STAFF REPORT SUBCOMMITTEE ON OVERSIGHT PERMANENT SELECT COMMITTEE ON INTELLIGENCE U.S. HOUSE OF REPRESENTATIVES

Document Type: 
Collection: 
Document Number (FOIA) /ESDN (CREST): 
CIA-RDP90-00530R000500970003-3
Release Decision: 
RIPPUB
Original Classification: 
K
Document Page Count: 
37
Document Creation Date: 
December 23, 2016
Document Release Date: 
January 10, 2013
Sequence Number: 
3
Case Number: 
Publication Date: 
September 1, 1979
Content Type: 
REPORT
File: 
AttachmentSize
PDF icon CIA-RDP90-00530R000500970003-3.pdf2.52 MB
Body: 
Declassified in Part - Sanitized Copy Approved for Release 2013/01/10 : CIA-RDP90-00530R000500970003-3 ITTEE plum SECURITY CLEARANCE PROCEDURES IN THE INTELLIGENCE AGENCIES STAFF REPORT SUBCOMMITTEE ON OVERSIGHT PERMANENT SELECT COMMITTEE ON INTELLIGENCE U.S. HOUSE OF REPRESENTATIVES SEPTEMBER 1979 U.S. GOVERNMENT PRINTING OFFICE 51-417 WASHINGTON: 1979 Declassified in Part - Sanitized Copy Approved for Release 2013/01/10: CIA-RDP90-00530R000500970003-3 Declassified in Part - Sanitized Copy Approved for Release 2013/01/10: CIA-RDP90-00530R000500970003-3 PERMANENT SELECT COMMITTEE ON INTELLIGENCE (Established by H. Res. 658, 95th Congress, 1st session) EDWARD P. BOLAND, Massachusetts, Chairman CLEMENT I. ZABLOCKI, Wisconsin J. KENNETH ROBINSON, Virginia BILL D. BURLISON, Missouri JOHN M. ASHB ROOK, Ohio MORGAN F. MURPHY, Illinois ROBERT McCLORY, Illinois LES ASPIN, Wisconsin G. WILLIAM WHITEHURST, Virginia CHARLES ROSE, North Carolina C. W. BILL YOUNG, Florida ROMANO L. MAZZOLI, Kentucky NORMAN Y. MINETA, California WYCFIE FOWLER, JR., Georgia THOMAS K. LATIMER, Staff Director MICHAEL J. O'NEIL, Chief Counsel PATRICK G. LONG, ASSOCiate Counsel JEANNE M. MCNALLY, Clerk SUBCOMMITTEE ON OVERSIGHT LES ASPIN, Wisconsin, Chairman CHARLES ROSE, North Carolina ROMANO L. MAZZOLI, Kentucky EDWARD P. BOLAND, Massachusetts LEON S. FIIERTH, Professional Staff Member RICHARD D. ANDERSON, Jr., Professional Staff Member G. ELIZABETH KEYES, Professional Staff Member PATRICIA GARBER, Secretary JOHN M. ASHBROOK, Ohio C. W. BILL YOUNG, Florida Declassified in Part - Sanitized Copy Approved for Release 2013/01/10: CIA-RDP90-00530R000500970003-3 Declassified in Part - Sanitized Copy Approved for Release 2013/01/10 : CIA-RDP90-00530R000500970003-3 CONTENTS Page 1 3 I Introduction Authorities, Procedures and Organization Central Intelligence Agency Department of State 6, Department of Defense 8 National Security Agency 11 Defense Intelligence Agency 12 Problems and Recommendations 13 CHARTS I?State Department?Statistics on SCI Clearances 8 II?Department of Defense?Statistics on SCI Clearances 13 III?National Security Agency?Statistics on SCI Clearances 13 IV?Summary of the Similarities and Differences for Gaining SCI Access in the Intelligence Community 14 APPENDIX APPENDIX A-Executive Order 10450_ 21 APPENDIX B-DCID 1/14 25. APPENDIX C-Public Law 88-290 30 APPENDIX D-Testimony by the FBI concerning domestic security investigations 32 LIST OF WITNESSES WEDNESDAY, MAY 16, 1979 Karl D. Ackerman, Deputy Assistant Secretary for Security, Department of State. Robert Gambino, Director, Office of Security, Central Intelligence Agency. THURSDAY, MAY 17, 1979 Thomas J. O'Brien, Director for Security Plans and Programs, Office of the Deputy Under Secretary of Defense for Policy Review, Department of Defense. Col. Karl V. Haendle, Assistant Deputy Director for Security Services, Defense Intelligence Agency. Arthur Mathisen, Assistant Deputy Director for Management Services, Na- tional Security Agency. THURSDAY, MAY 24, 1979 Gordon H. Barland, Ph. D., American Polygraph Association. Jeremiah S. Gutman, New York attorney, representing the American Civil Liberties Union. Jack Blake, recently retired Acting Deputy Director of the Central Intelligence Agency. Ray Cline, Executive Director, World Power Studies at Center for Strategic and International Studies. THURSDAY, TUNE 21, 1979 Daniel P. Jaffe, Assistant Attorney General, Department of the Attorney General, Commonwealth of Massachusetts. Thomas J. O'Brien, Director for Security Plans and Programs, Office of the Deputy Under Secretary of Defense for Policy Review, Department of Defense. Bernard J. O'Donnell, Director, Defense Investigative Service, Department of Defense. Declassified in Part - Sanitized Copy Approved for Release 2013/01/10: IA-RDP90-00530R000500970003-3 Declassified in Part - Sanitized Copy Approved for Release 2013/01/10: IA-RDP90-00530R000500970003-3 Iv Harry W. Bratt, Director, National Criminal Justice Information and Statistics Service, Law Enforcement Assistance Administration, Department of Justice. Helen Lessin, Office of General Counsel, LEAA, Department of Justice. Carol Kaplan, National Criminal Justice Information and Statistics Service, Department of Justice. Donald T. Perrine,-Assistant Section-Chief, Document Classification and Review Section, Records Management-Division, Federal Bureau of Investigation. Gary Stoops, Loyalty and Applicants Section, Federal Bureau of Investigation. Lawrence Lawler, Section Chief, National Criminal Information Section, Federal Bureau of Investigation. Conrad Banner, Deputy Assistant Director, Identification Section, Federal Bureau of Investigation. Paul Nugent, Terrorism Section, Federal Bureau of Investigation. Declassified in Part - Sanitized Copy Approved for Release 2013/01/10: .7,1A-RDP90-00530R000500970003-3 Declassified in Part - Sanitized Copy Approved for Release 2013/01/10: CIA-RDP90-00530R000500970003-3 INTRODUCTION The Oversight Subcommittee of the House Permanent Select Com- mittee on Intelligence has recently completed an in-depth study of security clearance procedures used by the Central Intelligence Agency, the National Security Agency, the Department of State, and the De- partment of Defense. This effort was specially focused on procedures used to screen applicants for access to Sensitive Compartmented Information (SCI)?a particularly delicate and important category of intelligence data. The subcommittee's interest in this area grew out of the recent proliferation of unathorized disclosures and incidents of espionage, involving members of the intelligence community or persons who were otherwise authorized access to intelligence information. Given the failure of the clearance and screening process to work in such well- publicized instances as the case of William Kampiles,1 the sub- committee believed it would be useful to examine the system and to determine whether it is working effectively. The obvious bottom line of any personnel security system is that it must be able to support reasonable determinations that hiring persons for intelligence work, or grantinc,b employees of the Federal Govern- ment (or its contractors) access to SCI is consistent with the national security. Based on the results of its investigation, the subcommittee believes that the screening process cannot presently meet uniform high standards in this regard. The subcommittee notes a number of factors which contribute to this conclusion: Although the Director of Central Intelligence (DCI) is in theory (and in law) generally responsible for protecting intelligence sources and methods, this function is in fact diffused among a number of agencies. Clearance procedures and philosophies differ widely among, and sometimes even within these agencies. There are, for example, ma,or variations in the use of and attitudes towards the polygraph. Cuts in manpower have placed pressure on investigative procedure and standards, and put a premium on efficient procedure and organization.2 Investigative branches report increasing difficulty in compiling adequate data bases from the FBI and other sources. A major problem appears to be inadequate access to criminal justice records. I Kampiles, a former employee of the CIA, was convicted of espionage in 1978 for selling a classified docu- ment to the Soviets. 2 DoD alone processed more than 100,000 persons for clearance last year. It should be noted that literally thousands of SCI clearances are held by employees of nonintelligence agencies. Although the subcommittee has not yet pursued this area, we do know that CIA and NSA account for the granting of about 2,500o1 these. (Still other nonintelligence agencies grant their own SCI clearances. The Department of Justice for example grants SCI access and notifies the DCI after the fact.) (1) Declassified in Part - Sanitized Copy Approved for Release 2013/01/10: -;IA-RDP90-00530R000500970003-3 Declassified in Part - Sanitized Copy Approved for Release 2013/01/10: CIA-RDP90-00530R000500970003-3 AUTHORITIES, PROCEDURES AND ORGANIZATION SECTION I: THE FRAMEWORK OF LAWS AND REGULATIONS The Director of Central Intelligence (DCI) is authorized to conduct background investigations of prospective and current employees of the CIA by the National Security Act of 1947 and the CIA Act of 1949. Both acts prescribe the establishment of programs and pro- cedures for the protection of national security sources, methods and data. Concern over revelations of Communist penetration of the U.S. Government in the late 1940's and early 1950's led to the publication of Executive Order 10450 25 (April 27, 1953) which established a security investigation program for the entire government. Executive Order 10450 remains the basis for security background investigations of government employees. The criteria and standards established in that Executive Order are still adhered to by all government agencies. Executive Order 12036 (January 24, 1978) directs that The CIA shall protect the security of its installations, activities, information and personnel by appropriate means including such investigations of applicants, employees, contractors and other persons with similar associations with the CIA as are necessary. (1.811) Executive Order 12036 also spells out the DCI's broader responsi- bility for setting clearance standards for the entire intelligence community.' Within this framework, the DCI has defined specific requirements that must be satisfied before access should be granted to SCI. These can be found in the Director of Central Intelligence Directive (DCID) 1/14 4 which sets forth "minimum personnel security standards and procedures governing eligibility for access to Sensitive Compartmented Information (SCI)." On the other hand, however, Executive Order 12036 also provides that All Foreign Intelligence Agencies (CIA, NSA, DIA, etc.) are authorized to conduct their own investigations of present, former or prospective employees as deemed necessary in the interest of national security (2.208(c)). Given this latitude, each intelligence agency therefore maintains its own program for investigation, clearance and employment. In addition, a number of other departments and agencies conduct back- ground investigations under Executive Order 10450; for example, the Office of 'Personnel Management (formerly the Civil Service Commission), the State Department and the Defense Department. The major screening programs are discussed below. 2. See appendix A. 3 The DCI shall "Ensure the establishment by the Intelligence Community, of common security and access standards for managing and handling foreign intelligence systems, information and products." (1.601 (0) See appendix B. (3) Declassified in Part - Sanitized Copy Approved for Release 2013/01/10: CIA-RDP90-00530R000500970003-3 Declassified in Part - Sanitized Copy Approved for Release 2013/01/10: CIA-RDP90-00530R000500970003-3 4 CENTRAL INTELLIGENCE AGENCY CIA's security clearance procedures appear to be the most compre- hensive and stringent in the intelligence community. Once a detailed personal history statement has been filed, a full field background investigation of each applicant begins, based on the cri- teria established in Executive Order 10450 and DCID 1/14. According to the testimony of Robert Gambino, Director of Security at CIA, the purpose of this background investigation is to establish the applicant's identity and to determine that he or she is of unquestionable loyalty, excellent character, integrity, discretion and trustworthiness.5 A National Agency Check (NAC) is the first step of the full field background investigation. The NAC consists of a review of holdings 'Which may be on file at the following federal agencies: The Federal Bureau of Investigation; The Office of Personnel Management ((OMP), formerly Civil Service Commission) ; The Defense Central Indices of Investigation; and Coast Guard Intelligence, Department of Transportation, if the appli- ?cant has served in the military; The Immigration and Naturalization Service (INS), if the applicant is an alien immigrant; The State Department's passport files, to cover foreign travel; and other federal agencies as appropriate. When the NAC uncovers a problem, CIA's Office of Security sum- mons an applicant for a personal interview. Such interviews are not routine; they take place only if the NAC indicates that an applicant may have a problem meeting CIA security standards. CIA's background investigation encompasses the last 15 years of an applicant's life or the years from his 17th birthday, whichever period is shorter. Identity is established through birth records, verification of parentage and citizenship. Investigators examine the applicant's education, employment, and residences and conduct neighborhood checks, criminal justice information checks and credit checks. A minimum of five character references must be interviewed with a view toward establishing the habits, loyalty and morals of the individual. Both positive and negative information must be taken into account Material from the background investigation in the field is passed to CIA "appraisers" for evaluation. CIA's appraisal process categorizes problems under two headings: suitability and security. Suitability problems are processed by CIA's Applicant Review Panel (ARP), comprising 4 members: one from the Office of Personnel, one from the Office of Security, one from the Office of Medical Services and one from the Equal Employment Opportunity Office. Each panel member reviews a case individually and offers a separate evaluation to the Director of Personnel. Final decision on whether to accept or reject an applicant on suitability grounds is exercised by the Director of Personnel. Security problems, on the other hand, are dealt with through an "adjudicative process". Should an appraiser's recommendation be negative on security grounds, the case is referred through a chain of experienced senior security officers. If their recommendation is nega- tive, the case then goes to the Director of Security, who alone can '"Security Clearance Procedures", Transcript, May 16, 1979. Declassified in Part - Sanitized Copy Approved for Release 2013/01/10: .7,1A-RDP90-00530R000500970003-3 Declassified in Part - Sanitized Copy Approved for Release 2013/01/10: CIA-RDP90-00530R000500970003-3 5 disapprove an applicant on security grounds. (The DCI has delegated this power to the Director. of Security; however, the DCI maintains the power to overrule any decision made at that level.) There are several suitability and security factors which would cause the automatic disqualification of an applicant. According to Mr. Gambino's testimony,' the following might be reasons for rejection on grounds of suitability: (1) emotional instability and immaturity; (2) personality idiosyncracies; (3) limited mental capacity/scholar- ship deficiencies; (4) physical impairments; (5) limitations preclud- ing adapability and flexibility; (6) poor employment record; (7) financial irresponsibility; (8) alcohol abuse; and (9) marital difficulties. The following would be considered disqualifying data in the security area: (1) illegal use of drugs; (2) thievery; (3) homosexuality,. and (4) gross character deficiencies. Any characteristic clearly outside the criteria established by Executive Order 10450 or DCID 1/14 is suffi- cient reason for immediate rejection of any applicant case. If no problems arise in the background investigation, or if adjudica- tion has resolved any uncertainty, the applicant next submits to a physical exam and psychiatric screening. The psychiatric screening consists of a battery of tests designed to measure the candidate's professional flexibility, stress level, and reactions to pressure in the hope of identifying problems he or she might have as an employee of the Agency.' If there is an indication of abnormality, the candidate would be referred to a psychiatrist for an interview. As the final step in the clearance process, all applicants for employ- ment at the CIA are subject to a polygraph examination. CIA uses the polygraph to supplement and/or cross-check information developed by the background investigation. Questions asked during the examination are standard, with problem areas discussed beforehand. No set of questions is ever asked just once. Examiners look for repeated reac- tions; a single atypical reading cannot be used as evidence of lying or concealed problems. Control questions are used for comparison. During the exam, if the polygraph operator notes an abnormality, (repeated reaction to a particular area of inquiry), he will concentrate on this until it can be cleared up; there is no time limit on the exam. Polygraph operators do not judge applicants; their function is to collect information and report it to apprasisers for evaluation. When security problems are revealed by the polygraph, the case must go back through CIA's adjudication process. Despite extensive use of the polygraph, CIA stresses that applicants are looked at from the "total person' standpoint, with the polygraph serving as an adjunct to this effort. Ten percent (10 percent) of all CIA applicants are turned down for security reasons; 3 to 5 percent are turned down for suitability reasons. Of the ten percent (10 percent) security turndowns, twenty-four point five percent (24.5 percent) are turned down based on the background investigation alone; seventy-five percent (75 percent) are rejected on the basis of information derived from the polygraph, or the combina- tion of polygraph results and the background investigation.' Ibid. 7 CIA also uses psychological assessment designed to match the skills of the subject with particular assign.. ments. it should be noted here, that because of the psychological effect the polygraph has on some of those being examined, a substantial number of revelations and admissions are volunteered prior to the actual testing. DoD and State, which do not use polygraph, believe that the same information can be obtained through a well-conducted personal interview without the aid of a polygraph. This raises the question, discussed below of whether the polygraph is in fact indispensable or merely one of several alternative screening tools. 51-417-79--2 Declassified in Part - Sanitized Copy Approved for Release 2013/01/10: CIA-RDP90-00530R000500970003-3 Declassified in Part - Sanitized Copy Approved for Release 2013/01/10: CIA-RDP90-00530R000500970003-3 6 The polygraph can be waived for reasons of: inconclusive heart patterns, pregnancy, and physical disability. Waivers for other reasons must come from the DCI. If a subject refuses the exam on religious, moral or any other grounds, the polygrapher sends a statement with the reason to Security; polygraph examiners make no recommendation but report only the simple statement of fact. Admiral Turner recently granted two exceptions involving the polygraph: one for an applicant who took the polygraph but "did badly"; one for an applicant who refused the polygraph on moral grounds. Every CIA employee is subject to reinvestigation at five year intervals. Reinvestigation consists of a neighborhood check, a police check, interviews with current and former supervisors and coworkers, and a polygraph. The polygraph questions at this time focus on counterintelligence issues. Repolygraphing is seen as a deterrent and as a way to detect security breaches.9 According to the CIA, when a "security allegation" or "special issue" involving an employee is raised, the polygraph clears people as often as it brings about an admission. Confession of a violation may lead to disciplinary action or termination of employment. Finally, under CIA policy, contractors, military personnel and all people needing "stall-like access" 10 to the CIA go through the same clearance procedures as all other employees. DEPARTMENT OF STATE The Foreign Service Act of 1946 provides basic legal authority to establish procedures for determining the loyalty of Foreign Service Officer candidates. The State Department also draws authority for performing background investigations on prospective employees from Executive Order 10450, Executive Order 11652 and Executive Order 10865, all of which state that no person shall be given access to classified information and materials unless that person has been determined to be trustworthy and that his or her employment is clearly consistent with the national security. After filino?6 Standard Form 86 h1(personal history statement), prospective employees are interviewed in depth" by State Depart- ment security investigators. Investigators explain the standards which must be met to gain a clearance at the State Department. Questions are designed to be "deeply probing" so that the investigator may develop an understanding of the candidate. Interviewers first verify and clarify all information provided in the personal history statement. Applicants are then asked if there is anything in their background which, if revealed during the investigation, might conflict with the criteria for clearance. Interviewers aim to develop information to supplement the personal history statement, as an aid to a more accurate and thorough investigation. 9 The subcommittee has determined that while CIA policy is, and has been, to reinvestigate employees every five years, such reinvestigations were for some time not conducted for the majority of employees, due to the pressure of other responsibilities on the staff of the Office of Security. In the wake of the Moore case, however, the five year requirement was again put into practical force. (Edwin Moore, a former employee of the CIA, was convicted of espionage in 1977, for attempting to transmit national defense information to the Soviets.) 19 "staff-like access"?Term applied to persons needing unescorted entry to CIA's buildings in order to do their job. 11 This is the Office of Personnel Management (OPM) standard application "Security Investigation Data for Sensitive Position": Declassified in Part - Sanitized Copy Approved for Release 2013/01/10: CIA-RDP90-00530R000500970003-3 Declassified in Part - Sanitized Copy Approved for Release 2013/01/10: .01A-RDP90-00530R000500970003-3 7 The next step in the screening process is a medical examination. There is no pre-employment psychiatric screening or psychological assessment at State. After the medical, a full field background in- vestigation begins. This investigation goes back 7 years or from an individual's 18th birthday, whichever period is shorter. State has its own security staff to conduct these investigations. There are ap- proximately 450 professional level security agents in the State Depart- ment. However, in addition to security investigations, this staff is also charged with the protection of foreign diplomats. The Department of State's approach to background investigations is on the principle that mere absence of disqualifying information is insufficient: There must be enough known positively about the indivudial * * * to conclude that he or she can be trusted with the responsibilities of more than routine con- sequence to the nation * * *. It is the purpose of the background investigation to acquire the information necessary and relevant to such a determination." Karl Ackerman, Deputy Assistant Secretary for Security at State, told the subcommittee that: Our investigative objective includes determining the individual's identity, establishing the continuity of his or her claimed background and activities, and acquiring sufficient information to permit a reasonable conclusion to the individual's loyalty, character, integrity and trustworthiness.13 (italic added). Most positions at State fall into what is known as the "critical- sensitive" category. The standard investigation for "critical-sensitive" positions at State is based on the criteria established in Executive Order 10450. For "critical-sensitive" positions, State believes that seven years' background is adequate. If, however, a SCI clearance is wanted, the investigation expands to cover the full fifteen-year minimum requirement of DCID 1/14. Both the standard investigation and the investigation for access to SCI are essentially the same except for the time element involved. State's standard full field investigation consists of a National Agency Check (NAC), followed by verification of birth and citizenship. An applicant's education records will be checked if they fall within the seven year investigative period. If an applicant's education does not fall within the seven year period being checked, the highest level of education attained above high school must be verified. An applicant's employment for the last seven years is investigated, including an interview with the current employer. Any military service of a pro- spective employee is always checked whether or not it falls within the seven year investigative period. A minimum of four character references must be interviewed: two listed by the applicant and two developed by the investigator. Neighborhood checks are used to verify the applicant's current address, as well as any other residences exceeding six months in duration over the last two years. Other addresses are verified when possible through education and employment checks. Both credit records and police records are investigated. State and Defense De- partment (see below) regard law enforcement records as their most productive and effective source of information. Both agencies note difficulties in gaining what they consider adequate access to criminal justice information. Office of Security Instructions and Procedures, Volume 2, "Investigations", (412.1) Department of State. la " Security Clearance Procedures," transcript, May 16, 1979. Declassified in Part - Sanitized Copy Approved for Release 2013/01/10: CIA-RDP90-00530R000500970003-3 Declassified in Part - Sanitized Copy Approved for Release 2013/01/10: CIA-RDP90-00530R000500970003-3 8 - Information from the background investigation is compiled and sent to the Chief of the State Department's Evaluation Branch, where an analysis- of the case is prepared and a recommendation is formulated. In the event of a negative recommendation on suitability grounds, the applicant's file is sent to State's Applicant Review Panel, comprising: the Chief of Evaluation, the Medical Advisor, and a member of the Office of Personnel. Most rejections at State are, in fact, on grounds of suitability rather than security. If enough adverse data is collected, on an individual to warrant the case going before the Applicant Review Panel, the applicant is usually reinter- viewed. Moreover, if the Applicant Review Panel recommends in favor of an applicant, but State's Office of Security disagrees, it will notify the Panel that although the subject is suitable he or she cannot be granted a security clearance, whereupon the case is closed. When a final negative decision is made, the applicant is informed in writing as to why employment and/or clearance has been denied. Where access to SCI is concerned, the Senior Intelligence Officer in State's Bureau of Intelligence and Research makes all final decisions. In calendar year (CY) 78, 746 SCI cases were adjudicated, of which three were denied.14 There is no formal applicant appeal process. Sensitive Compartmented clearances at State are revalidated at least every five years in a procedure which involves a review of the employee's security file, an internal name check and name checks with local authorities, and an update of biographic data. Revalidation does not involve reinvestigation unless information has been developed which requires follow-up. David McCabe, State Department Assistant Director for Personnel and Investigations, testified that there is no instance where revalidation has led state to cancel an SCI clearance.15 If problems are discovered at this time or during the interim between initial employment and revalidation, the subject may be moved to a less sensitive position. Meanwhile, the employee may retain access to classified materials other than SCI. The State Department makes only very limited use of the polygraph and does not use it as a preemployment screening device. State asserts that the procedure would be of little value for its purpose. Routine use of the polygraph is not essential to an effective clearance program and that * * * current procedures do, in fact, serve the personnel security needs of the Department wel1.16 CHART I STATE?STATISTICS ON SCI CLEARANCES Adjudicated Denied Granted SCI Revoked Calendar year 1977 725 3 722 Calendar year 1978 . 746 3 743 DEPARTMENT OF DEFENSE The Department of Defense has a centralized office to conduct its background investigations?the Defense Investigative Service (DIS). 14 See Chart 1. " "Security Clearance Procedures," transcript, May 16. 1979. "Additional remarks submitted for May 16, 1979 record, Department of Stats; Declassified in Part - Sanitized Copy Approved for Release 2013/01/10: :;IA-RDP90-00530R000500970003-3 Declassified in Part - Sanitized Copy Approved for Release 2013/01/10: IA-RDP90-00530R000500970003-3 9 , DIS is authorized by DoD Directive 5105.42 to conduct preem- ployment personnel security inveStigations for the entire department. However, DIS, in turn, services a number of agencies '7 within DoD which, all apply their own methods and procedures to determine whether or not to grant clearances. DoD has three clearance categories: Sensitive Compartmented Information (SCI) ; Collateral/Top Secret; and Contractor/Confi- dential. Applicants for employment at D.oD are cleared for specific kinds- of intelligence access by investigative procedures varying ac- cording to the type of clearance. For SCI, the DIS conducts a Special Background Investigation (SBI) ; for Collateral/Top Secret, the DIS conducts a Background Investigation (BI). Background Investigations, per DoD Directive 5210.8, cover the last five years of the applicant's life or from his 18th birthday, which- ever is shorter. BI's are designed to lead to a determination that em- ployment of a person is clearly consistent with national security. Suc- cessful completion and favorable adjudication permits an applicant to be cleared at the Collateral/TS level. A BI includes a National Agency Check (NAC), verification of birth and citizenship, a check on college education and full time em- ployment within the five year scope of the investigation, a check of local criminal justice records and, in the near future, will also include a credit check. BI's do not include neighborhood checks. However, the BI procedure requires DIS investigators to develop and personally interview three character references. These references must have suffi- cient knowledge of the applicant to comment intelligently on his background, suitability and loyalty. Foreign travel for more than 90 days within the investigation period is examined, and extensive in- quiries are made when an applicant has foreign connections. If any negative information is developed during a Background Investigation, ' the BI must expand automatically to cover a full 15 years. The Special Background Investigation (SBI) conforms to minimum investigative requirements prescribed by Executive Order 10450 and DCID1/14. Successful completion and favorable adjudication result in a clearance for Sensitive Compartmented Information (SCI). SBI's cover the last 15 years of applicants' lives, including all those points needed for a BI. In addition, the SBI includes a neighborhood check and a credit check. DIS requires verification of all residences for a period of 6 months or more during the past 5 years. The investigator tries to interview at least two neighbors who have enough knowledge of the applicant to comment on his suitability for a senstive position. Credit bureau checks go back 5 years. When credit bureau records are not available, credit references must be interviewed. Points of concern are financial responsibility and/or any unexplained affluence. Persons entering military service enlist for specific Military Oc- cupational Specialities (MOS). After such persons have been niter- viewed for enlistment and tested for aptitude, they are .' !):iven a security interview. At this point, approximately 60 percent of those wh would be intellectually qualified for 'positions involving access to intelligence data are dismissed from further consideration. During 17 This includes the Defense Intelligence Agency (DIA), the National Security Agency (NSA), the Army, Navy and Air Force. Declassified in Part - Sanitized Copy Approved for Release 2013/01/10: .7,1A-RDP90-00530R000500970003-3 Declassified in Part - Sanitized Copy Approved for Release 2013/01/10: CIA-RDP90-00530R000500970003-3 10 basic training, candidates for security clearance file a Statement of Personal History (DD 398). A prenomination interview is held and the person is examined again from a security standpoint. This process eliminates another 12 percent. Special Background Investigations (SBI) begin at this point for those who have favorably completed processing. DoD's screening process for civilians is much the same as for the military. Civilian applicants are first interviewed for employment qualifications, and are informed at this point that a background investigation will be needed. Applicants file Standard Form 171 and DD 398, Statement of Personal History-, and then are called for a pre- employment security interview. interview. The interview determines if there is any automatically disqualifying information about the applicant. Any information clearly outside the guidelines of DCID 1/14 elimi- nates the applicant for SCI but not necessarily for other types of clearance. It is exceptional for a person to be eliminated at this point; ordinarily the prenomination interview leads to an SBI. Under Executive Order 10865, the Department of Defense adminis- ters an industrial security (i.e., contractors) program for DoD, its agencies (NSA, DIA), and 15 other departments and agencies of the government. When a contract requiring SCI clearance is to be awarded, DoD investigates the management and key officials of the company in question. Foreign ownership, control or influence will disqualify a company. If all is well, the contracting agency will instruct DIS to conduct an SBI based on Executive Order 10450 and DCID 1/14. There are approximately 13,000 SCI-cleared contractors currently associated with DoD, and there are 1 2 million contractor clearances of all kinds. For contractors who need Top Secret access, DIS will also do a background investigation; for Secret and Con- fidential access, a National Agency Check (NAC) is conducted. There is also a program of "company-confidential" clearances, whereby the contractor is authorized to grant employees access to confidential materials. r In 1974, the DIS suffered a 25 percent appropriations cut, causing 5, a reduction in the DIS work force from 3,000 to 1,800 spaces. After further cuts, DIS now has approximately 1,000 positions with 860 agents in the field. These agents conducted 120,000 BI's in calendar year 1978. Prior to 1974, DIS routinely covered a 15-year period for all back- ground investigations. Because of its manpower losses, DIS now re- quires that only the Special Background Investigation for access to SCI must cover 15 years. Requirements for other clearances. were reexamined, coverage diminished and reporting standards abridged. For example, under a "no news is good news" approach, favorable information about an individual is written up in very summary fashion; only negative data is developed and reported in detail. Both DIA and NSA have criticized background information they are obtaining from DIS. Col. Carl V. Haendle of the DIA stated during testimony on May 17, that: From the standpoint of those who have to adjudicate investigations and make decisions as to whether an individual has access to Sensitive Compartmented In- formation, I am less than pleased with the information that we have to make that decision on.18 " Transcript, "Security Clearance Procedures", may 17, 1979. Declassified in Part - Sanitized Copy Approved for Release 2013/01/10: CIA-RDP90-00530R000500970003-3 Declassified in Part - Sanitized Copy Approved for Release 2013/01/10: CIA-RDP90-00530R000500970003-3 11 Mr. Arthur Mathisen of the NSA expressed these same sentiments. If we are going to make affirmative findings regarding people that are very im- portant in their lives and to the Agency, we really need data to put everything in context. We need information that is positive about reliability and trustworthi- ness and integrity, character, reputation. That is missing and makes the adjudica- tion a difficult process to be fair." Shortcomings in DIS' performance were underscored in 1978, when it was learned that DIS had done the Special Background Investiga- tion on an individual who had applied at DoD under an assumed identity. The SBI failed to detect this and the individual was cleared for SCI access. On another occasion, an Air Force enlistee was cleared for access to "Secret" inforation, although it was later learned he had been granted clearance under a false name. The Department of Defense has initiated meetings between the producers and consumers of DIS investigations. The subcommittee hopes that some of the issues high- lighted during its hearings will be resolved, and looks forward to the outcome of these meetings. THE NATIONAL SECURITY AGENCY As a result of hearings held by the House UnAmerican Activities Committee in 1962, Congress enacted Public Law 88-290 20 which provides specifically that employment of any person at the National Security Agency must be deemed in the interest of the national security. Applicants at NSA are initially briefed on the criteria that must be satisfied for employment with the agency. They are advised that proof of citizenship, and information on membership in organizations, use of drugs, foreign travels and other overseas associations will be sought. The applicant then files DD 398, Personal History Statement. The first step in NSA's clearance process is a polygraph examination. This procedure is based on DoD Directive 5210.48. It is worth noting however, that 52.10.48 stipulates that The polygraph shall be employed only as an aid to support other investigative techniques and be utilized generally only after the investigation by other means has been as thorough as ciricumstances permit." The Directive goes on to state specifically that the polygraph may be used on "those competitive career employees of the Defense agencies who are to be assigned for training in * * the National Security Agency." 22 Notwithstanding the prescribed sequence, NSA poly- graphs prior to the background investigation as an initial security screening measure. The principal difference between NSA and CIA polygraphing is that NSA explicitly uses the polygraph as a primary tool for the col-I' lection of adverse information. According to NSA, at least 95 percent of all negative information on applicants comes from the polygraph; 8590 percent of this information, in turn' is considered significant enough to warrant investigation. Out of 2,531 applicants for whom security processing was completed during fiscal year 1978. 775 were closed out by the Joint Personnel Security/Medical Review Panel 19 Ibid. 29 See Appendix C. 21 DoD Directive 5210.48 "The Conduct of Polgraph Examinations and the Selection, Training and Supervision of DoD Polygraph Examiners." Sec. III?A. 22 Ibid. Enclosure I, c, 1, b. Declassified in Part - Sanitized Copy Approved for Release 2013/01/10: CIA-RDP90-00530R000500970003-3 Declassified in Part - Sanitized Copy Approved for Release 2013/01/10: CIA-RDP90-00530R000500970003-3 12 without a favorable hiring determination. In roughly 90 percent (about 700) of these cases, the polygraph report was a contributing factor in the decision!' NSA uses the polygraph screening technique only on its civilian applicants. Military assignees are exempted on the grounds that their assignment to duty at NSA is not voluntary. Since submission to a polygraph examination must be a voluntary act, NSA considers that requiring it of military 'personnel would violate their rights. In con- trast, CIA polygraphs all military employees assigned to them, noting that their association with CIA is voluntary. It is an interesting question, whether this volutary/involuntary distinction is meaningful in the context of the all-volunteer military service. A further peculiarity relating to military personnel at NSA is that when such persons retire and seek reemployment as civilians, they are then subject to the polygraph. Sixty-eight (68) military assignees found themselves in that position during fiscal year 1978. Approxi- mately 20 percent of these candidates were adjudicated unfavorable by the Joint Personnel/Security/Medical Panel. In 90 percent of these cases, information obtained through the polygraph contributed to the decision. This means that thirteen (13) people who already had access to SCI through the clearance process at DoD were denied such access when NSA procedures came into play. Following the polygraph, applicants undergo psychological testing. A psychological assessment battery is used as an aid in determining suitability and acceptability for employment at NSA and access to SCI. Ninety percent of all applicants are interviewed by a clinical psychologist. The results of the polygraph and the psychological tests are evaluated and information developed from them is forwarded to the Defense Investigative Service (DIS) for the Special Background Investigation (SBI). SBI results are sent to NSA for evaluation. All information obtained about an applicant from the polygraph, psychological testing, and the full field investigation is then put together and brought before NSA's Applicant Review Panel (ARP). The ARP is comprised of representa- tives from NSA's Personnel, Medical and Security offices. It examines each applicant on the "total person" principle. The Panel either decides in favor of employment and access, or refers cases to NSA's Director of Personnel. DEFENSE INTELLIGENCE AGENCY The Defense Intelligence Agency (DIA) conducts its own adjudica- tion after a personal interview, and a Special Background Investiga- tion (SBI) is conducted by DIS.24 Col. Karl V. Haendle testified that in "the absence of any significant derogatory information, the decisions are made at the branch level to grant SCI access." 25 Where there is "significant derogatory informa- tion," cases are referred to a security review panel. The original adjudicator outlines the case and makes a recommendation. Cases are then reviewed by several senior security officials each of whom makes a 25 The Committee notes, however, that NSA keeps no statistics record of the reasons why persons are denied employment. NSA records only reflect that a person was denied employment, but not whether a secwity issue was involved. See Chart III, Page 13. 21 see Chart II, Pate 13. 25 Security Clearance Procedures. Transcript, May 17, 1979. Declassified in Part - Sanitized Copy Approved for Release 2013/01/10: CIA-RDP90-00530R000500970003-3 Declassified in Part - Sanitized Copy Approved for Release 2013/01/10: CIA-RDP90-00530R000500970003-3 13 recommendation. All these recommendations ultimately go to the Assistant Deputy Director for Security Services, DIA, for final determination. DIA considers the following information to be automatically dis- qualifying: use of illegal drugs, financial irresponsibility, indebtedness, homosexuality, foreign relatives, immediate relatives foreign-born who have made no attempt to become U.S. citizens, and mental and emotional problems. In contrast to CIA and NSA, DIA does not polygraph as part of its security screening process. Current policy provides for the polygraph to be used only to resolve situations which cannot be settled m any other way. POST-EMPLOYMENT SECURITY ISSUES After a person has been cleared and employed at DoD, if a security issue arises or, adverse information about the person comes to the attention of a supervisor, an evaluation must be made. If there is reason to believe that such a person's activities constitute an im- mediate threat to the national security, emergency suspension of the subject's clearance occurs. If, after a detailed investigation, continuing the person's clearance is still not considered to be consistent with the national security, the clearance is removed. Cases of espionage are referred to the Federal Bureau of Inv-e-sti-: gation for followup examination. Clearances in such instances are lifted at the time the case is referred, unless for the purpose of insuring a complete resolution of the case, the FBI requests that it not be. CHART II. DEPARTMENT OF DEFENSE?STATISTICS ON SCI CLEARANCES. Adjudicated Denied; Granted SCI Revoked Army (April 1978 to March 1979) 1 10, 500 1 710 9, 790 232 Navy (calendar year 1978) 11,280 173 11, 107 306 Air Force (calendar year 1978) 7, 900 381 7,519 456 DIA (calendar year 1978) 5, 985 48 5, 937 ? 35 Total 34, 353 2 1, 029 1 Estimates. 2 Or 3 percent. CHART III NATIONAL SECURITY AGENCY?STATISTICS ON SCI CLEARANCES Processing not corn- Adjudicated Denied pleted Granted SCI Revoked - NSA (fiscal year 1978)____.... 2, 531 1775 732 1,024 14 (or 1.37 percent) civil- ian; 23 (or 2.25 percent) military. In 90 percent or 700 of these, information learned on the polygraph was a contributing factor, PROBLEMS AND RECOMMENDATIONS Broadly speaking, the subCommittee sees two overall area where a heed exists for improvements in the way security screening is carried out: there is a need for greater uniformity in investigative procedures 51-417-79--3 Declassified in Part - Sanitized Copy Approved for Release 2013/01/10: CIA-RDP90-00530R000500970003-3 Declassified in Part - Sanitized Copy Approved for Release 2013/01/10: CIA-RDP90-00530R000500970003-3 14 and standards; and there is a need for improved access to pertinent information. PROCEDURES AND STANDARDS DCID 1/14 established minimum security standards and procedures governing access to SCI. However, as the subcommittee has dis- covered, each agency conducts its own investigation, and all such investigations differ one from the other in depth, scope, and technique. It is clear that each part of the intelligence community has peculiar needs, and that there is a role for diversity in the design and operation of personnel security systems. On the other hand, it also seems logical that to the extent each agency is trying to protect similar kinds of data?e.g., SCI?granting clearances ought to involve basically similar information about applicants, allowing for some reasonable variation. The subcommittee believes, however, that, even making allowances for varying needs among intelligence agencies, the divergencies in their screening techniques have become excessive. Chart IV graphi- cally illustrates how widely differentiated these procedures are. CHART IV (Key: 0?Yes; 0?Ncil CIA State DOD/DIA NSA Prenomination interview ? ? ? 0 Background investigation ? I ? ? ? a Psychiatric screening ? 3 0 0 ? Psychological assessment 0 8 6 Polygraph examination 04 05 Polygraph military personnel 0 0 0 All types data (positive and negative) e e 0 SCI clearance: A condition of employment 0 0 0 e I Conducted prior to the polygraph exam. 2 Conducted by DIS following the polygraph exam. 3 Testing for professional flexibility, stress level and reactions to pressure. If there are problems, an interview by a psychiatrist follows. 4 Administered after the background investigation on all civilian applicants and military personnel. s Used prior to the background investigation for leads; is the primary source for negative information; used only on Civilian applicants; military personnel are exempt. Several features recorded on the chart merit further comment. The subcommittee notes, for example, an existing pattern according to which persons being screened for the two most sensitive agencies of our government, the so-called intelligence "producers"?CIA and NSA?will not be granted employment unless they can be cleared for SCI from the start. On the other hand, employment by the so- called "intelligence consumers"?DoD and State?is not based on SCI access being granted. At DoD and State, a person can begin eniployment with access to other classified data, up to and including "Top Secret," and need only be cleared for SCI later upon need. The label "Top Secret," however, is applied to information, "the unauthorized disclosure of which reasonably could be expected to cause exceptionally grave damage to the national security." 28 The subcommittee believes that the boundary line between "Top Secret" and SOT information, in teims of pertinence to national security, is likely to be so thin that persons being cleared for "Top Secret" 'access ought to be subject to the same background investigation as those being cleared for SCI even if actual SCI access is not yet required. E.O. 12065 Section 1-102. Declassified in Part - Sanitized Copy Approved for Release 2013/01/10: CIA-RDP90-00530R000500970003-3 Declassified in Part - Sanitized Copy Approved for Release 2013/01/10: CIA-RDP90-00530R000500970003-3 15 The subcommittee also notes a major discrepancy among the services in terms of the basic profile of information considered relevant to the clearance process. CIA and the Department of State, for example, stress the need?under the "whole person" concept?to search out both positive and negative information about candidates. The DIS, on the other hand, follows an approach which essentially downplays positive information and focuses overwhelmingly on a search for the negative. No news is not necessarily good news, how- ever. While DIS' approach obviously helps it stretch manpower resources further, the subcommittee sees this technique as a point of weakness in the DIS product, and believes that in order for the screening process to be effective, both positive and negative data must be sought out and weighed. As the chart shows, no feature of the security screening process is marked by greater interservice difference and by more anomalies than the polygraph. CIA and NSA polygraph people whose intended level of access is so low?receptionists, char-force, et cetera?as to raise a question whether the investment is worthwhile. Other agencies hardly use the polygraph and argue that other techniques are equally effective for their purposes. CIA uses the polygraph on all applicants, military and civilian, while NSA exempts military personnel. DIA, meanwhile, does not polygraph, although the agency is clearly involved in the production of SCI intelligence. ILLEGIB CIA polygraphs as a last step, while NSA uses the polygraph as the first step in its screening process, although this appears to contradict -/ the sense of DoD Directive 5210.48. Both agencies adhere to the "whole person" approach to clearance, but NSA's heavy reliance on the polygraph may be inconsistent with a well-balanced approach. Evidence presented to the subcommittee demonstrates the that polygraph accounts for a substantial proportion of decisions to deny access. On the other hand, gaps in the statistics kept by the intelli- gence services do not make it possible to make the clear judgment that the polygraph is unique and indispensable. There has been insuf- ficient research on the accuracy of the polygraph technique in screen- ing job applicants. The subcommittee urges the DCI to conduct a study to validate the accuracy of the polygraph in the preemployment setting and to establish some level of confidence in the use of that technique. The subcommittee also feels that the intelligence community should consider whether and how it can exercise more discrimination in the use of the polygraph. One basic constraint already in effect owes to the fact that the polygraph, by and large, is used in the so-called "intelligence-producing" services rather than in the "intelligence consuming" agencies. Although this concept is not embodied in any regulation, it may make sense insofar as it can simultaneously protect intelligence sources and methods, while establishing a reasonable outer limit to polygraphing. If this arrangement is to be truly secure, how- ever, close attention must be paid to assure that as SCI moves through government, sources and methods are in fact kept under protection. The subcommittee understands that the DCI is studying methods for processing intelligence with this view. The Subcommittee may be interested in looking into this area at a later date. Declassified in Part - Sanitized Copy Approved for Release 2013/01/10: CIA-RDP90-00530R000500970003-3 Declassified in Part - Sanitized Copy Approved for Release 2013/01/10: CIA-RDP90-00530R000500970003-3 16 In light of these significant variations in practice regarding the polygraph, the subcommittee believes that the DCI, in consultation with the heads of other intelligence agencies and departments, should establish some communitywide criteria relating to the use of the poly- graph. Once these criteria have been established, they should be absolute conditions of employment and waivers should only be granted by the heads of any of the intelligence agencies in extraordinary circumstances. All these differences of technique underscore the fact that each program is administered by separate screening bureaucracies answering to several parent institutions. Each of these screening systems faces a heavy case load complicated not only by uncertain legal standards and diminished public respon- siveness, but by reductions in work force combined in some cases with a multiplication of responsibilities. The DIS, for example, exhibits all these problems. As has been "noted, DIS suffered a substantial reduction in force some years ago. Meanwhile, as the subcommittee learned in the course of its hearings, DIS investigators are also assigned to investigate white collar crime in the Department of Defense. A similar situation exists in the State Department, many of whose investigators double in brass, arranging for the protection of foreign dignitaries visiting the United States. More uniform procedures seem to be needed, along with some means to assure quality control across the entire set of systems. It is possible, in fact?and the subcommittee believes the Executive Branch should examine the benefits and costs of such a proposal?that the solution to both the procedural and the resource problems is to establish a .z centralized office to conduct background investigations for the entire -r?7- intelligence community. Such an office need not replace the adjudica- tive systems presently used by the intelligence services, but could, rather, provide these systems with a more standardized and qualita- tively superior form of background information about candidates for employment or SCI access. Certainly, if such a body were to be established, the subcommittee believes that its sole function should be the conduct of security investigations. Other, unrelated activities of the types now burdening some of the services, can only be to the detriment of their main objectives. ACCESS TO INFORMATION The intelligence agencies have testified before the subcommittee that criminal justice records provide their most effective and produc- tive source of leads for negative information developed by background investigations. The subcommittee has heard repeatedly, however, not only about the need for access to criminal justice records, but about the roadblocks involved.27 " Karl Ackerman, the Deputy Assistant Secretary for Security at the State Department, stated at the hearing on clearance procedures on May 16 that: "* ? ? we have encountered more than a few cases doing routine police checks where the constraints as perceived in a given local jurisdiction by privacy legislation has caused them to question whether they are able to give us information from police check files. We have ? * * run into the question of whether E.O. 10450 is indeed a proper statutory background for release of that information to us. Some (have) gone so far as to say, well, you know, if that were a law?they are really questioning, I suppose, whether the executive orders have the force of law. But it is being triggered by concerns for privacy." (p. 43) The Director for Security Plans and Programs at Defense, Thomas J. O'Brien, expressed the same senti- ments during testimony on May 17; O'Brien evaluating the investigation by the DIS, stated: "* * ? as far as the lessening of quality, I think an awful lot of it relates to that information that will be released by institutions, local law enforcement agencies * " There seems to be much, much less of that, with the standard remark furnished by the DIS agent is that this particular jurisdiction will not provide that information." Declassified in Part - Sanitized Copy Approved for Release 2013/01/10: CIA-RDP90-00530R000500970003-3 Declassified in Part - Sanitized Copy Approved for Release 2013/01/10: CIA-RDP90-00530R000500970003-3 17 Problems in this area arise primarily from guidelines established by the Law Enforcement Assistance Administration (LEAA). LEAA defines "criminal history record information" as information collected by criminal justice agencies (courts, government agency or subunit thereof involved in the administration of criminal justice) on indi- viduals "consisting of identifiable descriptions and notations of arrests, detentions, indictments, information or other criminal charges, and any disposition arising therefrom, sentencing, correctional supervision, and release." 28 These guidelines on Criminal Justice Information Systems place no restrictions whatsoever on the dissemination of conviction data, arrests made within the year of an inquiry, and arrests where charges are actively pending. However, the guidelines state specifically that policies regarding dissemination of nonconviction data by law enforce- ment agencies is left to states, and that is where the problem occurs." Because LEAA guidelines allow all 50 states to develop their own policies on dissemination of criminal justice information to non-law enforcement agencies, a very scattered pattern exists. Much useful information is denied intelligence agency investigators. To overcome this problem, federal legislation would be necessary. Such legislation could state that the intelligence agencies shall have access to the personal records of a subject, upon the subject's written consent, for the sole purpose of supplying information pertinent to the granting of a security clearance. The legislation might call not only for access to criminal justice records, but also education, employment, credit and medical records. As a safeguard, the law might require that this information be used only by intelligence services and dis- seminated to each other only for employment purposes. Witnesses before the subcommittee also noted that certain infor- mation formerly available from the FBI in the course of an NAC is no longer obtainable?that is, information on groups which "advocate the use of force or violence to overthrow the government of the United States" or information on groups which "unlawfully advocate or practice the commission of acts of force or violence to prevent others from exercising their rights under the Constitution." " The collection of such information was greatly curtailed by the institution of the Attorney General's Domestic Security Investigation Guidelines in June, 1976. The essence of those guidelines is to restrict investigations of individuals or groups advocating force or violence to overthrow the government or deprive others of their constitutional rights to those individuals or groups who may be engaged in activities which involve or will involve the use of force or violence and which involve a viola- tion of federal law. It is this stricture that has led to the large scale reductions in domestic security investigations since 1976." The subcommittee recognizes that the purposes of the Domestic Security Investigation guidelines was, and is, to curtail investigation 28 28 CFR, "Judicial Administration", Subpart A, Section 20.3(b). 22 State and local government wills determine the purpose for which dissemination of criminal history record information is authorized by State law, executive order, local ordinance, court rule, decision or order. (28 CFR, 20, 21 C3) 30 Section 8(a) (4) and (5), E.O. 10450. "For an evaluation of the impact of these guidelines, see November 9, 1977 GAO report entitled "FBI Domestic Intelligence Operations: An Uncertain Future," GGD-78-10. An earlier GAO report "FBI Domestic Intelligence Operations?Their Purpose and Scope: Issues That Need To Be Resolved", 2/24/76 GGD-76-50 had found that the many domestic security investigations previously in existence were unpro- ductive and did not lead to positive results and "The Erosion of Law Enforcement Intelligence and its Impact on the Public Security" report of the Subcommittee on Criminal Laws and Procedures", Senate Judiciary Committee 1978. Declassified in Part - Sanitized Copy Approved for Release 2013/01/10: CIA-RDP90-00530R000500970003-3 Declassified in Part - Sanitized Copy Approved for Release 2013/01/10: CIA-RDP90-00530R000500970003-3 18 of activities protected by the First Amendment?however extreme or unorthodox?absent a showing of illegality or the imminence of The subcommittee also recognizes that the FBI is responsible for preventing the commission of federal crimes, including acts of ter- rorism and similar acts of violence. Such crimes threaten the lives and "domestic tranquility" of the American people, who have every right to expect that the Federal Government's law enforcement arm will be given the necessary authority to provide that protection. The FBI has the additional investigative responsibility under the law to identify applicants who constitute security risks so as to prevent those securing sensitive government employment. The attempt, as reflected in the guidelines, to achieve an appropriate balance between concerns for freedom of speech and association and the government's responsibility to provide information necessary to satisfy the security needs of federal agencies whose employees must satisfy minimum standards consistent with the national security, has produced some anomalies. One such anomaly lies in the fact that an intelligence agency, in investigating an applicant for a security clearance, must rely on the FBI for any information concerning that person's activities to over- throw the government or deprive others of their constitutional rights or those of a group to which the individual belongs, while the Domes- tic Security Investigation Guidelines do not permit the FBI to in- vestigate such a person or a group unless the person or group is con- nected with actual or imminent acts of violence in violation of Federal law. Since the FBI is likely to be the only source of information on groups identified by Executive Order 10450, intelligence agencies are unable to secure information that could assist them in making security assessments under the Executive Order, since by its terms the Execu- tive Order only requires information about advocacy or association. Examples of the above were cited to the subcommittee, during the hearing on June 21, 1979. Thomas J. O'Brien, of the Department of Defense, testified about procedures used by that agency in identifying security risks. Mr. O'Brien responded to questions by Committee staff member Herbert Romerstein and testified as follows: " Mr. ROMERSTEIN. Where would you get that kind of information (regarding groups that plan the overthrow of the government by force and violence or to deny others their constitutional rights by violence) normally? Is there another agency that would supply it if they had the data? Mr. O'BRIEN. We would go to the Federal Bureau of Investigation and inquire as to their knowledge of the organization. Mr. ROMERSTEIN. If a group such as one of those referred to in Executive Order 10450 publishes a plan to penetrate the armed forces, from whom would you expect to get the information so that you could take protective measures to prevent such people from coming in? Mr. O'BRIEN. Our primary source of information of this type is the Federal Bureau of Investigation. Donald Perrine and Paul Nugent testified on behalf of the Federal Bureau of Investigation in response to a series of questions by Con- gressman C. W. (Bill) Young. They testified as follows: 1VIr. YOUNG. I want to talk about the organizational cases. It is my under- standing that most of them have been closed since the Attorney General's guidelines were issued. "Sections of the transcript are presented as appendix D. Declassified in Part - Sanitized Copy Approved for Release 2013/01/10: CIA-RDP90-00530R000500970003-3 Declassified in Part - Sanitized Copy Approved for Release 2013/01/10: CIA-RDP90-00530R000500970003-3 19 Mr. NUGENT. The answer to your question is yes, that the majority of the cases, investigative cases which have been closed since the adoption of the guide- lines in April 1976 have been due to the criteria established by the guidelines for investigation. They either did not meet that criteria or were closed for other reasons, but the vast majority of them have been closed for that reason. Mr. YOUNG. Now, if a case on an organization has been closed, is the FBI still permitted to collect public type information relative to the group and its activities? Mr. NUGENT. No, sir. Mr. YOUNG. What about the case of, say, a newspaper article. Are you permitted to collect that? Mr. NUGENT. To peruse the newspaper and clip it? No. sir, that is not done at this point. Mr. YOUNG. You say it is not done. Are you not permitted to do it? Mr. NUGENT. I say based on the Department ruling and that one investigative case which was cited specifically by the Department, we would not do that, and do not do that. Mr. 'YOUNG. Are you allowed to read it and remember it? Mr. NUGENT. I would think that might be allowable in the private confines of one's home. Mr. YOUNG. When was the case on the Progressive Labor Party closed? Mr. NUGENT. The Progressive Labor Party case was closed in September 1976, September 20, 1976, to be exact. Mr. YOUNG. Well, the Progressive Labor Party has publicly proclaimed that they intend to take power in the United States by using "armed struggle" and that they are engaged in a program of penetrating the Armed Forces. This information appeared in the Progressive Labor Magazine, their own magazine that was published in the spring of 1978. In a case like this where they themselves have made this declaration, can the FBI collect these public documents on a group like the Progressive Labor Party, despite the fact that the case has been closed? Mr. NUGENT. Absolutely not. Mr. YOUNG. If the United States Army sent you a name in a national agency cheek of someone who had recently joined the PLP, and had penetrated the Army, which is what they say they are going to do, would you have to answer no record? Mr. NUGENT. Well, that is a hypothetical question, I realize' and to answer hypotheticals is rather difficult, but if that name were submitted today and that individual had joined such an organization last week, I would say that the possibilities of our coming up with that name in a name check situation would be practically remote. Mr. YOUNG. Not because you weren't able to do it, but because you weren't permitted to, is that it? Mr. NUGENT. Well, we just wouldn't have the curl ency of information with respect to that organization which has been closed, now for 3 years. The,member- ship of that paiticular group and any other would have changed two times in that period of three years, and we wouldn't have the identities of the membership. Mr. YOUNG. There has been previous testimony before this committee that the FBI closed the case on the Maryland Ku Klux Klan shortly before Maryland State Police arrested a number of the leaders of the group in a plot to bomb, churches, Jewish temples and the home of a Member of Congress. If the State Police had not had Sergeant John Cook under cover in this violent group, they very likely would have been able to bring off this act of terrorism. Now, if someone had joined the Maryland Klan after you closed that case, and had then applied for security clearance, would you have had any information to? supply in a national agency check? Mr. PERRINE. Probably not unless it came from other sources, another investi- gative service who may have forwarded it to our agency, but as an active investiga- tion on the part of the FBI, as Mr. Nugent indicated, no. This is not to say that if violent, illegal acts do occur, or are im- minent, that the FBI could not investigate. Rather, before such acts- occur, groups cannot be investigated for mere advocacy of violence. The subcommittee recoguizes ? that the inconsisteney between Executive Order 10450 and the Domestic Security Investigation Guidelines is bound to produce similar examples. The subcommittee is. i divided as to whether it s the Executive Order or the Guidelines which Declassified in Part - Sanitized Copy Approved for Release 2013/01/10: CIA-RDP90-00530R000500970003-3 Declassified in Part - Sanitized Copy Approved for Release 2013/01/10: CIA-RDP90-00530R000500970003-3 20 should be reassessed, but all members of the subcommittee agree that the inconsistencies of these two policy documents should be resolved so as to provide a clearer understanding of what information should be collected and made available for security clearance investigations. This reassessment should also examine the provisions of the Privacy Act and take into account the applicable Supreme Court decisions. The upcoming consideration of the recently proposed FBI charter will offer an appropriate opportunity to resolve these issues. Declassified in Part - Sanitized Copy Approved for Release 2013/01/10: CIA-RDP90-00530R000500970003-3 Declassified in Part - Sanitized Copy Approved for Release 2013/01/10: CIA-RDP90-00530R000500970003-3 APPENDIX A EXECUTIVE ORDER 10450 SECURITY REQUIREMENTS FOR GOVERNMENT EMPLOYMENT Whereas the interests of the national security require that all persons privileged to be employed in the departments and agencies of the Government, shall be reliable, trustworthy, of good conduct and character, and of complete and unswerv- ing loyalty to the United States; and Whereas the American tradition that all persons should receive fair, impartial, and equitable treatment at the hands of the Government requires that all persons seeking the privilege of employment or privileged to be employed in the depart- ments and agencies of the Government be adjudged by mutually consistent and no less than minimum standards and procedures among the departments and agencies governing the employment and retention in employment of persons in the Federal service: Now, therefore, by virtue of the authority vested in me by the Constitution and statutes of the United States, including section 1753 of the Revised Statutes of the United States (5 U.S.C. 631); the Civil Service Act of 1883 (22 Stat. 403; 5 U.S.C. 632, et seq.); section 9A of the act of August 2, 1939, 53 Stat. 1148 (5 U.S.C. 118j) ; and the act of August 26, 1950, 64 Stat. 476 (5 U.S.C. 22-1, et seq.), and as President of the United States, and deeming such action necessary in the best interests of the national security, it is hereby ordered as follows: SECTION 1. In addition to the departments and agencies specified in the said act of August 26, 1950, and Executive Order No. 10237 1 of April 26, 1951, the provisions of that act shall apply to all other departments and agencies of the Government. SEC. 2. The head of each department and agency of the Government shall be responsible for establishing and maintaining within his department or agency an effective program to insure that the employment and retention in employment of any civilian officer or employee within the department or agency is clearly con- sistent with the interests of the national security. SEC. 3. (a) The appointment of each civilian officer or employee in any depart- ment or agency of the Government shall be made subject to an investigation. The scope of the investigation shall be determined in the first instance according to the degree of adverse effect the occupant of the position sought to be filled could bring about, by virtue of the nature of the position, on the national security, but in no event shall the investigation include less than a national agency check (including a check of the fingerprint files of the Federal Bureau of Investigation), and written inquiries to appropriate local law-enforcement agencies, former employers and supervisors, references, and schools attended by the person under investigation: Provided, that upon request of the head of the department or agency concerned, the Civil Service Commission may, in its discretion, authorize such less investigation as may meet the requirements of the national security with respect to per-diem, intermittent, temporary, or seasonal employees, or aliens employed outside the United States. Should there develop at any stage of investigation information indicating that the employment of any such person may not be clearly consistent with the interests of the national security, there shall be conducted with respect to such persons a full field investigation, or such less investigation as shall be sufficient to enable the head of the department or agency concerned to determine whether retention of such person is clearly con- sistent with the interests of the national security. (b) The head of any department or agency shall designate, or cause to be designated, any position within his department or agency the occupant of which could bring about, by virtue of the nature of the position, a material adverse effect on the national security as a sensitive position. Any position so designated shall be filled or occupied only by a person with respect to. whorri a full field 1 CFR, 1951 Supp., p. 430. (21) Declassified in Part - Sanitized Copy Approved for Release 2013/01/10: CIA-RDP90-00530R000500970003-3 Declassified in Part - Sanitized Copy Approved for Release 2013/01/10: CIA-RDP90-00530R000500970003-3 22 investigation has been conducted: Provided, that a person occupying a sensitive position at the time it is designated as such may continue to occupy such position pending the completion of a full field investigation, subject to the other provisions of this order: And provided further, that in case of emergency a sensitive position may be filled for a limited period by a person with respect to whom a full field pre- appointment investigation has not been completed if the head of the department or agency concerned finds that such action is necessary in the national interest, which finding shall be made a part of the records of such department or agency. SEC. 4. The head of each department and agency shall review, or cause to be reviewed, the cases of all civilian officers and employees with respect to whom there has been conducted a full field investigation under Executive Order No. 9835 2 of March 21, 1947, and, after such further investigation as may be appro- priate, shall re-adjudicate, or cause to be re-adjudicated, in accordance with the said act of August 26, 1950, such of those cases as have not been adjudicated under a security standard commensurate with that established under this order. Sac. 5. Whenever there is developed or received by any department or agency information indicating that the retention in employment of any officer or em- ployee of the Government may not be clearly consistent with the interests of the national security, such information shall be forwarded to the head of the employing department or agency or his representative, who, after such investi- gation as may be appropriate, shall review, or cause to be reviewed, and, where necessary, re-adjudicate, or cause to be re-adjudicated, in accordance with the said act of August 26, 1950, the case of such officer or employee. SEC. 6. Should there develop at any stage of investigation information indi- cating that the employment of any officer or employee of the Government may not be clearly consistent with the interests of the national security, the head of the department or agency concerned or his representative shall immediately suspend the employment of the person involved if he deems such suspension neces- sary in the interests of the national security and, following such investigation and review as he deems necessary, the head of the department or agency concerned shall terminate the employment of such suspended officer or employee whenever he shall determine such termination necessary or advisable in the interests of the national security, in accordance with the said act of August 26, 1950. SEC. 7. Any person whose employment is suspended or terminated under the authority granted to heads of departments and agencies by or in accordance with the said act of August 26, 1950, or pursuant to the said Executive Order No. 9835 or any other security or loyalty program relating to officers or employees of the Government, shall not be restored to duty or reemployed in the same department or agency and shall not be reemployed in any other department or agency, unless the head of the department or agency concerned finds that such reinstatement, restoration, or reemployment is clearly consistent with the in- terests of the national security, which findings shall be made a part of the records of such department or agency: Provided, that no person whose employment has been terminated under such authority thereafter may be employed by any other department or agency except a determination by the Civil Service Commission that such person is eligible for such employment. Sac. 8. (a) The investigations conducted pursuant to this order shall be de- signed to develop information as to whether the employment or retention in em- ployment in the Federal service of the person being investigated is clearly con- sistent with the interests of the national security. Such information shall relate, but shall not be limited, to the following: (1) Depending on the relation of the Government employment to the national security: (i) Any behavior, activities, or associations which tend to show that the in- dividual is not reliable or trustworthy. (ii) Any deliberate misrepresentations, falsifications, or omissions of material facts. (iii) Any criminal, infamous, dishonest., immoral, or notoriously disgraceful conduct, habitual use of intoxicants to excess, drug addiction, sexual perversion, or financial irresponsibility. (iv) An adjudication of insanity; or treatment for serious mental or neurological disorder without satisfactory evidence of cure. (v) Any facts which furnish reason to believe that the individual may be sub- jected to coercion, influence, or pressure which may cause him to act contrary to the best interests of the national security. 2 CFR, 1947 Supp. Declassified in Part - Sanitized Copy Approved for Release 2013/01/10: CIA-RDP90-00530R000500970003-3 Declassified in Part - Sanitized Copy Approved for Release 2013/01/10: CIA-RDP90-00530R000500970003-3 23 (2) Commission of any act of sabotage, espionage, treason, or sedition, or attempts thereat or preparation therefor, or conspiring with, or aiding or abetting another to commit or attempt to commit any act of sabotage, espionage, treason, or sedition. (3) Establishing or continuing a sympathetic association with a saboteur, spy, traitor, seditionist, anarchist, or revolutionist, or with an espionage or other secret agent or representative of a foreign nation, or any representative of a foreign nation whose interests may be inimical to the interests of the United States, or with any person who advocates the use of force or violence to overthrow the government of the United States or the alteration of the form of government of the United States by unconstitutional means. (4) Advocacy of use of force or violence to overthrow the government of the United States, or of the alteration of the form of government of the United States by unconstitutional means. (5) Membership in, or affiliation or sympathetic association with, any foreign or domestic organization, association, movement, group, or combination of persons which is totalitarian, Fascist, Communist, or subversive, or which has adopted, or shows a policy of advocating or approving the commission of acts of force or violence to deny other persons their rights under the Constitution of the United States, or which seeks to alter the form of government of the United States by unconstitutional means. (6) Intentional, unauthorized disclosure to any person of security information, or of other information disclosure of which is prohibited by law, or willful violation or disregard of security regulations. (7) Performing or attempting to perform his duties, or otherwise acting, so as to serve the interests of another government in preference to the interests of the United States. (b) The investigation of persons entering or employed in the competitive service shall primarily be the responsibility of the Civil Service Commission, except in cases in which the head of a department or agency assumes that responsi- bility pursuant to law or by agreement with the Commission. The Commission shall furnish a full investigative report to the department or agency concerned. (c) The investigation of persons (including consultants, however employed), entering employment of, or employed by, the Government other than in the com- petitive service shall primarily be the responsibility of the employing department or agency. Departments and agencies without investigative facilities may use the investigative facilities of the Civil Service Commission, and other departments and agencies may use such facilities under agreement with the Commission. (d) There shall be referred promptly to the Federal Bureau of Investigation all investigations being conducted by any other agencies which develop informa- tion indicating that an individual may have been subjected to coercion, influence, or pressure to act contrary to the interests of the national security, or information relating to any of the matters described in subdivisions (2) through (7) of sub- section (a) of this section. In cases so referred to it, the Federal Bureau of Investi- gation shall make a full field investigation. SEC. 9. (a) There shall be established and maintained in the Civil Service Com- mission a security-investigations index covering all persons as to whom security investigations have been conducted by any department or agency of the Gov- ernment under this order. The central index established and maintained by the Commission under Executive Order No. 9835 of March 21, 1947, shall be made a part of the security-investigations index. The security-investigations index shall contain the name of each person investigated, adequate identifying informa- tion concerning each such person, and a reference to each department and agency which has conducted an investigation concerning the person involved or has suspended or terminated the employment of such person under the authority granted to heads of departments and agencies by or in accordance with the said act of August 26, 1950. (b) The heads of all departments and agencies shall furnish promptly to the Civil Service Commission information appropriate for the establishment and maintenance of the security-investigations index. (c) The reports and other investigative material and information developed by investigations conducted pursuant to any statute, order, or program described in section 7 of this order shall remain the property of the investigative agencies con- ducting the investigations, but may, subject to considerations of the national security, be retained by the department or agency concerned. Such reports and other investigative material and information shall be maintained in confidence, and no access shall be given thereto except, with the consent of the investigative Declassified in Part - Sanitized Copy Approved for Release 2013/01/10: ,CIA-RDP90-00530R000500970003-3 Declassified in Part - Sanitized Copy Approved for Release 2013/01/10: CIA-RDP90-00530R000500970003-3 94 agency concerned, to other departments and agencies conducting security pro- grams under the authority granted by or in accordance with the said act of Au- gust 26, 1950, as may be required for the efficient conduct of Government business. SEC. 10. Nothing in this order shall be construed as eliminating or modifying in any way the requirement for any investigation or any determination as to security which may be required by law. SEC. 11. On and after the effective date of this order the Loyalty Review Board established by Executive Order No. 9835 of March 21, 1947, shall not accept agency findings for review, upon appeal or otherwise. Appeals pending before the Loyalty Review Board on such date shall be heard to final determination in ac- cordance with the provisions of the said Executive Order No. 9835, as amended. Agency determinations favorable to the officer or employee concerned pending before the Loyalty Review Board on such date shall be acted upon by such Board, and whenever the Board is not in agreement with such favorable determination the case shall be remanded to the departinent or agency concerned for determination in accordance with the standards and procedures established pursuant to this order. Cases pending before the regional loyalty boards of the Civil Service Commission on which hearings have not been initiated on such date shall be re- ferred to the department or agency concerned. Cases being heard by regional loyalty boards on such date shall be heard to conclusion, and the determination of the board shall be forwarded to the head of the department or agency concerned: Provided, that if no specific department or agency is involved, the case shall be dis- missed without prejudice to the applicant. Investigations pending in the Federal Bureau of Investigation or the Civil Service Commission on such date shall be completed, and the reports thereon shall be made to the appropriate department or agency. SEC. 12. Executive Order No. 9835 of March 21, 1947, as amended, is hereby revoked. For the purposes described in section 11 hereof the Loyalty Review Board and the regional loyalty boards of the Civil Service Commission shall continue to exist and function for a period of one hundred and twenty days from the effective date of this order, and the Department of Justice shall continue to furnish the information described in paragraph 3 of Part III of the said Executive Order No. 9835, but directly to the head of each department and agency. SEC. 13. The 4ttorney General is requested to render to the heads of depart- ments, and agencies such advice as may be requisite to enable them to establish and maintain an appropriate employee-security program. SEC. 14. (a) The Civil Service Commission, with the continuing advice and collaboration of representatives of such departments and agencies as the National Security Council may designate, shall make a continuing study of the manner in which this order is being implemented by the departments and agencies of the Government for the purpose of determining: (1) Deficiencies in the department and agency security programs established under this order which are inconsistent with the interests of, or directly or indi- rectly weaken, the national security. (2) Tendencies in such programs to deny to individual employees fair, im- partial, and equitable treatment at the .hands of the Government, or rights under the Constitution and laws of the United States or. this.order. Information affecting any department or agency developed or received during the course of such continuing study shall be furnished immediately to the head of the department or agency concerned. The Civil Service Commission shall report to the National Security Council, at least semiannually, on the results of such study, and shall recommend means to correct any such deficiencies or tendencies. (b) All departments and agencies of the Government are directed to cooperate with the Civil Service Commission to facilitate the accomplishment of the respon- sibilities assigned to it by subsection (a) of this section. SEC. 15. This order shall become effective thirty days after the date hereof. DWIGHT D. EISENHOWER. THE WHITE HOUSE; April 27, 1953. Declassified in Part - Sanitized Copy Approved for Release 2013/01/10: CIA-RDP90-00530R000500970003-3 Declassified in Part - Sanitized Copy Approved for Release 2013/01/10: CIA-RDP90-00530R000500970003-3 APPENDIX B DCID No. 1/14 13 May 1976 DIRECTOR OF CENTRAL INTELLIGENCE DIRECTIVE No. 1/14 1 MINIMUM PERSONNEL SECURITY STANDARDS AND PROCEDURES GOVERNING ELIGI- BILITY FOR ACCESS TO SENSITIVE COMPARTMENTED INFORMATION (Effective 13 May 1976) . Pursuant to the provisions of Executive Order 11905, Section 102 of the National ;Security Act of 1947 and National Security Council Directives, the following minimum personnel security standards, procedures and continuing security .programs are hereby established for all United States Government civilian and military personnel, consultants, contractors, employees of contractors and other individuals who require access to Sensitive Compartmented Information 2 (here- inafter referred to as SCI). The standards, procedures and programs established herein are minimum and the departments and agencies may establish such addi- tional security steps as may be deemed necessary and appropriate to ensure that -effective security is maintained. Purpose 1. The purpose of this Directive is to enhance the security protection of SCI through the application of minimum security standards, procedures and continu- ing security programs, and to facilitate the security certification process among Government departments and agencies. Applicability 2. The provisions of the Directive shall apply to all persons (other than elected ,officials of the United States Government, federal judges and those individuals for whom the DCI makes a specific exception) without regard to civilian or military .status, form of employment, official rank or position or length of service. 3. Individuals who do not meet the minimum security criteria contained herein and who are, therefore, denied access to SCI shall not, solely, for this reason, be ,considered ineligible for access to other classified information. Individuals whose -access to SCI has been authorized as an exception granted in accordance with :paragraph 7 below, shall not, solely for that reason, be considered eligible for access to other classification information. General 4. The granting of access to SCI shall be controlled under the strictest application of the "need-to-know" principle under procedures prescribed in the several existing .authorities which govern "access thereto, and in accordance with the personnel ,security standards and procedures set forth in this Directive. All persons account- Able under the authority of this Directive and given access to information (SCI) containing sources or methods of intelligence shall, as a condition of obtaining _access, sign an agreement that they will not disclose that information to persons not authorized to receive it. Personnel Security Standards 5. Criteria for security approval of an individual on a need-to-know basis for -access to SCI areas follows: a. The individual shall be stable, of excellent character and discretion and of unquestioned loyalty to the United States. I This directive supersedes DCID 1/14 approved 1 July 1968. 2 The term "Sensitive Compartmented Information" as used in this Directive is intended to include all Information and materials bearing special community controls indicating restricted handling within present and future community intelligence collection programs and their end products for which community systems6f compartmentation haie been or will be fort-I-40 eglablished: The term'does not inelnde'Reitticted Data as defined in Section II, Public Laws 585, Atomic Energy Act of 1954, as amended. (25) Declassified in Part - Sanitized Copy Approved for Release 2013/01/10: -;IA-RDP90-00530R000500970003-3 Declassified in Part - Sanitized Copy Approved for Release 2013/01/10: DIA-RDP90-00530R000500970003-3 26 b. Except where there is a compelling need and a determination has been. made by competent authority as described in paragraph 7 below that every reasonable assurance has been obtained that under the circumstances the. security risk is negligible: (1) Both the individual and the members of his or her immediate family shall be US citizens. For these purposes "immediate family" is defined as- including the individual's spouse, parents, brothers, sisters and children. (2) The members of the individual's immediate family and persons to. whom he is bound by affection or obligation should neither be subject to physical, mental or other forms of duress by a foreign power, nor advocate the use of force or violence to overthrow the Government of the United States or the alteration of the form of Government of the United States. byunconstitutional means. 6. In exceptional cases, the Senior Intelligence Officer (SIO) of the Intelligence- Community organization, or his designee, may determine that it is necessary or advisable in the National interest to authorize access to SCI prior to completion of the fully prescribed investigation. In this situation such investigative checks as are immediately possible shall be made at once, and should include a personal interview by trained security or counterintelligence personnel. Access in such cases shall be strictly controlled, and the fully prescribed investigation and final evaluation shall be completed at the earliest practicable moment. Exceptions 7. The exceptions to paragraph 5.b.(1) (2) above may be granted only by the- SIO or his designee, unless such authority has been specifically delegated to the head of an office of organization as set forth in inter-departmental agreements. All exceptions granted will be common sense determinations based on all available information, and shall be recorded by the agency making the exception. In those cases in which the individual has lived outside of the United States for a substantial period of his life, a thorough assessment of the adequacy of the investigation in terms of fulfillment of the minimum investigative requirements, and judicious review of the information therein must be made before an exception is considered. Investigative Requirements 8. The investigation conducted on an individual under consideration for access to SCI will be thorough and shall be designed to develop information as to whether the individual clearly meets the above Personnel Security Standards. 9. The investigation shall be accomplished through record checks and personal interviews of various sources by trained investigative personnel in order to establish affirmatively to the adjudicating agency complete continuity of identity to include- birth, residences, education, employments and military service. Where the cir- cumstances of a case indicate, the investigation shall exceed the basic requirements set out below to ensure that those responsible for adjudicating access eligibility have in their possession all the relevant facts available. 10. The individual shall furnish a signed personal history statement, fingerprints. of a quality acceptable to the Federal Bureau of Investigation and a signed release,. as necessary, authorizing custodians of police, credit, education and medical records, to provide record information to the investigative agency. Photographs of the individual shall also be obtained where additional corroboration of identity is required. 11. Minimum standards for the investigation are as follows: a. Verification of date and place of birth and citizenship. b. Check of the subversive and criminal files of the Federal Bureau of' Investigation, including submission of fingerprint charts, and such other National agencies as are appropriate to the individual's background. An additional check of Immigration and Naturalization Service records shall be conducted on those members of the individual's immediate family who are United States citizens other than by birth or who are resident aliens. c. A check of appropriate police records covering all areas where the indi- vidual has resided in the US throughout the most recent fifteen (15) years or since age eighteen, whichever is the shorter period. d. Verification of the individual's financial status and credit habits through checks of appropriate credit institutions and interviews with knowledgeable sources covering the most recent five (5) years. c. Interviews with neighbors in the vicinity of all the individual's residences in excess of six (6) months throughout the most recent five (5) year period. This coverage shall be expanded where the investigation suggests the existence of some questionable behavioral pattern. Declassified in Part - Sanitized Copy Approved for Release 2013/01/10: CIA-RDP90-00530R000500970003-3 Declassified in Part - Sanitized Copy Approved for Release 2013/01/10: CIA-RDP90-00530R000500970003-3 27 f. Confirmation of all employment during the past fifteen (15) years or since age eighteen, whichever is the shorter period but in any event the most recent two years. Personal interviews with supervisors and co-workers at places of employment covering the past ten (10) years shall be accomplished. g. Verification of attendance at institutes of higher learning in all instances and at the last secondary school attended within the past fifteen (15) years. Attendance at secondary schools may be verified through qualified collateral sources. If attendance at educational institutions occurred within the most recent five (5) years, personal interviews with faculty members or other persons who were acquainted with the individual during his attendance shall be accomplished. h. Review of appropriate military records. i. Interviews with a sufficient number of knowledgeable acquaintances (a minimum of three developed during the course of the investigation) as necessary to provide a continuity to the extent practicable, of the individual's activities and behavioral patterns over the past fifteen years with particular emphasis on the most recent five years. j. When employment, education or residence, has occurred overseas (except for periods of less than five (5) years for personnel on US Government assignment and less than ninety days for other purposes) during the past fifteen years or since age eighteen, a check of the records will be made at the Department of State and other appropriate agencies. Efforts shall be made to develop sources, generally in the United States, who knew the individual overseas in order to cover significant employment, education or residence and to attempt to determine if any lasting foreign contacts or connections were established during this period. However, in all cases where an individual has worked or lived outside of the US continuously for over five years, the investigation will be expanded to cover fully this period in his life through the use of such investigative assets and checks of record sources as may be available to the US Government in the foreign country (ies) in which the individual resided. k. In those instances in which the individual has immediate family members or other persons with whom he is bonded by affection or obligation in any of the situations described in subparagraph 5.h.(2), above, the investigation will include an interview of the individual by trained security, investigative or counter-intelligence personnel to ascertain the facts as they may relate to the individual's access eligibility. I. In all cases the individual's spouse shall at a minimum be checked through the subversive files of the Federal Bureau of Investigation and other National agencies as appropriate. When conditions indicate, additional in- vestigations shall be conducted on the spouse of the individual and members of the immediate family to the extent necessary to permit a determination by the adjudicating agency that the provisions of paragraph 5, Personnel Security Standards, above, are met. m. A personal interview of the individual will be conducted by trained security, investigative or counterintelligence personnel when necessary to resolve any significant adverse information and/or inconsistencies developed during the investigation. 12. Where a previous investigation has been conducted within the past five years which substantially meets the above minimum standards, it may serve as a basis for granting access approval provided a review of the personnel and security files does not reveal substantive changes in the individual's security eligibility. If a previous investigation does not substantially meet the minimum standards or if it is more than five years old, a current investigation shall be required but may be limited to that necessary to bring the individual's file up-to-date in ac- cordance with the investigative requirements set forth in paragraph 11 above. Should new information be developed during the current investigation which bears unfavorably upon the individual's activities covered by the previous investiga- tion, the current inquiries shall be expanded as necessary to develop full details of this new information. 13. Programs shall be instituted requiring the periodic reinvestigation of per- sonnel provided access to SCI. These reinvestigations will be conducted on a five- year recurrent basis, but on a more frequent basis where the individual has shown some questionable behavioral pattern, his activities are otherwise suspect, Or when deemed necessary by the SIO concerned.3 2 In DoD, an SIO may request, with the approval of the Secretary of Defense or his designee, more frequent reinvestigations under special circumstances. Declassified in Part - Sanitized Copy Approved for Release 2013/01/10: CIA-RDP90-00530R000500970003-3 rDeclassified in Part - Sanitized Copy Approved for Release 2013/01/10: CIA-RDP90-00530R000500970003-3 2g: 14. The scope of reinvestigations shall be determined by the SIO ?cOnCerned based on such considerations as the potential damage that might result from the individual's defection or willful compromise of SCI and the availability and prob- able effectiveness of other means to continually evaluate factors related to the individual's suitability for continued access. In all cases, the reinvestigation shall include, as a minimum, appropriate National agency checks, local agency (including overseas checks where appropriate), credit checks and a personal discussion with the individual by trained investigative, security or counterintellgence personnel when necessary to resolve significant adverse information or inconsistencies. 15. The evaluation of the information developed by investigation on an in- dividual's loyalty and suitability shall be accomplished under the cognizance of the SIO concerned by analysts of broad knowledge, good judgment and wide experience in personnel security and/or counterintelligence. When all other infor- mation developed on an individual is favorable, a minor investigative requirement which has not been met should not preclude favorable adjudication. In all evalua- tions the protection of the national interest is paramount. Any doubt concerning personnel having access to SCI shall be resolved in favor of the national security. The ultimate determination of whether the granting of access is clearly consistent with the interests of national security shall be an overall common sense determina- tion based on all available information. Continuing Security Programs 16. In order to facilitate the attainment of the highest standard of personnel security and to augment both the access approval criteria and the investigative requirements established by this Directive, member departments and agencies shall institute continuing security programs for all individuals having access to SCI. In addition to security indoctrinations, these programs shall be tailored to create mutually supporting procedures under which no issue will escape notice or he left unresolved which brings into question an individual's loyalty and integrity or suggests the possibility of his being subject to undue influence or duress through foreign relationships or exploitable personal conduct. When an individual is as- signed to perform sensitive compartmented work requiring access to SCI, the SIO for the department, agency or Government program to which the individual is assigned shall assume security supervision of that individual throughout the period of his assignment. 17. The continuing security programs shall include the followings: a. Security education programs to ensure that individuals who are granted access to SCI are intially indoctrinated and periodically thereafter instructed as to its unique sensitivity and that they understand their personal responsi- bility for its protection. The individual should be instructed that the ultimate responsibility for maintaining eligibility for continued access to SCI rests with with the individual. Therefore, the individual is encouraged to seek a pro- priate guidance and assistance on any personal problem or situation which may have a possible bearing on his eligibility for continued access to SCI, and se- curity counseling should be made available. These instructions should be conducted by individuals having extensive background and experience re- garding the nature and special vulnerabilities of the particular type of com- partmented information involved. b. Security supervisory programs to ensure that supervisory personnel recognize and discharge their special responsibility in matters pertaining to the security of SCI, including the eligibility for SCI access. Such programs shall provide practical guidance as to indicators which may signal matters of se- curity concern. Specific instructions concerning reporting procedures shall be disseminated to enable the appropriate authority to take timely corrective action to safeguard the security of the United States as well as to provide all necessary help to the indivuidal concerned to neutralize his vulnerability. c. Security Review Programs to ensure that appropriate security authori- ties invariably receive and exchange, in a timely manner, all information bearing on the security posture of persons having access to sensitive infor- mation. Personnel history information shall be kept current. Security and related files shall be kept under continuing review. 18. Whenever adverse or derogatory information is discovered or inconsistencies arise which could impact upon an individual's security status, appropriate in- vestigations shall be conducted on a timely basis. The investigation shall be of sufficient Scope necessary to resolve the specific adverse or derogatory information, or inconsistency, in question so that a determination can be made as to whether the individual's continued utilization in activities requiring SCI is clearly consistent with the interests of the national security. Declassified in Part - Sanitized Copy Approved for Release 2013/01/10: CIA-RDP90-00530R000500970003-3 Declassified in Part - Sanitized Copy Approved for Release 2013/01/10: CIA-RDP90-00530R000500970003-3 29 Effective Date 19. This Directive supersedes DCID 1/14, 1 July 1968. Existing directives,4 regulations, agreements and such other references governing access to SCI as. defined herein shall be revised accordingly. GEORGE BUSH, Director of Central Intelligence. 4 These include pertinent provisions of the Clearance Standards and Investigation and Evaluation sections off the Communications Intelligence Security Regulations. Declassified in Part - Sanitized Copy Approved for Release 2013/01/10: ::',IA-RDP90-00530R000500970003-3 Declassified in Part - Sanitized Copy Approved for Release 2013/01/10: -2,1A-RDP90-00530R000500970003-3 APPENDIX C NATIONAL SECURITY AGENCY?PERSONNEL SECURITY PROCEDURES PUBLIC LAW 88-290; 78 STAT. 168 An Act to amend the Internal Security Act of 1950. Be it enacted by the Senate and House of Representatives of the United States of America in Congress assembled, That: The Internal Security Act of 1950 is amended by adding at the end thereof the following new title: TITLE III?PERSONNEL SECURITY PROCEDURES IN NATIONAL SECURITY AGENCY "REGULATIONS FOR EMPLOYMENT SECURITY" SEC. 301. Subject to the provisions of this title, the Secretary of Defense (here- after in this title referred to as the 'Secretary') shall prescribe such regulations relating to continuing security procedures as he considers necessary to assure? "(1) that no person shall be employed in, or detailed or assigned to, the National Security Agency (hereafter in this title referred to as the 'Agency'), or continue to be so employed, detailed, or assigned; and "(2) that no person so employed, detailed, or assigned shall have access to any classified information; unless such employment, detail, assignment, or access to classified information is clearly consistent with the national security. "FULL FIELD INVESTIGATION AND APPRAISAL "SEc. 302. (a) No person shall be employed in, or detailed or assigned to, the Agency unless he has been the subject of a full field investigation in connection with such employment, detail, or assignment, and is cleared for access to classified information in accordance with the provisions of this title; excepting that condi- tional employment without access to sensitive cryptologic information or material may be tendered any applicant, under such regulations as the Secretary may prescribe, pending the completion of such full field investigation: And provided further, That such full field investigation at the discretion of the Secretary need not be required in the case of persons assigned or detailed to the Agency who have a current security clearance for access to sensitive cryptologic information under equivalent standards of investigation and clearance. During any period of war declared by the Congress, or during any period when the Secretary determines that a national disaster exists, or in exceptional cases in which the Secretary (or his designee for such purpose) makes a determination in writing that his action is necessary or advisable in the national interest, he may authorize the employment of any person in, or the detail or assignment of any person to, the Agency, and may grant to any such person access to classified information, on a temporary basis, pending the completion of the full field investigation and the clearance for access to classified information required by this subsection, if the Secretary determines that such action is clearly consistent with the national security. "(b) To assist the Secretary and the Director of the Agency in carrying out their personnel security responsibilities, one or more boards of appraisal of three members each, to be appointed by the Director of the Agency, shall be established in the Agency. Such a board shall appraise the loyalty and suitability of persons for access to classified information, in those cases in which the Director of the Agency determines that there is a doubt whether their access to that information would be clearly consistent with the national security, and shall submit a report and recommendation on each such a case. However, appraisal by such a board is not required before action may be taken under section 14 of the Act of June 27, 1944, chapter 287, as amended (5 U.S.C. 863), section 1 of the Act of August 26, 1950, chapter 803, as amended (5 U.S.C. 22-1), or any other similar provision of law. Each member of such a board shall be specially qualified and trained for his (30) Declassified in Part - Sanitized Copy Approved for Release 2013/01/10: CIA-RDP90-00530R000500970003-3 Declassified in Part - Sanitized Copy Approved for Release 2013/01/10: CIA-RDP90-00530R000500970003-3 31 duties as such a member, shall have been the subject of a full field investigation in connection with his appointment as such a member, and shall have been cleared by the Director for access to classified information at the time of his appointment as such a member. No person shall be cleared for access to classified information, contrary to the recommendations of any such board, unless the Secretary (or his designee for such purpose) shall make a determination in writing that such em- ployment, detail, assignment, or access to classified information is in the national interest. "TERMINATION OF EMPLOYMENT "SEC. 303. (a) Notwithstanding section 14 of the Act of June 27, 1944, chapter 287, as amended (5 U.S.C. 863), section 1 of the Act of August 26, 1950, chapter 803, as amended (5 U.S.C. 22-1), or any other provision of law, the Secretary may terminate the employment of any officer or employee of the Agency whenever he considers that action to be in the interest of the United States, and he determines that the procedures prescribed in other provisions of law that authorize the termi- nation of the employment of that officer or employee cannot be invoked consist- ently with the national security. Such a determination is final. "(b) Termination of employment under this section shall not affect the right of the officer or employee involved to seek or accept employment with any other department or agency of the United States if he is declared eligible for such em- pl97ment by the United States Civil Service Commission. (c) Notwithstanding section 133(d) of title 10, United States Code, any author- ity vested in the Secretary of Defense by subsection (a) may be delegated only to the Deputy Secretary of Defense or the Director of the National Security Agency, or both. "DEFINITION OF CLASSIFIED INFORMATION "SEC. 304. For the purposes of this section, the term 'classified information' means information which, for reasons of national security, is specifically designated by a United States Government agency for limited or restricted dissemination or distribution. "NONAPPLICABILITY OF ADMINISTRATIVE PROCEDURE ACT "SEC. 305. The Administrative Procedure Act, as amended (5 U.S.C. 1001 et seq.), shall not apply to the use or exercise of any authority granted by this title. "AMENDMENTS "SEC. 306. (a) The first sentence of section 2 of the Act of May 29, 1959 (50 U.S.C. 402 note), is amended by inserting, 'without regard to the civil service laws,' immediately after 'and to appoint thereto'. "(b) Subsection (5) of section 2 of the Performance Rating Act of 1950 (5 U.S.C. 2001(b) is amended? "(1) by striking out the period at the end of paragraph (13) and inserting in lieu thereof a semicolon; and "(2) by adding at the end thereof the following new paragraph: "'(14) The National Security Agency.'" Approved March 26, 1964. Declassified in Part - Sanitized Copy Approved for Release 2013/01/10: CIA-RDP90-00530R000500970003-3 Declassified in Part - Sanitized Copy Approved for Release 2013/01/10: CIA-RDP90-00530R000500970003-3 APPENDIX D To OVERSIGHT REPORT ? Thomas J. O'Brien, of the Department of Defense, testified, on June 21, 1979, about procedures used by that agency in identifying security risks. Mr. O'Brien responded to a series of questions by Committee staff member Herbert Romerstein and testified as follows: ? Mr. ROMERSTEIN. Among the criteria in Executive Order 10450 for denying employment are knowing membership in a group that plans the overthrow of the government by force and violence, or knowing membership in a group that advo- cates the use of violence to deny others their civil rights. Does the DoD have the data base to determine whether the prospective em- ployee or member of the Armed Forces holds such a membership? Mr. O'BRIEN. We do not hold a data base, per se. We conduct an extensive investigation. During the interview portion of the investigation, we will ask questions with respect to the person's involvement in activities that might advocate the overthrow of the government or that might advocate the denial of others' constitutional rights. Conceivably the person would have been arrested in some context that might lead to this kind of a discovery. Mr. ROMERSTEIN. But you don't collect data on such organizations so that you would be able to determine if a member of such a group? Mr. O'BRIEN. We do not. Mr. ROMERSTEIN. Where would you get that kind of information normally? Is there another agency that would supply it if they had the data? Mr. O'DONNELL. We would go to the Federal Bureau of Investigation and inquire as to their knowledge of the organization. Mr. ROMERSTEIN. If a group such as one of those referred to in Executive Order 10450 publishes a plan to penetrate the armed forces, from whom would you expect to get the information so that you could take protective measures to prevent such people from coming in? Mr. O'BRIEN. Our primary source of information of this type is the Federal Bureau of Investigation. Mr. ROMERSTEIN. Thank you. Donald Perrine and Paul Nugent testified on behalf of the Federal Bureau of Investigation in response to a series of questions by Congressman C. W. (Bill) Young. They testified as follows: Mr. YOUNG. Mr. Perrine, let me just ask the questions and then anyone, you or anyone can respond. Mr. PERRINE. All right, very well. Mr. YOUNG. I want to talk about the organizational cases. It is my under- standing that most of them have been closed since the Attorney General's guide- lines were issued. Is that correct? Mr. PERRINE. Yes, and I would like to have Mr. Nugent address that question more specifically. Mr. NUGENT. The answer to your question is yes, that the majority of the cases, investigative cases which have been closed since the adoption of the guidelines. in April 1976 have been due to the criteria established by the guidelines for in- vestigation. They either did not meet that criteria or were closed for another reasons, but the vast majority of them have been closed for that reason. Mr. YOUNG. Now, if a case on an organization has been closed, is the FBI still permitted to collect public type information relative to the group and its activities? Mr. NUGENT. No, sir. Mr. YOUNG. You are not. Mr. NUGENT. As a matter of policy, and there is documentation of this, the Department of Justice has considered the collection of public source information or information from the publication of even the group itself which has since been closed as active investigation. Now, ,that is not to say that certain information on this type which may be volunteering by citizens or other individual sources or informants cannot be accepted in the file. (32) Declassified in Part - Sanitized Copy Approved for Release 2013/01/10: CIA-RDP90-00530R000500970003-3 Declassified in Part - Sanitized Copy Approved for Release 2013/01/10: CIA-RDP90-00530R000500970003-3 33 Mr. YOUNG. What about the case of, say, a newspaper article. Mr. NUGENT. Yes, sir. Mr. YOUNG. Are you permitted to collect that? Mr. NUGENT. To persue the newspaper and clip it? No. sir, that is not done :at this point. Mr. YOUNG. You say it is not done. Are you not permitted to do it? Mr. NUGENT. I say based on the Department ruling and that one investigative ease which was cited specifically by the Department, we would not do that, and do not do that. Mr. YOUNG. Are you allowed to read it and remember it? Mr. NUGENT. I would think that might be allowable in the private confines of one's home. Mr. YOUNG. When was the case on the Progressive Labor Party Closed? Mr. NUGENT. The Progressive Labor Party case was closed in September 1976, September 20, 1976, to be exact. Mr. YOUNG. Well, the Progressive Labor Party has publicly proclaimed that they intend to take power in the United States by using "armed struggle" and that they are engaged in a program of penerating the Armed Forces. This information appeared in the Progressive Labor Magazine, their own magazine that was published in the spring of 1978. In a case like this where they themselves have made this declaration, can the FBI collect these public documents on a group like the Progressive Labor Party, despite the fact that the case has been closed? Mr. NUGENT. Absolutely not. Mr. YOUNG. Absolutely not. Now, let me make sure that I make sure I understand and anybody who reads this record understands. The Progressive Labor Party who has proclaimed through their own publication that they edit, publish, print, and somebody pays for, has said that they intend to take power by armed struggle. Now, there is something in gut law against advocating the violent overthrow of the government, isn't there? Mr. NUGENT. That is quite true. However, due to the nature of the investiga- tions which are conducted under the Domestic Security criteria today, if you have seen the guidelines, it is very specific in that advocacy or rhetoric is not the criteria on which we can base a domestic security investigation. There has to be that one step further, involvement in force and violence and violation of federal law, or at least a conspiracy to violate some federal law with force and violence on which we can base basically a criminal type approach to an investigation, not a searching for programs which groups may advocate in the press or in speechmaking and so forth. Mr. YOUNG. In other words, you are not allowed to be involved in fire preven- tion; you have to wait until the fire starts. Mr. NUGENT. Pretty close to that, yes, sir. Mr. YOUNG. I wonder what the American people would say if they all knew about that. I have an idea what their reaction would be. If the United States Army sent you a name in a national agency check of some- one who had recently joined the PLP, and had peneteated the Army, which is what they say they are going to do, would you have to answer no record? Mr. NUGENT. Well, that is a hypothetical question, I realize, and to answer hypotheticals is rather difficult, but if that name were submitted today and that individual had joined such an organization last week, I would say that the pos- sibilities of our coming up with that name in a name check situation would be practically remote. Mr. YOUNG. Not because you weren't able to do it, but because you weren't permitted to, is that it? Mr. NUGENT. Well, we just wouldn't have the currency of information with respect to that organization which has been closed now for three years. The membership of that particular group and any other would have changed two times in that period of three years, and we wouldn't have the identities of the membership. Mr. YOUNG. Since the regulations were issued, have you had any instance of the United States Army giving you,a name and asking for information relative to whether or not this person was an infiltrator from the PLO? Mr. NUGENT. No, sir, we haven't, to my knowledge. Maybe Mr. Perrine could recall one on a name check basis. I don't get involved in the name check process per se. Declassified in Part - Sanitized Copy Approved for Release 2013/01/10: -;IA-RDP90-00530R000500970003-3 Declassified in Part - Sanitized Copy Approved for Release 2013/01/10: .";1A-RDP90-00530R000500970003-3 34 Mr. PERRINE. Mr. Young, the mechanics would be that the Department of Defense or the Army would submit a form, either 1584, one of the routine forms requesting a check of our files. This would be initiating the national agency check. So unless they had some real special reason to flag the organization, we would have no way of knowing beyond our normal search procedure, which would be for any reference in our fdes, and if the information were not in our files, they would get a no record return. Mr. YOUNG. But the possibility of that person being what the Army suspected, that he was one of the PLO's infiltrators Mr. PERRINE. Would go undetected. Mr. YOUNG. That worries me. Does that worry you? MT. PERRINE. Certainly. Mr. Young. Well, I am certainly glad it worries more than just me. There has been previous testimony before this Committee that the FBI closed the case on the Maryland Ku Klux Klan shortly before Maryland State Police arrested a number of the leaders of the group in a plot to bomb churches, Jewish temples and the home of a Member of Congress. If the State Police had not had Sergeant John Cook under cover in this violent group, they very likely would have been able to bring off this act of terrorism. ?Now, if someone had joined the Maryland Klan after you closed that case, and had then applied for security clearance, would you have had any information to supply in a national agency check? Mr. PERRINE. Probably not unless it came from other sources, another investi- gative service who may have forwarded it to our agency, but as an active investiga? tion on the part of the FBI, as Mr. Nugent indicated, no. Declassified in Part - Sanitized Copy Approved for Release 2013/01/10 : CIA-RDP90-00530R000500970003-3