PHYSCIAL AND PERSONNEL SECURITY INVESTIGATIONS INTELLIGENCE CHARTER ISSUE PAPER FOR THE SPECIAL COORDINATION COMMITTEE

Document Type: 
Collection: 
Document Number (FOIA) /ESDN (CREST): 
CIA-RDP87B01034R000100080032-1
Release Decision: 
RIFPUB
Original Classification: 
K
Document Page Count: 
7
Document Creation Date: 
December 19, 2016
Document Release Date: 
December 21, 2006
Sequence Number: 
32
Case Number: 
Content Type: 
REGULATION
File: 
AttachmentSize
PDF icon CIA-RDP87B01034R000100080032-1.pdf545.59 KB
Body: 
Approved For Release 2006/12/28: CIA-RDP87B01034R000100080032-1 PHYSICAL AND PERSONNEL SECURITY INVESTIGATIONS INTELLIGENCE CHARTER ISSUE PAPER FOR THE SPECIAL COORDINATION COMMITTEE 1. Back round:-=This paper describes in summary fashion -` current practice* and procedures in the conduct of personnel and physical security investigations by the entities of the intelligence community. and presents basic issues that require resolution by the Special Coordination Committee in order to develop intelligence charter provisions governing the collection of- information that concerns United States persons for these purposes;. The general issues in this area are: a. Whether, and under what conditions, authority should be granted for unconsented collection of nonpublic information that concerns U.S. persons in the course of personnel security investigations; b. Whether, and to what extent, should authority be granted for such collection in connection with maintaining the physical security of intelligence facilities, information, and personnel; and, c. Whether, and subject to which* limitations, should such collection be authorized in order to identify, investigate or prevent breaches of security rules, regulations and contractual obligations. 11. Current Practice: Executive Order 12036 currently authorizes CIA, DOD and NSA to protect the security of their installations, activities, information and personnel by "appropriate means" including "such investigations of applicants, employees, contractors, and other persons with similar associations" with those entities as are 'necessary. Current security investigative activities that concern U.S. persons may be loosely grouped under three general headings: (i) personnel security, (ii) physical security of facilities, information and_personnel, and (iii) violations of security rules and regulations. These types of activities are all engaged in, to one degree or another, by CIA, DOD, FBI, State, and NSA. (i) Personnel security investigations would include the collection of information concerning U.S. persons who are being considered for access to intelligence information or facilities and would include applicants for various forms A_ e 'ed For Releases--2OQ6/12/25-_-#+A-RDP87B81 F034 }B Q9 00 2= = Approved For Release 2006/12/28: CIA-RDP87B01034R000100080032-1 of staff or contract or proprietary employment or for clearances, sources or contacts who have agreed to assist the government, contractors, consultants, detailees, and service personnel (such as guards, painters, and telephone and other equipment r:maintenance personnel), and present employees, contractors, consultants, or other persons with current access to intelligence information to determine `heir continued-suitability for such access. Background information would.be collected concerning individuals in these categories through means and to a depth that would very depending on the degree and scope of access to be oranted. The minimum inquiry would consist of a request for rcvi(.%7 of entity, national agency, or local and municipal records for .any existing information concerning the subject, and the maximum inquiry would. involve a "full field investigation" that could delve as much as 15 years into the subject's background and include, at-least as. to CIA employees and civilian employees of NSA, a polygraph interview. in addition, periodic reinvestigations of these types of persons, including a'counterintelligence-oriented polygraph -interview, could be scheduled as appropriate covering the intc:.vening period since the last investigation. All-such inquiries currently are conducted only with the consent of the-invididual concerned, except for preliminary national L-enc:y records reviews that may be conducted by CIA solely to establish the identity of a potential source or contact. (iio collection of information concerning potential sources the subject of a separate issue paper.)- Spouses of applicants for employment may be the subject of national agency records reviews, and the new spouse of a current employee may be the subject of a field investigation inquiry e:;tunding over the-prior five years. Field investigations couli: include neighborhood inquiries, birth records, and police and, if appropriate, credit inquiries. In certain background inquiries conducted by CIA where cover considerations require, the subject, although providing biographic data and consenting, or the persons being interviewed, may not be- .-t%;t.re that the subject of the inquiry will be working either for an intelligence entity or for an entity assisting the U.S. Government. - (ii) Physical security investigations encompass so- called "site suitability" reviews and threats to the integrity or safety of entity facilities, information, or personnel. .-'- Site suitability investigations entail preliminarily surveying the area surrounding the proposed location of an overt or clandestine intelligence activity and reviewing entity, and sometimes national agency,-records to determine whether entities or persons in the immediate area pose a security problem for the activity. For example,- it would not do to locate a CIA or FBI meeting site next door to a'Soviet trade mission. Investigations relating to threats to facilities, 2 Approved For Release 2006/12/28-:?CIA-RDP87Bfllfl34R0001Q Approved For Release 2006/12/28: CIA-RDP87B01034R000100080032-1 information, or personnel are tailored to the circumstances. there a crowd or demonstration appears to pose a threat to an. installation, the appropriate federal, state, military, or local police authorities are contacted and the intelligence entity representatives generally limit their activities to support of these police officials and to observing the crowd behavior at or near the facility. Suspicious activities by individuals outside entity-facilities (for example, use of telepho'o lens cameras or listing license plate numbers of cars entering or leaving) are also reported to the police, and the entity activity may be limited to obtaining a license plate number and attempting to identify the persons involved. Entity officials also would notify the FBI or Secret Service, as appropriate, of the contents of threatening mail or if the author of such mail should appear in the area.--= Where intrusion into an intelligence entity facility has occurred, the FBI, or local police if cover considerations require, would be notified and would investigate from a criminal or counterintelligence standpoint depending on the circumstances. Overseas, depending upon the circumstances, the local police may be contacted or the entity may 'conduct (iii) Breaches of security may be either inadvertent or deliberate. Inadvertent breaches by employees are usually discovered, investigated, and remedied administratively. Collection of information would proceed through interviews with the offending and other employees to determine the circumstances,of the breach. Deliberate breaches of security regulations or suspected leaks by employees would be investigated by interviews with employees with knowledge of the situation. Executive Order 12036 requires that senior intelligence. officials recommend to the Attorney General that serious or continuing security breaches be investigated by the FBI and where it is suspected that-'an employee may be furnishing information to a foreign entity, the matter would be turned over to the FBI. .111. Issues 1. Personnel Securi~X. Executive Order 12036 authorizes the DCI to protect intelligence sources and methods, by lawful means, against disclosure by present CIA employees or contractors. It also authorizes investigations, as necessary, of applicants,' employees, contractors, and other persons similarly associated with CIA, DOD, or NSA and permits by other than intrusive techniques the collection (using physical surveillance in some cases), retention, and dissemination of nonpublic information concerning U.S. persons without their consent when acquired in the course of "lawful" personnel security investigations or when related to present or former employees, present or former contractors or their employees,, and applicants for such employment or App ed For Re eai' se~12/-C1A-RDP87601034R000100080032-1 .. . Approved For Release 2006/12/28: CIA-RDP87B01034R000100080032-1 contracting when necessary to protect intelligence sources or methods. In limited circumstances this collection may include physical surveillance and pretext interviews. S. 2525 would have authorized CIA to conduct "background investigations" (without-elaboration but presumed to require consent) concerning applicants for employment, and would have* authorized'd issemination of information concerning the trustworthiness-qf any U.S_ person who has, had, or is being considered for, access to classified information.-. The issue-is whether,_and to what extent, statutory authority should be provided to collect nonpublic information that concerns U.S. persons without- their- consent in the context of personnel security investigations. It is assumed that any such authority for personnel security investigations need not extend to persons'beyond present employees and -_- various types and their employees, applicants for employment.- with an intelligence entity or proprietary and their spouses d close relatives to a-limited degree, applicants fo'r a n contractor status,. and persons who. are being cons'ide'red for access to intelligence facilities or information., electronic surveillance (or monitoring), physical searches= (including mail opening), or mail covers. The techniques that remain for consideration include only nonpublic sources- of information, "physical surveillance, covert human source inquiries, pretext and third party interviews, and federal, state and local records reviews. The options then appear to include: Option A - Provide no authority for collection of nonpublic information without consent; Option B Provide limited authority for such col- - - lection"only to the extent consent is unavailable-or. impractical' and only_as necessary to determine suitability or trustworthiness, and only through use of.-all or some - of the available techniques; Option C - Provide unlimited authority for such collection, or authority limited in some general way as to extent, or technique, but subject to regulation by entity procedures approved by the Attorney General;; . Ootion D- Provide unlimited authority, leaving regulation to entity heads. _ I . Approved For Release 2006/12/28: CIA-RDP87B01034R000100080032-1 2. pysical Security. Executive order 12036 authorizes , of their facilities it y ct the secur CIA, DOD and NSA to prote information, and personnel by "appropriate means". The Order also permits collection (using physical surveillance in some cases), retention,-and dissemination of nonpublic information that concerns an unconsenting.U.S. person arising out of "lawful" physical-security investigations, or concerning present or former employees or contractors or. their contacts, a.r concerning persons or activities that constitute a "clear threat" to any intelligence facility or personnel provided it is retained only by the threatened - entity and the Secret Service and FBI if appropriate. -The Order further exempts from its restrictions concerning relations with law enforcement authorities, cooperation with law enforcement entities to protect facilities and personnel. S. 2525 would have authorized unconsented collection of information concerning any U.S person-in or near an intelligence facility to determine whether to exclude that person, but?._ such colle'ction' would- have. been limited to physical surveillance, and requests for reviews of_federal,_state and local entities. In addition, S.- 2525 .would have. authorizes3 unconsented, nonpublic collection as to Li. S. persons. who are "reasonably -_- oses a clear h hi i p c ty w believed to be engaging-in. any activ threat" to any, intelligence facility 'or personnel,, but such- .- ld have been limited to physical surveillance i wou collect on. in the immediate vicinity of the-facility, pretext interviews,- and requests for reviews of federal, state and local entities. Again the issue centers on whether and to what extent should authority be provided to collect nonpublic informa- tion that concerns U.S. persons without their consent in the context of physical security investigations. It is assumed here also that specialized authority to use electronic surveillance and monitoring, physical searches. (including mail opening), or mail covers is unnecessary.- This leaves open for discussion'the-use of such techniques as physical surveillance, nonpublic- _sources' of information, covert human----- sources, pretext and third party interviews, and -federal, state,- and local records reviews. The options then appear to include: .- Option A - Provide no authority for collection of non- public information without consent. Option B - Provide limited authority for such collection only to the extent necessary to protect intelligence activities (e.g., site suitability investigations) or in the U.S. to determine whether to refer a matter (e.g., threats or disturbances) to. law, enforcement - authorities, and only through use of all or some of the available techniques. . _~ _ ._ ___.Aacaed Fox. eleasg 200 ;-2-z' .44-RBP-8-7-B01034R4} fi0fl 8.32=,I 7:. Approved For Release 2006/12/28: CIA-RDP87B01034R000100080032-1 option C - Provide unlimited authority for such col- lection, or authority limited in some general way as to extent or techniques, but subject to regulation by entity procedures approved by the Attorney General; -.- Option D - Provide unlimited authority, leaving regulation. to entity heads. 3.-- Breaches. of Securi. Executive order 12036 places responsibility in the DCI to protect against disclosure ence sources and methods by present or former CIA lli t i g e n o f employees or contractors through "lawful means". Senior- intelligence officials are charged by the order with reporting ches to the Attorney - b rea serious or continuing security vest ;Rat ion. This provision __ F I B n was intended to focus responsibility for_investig-ating security violations in the* FBI and, to some extent, to compensate-for the limitations imposed upon such activities by the_ intelligence entities. The order also authorizes CIA, DOD and NSA to protect security by- "appropriate means", ations of applicants, employees, investi ar g y including necess contractors, and other similarly associated _?persons. Physical surveillance is permitted by the Order for the purpose of- protecting intelligence_ sources and methods so long-as limited within the U.S., insofar as U.S. persons are -concerned,_ to present employees, contractors and their employees, military personnel, and persons in contact with such persons, and outside the U.S. also to persons formerly in any of these categories. Collection, retention, and dissemination of nonpublic information concerning U.S. persons without- their consent is permitted under the order regarding* present or former employees, contractors and their employees, and persons in contact with them, when necessary to protect. sources and methods from disclosure. S 2525 would have provided authority to collect information concerning U.S. persons who are employees, or ---- . -- contractors'and'their employees-to determine whether they----:--!-- have =-_ have violated any security rule or regulation. Such collection--- would have required entity head approval to proceed beyond. _ 180 days or to use covert human sources, mail covers; physical surveillance, or tax or.. other confidential records. In addition, S. 2525 would have-provided authority to collect _ information concerning U.S. persons in. contact with suspected- intelligence agents, but limited to 90 days and only to__ identify the person and determine whether the person has,' had, or will have access to sensitive information. In its November 1978 position paper, the SSCI indicated its preference.. that investigations of employees or former employees not be authorized unless there is "some evidence or reasonable - probability" that the person has or is about-to 'violate security regulations. __ApprnxetiF 61~1GiA-RD~B~B#?83.4f~668~t?32~-y-- Approved For Release 2006/12/28: CIA-RDP87B01034R000100080032-1 The issue here, as before, is focused on the nature and extent of the authority that should be granted in statute to collect nonpublic information and investigate actual or suspected breaches of security rules, regulations, or contractual obligations by U.S. persons without their consent, and the means by which such investigations should be carried out. Again it is assumed that electronic surveillance and monitoring or- physical searches (including mail opening) will not-be used ,for these purposes. It is also assumed that investigatory authority in this context need not extend.. beyond present and -former employees and contractors and their employees, as well as, to a limited degree, persons with whom these individuals come into contact. The options - appear- to_ include: Option A - Provide no authority for collection o nonpublic information without consent. Option B.- Provide unlimited authority for intelligence entities to collect nonpublic information concerning U.S. persons for these purposes, with or without a specific statutory standard. Option C - Same.as.option A but require entity procedures approved by the Attorney General. Option_D Provide limited authority through such means- - as time limitations and restrictions on the use, of certain techniques. - Option E - Provide limited authority to the intelligence entities but augment the responsibility and, authority of the FBI to conduct such investigations on behalf of .the intelligence entities. Approved For Release 2006/12/28: CIA-RDP87B01034R000100g890'32-1-