LETTER TO MR. STEVEN GARFINKEL FROM HARRY E. FITZWATER

Document Type: 
Collection: 
Document Number (FOIA) /ESDN (CREST): 
CIA-RDP85B00236R000200150008-9
Release Decision: 
RIPPUB
Original Classification: 
C
Document Page Count: 
12
Document Creation Date: 
December 19, 2016
Document Release Date: 
September 19, 2005
Sequence Number: 
8
Case Number: 
Publication Date: 
February 25, 1983
Content Type: 
LETTER
File: 
AttachmentSize
PDF icon CIA-RDP85B00236R000200150008-9.pdf1.06 MB
Body: 
CONFIDENTIAL Approved FjWRelease 2005/12/14: CIA-RDP85BOONS R000200150008-9 CENTRAL INTELLIGENCE AGENCY WASHINGTON. D.C. 20505 2 5 FEB 1983 Mr. Steven Garfinkel Director, Information Security Oversight Office General Services Administration (AT) 18th & F Streets, N.W. Washington, D.C. 20405 Enclosed are the "Guidelines for Identifying and Handling CIA Information During Declassification Review of Records from the Period 1946-54," as required by Section 3.3(a) of Executive Order 12356, 47 F.R. 14879, April 6, 1952, and Section 2001.31(c)(3)(i) of Information Security Oversight Office Directive Number 1, 47 F.R. 27839, June 25, 1982. The guidelines were coordinated in draft with Mr. Edwin A. Thompson, Director of the Declassification Review Division, National Archives and Records Service. The policy at CIA is that our officers must review information for which we are responsible before it can be declassified and released to the public. In the attached guidelines we have attempted to explain the reasoning behind that policy. In addition, we have described our activities as an intelligence agency as they relate to the creation and protection of records, and we have tried to anticipate, at least in a broad sense, where such records might be encountered in the files of other U.S. Government agencies. Finally, we have provided a three-page listing of the various types of intelligence reports that CIA produced during the period with descriptions and comments about where they may be held in governmental records. The enclosed guidelines supersede the "Central Intelligence Agency Systematic Review Guidelines" which were issued pursuant to Executive Order 12065, signed by Director Stan field Turner, and forwarded under a letter dated 5 June 1979. Previously issued guidelines currently in use at the National Archives and Records Service covering the records of the Office of Strategic Services (OSS), material, of the Foreign Broadcast Information Service (FBIS), and the Foreign Documents Division (FDD) remain in effect but will be reviewed and considered for revision as necessary. UNCLASSIFIED WIMN SEPAR't'TI?.I) FP(14 ENCLOSURE Approved For ReleaseNfIDMtIPE00236R000200150008-9 'f21 - Approved FRelease 2005/ 2 I L0O R000200150008-9 ~f you have any tiestiuns or continents concel [7 i li' r ilc' e ,ai plc j i nes , p iease contact Director of inform ion Serv:kce's, Directorate of Admi.r: istr,q'iota, CIA, t s tiington, D. C. 205115, Si Iicerely, 25X1 A 25X1 f y It itzwater De put:v Director io r ttlmi iii stra tioii Distribution: Orig - Addressee w/ enci and atts 1 -- DDA Subject w/encl and atts 1 - DDA Chrono 1 - D/OIS Subject w/encl and :itts ,~ - D/OIS Chrono 'V1 - CRD Liaison w/ISOO w/encl and at:ts Chrono (22 February 1.983) Approved For Releas ~~5B00236R000200150008-9 Approved FReleasN FAN ND&OftStR000200150008-9 GUIDELINES FOR IDENTIFYING AND HANDLING CIA .INFOINATION L RII~C'Il '~' t: UiV i 4TiZ,11 b " 0 'US T-ffaf- l:COU 1946 - 54 This guideline will serve as the basis for identifying n -id handling information which was originated between 1946 and 1954 by the CIA or one of its predecessor organi:ations, or Is information from that period which falls under CIA jurisdiction. This guid::li.n.e provides no authority to declassify information. Its purpose is to provide background and general descriptions intended to aid declassification review personnel to identify CIA material that may be found in the records of other agencies. When such material is found it must be reviewed for declassification by CIA personnel. This is necessary because an intelligence agency has special. security problems. All. components of an intelligence agency are either directly involved in clandestine work, provide support to elements that are engaged in clandestine work, or are involved in processing clandestinely acquired information into a finished intelligence product. whatever their role, there is an interrela- tionship among these elements which makes than all sensitive to one degree or another and an exposure in one can lead to an exposure in another. It requires a thorough understanding of these components and their interrela- tionships to assess the degree of sensitivity of information relating to Intelligence matters anal pass credible judgment on its classification status. (U) The inherent sensitivity of intelligence organizations is attested to by the fact that no other nation allows, let alone requires, its intelligence organization to make its records public except after a minimum of 30 years and then sources and methods are still completely protected. This point is important from another aspect: the intelligence services of nations friendly to the U. S. are keenly aware of the situation created by the Freedom of Information Act, the Privacy Act, m,indatory review, and systematic declassifi- cation review, and are very sensitive' to the possibility that information that they 'pass to the U.S. government may be exposed. For this reason, we do not declassify or even downgrade information from other intelligence services without their concurrence. (C) BACKGROUND During the years 1946 to 1.954, U.S. int.clli ;ence was pass:~'iag through a transitional period. The Office of Stratagic: Services (OSS), which played the. major U.S. intelligence role during WV1, was disbanded. on 1 October 1945. 1 t was succeeded by the Strategic,er. vices Unit (SS7J) which existed for one year. The records of the OSS and the S U reflect a wartime context, being staffed with military personnel and patting c~:~plk sis on "hot war?" activities related to the achievement of militias.~y> ob iectives. On 22 January 1946 the Central Intelligence Group (CIG) was created and began. to. take in more civilians while it succeeded in absorbing the SSU by the end of October 1.946. The CIG in turn was ? eplaced by the CIA on 18 September 1947. The CIA was created as a civilian orgazizatiorr and remains one today. (U) `CE Sl Mve For Releas , WCBOO floEf" 25X1 CONFIDENTIAL . Approved PWRelease 2005/12/14: CIA-RDP85B00 R000200150008-9 The world environment also was in transition: from wartime, to peacetime, then very quickly into a "cold war," followed after a few yeirs with hostilities in Korea, 1950-54. Intelligence activities during the period 1946-54 were not of wartime nature but they continued to have a strong paramilitary cast. Considerable resources were devoted to special activities aimed at strengthen- ing the West and weakening the East through various kinds of direct action. operations. Measures were ".undertaken to prepare for a "hot war" situation. Refugee and especially defector debriefings were an important source of intelligence information although classical intelligence collection operations were not ignored. Throughout this period the "iron curtain" between the West and East proved very difficult for our relatively young intelligence agencies to penetrate, and it restricted the flow of even overt information to the West. That forced collection efforts into many unlikely areas which normally would be considered overt. (U) During this period, CIA and the other U.S. national. security agencies were learning to coordinate their intelligence activities and were developing channels among themselves and with other U.S. government agencies to get administrative and operational support. Because intelligence agencies must establish themselves and operate abroad under some legitimate form, i.e. cover, they require a broad spectrum of support from agencies that function overtly. The latter will provide transportation, housing, offices, equipment, medical facilities, etc., the provision of which must be done covertly to provide cover for intelligence personnel. The arrangements for and actual providing of this support will leave a "paper trail" some of which will be classified, and some of. which will not, This "paper trail" may be found among any type of administrative or operational records of the agencies and units which are involved in providing the cover. Many of those records may appear routine and normal for the unit. If all is done properly, it may be difficult from administrative records to identify the Intelligence connection. But care must be exercised when reviewing all the unit's records that no document is declassified which could compromise the intelligence connection, even inferentially, and thus "blow" the cover. (,.tee also the CIA Guideline to Aid N RS Ide itif Unclassified Information Co Ice ni.; hnte3li eiice izrces end the identification of intelligence rela?ued docLmlents anal information can be very difficult, and one purpose of this guideline is to assist the records reviewer in identifying records that. relate to intelligence and, more specifically, to CIA. When files are encountered t;iat relate to `IA, or relate to intelligence matters, but the specific organization cannot be determined, they should be given to CIA for declassification review. (U) GENERAL GUIDELINE For the purpose of identifying informtion relating to CIA we may break down its activities into four major areas: Plans and Policies; Collection; Processing and Analysis; and Production and Dissemi.na.ti.on. Following is a brief general description of each of these areas intended to serve as a framework within which to identify CIA intelligence related information. (U) Approved For Relea' 00236R000200150008-9 CONFIDENTIAL Approved FRelease 2005/12/14: CIA-RDP85B00W6R000200150008-9 Plans and Policies - Overall. guidance to the intelligence com~acartl }Y c:ames rom t~h National Security Council (NSC) . Many intelligence activities, particularly special. activities, are initiated by the NSC or by presidential commissions such as the Psychological Strategy Board (PSB) or the Operations Coordinating Board .(OCB). Several agencies may be involved in discussing and eventually adopting and formulating such guidance and the record of such collective activities may be held by all the participating agencies. The inl.)l.ementation of such plans must be coordinated at all levels and with the many types of units. This broad involvement will be documented and that record will be found somewhere in the files of the participating agencies. At the NSC level planning papers often do not indicate the source of the specific information used. In such a. document if an intelligence matter is involved and i.t is not possible to identify the specific agency or department responsible for the information, CIA would like to have the opportunity to review that material. Classified planning and policy records relating to intelligence activities normally will require protection for long periods of time because (J) they officially confirm U.S. involvement and preclude the use of plausible denial and, (2) might provide details which could cargn?omise intelligence sources and methods. (C) Collection - The acquisition of intelligence information by all mat s Tiotth hzunan, and technical. This involves the development, placement, and exploitation of sources that can obtain the intelligence information that our government needs. the protection of these intelligence sources is paramount to preserve the flow of intelligence information, to prevent disruption in our foreign relations, to protect those persons and organizations who risk themselves on our behalf, to protect our national investment in costly projects and technical devices, and to prevent the targeted. persons and countries from becoming aware of our intelligence efforts and degree of success so they will. not take actions to nullify the results obtained or take aggressive countermeasures detrimental to our national security. (U) It appears somewhat contradictory, but to establish a clandestine foreign intelligence collection capability requires extensive support from overt agencies or: entities. The support required includes transportation, housing, ostensible employment, funding, and medical care; in short, all the things a large organization must have to p.lacaa; and maiDta.in personnel all arocuzd the world. This support also must be rendered in such a way that the cover it provides to intelligence personnel, and their activi ties is not compromised. Much of this support comes from other U.S. government agencies. This is "official" cover and of course, like any element of the goverment, the units involved must keep record of their activities. (C) CONFIDENTIAL Approved For Release 2005/12/14: CIA-RDP85B00236R000200150008-9 3 OC N F;DEN T IAL Approved FNWRelease 2005/12/14: CIA-RDP85B00Ii6R000200150008-9 While it is generally 1mown, and therefore unclassified, that CIA conducts intelligence operations around the world, the details and specifics remain classified. The CIA's covert presence abroad is made possible by the use of cover, and to maintain that cover the U.S. government cannnot acknowledge that a specific CIA presence exists abroad.. It is also important to protect friends and allies and to avoid frictions in our foreign relations by not disclosing details of our presence in specific countries or of our l.iaision relationships with foreign intelligence and security services. Director of Central Intelligence Directive (DCID) Security Classification Guidance on Liaison Relationships With -Foreign Intelligence Organizations and Foreign Security Services, effective 18 January 1982, '(Attachment A), states that the fact of intelligence cooperation between the U.S. and a specific governmental component in an allied county=, or general description of the nature of intelligence cooperation between the U.S. and one of these components is classified CONFIDENTIAL unless a higher classification or no classification has been specified by mutual agreement with the government or organization concerned.. Finally, intelligence agency elements are stationed abroad to obtain and report information. Collections of their raw field reports can reveal. a great deal about the organization that produced them. Therefore, all, raw, unevaluated, field intelligence reports dated I January 1946 or later are withheld from automatic declassification .under the authority of a letter from the DCI to the Archivist of the U. S. dated 1.6 October 1978 which was approved by the .Arc.hi.vis-.1_. (U) Technical Collection - %I1A is responsibi.l e for the clandestine ti chni.c. 1 co ec; :an `o the intelligence connuai.ity - as distinct from overt technical collection, which is the responsibility of the Department of Defense. Technico-1 collection encompasses sensors and methods of their use including platforms, transmitters and receivers for relaying the data collected, and all related equipment. Sensors are designed for various types of technical intelligence collection: ACOUSTINT, RADIN1', SIGINT (ELINT and CC}IINT) , PHOT TNT, etc. Platforms can range from the very small in the case of the microminiature, to vans, ships, aircraft , and satellites. Generally, mything having to do with the research and development, procurement, transportation, storage, location, and use of this equipment by the Agency, and its success or lack of it in collecting the required data, is classified. Certain codeword controls often apply to such information and could also serve as a key to identifying intelligence collected in a technical manner. (C) Processing. and Anal sis Processing is the conversion of technical ata into inEorn)a.ti.orn useful to the intelligence analyst. An example would be the development of Film from overhead reconnaissance, and its examination and reporting by photo interpreters. Since most of this conversion falls under the heading of "intelligence methods", the process and technical parameters are always classified, with the most highly classified information Approved For Release"- 11P00236R000200150008-9 CONFIDENTIAL Approved F4+Release 2005/12/14: CIA-RDP85BO0 R000200150008-9 i being about the degree of success of the system and data which, if divulged, would aid in the development of countermeasures to negate collection. (U) Much of the processing of technical data (such as in the field of overhead, photography) is a joint effort by CIA and other U. S. government agencies, particularly elements of the Department of Defense. The research and development of advanced methods of technical collection is often a joint effort, with CIA sharing contracting, appropriations, testing, etc. with other agencies. Consequently, many documents concerning such joint efforts will be found in the files of all participating agencies. The review of classified docunents arising from such joint activities must be coordinated with all the agencies involved. (C) Analysis is generally known and understood as the collation and processing of raw data from irony different sources to find the solution to some question confronting our policy makers. 'Mere are mauay specific tecluniques that will be classifi_e(l. The weighing and establishing of priorities for collection data and its use in estimating foreign capabilities and intentions is an i_ntellectii