MINUTES OF 11 DECEMBER 1978 MEETING
Document Type:
Collection:
Document Number (FOIA) /ESDN (CREST):
CIA-RDP91G01170R003505680020-9
Release Decision:
RIPPUB
Original Classification:
K
Document Page Count:
32
Document Creation Date:
December 22, 2016
Document Release Date:
July 26, 2010
Sequence Number:
20
Case Number:
Publication Date:
December 15, 1978
Content Type:
MEMO
File:
Attachment | Size |
---|---|
CIA-RDP91G01170R003505680020-9.pdf | 1.34 MB |
Body:
Sanitized Copy Approved for Release 2010/07/26: CIA-RDP91 G01 170R003505680020-9
15 December 1978
MEMORANDUM FOR: Members, Public Affairs Advisory Group
FROM, Herbert E. Hetu, Chairman
SUBJECT: Minutes of 11 December 1978 Meeting
1. The Minutes of the December 19788umeetingmofithe Public Affairs
d f
or y
Advisory Group (PAAG) are attache
/7
3 January
2. The PAAG will meet next at 1000 hours on Tuesda l21 ease notify
Room.
in the DCI Conference
,.Fl+he namPenfnvour alternate. pA proposed
7
-
-
agenda for the next meeting will be uis ,bu ---
er er E. Hetu
Attachment
Minutes
Distribution:
OIG
Charles Briggs
Sanitized Copy Approved for Release 2010/07/26: CIA-RDP91 G01 170R003505680020-9
Sanitized Copy Approved for Release 2010/07/26: CIA-RDP91 G01 170R003505680020-9
Minutes of the
Public Affairs Advisory Group
11 December 1978
Attending: OPA - Herbert Hetu, Chairman
OIG - Charles Briggs
OLC
DDS&
DDO
N FAC
Comp
OEEO
DDA I
OPA
Absent: OGC
CTS
RMS
Minutes
1. Introductory Remarks/Announcements/Reports
The Chairman announced the Director's luncheon for five
newspeople that day and his upcoming breakfast with the NBC bureau (12-
18 people) on 14 December. He reviewed the DCI's activities on his 29-
30 November trip to Boston and the schedule for the upcoming Intelligence
Community Public Affairs Officers meetin~ on 13 December.
The Chairman also announced the DCI's proposed meetings with
employees in the auditorium have been tabled until he gets back from his
overseas trip in late January. -The subject probably will not be brought
up again unless the PAAG so recommends. Mr. Hetu's view is that, if the
idea is revived, the meetings should be open Agency-wide on a first
come-first served basis (not by directorate as originally suggested) and
that topical subjects -- such as intelligence on Iran --should be dis-
cussed briefly, followed by a question-and-answer session. The PAAG
expressed no view of the proposed meetings.
In response to subjects discussed at the 9 November PAAG
meeting, an item on the PAAG appeared in the 28 November Notes From
the Director, and the next meeting agenda and list of members were
posted on the Public Affairs bulletin board.
Sanitized Copy Approved for Release 2010/07/26: CIA-RDP91 G01 170R003505680020-9
Sanitized Copy Approved for Release 2010/07/26: CIA-RDP91 G01 170R003505680020-9
Also as a follow-on to the 9 November meeting, a proposed DCI
letterhead was shown to the group--a blue banner with ICS seal and
"Director of Central Intelligence" in large letters--for possible use on
Public Affairs handouts. The validity of using the ICS seal was
questioned and it was suggested that "Office of the Director of Central
Intelligence" would b sufficient. In response to the question of why
it was needed at all, explained that some of the handouts we
have will be useful to the RM and CT Staffs and to other IC agencies if
they are not on CIA letterhead. The Chairman said we would try to have
another proposal ready by the next meeting.
A proposed new handout on the Intelligence Cycle was passed to
the group for comment and it was explained that it will be used in
reso-ons~
to an enormous number of requests to define this process.
requested that "analysis" appear more prominently in the
production step of the cycle. expressed his reluctance to
alter an Agency and Community-approved efinition, but agreed with
Mr. Hetu to try to find a suitable solution that would incorporate
this request.
Copies of the DDCI's address to the Commonwealth Club of
San Francisco, California on 15 November and the DCI's remarks to the
JFK School of Government at Harvard on 30 November were distributed
for information. The Question & Answer Book with talking points
prepared by Public Affairs for the DCI and DDCI's review prior to
speaking engagements or public meetings was passed around for in-
formation. The Chairman noted that a similar book was envisioned to
be part of Public Affairs eventual support to members of the Speakers
Bureau which is under construction.
Also passed around the table were the stock still-photo
alb that resulted from a contract with former employee
Photos include a variety of scenes of the Headquarters building
inside and out which may be used internally in publications such as
the DCI's Annual Report and externally in response to requests from
newspeople for pictures to accompany stories.
2. DCI's Article for Foreign Affairs, "Protecting Secrets in
a Free Society"
aid the article was circulated for comment by
Ben Evans'and is currently being redone by as a
result. There was discussion as to whether the article was
appropriate for Foreign Affairs, which has a limited audience that is
already enlightened regarding the theme, and because a similar
article appeared in it less than a year ago. The Chairman agreed
with the suggestion that the PAAG should review the article once it
has been redone.
Sanitized Copy Approved for Release 2010/07/26: CIA-RDP91 G01 170R003505680020-9
Sanitized Copy Approved for Release 2010/07/26: CIA-RDP91 G01 170R003505680020-9
STAT
3. CCTV
The Chairman recommended a written recommendation be sent
to DDA regarding the future of CCTV.
A sampling of o inion regarding TV's in the cafeteria has
proven to be negative. suggested that the PAAG attack the
problem from a positive side; that the objective, once defined, would
suggest the placement of the TV sets. The Chairman said the original
reason for the TV's was to accommodate overflow in the auditorium
and to rebroadcast commercial shows of interest to the Agency. He
emphasized his concern that the system be effectively used, either
where they are now or elsewhere, such as in classrooms.
The means for the Agency to communicate internally with
its own employees was discussed as a possible alternative use of
the CCTV.
Members of the PAAG were asked to solicit ideas from their
component organizations.
4. Speakers Bureau
The Chairman noted that the progress of the Bureau has been
delayed for the lack of a full time Director and because of such
problems as the support speakers would need from OPA and a decision
as to who pays for travel. The Chairman also noted that a recent
PMCD survey recommended that OTR's briefing billet be transferred
to OPA and several members expressed agreement with the recommendation.
projects:
5. Goals
Mr. Hetu reported on the status of several goal-related
Multi-media show - Contract has been let and we met
with the designer and writer last Friday. Target
date for completion: 1 May 79
One-day Media Seminar at Headquarters - Cancelled
because of negative reattion to the idea both from
within and from respected members of the media.
Strengthen the Publications Review Board Procedures -
Need an updated Agency regulation on the process, but
it is currently working well. In response to a question,
STAT said that the PRB in recent months has been
Brochure - Considerable text has been written and
Suzanne Black is working with an Agency designer on
composition and layout. We hope to have something to
show the PAAG by January.
able to stay, within the 30 days allowed for review.
Sanitized Copy Approved for Release 2010/07/26: CIA-RDP91 G01 170R003505680020-9
Sanitized Copy Approved for Release 2010/07/26: CIA-RDP91 G01 170R003505680020-9
6. Purpose of PAAG
There was a request for clarification of the purpose of
the PAAG and what is expected of its members. It was suggested that
members be given items to consider in advance of meetings so that they
would have full opportunity to play "advisory" roles. The Chairman
said that the point is well taken, that he is not only looking for
advice from the PAAG but for feedback as well, in an effort to try
to overcome misconceptions about what OPA is trying to do.
7. University Student Group Visits to Headquarters
distributed for information a memorandum dated
28 November 78, which he had sent to D/OS recommending reconsideration
of the policy of limiting student groups to rium and
excluding non-US students from the compound. said these
restrictions seriously hamper the mission of is o ice.
Mr. Briggs suggested that public image be focused on the
intelligence world, rather than CIA specifically, and to overcome
problems such as space and security, other buildings such as those
in the_complex be considered for meetings of both external
and internal groups, task forces, etc.
8. I lannounced that the DDCI was to testify before the
House Assassinations Committee that day at 1400.
9. The Chairman closed the meeting by asking for members inputs
to future agendas.
Herbert E. Hetu, Chairman
Respectfully submitted:
Sanitized Copy Approved for Release 2010/07/26: CIA-RDP91 G01 170R003505680020-9
Sanitized Copy Approved for Release 2010/07/26: CIA-RDP91 G01 170R003505680020-9
Intelligence is knowledge and fore-
knowledge of.the world around us-
the prelude to Presidential decision
and action.
WASHINGTON. D.C. 20505
PUBLIC AFFAIRS
Phone: (703) 351-7676
The Intelligence Cycle
is the process by which information is acquired, converted into intelligence, and made available to
policymakers. There are usually five steps which constitute The Intelligence Cycle.
1. Planning and Direction
This involves the management of the entire intelligence effort, from the identification of the need for
data to the final delivery of an intelligence product to a customer.
The whole process is initiated by requests or requirements for intelligence on certain subjects. These
are based on the ultimate needs of the policymakers-the President, the National Security Council, and
other major departments and agencies of government.
2. Collection
This involves the gathering of the raw data from which finished intelligence will be produced. There are
many sources for the collection of information, including foreign radiobroadcasts, newspapers,
periodicals, and official government personnel stationed in American embassies abroad.
There are also secret sources, such as agents and defectors who provide information obtainable in
no other way.
Finally, technical collection-photography and electronics-has come to play an indispensable part
in modern intelligence by extending the Nation's sensory system-its eyes and ears.
3. Processing
This step is concerned with the conversion of the vast amount of information coming into the system
to a form more suitable for the production of finished intelligence, such as in language translations,
decryption, and sorting by subject matter. The information that does not go directly to analysts is
sorted and made available for rapid computer retrieval.
Processing also refers to data reduction-interpretation of the information stored on film and tape
through the use of highly refined photographic and electronic processes.
4. Production and Analysis
This refers to the conversion of basic information into finished intelligence. It includes the integra-
tion, evaluation, and analysis of all available data and the preparation of a variety of intelligence products.
Such products or estimates may be presented as briefings, brief reports or lengthy studies.
The "raw intelligence" collected is frequently fragmentary and at times contradictory. Analysts, who are
subject-matter specialists for a particular country, produce finished intelligence by evaluating and
integrating the various pieces of data and interpreting their meaning and significance.
The subjects involved may concern different regions, problems, or personalities in various
contexts-political, geographic, economic, military, scientific, or biographic. Current events, capabilities,
or probable developments in the future may also be examined.
5. Dissemination
The last step is the distribution and handling of the finished intelligence to the consumers of intelligence,
the same policymakers whose needs triggered the Intelligence Cycle.
Sound policy decisions must be based on sound knowledge. Intelligence aims to provide that knowledge.
Sanitized Copy Approved for Release 2010/07/26: CIA-RDP91 G01 170R003505680020-9
Sanitized Copy Approved for Release 2010/07/26: CIA-RDP91 G01 170R003505680020-9
PUBLIC AFFAIRS
Phone: (703) 351-7676
MEMORANDUM FOR: .PAAG Members
For discussion at next PAAG meeting. See
Item 1, para. 4 of Minutes of 11 Dec
Meeting.
Sanitized Copy Approved for Release 2010/07/26: CIA-RDP91 G01 170R003505680020-9
Sanitized Copy Approved for Release 2010/07/26: CIA-RDP91 G01 170R003505680020-9
f ::y E s: t 3 ti! Z.i 3 Y: S i i~ 3 u
NFAC #5339/78
28 November 1978
MEMORANDUM FOR: Mr. Robert W. Gambino, Director of Security
THROUGH . Director, National Foreign Assessment Ce
FROM : Coordinator for Academic Relations, NFAC
SUBJECT New Security Regulations on University Student Group
Visits to Headquarters
1. It has come to the attention of this office that over the past
several weeks there has been a change in security policy on two aspects
of university student group visits to the Headquarters Building. These
changes are:
a. Limiting student and faculty visitors to the
Auditorium.
b. Excluding any foreign national student attending
a US institution of learning from entering the compound.
These restrictions are severely limiting our ability to run a successful
program.
2. Background: When the job of Coordinator for Academic Relations
and Externs na ytical Support (and later that of Associate Coordinator)
was created as a full-time position, its charter included an effort to
change the image of CIA in the academic community. As part of this effort,
a program of Headquarters visits and briefings of university student
groups was undertaken. These visits usually consist of an unclassified
briefing on the CIA, especially on NFAC and its functions of supporting
US policymakers. Sometimes, discussions on functional or regional
problems are added.
3. Our program has centered on graduate and undergraduate schools
with strong programs in area studies and foreign affairs or schools that
run courses on national security problems. In the past two years, NFAC
Sanitized Copy Approved for Release 2010/07/26: CIA-RDP91 G01 170R003505680020-9
Sanitized Copy Approved for Release 2010/07/26: CIA-RDP91 G01 170R003505680020-9
ADMINISTRATIVE - INTER!!AL USE ONLY
NFAC #5339/78
SUBJECT: New Security Regulations on University Student Group
Visits to Headquarters
has hosted 24 university student and faculty groups from Syracuse
University (the Maxwell School), Columbia University (the International
Fellows Program), West Point, the University of California, Princeton
University, Illinois Wesleyan University, Colgate University, and the
University of Michigan. These groups have ranged in size from ten to
150 people. Often they included a few foreign nationals.
4. At the 26 October 1978 meeting of university presidents with
Admiral Turner, the visitors pointed out that student visits to the
Agency are a major way of improving the Agency's image with the student
body. The university presidents suggested that this program be expanded.
The program also has had positive aspects besides the obvious public
relations effects. For example, the program has aided in establishing
good personal relationships with faculty members on many campuses. These
contacts are useful in recruiting employees and consultants. In addition,
many of the students and some faculty members who visit become interested
in employment by the Agency. Further, some students who visit us will
find employment at the State Department, the Department of Defense or the
Treasury, where they will begin with an awareness of the resources
available from the Agency and will be more inclined to coordinate their
work efforts with Agency analysts.
5. The Problem: The restriction that limits all student groups to
the Auditorium during working hours severely limits our ability to run a
successful briefing program. First, there are the physical problems.
The Auditorium is often booked when student groups would like to visit
the Agency. Many of these groups are from out of town and are planning
a Washington visit for only a day or two. Their flexibility in time and
date of visit is limited and with only the Auditorium, so is ours. For
example, recently a small group of honors students from the University
of Michigan were planning to visit Washington for one day only, 27 November.
They requested a series of area briefings similar to those received by the
same group last year. We had to turn them down because the Auditorium
had been booked all day for a series of security briefings.
6. On occasion we have had several groups requesting visits on the
same day and even at the same time of day. If we are limited to the use
of the Auditorium, we can only accommodate one group at a time. As a
-2-
ADMINISTRATIVE - INTERNAL USE ONLY
Sanitized Copy Approved for Release 2010/07/26: CIA-RDP91 G01 170R003505680020-9
Sanitized Copy Approved for Release 2010/07/26: CIA-RDP91 G01 170R003505680020-9
AOMmISTRATIVE - INTERNAL USE IJ LY
NFAC #5339/78
SUBJECT: New Security Regulations on University Student Group
Visits to Headquarters
case in point, we are scheduled again this year to host the language clubs
from the US Military Academy at West Point in April, 1979. These clubs,
of which there are usually at least three, have about 40 members each.
In the past they have been given individual area briefings; for example,
a Soviet area briefing for the Russian language club and a Middle East
situation briefing for the Arabic club. Obviously it will not be
feasible to do this, unless we have three or four separate rooms to
meet in.
7. There are also certain valuable intangibles such as the atmosphere
of intimacy a briefing creates. This is hardly achievable, however, if we
are forced to brief 20 students in an auditorium that holds 500. A small
conference room would serve much better. In addition, we are told that
the trip to the Agency is often the highlight of a student group's trip
to Washington. Many of our visitors are greatly impressed with our
facilities and go away with the feeling that they have seen something
few others have seen.
8. The second change in security procedure, that of excluding foreign
students from participating in Agency visits, will probably have an even
more damaging impact upon our program. We naturally seek to attract
graduate students involved in area study programs or foreign affairs
curriculum at major universities. These types of programs from major
universities usually attract a number of foreign students for obvious
reasons. At present, there are over 235,000 foreign students registered
in colleges and universities throughout the US. It is very difficult to
tell a program administrator or faculty member that he can bring forty
of his students into the compound but must not bring his two non-US
students. In discussions with university officials on this matter, I
have encountered resentment and a general lack of understanding. The
reaction usually is to question what a few well-mannered non-US students
could possibly do to the Agency, which has a security force capable of
coping with TV and movie cameras shooting in the building.
ADMINISTRATIVE - INTERTA1 !J1E D 11
Sanitized Copy Approved for Release 2010/07/26: CIA-RDP91 G01 170R003505680020-9
Sanitized Copy Approved for Release 2010/07/26: CIA-RDP91 G01 170R003505680020-9
ADMINISTRATIVE - INTER>AL USE ONLY
NFAC #5339/78
SUBJECT: New Security Regulations on University Student Group
Visits to Headquarters
9. Recommendation: That the policy of (a) limiting student groups
to the Auditorium and (b) excluding non-US students from the compound
be reconsidered.
-.4-
ADMINISTRATIVE - INTERNAL USE ONLY
Sanitized Copy Approved for Release 2010/07/26: CIA-RDP91 G01 170R003505680020-9
Sanitized Copy Approved for Release 2010/07/26: CIA-RDP91 G01 170R003505680020-9
i S" V..:~ ...wi
NFAC #5339/78
SUBJECT: New Security Regulations on University Student Group
Visits to Headquarters
Distribution:
Original - Addressee
1 - D/NFAC
1 - DDA
1 - A/DCI/PA
1 - NFAC Security Officer
2 - NFAC/CAR
1 - NFAC Registry
NFAC/ACAJ
is (28 November 1978)
Sanitized Copy Approved for Release 2010/07/26: CIA-RDP91 G01 170R003505680020-9
Sanitized Copy Approved for Release 2010/07/26: CIA-RDP91 G01 170R003505680020-9
PUBLIC AFFAIRS STAFF
Deputy Director Frank D. Carlucci
Address The Commonwealth Club
San Francisco, California
Wednesday, November 15, 1978
Sanitized Copy Approved for Release 2010/07/26: CIA-RDP91 G01 170R003505680020-9
Sanitized Copy Approved for Release 2010/07/26: CIA-RDP91 G01 170R003505680020-9
AMBASSADOR SHIRLEY TEMPLE BLACK: ...the Congo, Tan-
zania and Brazil, where he was Counselor for Political Affairs.
Returning to Washington in 1969, he served two years with the
Office of Economic Opportunity, one year with the Office of
Management and Budget as Deputy Director, and two years with
Health, Education and Welfare as Undersecretary. In 1974, he
returned to overseas service as U. S. Ambassador to Portugal
during the turbulent times when socialism and communism were
locked in their own wrestling match over Portugal.
Our guest has received Distinguished Service awards
from three departments -- State, HEW and Defense; an honorary
doctorate from two universities. Not only is he is a distin-
guished public servant and wrestler, he also served briefly as
an officer in the U. S. Navy, which would provide a bond of
professional interest with both the Director of the CIA and
and the President.
We are delighted to welcome a gentleman that's got
very serious and profoundly important responsibilities. Ladies
and gentlemen, may I present to you the Deputy Director of Cen-
tral Intelligence, Mr. Frank C. Carlucci.
[Applause.]
DEPUTY DIRECTOR FRANK CARLUCCI: Thank you very much,
Ambassador Black, President Javits. After that introduction,
I'm not sure whether I should give you a speech or wrestle.
I will try the former.
As I thought about the topic of the real issues facing
the CIA, a plethora of subjects lept to mind. And I tried to
distill them down to essentially four. Well, let me give them
to you directly and then go over them.
Number one, the nature of the external threat. Number
two, the challenge of the changing nature of the intelligence
business. Number three, the imperative to define the role of a
secret organization in a free society. And number four, our
Sanitized Copy Approved for Release 2010/07/26: CIA-RDP91 G01 170R003505680020-9
Sanitized Copy Approved for Release 2010/07/26: CIA-RDP91 G01 170R003505680020-9
ability or inability, as it may be, to protect our vital informa-
tion; in particular, our sources and methods. Let me look at
these one at a time.
In terms of the nature of the external threat, I sup-
pose there were some of us in the early 1970s who were thinking
in terms of the changing adversary, a new kind of world order,
a different kind of relationship between the big powers. And
indeed, it is fair to say that all of us hoped that this will
come about. But there have been two events, at least, that have
occurred in the mid and late 1970s which have certainly at least
raised warning signs. First are the rather extensive and blatantly
imperialistic activities of the Soviet Union and its Cuban proxy
in Africa. This has reminded us all too clearly that communist
doctrine is a revolutionary doctrine and that it is directed at
the kind of free society that we represent. I had an opportunity
to observe this at firsthand in 1975 in Portugal.
Secondly, we have all watched the increasing resources
being devoted by the Soviet Union to its defense establishment, or,
better stated, its offensive establishment. The United States de-
votes somewhere between five and a half to six percent of its GNP
to defense expenditures. The Soviet Union devotes more than double
that. In the past ten years, U. S. defense expenditure has actu-
ally declined in real terms. The Soviets' defense expenditure has
increased at a rate of about four or five percent per annum.
If we try to measure what they are doing in terms of
dollar value, that is how many dollars does it take to purchase
what they are doing in defense areas, we find that their effort
exceeds ours by some thirty-five to forty percent, certainly far
more than they need for their legitimate defense requirements.
WeII, what does this mean in the intelligence area?
It means, first of all, that we have reached an era of strategic
parity. The United States no longer has a vast lead. Simply
stated, that means we can't afford to make any mistakes. A
couple of years back, missing out on some information on some
new alliance might not have made a difference. But today it could
make a difference both in political and military terms.
That is why we find our military commanders increasingly
placing more emphasis on intelligence, on what they call strategic
w a r n i n g . Those few hours , those few days cou I d make the c r i t i c a l
difference. An obscure troop movement somewhere, the movement of
some atomic weapons, the deployment of submarines, maybe a report
picked up by a strategically placed agent could reveal some intent
or some kind of new alliance.
Indeed, intelligence today could provide the critical
difference. And that, I suggest, is very real. We learned the
lesson awfully painfully in 1941 at the time of Pearl Harbor. And
Sanitized Copy Approved for Release 2010/07/26: CIA-RDP91 G01 170R003505680020-9
Sanitized Copy Approved for Release 2010/07/26: CIA-RDP91 G01 170R003505680020-9
it was for that reason that the CIA was created.
Now since then, the nature of the intelligence business
has changed rather dramatically. And this brings me to my second
issue: the challenge that that change represents. Certainly we
still have to keep an eye on the strategic balance, and we have
to watch what the Warsaw Pact is doing. But that's not enough
in a complex, intriguing world. We also have to keep our eye
on regional and issue-oriented problems. A couple of years back,
it was enough just to take a look at one country and analyze that
country and say "Where is it heading?" That kind of analysis no
longer serves us very well.
Just take a look, for example, at the Horn of Africa,
Ethiopia and what's happening in the Ogaden and in Eritrea. But
you can't look at that in isolation. You have to look at what's
happening in Somalia, how does it affect the Sudan; what about
Egypt, what about the People's Democratic Republic of Yemen right
across the Gulf; how does the Cuban presence in Ethiopia relate
to the Cuban presence in Mozambique; what does this all mean for
Angola. Indeed, you could make an analysis that would stretch
all the way from Zimbabwe up to Afghanistan.
So it's become much more complicated to look at nations
today. And it no longer serves just to have one country as your
specialty.
Secondly, we have to deal with a lot of issues today
that we didn't have to, things that were never dreamed of at the
time CIA was founded. Let's take the intention of some countries
to build nulcear weapons, a matter of intense concern to the ad-
ministration. And there are countries in the world that are doing
that, and they're doing it without trying to let anybody know about
it. And in many Instances, it is only through intelligence that
we can find out.
Of course, nobody in his right mind would think of hav-
ing a SALT treaty if we didn't have the means to implement it.
And that means will have to fall principally to our intelligence
agencies. Even such issues as the North-South dialogues have
have national security implications these days. And then we
have a couple of others that sometimes touch us in very personal
ways. The question of narcotics. The best way to stop the nar-
cotics trade is to stop it abroad. A lot of that information comes
clandestinely through intelligence.
Or terrorism. Practically the only way to stop terrorism
is to find out about it in advance, to have a penetration. For-
tunately, we've been spared a lot of that in this country. But
there is still a danger to our people abroad. And we in the in-
telligence business do try to penetrate terrorist groups, sometimes
successfully, sometimes not so successfully.
Sanitized Copy Approved for Release 2010/07/26: CIA-RDP91 G01 170R003505680020-9
Sanitized Copy Approved for Release 2010/07/26: CIA-RDP91 G01 170R003505680020-9
And finally, there are the resource issues. Whoever
thought at the time that Central Intelligence was being set up
that we would be worried so much about the world's oil reserves
and what's going to happen. And whether or not you agree with
the study that's been put out on this subject, I think you have to
agree that we made these studies in the interests of our national
security. And this requires very careful intelligence collection.
Finally, there are the new techniques. And a lot has
been made about the technical systems, and indeed these systems
will be extremely helpful; indeed essential to verifying SALT.
Some people have said to me, "Well, you have the technical systems.
Why do you need the human element?" A very simple answer. The
technical system will tell you what happened yesterday and what
may even be happening today. But it can't tell you what's going
to happen tomorrow. It can't tell you what people's intent is.
And as long as we need to know the intentions, there will continue
to be a human element in the collection business.
Now, CIA for a number of years has been on the front
pages of your newspapers. There's been a lot more written than
we would like to see. It's not been the best climate in which
to conduct an intelligence operation. Some of the charges have
been sensationalist; others have been factual. But they have led
to what I believe is, by and large, a constructive debate. And
that is a debate on what the role of a secret agency in a free
society ought to be.
But let's try and put, first of all, some of the charges
into perspective without making any effort to defend against all
of the charges that have been made. But there is an impression
among some that the CIA intelligence community is some kind of a
rogue elephant on the loose. And let me just quote a few things.
The Church Committee itself, which conducted a far-reaching and, I
think it's far to say, not terribly friendly investigation of the
CIA, said [words unintelligible]. The Pike Committee, on the
House side, said, and I quote: "All evidence suggests that the
CIA, far from being out of control, has been utterly responsive
to Instructions of the President and the assistants for national
security."
Senator Inouye, the highly respected chairman of the
first Senate oversight committee, put it even more strongly. He
said, and I quote: "There's no question that a number of abuses
of power, mistakes in judgment and failures by the intelligence
agency have harmed the United States. In almost every instance,
the abuses that have been reviewed were the results of directions
from above, including Presidents and secretaries of State. Further,
in almost every instance, some members of both houses of Congress
assigned to give oversight were knowledgeable about the activity."
And to blame the CIA for implementing some of these poli-
Sanitized Copy Approved for Release 2010/07/26: CIA-RDP91 G01 170R003505680020-9
Sanitized Copy Approved for Release 2010/07/26: CIA-RDP91 G01 170R003505680020-9
Gies is somewhat akin to blaming the Army for the landing in the
Dominican Republic, blaming Marines for the landing in Lebanon
in the mid 1950s. It was an organization that was carrying out
orders.
But be that as it may, I ' m prepared to concede the
point that we have a credibility problem, or a political problem,
or both. And the best way to correct that problem is to reassure
the American people that a proper set of checks and balances have
been instituted, that the abuses that occurred in the past will
not re-occur.
And I think I can tell you in all candor that these
checks and balances do exist. And the Director and I practice
very much an open door policy. If people have dissents or grie-
vances, we're readily available. And the internal insepection
system has been strengthened, and it has a full mandate to look
into any charges.
Over and above that, the President has established by
Executive Order something called the Intelligence Oversight Board,
consisting of three distinguished Americans -- Tom Farmer, former
Governor Scranton, former Senator Gore -- which is entirely in-
dependent of the CIA. It reports directly to the President, and
it is empowered to hear any complaint of wrongdoing from any citi-
zen, anywhere, including CIA employees, without any reference to
to the Director of Central Intelligence.
And finally, and perhaps most importantly, there is
congressional oversight. The congressional oversight system has
been greatly strengthened in the past two years, both on the Senate
and the House side. I think we have constructive relationships
with our parent committees. But that doesn't mean that they don't
hesitate to criticize us, or to cut off our funds when they think
we're doing something they don't approve of. But this kind of
constructive oversight is welcomed.
Finally, we are in favor of seeking charter legislation
for the intelligence community. We think this kind of endorsement
by the people's representatives in Congress will be helpful. But
we also think that charter legislation ought to be just that: broad
legislation that gives us certain authorities and sets up procedures
to make sure there are no abuses of these authorities. It should
not be a form of micro management. And there are difficult issues
here. Some people say we ought to write into the charter that we
shouldn't overthrow democratic governments, and there shouldn't be
any relationship with the press, all of which sounds fine until
you get down to the question of trying to define what a democratic
government is. Or when you think about the press, does that mean
that the CIA shouldn't have a relationship with a TASS correspon-
dent? Oh, of course not. He's a communist. How about some other
countries that we may not like, but aren't communist? The question
Sanitized Copy Approved for Release 2010/07/26: CIA-RDP91 G01 170R003505680020-9
Sanitized Copy Approved for Release 2010/07/26: CIA-RDP91 G01 170R003505680020-9
gets quite complex. When you start trying to legislative morality,
it becomes very difficult.
Let's take a look at terrorism. I mentioned earlier
that the best way to stop terrorism is to penetrate it. And
in several instances we've received information that has saved
lives, including lives of U. S. Ambassadors. But what do we do
when our agent in a terrorist group is ordered to go on a hit,
or maybe a bank robbery? Well, obviously, you don't authorize
him to go out and kill. But if we tell him not to, his life is
then in danger. A difficult judgment to make; and even more
difficult to make in legislation.
I would suggest that the best way is through the nor-
mal procedures, and that is to have Congress confirm in office
executives in whom they will have the confidence to make the
difficult kind of judgment calls, and then to exercise the proper
oversight.
Now in coming to this, we have gotten ourselves into
situations where the micro management doesn't seem to make much
sense. You have a requirement, for example, that every time
that the CIA engages in anything other than pure intelligence
collection, something euphemistically called special activity
-- it used to be called a covert action -- there has to be a
presidential finding and we have to brief seven committees of
Congress, up to 140 people. It sounds fine, until the other day,
during the Moro kidnaping, we received a request for assistance
from the Italian government. They said "Could you send us a
psychiatrist who knows something about terrorism?" I said sure.
The lawyer came in and said "Huh-huh, that's not intelligence
collection. That's a specialized case. And to do that, you'll
have to get a presidential finding." The President happened to
have been visiting Brazil at that point. "And then you'll have
to brief these committees of Congress, 104 congressmen." I said
"What? To put a psychiatrist on an airplane?" The answer was
yes.
I called up the State Department and said "Do you have
a psychiatrist?" He said yes. I said "Will you please put him
on an airplane and send him to Rome?" That was that. But it
just doesn't make much sense.
Or let me give you a hypothetical example. Let's say
we have a democratic election in country "X." And a group of
generals begin to wonder about that election. They don't like
the candidates for election. And we have an agent in that country
who happens to be a general. And he comes to us and says "What
should I do? Should I side with the generals, or should I say
'Go pull off a coup?'" Well, if I understand the law, before we
give him advice, we would have to have a presidential finding and
brief nearly a dozen committees of Congress. And how long do you
think the name of that general will remain a secret? Obviously
Sanitized Copy Approved for Release 2010/07/26: CIA-RDP91 G01 170R003505680020-9
Sanitized Copy Approved for Release 2010/07/26: CIA-RDP91 G01 170R003505680020-9
we're not going to give him advice.
And I simply put these kinds of issues out as the
type of thing that can be addressed and, I hope, simplified
in charter legislation.
My last issue, our ability to protect our sources and
methods, is probably the most fundamental of all. No matter how
sincere people are, it is simply axiomatic that the more people
know about something, the greater is the likelihood that it will
become public. And frankly, too many people know about what is
going on in our intelligence community today. And in fact, there
are those who make a career out of trying to expose the names of
CIA employees. There's a former CIA employee named Philip Agee
who prints in DuPont Circle, in Washington, D. C., a monthly pub-
lication called "Covert Action," which is designed, purely and
simply to expose the names of CIA people overseas and does so in
such a way that it clearly incites people to violence. And we
have some unhappy memories of that kind of thing.
Yet when we look at ways to deal with this, we find
that we antequated espionage laws. We have laws in this country
that make it a crime just to give out information from the Depart-
ment of Agriculture on crop futures, or to give out information
from the Department of Commerce, or information from the IRS.
But there is no such law with regard to national security. It
is only a crime if you can prove intent to harm the United States,
which is very difficult to do.
So it's no wonder that we have people who come into
the CIA, spend some time, go out and write a book, make some
money. And we find that our only legal remedy right now is a
civil suit; hardly adequate if we're going to maintain the in-
tegrity of our intelligence secrets.
And in fact, some of our laws wouldn't seem to help.
I mentioned Philip Agee before. Under the Privacy Act and the
Freedom of Information Act, we have three people in the CIA,
at least at the last count I made, who are spending ful Itime
supplying information to Mr. Agee.
Now in terms of making information available to the
public, we favor it. And I think Admiral Turner spoke to this
group about it last year. Our agency puts out some hundred and
fifty finished reports on serious topics, such as economic develop-
ments in the Soviet Union, the steel industry in China, world oil
reserves. I think that serves a useful purpose, and we intend to
continue that. But at the same time, we find that we have diverted
109 man years to answering 85 Freedom of Information Act requests
a week; people writing in saying "Tell me all about the Berlin
Tunnel," one of whom was a 13 year old. It's not that I see any-
thing wrong with the Freedom of Information Act. But when it comes
Sanitized Copy Approved for Release 2010/07/26: CIA-RDP91 G01 170R003505680020-9
Sanitized Copy Approved for Release 2010/07/26: CIA-RDP91 G01 170R003505680020-9
to an intelligence agency, it is virtually self-deafeating. We
spend 2.6 million dollars supplying this information, at approxi-
mately $540.00 per request, most of which goes to taking out
the national security information. So when the product emerges,
it amounts to very little, except that it's been helpful to one
or two authors.
Also as I understand the act, if the head of the KGB
were to write and say "Tell us about the KGB, what you have in
your files on the KGB," we would legally have to respond in ten
days. And if we turned down his request on security grounds, he
would have twenty days in which we have to respond -- we would
have twenty days to respond to his appeal.
Now, I suggest that we don't want to turn an agency
designed to provide our policy-makers with the best possible in-
formation to the purveyor of information to the world.
I can say that this is a matter of very serious concern
for us. The issue is very simple. Do we need an intelligence
organization? The answer is, yes. Then you have to accept the
fact that with that organization comes some secrecy. And secrecy
is not a new concept in our society. When we talk about the doctor-
patient relationship, the lawyer-client relationship, the secrecy
of grand juries, credit information, why should someone who pro-
vides information to the U. S. government be entitled to less
than that? Indeed, I find myself in agreement with our friends
in the press when they say they've got to protect their sources,
because if they can't protect their sources, they're going to lose
information. That's exactly our point.
A couple of differences. Their stand is based on a
constitutional interpretation which is still open to dispute.
Our responsibility to protect our sources is very specific in
the 1947 National Security Act. And in most cases, if they lose
their sources, they lose information. Quite frankly, in some
cases if we lose our sources, lives are at stake. So I think
it is a very serious issue.
I'm frequently asked, well, how do we stand? How do
we do vis-a-vis the adversary? And let me close on this note.
The KGB has more resources than we have. They have fewer re-
straints than we have. They operate with a pretty few hand.
They also have disadvantages. Technically, we're ahead. And
they carry around an awful lot of ideological baggage. And the
worst way to deal with intelligence is from an ideological per-
spective. In many cases, intelligence is bad news. And I would
not like to be the bearer of bad news to the Kremlin.
The fact is that our analytical capability is, in my
judgment, far superior to theirs. Yes, I still think we're num-
ber one, and we need to be number one. But we're going to have
Sanitized Copy Approved for Release 2010/07/26: CIA-RDP91 G01 170R003505680020-9
Sanitized Copy Approved for Release 2010/07/26: CIA-RDP91 G01 170R003505680020-9
to run to stay ahead. We're going to have to work hard. We're
going to make progress, and to make that progress we're going to
need the support of groups such as this.
And I thank you very much for the opportunity to let
me make my speech here tonight.
Thank you.
Sanitized Copy Approved for Release 2010/07/26: CIA-RDP91 G01 170R003505680020-9
Sanitized Copy Approved for Release 2010/07/26: CIA-RDP91 G01 170R003505680020-9
Address by Admiral Stansfield Turner
Director of Central Intelligence
JFK School of Government
Cambridge, Massachusetts
Thursday, 30 November 1978
IS THE CIA ACCOUNTABLE?
I am very pleased to be back at Harvard and to share with you some of
the significant new trends that I see in the intelligence process of
our country today. There are few public institutions in history that
have undergone such thorough public scrutiny as has the American
intelligence community in the last four years, particularly, the
Central Intelligence Agency.
The CIA is and should be our most secretive government agency.
The fact that it has undergone this public scrutiny is really extraordinary.
Perhaps it is the first time the world has had opened up to it a major
intelligence organization in almost all of its aspects. It has been a
traumatic experience for those of us in the intelligence community. It
has damaged morale. The typical intelligence officer, for instance,
feels that he is performing a difficult, patriotic task which requires
great sacrifice on his part. When he finds his activities exposed in
the public media and severely criticized, he cannot help but feel
that the country neither understands nor appreciates that sacrifice.
That is a shame because we are very dedicated to you and to the entire
country.
The trauma also extends to the fact that it is more difficult to
do our job under these conditions. It has damaged our capability to
perform the intelligence functions authorized by law. When we cannot
Sanitized Copy Approved for Release 2010/07/26: CIA-RDP91 G01 170R003505680020-9
. Sanitized Copy Approved for Release 2010/07/26: CIA-RDP91 GO117OR003505680020-9
ensure adequate secrecy, foreigners who are willing to work on our
behalf and support our country; foreign governments whose intelligence
services complement ours are certainly much less willing to do so.
It has been a traumatic period for the American public also.
Americans like to view the world in idealized terms and yet the world
is not ideal. It is not open and free. The world is a highly competitive
place and more societies than not are closed and totalitarian. Not all
countries are willing to tell us what they are going to do in advance,
even if their actions may be inimical to our interests. Let me
remind you only of the great Soviet wheat steal of 1972 where we simply
lacked the statistical data base to drive the proper bargain for our
national interests.
Today, if we are to protect those interests and our pocketbooks,
we must have good information about what is going on in the rest of the
world. It is, in fact, much more important today than ever before.
Thirty years ago, when the Central Intelligence Agency was founded,
we were the preeminent military power in the world; we were a totally
independent economic power and many if not most of the world's free
nations took their political cues from us. How different is today's
world. We are one of several interdependent economic powers. We do
not dominate the world's political scene. Small nations and large
are activist and independent. We are much closer to military parity.
In these circumstances, the leverage of good information is much
greater than it was in the days of economic, political, and military
superiority.
Sanitized Copy Approved for Release 2010/07/26: CIA-RDP91 G01 170R003505680020-9
Sanitized Copy Approved for Release 2010/07/26: CIA-RDP91 G01 170R003505680020-9
Yet, if we are going to have better intelligence, we also must
have at least as much secrecy as we have had in the past and the
ability to keep national secrets. There is of course a contradiction
between the importance of continued secrecy and the danger of secrecy,
as shown by the exposures of the last four years. Secrecy can lead to
unidentified power. Power in any form can be abused, but unidentified
power has a particular potential for abuse. How then can we provide
for good intelligence for our country and yet insure against abuse?
On the one hand we can underreact and simply assume that the
relatively limited number of abuses of the past will not be repeated
because we are more conscious of the problem today. On the other hand
we can overreact and so attempt to control potential abuses that we
handcuff and handicap our intelligence effort out of business. Either
course would be shortsighted. We need to achieve some balance here.
The best way to achieve that balance is to have a system of accountability;
accountability to the Legislative Branch of our government, accountability
to the Executive Branch, and in addition, accountability to the public.
And, we must do this in a way that does not handcuff intelligence
capability at the same time.
I would like, briefly, to look with you at how this accountability
is being structured in all three of these segments of American society
and to try to determine whether there is an adequate basis for the
kind of accountability the country needs to be assured the intelligence
function is being carried out properly.
Sanitized Copy Approved for Release 2010/07/26: CIA-RDP91 G01 170R003505680020-9
Sanitized Copy Approved for Release 2010/07/26: CIA-RDP91 G01 170R003505680020-9
First, the public sector. In the past, public oversight, public
accountability was impossible. Not enough information was shared with
the public. Today that is no longer true. The recent revelations, the
public inquiries and investigations, the Freedom of Information Act,
have all made the American intelligence community much more accessible
to the public than before. In addition, over the past several years we
have made a very definite and deliberate effort to be more open. My
presence here with you tonight, something that probably would not have
taken place as recently as four or five years ago, is an earnest of
that effort to keep the public as well informed as we can. Also,
we respond to the press more forthrightly than ever before. Clearly,
we cannot answer every question, but I assure you that the needle is
not stuck in the groove that says, "no comment."
Beyond that, we are publishing more; making more intelligence
analyses and estimates available to the public. Obviously we are doing
that in those areas where information can be downgraded to unclassified.
In that process I hope that we are also helping to protect
classified information better. The big problem we have is that there
is too much classified information and, because of its quantity, it does
not engender the respect that is due. So if we can declassify as much
as possible and move it into the public sector, I hope we can garner
greater respect for that which remains.
Finally, in the public sector, the free press is a major assist to
the public in its effort to hold the American intelligence community
Sanitized Copy Approved for Release 2010/07/26: CIA-RDP91 G01 170R003505680020-9
Sanitized Copy Approved for Release 2010/07/26: CIA-RDP91 GO117OR003505680020-9
accountable. People like Woodward and Bernstein and others have
performed yeoman service in helping the public keep track of governmental
activities. There are, however, potential problems here.
When something is made known to the press and consequently to
the public, it is automatically revealed to a potential enemies.
And, unlike a court of law, the press can find you or me guilty through
accusation alone. The power to accuse in the public press or on the
airwaves of our country is a profound power and one that is susceptible
to as much abuse as any other form of power. This can also give rise
to another kind of problem. The press, I hope, never has the full set
of facts on any given intelligence subject. That means that any member
of the media writing about intelligence activities must always work
from an incomplete evidentiary base. It is a very difficult position
because they must always draw their conclusions from incomplete information.
The danger of misinterpretation or distortion is great.
However, we do have some things in common. One of them is the absolute
necessity to protect sources. I know how ardently the press holds to that
principle in their case; sometimes I am dismayed when they don't recognize
it in ours. Let me cite an example.
A few weeks ago in column three on the front page of a national
newspaper there was a story about an impending trial with two officials
of the ITT Corporation for perjury before the Congress testifying about
ITT activities in-Chile. The thrust of the story was how bad it was
that the Central Intelligence Agency might frustrate that prosecution
Sanitized Copy Approved for Release 2010/07/26: CIA-RDP91 G01 170R003505680020-9
Sanitized Copy Approved for Release 2010/07/26: CIA-RDP91 G01 170R003505680020-9
because of their unwillingness to release certain information. Over in
the next column was another story about a trial underway in New Jersey
in which a man accused of murder claimed that to defend himself
properly he needed the notes of a New York Times reporter. That
reporter refused to produce those notes. The trial was completed,
the reporter went to jail for awhile, but the notes were never
provided.
These cases may seem different but they are analogous in that they
both stand on the principle of protecting sources of information. And
yet, the media does not often recognize the similarity here. I believe
it is symptomatic of the fact that throughout our country there is not
really an adequate recognition of the legitimacy of some degree of
secrecy.
Let me move on to survey the second means by which we are held
accountable by the Executive Branch of the government. There are a
number of processes ensuring accountability in the Executive Branch,
but let me focus just on those revolving around the Presidency.
Today, no President can rely on the doctrine of plausible deniability
as we have seen in the past. The President is required personally to
sign the authorization for any covert political action. The President
is kept informed of all sensitive intelligence activities. And this
President has very strongly supported the concept that Congress must be
given adequate information to perform its oversight responsibilities,
Sanitized Copy Approved for Release 2010/07/26: CIA-RDP91 G01 170R003505680020-9
Sanitized Copy Approved for Release 2010/07/26: CIA-RDP91 G01 170R003505680020-9
which I will talk about more in a minute. This attitude is vital
to the whole process of accountability.
The President also has the Intelligence Oversight Board composed
of three members from outside the government, at the moment former
Senator Gore, former Governor Scranton and Mr. Thomas Farmer of
Washington, D. C. These three men, appointed by and reporting only to
the President, have the sole charge to look into the legality and the
propriety of intelligence community activities. Any of our employees,
any of you, anyone who believes there is an abuse of the intelligence
privilege may report it to them. This Board will look into it and
report only to the President as to the validity of the allegation and
what should be done about it.
Let me move to the accountability process with the Congress. Some
people are skeptical here, feeling that the record of the Congress
is no better than that of the President in exercising accountability
over intelligence. Yet, let me point out that the Congress is a body
elected separately from the President and operating totally separate from
the Executive Branch of our government. Being accountable to both of
these branches is, I think, a reinforcing assurance. There are two
committees in the Congress, one in each chamber dedicated exclusively to
the task of overseeing the intelligence process.
In the past, intelligence key members of the Congress and effective
oversight was really impossible. Vice President Mondale summed up this
Sanitized Copy Approved for Release 2010/07/26: CIA-RDP91 G01 170R003505680020-9
Sanitized Copy Approved for Release 2010/07/26: CIA-RDP91 G01 170R003505680020-9
situation in his book on accountability by quoting your eminent Massachu-
setts senator of the past, Leveret Saltonstall. At one time when he was
chairman of the subcommittee to oversee the Central Intelligence Agency,
the senator said:
"It is not a question of reluctance on the part
of CIA officials to speak to us, instead it is our
reluctance to seek information and knowledge on
subjects which I personally, as a member of Congress
and as a citizen, would rather not have."
I can assure you that attitude does not prevail in the Congress
today.
On top of that, the two committees I have mentioned conform very
closely to requirements laid out in a recent book by your own dean,
Graham Allison, in stating what he felt were the prerequisites for
good Congressional oversight of the intelligence community. Let me tick
off a few of the standards that Graham set forth:
That the committee should stand permanently. It does.
That they should be specifically concerned with intelligence.
They are.
That they should receive all relevant information. They do.
That they should be subject to rotating membership. While this
is not yet an established rule, the Chairman of the Senate
Select Committee on Intelligence, last January, stood down
from his position to establish this principle and concept
and I think it will take hold.
Sanitized Copy Approved for Release 2010/07/26: CIA-RDP91 G01 170R003505680020-9
Sanitized Copy Approved for Release 2010/07/26: CIA-RDP91 G01 170R003505680020-9
That they should review and approve the intelligence budget.
They do. They are now responsible for the authorization process
in the Congress for intelligence.
And finally, they should propose statutory charters to
prescribe our authorities and limitations. This is underway
at the moment and hopefully legislation will be enacted by
the forthcoming Congress.
Let me just go back to what I said in the beginning about the need
for balance. Balance between accountability and an ability to conduct
effective intelligence. Have we achieved that balance today? I don't
know. I think it is too early to tell. I think it will be several
years before we know where we are on that tightrope and, in particular,
we must wait until the charters are enacted. But, if we do find the
right balance, we will have achieved a revolution in intelligence, for
never before in history will any major intelligence activity have been
subject to a greater degree of accountability. I believe we are on the
right track and that this can work. I would remind you that it will
require some understanding and some forbearance. Forbearance, for
instance, for having such detailed laws and regulation that we will find
ourselves in a straightjacket unable to conduct intelligence activities
adequately. And here let me just pause to give you an example of how
this can go astray.
When I came to the Central Intelligence Agency there was a regulation
prohibiting the establishment of any paid, contractual relationship
Sanitized Copy Approved for Release 2010/07/26: CIA-RDP91 G01 170R003505680020-9
Sanitized Copy Approved for Release 2010/07/26: CIA-RDP91 G01 170R003505680020-9
with any accredited member of the United States news media. I was
only there a few weeks when I received a letter from the American
Translators Association. They objected to the firing of a large
number of stringers to the news media who were also part-time translators for
the open and unclassified Foreign Broadcast Information Service. That
really didn't make any sense, so we rewrote the regulation putting in a
loophole clause which it said we would not establish any paid contractual
relationship with any accredited member of the American news media
unless the Director of Central Intelligence personally makes an
exception. That may seem to be no regulation whatsoever; that I can
make an infinite number of exceptions. I don't think that is the case.
I remind you that I am accountable to the oversight process I have just
described; I am subject to interrogation by the Intelligence Oversight
Board, the President, and by two committees of Congress as to what use I
make of this loophole. Unjustified use of it would not be tolerated.
In sum, it is not a perfect world. It is not an open world. It
is a world in which we must balance idealism and realism in international
affairs. We must be sure that the check of accountability encourages
our idealism. We must ensure that the check of accountability is made
sufficiently flexible so that idealism can be tempered with realism.
We are not there yet, but we are moving strongly in the right direction.
It is an exciting period, an important period in American intelligence.
A period when we are, in effect, evolving a new, uniquely American
model of intelligence, one tailored to the values and standards of our
society, and yet, one which is also designed to ensure that we remain
what we are today, the number one intelligence service in the world.
Sanitized Copy Approved for Release 2010/07/26: CIA-RDP91 G01 170R003505680020-9