LETTER TO JOHN H. BUCHANAN, JR. FROM ROBERT M. GATES

Document Type: 
Collection: 
Document Number (FOIA) /ESDN (CREST): 
CIA-RDP90G01353R002000030039-9
Release Decision: 
RIPPUB
Original Classification: 
K
Document Page Count: 
146
Document Creation Date: 
January 4, 2017
Document Release Date: 
August 13, 2012
Sequence Number: 
39
Case Number: 
Publication Date: 
April 27, 1988
Content Type: 
LETTER
File: 
AttachmentSize
PDF icon CIA-RDP90G01353R002000030039-9.pdf7.18 MB
Body: 
Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90G01353R002000030039-9 THE FOLLOWING DOCUMENTS ARE ATTACHED: (Please do not remove) =V cpc; C~j 0,0 Gl".!3 /806 ~~ SUBJECT: Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90G01353R002000030039-9 Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 STAT STAT FOR I-79M 610 USEEDI-REViOUSNS IO T ROUTING AND RECORD SHEET SueJecT. (Optional) Response to John Buchanan, Chairman, People for the American Way, declining invitation to attend 13 June 1988 conference FROM: John L. flelgerson No. OCA 88-1300 Director of Congressio - - - oA? 24 AP P TO: (Officer designation, room number, and building) COMMENTS (Number each comment to show from whom INITIALS b whom, Draw a line atrois column after each comment.) R?t IVE4 FO WAR9ED William Baker Director of Public 2 . Executive Registry APR 5' Executive Director 7 APR 190 7. Deputy Director of tr C l I t lli en a n e gence 9? Return to Director of Congressional Affairs 10. 12. 13. 14. 1S. CC Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90G01353R002000030039-9 s Central Apncv 2 7 APR 1988 Mr. John H. Buchanan, Jr. Chairman People for the American Way 2000 M Street, Suite 400 Washington, D.C. 20036 Dear Mr. Buchanan: I very much appreciate your inviting me to participate in your People for the American way conference on 13 June 1988. You have picked a challenging and important subject for discussion. Unfortunately, my schedule will not permit me to attend. Thank you again for thinking of me. Sincerely, /s/ Re10Qrt M. Gates Robert M. Gates Deputy Director of Central Intelligence STAT Distribution: Orig. - Addressee 1 - DCI 1 - DDCI ER (Ref ER 1604x-88) - D/PAO 1 - D/OCA 1 - OCA Record 1 - DD/HA/OCA 1 - OCARead DD/IIA/0 :dpt (22 Apr 88) Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90G01353R002000030039-9 Declassified in Part - Sanitized Copy Approved for Release 2012/08/13 : Igo /Z~J) (IA-RnP9nr;n1'~F Rnngnnnn,~nn,~c) De Rnnu NO RI III nim CvTCKIQI^L lassified in Part - Sanitized Copy Approved for Release 2012/08/13: ellee....n Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 Z4%r,..IJ i v m oAi-KL AmLAT ROUTING SLIP STAT ACTION INFO DATE INITIAL 1 DCI 2 DDCI }{ 3 EXDIR 4 D/ICS 5 DDI 6 DDA 7 DDO 8 DDS&T 9 Chm/NIC 10 GC 11 IG 12 Compt 13 D/OCA D/PAO x 15 D/ ERS 16 D/Ex Staff 17 18 19 20 21 22 TO: o 9 Rk 9 a a V, pev dcJ- , e ' - . ' ' ) ^N r\ VLe T2VS\ ~e STAT r/L' ~Jrn~ I, t 1 19Ipr68 Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 Declassified in Part - Sanitized Copy Approved for Release 2012/08/13 : CIA-RDP90G01353R002000030039-9 EXECUTIVE SECRETARIAT 9 ROUTING SLIP ACTION INFO DATE INITIAL 1 DCI 2 DDCI 3 EXDIR 4 D/ICS 5 DDI 6 DDA 7 DDO 8 DDSBT 9 Chm/NIC 10 GC 11 IG 12 Compt 13 D/OCA 14 D/PAO X w encl 15 D/PERS 16 D/Ex Staff 17 18 19 20 21 22 Executive Secretary 19 Ar 68 Dar. Declassified in Part - Sanitized Copy Approved for Release 2012/08/13 : CIA-RDP90G01353R002000030039-9 Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90G01353R002000030039-9 ///~merKanWc The non-partisan constitutional liberties organization. April 11, 1988 The Honorable Robert M. Gates Deputy Director of Intelligence Central Intelligence Agency Washington, D.C. 20505 I am writing to invite you to participate in People For the American Way's conference on government secrecy and the Congress entitled, "Does Congress Have a Need to Know?" It will be held in the Russell Senate Caucus Room from 11:30 am until 2:00 pm on Monday, June 13, 1988. Last December, People For the American Way released a comprehensive study entitled Government Secrecy: Decisions Without Democracy (a copy is enclosed). It documents a rise of lifetime publication restrictions on current and former federal employees; a dramatic increase in the classification of documents; the growth of 400% over seven years in the Pentagon's "black budget"; new restrictions on the free flow of scientific and research data; and the proliferation of National Security Decision Directives. We at People For the American Way are concerned about how this trend effects citizens' ability to be informed participants in their government, and whether it compromises our system of checks and balances. These issues are especially important in the aftermath of the Iran-Contra affair and in this election year as the agenda for a new administration is debated. The primary focus of the conference will be a panel discussion on Congress's "need to know" and the limits on Executive decision-making under our constitutional system. I would like you to serve on the panel. Your vast experience and knowledge would be bring an invaluable perspective to the discussion. Norman Ornstein of the American Enterprise Institute will be the moderator. William Colby, Rep. Lee Hamilton, Rep. William Dickinson, and Scott Armstrong of the National Security Archive have agreed to participate on the panel. Others we have invited are Sen. George Mitchell, Clark Clifford, and Cokie Roberts of National Public Radio. The panel will be the centerpiece of the conference. It is structured to provide ample opportunity for discussion and 7 ' 2 FP-' j 2000 M Street. NW. Suite 400. Washineton. n_C_ 20036 (202) 467-4999 C Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90G01353R002000030039-9 Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90G01353R002000030039-9 debate. We are not asking for prepared speeches. Instead, the moderator will pose questions for you and your colleagues' response and comment. You will be free to debate among yourselves, questioning and challenging each other. As the discussion develops, the moderator will draw out different points of view and raise new issues, but the primary focus of the panel will be set by you and your fellow panelists. We have reserved the Russell Caucus Room in the Russell Senate Office Building for the event. Once again, the date is Monday, June 13, 1988 from 11:30 until 2:00 pm. We expect an audience of over 250 government officials, congressional staff, research institution specialists, scholars, and information specialists. We anticipate C-SPAN coverage and national press attention. The proceedings from the conference will be published and distributed widely to the media and the public. Please do not hesitate to contact me if you have any questions or suggestions about the conference, or if we can be of assistance. Thank you for your consideration. JHB:DCC:me Enclosures Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90G01353R002000030039-9 Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 GDVERNME DECISIONS WIIHOUI Preface by Arthur Schlesinger, Jr. Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 12012/08/13: CIA-RDP90GO1353R002000030039-9 T g w`. ROtiTING SLIP ACTION INFO DATE INITIAL 1 p 2 DI )d 3 EXDIR .,, 4 D/ICS 5 DDI 6 DDA 7 DDO 8 DDS&T 9 Chm/NIC 10 GC 11 IG 12 Compt 13 D/OCA D/PA x 15 ERS 16 D/Ex Staff 17 18 19 20 21 22 e , v ~ 0, W. j 1 h - e ~a L vyL ~P/'eeK 1- 1"f c`1 y1 P Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90G01353R002000030039-9 Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90G01353R002000030039-9 ~~~~merKan 64 The non-partisan constitutional liberties organization. April 11, 1988 The Honorable Robert M. Gates Deputy Director of Intelligence Central Intelligence Agency Washington, D.C. 20505 I am writing to invite you to participate in People For the American Way's conference on government secrecy and the Congress entitled, "Does Congress Have a Need to Know?" It will be held in the Russell Senate Caucus Room from 11:30 am until 2:00 pm on Monday, June 13, 1988. Last December, People For the American Way released a comprehensive study entitled Government Secrecy: Decisions Without Democracy (a copy is enclosed). It documents a rise of lifetime publication restrictions on current and former federal employees; a dramatic increase in the classification of documents; the growth of 400% over seven years in the Pentagon's "black budget"; new restrictions on the free flow of scientific and research data; and the proliferation of National Security Decision Directives. We at People For the American Way are concerned about how this trend effects citizens' ability to be informed participants in their government, and whether it compromises our system of checks and balances. These issues are especially important in the aftermath of the Iran-Contra affair and in this election year as the agenda for a new administration is debated. The primary focus of the conference will be a panel discussion on Congress's "need to know" and the limits on Executive decision-making under our constitutional system. I would like you to serve on the panel. Your vast experience and knowledge would be bring an invaluable perspective to the discussion. Norman Ornstein of the American Enterprise Institute will be the moderator. William Colby, Rep. Lee Hamilton, Rep. William Dickinson, and Scott Armstrong of the National Security Archive have agreed to participate on the panel. Others we have invited are Sen. George Mitchell, Clark Clifford, and Cokie Roberts of National Public Radio. The panel will be the centerpiece of the conference. It is structured to provide ample opportunity for discussion and 2000 M Street, NW, Suite 400, Washington, D.C. 20036 (202) 467-4999 Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90G01353R002000030039-9 4 Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90G01353R002000030039-9 debate. We are not asking for prepared speeches. Instead, the moderator will pose questions for you and your colleagues' response and comment. You will be free to debate among yourselves, questioning and challenging each other. As the discussion develops, the moderator will draw out different points of view and raise new issues, but the primary focus of the panel will be set by you and your fellow panelists. We have reserved the Russell Caucus Room in the Russell Senate Office Building for the event. Once again, the date is Monday, June 13, 1988 from 11:30 until 2:00 pm. We expect an audience of over 250 government officials, congressional staff, research institution specialists, scholars, and information specialists. We anticipate C-SPAN coverage and national press attention. The proceedings from the conference will be published and distributed widely to the media and the public. Please do not hesitate to contact me if you have any questions or suggestions about the conference, or if we can be of assistance. Thank you for your consideration. JHB : DCC : me Enclosures Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90G01353R002000030039-9 Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 t I 1 4 Amencan The nonpartisan constitutional liberties organization. GOVERNME DECISIONS WIIHOUI DJMII!RIY VP Preface by Arthur Schlesinger, Jr. Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 "A popular Government without popular information, or the means of acquiring it, is but a Prologue to a Farce or a Tragedy-, or perhaps both. Knowledge will forever govern ignorance: And a people -,-,h* nAvk%MLv!r-vNm Governors. must arm themselves with the power which knowledge gives." Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 p DECISIONS WIIHOUI ~FMO,CRACY by Steven L. Katz Preface by Arthur Schlesinger, Jr. L Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90G01353R002000030039-9 A publication of People For The American Way 2000 M Street, Suite 400 Washington, D.C. 20036 (202) 467-4999 People For The American Way is solely responsible for the contents of this publication. ? Copyright 1987 by People For The American Way. All rights reserved. Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90G01353R002000030039-9 Acknowledgements Several individuals provided valuable assistance in reviewing this report. David Cohen emphasized the impact of secrecy on decreasing the political efficacy of citizens. Tony Podesta addressed the ways in which secrecy undercuts the role of elected officials in our representative form of government. Gary Bass and David Plocher were particularly helpful in understanding the White House Office of Management and Budget. Deep gratitude must also be extended to those in government who provided valuable assistance and insight. These individuals are career government professionals who are dedicated to the principle of maintaining an informed citizenry in a democratic society. Recognition must also be given to the staff of People For the American Way. Especially important contributions resulted from the foresight and guidance of Melanne Verveer, the editing of Nancy Stella, the invaluable and artful work of Jill Craig in producing this report, the technical editing of Timmy Napolitano and Nadine Wesoski, and the assistance of Maria Pica. People For the American Way is most grateful for the generous support it has received from the Field Foundation, the Benton Foundation, and the Deer Creek Foundation. It is also essential to acknowledge several other public interest organizations. Many of these groups have pioneered the territory of excessive government secrecy and have worked to make our government more accountable and responsive. In many cases, the public education goals of People For the American Way pursued with this report has been made possible by the efforts and achievements of these organizations: Access Reports, Advocacy Institute, American Association for the Advancement of Science, American Civil Liberties Union, American Library Association, American Newspaper Publishers Association, American Society of Newspaper Editors, Center for Defense Information, Center for Investigative Reporting, Inc., Common Cause, Constitutional Research Institute, Data Center, FOIA Inc., Government Accountability Project, National Academy of Sciences, National Newspaper Association, National Security Archives, OMB Watch, Project for Military Procurement, Public Citizen, Reporters Committee for a Free Press, Society for Professional Journalists. Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90G01353R002000030039-9 Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 Table of Contents PREFACE by Arthur Schlesinger, Jr. . . . . . . . . . . . . . . . . . . . . . . . . . . . i FOREWORD by John H. Buchanan, Jr.. . . . . . EXECUTIVE SUMMARY . ............ . ... .. .. .. . .. . . . . v 1. OPENING OUR EYES TO SECRECY .. . ... ... .. .. . . . .. . . .1 Superpower Secrecy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 Secrecy Unchecked . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 2. THE PRESIDENT'S "SECRET LAWS" .....................5 "National Security" Can Be Used To Hide National Policymaking . . . . . . . . . . . . . 6 Secrecy Promotes Fugitive Policy Making . . . . . . . . . . . . . . . . . . . . . . . . 7 Secrecy Defeats The Checks and Balances System . . . . . . . . . . . . . . . . . . . 10 Secrecy Defeats Accountability . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11 3. "NATIONAL SECURITY" : PASSWORD FOR SECRECY. . . . . .. . . 13 Classifying Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14 Above Top Secret? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22 Classified Spending: The "Black Budget" . . . . . . . . . . . . . . . . . . . . . . . . 24 4. GOVERNMENT EMPLOYEES: SWORN TO SECRECY . .. .. .. . . 27 Executive Branch Controls . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27 Nondisclosure Agreements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28 Prepublication Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31 5. R E S T R I C T I N G S C I E N T I F I C AND A C A D E M I C FREEDOM . . . . . . . 35 Science and Technology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35 Controls on Campus: Academic Freedom . . . . . . . . . . . . . . . . . . . . . . . 42 6. STOPPING THE PRESSES ........ .... . .. .. ... .. .. . . . 47 Grenada, Spies, and Libya . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48 Distrust and Disclosure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49 7. CITIZEN ACCESS: THE FREEDOM OF INFORMATION ACT.. .. . 51 What the Freedom of Information Act Does . . . . . . . . . . . . . . . . . . . . . . 51 How the Freedom of Information Act Benefits Society . . . . . . . . . . . . . . . . . 52 The Reagan Administration "Onslaught" Against the FOIA . . . . . . . . . . . . . . . 54 The Future of the Freedom of Information Act . . . . . . . . . . . . . . . . . . . . 58 Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 8. POLICY POWERHOUSE: THE OFFICE OF MANAGEMENT ..... 59 AND BUDGET OMB Control of Government Information . . . . . . . . . . . . . . . . . . . . . . 60 OMB Control of Government Regulations . . . . . . . . . . . . . . . . . . . . . . . 65 CONCLUSION AND RECOMMENDATIONS .... ... .. . .. . .. . . 73 Recommendations for Candidates for President . . . . . . . . . . . . . . . . . . . . 74 Recommendations for the United States Congress . . . . . . . . . . . . . . . . . . . 78 NOTES ........................................83 APPENDICES ....................................105 A. National Security Decision Directives B. National Security Decision Directive 159, "Covert Action Policy Approval and Coordination Procedures" C. Classified Information Nondisclosure Agreement (Standard Form 189) D. Prepublication Review Agreement (Form 4193) Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90G01353R002000030039-9 Preface By Arthur Schlesinger, Jr. Secrecy is the bane of democracy because it is the enemy of accountability. The framers of the American Constitution designed a system of government intended to bring power and accountability into balance. The secrecy system, as it has been nurtured by the executive branch over the last forty years and with special zeal over the last seven years, is the indispensable ally and instrument of the Imperial Presidency. Now no one can question the right of the state to keep certain things secret. Weapons technology and deployment, diplomatic negotiations, intelligence methods and sources, military contingency plans are among the areas where secrecy is entirely defensible. Secrecy is defensible too in certain domestic areas: personal data given the government on the presumption it would be kept confidential -- tax returns, personnel investigations and the like; and official decisions that, if prematurely disclosed, would lead to speculation in land or commodities, preemptive buying, higher governmental costs and private enrichment. But the contemporary state has extended the secrecy system far beyond its legitimate bounds. In doing so, the target is far less to prevent the disclosure of information to enemy governments than to prevent the disclosure of information to the American Congress, press and people. For governments have discovered that secrecy is a source of power and an efficient way of covering up the embarrassments, blunders, follies and crimes of the ruling regime. When governments claim that a broad secrecy mandate is essential to protect national security, they mostly mean that it is essential to protect the political interests of the administration. The harm to national security through breaches of secrecy is always exaggerated. The secrecy system has been breached since the beginning of the republic -- from the day in 1795 when Senator Mason of Virginia enraged President Washington by giving the secret text of Jay's Treaty to the Philadelphia Aurora, or the day in 1844 when Senator Tappan of Ohio enraged President Tyler by giving the secret text of the treaty annexing Texas to the New York Evening Post. No one has ever demonstrated that such leaks, or the publication of the Pentagon Papers either, harmed national security. No one can doubt that these disclosures benefited the democratic process. The republic has survived great crises -- the War of 1812, the Civil War, the First and Second World War -- without erecting the suffocating structure of secrecy the Reagan administration proposes today. One wonders what greater crisis justifies the extreme measures taken and contemplated by the Reagan administration since 1981. The consequences for American democracy of the cult of secrecy may be dire. For the secrecy system not only safegaurds the executive branch from accountability for its Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90G01353R002000030039-9 Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 incompetence and its venality. Worse, it emboldens the state to undertake rash and mindless adventures, as the Iran-contra scandal sadly reminds us. "Though secrecy in diplomacy is occasionally unavoidable," wrote James Bryce, who was not only an acute student of comparative government but also a distinguished diplomat, "it has its perils .... Publicity may cause some losses, but may avert some misfortunes."' Perhaps President Reagan will one day regret that the press had not exposed his secret intentions toward Iran in time to block his ill-considered policy, as President Kennedy regretted that the New York limes had not played up its story on the exile invasion of Cuba. "If you had printed more about the operation," he told a limes editor, "you would have saved us from a colossal mistake." Because the secrecy system is controlled by those on whom it bestows prestige and protection, it has long since overridden its legitimate objectives. The religion of secrecy has become an all-purpose means by which the American Presidency seeks to dissemble its purposes, bury its mistakes, manipulate its citizens and maximize its power. This People For the American Way report by Steven L. Katz is a meticulous and dispassionate account of the growth and widening reach of the secrecy system and of the danger it poses to American democracy. It is not too late for Congress to bring the secrecy system under control and redress the balance between presidential power and presidential accountability. The issue is hardly new. "Executive secrecy," John Taylor of Caroline, the philosopher of Jeffersonian democracy, wrote in 1814, "is one of the monarchial customs, plausibly defended, and certainly fatal to republican government ... How can national self government exist without a knowledge of national affairs? or how can legislatures be wise or independent, who legislate in the dark upon the recommendation of one man?" December 1987 New York Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90G01353R002000030039-9 GOVERNMENT SECRECY: DECISIONS WITHOUT DEMOCRACY Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90G01353R002000030039-9 Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 Foreword By John H. Buchanan, Jr. Chairman, People For the American Way During 1987, Americans celebrated the 200th anniversary of a system of government where "we the people" rule. From our nation's founding, we have understood that an informed citizenry is essential to a democracy. Only an informed citizenry can debate public issues, hold elected officials accountable for their actions, and offer meaningful consent to the actions of their government. Over the years, Americans have supported the principle of a free flow of information and ideas. During my own years in Congress, we enacted the Freedom of Information Act, which both symbolizes and protects the people's right to know what their government is doing in their name, In recent years, however, a curtain of secrecy has fallen over many activities of our government. For many of us, the Iran-contra scandal was a rude awakening as we learned of secret actions by a shadow government operating from the White House basement. But the headlines of 1987 are just a small part of the larger story of the growth of excessive government secrecy -- secrecy that denies Americans the information we need about our government and our entire society. In this report, People For the American Way tells the story of the institutionalization of secrecy throughout the federal government. This is the story of unprecedented controls on information: not only on defense and foreign policy issues where legitimate secrets do need to be protected but on a host of topics vital to our daily lives, from toxic wastes to occupational hazards, from new technology to the health of our children. The report warns that excessive secrecy could become a permanent part of our government -- unless the people take notice and their elected officials take action. And this report offers an action agenda to reverse the institutionalization of secrecy and restore the American tradition of open government. Most importantly, this report makes clear that the American people are being denied the information we need to participate in our political system and to hold our elected officials accountable for their actions. Instead of the free and open debate that is the essence of the American way, our system is increasingly characterized by "decisions without democracy": actions taken unilaterally by the Executive Branch and kept secret from Congress, the news media, and, ultimately, from the people. Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90G01353R002000030039-9 iv FOREWORD I sincerely believe that a citizenry better informed about the decisions of government is essential to the preservation and strengthening of our democratic values and our constitutional system. Only as informed citizens are we empowered to assume our rightful role as the masters, not the servants, of government. December 1987 Washington, D.C. Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90G01353R002000030039-9 Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 Executive Summary Government secrecy affects the lives of all Americans. In today's complex world, what we don't know can hurt us. The importance of secrecy to the security of our nation is undeniable; however, excessive government secrecy is a serious national problem. Indeed, it has been expanded without regard to constitutional protections and has been used to restrict and circumvent the very laws that Congress passed to promote an informed citizenry and a responsive government. The result, increasingly, is a government shaping our society and our lives through decisions without democracy. This report demonstrates that government secrecy involves the unlimited executive authority to control resources and activities both inside and outside the government. Such authority is unilaterally exercised to control governmental and social institutions upon which we depend. Excessive secrecy is not a victimless practice; it affects individuals and the future of our democratic institutions. The Iran-contra scandal enabled Americans to see that the arrangements created at the highest level of government in pursuit of "national security" have consequences for our republic. The president secretly authorized arms sales to Iran that violated our nation's laws and foreign policy -- and contradicted the president's public pledge not to make deals with terrorists. Most disturbing is the fact that official U.S. policy was apparently created and implemented without the president's knowledge. These events, however, were born from a secrecy system that is well established, virtually unchallenged by Congress, and given considerable deference by the courts. The years 1981-1987 stand as the most recent chapter in the development of secrecy which provides the executive branch with more power and less accountability than any other branch of government. The National Security Council, which quietly marked its 40th anniversary in 1987, has been extensively utilized by President Reagan to issue more than 200 "secret laws" on national policy matters. Congress has virtually no knowledge of the issuance of any of the orders. Even in the case of pertinent national security matters, the appropriate committees of Congress are not informed. These have included orders that: in 1981 first sent funds for covert training of Nicaraguan rebels to Argentina; in 1983 authorized Central Intelligence Agency (CIA) training and support of secret counter terrorist squads in the Middle East for the purpose of "preemptive strikes;" in 1985 authorized agencies other than the CIA, such as the National Security Council, to engage in covert operations; and in 1986 authorized the Libyan "disinformation" campaign. In achieving our nation's greatest military build-up during peacetime, the Reagan administration has shrouded much of the expansion, and many of the problems, in secrecy. In what is known as the Pentagon's "black budget," highly classified spending for secret weapons programs has increased from $5 billion in 1981 to at least $22 billion Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90G01353R002000030039-9 vi GOVERNMENT SECRECY: DECISIONS WITHOUT DEMOCRACY for 1988. Congress has been almost powerless to stop the expansion of secret spending even though increasing evidence points to waste of taxpayers' dollars through mismanagement, fraud, and abuse. The growth of secrecy can be traced to the exercise of virtually unilateral presidential power in such areas as information classification, when, for example, documents are stamped "Top Secret" or restrictions such as secrecy contracts are imposed on government employees. Since 1981 the already overloaded classification system has grown by almost two million new 'documents annually. This increase reverses the 30-year trend toward narrowing the classification criteria and systematizing declassification. The president has also taken unprecedented action authorizing "reclassification" of publicly released documents. Government officials have demanded the return of materials from individuals, libraries, and other institutions around the country. While information classification is essential for protecting vital secrets, overclassification overloads the system and defeats the effectiveness and integrity of such protection. The Reagan administration's obsession with secrecy has also led to mandatory secrecy contracts for millions of government employees, many of whom have no access to classified information. Hundreds of thousands of others, including Cabinet officials, are subject to lifetime censorship agreements requiring government review of any writings or speeches even after they have stopped working for the government. These requirements infringe upon First Amendment rights, allow government officials to censor embarrassing or dissenting views, filter and narrow public debate, and prevent government and the people from learning from past mistakes. The expansion of these restrictions, in some cases unprecedented even during the most xenophobic periods in American history, has created a bureaucracy of secrecy that threatens to isolate the government from the governed. While secrecy is often a shapeless force, its pervasiveness has become disturbingly clear in the growing gap between authority and accountability. Whether the subject has been information policy in general or specific regulatory issues about health and safety, the White House Office of Management and Budget (OMB) has become the Reagan administration's policy power base. OMB has instituted policies which increase secrecy and has conducted its own activities in secret. The opening for such activity came as the result of a law passed by Congress to decrease wasteful paperwork volume in government, but President Reagan used OMB's powers under the act in ways beyond the boundaries set by Congress. President Reagan granted OMB unprecedented authority to control the content and the volume of all government publications, to set the information collection policies of all federal agencies, and to rewrite almost all federal regulations and studies. The enormous role that OMB has been given in government between 1981 and 1987 is evidenced by the application of OMB's authority to oversee activities affecting Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90G01353R002000030039-9 Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 the daily lives of Americans. By 1986 a White House report showed that OMB was reviewing and rewriting a diverse range of regulations in areas in which it had no expertise. These included civil rights, mental retardation, and cancer risks. For three years, OMB delayed plans of the Department of Health and Human Services to place warning labels on aspirin about the fatal link between aspirin and Reye Syndrome, a life threatening condition following influenza and chicken-pox in children. Government and private medical experts concluded that 30 percent of 1,200 cases of Reye Syndrome reported annually were fatal. OMB officials responded instead to aspirin manufacturers, with whom they had met privately, who feared commercial loss if warning labels became required. OMB's review of federal studies of occupational illness have also perpetuated health risks to citizens. Reports of birth defects and miscarriages associated with the use of video display terminals (VDTs) on computers by women led a federal agency to propose the first major scientific research project to examine this health issue. Approximately 10 million American women sit at VDTs every day. OMB thwarted the planned study, substituting a modified version submitted by industry representatives that omitted many of the questions essential to measuring the relationship of stress at work and problems of fertility. No one is surprised to learn that government is powerful. However, it is disturbing to discover that the exercise of so much power is characterized by secrecy. OMB bypasses federal laws specifically enacted to provide citizens with knowledge of and access to government decision-making. While positioned close to the president, OMB operates from deep within an already inaccessible bureaucracy. Just as in other improper uses of government secrecy, OMB has avoided accountability and undercut the checks and balances of our constitutional system. It has made decisions without democratic input and has protected private interests, often negotiating behind closed doors. The bureaucracy of secrecy has made citizens the lowest priority of those who "need to know." When information is not disclosed to the public, however, our government has failed to exercise its best means of maintaining the public trust. Since 1981 the government has imposed unprecedented restrictions on information. Through attacks on the Freedom of Information Act, controls on the media, and interference with scientific and academic freedom, the government has sharply limited the free flow of information in our society. The Freedom of Information Act, the only right to government information that the public can enforce in court, has enabled Americans to live safer and healthier lives and to govern themselves more economically and efficiently. Nonetheless, that law has been subject to administration attacks between 1981 and 1987. For example, the administration has increased the ability of the defense establishment and law enforcement agencies to deny access to records. Recently, President Reagan announced he would soon try to limit access to scientific information. Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90G01353R002000030039-9 The Reagan administration has repeatedly pressured the news media to either alter or kill certain articles, even when the information had been previously published. The CIA has threatened to prosecute major newspapers and magazines for espionage. The FBI has told former government employees that they should not publish newspaper articles commenting on current events. The potential for creating the equivalent of an "Official Secrets Act" in the United States has been greatly increased by these actions and may result from the prosecution of government employees who unlawfully disclose information -- not to foreign powers or their agents but simply to the press. In Grenada, the press was kept off the battlefield, and the public was forced to rely on official Defense Department accounts. The public was manipulated by a "disinformation" campaign aimed at derailing Libya's President Gadhafi. Outside the walls of government, secrecy has become the catchword to cover many activities well beyond anything understood as "national security." There has been an increasing trend toward controlling information that does not originate with the government, but rather in the academic and scientific communities. Government censorship agreements have been imposed on certain scientists and university professors as part of the procedure in awarding federal grants. Military authority has been extended by President Reagan to control access to unclassified computerized information belonging to corporations, universities, and private libraries. Officials from several agencies have forced private scientific conferences to exclude foreigners and stopped the presentation of hundreds of papers on scientific subjects. In each instance the information at issue was neither classified nor government property. At universities and colleges across the country, government controls restrict teachers and students from exercising academic freedom and threaten to hinder intellectual inquiry. The government has asked universities to conduct surveillance of foreign students at U.S. colleges and universities regarding their course work and use of library materials, laboratory equipment and computers. In some cases, it has restricted college course enrollment to "U.S. citizens only," denied immigration visas to foreigners coming to study or teach, and sought deportation of tenured professors. It is incumbent upon a democratic government to maintain policies permitting broad citizen access to information and wide dissemination of information. The public also has a responsibility to demand that government fulfill these democratic ideals. The urgency, however, should be addressed by the president, Congress and government officials. Those in government who are in the best position to make changes must deepen their commitment and seek to make our system more accountable and more responsive. Respect for the law must be reinstituted as the highest of priorities. The executive branch must work closely with Congress to improve procedures and safeguards concerning the creation, notification, and accountability of covert activities. A thorough review must be conducted of secrecy measures and presidential power, from "national security" to Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90G01353R002000030039-9 Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90G01353R002000030039-9 decision-making affecting health and safety -- from the CIA to OMB. Present policies for secrecy contracts for federal workers, government censorship, overclassification of information, interference in our nation's libraries and universities, and much more must be reversed. Practical considerations such as improving information classification management and accountability of government, especially in an electronic information age, must be immediately addressed. These and many other specific recommendations are presented and addressed to presidential candidates and members of Congress. Lastly, all citizens must continue to utilize the laws and processes available to become well-informed about government activities and to participate in the democratic process. U.S. Supreme Court Justice Oliver Wendell Holmes stated that majorities are prone to "sweep away all opposition." Governments strongly prefer acquiescence to dissent, but the test of democracy is not the ability of government to arrogate power to itself. Secrecy poses many questions for the people of the United States, the most important of which is whether Americans will acknowledge the demands of maintaining a democracy. Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90G01353R002000030039-9 Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 Chapter 1 Opening Our Eyes To Secrecy Government secrecy in the United States requires the special attention of all Americans. It is a subject we have come to know best in moments of national crisis: official secrecy too often displaces important constitutional protections and democratic values. When major decisions and actions are shrouded in secrecy they can profoundly affect the character and stability of our government as well as the quality of our lives. Nonetheless, we are both unprepared and surprised when our government is made to account in the sunlight for questionable activities it has conducted in the dark. The manner in which Americans experience secrecy reflects how little we know about its purpose and effect. An American pilot is shot down over the jungles of Central America -- we discover a clandestine White House operation in Nicaragua. An Iranian arms dealer becomes angry -- we learn of a secret White House arms deal with Iranian terrorists. During the Iran-contra hearings which followed, we learned that the director of the Central Intelligence Agency (CIA) was planning to create a secret government within the government -- described by Oliver North as an "off-the-shelf, self-sustaining, stand-alone entity that could perform certain activities on behalf of the United States."1 The truth is that official secrecy is not best, or solely, understood in terms of misdeeds on a grand scale. Forced to consume large doses of small facts, we learn very little about the underlying potential in our government for such problems that are likely to reoccur. Secrecy is a fact of government. It is a normal practice; however, it can be applied for both legitimate and wrongful purposes. While it would be unrealistic to deny the importance of secrecy to the security of the nation, excessive secrecy undercuts our democracy and may be used to violate the procedures and rights guaranteed by the Constitution. National security is not very well served when official secrecy is used to exclude top advisers or to cover up questionable activities, thwart the checks and balances system of government, avoid accountability and permit waste and abuse, hinder Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90G01353R002000030039-9 scientific and technological progress, suppress intellectual and academic freedom, and restrict public debate. Why should Americans want to know more about government secrecy? In our nation, citizens are the governors and the governed. It is our responsibility to understand government, and to the extent that secrecy is a factor or an obstacle in that process, we need to be informed. Citizens need to know about the authorization and application of secrecy as well as ways of detecting and preventing its misuse. In celebrating the Bicentennial of the Constitution in 1987, we are especially mindful of the ideas important to the earliest champions of American democracy. James Madison once poignantly declared: A popular Government without popular information, or the means of acquiring it, is but a Prologue to a Farce or a Tragedy; or perhaps both. Knowledge will forever govern ignorance: And a people who mean to be their own Governors, must arm themselves with the power which knowledge gives .2 SUPERPOWER SECRECY In the aftermath of World War II, the atomic bomb became the "winning weapon." It was the means to becoming a superpower and the greatest object of secrecy in government. Congress placed military and civilian agencies in charge of its development, while its use was determined largely by the president. The superpower presidency was thus inaugurated; nuclear politics permanently fused together "national security" and the traditional foreign policy and defense authority of the president. Full realization of this power required new institutions and operational arrangements. The political climate foreshadowed the Cold War -- secrecy was preeminent. Not unlike the effect of an atomic blast, the federal landscape was permanently altered. The strong executive branch that emerged forty years ago established the modern institutions and systems of government secrecy in America. These include the protection of new technology and resources through the Atomic Energy Commission and the Invention Secrecy Act; executive branch administration of defense and national security through the Department of Defense, the National Security Council, and the information classification system; intelligence, counterintelligence, surveillance, and covert operations through the Central Intelligence Agency and the National Security Agency.3 Americans may be familiar with one or more of these components of secrecy in our government. Most, however, remain unaware that a bureaucracy of secrecy exists, wields enormous power and produces decisions without democracy. Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90G01353R002000030039-9 Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90G01353R002000030039-9 SECRECY UNCHECKED The secrecy system has expanded rapidly within four decades. There has been little challenge from Congress, considerable deference by the courts, and almost no awareness by citizens. Each of the three co-equal branches of government engages in some type of secrecy, but not with equal scale, scope, or authority. In our courts, documents can be sealed but only by judges. Trials are presumptively open to public observation. In Congress, "executive sessions" are closed to the public, and secret government documents are received in such meetings -- but only senators and representatives may authorize these closed gatherings to occur. In the executive branch, the president authorizes thousands of federal employees to create millions of secret documents; billions of dollars are put into a "classified" budget and are approved with little detailed review by the entire Congress or citizens. The president's Office of Management and Budget, which has control of federal regulations, studies, and statistics, has reduced access to government information and ignores federal laws requiring public notice of decision making. The Iran-contra scandal has been the most recent cause of national crisis for Americans, and we are especially mindful that secrecy has provided the executive branch with more power and less accountability than any other branch of government. The president can secretly pursue policies which the public might not support if asked. These bypass Congress and the citizenry and bypass our constitutional system. Conducting a "secret war" in Central America illustrates this problem. Three months after President Reagan first entered office in 1981, he authorized the CIA to conduct covert activities in Nicaragua .4 Several months later, the president authorized secret training of Nicaraguan rebels in Argentina. The training was funded by millions of dollars in U.S. support .5 Public knowledge of these policies might have prevented the Iran-contra scandal. Noted historian Garry Wills, writing in 1987 in honor of the Bicentennial of the Constitution, wrote that: The wartime justification of secrecy used to be: the citizens must be kept in the dark to keep the enemy from knowing what one's country is doing and taking action on that knowledge. The modern presidency takes the old means and makes it the end: the citizens are kept in the dark about what the enemy already knows .6 What purposes justify secrecy? How much information should be kept secret? How long should it be kept secret? When does secrecy undercut democracy? When does secrecy violate constitutional guarantees? Americans have the right to ask these questions, and have a need to know the answers! Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90G01353R002000030039-9 Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 The value of an informed citizenry cannot be overemphasized in a democratic society. As Thomas Jefferson reminded us: I know of no safe depository of the ultimate powers of society, but the people themselves; and if we think them not enlightened enough to exercise their control with a wholesome discretion, the remedy is not to take it away from them, but to inform their discretion by education.' Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90G01353R002000030039-9 Chapter 2 The President's "Secret Laws" A window through which to view the problems of excessive secrecy is the series of directives termed the president's "secret laws" by Rep. Jack Brooks (D-TX), Chairman of the House Government Operations Committee. The concept of a "secret law" in America conflicts with every basic notion of democracy under the Constitution, and yet such laws exist. They are created by the president as national security directives and have been issued through the National Security Council (NSC) by each president since President Truman.' In 1976, a special Senate committee studying presidential power concluded: In recent years, the National Security Action Memorandums of Presidents Kennedy and Johnson and the National Security Action Directives of President Nixon represent a new method for promulgating decisions, in areas of gravest importance. Such decisions are not specifically required by law to be published in any register, even in a classified form; none have prescribed formats or procedures; none of these vital Executive decisions are revealed to Congress or the public except under irregular, arbitrary, or accidental circumstances.2 President Reagan has designated these "national security decision directives," (NSDDs). He has used NSDDs to authorize an array of activities which included the Libyan disinformation campaign3 and the use of Presidential Findings by agencies other than the Central Intelligence Agency (CIA), such as the NSC, to conduct covert operations.4 In 1987, the public learned that in 1983 President Reagan had authorized, through an NSDD, CIA training and support of secret counter terrorist squads in the Middle East to be used for "preemptive strikes "5 Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90G01353R002000030039-9 Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 As of June 24, 1987, President Reagan had signed and issued at least 280 NSDDs [Appendix A]. Today, as in years before, Congress remains uninformed about the issuance and content of these directives. No complete list of them is publicly available because the National Security Council claims that such a list of the president's NSDDs is classified. One public requester seeking unclassified information about an NSDD received the following response from the National Security Council: "The NSC has no publications program and, most of the information in our files is classified and, therefore unavailable to the public."6 These directives illustrate some of the problems which exist on a much wider scale in the government secrecy system. "NATIONAL SECURITY" CAN BE USED TO HIDE NATIONAL POLICYMAKING "National security" can be invoked to shroud many decisions concerning United States policy and activity, hiding these from congressional and public view. In this regard, President Reagan defined the NSDDs which he issues through the National Security Council: This series shall be used to promulgate Presidential decisions implementing national policy and objectives in all areas involving national security.7 Indeed, NSDDs issued by President Reagan involve a variety of national policies for which responsibility is shared by Congress and which affect various existing statutes. An examination of approximately 50 NSDDs reveals their application to many national policies: civil defense, world economic summits, telecommunications, commercial satellites and space vehicles, resettlement of Indochinese refu8gees in the United States, production and handling of nuclear materials, and terrorism. Other NSDDs issued by President Reagan have involved measures affecting millions of the nation's civil servants and have been viewed as both extreme and unconstitutional approaches to government. These have included, for example, NSDDs requiring government employees to sign secrecy contracts, agree to lifetime government censorship of any writing they seek to publish, and to undergo periodic lie-detector tests .9 NSDDs that involve the United States militarily in other countries are especially worthy of scrutiny. They demonstrate unaccountable use of presidential power and potentially damaging consequences for the nation. By secretly engaging our nation in military activity, the president jeopardizes the essential support of Congress and the American public. Recent examples include U.S. operations in Nicaragua and the surrounding region and military preparations for the invasion of Grenada. In July 1983, President Reagan issued NSDD 100, "Enhanced U.S. Military Activity and Assistance for the Central American Region." The president achieved three military goals with NSDD 100: U.S. military activity in Nicaragua, military training in El Salvador, and placing U.S. forces in the Caribbean three months before the October 1983 invasion Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 of Grenada. In addition, the president required that the Secretary of Defense and the Secretary of State, without revealing the secret law or fully disclosing the administration's plans, persuade Congress and the public to support the administration's actions. President Reagan stated in NSDD 100: The increasing threat to U.S. national interests in Central America requires that we strengthen our diplomatic and security efforts in the region. The consolidation of a Marxist-Leninist regime in Nicaragua, committed to the export of violence and totalitarianism, poses a significant risk to the stability of Central America. Our ability to support democratic states in the region, and those on the path to democracy, must be visibly demonstrated by our military forces. A program of expanded U.S. military activities and exercises both in the Caribbean Basin and on the Pacific coast of Central America will commence as soon as possible. The Secretary of State and the Secretary of Defense will prepare a coordinated legislative, diplomatic, and public affairs strategy that supports these initiatives.10 The Iran-contra scandal reflects the serious consequences of secretly planned U.S. military involvement in which Congress and many government foreign policy professionals are kept ignorant of preparations. More importantly, it reveals the potential for secret development of U.S. foreign policy -- one perhaps contradicting and superseding publicly proclaimed policy. SECRECY PROMOTES FUGITIVE POLICYMAIGNG The problem worsens where such secret laws are fugitive instruments for policymaking, mobilizing executive branch personnel and federal resources in ways that conflict with national policy and may violate our laws. NSDDs that sustain covert activity abroad by the United States merit especially careful examination. While covert activity may be necessary in certain situations, it must be conducted in accordance with procedures for informing Congress and only as necessary to protect America's vital interests. The use of NSDDs for covert operations occurred very early in the Reagan administration, initiating what has been called the president's "secret war" in Nicaragua." In November 1981, President Reagan, in response to a proposal by CIA Director William Casey, issued NSDD 17 establishing a $19 million CIA covert operation in Nicaragua and authorizing the CIA to recruit a force of 500, to be supplemented by at least 1,000 Nicaraguan rebels being trained in Argentina.12 In 1987, reports indicated that NSDD 17 directed an estimated $50 million to Argentina to train Nicaraguan rebels.13 Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 ALTERED DOCUMENT Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90G01353R002000030039-9 THE PRESIDENT'S "SECRET LAWS" 9 The Iran-contra scandal demonstrated that covert operations are vulnerable to the abuse of authority, secret development of questionable American foreign policy, and misrepresentation of United States interests. Foremost among the instruments of secrecy authorizing these activities was a single NSDD issued by President Reagan. It contravened the president's own public policy on covert action, embodied in the president's executive order on covert action which explicitly limited "special activities" to the CIA.14 Nonethe- less, the National Security Council engaged in secret activities in the Middle East and Central America, and bypassed the required reporting of covert operations to Congress. National Security Decision Directive 159, entitled "Covert Action Policy Approval and Coordination Procedures" was issued by President Reagan on January 18, 1985 [Appendix B]. It has two important components. First, President Reagan authorized agencies other than the CIA, such as the National Security Council, to undertake covert operations by virtue of a Presidential Finding. A Finding is a document signed by the president, required by law, granting intelligence agencies permission to undertake specific covert operations. Findings are required by law specifically so that covert activities are accountable through the president. Second, President Reagan exempted a broad range of covert activities by agencies other than the CIA from being labelled covert action. This provision functions as an escape clause because it eliminates the need for a covert action Finding, and eliminates the requirements for reporting to Congress. Specifically, NSDD 159 was central to White House arms-for-hostages transactions with Iran, allowing the National Security Council to mount a covert operation and directing that it be excluded from the law requiring that it be reported to Congress. The arms sale to Iran was a radical departure from ongoing U.S. policy -- an arms embargo had been in effect since the Shah was deposed by the Ayatollah Khomeni. In fact, Secretary of Defense Weinberger and Secretary of State Schultz opposed the secret law. Secretary Weinberger stopped a June 1985 attempt to issue an NSDD establishing essentially the same plan. Nonetheless, the "Covert Action Finding Regarding Iran" was signed by the president, prompting shipment to Iran of 4000 TOW antitank missiles, spare parts for radar systems purchased by the Shah and other military equipment. The CIA played an integral role, serving as a conduit for three shipments of more than 2000 missiles in 1986.16 The new arms sale effort violated current prohibitions on such transactions set in U.S. foreign policy and the Arms Export Act.17 The second application of NSDD 159 for fugitive U.S. policymaking was its use by Oliver North and others who did not want their covert activity in Central America to be reported to Congress. North and others interpreted the president's directive to mean that a Presidential Finding was not required. North's interpretation was based on an escape clause in NSDD 159, in which President Reagan states: However, the provision of routine support in the form of personnel, funds, equipment, supplies, transportation, training, logistics, and facilities by Government components other than the CIA to support a covert action shall not in itself be considered a separate covert action by the supplying agency.18 Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90G01353R002000030039-9 Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 Essentially everything the NSC and its "enterprise" did in Nicaragua can be included in the above list of "routine support." Relying on the above provision in NSDD 159, the result, however, was that the NSC operation was not considered a covert operation, Congress was uninformed, and the NSC's secret war in Nicaragua continued. It was only at a later date that a veteran CIA official, accustomed to the use and intent of Presidential Findings for accountability of covert operations, required that one be obtained from President Reagan. During the Iran-contra hearings in the summer of 1987, former National Security Advisor John Poindexter claimed that he destroyed the only copy of the Finding ultimately obtained to authorize NSC operations in Central America. The NSC, however, continued to insist that it was not accountable. On July 13, 1987, the following exchange occurred between U.S. Senator George Mitchell (D-ME) and Oliver North: Senator Mitchell. Since the law requires that before any covert action could be conducted, the President must specifically authorize it, since you've testified that you conducted a covert operation, and since you've further testified that the President neither designated the National Security Council to conduct covert operations nor did he make a Finding authorizing this covert operation, what was the legal basis for your activities with respect to this covert operation? Oliver North: The National Security Council staff is not included within the constraints that are depicted in either the executive order [on covert operations] or the NSDD [159] as an intelligence agency. And thus, in neither case does the law provide that the president had to do what you are saying he had to do.18 SECRECY DEFEATS THE CHECKS AND BALANCES SYSTEM The secret laws reflect the extent to which the president and the executive branch exercise unreviewable authority and escape accountability. Regardless of the relationship of such directives to current policy, Congress has virtually no knowledge of their issuance; even in the case of pertinent national security matters, the appropriate committees of Congress are not informed. Even specific requests from Congress, seeking to fulfill its intelligence oversi ht responsibilities under the law, have been ignored by current and past administrations.9 These points were underscored at a 1987 hearing of the House Government Operations Subcommittee. The chairman of the Oversight and Evaluation Subcommittee of the House Select Committee on Intelligence, Congressman Anthony Beilenson (D-CA): What I have to say about NSDDs, as they are called, will be brief. It is based on an incomplete understanding of this form of Presidential decision. That is because the Permanent Select Committee on Intelligence does not receive copies of NSDDs.20 Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 SECRECY DEFEATS ACCOUNTABILITY The lack of congressional access to NSDDs creates special problems of accountability. Even when these laws are discovered and Congress, for example, calls for partial or complete revocation, the executive branch continues, undetected, to implement its original plans. The problem is put in perspective by the more conventional system of presidential proclamations and executive orders. These are issued according to a numerical accounting system and by law must be published in the Federal Register and reproduced in the Code of Federal Regulations 2' Furthermore, while confidential or classified executive orders have been issued and not published, they are accounted for in the numbering system. Congress, particularly its intelligence committees, has been granted access to these records. This system is particularly useful to ensure that executive orders that have been rescinded are in fact "off the books." 22 Two recent examples illustrate that the same is not true with the NSDDs. Even when the president has promised to rescind a particular NSDD program, there is no way to monitor such action. National Security Decision Directive 84. NSDD 84, "Safeguarding National Security Information," was issued by President Reagan in 1983 as a major policy initiative of the administration to stop unlawful disclosures of classified information by government employees. Its requirements include a secrecy contract for certain government employees, possibly every Cabinet official, pledging lifetime government censorship of all writings. The directive was publicly revealed as a Department of Justice memorandum. U.N. Ambassador Jeane Kirkpatrick refused to sign her lifetime censorship contract, which was presented to her by the State Department as she prepared to leave her U.N. post.23 Congress, government employees, and the public reacted negatively to the plan. On February 15, 1984, President Reagan agreed to suspend the lifetime censorship provision of NSDD 84 -- but the practice in fact widened. Unknown to Congress, the Reagan administration had already been using a censorship contract developed by the CIA 24 NSDD 84 had merely revised this contract and extended its application throughout the government. President Reagan interpreted suspension of the censorship portion of NSDD 84 in the narrowest possible terms: refrain from using the revised censorship contract. The president then continued a widespread program of censorship agreements using the original CIA contract. In September 1986, the General Accounting Office revealed several startling statistics resulting from a study that did not even include the Central Intelligence Agency or the National Security Agency: 11 agencies alone reported 290,000 government workers had been required to sign the lifetime censorship contract because of access to intelligence information, and the policy continued in numerous agencies ranging from the Agency for International Development to the Securities and Exchange Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 Commission.25 The practice has also been extended to hundreds of government contractors and university research scientists who have received federal grants. Thus, executive branch practice has been a far cry from rescinding the censorship program. Moreover, Congress could not hold the president to his word: NSDD 84 remains effectively intact today. National Security Decision Directive 145. NSDD 145, "National Policy on Telecommunications and Automated Information Systems Security," was issued by President Reagan in 1984 to govern the security of telecommunications and computerized information systems. It set unprecedented restrictions on access to computerized information that is not classified and is held not only by the federal government but also by private companies, libraries, and universities. Furthermore, the president gave the enforcement authority for the new policy to a highly secretive military entity -- the National Security Agency. Public awareness of this directive, a very technical subject area, occurred almost by accident: the resignation of former White House National Security Advisor John Poindexter for his role in the Iran-contra scandal. Although the directive was known to a small number of exceptionally well-informed citizens, public awareness of NSDD 145 heightened during the investigation of Poindexter's final days at the National Security Council. Among the orders and directives that drew attention was a Poindexter memorandum that was the Reagan administration's first attempt to implement NSDD 145.26 Congress, librarians, scientists, information companies, and concerned citizens reacted quickly and demanded withdrawal of the Poindexter memorandum. The reasons for concern were obvious: awesome reach beyond the government, its military authority, and questionable constitutionality. Congress also responded with legislation to address the legitimate needs for computer security, creating more reasonable controls and supplanting NSDD 145.27 In this case, the administration was eager to disassociate itself from Poindexter and withdrew the implementing memorandum on March 17, 1987. While NSDD 145 appears to be dormant, strong evidence exists that another implementing memorandum will be produced.28 National policymaking, fugitive policy instruments, and the lack of accountability for action authorized by the president are troubling qualities of National Security Decision Directives and presidential power. By using the National Security Council to create unreviewed policies, the president has ignored our constitutional system of separation of powers and checks and balances. However, the use of such directives and the propensity for excessive secrecy is an institutional problem. It is not unique to the Iran-contra affair or the Reagan administration, and it is not likely to disappear in 1988. Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90G01353R002000030039-9 NATIONAL SECURITY Chapter 3 "National Security": Password for Secrecy "National security" is a policy term that is frequently invoked, but rarely reduced to a set of discernible principles. The power of national security cannot be denied. However, it is a formidable justification to be overcome by citizens who demand greater government accountability and strive to engage in informed public debate. National security is a high-stakes concept when applied and produces losses equal in proportion to its accomplishments. In several misdirected White House policies, Americans have observed how often secrecy -- justified by "national security" -- isolates executive action from public scrutiny and from the exercise of good judgment. At his sentencing for perjury, former Nixon aide Egil Krogh, chief of the White House "plumbers" unit during Watergate, expressed these thoughts about burglarizing the office of Daniel Ellsberg's psychiatrist: I see now ... the effect that the term "national security" had on my judgment. The very words served to block critical analysis. It seemed at least presumptuous if not unpatriotic to inquire into just what the significance of national security was ... The discrediting of Dr. Ellsberg, which today strikes me as repulsive and an inconceivable national security goal, at the time would have appeared a means to diminish any influence he might have had in mobilizing opposition to the course of ending the Vietnam War that had been set by the President. Freedom of the President to pursue his planned course was the ultimate national security objective.1 A national journalist commented in 1987 that President Reagan has "cheapened the concept of national security" because an obsession with information security makes the president unable to distinguish between vital secrets and other information.2 If everything is made secret in the name of national security, the meaning and integrity of the concept is endangered. Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90G01353R002000030039-9 Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 We have seen this to be true in the use of National Security Decision Directives. Overall, the list of areas in which the current administration has aggressively used national security to justify excessive secrecy is regrettably a long one: ' Information classification and reclassification. ' Unprecedented classified defense and intelligence spending. ' Secrecy contracts and lifetime censorship of writings of some government employees. ' Controls on the press. ' Toughening of information access laws. s Restriction of access to non-government data banks. * Reducing of publication and dissemination of government information. ' Restricting of scientific and academic freedom. ' Ideological censorship of foreign visitors. CLASSIFYING INFORMATION Information classification is most familiar to Americans as the system used to stamp government information, documents, and records "Top Secret," "Secret," or "Confidential." It originated in the 1800s with our nation's military in order to safeguard such information as weapon designs, the layouts of installations, and the construction of ships. Since World War II, it has grown steadily as a instrument of the president and the executive branch for controlling information throughout the federal government. It has become the greatest means of achieving government secrecy in America. Information classification is technically an internal government system, created by executive order of the president, restricting access to information to federal employees with a "need to know." The practice and the consequences, however, are much broader. It includes layers of classification that some say are above "Top Secret," but which the government says are merely special clearances, not classifications. The classification system governs the length of time information remains secret and the extent to which persons within the government and the public have access. Statutes establishing parallel restrictions on information include the Atomic Energy Act, the National Security Act, and the Invention Secrecy Act. The National Security Act, for example, requires the Director of Central Intelligence to "protect intelligence sources and methods from unauthorized disclosure." It is the presidential security classification system, however, that is used to actually implement these statutory secrecy requirements. The staggering power of the classification system results from its basis in presidential authority and the scope of its widespread use throughout the executive branch and the federal government. Since 1981, for example, an average of 15 million Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 documents have been classified annually by at least 7000 government officials. This power is significantly reinforced by the inertia of Congress and the deference of the courts. Presidential authority for the creation and operation of the classification system began with a single defense statute but now rests more broadly on Article II of the Constitution. In 1940, President Franklin Roosevelt issued the first executive order setting classification policy. Reflecting earlier classification arrangements, it was a purely military policy, and Roosevelt claimed authority under a defense installations law. Truman followed suit in 1950.4 By 1951, the superpower presidency was emerging. President Truman looked to broader authority for classifying information -- "the authority vested in me by the Constitution and statutes, and as President of the United States."5 He cancelled all prior orders including his own and extended classification well beyond traditional defense matters to agencies throughout the federal government. Considered by many to be the high-water mark of classification breadth, Truman authorized almost every agency in the federal government to classify information. Following the precedents of authority and practice, almost every successive president since Truman has issued his own executive order on information classification.6 These too have transcended traditional military matters, extending into the realms of national security, defense, foreign policy, and law enforcement. They have for the most part, however, successively limited the criteria and discretionary power of the Truman order. From President Eisenhower through President Carter, however, new information classification orders reflected a trend toward limited classification and a system of integrity. Policies achieving these goals have included: * Narrowing the criteria for classification. * Reducing discretionary authority of government personnel for classification. s Reducing the volume of classification. s Creating schedules for systematic declassification. In the Pentagon Papers case, the Supreme Court had to determine whether President Nixon's control over information extended to stopping publication of classified documents in the New York Times. Justice Potter Stewart, in a concurring opinion, reminded Americans that: When everything is classified, then nothing is classified, and the system becomes one to be disregarded by the cynical or the careless, and to be manipulated by those intent on self-protection or self-promotion. I should suppose, in short, that the hallmark of a truly effective internal security system would be the maximum possible disclosure, recognizing Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 that secrecy can best be preserved only when credibility is truly maintained.? No existing classification policy has ever been perceived as a perfect one, especially by succeeding administrations. Even reformers who advanced the trend towards a policy more rational in scope and application may be faulted in some ways. However, the Reagan policy is widely viewed as reversing a desirable trend away from overclassification. It has marked a return to a classification policy of indefinite scope, unreviewable authority, and decreased accountability in the executive branch. President Reagan has increased the total volume of classification as much as 10% annually, a fact attributable to the president's classification policy and his enormous military build-up. Reversing a thirty-year trend, President Reagan has increased the criteria for classification; widened the discretionary authority of government personnel to classify information; de-emphasized declassification; and in an unprecedented action has authorized the government to reclassify documents previously released to the public. Increasing classification. Statistics are the beginning of the story. Classification during the Reagan administration has increased steadily on an annual basis .8 As stated by Congressman Glenn English (D-OK), Chairman of the House Government Information Subcommittee, "The history of classification policy for thirty years has been a history of continual circumscription of classification authority. This trend of narrowing classification authority was not broken until the promulgation of E.O. 12356 by President Ronald Reagan in 1982."9 Classified Government Documents 1979.1985 25 24 c E ^ U) U c 23 2 C)-? E ; ! O 18 E 17 Z 16 15 14 1981 1982 Year Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 Expanding classification criteria. Massive military build-up during the Reagan administration has been a major factor in the significant increases in classification, but another contributing factor has been the president's expansion of the criteria for classification. When President Reagan entered office, the prevailing classification policy had addressed the tendency toward overclassification, in part, by identifying specific categories of information subject to classification. Earlier orders simply based classification on the prospective damage that might result from disclosure. President Reagan added three new categories and modified an existing one. Widening discretionary authority for classification. President Reagan also widened the discretionary authority for classification. Under the executive order issued by President Carter, the policy had been -- when in doubt, don't classify.10 The Reagan order requires that when in doubt, do classify! 11 The emphasis on classification has allowed low-level officials to continually increase the volume of classified information. Although subject to higher review, the volume of documents becomes unmanageable, review is delayed, and overclassification results. De-emphasizing declassification. President Reagan also de-emphasized declassification, reversing a long-standing presidential policy. Since President Kennedy, each successive administration had maintained a system and schedule for automatically downgrading and declassifying information.12 Congressional hearings held prior to the issuance of the Reagan order revealed the particular importance of a declassification system, according to one scholar, to conducting reliable historical research: To understand the relationships between the individuals, institutions, and ideas which encompass political, diplomatic or military history, the historian needs not one document or even 10 documents, but an array of information from a broad spectrum of sources. Therefore, the ideal declassification process for historical research is the very kind of orderly declassification which this draft Executive Order will now eliminate.13 Despite these and other concerns, President Reagan eliminated existing declassification schedules, as well as the policy of systematic declassification and downgrading of information within federal agencies. In its place, the Reagan order limits "systematic" review to such departments as the National Archives, which has little control over information of timely importance in areas such as health, safety, or the environment.14 In addition, requirements for "mandatory review" leading to declassification are conditioned upon outside requests for information. Lastly, the mandatory review section exempts from declassification a wide range of "[i]nformation originated by a President, the White House Staff, by committees, commissions, or boards appointed by the President, or others specifically providing advice and counsel to a President or action on behalf of a President."15 Documents related to the mandate and work of the Tower Commission, created by President Reagan to probe the Iran-contra affair, are within this category. Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 Authorizing reclassification. President Reagan is the first president to authorize the reclassification of previously released information. Earlier orders included strict prohibitions against reclassification.16 The Reagan order permits reclassification of information that has been declassified and released to the public if it is determined in writing that (1) the information requires protection in the interest of national security and (2) the information "may reasonably be recovered."17 The order also places reclassification control within the purview of the Information Security Oversight Office (ISOO), which oversees implementation of the classification order on behalf of the executive branch. However, the ISOO has considered the reclassification statistics too low to report. Reclassification, however, is not merely a matter of degree or statistical significance. It reflects the power of the government, as well as the tension between national security and the First Amendment. The government argues that retrieval authority must exist where declassification mistakes have been made or, for example, where sudden shifts in international events may make information sensitive again. First Amendment specialists argue that the government has been given too much power to "plug history," restrict public debate, and arbitrarily recall documents to official secrecy status even though many persons outside of government may have already seen them. In 1981, the Reagan administration was already "rattling the saber" of reclassification before its new executive order became final. At that point, the Carter order, which expressly prohibited reclassification, was still in effect. Substituting power for law, the Justice Department demanded the return of declassified copies of documents it had released more than two years earlier to James Bamford, author of the first thorough profile of the highly secret National Security Agency.18 Pursuant to a Freedom of Information Act request, the Criminal Division of the Justice Department had supplied Bamford with a summary about whether the NSA or the CIA had violated criminal statutes in conducting certain types of electronic surveillance. The Justice Department could not yet legally reclassify the document and instead told Bamford that "the declassifier lacked the requisite authority under the Executive Order to effect the 'declassification.'"19 When Bamford cited the Carter executive order, prohibiting reclassification, as grounds for denying the Justice Department's reclassification demands, he was threatened with legal action, as well as a variety of other threats, if the information was ever published 20 Subsequently, however, the government vacated its retrieval effort but did secure materials at a private research center where Bamford had conducted research. In another case, the CIA attempted to reclassify material from a book written by former employee Ralph McGehee, a 25 year veteran of the agency. The information had appeared in other publications and had been subject to rigorous CIA review and subsequent approval in an earlier draft manuscript in 1980. The work was resubmitted because the author was rewriting and revising it for an interested publisher. The information included the identity of a publicly known CIA training facility in Virginia, Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 the size and training received by the author's CIA training class in the 1950s, and personnel procedures from that period.21 Later in 1981, the National Archives, in conjunction with the Department of the Air Force, attempted to retrieve declassified copies of Air Force records released to a researcher writing a book on U.S.-Israeli relations. Its approach was to request a "loan- back" of 47 pages for purposes of reproduction and record keeping. A second letter assured the researcher that the materials would be returned immediately, and he returned the documents. A month later, the National Archives claimed that declassification mistakes had been made, and proceeded to withhold 11 pages and delete liberally from 7 pages of the materials. The researcher threatened legal action against the Archives and, in the controversy that followed, the Archives admitted that it had misled the researcher. The materials were returned to him in their entirety.22 Since the Reagan order became effective in 1982, reclassification has been successfully enforced in the courts in the only court case to arise thus far. The National Security Agency pursued reclassification of material held in the library of a private educational institution. The library houses the private papers of several former federal officials once prominently involved in national defense. The NSA was specifically interested in a collection of papers on the subject of cryptology, or secret codes, donated by a former NSA employee who was a leading authority on the subject. The NSA had not only reviewed the documents for release, but also "provided for secure shipment of the collection to safeguard the materials and facilitate the in transit insurance arrangements."23 Some of the materials had been used by author James Bamford in his book The Puzzle Palace about the NSA. Unaccustomed to public attention and seeking greater control of cryptographic information, NSA personnel visited the library and demanded removal of 33 key documents from public availability. The NSA was challenged in court by a distinguished group of educational organizations led by the American Library Association, but the court deferred entirely to the NSA. Experts in the field believe that the court actually increased the government's reclassification power -- simply requiring it to assert a national security interest in a set of documents. However, the executive order contains a two-part standard for proper reclassification. In addition to the existence of a national security interest, the "information," and not merely particular documents, must be reasonably recoverable. 4 The court did not address this issue, and since the information appeared in thousands of copies of The Puzzle Palace, its reasonable recovery was unlikely. Reclassification is also believed to exist in another situation, when the government classifies documents and records that had been declassified or scheduled for declassification but not publicly released. The Information Security Oversight Office does not believe that this is reclassification. Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90G01353R002000030039-9 20 GOVERNMENT SECRECY: DECISIONS WITHOUT DEMOCRACY This view is not shared by others, including Congressman Glenn English (D-OK), Chairman of the House Government Information Subcommittee. Congressman English illustrates his point by citing a General Accounting Office (GAO) report he used in investigating drug smuggling. The GAO report had the following history: it was published in 1975, classified at the request of the Drug Enforcement Administration (DEA), and given an automatic declassification date of May 30, 1980. In 1982, however, after President Reagan created reclassification authority, "a request for a copy of the GA.O. report was made under the Freedom of Information Act. At the time of the request, D.E.A. reclassified the report and notified GA.O. in November 1982. GA.O., in turn, notified all recipients that the report was reclassified."25 Whether or not this is truly "reclassification" as specifically authorized by President Reagan, its frequent occurrence is made likely by two other provisions of the Reagan order: (1) elimination of a system for automatic downgrading and declassification and (2) increased authority for lower-level officials to classify documents after a FOIA request is received 26 Since the Information Security Oversight Office does not consider this to be reclassification, the extent of such activity has never been evaluated. Agency officials too often forget that government can best serve the public interest by keeping the people's trust and dispelling distrust by supplying the most current information available. These goals are undercut by unjustifiably increasing the volume of classified information and the duration of its protection. Overclassification is an inherent problem in the executive branch. On the one hand, management of government information is a massive task. On the other hand, essentially all authority to classify or declassify rests with the same officials. The responsibilities to both manage and control disclosure become confused, and the executive branch often tries to protect its own territory, place itself above accountability, and control information for political or other self-serving reasons. Overclassification has prevailed regardless of the reforms a president institutes to decrease unnecessary classification. President Carter, for example, expressly required: ? Balancing the public's interest in access to information against the need to classify for national security reasons;27 28 * Placing equal emphasis upon classification and declassification. Nonetheless, a 1979 study by the General Accounting Office29 reported the prevalence of overclassification at the largest classifying agency, the Department of Defense. GAO reported that: * Information not related to national security was classified. * Information was classified inconsistently. Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90G01353R002000030039-9 Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90G01353R002000030039-9 ? Information that lost some of its sensitivity was not downgraded. ? When there was a doubt about the level of classification, a higher level of classification was assigned. Action by the Reagan administration shows the unobstructed reach of the executive branch, and the interagency rivalries involved in controlling information. On April 29, 1986, senior administration officials, including the Director of the Arms Control and Disarmament Agency and an assistant secretary of defense, testified in a public Senate hearing about a hotly debated question: Are the Soviets violating two treaties that limit the size of underground nuclear explosions? The Reagan administration insisted that the Soviets were not "likely" in compliance. The Pentagon supported the administration's view, but the government's Arms Control Agency did not. Leading government laboratories found strong evidence that the Soviets were in compliance. The CIA determined that its previous estimates of Soviet nuclear tests were too high30 Shortly after the Senate hearings, the Pentagon contacted the Senate Armed Services Committee and indicated that portions of the public testimony, as well as certain questions by Senators, were classified. The Arms Control and Disarmament Agency, however, had sent the Senate committee a letter stating that no deletions were necessary on security grounds. When the Senate report was published in 1987, the challenged questions and answers were deleted. In addition, the Senate Foreign Relations Committee, which held hearings on the same subject, also bowed to Pentagon requests to modify the substance of testimony of senior military officials 31 Over the years, many recommendations to reduce overclassification and place controls on unchecked power have traveled through Congress and the executive branch. Reforms have been sought through new executive orders on classification 32 Particular concern has been raised over the fact that increased espionage may result from the unmanageable amounts of information that is classified 33 The urgency to address the overclassification problem remains, and the findings bear repeating. Classifying too much information: ' Causes excessive government secrecy. ' Obstructs public disclosure of government information and knowledge of government activity. ' Creates an unmanageable volume of information for effective security controls, efficient cost-management, and adequate declassification. ' Adversely effects decision-making by decreasing access to information within and between federal agencies. ' Jeopardizes the protection of information that truly warrants classification. ' Breeds mistrust between Congress and the administration, with the likelihood that claims of executive privilege will lead to a constitutional clash. Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90G01353R002000030039-9 Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 ABOVE TOP SECRET? Executive Orders since the one issued by President Eisenhower in 1953 have allowed only three classification levels: "Top Secret," "Secret," and "Confidential." However, secret classifications above "Top Secret" have also been thought to exist. Senior government officials have, over time, given credence to this belief. In 1968, for example, the Senate Foreign Relations Committee was investigating the 1964 alleged North Vietnamese attack on U.S. ships known as the Tonkin Gulf incident. Secretary of Defense Robert McNamara was testifying but declined to answer a question about radio intercepts.. His answer would have revealed that U.S. intelligence sources knew that North Vietnamese patrol boats were about to attack the U.S.S. Turner Joy. McNamara explained that he could not respond to the question because, "Clearance is above Top Secret for the particular information involved in this situation." One bewildered Senator then asked, "I thought Top Secret was Top Secret?"34 In the years since, the debate over what are today termed "special access programs" has heightened significantly. These terms refer to specialized codes and markings within the classification system. The government explains these as clearance and routing mechanisms for sending information rather than classification of information. At least since President Nixon, executive orders on classification have recognized the right to create "special departmental arrangements."35 President Reagan's executive order specifically recognizes "Special Access Programs" as part of the classification system 36 In earlier days, the government's use of special markings may have been better managed and more precise. For example, the State Department may have placed routing marks on an overseas cable sent to organizations such as NATO or to a particular allied nation. Even today, the system includes many specialized arrangements which range from simple routing marks to narrowly defined clearance codes for technical information. For example, a recent advertisement in the Washington Post for computer operators listed 37 clearances required for applicants: "TOP SECRET SI/TK-POLY-SCI a plus!" Today a multiplicity of code words are operative for an extensive number of special access programs and projects involving the "compartmentalization" of classified information. These are used extensively for national security and defense purposes, particularly for weapons systems research and development as well as for intelligence activities and covert operations. Defense analysts, members of Congress, and others have stated with increasing frequency that such secret classifications lead to abuses. Secret classifications defy oversight and accountability, permit waste and fraud, and allow for cover-up of unlawful activity. Evidence of these abuses has been discovered in projects ranging from defense spending38 to ille al government programs helping Nazi war criminals immigrate to the United States. More recently, special access arrangements were used for many communications related to the Iran-contra scandal. Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 There remains, however, great uncertainty as to the number and uses of the special access programs in the U.S. government. President Reagan has required all agency heads to "establish and maintain a system of accounting for special access programs." The president also grants "nondelegable access to all such accountings" to the director of the oversight office for information classification 40 However, this authority apparently has never been exercised, and no information has appeared about special access programs in the six annual reports prepared for President Reagan by the Information Security Oversight Office. Part of the problem is the breadth of institutional secrecy under President Reagan. Defense development and intelligence activities are the two major areas using special access programs. The Reagan order grants sole and complete authority for intelligence special access programs to the Director of Central Intelligence. As a result, in order for overseers to investigate those programs, the CIA Director must grant permission, and the auditors must survive the CIA's lengthy clearance process. The experience of the General Accounting Office (GAO) illustrates the problems associated with ensuring accountability. In 1987, the director of GAO's national security and international affairs division stated that he had about 12 auditors cleared for special access programs. In 1986, GAO had only "a small handful, two or three, maybe, and that was up from zero before that."41 Demands for more information about special access programs are met with arguments that too many auditors will make the information less secure. However, the estimated volume and evidence of abuse of such secret classifications has drawn attention to the subject. In 1987, a journalist investigating the subject of classified defense spending stated that he believed that at least 10,000 special access programs existed.42 In 1986, GAO conducted a study of the implementation of a presidential directive requiring lifetime censorship contracts for government employees whose work involves certain special access programs. GAO learned that 21 agencies, led by the departments of Defense, State, and Justice, maintained special access programs, and the report did not even include the CIA or the National Security Agency.43 Reflecting on the widespread use of special access programs, GAO also reported that hundreds of thousands of government employees must sign secrecy contracts because their work involves special access programs.44 Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90G01353R002000030039-9 CLASSIFIED SPENDING: TIE 'BLACK BUDGET' The widest application of special access programs, and a subject of much current scrutiny and controversy relates to secret or classified defense spending. Popularly called the "black budget," classified defense spending in the Reagan administration has increased from $5 billion in 1981, to at least $22 billion for 1988.45 One investigator who broadened cost factors to include classified sections of military operations and personnel budgets (e.g. the National Security Agency employs an estimated 50,000-60,000 employees, but these figures and the NSA budget are classified) produced a higher figure of $35 billion.46 The Stealth bomber, estimated to be the Pentagon's costliest weapon system in history, is one of the "black budget" items. The Pentagon's 1988 "black budget" proposed a list of 200 items 47 Addressing this issue, Senator Paul Simon (D-IL) pointed out: "When we realize that the 'black budget' for fiscal year 1988 equals one-third of the deficit reduction target we need to reach this year, then I hope we can also agree that change must occur in this critical area.?48 Classified spending is proposed by the Department of Defense in two categories: (1) project labels are given, but the costs are not revealed, and (2) projects are listed in code names, but the costs are revealed. The first situation is believed to account for $11 billion, one-half of the 1988 "black budget."49 Examples include the Air Force's Advanced Cruise Missile (ACM) and the Army's "Project Sierra." Illustrative of the second category are three Air Force listings that amount to $8.2 billion: "Special Programs," "Special Update Programs," and "Selected Activities." Another Air Force entry includes an anti- radiation missile, labeled "Tacit Rainbow," which conducts a search-and-destroy mission while airborne.50 The problems of accountability and oversight of the "black budget" result from a double-punch of classified spending and special access programs. For classified spending, Congress permits certain agencies to use "certificates" instead of conventional vouchers that show precisely how agencies spend their funds. As a result, the General Accounting Office cannot perform a full-scale audit even though billions of dollars are spent 51 In addition, the courts have been very protective of agencies such as the CIA that operate in almost total secrecy. Constitutional challenges have been waged to gain access to CIA classified finances for violating Article I, Section 9 of the Constitution which requires that a "regular Statement and Account of the Receipts and Expenditures of all public Money shall be published from time to time." Rejecting this argument, the Supreme Court in 1973 determined that citizens lack judicial standing to challenge classified spending, reasoning that relief is available through the electoral process.52 In 1977, a federal court determined that a single congressman also lacked standing to determine the use of public funds for illegal CIA activities.53 Improving accountability and oversight is an important responsibility of Congress. The "black budget" and the breadth of attendant special access programs has never been Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90G01353R002000030039-9 Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 as extensive as it is today, but Congress has not ventured very far toward reforms in these matters in past years. Today, however, an effort is beginning, and the evidence of a need for more scrutiny includes considerations of inefficiency, waste, and fraud. The defense industry is famous for delays and cost overruns, and observers fear that these problems run rampant in the "black budget" where virtually no checks and balances operate. One staunch defender of the Reagan military build-up, Senator Dan Quayle (R-IN) has argued unconvincingly that because of less oversight, "black programs are the most efficient programs we probably have "54 However, former Deputy Defense Secretary David Packard, the chairman of the president's Blue Ribbon Commission on Defense Management, stated the reverse: "The interesting thing we found is that not all of those programs are well managed, either. So our investigation didn't quite support the theory that if you classify a program, it's automatically managed better."55 Fraud is also a serious problem. In 1986, there were three criminal convictions involving research and development for the supersecret Stealth bomber. In one case, an engineer working for Northrup Corporation on the Stealth project was convicted of defrauding the contractor of $600,000. A congressional investigative subcommittee has predicted that it will uncover kickbacks involving "the theft of several millions of dollars over the course of four or five years."56 National security is not well served by overclassification of information, the lack of accountability of government officials or misuse of taxpayers dollars. Nonetheless, as a password for secrecy, national security has been used by the executive branch to perpetuate such harmful practices in our government. Congressional and public support are essential requirements for major U.S. policy and action, yet today Congress remains on the periphery, and citizens are given the lowest priority of those who "need to know." In the executive branch, the president is responsible, yet all too often remains unaccountable for excessive secrecy. The abuse of the concept of "national security" to justify anything the government wants to keep secret has fostered a bureaucracy of secrecy that threatens to isolate the government from the governed. Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 2. In accordance with Executive Order 12333, the Central Intelligence Agency shall conduct covert When the provision of essential to the conduct of a covert ac, ion that support S E C R E T Chapter 4 Government Employees: Sworn To Secrecy Since entering office in 1981, President Reagan has redefined federal information policy in terms of information security. In addition to issuing a restrictive information classification policy, a more visible and corollary policy has been to control the communications of government employees to the outside world. This has included major policy initiatives imposing secrecy agreements, lifetime prepublication review, controls on press contacts, and polygraph testing of employees. Crucial to the president's administrative regimen of controls has been the approval of an increasingly more conservative judiciary. In recent years, the constitutionality of executive branch measures has been upheld by the courts, further encouraging the expansion of government controls. EXECUTIVE BRANCH CONTROLS Information security is a legitimate concern in the management of vital secrets. It is an especially compelling issue at a time when information classification has been increasing significantly. It is, however, particularly discouraging to learn that more information is being locked up and more communication controls are being imposed on people experienced in government. Two of the strongest Reagan measures to control communication have been issued as National Security Decision Directives (NSDDs). These are NSDD 84, "Safeguarding National Security Information," issued on March 11, 1983, and NSDD 196, "Counterintelligence/Countermeasure Implementation Task Force," issued November 5, 1985. Federal workers at all levels of government, including Cabinet officers, are affected by these orders. National Security Decision Directive 84, designed to protect national security information, was released by the Justice Department shortly after it was signed by President Reagan.' In fact, NSDD 84 had been developed by an interagency team convened by Attorney General William French Smith at the request of the president's Assistant for National Security Affairs, William P. Clark. The group consisted of leading Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90G01353R002000030039-9 officials and legal authorities at the departments of Justice, Defense, the Treasury, and Energy as well as the Central Intelligence Agency.2 NSDD 84 imposed four new requirements: (1) All federal employees with access to classified information must sign a nondisclosure agreement, pledging never to disclose classified information to which they had access. (2) Federal employees whose work involves intelligence-related special access programs, "Sensitive Compartmented Information" (SCI), must sign a contract pledging lifetime prepublication review. (3) Federal agencies shall set rules for media contacts with agency personnel. (4) Federal agencies may require lie detector tests in investigations of unauthorized disclosures of information. The prepublication review provision attracted public attention when departing U.N. Ambassador Jeane Kirkpatrick refused to sign it. She was presented with the secrecy contract by State Department security officials. Kirkpatrick defended her refusal to sign the agreement, saying "it binds you not to write, not even from unclassified material that may have come to you in the course of your work in the State Department. It is an extraordinary document. You could never write after signing it."3 NSDD 196, also an unpublished directive, was issued by President Reagan in 1985. It sought to reduce espionage by requiring periodic lie detector tests of government employees and contractors. Those affected by NSDD 196 include agency employees, as well as cabinet officials whose work involves special access programs, particularly the Sensitive Compartmented Information access programs. It was Secretary of State George Shultz who first drew public attention to this order when he reacted by stating, "the minute in this government I am told that I am not trusted is the day that I leave."4 The following discussion focuses upon the nature and scope of secrecy agreements concerning nondisclosure of information and lifetime prepublication review. NONDISCLOSURE AGREEMENTS The nondisclosure agreements required by NSDD 84 demonstrate the unlimited breadth and power of government controls on communication in our society. The "Classified Information Nondisclosure Agreements (Standard Forms 189 and 189A)" [Appendix Cj apply to 3.5 to 4 million government employees and contractor employees whose work involves access to classified or "classifiable" information.5 When this requirement was first set, almost one-half the federal work force was estimated to have security clearances.6 Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90G01353R002000030039-9 Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 0987 E.R$+r-O Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90G01353R002000030039-9 The 1986 annual report to the president by the Information Security Oversight Office reported that 69 federal agencies have implemented the directive .7 The Air Force, for example, stated that 765,000 Air Force military and civilian officials had signed the nondisclosure agreement.8 The number of Pentagon employees who have signed the agreement is placed at 1.5 million .9 Another means of visualizing the application of the agreement is simply by calculating the number of federal employees and contractors with clearances for classified information. In 1986, the GAO determined from a study of 41 agencies, excluding the CIA and the National Security Agency, that "about 2.2 million federal and 1.4 million contract employees held security clearances at the end of 1985."10 The consequences of violating the terms of the nondisclosure pledge are indeed strong, even though its national security purpose is obvious enough to clearly emphasize compliance. However, the government states in the nondisclosure agreement and in related guidelinesil that its enforcement powers include: * Injunctive relief to prevent disclosure. s Penalties for security violations and revocation of security clearance. ? Administrative sanctions (including job transfer and firing), financial penalties, and "initiation of criminal prosecution against an individual, if approved by the Department of Justice." In 1987, members of Congress called upon President Reagan to withdraw the nondisclosure agreement, citing serious constitutional problems with the directive.12 First Amendment violations may result because the agreements restrain free speech, including an impermissible burden on the right to petition the government. Similarly, it is believed that the agreements conflict with so-called "whistle-blower" laws, which give government employees the right to cite "mismanagement, a gross waste of funds, an abuse of authority, ... a substantial and specific danger to public health or safety," or illegality.13 Lastly, there is strong concern about the indefinite standard of "classifiable information" which gives the government great control, especially considering the president's exclusive authority to set the boundaries of classified information, to limit declassification, and to engage in reclassification of information. Initial progress has been made to reduce the scope, ambiguity, and repercussions of the nondisclosure agreements. In August 1987, the Information Security Oversight Office informed the Air Force that its practice of requiring all employees to sign nondisclosure pledges, including at least 150,000 with no access to secrets, was not the intent of the administration.14 In addition, the administration has instructed agencies-- temporarily -- not to withdraw the security clearances of employees who refuse to sign the nondisclosure agreements.15 Legal action challenging the constitutionality of the mandatory secrecy agreements has been taken by the National Federation of Federal Employees which represents an estimated 150,000 federal workers and the American Federation of Government Employees which represents approximately 700,000 federal workers.16 Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90G01353R002000030039-9 Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 The lawsuit is particularly focused upon the term "classifiable." On August 11, 1987, the administration released a new definition "classifiable," which it believed clarified the term by defining it as information that was classified but had not been designated as such. While it is recognized that some derivative use of classified information may not have been labeled as such, the concept of classifiable, even under the new definition, would allow the government to make unilateral decisions to classify whenever a query or request for the information has been made. Some in Congress believe that such a policy constitutes a broader form of predisclosure and prepublication review by the government. PREPUBLICATION REVIEW In the past, intelligence agencies, relying upon statutory authority to "protect intelligence sources and methods from unauthorized disclosure,?17 have been the primary entities requiring prepublication review. Employees involved in covert intelligence operations have routinely had their speeches and writings reviewed for content that discloses classified information without authorization. The Supreme Court determined that this practice was constitutional in 198018 and that even unclassified material was subject to review.19 Prepublication review has been a practiced method of controlling information at the CIA. For example, the editor of Periscope, the publication of the Association of Former Intelligence Officers, has stated: "Everyone who writes for my publication is bound by a contractual prepublication review agreement by some agency or department of the federal government. Many writers worry about the lawyers determining whether it's libelous or suitable to print. We worry about the lawyers after we get through the publication review process."20 The prepublication review agreement required by NSDD 84 was, in fact, a revised version of the CIA's Form 4193 [Appendix D]. Congress reacted strongly in opposition to NSDD 84, particularly its lifetime censorship program. Temporary statutory restrictions, lasting 5-6 months, were placed on implementation of the prepublication review requirements by any agencies so as to allow time for congressional review.21 On February 15, 1984, shortly before the congressional restraints ended, President Reagan agreed to suspend the prepublication provisions of NSDD 84, and National Security Advisor Robert McFarlane issued a suspension order "to all agencies affected by NSDD 84."22 The practice of- imposing prepublication review requirements on government workers was, nonetheless, widened. Unknown to Congress, the Reagan administration had already been using the CIA's lifetime censorship contract, Form 4193, as a "boilerplate" secrecy contract throughout the government. The General Accounting Office reported that at the end of 1983, excluding the CIA and the National Security Agency, 23 agencies had required 119,000 employees to sign Form 4193. "An unknown number of former employees also have signed the agreement. The Department of Defense estimated that, of 156,000 military and civilian employees who had signed agreements, about 45,000 were former Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 employees" who had been reassigned to work no longer involving highly classified information.23 President Reagan interpreted suspension of the lifetime censorship provision of NSDD 84 in the narrowest possible terms: not implementing a revised Form 4193 contract. The General Accounting Office conducted another study and concluded that in 1985 the number of employees required to sign Form 4193 had risen to 300,000. The most astounding figure reported by the GAO was that in addition to lifetime censorship agreements prepublication review regulations applied to an estimated 3.5 million federal employees '4 As part of the August 1987 lawsuit challenging the constitutionality of the nondisclosure forms, the American Federation of Government Employees is also challenging the constitutionality of the Form 4193 lifetime censorship contract.' Prepublication review poses important constitutional questions not only regarding possible First Amendment violations but also about the way in which Americans can learn about their government. Issues to consider include whether: s Political debate will be filtered. * Information will be subject to broad manipulation or censorship. s Officials of the current administration will be put in a position to censor former officials. ? Timely publication of opinion pieces and articles in newspapers will be delayed. ? An extensive bureaucracy will develop around lifetime censorship. The effects of prepublication review include its potential impact on the most important officials of every administration: cabinet officers. From the president on down, all cabinet officers have access to the type of information that triggers lifetime censorship contracts. This means that many books and articles they write about their experience and issues to which their experience lends insight will be subject to censorship by the government. The impact of such restraint was illustrated during congressional hearings on NSDD 84. There, the chairman of the board of Time, Inc., listed the books and articles by former senior officials that would have to undergo government censorship. The list included books and magazine articles by former officials including: three presidents, a Joint Chief of Staff, chairman of the board, three secretaries of state, a director of central intelligence five ambassadors, and important aides, including Watergate burglar G. Gordon Liddy. Our need to ensure that the voices of former government employees can be expressed to policymakers was underscored in 1987 by meetings of former cabinet officials. On September 26, 1987, seven former Defense secretaries gathered to discuss United States policies ranging from nuclear arms to the Persian Gulf. The group discussion, taped for public television, found both "peril and promise" for the United States.27 If prepublication review had been required of these officials, the program would have had to be approved by the government. Another example of the value of public Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90G01353R002000030039-9 debate involving former policymakers was a reunion of former Kennedy administration officials. On March 5, 1987, marking the 25th year since the Cuban Missile Crisis, former cabinet members and staff from the Kennedy administration gathered. Those present included former Secretary of Defense Robert McNamara, former Secretary of the Treasury C. Douglas Dillon, and former Under Secretary of State George Ball. For one week, these former officials and other important aides to President Kennedy met with scholars and policy experts to publicly reflect on "those '13 days' when the world seemed to tremble on the brink of nuclear apocalypse." As stated by Harvard professor Richard Neustadt, addressing the small group of Kennedy alumni: "You are the only people we have access to who have had to face the problems of escalation in a nuclear crisis. You are the only people there are to talk to about your perceptions, your feelings, your concerns. For any future leader who has to face the prospects of a crisis escalating out of hand, you have valuable lessons to offer."28 The Reagan administration prepublication review measures, however, would jeopardize the availability of such information to future administrations and generations. While President Reagan's efforts to control information and communication has at times been protested by Congress and the public, it has received less opposition from the courts. The Supreme Court's 1980 decision in the U.S. v. Snepp case29 is the most powerful enforcement tool the government now possesses. However, the government has used the decision, which required a CIA employee to submit to prepublication review, to impose censorship agreements on federal workers in a variety of agencies. The Snepp case involved a former CIA agent who published a book criticizing U.S. practices during the Vietnam War. The Court held that Snepp had violated his agreement by not providing the CIA "an opportunity to determine whether the material he proposed to publish would compromise classified information or sources." Furthermore, the Supreme Court awarded damages to the government in the form of a "constructive trust," into which Snepp was required to "disgorge the benefits of his faithlessness." Federal intelligence agencies, acting on the expanded power they perceive has been endowed by the courts, have begun to threaten and prosecute past and present employees under espionage law. In one case, the National Security Agency (NSA) had a warning delivered by the FBI to two former Air Force communications intelligence specialists who had written an article for the Denver Post challenging the Reagan administration's account of the Soviet downing of Korean Air Lines Flight 007. In the warning, the NSA reminded one author of his "secrecy agreement with the agency," and told him that his "disclosure is technically a violation of the Espionage Act and any further disclosures should be cleared with the NSA."30 Espionage law, however, is now clearly operational against misanthropic government employees not only for disseminating information to foreign agents, as was intended by those perfecting the law, but also for disclosing information to the press. In the 1985 U.S. v. Morison case,31 a government employee was convicted of violating an espionage law32 for "willfully" communicating to a British military journal, Jane's Defense Weekly, copies of photographs taken by a reconnaissance satellite. He was also convicted Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90G01353R002000030039-9 Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 of violating another _provision of the espionage law for having kept intelligence documents at his home.'" The Supreme Court may make a final determination in the Morison case in 1987. However, three important concerns have surrounded the case: (1) There has been a rush in recent years by the courts to give the espionage statutes the broadest possible application. (2) Congress did not intend the espionage statutes to extend to publications as well as specific agents and foreign governments. (3) The United States will have the equivalent of an "Official Secrets Act" if the Supreme Court upholds the conviction. The above controls on government employees are extraordinary measures of information security that unwisely displace constitutional guarantees and democratic values. These restrictions on communication and information in our society have the potential to further isolate our government from accountability, to remove responsibility for policies and activities from elected officials, and to undercut the ability of citizens to engage in informed debate about their nation. Prepublication review contracts, nondisclosure agreements, and extension of secrecy controls through the courts between 1981 and 1987 have a disturbing similarity to policies during the McCarthy era of the 1950s. That was a period of heightened fear and distrust of those outside government. Officials stigmatized citizens and arrogantly displaced constitutional guarantees. Today, loyalty oaths are replaced by secrecy contracts; information disclosure is defined in terms of "leaks," and the espionage law is wielded by government officials beyond the intent of the law. Government employees are sworn to secrecy. These practices threaten to erect a wall between government employees, Congress, citizens, and the press. Never before have First Amendment guarantees of Americans been conditioned upon government employment to this extent. Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90G01353R002000030039-9 Chapter 5 Restricting Scientific and Academic Freedom SCIENCE AND TECHNOLOGY Scientific and technological developments in the United States have prompted government concern about the "dual use" of technology by the military and civilians. A leading physicist put this development into perspective: "Nikita Khrushchev is supposed to have commented that the buttons on a soldier's pants represent an important military technology, since they free his hands to hold a rifle." National security controls on the scientific, technological, and academic communities have had a long history in the United States because of the use of atomic and nuclear technology for weapons. Thus, in 1946, Congress enacted the Atomic Energy Act .2 It established a category of protected information called Restricted Data, and today virtually all information related to nuclear weapons and nuclear energy is "born classified."3 In 1951, Congress enacted the Invention Secrecy Act which allows the Department of Defense to review patent applications, impose a secrecy order, and block an invention's use in the civilian sector .4 Earlier authority for this activity dated from the World War I era. Today, however, secrecy orders are permissible even where the government has no property interest or right in the invention. Despite these and other statutory controls, as well as the massive classification system, the government is pursuing more aggressive measures. Increasingly, U.S. defense Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90G01353R002000030039-9 Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90G01353R002000030039-9 policy, foreign policy, and trade policy are combined through a single national security interest to control scientific communication and the free exchange of ideas. Edward Teller, an outspoken physicist and considered the "father of the hydrogen bomb," said: "Secrecy is not compatible with science, but it is even less compatible with democratic procedure."5 Scientific and technological advancement result from multiple postulations, experiments, and conclusions, as well as verifications, from many sources around the world. The "science race" is best visualized as the Olympic relays where runners from many nations pass a baton to begin the next lap -- instead of a lone climber scaling Mt. Everest. An excellent illustration of the situation may be found in the recent advances in superconductor technology, believed to revolutionize existing technology from electrical generation to computers. The race started in Zurich and culminated in Houston, Texas. Notably, the Houston team was led by a Chinese-American working with other Chinese- born scientists, most of whom are not U.S. citizens.6 Ironically, and sadly, these successes have led to increased government controls. On July 25, 1987, the Reagan administration announced that it was denying all foreign officials permission to attend a major superconductivity conference sponsored by the White House and the Department of Energy.? On July 28, 1987, President Reagan addressed the conference and announced an eleven-point "Superconductivity Initiative" that included: changes in the Freedom of Information Act to withhold "commercially valuable" scientific information and "strengthening the patent laws," which means increasing the government's power to impose secrecy orders on patents.8 A leading physicist said in response that superconductivity "has been an international project from the start. The openness here has been just astonishing. That is why the advances have come so fast. If we start closing the doors now, the United States stands to be a very big loser."9 In such actions, the government has extended the "dual use" theory beyond national security to such areas as economics or, in the current parlance, "competitiveness." As in the past, singular events have triggered expanded controls on scientific communication beyond reasonable boundaries. In 1979, it was the Soviet invasion of Afghanistan. In 1987, it is the illegal transfer of technology by Japanese and Norwegian companies to the Soviets to make quieter submarines. One scientist placed the issue in perspective by stating: I have no wish to minimize the irresponsibility of the Toshiba/Kongsberg actions. But let me suggest that the greatest threat to our military security is not from unscrupulous corporate executives, or inadequate Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90G01353R002000030039-9 Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 RESTRICTING SCIENTIFICAND ACADEMIC FREEDOM 37 export regulations or Soviet espionage. The danger is that Mr. Gorbachev is beginning to recognize why it is that they have been compelled to rely so heavily on technology purloined from the West. The Glasnost reforms in the Soviet Union are aimed at emulating the open system that has given us our technological advantage. The final irony of the silent Soviet submarines would be for the United States to move toward the sort of restrictions that have held back the Soviet Union.10 Do increased U.S. restrictions on access and activity of foreigners help or hinder the competitiveness of American industry? While it is clear that the United States is a point of origin for much technology transfer, the situation is not as unbalanced in favor of foreign countries as some would argue. Strong evidence shows that foreign students, engineers, and scientists are playing an integral role in the success of American industry. Nonetheless, the Reagan administration's restrictions on technology transfer often cause corporations to forego this talent pool. A vice-president at Monsanto Corporation states: "Sometimes you fight to get them because they're the best. Other times it's just too much hassle." Many large corporations still make the effort. At Rockwell International Corporation's main research center, 60 of 300 scientists are foreign. The restrictions on technology transfer are a formidable hurdle to overcome. General Electric's chief scientist, Roland W. Schmitt, has said: "So far we've lucked out in that a significant number of those foreign nationals have decided to stay. The United States has many research centers, including our main facility at G.E., that would have been dead in the water had they not been available ?11 Increased governmental concern over militarily useful information reaching the Soviets and other adversaries has received equal attention from American scientists. In 1982, the National Academy of Sciences (NAS) issued a report, Scientific Communication and National Security, which found that, while there is a "substantial transfer" of U.S. technology to the Soviet Union, "very little" was attributable to open scientific communication.12 President Reagan acknowledged the NAS conclusions and then proceeded to expand the secrecy-security controls on scientific and technological research conducted with federal grants or contracts. In late 1982, President Reagan issued a National Security Study Directive calling for a special panel to develop policies to control scientific information.13 In September 1985, the president issued National Security Decision Directive 189, "National Policy on the Transfer of Scientific, Technical and Engineering Information," calling for use of the classification system to "control information generated during federally funded fundamental research in science, technology and engineering at colleges, universities and laboratories." The directive ordered all agency heads to initiate classification of such information prior to the award of grants, Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 contracts, or cooperative agreements, and "periodic review" of grants, contracts, and agreements for "potential classification."14 The Reagan administration's initiative to control scientific, technological, and engineering information extended well beyond the atomic energy laws or the classification system. Target authorities have included: the Arms Export Control Act of 1976, administered by the State Department through the International Traffic in Arms Regulations; and the Export Administration Act of 1979 (extended in 1985), administered by the Commerce Department through the Export Administration Regulations. The application of the Export Administration Act not only covers international exchanges of information in the form of documents, records, and papers but also restricts access of foreign nationals to information in the United States. The application of these authorities relies upon the Militarily Critical Technologies List, prepared and maintained by the Defense Department. In an unclassified version, this list is 212 single-spaced pages. The Defense Authorization Act of 1984 also gave the Secretary of Defense authority to withhold technical information under the control of DOD from disclosure under the Freedom of Information Act.15 The information increasingly subject to secrecy controls is neither classified information, nor is it always government owned. Instead, the indefinite national security concept is used to restrict scientific communication, attendance at professional conferences, enrollment in university classes, access to university laboratories and computers, access to computerized information, and the ability of foreign intellectuals to come to the United States. A brief chronology, compiled from publicly available sources, helps illustrate the nature and extent of national security controls imposed on the scientific and academic community: 1980: Department of Commerce forced American Vacuum Society, organizer of a small international meeting on magnetic bubble memory devices, to rescind invitations to certain foreign nationals. In a phone call, the Commerce Department threatened to fine the Society and imprison its president, stating that an agent was on hand to arrest him.16 The Society wrote invitees in Hungary, Poland, and the Soviet Union rescinding the invitations. Scientists en route from the People's Republic of China were admitted to the meeting subject to signing an agreement not to "reexport" information to any national from a list of 18 countries.17 1980: Department of State stopped nine Soviet citizens from traveling to a conference on lasers, electro-optical systems, and inertial confinement fusion organized by the Institute of Electrical and Electronics Engineers and the Optical Society of America.'-8 Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 1982: U.S. Customs officials seized a shipment of computer science textbooks which a U.S. professional society was shipping to Japan.19 1982: U.S. Customs officials confiscated the luggage of five visiting Chinese scholars, removing scientific journals, classroom notebooks, thesis and lecture materials, slides, innocuous computer software, and rock music cassettes 20 1982: Department of Commerce and Department of Defense officials forced the withdrawal of more than 100 of 700 papers at the twenty-sixth Annual Technical Symposium of the Society of Photo-Optical Instrumentation Engineers.21 1984: Department of Defense and National Aeronautics and Space Administration (NASA) jointly sponsored a professional conference with the American Ceramics Society on composite materials but restricted attendance to "U.S. citizens only.- 22 1984: The International Traffic in Arms Regulations were implemented by the American Institute of Aeronautics and Astronautics to restrict non-U.S. citizens from attending certain composite materials sessions at the Institute's conference. Proof of citizenship required a birth certificate, naturalization papers, U.S. passport, or voter registration card.23 1984: The Society for the Advancement of Material and Process Engineering closed conference sessions on metal matrix and carbon-carbon to non-U.S. citizens. About 20 percent of the Society's 5,000 members are foreign nationals.24 1985: The Department of Defense required cancellation of a special session of the Society for Photo-Optical Instrumentation Engineers, organized by one of its members at a military base, stating that such presentations could not be made in open session. Ultimately, 28 of the 43 proposed papers, revised under DOD review, were presented in closed session, attendees were required to sign an agreement controlling dissemination of export-controlled DOD technical data. 1986: The Pentagon oversaw the selection of papers for presentation at the Linear Accelerator Conference. Initially, 13 were refused clearance, and after an appeal 3 papers were still banned 25 1987: The U.S. Army obtained a secrecy order from the Patents Commissioner when an Israeli mathematician, working in Israel, requested a U.S. patent for an invention involving "zero-knowledge proofs." Cryptological applications of proofs have occurred, but new discoveries are generally considered as advances in theoretical science. Withdrawal of the secrecy order was forced because the government is not permitted to classify work that foreigners do in their own country._ 1987: President Reagan and the Department of Energy barred foreign officials from attending a national conference on superconductor technology. Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 Particularly because of the growth of the electronic information age and computers, the government has accelerated efforts to control access to telecommunications and computerized information. It is an especially important subject area because it involves the government's right to control information that is neither classified nor government property. Instead, it includes data bases belonging to private corporations, universities, and libraries.27 The concern over access to such information pertains, as President Carter stated in 1977, to materials "that would be useful to an adversary." The problem is a genuine one, but there is great difficulty in balancing legitimate protections with necessary freedoms. The potential for moving our nation towards a "national security state" is nowhere greater than in allowing the government to extend its control over information or maintain surveillance over practices regarding the use of telecommunications or computerized information. Federal arrangements for protecting the information must be reasonably designed to ensure public accountability, and not simply to create another institutional form of secrecy. Under President Carter, for example, telecommunications information policy included classified and "unclassified, but sensitive," information. The Defense Department was made responsible for information related to national security. Importantly, the Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 Secretary of Commerce was responsible for non-national security and unclassified systems, particularly for private sector information security needs 28 Under President Reagan, however, the scope of the government's control of telecommunications and computerized information has been increased, and the mechanisms to do so are more secret. In 1984, President Reagan issued National Security Decision Directive 145, eliminating the counterpart authorized by President Carter in 1977. By definition, President Reagan emphasizes information as "sensitive, but unclassified." The boundaries of government control have been extended beyond government property or even reasonable national security concerns. The arrangements for protecting the information, notably including the property of private corporations, and universities, has been centralized in the military, specifically the highly secretive National Security Agency. In the National Security Council directive implementing NSDD 145, former National Security Advisor John Poindexter stated that the scope of "sensitive, but unclassified information" now subject to government control would include: Other government interests ... related but not limited to the wide range of government or government-derived economic, human, financial, industrial, agricultural, technological, and law enforcement information, as well as the privacy or confidentiality of personal or commercial proprietary information provided to the U.S. by its citizens 29 The Poindexter memorandum announced the creation of a new unit within the National Security Agency and described the NSA's responsibilities as: to include all computers and communications security for the Federal Government and private industry ... including non-national security sensitive information. The potential impact of NSDD 145 in the private sector is staggering. By 1986 the Information Industry Association reported that there were 3200 electronic data bases available worldwide through 486 on-line information services. Seventy percent of these data bases are produced in the United States, and all but two of the 20 largest data base companies are U.S. corporations.30 In 1986, one of the nation's largest electronic publishers, Mead Data Central, was visited by officials from the Air Force, the FBI, and the CIA. Mead Data Central has clients in 46 countries, and its information is entirely unclassified. Nonetheless, the government stated its desire to monitor Mead's clients and limit their access to information. In June 1987, Columbia University was visited by two FBI agents who told its library administrators that it wanted them to report on the use of materials by foreign nationals in the school's science libraries.31 These activities reflect how aggressively the Reagan administration has implemented its policy. The Columbia University visit is notable because three months Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 earlier, in March 1987, the Poindexter memorandum implementing NSDD 145 was officially withdrawn by National Security Advisor Frank Carlucci. In Congress, legislation passed the House supplanting NSDD 145 while creating effective computer security policies. If passed by the Senate, the law would provide a more limited definition of "sensitive" information and would remove the National Security Agency from its policy development and enforcement role. Instead, responsibility for policies within the federal government, as well as civilian agencies and the private sector, would be in the hands of the Department of Commerce and the National Bureau of Standards.32 In the meantime, NSDD 145 is intact, and both White House and Pentagon proposals for implementation are expected during the remainder of the Reagan administration.33 CONTROLS ON CAMPUS: ACADEMIC FREEDOM On college and university campuses across the United States, the restrictions discussed above are felt by many scientists. In addition, there have been prepublication review contracts, controls on foreign scholars, course enrollment by foreign students and their computer access, and immigration restrictions on foreign visitors. These distinct controls strike at the heart of academic freedom. In some cases, the relationship to national security is questionable, in others it has been nonexistent. Prepublication review agreements in academia revisit the controls imposed by President Reagan under National Security Decision Directive 84. The directive's provisions for lifetime prepublication review applied to university researchers because certain research grants are government-sponsored. The same experience has occurred in universities as in federal agencies -- prepublication contracts have been imposed despite President Reagan's agreement in 1984 to rescind that portion of NSDD 84. In addition, the practice of using prepublication review in science-related government grants has led to a trend in other government-sponsored university research contracts in areas involving neither military nor classified information. Prepublication review in the academic community raises several unique problems, including elimination of the valuable expertise and insight that the academic community often provides to government. Such insight is denied in three ways: (1) . former government officials are prevented from further exploring the areas in which they have worked after they leave government to take university positions; (2) current government officials can thwart criticism of their practices and policies by deciding that information should never be publicized; and (3) government censorship generally will filter the debate in academic forums, greatly diminishing an essential value of universities. Adding to these concerns is the growing number of federal agencies requiring prepublication review contracts. Most troubling is the fact that these limitations are Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90G01353R002000030039-9 required where the information is not only unclassified, but outside the scope of national defense concerns. A Harvard University report identified several such instances in which prepublication review has been required or proposed:34 * Department of Housing and Urban Development: "Study on Changing Economic Conditions of the Cities." * Health Resources and Sciences Administration: "Workshop for Staff of Geriatric Education Centers." * National Institute for Education: "Education and Technology Centers." * Environmental Protection Agency: "Conference on EPA's Future Agenda." * Food and Drug Administration: "Development of a Screening Test for Photo- carcinogenesis on a Molecular Level." * National Institutes of Health: "International Comparison of Health Science Policies." * Department of the Air Force: "Measurement of Lifetime of the Vibrational Levels of the B State of N2." RESTRICTED ACCESS: COURSES, COMPUTERS, AND COLLEAGUES Just as federal agencies have sought to regulate areas of scientific communication, so too has the government asserted power to control teaching activity. These government actions have startled the academic community and, while some have refused to accept the restraints imposed by government, many feel that there is no alternative. The following are some examples of these governments actions since 1981: 1981: Department of State asked officials at major universities to cooperate in prohibiting visiting students from the People's Republic of China from engaging in research and studies in certain scientific and technological areas. The request would have required close personal surveillance of student activities.35 1981: Department of State imposed restrictive conditions on a Hungarian engineer's scheduled stay at Cornell University to study electronics. The visit was cancelled 36 1982: Department of Commerce concerns caused the National Library of Medicine to deny nationals from Communist countries on-line access to its MEDLINE service, a computerized index of articles appearing in some 3,000 medical and biomedical journals 37 1984: A college course at the University of California at Los Angeles was restricted to "U.S. Citizens Only." It was determined that lecture materials concerned unclassified technical data appearing on the Munitions Control List regulated by the International Traffic in Arms Regulations. 38 Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90G01353R002000030039-9 Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 unclassified technical data appearing on the Munitions Control List regulated by the International Traffic in Arms Regulations.38 1987: The FBI established a "Library Awareness Program" within its national counterin- telligence effort. The FBI program seeks the assistance of college and public librarians in creating surveillance records on library use by foreigners. By September 1987, FBI officials had visited approximately 20 libraries in the New York area.39 Controls on access to computerized information have been the subject of a special initiative by the Reagan administration. This issue reexamines National Security Decision Directive 145 issued by President Reagan in 1985, creating military authority to control access to "sensitive, but unclassified, information." Although implementation of the directive has been in abeyance since March 1987, it is expected to be revitalized, and its application would be wide ranging. Intended to improve computer security the directive affects unclassified information not only in the possession of the government, but in universities and libraries. In addition to access controls the government may place on foreign students, scientists, and scholars at universities, one of the strongest measures used has been to deny immigration visas. This has been done using the ideological exclusion provisions of the McCarran-Walter Act,40 a McCarthy-era immigration law enacted over the veto of President Harry Truman. The Act has been used by several administrations to exclude and deport foreign visitors invited to lecture or teach at universities and colleges in the United States. The law reflects a xenophobic period in American history, when unwise compromises of important democratic freedoms were made. The denial of rights in this case is to Americans, whose First Amendment rights include hearing and judging ideas for themselves, rather than allowing the government to serve as censor. In 1972, the Supreme Court interpreted the McCarran-Walter Act to deny a visa to Ernest Mandel, a Belgian journalist and Marxist theoretician invited to speak at Stanford University in 1969. Mandel had described himself as a "revolutionary Marxist" on his visa application in 1969 as well as on two previous applications allowing successful visits to the United States in 1962 and 1968. The 1969 visa was denied on the grounds that his "1968 activities while in the United States went far beyond the stated purposes of his trip ... represent[ing] a flagrant abuse of the opportunities afforded to him to express his views in this country."41 The Supreme Court rejected claims made by American university professors who claimed they had a right to hear and communicate with foreigners. Since Mandel v. Kleindienst, a disturbingly long list of visa denials have been implemented against visiting scholars and speakers. In addition, there have been deportation proceedings against tenured foreign-born professors.42 Congress is currently trying to change the law to terminate the government's authority to deny visas or deport Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90G01353R002000030039-9 States simply because of their political affiliations, in this case allegedly with communist groups. The Court upheld a U.S. Court of Appeals decision saying that if the State Department wanted to bar foreign visitors invited to speak in the United States, it must certify to Congress that the visitors would constitute a threat to national security.44 The Reagan administration has been notable for its use of the McCarran-Walter Act to ban foreign visitors to prevent Americans from hearing views the administration does not support. The administration claims that its actions are authorized under provisions of law that grant broad foreign policy powers as well as provisions that authorize visa denials on the basis of membership of or affiliation with certain political organizations. Particular instances have involved visa denials to: ? Hortensia Allende, widow of Salvadore Allende, Chile's last democratically elected president. Mrs. Allende was invited to speak by the Archdiocese of San Francisco and Stanford University and would have made comments critical of current U.S. policy in Chile. * Nicaraguan Interior Minister Tomas Borge, who was invited to speak and would have criticized President Reagan. * Former Italian General Nino Pasti, a former NATO official, who was invited to speak and would have been critical of U.S. missile deployment in his homeland and Western Europe. s Farley Mowat, Canadian naturalist and author of Never Cry Wolf, and Italian playwright Dario Fo. As noted American author Kurt Vonnegut stated in testimony before a Senate subcommittee considering elimination of these restrictions: No other nation has a law like our First Amendment. But then again no other Western bloc country has anything quite like the McCarran-Walter Act. We have damaged our own reputation while gaining nothing with enforcement of this law. It is the free exchange of ideas, no matter how outrageous, that has made us strong. I don't think we have to be afraid of any idea. We are very good at testing them when given a chance.45 Government restrictions on scientific, academic, and intellectual freedom pose some of the most serious problems for the future of our nation. Free exchange of ideas serves as a practical requirement for scientific and technological advancement. Government secrecy measures, however, interfere with meeting this basic requirement. The academic community is an essential forum for independent learning, thinking, and debate. Our nation values the education of its children and their preparation for a world of uncertainties. Nonetheless, government secrecy measures have inhibited the intellectual prosperity of our nation's colleges and universities and have begun to isolate teachers and students from their colleagues and counterparts around the world. Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90G01353R002000030039-9 Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 Government infringement upon First Amendment guarantees augment the practical handicaps resulting from excessive government secrecy in the scientific, technological, and academic communities. Efforts to stop the public presentation of scientific papers, that are neither classified or government property -- yet are prohibited from public presentation -- pose serious problems under the Constitution. The government's use of export and import laws to justify such action creates a heavy burden of proof, as yet unmet, regarding the proper use of these laws. When the government decides to deny a visa to a visiting scientist, scholar, or writer, it is violating the First Amendment rights of Americans to decide for themselves the value of ideas expressed by such persons. The many instances of government interference from 1981 to 1987 reflect the capacity of our government for unilateral action. The strength of our democracy and the future of our nation, however, require a more limited and well-balanced role of government. Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 Chapter 6 Stopping The Presses The United States is in the midst of an evolving "information age," when policies about information become decisions about the future of society itself. These decisions are most keenly felt by Americans regarding their daily forum and source of information: the press. Despite the rights that allow Americans to navigate the maze of government agencies to acquire documents and records, it is the press that regularly and systematically brings most information to the public's attention. The role of the press has produced a complex and tense working relationship between the news media and the executive branch. President Kennedy launched the modern media presidency by being the first to use the live television press conference as a communication tool of the White House. Other presidents have lacked President Kennedy's telegenic quality, but the role of the media in general has, nonetheless, expanded. In recent years, Americans have witnessed the power of information, the dynamics of its control, and its capacity for truth as well as manipulation. President Nixon was well known for his distrust of the press which he converted into presidential power to broaden control over information. Nixon's unsuccessful attempt to obtain a court order to stop the New York Times from publishing the Pentagon Papers remains a landmark in history. President Reagan has been equally distrustful of the press and appears to be willing to compromise First Amendment freedoms. The Reagan administration has planned and implemented an aggressive agenda of controls on the press and for most of Reagan's tenure as president has simultaneously tried to disarm and manipulate the news media. In the wake of the Iran-contra scandal, some may say that the administration is getting its just desserts, but scorn will not erase past practices or uproot policy. As in any presidency, many events take place that cannot be simply wished away. Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 48 GOVERNMENT SECRECY: DECISIONS WITHOUT DEMOCRACY GRENADA, SPIES, AND LIBYA THE INVASION OF GRENADA In October 1983, furor over national security controls on communication reached its highest level since the Pentagon Papers when President Reagan ordered a news blackout during the invasion of Grenada. The threat was made to shoot any U.S. reporters who tried to reach the island on their own. Coverage of the initial stages of the assault was selectively provided by the Defense Department's own public relations personnel.' In May 1986, President Reagan telephoned the publisher of the Washington Post, Katherine Graham, and urged her not to _publish an article about intelligence-gathering operations involving American submarines. The president's phone call belied a stronger administration effort. Within days, CIA Director William Casey threatened to prosecute the New York Times, the Washington Post, the Washington Times, Newsweek, and Time magazine for publishing information about U.S. intelligence gathering operations. He alleged that the news organizations had violated a section of the espionage law, enacted in 1950 but never applied. Discussions between the administration and the Washington Post in May 1986 marked the sixth time in a twelve-month period that government officials had pressed the newspaper to withhold or alter an impending article.3 In a case now before the Supreme Court, the Reagan administration is pursuing an unprecedented application of our nation's espionage laws to news publishers.' In the past, the espionage laws have applied only to disclosure of information to hostile foreign governments and their agents. Many believe that if the Reagan administration is successful before the Supreme Court, the United States will essentially have created an Official Secrets Act. Even if the person who disclosed the information is never identified, the mere publication of information would be prohibited and punishable. A newspaper or any other media in which the information appears could be held criminally liable. In October 1986, it was revealed that a White House disinformation campaign against Libyan leader Moammar Gadhafi had been perpetrated in the U.S. and world news media. It had been authorized by President Reagan through use of a National Security Decision Directive issued in mid-August 1986, seeking a "regime change" in Libya. The president directed the CIA to mount a campaign of "disinformation" to make Gadhafi think that a second U.S. attack or a coup d'etat was imminent.5 President Reagan justified the action by contending it was legitimate if it made Gadhafi "go to bed at night wondering what we might do. "b While the press is often the subject of government criticism, the government uses the media extensively and, as the Libyan case illustrates, is capable of extensive manipulation of the facts. Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 DISTRUST AND DISCLOSURE A 1987 study by the Reporters Committee for Freedom of the Press has identified more than 135 actions by the Reagan administration aimed at restricting public and media access to government information and intruding on editorial freedom.7 The Reagan administration's distrust of the press has been central to a wide array of information controls that are spread throughout society. It has shaped federal information policy in terms of "information security" and defined information disclosure as "leaks." Control of information has been the emphasis of the information policy of the Reagan administration. In 1986, White House spokesman Larry Speakes defended reducing presidential news conferences and the administration's tightening of controls on information to the media, saying: "I don't know a corporation ... that doesn't try to control the message that goes to the public ... that's the way the game is played."8 However, public office and democratic government have greater requirements of trust and accountability to the citizens than do corporations, and there are no shareholders waiting in the wings, assisted by squads of lawyers, ready to file a lawsuit. The Reagan administration has exerted unprecedented control over information available to the press, creating secrecy-security policies throughout government. National Security Decision Directive 84, issued in 1983, not only clamps down on employees by imposing secrecy agreements, but requires of all agencies that: "Appropriate policies shall be adopted to govern contacts between media representatives and agency personnel."9 Other incidents have occurred lately throughout the agencies. In September 1983, for example, the Commerce Department placed new restrictions on journalists. It imposed a "lock-up" on reporters being given a view of a major report on durable goods before the official release time -- they were required to sit in a locked room without access to a telephone.10 In 1985, a State Department bureau chief barred staff members from talking to a New York Times reporter, Leslie H. Gelb, who once headed the office. The new bureau chief also removed a photograph of Mr. Gelb from the waiting room wall. A note in large handwriting was placed in the picture frame reading: Removed For Cause. The P.M. Director, 1977-1979, did willingly, willfully, and knowingly publish in 1985 classified information the release of which is harmful and damaging to the country. -1 Gelb had written an article on U.S. contingency plans to deploy nuclear weapons in certain foreign countries. Part of the information had already appeared in the international press. The New York Times story included information that the plan had been prepared without notifying officials of the recipient countries. Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90G01353R002000030039-9 In 1986, the FBI formed a special team of agents to investigate disclosures of "sensitive" information to news organizations. Among the cases being investigated, FBI agents were trying to track down the source of a New York Times article about the alleged role of Panamanian army commander Gen. Manuel Antonio Noriega in international drug trafficking and illicit concealment of funds. In recent months, the president's preoccupation with leaks has led to a volley of charges exchanged between the executive branch, witnesses in the Iran-contra hearings, and Congress. Lt. Col. Oliver North went so far as to justify lying to Congress because he felt that its Members and staff could not be trusted to withhold information from the press) A recent study by the Senate Select Committee on Intelligence concluded that about two-thirds of the disclosures of classified information came from the executive branch. The study examined eight prominent newspapers, and determined that 98 of 147 such disclosures were perpetrated by anonymous sources within the Reagan administration.14 The value of a free press in the United States cannot be overemphasized. The press has successfully kept the public informed, despite the difficulty of obtaining from our government even information that is not officially secret. The news media possesses unique resources to appraise the public of government actions, and is essential as a forum for public debate. The institutional nature of government secrecy in the United States, and the continued growth of our government in general, require a strong and independent source of information. Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90G01353R002000030039-9 Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 Chapter 7 Citizen Access: The Freedom of Information Act In addition to the controls that allow the government to restrict the flow of information handled by government employees, contractors, and specific sectors of society, such as scientists, the government also imposes controls upon the general public. The principal instrument governing the disclosure of information about the federal government to the public is the Freedom of Information Act. Many Americans may be familiar with the existence of the Freedom of Information Act (FOIA) but remain uncertain as to its use. The Freedom of Information Act has allowed the public to learn about many activities of the federal government. The results have enabled Americans to live safer and healthier lives and to govern themselves more economically and efficiently. WHAT THE FREEDOM OF INFORMATION ACT DOES Enacted in 1966, the Freedom of Information Act stands alone as the legal basis for public access to records of federal agencies. The FOIA gives all persons this access right, enforceable in court, except to the extent that such records are specifically protected from disclosure.' Examples of key exemptions to the Act's rule of disclosure include classified information and commercial trade secrets. It is encouraging to note that since the enactment of the FOIA many states have enacted a similar open information law. Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 executive branch. Its support in Congress has always been bipartisan. Democrats and Republicans together created the law and, in 1974, passed crucial amendments over the veto of President Gerald Ford. From its earliest days of passage through the present, the FOIA has reflected constant push and pull of the separation of powers between Congress and the HOW THE FREEDOM OF INFORMATION ACT BENEFITS SOCIETY The contributions of the Freedom of Information Act to American society have been significant. The use of the FOIA by the public and the press has had a positive impact on government efficiency and spending, and on the health and safety of citizens and has promoted essential principles of democracy. The following are important examples of the use of the Freedom of Information Act in ways that have benefited our society. Freedom of Information Act requests have uncovered: Atomic Energy Commission: Department of Defense: Department of Justice: An eleven-year Atomic Energy Commission study of cancer rates of 30,000 workers in "Plutonium City," an atomic bomb facility in Hanford, Washington, during World War II, was publicly disclosed for the first time in 1978. The Department of Energy, superceding the Atomic Energy Commissioner, abandoned the study in 1975, citing the "imminent retirement" of the chief scientist. The scientist's retirement date was six years later. The study was shelved because of the extensive findings directly linking work at "Plutonium City" with increased cancer rates among workers .2 Federal audits of the top ten defense contractors showed that between 1974-1975, these contractors charged the Department of Defense for $2 million in lobbying costs and $2.5 million in entertainment costs. New Pentagon policies were subsequently established to end such charges .3 In 1986, Department of Justice records revealed political favoritism in awarding a $622,905 grant for domestic violence prevention to a controversial group with no background or expertise in preventing family violence. An inquiry into the propriety of the grant was launched by the Criminal Justice Subcommittee in the House of Representatives .4 Federal Bureau of Records revealed secret operations of Cointelpro against Investigation: Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 Records and documents revealed covert FBI investigation of public interest groups, including Physicians for Social Responsibility. Documents revealed extensive intelligence files were compiled for more than 50 years on many distinguished American writers including: Carl Sandburg, William Faulkner, Edna St. Vincent Millay, Pearl Buck, Ernest Hemingway, John Steinbeck, Archibald MacLeish, Thomas Wolfe, John Dos Passos, and others .5 Food and Drug Previously undisclosed test results showed the presence Administration: of a cancer-causing chemical in hundreds of liquor products sold in the United States. These included bourbons, sherries, and fruit brandies. Canada already bans dozens of liquor products for this reason.6 Data that the Food and Drug Administration held linked an arthritis drug to severe liver damage that resulted in dozens of deaths. The drug in question, Oraflex, was removed from the market amidst allegations that the FDA had rushed through the approval.? Transcripts and records from a Fertility and Maternal Health Advisory Committee revealed a 1987 FDA deregula- tion recommendation to delete birth defect warnings from progestational drugs and that the FDA reached its decision using an improperly designed study and ignored authoritative birth defect research .8 Internal Revenue A 1973 IRS survey of compliance with federal tax laws Service: revealed extensive evasion by small businesses coupled with non-detection by the IRS. The survey detailed that 33% of all small businesses (i.e. with assets less than $1 million) were underpaying taxes; 28% went entirely undetected by the IRS. A statistic for 1969 showed that small businesses had underpaid $641 million in federal taxes. Disclosure led to improvement of IRS enforcement and increased attempts to recover back taxes .9 National Aeronautics and Federal audits of NASA revealed to the public for the Space Administration: first time a history of poor management at NASA. These disclosures revealed agency mismanagement and waste of billions of dollars. Experts have concluded that mismanagement, detailed in federal audits, severely hurt the space program and is directly linked to safety Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 problems that culminated in the Challenger explosion and the death of seven astronauts. In 1987, a Pulitzer Prize was awarded to the New York Times for investigative reporting that used the FOIA.10 National Institutes of A study was conducted for the NIH showing a clear Health: connection between the administration of certain medications to mothers during childbirth and the impairment of brain development. At the time of the study, 95% of all births in the United States were medicated. Disclosure revealed that government review of the study eliminated key findings, diluted the author's conclusions, and prevented publication in a medical journal. The study was unpublished when obtained." A study conducted by the House Government Information Subcommittee reported that over 400 cases like those cited above were reported in the news media between 1972 and 1984.12 THE REAGAN ADMINISTRATION'S "ONSLAUGHT" AGAINST THE FOIA Despite these disclosures that protect our lives and improve our government, President Reagan has led the effort to prevent greater executive branch accountability by the public and Congress. Since 1981 Reagan administration officials have called the Freedom of Information Act a "highly overrated instrument" and have worked to decrease the rights of citizens granted by the Act and increase the government's power to withhold information.13 In the past seven years, President Reagan's initiative has changed the shape of the Freedom of Information Act, with attacks on several fronts, employing an array of methods: 1982: President Reagan's executive order on information classification granted agency officials authority to classify and reclassify records upon review of a FOIA request. 1984: President Reagan and CIA Director William Casey persuaded Congress to pass the CIA Information Act, broadening the CIA's ability to exempt its operational files from FOIA disclosure. 1984: The Defense Authorization Act of 1984 gave the Secretary of Defense authority to withhold DOD technical information from FOIA disclosure.14 Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 CITIZENACCESS: THE FREEDOM OF INFORMATIONACT 55 1986: The Anti-Drug Abuse Act of 1987 was used as vehicle for the passage of the Freedom of Information Reform Act of 1986. These amendments increased the ability of the FBI and other law enforcement agencies to withhold records and gave the Office of Management and Budget new authority to set guidelines and fee schedules for the Freedom of Information Act.15 1987: The Office of Management and Budget issued uniform FOIA fee schedules and guidelines.16 1987: The Department of Justice issued a memorandum imposing guidelines and requirements for implementation of OMB fee schedule and guidelines.17 1987: President Reagan issued an executive order giving corporations increased power to review materials requested for release under FOIA and that may be exempt from disclosure under Exemption 4.18 Changes in the law, particularly concerning law enforcement, fee guidelines, and business notification, merit further discussion. Freedom of Information Act amendments passed as part of the comprehensive drug control legislation in 1986 reflect a particular legislative tactic -- the use of other statutes to dilute the Freedom of Information Act. It is a particularly effective tactic because omnibus legislation, such as the drug bill in 1986 or the trade bill in 1987,19 carries immense political momentum, and new provisions can be easily added and buried. In technical terms, the amendments provide limited exemptions for records that "could reasonably be expected to interfere with enforcement proceedings, would deprive a person of a right to a fair trial or impartial adjudication, could reasonably be expected to disclose the identity of a confidential source, or could reasonably be expected to endanger the life or physical safety of any individual."20 The main forces behind the amendment affirm the broader design of the changes. Senator Orrin Hatch (R-UT), President Reagan's chief advocate in Congress for strengthening government control of information and weakening the Freedom of Information Act, believes the changes will considerably enhance the ability of Federal law enforcement agencies such as the FBI and the DEA [Drug Enforcement Agency] ... and greatly enhance the ability of all Federal law enforcement agencies to withhold additional law enforcement information.21 Justice Department officials who lobbied hard for the amendments were quoted as saying the amendments "make real changes."22 Senator Hatch bluntly described the meaning of the new law enforcement provisions, stating "there likewise should be no misunderstanding that they will logically operate as exclusions -- not mere exemptions Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90G01353R002000030039-9 to be applied whenever the special circumstances specified in them are found by the agency to exist."23 Agencies will no longer have to review their files when information is requested on subjects including FBI records on foreign intelligence, counterintelligence, and international terrorism. These are the very files, however, that have revealed highly questionable surveillance and covert operations involving the antiwar movement, as well as legal, political, and public interest groups. A recent example is the discovery of a 1982 FBI operation inside the Physicians for Social Responsibility. FEE WAIVERS, SCHEDULES, AND GUIDELINES. These changes affect the often debated subject of the cost of government information to the public. Some believe that government has a responsibility to inform its citizens, and that citizens should not be charged a separate cost to ensure that this responsibility is fulfilled. Counter arguments are made that government information costs include not only printing and publication but also searching for and reviewing records pursuant to FOIA requests, as well as subsequent litigation costs. In many ways it reflects the continual tension between Congress and the executive branch over control of the federal government. Recent changes do not offer much hope that the dilemma has been resolved or that the public will be better off. The Office of Management and Budget Fee Schedule. The Office of Management and Budget's (OMB) fee schedule and guidelines add to the ever-increasing power of the agency under the Reagan administration. However, Congress saw OMB as an alternative to the Justice Department, whose recent guidelines have been viewed with dissatisfaction by congressional overseers. Among the concerns about the OMB guidelines is that they set wholly new definitions of "news media," "educational institutions," and "commercial use." Congressman Glenn English (D-OK), Chairman of the House Subcommittee on Government Information, believes that OMB "approached its responsibilities in good faith," but strongly disapproves of many of the definitions and suggests that OMB may have overstepped the law that limited its role to writing a uniform schedule of fees. English has termed OMB's definition of news "broad, vague, and useless." He believes OMB invites agencies to evaluate the news value of information and that Congress specifically rewrote part of the law to remove agencies from such an editorial position.24 "Educational institutions" are defined in a way that hinders scholarly and scientific research reliant upon government records. Unfortunately, the combined effect of the broad OMB definitions and the "advisory" Department of Justice memorandum have already been invoked to deny fee waivers for educational research. Furthermore, these denials illustrate the power that low level government officials now wield to determine what is and is not in the public interest. For example, the Department of the Air Force recently denied a fee waiver to a professor researching U.S. involvement in Southeast Asia. The Air Force stated: Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90G01353R002000030039-9 Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90G01353R002000030039-9 We do not believe that there is a genuine public interest in the documents you have requested. Secondly, we seriously question the value to the public of these records ... Since there have been voluminous books and studies previously published on Southeast Asia, we do not feel the records will meaningfully contribute to the public development or understanding of the subject. The value at best may be marginal. Individual scholars, according to OMB, must have a fee waiver request presented under some official authority of their institution. In one recent denial of a fee waiver, the Department of Defense told a tenured history professor, who had requested a fee waiver on university letterhead: "Future requests on behalf of [name of university], should indicate such, so that the University's ownership of records provided and possible publication royalties are recognized."26 The planned sale of a report, booklet, or book based on information sought in a FOIA request will taint it as a "commercial use" and vitiate the possibility of a fee waiver -- but according to one agency, so does a professor's teaching salary! The Department of the Air Force recently denied a fee waiver to a college professor stating: The fact that you intend to use the information in your college classes is not a relevant factor because as a college professor you are paid a salary and, therefore would derive monetary benefit from the information requested.2' Lastly, the guidelines specifically exclude independent scholars and students -- those not affiliated with an educational institution -- from qualifying for the fee waiver. Department of Justice Memorandum. The Justice Department Memorandum, "New FOIA Fee Waiver Policy Guidance," advising agencies on implementation of the OMB guidelines, was not required by law, requested by Congress, or solicited by a single federal agency. Instead, it reflects the continued determination of the Reagan administration and Justice Department to press for restriction of the Freedom of Information Act as they have for the past seven years. The Justice Department enters the area of FOIA, without any authority to issue binding guidance, and undercuts the very intention of Congress in giving responsibility for developing fee guidelines to OMB. On the meaning of the "fee waiver standard," addressed by OMB in a single sentence, the Justice Department devoted 12 single-spaced pages of advice. Congressman English, in a letter asking the Attorney General to withdraw the memorandum, stated: Let there be no confusion about the congressional intent. Congress rewrote the FOIA fee waiver rules in order to make more people eligible Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90G01353R002000030039-9 Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 libraries, and other requesters would find it easier to qualify for fee waivers. This change in the FOIA was an integral part of a package of amendments that included raising the fees for a narrowly defined class of commercial users of the FOIA ... Whether the Justice Department likes it or not, that is the intent of the amended FOIA 28 President Reagan issued Executive Order 12600, "Predisclosure Notification Procedures For Confidential Commercial Information," on June 23, 1987. Its purpose is "to implement the section of the President's Competitiveness Initiative seeking to better protect intellectual property."29 Intellectual property is a legal term for inventions, formulas, designs, methods, processes, and writings, as well as scientific, literary, and musical creations and even computer programs, for which property rights are created through patents, copyrights, trademarks, and trade secrets. The Freedom of Information Act already exempts the disclosure of trade secrets,30 and Federal agencies have generally given corporations notification of the release of submitted records, and often the chance to challenge the FOIA request. Because the Reagan executive order has only been in existence a short time, its impact is not yet known. Concerns about the order, however, include: direct presidential action amending the Freedom of Information Act, avoiding the legislative and public hearing process; the potential for broadening the trade secret exemption to information that is neither a "trade secret" nor "intellectual property;" the ability of corporations to prevent disclosure simply by stamping everything submitted as "confidential commercial information;" and the ability of corporations to delay timely release of information valuable to the public. THE FUTURE OF THE FREEDOM OF INFORMATION ACT The Freedom of Information Act, after twenty years of operation, remains the single statutory mechanism granting an enforceable right of public access to government records. The Act has served effectively as an instrument and a symbol of open information policies in our democratic society. In recent years we have witnessed an onslaught of attempts to weaken the access rights of citizens, and increase the power of government to control the flow of information. As the original passage and improvements of the Freedom of Information Act have shown, access to information is not a partisan issue. Opponents of the Act must be required to substantiate their claims and not simply attack the Act as a source of problems originating elsewhere, or as a means of limiting access to information. Changes in the law must be carefully balanced with its enormous benefit to American society, especially for the oversight and accountability of government. Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 IF - 13311111 Chapter 8 Policy Powerhouse: The Office of Management And Budget The Office of Management and Budget (OMB) is best known to Americans as former home to David Stockman, President Reagan's first OMB director. Stockman and the Reagan administration were able to transform OMB into one of the most powerful, yet secretive, agencies in the government. What makes a lesser known federal office the source of so much controversy and turbulence? Despite its roots in the old Bureau of the Budget, which OMB superceded in 1970, OMB's role in the government is much broader than number crunching. In 1986, Congress stepped back to view OMB's dimensions. In the report that followed, Office of Management and Budget: Evolving Roles and Issues, Congress cited "95 statutes, 58 executive orders, 5 regulations and 51 circulars which reflect OMB's operational authorities."' The subjects covered by these measures are all-encompassing, from arms control2 to water resources.3 The controversy and turbulence surrounding OMB has been about the exercise, growth, and secrecy of OMB's extraordinary control over the federal government. Congress acted to increase OMB's authority to improve the efficiency of the federal government. Then President Reagan expanded these new responsibilities beyond the intent, and consent, of Congress. During the Reagan administration OMB has been reinvented as the power base of the executive branch. As Congress observed in its study, OMB operates under the guise of a federal management agency, but it exhibits a "persistent confusion between management and control." OMB's control and its ability to manipulate the bureaucracy has led to increased government secrecy as both an end and a means. The opening for such activity came as the result of the Paperwork Reduction Act, passed by Congress to decrease wasteful paperwork volume in government, but President Reagan used OMB's powers under the Act in ways beyond the intended boundaries set by Congress. President Reagan granted OMB unprecedented authority to control the content and the volume of all government publications and to set the information collection policies of all federal agencies.5 The result: less information is available to fewer people about government. Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 As a means, President Reagan has endowed OMB with authority to rewrite federal regulations and studies, but the process has been conducted secretly. In 1985, disturbed that President Reagan had created a "superagency," Congressman John Dingell (D-MI), Chairman of the House Energy and Commerce Committee, stated: While Congress expected everyone to play by the same rules, the OMB has rewritten the rules to give itself a special advantage. It engages in secret communications with agency officials and outside parties, leaving other interested parties on the sidelines watching a different game. A regulation may be blocked through OMB's clandestine intervention at the behest of a particular industry while limiting the presentation of opposing views by other industry representatives and the general public who might benefit from the proposed rule. This secret process is simply incompatible with a regulatory review process purportedly designed to promote rationality in decision making.6 OMB bypasses federal laws specifically enacted to provide citizens with knowledge of and access to government decision-making. In general, OMB reaches from behind the curtain of government into the lives of Americans. OMB is a subtle and complex force that makes unrestrained use of unaccountable power. OMB CONTROL OF GOVERNMENT INFORMATION The Reagan administration's action at OMB reflects a pattern throughout the government of reduced flow of information to the public. It seems that only the justification used in other areas of government has shifted, from "national security" to "cost/benefit." The consequences of secrecy remain the same: defeating the accountability of officials and agency activity, thwarting the checks and balances of our government, and undermining the democratic process. The Reagan administration assault against public service information began in 1981. It was significantly advanced in 1985 through the issuance of a comprehensive information management policy entitled OMB Circular A-130 7 Implementation of this policy has emboldened executive branch control of government publications, information collection and dissemination, and privatization of government printing. It has also undercut protections and rights guaranteed by law and decreased the effectiveness of government programs. The free flow of information in a democracy is essential to maintaining an informed citizenry, as well as helping people improve the quality of their lives. Government publications have historically been an important source of public information. These materials are relied upon by Americans to learn about their government, to be advised on health and safety matters, and to discover job and educational opportunities, as well as to become educated on other issues affecting their lives. Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90G01353R002000030039-9 When President Reagan entered office in 1981, government publications were immediately targeted as an expendable resource. The president quickly expanded OMB's limited budgetary authority to review government publications8 and initiated a campaign to reduce government information as part of a "war on waste." Few would argue that government programs cannot be improved, but the emphasis in this case was not to create better information resources -- simply less. President Reagan kicked off the new OMB campaign by stating: The federal Government is spending too much money on public relations, publicity, and advertising. Much of this waste consists of unnecessary and expensive films, magazines, and pamphlets .9 As the new "information czar," OMB established stringent controls on federal agencies. It declared a moratorium on new periodicals, pamphlets, and audiovisual products; required OMB review and approval of plans to publish such materials in the future; and mandated use of OMB publication control systems.10 OMB's publications policy terminated the availability of much information of public importance. In 1982, OMB issued its List of Publications Terminated and Consolidated by Agency, in which 2,000 publications were dropped.11 One government publications librarian assessed the damage, stating: Well-known government titles have ceased publication since the moratorium. Some of them can be verified among 2,000 titles announced in OMB's List of Government Publications Terminated and Consolidated by Agency. Others have simply failed to appear in print. No announcement was needed for reference librarians to notice that the annual Handbook of Labor Statistics failed to arrive on schedule in 1982, but it was not immediately apparent that it had ceased publication. It gradually became clear that numerous federal statistical sources had been terminated.12 OMB steamed ahead despite strong opposition by the nation's librarians and others. By 1984 a second OMB report claimed reduction of 3,848 government publications.13 One private, nonprofit group, OMB Watch, created to monitor the actions of OMB, determined that "over 43% of all federal publications were affected by the campaign against waste."14 The "waste" included publications on such wide ranging subjects of public concern as income taxes, drug abuse, automobile safety, and radioactive fallout. Some of these were: A Woman's Guide to Social Security Emergency Management Handbook of Labor Statistics Health Resources Statistics Housing and Urban Development Trends Oil Pollution Abstracts Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90G01353R002000030039-9 Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90G01353R002000030039-9 Poison Control Center Bulletin The Car Book The Right To Read Unemployment Rates for State and Local Governments Your Housing Rights OMB's systematic efforts to cut back publications have continued to grow, snowballing into more comprehensive controls on information. In 1985, OMB issued an expanded "Government Publications" policy, increasing the frequency of OMB review of agency publication policy to every year, and expanding the types of materials subject to OMB scrutiny.16 OMB's control of government publications demonstrated its ability to block a direct communication channel between government and the public. However, OMB's control extends deep into all the information functions of federal agencies. The following is a list of ways in which this is accomplished. Records are maintained by agencies to help determine whether the government and others in society are complying with air safety, environmental, civil rights, or consumer protection laws. Information collected about specific government programs increases effectiveness in programs ranging from immigration reform to drug enforcement. Surveys are conducted by agencies to better administer government programs for public health care delivery, agriculture, or heat and fuel needs. All such information is especially important to concerned citizens and nonprofit groups that fill gaps in public policy by helping Congress formulate programs. OMB's control of information is strong evidence that policies about information are decisions about the very nature of society itself. OMB action in March 1987 reveals its central role in determining whether government is responsible for informing its citizens and taxpayers. Bridging the areas of government publication and information policy are the very regulations that determine how information is printed and distributed. For the Reagan administration, government printing is a primary target of its drive for "privatization," shifting functions of government to the commercial sector. Like other recent OMB stratagems, privatization has been pursued without considering its effect on government responsibilities. Government and commerce differ in many obvious ways. Foremost is the fact that public needs must be met efficiently but should not be conditioned upon profitability. OMB's effort to privatize government information has been advanced in regulations that undercut the system created in law more than fifty years ago.17 That system requires federal printing to be performed by the Government Printing Office (GPO) under the auspices of the congressional Joint Committee on Printing. Congressman Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90G01353R002000030039-9 Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 Major Owens (D-NY), who was a professional librarian before entering Congress, in 1987 stated: The benefits of this requirement as it has been implemented over the last 68 years has been invaluable: it has rid Government printing of the corruption with which it was once plagued, assured that printing is carried out as economically and efficiently as possible, provided universal public access to Government publications through the GPO-administered depository library system, and given Congress the powerful oversight tool it needs to preserve the free flow of Government information to the public.18 OMB's manipulation of federal regulations has, in this case, usurped these requirements supplanting benefits and reforms. OMB also permitted certain provisions to be issued as final rules without any opportunity for public comment. In particular, the new regulations remove the requirement that federal agencies obtain approval of the Joint Committee on Printing in Congress before transferring printing to commercial firms. Without centralized review, the government printing operation will be less efficient. While the government will be expected to print and publish, it will be both unable to plan and uncertain of personnel and budgetary needs. OMB has substituted "private" policy for public policy, dismantling the government's information infrastructure. OMB's control of information collection affects the determination of whether government and others in society are complying with the law. OMB wields the power simply to tell agencies to stop collecting such information. The areas range widely from worker safety to fair housing opportunities. In most cases, OMB lacks the expertise to understand the importance of the information or the consequences of its disapproval. OMB, for example, decreased assurances of a safe workplace for Americans in a January 1987 decision about information collection. Wood dust exposure in wood manufacturing factories has been linked to increased risks of nose, throat, and stomach cancer. The Department of Labor's Occupational Safety and Health Administration (OSHA) had recently stepped up its effort to determine the need for new worker protection regulations. In January 1987 OMB ordered OSHA to stop visiting wood and wood product manufacturers to make necessary evaluations, terming them "unapproved information collection."19 In another matter of occupational safety, OMB changed regulations dealing with mine workers' safety by scaling back safety record-keeping requirements. The Department of Labor's Mine Safety and Health Administration had sought to record defects in "self- propelled" mining equipment such as trucks and loaders. In 1984, the Mine Safety and Health Administration reported that between 1980 and 1983, 154 deaths and 10,000 injuries were attributable to accidents involving such equipment. This information ensures that defects are not overlooked, that necessary repairs are made, and that maintenance is Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90G01353R002000030039-9 performed regularly. OMB, however, wanted to leave the responsibility up to the mining companies, requiring only a signed certification that inspections have occurred2? Compliance with civil rights laws has also been affected by OMB decisions that reduced the effectiveness of agencies responsible for stopping housing discrimination as well as those working to increase the number of minority-owned businesses in the United States. In 1985, OMB issued a decision barring the Veterans Administration and the Department of Housing and Urban Development (HUD) from collecting information that the two agencies use to remedy housing discrimination and administer civil rights programs. The information included the race, sex, and ethnic background of applicants for home mortgage insurance. One HUD official stated, "This is no casual effort by OMB, it's a concerted action. The surest way to stop [civil rights] enforcement is to remove information about who is in the programs."21 Pressure from a group of federal agencies and Congress forced OMB to reverse its decision 22 Also in 1985, another OMB decision meant that compliance with the Equal Employment Opportunity laws by television stations throughout the country became less certain. OMB disapproved of Federal Communications Commission (FCC) annual reporting requirements on the race and sex of employees of cable television stations. In another interference with the FCC, the administration moved towards achieving its goal of eliminating the Fairness Doctrine, the rule that broadcasters must give equal time to opposing views of controversial issues of public importance. OMB disapproved of FCC forms used to notify political candidates of their right to respond to TV and radio station editorials 24 FCC compliance with the Fairness Doctrine was diminished, a goal which the administration championed throughout 1987. Information is, collected by federal agencies to evaluate public needs and to improve the effectiveness and responsiveness of government programs. OMB, however, can choose to undermine these programs simply by disapproving of information collection. Communities that suffer from chronically poor economic conditions or severe economic dislocation may be prevented from improving their lot in life. In June 1987, OMB disapproved of a plan by the Department of Commerce's Economic Development Administration to evaluate local technical assistance projects it has provided in the past. The systematic evaluations could have indicated the progress of such programs, as well as targeted areas of continuing need 25 An effort to increase the utility of federal reports on medical policy and reviews of medical treatments and devices for nearly one million medical professionals was undercut by OMB in June 1987. The Food and Drug Administration (FDA) publishes its Drug Bulletin three to four times annually and it serves as an important forum for government and the medical community. Rapid medical advances and improvements in health care practices have raised important questions about the scope and utility of the Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90G01353R002000030039-9 Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 FDA publication. FDA decided to conduct its first readership survey in 15 years. OMB's disapproval of the survey forced FDA to continue making relatively uninformed editorial and budget decisions about the publication.26 In 1985, the Indian Health Service tried to pursue a recommendation from Congress for improving its community-based outreach program for Native Americans. Congress has fought to maintain funding levels for the program despite President Reagan's efforts to phase it out. Congress recommended that the Indian Health Service set up a systematic evaluation of service delivery problems to the Native American communities. It was an attempt to resolve problems of geographic isolation, lack of access to health service facilities, and inadequate emergency services. OMB disapproved of the evaluation and information collection plan, referring in part to "apathetic respondent behavior."27 These and other examples demonstrate OMB's ability to manipulate federal programs, undermine the intent of laws, and decrease the protections and rights of citizens. OMB's activities in these areas involve technical and often complex matters which the public cannot ordinarily understand or resolve. OMB's review process is inaccessible, and its rulings are difficult to challenge even by agencies which have expertise in the areas concerned. OMB CONTROL OF GOVERNMENT REGULATIONS It has been no secret that President Reagan has made deregulation of industry a priority of his presidency. However, two facts are virtually secret: (1) OMB is the administration's most subtle and powerful agent in reducing the number of government regulations; and (2) OMB uses its authority to rewrite regulations. Central to this authority has been the issuance of two executive orders by President Reagan, E.O. 12291 and 12498, which gave OMB the power to effectively control agency decisions 28 Simply stated, since OMB controls federal regulations, OMB controls the laws. Regulations are the engines of federal law, determining the behavior of institutions and industries, and the strength of protections and rights 29 OMB's role in shaping life in America has been permeated by secrecy. Its unaccountable power and unreviewable authority are an unsuitable environment for decision-making in a democracy. In 1986, a Senate investigation of OMB's interference with agency regulations reached the following conclusions about the impact of President Reagan's expansion of OMB's authority: Executive Orders 12291 and 12498 together effectively exert a "cradle to grave" influence over the agency rulemaking process and there is widespread concern that the secrecy and delay imposed by OMB compromise the principles of openness and fairness under which agencies strive to develop their regulations 30 Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 In several instances these practices have caused OMB to perpetuate serious health risks in society, in others OMB has substantively altered regulations despite its lack of expertise in the subject area. A regulation affecting an airline may seem impersonal, but a regulation affecting a drug or a hazardous substance is not. In 1986, a federal court ruled that the government's unlawful delay in issuing regulations governing storage of hazardous waste in tanks was caused by OMB. The court further stated that: The use of E.O. 12291 to create delays and to impose substantive changes raises some constitutional concerns. Congress enacts environmental legislation after years of study and deliberation, and then delegates to the expert judgement of the EPA Administrator the authority to issue regulations carrying out the aim of the law. Under E.O. 12291, if used improperly, OMB could withhold approval until the acceptance of certain content in the promulgation of any new EPA regulation, thereby encroaching upon the independence and expertise of EPA. Further, unsuccessful executive lobbying on Capitol Hill can still be pursued administratively by delaying the enactment of regulations beyond the date of a statutory deadline. This is incompatible with the will of Congress and cannot be sustained as a valid exercise of the President's Article II powers.31 OMB's interference with regulations to decrease human health risks is nowhere more apparent than in the case of the fatal link between aspirin and Reye Syndrome (pronounced "rye") in children. In June 1982, the Department of Health and Human Services (HHS) announced its proposal to use radio advertisements and place warning labels on containers of aspirin warning parents of the possible dangers. OMB, positioned by the Reagan executive order to review the proposed regulation, chose to ignore authoritative medical findings by the U.S. Centers for Disease Control (CDC) and experts in the field of rare diseases, siding instead with the aspirin industry to prevent the labeling. Within five months of the proposed HHS campaign, OMB placed a phone call to the Secretary for Health and Human Services who withdrew the proposed regulation for further study.32 Strong evidence supported the need for preventive measures in 1982, if not earlier. Reye Syndrome is a life threatening condition that may follow influenza or chicken pox infections in children. At the end of 1981, the CDC, the Public Health Service facility in Atlanta, reported that an estimated 1,200 cases of Reye Syndrome occurred annually, and the death rate was 30% for reported cases. Permanent brain damage and other problems may occur even if the affected child does not die. However, Reye Syndrome is difficult to diagnose because its symptoms are easily confused with other illnesses, including meningitis, encephalitis, or even drug overdose hallucinations.33 Four studies conducted between 1978 and 1981 by the state health departments of Ohio, Michigan, and Arizona provided the most convincing evidence of a fatal link between aspirin use by children and Reye Syndrome. The Ohio study alone showed that children Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 who came down with Reye Syndrome were ten times as likely to have taken aspirin as those who did not contract the disease.34 The CDC reports prompted the Surgeon General, Dr. Everett Koop, to issue an advisory cautioning against the use of aspirin for children with influenza or chicken pox. The Surgeon General was joined by the CDC, the Food and Drug Administration, and the American Academy of Pediatrics in urging the government to warn parents and physicians of potential dangers. OMB, however, chose to listen to aspirin manufacturers, who met with OMB officials privately, and estimated that the industry could lose $100 million in sales. The aspirin makers commissioned their own study which concluded, amazingly, that there was no relationship between aspirin and Reye Syndrome. The FDA and even OMB's own analysts rejected these conclusions.35 OMB's final decision on warnings was not made, however, by its analysts but by its regulatory affairs chief. Ignoring all authoritative scientific evidence, affirmations of the fatal link between aspirin use in children and Reye Syndrome by the White House Office of Science and Technology Policy, and even OMB's own statisticians, the regulatory affairs chief told the Secretary of Health and Human Services to withdraw the proposed warnings. The decision was based on a conversation with the OMB official's wife, a pediatrician who did not accept the scientific conclusions, and the intense lobbying by the aspirin industry.36 Since 1982, the evidence supporting warning labels has increased. In 1983, the New England Journal of Medicine reported that Reye Syndrome was 10 to 20 times more common than doctors had believed. 7 In 1984, another study by the U.S. Centers for Disease Control concluded that children suffering from influenza or chicken pox were 12 to 25 times more likely to contract Reye Syndrome if treated with aspirin, than those who were not 38 In 1984, 190 cases of Reye Syndrome were reported, 26% of them were fatal, and many survivors suffered brain damage.39 Finally in 1985, the aspirin industry entered into an agreement with the Department of Health and Human Services to issue warning labels and public service announcements against aspirin use for flu or chicken pox in children. The industry remained reluctant, however, to state the relationship of aspirin to Reye Syndrome. If OMB had not interfered many children could have been saved from the fatal and permanently disabling effects of Reye Syndrome. A second example has been OMB's interference with the Environmental Protection Agency's proposed ban on certain asbestos products and uses. Asbestos is a known cancer-causing material used in buildings for insulation, floor and ceiling tiles, paints and joint compounds. EPA was supported in its efforts by scientific studies demonstrating the harmful effects of asbestos. Following an lengthy investigation, Congress acted to remove asbestos from schools and other public buildings. Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 In order to preserve commercial interests in asbestos, OMB disagreed with Congress and the EPA. OMB delayed its review of the EPA proposed ban for many months, stating that "cost/benefit" standards had not been met. According to this standard, OMB created a "discounting human lives saved" concept in order to decrease the value of the benefits of asbestos regulations, as weighed against the costs of the regulation to the industry. As stated by House Energy and Commerce Chairman John Dingell (D-MI) in a thorough review of OMB interference with EPA asbestos regulations: Under this discounting approach, the OMB's cost-benefit analysis of the proposed asbestos regulations computes human life at a base value of $1 million -- and then discounts that value over the 30 to 40 year latency period for asbestos-related cancer. This arbitrary and callous discounting methodology would reduce the value of life to a figure as low as $22,500, thereby undervaluing the benefits of health and safety regulations and thwarting the regulation of many toxic substances evaluated under the cost-benefit criteria of Executive Order 1229140 While the problem of public exposure to asbestos persisted, OMB worked secretly to undercut EPA's ban. OMB met twelve times with representatives from the asbestos industry,41 and was particularly responsive to officials from Canada, where asbestos is a major export product. In 1986, it was revealed that the director of OMB's regulatory review office met secretly with Canadian officials to assure them of OMB's intent to undercut the ban. In a subsequent communication, the OMB official stated that OMB "remains opposed to [the] banning and it will actively work toward this end in [the] regulatory process."42 In another example, the delay and burden of passing OMB's "cost/benefit" test posed a continued risk to human lives from chemically treated fruits and vegetables. In 1985, the Food and Drug Administration proposed regulations banning certain uses of sulfites which had led to twelve deaths. During a lengthy delay posed by OMB's "cost/benefit" review, a 44-year old woman died after eating sulfite-treated food in a restaurant 43 At a 1986 Senate hearing on OMB policy making, Senator Carl Levin (D-MI), Chairman of the Subcommittee on Governmental Affairs, stressed that, "These are obvious life and death decisions. Who's making these decisions has been hidden from the public."44 OMB's power and control over the federal government is unprecedented. It is especially ironic that an administration so outwardly committed to "decentralizing" the federal government has centralized its power at OMB so quickly. Within one month of entering office, President Reagan empowered OMB to oversee regulations proposed by federal agencies, requiring agencies to conform with OMB's "cost/benefit" analyses and gave OMB broad authority over the content and fate of regulations.45 In 1985, through an order implemented by then OMB official Douglas Ginsburg, President Reagan made Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 OMB responsible for the regulatory program of the federal government 46 As Congress observed in its comprehensive 1986 report: The Reagan Administration's designation of OMB's Office of Information and Regulatory Affairs (OIRA) as its central clearance arm for regulatory policy capitalized on a national mandate for regulatory relief and set in motion -- administratively -- the most sweeping reform of the regulatory process in 35 years 47 Since 1981 the requirement that agencies adopt OMB's substantive recommendations has permitted OMB to rewrite agency regulations and supplant them with the administration's own policies. The White House's commitment to this process was boldly demonstrated when Congress threatened action in 1986 to eliminate the OMB office responsible for regulatory review. OMB Director James Miller III pledged that, if Congress eliminated OMB's office for reviewing and rewriting regulations: We will do it in the White House. If [you take] the office out of the White House, we will do it in the Justice Department. If you take the office out of the Justice Department, we will do it in Commerce.` Just what does OMB do that it refuses to stop? An analysis of OMB regulatory review from 1981-1986 by OMB Watch, revealed that ten federal agencies have been subject to the harshest OMB action. In these agencies, 30%-40% of the regulations proposed have been either altered or not approved by OMB49 The top ten agencies on the "OMB Hit List" include: s Department of Labor ? Department of Education ? Department of Housing and Urban Development s Department of Health and Human Services * Department of Commerce $ Department of Transportation s Environmental Protection Agency Small Business Administration Department of Energy ? Veterans Administration Is it possible for a federal agency, created and staffed for overseeing management and budget issues, to evaluate the substance of regulations at these and other agencies? The 700-page Regulatory Program issued by the White House shows that by 1986 OMB was reviewing and rewriting a diverse range of regulations in areas which it had no expertise. These included civil rights,50 mental retardation,51 and cancer 52 In addition to lacking expertise in these and other subjects, OMB's activity remains unaccountable, and its business is conducted in virtual secrecy. Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 OMB's authority to review proposed regulations is coupled with its authority over other proposed agency activity including federal studies and surveys. Such studies can range from air quality to welfare reform, and often have a important impact on improving the quality of the environment, the safety of the workplace, and the assurance of a good standard of living. Just as in the regulatory area, OMB has the power to rewrite, redesign, or simply reject proposed studies. Many observers believe that OMB's interference with federal studies constitutes a more egregious abuse of its authority than in the regulatory area 53 This is because it prevents the government from identifying new developments and problems, many of which are within the scope of protections required by law. OMB's review of vital studies related to health and the environment have come under especially sharp criticism. In 1986, Congressman Ted Weiss (D-NY), Chairman of a House subcommittee investigating OMB review practices, found that OMB was: seven times more likely to reject or revise studies with an environmental or occupational health focus than to reject or revise studies that focused on infectious or other diseases. In addition, studies focusing on reproductive health hazards were more likely to be rejected by OMB than were other types of studies.54 In 1987, scientists from the Harvard School of Public Health examined OMB's review of 51 studies proposed by the U.S. Centers for Disease Control during 1984-1986. The report concluded that OMB's review process was: poorly documented and often demonstrated a dismaying ignorance of the fundamentals of science and public decisionmaking ... the health policy implications are serious; OMB is clearly interfering with the substance of CDC research. OMB has delayed, impeded, and thwarted governmental research efforts designed to answer public demands for information on serious public health questions.55 OMB has abused its authority by rejecting and delaying timely and important studies. It has bowed to pressure from affected industries while failing to incorporate the findings of authoritative researchers and specialists. Most distressing, however, are the human consequences of OMB's actions. The most compelling evidence comes from specific cases of OMB review. OMB's review of federal studies in the area of occupational illness has had especially important consequences. In 1984-85, OMB rejected four studies of occupational health hazards. Three were resubmitted and eventually approved contingent on adopting OMB's changes.56 Occupational health hazards cause the death of an estimated 100,000 Americans annually, and cause sickness among 400,000 more.57 Health risks to pregnant women in the workplace are a particularly growing concern. Recent statistics show that Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 63% of married American women are employed during the year before giving birth. More than 300,000 of these women work in occupations where they risk exposure to substances known to cause birth defects.58 Study of Video Display Terminals. One controversial OMB decision concerns a study of the reproductive health hazards to women using video display terminals (VDTs) on computers. Congress reported that "approximately 10 million American women use VDTs every day making this a very important issue to American workers."59 The National Institute for Occupational Safety and Health (NIOSH) had been planning a study of women using VDTs since 1982. The study was triggered by reports of birth defects and miscarriages associated with women's VDT use, and the federally funded study was planned as the first major scientific research endeavor to examine this health issue. The study design was completed in 1985, but OMB refused to approve it. NIOSH amended the study to meet OMB's concerns but in 1986 OMB responded by offering a conditional approval only if 69 questions were omitted. Many of the questions were essential to measure the existence of stress at work and problems of fertility. Congress became alarmed at OMB's interference with the NIOSH study and, after a thorough investigation, found many disturbing aspects of OMB's review of the VDT study: OMB's redesign of the study conflicted with established methods for evaluating occupational stress; OMB had adopted design changes to reduce the potential impact on the corporation whose workers were to be studied; the target corporation had provided OMB with a new design by two consulting scientists, neither of whom specialized in occupational stress or women's health; and one of the target corporation's consulting scientists later stated that their conclusions did not support the changes proposed for the NIOSH study. Study of Infant Mortality Rates. A second case involves the issue of infant mortality rates in the United States and illustrates the unresponsiveness of government to address important problems because the decisions are placed in the hands of OMB. In 1984, the Children's Defense Fund, analyzing census records determined that the earlier trends of lower infant mortality rates had failed to continue in recent years. In order to further explore the problem, the Public Health Service proposed a study of the relationship between federal funding cuts and infant mortality rates. The proposed study sought to determine whether maternal and child health and nutrition programs were inadequately funded and a cause of higher infant mortality rates in some states. The administration had challenged the Children Defense Fund's findings when first released, attributing them to statistical fluctuations. In 1985, OMB disapproved the Public Health Service study under its regulatory review powers, as a significant regulatory act that was "inconsistent with the Administration's policies." Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90G01353R002000030039-9 The enormous role which OMB has been given in government between 1981-1987 is evidenced not only by the breadth of authority, but by its application to everyday concerns to Americans. It may seem ironic that such power has been centralized in one White House office by a president who has promised the nation a "new federalism" of decentralized government. The behavior of OMB has shown that nothing could be farther from the truth. No one is surprised to learn that government is powerful, but it is disturbing to discover that so much power has been exercised in secrecy. While positioned close to the president, OMB operates from deep within an already inaccessible bureaucracy. Just as in other improper uses of government secrecy, OMB has avoided accountability and undercut the checks and balances of our constitutional system. It has made decisions without democratic participation, and has protected private interests, often negotiated behind closed doors. Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90G01353R002000030039-9 Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90G01353R002000030039-9 Conclusion and Recommendations Government secrecy affects the lives of all Americans. In today's complex world, what we don't know can hurt us. The importance of secrecy to the security of our nation is undeniable; however excessive secrecy is a serious national problem. It permeates most policies under the guise of making our nation secure and effects controls over a vast array of people and practices well beyond the traditional realm of national security. Moreover, government secrecy has become increasingly institutionalized throughout our government without any sensitivity or attempt to reconcile it or balance it with democratic values. Indeed, it has been expanded without regard to constitutional protections and has been used to restrict and circumvent the very laws that Congress passed to promote an informed citizenry and a responsive government. When secrecy is used to bypass the consensus of Congress and citizens, then our constitutional system is also bypassed. When information is not disclosed to the public, the government has failed to exercise the best means of maintaining the public trust and dispelling distrust. When government activity is conducted in secret to prevent public opinion from mobilizing, it is virtually ensuring that once mobilized, public opinion will oppose the activity. Secrecy often seems to operate as a shapeless force, but it can regularly be identified in its consequences. Today it is seen in an unrestrained use of unaccountable power to restrict information, control communication, escape public scrutiny, and restrict public debate. Our nation's stability is weakened by covert actions pursued with indifference to the law, "confidential" spending involving billions of dollars, and decisions affecting human health and safety made in isolation by officials who possess authority but no expertise in the substance of the regulations. The years 1981-1987 -- the eve of our Constitution's bicentennial -- stand as the most recent chapter in our nation's history when the confidence of Americans in their government has been shaken because citizens are given the very lowest priority among those who "need to know." It is incumbent upon a democratic government to maintain policies permitting citizens to have broad access to information, and wide dissemination of information. The public also has a responsibility to demand that government fulfill these democratic ideals. The urgency, however, remains in the government, where policies improving our democratic system and reducing institutional secrecy can be achieved by the president and by Congress. For this reason, the recommendations presented here are addressed to presidential candidates and members of Congress. Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90G01353R002000030039-9 Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 74 GOVERNMENT SECRECY: DECISIONS WITHOUT DEMOCRACY RECOMMENDATIONS FOR CANDIDATES FOR PRESIDENT RESPECT FOR THE LAW IN GOVERNMENT In this year of the Bicentennial of the Constitution, it is important that the president, government officials, and citizens rededicate themselves to respect for the law as the highest of priorities. Indeed, the president must demonstrate respect for the law in the operation of government. The president is required by the Constitution to "faithfully execute the laws of the United States." To reduce excessive government secrecy, execution of the law requires compliance with the laws including: accountability in areas ranging from covert operations to wasteful spending; citizen access to information; constitutionally protected rights of expression and association; and congressional oversight of the executive branch and its agencies. The executive branch must work closely with Congress to improve procedures and safeguards concerning the creation, notification, and accountability of covert activities. Moreover, specific improvements in the intelligence oversight process are essential. NATIONAL SECURITY DECISION DIRECTIVES National Security Council directives, such as the National Security Decision Directives of the Reagan administration, should be carefully drafted so that they do not circumvent the law or the oversight role of Congress. Unless classified, they should be published in the Federal Register, like other executive orders. The president must be willing to share such directives with the appropriate committees of Congress, whether classified or unclassified. Covert operations should be limited. By their very nature and as a matter of policy covert operations are not accountable to many in government. They lack the broad congressional or popular support necessary for actions necessary to protect America's vital interests. Furthermore, even the bureaucracies required to implement covert plans, such as those of the Department of Defense or the Department of State, often will not immediately lend their essential support. The inevitable result is that a dangerously small circle of zealous actors are tempted by secrecy to unilaterally commit the nation to perilous actions. Information classification is a powerful authority of the president affecting the entire federal government. The president, as administrator of the laws and as Commander in Chief, has broad authority to issue an executive order on classification of information. However, Congress also has a role in this area. Executive Order. A new executive order, returning to the 30-year trend towards openness that was halted by President Reagan, should be developed in conjunction with Congress. That executive order should be formulated in a more open manner and return to a balanced policy that includes disclosure of information as practiced by earlier Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 administrations. Decreasing the amount of information classified should be pursued in several ways: * continued reduction of original classification authority. * reduction of derivative class- ification authority. ? reinstitution of automatic schedules for information declass- ification. ? elimination of reclassification authority. Several steps should be taken to produce more open formulation of the executive order: ? public announcement of plans to revise security classification rules. ? public circulation of the draft order for sixty days for public comment and subsequent consideration of these comments by the president. s provide the proposal to Congress with sufficient time to permit interested congressional committees to consider the draft order, hold hearings, and prepare comments. ? requiring the National Security Adviser or other officials charged with policy responsibility for presidential security classification to provide written findings detailing the problems that any proposed changes in security classification policies and practice are intended to solve. They should also provide written explanations to Congress and to the public as to the purpose and scope of such proposed changes. If the findings or explanations are classified, then a classified version should be provided to congressional committees and an unclassified version should be made public. Special Access Programs. Confusion over the number and use of special access programs and codes requires internal clarification and accountability. New policies must be created to govern these programs. Presidential guidelines should be developed within the executive order on classification for controlling the creation, use, and accountability of special access programs. These should set forth the purposes of such programs -- from mere routing of information to protecting intelligence sources and methods. Guidelines should limit the authority for use of special access programs. Agency heads should not be given the broad authority for creation and evaluation as created by the current executive order. Information Security Oversight Office. The Information Security Oversight Office (ISOO) is a joint office of the General Services Administration (GSA) and the National Security Council (NSC). It is responsible for monitoring the classification of information in the government and issues an annual report to the president. The task is an enormous one because of the millions of classified documents and thousands of employees engaged in the process of classification. ISOO requires a larger staff to exercise its oversight function. The staff is currently comprised of no more than fifteen individuals including the director. Many of the oversight responsibilities of the office simply go unfulfilled because of staff shortages. Individual agencies are consequently allowed too much evaluation discretion over their own classification activity. Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 ISOO should maintain an increased number of field staff and auditors to examine classification activity in government facilities outside of Washington, D.C. ISOO should be granted greater authority to identify and audit "special access" programs within the government. The office should also be utilized to evaluate specific agencies responsible for overclassification. In this sense, the ISOO should not simply be given a list of narrow, routine oversight responsibilities but should be authorized to conduct a variety of discretionary and evaluative long-term oversight projects. Lastly, the ISOO annual report, now directed specifically to the president, should be formally sent by the ISOO Director to the Speaker of the House and the Senate leadership, to be referred to minority leaders and pertinent oversight committees. RESTRICTIONS ON UNCLASSIFIED INFORMATION National security controls have been applied to activity ranging from scientific conferences to computerized information. This practice should be the focus of review to identify the questionable basis of such action. It is a matter of much dispute whether the export laws and arms control regulations were intended to apply to traditional scientific communication, and important First Amendment issues are at stake. In addition, the government has extended its control over information that is neither classified nor necessarily government property through policies that restrict access to computerized information. President Reagan's National Security Decision Directive 145 encompasses activity in libraries, universities, and corporations. This directive should be withdrawn, and to the extent that legitimate concern exists over "sensitive, but unclassified information," there should be a full-fledged debate in Congress and with the public over the subject. Prepublication review of government employees violates the First Amendment by imposing unconstitutional prior restraints. A thorough review must be conducted of the current policies and practices requiring certain government employees, federal contractors, and federally funded university researchers to sign lifetime prepublication review contracts. Such policies, to the extent that they are necessary, must exist only to serve a narrowly drawn national security objective. These policies should be reasonably calculated to ensure that the experience of government officials and employees will be available for public discussion of American policy, that scientific and technological development is not hindered, and that First Amendment principles of free speech and the right to petition government are not denied. The current administration has effectuated its goals in this area by the use of Form 4193, National Security Decision Directive 84, and special agency contracts. The prepublication review policies outside of intelligence agencies, lifetime and otherwise, should be terminated. Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 Presidential support for the Freedom of Information Act is essential and practices designed to decrease information disclosure must be rejected. The tone and practices of the Reagan Administration must be criticized for keeping more information from citizens and undercutting accountability of elected officials and the bureaucracy. A special evaluation must be made of the function and authority of the Department of Justice regarding the FOIA. This includes the strong role with which legislative attacks on the FOIA have been mounted by the current Office of Legal Policy (OLP) and the extensive guidelines which OLP has imposed on all federal agencies to interpret new OMB fee guidelines for the use of FOIA. In particular, these guidelines should be revoked. Administration of the FOIA in the agencies would be improved by increasing resources for handling FOIA requests. In addition, the idea for creating a separate FOIA/Information ombudsman office should be explored. Lastly, special attention should be given to the need for new policies and arrangements for handling electronic information and automated records pursuant to the FOIA. OFFICE OF MANAGEMENT AND BUDGET OMB's extraordinary power should be carefully reviewed and aligned with its actual statutory authority. Action should be taken to reduce both the power and personnel of OMB. Executive orders 12291 and 12498 allow OMB regulatory review over federal agencies, federal information policy related to the collection and dissemination of government information, and power to determine the fate of proposed federal studies. These executive orders have circumvented statutes designed to allow citizens to interact with federal agencies and have allowed the executive branch to conduct regulatory rule making in secret. They have supplanted the substantive knowledge of agencies and affected communities with executive branch policies lacking in subject matter expertise. They have led to excessive secrecy and abuse of agency authority. Health risks have been perpetuated, the work place has become less safe, and government resources for citizens have been eliminated. Both executive orders 12291 and 12498 should be repealed. Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 RECOMMENDATIONS TO THE UNITED STATES CONGRESS The United States Congress plays a multifaceted role in maintaining a balance between legitimate and excessive secrecy. Congress also preserves the rights of Americans to have access to government information and participate in an informed way in the democratic process. It does so through its oversight of federal agencies and their implementation and enforcement of our nation's laws. Congress has investigative authority to explore and uncover corrupt and improper practices, and legislative power to make necessary corrections in the law. Regardless of whether the president addresses the issues outlined in the manner described above, Congress must take the initiative in ensuring such reforms. Indeed, in the aftermath of the Tower Commission Report and that of the House and Senate select committees investigating the Iran-contra affair, Congress may well be on its way toward re-evaluating and modifying existing procedures and safeguards concerning the creation, notification, and accountability of covert intelligence activities. Congress has responded effectively in the past, balancing the need to protect vital secrets with the public's right to be informed of government activities. Congress has demonstrated its ability to create limited statutory restrictions on information, comparable to those in the president's order on security classi- fication, with the Atomic Energy Acts of 1946 and 1954. Moreover, in 1973 the House Committee on Government Operations formally recommended the creation of statutory security classification policy and procedure. Congress indicated it was willing to limit the prepublication review policy of NSDD 84 in 1983. Thus, the capability of Congress to act in any of these areas should not be doubted, and there is no reason to believe that Congress would be reluctant to address the other remaining issues including oversight of national security directives, restrictions on unclassified information or the extraordinary power assumed by OMB over information and regulatory matters. RECOMMENDED CONGRESSIONAL REFORMS, HEARINGS, AND INVESTIGATIONS Congress should consider holding hearings to examine how its various responsibilities are affected by current secrecy practices: first, to examine how its checks and balances role is affected; second, to evaluate its oversight of federal agencies; third, to hold hearings on specific laws, measures, and federal agencies. The status of our information access laws and protections against excessive government secrecy should be examined, and particular laws and legislation should be recognized for their impact. Suggested topics for investigation, inquiry, and reform include: (1) What is the scope of the president's "national security" power? What con- stitutional and statutory authorities exist, and how may the executive branch operationally protect national security interests? Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 CONCLUSIONAND RECOMMENDATIONS (2) Is all executive branch activity pursued for national security purposes? This includes not only evaluation and review of current congressional requirements for notification and reporting of activity but also precise identification by Congress of the breadth of related activity. NATIONAL SECURITY DECISION DIRECTIVES Specific reforms should include required reporting of presidential national security directives, such as President Reagan's National Security Decision Directives to the appropriate oversight committees. Furthermore, all directives authorized by the president and his appointees furthering national policy through mobilization of resources, funds, and personnel should be reported to Congress. Improved management of information classification can result from improvements to the oversight office. The Information Security Oversight Office, a joint office of GSA and the National Security Council, is understaffed for the immense job it must perform. A current staff of 12-15 is inadequate and explains, in part, its inability to exercise many of its useful oversight functions. Authorization and appropriation committees of Congress should study and recommend improvements in this area. The use of special access programs must be evaluated by Congress for purposes of accountability and the prevention of fraud, waste, and abuse. An evaluation should include a review of the authority for creating such programs, as well as their use, duration, and termination. Classification of information should be examined by Congress with a view to reforms and possible legislation of a classification program. Management of the system could still be administered through the executive branch. While the executive branch has dominated control of information through classification, Congress can responsibly develop alternative policy. Overclassification is a direct cause of decreased flow of information and the unmanageable information systems in the federal government and a possible factor in the growth of espionage cases. These problems, however, require greater congressional involvement in the origination of classification programs. Congress must scrutinize classified spending by the executive branch, both in the "black budget" for defense spending and for intelligence activity. Legislation should be developed to improve the knowledge of Congress and to ensure that defense projects are necessary, feasible, well managed and free of waste, fraud, and abuse. Congress should hold hearings and develop legislation to control the use of prepublication review, nondisclosure agreements, and polygraph testing of government employees. Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90G01353R002000030039-9 GOVERNMENT SECRECY: DECISIONS WITHOUT DEMOCRACY SCIENTIFIC AND TECHNOLOGICAL INFORMATION The use of laws such as the Export Administration Act and arms control regulations to control scientific information and communication must be addressed. To the extent that these laws were never intended to control the communication of ideas, much less private ideas or unclassified information, Congress must establish their proper use by the executive branch. Efforts to place restrictions on citizens and access to unclassified information should be scrutinized. Congress should support legislation (H.R. 145) developed in 1987 to improve computer security in and outside government. Particular efforts should be made to hold hearings and develop legislation, if necessary, to protect the open communication of scientific and technological information. Congress should amend existing laws used to exclude foreign visitors from entering the United States on ideological grounds, as well as those laws used to register foreign films and other material as "political propaganda." The Freedom of Information Act requires vigilant protection as the single statutory right of access to information about the federal government. Its purpose as a disclosure law, not an information withholding instrument, must be ensured for the future. Congress should determine the extent to which its recent action allowing OMB to create fee schedules and guidelines are consistent with its responsibility in this area. Furthermore, Congress must determine the extent to which recent Justice Department efforts to further shape these policies have been implemented. The Justice Department lacks authority to create binding policies in this area. THE OFFICE OF MANAGEMENT AND BUDGET Congress should examine the role of the Office of Management and Budget to determine the exact scope of its powers and authority created during the Reagan administration. These activities must be made consistent with the statutory autho- rity of OMB under the Paperwork Reduction Act and other laws, including the Administrative Procedures Act. Congressional authorization and appropriations for OMB should be used to restrict OMB to its limited lawful role. Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90G01353R002000030039-9 Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 Notes 1. Taking the Stand: The Testimony of Lt. Col. Oliver L. North, (New York: Pocket Books, 1987), p. 443. 2. Letter to W.T. Barry, 1822. 3. The Atomic Energy Commission (1946); The National Security Council (1947); The Central Intelligence Agency (1949); The Department of Defense (1949); Executive Branch Information Classification (1951); The Invention Secrecy Act (1951); The National Security Agency (1952). 4. The Chronology, (New York: Warner Books, 1987), p.7. See also: Washington Post, 5 May 1983. 5. Clyde R. Mark, "Iran-Contra Affair: A Chronology," Congressional Research Service, Rept. No. 86-190-F. (Washington, D.C.: Library of Congress, 2 April 1987, Updated 29 April 1987), p. 5. "Rebel Fund Diversion Rooted in Early Policy," Washington Post, 1 January 1987, p. Al, A24. 6. Garry Wills, "Power Unchecked," Washington Post Magazine, 28 June 1987, p. 31. 7. Letter to William Charles Jarvis, 28 September 1820. Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90G01353R002000030039-9 1. National Security Decision Directives (NSDD) under President Reagan; Presidential Directives (PD) under President Carter; National Security Decision Memorandums (NSDM) under Presidents Ford and Nixon; National Security Action Memorandums (NSAM) under Presidents Kennedy and Johnson; and National Security Council Presidential ("P") and "Mill" Papers under Presidents Truman and Eisenhower. Source: Judicial, Fiscal, and Social Branch. The National Archives. Washington, D.C. 2. Special Committee on National Emergency and Delegated Emergency Powers, "National Emergencies and Delegated Emergency Powers," U.S. Senate, 94th Congress, 2nd Session, S. Rept. No. 94-922, 28 May 1976, p. 16. 3. "State Dept. Acted to Block U.S.-Egypt Attack on Libya," Washington Post, 20 February 1987, p. Al, A27. 4. National Security Decision Directive 159, "Covert Action Policy Approval and Coordination Procedures," 18 January 1985. 5. Bob Woodward, VEIL: The Secret Wars of the CIA 1981-1987 (New York: Simon and Schuster, 1987), p. 394. 6. Office of Information Policy and Security Review, National Security Council, Letter from the Director, 26 April 1984. 7. National Security Decision Directive 1, "National Security Council Directives," 25 February 1981, Revised 17 December 1981. 8. National Security Decision Directive 23, "U.S. Civil Defense Policy," 3 February 1982. National Security Decision Directive 25, "Preparations for the Economic and NATO Summits June 1982," 12 February 1982. National Security Decision Directive 60, "Preparations for the 1983 Summit," 9 October 1983. National Security Decision Directive 145, "National Policy on Telecommunications and Information Systems Security," 17 September 1984. National Security Decision Directive 94, "Commercialization of Expendable Launch Vehicles," 16 May 1983. National Security Decision Directive 68, Nuclear Materials, 18 November 1982. (official title not public). Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90G01353R002000030039-9 Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 NOTES : THE PRESIDENT'S "SECRET LAWS" 83 National Security Decision Directive 138, International Terrorism, 1984. (official title and exact date not public). 9. National Security Decision Directive 84, "Safeguarding National Security Information," 11 March 1983. National Security Decision Directive 196, "Counterintelligence/Countermeasure Implementation Task Force," 1 November 1985. 10. National Security Decision Directive 100, "Enhanced U.S. Military Activity and Assistance for the Central American Region," 23 July 1983. 11. John Prados, Presidents' Secret Wars, (New York: Wm. Morrow & Co., 1987). 12. Ibid., pp. 371, 379. See above, n. 5, pp. 173, 174, 187. 13. "Rebel Fund Diversion Rooted in Early Policy," Washington Post, 1 January 1987, p. Al, A24. 14. Executive Order 12333, Sec. 3 (4 December 1981). The order provides that "no agency except the CIA ... may conduct any special activity (elsewhere defined to include covert actions overseas) unless the President determines that another agency is more likely to achieve a particular objective." In its final report issued in 1987, the Iran-contra Committee concluded: "There was no Presidential determination that the NSC staff should conduct the Contra covert operation, and thus the NSC staff's covert action in support of the Contras violated the President's executive order." "Report of the Congressional Committees Investigating the Iran-Contra Affair," H. Rept. No. 100-433 and S. Rept. 100-216, 100th Congress, 1st Session, November 1987, p. 416. 15. Testimony by John Poindexter, Iran-contra Hearings, Federal News Service transcript, 20 July 1987, p. 12-1. 16. "Pentagon Fumbled on TOWS for Iran," Washington Post, 1 August 1987, p. All. 17. "Weinberger Highlights a Problem: Did '85 Sales to Iran Break Law?" Washington Post, I August 1987, p. A10. 18. See above, n.6. 19. Taking the Stand: The Testimony of Lt. Col. Oliver L. North, (New York: Pocket Books, 1987), p. 527. Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90G01353R002000030039-9 84 NOTES 20. The Intelligence Oversight Act requires that the intelligence committees of Congress be provided on request "any information or material concerning intelligence activities" in the possession of the intelligence community. 21. Prepared testimony of Rep. Anthony C. Beilenson, Committee on Government Operations Subcommittee on Legislation and National Security, 17 March 1987, p.1. 22. This system began in 1907 and publication has been required since passage of the Federal Register Act in 1935 [44 U.S.C.1505(a)]. 23. Prepared statement of Harold Relyea, Specialist in American National Government, Congressional Research Service, Library of Congress. Before the House Committee on Government Operations, 17 March 1987, p. 2. 24. Angus MacKenzie, "Fit To Be Tied," Quill, July/August 1985, p. 13. 26. General Accounting Office, "Information and Personnel Security: Data on Employees Affected by Federal Security Programs," GAO/NSIAD-86-189FS, September 1986, p. 3. 27. National Security Council, "National Policy on Protection of Sensitive, but Unclassified Information in Federal Government Telecommunications and Automated Information Systems," NTISSP No. 2, 29 October 1986. 28. The Computer Security Act of 1987, H.R. 145. Introduced 6 January 1987. Passed by the House of Representatives 22 June 1987. "To provide for a computer standards program within the National Bureau of Standards, to provide for Government-wide computer security, and to provide for the training in security matters of persons who are involved in the management, operation, and use of Federal computer systems, and for other purposes." "Reagan Rebuffed on Computer Files: House Bill Wrests Control of Access From the Military," New York limes, 23 June 1987. 29. Ross Gelspan, "Reagan Seeks Controls On Database Access," Boston Globe, 20 April 1987, p. 36-7. Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90G01353R002000030039-9 Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 "NATIONAL SECURITY" : PASSWORD FOR SECRECY 85 NOTES : "NATIONAL SECURITY" : PASSWORD FOR SECRECY 1. From John Shattuck, "National Security a Decade after Watergate," Democracy 3 (Winter 1983): 57. 2. Lou Cannon, "The High Cost of Secrecy," Washington Post, 20 July 1987, p. A2= 3. E. O. 8381, 5 Federal Register. 1145 et seq. (26 March 1940). Authority derived from 1938 statute concerning the security of armed forces installations and equipment and "information relative thereto." (52 Stat. 3)(1938). Power of enforcement was still vested in the Secretary of War and the Secretary of the Navy. 4. E.O. 10104, "Definitions of Vital Military and Naval Installations and Equipment," 15 Federal Register, 597 et seq. (1 February 1950). Truman added a fourth designation, "Top Secret," which paralleled American information classification categories with those used by our allies, principally the British. 5. E.O. 10290, "Prescribing Regulations Establishing Minimum Standards for the Classification, Transmission, and Handling, by Departments and Agencies of the Executive Branch of Official Information Which Requires Safeguarding in the Interests of the Security of the United States." 16 Federal Register, 9795 et seq. (27 September 1951). 6. President Eisenhower issued E.O. 10501, "Safeguarding Official Information in the Interests of the Defense of the United States," 18 Federal Register 7049 et seq. (9 November 1953). President Kennedy issued E.O. 10964, 27 Federal Register 8532 et seq. (20 September 1961). President Nixon issued E.O. 11652, "Classification and Declassification of National Security Information," 37 Federal Register 5200 et seq. (10 March 1972). President Carter issued E.O. 12065, 43 Federal Register 28949 (2 July 1978). President Reagan issued E.O. 12356, "National Security Information," 47 Federal Register 14874 et seq. (2 April 1982). 7. New York Times Company v. United States, 403 U.S. 713 at 729 (1971). 8. 1979 14,850,000 1984 19,607,736 1980 16,058,764 1985 22,322,895 1981 17,374,102 1982 17,504,611 1983 18,005,151 Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 Figures for 1979-1980: Annual Report to the President 1980-1981, Information Security Oversight Office, Washington, D.C., p. 10. Figures for 1980-1982: Annual Report to the President FY 1982, Information Security Oversight Office, Washington, D.C., p. 8. Figures for 1981-1985: Annual Report to the President FY 1985, Information Security Oversight Office, Washington, D.C., p. 13. For 1986 the Information Security Oversight Office (ISOO) reported "statistical aberrations" in several categories including "Top Secret," derivative, and combined classification. See: ISOO, Annual Report To The President, FY 1986, Washington, D.C., pp. 16-19. 9. Glenn English, "Congressional Oversight of Security Classification Policy," Government Infonnation Quarterly, No. 2 (1984), p. 166. The author is Chairman of the Government Operations Subcommittee on Government Information and Agriculture in the House of Representatives. 10. E.O. 12065 at Sec.1-101, issued by President Carter. E.O. 11652, 37 Federal Register, 10053 (19 May 1971), issued by President Nixon. Implementing directive contained policy. 11. E.O. 12356, at Sec. 1.1(c). 12. E.O. 10964, issued by President Kennedy, 27 Federal Register 8532 (20 September 1961). E.O. 11652, "Classification and Declassification of National Security Information," Issued by President Nixon, 37 Federal Register 5200 (10 March 1972). 13. "Security Classification Policy and Executive Order 12356," Committee on Government Operations, 97th Congress, 2nd Session, House Rept. No. 97-731, (12 August 1982), pp. 24-5. 14. E.O. 12356 at Sec. 3-3. 15. E.O. 12356 at Sec. 3.4. 16. E.O. 12065 at Sec. 1-607. Issued by President Carter. 17. E.O. 12356 at Sec. 1.6(b). 18. James Bamford, The Puzzle Palace, (New York: Penguin Books, 1983). Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 NOTES : "NATIONAL SECURITY' : PASSWORD FOR SECRECY 87 19. Alan Adler, "Dangerous Information," First Principles, 7 (July 1982), p.3. Center for National Security Studies, Washington, D.C. 20. "Agency Demands Documents Back," New York Times, 14 March 1982. See: "Security Classification Policy and Executive Order 12356," Government Operations Committee, 97th Congress, 2nd Session, House Rept. No. 97-731, (12 August 1982), p. 22-3. 21. "CIA Veteran Decries Effort to 'Reclassify' Material in His Book," Washington Post, 4 April 1982, p. A12. 22. Letters from The National Archives to Mr. Stephen Green on file in the House of Representatives, Government Information Subcommittee on Government Information, Justice, and Agriculture, Washington, D.C. "Air Force Pulls Back on '53 Secret Papers," Washington Post, 5 April 1982, p. AS. 23. American Library Association v. William Odom, Director, National Security Agency, U.S. Court of Appeals (D.C. Circuit) No. 86-5337 (8 May 1987), p. 5. 24. E.O. 12356 at Sec. 1.6.(b). 25. See above, n.9, p. 171. 26. E.O. 12356 at Sec.1.6(c). 27. E.O. 12065 at Sec. 3-303. 28. E.O. 12065 at Sec. 3-301. 29. General Accounting Office, "Continuing Problems in DOD's Classification of National Security Information," 12 (LCD-80-16), (26 October 1979). 31. "How Public Remarks Became Classified Data," Washington Post, 20 February 1987, p. A18. 32. Committee on Government Operations, "Security Classification Policy and Executive Order 12356," 97th Congress, 2nd Session, House Rept. No. 97-731 (12 August 1982), pp. 27-49. 33. Permanent Select Committee on Intelligence, "United States Counterintelligence and Security Concerns--1986," House of Representatives, 100th Congress, 1st Session, Rept. No. 100-5, (4 February 1987). Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 34. Senate Committee on Foreign Relations, U.S. Congress, "The Gulf of Tonkin, the 1964 Incidents," 90th Congress, 2nd Session, (20 February 1968), pp. 38-9. David Wise, The Politics of Lying, (New York: Random House, 1973), pp. 58-9. 35. E.O. 11652, "Classification and Declassification of National Security Information and Material," issued by President Richard Nixon, Section 9, 2 March 1972. 36. E.O. 12356 at Sec. 4.2. This provision gives authority to agency heads to "create special access programs to control access, distribution, and protection of particularly sensitive information classified pursuant to this Order or predecessor orders." It also grants the Director of Central Intelligence control over all special access programs related to "intelligence activities, or intelligence sources or methods." 37. Washington Post, 19 July 1987, Classified Ads, Section 905. 38. "Dancing in the Dark," National Journal, 11 April 1987, p. 867. 39. John Loftus, The Belarus Secret, (New York: Knopf, 1982). The Office of Special Investigations (OSI) of the criminal division of the Department of Justice, also known as the Nazi war crimes unit, revealed the State Department's responsibility for assisting Nazi war criminals to enter the United States and become U.S. citizens. The OSI investigators had to obtain special clearances "above Top Secret" to finally uncover the truth. Over time records of the State Department, the FBI, Immigration and Naturalization Service, and others became available only through special access clearances, even to investigators in Congress who were told that no such files existed. 40. E.O. 12356. at Sec. 4.2(b). 41. See above, n. 38, p. 867, 870. 42. Lee Feinstein, "Secret Pentagon Budget Is Bulging: 200 Items On Current 'Black' List," Cleveland Plain Dealer, 20 February 1987. 43. General Accounting Office, "Information and Personnel Security: Data on Employees Affected By Federal Security Programs, GAO/NSIAD-86-189-FS, (September 1986), p. 11. 44. See above, n. 18. 45. See above, n. 38, p. 867. 46. Ibid., p. 871-2. Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90G01353R002000030039-9 NOTES : "NATIONAL SECURITY" : PASSWORD FOR SECRECY 89 47. See above, n. 42. 48. Senator Paul Simon, "The Pentagon's Black Budget," Congressional Record, 18 March 1987, S3418. 49. See above, n. 38. 50. See above, n. 38, p. 873. 51. Louis Fisher, "Confidential Spending and Governmental Accountability," George Washington Law Review 47 (January 1979): 347. 52. United States v. Richardson, 418 U.S. 166,179 (1973). 53. Harrington v. Bush, 553 F.2d 190,194 (D.C. Circuit, 1977). 54. See above, n. 38 p. 869. 55. See above, n. 38, p. 869. 56. See above, n. 48. Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90G01353R002000030039-9 Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 90 NOTES NOTES: GOVERNMENT EMPLOYEES : SWORN TO SECRECY 1. Department of Justice, "Presidential Directive On Safeguarding National Security Information," (11 March 1983), Issued by Attorney General William French Smith. 2. Department of Justice, "Interdepartmental Report on Unauthorized Disclosures of Classified Information," (31 March 1982). 3. Angus Mackenzie, "Fit To Be Tied," Quill, July/August 1982, p.13. 4. "White House Acts To Ease Concerns About Polygraphs," New York Times, 21 December 1985, p. Al. 5. "Secrecy Pledges Challenged Openly," Washington Post, 2 September 1987, p. A21. 6. General Accounting Office, "Polygraph and Prepublication Review Policies of Federal Agencies," (GAO/NSIAD-84-134), Washington, D.C. (11 June 1984), Report to Rep. Jack Brooks, Chairman, Government Operations Committee. See: Mark H. Lynch, "Secrecy Agreements and National Security," Government Information Quarterly, No.2, (1984), p.139. 7. ISOO, Annual Report to the President, FY 1986. Appendix B-Classified Information Nondisclosure Agreement FY 1986, p.35. 8. "Air Force Aide Balks at Secrecy Pact," New York limes, 4 July 1987. 9. "Air Force Whistle-Blower Could Lose Clearance," Washington Post, 4 July 1987. 10. General Accounting Office, "Information and Personnel Security: Data on Employees Affected by Federal Security Programs," (GAO/NSIAD-86-189FS) Washington, D.C. (September 1986), p. 2. 11. Classified Information Nondisclosure Agreement (SF-189), Includes Sample Indoctrination Briefing, Legislative and Executive Authorities and Questions/ Answers. Prepared by the Directorate of Security Plans and Programs Office of the Deputy Under Secretary of Defense for Policy, Department of Defense, Washington, D.C., (July 1985), p. 31. 12. Sen. Charles Grassley (R-IA); Rep. William Ford (D-MI), Chairman, House Post Office and Civil Service Committee; Rep. John Dingell (D-MI), Chairman, House Energy and Commerce Committee; and Rep. Patricia Schroeder (D-CO), Chairman, House Civil Service Subcommittee. 13. 5 U.S.C. Sec. 2302 (b)(8)(A). Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90G01353R002000030039-9 NOTES : GOVERNMENT EMPLOYEES: SWORN TO SECRECY 91 14. "Air Force Oversteps Security Policy," Washington Post, 24 August 1987, p. AS. 15. "Taking the Pledge," Washington Post, 28 August 1987, p. A21. 16. See above, n. 5. 17. 50 U.S.C. 403(d)(3). 18. Snepp v. United States, 444 U.S. 507 (1980). 19. See: Jonathan C. Medow, "The First Amendment and the Secrecy State: Snepp v. United States," University of Pennsylvania Law Review, 130 (April 1982): 775- 844. 20. Information Security Oversight Office, "National Security Information: Different Perspectives," Washington, D.C., (5 December 1984), p. 22. 21. Report of the Committee on Post Office and Civil Service, "Federal Polygraph and Anti-Censorship Act of 1984," 98th Congress, 2nd Session, Rept. No. 98-961, Part I, (1 August 1982), p. 14. 22. Ibid., p. 15. 23. See above, n. 9. 24. See above, n. 9. 25. See above, n. 5. 26. Committee on Government Operations Hearing, "Review of the President's National Security Decision Directive 84 and the Proposed Department of Defense Directive on Polygraph Use," 98th Congress, 1st Session. (19 October 1983), pp. 158-9. 27. "Seven Former Defense Chiefs See Peril and Promise for U.S.," New York limes, 27 September 1987, p. A16. 28. J. Anthony Lukas, "Class Reunion," New York limes Magazine, 30 August 1987, p. 24. 29. Snepp v. United States, 444 U.S. 507 (1980). 30. George Lardner, Jr., "Authors of KAL Article Say Agent Warned of Espionage Law Violations," Washington Post, 3 February 1984, p. A2. 31. United States v. Morison, 604 F.Supp 655 (D. Md. 1985). Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90G01353R002000030039-9 Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90G01353R002000030039-9 92 NOTES 32. 18 U.S.C. 793(d). 33. 18 U.S.C. 793(3). Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90G01353R002000030039-9 Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 NOTES: RESTRICTING SCIENTIFICAND ACADEMIC FREEDOM 93 NOTES : RESTRICTING SCIENTIFIC AND ACADEMIC FREEDOM 1. Robert L. Park, "The Silent Soviet Submarines," Newsday, 19 July 1987, p. 3. 2. Atomic Energy Act, 60 Stat. 755 (1946), amended 68 Stat. 919 (1956), current version, 42 U.S.C. 2011-2296 (1976). 3. "The Progressive Case and the Atomic Energy Act: Waking to the Dangers of Government Information Controls," George Washington Law Review 42 (January 1980):163. 4. 35 U.S.C. 181-188 (1952). Committee on Government Operations, "The Government's Classification of Private Ideas," House Rept. 96-1540, 96th Congress, 2nd Session (1980) p. 125. 5. Edward Teller, "Secrecy in Science," Los Angeles Times Magazine, 5 July 1987, p. 4B. 6. Robert L. Park, "Only An Open Society Can Win the Science Race," Newsday, 3 May, 1987, p. 10. 7. "Superconductivity Conference to Exclude Foreign Officials," Washington Post, 25 July 1987, p. A2. 8. "Commercializing Superconductors," Washington Post, 29 July 1987, p. A3. 9. Ibid., Prepared statement of Robert L. Parks, executive director of the American Physical Society. 10. See above, n. 1. 11. Steven Solomon, "American Laboratories, Foreign Brains," New York Times, 19 July 1987, p. F8. See also, Roland W. Schmitt, "Export Controls: Balancing Technological Innovation and National Security," Issues in Science and Technology, 6 (Fall 1984): 117. 12. National Academy of Sciences, Scientific Communication and National Security, Washington, D.C.: National Academy Press, 1982. Also, Balancing the National Interest: U.S. National Security Export Controls and Global Economic Competition, Washington, D.C.: National Academy Press, 1987. Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 94 NOTES 13. National Security Study Directive 14-82, "Scientific Communication and National Security," 23 December 1982. The president's review was classified and was conducted without input from universities or other sources outside the federal government. 14. National Security Decision Directive 189, "National Policy on the Transfer of Scientific, Technical and Engineering Information," 21 September 1985. 15. Harold Relyea, "Increased National Security Controls on Scientific Communication. Government Information Quarterly, No. 2 (1984): 177. 16. Robert L. Park, '"The Muzzling of American Science," Academe, (September/ October 1986), pp. 19, 20. 17. Nicholas Wade, "Science Meetings Catch the U.S.-Soviet Chill," Science 207 (March 1980): 1056, 1058. 18. Nicholas Wade, "Government Bars Soviets from AVS and OSA Meetings," Physics Today 33 (April 1980): 81-3. 19. O.N. Garcia, "From the President: On a Matter of Importance -- Technical Information Flow," Computer (May 1982): p. 7. 20. Jeffrey Smith, "The Mysterious Chinese Luggage Incident," Science 216 (11 June 1982): 1204-5. 21. Robert L. Park, "Science and Secrecy," Bulletin of the Atomic Scientists (March 1985): p. 22. 22. Ibid., p. 23. 23. Ibid., p. 23. 24. Ibid., p. 23. 25. "Universities Feel Effect of Information Restriction," Harvard Alumni Gazette, June 1987, p. 21. 26. "Brief U.S. Suppression of Proof Stirs Anger," New York limes, 17 February 1987, p. C3. 27. See: Jerry Berman, "National Security vs. Access to Computer Databases: A New Threat to Freedom of Information," First Principles 12 (June 1987): 1, for the Center for National Security Studies, Washington, D.C. Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90G01353R002000030039-9 28. Presidential Directive 24 (PD-24), 16 November 1977. 29. National Policy on Protection of Sensitive but Unclassified Information in Federal Government Telecommunications and Automated Information Systems, NTISSP No. 2,29 October 1986. Section II, Definitions. 30. Information Industry Association, Potential Government Restrictions on United States Unclassified Commercial Databases, Washington, D.C., (9 March 1987). 31. "Washington Feeling Insecure About Non-Secret Information," New York limes, 30 August 1987, p. E5. 32. H.R. 145, The Computer Security Act of 1987, introduced by Congressman Jack Brooks (D-TX) and Congressman Dan Glickman (D-KS), January 6 1987. 33. Ross Gelspan, "Reagan Seeks Controls On Database Access," Boston Globe, 20 April 1987, p. 36-7. 34. John Shattuck, "Federal Restrictions on the Free Flow of Academic Information and Ideas," Office of the Vice-President for Government, Community, and Public Affairs, Harvard University (January 1985): p. 11, attachment B-F. Reprinted in Committee on the Judiciary, House of Representatives, "1984: Civil Liberties and the National Security State," 98th Congress, 1st and 2nd Sessions, Serial No. 103, p. 827. 35. Barbara Crossette, "State Department is Asking Colleges to Curb Research by Chinese," New York Times, 27 November 1981, pp. Al, AS. The requested information included "professional trips" taken by students; "specific experiments" conducted on campus; use of "instruments or specialized equipment (e.g. laser measuring devises, automatic analytical equipment, computers, etc.) that may be used during the course of the study program." 36. Gina Bari Kolata, "Attempts to Safeguard Technology Draw Fire," Science 212 (1 May 1981): 523-526. 37. Eliot Marshall, "Medical Data Bank: A Security Risk?" Science 216 (21 May 1982): 831. 39. "Libraries Are Asked By F.B.I. to Report On Foreign Agents," New York Times, 18 September 1987, pp. Al, B4. 40. 8 U.S.C. 1182(a) et seq. Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90G01353R002000030039-9 Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 41. Kleindienst v. Mandel, 408 U.S. 753 (1972). 42. On August 28, 1986, a Federal judge ordered the deportation of Margaret Randall, a controversial poet and writer who teaches at the University of New Mexico, who gave up her U.S. citizenship to become a Mexican national in 1967. Others subjected to attacks under McCarran-Walter while working at U.S. universities include: Dennis Brutus, South African poet and writer, teaching at Northwestern University; Cosmo Pieterse, tenured professor at Ohio State University; Angel Rama, a Uruguay native and tenured professor at the University of Maryland. In addition, another section of McCarran-Walter, grounds of "prejudicial to the public interest," have been invoked to deny visas to Nobel Laureates Gabriel Garcia Marquez and Czelaw Milosz; authors Carlos Fuentes, Graham Greene, and Farley Mowat; playwright Dario Fo; actress Franca Rama; and Hortensia Allende, widow of slain Chilean President Salvador Allende. Before Pierre Trudeau became Prime Minister of Canada, he had been excluded after he attended an international conference on economics held in Moscow. 43. H.R. 1119 was introduced by Rep. Barney Frank (D-MA) on February 18, 1987. S. 28 was introduced by Sen. Daniel P. Moynihan (D-NY) on January 6, 1987. 44. "Court Upholds Curb on Visa Denials," Washington Post, 20 October 1987, p. A9. The case involved four speakers who were invited to speak in the U.S. but who were denied visas in late 1983. The four speakers included Nicaraguan Interior Minister Tomas Borge; former Italian general Nino Pasti, who belongs to a peace group allegedly affiliated with the Soviet Union; and two Cuban women allegedly tied to the communist party there. See: Reagan v. Abourezk, 785 F.2d 1043 (D.C. Circuit, 1986). See: Reagan v. Abourezk, 56 LW 4001 (U.S. Supreme Court, 1987). 45. "Verbatim: Testing Freedom," New York limes, 17 August 1986, sec. 4, p. 4. Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90G01353R002000030039-9 1. Dom Bonafed, "Muzzling the Media," National Journal 18 (12 July 1986), pp. 1716- 1720. 2. "CIA Weighs Action on Washington Post Article," Washington Post, 22 July 1986. 3. Of particular sensitivity was the reported ability of the National Security Agency to intercept and decode messages of other nations, including allies and neutrals. As noted in: Samuel G. Freedman, "Newspaper Cites Official Pressure," New York Times, 18 May 1986, p. All. 4. 604 F.Supp 655, (D. Md. 1985). Espionage law involved is 18. U.S.C. 793 (d)(e). 5. "State Dept. Acted to Block U.S.-Egypt Attack on Libya," Washington Post, 20 February 1987, pp. Al, A27. 6. "The Reagan Administration and the News Media," The Reporters Committee for Freedom of the Press, March 1987, p.49. 8. "Speakes Defends Administration's Controls Over Public Information," Los Angeles Times, 27 September 1986. 9. National Security Decision Directive 84, "Safeguarding National Security Information," 11 March 1983, sec. ld. 10. "U.S. Restricts Reporters In Bid To End News Leaks," Wall Street Journal, 25 October 1983, sec. 2, p. 53. 11. "State Department Bureau Bars Talks With Former Chief," Washington Post, 1 March 1985, p. A6. 12. "F.B.I. Unit Tracing Some Disclosures to Press," New York Times, 2 October 1986, pp. Al, A18. 13. Norman J. Ornstein, "North Errs on Leaks By Congress," New York Times, 17 July 1987. 14. "Executive Branch Leads The Leakers," Washington Post, 28 July 1987, p. A13. Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90G01353R002000030039-9 Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 NOTES : CITIZEN ACCESS : THE FREEDOM OF INFORMATION ACT 1. The Freedom of Information Act, 5 U.S.C., Sec. 552. 2. Washington Star, 3 August 1978, p. A10. FOIA requester, Washington Star. 3. Common Cause Magazine, August 1981, pp.16-23. FOIA requester, Common Cause. 4. "Crisis Intervention for Traditionalists?" Washington Post, 24 June 1986, p. A24. Senator Edward M. Kennedy, "Freedom of Information After Twenty Years," Congressional Record, (26 June 1986), S8773-8775. 5. "Documents Show FBI Kept Files on Leading U.S. Writers," Washington Post, 30 September 1987, pp. Al, AT 6. "Carcinogen Found in Many Liquor Products," Washington Post, 31 July 1987. 802 wines and spirits were tested, 95 of which would not meet Canada's import health standards. FOIA requester, The Center for Science in the Public Interest. 7. Testimony of Dr. Sidney Wolfe, House Subcommittee on Government Information, Justice, and Agriculture. Hearings on S.744, May-August 1984. FOIA requester, Public Citizen Health Research Group. 8. FOIA requester, Dr. Nancy Lord, Potomac, Maryland. 9. New York Times, 21 July 1975, p. 31. FOIA requester, The Corporate Accountability Group. 10. "NASA Wasted Billions, Federal Audits Disclose," New York Times, 23 April 1986, p. Al. 11. San Francisco Examiner, 14 January 1979, p. 13. FOIA requester, United Press International. 12. Jack Nelson, "The Information Act Comes Under Siege," Los Angeles Times, 23 March 1986, p. Al. 13. "Administration Calls FOIA 'Overrated,' Seeks Wide-Ranging Restrictions on It," Washington Post, 16 October 1981. 14. Harold Relyea, "Increased National Security Controls on Scientific Communication. Government Information Quarterly, No. 2 (1984), p. 177. Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90G01353R002000030039-9 15. Pub. L. No. 99-570, Sec. 1801-1804, 100 Stat. 3207, 3207-48 (1986). See 5 U.S.C. 552(a)(4)(A)(i), as amended. 16. "Uniform FOIA Fee Schedule and Guidelines," Federal Register 10012 (27 March 1987). 17. "New FOIA Free Waiver Policy Guidance," Department of Justice Memorandum, issued by Stephen J. Markman, Assistant Attorney General for Legal Policy, Office of Legal Policy, 2 April 1987. 18. E.O. 12600, "Predisclosure Notification Procedures for Confidential Commercial Information," issued by President Ronald Reagan, (23 June 1987). 19. See: Section 3201, "Freedom of Information Act Amendments of 1987," H.R. 1155, introduced in the House by Rep. Robert Michel (R-IL), House Minority Leader. 20. See above, n. 14. 21. "Freedom of Information Act Changes," Congressional Record, (15 October 1986), S16504. 22. Eve Pell, "FOIAbles of the New Drug Law," Nation, 13 December 1986, pp. 666-667. 23. Senator Orrin Hatch, "Freedom of Information Act Changes," Congressional Record, (15 October 1986), S16505. 24. Congressman Glenn English, "Implementation of the Freedom of Information Reform Act," Congressional Record, (22 April 1987). 25. Letter from U.S. Air Force Freedom of Information Manager. Identity of requester withheld for confidentiality, 26. Letter from the Director, Freedom of Information and Security Review, Office of Assistant Secretary of Defense. Name of requester withheld for confidentiality. 27. See above, n. 24. 28. Ibid. 29. Cover letter from the General Counsel, Executive Office of the President, Office of Management and Budget, sending proposed executive order, 13 February 1987. 30. 5 U.S.C., Sec. 1(b)(4). Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90G01353R002000030039-9 Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 Committee on Governmental Affairs, "Preliminary Catalogue of Office of Management and Budget Authorities and Directives," Office of Management and Budget: Evolving Roles and Issues, United States Senate, 99th Congress, 2nd Session, S. Rept. 99-134, (February 1986), pp. 395, 407. 2. 22 U.S.C. 2576(b). 3. E.O. 12322, 46 Federal Register 46561 (17 September 1981). All reports, plans or proposals relating to Federal or federally assisted water and related land resources projects submitted to Congress must be submitted beforehand for review and advice by OMB and when submitted to the Congress it must contain the advice received. 4. Ibid., p. XII. 5. OMB had been granted powers of limited information and regulatory review by the Paperwork Reduction Act of 1980 (44 U.S.C. 3504). The Paperwork Reduction Act created the OMB Office of Information and Regulatory Affairs (OIRA) for the purpose of reducing the volume and duplication of government paperwork. President Reagan broadened OIRA's role primarily by executive orders 12291 and 12498. For a fuller discussion of the intent and limits of the statutory powers of OIRA, see: OMB Watch, Washington, D.C., "OMB Control of Government Information," Eye On Paperwork, 2, (27 January 1986). 6. Energy and Commerce Subcommittee on Oversight and Investigations, "EPA's Asbestos Regulations -- A Case Study on OMB Interference in Agency Rulemaking," Committee Print 99-V, 99th Congress, 1st session (October 1985), P.V. Congressional concern over OMB was manifested in a number of hearings and other actions. One such action came in the form of a 1985 amicus curae brief filed by Members of Congress including the Chairmen of the House Committees on the Judiciary, Energy and Commerce, Government Operations, Education and Labor, and Post Office and Civil Service. The brief was filed in support of a lawsuit challenging OMB's interference with a proposed Occupational Safety and Health Administration rule regarding exposure to ethylene oxide. The suit was filed by the Public Citizen Health Research Group. 7. OMB Circular A-130, -titled "Management of Federal Resources", 50 Federal Register 52730, (24 December 1985). Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 NOTES : THE OFFICE OFMANAGEMENTAND BUDGET 101 8. U.S. Code, Title 44, section 1108, enacted May 11, 1922, section 1. 9. Statement by President Ronald Reagan, Weekly Compilation of Presidential Documents, April 20, 1981. 10. OMB Bulletin, "Elimination of Wasteful Spending on Government Periodicals, Pamphlets, and Audiovisual Products," 81-16 (21 April 1981): sec. 5, 7, 8. 11. U.S. Office of Management and Budget, "List of Government Publications Terminated and Consolidated by Agency," Washington, D.C., (1982). "Government Restricting the Flow of Information to the Public," New York Times, 12 November 1982. 12. Judith E. Stokes, "Federal Publications Cutbacks: Implications for Libraries," Government Information Quarterly, No. 1 (1984): 49-50. 13. Office of Management and Budget, "Second Annual Report on Eliminations, Consolidations, and Cost Reductions of Government Publications," (6 January 1984). 14. "OMB Control of Government Publications: Review and Elimination," OMB Watch, Washington, D.C., (May 1986), p.10. 15. Ibid., p. 11. "Abridging Government Information: The Reagan Administration's War on Waste," Dartmouth College Library Bulletin, (April 1985), p. 58. 16. OMB Circular A-3, "Government Publications," (2 May 1985). Replacing OMB Circular A-3, "Government Periodicals," (18 May 1972). 17. The new regulations, Federal Acquisition Circular 84-25, amend the Federal Acquisition Regulation. They appear as a final rule in the Federal Register 52 (20 March 1987):9036. 18. Representative Major R. Owens, "A New Attack On The Right To Know," Congressional Record, (8 July 1987), E2772. 19. OMB Watch, Washington, D.C., Monthly Review, 2 (28 February 1987): 5. 20. OMB Watch, Washington, D.C., Monthly Review, 2 (28 February 1987): 10. 21. "OMB Effort to Curb Data Disputed," Washington Post, 15 May 1985. 22. "OMB Reverses Decision To Prohibit Collection Of Data on Race, Gender," Washington Post, 26 June 1985. Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 23. OMB Watch, Washington, D.C., "OMB Control of Government Information," Eye On Paperwork, No.1 (27 January 1986): 8. 24. Ibid., p. 9. 25. OMB Watch, Washington, D.C., Monthly Review 7 (30 July 1987): 10. 26. Ibid. 27. See above, n. 18, p. 10. 28. E.O. 12291, 46 Federal Register 13193 (19 February 1981). E.O. 12498, (4 January 1985). 50 Federal Register 1036, (8 January 1985). 29. See: OMB Watch, Washington, D.C., Through The Corridors Of Power. A Guide to Federal Rulemaking, (1987). See: Senate Committee on Governmental Affairs, "Oversight of the Office of Management and Budget Regulatory Review and Planning Process," 99th Congress, 2nd Session, S. Rept. 99-839, (28 January 1986). See: "Regulatory Policy," The Urban Institute Press, Washington, D.C., The Reagan Experiment,(1982), pp. 129-153. 30. Senate Committee on Environment and Public Works, "Office of Management and Budget Influence on Agency Regulations," S. Rept. 99-156, 99th Congress, 2nd Session (May 1986), p. ix. 31. Environmental Defense Fund v. Lee M. Thomas, Administrator, U.S. Environmental Protection Agency, et al., U.S. District Court for the District of Columbia, Civil Action No. 85-1747, filed January 23, 1986, p. 9. See: Senate Committee on Environment and Public Works, "Office of Management and Budget Influence on Agency Regulations," S. Print 99-156, 99th Congress, 2d Session (May 1986), p. vii. 32. Tim Miller, "The O.M.B. Writes A Prescription," The Nation, 31 March 1984, p. 383. 33. Richard C. Thompson, "Reye Syndrome Spells Caution to Parents," FDA Consumer, October 1982, pp. 19-21. "Ads to Warn of Possible Link Between Aspirin, Reye's Syndrome," Washington Post, 21 September 1982. 34. See above, n. 27. Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90G01353R002000030039-9 NOTES : THE OFFICE OF MANAGEMENT AND BUDGET 103 35. See above, n. 27. 36. See above, n. 27, p. 384. 37. "Reye's Syndrome Found Widespread," Washington Post, 21 July 1983, p. A17. 38. "Study Reported to Tighten Link Of Aspirin and Reye's Syndrome," New York limes, 9 January 1985. 39. "Warning to Go on Aspirin Labels," New York limes, 24 January 1985. 40. House Energy and Commerce Subcommittee on Oversight and Investigations, "EPA's Asbestos Regulations -- A Case Study On OMB Interference In Agency Rulemaking," Committee Print 99-V, 99th Congress, 1st Session (October 1985) p. iv. 41. OMB Watch, Washington, D.C., "OMB Control Of Rulemaking: The End of Public Access," (1985), pp. 10-11. 42. "OMB Official Said Agency Would Fight an Asbestos Ban," Washington Post, 9 May 1986, p. A2. 43. See above, n. 26, p.21-2. 44. -"The Silent Shift of Power," Newsday, 4 May 1986, p.7. 45. E.O. 12291, 46 Federal Register 13193 (19 February 1981). 46. E.O. 12498, (4 January 1985). 50 Federal Register 1036, (8 January 1985). 47. See above, n. 1, p. XIII. 48. "'Defunding' OMB's Rule Reviewers," Washington Post, 30 July 1986. "Lawmakers Want To Dethrone Rule Reviewers," Washington Post, 22 May 1986. 49. OMB Watch, Washington, D.C., OMB Watcher, (9 July 1987), p. 10. 50. Review of the administrative procedures for Section 5 of the Voting Rights Act of 1965, determining the existence of racially discriminatory voting practices. 51. Revisions for the standards for Intermediate Care Facilities for the Mentally Retarded, 51 Federal Register 7520. 52. Cancer Risk Guidelines, 29 CFR 1990. Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90G01353R002000030039-9 Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 53. "OMB Seeks Restrictions on Agency Studies," Washington Post, 25 April 1985. 54. Committee on Government Operations, "Occupational Health Hazard Surveillance: 72 Years Behind And Counting," 99th Congress, 2nd Session, House Rept. 99-979, (8 October 1986), p. 27. 55. "OMB Review of CDC Research: Impact of the Paperwork Reduction Act," Released by the House Committee on Energy and Commerce. 56. See above, n. 39, p. 10. 57. Morbidity and Mortality Weekly Report, 35 (29 August 1986): 538. 58. "Reproductive Health Hazards in the Workplace," U.S. Congress, Office of Technology Assessment, OTA-BA-266, (December 1985), p. 33. See above, n. 39, pp. 7-8. 59. See above, n. 39, pp. 10-11. Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 Appendix A Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 NATIONAL SECUTRTTY DECISION DIRECTIVES National Security Decision Directives (NSDD) do not appear in published records of the president or the National Security Council. The following list of NSDDs has been compiled from those publicly known to exist. Some are now declassified, in partial or whole form, and are in the National Archives, Washington, D.C., Record Group 273, Records of the National Security Council. * Indicates general subject and/or date, but specific title and/or date not public. NSDD 1 "National Security Council Directives," February 25, 1981. Revised, December 17, 1981. NSDD 2 "National Security Council Structure," January 12, 1982. NSDD 3 "Crisis Management -- Special Situation Group," 1981. NSDD 5 "Conventional Arms Transfer Policy," July 8, 1981. NSDD 6 "United States Non-Proliferation and Peaceful Nuclear Cooperation Policy," July 16, 1981. NSDD 8 Space Transportation System Policy, 1981. NSDD 12 "Strategic Forces Modernization Program," October 1, 1981. NSDD 13 "Nuclear Weapons Employment Policy." * NSDD 17 Deterring Cuban Models / Covert Action in Nicaragua, November 23, 1981. * NSDD 19 "Protection of Classified National Security Council and Intelligence Information," January 12, 1982. NSDD 22 "Designation of Intelligence Officials Authorized to Request FBI Collection of Foreign Intelligence," January 29, 1982. NSDD 23 "U.S. Civil Defense Policy," February 3, 1982. NSDD 25 "Preparations for the Economic and NATO Summits, June 1982," February 12, 1982. NSDD 26 "U.S. Civil Defense Policy," March 16, 1982. NSDD 30 Anti-terrorist Policy / State Department, 1982. NSDD 32 National Strategy, May 1982. * NSDD 35 MX Basing Mode, May 17, 1982. NSDD 38 "Staffing At Diplomatic Missions and Their Constituent Posts," June 2, 1982. NSDD 42 National Space Policy, 1982. NSDD 47 "Emergency Mobilization Preparedness," July 22, 1982. NSDD 50 Space International Payloads, August 6, 1982. * NSDD 60 "Preparations for the 1983 Summit," October 9, 1982. NSDD 68 Nuclear Materials, November 18,1982. * NSDD 75 Strategy Regarding Soviet Union/Covert Operation. Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 NSDD 77 "Management of Public Diplomacy Relative to National Security," January 14,1983. NSDD 80 "Shuttle Orbiter Production Capability," February 3, 1983. NSDD 84 "Safeguarding National Security Information," March 11, 1983. NSDD 85 "Eliminating the Threat from Ballistic Missiles," March 25, 1983. NSDD 89 "The Export Administration Act," April 11, 1983. NSDD 90 "United States Arctic Policy," April 14, 1983. NSDD 91 ICBM Guidance, April 1983. * NSDD 93 "Refugee Policy and Processing Refugees from Indochina," May 13, 1983. NSDD 94 "Commercialization of Expendable Launch Vehicles," May 16, 1983. NSDD 97 "National Security Telecommunications Policy," August 3, 1983. NSDD 99 Lebanon. * NSDD 100 "Enhanced U.S. Military Activity and Assistance for the Central American Region," July 28, 1983. NSDD 102 "U.S. Response to Soviet Destruction of KAL Airliner," September 5, 1983. NSDD 111 Middle East Policy, October 29, 1983. * NSDD 113 Radio Telephone COMSEC Government Limousines. NSDD 119 Strategic Defense Initiative, 1984. * NSDD 124 U.S. Objectives in Central America and Mexico, February 1984.* NSDD 127 Strategic Policy. * NSDD 138 International Terrorism, 1984. NSDD 143 U.S. Third World Hunger Relief: Emergency Assistance," July 9, 1984. NSDD 144 National Space Strategy, August 15, 1984. * NSDD 145 "National Policy on Telecommunications and Automated Information Systems Security," September 17, 1984. NSDD 156 "U.S. Third World Food Aid: A 'Food For Progress' Program," January 3, 1985. NSDD 159 "Covert Action Policy Approval and Coordination Procedures," January 18, 1985. NSDD 164 "National Security Launch Strategy," February 25, 1985. NSDD 166 U.S. Support to Afghan Rebels, April, 1985. * NSDD 167 "Food For Progress Program Implementation," April 29, 1985. NSDD 168 "U.S. Policy Towards North Africa," April 30, 1985. NSDD 172 Strategic Defense Initiative, 1985. * NSDD 175 "Establishment of a Blue Ribbon Commission on Defense Management," June 17, 1985. NSDD 178 Strategic Policy. NSDD 179 "Task Force on Combating Terrorism," July 20, 1985. NSDD 181 Space Shuttle Pricing Policy, August 1, 1985. * NSDD 189 "National Policy on the Transfer of Scientific, Technical, and Engineering Information," September 21, 1985. NSDD 192 SDI/Narrow Interpretation of ABM Treaty, October 12, 1985. NSDD 196 "Counterintelligence / Countermeasure Implementation Task Force," November 1, 1985. NSDD 197 "Reporting Hostile Contacts and Security Awareness," November 1, 1985. NSDD 201 "National Security Emergency Preparedness Telecommunications Funding," December 17, 1985. Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 NSDD 202 Arms Control. * NSDD 207 Protection of Spouse of Foreign Heads of State. * NSDD 219 Blue Ribbon Commission on Defense Management, April 1, 1986. * NSDD ? "Narcotics and National Security," April 8, 1986. NSDD 254 "United States Space Launch Strategy," December 27, 1986. NSDD 259 "U.S. Civil Defense Policy," February 9, 1987. NSDD 266 "Implementation of the Recommendations of the President's Special Review Board," March 31, 1987. NSDD 276 "National Security Council Interagency Process," June 9, 1987. NSDD 280 "National Airlift Policy," June 24, 1987. Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 Appendix B Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 Extract From National Security Decision Directive 159 January 18, 1985 COVERT ACTION POLICY APPROVAL AND COORDINATION PROCEDURES Approval Procedures for Intelligence 1. Presidential Findings. The President shall approve all covert action Findings in writing. Under Section 662 of the Foreign Assistance Act of 1961, as amended, all covert actions undertaken by the Central Intelligence Agency must be authorized by a Presidential Finding that each such operation is important to US national security. E.O. 12333 and this Directive establish that covert actions (intelligence "special activities") undertaken by components other than CIA also require a Presidential Finding. Each covert action is also considered a significant anticipated intelligence activity under Section 501 of time National Security Act and is subject to certain Congressional reporting procedures. The Congressional reporting procedures for significant intelligence activities apply to all agencies of the intelligence community. Findings shall remain valid until formally cancelled. U~'f 2. In accordance with Executive Order 12333, the Contra. Intelligence Agency shall conduct covert actions unless the President specifically designates another agency of the govern- ment. When the provision of substantial support by one govern- ment component to another is essential to to conduct of a covert action, indication of the extent and nature of that support shall be included as part of the Finding or Memorandar of Notificaff'on. However, the provision of routine support in the forts of personnel, funds, equipment, supplies, transporta- tion, training, logistics, and facilities by Government compo- nents other than CIA to support a covert action shall not in itself be considered a 'separate covert action by the supplying' agency. (V) L .,e SS..~~ 14gi 'IS of ^ 12'56 Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 Appendix C Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 CLASSIFIED INFORMATION NONDISCLOSURE AGREEMENT An Agreement Between and the United States (Name - Printed or Typed) 1. Intending to be legally bound, I hereby accept the obligations contained in this Agreement in consideration of my being granted access to classified information. As used in this Agreement, classified information is information that is either classified or classifiable under the standards of Executive Order 12356, or under any other Executive order or statute that prohibits the unauthorized disclosure of information in the interest of national security. I understand and accept that by being granted access to classified information, special confidence and trust shall be placed in me by the United States Government. 2. I hereby acknowledge that I have received a security indoctrination concerning the nature and protection of classified information, including the pro- cedures to be followed in ascertaining whether other persons to whom I contemplate disclosing this information have been approved for access to it, and that I understand these procedures. 3. 1 have been advised and am aware that direct or indirect unauthorized disclosure, unauthorized retention, or negligent handling of classified informa- tion by me could cause irreparable injury to the United States or could be used to advantage by a foreign nation. I hereby agree that I will never divulge such information unless I have officially verified that the recipient has been properly authorized by the United States Government to receive it or I have been given prior written notice of authorization from the United States Government Department or Agency (hereinafter Department or Agency) last granting me a security clearance that such disclosure is permitted. I further understand that I am obligated to comply with laws and regulations that prohibit the unauthorized disclosure of classified information. 4. I have been advised and am aware that any breach of this Agreement may result in the termination of any security clearances I hold; removal from any position of special confidence and trust requiring such clearances; and the termination of my employment or other relationships with the Departments or Agencies that granted my security clearance or clearances. In addition, I have been advised and am aware that any unauthorized disclosure of classified information by me may constitute a violation or violations of United States criminal laws, including the provisions of Sections 641, 793, 794, 798, and 952, Title 18, United States Code, the provisions of Section 783(b), Title 50, United States Code, and the provisions of the Intelligence Identities Protec- tion Act of 1982. I recognize that nothing in this Agreement constitutes a waiver by the United States of the right to prosecute me for any statutory violation. 5. I hereby assign to the United States Government all royalties, remunerations, and emoluments that have resulted, will result or may result from any disclosure, publication, or revelation not consistent with the terms of this Agreement. 6. 1 understand that the United States Government may seek any remedy available to it to enforce this Agreement including, but not limited to, applica- tion for a court order prohibiting disclosure of information in breach of this Agreement. 7. 1 understand that all information to which I may obtain access by signing this Agreement is now and will forever remain the property of the United States Government. I do not now, nor will I ever, possess any right, interest, title, or claim whatsoever to such information. I agree that I shall return all materials which have, or may have, come into my possession or for which I am responsible because of such access, upon demand by an authorized repre- sentative of the United States Government or upon the conclusion of my employment or other relationship with the Department or Agency that last granted me a security clearance. If I do not return such materials upon request, I understand that this may be a violation of Section 793, Title 18, United States Code, a United States criminal law. 8. Unless and until I am released in writing by an authorized representative of the United States Government, I understand that all conditions and obliga- tions imposed upon me by this Agreement apply during the time I am granted access to classified information, and at all times thereafter. 9. Each provision of this Agreement is severable. If a court should find any provision of this Agreement to be unenforceable, all other provisions of this Agreement shall remain in full force and effect. 10. I have read this Agreement carefully and my questions, if any, have been answered to my satisfaction. I acknowledge that the briefing officer has made available to me Sections 641, 793, 794, 798, and 952 of Title 18, United States Code, Section 783(b) of Title 50, United States Code, the Intelli- gence Identities Protection Act of 1982, and Executive Order 12356, so that I may read them at this time, if I so choose. SOCIAL SECURITY NO. (See notice below) The execution of this Agreement was witnessed by the undersigned, who, on behalf of the United States Govern- ment, agreed to its terms and accepted it as a prior condition of authorizing access to classified information. NOTICE: The Privacy Act, 5 U.S.C. 552a, requires that federal agencies Inform Individuals, at the time Information Is solicited from them, whether the disclosure Is mandatory or voluntary, by what authority such Information is solicited and what uses will be made of the Information. You are hereby advised that authority for soliciting your Social Security Account Number (SSN) Is Executive Order 9397. Your SSN will be used to Identify you pre- cisely when it is necessary to 1) certify that you have access to the Information Indicated above or 2) determine that your access to the Information Indicated has terminated. Although disclosure of your SSN Is not mandatory, your failure to do so may Impede the processing of such certifications or determinations. STANDARD FORM 189 (8-83) Prescribed by GSA/ISOO e.en 1e1" Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 Appendix D Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 Nondisclosure Agreement 1. Intending to be legally bound, I hereby accept the obligations contained in this Agreement in consider- ation of my being granted access to information known as Sensitive Compartmented Information (SCI). I have been advised and am aware that SCI involves or derives from intelligence sources or meth- ods and is classified or classifiable under the stand- ards of Executive Order 12356 or under other Execu- tive order or statute. I understand and accept that by being granted access to SCI, special confidence and trust shall be placed in me by the United States Government. 2. I hereby acknowledge that I have received a security indoctrination concerning the nature and protection of SCI, including the procedures to be followed in ascertaining whether other persons to whom I contemplate disclosing this information have been approved for access to it, and that I understand these procedures. I understand that I may be required to sign subsequent agreements as a condition of being granted access to different categories of SCI. I further understand that all my obligations under this Agree- ment continue to exist whether or not I am required to sign such subsequent agreements. 3. 1 have been advised and am aware that direct or indirect unauthorized disclosure, unauthorized reten- tion, or negligent handling of SCI by me could cause irreparable injury to the United States or could be used to advantage by a foreign nation. I hereby agree that I will never divulge such information unless I have officially verified that the recipient has been properly authorized by the United States Government to receive it or I have been given prior written notice of authorization from the United States Government Department or Agency (hereinafter Department or Agency) last granting me either a security clearance or an SCI access approval that such disclosure is permitted. 4. I further understand that I am obligated to comply with laws and regulations that prohibit the unautho- rized disclosure of classified information. As used in this Agreement, classified information is information that is classified under the standards of E.O. 12356, or under any other Executive order or statute that prohibits the unauthorized disclosure of information in the interest of national security. 5. In consideration of being granted access to SCI and of being assigned or retained in a position of special confidence and trust requiring access to SCI and other classified information, I hereby agree to submit for security review by the Department or Agency last granting me either a security clearance or an SCI access approval all materials, including works of fiction, that I contemplate disclosing to any person not authorized to have such information, or that I have prepared for public disclosure, which contain or purport to contain: (a) any SCI, any description of activities that produce or relate to SCI, or any information derived from SCI; (b) any classified information from intelligence reports or estimates; or (c) any information concerning intelligence activ- ities, sources or methods. I understand and agree that my obligation to submit such information and materials for review applies during the course of my access to SCI and at all times thereafter. However, I am not required to submit for review any such materials that exclusively contain information lawfully obtained by me at a time when I have no employment, contract or other relationship with the United States Government, and which are to be published at such time. 6. 1 agree to make the submissions described in paragraph 5 prior to discussing the information or materials with, or showing them to anyone who is not authorized to have access to such information. I further agree that I will not disclose such information or materials unless I have officially verified that the recipient has been properly authorized by the United States Government to receive it or I have been given written authorization from the Department or Agency last granting me either a security clearance or an SCI access approval that such disclosure is permitted. 7. 1 understand that the purpose of the review de- scribed in paragraph 5 is to give the United States a reasonable opportunity to determine whether the in- formation or materials submitted pursuant to para- graph 5 set forth any SCI or other information that is subject to classification under E. O. 12356 or under any other Executive order or statute that prohibits the unauthorized disclosure of information in the interest of national security. I further understand that the Department or Agency to which I have submitted materials will act upon them coordinating with the Intelligence Community or other agencies when ap- propriate, and substantively respond to me within 30 working days from date of receipt. Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 I 8. 1 have been advised and am aware that any breach of this Agreement may result in the termination of any security clearances and SCI access approvals that I may hold; removal from any position of special confidence and trust requiring such clearances or access approvals; and the termination of my employ- ment or other relationships with the Departments or Agencies that granted my security clearances or SCI access approvals. In addition, I have been advised and am aware that any unauthorized disclosure of SCI or other classified information by me may constitute a violation or violations of United States criminal laws, including the provisions of Sections 641, 793, 794, 798, and 952, Title 18, United States Code, the provisions of Section 783 (b), Title 50, United States Code and the provisions of the Intelligence Identities Protection Act of 1982. 1 recognize that nothing in this Agreement constitutes a waiver by the United States of the right to prosecute me for any statutory violation. right, interest, title, or claim whatsoever to such information. I agree that I shall return all materials which have or may come into my possession or for which I am responsible because of such access, upon demand by an authorized representative of the United States Government or upon the conclusion of my employment or other relationship with the Depart- ment or Agency that last granted me either a security clearance or an SCI access approval. If I do not return such materials upon request, I understand that this may be a violation of Section 793, Title 18, United States Code, a United States criminal law. 12. Unless and until I am released in writing by an authorized representative of the United States Gov- ernment, I understand that all conditions and obliga- tions imposed upon me by this Agreement apply during the time I am granted access to SCI and at all times thereafter. 13. Each provision of this Agreement is severable. If a court should find any provision of this Agreement to be unenforceable, all other provisions of this Agree- ment shall remain in full force and effect. 9. 1 hereby assign to the United States Government all royalties, remunerations, and emoluments that have resulted, will result, or may result from any disclosure, publication, or revelation not consistent with the terms of this Agreement. 10. 1 understand that the United States Government may seek any remedy available to it to enforce this Agreement including, but not limited to, application for a court order prohibiting disclosure of information in breach of this Agreement. 11. I understand that all information to which I may obtain access by signing this Agreement is now and will forever remain the property of the United States Government. I do not now, nor will I ever, possess any 14. I have read this Agreement carefully and my questions, if any, have been answered to my satisfac- tion. I acknowledge that the briefing officer has made available to me Sections 641, 793, 794, 798, and 952 of Title 18, United States Code, Section 783 (b) of Title 50, United States Code, the Intelligence Identi- ties Protection Act of 1982, and Executive Order 12356 so that I may read them at this time, if I so choose. 15. 1 make this Agreement without mental reserva- tion or purpose of evasion. The execution of this Agreement was witnessed by the undersigned, who, on behalf of the United States Government, agreed to its terms and accepted it-as a prior condition of authorizing access to Sensitive Compartmented Information. Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 Sensitive Compartmented Information Nondisclosure Agreement SECURITY BRIEFING ACKNOWLEDGEMENT SFN I hereby acknowledge that I was briefed on the following SCI Special Access Program(s): I certify that the above SCI access(es) were approved in accordance with relevant SCI procedures and that the briefing presented by me on the above date was also in accordance therewith. SECURITY DEBRIEFING ACKNOWLEDGEMENT Having been reminded of my continuing obligation to comply with the terms of this Agreement, I hereby acknowledge that I was debriefed on the following SCI Special Access Program(s): Notice: The Privacy Act, 5 U.S.C. 552a, requires that federal agencies inform individuals, at the time information is solicited from them, whether the disclosure is mandatory or voluntary, by what authority such information is solicited, and what uses will be made of the information. You are hereby advised that authority for soliciting your Social Security Account Number (SSN) is Executive Order 9397. Your SSN will be used to identify you precisely when it is necessary to I) certify that you have access to the information indicated above, 2) determine that your access to the information indicated has terminated, or 3) certify that you have witnessed a briefing or debriefing. Al- though disclosure of your SSN is not mandatory, your failure to do so may impede the processing of such certifications or determinations. FORM 4193 OBSOLETE PREVIOUS IRphn? Farm. 4066. 3968, 4193. sd 4193b 9-83 EDITIONS which vo obrohno and w$ nor b. aud.3 Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 Declassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9 "I know of no safe depository of the ultimate powers of society, but the 01 1 but to inform their on eclassified in Part - Sanitized Copy Approved for Release 2012/08/13: CIA-RDP90GO1353R002000030039-9