence shall be responsible for protecting
intelligence sources and methods from unauthorized disclosure;
Referring back to this latter provision, Section 6 of
the CIA Act of 1949 exempts the Agency from the provisions of
any other law which requires "the publication or disclosure
of the organization, functions, names, official titles,
salaries, or numbers of personnel employed by the Agency...
Note that it is the Director personally who is charged with
the responsibility of protecting sources and methods and that
there is no explicit grant of powers to be exercised in
carrying out this responsibility. Nor is there a definition
of the scope of "sources and methods." E.O. 11652 refers
twice to "sources and methods": E2 excludes information
"disclosing intelligence sources and methods" and Section 9
Approved Fw i$q aQOM9/04 f l 8Qjg 6 Qp0300010001-6
Approve AdDWN eVT fa, f (91/091 NTERNALDUSE 08~jQff0300010001-6
authorizes supplementary protection for intelligence sources and
methods. The criteria for Top Secret and Secret mention respec-
tively "sensitive intelligence operations" and "intelligence
operations."
The origin of the "sources and methods" concept is some-
what nebulous. The earliest known references occur in military
planning papers dealing with the establishment of a "central
intelligence service." General William J. Donovan had sub-
mitted to the President in November 1944 recommendations for
a post-war intelligence service and the President had instructed
the Joint Chiefs of Staff to study them and to prepare a draft
Executive order for his signature. In a memorandum, dated
18 January 1945, the Joint Strategic Survey Committee, com-
menting on a proposed draft recommended: "With a view to
emphasizing the importance of protecting certain methods and
sources of obtaining information the following should be
added to paragraph 6 of the draft directive: 'In the inter-
pretation of this paragraph, the National Intelligence
Authority and the Central Intelligence Agency will be
responsible for fully protecting intelligence sources and
methods which, due to their nature, have a direct and highly
important bearing on military operations.'"
This wording was incorporated into the draft Executive
order that the Joint Chiefs of Staff sent to the President
Approve el 'bTr AW '2Ug1/69IDNT p 0O QA000300010001-6
Approved For Release 2001/09/04: CIA-RDP80-00630A000300010001-6
ADMINISTRATIVE - INTERNAL USE ONLY
circa 18 September 1945. The pertinent portion of paragraph 7
of the draft reads: "As approved by the National Intelligence
Authority, the operations of the departmental intelligence
agencies shall be open to inspection by the Central Intelligence
Agency in connection with its planning function. In the inter-
pretation of this paragraph, the National Intelligence Authority
and the Central Intelligence Agency will be responsible for
fully protecting intelligence sources and methods which, due
to their nature, have a direct and highly important bearing
35
on military operations." There is circumstantial evidence
that this sources-and-methods formulation may have originated,
at least indirectly, with the Navy, in particular with the
Director of Naval Communications who expressed concern that
the availability of military communications intelligence to
the Central Intelligence Agency would be detrimental to
military operations and therefore recommended inclusion in
the draft directive of language permitting each department
or agency to withhold such information if it felt that dis-
closure "will be inimical to the functions of such department
36
or agency." The sources-and-methods obligation was apparently
the result of a compromise with those in the military demanding
discretionary authority to withhold sensitive information from
CIA. In any event, it is fairly clear that the wording was
designed to ensure that CIA adequately protected military
secrets.
Approved FkliARR1d 2.QfUQ9/04I=AR%MQJ6U,63 YO~O0300010001-6
ApproveAcl ~ bQ1/09441 I-jRQ6ff-OQOR?OYA000300010001-6
"Sources and methods" were not mentioned in the CIA
sections of the draft bill sent to Congress by President
Truman in 1947. The White House felt that the CIA section
should be kept as short as possible to avoid controversy and
not jeopardize the main thrust of the bill which involved
the unification of the armed services. Congress felt other-
wise. The Central Intelligence Group accordingly submitted
to Congress its recommendations (originally sent to the White
House) containing the sources-and-methods language. As
incorporated in the 1947 Act, the latter is in the form of
a proviso, one of three provisos restricting the powers of
CIA. The other two provisos respectively deny to the Agency
police powers and, by authorizing departmental intelligence,
a monopoly in the intelligence field. Although the explicit
reference to military secrets found in the old NSSC version
is dropped, the contextual implication of the obligation to
protect sources and methods is almost that of a condition of
access to the intelligence of other departments.
However this may be, CIA legal thinking on the sources-
and-methods obligation has seen in it a significant grant
of implicit authority to the Director that goes beyond the
mere protection of classified information. "The Congress
use of the term 'sources and methods,"' writes the Assistant
General Counsel, "indicates its recognition of the existence
Approv@d*b T I2O1I0gV014'E RDJ 9-OO8 A000300010001-6
Approved For Release 2001/09/04: CIA-RDP80-00630A000300010001-6
ADMINISTRATIVE - INTERNAL USE ONLY
of a special kind of data encompassing a great deal more than
38
what is usually termed 'classified intelligence information."'
And the CIA General Counsel in a letter to Senator Muskie, dated
13 August 1974, in connection with the Senate hearings on clas-
sification, declared: "...it is conceivable that certain intel-
ligence sources and methods information would require protection
under 403(d)(3) of Title 50 [United States Code designation of
Section 102(d)(3)] even though it would not also warrant clas-
sification under the Executive order. Information protected
under that subsection, whether or not classified, is not
subject to the mandatory disclosure provisions of the Freedom
of Information Act since that Act does not apply to matters
that are specifically exempt from disclosure by statute."
From these citations two thoughts emerge: that sources-
and-methods information is not synonymous with classified
intelligence information, and that it may even embrace infor-
mation not classifiable in terms of the Executive order. It
follows that sources-and-methods information has a specific
character distinguishable from substantive intelligence
information. One might define it as embracing:
a) information or material revealing or tending to
reveal the identity and association with CIA of
any person, group, organization, or governmental
entity, whether witting or unwitting, that pro-
vides foreign intelligence information or intel-
ligence-related services, as well as the iden-
tificiation and connection with CIA of any
intelligence-producing device; and
Approved F j a 0pj1A9/04 i , L80 63 0300010001-6
Approved For Release 201/0940 $t D~g~-08H~A000300010001-6
ADMINISTRATIVE E
b) information or material revealing or tending
to reveal the means, techniques, and procedures
by which foreign intelligence is collected,
processed, and analyzed, including those used
to support and protect foreign intelligence
activities, to the extent that these means,
techniques, and procedures are subject to
countermeasures, or revelatory of intelli-
gence intentions and capabilities. It must
be broad enough to include all forms of clan-
destine activity, as well as scientific and
technical intelligence. And, of course, it
must include sources-and-methods information
furnished by foreign governments. Unlike
much other sensitive information, it is dif-
ficult to prescribe in advance the life span
of sources-and-methods information. 0
The question naturally occurs, How have the sources-and-
methods provisions fared in the courts? In the United States
v. Jarvinen, a 1952 case, the United States District Court
for the Western District, State of Washington, rejected the
argument that two CIA employees, acting on instructions from
the DCI under Section 102(d)(3), could refuse to testify in
court concerning an informant of the CIA
They were sentenced to two weeks in jail, but later received
a Presidential pardon. Because of the defective fact situa-
tion and the danger of creating an unfavorable precedent, the
Agency decided not to appeal the decision of the district
41
court.
On the other hand, in Heine v. Raus, an action filed in
1964, there was a clear vindication of the Director's role in
the protection of sources and methods. Confirming the decision
Approve~d4%i4iU4 '20'(l1/69/b4T$M DP> 0OISWA000300010001-6
Approved For Release 2001/09/04: CIA-RDP80-00630A000300010001-6
ADMINISTRATIVE - INTERNAL USE ONLY
of the Maryland District Court, the Fourth Circuit Court of
Appeals said, "action here to protect the integrity of sources
42
of foreign intelligence was explicitly directed by Congress."
Sources and methods figured also in the Marchetti case.
Although the Supreme Court had refused the government an
injunction in the "Pentagon Papers" case, the U.S. District
Court for the Eastern District of Virginia in Alexandria issued
an injunction on 18 April 1972 enjoining Victor Marchetti from
public disclosure of any intelligence information, particularly
that relating to intelligence sources and methods, and requiring
him to submit his manuscript to the CIA for review before
releasing it "to any person or corporation." The Fourth
Circuit Court of Appeals restricted the injunction to "clas-
sified information" acquired by Marchetti during his employment
by CIA.
In its final position on the Marchetti manuscript the
Agency insisted on 168 deletions. The district court upheld
only 26 of them, but, on appeal, the Fourth Circuit Court
sustained the remaining 142 deletions and remanded the case
to the district court "for such further proceedings as might
be necessary." In his opinion of 7 February 1975 the chief
judge of the Fourth Circuit Court, Judge Haynsworth, took
note of the DCI's statutory responsibility to protect sources
and methods, but based his decision on the classified nature
of the information.
Approved F MWg 29/041 PL8~~R6~QAQP0300010001-6
Approva~MF f "~ff 0l /09 f Q,E~J&FDUPS8h0-Q3$A000300010001-6
What was particularly noteworthy about the Marchetti case,
however, was the willingness of the courts, under certain narrowly
defined circumstances, to accept "prior restraint"--in this
instance, because of the contractual nature of the secrecy
43
agreement signed by Marchetti as a CIA employee.
Since December 1975 there have been at least seven cases
in which U.S. district courts have recognized the sources-and-
methods provisions of the 1947 and 1949 Acts as a statutory
basis, under exemption (b)(3) of the FOIA, for withholding
information. Moreover, in most cases the courts have accepted
testimony and affidavits rather than insisting on in camera
examination of documents. Reaffirming the legal force of the
sources-and-methods provisions, Judge William P. Gray of the
U.S. District Court for the Central District of California
declared in Stanley D. Backrack v. CIA, William Colby, a case
decided on 13 May 1976: "While there is a strong public
interest in the public disclosure of the functions of govern-
ment agencies, there is also a strong public interest in the
effective functioning of an intelligence service, which could
be greatly impaired by irresponsible disclosure." Through
the decisions of these district courts a series of precedents
is emerging which have already greatly enhanced the legal
stature of sources and methods as an independent means of
protecting intelligence information--at least in the context
of FOIA requests for information.
49
Approvaaffi RTi16I o1104614TE8W-k -633A000300010001-6
Approved For Release 2001/09/04: CIA-RDP80-00630A000300010001-6
ADMINISTRATIVE - INTERNAL USE ONLY
The Agency's experience with the Marchetti case revealed
certain weaknesses from a judicial review aspect in generalized
appeals to Section 102(d)(3) as a means of preventing the dis-
closure of sources-and-methods information. To give greater
legal solidity to future use of this Section, the Office of
the General Counsel has drawn up a catalogue of sources and
methods, hopefully broad enough and specific enough to prove
convincingly in case of litigation that a disputed piece of
information falls clearly in a category previously designated
45
by the Director pursuant to his statutory authority. Com-
plementary to this is the draft DCID (1/19) entitled "Non-
disclosure Agreements for Intelligence Sources or Methods
Information." Paragraph 1 sets forth the policy: "All
members of the Executive Branch and its contractors given
access to information containing sources or methods of intel-
ligence shall, as a condition of obtaining access, sign an
agreement that they will not disclose that information to
persons not authorized to receive it." The agreement is to
make specific reference to Section 102(d)(3), and each pro-
tected document is to bear the marking: "Warning Notice:
Sensitive Intelligence Sources and Methods Involved." When
finally implemented, these two steps should go a long way
toward filling loopholes that judicial challenges might
otherwise have found. The shortcoming of both these steps,
ADMINISTRATIVE - INTERNAL USE ONLY
Approved For Release 2001/09/04: CIA-RDP80-00630A000300010001-6
AffMd1,rlgtlease Fffi/RR/4 :11-~RE~0-00630A000300010001-6
however, is the absence of a definition of sources and methods.
A catalogue excludes what it fails to include. Undefined,
sources-and-methods information runs the risk of becoming as
jargonized and abused a concept as that of "national security."
Statutory and Constitutional Barriers to Disclosure
"American culture is a populistic culture. As
such, it seeks publicity as a good in itself.
Extremely suspicious of anything which smacks of
holding back, it appreciates publicity, not merely
as a curb on the arrogance of rulers, but as a con-
dition in which the members of society are brought
into a maximum of contact with each other. Favoring
the exposure of practically every aspect of life, it
is uneasy in the presence of those who appear to be
withholding something."46
It is against this ethos that the torrent of unauthorized
disclosures in the seventies must be viewed. These included
the "Pentagon Papers" in 1971; the Marchetti and Marks expose
in 1974; Agee's damaging book in 1975; and the Village Voice
publication of the Secret report of the House Select Committee
on Intelligence in 1976.
Besides the American penchant for publicity, disclosure
at any particular time may be triggered by such factors as a
disgruntled or disaffected member of the executive branch,
sharp cleavages in the body politic, a confrontation between
the Congress and the President, and secrets that have lost
47
their credibility. The "Pentagon Papers," which has been
referred to perversely as "citizen disclosure," belongs to
ADMINISTRATIVE - INTERNAL USE ONLY
Approved For Release 2001/09/04: CIA-RDP80-00630A000300010001-6
Approved For Release 2001/09/04: CIA-RDP80-00630A000300010001-6
ADMINISTRATIVE - INTERNAL USE ONLY
the species designed to change government policy. As such,
it has a number of precedents in our early history, although
certainly not in scale or impact. In 1795 Senator Mason of
Virginia, feeling that the people had a right to know the
terms of a treaty that Washington had laid before the Senate
in secret session, sent a copy to the Philadelphia Aurora;
Senator Tappan of Ohio did the same thing in 1844 with a
treaty calling for the annexation of Texas which President
Tyler had presented to the Senate in secret session, sending
the text to the New York Evening Post; and in 1848 the New
York Herald Tribune published the Treaty of Guadaloupe Hidalgo
ending the Mexican war, while the Senate was debating it in
48
executive session. The other three cases of recent dis-
closure illustrate the tension between publicity and secrecy
at its tautest point, that is, as it relates to covert intel-
ligence activities. In three of the four cases an essential
ingredient was a disgruntled or disaffected employee or former
employee of the executive branch.
It is striking that the compromises of classified infor-
mation in the seventies have been overwhelmingly due to public
disclosure rather than espionage. The legal defenses of secrecy,1
like the Maginot Line, have been so singlemindedly directed
against espionage that they have been repeatedly outflanked
by public disclosure. The First Amendment to the Constitution,
in severely restricting the use of "prior restraint" against F
ADMINISTRATIVE - INTERNAL USE ONLY
Approved For Release 2001/09/04: CIA-RDP80-00630A000300010001-6
Approv a -IF nfR01/0?Tf LRI O 8R 3PA000300010001-6
the press, has also been, it is true, conducive to disclosure.
In view of this situation, how much protection then do statutory
and other judicially enforceable principles provide for foreign
intelligence information?
Before there was a classification system or espionage
laws, the executive branch protected secrets by virtue of the
principle of "executive privilege." The authority for issuing
Executive orders on classification derived from the exercise
49
of this privilege. E.O. 11652 refers only indirectly to
the Espionage Statutes. The doctrine of executive privilege
is an unwritten, implicit power that is usually derived from
Article 1, Section 2 of the Constitution--the separation-of-
powers provision--and, as it relates to national security,
from the powers of the President as Commander in Chief and
as the principal representative of the State in the conduct
of foreign affairs. In the New York Times Company v. the
United States, in 1971, even while refusing to support the
government's position on the "Pentagon Papers," Justice Potter
Stewart gave a ringing affirmation of executive privilege:
"It is clear to me that it is the constitutional duty of the
executive--as a matter of sovereign prerogative and not as a
matter of law as the courts know law--through the promulgation
and enforcement of executive regulations, to protect the con-
fidentiality necessary to carry out its responsibilities in
50
the fields of international relations and national defense."
ApproAkM~VI akaiJYbol/0it$TtEPdALRt[P?O-Mb,'OA000300010001-6
Approved For Release 2001/09/04: CIA-RDP80-00630A000300010001-6
ADMINISTRATIVE - INTERNAL USE ONLY
But the extravagant claims of executive privilege in
connection with the Watergate experience and their rejection
by the Congress and the courts have made incontrovertibly
clear that the executive has no absolute power to withhold
information for national security, or any other reasons, being
subject in the exercise of executive privilege to legislative
and judicial checks and balances. Executive privilege still
remains a valid doctrine, but the courts are more likely to
support the Executive in withholding valid state secrets than
in preventing their publication once they have escaped from
51
executive control. This is certainly borne out by recent
disclosure history.
One statutory barrier to disclosure--the sources-and-
methods provisions of the 1947 and 1949 Acts--has been dis-
cussed in the preceding section. Exemption (b)(1) of the
Freedom of Information Act gives statutory sanction to the
protection of information properly classified in accordance
with an Executive order.
A particularly operative statute is the Atomic Energy
Act of 1954, which offers this definition of Restricted
Data: "all data concerning (1) design, manufacture, or
utilization of atomic weapons; (2) the production of special
nuclear material; or (3) the use of special nuclear material
in the production of energy, but shall not include data
Approved Ubi.WNAVGI B9/04L?n PQ8g&Q6?PAQ00300010001-6
Approved For SD-1 - T TIVE01/09/NT RNAL USED-B? A000300010001-6
ADMIN
declassified or removed from the Restricted Data category
pursuant to Section 142." As perhaps the most effective
security program in the government, Restricted Data merits
our attention. A unique feature of Restricted Data that
marks it off from national security information classified
under E.O. 11652 is that by law any information falling
within the definition above, no matter where it originates,
is automatically classified, or, to use the expression of
the Energy Research and Development Administration (ERDA)
52
Handbook, is "born classified." The open-ended nature
of the definition is brought within reasonable bounds by
Section 142 of the Atomic Energy Act which obliges the
Commissioners collectively to declassify all Restricted
Data that can be published without undue risk to the common
defense and security.
Sections 142(c) and 142(d) require the Department of
Defense and the AEC to determine jointly what Restricted
Data relates primarily to the military utilization of atomic
weapons; this information can then be "transclassified" and
protected as national security information. This decompart-
mented atomic information then is known as "Formerly Restricted
Data," and its passage to foreign countries, except by special
agreement, is precluded. Section 142(e) permits the trans-
classification of atomic energy information pertaining to
ADMINISTRATIVE - INTERNAL USE ONLY
Approved For Release 2001/09/04: CIA-RDP80-00630A000300010001-6
Approved For Release 2001/09/04: CIA-RDP80-00630A000300010001-6
ADMINISTRATIVE - INTERNAL USE ONLY
other countries if the Commission and the Director of Central
Intelligence jointly determine that the information is neces-
sary for the intelligence process and can be adequately pro-
tected as national security information. This flexibility,
coupled with ERDA's strict compliance with the declassifica-
tion provisions of the Act, has contributed greatly to its
success as a security program.
Next to Restricted Data, cryptographic information has
probably been the category of classified information most
successfully protected by statute. It is protected under
the Espionage Statutes, which are codified in Sections 792-
799 of Title 18 of the United States Code. Section 798 deals
with cryptographic information. It criminalizes the publica-
tion or transmission to an unauthorized person of classified
information "(1) concerning the nature, preparation, or use
of any code, cipher, or cryptographic system of the United
States or any foreign government; or ... (4) obtained by the
processes of communications intelligence from the communica-
tions of any foreign government, knowing the same to have
been obtained by such processes..." It goes on to define
"communications intelligence" as "all procedures and methods
used in the interception of communications and the obtaining
of information from such communications by other than the
intended recipients." Section 798 specifically bans
ADMINISTRATIVE - INTERNAL USE ONLY
Approved For Release 2001/09/04: CIA-RDP80-00630A000300010001-6
Approved FoIRelease 2 01/094E:RIRp 0-q 10A000300010001-6
publication of cryptologic information in unequivocal terms
and omits the "intent" criteria of culpability which weaken
the other sections. As it relates to the "procedures and
methods" of communications intelligence, this statute over-
laps to some extent with the sources-and-methods provision
of the 1947 Act.
Section 793 of the Espionage Statutes penalizes a series
of specified actions undertaken "for the purpose of obtaining
information respecting the national defense with intent or
reason to believe that the information is to be used to the
injury of the United States, or to the advantage of any
foreign nation." The underlining, which we have added, is
the guilt criterion common to this section and Section 794.
Subsection (a) of Section 794 punishes with death or imprison-
ment anyone who delivers, or attempts to deliver, to a foreign
person or government, information relating to the national
defense with the intent formulation underlined above. Sub-
section (b) imposes the same penalties on anyone who, in time
of war, "with intent that the same shall be communicated to
the enemy, collects, records, publishes, or communicates..."
information on troop movements, defense dispositions, etc.
This is the only place in the Espionage Statutes where the
"publishing" of defense information is specifically mentioned.
It is limited in its application to time of war and to com-
munications intended for the enemy. "If this intent requirement
ADMINISTRATIVE - INTERNAL USE ONLY
Approved For Release 2001/09/04: CIA-RDP80-00630A000300010001-6
Approved For Release 2001/09/04: CIA-RDP80-00630A000300010001-6
ADMINISTRATIVE - INTERNAL USE ONLY
is read to mean conscious purpose--a construction suggested by
the absence of the "reason to believe" standard used in the
culpability formulation of 794(a)--then prosecution of normal
publication under Section 794(b) is a virtual impossibility." 54
Returning to Section 793 of the Espionage Statutes, there
is no definition of "intent," "reason to believe," "damage"
or "advantage" in the guilt criterion. Although 793 is adequate
to convict a person guilty of espionage, its applicability to
55
a person who publishes defense information is less clear.
Professor Benno C. Schmidt, Jr., an authority on the Espionage
Statutes, sums up his study of them as follows:
In my reading of the Espionage Statutes, publication
of defense information not animated by a purpose to
communicate to a foreign country is not prohibited,
except for the narrow range of cryptographic infor-
mation covered by Sections 952 and 798. This reading
admittedly makes heavy use of legislative history in
construing the culpability provisions of subsections
794(b), 793(a) and 793(b). My conclusion rests also
on the belief--perhaps speculation would be a better
word--that courts will refuse to apply Sections 793(d)
and (e) to acts preparatory to publication, either by
finding some very narrow reading that conforms the
provision to the pattern of the other Espionage
Statutes, or--preferably as it seems to me--by
striking the provisions from TTitle 18 on grounds
of vagueness and overbreadth.55a
It is noteworthy that the United States did not invoke the
Espionage Statutes against the New York Times in connection
with the publication of the "Pentagon Papers."
In addition to the defects described above, the Espionage
Statutes have two other major weaknesses when viewed in terms
Approved R eg gQlVQ9/D4Y 1 ?8 p6~ ( 00300010001-6
ApprovRffrISTn$n;/D 1/09Jf,EKNA 9FA0-~W31QA000300010001-6
of the protection of intelligence information, and in particular,
the sources-and-methods information of CIA. First, the meaning
of "defense information" contained therein is probably not broad
enough to embrace the whole of sources-and-methods information
or much of foreign relations information. In Gorin v. the
United States, the Court declared: "In short, the phrase
'information connected with National Defense' as used in the
context of the Espionage Act, means broadly, secret or con-
fidential information which has its primary significance in
relation to the possible armed conflicts in which the nation
56
might be engaged." Second, proving in a court of law
"intent or reason to believe" that the information in question
was to be used to the "injury of the United States, or advantage
of a foreign nation" will often be more costly in terms of
security than the violation to be punished. Referring to
court decisions that the government must present proof of
these points to a jury, the CIA Assistant General Counsel
wrote: "These rulings have left the government in the posi-
tion of having to reveal in court the very information it is
trying to keep secret, or else not prosecute those who steal
information and use it to the injury of the nation. To
invoke the law's protection of the secret, the secret must
be told."
ADMINISTRATIVE - INTERNAL USE ONLY
Approved For Release 2001/09/04: CIA-RDP80-00630A000300010001-6
Approved For Release 2001/09/04: CIA-RDP80-0063OA000300010001-6
ADMINISTRATIVE - INTERNAL USE ONLY
CONCLUSIONS AND RECOMMENDATIONS
General
Some positive steps should be taken to re-establish the
credibility of the classification system. This thought is
implicit in the Director's recently enunciated guiding prin-
ciples for the Intelligence Community: "Improvement of the
public perception of U.S. Intelligence will be given con-
tinuing attention.... Within the constraints of legitimate
security requirements, the Intelligence Community should
strive to better public understanding of our mission and of
our product....The Intelligence Community should bexas respon-
sive as possible to Congressional inquiries. Congressional
support is essential to sustain the effectiveness of the U.S.
intelligence effort..."
A prerequisite in re-establishing the credibility of the
classification system is the reduction of secrecy to an
absolute minimum. This would have the effect of upgrading
legitimate secrets and thereby better protecting them.
"Secrecy practices which were taken for granted before
Vietnam and Watergate need to be adjusted to the processes
59
of re-establishing faith in our institutions." Although
some may dismiss the reduction of secrecy as merely hortatory
and not very practical, it is fundamental to all reform of
Approved For ReleaseR2001/09/04INCIA-RDP80-D0630kv00300010001-6
Approved MIN ReTleas j2001/091 Ff 2~P Q-Q0 A000300010001-6
the classification system. The means of achieving it are
strict construction of the classification criteria in
E.O. 11652, placing the burden of proof on the classifier,
and, in accordance with the NSC Directive, choosing the less
restrictive classification when in doubt.
In its long-standing defensive posture against the demands
of Congress and the public for its closely held secrets, the
executive branch has neglected to devote much attention to
the theory and practice of its own classification system.
Its sporadic examinations have been reactive to Congressional
pressure. As a result, the only serious ongoing study of the
classification system, although predominantly adversary in
nature, has been done by Congress in investigative hearings.
Recommendation 1
CIA should take a leading role in the government's
development of classification theory and reform of the clas-
sification system. This would promote greater Agency sensi-
tivity to the mood of Congress and the public. This recom-
mendation is made in full awareness that the National Security
Council and the Interagency Classification Review Committee
have primary responsibility in this area. The intimate con-
nection between the classification system and the protection
of foreign intelligence information justifies such an initia-
tive. Executive Order 11905 lists as a function of the DCI
Approve'&KJPl~gl LT tb6I /fl9T 4T:EC"DP8B-0D QA000300010001-6
Approved For Release 2001/09/04: CIA-RDP80-00630A000300010001-6
ADMINISTRATIVE - INTERNAL USE ONLY
ensuring "the establishment, by the Intelligence Community,
of common security standards for managing and handling foreign
intelligence systems, information and products, and for
granting access thereto."
Suggestions for Reform of E.O. 11652
Classification Criteria. Any radical reform of the present
classification system would involve redefinition of the criteria
for each level of classification. The vagueness of the criteria
has been a primary source of system abuses. A study of the
definitions employed throughout its history shows a gradual
evolution toward greater specificity. (See Annex A.) The
NSSM 229 group studying the classification system has thus
far been unable to improve the current criteria for the three
levels. It is true, of course, that no conceivable recasting
of the criteria will ever totally remove the judgmental ele-
ment from the act of classification.
On the other hand, there is nothing sacrosanct about the
three present levels of classification. At one point there
was only one classification--Confidential--and, at other
times, there have been as many as four. Some have recommended
scrapping the three existing levels and substituting a single
60
new category, Secret Defense Data. Tinkering with the three
present levels, which have existed for some twenty-five years,
is more likely, however, to generate confusion than reform.
Approved For Release 20 1109/041: IA 6 86- 696i (600300010001-6
Approve RRRM?RhQ1-"I`NTERN ALL USE ONLYA000300010001-6
In the first place, it would be costly, it would require giving
maximum protection to all information and conducting full
background investigations (now only required for Top Secret)
on all those granted access to the single level. And it
would have a disruptive effect qn agreements with our
61
Allies in which the three levels have been incorporated.
Recommendation 2
Revise the first sentence of section 1 of the Order as
follows:
a. "Official information or material which requires
protection against unauthorized disclosure in
the interest of the national defense, foreign
relations of the United States, or the protection
of foreign intelligence sources and methods
(hereinafter collectively termed "national
security") shall be classified in one of three
categories..." (The addition is indicated by
underlining.)
b. An attempt should be made to cite under the
criteria for each level of classification one
or two telling examples of what should not be
classified at that particular level, chosen
on the basis of frequent and flagrant
misclassification.
c. Under the criteria for Confidential, of what
Confidential is, examples should be provided.
Administrative Privacy. A frequent cause of over- and
unnecessary classification is the bona fide desire to protect
information falling generally in the category of "administra-
tive privacy." There is no question about the desirability
of protecting this type of information if the government is
to go about its business, but this information has nothing
Appro dYt 1PA-W'9901101/9#ElR~LRIN~0 BR~JDA000300010001-6
Approved For Release 2001/09/04: CIA-RDP80-0063OA000300010001-6
ADMINISTRATIVE - INTERNAL USE ONLY
to do with national security as defined in E.O. 11652 and
should not be classified thereunder. Such information is
amply protected from disclosure by the exemption provisions
of FOIA and, in certain specific respects, by Sections 5
and 6 of the CIA Act of 1949.
Recommendation 3
a. Insert in Section 4 of E.O. 11652 dealing with
abuses of classification a warning against the classifica-
tion of information falling in the category of "administra-
tive privacy" and reference the pertinent provisions of the
FOIA and the Privacy Act.
b. In the interest of unformity and avoidance of
misclassification, consideration should be given to the
issuance of an Executive order or NSC directive dealing
with administrative privacy and prescribing a uniform
marking for this type of material (Internal Use Only,
Administrative Use Only, etc.) dissimilar to present
national security markings. It should reference the
relevant exemptions of the FOIA.
c. Insert a caveat in the first pargraph of Section 4
of the Order warning that no information, regardless of
national security considerations, may be classified if the
activity it protects contravenes the U.S. Criminal Code, a
statute or an Executive order.
Approved Fq 1M4WRAQVQ2/04 : f4* R~0-99~3W(P300010001-6
Approve r ~Lr ?~~11091P4TLyNALDUSE 08~1(A000300010001-6
Monitoring the Effectiveness of the Classification System.
Section 7 of the Order provided for the establishment of
the ICRC to assist the National Security Council in monitoring
the classification system. The Committee consists of repre-
sentatives of the seven principal agencies, including CIA,
concerned with classification. It has a permanent staff of
eight persons. By and large the Committee has been ineffec-
tive in preventing abuses of classification and has not pro-
vided dynamic leadership to the executive branch in the field
of classification theory and practice. This is no fault of
the members, but rather of the part-time nature of the assign-
ment, of the heavy responsibilities each member continues to
exercise in his parent organization, and of the inability of
the members to act independently of the organizations they
62
represent. The NSC directive implementing E.O. 11652 imposed
on the classifying departments and agencies the onerous task of
forwarding to the ICRC five types of quarterly reports. What-
ever utility these reports may have, one annual report would
probably provide it. There is need for a strong independent
body in the executive branch to monitor the classification
system and the codeword compartments.
Recommendation 4
Amend Section 7 of the Order and Section IX of the
Directive as follows:
ApprovaRIA~ T IY( 01709I/6X~&fi R a- abA000300010001-6
Approved For Release 2001/09/04: CIA-RDP80-00630A000300010001-6
ADMINISTRATIVE - INTERNAL USE ONLY
Abolish the ICRC and establish in its place a
quasi-judicial board with investigative powers.
Its membership would consist of senior officers
from the Departments of State, Defense, and
Justice, the Energy Research and Development
Administration, the Central Intelligence Agency,
the National Security Council Staff, and a
chairman designated by the President. The
members would serve for at least two years,
and would not represent their parent organiza-
tions. The Board, responsible only to the NSC,
would have cognizance in all matters relating
to security classification, and the FOIA and
the Privacy Act as they impinge on the clas-
sification system.
Special Departmental Arrangements. Section 9 of the
Order authorizes originating departments to impose special
requirements with regard to access, distribution, and pro-
tection of classified information. This is the charter for
the codeword compartments and the plethora of dissemination
and other controls that have proliferated in the Intelligence
Community. Where these arrangements have repercussions beyond
the originating department (as is generally the case), there
should be some form of central supervision and control over
departmental initiatives. Their inhibiting effect on the
flow of information is imcomparably greater than that of
simple classification.
Recommendation 5
Amend Section 9 of the Order and VI F of the Directive
to require the concurrence of the Director of Central
Intelligence whenever an NFIB member establishes a compartment
Approved For Release zv~~lI 9/04 MITAE- 80 3 X60300010001-6
Approv pd o R r leaass 2001/09/04: CIA--RDU80 00630A000300010001-6
that inhibits the flow of information to other members of the
Intelligence Community.
Sanctions for Noncompliance with the Order
Historically, the principal shortcoming of the classifica-
tion systems has been the lack of credible, deterring sanctions
against abuses and unauthorized disclosure. This explains the
repetitive nature of the criticisms aimed at the various sys-
tems. Still, we are forced to the conclusion that, by and
large, the proximate cause of the failure of the sanctions
prescribed by the Order to deter abuses is not so much the
weakness of the penalties, as their sporadic imposition.
As far as overclassification is concerned, we have seen
that the system is tilted in favor of overclassification. If
management wishes to, however, it should not be more difficult
to make people classification-conscious than cost-conscious.
One Agency critic of the Order has charged that undue
importance is given to the number of persons authorized to
classify. This has had the effect of forcing busy, higher-
level people to make decisions that they do not have time to
make. They, therefore, accept uncritically the decisions of
subordinates. He sees in this a "forced pattern of non-com-
63
pliance." The rationale behind limiting the number of
classifiers was to reduce the amount of classified paper.
As noted, this has had little effect on the volume of
ADMINISTRATIVE - INTERNAL USE ONLY
Approved For Release 2001/09/04: CIA-RDP80-0063OA000300010001-6
Approved For Release 2001/09/04: CIA-RDP80-00630A000300010001-6
ADMINISTRATIVE - INTERNAL USE ONLY
classification material within the Agency. Consideration
should perhaps be given to increasing selectively the number
of classifiers in certain components, but only as part of an
overall revamping of classification practices.
Recommendation 6
Add to Section 13(A) of the Order a requirement that
supervisors rate all classifying officers on their knowledge
and exercise of the classifying function. It is recommended
that CIA adopt this practice independently.
CIA Management of Classification
In the section dealing with the functioning of the clas-
sification system within CIA, certain abuses, anomalies, and
nonconformity with certain provisions of E.O. 11652 were noted.
The interaction of FOIA and the Privacy Act with the classifica-
tion system was also examined. Although no evidence was found
of the use of classification to conceal inefficiency or admin-
istrative error, various investigations of the Agency, internal
and external, have shown that classification served in some
instances to conceal illegality, often perceived as such only
retrospectively. There has emerged from the investigations
what might be termed the doctrine of the "valid secret." To
be valid, a secret, even if properly classified in accordance
with the national security criteria, must not be tainted by
ADMINISTRATIVE - INTERR~~AAII~
Approved For Release 2001/09/04: CIA-RDP80U0 63BW0300010001-6
Approved For Release 2001/09/04: CIA-RDP80-00630A000300010001-6
ADMINISTRATIVE - INTERNAL USE ONLY
illegality, which has the effect of nullifying the classifica-
tion. As remedial steps in countering CIA noncompliance with
the Order, eight steps under the recommendation below are
offered.
Recommendation 7
To correct the abuses, to provide centralized direction
of classification and related matters, to monitor compliance
with E.O. 11652 in the future, and to develop a body of doc-
trine, it is recommended that a CIA Classification Board,
with the following features be established:
a. A five-member board of senior officers
directly responsible to the Deputy
Director of CIA. The members would
serve full-time for tours of at least
two years. Each Directorate would name
a member; the chairman would be appointed
by the DCI. The members would not repre-
sent their parent organizations, nor be
answerable to them for their decisions.
b. The Board would have investigative,
adjudicatory, and research functions
within the limits of its responsibilities.
c. The Board would replace the p6jsent CIA
Information Review Committee.
d. Besides monitoring compliance with E.O. 11652,
the Board would provide policy guidance to
the office dealing with FOIA and the Privacy
Act, to the Special Security Center, and to
the Systems Classification Branch in the
Office of Joint Computer Services. It
would monitor the operation of the codeword
compartments within CIA. Its concurrence
would be required on the establishment of
ADMINISTRATIVE - INTERNAL USE ONLY
Approved For Release 2001/09/04: CIA-RDP80-00630A000300010001-6
Approved For Release 2001/09/04: CIA-RDP80-00630A000300010001-6
ADMINISTRATIVE - INTERNAL USE ONLY
any compartment, control, or marking affecting
the flow of information beyond the originating
Directorate.
e. The Board would prepare handbooks, and guides
on classification, declassification, sanitiza-
tion, and decompartmentation as these matters
fall within the province of CIA.
f. The Board would serve as a central clearing
office for information on formal and informal
compartmentation, providing guidance to
researchers and others on special clearances
required to gain access to information needed
to do their job. For this purpose, the Board
would be briefed on every compartment existing
within the Intelligence Community which is
relevant to the mission of CIA.
The Board would be provided with a small
permanent secretariat designed to provide
research and secretarial support.
Recommendation 8
a. A handbook dealing with not only the basics, but
also the more subtle aspects of classification, its inter-
relationships with FOIA and the Privacy Act, should be
prepared. The ERDA handbook on classification could serve
as a model.
b. There is need to establish training programs on
classification, FOIA, and the Privacy Act, especially for
original classifiers. A program of periodic reorientation
of employees on classification, as required by the Order,
should be instituted.
ADMINISTRATIVE - INTERNAL USE ONLY
Approved For Release 2001/09/04: CIA-RDP80-00630A000300010001-6
Approved For Release 2001/09/04: CIA-RDP80-00630A000300010001-6
ADMINISTRATIVE - INTERNAL USE ONLY
Recommendation 9
a. A beginning should be made on compliance with that
section of the Order enjoining classification by portion or
paragraph, where feasible. This would facilitate declassifica-
tion and minimize overclassification in those cases where infor-
mation is extracted and incorporated in other reports. (It
should be noted that at the present time cabled intelligence
summaries prepared by OCI are classified by paragraph.)
b. In addition to paragraph marking, an attempt should
be made to devise guidelines that would permit de novo clas-
sification, under specified conditions, of information extracted
from raw reports for incorporation in finished intelligence.
Recommendation 10
Top Secret cables should be handled in the same manner
as other Top Secret collateral material once they leave the
Cable Secretariat and should be brought under the supervision
of the Top Secret Control Officer. The problem of better
control of Top Secret codeword material requires further study.
Recommendation 11
Pre-printed forms marked; Secret When Filled In, are
a prime cause of overclassification. They should be abolished
and replaced with forms that offer other classification options,
including Unclassified.
71
ADMINISTRATIVE - INTERNAL USE ONLY
Approved For Release 2001/09/04: CIA-RDP80-00630A000300010001-6
Approved For Release 2001/09/04: CIA-RDP80-00630A000300010001-6
ADMINISTRATIVE - INTERNAL USE ONLY
Recommendation 12
There should be a thorough review, at least annually,
of the number and level of classifiers required by each com-
ponent. Both the tables of organization upon which the alloca-
tion of original classifiers is usually based and the lists of
authorized classifiers appear in need of updating. Selective
increases in the number of classifiers seem warranted in some
components. These increases could probably be offset by
removing from the lists those who exercise their classifica-
tion authority infrequently or not at all. To dispel con-
fusion in the minds of many officers, those authorized to
classify should be reminded of the level at which they are
authorized to classify at least annually and those whose
authorization has been terminated should be notified immediately.
Recommendation 13
A regulation should be issued on the handling of infor-
mation falling in the category of "administrative privacy."
It should reference the pertinent provisions of FOIA and the
Privacy Act. It should prescribe uniform marking and pro-
tection for this information, emphasizing that it should not
be classified under E.O. 11652 unless it has unmistakable
claims to this protection in terms of national security
and/or the protection of sources and methods. (Section 8f
of CIA Regulation dealing with dissemination controls
ADMINISTRATIVE - INTERNAL USE ONLY
Approved For Release 2001/09/04: CIA-RDP80-00630A000300010001-6
Approv-.ri A?~ T RRI109 C1AARhD6pp-OM~~A000300010001-6
for foreign intelligence, lists as additional controls: CIA
Internal Use Only, Administrative-Internal Use Only, and For
Official Use Only. Administrative-Internal Use Only, which
comes closest to a marking for administrative privacy, is
defined as a control that may be used "for unclassified, non-
sensitive administrative information that should not be dis-
seminated outside of CIA." If this definition were broadened
to include the types of unclassified information exempted by
the FOIA and if protective measures were prescribed, this
control would satisfy the sense of this recommendation.)
Recommendation 14
To bring the current exponential proliferation of clas-
sified paper through Xeroxing under control, research should
be conducted into the feasibility of a system similar to the
following: Programming the Xerox copying machine so that it
will not function unless certain information is input into
it--the name or badge number of the employee, whether the
document to be copied is unclassified or draft and, if clas-
sified, the classification, subject, dispatch symbol, etc.
If classified, (the machine could be programmed to recognize
this from the marking), the machine could assign a control
number and provide a record of copies made. Something of
this sort should serve two purposes: deter Xeroxing and,
where necessary, provide an inventory of classified documents
that have been Xeroxed.
Approv6NVb~ '&1f09lOi4 ECHA-BD 1-@ A000300010001-6
Approved For Release 2001/09/04: CIA-RDP80-00630A000300010001-6
ADMINISTRATIVE - INTERNAL USE ONLY
The Problem of Disclosure
This Study has examined the statutory and constitutional
barriers to disclosure--the Espionage Statutes, executive
privilege, the classification system, certain provisions of
FOIA and the Privacy Act, the sources-and-methods clause--and
found them wanting in important respects. Before suggesting
any remedies, it is first necessary to consider various pro-
posals that have been made for a statutory solution.
During the last Senate hearings on classification in
1974 there were six bills pending before Congress designed
65
to create a statutory classification system. The motiva-
tion behind these bills was not to give greater protection
to government secrets by providing legal underpinning but
rather, through various devices, to accelerate the declas-
sification of information and insure Congressional access to
executive branch secrets. One bill (S. 1520) would set up
a National Committee on Executive Secrecy; another (S. 3399)
would create a Classification Review Commission. In the
case of the latter, Congress would propose the names of six
of the nine members to the President for appointment. This
thinly veiled intent to share executive power is probably
unconstitutional. The proposed Classification Review
Commission would be empowered to overrule the President
on classification matters. As mentioned above, two bills
ADMINISTRATIVE - INTERNAL USE ONLY
Approved For Release 2001/09/04: CIA-RDP80-00630A000300010001-6
Appro ,%$ ~VI I Tg 01/Oi1V'1'ERNALRO~EO(92~OA000300010001-6
(S. 1726 and S. 2451) would set up a single classification--
Secret Defense Data--that S. 2451 defines as information the
unauthorized disclosure of which "would adversely affect the
ability of the United States to protect itself against overt
or covert hostile action." The bills generally avoid the
"national security" formulation of E.O. 11652 in favor of
an undefined "national defense." None was found satisfactory
by the executive branch, and none contains features that would
be helpful in drafting a constructive statutory vehicle for
the classification system.
More deserving of our attention is Subchapter C, Chapter 11
of S.1, a Senate bill entitled "The Criminal Justice Reform
Act of 1975." This subchapter, a part of a monumental codifica-
tion of Federal criminal law, over twenty years in the making,
presents a revision of the Espionage and related statutes
discussed earler. Sections 1121-1123 deal with espionage
and the disclosing and mishandling of "national defense
information." Section 1124 penalizes the disclosure to an
unauthorized person of any type of classified national
defense information. The vague "intent or reason to believe"
wording of Sections 792-794 of the Espionage Statutes has
been replaced throughout Subchapter C by the following guilt
formulation: "knowing that defense information could be used
to the prejudice of the safety or interest of the United
States, or to the advantage of a foreign power."
Approv Moiio /lW bAIR60-0T3XbA000300010001-6
Approved For Release 2001/09/04: CIA-RDP80-00630A000300010001-6
ADMINISTRATIVE - INTERNAL USE ONLY
A key element in the codification of these statutes is the
definition of "national defense information" in Section 1128(f).
The latter is essentially an enumeration of ten types of infor-
mation, the first five of which relate to military secrets.
Item (6) reads: "intelligence operations, activities, plans,
estimates, analyses, sources, or methods, of the United States."
The remaining four specify intelligence concerning a foreign
power, communications intelligence and cryptographic informa-
tion, atomic Restricted Data, and any matter involving the
security of the U.S. in time of war.
Section 1123 would indirectly permit the prosecution of
anyone deliberately publishing national defense information,
but the burden of proof would be upon the government to con-
vince the jury that the information was in fact national
defense information. Thus, we are faced again with the
dilemma encountered earlier, the requirement of proof that
would compound the damage already done to national security.
Although Section 1224 embraces "all" classified informa-
tion and applies to former as well as present government
employees, it specifically exempts from prosecution the
unauthorized person to whom national defense information
has been communicated. Since the unauthorized recipient
may well be a member of the press, Section 1124 is not an
effective deterrent to the publication of classified information.
ADMINISTRATIVE - INTERNAL USE ONLY
Approved For Release 2001/09/04: CIA-RDP80-00630A000300010001-6
ApprovR~R f mI2 1 /09#9 l&-L I USE f j A000300010001-6
Moreover, by bringing Section 798 of the Espionage Statutes
(the section protecting communications intelligence, etc.,
and the most effective of the Espionage Statutes) under its
wing, Section 1124 vitiates 798.
In short, Subchapter C represents an advance in terms of
simplicity of language, procedure, and careful definition of
terms, but a step backwards in exempting from prosecution the
unauthorized recipient of classified information and in using
the concept, "national defense information," rather than that
of "national security information." Foreign relations infor-
mation, an essential element of the latter, is apparently
66
excluded from its purview.
Those who decry the lack of effective statutory deter-
rents to disclosure often look enviously at the British
Official Secrets Act. The latter, however, with its D-notices
and catchall language that protects any "official information"
whether related to national security or not, is not only
inconceivable politically in the context of American freedoms
but would undoubtedly be struck down by the courts as
67
Recommendation 15
The Agency should propose legislation along the following
lines to protect sources-and-methods information. The proposed
legislation should be patterned on the Atomic Energy Act of
1954. It should:
77
Appro,~JW kSkAig~b0?/OJM RE)PS01 9.6:90A000300010001-6
Approved For Release 2001/09/04: CIA-RDP80-00630A000300010001-6
ADMINISTRATIVE - INTERNAL USE ONLY
a. amend section 102(d)(31 of the National Security
Act of 1947 for the purpose of defining sources
and methods and creating a new category of
legally protected information, overlapping wi~hh
but independent of the classification system. 8
Like Restricted Data, Foreign Intelligence Data
or Sources and Methods Information would be
"born classified."
b. reference exemption (b)(3) of the Freedom of
Information Act.
c. provide for an energetic program of removal
of nonsensitive or sanitized sources-and-
methods information from the special category
to the protection of simple classification,
or, if appropriate, declassification. These
procedures would usually apply to the product
of sources and methods and, only rarely, to
sources and methods per se. There is a partial
analogy to Formerly Restricted Data.
d. prescribe a full background investigation as a
condition of access to sources-and-methods
information.
e. make clear that the proposal is not directed
against Congress and that all appropriate
information will be made available to con-
cerned committees of Congress in secret
session. There has been no known leak of
Restricted Data by Congress and hopefully
the same would be true of sources-and-
methods information.
f. ban all controls, markings, or compartments,
other than the three levels of classification,
within the Foreign Intelligence Data category,
unless approved by the DCI. In general, sup-
plementary protection, other than through a
strict application of need-to-know, should be
unnecessary within the special category.
Where applicable, the three levels of classification of
E.O. 11652 should continue to be utilized within the special
category. By definition, however, sources-and-methods infor-
mation would be protected, whether classified or not.
78
Approved kbMMFE&tb OO1JO9f04INCMRW M 6Mb'000300010001-6
Approved For Release 2001/9IW~j -&- 89 30A000300010001-6
ADMINISTRATIVE
Recommendation 16
The DCI, acting within the NFIB structure, should
designate an ad hoc committee of legal experts to study
the revision of the Espionage Statutes. In particular,
sections 792 through 796 should be consolidated, simpli-
fied, and clarified. The intent criteria should be
abolished and other loopholes plugged. As an alternative
to Recommendation 15, section 798 dealing with cryptographic
information could be expanded to include sources-and-methods
information, or a separate section could be added for this
purpose. (Because of its primary responsibility in this
area, the establishment of such a committee would, of course,
have to be closely coordinated with the Justice Department.)
ADMINISTRATIVE - INTERNAL USE ONLY
Approved For Release 2001/09/04: CIA-RDP80-00630A000300010001-6
Approved For Release 2001/09/04: CIA-RDP80-00630A000300010001-6
CONFIDENTIAL
FOOTNOTES
1. The dictionary defines compartmentation as division
into separate sections or units, giving as an example, the
elaborate compartmentation of submarines wnich reduces the
danger of sinking. Within a government agency, and par-
ticularly within an intelligence organization, compartmenta-
tion takes on a special coloration. In this context, it may
be defined as the deliberate restriction of the free flow of
information for the purpose of minimizing the risk of unau-
thorized disclosure of designated types of information whose
protection is deemed essential to the organization.
One may picture compartmentation as a series of
rings starting with the badge that excludes those who are
not members of the organization, and working inward and
upward through the levels of document classification to
the ever smaller rings of the codeword compartments. If
the application of compartmentation were absolute in the
sense of the submarine analogy, the organization would
suffocate. What enables the organization to survive is
the operation of the countervailing principle of "need-to-
know" permitting a directed flow of information.
Interacting with deliberate compartmentation are
various bureaucratic practices that tend to clog the need-
to-know channels and magnify difficulties in the compart-
mented systems. In the series of Center studies, compart-
mentation has been viewed as "formal" as it relates to the
codeword systems, "informal" as it pertains to the gener-
alized need-to-know found in the classification system or
the more rigid need-to-know practiced in the Clandestine
Service, and "bureaucratic" as it evolves accidentally
from organizational phenomena. Forthcoming studies in
this series will deal with formal and bureaucratic com-
partmentation as well as other aspects of informal
compartmentation.
2. A unique source of information on the pre-World
War II origins of the classification system is a typescript
by Dallas Irvine, Origins of Defense-Information Markings
in the Army and Former War Department. Washington: National
Archives and Records Service, 1972. Particularly valuable
are the appendices to this work reproducing the original
documents referred to in the text. An excellent overall
view is given by Harold C. Relyea, "The Evolution of
Government Information Security Classification Policy: A
Brief Overview (1775-1973)." It appears as a supplement
in: Government Secrecy: Hearings before the Subcommittee
Approved For Release 20 Qay PM#B L MDP80-00630A000300010001-6
Approved For Releas1FQI/$R 4IA~IA-RDP80-00630A000300010001-6
on Intergovernmental Relations of the Committee on Government
Operations.. .on S. T5 0, S. 1726, S. 451,-S. 2738-,--S. 3393,
and S. 3399. May 22, 23, 29, 30, 31, and dune 10, 1974.
Washington: U.S. Govt. Print. Office, 1974. The following
two works cover much the same ground, but are useful for
recent developments and bibliographic references: William G.
Phillips. "The Government's Classification System." Ch. 2
in None of Your Business-Government Secrecy in America.
Ed. Normal Dorsen and Stephen Gillers. New Yor : T e
Viking Press, 1974; Representative William S. Moorhead.
"Operation and Reform of the Classification System in the
United States." Ch. 6 in Secrecy and Foreign Policy. Eds.
Thomas M. Franck and Edward Weisband. New Yor : Oxford
University Press, 1974.
3. Other changes effected by E.O. 11652 are summarized
in Annex B.
4. Quoted in H. Rept. 93-221, Executive Classification
of Information-Security Classification Problems Involving
Exemption (b)(1) of the Freedom of Information Act (5 U.S.C.
552). 93d Congress. 2d Sess. Washington: U.S. Govt. Print.
Mice,, 1973, p. 16.
5.
Quoted by Relyea, op. cit., p. 861.
6.
Ibid., pp. 875-876. For the text of the proposed
bill
tains
see
the
Appendix III of Relyea's study. Appendix II con-
text of other recommendations.
7.
Quoted by Relyea, ibid., p. 863.
8.
Ibid., pp. 863-865.
9.
Moorhead, op. cit., p. 98.
10. Ibid., pp. 77-78. See also H. Rept. 93-221, op. cit.
Ch. VI, and Senate Hearings on Government Secrecy, op. cit.,
passim.
11. Moorhead, op. cit., pp. 100-101.
12. Phillips, op. cit., pp. 72, 96, 101. Dr. Ray S.
Cline, testifying at the 1974 Senate hearings estimated that
"there probably is 15 to 25% of the material that is clas-
sified by the Government which, at least at the time, is
legitimately classified." Senate Hearings on Government
Secrecy, op. cit., p. 56.
CONFIDENTIAL
Approved For Release 2001/09/04: CIA-RDP80-00630A000300010001-6
Approved For Release 2001/09/04: CIA-RDP80-00630A000300010001-6
CONFIDENTIAL
13. Stanley Futterman. "What is the Real Problem with
the Classification System?" Ch. 3 in None of Your Business,
op. cit., p. 103.
14. Quoted by Phillips, op. cit., p. 69.
15. "Secrecy and Intelligence in a
Free Society," an unpublished study done for the Center
for the Study of Intelligence. Some of the highlights of
this study appear in: "Secrecy and Intelligence in a
Free Society-The Dilemma of Security vs. Openness," Studies
in Intelligence. Vol. 19, No. 2, summer 1975.
16. Quoted by William G. Florence. "Issues in
Classifying and Protecting National Defense Information."
Ch. 10 in Surveillance and Espionage in a Free Society.
Ed. Richar um, New York: Praeger u is ers, 972,
p. 132.
17. . cit., pp. 91-92.
18. Florence, op. cit., p. 132.
19. Apposite descripti-on used by Dr. Edward Proctor
in a talk to the Senior Seminar on 3 May 1976.
20. op. cit., pp. 9-10.
21. During the period 1 January 1973 to 31 March 1974,
there were 33 recorded abuses of classification in CIA, 26
of which were attributable to overclassification and two to
unauthorized disclosure, source unknown. The reprimands
given were characterized as more educational than punitive
in tone and were not entered in personnel files. Colby
Letter to Senator Edmund S. Muskie, 24 May 1974. Senate
Hearings on Government Secrecy, op. cit., pp. 114, 469.
22. A memorandum from the chairman of the ICRC, dated
22 March 1976, to the departments authorized to classify
information under E.O. 11652 stresses that the use of such
designations as "Top Secret/Sensitive," "White House
Confidential," and "Conference Confidential" is a violation
of the Order and should he discontinued.
23. Senator Muskie used figure of 96% for the amount
of CIA information exempted. 'senate Hearings on Government
Secrecy, op. cit., p. 102. Commenting on this at a later
date, he remarked: "That is tc~ say the Executive order is a
82
CONFIDENTIAL
Approved For Release 2001/09/04: CIA-RDP80-00630A000300010001-6
Approved For Release Q 1 ffR ,I.RIA-RDP80-0063OA000300010001-6
dead letter in its application to that institution." Ibid.,
p. 252. At the same hearings the following exemption figures
for other agencies were given: FBI, over 99%; Defense Depart-
ment, 50%; State Department, less than 50%. Ibid., p. 162.
24. CIA Annual Report to the Congress for the Year
1975 on the Freedom of Information Act.
26. See Edward A. Shils, The Torment of Secrecy,
New York: Free Press, 1956, for a sociological analysis
of this triad.
26a. In 1974 the Office of the Inspector General con-
ducted a review to determine "whether Agency officers with
classification authority understand classification criteria
and are complying with guidance...." In pursuing this
objective, the review did not consider "substantive intelli-
gence" nor cable traffic, limiting itself essentially to
"administrative material." The principal conclusions of
its four-page report were these:
- The Agency has made progress in responding to
E.O. 11652. There is "more discretion in clas-
sification decisions."
- There is some overclassification in the Agency,
but it is "not a problem of any serious magnitude."
Much remains to be done, however, in correcting
the overclassification of pre-printed forms. And,
the report adds, "given the nature of the Agency's
business, the tendency to overclassify will remain
with us for some time."
- In some components no distinction is made between
the authority to classify and the authority to
exempt.
- Training for classification officers is virtually
non-existent.
- There is apparently no periodic review of clas-
sified material for downgrading and declassification.
- The report recommends "a periodic training program"
for classification officers and the designation of
an officer in each component to review at regular
CONFIDENTIAL
Approved For Release 2001/09/04: CIA-RDP80-0063OA000300010001-6
Approved For Release 2001/09/04: CIA-RDP80-0063OA000300010001-6
CONFIDENTIAL
intervals chrono files for classification abuses.
See: Memorandum For: Chief, Information Systems
Analysis Staff. Subject: Classification/Declas-
sification of Information. DD/M and S 74-1319,
dated 12 April 1974.
27. The National Archives and Records Service (NARS)
has general supervisory responsibility for the destruction
of useless official records. Each government Agency is
required to provide the NARS with a records schedule setting
forth the disposition of its records. Actual destruction
may then be carried out by each agency in accordance with
the schedule.
28. Futterman, op. cit., pp. 93-94.
29. The rationale for all forms of supplementary
protection is sensitivity. The security classification
system itself is a three-step sensitivity scale. Top
Secret information is information requiring "the highest
degree of protection." Leaving aside practical considera-
tions such as managerial efficiency, there is obviously
a logical redundancy in providing supplementary protection
to Top Secret information.
30. Memorandum For: Executive Secretary, CIA
Management Committee. Subject: Central Storage and
Retrieval of Sensitive Intelligence Documents, 6 August
1973, p. 5 of Attachment to report entitled "Security
of the CRS System."
31. Ibid., p. 3 of report.
Approved For Release 2001/09/04:CIA-RDP80-00630A000300010001-6
Approved For Release e8'P l --RDP80-00630A000300010001-6
33. The Rockefeller Commission Report notes: "In
connection with the statutory responsibility of the Director
of Central Intelligence for the protection of intelligence
sources and methods from unauthorized disclosure, the
National Security Council has directed that each agency or
department be responsible for the protection of its own
sources and methods, and that the Director call upon these
other bodies as appropriate to investigate any unauthorized
disclosures and report to him. The Director has, in turn,
delegated these responsibilities to the Security Committee
of the United States Intelligence Board [now the National
Foreign Intelligence Board]..." Report to the Commission
on CIA Activities within the Unite States. Washington:
Govt. Print. Office, June 1975, p. 56. The precise extent
to which the DCI's statutory responsibility extends to
other members of the Intelligence Community is unclear.
34. JSSC memorandum, dated 18 September 1945,
entitled "Proposed Establishment of a Central Intelligence
Service. Report of the Joint Strategic Survey Committee."
It references Joint Chiefs of Staff (JCS) memorandum 1181
(Donovan's recommendations). The National Intelligence
Authority was the predecessor of the National Security
Council.
35. JCS 1181/5 (amended). "Establishment of a
Central Intelligence Service Upon Liquidation of O.S.S.
Directive Regarding the Coordination of Intelligence
Activities." For text see Appendix R, Donovan and the
CIA: A Histor of the Establishment of the Central
Intelligence Agency, by CIA, 1975 SECRET).
36. Memorandum from Director of Naval Communications
to Chief of Naval Operations, dated 8 January 1975. Subject:
Establishment of a National Intelligence Service-Necessity
for Safeguarding the Security of Military Intelligence in
Connection Therewith.
Approved For Release ~kWWT 8!A-RDP80-00630A000300010001-6
Approved For Release 2001/09/04: CIA-RDP80-0063OA000300010001-6
CONFIDENTIAL
37. This seems borne out by these words in the Central
Intelligence Group (CIG) draft for the CIA section of the
1947 Act: "Be responsible for fully protecting sources and
methods used in the collection of foreign intelligence infor-
mation received by the Agency..." And also in the draft for
a separate CIA Act of 10 March 1947: "Be responsible for
taking measures to protect sources and methods used in the
collection and dissemination of foreign intelligence infor-
mation received by the Agency..." The Rockefeller Commission
Report, op. cit., p. 53, expresses a similar view: "This
language [sources and methods] was originally inserted in
the early drafts of the Act in response to the expressed
concern of some military officials that a civilian agency
might not properly respect the need for secrecy. Congress
was also aware of the concern that the United States espionage
laws were ineffective in preventing unauthorized disclosure of
classified information."
38. "The Protection of Intelligence
Data." S u ies in n e igence. Vol. 11, No. 2, p. 72.
39. Letter fro to Senator Muskie,
Senate Hearings on Government Secrecy, op. cit., p. 115.
40. This definition draws on some of the concepts
contained in the OGC catalog of sources and methods and
the Agency-sponsored bill dealing with sources and methods.
See footnotes 42 and 66. "Foreign intelligence information"
itself would, of course, also require definition. The
Rockefeller Commission Report observes that "'foreign intel-
ligence' is a term with no settled meaning. It is used but
not defined in National Security Council Intelligence
Directives. Its scope is unclear where information has
both foreign and domestic aspects." Op. cit., p. 59. It
adds its belief that "...congressional concern is properly
accommodated by construing 'foreign intelligence' as infor-
mation concerning the capabilities, intentions, and activities
of foreign nations, individuals or entities, wherever the
information can be found. It does not include information
on domestic activities of United States citizens unless there
is reason to suspect they are engaged in espionage or similar
illegal activities on behalf of foreign powers." Ibid., p. 59.
41. For a short account of this case, see: Guide to
CIA Statutes and Law, p. 16. Also Lawrence R. Houston.
"U.S. v. Jarvinen." Studies in Intelligence. Vol. 15,
No. 1.
CONFIDENTIAL
Approved For Release 2001/09/04: CIA-RDP80-0063OA000300010001-6
Approved For Release MI1/ / VILA-RDP80-00630A000300010001-6
42. Guide to CIA Statutes and Law, pp. 16-18.
43. On this point Judge Haynsworth reiterated his
previous holding "that the First Amendment is no bar against
an injunction forbidding the disclosure of classifiable infor-
mation within the guidelines of the Executive Orders when
(1) the classified information was acquired, during the
course of his employment, by an employee of a United States
agency or department in which such information is handled
and (2) its disclosure would violate a solemn agreement
made by the employee at the commencement of his employment.
With respect to such information, by his execution of the
secrecy agreement and his entry into the confidential
employment relationship, he effectively relinquished his
First Amendment rights." Opinion, p. 15. For a brief
summary of the Marchetti case prior to the final appeal
see'Victor Marchetti and John D. Marks. The CIA and the
Cult of Intelligence. New York: Alfred A. Knopf-, - f97 .
Introduction by Melvin L. Wulf, legal director of ACLU
and Marchetti's defense lawyer. The Supreme Court refused
to review the Marchetti case.
44. Backrack was suing for all information on the
relations of Nicholas de Rochefort (deceased) with CIA and
its predecessor organizations. Paragraph 9 of Judge Gray's
opinion is particularly noteworthy: "Since it is concluded
that the exemptive provisions of 5 U.S.C. 552(b)(3) [that
is, the sources-and-methods provisions under the FOIA
statutory exemption] are applicable herein, the Court has
no occasion to consider whether the sought information, if
it exists, would also be exempt from disclosure by the pro-
visions of U.S.C. 552(b)(1) [information properly classified
pursuant to an Executive order]." The other cases referred
to in the text are: Harriet A. Phillippi V. CIA, et. al.,
1 December 1975, a case in w ic-h in camera examination of
documents with the plaintiff's lawyer present was denied;
William B. Richardson v. J.T. S ahr et. al., 30 January 1976,
a consolidation of three suits demanding CIA financial
records; Gary A. Weissman v. CIA et. al., 14 April 1976,
in which the plaintiff requestedthe CIA security file on
himself; Jonathan A. Bennett v. DOD, CIA, et.al., 13 September
1976, requesting information on all missions sent into Cuba
by DOD; and Morton H. Halperin v. William E. Colby, et. al.,
4 June 1976, a request fogetary information (Although
the sources-and-methods provisions were cited by the. judge,
the case was decided on the basis of exemption (b)(1)); and
Anthony V. Vecchiarello v. Edward Levi, et. al. (CIA),
1 June 1976. The District Court decided that the disputed
information was properly withheld under the FOIA exemptions.
CONFIDENTIAL
Approved For Release 2001/09/04: CIA-RDP80-00630A000300010001-6
Approved For Release 2001/09/04: CIA-RDP80-00630A000300010001-6
CONFIDENTIAL
45. The sources-an.-methods catalogue, OGC 76-03333,
dated 12 December 1975, is entitled "Aspects of Intelligence
Sources and Methods of the Central Intelligence Agency That
Require Protection from Unauthorized Disclosure." It is
divided into twelve sections with a total of 126 "aspects."
Approved by the DCI on 12 January 1976, it is to be issued
as an Agency regulation. An 0GC staff memorandum explaining
the rationale of the sources-and-methods catagloue notes that
in those instances where the district court decided against
the Agency's deletions from Marchetti's book, it was generally
because the Agency was unable to document prior determinations
concerning the classification of the contested item. The
nondisclosure agreement for sources-and-methods information
will be in addition to the secrecy agreement that employees
now sign for the protection of classified information.
46. Shils, op. cit., p. 41. He adds: "With its
[America's] devotion to publicity on such a scale, it could
scarcely be expected that in its normal state Americans
would have much sympathy with secrecy, particularly govern-
ment secrecy." Ibid., p. 42. And again: "No society has
ever been so extensively exposed to public scrutiny as the
United States in the twentieth century." Ibid., p. 39.
47. Writing of the disclosures of CIA cover and funding
operations in 1967, - concludes: "Habits of thinking
within the Agency and the Executive had become outmoded, and
preserved from change by secrecy." Op. cit., p. 64. In
other words, covert operations that had been appropriate
and credible in the fifties had ceased to be so in 1967,
but were not recognized as such until it was too late.
Secrecy often tends to breed insensitivity to change and
public opinion.
48. Cited by Professor Arthur Schlesinger, Jr., Senate
Hearings, op. cit., pp. 40-41.
49. The preamble to E.O. 11652 takes note of the
section of the Freedom of Information Act (552(b)(1) of
Title 5, U.S.C.) exempting properly classified information
from disclosure, but the Executive order does not expressly
derive its authority from that Act.
50. Quoted by Stanley Futterman. "What is the Real
Problem with the Classification System?" Ch. 3 in None of
Your Business, op. cit., p. 102.
CONFIDENTIAL
Approved For Release 2001/09/04: CIA-RDP80-00630A000300010001-6
Approved For Release F1 ~
L ( 41 T A-RDP8O-OO63OAOOO3OOO1 OOO1-6
CUN
51. Speaking of the decision in the "Pentagon Papers"
case, New York Times v. United States, Ralph E. Erickson,
then Assistant Attorney General, expressed this view: "While
the Justices applied a number of different standards, it seems
clear that injunctive relief against publication of classified
material already in the hands of the press will be granted
only in the most extreme circumstances, at least in the
absence of specific legislation." Hearings on the Proper
Classification and Handling of Government Information
Involving the National Security and H.R. 9853, a Related
Bill. Special Subcommittee on Intelligence. House Armed
Services Committee. 92d Congress. 2d Sess. March and
May 1972. H.A.S.C. No. 92-79, p. 17472.
52. The then Atomic Energy Commission (AEC) Classifica-
tion Handbook and excerpts from the Atomic Energy Act are
reproduced in the Senate Hearings on Government Secrecy,
op. cit., pp. 364-467.
53. The House Committee Report on Executive Classifica-
tion, op. cit., p. 99, makes this interesting comment on the
atomic energy program:
Like other executive agencies the AEC also
functions within the Executive order classifica-
tion system, as well as its own statutory system.
The committee notes, however, the sharp'contrast
between the apparent efficient operation of the
AEC classification system and the administrative
failures that have marked the operation of the
Executive order system within the past 20 years.
It is true that the highly technical type
of information that is subject to classification
within AEC's own statutory system and its limited
scope of applicability makes it more manageable.
Moreover, scientific development in the atomic
energy field usually provides more precise
benchmarks for measuring the necessity to con-
tinue classification of AEC information at a
particular level than is generally true in the
fields of foreign policy or defense information.
54. Benno C. Schmidt, Jr. "The American Espionage
Statutes and Publication of Defense Information." Ch. 11
in Secrecy and Foreign Policy, op. cit., p. 188. By dropping
the wor "intent" and retaining "reason to believe" and by
substituting for foreign person or power "any person not
CONFIDENTIAL
Approved For Release 2001/09/04: CIA-RDP8O-0063OA000300010001-6
Approved For Release 2001/09/04: CIA-RDP80-00630A000300010001-6
CONFIDENTIAL
entitled to receive it," subsections (d) and (e) of 793 come
closest to embracing press disclosure of defense information.
Subsection (d) prescribes penalties for one lawfully in pos-
session of defense information who refuses to deliver it on
demand to an officer or employee of the United States "entitled
to receive it"; subsection (e) covers a person who, being in
unauthorized possession of defense information retains it,
communicates it to another unauthorized person, or refuses to
surrender it to an officer or employee of the United States
entitled to receive it. Prior to 1950 there was only a
section (d) applying to government employees; the addition of
(e)- was done as a result of the Whittaker Chambers "pumpkin
papers" case to criminalize retention by non-goverment personnel.
Ibid., p. 188.
55. Ibid., p. 198. The present Espionage Statutes
comprise in the main legislation enacted in 1911, 1917, and
1950. The most recent provision, Section 799, daals with
the protection of NASA secrets.
55a. Ibid., p. 201. Section 952 (18 U.S.C. 952) imposes
penalties on a government employee who publishes or makes
unauthorized disclosure of information concerning or trans-
mitted by a foreign diplomatic code.
56. Quoted in CIA publication entitled "Title 18,
U.S. Code. Sections 792, 793, 794, 795, 796, 797, and
798 with an Interpretation of the Internal Security Act
of 1950." p. 6.
57. op. cit., p. 75. Mention should also
be made of another statutory barrier to disclosure, sub-
section (b) of the Internal Security Act of 1950 (50 U.S.C.
783). This subsection makes it a crime "for any officer or
employee of the United States" to communicate to a foreign
agent "any information of a kind which shall have been
classified by the President as affecting the security of
the United States..." Quoted by Ralph E. Erickson in
statement to the House Subcommittee on Intelligence,
H.A.S.C. No. 92-79, op. cit., p. 17471. It apparently
does not apply to former government employees.
58. Guiding Principles for the Intelligence Community,
13 May 1976. NFIB-D-1/49.
59. ~ & op. cit., p. 10.
60. See Senate bills S. 1726 and S. 2451. Texts and
analysis of these and other bills dealing with classification
Approved For Release 2O ~ $/ JfAl DP80-00630A000300010001-6
Approved For Release 0001-6
will be found in Legislation on Government Secrecy. Sub-
committee on Intergovernmental Relations. Committee on
Government Operations. U.S. Senate. Washington: Govt.
Print. Office, 1974. Florence, a strong protagonist of a
single-tier system, wrote, op. cit., p. 131: "Consistent
with the urgent need for narrowing the scope of any execu-
tive order or :law for the protection of national defense
information, there should be only one category of such
information. Internal distribution designators could be
used to limit the dissemination of a given item, but there
should be only one classification marking to indicate the
application of law or, in the absence of law, such an
executive order as might exist."
61. See testimony of Fred Buzhardt, General Counsel,
Department of Defense, before House Subcommittee on
Intelligence, op. cit., pp. 17376-17377 and that of
William Blair, Deputy Assistant Secretary of State, ibid.,
pp. 17562-17464. The Rehnquist Committee considered and
rejected suggestions for both a one-tier and a two-tier
classification system.
62. "The ICRC is charged with duties it cannot perform,
given the size of the staff and the volume of non-ICRC duties
of its members. Realistically, it is not possible to allocate
sufficient resources (money and people) to provide the neces-
sary expertise and support services. Further, conceptually,
a Committee of departmental employees cannot monitor and
regulate the policies and practices of the heads of their
own departments." Memorandum to ICRC Chairman, dated
9 March 1976, from CIA member,
OGC-76-1148. The memorandum is entitled: ssues and
Problems with Executive order 11652."
64. The CIA Information Review Committee consists of
the DDA, who is the chairman, the DDI, the DDO, the DDSET,
the Deputy for National Intelligence, and the General
Counsel. It is obvious that a high-level body such as
this, which also handles FOIA appeals, can only address
itself to the most urgent problems posed by the classifica
tion system and not to radical reform of the latter.
65. See Legislation on Government Secrecy, op. cit.
66. See S. 1, Chapter 11, Subchapter C, pp. 68-74.
The bill is dated 15 January 1975. See also Report of the
Approved For Release V/b T:IuAk-RDP80-00630A000300010001-6
Approved For Release 2001/09/04: CIA-RDP80-00630A000300010001-6
CONFIDENTIAL
Committee on the Judiciary United States Senate to Accompany
S.1, 94th Congress, 1st Sess., Rpt. No. 94, Washington: U.S.
Rout. Print. Office, 1975, particularly pp. 229-263. Sub-
chapter D takes over the provisions of the Atomic Energy Act,
as amended, but does not appear to weaken them. The National
Commission that worked on the codification of Federal criminal
law used the term "national security information." which the
Judiciary Committee replaced with "national defense information."
67. D-Notices are administrative warnings by the
Defense, Press and Broadcasting Committee that information
someone proposes to publish is secret and concerns national
security. For a discussion of the Official Secrets Act see
Franck and Wiesband, op. cit., pp. 325-331.
op. cit., pp. 70-71, explains that the British acts "are
based on the theory of privilege, according to which all
official information, whether or not related to the national
defense and security is the property of the crown. It is
therefore privileged, and those who receive it officially
may not divulge it without the crown's authority." And
he concludes: "In short, the Official Secrets Acts would
seem to be in important respects unconstitutional in this
country and therefore cannot be relied on as examples of
means by which we could protect intelligence data." Ibid.,
p. 72.
68. An Agency-sponsored bill, H.R. 12006, introduced
by Representative Robert McClory on 19 February 1976, aims
at strengthening the sources-and--methods clause by adding a
new subsection (g) to Section 102 of the National Security
Act of 1947. Its main features are these:
--It criminalizes the communication of classified
sources-and-methods information to an unauthorized
person or the general public.
--It extends to anyone who is or has been in authorized
control or possession of classified sources-and-
methods information, but not to the unauthorized
recipient of such information.
--It requires in camera hearings when a court wishes
to determine whether the information was properly
classified and designated as sources-and-methods
information (the court's determination is then a
point of law).
--It provides for a temporary or permanent injunction
when in the judgment of the DCI a violation is
CONFIDENTIAL
Approved For Release 2001/09/04: CIA-RDP80-00630A000300010001-6
Approved For Release W/%Tn - PIA-RDP80-00630A000300010001-6
RTIAL
imminent. Unless there is presumptive evidence
of improper classification, the court is directed
not to hold an in camera hearing prior to granting
an injunction.
Information relating to sources and methods is defined
as "any information, regardless of its origin, that is clas-
sified pursuant to the provisions of a statute or Executive
order, or a regulation or a rule issued pursuant thereto as
information requiring a specific degree of protection against
unauthorized disclosure for reasons of national security and
which, in the interest of the foreign intelligence activities
of the United States, has been specifically designated by a
department or agency of the United States Government which is
authorized by law or by the President to engage in foreign
intelligence activities for the United States as information
concerning--(A) methods of collecting foreign intelligence;
(B) sources of foreign intelligence, whether human, technical,
or other; or (C) methods and techniques of analysis and evalua-
tion of foreign intelligence."
According to the Office of the General Counsel, the
Justice Department insisted on the provision in the bill
restricting protected sources-and-methods information to
that which has been classified.
The bill's exemption from prosecution of the unauthorized
recipient of sources-and-methods information was apparently
inspired by similar language in Section 1124 of S.1 (dealing
with classified. national defense information). Because of
this exemption, H.R. 12006 affords considerably less protection
to sources-and-methods information than Section 798 of the
Espionage Statutes (also limited to classified information)
affords to communications intelligence.
By limiting sources-and-methods information to that
which has been classified it tends also to undercut the theory
that sources-and-methods information has statutory claims to
protection under Section 102(d)(3), independent of the clas-
sification system. Unlike the Atomic Energy Act, this bill
does not create a unique category of information that is
"born classified."
On the other hand, it breaks new ground in the statutory
protection of information with its provisions for unjunctive
relief and in camera hearings. The injunctive provision could
apparently be invoked against a newsman who planned to publish
sources-and-methods information, but the newsman would not be
actionable under the provisions of the bill if he managed to
publish the information before being restrained.
Approved For ReleascC2 JW 4IANA-RDP80-00630A000300010001-6
Approved For Release 2001/09/04: CIA-RDP80-00630A000300010001-6
A SELECTION OF CLASSIFICATION CRITERIA*
(Arranged Chronologically)
21 November 1907. Circular No. 78, War Department.
Paragraph 1 of the Circular specified that Confidential is
permitted only "where the subject matter is intended for the
sole information of the person to whom addressed." Paragraph 2
required that issuances be accompanied by a statement indicating
the class or classes of individuals to whom the contents might
be disclosed. Paragraph 4 stated that issuances marked
Confidential in the past were for the use of Army officers,
enlisted men, and government employees "when necessary in
connection with their work." (Irvine, op. cit., p.14.)
British Classification Criteria
The criteria are based on the degree of damage which
disclosure would entail:
Top Secret--"exceptionally grave damage to the nation."
Secret--"serious injury to the interests of the nation."
Confidential--"prejudicial to the interests of the nation."
Restricted--"undesirable in the interests of the nation."
(Franck and Wiesband, op. cit., p. 336.)
*Full identification of the references cited after each entry
will be found in the footnotes.
94
Approved For Release 2001/09/04: CIA-RDP80-00630A000300010001-6
Approved For Release 2001/09/04: CIA-RDP80-00630A000300010001-6
21 November 1917. General Orders, No. 64, General Hqrs., AEF.
General Orders, No. 64, General Headquarters, American
Expeditionary Force, established three classifications for
"official information."
Confidential: "Confidential matter is restricted for
use and knowledge to a necessary minimum of persons, either
members of this expedition or its employees."
Secret: "The word 'secret' on a communication is intended
to limit t- e use or sight of it to the officer into whose hands
it is delivered by proper authority, and, when necessary, a
confidential clerk. With such a document no discretion lies
with the officer or clerk to whom it is delivered, except to
guard it as SECRET in the most complete understanding of that
term. There are no degrees of secrecy in the handling of
documents so marked. Such documents are completely secret."
For Official Circulation Onl : "Orders, pamphlets of
instruction, maps, diagrams, intelligence publications, etc.,
from these headquarters.. .which are for ordinary official
circulation and not intended for the public, but the acci-
dental possession of which by the enemy would result in no
harm to the Allied cause; these will have printed in the
upper left hand corner, "For Official Circulation Only."
This order also prescribed the following circulation
controls:
Not To Be Taken into Front Line Trenches; Not To Be Reproduced;
Not To Go Below Division Headquarters; Not To Go Below Regi-
mental Headquarters. (Irvine, op. cit., pp. 24-25. The
markings, "Secret" and "Confidential," were borrowed from the
French., The British had a marking "For Official Use Only."
14 December 1917. Compilation of Orders, No. 6, War Department
Section 176 of the Compilation of Orders reads:
A document or map marked 'Secret' is for the personal
information of the individual to whom it is offi-
cially entrusted and of those officers under him
whose duties it affects. The officer to whom it
is entrusted is personally responsible for its safe
Approved For Release 2001/09/04: CIA-RDP80-00630A000300010001-6
Approved For Release 2001/09/04: CIA-RDP80-0063OA000300010001-6
custody and that its contents are disclosed to those
officers mentioned above, and to them only. The
existence of such a document or map will not be dis-
closed by the officer to whom it is entrusted, ..."
"A document or map marked 'Confidential' is of less
secret a nature than one marked 'Secret,' but its
contents will be disclosed only to persons known
to be authorized to receive them or when it is
obviously in the interest of the public service
that they receive them."
"The information contained in a document or map
marked 'For Offical Use Only' will not be com-
municated to the public or to the press, but may
be communicated to any person known to be in the
service of the United States simply by virtue of
his official position."
Section 176 also required that catalogues of classified
documents be classified. (Irvine, op. cit., Appendix K.)
22 January 1921, Army Regulations, 330-5.
"A document will be marked 'Secret' only when the
information it contains is of great importance and
when the safeguarding of that information from
actual or potential enemies is of prime necessity.
A document will be marked 'Confidential' when it
is of less importance and of less secret nature
than one requiring the mark of 'Secret,' but which
must, nevertheless, be guarded from hostile or
indiscreet persons.
A document will be marked 'For Official Use Only'
when it contains information which is not to be
communicated to the public or to the press, but
which may be communicated to any person known to
be in the service of the United States whose duty
it concerns, or to persons of undoubted loyalty
and discretion who are cooperating with Government
work." (Irvine, op. cit., pp. 33-34.)
Approved For Release 2001/09/04: CIA-RDP80-0063OA000300010001-6
Approved For Release 2001/09/04: CIA-RDP80-00630A000300010001-6
12 February 1935, Changes No. 3 in Army Regulations, 850-25.
A fourth classification "Restricted" was added.
"Whenever the chief of an arm or service which is
charged with a research project or design, develop-
ment, test, and production of a unit of military
equipment or component thereof, shall determine
that the maintenance of secrecy regarding any such
project is sufficiently important to the national
defense of the United States to warrant it, he may
declare it a "-Restricted' project. Information
regarding a 'Restricted' Project will be considered
to be information affecting the national defense
within the meaning of the provisions of the
Espionage Act (sections 1 and 2, Title I,...
"During the period that a project has a restricted
status, all documents-containing technical infor-
mation regarding it will be identified by being
marked substantially as follows: Notice This
document contains?information affect ni g the
national defense of the United States within the
meaning of the Espionage Act (U.S.C. 50:31, 32).
The transmission of this document or the revela-
tion of its contents in any manner to any
unauthorized person is prohibited." (Irvine,
op. cit., pp. 38-39.)
1936. Army Regulations, 330-5.
"For Official Use Only" was dropped from Army Regulations.
The following new definitions were added:
"A document will be classified and marked 'Secret'
only when the information it contains is of such
nature that its disclosure might endanger the
national security, or cause serious injury to the
interests or prestige of the Nation, an individual,'
or any government activity, or be of great advantage
to a foreign nation."
"A document will be classified and marked 'Confidential'
when the information it contains is of such a nature
that its disclosure, although not endangering the
national security, might be prejudicial to the interests
or presitge of the Nation, an individual, or any govern-
ment activity, or be of advantage to a foreign nation."
Approved For Release 2001/09/04: CIA-RDP80-00630A000300010001-6
Approved For Release 2001/09/04: CIA-RDP80-0063OA000300010001-6
"A document will be classified and marked 'Restricted'
when the information it contains is for official use
only or of such a nature that its disclosure should
be limited for reasons of administrative privacy, or
should be denied to the general public." (Irvine,
op. cit., pp. 39-40.)
28 September 1942, OWI Regulation No. 4.
"Secret information is information the disclosure of
which might endanger national security, or cause
serious injury to the Nation or any government
activity thereof."
"Confidential information is information the dis-
closure of which although not endangering the
national security would impair the effectiveness
of government activity in the prosecution of war."
"Restricted information is information the disclosure
of which should be limited for reasons of administra-
tive privacy, or is information not classified as
confidential because the benefits to be gained by a
lower classification, such as permitting wider dis-
semination where necessary to effect the expeditious
accomplishment of a particular project, outweigh the
value of the additional security obtainable from the
higher classification." (Relyea, op. cit., p. 855.)
5 November 1953, E.O. 10501.
E.O. 10501 described classified information as "official
information affecting the national defense." Top Secret was
defined as "'defense information' requiring the highest degree
of protection whose disclosure would cause "exceptionally grave
damage to the nation."
Secret information was information whose disclosure would
cause "serious damage to the nation." The words "vital" and
"important" were used to qualify the examples given of Secret
Approved For Release 2001/09/04: CIA-RDP80-0063OA000300010001-6
Approved For Release 2001/09/04: CIA-RDP80-0063OA000300010001-6
information. Confidential was defined as information whose
unauthorized disclosure "could be prejudicial to the defense
interests of the nation." No examples of Confidential were
given.
21 June 1957. Legislation Proposed by the Wright Commission.
"(1) the term 'top secret' or 'atomic top secret'
means any information affecting the national
defense of the United States in such degree that
.its unauthorized disclosure could result in
exceptionally grave damage to the Nation; and
"(2) the term 'secret' or 'atomic secret' means
any information affecting the national defense
of the United States in such degree that its
unauthorized disclosure could result in serious
damage to the Nation." (Quoted by Relyea,
op. cit., p. 876.)
March 9, 1972. Defense Department Guidelines for Classification.
" ..a determination to classify shall be made only
when one or more of the following considerations
are present and the unauthorized disclosure of
the information could result in a degree of harm
to the national security:
1. The information provides the United States,
in comparison with other nations, with a
scientific, engineering, technical, opera-
tional intelligence, strategic or tactical
advantage related to the national defense.
2. Disclosure of the information would weaken
the international position of the United
States; create or increase international
tensions contrary to U.S. interests; result
in a break in diplomatic relations; or lead
to hostile economic, political, or military
action against the United States or its
allies, thereby adversely affecting the
national defense.
Approved For Release 2001/09/04: CIA-RDP80-0063OA000300010001-6
Approved For Release 2001/09/04: CIA-RDP80-00630A000300010001-6
3. Disclosure of the information would weaken
the ability of the United States to wage war
or defend itself successfully, limit the
effectiveness of the Armed Forces, or make
the United States vulnerable to attack.
4. There is sound reason to believe that other
nations do not know that the United States
has, or is capable of obtaining, certain
information or material which is important
to the international posture or national
defense of the United States vis-a-vis
those nations.
S. There is sound reason to believe that the
information involved is unique, and is of
singular importance or vital to the national
defense.
6. The information represents a significant
breakthrough in basic research which has
an inherent military application potential
in a new field or radical change in an
existing field.
7. There is sound reason to believe that knowledge
of the information would provide a foreign
nation with an insight into the war potential
or the war or defense plans or posture of the
United States; allow a foreign nation to
develop, improve or refine a similar item of
war potential; provide a foreign nation with
a base upon which to develop effective counter-
measures; weaken or nullify the effectiveness
of a defense or military plan, operation,
project, or activity which is vital to the
national defense.
The criteria will be reexamined in light of the
new Executive order [that is, E.O. 11652].
(Statement of Joseph J. Liebling, Deputy Assistant
Secretary of Defense. Senate Hearings on Clas-
sification, op. cit., pp. 17409-17410.)
Approved For Release 2001/09/04: CIA-RDP80-00630A000300010001-6
Approved For Release 2001/09/04: CIA-RDP80-0063OA000300010001-6
1974. S-2451, a bill introduced by Senator William D. Hathaway.
Secret Defense Data, a single classification defined as
information the disclosure of which would adversely affect the
ability of the United States to protect itself afainst overt
or covert hostile action. (Senate Hearings on Government
Secrecy, op. cit., p. 77).
19 February 1976. Definition of Classified Sources and Methods
of Information. See footnote 68.
Approved For Release 2001/09/04: CIA-RDP80-0063OA000300010001-6
Approved For Release 2001/09/04: CIA-RDP80-00630A000300010001-6
ANNEX B
PRINCIPAL CHANGES EFFECTED BY E.O. 11652
The Order:
tightens the classification criteria.
reduces the number of agencies authorized to classify
from 47 under E.O. 10501 to 26, only thirteen of which
,have Top Secret classifying authority.
establishes schedules for automatic downgrading and
declassification of all information except that
falling in four exemption categories. (Under E.O.
10501 only one of four groups of information was
eligible for downgrading and declassification.)
It reduces the downgrading interval from three to
two years, and the declassification cycle from
12 years for all levels under the former Order to
10 for Top Secret, eight for Secret, and six for
Confidential.
subjects exempted information to mandatory review
for declassification ten calendar years after its
origination upon request of a member of the public
or of another government agency and to automatic
declassification thirty years after its origination
unless the head of the originating agency determines
102
Approved For Release 2001/09/04: CIA-RDP80-00630A000300010001-6
Approved For Release 2001/09/04: CIA-RDP80-00630A000300010001-6
in writing that the exempted information requires
additional protection.
charges the National Security Council with monitoring
the implementation of the Order and, to assist the
NSC in this function, envisages the creation of an
Interagency Classification Review Committee (ICRC).
(The ICRC was established by E.O. 11714, dated
24 April 1973, with the following composition: a
chairman appointed by the President; representatives
of the Departments of State, Defense, and Justice,
of the Atomic Energy Commission, the Central
Intelligence Agency, and the National Security
Council Staff.)
refers specifically in the preamble to the Freedom
of Information Act, stressing that the interests of
the United States are best served by making informa-
tion readily available to the public. In the accom-
panying statement President Nixon sums up well the
dichotomy implicit in FOIA and the classification
system: "Clearly the two principles of an informed
public and of confidentiality within the Government
are irreconcilable in their purest form, and a
balance must be struck between them."
- inveighs, in Section 4, against the besetting sins
of the classification system throughout its
Approved For Release 2001/09/04: CIA-RDP80-00630A000300010001-6
Approved For Release 2001/09/04: CIA-RDP80-00630A000300010001-6
history--overclassification and unnecessary
classification. Offenders "shall be notified"
and, in case of repeated abuses, shall be subject
to "administrative reprimand." Heads of agencies
are to take "prompt and stringent administrative
action" against those guilty of unauthorized
disclosure.
provides, in Section 9, a charter for supplementary
protection of classified information and material,
in particular for codeword compartmentation and
the informal compartmentation techniques employed
within the Clandestine Service. It reads: "Special
Departmental Arrangements. The originating Department
or other appropriate authority may impose, in con-
formity with the provisions of this order, special
requirements with respect to access, distribution
and protection of classified information and material,
including those which presently relate to communica-
tions intelligence, intelligence sources and methods
and cryptography."
Approved For Release 2001/09/04: CIA-RDP80-00630A000300010001-6
Approved For Release 2001/09/04: CIA-RDP80-00630A000300010001-6
BREAKDOWN OF THE CLASSIFICATION OF THIS STUDY
OVERALL CLASSIFICATION ..... CONFIDENTIAL E2 IMPDET
BY SECTIONS:
INTRODUCTION ..... CONFIDENTIAL (Unclassified if asterisked footnote
of page 1 is removed.)
PRINCIPAL CONCLUSIONS AND RECOMMENDATIONS .....ADMINISTRATIVE -
INTERNAL USE ONLY
DEVELOPMENT OF THE CLASSIFICATION SYSTEM ..... UNCLASSIFIED
THE FUNCTIONING OF CLASSIFICATION WITHIN CIA ..... CONFIDENTIAL
Misclassification ..... CONFIDENTIAL
Related Issues ..... Confidential
Reasons for Misclassification .....ADMINISTRATIVE - INTERNAL
USE ONLY
Anomalies in the Handling of Top Secret Material ..... CONFIDENTIAL
Exemption, Downgrading, and Declassification ..... ADMINISTRATIVE -
INTERNAL USE ONLY
Impact of Freedom of Information and Privacy
Acts ..... ADMINISTRATIVE - INTERNAL USE ONLY
Scope of Noncompliance with E.O. 11652 ..... CONFIDENTIAL
Effect of Classification on the Agency ..... CONFIDENTIAL
THE PROBLEM OF DISCLOSURE ..... ADMINISTRATIVE - INTERNAL USE ONLY
CONCLUSIONS AND RECOMMENDATIONS ..... ADMINISTRATIVE - INTERNAL USE
ONLY
FOOTNOTES ..... CONFIDENTIAL (Except for footnote 32, which is
Confidential, footnotes as a whole are unclassified,
Administrative - Internal Use Only
ANNEX A ..... UNCLASSIFIED
ANNEX B ..... UNCLASSIFIED
ANNEX C. . . . , UNCLASSIFIED
Approved For Release 2001/09/04: CIA-RDP80-00630A000300010001-6
CONFIDENTIAL
Approved For Release 2001/09/04: CIA-RDP80-00630A000300010001-6
Approved For Release 2001/09/04: CIA-RDP80-00630A000300010001-6
CONFIDENTIAL