LAW AND NATIONAL SECURITY INTELLIGENCE REPORT
Document Type:
Collection:
Document Number (FOIA) /ESDN (CREST):
CIA-RDP90-00806R000100080011-0
Release Decision:
RIPPUB
Original Classification:
K
Document Page Count:
10
Document Creation Date:
December 22, 2016
Document Release Date:
September 13, 2010
Sequence Number:
11
Case Number:
Publication Date:
June 1, 1982
Content Type:
OPEN SOURCE
File:
Attachment | Size |
---|---|
![]() | 1.05 MB |
Body:
STAT
Sanitized Copy Approved for Release 2010/09/13: CIA-RDP90-00806R000100080011-0
~' / P AMERICAN BA
STANDING COMMITTEE Law and National Security
INTELLIGENCE REPORT
Morris I. Leihman, Chairman June 1982
House-Senate Conference Agrees
On H.R. 4, Agents' Identities Bill
On May 17, the House-Senate Committee of Con-
ference on H.R. 4, the Intelligence Identities Protec-
tion Act, released a report reconciling the several
differences between H.R. 4 as passed by the House in
October 1981 and the same bill as amended by the
Senate in March 1982. The House and Senate ver-
sions agreed on all fundamentals; the differences
here minor, but significant enough to require careful
consideration.
Particularly interesting to those trho followed the
legislation trill he the discussion of'601(c), the section
which deals with disclosure of agent identities by those
with no access to classified information. There was no
diffe re nce hetti'e e n the House and Senate versions on
this point, but a number of iritnesses and committee
members on both the House and Senate sides ex-
pressed the belief the language of 601(c), as adopted,
would restrict the freedom of the press to expose
wrongdoings by members of the intelligence com-
mnnity. The report seeks to set these f ears to rest.
We reproduce helots extensive excerpts from the re-
port of the Committee of Conference because of its
importance in establishing the legislative intent of
H.R. 4, and because tie believe our readers trould pre-
fer to have the original text to a paraphrased text.
Although the Senate amendments to H.R. 4 did not
affect the language of section 601(c) adopted by the
House, the Committee of Conference believes it im-
portant and appropriate to discuss that section in this
Joint Explanatory Statement because debate in both
Houses centered upon its meaning.
Background of 601(c)
H.R. 4 as reported from the House Permanent Se-
lect Committee on Intelligence and S. 391 as reported
from the Senate Committee on the Judiciary in 1981
Editor: W
both required that to be criminal the disclosure made
by those with no access to classified information
would have to be made "in the course of an effort to
identify and expose covert agents with the intent to
impair or impede the foreign intelligence activities of
the United States by the fact of such identification
and exposure."
H.R. 4 as passed in the House in 1981 and in the
Senate in 1982, replaces this intent standard with a
more objective standard which requires that the dis-
closure must be "in the course of a pattern of activi-
ties intended to identify and expose covert agents and
with reason to believe that such activities would im-
pair or impede the foreign intelligence activities of the
United States."
In adopting this amendment neither House intended
to change the scope of the conduct which the Act
Continued on page 2
Litigating National Security Issues:
Workshop at ABA Annual Meeting
The Standing Committee on Law and National Se-
curity will present a workshop at the ABA Annual
Meeting in San Francisco. Entitled Litigating National
Security Issues, it will be held on Monday, August 9,
from 2 to 5 p.m. at the Holiday Inn-Union Square.
The program will address the difficult legal and prac-
tical issues that a national security issue presents in
both civil and criminal litigation-typically when a
party attempts to obtain classified information in dis-
covery or to introduce such information into evidence.
Issues of this kind have arisen in several celebrated
criminal cases in recent years and have given rise to
federal legislation, the Classified Information Proce-
dures Act of 1980 (the "Greymail" Act). The work-
shop will evaluate the usefulness of the Act and will
consider whether similar legislation would be useful to
Continued on hack page
601 C. Nkft As ia~ r- t Security,
''
Sanitized Copy Approved for Release 2010/09/13: CIA-RDP90-00806R000100080011-0
Sanitized Copy Approved for Release 2010/09/13: CIA-RDP90-00806R000100080011-0
Agents' Identities Bill
Continued from page /
seeks to proscribe. Rather, the change was made to
deal with elements of proof at trial. The language as
adopted makes it clear that the defendant must be
engaged in a conscious plan to seek out undercover in-
telligence operatives and expose them with reason to
believe such conduct would impair U. S. intelligence
efforts.
The language of section 601(c) was considered by
the House as a result of an amendment offered on the
floor by Representative Ashbrook. The amendment
was adopted by a vote of 226 to 181. The same lan-
guage was considered by the Senate as a result of an
amendment offered on the floor by Senators Chafee
and Jackson. This amendment was adopted by a vote
of 55 to 39. The bill containing the amended section
601(c) language was adopted by the House by a vote
of 354 to 56 and by the Senate by a vote of 90 to 6.
Thus, the following language appears in section 601(c):
Whoever, in the course of a pattern of activi-
ties intended to identify and expose covert
agents and with reason to believe that such ac-
tivities would impair or impede the foreign intel-
ligence activities of the United States, dis-
closes any information that identifies an
individual as a covert agent to any individual
not authorized to receive classified informa-
tion, knowing that the information disclosed so
identifies such individual and that the United
States is taking affirmative measures to conceal
such individual's classified intelligence relation-
ship to the United States, shall be fined not
more than $15,000 or imprisoned not more than
three years, or both.
The record indicates that the harm this bill seeks to
prevent is most likely to result from disclosure of
covert agents' identities in such a course designed,
first, to make an effort at identifying covert agents and,
second, to expose such agents publicly. The gratui-
tous listing of agents' names in certain publications
goes far beyond information that might contribute to
informed public debate on foreign policy or foreign
intelligence activities. That effort to identify U. S. in-
telligence officers and agents in countries throughout
the world and to expose their identities repeatedly,
time and time again, serves no legitimate purpose. It
does not alert to abuses; it does not further civil liber-
ties; it does not enlighten public debate; and it does
not contribute one iota to the goal of an educated and
informed electorate. Instead, it reflects a total disre-
gard for the consequences that may jeopardize the
lives and safety of individuals and damage the ability
of the United States to safeguard the national defense
and conduct an effective foreign policy....
The standard adopted in section 601(c) applies
criminal penalties only in very limited circumstances
to deter those who make it their business to ferret out
and publish the identities of agents. At the same time,
it does not affect the First Amendment rights of those
who disclose the identities of agents as an integral
part of another enterprise such as news media report-
ing of intelligence failures or abuses, academic studies
of U. S. government policies and programs, or a pri-
vate organization's enforcement of its internal rules.
Section 601(c) applies to any person who discloses
the identity of a covert agent. As is required by sec-
tions 601(a) and (b), the government must prove that
the disclosure was intentional and that the relation-
ship disclosed was classified. The government must
also prove that the offender knew that the government
was taking affirmative measures to conceal the classi-
fied intelligence relationship of the covert agent. As is
also the case with sections 601(a) and (b), the actual
information disclosed does not have to be classified.
However, the government must prove that the de-
fendant knew that he was disclosing a classified rela-
tionship the government seeks to conceal by affirma-
tive measures.
Unlike the previous two sections, authorized access
to classified information is not a prerequisite to a con-
viction under section 601(c). An offender under this
section has not voluntarily agreed to protect any gov-
ernment information nor is he necessarily in a position
of trust. Therefore, section 601(c) establishes three
elements of proof not found in sections 601(a) or (b).
The United States must prove:
1. That the disclosure was made in the course
of a pattern of activities, i.e., a series of acts
having a common purpose or objective;
2. That the pattern of activities was intended to
identify and expose covert agents; and
3. That there was reason to believe that such
activities would impair or impede the foreign
intelligence activities of the United States.
Pattern of Activities
"Pattern of activities" is defined as a "series of acts
with a common purpose or objective." It is important
to note that the pattern of activities must be intended
to identify and expose covert agents. The process of
identifying such agents must involve a substantial
effort to ferret out names which the government is
seeking to keep secret. This pattern of activities must
involve much more than merely restating that which is
in the public domain. The process of uncovering
names could include, for example, techniques such as:
(1) seeking unauthorized access to classified informa-
tion, (2) a comprehensive counterintelligence effort of
engaging in physical surveillance, electronic surveil-
Continued on page 7
Sanitized Copy Approved for Release 2010/09/13: CIA-RDP90-00806R000100080011-0
Sanitized Copy Approved for Release 2010/09/13: CIA-RDP90-00806R000100080011-0
Protecting Against Terrorism:
Conference Examines Problem
The complex problem of protecting diplomats and
diplomatic premises against terrorist attack was ex-
amined in depth at a conference which took place in
Bellagio, Italy, this past March 8-12. The article that
follows was excerpted from the much longer report
prepared by Professor John F. Murphy of the Depart-
ment of International Lattw, University of Kansas,
vrho tras a participant in the conference. Professor
Murphy series as a consultant with the American Bar
Association's Standing Committee on Latin and Na-
tional Security.
From March 8 to March 12 the University of South
Carolina's James F. Byrnes Center on International
Relations was host for an international conference on
the protection of diplomatic premises and personnel,
held at the Rockefeller Foundation Study and Con-
ference Center located in Bellagio on Lake Como,
Italy. As envisaged by the sponsors, the primary pur-
pose of the conference was to get together govern-
mental representatives of the five permanent mem-
bers of the United Nations Security Council (United
Kingdom, France, United States, U.S.S.R., and Peo-
ple's Republic of China) in order to discuss their
common problem in protecting their diplomats and
diplomatic facilities against terrorist attack and other
manifestations of political violence. The premise was
that, despite the deep ideological differences between
some of the permanent members, they all held a strong
common interest in ensuring the continuation of diplo-
matic intercourse.
At first it appeared that both the People's Republic
of China and the U.S.S.R. would be represented at
the conference. Indeed, both had indicated their ac-
ceptance of the University of South Carolina's invita-
tion to attend. However, shortly before the confer-
ence was to begin, both the U.S.S.R. and the People's
Republic of China informed the sponsors that they
would be unable to attend. Although it is not clear
why the acceptances of the invitations were with-
drawn, it appears that the reasons are grounded in the
current tense relations between the U.S.S.R. and the
People's Republic of China and between the United
States and the U.S.S.R.
Nonetheless, the conference did have substantial
governmental representation from the United States,
the United Kingdom, the Federal Republic of Ger-
many and Italy, as well as nongovernmental repre-
sentatives from Israel and Yugoslavia.
The Scope of the Problem
With respect to trends in terrorist attacks against
diplomats and diplomatic premises, it was noted that
the last two years have seen a dramatic surge, a sixty
percent increase over the previous two-year period,
with a wider range of targets and geographical scope.
Often these attacks have been connected with war-
fare, for example, the conflict between Iran and Iraq
and the civil wars in Central America. In these areas
there seems to be no such thing as a "local war."
Bombings have been the most prevalent form of at-
tack, while assassinations have tripled. Kidnappings,
by contrast, have not increased. There has also been a
substantial increase in the take-over of embassies;
more than 50 have been seized since 1970. However,
the seizing of embassies appears to be losing popular-
ity, since seldom have demands been met, and 1981
saw a decline in this manifestation of terrorist attack.
American diplomats have been the most popular
target for terrorists. Reasons for this include (1) the
ubiquity of American diplomats; (2) the predominant
U. S. role in international affairs; (3) the negative
image of the United States promoted by adversary
propagandists. Terrorists tend to exaggerate the lever-
age they will have if they are able to seize an Ameri-
can diplomat. Turkish diplomats have been the second
most popular target, with Yugoslav diplomats third.
The high cost of protecting embassies was noted.
For example, ten percent of the Guatemalan Army is
engaged in guard duty attempting to protect diplo-
matic premises in Guatamala City. The expense there
amounts to approximately one to two million dollars
per embassy. Even these extraordinary precautions
may not be sufficient to protect more than the diplo-
matic premises themselves or the person of the am-
bassador. Terrorists, in such event, may simply target
lower ranking diplomatic personnel.
There are, roughly speaking, five basic categories of
terrorist activity that may be directed towards diplo-
mats and that raise distinctive problems of prevention
and punishment. The first and largest category is guer-
rilla warfare by indigenous groups. Since the local
government is the real target, it is pleased to cooperate
in combatting such terrorist activity.
The second and the second largest category of gen-
eral terrorist activity is attacks by ethnic groups, e.g.,
Armenians or Croatians. In this case also, the local
government is anxious to prosecute, but apprehension
may be an exceedingly difficult problem.
The third is worldwide attacks by groups connected
with local groups, for example, the PLO and the IRA.
Here one finds arising major political problems re-
garding extradition and prosecution.
The fourth is isolated terrorist attacks to protest the
actions of local governments. An example would be
the bombing of the French Embassy in Peru to protest
nuclear tests in the Pacific.
The fifth, and the most recent, type of activity is
the use of terrorism by governments. Examples would
include the Iranian government's use of assassins to
Continued on page 4
Sanitized Copy Approved for Release 2010/09/13: CIA-RDP90-00806R000100080011-0
Sanitized Copy Approved for Release 2010/09/13: CIA-RDP90-00806R000100080011-0
Protecting Against Terrorism
Continued from page 3
attack Iraqi diplomats and Libya's well documented
hit teams against United States diplomats in Italy. In
these instances the local government wants to coop-
erate, but often can't do so very effectively. It has also
been extremely difficult to substantiate terrorist activ-
ity directed by governments.
As to possible trends in general terrorist activity,
several commentators were of the opinion that the
antinuclear movement, Islamic fundamentalism, frus-
trated reactions by blacks, and increased activity by
the PLO might well lead to a sharp increase in ter-
rorist activity over the next decade. There are also
disturbing signs that the use of terrorism as surrogate
warfare may increase over the next few years.
U. S. Policy Towards Terrorism,
Embassy Protection
In reporting on U. S. policy, Ambassador Robert
Sayre suggested that the primary goal was to ensure
effective implementation of the Vienna Convention on
Diplomatic Relations and the Vienna Convention on
Consular Relations. With respect to the threat, Am-
bassador Sayre reported that Latin America has tra-
ditionally been the most troublesome area but Western
Europe has now taken first place in this regard. Most
terrorists are Marxist-Leninist in political orientation;
even the Armenians have close connections with
Marxist groups in Lebanon. In his opinion, these ter-
rorist groups are not controlled by or directed from
the U.S.S.R., but they do get training and logistical
support from the Soviet Union, and the United States
and its allies are the primary targets. What these ter-
rorists are doing is helpful to the Soviet Union, the
Soviet Union is benefitted by their activities, and the
Soviet Union has not been helpful in cooperating to
combat the terrorist threat.
Ambassador Sayre identified the following as the
primary problems the U. S. faces in combatting ter-
rorism against diplomats and diplomatic premises:
(1) Lack of resources. Ten to 14 percent of the State
Department's budget, or approximately 100 to 140
million dollars annually, is allocated to security. The
costs of adequate security throughout Western Europe
and other areas of high risk are prohibitive. (2) The
nature of diplomatic premises. Most embassy build-
ings were not acquired with security in mind. Over
the next decade, it will cost at least 200 million dollars
to remedy this situation, and more costs will be in-
volved in efforts to provide security to the residences
of U. S. diplomats. (3) Attitudes of personnel. Many
U. S. diplomats have simply not understood the nature
and magnitude of the terrorist threat against them. For
example, General Dozier had been informed he was
on a terrorist hit list, yet neither he nor his staff knew
what to do about this and, as a consequence, did
nothing. The size of the U. S. diplomatic presence has
been reduced continuously in various areas, but the
United States cannot trim its diplomatic personnel too
much without the effect of surrendering to terrorist
threats.
At home, the United States has done reasonably
well to carry out its obligations under the Vienna Con-
vention on Diplomatic Relations. The Secret Service
has been effective in protecting foreign diplomats in
New York and in Washington. However, the United
States has faced graver difficulties with respect to
consular officials. The United States has just sub-
mitted to Congress legislation designed to implement
the Vienna Convention on Consular Relations. Be-
fore this, responsibility for implementation had, in
effect, been left to the individual states of the union.
Ambassador Sayre noted that, on a bilateral basis,
cooperation between the United States and its allies
has been good. He cited the Dozier case as a recent
example. However, he reported that efforts toward
more multilateral cooperation have been unsuccess-
ful. The United States has not been involved in such
efforts among Western European states, and NATO
has recently ruled out cooperation with respect to
combatting international terrorism on the ground that
it is a police rather than a military matter. Ambassador
Sayre seconded Senator Franco Calamanderi's
(Rome, Italy) suggestion regarding the Council of
Europe as a possible forum, but noted that even there
difficulties arise.
Current International Law
In introducing his remarks, John Lawrence Har-
grove (Washington, D. C.) referred participants to the
substantial discussion paper he had prepared for pur-
poses of this meeting and highlighted a few salient
points. He noted that state complicity in international
terrorism is governed by general international law
norms. That is, a state's use of individual terrorists to
attack another state's diplomats, or to commit other
forms of terrorist acts, violates Article 2(4) of the
United Nations Charter and gives rise to a right on the
part of the target state to engage in measures of self-
defense proportionate and necessary to meet the threat
posed. These could, in certain circumstances, include
utilization of armed force. Also, he noted, depending
upon the level of military activity, the laws of armed
conflict may become applicable. If so, attacks on non-
combatants or the taking of hostages could be char-
acterized as war crimes. He suggested that the inter-
national law specifically pertinent to the protection
of diplomats was probably more or less adequate to
the task, provided that states are willing to implement
it. This law included, in addition to possible rules of
customary international law, the Vienna Convention
Continued on page 9
Sanitized Copy Approved for Release 2010/09/13: CIA-RDP90-00806R000100080011-0
Sanitized Copy Approved for Release 2010/09/13: CIA-RDP90-00806R000100080011-0
Senate Committee Reviews
FOIA Amendments Bill
At a mark-up session on May 20, the Senate Judi-
ciary Committee agreed, 15 to 0, to support a new and
milder version of S. 1730, a bill containing numerous
amendments to the Freedom of Information Act
(FOIA). The new version dilutes the changes in sev-
eral subjects, including national security, compared to
the stronger subcommittee bill of last December. That
bill, a blending of Senator Hatch's own FOIA pro-
posals and the administration's, had provided that fed-
eral courts would protect classified defense and for-
eign relations documents from disclosure under FOIA
unless the court found the classification to be "arbi-
trary and capricious."
The new May 20th version has no provision to limit
the present broad scope of judicial review where a
FOIA suit challenges the national security classifica-
tion of a record. In addition, the new version contains
no additional exemption to protect foreign intelligence
or most other types of national security information.
However, as discussed below, there is a new exemp-
tion for certain government-owned technical data, and
there are several other provisions offering relatively
minor improvements in the present protection of na-
tional security information.
The new version is the result of months of negotia-
tions since the beginning of this year, largely between
Senators Hatch and Leahy. During this period, the
news media gave much critical attention to the pend-
ing proposal to amend FOIA, and a number of Con-
gressmen and Senators were critical of recent revi-
sions in the executive order on classified national
security information.
The Judiciary Committee's action apparently re-
stores momentum to the lagging progress of the FOIA
amendments. The committee's changes were promptly
praised by The Washington Post and by an ACLU
spokesman as relieving their fears that the earlier
proposals would seriously cripple FOIA. But it is not
clear how fast the legislation will now move to the
Senate floor and to the House. Nor is it clear whether
further changes are likely, or what direction such
changes might take.
During the mark-up session, however, one question
was clearly noted for further consideration. Senator
Leahy indicated that an effort will be made soon to add
the Durenberger bill (S.2452) to the bill just approved
by the Judiciary Committee, an action which would
further weaken the committee bill in the area of na-
tional security.
The Durenberger bill, of which Senators Leahy,
Biden, Huddleston, and Moynihan are cosponsors, is
a reaction against President Reagan's April 2 execu-
tive order (12356) revising and tightening the rules for
national security classification of defense and foreign
policy documents. The rules in such an executive or-
der are, in effect, part of FOIA, because FOIA Ex-
emption One applies to matters classified under such
an order.
Senator Durenberger's bill would strike at two dele-
tions made by President Reagan's order of wording
in President Carter's order. President Carter had in-
serted this wording into the previous (Nixon) order. In
the first of these deletions, President Reagan removed
the word "identifiable" which President Carter had
inserted as an added requirement for the "damage to
the national security" which is the basis for classifying
and withholding information. Second, President Rea-
gan removed the public interest "balancing" provision
in the Carter order under which officials, in deciding
whether to classify information, were to balance any
public interest favoring disclosure against damage of
disclosure to the national security. Both deletions
were made chiefly because the provisions in question
were felt to increase the risks during litigation of com-
promising the information in dispute.
The Durenberger bill would put the word "identi-
fiable" into FOIA Exemption One as a requirement
for protecting classified information -the government
would have to prove that its disclosure "could rea-
sonably be expected to cause identifiable damage to
national security" (emphasis added)-thereby writing
the Carter order provision on this point into the stat-
ute. The Durenberger bill would also write the "bal-
ancing" test into Exemption One; classified informa-
tion would not be exempt unless "the need to protect
the information outweighs the public interest in dis-
closure." However, on this last issue, the Durenberger
bill also provides that court review of such balancing
"shall be limited to ascertaining whether the agency
withholding such records made the determination"
that the need to protect outweighs the public interest
in disclosure, in order to prevent courts from doing
their own balancing on that issue.
Several provisions of the Judiciary Committee's
FOIA bill offer improvements for national security
information. The added protection ranges from prob-
ably very slight to probably substantial. Thus, under
Section 8 of the bill, instructions to negotiators would
be clearly exempt; this would include negotiators op-
erating in national-security-sensitive areas. Under
Section II of the bill, the exemption for law enforce-
ment investigatory records is strengthened in several
ways, including greater protection for ongoing investi-
gations and for confidential sources. These added
protections for law enforcement should benefit na-
tional security, for example, in counterintelligence
and in background national security investigations.
Under Sections 12 and 17 of the bill, there is a new
Continued on page 6
Sanitized Copy Approved for Release 2010/09/13: CIA-RDP90-00806R000100080011-0
Sanitized Copy Approved for Release 2010/09/13: CIA-RDP90-00806R000100080011-0
FOIA Amendments Bill
Continued from page 5
exemption for government-owned "technical data"
that cannot be lawfully exported without a license.
Under Section 13, the bill would amend FOIA's
"reasonably segregable" clause, which requires dis-
closure of most non-exempt parts of a document con-
taining exempt information, to enable an agency to
consider the "mosaic" effect in processing requests
for classified records, i.e., situations where the re-
quester may know so much about the subject of the
record that releasing apparently innocuous portions
of it may actually give him, when these portions are
fitted together with information already available,
what amounts to a damaging disclosure of protectable
information. The bill also will create some obstacles to
the making of FOIA requests by most aliens and in-
carcerated felons. In addition, the bill amends the
present provisions on fees and time limits in various
ways which, taken together, should tend to facilitate
more careful work by agencies in reviewing requested
records for possible release, which in turn may reduce
the risks of inadvertent disclosures of national security
information.
In summary, the Senate Judiciary Committee's
May 20 mark-up of S. 1730, viewed from the stand-
point of better protection for sensitive national secur-
ity information, (a) is disappointing in failing to make
any change at all in the present FOIA judicial review
provisions for classified information (which directs
federal judges to make their own independent judg-
ments on whether or not to protect classified defense
and foreign affairs information, judgments which may
differ from the judgment of those officially responsible
for conducting defense and foreign affairs); (b) is bene-
ficial in varying degrees in the several particulars out-
lined above; and (c) is subject to possible further
weakening if the provisions of the Durenberger bill
discussed above were to be attached to the commit-
tee's bill.
the territorial states. Dean Rusk stated the issue suc-
cinctly as follows:
Older distinctions between internal and interna-
tional wars seem to be melting away because of
the direct or indirect involvement of other na-
tions in internal conflicts. Just as human rights
are now no longer a purely internal affair, it may
be that internal wars must become a matter of
concern to the community of nations because
they so frequently affect the possibilities of or-
ganizing a durable peace.
To explore the possibilities, the workshop covered
(i) the obligations of other states in cases of internal
conflict; (ii) the applicability of humanitarian law in in-
ternal conflicts; and (iii) the role of international and
regional organizations in internal conflicts. With re-
spect to each, the focus was on current international
legal principles and the desirability of effecting changes
to reduce the adverse impacts of destabilizing internal
conflicts.
The workshop "faculty" consisted of distinguished
specialists, both foreign and domestic, and present and
former government officials. Their presentations were
well received by the workshop participants who were
stimulated by the exercise in international norm build-
ing. The highlight of the workshop was the period de-
voted to the "reflections" of Dean Rusk who shared
his perceptions of the current state of world order with
special emphasis on the problem of internal conflicts.
Among the congratulatory messages sent to Dean
Rusk were those of George Ball:
Some Americans in public life, diligent in ad-
vancing their own interests, receive far more
adulation than is due; others, out of a modesty
derived from a larger perspective and a deeper
understanding of world forces, are less con-
cerned with the capricious assessments of the
moment. They decline to manipulate the judg-
ment of history because they do not fear it.
Dean Rusk is one of that small elite.
Workshop Honors Dean Rusk
The Standing Committee on Law and National Se-
urity and the University of Georgia Law School co-
sponsored a Law Professor Workshop, "Coping with
Internal Conflicts: Dilemmas in International Law," at
Athens, Georgia, on May 7-8, to honor former Secre-
tary of State Dean Rusk for his public service and his
contribution to the study and understanding of inter-
national law and international relations. The workshop
considered the need for international involvement in
internal conflicts which, under the concepts of sover-
eignty, self-determination and nonintervention, tradi-
tionally have been considered the exclusive concern of
and Henry Kissinger:
It is not only because we will both go down in
history as Secretaries of State who spoke with
funny accents. It is also because I have known
you - before, during and after my own tenure in
government - as a pillar of strength and decency
and integrity. Intellectual fashions come and go,
but the basic values of character and patriotism
endure. In your work as a teacher of interna-
tional law and a wise Counsellor to the ABA
Standing Committee on Law and National Se-
curity, you have shown that public service is not
limited to government service.
Bernard Ramundo
Sanitized Copy Approved for Release 2010/09/13: CIA-RDP90-00806R000100080011-0
Sanitized Copy Approved for Release 2010/09/13: CIA-RDP90-00806R000100080011-0
Supreme Court Reverses
D. C. Circuit Court of Appeals
The Supreme Court on May 17 unanimously re-
versed a decision of the Circuit Court of Appeals of
the District of Columbia involving whether, under
FOIA, The Washington Post was entitled to know
whether two persons in Iran were United States citi-
zens (see May Intelligence Report). The State Depart-
ment had refused to release this information on the
basis that the physical safety, if not the lives, of the
persons involved would be jeopardized.
The Supreme Court in its opinion stated that a
FOIA exemption from release of information found in
personnel and medical files was broad enough to au-
thorize a determination in this case by the State De-
partment that release of the information could be a
clearly unwarranted invasion of privacy.
The Reporters Committee for Freedom of the Press
immediately issued a statement calling the decision "a
major defeat" for the principles of the Freedom of In-
formation Act.
Larry Williams
Agents' Identities Bill
Continued from page 2
lance abroad, and other techniques of espionage di-
rected at covert agents, or (3) systematically collect-
ing, collating and analyzing information from docu-
mentary sources for the purpose of identifying the
names of agents. The process of exposing covert
agents must involve the deliberate exposure of infor-
mation identifying them, the intentional "blowing" of
intelligence identities.
It should, of course, be clear that "pattern of activi-
ties" does not necessarily mean a pattern of disclo-
sures; a single, first disclosure of information identi-
fying a covert agent is punishable under section 601(c)
if the requisite pattern of activities and the other ele-
ments of the offense are proved beyond a reasonable
doubt.
Most laws do not require intentional acts, but mere-
ly knowing ones. The difference between knowing and
intentional acts was explained as follows in the Senate
Judiciary Committee report on the Criminal Code
Reform Act of 1980:
As the National Commission's consultant on
this subject put it, "it seems reasonable that the
law should distinguish between a man who wills
that a particular act or result take place and an-
other who is merely willing that it should take
place. The distinction is drawn between the
main direction of a man's conduct and the (an-
ticipated) side effects of his conduct.
A newspaper reporter would rarely have engaged
in a pattern of activities with the requisite intent "to
identify and expose covert agents." Instead, such a
result would ordinarily be "the (anticipated) side
effect of his conduct."
Of course, the fact that a defendant claims one or
more intents additional to the intent to identify and
expose does not absolve him from guilt. It is only
necessary that the prosecution prove the requisite in-
tent to identify and expose covert agents.
This crucial distinction between the main direction
of one's conduct and the side effects that one antici-
pates but allows to occur forms an important safe-
guard for civil liberties. Because the intent standard in
section 601(c) is an intent "to identify and expose
covert agents" rather than an intent to "impair or im-
pede the foreign intelligence activities of the United
States," it is clear that the fact that a journalist had
written articles critical of the CIA which did not
identify covert agents could not be used as evidence
that the intent standard was met.
In order to fit within the definition of "pattern of
activities," a discloser must be in the business, or
have made it his practice, to ferret out and then expose
undercover officers or agents where the reasonably
foreseeable result would be to damage an intelligence
agency's effectiveness. Those who republish previous
disclosures and critics of U. S. intelligence would all
stand beyond the reach of the law if they did not en-
gage in a pattern of activities intended to identify and
expose covert agents.
A journalist writing stories about the CIA would not
be engaged in the requisite "pattern of activities,"
even if the stories he wrote included the names of one
or more covert agents, unless the government proved
that there was an intent to identify and expose agents.
To meet the standard of the bill, a discloser must be
engaged in a purposeful enterprise of revealing identi-
ties-he must, in short, be in the business of "naming
names."
The following are illustrations of activities which
would not be covered:
An effort by a newspaper intended to un-
cover CIA connections with it, including learn-
ing the names of its employees who worked for
the CIA.
An effort by a university or a church to learn
if any of its employees had worked for the CIA.
(These are activities intended to enforce the
internal rules of the organization and not iden-
tify and expose CIA agents.)
An investigation by a newspaper of possible
CIA connections with the Watergate burglaries.
(This would be an activity undertaken to learn
about the connections with the burglaries and
not to identify and expose CIA agents.)
Continued on page 8
Sanitized Copy Approved for Release 2010/09/13: CIA-RDP90-00806R000100080011-0
Sanitized Copy Approved for Release 2010/09/13: CIA-RDP90-00806R000100080011-0
Agents' Identities Bill
Continuedfrom page 7
An investigation by a scholar or reporter of
the Phoenix program in Vietnam. (This would
be an activity intended to investigate a contro-
versial program and not to reveal names.).. .
The reporters who have investigated the activities
of Wilson and Terpil, former CIA employees who al-
legedly supplied explosives and terrorist training to
Libya, would not be covered even if they revealed the
identity of covert agents if their pattern of activities
was intended to investigate illegal or controversial
activities, and not to identify covert agents. Similarly,
David Garrow would not be within the scope of the
statute even though he purported to give the identity
of covert agents in his book, The FBI and Martin
Luther King, Jr.: from "Solo" to Memphis. His intent
presumably was to explain what drove the FBI to
wiretap Martin Luther King and not to identify and
expose covert agents.
Reason to Believe
The government must also show that the discloser
had reason to believe that the pattern of activities in
which he was engaged would impair or impede the
foreign intelligence activities of the United States.
The "reason to believe" standard is met when the sur-
rounding facts and circumstances would lead a rea-
sonable person to believe that the pattern of activities
would impair or impede the foreign intelligence activi-
ties of the United States.... Among the objective facts
to be weighed by the jury in determining what a rea-
sonable person would believe would certainly be the
ease with which the name of a covert agent was iden-
tified and the extent to which it was widely and pub-
licly known.
The conferees expect that the Department of Jus-
tice and the federal courts will limit the application of
section 601(c) to those engaged in the pernicious busi-
ness of naming names as that conduct is described in
the legislative history of this Act.
Section 603
The House bill contained section 603 which deals
with procedures for establishing cover for intelligence
officers and employees. This section required the
president to establish procedures to ensure the protec-
tion of the identities of covert agents. Such procedures
were to include provision for any federal department
or agency designated by the president to assist in
maintaining the secrecy of such identities.
The Senate struck section 603 by unanimous
consent.
The conference report contains a substitute section
603 requiring an annual report from the president on
measures to protect the identities of covert agents.
The conferees expect such report to include an as-
sessment of the adequacy of affirmative measures
taken by the United States to conceal the identities of
covert agents.
The conferees stress, however, as was made clear
during consideration of this measure in both bodies,
that nothing in this provision or any other provision
of H.R. 4 or in any other statute or executive order
affecting U. S. intelligence activities in any way dimin-
ishes the 20-year-old Congressionally sanctioned ex-
ecutive branch policy of maintaining the total separa-
tion of the Peace Corps from intelligence activities.
The importance to the effectiveness of the Peace
Corps of maintaining this policy and its essential com-
ponents was spelled out in detail in the reports of the
Senate Judiciary Committee and the House Permanent
Select Committee on Intelligence and in the debate on
this measure in both bodies, and the conferees wish
to reemphasize this point and call attention to the
strong views of both bodies as set forth in that legis-
lative history.
Section 606(4)
Senate amendment 13 struck from the definition of
"covert agent" certain former intelligence officers and
certain other U. S. citizens who formerly were intelli-
gence agents, informants, or sources of operational
assistance. The conferees agreed to the Senate
amendment.
In adopting the Senate amendment, the conferees
note that the definition of "covert agent" and thus the
scope of possible prosecution is closely tied to the
concept of classified information. This connection is
of utmost importance in insuring that, as it applies to
those who are not undercover intelligence agency em-
ployees, the definition of covert agent does not in-
clude those private citizens who might provide infor-
mation to the CIA or FBI, but whose public
identification, though causing personal embarrassment,
would not damage the national security.
It is to be noted that after House passage of H.R. 4
and Senate passage of S. 391, the president promul-
gated a new executive order on classification. The
Committee of Conference understands that the
changes contained therein, particularly the elimina-
tion of the concept of "identifiable" damage, the addi-
tion of the category of "confidential source," and the
addition of a presumption of classification for "intel-
ligence sources and methods," were not intended to
affect, and will not affect, a decision on whether an
individual is or is not a "covert agent." The Commit-
tee of Conference expects the executive branch to
exercise the utmost care in making classification deci-
sions in this area.
Sanitized Copy Approved for Release 2010/09/13: CIA-RDP90-00806R000100080011-0
Sanitized Copy Approved for Release 2010/09/13: CIA-RDP90-00806R000100080011-0
Protecting Against Terrorism
Continued from page 4
on Diplomatic Relations, the Vienna Convention on
Consular Relations, the United Nations Convention
on the Protection of Internationally Protected Per-
sons, an OAS convention along similar lines, the
European Convention on the Suppression of Terror-
ism, and the UN Convention Against the Taking of
Hostages. This complex of conventions, Hargrove
suggested, made it more difficult for a state to claim the
political offense exception and tightened the obliga-
tion to prosecute, and the emerging political consensus
reflected by adoption of these conventions could
evolve into pertinent rules of customary international
law. He noted, however, that these conventions did
contain certain weaknesses. First, a state can avoid
the extradite or prosecute obligation if it is so inclined,
especially since prosecutorial discretion under the
conventions is fully reserved. In this respect, the re-
gional conventions are weaker than the UN conven-
tions. Second, there is still an inadequate number of
states parties to these conventions and hence a great
need for more ratifications. Third, none of these con-
ventions establishes a system of collective sanctions.
In addition, there is a need for greater efforts to be
taken at the national level to bring domestic law into
accord with the obligations contained in these conven-
tions.
Sir Ian Sinclair (London, England) noted paren-
thetically that the basic principle of diplomatic in-
violability is recognized in Islamic law as well as in
conventional and customary international law. He
suggested that the experience under the anti-aircraft
hijacking and sabotage conventions was an encourag-
ing precedent in that the number of ratifications to
these conventions has increased dramatically in the
last few years. In this connection, he noted that the
reasons for nonratification by states varies. In some
instances there is a deliberate decision of state policy
not to ratify. In many more instances, however, the
foreign offices of states simply do not have the exper-
tise to act rapidly on these and on a variety of other
international conventions on their docket.
With respect to the question of prosecution of ter-
rorists, Mr. Sinclair noted that, even if a state is willing
to prosecute, it may have difficulty getting evidence
sufficient for conviction under its law. Mutual judicial
assistance is at best at a rudimentary stage, and dif-
ferences of view regarding admissibility of evidence
and cross examination of witnesses between common
law and civil law jurisdictions greatly hamper interna-
tional cooperation in this area. Moreover, diplomats
are often unwilling to testify as to the facts of cases
involving terrorist attacks. Problems of classification,
secrecy and security also hinder the gathering of
sufficient evidence. In the United States, at least in
the European view, the media may obtain information
that foreign states would not wish disclosed.
On the subject of abuse of diplomatic immunities,
Sinclair noted that use of the diplomatic bag to trans-
port arms is increasing. There is an item currently on
the agenda of the International Law Commission to
consider this practice and whether steps might be
taken to qualify the immunity of the diplomatic bag, at
least to the extent of permitting it to be x-rayed.
John F. Murphy
Recent FOIA Appeals Cases
In a recent FOIA case (Weberman iv. National Se-
curity Agency, 668 F. 2d 676 (2d Cir. 1982) ), an au-
thor sought to use the National Security Agency to es-
tablish a link between Cuba and President Kennedy's
assassination.
Weberman alleged that Jack Ruby's brother, Earl
Ruby, had sent a telegram to Cuba prior to the assas-
sination of President Kennedy by Lee Harvey Oswald
and Oswald's being killed by Jack Ruby. He claimed
that NSA had intercepted this telegram, and was re-
fusing disclosure to him of the telegram. NSA con-
tended that whether the telegram was or was not in-
tercepted remains a matter of national security and
exempt under a specific FOIA provision. Acting un-
der prior instructions from this court (see 646 F. 2d
563 (2d Cir. 1980)), the federal district judge re-
viewed, in camera and ex parte, a top secret NSA
affidavit as to why the existence or non-existence of
such an intercept was classified and why the fact of
interception or non-interception was exempt under
FOIA. The lower court dismissed the complaint.
The Second Circuit Court of Appeals held that the
lower court could review the affidavit in camera and
ex paste, and that plaintiffs counsel had no right to be
present during such review. Accordingly, it affirmed
the lower court's decision. As no appeal was taken to
the Supreme Court, the matter is now concluded.
The May Intelligence Report carried an account of
the efforts under FOIA of Abramson, a journalist, to
obtain from the FBI copies of documents sent by it to
the White House in 1969 concerning various public
figures. The Circuit Court of Appeals for the District
of Columbia had decided to return the case to the low-
er court to decide whether the documents sought had
been created for law enforcement purposes. The FBI
appealed that decision to the Supreme Court.
The Supreme Court, on May 24 (slip opinion), ruled
that, although the documents sent to the White House
had not in fact been created for law enforcement pur-
Continued on hack page
Sanitized Copy Approved for Release 2010/09/13: CIA-RDP90-00806R000100080011-0
Sanitized Copy Approved for Release 2010/09/13: CIA-RDP90-00806R000100080011-0
Recent FOIA Appeals Cases
Continued from page 9
poses, they were summarizations of such documents
and hence did not lose their exempt status (under Ex-
emption 7(c)) by such summarization. The four dis-
senting justices took the position that only documents
or records created for law enforcement purposes can
be exempt under Exemption 7(c), and that new docu-
ments containing summarizations of them, but which
were not created for law enforcement purposes, are
not exempt.
The Supreme Court, on May 17, denied certiorari in
a FOIA case involving the Founding Church ofScien-
tologv of Washington, D. C. The plaintiffs request
had been denied below (670 F. 2d 1158 (CADC
1981)). What the Church wanted were certain Inter-
pol documents once held by the United States Na-
tional Central Bureau (the U. S. agency member of
Interpol) but now in Paris at Interpol. The records
were alleged to be able to be retrieved by the Bureau.
The Circuit Court of Appeals for the District of
Columbia determined that the defendants were cor-
rect on all three bases of their refusal: (1) A confiden-
tial source need not be an individual but can be an in-
stitution (such as Interpol) and hence an exemption
based upon "revelation of a confidential source" was
applicable. (2) It found that Exemption 7(d) is applic-
able to law enforcement proceeding documents even
when no proceedings are under way or contemplated.
(3) Courts can not command agencies to acquire pos-
session or control of documents the agencies do not
have even though they could acquire (or reacquire)
them, as FOIA only prevents withholding of held
records.
In a petition to the Supreme Court on March 30
(on which no action has as yet been taken), Victor S.
Navasky, editor of Nation, requested the overturning
of the decision of the United States Court of Appeals
for the Second Circuit ( F. 2d (CA2 1981))
denying his FOIA request for a list of titles of books
subsidized for publication abroad by the CIA, some
without the author's knowledge of the subsidization.
That court had affirmed a lower court ( F. Supp.
(S.D.N.Y. 1981)) that such disclosures, even
many years later, could be expected to "cause identi-
fiable damage to the national security in the field of
foreign relations," and hence are exempt under FOIA.
Larry Williams
Litigating National Security Issues
Continued from page I
cover civil litigation. In addition, the workshop will
survey the range of practical and legal problems raised
by the Act, the State Secrets privilege and similar doc-
trines and by the conflicting dictates of secrecy and
normal judicial procedures.
The workshop will consist of two panels, made up of
knowledgeable experts from both government and the
private bar. They are:
The Criminal Case
Thomas Kennelly
Partner, Duiguid, Kennelly & Epstein
Washington, D. C.
(Defense attorney in Felt-Miller case)
Mark Richard
Deputy Assistant Attorney General
Criminal Division
U. S. Department of Justice
Earl Silbert
Partner, Schwalb, Donnenfeld, Bray & Silbert
Washington, D. C.
(Formerly U. S. Attorney for the District
of Columbia)
Stanley Sporkin
General Counsel
Central Intelligence Agency
The Civil Case
Jon Anderson
General Counsel
National Security Agency
Mark Lynch
ACLU Project on National Security
(Counsel in numerous cases involving classified
information)
Ernest Mayerfeld
Deputy General Counsel
Central Intelligence Agency
Daniel B. Silver
Partner, Cleary, Gottlieb, Steen & Hamilton
Washington, D. C.
(Formerly General Counsel, Central Intelligence
Agency and National Security Agency)
Richard Willard
Deputy Assistant Attorney General
Civil Division
U. S. Department of Justice
For further information contact: William C. Mott, Suite 709
1730 Rhode Island Avenue N.W., Washington, D. C. 20036
Sanitized Copy Approved for Release 2010/09/13: CIA-RDP90-00806R000100080011-0