THE CONSTITUTIONALITY OF THE INTELLIGENCE IDENTITIES PROTECTION ACT

Document Type: 
Collection: 
Document Number (FOIA) /ESDN (CREST): 
CIA-RDP90-00530R000300550002-2
Release Decision: 
RIFPUB
Original Classification: 
K
Document Page Count: 
28
Document Creation Date: 
December 23, 2016
Document Release Date: 
August 22, 2012
Sequence Number: 
2
Case Number: 
Content Type: 
MISC
File: 
AttachmentSize
PDF icon CIA-RDP90-00530R000300550002-2.pdf1.83 MB
Body: 
Declassified and Approved For Release 2012/08/22 : CIA-RDP90-0053OR000300550002-2 The Constitutionality of the Intelligence Identities Protection Act On June 23, 1982, President Reagan signed into law' the Intelligence Identities Protection Act of 1982 (the Act),2 making criminal the disclosure of the identities of United States foreign intelligence operatives. Enactment of this legislation reflects heightened concern within the United States intelli- gence community over the exposure of foreign agents, which can threaten agents' personal safety and the effectiveness of intelligence activities. Despite this compelling interest in safeguarding the vitality of American intelligence efforts, the Act raises critical first amendment issues regarding the govern- ment's power to punish the divulgence of national security information. This Note evaluates the constitutionality of the Act in light of first amendment principles. After describing the Act's criminal provisions, the Note analyzes recent Supreme Court decisions in the area of disclosure of confidential government information and national security information. Ob- serving that the Court has delineated narrow yet significant areas of virtually unprotected disclosure, but has set extremely high standards of review in the areas outside the unprotected sphere, the Note applies these principles to the Act. The Note concludes that two sections of the Act, if narrowly construed, avoid constitutional difficulties. The third section, however, cannot be nar- rowly construed to avoid application to disclosure of properly classified infor- mation, lawfully obtained from the public domain by persons without autho- I. Remarks on Signing H.R. 4 Into Law. 18 Weekly Comp. Pres. Doc. 829 (June 23, 1982). 2. Pub. L. No. 97-200, 1982 U.S. Code Cong. & Ad. News (96 Scat.) (22. amending the National Security Act of 1947 (to be codified at 50 U.S.C. ?? 421-26). The Act's substantive provisions are as follows: . Sec. 601. (a) Whoever, having or having had authorized access to classified infor. mation that identifies a covert agent. intentionally discloses any information identifying such covert agent to any individual not authorized to receive classified information. knowing that the information disclosed so identifies such covert agent and that the United States is taking affirmative measures to conceal such covert agent's intelligence relationship to the United States, shall be fined not more than $50,000 or imprisoned not more than ten years, or both. (b) Whoever, as a result of having authorized access to classified information, learns the identity of a covert agent and intentionally discloses any information identify- ing such covert agent to any individual not authorized to receive classified information, knowing that the information disclosed so identifies such covert agent and that the United States is taking affirmative measures to conceal such covert agent's intelligence relationship to the United States, shall be fined not more than $25,000 or imprisoned not more than five years, or both. (c) Whoever, in the course of a pattern of activities intended to identify and expose covert agents and with reason to believe that such activities would impair or impede the foreign intelligence activities of the United States, discloses any information that identi- fits an individual as a covert agent to any individual not authorized to receive classified information, knowing that the information disclosed so identifies such individual and that the United States is taking affirmative measures to conceal such individual's classi- Declassified and Approved For Release 2012/08/22 : CIA-RDP90-0053OR000300550002-2 Declassified and Approved For Release 2012/08/22 : CIA-RDP90-0053OR000300550002-2 728 COLUMBIA LAW REVIEW [Vol. 83:727 rized access to classified information, and consequently violates the first amendment. 1. PROTECTION OF INTELLIGENCE IDENTITIES A. Background In recent years, disclosures of the classified identities of those intelligence officers, agents, and sources located abroad' have created mounting concern within the United States intelligence community. This concern is particularly directed at the editors of certain books (Dirty Work "I" and "2")* and periodicals (Counterspy and Covertaction Information Bulletin). In these publications, the editors have purported to identify foreign intelligence opera- tives in order to expose and nullify covert political intervention in the affairs of other countries." On at least two occasions, violent attacks on United States agents have followed public reports of their identities.' Moreover, the Central Intelligence Agency (CIA) attributes a continuing decrease in the effectiveness of United States intelligence activities to agent identity disclosures.? red intelligence relationship to the United States, shall be fined not more than 515,000 or imprisoned not more than three years. or both. 3. See generally H.R. 4. The Intelligence Identities Protection Act: Hearings before the Subcomm. on Legislation of the House Permanent Select Comm. on Intelligence, 97th Cong., 1st Sess. 13-56 (1981) (statements of W. Casey, R. Willard. J. Warner et al.) [hereinafter cited as House Hearingsl; Intelligence Identities Protection Act of 1981-5.391: Hearing before the Subcomm. on Security and Terrorism of the Senate Comm. on the Judiciary, 97th Cong., 1st Sess. 26-70 (1981) (statements of W. Casey, J. Stein, F. Hits, and R. Willard) [hereinafter cited as Senate Hearings). 4. Dirty Work: The CIA in Western Europe (P. Agee & L. Wolf eds. 1978); Dirty Work 2: The CIA in Africa (E. Ray, W. Schaap, K. Van Meter, & L. Wolf eds. 1979). See S. Rep. No. 201, 97th Cong., Ist Sess. 7-8 (1981) (hereinafter cited as Senate Report). 5. See House Hearings, supra note 3, at I (statement of Rep. Mazzoli). 6. See Agee, Introduction: Where Myths Lead to Murder, in Dirty Work, supra note 4, at 17-20; Proposals to Criminalize Unauthorized Disclosures, Hearings before the Subcomm. on Legislation of the House Permanent Select Comm. on Intelligence, 96th Cong., 2d Sess. 112 (1980) (statement of W. Schaap, editor, CovertAction Information Bulletin) (hereinafter cited as Proposals). In 'response to the passage of the Act, then pending in Congress, the editors of CoverrAction Information Bulletin announced in March 1982 that the periodical would discon- tinue its practice of disclosing identities until the Act's constitutionality was tested in court. N.Y. Times, Mar. 13, 1982. at 11, cot. 1. 7. In 1975 Richard Welch was identified as CIA Station Chief in Athens by the editors of Counterspy magazine and was murdered a month later. See Senate Report, supra note 4, at S. The editors denied responsibility for his (or any other) murder. See Proposals, supra note 6, at 113. In 1980 an American Embassy official in Jamaica was the target of an assassination attempt two days after the editors of CoverrAction Information Bulletin alleged he was one of a number of CIA officers stationed at the Embassy and, at a news conference, revealed the names, addresses, telephone numbers, and automobile information of these officers. Senate Report, supra note 4. at 8; see also H.R. Rep. No. 221. 97th Cong., 1st Sess. 4-5 (1981) (hereinafter cited as House Reportj. 8. House Hearings, supra note 3. at 13-14 (statement of W. Casey, Director of the Central Intelligence Agency). The assertion has been disputed by intelligence observers. See Franck & Eisen, Balancing National Security and Free Speech, 14 N.Y.U. J. Int'l L. & Pol. 339, 353-54 (1982). Declassified and Approved For Release 2012/08/22 : CIA-RDP90-0053OR000300550002-2 Declassified and Approved For Release 2012/08/22 : CIA-RDP90-0053OR000300550002-2 19831 INTELLIGENCE IDENTITIES ACT 729 Existing legal sanctions cannot deter these disclosures.0 Relevant provi- sions of the espionage statutes,1? which prohibit the communication of infor- mation relating to the national defense, apparently do not apply to the publi- cation of such information;" nor has any court specifically upheld the validity of a prosecution under the theft-of-government-property statute's where the "property" is national security information." Thus, no prosecutions have been attempted. The government has not sought a prior restraint against these disclosures, probably because such a restraint would be difficult to justify in the absence of a statute specifically prohibiting the disclosures.' B. The Intelligence Identities Protection Act of 1982 The Intelligence Identities Protection Act was enacted by the 97th Con- gress in response to the perceived threat to national security posed by intelli- gence revelations.1S The Act prohibits disclosures by three classes of individ- 9. The present Department of Justice takes the position that disclosures may be prosecuted under existing statutes but that certain problems with the scope of the statutes, see infra text accompanying note If. and difficulties of proof preclude their effectiveness. House Hearings, supra note 3, at 28 (statement of R. Willard, Counsel to the Attorney General for Intelligence Policy). 10. 18 U.S.C. ? 793(d), (e) (1976). The espionage statutes are codified at 18 U.S.C. ?? 793- 799(1976). 11. See Edgar & Schmidt. The Espionage Statutes and Publication of Defense Information, 73 Colum. L. Rev. 929 (1973). 12. 18 U.S.C. ? 641 (1976). 13. In the two reported national security cases in which this statute was the basis of a prosecution, the defendant was convicted under the espionage statutes, see supra note 10, as well, and the courts of appeal declined to review the validity of the ? 641 conviction because of the concurrent-sentence doctrine. United States v. Truong Dinh Hung. 629 F._d 908. 922 (4th Cir. 1980), cert. denied, 454 U.S. 1144 (1982); United States v. Boyce. 594 F.2d 1246, 1252 (9th Cir.), cert. denied, 444 U.S. 855 (1979). The Fourth Circuit suggested, in dictum, that national defense information is not "government property" within the meaning of ? 641. Truong Dinh Hung, 629 F.2d at 924-29. See generally Nimmer. National Security Secrets v. Free Speech: The Issues Left Undecided in the Ellsberg Case, 26 Stan. L. Rev. 311, 315-24 (1974). 14. See New York Times Co. v. United States, 403 U.S. 713 (1971) (per curiam) (vacating prior restraint not based on statute prohibiting disclosure). In concurring opinions, two Justices suggested that they might uphold a prior restraint if there were a statute specifically authorizing such a proceeding. Id. at 732-34, 740 (White, J., concurring); id. at 746-47 (Marshall, J., concurring). Two other Justices, also concurring, suggested a willingness to uphold a prior restraint if there were at least a statute barring the publication. Id. at 720-22 (Douglas, I., concurring); id. at 718-19 (Black, J., concurring). 15. Pub. L. No. 97-200, 1982 U.S. Code Cong. & Ad. News (% Stat.) 122, amending the National Security Act of 1947 (to be codified at 50 U.S.C. ?? 421-26). The Act is a direct descendant of several bills that were introduced in the 96th Congress to criminalize disclosures of intelligence identities. H.R. 5615, 96th Cong.. 1st Sess. (1979); S. 2216, 96th Cong., 1st Sess. (1979); S. 2284, %th Cong:, 2d Sess. (1980). The bills died in the crush of pre-adjournment legislation. N.Y. Times, April 8, 1981, at A14, col. 1. For a history and a critique of these bills, as to both constitutionality and functionality, see Note, "Naming Names": Unauthorized Disclosure of Intelligence Agents' Identities, 33 Stan. L. Rev. 693 (1981). The Stanford Note, in a brief discussion of the first amendment interests at stake, comes to the general conclusion that a statute prohibiting intelligence identity disclosures could be constitutional, but argues that prior restraints may be preferable less restrictive means. Id. at 706-09. In contrast, this Note undertakes an extensive first amendment analysis Declassified and Approved For Release 2012/08/22 : CIA-RDP90-0053OR000300550002-2 Declassified and Approved For Release 2012/08/22 : CIA-RDP90-0053OR000300550002-2 730 COLUMBIA LAW REVIEW (Vol. 83:727 uals, mandating fines and imprisonment penaltiest? for the violation of its provisions." There is no provision for the use of injunctions or other restrain- ing orders1d to suppress disclosures.'9 1. Disclosure by Government "Insiders. " The Act distinguishes between persons who have had authorized access2? to classified information (insiders) and those who have not had such access (outsiders)." Sections 601(a) and (b) define the offense as committed by insiders, with a further distinction between a person who has had access to classified information "that identifies a covert agent"22 and one who learns a covert identity "as a result of having had access to classified information" in general." Persons subject to these sections are Because of the line of descent of the Act, see House Report, supra note 7, at t0-1l; Senate Report, supra note 4, at 1-5, this Note occasionally cites the legislative history of the 96th Congress legislation. 16. Section 601(a) imposes a fine of not more than $50,000 or imprisonment for not more than ten years, or both; ? 601(b), S25,000 and/or five years' imprisonment; ? 601(c), $15,000 and/ or three years. The reason for the declining penalties is the relatively lesser degree of trust required of defendants in succeeding categories, and the concomitantly lesser breach of the trust. House Report, supra note 7, at 12; Senate Report, supra note 4, at 18. 17. The other provisions of the Act delineate defenses (? 602), create extraterritorial jurisdic- tion (1604), prohibit the implication of authority to withhold information from Congress (1605), and define various terms (? 606). 18. The House rejected an amendment to the Act providing for injunctive relief. 127 Cong. Rec. H6534 (daily ed. Sept. 23, 1981). Opponents of the amendment cited their fear of such relief being held unlawful because of the extra constitutional scrutiny applied to prior restraints. Id. at H6533-34 (statement of Rep. Mazzoli); id. at H6534 (statement of Rep. McClory). 19. The Act may well provide a basis for the imposition of a prior restraint. See supra note 14 and accompanying text. A discussion of the possible basis and limitations of a prior restraint based on the Act is beyond the scope of this Note. 20. "Authorized" is defined in ? 606(2) to mean: having authority, right. or permission pursuant to the provisions of a statute, Executive order, directive of the head of any department or agency engaged in foreign intelligence or counterintelligence activities, order of any United States court, or provisions of any Rule of the House of Representatives or resolution of the Senate which assigns responsi- bility within the respective House of Congress for the oversight of intelligence activities. 21. The terms "insider" and "outsider" are borrowed from Comment, First Amendment Standards for Subsequent Punishment of Dissemination of Confidential Government Informa- tion, 68 Calif. L. Rev. 83, 84 n.6 (1980). 22. Section 601(a). "Covert agent" is defined in ? 606(4): (A) an officer or employee of an intelligence agency or a member of the Armed Forces assigned to duty with an intelligence agency-(i) whose identity as such an officer, employee, or member is classified information, and (ii) who is serving outside the United States or has within the last five years served outside the United States; or (B) a United States citizen whose intelligence relationship to the United States is classified informa- tion, and-(i) who resides and acts outside the United States as an agent of, or informant or source of operational assistance to, an intelligence agency, or (ii) who is at the time of the disclosure acting as an agent of, or informant to, the foreign counterintelligence or foreign counterterrorism components of the Federal Bureau of Investigation; or (C) an individual, other than a United States citizen, whose past or present intelligence relation- ship to the United States is classified information and who is a present or former agent of, or a present or former. informant or source of operational assistance to, an intelli- gence agency. Identification must be accurate. See House Report, supra note 7, at 13; Senate Report, supra note 4, at 18. 23. This distinction is not material in the context of this Note. See infra text accompanying note 117. Declassified and Approved For Release 2012/08/22 : CIA-RDP90-0053OR000300550002-2 Declassified and Approved For Release 2012/08/22 : CIA-RDP90-0053OR000300550002-2 19831 INTELLIGENCE IDENTITIES ACT primarily government employees, who, as a rule, have agreed with the govern- ment not to reveal classified information.24 Both sections prohibit the intentional disclosure's of "any information identifying such covert agent" when the disclosure is made "to any individual not authorized to receive classified information." if the discloser "know[s] that the information disclosed so identifies such covert agent and that the United States is taking affirmative measures to conceal such covert agent's intelligence relationship to the United States." The identity of an agent must be classified information, but the information disclosed need not be, as long as it identifies an agent. 2. Disclosure by "Outsiders." Section 601(c) defines the offense with respect to persons who do not fall within sections 601(a) and (b), i.e., anyone who has not had "authorized access to classified information." Like sections 601(a) and (b), section 601(c) requires that the discloser intentionally reveal identifying information, knowing that he is identifying an agent whose iden- tity the United States is trying to conceal. Unlike sections 601(a) and (b), however, the section requires that the revelation be made "in the course of a pattern of activities intended to identify and expose covert agents ... with reason to believe that such activities would impair or impede the foreign intelligence activities of the United States." While it remains unsaid, section 601(c) implicitly covers two means of access: (i) lawful access, whether gained by obtaining access to such information as is in the public domain or by receiving information from an "insider,"48 and (ii) unlawful access, gained by breaking some law in the process.47 11. CONSTITUTIONAL STANDARDS FOR PUNISHING DISCLOSURE OF N4ATIONAt SECURITY INFORMATION The constitutionality of the Intelligence Identities Protection Act under the first amendment will depend on the protection that that amendment affords national security speech-the communication of information classi- fied for national security purposes.s" Applicable Supreme Court precedent 24. House Report, supra note 7, at 6-7. Although many such agreements are formal, in United States v. Snepp, 444 U.S. 507, 510 (1980), the Supreme Court said that such agreements may be implied from the position of trust such persons occupy in the government. See infra notes 109-10 and accompanying text. 25. Section 606(3) defines "disclose" to mean "communicate, provide, impart, transmit, transfer, convey, publish, or otherwise make available." It thus specifically deals with one problem of using the espionage statutes in this area, the uncertainty whether they cover publi- cation. See supra note I I and accompanying text. 26. A further distinction exists between information that exists as an identification (e.g., "Deputy Ambassador X is really the CIA Station Chief") and that which exists as an identifica- tion only after one deduces it (e.g., in source A. "In Togo, only CIA employees are permitted to wear brown suits"; in source B, "Deputy Ambassador X is the only U.S. government employee in Togo who wears a brown suit"). 27. The law violated must be one that otherwise would have prevented access. See infra note 81 and accompanying text. 28. Sections 601(a) & (b) of the Act contain the element of access to "classified informa- tion," and 1* 601(a)-(c) contain the element of disclosing the identity of a "covert agent," which Declassified and Approved For Release 2012/08/22 : CIA-RDP90-0053OR000300550002-2 Declassified and Approved For Release 2012/08/22 : CIA-RDP90-0053OR000300550002-2 732 COLUMBIA LAW REVIEW [Vol. 83:727 suggests that some national security speech is beyond the scope of the first amendment while other national security speech does benefit from first amendment protection. Speech in the former category may be regulated in any manner that the government finds appropriate. Speech in the latter category is also regulable, but only in limited circumstances. A. Unprotected Communication of National Security Information Certain forms of communication of national security information receive no first amendment protection. Such communication falls into two categories: speech by certain government insiders and speech whose content and context except it from the doctrine of prior restraint. Communication falling within these categories may be prohibited and punished by statute. 1. Speech by Insiders-The Snepp Principle. The first amendment does not protect classified information divulged by government employees whose positions involve such a high degree of trust that a fiduciary duty exists. In Snepp Y. United States,Y9 the Supreme Court upheld a standard prepublication review requirement imposed by agreement on a former CIA employee. That agreement required the employee to submit for review all material to be published relating to the CIA, regardless of whether the material was classi- fied.70 Another part of the agreement, not challenged in the case, prohibited is defined by ? 606(4) to mean a person whose identity as an agent is "classified information." Section 606(1) defines classified information as that designated as such "pursuant to the provi- sions of a statute or Executive order." It is not obvious on the face of the Act that what is being punished is the disclosure of classified information, since it in terms refers only to information that "identifies" a covert agent. This Note assumes that the proper construction of the statute is narrow, so that it does regulate "national security speech" as here defined. See infra text accompanying notes 121-23 & 131. Information is classified pursuant to the National Security Act, 50 U.S.C. ?? 401-406 (1976), by Executive order. The current order requires that "Top Secret" classification, the highest grade, be based on a decision by authorized officials that "unauthorized disclosure ... reasona- bly could be expected to cause exceptionally grave damage to the national security," Exec. Order No. 12,356, ? 1.1(a)(1), 47 Fed. Reg. 14,874 (1982). Information may be classified as "secret" if unauthorized disclosure reasonably could be expected to cause "serious" damage, id. ? 1.1(ax2); or "confidential," if unauthorized disclosure reasonably could be expected to cause "damage," id. 4 I.I(a)(3). Doubts are resolved in favor of classification and in favor of the higher level, pending final determination. Id. 4 I.1(c). The effect of classification is to restrict unauthorized access to such material. Id. 14. 1. 29. 444 U.S. 507 (1980) (per curiam). 30. All persons with access to "sensitive compartmented [classified) information" must sign similar secrecy agreements; all persons with access to classified information must sign nondisclo- sure agreements (without prepublication review). Presidential Directive on Safeguarding National Security Information, Dep't of Justice release, Mar. ll, 1983. The agreements are worded to comply with Snepp. See N.Y. Times, Mar. 12, 1983, at Al, col. 3. Besides the CIA, several other federal agencies specifically require employees to sign similar secrecy agreements. See 22 C.F.R. 4 10.735-303(b) (1982) (Department of State); 28 C.F.R. 4 45.735-12(c) (1982) (Department of Justice); see also statement of Lloyd E. Dean, Federal Bureau of Investigation, April 16, 1980, statement of Daniel C. Schwartz, National Security Agency, April 16, 1980, and statement of George A. Zacharias, Defense Intelligence Agency, March 16, 1980, before the Oversight Com- mittee of the House Permanent Select Committee on Intelligence. See generally the survey of policies of government agencies in Prepublication Review and Secrecy Requirements Imposed upon Federal Employees, Hearing before the Subcomm. on Civil and Constitutional Rights of the House Judiciary Comm., %th Cong., 2d Sess. 59-73 (1980). Declassified and Approved For Release 2012/08/22 : CIA-RDP90-0053OR000300550002-2 Declassified and Approved For Release 2012/08/22 : CIA-RDP90-0053OR000300550002-2 1983] INTELLIGENCE IDENTITIES ACT 733 him from disclosing classified information without authorization." The Court acknowledged the government's "compelling interest" in protecting both the secrecy of information important to national security and the appearance of confidentiality essential to effective intelligence activities." Without inquiring at length into the scope of first amendment protection," the Court found that the agreement signed by the defendant created a "trust relationship," which included an "obligation not to publish any information relating to the Agency without submitting the information for clearance.' " Such an obligation was found to be a reasonable means of serving the government's interest.u The majority, moreover, did not rely on the contractual relationship alone. Speak- ing more broadly, they indicated that the defendant's status as an employee and his access to confidential materials might also establish such a "trust relationship" and concomitant fiduciary duty." Thus, while in other circum- stances an employee's speech "might be protected by the First Amendment," his fiduciary status precludes such protection." This holding is narrower than might appear on first impression. While the employee may be restrained from and punished for publishing any material relating to intelligence activities unless he complies with the review imposed by agreement, when he does comply with this review the government may only prohibit the employee's unauthorized disclosure of properly classified infor- mation. The prohibition must be limited to properly classified information because in the case of unclassified or improperly classified information the government's interest in suppression is not compelling. Authority to classify is broad, encompassing information whose unauthorized disclosure "could" be expected to cause damage to the national security;' thus there is no tenable argument for suppression of unclassified or improperly classified information on the ground of potential harm to national security. In Snepp, the govern- ment apparently recognized the force of this argument, since it did. not argue for so broad a standard.7? Indeed, the Court noted that neither the govern- 31. The CIA reviews submitted material in order to determine whether publication would compromise classified information or sources. Snepp, 444 U.S. at 511. 32. Id. at 509 n.3. 33. The Court did not advance a particular rationale, but merely stated in a footnote that the CIA could protect certain government interests by imposing reasonable restrictions on speech "that in other contexts might be protected by the First Amendment." Id. Thus the Court essentially assumed a stance of extreme deference: as long as a restriction is a "reasonable means" of advancing the compelling interest in national security, it is permissible. 34. Id. at 510-11. 35. Id. at 509 n.3. See supra note 33. 36. Id. at 509 n.3, 511 n.6. 37. Id. at 509 n.3. 38. See supra note 28. 39. See Medow, The First Amendment and the Secrecy State: Snepp v. United States, 130 U. Pa. L. Rev. 775 (1982); Comment, Snepp v. United States: The CIA Secrecy Agreement and the First Amendment, 81 Colum. L. Rev. 662 (1981). The only circuit court to consider this issue adopted substantially these arguments. Alfred A. Knopf, Inc. v. Colby. 509 F.2d 1362 (4th Cir.), cert. denied, 421 U.S. 992 (1975). Declassified and Approved For Release 2012/08/22 : CIA-RDP90-0053OR000300550002-2 Declassified and Approved For Release 2012/08/22 : CIA-RDP90-0053OR000300550002-2 734 COLUMBIA LA W REVIEW [Vol. 83:727 ment nor foreign agencies would be concerned with unclassified or public domain information: since that information is available elsewhere, the govern- ment has no interest in ensuring that it not be published. 40 The Court drew from its finding that Snepp "violated his obligation to submit all material for prepublication review," the conclusion that Snepp "exposed the classified information with which he had been entrusted to the risk of disclosure. "" Thus the insider's fiduciary obligation is only to protect classified informa- tion. In addition, although Snepp does not so hold, "properly classified" must be limited to the classification of information relating to activities that are not themselves illegal. There is a strong first amendment interest in encouraging insiders who know of such illegal activities to make these activities public. Insiders may be the only persons who are able to obtain or interpret informa- tion on these activities, and the government cannot be said to have a legitimate interest in keeping them secret.42 2. Speech Unprotected Because of Content and Context. Communica- tion with certain content also may be deemed unprotected. Prior restraints against expression are ordinarily disfavored; they carry a "heavy presumption against [their] constitutional validity,' 143 a presumption to which subsequent punishment schemes are not subject. The 1931 case of Near v. Minnesota" established this doctrine within first amendment law. But at the same time, in dictum, the Near Court stated that prior restraints are not disfavored in "exceptional cases."'s Among these are the prevention in wartime of "actual obstruction to [the government's] recruiting service or the publication of the sailing dates of transports or the number and location of troops."'? Though the Near "troopship" exception applies by its terms only to prior restraints, the exception logically applies to subsequent punishment schemes as well. In the hierarchy of speech-regulation methods, prior restraints occupy the lowest position." Thus, if a prior restraint would be allowed in a particu- 40. 444 U.S. at 513 n.8. 41. Id. at 511 (emphasis added). 42. At the very least, such a limitation would be consistent with the first amendment interest in preventing, through free discussion, official breaches of the public trust. See New York Times Co. v. Sullivan, 376 U.S. 254, 274-75 (1964); see also Landmark Communications. Inc. v. Virginia, 435 U.S. 829, 838-39 (1978); Mills v. Alabama, 384 U.S. 214, 219 (1966). See generally Blasi, The Checking Value in First Amendment Theory, 1977 Am. B. Fnd. Rsch. J. 521. The current classification order prohibits information from being classified to conceal violations of law. Exec. order No. 2, 356, ? 1.6(a), 47 Fed. Reg. 14,874 (1982). For a discussion of the legal limits on activity of intelligence agencies, see infra note 99. 43. Bantam Books, Inc. v. Sullivan, 372 U.S. 58, 70 (1%3). 44. 283 U.S. 697 (1931). 45. Id. at 716. 46. Id. (footnote omitted). Also included are obscenity, incitement to violence or overthrow of the government, and fighting words (see also the discussion of fighting words infra note 57 and accompanying text). 47. The hierarchy is expressed through the technique of burdening prior restraints with a presumption against validity, see supra text accompanying note 45, which subsequent punish- ments do not share even though subsequent punishment schemes may themselves be subjected to rigorous tests of first amendment validity. See Smith v. Daily Mail Publishing Co., 443 U.S. 97, 102 (1979). This distinction is drawn because prior restraints are thought to be more restrictive in their impact on protected speech than are subsequent punishments. E.g., A. Bickel, The Morality of Consent 61 (1975) ("A criminal statute chills, prior restraint freezes."); Emerson, The Doc- Declassified and Approved For Release 2012/08/22 : CIA-RDP90-0053OR000300550002-2 Declassified and Approved For Release 2012/08/22 : CIA-RDP90-0053OR000300550002-2 19831 INTELLIGENCE IDENTITIES ACT 735 lar situation, a subsequent punishment would, a fortiori, be permissible." Indeed, the Supreme Court has implicitly adopted this position: in a recent case it cited the Near exception in passing on a subsequent punishment in the form of a passport revocation statute.49 The Near "troopship" exceptions define expression that, because of both its content (i.e., obstruction of recruiting, or disclosure of sailing dates) and its context (i.e., wartime) may be restrained. The original formulation was expressed in terms of a category of speech that "no one would question" could be restrained in advance." The more recent case of Haig Y. Ageest affirms the viability of the Near exception,S4 and, moreover, expands the range of content and context factors trine of Prior Restraint, 20 L. & Contemp. Prob. 648, 655-60 (1955). This differential impact may not always bear out in practice, see Smith, 443 U.S. at 101 ("respondents acknowledge that the statutory provision for court approval of disclosure actually may have a less oppressive effect on freedom of the press than a total ban on the publication"); nor is the theory without its critics, e.g., Litwack, The Doctrine of Prior Restraint, 12 Harv. C.R.-C.L. L. Rev. 519 (1977): Mayton, Toward a Theory of First Amendment Process: Injunctions of Speech, Subsequent Punishment. and the Costs of the Prior Restraint Doctrine, 67 Corn. L. Rev. 245 (1982); Murphy, The Prior Restraint Doctrine in the Supreme Court: A Reevaluation, 51 Notre Dame Law. 898 (1976). See also infra note 48. 48. The only reason a subsequent punishment might not be permissible would be that the reasons permitting a particular prior restraint were inapplicable to a subsequent punishment statute. In general, all restraints on expression have the broad goal of preventing particular communication; prior restraints and subsequent punishment both aim to accomplish this goal through deterrence of the expression. Prior restraints accomplish deterrence by judicial or admin- istrative restraint imposed prior to expression; subsequent punishment schemes, like all penal statutes, deter by the in terrorem nature of the punishment embodied in the statute. While no method relying on deterrence can ever be fully effective, prior restraints are deemed more likely to be effective. Because the greater likelihood of effective enforcement carries a greater threat to the exercise of first amendment rights, prior restraints are normally more difficult to sustain than are subsequent punishments. See supra note 47. If a prior restraint is upheld, it is because the court considers the expression sufficiently dangerous to warrant the risk of deterring protected speech, such as speech involving risk to national security. United States v. Progressive, Inc.. 167 F. Supp. 990 (W.D. Wis.), appeal dismissed, 610 F.2d 819 (7th Cir. 1979). Even in Progressive, though, the government rested its claim of an overriding interest on its statutory authority under the Atomic Energy Act, 42 U.S.C. ? 2274 (1976), to punish disclosure of the relevant information. 467 F. Supp. at 991. If deterrence is the goal, and the risks are high enough to warrant a prior restraint, the government should be required to provide some notice to potential speakers that their speech is disfavored; such notice should be embodied in a statute punishing disclosure. See supra note 14 and accompanying text. Furthermore, since subsequent punishment statutes are more efficient. cf. Mayton, supra note 47, at 253-54 (lower transaction costs than prior restraints), and more likely to survive, given the disfavor of prior restraints, deterrence could more easily be accom- plished by such statutes. There is, then, no reason to reverse or erase the traditional hierarchy in the national security situation. 49. Haig v. Agee, 453 U.S. 280, 308 (1981). See infra text accompanying notes 51-54. 50. 283 U.S. at 716. 51. 453 U.S. 280 (1981). 52. Aga does after the character of the Near exception in one important manner. Although the Near exception was framed in terms of wartime considerations, the Near "troopship" exceptions are, according to Agee, not limited to wartime. In Agee the Supreme Court stated that "[hlistory eloquently attests that grave problems of national security and foreign policy are by no means limited to times of formally declared war." Id. at 303. Indeed, in Agee the Court cited the "troopship" exceptions in upholding a speech restraint imposed in peacetime, without comment- ing on this expansive application. Id. Declassified and Approved For Release 2012/08/22 : CIA-RDP90-0053OR000300550002-2 Declassified and Approved For Release 2012/08/22 : CIA-RDP90-0053OR000300550002-2 736 COLUMBIA LAW RE VIEW [Vol. 83:727 that define it. Under Agee, the speaker's purpose, knowledge, and conduct are indicators of what may be termed per se unprotected speech. In Agee, the United States revoked the passport of former CIA agent Philip Agee on the ground that his prior and continuing disclosures of the identities of intelligence agents posed a threat to national security. The Su- preme Court held that revocation of the passport was not an unconstitutional abridgment of Agee's first amendment rights. First, the Court stated that revocation "rests in part on the content of [Agee's] speech: specifically, his repeated disclosures of intelligence operations and names of intelligence per- sonnel"; it then quoted the Near troopship exception language, and con- cluded, using language that closely echoed that of the Near Court,' that the disclosures were "not protected. "5' Implicit in the Court's reliance on Near is the notion that when speech falls within the literal terms of Near, or very close to them, there is no need to balance competing interestsu in order to deter- mine whether it is protected. Agee, then, defines a core of expression that is categorically unprotected, and leaves open the possibility that other analogous speech may be deemed to fall within this core category. Because Agee places the disclosure of intelligence identities within the core of the Near exception, it is important for the purposes of this Note to define the limits of the Agee holding. The mere fact that speech disclosesS? intelligence identities does not mean that the speech is unprotected. Unlike the old "fighting words" category, the content of the speech is not determinative of the issue.5' First, the purpose of the speech in question is also relevant in determining whether or not the speech falls within the core. In declaring Agee's disclosures "clearly not protected," the Court said, "among other things, [the disclo- sures] have the declared purpose of obstructing intelligence operations and the recruiting of intelligence personnel. "58 The relevance of the purpose factor is not immediately apparent, but may be read as an indicator of the likelihood of the occurrence of the feared effect-in this case the obstruction of intelligence activities." 53. "Agee's disclosures, among other things, have the declared purpose of obstructing intelligence operations and the recruiting of intelligence personnel." Id. at 308-09. 54. Id. Note that the speech restraint in Agee was the functional equivalent of a subsequent punishment scheme. For the implications of this, see supra text accompanying notes 47-49. 55. To determine the efficacy of a prior restraint on expression not subject to the Near exceptions (and otherwise not unprotected), the court must "determine whether ... 'the gravity of the "evil," discounted by its improbability, justifies such invasion of free speech as is necessary to avoid the danger."' Nebraska Press Ass'n v. Stuart, 427 U.S. 539, 562 (1976) (quoting United States v. Dennis, 183 F.2d 201, 212 (2d Cir. 1950) (L. Hand, J.)). 56. Note that the Court referred to Agee's repeated disclosures. 453 U.S. at 284. 57. The "fighting words "'category was brought into first amendment law in Chaplinsky v. New Hampshire, 315 U.S. 568 (1942), and focused solely on the content of the expression. That narrow approach, however, is obsolescent; the Court's approach now has some contextual elements. L. Tribe, American Constitutional Law 617-23 (1978); see Cohen v. California, 403 U.S. 15 (1971). 58. 453 U.S. at 308-09 (emphasis added). 59. In this context, purpose does not serve the usual function of a mens rea. which is to provide a moral component of the punished activity, compare, e.g., 1. Hall, General Principles of Declassified and Approved For Release 2012/08/22 : CIA-RDP90-0053OR000300550002-2 Declassified and Approved For Release 2012/08/22 : CIA-RDP90-0053OR000300550002-2 1983) INTELLIGENCE IDENTI77ES ACT 737 In addition, the breadth of the Agee holding is limited by Agee's status as an intelligence "insider." In cases involving the disclosure of confidential information, the Court generally distinguishes between persons with autho- rized access to the confidential information (insiders)80 and persons without such access (outsiders).61 In Agee this distinction makes sense because the "insider" element, like the purpose factor, increases the likelihood that the obstruction will occur. Insiders are more likely to possess the requisite inten- tion to obstruct; their knowledge of the intelligence area decreases the chance that they would disclose harmful information recklessly or negligently. Also, insiders are more likely to know what information would be most harmful.82 Agee's insider status, however, was not in itself crucial. His status was impor- tant because it provided him with knowledge regarding the significance of the disclosed information. Thus, an outsider's possession of the same knowledge would be an equally good correlative of the likelihood that obstruction would occur. This use of Agee's insider status distinguishes Haig Y. Agee from Snepp, where the insider status was itself crucial.83 Finally, one must examine the relevance of Agee's conduct to the deci- sion. In earlier cases,84 the Court refused to uphold passport revocations predicated on the holders' purported danger to the national security, when the only manifestations of this danger were speech, beliefs, or association. By Criminal Law 133-41 (2d ed. 1960). This is clear from the way in which the court considered purpose in deciding the first amendment issue: in its inquiry the focus was on the effect of the expression the government sought to suppress rather than on the moral culpability of the actor. Agee conceded that his activities "were causing or were likely to cause serious damage to the national security" for the purpose of challenging the facial validity of the revocation regulation. 453 U.S. at 28' & nn.10 & 11. The Secretary of State had made the determination of "serious damage." Since the Court held that "the Government's interpretation of the terms 'serious damage' and 'national security' shows proper regard for constitutional rights and is precisely in accord with our holdings on the subject," id. at 309 n.61, the Court must have assumed that "serious damage" is here equivalent to the "actual obstruction" referred to in .year. See supra note 46 and accompanying text. It therefore held that "when there is a 'substantial likelihood' of 'serious damage' to national security," as there was here, the government may act against a passport holder. Id. at 309 (emphasis added). Of course, purpose alone is insufficient to cause the obstruction; it must be coupled with speech capable of causing obstruction in order to be the object of sanctions. 60. See supra text accompanying notes 29-42. 61. See infra text accompanying notes 71-90. 62. But this knowledge may not be as great as the employer's: the agency may have a broader understanding of what could cause harm, because it has access to more information. See Snepp v. United States, 444 U.S. 507, 512 (1980). 63. The Court did not rely on the Snepp principle in deciding Agee, even though Agee acknowledged that the disclosures violated his secrecy agreement; it noted instead that measures to enforce the agreement would be useless outside the United States. Agee, 453 U.S. at 308 n.60. Generally speaking, enforcement of an insider's fiduciary obligation would be limited to an injunction for specific performance of his contract obligations, if any contract exists, or the imposition of a cotthtructive trust to remedy breach of his fiduciary obligations. See Medow, supra note 39, at 788 (summary of possible enforcement procedures). (Tort remedies may also be available. See Note, Breach of Confidence: An Emerging Tort. 82 Colum. L. Rev. 1426 (1982).) Furthermore, punishing an insider would require a statute authorizing punishment. Thus, the Court cited Agee's purpose and conduct in addition to his insider status. Moreover, the passport revocation order did not refer explicitly to his status. 453 U.S. at 286. 64. Aptheker v. Secretary of State, 378 U.S. 500 (1964); Kent v. Dulles. 357 U.S. 1 16 (1958). Declassified and Approved For Release 2012/08/22 : CIA-RDP90-0053OR000300550002-2 Declassified and Approved For Release 2012/08/22 : CIA-RDP90-0053OR000300550002-2 738 COLUMBIA LAW REVIEW (Vol. 83:727 contrast, the revocation of Agee's passport was predicated on his entire campaign to fight the CIA, of which "(b)eliefs and speech [were] only part. "63 The balance of the campaign consisted of conduct. Thus, the government alleged, and Agee conceded for the purposes of the litigation, that the cam- paign as a whole. was causing or was likely to cause serious damage to national security." Furthermore, the government never alleged that Agee's speech alone was damaging, nor did it base the passport revocation on this speech alone. Rather, the government referred to Agee's activities in foreign coun- tries carried out with the intention to disrupt intelligence operations and his intention to continue these activities. The Court recognized the significance of Agee's conduct by holding that the passport revocation was a permissible burden on Agee's freedom to travel, and stating that restricting his travel, "although perhaps not certain to prevent all of Agee's harmful activities, is the only avenue open to the Government to limit these activities."67 Restrict- ing his travel could have virtually no effect on Agee's ability to disclose intelligence identities. The Court's focus on Agee's conduct may be explained in one of two ways. Conduct may be necessary to show the likelihood of obstruction of intelligence operations. Or conduct could be evidence of an intention to obstruct (which, as is shown above, is itself a correlative of the likelihood of obstruction). At any rate, conduct is, according to Agee, an indicator of per se unprotected speech. Assuming that conduct is a relevant consideration, the question becomes what conduct is relevant. Agee is not clear on this issue; the Court did not identify which of the activities comprising Agee's "campaign" were endanger- ing the national security. The Court's description of the "campaign" con- sisted solely of the facts conceded for litigation." These facts include the recruitment and training of collaborators; repeated and public disclosures of the identities of CIA agents, employees, and sources; Agee's violation of his secrecy agreement with the CIA; prejudice to the United States; and violence following disclosures." From this it is unclear whether the conduct consists'of all these factors, some of them, or some of them only in conjunction with each other. The Court is clear only on the point that the campaign must pose a serious danger to national security. In sum, Agee outlines a set of indicators of per se unprotected national security speech: purpose, insider knowledge, and conduct. When some combi- nation of these indicators is present there is no need to balance interests. Agee does not, however, make clear what combination of these indicators is neces- 65. Agee, 453 U.S. at 305. 66. See supra note 59. 67. 453 U.S. at 308. 68. Id at 306 & n.58. 69. Id. at 283-86 & nn.1-8. Declassified and Approved For Release 2012/08/22 : CIA-RDP90-0053OR000300550002-2 .. Declassified and Approved For Release 2012/08/22 : CIA-RDP90-0053OR000300550002-2 19831 INTELLIGENCE IDENTITIES A CT 739 sary. Agee clearly holds only that the combination of all three factors is sufficient to find disclosures per se unprotected.70 B. Punishing Protected Disclosures of Confidential Information National security speech is a specific type of disclosure of confidential information.7' When this type of disclosure is made by an insider or when the content and context of the disclosure except it from the doctrine of prior restraint, the disclosure receives no first amendment protection. When a disclosure does not fall into these unprotected categories, some test must be employed to evaluate the permissible scope of regulation of the disclosure. The test logically applicable to this problem is the constitutional analysis that has been developed to deal with the general problem of punishing disclosures of confidential information. The Supreme Court has articulated a balancing approach to the review of statutes punishing such disclosures by persons who either do not have authorized access to the disclosed information or who are not immediately privy to it.72 1. Lawful Access by Third Parties to Confidential Information. The Supreme Court held in Landmark Communications v. Virginia" that a statute 70. Agee must be reconciled with the analysis in New York Times Co. v. United States. 403 U.S. 713 (1971), the only Supreme Court case to pass on the constitutionality of a prior restraint sought on national security grounds. The Court held unconstitutional a restraint on the publi- cation of a classified document (the "Pentagon Papers"). The test used to review the restraint was a definitional one, reflecting the principles implicit in the Near exception: "(O)nly governmental allegation and proof that publication will inevitably, directly, and immediately cause the occur- rence of an event kindred to imperiling the safety of a transport already at sea can support even the issuance of an interim restraining order." Id. at 726-27 (Brennan, J., concurring). "[D[isclo- sure ... [must] surely result in direct, immediate, and irreparable damage to our Nation or its people." Id. at 730 (Stewart, J., concurring). The opinions of Justices Brennan and Stewart, being the narrowest of the five concurrences to the per curiam holding, must be considered the holding of the case. The Agee Court did not mention New York Times when it applied Neu to Agee's disclo- sures. It might be argued that the Court should have explicitly tested the disclosures under the definitional test instead of focusing on whether factors were present that indicated the likelihood that speech would cause obstruction of intelligence activities. The implication of such an argu- ment is that, because New York Times requires actual proof of the likelihood of significant harm, Agee cuts back on the scope of the applicability of New York Times. See Agee, 453 U.S. at 321 a.10 (Brennan, J., dissenting). The analysis outlined in this Note, however, renders this argument unnecessary. The doctri- nal significance of Agee's applying Near while failing to attach significance to New York Times lies in its explicit recognition that speech falling within the Near exception is unprotected for all purposes. These factors, showing likelihood of harm, obviate the need to prove harm. This per se rule can coexist with New York Times: if Agee factors are not present, the speech is not per"se unprotected, but that is not the end of the analysis. The nature of the speech regulation deter- giines the course of analysis. In the prior restraint area, the New York Times test would then be applied. requiring proof of harm. Agee neither expressly nor implicitly obviates the necessity for such proof when per se factors are absent. See also infra text accompanying notes 92-94 for a discussion of the relevance of New Yost Times to the subsequent punishment of national security speech. 71. For a definition of national security speech, see supra text accompanying note 28. 72. As outlined above, see supra notes 29-42 and accompanying text, when national security disclosures are made by insiders the speech is unprotected. 73. 435 U.S. 829 (1978). Declassified and Approved For Release 2012/08/22 : CIA-RDP90-0053OR000300550002-2 ? Declassified and Approved For Release 2012/08/22 : CIA-RDP90-0053OR000300550002-2 740 COLUMBIA LAW REVIEW [Vol. 83:727 that imposes criminal sanctions on disclosure of information regarding confi- dential judicial proceedings unconstitutionally abridges first amendment rights. In Landmark, the Court overturned a newspaper's conviction for divulging accurate information. Although the state had a legitimate interest in the confidentiality of these proceedings such that it might lawfully inhibit access to them, once a speaker had lawfully obtained information pertaining to these proceedings the state's interest was outweighed by the encroachment on freedom of expression. The Court reached this result by balancing the interests of the state and the speaker. It held that in this context a court cannot defer to a legislative judgment, but must "make its own inquiry into the imminence and magnitude of the danger said to flow from the particular utterance and then ... balance the character of the evil, as well as its likelihood, against the need for free and unfettered expression. "74 In this balancing process, rights of expression are given great weight: the standard used to balance is that " `the substantive evil must be extremely serious and the degree of imminence extremely high before utterances can be punished.' ... 'The danger must ... immediately im- peril, ,+7s In addition, the Court stated that "[t]he possibility that other measures will serve the State's interests should also be weighed. "76 That is, the govern- ment must employ a less restrictive means of controlling dissemination." Thus, it must, if feasible, control access to information by making it confiden- tial, and must punish the breach of confidentiality by persons with authorized access; furthermore, it must control unauthorized access by "internal proce- dures. ""? The less-restrictive-means requirement permits the government to restrict initial access to confidential information to those immediately autho- rized to receive it, but prohibits the government from punishing disclosure by a third party who obtains the information.79 The information disclosed must, however, be lawfully acquired.60 This limitation serves to ensure that the government, by its laws, controls access, 74. Id. at 843. 75. Id. at 845. Justice Stewart's concurrence included the formulation, "government may not prohibit or punish the publication of ... information once it falls into the hands of the press, unless the need for secrecy is mainfestly overwhelming." Id. at 849 (footnote omitted). 76. Id. at 843. 77. See also Smith v. Daily Mail Publishing Co., 443 U.S. 97, 105 (1979). 78. Landmark Communications, 435 U.S. at 845 & n.13. Although this "internal proce- dures" requirement could be read to authorize the use of prior restraints on those insiders with authorized access, see Comment, supra note 21, at 88; cf. Snepp v. United States, 444 U.S. 507 (1980) (prepublication review procedure pursuant to valid secrecy agreement), the heavy disfavor of prior restraints, see supra notes 43-48 and accompanying text, means that a system of internally imposed controls on leakage would be much preferred. Cf. Nebraska Press Ass'n v. Stuart, 427 U.S. 539, 563-65 (1976) (invalidating judicially imposed prior restraint on publication of certain information pertaining to trial: judge can control dissemination of information by measures short of prior restraint); id. at 601 n.27 (Brennan, J., concurring) (court has power to control release of information by court personnel). 79. For a critique of this distinction, see Comment, supra note 21. 80. Cf. Smith v. Daily Mail Publishing Co., 443 U.S. 97, 103 (1979) ("(1lf a newspaper lawfully obtains truthful information about a matter of public significance then state officials Declassified and Approved For Release 2012/08/22 : CIA-RDP90-0053OR000300550002-2 Declassified and Approved For Release 2012/08/22 : CIA-RDP90-0053OR000300550002-2 19831 INTELLIGENCE IDENTITIES ACT 741 and relinquishes control where the reach of its law ends. Moreover, while a significant connection must exist between the law violated and the prevention of access to confidential information in order to punish disclosure of unlaw- fully acquired information," the law need not be directed specifically at access. The government's less restrictive means of preventing disclosure should include all its lawful powers. For example, if confidential documents were kept on file in a locked room, and a person broke into the room unlawfully, looked at the information, and disclosed it, punishment would be warranted. The less restrictive means chosen by the government in this case is to lock a room, so if breaking open a locked door is unlawful, access is unlawful, even if the law is not directed specifically at preventing access to confidential information.82 2. Information in the Public Domain. Once information escapes into the public domain, the government effectively loses control over its dissemina- tion. Regulation of the information can logically only be based on an interest other than preventing the public from gaining access to the information. Thus the state should not be able to restrain or penalize the dissemination of may not constitutionally punish publication of the information, absent a need to further a state interest of the highest order."). This limitation seems to qualify a very broad statement made in the Court's opinion in Houchins v. KQED. Inc., 438 U.S. I, 10 (1978): "The government cannot restrain communication of whatever information the media acquire-and which they elect to reveal." 81. For example, if a person drove through a red light on the way to gather information from a public library, it could hardly be said that access was unlawful. 82. Another definitional problem is whether initial unlawful access colors subsequent distri- bution of the information, so that a person could not disclose information obtained lawfully from a third person who had obtained it unlawfully. A variation of this question is whether unlawful disclosure by A to B is at the same time unlawful access by B from A. The problem could be solved by treating the information as akin to stolen property, so that its receipt would be unlawful in certain circumstances, such as where B knew A had had unlawful access. For a discussion of the problems such a concept raises, see generally Dennis. Leaked Information as Property: Vulnera- bility of the Press to Criminal Prosecution, 20 St. Louis U.L.J. 610 (1976). Cf. Nimmer, supra note 13, at 315-24 (use of 18 U.S.C. ? 641 (1976), the theft-of-govern ment -property statute, to punish removal of classified information by persons with authorized access, is unconstitutional). More generally, it could be argued that since disclosure of lawfully obtained information is allowed partially because it reflects a failure of the government adequately to restrict access, see supra text accompanying note 80, and since access to unlawfully obtained information does not reflect such a failure, the subsequent access is not "lawful" or at least not accorded the same treatment as lawfully acquired information. Where initial disclosure by A is a violation of an insider's fiduciary obligation. B's liability might be predicated on the theory that 8 participated in A's breach. It would have to be determined whether B's action completed the breach (since A's breach makes confidentiality nonexistent, it is unlikely that one could find B to have completed any such breach), and whether B knew his action was a breach of trust. See G. G. Bogert & G. T. Bogert, The Law of Trusts and Trustees 1901 (rev. 2d ed. 1982). Section 602(b) of the Act limits the reach of a prosecution for aiding and abetting, misprision of felony, or conspiracy. It requires that the "pattern" and "reason to believe" elements be satisfied as to a person prosecuted for these offenses. The legislative intent was to protect persons who receive disclosures made in violation of the Act. House Report, supra note 7, at 18; Senate Report, supra note 4. at 23. This provision does not fully answer the question, since conceivably a person could unlawfully obtain information and disclose it to a second person without violating the Act, and the second person could then disclose in arguable violation of the Act. Declassified and Approved For Release 2012/08/22 : CIA-RDP90-0053OR000300550002-2 Declassified and Approved For Release 2012/08/22 : CIA-RDP90-0053OR000300550002-2 742 COLUMBIA LA W REVIEW [Vol. 83:727 information obtained from sources available to the public, whether the infor- mation was affirmatively placed in the public domain' or not,64 where the only asserted state interest is in maintaining the confidentiality of informa- tion. But while the Supreme Court has never upheld a restriction on "disclo- sure" of public domain information, its language has been more circumspect when considering information that has come into the public domain despite or without the government's intervention than when the initial disclosure has come about by affirmative government action. In Cox Broadcasting Corp. v. Cohn,"s for example, the Court held unconstitutional a statute punishing the disclosure of a rape victim's name where the name had been obtained from official court records. The state asserted an interest in protecting the victim's privacy. The Court did not engage in an explicit balancing process; rather it appeared to advance an estoppel argument. It stated that "the interests in privacy fade when the information involved already appears on the public record," and went on to say that "[bjy placing the information in the public domain ... the State must be presumed to have concluded that the public interest was thereby being served. . . . If there are privacy interests to be protected .... the States must respond by means which avoid public docu- mentation or other exposure of private information."" By comparison, in Smith v. Daily Mail Publishing Co.,67 the Court employed a typical balancing- of-interests approach to strike down a statute prohibiting the publication of the identity of a juvenile participant in a court proceeding. In Smith, a newspaper obtained the identity of an accused juvenile offender by monitor- ing the police band frequency (a lawful activity) and questioning witnesses and a prosecutor. At least some of the information (the witness-provided portion) thus could be said to have reached the public domain without affirmative state action. The Court in fact stated that the way in which the information escaped "is not controlling" because `-`[a] free press cannot be made to rely solely 83. Cox Broadcasting Corp. v. Cohn. 420 U.S. 469 (1975) (statute prohibiting publication or other disclosure of rape victim's name held invalid as applied to name obtained by reporter from indictments open to public scrutiny; information was obtained lawfully). Cf. Oklahoma Publish- ing Co. Y. District Court. 430 U.S. 308 (1977) (invalidating pretrial order that prohibited publi- cation of name of juvenile offender obtained at hearing that by law had to be closed but at which press was present and neither parties nor judge objected; information was obtained lawfully). 84. Smith v. Daily Mail Publishing Co., 443 U.S. 97 (1979) (statute prohibiting publication of name of offender held invalid; newspaper reporter obtained name by monitoring police radio and questioning witnesses). 85. 420 U.S. 469 (1975). 86. Id. at 494-95, 496. The Court further stated: Public records by their very nature are of interest to those concerned with the adminis- tration of government, and a public benefit is performed by the reporting of the true contents of the records by the media. The freedom of the press to publish that informa- tion appears to us to be of critical importance to our type of government in which the citizenry is the final judge of the proper conduct of public business. Id. at 495. Compare the implied consent rationale in United States v. Heine. 151 F. 2d 813 (2d Cit. 1945) (L. Hand, J.), cert. denied, 328 U.S. 833 (1946), referred to infra notes 102-04 and accompanying text. 87. 443 U.S. 97 (1979). Declassified and Approved For Release 2012/08/22 : CIA-RDP90-0053OR000300550002-2 .. Declassified and Approved For Release 2012/08/22 : CIA-RDP90-0053OR000300550002-2 19831 INTELLIGENCE IDENTITIES ACT 743 upon the sufferance of government to supply it with information."" Never- theless, the Court balanced the state's interest in protecting juvenile anonym- ity against the first amendment interest, rather than applying the estoppel argument of Cox Broadcasting. The Court decided that the state's interest was insufficient, noting that to be valid the statute must be "necessary"99 to further the "highest form of state interest."" The differing approaches of Cox Broadcasting and Smith may be read as, an indication that in extraordinary circumstances the state may prevent the dissemination of public domain information. Considering the rationale under- lying the cases, one can assume that if the state does not willingly make the information public, if the dissemination did not occur because the state failed to employ properly its less restrictive means, and if the initial disclosure was both minimal and containable, the interests of the state arguably outweigh those of the speaker. C. Is the Analysis of National Security Speech Different? Thus, although the Supreme Court has never directly addressed the ques- tion of the constitutionality of a statute punishing the disclosure of national security information,9' there is an existing body of law that can be applied to statutes generally punishing disclosure of confidential information. Statutes punishing disclosure of national security information are a fortiori subject to this analysis, unless some reason compels a different treatment of national security speech. The relevant cases support a unified approach. 1. The New York Times Standard. While there is no body of case law dealing with the punishment of national security speech, the Supreme Court has set forth a standard for prior restraints in this area. In New York Times Co. v. United States,92 the Court held that the first amendment prohibits a restriction on publication of classified national security information unless direct, immediate, and irreparable damage to the nation will inevitably fol- low.9" The fact of classification, without more, is insufficient to prove such damage. Although New York Times is a prior restraint case, the standard it sets forth logically should inform the selection of a standard applicable to the punishment of disclosure of national security information by outsiders. When the government controls access to information by classification, it sets up a mechanism whose effect is to prevent information from reaching the public- the same effect that a prior restraint has. With respect to those members of the U. Id. at 103-04. 89. Id. at 104. 90. Id. at 102. 91. This is assuming that espionage statutes, which the Court has reviewed, see. e.g., Gorin v. United States, 312 U.S. 19 (1941) (vagueness challenge defeated), do not cover the disclosures. see supra text accompanying notes 10-16. 92. 403 U.S. 713 (1971). 93. See supra note 70. Declassified and Approved For Release 2012/08/22 : CIA-RDP90-0053OR000300550002-2 Declassified and Approved For Release 2012/08/22 : CIA-RDP90-0053OR000300550002-2 744 COLUMBIA LAW REVIEW (Vol: 93:n7 public who obtain information despite the control, punishment for the disclo- sure of the information is analogous to punishment for ignoring a prior restraint. This is not to say that the classification system is vulnerable to attack as a classic prior restraint. The system does not operate of its own force to prevent disclosure by outsiders. Rather, it operates by regulating disclosure to outsid- ers by agencies entrusted with sensitive information. Such disclosure is itself subject to the Snepp test, which validates the restraint. Thus the government may employ the system as a less restrictive means of keeping the information secret. There is a fundamental distinction, however, between regulating the national security speech of insiders through this less restrictive means, and regulating the speech of outsiders by the same means. Restricting public access clearly affects the speech interests of insiders, but not the speech interest of outsiders. It is thus not a classic prior restraint. Yet it partakes of the essential attributes of a prior restraint, i.e., the prevention in advance of the dissemina- tion of information. If one acknowledges that the system has this effect without impinging on a speaker's interests, the logical implication is that the prior restraint analysis-The New York Times test-should apply to the punishment of a speaker when punishment is predicated on the application of that system to the speaker. The speaker cannot, however, challenge the opera- tion of the system before it operates on his speech interests. The substantive level of stringency embodied in the New York Times standard is substantially the same as that embodied in the Landmark standard for the punishment of the disclosure of confidential information. Both stand- ards require a high degree of potential for immediate and extraordinary harm resulting from the disclosure. 94 Thus, the Landmark standard for the punish- ment of the disclosure of confidential information should also be applied to the punishment of the disclosure of national security information. a. Application to Lawfully Obtained National Security Information. The Landmark balancing test requires a judge to speculate on the likelihood that significant harm will result from disclosure. In the case of the disclosure of national security information, requiring a court to speculate in this manner seems both an inordinate burden on the judge and an inaccurate method with which to test a statute's legitimacy. The validity of claims of harm to national security is inherently difficult to assess. A judge is unlikely to have experience in weighing the specialized factors involved in the decision.95 Moreover, infor- mation necessary to make an accurate decision will likely be classified and 94. See supra tent accompanying notes 74 & 75. 95. For example, the judge in United States v. Progressive, Inc., 467 F. Supp. 990 (W.D. Wis.), appeal dismissed, 610 F.2d 819 (7th Cir. 1979), was asked to examine an article containing information on the operation of the hydrogen bomb and compare it with extremely technical information in the public domain in order to decide whether publication would "increase thermo- nuclear proliferation" and harm the national security. The court, while acknowledging that to write the article one needed sufficient expertise, considered itself up to the task of comparing the information. Declassified and Approved For Release 2012/08/22 : CIA-RDP90-0053OR000300550002-2 Declassified and Approved For Release 2012/08/22 : CIA-RDP90-0053OR000300550002-2 19831 INTELLIGENCE IDENTITIES ACT 745 thus unavailable to a judge." In subsequent punishment cases, however, this problem can be effectively remedied by requiring proof that significant harm was actually caused by disclosure.97 Mere proof of classification is not suffi- cient proof of significant harm, as New York Times held." The significant harm demonstrated must, however, affect a legitimate government interest. Absent such a requirement the government would be able to punish individuals for disclosures that revealed illegal government activity." b. Application to Unlawfully Obtained National Security Information. Where a statute punishes the disclosure of unlawfully obtained classified information, the government's interest should prevail and the statute be held constitutional. The less restrictive means of preventing disclosure of confiden- tial information is through internal procedures designed to prevent informa- tion from escaping.100 To allow disclosure after unlawful access nullifies the 96. Cf. the Classified Information Procedures Act, IS U.S.C. App. (Supp. V 1981). which was enacted to deal with the problems that arise when criminal prosecutions require the govern- ment or defendant to disclose classified information in order to present a satisfactory case ("graymail" tactics). The Act provides for hearings to determine whether and how such informa- tion shall be disclosed. 97. One commentator has stated: Taken together, (Cox Broadcasting Y. Cohn, Smith Y. Daily :Mail Publishing Co., Landmark Communications Y. Virginia, Nebraska Press Ass 'n v. Stuart, and New York Times Co. v. United States) leave little doubt that, except in cases involving imminent national military catastrophe, the Court will not permit previous restraints upon, or subsequent punishment for, publication in a mass medium of accurate information that the publisher has lawfully acquired. Cox, The Supreme Court, 1979 Term-Foreword: Freedom of Expression in the Burger Court, 94 Harv. L. Rev. 1, 17 (1980). Cox's limitation to "mass medium" seems unnecessarily cautious: the public interest can be served just as adequately by disclosure to individuals in a position to exert political influence as by dissemination to the public in general. 98. Since information may be classified by agents of the Executive, and may be classified upon a decision that "damage" may result, see supra note 28, the classification standard itself is insufficient proof of harm under the New York rimes standard. See Comment, supra note 39, at 690 n.185. 99. The activities of the government in the intelligence area are limited by Executive order pursuant to 50 U.S.C. ? 401 (1976) (congressional declaration of purpose to provide comprehen- sive national security program). Exec. Order No. 12,333, 46 Fed. Reg. 59,941 (1981). In addition to circumscribing the authority of the various agencies affected, the order provides that the conduct of intelligence activities is to be carried out "consistent with the Constitution and applicable law and respectful of the principles upon which the United States was founded." Id. 4 2.1; see also id. 1 2.8 ("Nothing in this Order shall be construed to authorize any activity in violation of the Constitution or statutes of the United States."). Instances of reporting on the abuses of authority by the agencies with authority to classify are well known. See generally T. Powers, The Man Who Kept the Secrets 271-308 (1979). These reports clearly advance the first amendment checking interest, see supra note 42. 100. See supra notes 77-79 and accompanying text. A variety of such meats are open to the government and are now being employed: These include physical barriers such as locked doors and windows; punishment of employees for failing to lock up documents; and compartmentaliza- tion of knowledge. T. Powers, supra note 99, at 66. Employees who have access to classified information may be subject to polygraph examinations. Presidential Directive on Safeguarding National Security Information. supra note 30. Some agencies construct elaborate systems to guard against disclosure and impose administrative sanctions on employees who violate the rules. See, e.g., 32 C.F.R. ? 159.141 (1982) (Department of Defense) (sanctions for knowing, willful, unauthorized disclosure range from "warning notice" to "removal or discharge"). Declassified and Approved For Release 2012/08/22 : CIA-RDP90-0053OR000300550002-2 Declassified and Approved For Release 2012/08/22 : CIA-RDP90-0053OR000300550002-2 746 COLUMBIA LAW REVIEW [Vol. 83:727 government's less restrictive means of controlling information availability. Thus, in contrast with the lawful-access situation, conditioning the right to disclose information gained unlawfully upon subsequent proof of significant harm would inadequately serve the government's interest in preventing such harm by restricting initial public access. Therefore, the public's interest in free expression extends only to the boundaries imposed by an otherwise valid law; if there is a sufficient connection between the law violated and the govern- ment's right to control access to classified information, disclosure may be punished. 2. Public Domain National Security Information. As indicated above, the state is generally not able to punish the dissemination of confidential information already in the public domain.t01 Once information escapes into the public domain, the government effectively loses control over it and can no longer assert an interest in preventing public access. Courts have divided over the question of the scope of first amendment protection for public domain national security information. The Second Cir- cuit held in United States Y. Heine102 that the espionage statutes cannot be construed to permit punishment of the dissemination of information gathered from "sources that were lawfully accessible to anyone who-was willing to take the pains to find, sift and collate it. 11103 The decision was not expressly based on the first amendment, but constitutional considerations entered into it: "so drastic a repression of the free exchange of information it is wise carefully to scrutinize, lest extravagant and absurd consequences result." 104 In Alfred A. Knopf, Inc. v. Colby,105 where the court focused specifically on first amend- ment concerns, the Fourth Circuit indicated in dictum that it was in agreement with this position. The court stated that while insiders may not republish classified information in the public domain,106 outsiders may.t07 A district court reached a contrary conclusion in United States v. Pro- gressive, Inc.108 and imposed a preliminary injunction based on the Atomic 101. See supra notes 83-89 and accompanying text. 102. 151 F.2d 813 (2d Cir. 1945) (L. Hand, J.), cert. denied, 328 U.S. 833 (1946). 103. Id. at 815. Heine's rationale was a theory of implied consent by the military services: "The services must be trusted to determine what information may be broadcast without prejudice to the 'national defense,' and their consent to its dissemination is as much evidenced by what they do not seek to suppress, as by what they utter." Id. at 816. Compare the rationale used by the Supreme Court in Cox Broadcasting Corp. v. Cohn, 420 U.S. 469 (1975), discussed supra note 86 and accompanying text. 104. 151 F.2d at 815. 105. 509 F.2d 1362 (4th Cir.), cert. denied, 421 U.S. 992 (1975). 106. Id. at 1370. 107. Id. (dictum). 108. 467 F. Supp. 990 (W.D. Wis.), appeal dismissed, 610 F.2d 819 (7th Cir. 1979). Cf. also Gros v. United States, 138 F.2d 261 (9th Cir. 1943) (upholding espionage conviction, challenged on other grounds, for dissemination of defense information apparently gleaned from newspaper clippings); United States v. Enger, 472 F. Supp. 490 (D.N.J. 1978) (not an essential element of an offense, such that it must be alleged in indictment under espionage statutes, 18 U.S.C. If 793 & 794 (1976), that information be of a secret, nonpublic nature). Declassified and Approved For Release 2012/08/22 : CIA-RDP90-0053OR000300550002-2 Declassified and Approved For Release 2012/08/22 : CIA-RDP9O-0053OR000300550002-2 1983) INTELLIGENCE IDENTITIES ACT 747 Energy Act100 against publication of classified information on the hydrogen bomb that had been gathered by a magazine reporter from both inadvertently declassified data and information in public sources. The court reasoned that a prior restraint was valid, by analogy to the Near exceptions, because even though some information was in the public domain, it took a certain amount of expertise to draw correct conclusions. Thus publication would, on the one hand, allow other nations more quickly to develop the bomb, while, on the other, would not significantly advance the public interest.110 The position set forth in Heine and Knopf is the more persuasive. The concerns that underlie the prohibition on the punishment of outsiders for the dissemination of confidential information in the public domain apply with even more force in the case of public domain national security information. Smith and Cox Broadcasting were based on the argument that once informa- tion is in the public domain the government no longer has a legitimate interest in regulating dissemination. This reasoning is particularly applicable to na- tional security information. Intelligence agencies have become so numerous and so sophisticated that any disclosure of confidential information is likely to be detected and exploited immediately." Moreover, the first persons to ob- tain disclosed information are likely to be precisely those from whom the government is most interested in keeping the information. Thus, after even minimal initial disclosure, the government's legitimate interest' 12 in regulating dissemination declines precipitously. From the government's point of view, little can be gained from inhibiting additional dissemination. Furthermore, in cases where the government affirmatively or negligently places the information in the public domain,!'' it may be argued that the government has failed to employ its less restrictive means of maintaining confidentiality. l` In the national security area, the government possesses 109. The relevant portions are 42 U.S.C. ?12274 & 2280 (1976), which, respectively, prohibit disclosure of certain data and authorize the enjoining of such disclosures. 110. Information in the article was published elsewhere while appeal was pending, where- upon the government withdrew its request for an injunction, and The Progressive published its material. For a history of the case, see Comment, A Journalist's View of The Progressive Case, 41 Ohio St. L.J. 1165, 1166-74'(1980). 111. See L.F. Prouty, The Secret Team 293-94 (1973). 112. The government might assert an interest in preventing the wider domestic public from obtaining information so that it might conceal illegal activities or prevent public policy discussion when secrecy is not necessary to maintain national security, cf. M. Halperin & D. Hoffman, Top Secret 31 (1977) (secrecy of covert operations of questionable legality and/or public support); this would clearly not constitute a legitimate interest. See Hill, Defamation and Privacy Under the First Amendment, 76 Colum. L. Rev. 1205, 1295 (1976). Nor is it now a legitimate ground for classification. Exec. order N9. 12,356, ? 1.6(a), 47 Fed. Reg. 14,874 (1982). 113. Outside observers blame CIA carelessness for the fact that intelligence identity informa- tion may be obtained by those without authorized access to it. N.Y. Times, Feb. 6, 1981, at A10, col. 6. But the CIA argues that since the information is publicly available, and since ex-employees are willing to help others find it, internal procedures instituted now would be worthless. See House Hearings, supra note 3, at 24 (statement of CIA Director William Casey). 114. Cf. New York Times Co. v. United States, 403 U.S. 713, 728-29 (1971) (Stewart, L. concurring) ("The responsibility must be where the power is. If the Constitution gives the Executive a large degree of unshared power in the conduct of foreign affairs and the maintenance of our national defense, then under the Constitution the Executive must have the largely unshared Declassified and Approved For Release 2012/08/22 : CIA-RDP9O-0053OR000300550002-2 . Declassified and Approved For Release 2012/08/22 : CIA-RDP90-0053OR000300550002-2 748 COLUMBIA LAW REVIEW (Vol. 83:727 special powers designed to allow it to control the dissemination of informa- tion.115 When the government fails to employ these powers effectively, and the information is disclosed, it should be estopped from punishing further dissem- ination of the information by outsiders.11e III. CONsTITUTIONAt.ITY of THE ACT Different kinds of disclosures warrant different levels of first amendment protection. The Act itself is divided into two conceptual categories: disclo- sures by intelligence insiders and disclosures by the public at large. A. Sections 601(a) and (b): Punishment of "Insiders" Sections 601(a) and (b) are nearly identical, and differ from (c), in that both define the offense with respect to persons who have had "authorized access to classified information"-insiders. Because such persons have a rela- tionship of trust with the government, their release of classified information- whether or not actually obtained during the course of authorized access-is unprotected by the first amendment. Thus, while sections 601(a) and (b) distinguish between insiders who have had access to classified information identifying a covert agent, and insiders who learn the identity as a result of having had general access to classified information, the distinction is immate- rial to the scope of protection accorded expression. A statute may constitu- tionally punish any insider who divulges any properly classified informa- tion.117 Construed narrowly,118 the Act operates within these bounds. Section 606(1) defines "classified information" to mean material "designated [as such] ... pursuant to the provisions of a statute or Executive order." On its face, this does not require that the information be properly classified. Im- proper classification, however, is simply that which is not authorized by the duty to determine and preserve the degree of internal security necessary to exercise that power successfully." (footnote omitted)). 113. Based on its foreign affairs power, the Executive branch of the government has special authority to regulate national security information. See New York Times Co. v. United States, 403 U.S. 713, 727-28 (1971) (Stewart, 1., concurring); Chicago & S. Air Lines v. Waterman Corp.. 333 U.S. 103, 111 (1948); United States v. Curtiss-Wright Export Corp., 299 U.S. 304. 320 (1936). See also Haig v. Agee, 453 U.S. 280. 307 (1981) (national security is the most compelling governmental interest, and measures to protect secrecy of intelligence operations plainly serve this interest). 116., Another argument. which would apply with equal force to non-national security infor- mation. is that if information is in the public domain, anyone repeating it has no notice that it is confidential. It would be manifestly unfair to burden the public with finding out whether information is confidential before repeating it. The unfairness is diminished if the repeater has actual knowledge that it is confidential. 117. "Properly classified" is here used as a term of art, the meaning of which is discussed supra text accompanying notes 39-41. 118. Narrow construction is required because if a limiting construction can be placed on a statute so as to remove its unconstitutional aspects, it will not be held invalid on its face. Broadrick v. Oklahoma, 413 U.S. 601, 613 (1973). Declassified and Approved For Release 2012/08/22 : CIA-RDP90-0053OR000300550002-2 Declassified and Approved For Release 2012/08/22 : CIA-RDP90-0053OR000300550002-2 19831 INTELLIGENCE IDENTITIES ACT 749 pertinent Executive order,119 and if "pursuant to" is read to mean "as autho- rized by," the statute would require that the identity revealed be properly classified. 120 Furthermore, section 602(a) sets up as a defense that the govern- ment has "publicly acknowledged or revealed" the identity of an agent, so that if an identity' is effectively declassified by official disclosure an insider may "disclose" it. Neither section requires in terms that the actual information disclosed be classified, but only that it identify a covert agent, whose identity by defini- tion141 is classified.'U Abroad reading that mandated punishment for disclo- sure of unclassified information would arguably infringe protected expres- sion. It makes more sense to characterize the section as punishing the disclosure of the classified identity itself. The connection between the infor- mation disclosed and the identity must therefore be narrowly confined. The Act does this by requiring that the individual know that the information identifies a covert agent. Furthermore, the legislative history indicates that the Act requires that the connection be direct and specific.'2' Thus, the insider is being punished for the effective disclosure of classified information learned through inside access. To this extent sections 601(a) and (b) are constitutional, since such expression is unprotected by the first amendment. B. Section 601(c): Punishment of "Outsiders" Section 601(c) differs from (a) and (b) in that it applies to individuals who do not have authorized access to classified information-outsiders. 124 1. Regulation of Per Se Unprotected Speech. If section 601(c) can be said to regulate per se unprotected speech, it is constitutional. Haig v. Agee held that three factors indicate such speech: purpose, insider status or equivalent knowledge, and conduct.123 119. Alfred A. Knopf, Inc. v. Colby, 509 F.2d 1362, 1367 (4th Cir.), cert. denied, 421 U.S. 992 (1975). The Knopf holding was based on the exemption from disclosure requirements of the Freedom of Information Act, 5 U.S.C. I 552(bXl) (1976). which applies to any information that is "in fact properly classified." 120. Legislative history supports this reading, albeit not unambiguously. The House Report, supra note 7, at 13, 20, 21, states that the identity disclosed must be "properly classified." The Senate Report, supra note 7, at 19, 24, 25, while otherwise tracking the House Report closely, leaves out the word "properly." On the other hand, it does not anywhere state that proper classification is not required. The dangers of reading too much into legislative silence militate against interpreting the Senate Report to support either interpretation. The Conference Report, H.R. Rep. No. 580, 97th Cong., 2d Sess. (1982), is of no help, but it does caution that "[tlhe Committee of Conference expects the executive branch to exercise the utmost care in making classification decisions in this area," id. at 12, a tenor comporting with the interpretation above. 121. See i :pra note 22. 122. See House Report, supra note 7, at 13; Senate Report, supra note 4, at 19. 123. See House Report, supt. note 7, at 13 (connection must be "direct, immediate, and obvious"); Senate Report, supra note 4, at 19 (connection must be "direct, and the information must point at a particular individual"). For instance, if the phone number, address, or automo- bile license number of a CIA station chief is not classified, but is disclosed so as to identify the chief, that is an offense. See House Report, supra note 7, at 13; Senate Report, supra note 4, at 19. 124. See supra text accompanying notes 26 & 27. 125. See supra text accompanying notes 56-70. Declassified and Approved For Release 2012/08/22 : CIA-RDP90-0053OR000300550002-2 ? Declassified and Approved For Release 2012/08/22 : CIA-RDP90-0053OR000300550002-2 750 COLUMBIA LA W REVIEW [Vol. 83:727 Presumably, an insider is subject to section 601(c), since by its terms it includes "any person." But since insiders can be prosecuted under sections 601(a) and (b), which require fewer elements of proof and impose harsher sanctions, and since the legislative intent of section 601(c) was clearly to reach outsiders,'s" it could be interpreted to exclude insiders from its coverage. In any case, section 601(c) does not require insider knowledge. Agee's insider position allowed him to acquire important knowledge about the significance of the information he was disclosing beyond the mere fact that it was classi- fied. Section 601(c) does not require that the discloser have such knowledge, only that he know "that the information disclosed ... identifies" a covert agent "and that the United States is taking affirmative measures to conceal such individual's classified intelligence relationship." Furthermore, section 601(c) does not contain the requisite purpose ele- ment. Agee's "disclosures ... ha[d] the declared purpose of obstructing intelligence operations. "121 Section 601(c) requires only that disclosures be made with "reason to believe that [his] activities would impair or impede the foreign intelligence activities of the United States."'Z" Arguably, section 601(c) does incorporate the third factor set forth in Haig Y. Agee-conduct constituting a "campaign to fight the United States CIA."129 The section specifically requires a "pattern of activities intended to identify and expose covert agents." This phrase, since it is broadly drawn, certainly describes Agee's conduct in a general sense, but it fails to define the essential characteristics of the "campaign," which involved repeated public exposures of identities intended to destroy CIA effectiveness by driving the agents out of foreign countries. Other activities, which can be distinguished from Agee on their facts, would fall within the "pattern" phrase-for exam- ple, a series of investigative articles in a newspaper that exposes illegal CIA infiltration of foreign governments. The legislative history, however, evinces an intent to exclude these kinds of activities, which are viewed as serving the public interest.'" The statute can therefore be construed as requiring the highly specific conduct described in Agee. 126. The House Report, supra note 7, at 7, states that the "third . . . class of individuals affected by the bill are those who ... never have held the position of trust which typifies members of the first and second class." The Senate Report, supra note 4, at 12, states that the "third ... class of individuals ... are those who ... have never had authorized access to classified information with its accompanying duty of care." 127. Haig v. Agee, 453 U.S. 280, 309 (1981). 128. The legislative history of the Act clearly evinces a congressional purpose to attach a "reason to believe" standard rather than an "intent" standard, to the element of harm to intelligence activities, and to distinguish this from the intent to identify and expose agents that is attached to the "pattern" element. See Conference Report, supra note 120. at 7, 10. Whether to require "intent" to harm intelligence or "reason to believe" was the subject of extensive debate in Congress. See 128 Cong. Rec. S2352-S8 (daily ed. Mar. 18, 1982); id. at S2281-95 (daily ed. Mar. 17, 1982); id. at 52118-36 (daily ed. Mar. 16, 1982); id, at S2070-85 (daily ed. Mar. 15. 1982); id. at S1230-40 (daily ed. Mar. 1, 1982); id. at 51164-83 (daily ed. Feb: 25. 1982); 127 Cong. Rec. H6504-40 (daily ed. Sept. 23, 1982). (The House version of the Act as reported from Committee, and the Senate version in the 1981 Congress as reported from Committee, both had an "intent" standard. See Conference Report, supra note 120, at 6.) 129. Haig v. Agee, 453 U.S. at 283. 130. Conference Report, supra note 120, at 8-10. Declassified and Approved For Release 2012/08/22 : CIA-RDP90-0053OR000300550002-2 ? Declassified and Approved For Release 2012/08/22 : CIA-RDP90-0053OR000300550002-2 19831 INTELLIGENCE IDENTITIES ACT 751 Thus, at best, section 601(c) incorporates only one of the three factors outlined in Agee. The section's coverage extends beyond the ambit of the per se unprotected speech defined in Agee. Consequently, analysis of its constitu- tionality must proceed with a balancing approach based on the assumption that prohibited disclosures are protected. 2. Punishment where Information Obtained Un/awfully. Where classi- fied information is obtained unlawfully, a statute may, under the Landmark balancing test, constitutionally punish its disclosure. Section 601(c) is, by its terms, applicable to cases involving the disclosure of unlawfully obtained information. The section does not, however, explicitly require that the infor- mation disclosed be classified. Rather, like sections 601(a) and (b), it punishes the disclosure of "any information that identifies an individual as a covert agent," so long as the speaker knows he is thus revealing a classified identity. If, however, the information actually disclosed was obtained unlawfully, and the revelation of a classified identity is both knowing and significantly con- nected to the information obtained,"' the individual is effectively disclosing classified information unlawfully obtained. So construed, section 601(c) is constitutional.132 3. Punishment where Information Obtained Lawfully. Section 601(c) also punishes the disclosure of lawfully obtained information. A statute can- not constitutionally punish disclosure of classified information obtained law- fully by an outsider without proof that significant harm-i.e., direct, immedi- ate, and irreparable damage-to national security resulted from disclosure. The mere fact that the identity revealed is classified is insufficient. This, however, is all that section 601(c) requires; no proof of subsequent harm to national security is necessary under the section.' Section 601(c) could, how- ever, be constitutionally applied if the element of classification were construed to require proof that the identity was in fact "properly classified," meaning that its disclosure would necessarily result in significant harm.' Section 601(c) also fails to require explicitly that the information dis- closed pertain to activities within the legal authority of the agency involved. Disclosures pertaining to illegal activities are. protected by the first amend- 131. See supra note 123. 132. There is no legislative intent to support a contrary construction. Furthermore, since the broader legislative purpose was to prevent disclosure of intelligence identities, such a construction is not inconsistent with the purpose. Thus there is no obstacle to the narrowing construction. See, e.g., United States v. Thirty-Seven photographs, 402 U.S. 363 (1971). Compare infra notes 139- 42 and accompanying text. 133. Nor can it be argued that Haig v. Agee held that disclosure of intelligence identities must necessarily cause significant harm, since Agar was decided on a stipulated concession of resultant harm. See supra note 39 and accompanying text. 134. See supra note 120. Given the current classification standards, which require at most that harm "could" result, see' supra note 28, no disclosure would necessan/y cause significant harm, so that no disclosure would be constitutionally punishable. . Declassified and Approved For Release 2012/08/22 : CIA-RDP90-0053OR000300550002-2 Declassified and Approved For Release 2012/08/22 : CIA-RDP90-0053OR000300550002-2 752 COLUMBIA LAW REVIEW (Vol. 83:727 ment.tu Thus, if the section is to survive constitutional scrutiny, it must be construed to exclude such disclosures. 4. Public Domain Information. Where the information obtained law- fully is in the public domain, a statute may not constitutionally punish its "disclosure." Section 601(c) does not require that the identity revealed be obtained from classified sources. The only qualification made is the section 602(a) defense that the United States has "publicly acknowledged or re- vealed" the identity at issue; the legislative history makes clear, however, that this defense does not apply where the United States has merely placed infor- mation in the public domain from which an identity may be deduced. Rather, it applies only where the United States has either specifically acknowledged an identity or made information public that leads directly to an identity.'" Thus, on its face, section 601(c) punishes the disclosure of the identity of a covert agent when that identity is deduced entirely from sources in the public do- main. Such an application is constitutionally prohibited. A statute may not validly regulate unprotected activities if it does so by unnecessarily broad means that thereby affect protected activities.'" "[T]he First Amendment needs breathing space," and therefore requires that statutes affecting rights of free expression "must be narrowly drawn and represent a considered legislative judgment that a particular mode of expression has to give way to other compelling needs of society."13+ Unlike sections 601(a) and (b), section 601(c) cannot be given a narrowing construction to avoid this constitutional infirmity. Such a construction is ordinarily preferable to a finding of facial invalidity.t30 A court may not, 135. See supra text accompanying note 99. The narrowing construction is permissible, since there is no legislative history evidencing an inconsistent intent; indeed, the legislative history evidences a congressional intent to allow exposure of intelligence agents where intent was to expose illegal or controversial activities, Conference Report, supra note 120, at 10, and is consistent with the broad purpose of preventing harm to intelligence operations through disclo- sures. See supra note 132. 136. House Report, supra note 7, at 17-18; Senate Report, supra note 4, at 23. The House Report, at 18, further states, "An identification is not (subject to the defensel if it can be made only after an effort to seek out and compare, cross-reference, and collate information from several publications or sources." The Senate Report, at 23. uses nearly identical language. The aim of this language apparently is to exclude specifically from the defense those people who identify agents using the methods described by Agee, supra note 6, and in Marks, How to Spot a Spook, in Dirty Work, supra note 6, at 25, 31-35. These articles, written by ex-CIA employees, detail how classified intelligence identities may be deduced from public documents such as the State Department Biographic Register and the United States Foreign Service List. They also recommend using general common sense, e.g., "The Agency operative is taught early. on in training that loud background sounds interfere with bugging. You can be pretty sure that the CIA man in the Embassy is the one who leaves his radio on all the time." Id. at 31. See also Intelligence Identities Protection Act, S. 2215, Hearing before the Senate Committee on the Judiciary, %th Cong., 1st Sets. 42-45 (1980) (testimony of Deputy CIA Director F. Carlucci). 137. E.g., NAACP v. Alabama, 377 U.S. 288 (1964). 138. Broadrick v. Oklahoma, 413 U.S. 601, 611-12 (1973). 139. Arnett v. Kennedy, 416 U.S. 134, 162 (1974); United States v. Thirty-Seven Photo- graphs, 402 U.S 363, 369 (1971). Where a state statute is measured against federal constitutional standards, only the state courts have jurisdiction to construe it authoritatively. Wainwright v. Stone, 414 U.S. 21, 22-23 (1973), but federal courts may decide whether the statute as so construed violates the Constitution. New York v. Ferber, 102 S. Ct. 3348, 3360 (1982). . Declassified and Approved For Release 2012/08/22 : CIA-RDP90-0053OR000300550002-2 Declassified and Approved For Release 2012/08/22 : CIA-RDP90-0053OR000300550002-2 19831 INTELLIGENCE IDENTITIES ACT 753 however, construe a statute so as to avoid facial invalidity where such a construction is contrary to the legislative purpose.10 To do so would consti- tute an invasion of Congress's lawmaking function. Thus, where a limiting construction would require that a court import into the statute elements or qualifications that Congress clearly intended not to include, the construction is impermissible."' The legislative history of section 601(c) clearly manifests an intention to include within its scope those disclosures based on public domain sources.'" To construe the section so as to exclude such disclosures would thus be improper. As the subject of an arguably overbroad statute moves from pure speech to conduct, its overbreadth must be more substantial to be fatal.' 3 Section 601(c) does not regulate conduct, however, even though it requires proof of a "pattern of activities." The conduct element is defined in terms of an intent to "identify and expose covert agents." Identification and exposure are ulti- mately expressive actions; thus even to the extent it regulates conduct section 601(c) does so only as an incident to its regulation of speech by disclosure of identities. Finally, even if it does regulate conduct its overbroad applications are not an insubstantial portion of its prospective applications, given the magnitude of public domain information pertaining to the identity of covert agents."' Under these principles, section 601(c) is manifestly overbroad. CONCLUSION Anxiety over the effect of disclosures of intelligence identities on national security and the inability of current law to deal with this problem has led to the enactment of the Intelligence Identities Protection Act. While the Act validly punishes some kinds of disclosures, it also prohibits disclosures that cannot constitutionally be forbidden. First, if they are to survive constitutional attack, sections 601(a) and (b) must be narrowly construed to apply only to intelligence identities that have been properly classified. Second, section 601(c) must be narrowly construed to 140. Blount v. Rizzi, 400 U.S. 410, 419 (1971); United States v. Robel, 389 U.S. 258. 267 (1967); see United States v. Reese, 92 U.S. 214. 221 (1875). 141. Blount v. Rizzi, 400 U.S. 410 (1971) (refusing to construe statute so as to incorporate constitutionally required procedures when legislative history showed congressional intent not to include such procedures); compare United States v. Thirty-Seven Photographs, 402 U.S. 363, 368-73 (1971) (distinguishing Blount where legislative history supports saving construction). 142. In its discussion of the "pattern of activities" requirement, the Conference Report states, "This pattern of activities must involve much more than merely restating that which is in the public domain.... Those who republish previous disclosures ... would all stand beyond the reach of the law if they did not engage in (the requisite( pattern of activities ...." Conference Report, supra note 120, at 8-9. There was much testimony before Congress as to the constitution- ality of such disclosures. See, e.g., House Hearings, supra tote 3, at 29-30 (statement of R. Willard, Counsel to the Attorney General for Intelligence Policy); id. at 71-72 (statement of J. Berman & M. Halperin); id. at 104 (statement of F. Abrams); Proposals, supra note 6, at 29-32 (statement of R. Keoch, Assoc. Deputy Att'y Gen.); id. at 45-49, 56, 58 (statement of F. Abrams); id. at 76 (statement of J. Berman). 143. Broadrick v. Oklahoma, 413 U.S. 601, 611-12 (1973). 144. See supra note 136. Declassified and Approved For Release 2012/08/22 : CIA-RDP90-0053OR000300550002-2 Declassified and Approved For Release 2012/08/22 : CIA-RDP90-00530R000300550002-2 754 COLUMBIA LAW REVIEW apply only to unlawfully obtained information and certain lawfully obtained information. Because such a narrow construction would be improper, how- ever, section 601(c) is overbroad and therefore unconstitutional. Concern about our national security must be tempered with a sense of the limits we voluntarily impose on our ability to authorize the creation of official secrets. The power to create secrets and the duty of keeping them are reposed in the Executive's intelligence agencies. Congress may not enact a law that unfairly burdens the populace with the duty of safekeeping while preserving the power in the government. Susan D. Charkes Declassified and Approved For Release 2012/08/22 : CIA-RDP90-00530R000300550002-2