RECOMMENDATIONS ON THE LEAK PROBLEM
Document Type:
Collection:
Document Number (FOIA) /ESDN (CREST):
CIA-RDP94B00280R001200020002-2
Release Decision:
RIPPUB
Original Classification:
K
Document Page Count:
12
Document Creation Date:
December 22, 2016
Document Release Date:
March 23, 2009
Sequence Number:
2
Case Number:
Publication Date:
May 31, 1983
Content Type:
MEMO
File:
Attachment | Size |
---|---|
CIA-RDP94B00280R001200020002-2.pdf | 653.26 KB |
Body:
Approved For Release 2009/03/23: CIA-RDP94BOO28OR001200020002-2
.
Director
Intelligence Conin,U111ty Stu t?
%v3shingion. 1) C ?0'5(+S
24 May 1983
S 1 MAY 1983
VIA:
NOTE FOR: DC
SUBJECT: Recommendations on the Leak Problem
The attached memorandum presents our ideas
and some recommendations on the leak problem. It
is the product of two things: (1) three separate
meetings with senior staff personnel, and (2) the
carefully considered thoughts over a long period
of time of the Security Committee. I think it is
pretty comprehensive, and some of the ideas have a
lot of merit. Unfortunately, the memorandum is
also rather long and not well suited for a quick
review. My purpose in sending'it along as is--and
encouraging you to take the time to go through
it--is to give you a timely input as you consider
remedial action.
We are going to continue to pursue the subject
and will advise you of any additional thoughts.
And, of course, we are ready to respond to any
requirements that you may have for us to develop
policies and procedures for the Community.
Attachment
Approved For Release 2009/03/23: CIA-RDP94BOO28OR001200020002-2
Approved For Release 2009/03/23: CIA-RDP94B00280R001200020002-2
Director
Intelligence Community Staff
wesnmoion. D.C. 20505
ICS-0802-83
24 May 1983
MEMORANDUM FOR: Director of Central,Intel l i gence
VIA: Deputy Director of Central Intelligence
FROM:
Director, Intelligence Community Staff
25X1 SUBJECT: Unauthorized Disclosures of Classified Information
1. Senior members of the Intellioence Community Staff have met to
consider responses to your call for proposals to-'counter the unauthorized
disclosures of classified intellioence which are increasing in number and
severity. The recommendations of the group are in five basic categories --
education, legislation, investigations, media interface and information
control. This memorandum discusses proposals in each of these categories.
2. Educati..oD - There appears to be a lack of appreciation of the
consequences of the unauthorized revelation of classified intelligence
informati on',. both to the national security and to the individual. making the
disclosure. Each recipient of Sensitive Compartmented Information (SCI) is
indoctrinated on the potential damage to the national security of such
revelations, as well as the penalties prescribed in Title 18, Sections 793
through 798. Nevertheless, incidents continue which indicate that these
elements of risk are not being taken seriously. Recipients of classified
intelligence must be convinced that its unlawful revelation is reprehensible,
and that individuals who take it upon themselves to decide when the system may
be ignored place the national security and themselves in jeopardy.
3. In wartime, the population recognizes the need to keep military
secrets. The concept that "loose lips sink ships" is well accepted. We need
a campaign, beginning with the President, to convince all concerned that
classified information must be protected if we are to avoid national
disaster. A vigorous Presidential charge to the Cabinet and the Executive
Office of the President, relayed through channels to all levels, is an
essential element of this campaign.
4. Awareness of the importance of security to intelligence must be
extended to the Congress. The whole-hearted cooperation of both-legislators
and staff members.is indispensable. Not only is Legislative Branch support
needed to safeguard ttie.?material provided to the Congress, but.also to put
teeth into. the anti-leak effort.
Approved For Release 2009/03/23: CIA-RDP94B00280R001200020002-2
Approved For Release 2009/03/23: CIA-RDP94BOO28OR001200020002-2
? ?
SECRET
5. To make this effort credible, documents must be classified properly
and concern about disclosures should be limited to those affecting national
security.
6. A one-time effort to sensitize the government and the public to the
disastrous consequences of illegal disclosures, even one kicked off by the
President, has a limited half-life. There must be a planned follow-up. In
addition to the obvious reindoctrination efforts, consideration should be
given to an ongoing program of damage-oriented "lessons learned" presenta-
tions. These are envisioned as timely, specific, succinct and technically
competent videotape shows detailing the nature of the unauthorized disclosure
and the specific losses suffered as a result. They would be shown to
audiences cleared for the compromised information as a means of reinforcing
the need for strong security. .
7. Because of the general derision with which the media regard
government efforts to stop leaks and because the generic term "leak" is
associated with disclosures that are politically Pmbarrassing, It may be
advisable to avoid that term and speak only of "unauthorized disclosures of
classified information."
8. Lec.islat.ion - The existing espionage laws were drafted to protect
U.S. secrets from foreign agents. They did not contemplate the hemorrhaging
of classified data that has followed the media explosion. The divulgence of
classified information to the Russians by way of Jack Anderson's column, for
example, is a relatively new phenomenon. Even though the intentions of the
leaker may be to nobly inform the public of facts he thinks should be known,
the results are the same as directly transmitting the information to the KGB.
9. Attached is a copy of the proposed bill to prohibit certain
unauthorized disclosures of classified information. Formulated on the basis
of the Willard Report, it is an excellent vehicle for closing the loophole
that allows individuals to ignore classifications and make their own decisions
about what must or must not be kept secret. Passage of such a bill would make
it clear that both the legislative and executive branches are serious about
preserving our ability to keep our national security secrets. It would then
remain for the judiciary to show the same resolve.
10. The chances of passing the unauthorized disclosures bill are
directly related to the Congress-'.s percept-ion' of how responsibly the Executive
Branch uses its classification powers. As noted above, the effort to educate
oovernment employees (and the public, to the extent possible) on the need for
effective secrecy must also include the Congress and legislative staff
personnel. The means of reaching this objective are the same for both
branches of government -- graphic demonstrations that unauthorized disclosures
are costly in terms of'money, national defense, intelligence capabilities, and
sometimes, human lives.
11. Legislation also is needed to make the unauthorized possession of
classified material a crime. It is illogical for the U.S. Government to be
Approved For Release 2009/03/23: CIA-RDP94BOO28OR001200020002-2
Approved For Release 2009/03/23: CIA-RDP94BOO28OR001200020002-2
SECRET
unable to brine charges against, or at least sue tolrecover classified
material from, Jack Anderson, who makes a mockery of classification, or from
kviaLion.keek.and. Space.T.echnntom,, which has printed classified satellite
imaoery, the would take action against an ordinary citizen, it should
act with the same vigor against journalists who damage the national security.
The Attorney General and the General Counsels of the Intelligence Community
should begin a crash program to draft a legislative' proposal and to review the
possibilities of action even without?a new law.
12. Whether or not the effort to pass new legislation is successful, it
is vital that Congress be included in any awareness- raisino program. A
.secondary objective would be to raise the security standards of the congres-
sional staffs. Many staffers have access to more sensitive information than
some CIA or NSA personnel, who are polygraphed as well as backgrounded, and
are subject to periodic reprocessing. Congressional staffers are not steeped
in the discipline of security as are the intelligenice professionals, and would
almost certainly benefit from a greater appreciation for the need for secrecy.
13. Finally, the problem of reinforcino the, responsibilities of formerly
cleared recipients of classified information to continue to maintain secrecy
requires attention. A periodic reminder by mail might be considered, but
except for CIA and NSA, it could be difficult to identify those who should
receive them. In the future, the archival file of the Community-wide,-
Computer-assisted Compartmented Control (4C) System', which will contain the
identities of individuals formerly approved for access to SCI, should assist
with this problem. Meanwhile, the message needs to' be spread that our "old
boys" can do a lot of harm by talking too much. Cleared persons still
employed in government must be reminded frequently and forcefully that those-
who have retired, or taken jobs in the industrial sector, may not legally
receive classified-information unless they are specifically cleared for it.
~? L? L i 1
14. 1.~vestioa_~tons - The investigation of f unauthorized disclosures has
rarely proven success u over the years. The broad; dissemination required of
intelligence reporting, the lack of an effectual investigative program
throughout the government, an apparent tolerant attitude toward those who make
illicit disclosures, and the absence of a leoislati;ve basis for action have
made for a highly frustrating situation. NS00-84 offers hope for greater
success in the future, but there is much to be done;.
15. Although leak investigations are searches! for needles in haystacks,
occasionally good investigative work will produce rIIesults. Unfortunately,
unauthorized disclosures to the media are consensual acts between two parties,
neither of whom is likely to admit participation, and one of whom enjoys a
special degree of privilege under the First Amendment. Legislation will help,
but there can't be a trial until a defendant is identified. The abysmal track
record of leak investigations to date dictates that' the Federal Bureau of
Investigation is the only agency with any chance of success. Fragmented,
single-agency efforts simply do not work. Nor does the proposal to form
interagency units to ?inv'estigate unauthorized disclosures offer any reasonable
hope for improvement.
Approved For Release 2009/03/23: CIA-RDP94BOO28OR001200020002-2
Approved For Release 2009/03/23: CIA-RDP94BOO28OR001200020002-2
16. Even the FBI will require some help -- the full cooperation of other
agencies, the legislation discussed earlier, and guidelines that permit the
use of as full a range of investigative tools as possible. The Attorney
General and the Director of the FBI should be instr~ucted by the President to
provide the most permissive guidelines possible, consistent with the protec-
tion of civil liberties, for FBI investigations oflunauthorized disclosures of
classified information. In addition, appropriate manpower allocations to the
FBI should be made to ensure a vigorous effort to solve unauthorized disclo-
sures. Without this, the Bureau cannot be expected to neglect other important
investigations to undertake tasks that offer a low probability of success and
almost certain criticism in the press.
17. Because of the nature of unauthorized disclosures, the likelihood of
developing conclusive evidence.is low. In fact, the investigative tool most
likely to succeed is the polygraph, if conventional investigation can narrow
the number of suspects sufficiently to employ it. If a suspect confesses as a.
result of polygraph interview the case is solved. If, however, in the face of
clear-cut polygraphic evidence of deception he continues to deny culpability,
the problem of acceptability of polygraph evideneeiarises.
18. While prosecution on the basis of polygraph charts is extremely
unlikely to succeed, the government could revoke the individual's clearances
or access approvals on that basis. , This would effectively neutralize future
disclosures by that individual, but could result in a lawsuit to regain the
approvals. The Justice Department and Intelligence Community legal counsels
should be tasked to research the grounds upon which such a suit could be
defended and the likelihood of success.
101. Action based primarily upon polygraph results is certain to bring
strong media criticism. The na1 yr_r_aph_prt cess is little understood and the
press has fostered this misunderstanding by pressing the theme that the
instrument itself is.unreliable. Consideration should be given to preparing
an educational program to be used first with senior, officials of the Executive
Branch and with legislators. It should demonstrate that the effectiveness of
the process doesn't depend totally upon the machine, but is a technique to aid
a skilled interrogator. If a convincing effort can be mounted, it could be
brought to the public and even to the news media. If the Intelligence
Community can't provide objective, rational evidence that the nnlynj:apb.
.iroress is reliable, the entire effort to combat unauthorized disclosures may
be in serious trouble.
20. . P.ress.Interface - NSDD-84 mandates policies' to govern contacts
between media representatives and agency personnel, leaving implementation to
the individual agencies. The effort to eradicate unauthorized disclosures
would be assisted greatly by the adoption of uniform rules for all agencies.
21. The discussi.on of'governmerlt information, especially sensitive
intelligence, by a government employee is not a private, personal matter.
There seems no reason why the government cannot require the reporting of all
contacts with the news-media, during or outside of 'duty hours, in which
Approved For Release 2009/03/23: CIA-RDP94BOO28OR001200020002-2
Approved For Release 2009/03/23: CIA-RDP94BOO28OR001200020002-2
SECRET
oovernment business is discussed. Failure to follow such a rule could be
made subject to administrative sanctions of varying severity. Data on such
contacts could be computerized, by names of government employees, names of
media representatives, subjects of discussions and dates of contacts, pro-
viding a means of determining a great deal of information that could take
inordinate amounts of investigative effort. It wouldn't tell who made
unauthorized disclosures, but it would ,provide a means of determining who
might have had the means and the opportunity, and possibly even the motive
to have done so.
22. It would be ideal, from the standpoint of security, to abolish back-
grounders. Recognizing that this isn't going to happen, there should be firm
control of background briefings to the press. There must be clear-cut guide-
lines on who may authorize and.present backgrounders. Every such briefing
should be attended by a security or public affairs officer wta_kranws__wha__is
&eos.i_tive about the topic being discussed and is capable o, offering gui?cance
to the briefer. A record should be kept of briefings by names of participants
and authorizing officials, dates and topics, preferably in a computerized
mode. Presenters of background briefings should be required to prepare
summaries of what was presented. These should be cross-referenced to the
automated index of background briefings. The documentation of this infbrma-
tion and its retrievability will not only serve as an invaluable investigative
resource, but its existence will promote prudence in the presentation of
backgrounders and in other dealings with the press.
23. Even if all these proposals were adopted, there would be individuals
who would continue to divulge classified information to the press. But they
would find themselves operating at considerably greater risk. Simple failure
to comply with the reporting requirements would be cause for administrative
sanctions, and it would become easier to detect such failures by having a
reliable record of compliance. It is likely that associations between
government personnel and media representatives are known to at least some
associates of both, and the possibility of being reported by a concerned
colleague would be enhanced by the revised rules. An effective education
program about leaks should have the salutary effect of highlighting to their
associates those who may deal with the media without observing the reporting
requirements. If those who comply are sufficiently convinced of the need for
regulation of press contacts, they may be inclined to "blow the whi.stle." It
would then be necessary for the government to demonstrate the seriousness of
its intent by taking administrative action against the.nonreporting
individuals, regardless of their positions.-
24. The matter of "authorized" or."official" leaks needs close atten-
tion. If the appropriate official determines it is in the national interest
to release for publication information that was classified until that point,
there should be a means of recording that fact. Such ?a record would
appropriately be kept somewhere in the Executive Office of the President.
This record could provide a means of avoiding the expenditure of resources
to investigate such disclosures as "leaks."
Approved For Release 2009/03/23: CIA-RDP94BOO28OR001200020002-2
Approved For Release 2009/03/23: CIA-RDP94BOO28OR001200020002-2
SECRET
25. Finally, the revolving door practice of appointing national media
personalities as top level government press officers should be carefully
reexamined. Such appointments mu-st face the incumbents with conflicts of
interest and severely ambivalent feelings, both during and after their federal
service. It may be unrealistic to expect them to deny their colleagues
information which they feel is unjustifiably classified and to expect them
to forget, and never use, information they received officially.
26. lnf=ati_on-.Lontr_n) - Some people believe there are enough
information contra policies, procedures and regulations on the books to bring
the government to a complete halt if they were strictly applied. While this
view may have some merit, it should not serve as an excuse for not trying to
secure our sensitive information. The concept that security is eve'ybody's
business must not be given lip.service and then cast aside.
27. Except for the need for developing a strong, national information
control program for the emerging electronic information systems, it is
unlikely that more document control regulations ?,re needed or practicable.
What is needed is for everyone to be educated in-the existing policies and
procedures and to make a renewed effort to comply. While everyone claims to
know the regulations, it is likely that few could pass a comprehensive -test on
information security and control. -
28. Steps to improve information control would include detailed
comparison of practices with policies; the reeducation of all personnel in
information security, and a motivational program to enhance awareness of the.
consequences of improper handling of sensitive .intellioence. Better
information control is needed, but it must come from motivated people. More
regulations are not the answer.
29. Sumnacv - Unauthorized public disclosures of classified information
in the news me is are damaging to the national security. Our defense against
them must come from within, from those who are cleared for access to, and who
have signed agreements to protect, classified information. It is-clear that
some of these people, for reasons of their own, have not kept their word. It
also appears that neither the overall level of concern about this situation
nor the government's capability for remedial action is up to the job.
30. To encourage wholehearted support of our efforts to protect classi-
fied information, we must convince those who have agreed to keep the secrets
that they have a moral and legal obligation to keep that convenant. The rules
on SCI are simple and clear. it is inconceivable that. anyone who gives such
information to uncleared individuals is unaware of what he is doing.
Therefore, such persons must be unconvinced of the seriousness of the security
program.
31. A massive reeducation program for all legitimate recipients of
classified' information is the first step in attempting to achieve the
necessary change in attitude.
Approved For Release 2009/03/23: CIA-RDP94BOO28OR001200020002-2
Approved For Release 2009/03/23: CIA-RDP94BOO28OR001200020002-2
32. A policy and resource commitment to the solution of at least the
most flaorant cases of unauthorized disclosure is also needed. This means the
devotion of sufficient FBI assets to investioations and an all-out effort to
obtain passage of unauthorized disclosure laws.
33. A severe tightening of policies concerning relationships of cleared
individuals with media representatives is essential. To be meaningful, this
must include. strict ouidelines, reporting procedures, information retrieval
capabilities, and impartial administrative penalities for noncompliance.
34. Renewed awareness of information control policies and procedures and
their importance to the national security is needed. If classified documents
can be turned over to the media or other unauthorized persons without being
noticed, the system isn't working. .It must be made clear' that "the system"
really is the people who operate it.
35. If you wish elaboration or action on any of the above items,
appropriate elements of the Intelligence Communit Staff are prepared to
assist in any way possible.
Attachment:
Draft unauthorized disclosures bill
All paragraphs of the text
are classified SECRET
Approved For Release 2009/03/23: CIA-RDP94BOO28OR001200020002-2
Approved For Release 2009/03/23: CIA-RDP94BOO28OR001200020002-2
SECRET
SUBJECT: Unauthorized Disclosures of Classified Information
Distribution:
Oric - Addressee w/att
1 - DDCI w/att
1 - ER w/att
1 - D/OS/CIA w/att
1 - D/ICS w/att
- C/SECOM Watt
1 - C/UDIS w/att
1 - ICS Registry w/att
SECRET
Approved For Release 2009/03/23: CIA-RDP94BOO28OR001200020002-2
Approved For Release 2009/03/23: CIA-RDP94BOO28OR001200020002-2
In the course of Aministration development of the Fiscal
Year 1984 Intel l igence Authorization B-511, the Intelligence
Community obtained from the Off ice of Management and Budget
clearance of provisions wni h would establish crirt.i sl penalties
for certain unauthorized disclosures of classified informtion.
The provisions were based on the report of the Interagency G- oim
on Unauthorized Disclosure of Classified Iruo mation chaired by
Deputy Assistant Attorney General (Civil Division) Ric rd K. Willard
and were coordinated with Deputy Assistant Attorney Gene, a1 (Crime?i
Division) Mark Richard., as well as with the Office of the Secretary
of Defense/Legislative Affairs.
For. a nunber of reasons, including the issuance of NSDD 84 just
before the Authorization Bill was forwarded to the Hill, and in
deference to the intelligence committees' preference for candling
t}~e. Intelligence Au*-~horizati on in as i obtr.isive a manner as possible,
the irnauthorized disclosures prop ision ultim=ately was not rarsmitted
as part of the Authorization Bill. The proposal has now been con:Eig-sred
as a separate bill, and it has been prepay ed for transmission, at an
oppo, tune moment as a tr Dar`Lite initiative from the DCI, the Secretary
of Defense and the Attorney General.
Approved For Release 2009/03/23: CIA-RDP94BOO28OR001200020002-2
Approved For Release 2009/03/23: CIA-RDP94BOO28OR001200020002-2
( l
To protect against injury to the national defense and foreign
relations of the Dnited States by prohibiting certain
unauthorized disclosures- of classified information.
Be it enacted by the Senate and souse of ReP.resentatives
of the United States of America in Congress assembled, ;hat
Chapter 37 of title 18, United States Code, is amended by
adding at the beginning thereof the f ollowing new section:
"? 751.; Unauthorized Disclosures
(a) Whoever, being an office: or employee of the United
States or a person with authorized access to
classified information, wi11fu11v discloses, or
attempts to disclose, any classi~ied information to a
person who is not. an officer or er~.ployee of the United
States and who does not have authorized access to
shall be fined not more than S10,000, or imprisoned
not more than three years, or both.
(b) Whoever, beinc an officer or employee of the United
States, willfully discloses any classified information
to an officer or employee of the United States with
the intent that such officer or employee disclose the
information, directly or indirectly, to a person. who
is not an officer o: employee of the United States and
who does not have authorized access to it, shall be
.fined not more than $10,000, or imprisoned not more
than three years, or both.
(c) As used in this section--
(i) the term "classified information" means
information or material designated and
clearly marked or represented, pursuant
the provisions of a statute :or Executive
order, as requiring protection against
unauthorized disclosure for reasons of
national security;
(ii) the term "disclose" or "discloses" means to
communicate, furnish, de.liver, transfer,
impart, provide, publish, convey, or
otherwise make available;
C
C
Approved For Release 2009/03/23: CIA-RDP94BOO28OR001200020002-2
Approved For Release 2009/03/23: CIA-RDP94BOO28OR001200020002-2
(iii) the term -authorized access" means havinc
authority, right, or per mission to receive
information or meter i a1 within the scope of
authorized intell ioence activities or
pursuant to the provisions of a statute,
Executive order, directive of
the head of any
department or aoency who is emoowered to
classify i -formation, order Of any Dnited
States court, or vrovisjons Of any Rule Of
the Bouse Of Representatives or resolution Of
the senate which ooverrs ha.ndlinc of
classified information by the respective
House of Congress.
d) Nothing in this section shall be construed to
establish criminal liabili tv for disclosure of
classified informatio: in^, accordance with. applicable
law to .
(i) any court of the UPited--States, or judge or
justice thereof; or
(ii) the Senate Or House of Representatives, or
any co:nmi tree, subco;,,rittee or joint
committee ;:hereof.
SEC. 2. The table of contents of Chapter 37 of title
i g
Dnited States .Code, is amended to include the followi nc ?caption:
"791. Dnauthorized Disclosures".
Approved For Release 2009/03/23: CIA-RDP94BOO28OR001200020002-2