LEAKS
Document Type:
Collection:
Document Number (FOIA) /ESDN (CREST):
CIA-RDP86M00886R002800020038-2
Release Decision:
RIPPUB
Original Classification:
S
Document Page Count:
37
Document Creation Date:
December 22, 2016
Document Release Date:
September 26, 2008
Sequence Number:
38
Case Number:
Publication Date:
April 19, 1984
Content Type:
MEMO
File:
Attachment | Size |
---|---|
CIA-RDP86M00886R002800020038-2.pdf | 1.13 MB |
Body:
Approved For Release 2009/03/11: CIA-RDP86M00886R002800020038-2
AP
# Ilif
4,
42 ?*(be
Approved For Release 2009/03/11: CIA-RDP86M00886R002800020038-2
25X1
Approved For Release 2009/03/11: CIA-RDP86M00886R002800020038-2
TO:
EXECUTIVE SECRETARIAT
ROUTING SLIP
/
ACTION
DATE
INITIAL
1
D 1
ilF0
_
DCI
/
44we?i:
ry
sz:Ni.
11
EXDIR
D/ICS
5
DDI
6
DDA
7
DDO
8
DDS&T
9
Chm/NIC
10
GC
11
IG
12
Compt
13
D/Pers
14
D/OLL
15
D/PAO
16
SA/1A
17
AO/DCI
18
C/IPD/OIS
19
20
21
22
)
SUSPENSE
Remarks
3637 (10-81)
VJ Executiv4 Secreiary
7/ C7IY
ate
Approved For Release 2009/03/11: CIA-RDP86M00886R002800020038-2
Approved For Release 2009/03/11: CIA-RDP86M00886R002800020038-2
SECRET
IExecuth,0,-;.,,F--7
84- 1 740
19 April 1984
MEMORANDUM FOR: Deputy Director of Central Intelligence
FROM: Director of Central Intelligence
SUBJECT: Leaks
1. Bill Baker, Johnny Foster and Leo Cherne are going to give us their
thoughts on the leak problem based on the papers produced by Eloise. I am
committed to get back to Biden and Murtha with some ideas on how the leak
problem might be addressed.
2. I believe that Eloise's papers have been sent to the members of the
SIG-I, so they will have reviewed them by the meeting tomorrow. If you can
kind of open up a dialogue and get their thinking, I will pursue it further
at the meeting on the hostile presence. If I can get your ideas after your
talk with the SIG-I, I will move forward with the Congress and NSC.
William J. Casey
SECRET
Approved For Release 2009/03/11: CIA-RDP86M00886R002800020038-2
Approved For Release 2009/03/11: CIA-RDP86M00886R002800020038-2
R
Next 2 Page(s) In Document Denied
Approved For Release 2009/03/11: CIA-RDP86M00886R002800020038-2
25X1
Approved For Release 2009/03/11: CIA-RDP86M00886R002800020038-2
SECRET
MEMORANDUM FOR:
FROM:
SUBJECT:
DCl/ICS 84-3007
6 April 1984
Director of Central Intelligence
Eloise R. Page
Deputy Director, Intelligence Community Staff
-
Initiatives to Combat Unauthorized Disclosures
of Classified Intelligence Information
1. On 30 March 1984 I convened a meeting in response to
your charge to develop administrative, security and legal
initiatives which could be taken to help deal with the
problem of unauthorized disclosures. At this meeting, which
was attended by the Executive Director, the General Counsel,
the Director of Security, the Deputy Director of Legislative
Liaison, the Chairman of the Security Committee and senior
General Counsel representatives, including the Chairman of
SECOM's Unauthorized Disclosures Investigations Subcommittee,
the papers at Tab A were presented. After some discussion,
it was decided that the following proposals should be
submitted for your consideration.
I. INVESTIGATION
Nothing is more necessary at this point than
cycle of futility by finding an appropriate leak
it thoroughly investigated and having the leaker
and appropriately disciplined.
A. Presidential Statement
to break the
case, having
identified
-- Congressional and media focus on certain
aspects of NSDD-84 diverted attention away from
the problem of intelligence leaks and, if
anything, the problem has gotten worse. More
recently there has been some Congressional
recognition of the seriousness of such leaks and
we again need to signal Executive Branch concern.
DOWNGRADE TO UNCLASSIFIED
WHEN SEPARATED FROM TAB A
Approved For Release 2009/03/11: CIA-RDP86M00886R002800020038-2
Approved For Release 2009/03/11: CIA-RDP86M00886R002800020038-2
*We recommend a forceful Presidential
statement to his Cabinet and senior White House
officials, decrying the harmful effects of
leaks. Expressions of Congressional support from
the intelligence oversight committees would help
immeasurably.
B. Use of a Special Prosecutor
-- Current investigative timidity may
derive from the recognition that there are
political costs in pursuing an aggressive
investigation of media leaks.
*We recommend Attorney General appointment
of a special prosecutor (independent counsel) to
pursue sensitive leak investigations. The
special prosecutor should have all necessary
powers, including the ability to bring witnesses
before a grand jury.
-- Use of a special prosecutor in
appropriate cases will help assure the public,
and particularly the media, that the investi-
gation will be impartial and objective and
neither politically motivated nor politically
constrained.
C. Creation of a Separate FBI Leak Investigation Unit
-- Although we report a significant number
of leaks to Justice each year, very few are
investigated because Justice is not sanguine
about solving such cases and prefers to use FBI
resources on other types of cases.
*We recommend creation of a special unit
within the FBI to do nothing but investigate
intelligence leaks. The Intelligence Community
should support a line-item appropriation to
finance this unit.
-- Bureau assistance is necessary because
certain key government components have no
investigative staffs and in other departments and
-2
Approved For Release 2009/03/11: CIA-RDP86M00886R002800020038-2
Approved For Release 2009/03/11: CIA-RDP86M00886R002800020038-2
SLLRET
agencies responsibility and authority are solely
internal, with one agency unable to investigate
what happened to its information when
disseminated to a second agency.
-- Intelligence Community security
organizations and the DCI Security Committee must
provide appropriate assistance and work closely
with this FBI unit.
II. REGULATION OF GOVERNMENTAL CONTACT WITH THE MEDIA
-- Contact between government officials and
the-press-very often is salutary, contributing to
public knowledge and informing public debate.
Government officials, however, have no license to
jeopardize intelligence sources and methods or
mishandle classified information. Nevertheless,
newsmen regularly brag that they have daily
access to some of our most sensitive intelligence
publications.
*We recommend:
a) Centralizing within each
agency the regulation of all press
contacts so a single official is aware
of all authorized contacts;
b) Elimination of press building
passes giving unsupervised or
unrestricted access to government
buildings;
c) Requiring employees to record
all press contacts relating to their
official positions and duties; and
d) Establishment of guidelines
for backgrounders and indoctrination of
employees on press tactics and proper
responses.
III. SECURITY EDUCATION
The public generally regards intelligence leaks as
interesting, even titilating and perhaps useful in exposing
governmental excess but basically harmless. Leakers are seen
as vaguely heroic figures akin to whistleblowers, and leaks
are viewed as a kind of game in which the government tries to
- 3 -
SECRET
Approved For Release 2009/03/11: CIA-RDP86M00886R002800020038-2
Approved For Release 2009/03/11: CIA-RDP86M00886R002800020038-2
6EL Rh '1'
hide information while the media trys to find the secrets.
Until the public understands that compromises of intelligence
sources and methods erode our ability to obtain vital
intelligence and hurt the national security more than they
contribute to public debate, public support for needed
security measures will be lukewarm at best.
A. Presidential Commission
*We recommend creation of a Presidential
Commission to review intelligence leaks, to
examine steps which can be taken to protect
intelligence sources and methods from
unauthorized disclosure, ta-review existing
investigative and legal constraints and to make
recommendations to improve the situation.
-- Intelligence leaks have been a problem
in both Democratic and Republican administra-
tions. A nonpartisan blue ribbon panel could
help to generate greater public understanding of
the problem and support for appropriate remedial
steps.
B. Security Briefings
*We recommend a redoubling of efforts to
reach policy level officials in the State and
Defense Departments, the National Security
Council, and on the staff of the intelligence
oversight committees. These security briefings
should not be in a lecture format in which the
official being briefed listens passively to a
recitation of rules. Instead, the briefing must
focus on the specific audience, citing the actual
damage caused by leaks and explaining how, with a
modicum of care, intelligence sources and metnods
could have been protected with minimum impact on
the underlying news story or policy issue. There
must be practical guidelines for senior officials
on how intelligence material must be sateguarded
in dealing with the press.
C. Outreach Program
*We recommend an effort to increase public
awareness of the fragility of intelligence
sources and methods and the national security
implications of intelligence leaks. Senior
intelligence officials and public affairs
officers should take the time to develop this
issue in speeches, articles and other programs
which will reach important segments of the public.
- 4 -
Approved For Release 2009/03/11: CIA-RDP86M00886R002800020038-2
Approved For Release 2009/03/11: CIA-RDP86M00886R002800020038-2
rk 1., 1
IV. LEGISLATION
Arguably, unauthorized disclosures of classified
information are in violation of the espionage laws but
Justice has never successfully prosecuted a leaker under
these statutes. In part, this may be because it is necessary
to prove that the individual transmitting the national
defense information did so with reason to believe it would be
used to the injury of the United States or to the advantage
of a foreign nation and in part, because of a reluctance to
treat leakers as spies.
A. Criminalizing Leaks
*We recommend new legislation (Tab B)
criminalizing the willful unauthorized disclosure
of classified information by government employees
or other persons with authorized access to
classified information.
-- Such legislation would be free of the
intent requirements in the current espionage laws
and would make willful unauthorized disclosure of
classified information illegal per se.
B. Injunctive Relief
-- At the appropriate time after passage of
legislation criminalizing the unauthorized
disclosure of classified information, we might
consider seeking legislation (Tab C) providing
for injunctive relief in leak cases similar to
that available under the Atomic Energy Act.
2. To the extent appropriate, implementation of these
recommendations should be discussed with our oversight
committees. In this manner, we can capitalize on the growing
Congressional concern about damage to intelligence from leaks
and can avoid triggering a partisan political response to
actions which seek to deal with a very serious and very
urgent problem facing the Community.
Attachments: As stated.
-5
tuoise K. Page
Approved For Release 2009/03/11: CIA-RDP86M00886R002800020038-2
25X1
Approved For Release 2009/03/11: CIA-RDP86M00886R002800020038-2
Approved For Release 2009/03/11: CIA-RDP86M00886R002800020038-2
25X1
Approved For Release 2009/03/11: CIA-RDP86M00886R002800020038-2
Approved For Release 2009/03/11: CIA-RDP86M00886R002800020038-2
Approved For Release 2009/03/11: CIA-RDP86M00886R002800020038-2
R
Next 10 Page(s) In Document Denied
Approved For Release 2009/03/11: CIA-RDP86M00886R002800020038-2
25X1
Approved For Release 2009/03/11: CIA-RDP86M00886R002800020038-2
OF PSF (riY
DIPECTOR 07 C7NiaAl. INTELLIGENCE
Z.13C?It;ty c.ormin111)4
SECOM D-069
19 March 1984
MEMORANUUM FOR:
Director, Intelligence Community
Staff
FROM:
25X1
Chairman
SUBJECT:
Intelligence
Leaks
REFERENCE:
DCI MEMO
25X1
Subject:
Intelligence Leaks and Counterterrorism
Capabilities
1. The referent memorandum and the recent SSCI hearings have raised new
hopes that something can be done at last about those who breach their oaths
and reveal classified intelligence to the news media. The following
observatiorm on the leak situation may be useful to you in carrying out the
DC1's charge.
2. While Senator Biden's helpful attitude is gratifying, there is a need
to stimulate public opinion against leaks of classified information. There is
a great groundswell of apathy about leaks, both within the government and
among the general public. It is essential that new leak legislation, if it
can LIL passed, not be regarded with the same enthusiasm as the Volstead Act.
3. There has been little opportunity to take the anti-leak message to
rank-and-file government employees. Even worse, the public receives all its
information about leaks and anti-leak efforts from the news Media. While the
DCI videotape has been shown to high-level audiences in some; not all,
Intelligence Community agencies, it has not been generally presented to middle
and lower graded personnel, even in CIA.
4. We are not doing enough to create a climate of acceptance for anti-
leak efforts. Almost without exception, audiences vier4ing the DCI leak
videotape have expressed the belief that no progress will be made until senior
officials of the government stop leaking classified information for their own
purposes. The opinion persists that the public chastisement of one or more
identified high level leakers is essential to marshalling any anti-leak
support. The message is clear--mere words- are not enough. The government
must demonstrate that leaks are a sufficiently severe problem to warrant
decisive, well-publicized action against senior, well-connected officials.
Approved For Release 2009/03/11: CIA-RDP86M00886R002800020038-2
Approved ForRelease2009/03/11 : CIA-RDP86M00886R002800020038-2
U J um! ii.tj
5. There -;s a reasonable reluctance to use the Espionage Act to
prosecute leakers. Legislation is needed to deal specifically with the
disclosure of classified information by cleared individuals to unauthorized
persons. No matter how cne views it, this is a different crime from
espionage. Nevertheless, it is no less a breach of trust by a federal
official than illegal use of a limousine, disclosure of crop futures, or
misappropriation of federal funds. It deserves its own law. We should not
drive tacks with a sledge hamar. We have offered, then withdrawn,
legislative proposals on this topic for the past two years.
6. As the leak situation grows worse, our posture to combat leaks also
seems to be going downhill. The Brooks Bill, if passed, would hamper the
anti-leak effort. More importanta it would send a message that efforts to
combat leaks are somehow immoral, unconstitutional,or worse. It is essential
that Congressional liaison officers throughout the Community do everything
possible to educate members of both Houses on the pernicious nature of leaks
and the extremely disadvantaged posture of the government in combatting -
them. A solid defeat for the Brooks Bill is an indispensable step in our
effort to turn public opinion around.
7. CIA and the rest of the Community need to determine as precisely as
possible what the leak story is and how much of that story can be told
publicly; how much more can be told to Congressional leaders, and how much can
be told to top Administration officials. Unless we can present a credible
story that the US intelligence effort is being significantly damaged by leaks,
no amount of hand wringing is likely to have any effect, whatsoever.
8. We need to determine ways to get the general story before the public
and the specifics to those who can help lead the way back from apathy. 'Having
a good story doesn't help unless we can get people to listen. The DCI anti-
leak videotape has been an excellent counsciousness-raising exercise, but
there has been a constant uphill struggle to get audiences to view it. We
need to produce a new, hard-hitting, factual message on leaks and cbtain
authority to require cleared personnel throughout the government to attend.
e-
9. The fact that after four decades, the DCI still finds the slogan
"loose lips sink ships" useful indicates that posters are a powerful medium.
We should mount a poster campaign against leaks throughout the government.
Posters provide the message to masses of people without requiring any action
on their part_
10. As has been reiterated, the current procedures for -investigation of
unauthorized disclosures are geared to failure. The fragmented, agency-by-
agency approach to investigating leaks of information that is disseminated
government-wide doesn't provide a uniform effort. In order to ensure that
competent investigative resources are concentrated on areas most likely to
yield results, an overall, coordinated effort by a single agency is
required. The FBI is the only agency capable of doing the job. It is also
essential to the continued protection of intelligence sources and methods that
the investigation be closely ct,ordinated with senior Intelligence Community
2
Approved For Release 2009/03/11: CIA-RDP86M00886R002800020038-2
Approved For Release 2009/03/11: CIA-RDP86M00886R002800020038-2
officials Olo cr rin tfta ris!K of additional revelations of classifi?d
information at every step of the invastigation and recommend appropriate
action to avoid compounding or problems.
11. The fragmented approach to investigation does not permit any
analysis of leaks for possible patterns. Centralized investigation and
coordination would afford the opportunity to analyze the content, apparent
intent, possible sourcing, etc., in order to focus investigative efforts whore
they are likely to yield results. Sophisticated investigative and analytical
techniques, as currently being applied to the fight against narcotics, need to
be used against leaks. The current simplistic approach does not work.
12. To avoid having an anti-leak effort evaporate in a cloud of
frustration, there should be personnel and other resources dedicated to the -
investioation and prosecution of leaks, preferably with a Congressional
mandate. The current unsophisticated, relatively low level, effort appears to
result from reluctance to devote resources to a no-win situation. If the "
resources and appropriate guidelines can be made available, we can win, at
least some of the time. A concerted effort to mount a strong pilot operatk
offers the best chance of success.
13. Senator Biden's concern about lack of utilization of "graymail"
procedures illustrates to points that must not be ignored. The first is that
the passage of legislation, per se, is not enough to cure a bad situation.
The second is that nothing can be done about the leak problem unless some of
the offenders-rare identified and penalized.
14. I have telephoned all the members of the Security Committee and
requested their thoughts on new approaches to the leak problems. 'Their
responses will be provided to you when received.
15. Finally, I propose that we consider recommending appointment of a
presintial commission on unauthorized disclosure of classified
information.. A bi-partisad group of distinguished present and former members
of all three'branches of government could be given all the facts and asked to
report and recommend remedial action. Coming from such a broad-based group,
the recomnendations should command widespread support and would provide a
means of informing the American people of the gravity of the threat, if not
the details of it. Formation of a commission would provide a way to meet
several of the needs enumerated above. The primary drawback is that this is
an election year. Although timing is important, the action could be taken
after the election, because the problem will still b w:
3
nucrrTm ns !iv
- Approved For Release 2009/03/11: CIA-RDP86M00886R002800020038-2
25X1
Approved For Release 2009/03/11: CIA-RDP86M00886R002800020038-2
DIrt.'l;1(11
trite:lige:ICC,' CO111:11;111! y tOt
I (.
24 May 1983
3 1 MAY 1983
NOTE FOR: OCI-
VIA: DDCI
SUBJECT: Recommendations on the Leak Problem
The attached memorandum presents our ideas
and some recommendations on the leak problem. It
is the product of two things: (1) three separate
meetings with senior staff personnel, and (2) the
carefully considered thoughts over a long period
of time of the Security Committee. I think it is
pretty comprehensive, and some of the ideas have a
lot of merit. Unfortunately, the memorandum is
also rather long and not well suited for a quick
review. My purpose in sending it along as is--and
encouraging you to take the time to go through
it--is to give you a timely input as you consider
remedial action.
We are going to continue to pursue the subject
and will advise you of any additional thoughts.
And, of course, we are ready to respond to any
requirements that you may have for us to develop
policies and procedures for the Community.
Attachment
25X1
Approved For Release 2009/03/11: CIA-RDP86M00886R002800020038-2
Approved For Release 2009/03/11: CIA-RDP86M00886R002800020038-2,
MEMORANDUM FOR:
VIA:
FROM:
SECRET
Director
Intellioence Community Staff
Wasningion. D.C. 20505
Director of Central.Intelligence
Deputy Director of Central Intelligence
ICS-0802-83
24 May 1983
Director, Intelligence Community Staff
SUBJECT: Unauthorized Disclosures of Classified Information
25X1
25X1
1. Senior members of the Intelligence Community Staff have met to
consider responses to your call for proposals to7tounter the unauthorized
disclosures of classified intelligence which are increasing in number and
severity. The recommendations of the group are in five basic categories --
education, legislation, investigations, media interface and information
control. This memorandum discusses proposals in each of these categories.
2. Frilwatipo - There appears to be a lack of appreciation of the
consequences of the unauthorized revelation of classified intelligence
information, both to the national security and to the individual making the
disclosure. Each recipient of Sensitive Compartmented Information (SCI) is
indoctrinated on the potential damage to the national security of such
revelations, as well as the penalties prescribed in Title 18, Sections 793
through 798. Nevertheless, incidents continue which indicate that these
elements of risk are not being taken seriously. Recipients of classified
intelligence must be convinced that its unlawful revelation is reprehensible,
and that individuals who take it upon themselves to decide when the system may
be ignored place the national security and themselves in jeopardy.
3. In wartime, the population recognizes the need to keep military
secrets. The concept that "loose lips sink ships" is well accepted. We need
a campaign, beginning with the President, to convince all concerned that
classified information must be protected if we are to avoid national
disaster. A vigorous Presidential charge to the Cabinet and the Executive
Office of the President, relayed through channels to all levels, is an
essential element of this campaign.
4. Awareness of the importance of security to intelligence must be
extended to the Congress. The whole-hearted cooperation of both legislators
and staff members is indispensable. Not only is Legislative Branch support
needed to safeguard the material provided to the Congress, but also to put
teeth into the anti-leak effort.
Cl FY clnNFP
Annroved For Release 2009/03/11: CIA-RDP86M00886R002800020038-2
Approved For Release 2009/03/11: CIA-RDP86M00886R002800020038-2
SECRET
5. To make this effort credible, documents must be classified properly
and concern about disclosures should be limited to those affecting national
security.
6. A one-time effort to sensitize the government and the public to the
disastrous consequences of illegal disclosures, even one kicked off by the
President, has a limited half-life. There must be a planned follow-up. In
addition to the obvious reindoctrination efforts, consideration should .be
given to an ongoing program of damage-oriented "lessons learned" presenta-
tions. These are envisioned as timely, specific, succinct and technically
competent videotape shows detailing the nature of the unauthorized disclosure
and the specific losses suffered as a result. They would be shown to
audiences cleared for the compromised information as a means of reinforcing
the need for strong security.
7. Because of the general derision with which the media reoard
government efforts to stop leaks and because the oeneric term "leak" is
associated with disclosures that are politically gmbarrassing, It may be
advisable to avoid that term and speak only of "unauthorized disclosures of
classified information."
8. Legislation - The existing espionage laws were drafted to protect
U.S. secrets trom foreign agents. ,They did not contemplate the hemorrhaging
of classified data that has followed the media erni_r-c_i_rtnil--h-c?ki--ti---1---s of
classified information to the Russians by way of for
example, is a relatively new phenomenon. Even tiough the intentions of the ?
leaker may be to nobly inform the public of facts he thinks should be known,
the results are the same as directly transmitting the information to the KGB.
9. Attached is a copy of the proposed bill to prohibit certain
unauthorized disclosures of classified information. Formulated on the basis
of the Willard Report, it is an excellent vehicle for closing the loophole
that allows individuals to ignore classifications and make their own decisions
about what must or must not be kept secret. Passage of such a bill would make
it clear that both the legislative and executive branches are serious about
preserving our ability to keep our national security secrets. It would then
remain for the judiciary to show the same resolve.
10. The chances of passino the unauthorized disclosures bill are
directly related to the Congress's perception of how responsibly the Executive
Branch uses its classification powers. As noted above, the effort to educate
government employees (and the public, to the extent possible) on the need for
effective secrecy must also include the Congress and legislative staff
personnel. The means of reaching this objective are the same for both
branches of government -- graphic demonstrations that unauthorized disclosures
are costly in terms of money, national defense, intelligence capabilities, and
sometimes, human lives.
11. Legislation also is needed to make the unauthorized possession of
classified material a crime. It is illogical for the U.S. Government to be
Approved For Release 2009/03/11: CIA-RDP86M00886R002800020038-2
Approved For Release 2009/03/11: CIA-RDP86M00886R002800020038-2
SECRET
unable to brine char
t, or at least sue to recover classified
material
whn
makes a mockery of classification, or from
which has printed classified satellite
imaoery.
It the :U.S. woulo take action
against an ordinary citizen, it should
act with the same vigor against journalists who damage the national security.
The Attorney General and the General Counsels of the Intelligence Community
should begin a crash program to draft a legislative proposal and to review the
possibilities of action even without a. new law.
12. Whether or not the effort to pass new legislation is successful, it
is vital that Congress be included in any awareness-raising program. A
secondary objective would be to raise the security standards of the congres-
sional staffs. Many staffers have access to more sensitive information than
some CIA or NSA personnel, who are polygraphed as well as backorounded, and
are subject to periodic reprocessing. Congressional staffers are not steeped
in the discipline of security as are the intelligence professionals, and would
almost certainly benefit from a greater appreciation for the need for secrecy.
13. Finally, the problem of reinforcing the:responsibilities of formerly
cleared recipients of classified information to continue to maintain secrecy
requires attention. A periodic reminder by mail might be considered, but
except for CIA and NSA, it could be difficult to identify those who should
receive them. In the future, the archival file of the Community-wide,'
Computer-assisted Compartmented Control (4C) System, which will contain the
identities of individuals formerly* approved for access to SCI, should assist
with this problem. Meanwhile, the message needs to be spread that our "old
boys" can do a lot of harm by talking too much. Cleared persons still
employed in government must be reminded frequently and forcefully that those.
who have retired, or taken jobs in the industrial sector, may not legally
receive classified information unless they are specifically cleared for it.
14. InvestigLtions - The investigation of unauthorized disclosures has
rarely proven successful over the years. The broad dissemination required of
intelligence reporting, the lack of an effectual investioative program
throughout the aovernment, an apparent tolerant attitude toward those who make
illicit disclosures, and the absence of a leoislative basis for action have
made for a highly frustrating situation. NSOD-84 offers hope for greater
success in the future, but there is much to be done.
15. Although leak investigations are searches for needles in haystacks,
occasionally good investigative work will produce results. Unfortunately,
unauthorized disclosures to the media are consensual acts between two parties,
neither of whom is likely to admit participation, and one of whom enjoys a
special degree of privilege under the First Amendment. Legislation will help,
but there can't be a trial until a defendant_is identified. The abysmal track
record of leak investigations to date dictates that the Federal Bureau of
Investioation is the only agency with any chance of success. Fragmented,
single-agency efforts simply do not work. Nor does the proposal to form
interagency units to investigate unauthorized disclosures offer any reasonable
hope for improvement.
3
Approved For Release 2009/03/7171-A-RDP86M00886R002800020038-2
Approved For Release 2009/03/11: CIA-RDP86M00886R002800020038-2
SECRET
16. Even the FBI will require some help -- the full cooperation of other
aoencies, the legislation discussed earlier, and guidelines that permit the
use of as full a range of investigative tools as possible. The Attorney
General and the Director of the FBI should be instructed by the President to
provide the most permissive guidelines possible, consistent with the protec-
tion of civil liberties, for FBI investigations of unauthorized disclosures of
classified information. In addition, appropriate manpower allocations to the
FBI should be made to ensure a vigorous effort to solve unauthorized disclo-
sures. Without this, the Bureau cannot be expected to neglect other important
investigations to undertake tasks that offer a low probability of success and
almost certain criti ism i
I- I
20. Rress..In?erface - NSDD-84 mandates policies to govern contacts
between media representatives and agency personnel, leaving implementation to
the individual agencies. The effort to eradicate unauthorized disclosures
would be assisted greatly by the adoption of uniform rules for all agencies.
21. The discussi.on of government information, especially sensitive
intelligence, by a government employee is not a private, personal matter.
There seems no reason why the government cannot require the reporting of all
contacts with the news media, during or outside of duty hours, in which
Approved For Release 2009/03/11': CIA-RDP86M00886R002800020038-2
Approved For Release 2009/03/11: CIA-RDP86M00886R002800020038-2
SECRET
government business is discussed. Failure to follow such a rule could be
made subject to administrative sanctions of varying severity. Data on such
contacts could be computerized, by names of government employees, names of
media representatives, subjects of discussions and dates of contacts, pro-
viding a means of determining a great deal of information that could take
inordinate amounts of investigative effort. It wouldn't tell who made
unauthorized disclosures, but it would.proyide a means of determining who
might have had the means and the opportunity, and possibly even the motive
to have done so.
22. It would be ideal, from the standpoint of security, to abolish back-
grounders. Recognizing that this isn't going to happen, there should be firm
control of background briefings to the press. There must be clear-cut guide-
lines on who may authorize and present backgrounders. Every such briefing
should be attended by a security or public affairs officer isthaAnaws_Abat_is
s.ensiIive about the topic being discussed and is capable of ottering guidance
to the briefer. A record should be kept of briefings by names of participants
and authorizing officials, dates and topics, preferably in a computerized
mode. Presenters of background briefings should 'be required to prepare
summaries of what was presented. These should be cross-referenced to the
automated index of background briefings. The documentation of this infbrma-
tion and its retrievability will not only serve as an invaluable investigative
resource, but its existence will promote prudence in the presentation of
backgrounders and in other dealings with the press.
23. Even if all these proposals were adopted, there would be individuals
who would continue to divulge classified information to the press. But they ?
would find themselves operating at considerably greater risk. Simple failure
to comply with the reporting requirements would be cause for administrative
sanctions, and it would become easier to detect such failures by having a
reliable record of compliance, it is likely that associations between
oovernment personnel and media representatives are known to at least some
associates of both, and the possibility of being reported by a concerned
colleague would be enhanced by the revised rules. An effective education .
program about leaks should have the salutary effect of highlighting to their
associates those who may deal with the media without observing the reporIing
requirements. If those who comply are sufficiently convinced of the need for
regulation of press contacts, they may be inclined to "blow the whistle." It
would then be necessary for the government to demonstrate the seriousness of
its intent by taking administrative action against the nonreporting
individuals, regardless of their positions.
24. The matter of "authorized" or "official" leaks needs close atten-
tion. If the appropriate official determines?it is in the national interest
to release for publication information that was classified until that point,
there should be a means of recording that fact. Such a record would
appropriately be kept somewhere in the Executive Office of the President.
This record could provide a means of avoiding the expenditure of resources
to investigate such disclosures as "leaks."
nnt-rwAd For Release 2009/03/11: CIA-RDP86M00886R002800020038-2
Approved For Release 2009/03/11: CIA-RDP86M00886R002800020038-2
SECRET
25. Finally, the revolving door practice of appointing national media
personalities as top level government press officers should be carefully
reexamined. Such appointments must face the incumbents with conflicts of
interest and severely ambivalent feelings, both during and after their federal
service. It may be unrealistic to expect them to deny their colleagues
information which they feel is unjustifiably classified and to expect them
to forget, and never use, information they received officially.
26. Infonmation_Contilol - Some people believe there are enough
information control policies, procedures and regulations on the books to bring
the government to a complete halt if they were strictly applied. While this
view may have some merit, it should not serve as an excuse for not trying to
secure our sensitive information. The concept that security is everybody's
business must not be given lip service and then cast aside.
27. Except for the need for developing a strong, national information
control program for the emerging electronic information systems, it is
unlikely that more document control regulations &re needed or practicable.
What is needed is for everyone to be educated in-the existing policies and
procedures and to make a renewed effort to comply. While everyone claims to
know the regulations, it is likely that few could pass a comprehensive -test on
information security and control.
28. Steps to improve information control would include detailed
comparison of practices with policies; the reeducation of all personnel in
information security, and a motivational program to enhance awareness of the.
consequences of improper handling of sensitive intelligence. Better
information control is needed, but it must come from motivated people. More
regulations are not the answer.
29. Summary - Unauthorized public disclosures of classified information
in the news mediaare damaging to the national security. Our defense against
them must come from within, from those who are cleared for access to, and who
have signed agreements to protect, classified information. It is clear that
some of these people, for reasons of their own, have not kept their word. It
also appears that neither the overall level of concern about this situation
nor the government's capability for remedial action is up to the job. '
30. To encourage wholehearted support of our efforts to protect classi-
fied information, we must convince those who have agreed to keep the secrets
that they have a moral and legal obligation to keep that convenant. The rules
on SCI are simple and clear. It is inconceivable that anyone who gives such
information to uncleared individuals is unaware of what he is doing.
Therefore, such persons must be unconvinced of the seriousness of the security
program.
31. A massive reeducation program for all legitimate recipients of
classified information is the first step in attempting to achieve the
necessary change in attitude.
Approved For Release 2009/03/11: CIA-RDP86M00886R002800020038-2
Approved For Release 2009/03/11 CIA-RDP86M00886R002800020038-2
SECRET
32. A policy and resource commi tment to the solution of at least the
most flagrant cases of unauthorized disclosure is al so needed. This means the
devotion of sufficient FBI assets to i nvesti ?a ti ons and an al 1 -out effort to
obtain passage of unauthorized disclosure laws.
33. A severe ti ghteni ng of pol i ci es concerni ng rel ati onshi ps of cl eared
individuals with media representatives is essential. To be meaningful , this
must include strict oui deli nes, reporii ng procedures, information retrieval
capabilities, and impartial administrative penal i ti es for noncompliance.
34. Renewed awareness of i nformati on- control policies and procedures and
their importance to the national security is needed. If classified documents
can be turned over to the media or other unauthorized persons without bei ng
noticed, the system isn't working. . It must be made clear that "the system"
really is the people who operate it.
35. If you wish elaboration or action on any of the above items,
appropriate elements of the Intelligence Communi tY Staff are prepared to
assist in any way possible.
Attachment:
Draft unauthorized disclosures bill
?
All? paragraphs of the text
are classified SECRET
Annroved For Release 2009/03/1 1 : CIA-RDP86M00886R002800020038-2
25X1
Approved For Release 2009/03/11: CIA-RDP86M00886R002800020038-2
Approved For Release 2009/03/11: CIA-RDP86M00886R002800020038-2
Approved For Release 2009/03/11: CIA-RDP86M00886R002800020038-2
New version of proposed 18 U.S.C. -791
is attached. Note that the cover language
specifies that the proposal would have
to be recoordinated within the Administration
before being sent to the Congress
-
Approved For Release 2009/03/11: CIA-RDP86M00886R002800020038-2
Approved For Release 2009/03/11: CIA-RDP86M00886R002800020038-2
In the course of Administration development of the Fiscal
Year 1984 Intelligence Authorization Bill, the Intelligence
Community obtained from the Office of Management and Budget
clearance of a proposal to establish criminal penalties for
certain unauthorized disclosures of classified information.
The proposal was based in part on the report of the Interagency
Group on Unauthorized Disclosure of Classified Information
chaired by Deputy Assistant Attorney General (Civil Division)
Richard K. Willard. It was coordinated with Deputy Assistant
Attorney General (Criminal Division) Mark Richard, as well as
with the Office of the Secretary of Defense/Legislative Affairs.
For a number of reasons, including the issuance of NSDD-84
just before the Authorization Bill was forwarded to the
.7r
Congress, and in deference to the intelligence committees'
preference for handling the Intelligence Authorization in as
unobtrusive a manner as possible, the unauthorized disclosures
proposal ultimately was not transmitted as part of the
Authorization Bill. The climate for transmittal of the
proposal as part-of the?F-iscal -Year 1985 Int-e1-1-igence---
Authorization Bill also was considered unfavorable, due to
continuing controversy over NSDD-84.
The proposal (attached) has been modified to include former
officers or employees for a period of five years following
termination of their government service. It has been
reconfigured as a separate bill, and prepared for transmission
Approved For Release 2009/03/11: CIA-RDP86M00886R002800020038-2
Approved For Release 2009/03/11: CIA-RDP86M00886R002800020038-2
at an opportune moment as an initiative from the DCI. The
proposal would have to be .recoordinated within the
Administration before being sent to the Congress.
2
Approved For Release 2009/03/11: CIA-RDP86M00886R002800020038-2
Approved For Release 2009/03/11: CIA-RDP86M00886R002800020038-2
R
Next 3 Page(s) In Document Denied
Approved For Release 2009/03/11: CIA-RDP86M00886R002800020038-2
STAT
Approved For Release 2009/03/11: CIA-RDP86M00886R002800020038-2
Honorable Thomas P. O'Neill, Jr.
Speaker of the House of Representatives
Washington, D.C. 20515
Dear Mr. Speaker:
This letter transmits for the consideration of the Congress
legislation to provide criminal penalties for the unauthorized
disclosure of classified information by individuals who have had
authorized access to such information. The legislation is
designed to deter unauthorized disclosures of classified infor-
mation, which damage the national security interests of the
United States and raise grave questions about the ability and
willingness of the United States Government to protect its
secrets.
With the exception of disclosures of information in the
narrow categories of atomic energy Restricted Data, communi-
cations intelligence or cryptography, and identities of covert
agents, disclosures of classified information by government
employees and others with authorized access to classified
information, such as government contractors, do not constitute
21E se criminal offenses. /n many circumstances such conduct
would violate the Espionage Act or statutes protecting
government property from theft, but a variety of legal and
practical problems usually prevent such prosecutions. The
proposed legislation contains straightforward, easily
understood, and readily enforceable provisions prohibiting
willfdr?Unauthorized disclosure of classified information by
government employees and others XI authorized access to
classified information, who have had
? The proposed legislation has been narrowly tailored to
establish criminal sanctions for unauthorized disclosures of
classified information only when committed by individuals who,
by virtue of their acceptance of employment in positions of
trust involving the national security, have freely undertaken
the legal and moral obligation to protect classified
information. The legislation has also been crafted carefully
to preserve access to classified information by the executive,
legislative, and judicial branches of government.
Approved For Release 2009/03/11: CIA-RDP86M00886R002800020038-2
Approved For Release 2009/03/11: CIA-RDP86M00886R002800020038-2
Timely consideration of this legislation of great
importance to the continued security of the nation would be
greatly appreciated. The Office of Management and Budget has
advised that enactment of the proposed legislation would be in
accord with the President's program.
Sincerely,
William J. Casey
Director of Central Intelligence
Approved For Release 2009/03/11: CIA-RDP86M00886R002800020038-2
Approved For Release 2009/03/11: CIA-RDP86M00886R002800020038-2
Approved For Release 2009/03/11: CIA-RDP86M00886R002800020038-2
Approved For Release 2009/03/11: CIA-RDP86M00886R002800020038-2
Two versions of the
Injunction Provision
Approved For Release 2009/03/11: CIA-RDP86M00886R002800020038-2
Approved For Release 2009/03/11: CIA-RDP86M00886R002800020038-2
R
Next 1 Page(s) In Document Denied
Approved For Release 2009/03/11: CIA-RDP86M00886R002800020038-2
STAT
Approved For Release 2009/03/11: CIA-RDP86M00886R002800020038-2
Approved For Release 2009/03/11: CIA-RDP86M00886R002800020038-2
25X1
Approved For Release 2009/03/11: CIA-RDP86M00886R002800020038-2
Approved For Release 2009/03/11: CIA-RDP86M00886R002800020038-2
Approved For Release 2009/03/11: CIA-RDP86M00886R002800020038-2
JUAttl
25X1
1
25X
23 March 1984
MEMORANDUM FOR: Director; Intelligence Community Staff
Executive Director
Deputy Director for Administration
General Counsel
Director, Office of Legislative Liaison
FROM: Director of Central Intelligence .
SUBJECT: Intelligence Leaks and Counterterrorism Capabilities
1. We need a quick and intensive review of what could be done to
attack the leak problem again in every possible way - legislatively,
administratively, and every other conceivable way. The current staccato
of leaks, the increasingly damaging impact and expression of concern and
offers of support in the Conarecs mandate thic The latAct and mnct chnnle-
ing is the broadcasting
2. Particularly significant was Joe Biden's reaction - the tongue
lashing he gave Justice for their passive attitude and general ineffectiveness,
and his demand that, if the gray mail legislation which he sponsored was not
enough to enable them to go after leaks, they tell them what else needs to
be done. This all may make for an opportunity to launch a more effective
campaign against leaking which can cost us the great bulk of intelligence
assets if it keeps up.
3. I attach a memorandum prepared on how leaks damage our counterterrorism
capabilities. The OKI strongly disagrees with its passiveness and acceptance
of our continued exposure to leaks even to the extent of seeing leaks as
sometimes helpful.
4. Will all five of you get on this, working your respective areas of
authority and influence, to gather ideas and do the necessary research to
come up with a program of action.
5. I will meet with you whenever you are ready.
William J. Casey
Approved For Release 200-9-/03/i1 : CIA-RDP86M00886R002800020038-2
STAT
25X1
25X1
25X1?
Approved For Release 2009/03/11: CIA-RDP86M00886R002800020038-2
R
Next 6 Page(s) In Document Denied
Approved For Release 2009/03/11: CIA-RDP86M00886R002800020038-2
25X1