SCREENING FEDERAL EMPLOYEES A NEGLECTED SECURITY PRIORITY

Document Type: 
Collection: 
Document Number (FOIA) /ESDN (CREST): 
CIA-RDP85M00364R002204190005-2
Release Decision: 
RIFPUB
Original Classification: 
K
Document Page Count: 
121
Document Creation Date: 
December 20, 2016
Document Release Date: 
January 15, 2008
Sequence Number: 
5
Case Number: 
Publication Date: 
January 1, 1983
Content Type: 
REPORT
File: 
AttachmentSize
PDF icon CIA-RDP85M00364R002204190005-2.pdf6.5 MB
Body: 
Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 Screening Federal Employees ANegleeted Securw Priority by DAVID MARTIN Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 HezIta PoundatiaQ Board of Trustees: Hon. Frank Shakespeare (Chairman), Hon. Ben B. Blackburn, Dr. David R. Brown, Joseph Coors, Hon. Shelby Cullom Davis, Midge Decter, Robert F. Dee, Hon. Jack Eckerd, Edwin J. Feulner, Jr., Joseph R. Keys, Dr. Robert Krieble, Lewis E. Lehrman, J. F. Rench, Hon. William E. Simon, Jack Wrather. President: Edwin J. Feulner, Jr. The Heritage Foundation is a Washington-based, tax-exempt, non-partisan public policy research institution dedicated to the principles of free competitive enterprise, limited government, individual liberty and a strong national defense. The Heritage Foundation publishes a wide variety of research in various for- mats for the benefit of decision-makers and the interested public. The views ex- pressed in the Foundation's publications are those of the authors and do not necessarily reflect the views of the Foundation or its Trustees. The Policy Studies Series are in-depth analyses of major issues written by scholars or experienced professionals in the appropriate field. Policy Review is The Heritage Foundation's quarterly journal of public policy. An editorial advisory board of distinguished specialists in economics, foreign policy, defense studies, political science, sociology and other disciplines seeks out for publication original proposals and critiques addressed to the prob- lems of our society. Subscriptions to Policy Review are available for $15 for one year, $28 for two years and $36 for three years. The Heritage Foundation Research Department frequently publishes Issue Bulletins and Backgrounders: the former are concise and timely analyses of specific, current policy issues; the latter are in-depth studies of longer-range policy questions. The Heritage Foundation Resource Bank is a clearinghouse of information useful to like-minded organizations. Its newsletter, the Insider Newsletter, transmits news of conferences, publications and work-in-progress to interested institutions and individuals. Its communications network provides lecturers in both foreign and domestic policy to colleges and civic groups. The Foundation is classified as a Section 501(c)(3) organization under the In- ternal Revenue Code of 1954. It is further classified as a "non-profit" (i.e., "public") foundation under Section 509(a)(2) of the Code. Individuals, cor- porations, companies, associations, and foundations are eligible to support the work of the Foundation through tax-deductible gifts. Background material will be provided to substantiate tax-deductibility. Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 Screening; Federal ]Emmaployees ANegleeted SecurityPriorily by DAVID MARTIN Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 DAVID MARTIN served for almost 20 years on the staff of the Senate Subcommittee on Internal Security. From 1959 until the end of 1970, he was attached to the staff of the late Senator Thomas J. Dodd of Connecticut, the vice-chairman of the Subcommittee. In this posi- tion, his portfolio as a staff assistant embraced internal security, foreign policy, and national defense. From 1971 until the end of 1978, he was senior analyst for the Internal Security Subcommittee and wrote many of its reports, including its final report on "The Erosion of Law Enforcement Intelligence and Its Impact on the Public Security." He is the author of two books on wartime Yugoslavia and of many articles on foreign affairs and problems of internal security. His last book, pub- lished by the Hoover Institution Press in 1978, was entitled Patriot or Traitor: The Case of General Mihailovich. Since retiring from the Senate, he has served as a consultant for the Standing Committee on Law and National Security of the American Bar Association. Library of Congress Card number 83-47643 ISBN 0-89195-034-6 ? 1983 by The Heritage Foundation Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 Table of Contents Introduction ix The Sad Plight of the Federal Employee Security Program ix The Situation in the Department of Defense xv Recommendations xvi Chapter 1 The Need for Personnel Security Chapter 2 The Anatomy of the Federal Employee Security Program 7 Chapter 3 The Erosion of Employee Security 13 Court Rulings and Self-Imposed Restrictions 15 The Destruction of the Domestic Intelligence Data Base 23 The Devaluation of the National Agency Check and the Back- ground Investigation 28 Closing Down the Civil Service Commission's SRAS 31 The Freeze on the Exchange of Domestic Intelligence 37 Suitability: The Dilemma of the Adjudicator 38 Cutting the Costs of Personnel Security: A Study in False Economy 44 The Jane Doe Decision 47 Chapter 4 Personnel Security Procedures in Individual Agencies 51 The Department of Defense 51 The Intelligence Agencies and the FBI 60 The Departments of State, Justice, and Energy 62 Chapter 5 Three Areas of Special Weakness Waiver of Pre-Employment Field Investigations for Sensitive Positions Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 Abandonment of Reinvestigations 71 Americans Employed by International Organizations 72 Chapter 6 Measures Necessary to Resuscitate the Program 77 The GAO's Recommendations 77 Changes Proposed by the Interagency Task Force 77 Essential Requirements I: Quick Fixes 81 Essential Requirements II: Long-Term Problems 87 Appendix I Appendix II Appendix III Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 Preface This monograph is the product of several years of continuing, if in- termittent, research. The initial impetus for the study was provided by the alarming information on the state of the Federal Employee Security Program developed in the course of hearings held by the internal secu- rity unit of the Senate Subcommittee on Criminal Laws and Procedures in 1978. The study is based in large degree on an extensive reading of the avail- able literature and official documents. But the principal contribution came from numerous conversations with people who have served in vari- ous capacities in the Federal Employee Security Program-as investiga- tors, as directors or recent directors or officials of the personnel security programs in federal departments and agencies, or as officials and recent officials of the FBI and the Department of Justice. Two previous drafts were submitted to the Office of Personnel Man- agement (OPM) and the Department of Defense (DOD) for their com- ments and correction. Relevant portions of the drafts were also submitted for the scrutiny of the State Department, the Justice Department, the Energy Department, and the CIA. Copies were also submitted for the critical review of a dozen or more old-time professionals, including high- ranking officials-some of them current, some of them recent-in vari- ous sectors of the Federal Employee Security Program. The fact that an official reviews a paper for accuracy does not of course signify that he endorses all of the estimates and opinions to be found in the paper. But I think it worth noting that the old-time professionals who were con- sulted, without exception, expressed the conviction that the paper did not overstate the seriousness of the situation. All members of Congress, even the most liberal, would agree that the government has the right-indeed, it has the responsibility-to insti- tute procedures for assuring itself that those who are going to fill sensi- tive positions in government are of good character and unquestionable loyalty to the United States. One has to wonder, therefore, how Con- gress could have permitted the massive, year-by-year erosion of the Fed- eral Employee Security Program without interceding to stop the rot. Perhaps none of the members were really aware of how bad the situation had become. Whatever the reason, it is my hope that this preliminary study will inspire Congress to embark upon a comprehensive investiga- tion for the purpose of establishing all the facts and exploring the possi- bility of legislative remedies. Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 Recently there have been three encouraging developments. In Janu- ary 1.982, on the direction of General Richard G. Stilwell, Deputy Un- dersecretary of Defense (Policy), the Department of Defense set up a high-level panel to review the entire question of personnel security in the DOD. The panel was chaired by David O. Cooke, Deputy Assistant Secretary of Defense (Management), who has had extensive experience in the field of personnel security. Toward the end of April, the panel submitted a report, which examines all the Department's personnel se- curity programs in a refreshingly objective manner and recommends a series of improvements in DOD procedures-some of which parallel the recommendations made in. this monograph. These recommendations are now under study, and there is reason to hope that at least some of them will be acted on affirmatively. The entire question of personnel security procedures has also been undergoing examination in the Office of Personnel Management at the initiative of OPM Director Donald J. Devine. Here, too, there is reason to hope that the arduous study of recent months will produce a number of significant improvements despite the continuing constraints imposed by court decisions and budgetary considerations. The third development that holds promise for the future is FBI Direc- tor William Webster's statement to the Senate Subcommittee on Secu- rity and Terrorism that the FBI is engaged in a rewriting of its domestic intelligence guidelines with a view to removing some of the more serious constraints resulting from the Levi guidelines. Director Webster assured the Chairman, Senator Jeremiah Denton (R-Ala.), that the Subcom- mittee would be given an opportunity to examine the revised guidelines and comment on them before they were finalized. It is my hope that those involved in the reevaluation of our personnel security programs in DOD, OPM, and other government agencies have found my research and suggestions helpful. Some of the proposals made here may infringe somewhat on a purist view of privacy rights and First Amendment rights. The proposals, more- over., may offend rigid civil libertarians. The far left, on the other hand, rejects out of hand the need for an employee security program of any kind. What seems undeniable, however, is the need to restore the confi- dence that federal employees in sensitive positions can be trusted. If the proposals in this study are not acceptable, then other means must be found to reconstitute an effective Federal Employee Security Program. Without naming any of the many people who assisted me, I would like to thank them all for their patient acceptance of my repeated demands on their time. I will, however, make one exception to this general rule because I would like to take this opportunity to pay.a personal tribute to the late Walter ("Wally") I. Waldrop, who served as Deputy Director of the Personnel Investigations Division of the Civil Service Commission/ Office of Personnel Management from 1967 to 1979 and who died on Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 z d e - June 16, 1982. His wisdom and judgment are reflected at many points in this study. Like so many others who worked in the field, Wally was a dedicated personnel security professional. He knew what good personnel security requires and knew that the government's program was being gutted on a year-by-year basis. Some of them offered resistance-without any ef- fect-to the combination of forces which appeared to be irresistibly de- stroying all the defenses that had been built up over a period of years. Others retired early out of a sense of complete frustration. Still others ate their hearts out and developed ulcers or other stress-related physical symptoms. Wally was one of the best of them all. Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 Introduction The Sad Plight of the Federal Employee Security Program The 1930s and the World War II years were years of appalling inno- cence in the major Western countries on all matters related to commu- nist subversion and infiltration. Because of this innocence, there were no effective safeguards against communist infiltration in government. In the United States, this resulted in a massive infiltration of various government offices, which was the subject of highly publicized hearings in the House and Senate ranging from 1948 to 1955. It was not only Alger Hiss. Through these hearings, the American people learned for the first time that Soviet agents had filled the number two slot and other nearby slots in the Treasury Department, that they had held a number of key positions in the State Department, and that they had also held key positions in the Roosevelt White House, in the Office of Strategic Services (OSS), and in other departments of the U.S. government. These revelations were primarily the work of a number of defectors from the Soviet intelligence apparatus-Igor Gouzenko in Canada; Whit- taker Chambers, Hedda Massing, and Elizabeth Bentley in the United States. Apart from the fact that their independent testimony jibed com- pletely on essential points, the FBI in its followup investigations found nothing but confirmation of the charges they had made. These charges were directed almost without exception against people then living, who were capable of defending themselves. The great majority of those who had been identified invoked the Fifth Amendment when they were hailed before congressional committees. In April 1953, the Senate Internal Security Subcommitee embarked on a series of hearings on interlocking subversion in government depart- ments. In doing so, the subcommittee noted that scores of agents had penetrated the United States government and had influenced American foreign policy. Summarizing the evidence presented by various witnesses, including some two score government employees who persistently invoked the Fifth Amendment, the Senate Subcommittee on Internal Security reported: They colonized key committees of Congress. They helped write laws, con- duct congressional hearings and write congressional reports. They advised cabinet members, wrote speeches for them, and represented them at inter- governmental conferences. They staffed interdepartmental committees which prepared basic American and world policy. They traveled to every Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 continent as emissaries and representatives of the American people. They attended virtually every international conference where statesmen met to shape the future. They used each other's names for reference on applications for federal employment. They hired each other. They promoted each other. They raised each other's salaries. They transferred each other from bureau to bureau, from department to department, from congressional committee to congressional committee. They assigned each other to international missions. They vouched for each other's loyalty and protected each other when exposure threatened. On the basis of these exposures, the need for a personnel security pro- gram designed to prevent communist penetration of government offices was accepted in principle in the 1950s by all members of Congress-lib- erals as well as conservatives. However, over the past two decades, and in particular over the past seven years, there has been a serious erosion affecting all aspects of the Federal Employee Security Program. In most government departments, very little is left of the loyalty-security pro- gram originally spelled out by President Truman in Executive Order 9835 (March 1947) and rewritten by President Eisenhower in Executive Order 10450 (February 1953), which established a government-wide loy- alty and suitability program. What is left is essentially a suitability pro- gram, tailored to weed out applicants who are lacking in competence or deficient in character or are unacceptable because of serious criminal history records, but possessing little direct relevance to the task of weeding out those whose activities or assiciations pose a danger to the national security. Even as a suitability program, it has been seriously undercut by the general weakening of suitability criteria and by the so- called nexus principle which, in effect, bars disqualification because of flaws such as heavy drinking, occasional drug use, homosexuality, etc., unless a definite nexus can be established between the weakness in question and the applicant's ability to perform his job. How bad the situation has become may be gauged from a few ba- sic facts. First, as matters stand today, "mere membership" in the Communist Party, the Ku Klux Klan, and other subversive organizations on either side of the spectrum is not a bar to federal employment, even in sensi- tive positions. To disqualify an applicant, there must be evidence that the membership is knowing membership and that the applicant has en- gaged, or intends to engage, in criminal activities in conjunction with his membership. In most cases, this places an almost impossible burden of proof on the government. But even this tells only a small part of the story. If the government to- day were to reverse itself on the implications for federal employment of membership in the Communist Party or other subversive organizations, Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 it still would not be able to take effective action to implement this rever- sal of policy. This is because there is no current domestic intelligence data base against which the names of applicants can be checked; be- cause, when checks are made, cooperation is frequently not forthcoming from state and local offices and from the private sector; and because there are no national security criteria for the guidance of investigators, adjudicators, and administrators. How did all this come about? The situation is the product of a complex of developments, involving both Democratic and Republican adminis- trations, decisions of the Supreme Court, Acts of Congress-in particu- lar the Privacy Act and the Freedom of Information Act of 1974-and arbitrary rulings by the Civil Service Commission (now known as the Office of Personnel Management) putting the most restrictive interpre- tation on court decisions and the requirements of privacy legislation. Another factor is the widespread tendency, when economies have to be effected, to put personnel security at, or near, the bottom of the priority totem pole. Still another factor is the anti-intelligence hysteria in the wake of Watergate. Particularly damaging has been the near total destruction of the do- mestic intelligence data base laboriously built up by the FBI and local and state law enforcement agencies over several decades. In the old days, applicants for federal employment were routinely checked against (1) the files of the FBI; (2) the personal reference card system main- tained by the Security Research and Analysis Section (SRAS) of the Civil Service Commission (CSC); (3) the extensive domestic intelligence rec- ords maintained by state and local agencies; (4) the files of the House Internal Security Committee (previously the House Un-American Ac- tivities Committee). But the priceless reservoir of domestic security in- telligence at state and local levels has for the most part been destroyed or locked up; the FBI has for all practical purposes been out of the do- mestic intelligence business since 1976; and the SRAS and the House Internal Security Committee no longer exist. The destruction of the domestic intelligence data base took only a few years to accomplish. It will take many, many years to undo the damage. The FBI, which used to be the principal agency involved in making the National Agency Checks on applicants, has largely withdrawn from the domestic security field since the imposition of the restrictive 1976 guidelines: In 1974 the FBI opened or reopened over 55,000 cases on subversives and extremists. By June 1982 only ten individuals and four organizations were under active domestic intelligence investigation. In 1967 the CSC referred the cases of 2,223 applicants to the FBI for full field investigations because preliminary evidence based on National Agency Checks (NACIs) had turned up information bearing on the na- tional security. By 1977 the number was down to 81. The author was Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 told that the last time an NAC was converted into a full FBI field inves- tigation was in 1978. No personnel security program can be implemented without a very high degree of cooperation from the public and public institutions and from other governmental agencies-federal, state, and local. Until the mid-70s, the Civil Service Commission could count on such cooperation. Today many state and local jurisdictions do not cooperate at all because of the Privacy Act and Freedom of Information Act, and private citi- zens, all the way up to federal judges, frequently refuse to cooperate if they have adverse information because, under the Privacy Act, OPM can no longer guarantee confidentiality. One respected federal judge told the author that he did not know a single member of the federal ju- diciary who would provide derogatory information about an applicant for federal employment if he possessed such information. Mention must also be made of a number of Supreme Court deci- sions-and interpretations of these decisions-which have served to re- duce the effectiveness of the Federal Employee Security Program. The first of these, Cole v. Young, handed down in 1956, found that the term national security in the Act of August 26, 1950, was intended to comprehend "only those activities of the government that are directly concerned with the protection of the nation from internal subversion or foreign aggression" and that mere membership in a communist or other subversive organization did not justify dismissal unless the employee in question occupied a "sensitive" position. In Keyishian v. Board of Regents, handed down in January 1967, the Court. ruled that mere knowing membership was not enough to justify exclusion from the faculty of New York State University. It has been the general tendency until now to apply the Keyishian ruling to govern- ment positions despite the Court's statement limiting its decision to "such positions as those held by appellants." In United States v. Robel, also handed down in 1967, the Court held that employment in industrial defense facilities could not be denied to an applicant because of mere membership in the Communist Party. There were other decisions by the Supreme Court which compounded the difficulties in other ways, but the three decisions listed above are probably the best known. There were also a number of decisions by District Courts that have served as restrictive precedents. The most damaging decisions were essentially the work of the War- ren Supreme Court. The Burger Court, in a major decision on the con- stitutionality of questions about subversive associations (Law Students Civil Rights Research Council, Inc., et al., v. Wadmond et al.), ruled that questions on membership in subversive organizations addressed to applicants for the New York Bar were not unconstitutional if they were carefully worded to conform with previous Court decisions. The damage done by court decisions and restrictive legislation was Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 compounded by a series of self-inflicted restrictions. In 1976, for ex- ample, the Civil Service Commission (CSC) ruled, based on its interpre- tation of court decisions and of the Privacy Act, that questions relating to membership in subversive organizations had to be eliminated from applications for federal employment in nonsensitive positions. In 1977, this ruling was extended to cover sensitive positions as well. The upshot of this is that the Office of Personnel Management (OPM) today cannot even make a preliminary determination that an applicant is a member of such an organization, so that it would be in a position to determine whether this is knowing membership or membership with an intent to engage in an overt act. Much damage has also been done by the tendency-on the part of Congress as well as of most government departments-to assign very low budgetary priority to their personnel security programs. When cuts have had to be made, the personnel security divisions have generally suffered more than other divisions. Here are several examples: ? In 1965, the Civil Service Commission eliminated the requirement for full field investigations for noncritical-sensitive positions (which have access up to Secret). The Department of Defense followed suit shortly thereafter. ? The Department of Health and Human Services, with 170,000 em- ployees, has had its personnel security division reduced to a staff of three, as against 333 investigators and staff assistants in its Civil Rights division. ? In 1976, Congress mandated a 27 percent cut in the personnel of the Defense Investigative Service, which processes personnel investiga- tions for the Department of Defense. By June 1, 1981, this had re- sulted in a backlog of 83,000 investigations. According to the DOD, this backlog was having a serious adverse effect on operational readi- ness and defense production. The General Accounting Office esti- mated that the backlog might be costing the DOD almost $1 billion a year, and strongly urged that the DIS be provided with 888 addi- tional staff. Some progress has been made in adding staff and re- ducing the backlog, but the situation still remains serious. ? Although the NACI (National Agency Check with Inquiries) still re- mains the minimal investigation for employees in nonsensitive and noncritical-sensitive positions, it is now being proposed, in the inter- est of economy, that employees in nonsensitive positions (1,098,166 out of 1,652,083 positions surveyed in 1980) be subjected only to an NAC. The saving effected would be approximately $11.00 per appli- cant ($36.29 against $25.05). This would be a highly questionable procedure, because without written inquiries to reinforce the National Agency Check, the employing agency would not even be able to con- firm that the applicant is who he says he is. The continuing pressure to economize at the expense of the employee security program makes no sense. The total cost of the program, gov- Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 ernment wide, is probably under $200 million per year. In the author's opinion, double this amount would not be too high a price to pay for an effective personnel security program. From a personnel security standpoint, one of the most dangerous practices that has established itself over the past two decades is the widespread resort to the waiver of full field investigations prior to filling critical-sensitive positions with applicants or appointees. Executive Order 10450 provided for the use of such waivers only "in case of emergency"; in each case, the head of the agency had to approve the appointment as "necessary in the national interest," and the back- ground investigation had to be undertaken without further delay. A ma- jority of the agencies apparently now feel that the cost of leaving such positions unfilled for several months outweighs any risk that may be involved in a post-appointment investigation. A survey of eleven agen- cies conducted in mid-1980 by the Office of Personnel Management (OPM) revealed that most investigations were now being processed on a post-appointment basis. Only two of the agencies reported pre-appoint- ment waivers in less than 34 percent of the cases. Seven of them re- ported such waivers in 90 to 100 percent of the cases. The waiver of pre-employment field investigations has been strongly and repeatedly criticized as bad security practice by the Department of Justice and the CSC/OPM. The various departments and agencies ap- pear to have shrugged off these repeated criticisms and moved ahead to make the waiver their procedural norm. This situation must be reversed. It will not be reversed, however, unless investigative staffs are maintained at a level that permits them to operate without the constant encum- brance of a two to six month backlog. The Federal Personnel Manual, basing itself on EO 10450, calls for a reinvestigation of the incumbents of all critical-sensitive positions five years after appointment and "at least once each succeeding five years." Personnel security professionals regard periodic reinvestigations to be just as important as-perhaps even more important than-initial inves- tigations. Long-term ideological moles will frequently enter government at a relatively low level and do nothing that might compromise their po- sition until they achieve important positions at the policy-making or op- erational levels. Similarly, those who have character weaknesses or personal backgrounds that would make them easy targets for the KGB recruiters become far more attractive after they have moved up the lad- der and have access to important information. Government wide, the performance record on the requirement for re- investigations is at an abysmally low level. DOD has suspended indefin- itely all such investigations. In other departments and agencies, rein- vestigation is becoming increasingly rare. OPM reports that between 1977 and 1981 the number of requests for reinvestigation received from Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 GAO fell from 277 to 84; the State Department from 114 to 50; NASA from 254 to 151. This is an area where dramatic improvement would be possible, given a combination of a firm administrative directive and the funds neces- sary to restore the reinvestigative program to an adequate level. The Situation in the Department of Defense There are weaknesses in the personnel security procedures in the De- partment of Defense (DOD) that give serious reason for concern. Enlistees are required to undergo an ENTNAC, which is a National Agency Check without a fingerprint check. This qualifies them for ac- cess to information and technology up to the level of Secret. It would, for example, qualify an enlistee for service aboard a nuclear submarine. Access to Top Secret information or to officer duty aboard a nuclear submarine requires a Background Investigation (BI)-now an Interview- oriented Background Investigation (IBI) (see below). Officer candidates for all services are accepted on the basis of an NAC-now almost mean- ingless because there is no data base. Under the pressure of a midyear backlog of 83,000 cases awaiting background investigation, the Department of Defense, in July 1981, made a number of drastic cutbacks in the scope of its personnel security program, including its application to members of the armed forces and defense contractor personnel. Periodic reinvestigations were suspended indefinitely. The standard BI, which used to have a scope of five years, was reduced to an IBI, consisting of an NAC and a one-hour (average) interview. The IBI has been strongly criticized by other components of the personnel security community, including OPM, the State Depart- ment, the Energy Department, and CIA. CIA professionals point out that many applicants, when interviewed in the field by skilled investiga- tors, will pass muster with flying colors, while they flunk the polygraph miserably when the same questions are put to them in Washington. One senior CIA official described the IBI as a very serious danger to the national security. DOD is now giving serious consideration to abandoning the IBI and returning to the old-fashioned BI. In December 1981, the Defense In- vestigation Service (DIS), which conducts the Background Investigations for DOD, was given the authorization for 768 additional positions, of which approximately two-thirds were allocated to investigators. This expansion of DIS will contribute to reducing the backlog, but it is almost certainly not enough to permit the liquidation of the backlog, plus the resubstitution of the standard BI for the IBI, plus a return to the requirement for five-year reinvestigations of all those with access to Top Secret or over. Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 Recommendations Given these facts, it would be natural to ask if our Federal Employee Security Program is not beyond repair, or at least beyond repair in any reasonable time frame. The problems are unquestionably enormous- but we must address them because the penalty for failing to do so goes to our survival as a nation. Certain of the most basic repairs are going to be very difficult and time-consuming (among other things because they will require legislation). There are, however, a number of "quick fixes," especially in the case of the suitability program, that can be made without serious delay-a few months, a year, perhaps a bit longer-by administrative action only, without the enactment of new legislation. As was pointed out, the Federal Employee Security Program really consists of two parts. The first part has to do with security strictly per- ceived-that is, in the sense of screening out elements whose associations with organizations found to be subversive renders them unsuitable for employment on national security grounds. The second part of the pro- gram has to do with suitability. Inevitably, there is a strong overlapping between the two because those who are untrustworthy or engage in "criminal, dishonest, infamous or notoriously disgraceful conduct," or drink excessively, or use drugs, are clearly more vulnerable targets for the many KGB recruiters who are active in this country, or more liable to be careless with confidential information or documents to which they have access. In fact, the majority of those convicted of espionage since World War II did not become agents for ideological reasons; they suc- cumbed, rather, because of monetary or sexual enticement or blackmail. Administrative directives not supported or required by law can very easily be replaced by directives from the new administrators. Handbooks prepared under previous administrations can be replaced by new hand- books designed to enhance the quality of our personnel suitability pro- gram. Here are some of the things that could and should be done. 1. The lax 1975 suitability guidelines for adjudicators, currently in use by OPM, should be completely rewritten. 2. The directives promulgated by the chairman of the Civil Service Commission or the chief counsel of the CSC going back to 1965 should be reexamined with a view to eliminating or rewriting all those weakening directives not absolutely required by law. 3. The entire body of Supreme Court rulings relating to federal em- ployment should be reexamined with a view to replacing the ex- tremely constrictive interpretations, passively accepted for some two decades now, with viable, more conservative interpretations. 4. The quality of investigation and adjudication should be improved by funding more intensive training courses, plus refresher courses, for investigators and adjudicators. 5. There should be a tightening up on the waiver of the pre-employ- Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 ment Background Investigation (BI), which has now become the rule in most agencies. 6. There should be a firm return to the requirement for a reinvesti- gation at five-year intervals of all employees in sensitive-or at the very least, critical-sensitive-positions. 7. Adequate funding must be provided for the manpower require- ments that would be made necessary by such improvements. This will need a budgetary assist from Congress. 8. DOD should, at the earliest possible date, abandon the IBI and return to the requirement of a full field Background Investigation for all those with access to Top Secret or higher classifications. 9. Some formula must be found for recasting the "nexus" provi- sion so that agencies are not placed in the ridiculous position of having to hire employees whom they have many valid reasons for not hiring, but about whose flaws and weaknesses they cannot provide a definite nexus to ability to perform the job. 10. The OPM and the Justice Department must team up to repre- sent the interests of the Federal Employee Security Program be- fore the courts far more vigorously and effectively than heretofore. 11. A new executive order should be issued, making it clear that it is the intention of the Administration to maintain an effective pro- gram to ensure that applicants for employment in sensitive gov- ernment positions possess the qualities of integrity and unswerving loyalty to the United States. In all of these areas, quick fixes are possible; the time required de- pends more on the commitment of the principal actors than on the amount of reading and writing to be done. The institution of the im- provements suggested above should quite quickly-let us say, over several years-result in a much stronger suitability program than we have today. The improvement of the personnel security program, as distinct from the suitability program, will require much more time and effort-al- though here, too, there are some things that can be undertaken without delay, e.g., rewriting the domestic intelligence guidelines imposed on the FBI by Attorney General Edward Levi in 1976. In a hearing before the Senate Subcommittee on Security and Terrorism in early July 1982, FBI Director Webster informed Chairman Denton that the FBI was engaged in redrafting the Levi guidelines because they imposed excessive restric- tions on the FBI's ability to monitor subversive and terrorist organizations. The two central requirements for the implementation of an effective Federal Employee Security Program are (1) the establishment of guide- lines for agency directors, adjudicators, and investigators; and (2) the reconstruction of a domestic intelligence data base by reactivating the FBI in the field of domestic intelligence and reviving the OPM's Secu- rity Research and Analysis Section. Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 The reconstruction of the domestic intelligence data base will require a much better balance between the right of the nation to protect itself and the privacy rights of the individual than is today the case. Among other things, the FBI will have to be relieved of some of the restraints imposed on it in the course of the post-Watergate anti-intelligence hys- teria. Virtually mandatory would be an amendment to the Privacy Act to specifically exempt domestic intelligence files from disclosure. To provide the greatest possible assurance that some of the abuses of the past will not be repeated, a nonpartisan domestic intelligence advi- sory board should be constituted, in which the judicial profession, the academic community, the legal community, and business and labor are all represented. It would have oversight responsibilities in the field of domestic intelligence plus the responsibility for preparing, as quickly as can judiciously be done, a list of organizations in which membership would raise serious questions of suitability for employment in sensitive positions. The listing should be public and should be accompanied in each case by a summary of the reasons for the listing. Organizations thus designated should be given administrative due process rights to challenge the designation. Beyond this, of course, they could appeal their cases to the courts. They should also have the right to ask for a de- listing hearing if they wish to demonstrate that their activities have changed significantly since the listing was promulgated. If the Privacy Act and the Freedom of Information Act are amended to exempt investigative and adjudicative files from disclosure, it will still be possible to observe administrative due process. Applicants about whom derogatory information is developed should be provided with a summary of this information and with an opportunity to respond to it before a final decision is made. In addition, virtually every agency has a built-in machinery of appeal against adverse decisions-and beyond this, at the administrative level, there is the final right of appeal to the autonomous Merit Systems Protection Board. Here are a few additional recommendations the author would like to urge: ? Individuals who are denied employment on national security grounds should not be stigmatized as loyalty risks. Instead, the de- termination should simply state that the applicant has been found "unsuitable" for federal employment. ? The Federal Torts Claims Act should be amended to protect federal employees from the threat of civil suits by providing an exclusive remedy against the United States government in cases involving al- legations of tortious conduct by government employees acting in an official capacity. (Such legislation is now pending.) ? Legislation should be considered which would make mandatory the cooperation of state and local authorities with the DOD and other Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 government agencies in the matter of personnel investigations re- lated to the Federal Employee Security Program. The possible need for compensating state and local agencies should also be examined. ? A blue ribbon panel similar to the Loyd Wright Commission of the 50s should be set up to look at the entire question of the personnel security situation. In order to provide a lead and set the tone for all government depart- ments and agencies, President Reagan should speak out on the matter and issue a new executive order, reaffirming the need for sound person- nel security practices in government and establishing some basic rules for the conduct of such a program. January 27, 1983. As we go to press, a check with the Department of Defense and the Office of Personnel Management reveals that at OPM there has in recent months been some significant progress, with indica- tions of more to come. New guidelines for adjudicators are in the final stages of preparation. A decision has been made not to go along with the recommendation of the Interagency Task Force calling for the substitution of a NAC for a NACI in the case of Level I employees. The proposal that investigative files be retained for seven years only has also been turned down. Within the past few months, OPM has also made some progress in improving its access to state and local law enforcement records. The State of Pennsylvania has passed legislation directing police depart- ments to accept requests from OPM in the same way that they would requests from components of the federal criminal justice system. Pro- posals are also pending that would give OPM comparable access in New Jersey and Massachusetts, as well as in New York City. DOD seems to be moving toward the use of polygraphs in appoint- ments to the most sensitive positions, whose occupants have access to Secret Compartmented Information (the highest level of classification). It has also been recommended that the polygraph be used on a random basis in the periodic reinvestigations of those in sensitive positions. Despite the very strong recommendations of the high-level interdepart- mental task force which submitted its report on personnel security in April 1982, the indications are that the Defense Department will stick with the IBI (a one-hour-average-interview) as a substitute for the full field background investigation in processing personnel for sensitive and critical-sensitive positions. At the very highest level of sensitivity, however, there will be ten-year background investigations. Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 1 The Constitution does not guarantee public employment. City, State, and Nation are not confined to making provisions appropriate for secur- ing competent professional discharge of the functions pertaining to diverse governmental jobs. They may also assure themselves of fidelity to the very presuppositions of our scheme of government on the part of those who seek to serve it. No unit of government can be denied the right to keep out of its employ those who seek to overthrow the government by force or vio- lence, or are knowingly members of an organization engaged in such endeavor. Justice Felix Frankfurter, in Garner v. Board of Public Works of City of Los Angeles. 341 05 716, 724-725, 1951 The Need for Personnel Security The need for a personnel security program is accepted in principle by virtually all members of Congress, liberals as well as conservatives. In practice, however, this acceptance has, over the past decade or more, been rendered meaningless by the one-sided insistence on the right of privacy. The right of privacy is very important-but it is not the only right. The government also has rights-and one of the most important of these is the right to protect itself and the public against subversion and terrorism and domestic violence. The exercise of this right of self- protection undeniably conflicts at certain points with the right of pri- vacy or, to be more precise, with the absolutist conception of the right of privacy. This is so for the simple reason that it involves such proce- dures as personnel investigations and the maintenance of an effective domestic intelligence operation and domestic intelligence files. Common sense points to the need for a reasonable compromise between the right of privacy and the right of the government to take measures to protect the security of the nation. Instead, today the right of privacy is over- whelmingly paramount, while the personnel security program essential to the protection of the nation has been reduced to a fragmentary and moribund condition. Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 The history of the post-World War II period, both in this country and in western Europe, is filled with incidents that dramatically dem- onstrate the need for rigorous personnel security practices designed to protect our government from the risks inherent in employing in posi- tions of responsibility either people of questionable character or stability -of whom there are many-or people who are ideologically committed to the destruction of our form of government. The latter constitute only a tiny fraction of the population, but they are capable of inflicting enor- mous damage if they move into sensitive positions in government. In the late 1940s and early 1950s, as a result of the revelations of Whittaker Chambers, Elizabeth Bentley, and Hedda Massing, all self- confessed Soviet agents, the American public learned that some 40 people who held high positions in the United States government and in- ternational agencies were, in fact, Soviet agents. The roster of revealed agents included Alger Hiss, who had served as Assistant Secretary of State for International Organization Affairs; Harry Dexter White, As- sistant Secretary of the Treasury under Henry Morgenthau; Lauchlin Currie, Executive Secretary to President Roosevelt; Larry Duggan, head of the State Department's Latin American Division; and Frank Coe, another top Treasury employee who later became head of the In- ternational Monetary Fund.* Since these early revelations were made, there has been a steady suc- cession of cases-less spectacular, perhaps, but nevertheless highly im- portant-involving disloyalty and espionage by United States government employees. A random selection reminds us that Irvin Chambers Scar- beck, second secretary of the U.S. Embassy in Poland, was sentenced to 30 years in November 1961 on a charge of espionage; that Nelson C. Drummond, a U.S. Navy enlisted man, was sentenced to life imprison- ment in August 1963 on a similar charge; that Sgt. Robert C. Johnson was sentenced to 25 years in July 1965; that William Henry Whalen, a retired lieutenant colonel, was sentenced to 15 years in March 1967; *Of the government officials named above, only Alger Hiss went to prison. The essence of the case against him had to do with treason, but because of the statute of limitations he was charged with having perjured himself in denying that he had transmitted secret State Department documents to Whittaker Chambers, a confessed Soviet courier. Harry Dex- ter White appeared once before the House Un-American Activities Committee-and then died of a heart attack before his second scheduled appearance. Subsequently, both At- torney General Herbert Brownell and J. Edgar Hoover made statements indicating that they regarded the case against Harry Dexter White as ironclad. Lauchlin Currie, when asked to appear before the Senate Internal Security Subcommittee in 1952, went to Co- lombia and has never returned to the United States. Larry Duggan, who had been asked to testify before the Senate Subcommittee at about the same time, fell from a New York skyscraper window under mysterious circumstances. Frank Coe invoked the Fifth Amendment when he was asked, Are you a Soviet agent, Mr. Coe?" He was immedi- ately dismissed by the International Monetary Fund. Shortly thereafter he went to Red China where he served as a financial advisor to the government until his death in the sum- mer of 1981. Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 that Edwin Gibbons Moore II, a retired CIA employee, was sentenced to life imprisonment in June 1977 on a charge of espionage; that Christopher John Boyce, a TRW contract employee, was sentenced to 40 years in prison in December 1977 for passing sensitive information about our reconnaissance satellites to the Soviets; that in November 1978, William Kampiles, a minor CIA employee, who got his hands on a priceless manual on the KH 11 satellite (designed to monitor Soviet SALT violations) and sold it to the Soviets, was also sentenced to 40 years in prison. Just before this study was completed, there was the case of 2nd Lt. Christopher M. Cooke, USAF, who confessed to passing on to the Soviets highly classified information to which he had access as the deputy commanding officer of a Titan missile site. (The charges against him were dismissed by the Court Martial on the grounds that he had been promised immunity if he confessed.) Other traitors who held important positions managed to get away be- fore the law could catch up with them. In the summer of 1960, two em- ployees of the supersecret National Security Agency, Bernon F. Mitchell and William H. Martin, defected to the Soviet Union, gave away vital technical know-how on U.S. coding and decoding capabilities and pro- cedures, and lent themselves to a sustained and malicious propaganda campaign against the United States. And we are currently confronted with the case of Philip Agee, who resigned from the CIA in 1968, con- vinced that he had become a "servant of the capitalism I rejected." Since that time, making no bones about the fact that he considers him- self a Marxist, he has been devoting himself to publicly identifying CIA agents. This partial listing could be expanded many times over. The other Western nations have been shocked similarly from time to time to discover that men who held high positions in their governments were in reality Soviet agents. England received its first shock from the case of Klaus Fuchs, a top-ranking nuclear scientist, who passed on vi- tal information about the H-bomb to the Soviets. Years later it was shocked once again to learn that Kim Philby, the head of British coun- terintelligence, was also a Soviet agent-as were his confederates, both high-ranking officers in the Foreign Service, Guy Burgess and Donald Maclean. All three defected to the Soviet Union before they could be apprehended. In Germany in recent years there have been many instances of espionage by people who held important government positions, the best known of which was the case of Guenther Guillaume, a personal secretary to Chancellor Willy Brandt. Even neutral countries have not escaped the attention of the KGB. In Sweden in 1964, there was the sensational case of Colonel Stig Wenner- stroem, a retired air force colonel who had served from 1952 to 1957 as air force attache in Washington. Wennerstroem was convicted on the charge that he had supplied information to the Soviets continuously Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 from 1948 to 1963 and had gravely compromised Sweden's national de- fense. Neutral Switzerland went through a similar experience in 1976 when Brigadier General Jean-Louis Jeanmarie, a member of the mili- tary general staff, was convicted of spying for the Soviets for 18 years, massively compromising Switzerland's defensive preparations. It would be difficult to place a dollar figure on the total damage done to the interests and defenses of the Western nations by such Soviet agents. Sweden is reported to have spent in excess of $100 million in re- organizing its defenses as a result of the Wennerstroem revelations. The Jeanmarie case is reported to have cost Switzerland a comparable sum of money. Then there is the case of Harry Dexter White who, in the period following World War 11-over the opposition of the War De- partment, the State Department, and the Bureau of Engraving and Printing-pushed through his personal recommendation that the So- viets be provided with duplicates of the American printing plates for German occupation currency. This surely cost the U.S. billions of dol- lars. Much more important, however, in White's case, is the fact that, through the Morgenthau Plan* of which he was the author, he was able to serve the Soviet objective of keeping Germany in the war as long as possible so that the Red Army would have more time to push to the West in Europe. On the basis of this long and dismal record, it should not be necessary to defend the proposition that all those employed by the U.S. govern- ment, especially in sensitive positions, should undergo careful scrutiny before they are approved for such employment. The argument may be made that a substantial majority of those who have been apprehended and sentenced as Soviet agents are people who could not have been spotted in advance because there were no subver- sive associations of any kind in their backgrounds, and the weaknesses which led to their downfalls were not predictable. It is true that there are far more instances where government employees or members of the armed forces have succumbed because of monetary or sexual entice- ments or blackmail than there are instances where the motivation was *The Morgenthau Plan, in essence, called for the deindustrialization of Germany and its conversion into a pastoral country. It was strongly opposed by both the War Department and the State Department because it undercut the position of those Germans who wanted to end the war, many of whom were in contact with our own intelligence. In July of 1944, indeed, anti-war sentiment at high level resulted in the attempted assassination of Hitler by Count von Stauffenberg. an incident which was followed by hundreds of executions and the forced suicide of General Rommel. The Morgenthau Plan was used by Hitler to bolster his position. The Nazi press depicted it as a Jewish-American plan for the perma- nent impoverishment of Germany. Governor Thomas Dewey made the statement that the plan was worth ten new divisions to Hitler. Obviously, if the anti-Nazi Germans had been able to overthrow Hitler and make peace in the fall of 1944, scores of thousands of lives would have been saved and the war would have ended with the Soviets hundreds of miles to the east of where they finally stood on VE Day in May of 1945. The Morgenthau Plan foreclosed any such possibility. Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 primarily ideological. But this is true only when it comes to passing on classified information. Even here, it would be appropriate to recall that all of the dozen or more post-World War II atom bomb spies in the United States, Canada, and Great Britain were spies for ideological reasons. There are, however, other vital areas of agent activity, capable of in- flicting enormous damage, where the motivation is primarily ideological. This would certainly be true in the area of policy manipulation (Alger Hiss, Harry Dexter White, Burgess and Maclean, Guenther Guillaume). It would also be true of the kind of operational sabotage carried out by Kim Philby, who did great harm to British intelligence operations by virtue of his key position as chief of M16 (counterintelligence). Finally, while it is not excluded that physical sabotage in time of war can be ar- ranged on a mercenary basis, the chances are that, in this area of risk, ideological motivations pose a substantially greater danger. Perhaps another point should be made here to underscore the impor- tance of having a domestic intelligence machinery and an adequate data base in existence before a country is plunged into war. Kim Philby, Burgess and Maclean, and Anthony Blunt (whose exposure as a war- time Soviet agent four years ago led to the revocation of his knighthood) were all members of an openly communist group on the Cambridge campus in the early thirties. So was James Klugman, who played a sin- ister role in promoting the British decision to abandon the Yugoslav re- sistance movement of General Draja Mihailovich and throw all World War II allied support to the avowedly communist movement led by Marshal Tito. Had there been any meaningful domestic intelligence op- eration in existence in Britain at the time, it certainly would have picked up masses of detailed information about the activities and mem- bership of the Cambridge group. And had such domestic intelligence been available, it is probable that Britain could have avoided the cata- strophic damage inflicted by the combined activities of this remarkable group of communist intellectuals from which Soviet intelligence was able to recruit some of its ablest and most effective agents. But Britain and the United States, before World War II, had very little in the way of domestic intelligence. For this they both paid a heavy price. Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 2 The Anatomy of the Federal Employee Security Program Prior to 1939, the criteria governing the employment of applicants by federal departments and agencies had to do essentially with general suitability-primarily the factors of competence and personal integrity. This was the thrust of the Civil Service Act of 1883, the first legislation in a long series bearing on the problem of employability. In line with this, civil service investigations prior to 1939 were as a rule limited to questions of character and general suitability. The Hatch Act of 1939 was the first law to deal specifically with the question of loyalty. Section 9A prohibited federal employees from "mem- bership in any political party or organization which advocates the over- throw of our constitutional form of government in the United States." Over the years this was followed by a progression of executive orders and acts of Congress, which led to the emergence in the mid-50s of a formalized and effective loyalty-security program. After the Hatch Act, there was President Roosevelt's Executive Order 8781 of June 12, 1941, which required the fingerprinting of all employ- ees in the executive civil service. In the spring of 1944, the Civil Service Commission established a Loyalty Rating Board to handle cases involv- ing derogatory information with regard to loyalty. About the same time, the Civil Service Commission began compiling a security index and gen- eral information file. In November 1946, President Truman issued an ex- ecutive order establishing a Temporary Commission on Loyalty. Based on the Commission's report, President Truman on March 2, 1947, pro- mulgated Executive Order 9835, which stipulated that employment in the executive departments or agencies could be refused if "... on all the evidence, reasonable grounds exist for the belief that the person in- volved is disloyal to the government of the United States." EO 9835 was superseded in February of 1953 by Executive Order 10450, signed by President Eisenhower, which basically broadened the loyalty program to include suitability. It is EO 10450, as amended, that governs the em- ployee security program today in the competitive civil service. EO 10450 said that: Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 ...the interests of the national security require that all persons privi- leged to be employed in the departments and agencies of the government shall be reliable, trustworthy, of good conduct and character and of com- plete and unswerving loyalty to the United States. It called upon the head of each department and agency of the govern- ment to establish and maintain "an effective program to insure that the employment and retention in employment of any civilian officer or em- ployee ... is clearly consistent with the interests of the national security." It stipulated that the employment of civilian officers or employees in government agencies and departments should be made subject to inves- tigation, the scope of the investigation to be regulated "according to the degree of adverse effect the occupant of the position ... could bring about, by virtue of the nature of the position, on the national security." EO 10450 required the heads of departments and agencies to desig- nate as sensitive any position where the occupant would be in a position to bring about "a material adverse effect on the national security." It also stipulated that any position designated sensitive "shall be filled or occupied only by a person with respect to whom a full field investigation has been conducted," and that "in no event shall the investigation in- clude less than a National Agency Check, including a check of the finger- print files of the Federal Bureau of Investigation and written inquiries to appropriate local law enforcement agencies, former employers and supervisors, references, and schools attended by the person under in- vestigation." The Federal Personnel Manual added the stipulation that occupants of sensitive positions be reinvestigated every five years. EO 10450 gave to the Civil Service Commission the primary responsi- bility for conducting investigations of persons entering or employed in the competitive service. To assist investigators in deciding whether the employment or retention in employment of a person being investigated was "clearly consistent with the interests of the national security," EO 10450 listed the follow- ing criteria: 1. Depending on the relation of the government employment to the national security: (i) Any behavior, activities, or associations which tend to show that the individual is not reliable or trustworthy. (ii) Any deliberate misrepresentations, falsifications, or omissions of material facts. (iii) Any criminal, infamous, dishonest, immoral, or notoriously disgrace- ful conduct, habitual use of intoxicants to excess, drug addiction, or sexual perversion. (iv) An adjudication of insanity, or treatment for serious mental or neu- rological disorder without satisfactory evidence of cure. (v) Any facts which furnish reason to believe that the individual may be Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 subjected to coercion, influence, or pressure which may cause him to act contrary to the best interests of the national security. 2. Commission of any act of sabotage, espionage, treason, or sedition, or at- tempts thereat or preparation therefor, or conspiring with, or aiding or abetting, another to commit any act of sabotage, espionage, treason, or sedition. 3. Establishing or continuing a sympathetic association with a saboteur, spy, traitor, seditionist, anarchist, or revolutionist, or with an espionage or other secret agent or representative of a foreign nation whose interests tend to be inimical to the interests of the United States, or with any per- son who advocates the use of force or violence to overthrow the govern- ment of the United States or the alteration of the form of government of the United States by unconstitutional means. 4. Advocacy of use of force or violence to overthrow the government of the United States, or the alteration of the form of government of the United States by unconstitutional means. 5. Membership in, or affiliation or sympathetic association with, any foreign or domestic organization, association, movement, group, or combination of persons which is totalitarian, Fascist, Communist, or subversive, or which has adopted, or shows, a policy of advocating or approving the commission of acts of force or violence to deny other persons their rights under the Constitution of the United States, or which seeks to alter the form of government of the United States by unconstitutional means. 6. Intentional, unauthorized disclosure to any person of security informa- tion, or of other information disclosure of which is prohibited by law, or willful violation or disregard of security regulations. 7. Performing or attempting to perform his duties, or otherwise acting, so as to serve the interests of another government in preference to the interests of the United States. With minor modifications, these criteria still govern-theoretically- the operation of .the federal employee security program. In its second paragraph, EO 10450 underscored the need for fair- ness, impartiality, and equitable treatment and for the adjudication of cases by mutually consistent standards between government departments and agencies. Prior to 1965, the federal work force was divided into two categories for purposes of investigation-nonsensitive and sensitive. All sensitive positions required a full field Background Investigation. Since 1965, however, all civilian positions in the competitive service have been di- vided into three basic categories-nonsensitive, noncritical-sensitive, and critical-sensitive. Only the very limited number of critical-sensitive positions require full Background Investigations. The Federal Personnel Manual defines sensitive positions as "those positions the occupants of which could bring about, by virtue of the na- ture of their positions, a material adverse effect on the national security." It makes it mandatory to classify positions as sensitive if the occupants will have access to Top Secret, Secret, or Confidential information. Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 The Personnel Manual defines critical-sensitive positions by positing these criteria: ? Access to TOP SECRET defense information; ? Development or approval of war plans, plans or particulars of future or major or special operations of war, or critical and extremely important items of war; ? Development or approval of plans, policies and programs which affect the overall operations of an agency-that is, policy-making or policy-deter- mining positions; ? Investigative duties, the issuance of personnel security clearances, or du- ties on personnel security boards; ? Fiduciary, public contact, or other duties demanding the highest degree of public trust. Noncritical-sensitive positions are defined as all other sensitive posi- tions that do not meet the above criteria. The Office of Personnel Management (OPM), previously the Civil Service Commission (CSC), conducts the National Agency Checks (NACs) for almost all government agencies. The NAC involves a check of the fingerprint and investigative files of the FBI, the files of the OPM, the files of the appropriate intelligence and investigative agen- cies and armed forces. It also used to involve a check with the personal reference card files maintained by the Security Research and Analysis Section of the CSC/OPM, the files of the House Internal Security Com- mittee, and the domestic intelligence files of state and local law enforce- ment agencies. These sources, however, are no longer available to the Federal Employee Security Program. (This will be discussed in detail at a later point.) In the case of nonsensitive and noncritical-sensitive positions, the NAC., as required by EO 10450, is supplemented with written inquiries to references, schools, former employers, local police departments, etc., and the entire procedure is then called an NACI. The inquiries are important among other reasons because they help to establish that the subject is who he says he is. The NACI is the minimum investigation conducted for federal employment by the OPM. However, enlistees in the armed forces undergo a somewhat abbreviated investigation called an ENTNAC, which is an NAC without an FBI fingerprint check. Offi- cer candidates are required to undergo an NACI. In the case of critical-sensitive positions, the NAC is combined with a full field Background Investigation, which involves record checks and personal interviews with neighbors, friends, references, employers, schools, business associates, and others who have general knowledge of the subject, as well as law enforcement agencies. It also generally in- volves a credit check. Operationally, the Federal Employee Security Program is divided into three distinct sectors: the Department of Defense (DOD), including the Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 armed forces; the 54 federal departments and agencies whose investiga- tive programs come under the direct authority of the OPM; and the law enforcement and intelligence agencies. The State Department, as an intelligence-using agency, would be in this last category. Because of its size and the massive annual turnover in the armed forces, DOD accounts for the bulk of personnel security investigations- some 900,000 in 1978 out of a total of 1.4 million.* The great majority of these investigations are NACs or ENTNACs, but about 120,000 are BIs or Special BIs. In that same year, 1978, the Civil Service Commission conducted some 325,000 personnel security investigations, while the remaining 175,000 were conducted by the Departments of Justice, State, and Treasury and by the CIA. There are several qualifications that have to be made to the above de- scription of the division of labor in the personnel security field. Executive Order 10450 had given the CSC the authority to conduct investigations of applicants for employment throughout the civilian sector, including the civilian sector of DOD. Under a rather complex arrangement- which makes for divided responsibilities-the CSC had delegated to the Department of Defense the responsibility for conducting Background Investigations of its own civilian employees, and there have been simi- lar delegations of authority in the case of the intelligence and law en- forcement communities. A number of the agencies and departments that conduct most of their own BIs (e.g., Treasury Department, State Department, and the National Security Agency) still call on the OPM to assist in the processing of some of the less important positions re- quiring Background Investigations. Applicants for government employment are given protection and consideration far exceeding the norms of the private sector. If an appli- cant is not selected, he may appeal the decision to a review authority in the agency itself. If the decision is not reversed and the applicant re- mains dissatisfied, he may carry his appeal to an independent body, the Merit Systems Protection Board, which, according to those in the field of personnel security, has, at least until recently, tended to tilt heavily to the side of the applicant or employee. Such an anatomical description of the Federal Employee Security Program makes it sound like a reasonably neat and orderly operation. Unfortunately, it provides no clue to the true state of affairs. *Search Group Inc., Federal Access to State and Local Criminal Justice Information for Federal Personnel Security and Employment Suitability Determinations, Sacramento, California, March 1979. Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 The Erosion of Employee Security Over the past two decades, and in particular over the past seven years, there has been a progressive retreat from the concept of person- nel security in government. In most government departments, very lit- tle is left of the personnel security program, properly speaking. What does remain of it is essentially a personnel suitability program, capable in many cases of weeding out applicants who are lacking in competence or deficient in character or are unacceptable because of serious crimi- nal history records. (Even in this limited function the program's effec- tiveness has been sadly reduced by privacy legislation and by a whole series of regulatory constraints.) It is virtually incapable, however, of weeding out applicants who have ties or associations that raise serious questions of suitability from a national security standpoint, or which are clearly inconsistent with the national interest. Testifying before the Senate Subcommittee on Criminal Laws and Procedures in 1978, Alan K. Campbell, Chairman of the Civil Service Commission, stated that applicants could not be denied employment in the federal competitive service on the basis of what is called "mere mem- bership" in subversive organizations of the far left or the far rght-in- cluding the Communist Party, the Socialist Workers Party (SWP), the KKK, the American Nazi Party, the Palestine Liberation Organization (PLO), and the Puerto Rican Socialist Party (a frankly Castroite orga- nization) as well as the several Maoist organizations. For employment to be denied, there had to be knowing membership plus some overt act or evidence of intention to commit such an act. In line with this, the Civil Service Commission in 1977 had taken the stand that applicants for employment, even in sensitive positions, could not be asked about membership in organizations committed to the vio- lent overthrow of the United States government or to the use of force for political change; nor, in the absence of an overt act, could information about such membership coming from a third party source be entered into the record of the investigation. This was confirmed by Mr. Robert J. Drummond, Jr., Director of the CSC Bureau of Personnel Investigations, in the course of a 1978 ap- Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 pearance before the Senate Subcommittee on Criminal Laws and Pro- cedures, in the following exchange: SENATOR THURMOND: And you would not maintain in your files the information that a man is a member of the Communist Party or any orga- nization that stands for the violent overthrow of our government. Mere membership would not be enough to allow you to put that in your files- you would have to have some overt act? MR. DRUMMOND: Yes. We would have to have something more than mere membership. The absolute ban on investigation into what is euphemistically called "mere membership" was reflected in the following paragraph taken from a 1978 handbook for Civil Service Commission investigators: Members of an organization are reported to have set fire to the campus ROTC building. If the subject of investigation is reported to be a member of this group, our inquiry would be limited to his/her activities, if any, in connection with the act of arson. Such self-imposed restrictions are crippling enough by themselves. But they exacerbate the basic damage done by a series of court decisions, by the virtual destruction of the intelligence data base on subversive and violence-prone organizations, and by the catastrophic effect that privacy legislation and the 1976 FBI guidelines have had on the ability of federal agencies to maintain records or to obtain information from state, local, and private sources, or even from other federal agencies. The basic ruling that applicants cannot be asked about membership in subversive organizations stands to this day, although it must be noted that, thanks to a change in management, there have been some signifi- cant changes for the better, so that today investigators interviewing third parties are permitted to ask in a general manner about membership in questionable organizations and may report any such statements by wit- nesses in their own words. The Investigators' Handbook quoted above has now been replaced by a new handbook, which avoids such inane instructions. In theory, employment may be denied on the basis of membership in a subversive organization (1) if it is knowing membership, and (2) if it can be established that the applicant has engaged in an overt act or has a specific intent to further the unlawful aim of the organization. But this theoretical permission is completely ineffective because of the near- total absence of a domestic intelligence base, the lack of guidelines for adjudicators, and the limitations on questions to applicants. Nor does it nullify the fact that information about membership or knowing membership, even if confirmed, is under present standards unaction- able without evidence of criminal complicity or criminal intent. Another factor contributing to the degradation of the Federal Em- Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 ployee Security Program is the fact that investigators, analysts, and ad- ministrators concerned with personnel security have been compelled for some years now to operate without accepted criteria and guidelines. The situation existing today in effect nullifies long-standing and re- peated legislative requirements. It also makes a mockery of the provi- sions of executive orders relating to personnel security in government promulgated by President Truman in 1947 and by President Eisenhower in 1953. It flies in the face of a whole series of Supreme Court decisions, which are in essential harmony with Justice Frankfurter's statement quoted above, in upholding the constitutionality of measures designed to "safeguard the public service from disloyalty." Court Rulings and Self-Imposed Restrictions The series of circumstances and decisions that brought the Federal Employee Security Program to its present lamentable state cannot be attributed to any single agency or any single administration. It is the product of a complex of developments, involving both Democratic and Republican administrations, decisions of the Supreme Court, Acts of Congress, in particular the Privacy Act and the Freedom of Information Act of 1974, and arbitrary rulings by the Counsel for the Civil Service Commission, putting the most restrictive interpretations on Supreme Court decisions and other court decisions and on the requirements of the privacy legislation. It is also a product, as will be discussed later, of the widespread tendency to put personnel security at or near the bottom of the priority totem pole. Finally, it is a product of widespread misunder- standing of the nature and purpose of the federal personnel security program, a misunderstanding that tends to equate it with "witch- hunting" and "McCarthyism." Critics charge that EO 10450 is out of date and that it requires amendment or even rewriting in order to make it a viable administra- tive and legal instrument. However, subject to certain changes sug- gested by Supreme Court decisions, it remains the law of the land (no matter what weaknesses it may suffer from) and the guiding authority for the various executive agencies in the conduct of their own employee security programs. The Eisenhower Executive Order had been preceded in 1950 by Public Law 733, which dealt primarily with the problem of applicants and em- ployees who "although loyal to the United States, act in a manner which jeopardizes national security, either through wanton carelessness or general disregard for the public good." The House report from which this quote was taken also pointed out that this bill made "ample provi- sion for the employment in nonsensitive agencies of certain of those em- ployees who may be classified in sensitive departments and agencies as security risks." Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 At the time Executive Order 10450 was promulgated, the situation seemed clear enough. Nor was there any significant partisan division within Congress. However, over the ensuing period there were several developments that served to weaken Executive Order 10450 and restrict its application. In 1956, the Supreme Court (Cole v. Young, 351 US 536) found that the term "national security" (not defined in the 1950 Act) meant "only those activities of the government that are directly concerned with the protection of the nation from internal subversion or foreign aggression," and that membership in a communist or other subversive organization did not fall within the dismissal procedures set forth by Executive Order 10450, unless the employee in question occupied a "sensitive" position. The Court accordingly ordered the reinstatement of Cole as a food and drug inspector for the Department of Health, Education and Welfare. In thus interpreting the intent of Congress, the Supreme Court stated that its construction was limited to the Act of 1950 and was not directed at EO 10450. Despite this disclaimer, however, it was inevitable that Cole v. Young would have a chilling effect on the future implementation of EO 10450. The Court's decision brought a storm of protest from Congress. As Thomas Murray, an influential Democrat, later put it, there never had been any indication that "any member of the Committee or the House felt that its provisions were limited to so-called sensitive positions." Francis E. Walter, a senior member of the House Judiciary Committee, said in anger, "It was intended by the Congress to make it possible to get rid of a person, no matter what job he had, if that person was a part of this conspiracy to destroy this government.... We intended that we were going to rid ourselves in the government of this kind of employee. The case of Cole v. Young in my judgment is the most striking example of the invasion by the Court of the legislative prerogative that I have seen in many years." The Court's decision nevertheless had a far-reaching and many-sided impact. In its wake, the federal agencies were compelled to restore 109 dismissed employees to their positions and to award some $579,000 in back pay. Since the time of this decision there have been virtually no dismissals on loyalty grounds with respect to nonsensitive positions- this despite the fact that such positions constitute over 95 percent of the total civilian federal work force. A second important restriction on the original intent of EO 10450 re- sulted from a letter written on November 18, 1965, by John W. Macy, Jr., Chairman of the Civil Service Commission, to the heads of federal departments and agencies. The letter, written at the direction of Presi- dent Lyndon B. Johnson, redefined sensitive positions by dividing them into critical-sensitive and noncritical-sensitive. Under EO 10450, full field investigations had been required for all sensitive positions. Under Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 the Macy directive, pre-appointment full field investigations were re- quired only with respect to persons considered for critical-sensitive po- sitions. (In 1980, the federal civilian service, not including DOD, State, and CIA, had a total of 1,389,000 positions classified nonsensitive; 191,000 classified noncritical-sensitive; and just under 79,000 classified critical-sensitive. ) In the aftermath of the Macy directive, there was a sharp decrease in the number of applicants requiring full field investigations prior to their appointment, for the simple reason that there are far more non- critical-sensitive positions than there are critical-sensitive positions. The division into critical-sensitive and noncritical-sensitive positions has its supporters even among those who favor a strong Federal Employee Se- curity Program and are critical of many of the concessions that have served to weaken the program. Their argument is that each full field in- vestigation conducted by OPM costs $1450 to $1900 (as of July 1982), and that, in the interest of economy, the number of full field investiga- tions must be limited to those positions where the national security could be jeopardized by a disloyal employee. The argument against this is that the loose noncritical-sensitive definition covers a tremendous amount of territory and, in some agencies-including DOD-involves access to Secret (but not Top Secret) documents. It should be noted that, under President Carter's Executive Order of December 1978, the classification and handling of Top Secret docu- ments were made so cumbersome that, in a number of government de- partments, many items which would in previous years have been given a Top Secret designation were classified Secret in the interest of avoiding difficulty. This situation was recently improved as a result of President Reagan's promulgation of EO 12356. Compared with the annual salaries paid to occupants of noncritical- sensitive positions, a $1450 to $1900 expenditure at the outset for the purpose of assuring the government of an applicant's loyalty and integ- rity and general suitability for the specified position would appear to be a modest and prudent investment. And compared with the cost of na- tional defense, the additional cost involved in such a procedure would be trifling. The final point is that, from the standpoint of the ultimate cost to taxpayers, an enhanced personnel security program would probably pay for itself, in terms of insuring that the government obtains the best qualified candidates and in terms of giving the government an additional measure of protection against the infiltration of underworld elements and against the kind of fraud and other criminal diversionary activities that were rampant in the General Services Administration only a few years ago. On the heels of the Macy memorandum, another serious blow was struck at the Federal Employee Security Program by two related deci- Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 sions handed down by the Supreme Court-Elfbrandt v. Russell et al., decided on April 18, 1966, and Keyishian v. Board of Regents of the University of the State of New York, et al., decided on January 23, 1967. Keyishian is the case more frequently quoted, but both decisions-or perhaps we should say, the interpretations placed on both decisions- have had decidedly adverse effects. Elfbrandt had to do with an Arizona state law calling for prosecution on perjury charges of any teacher who took the required oath to support the Federal and State Constitutions, and then "knowingly and willfully" remained or became a member of the Communist Party or any other organization committed to the overthrow of the state or federal govern- ment. By a 5-4 majority the Court found that: Political groups may embrace both legal and illegal aims, and one may join such groups without embracing the latter. Those who join an organization without sharing in its unlawful purposes pose no threat to constitutional government, either as citizens or as pub- lic employees. ... The Arizona Act is not confined to those who join with the "specific intent" to further the illegal aims of the subversive organization; because it is not "narrowly drawn to define and punish specific conduct as consti- tuting a clear and present danger" it unnecessarily infringes on the free- dom of political association. In a. stinging dissent, Justices White, Clark, Harlan, and Stewart wrote: According to unequivocal prior holdings of this Court, a State is entitled to condition public employment upon its employees abstaining from knowing membership in the Communist Party and other organizations advocating the violent overthrow of the government which employs them; the State is constitutionally authorized to inquire into such affiliations and it may discharge those who refuse to affirm or deny them. [Eight Su- preme Court cases are cited in support of this statement.] The Court does not mention or purport to overrule these cases; nor does it expressly hold that a State must retain, even in its most sensitive positions, those who lend such support as knowing membership entails to those organizations, such as the Communist Party, whose purposes include the violent de- struction of democratic government. Under existing constitutional law, then, Arizona is free to require its teachers to refrain from knowing membership in the designated organi- zations and to bar from employment all knowing members as well as those who refuse to establish their qualifications to teach by executing the oath prescribed by the statute. Arizona need not retain those employees on the governor's staff, in the Phoenix police department or in its schools who insist on holding membership in and lending their name and influ- ence to those organizations aiming at violent overthrow. Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 On the legal reach of the Court's finding, the minority statement had this to say: It would seem, therefore, that the Court's judgment is aimed at the crimi- nal provisions of the Arizona law which expose an employee to a perjury prosecution if he swears falsely about membership when he signs the oath or if he later becomes a knowing member while remaining in public em- ployment. But the State is entitled to condition employment on the absence of knowing membership; and if an employee obtains employment by fal- sifying his present qualifications, there is no sound constitutional reason for denying the State the power to treat such false swearing as perjury. In Keyishian, the Court struck down as overbroad a New York State statute disqualifying individuals for faculty positions at the State Uni- versity on the basis of membership in the Communist Party. Once again the vote was 5-4, with White, Clark, Harlan, and Stewart dissenting. In brief, the Court ruled that "mere knowing membership without a spe- cific intent to further the unlawful aims of an organization is not a con- stitutionally adequate basis for exclusion from such positions as those held by appellants" [emphasis added]. The Department of Justice and the Civil Service Commission have taken the stand from the beginning that Keyishian applied with equal force to government positions, and they have conducted themselves accordingly. This has confronted them with a formidable burden of proof. In light of the exact language quoted above, it is at least debatable that the Court intended Keyishian to apply to government, especially to sensitive government positions. And in the light of the Court's decision four years later in the Wadmond case, dis- cussed below, the stand taken by the Civil Service Commission becomes incomprehensible. Erandt v. Russell and Keyishian v. Board of Regents are frequently cited as justifications for the do-nothing policy regarding identified subversives prior to 1976 and for the elimination in 1976-1977 of the "Have you ever been a member..." question. Almost completely over- looked in the literature on this subject, however, is the Supreme Court decision in February 1971 in the case of Law Students Civil Rights Re- search Council, Inc., et al., v. Wadmond et al. Sequentially, this was the last decision-and the most explicit one-on the specific matter of questions addressed to membership in subversive organizations. The appellants had challenged the constitutional validity of certain proce- dures and questions used in screening applicants for admission to the New York Bar. One of the two numbered questions which were directly challenged read: 26. (a) Have you ever organized or helped to organize or become a mem- ber of any organization or group of persons which, during the period of your membership or association, you knew was advocating or teaching that the government of the United States or any state or any political subdivi- Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 sion thereof should be overthrown or overturned by force, violence or any unlawful means?-If your answer is in the affirmative, state the facts below. (b) If your answer to (a) is in the affirmative, did you, during the period of such membership or association, have the specific intent to fur- ther the aims of such organization or group of persons to overthrow or overturn the government of the United States or any state or any political subdivision thereof by force, violence or any unlawful means? The Supreme Court (now the Burger Court), by a vote of 5-4 (with Justices Black, Douglas, Marshall, and Brennan dissenting), upheld the New York Bar on all points. On the question quoted above, the ma- jority decision said: Question 26 is precisely tailored to conform to the relevant decisions of this Court. Our cases establish that inquiry into associations of the kind referred to is permissible under the limitations carefully observed here. We have held that knowing membership in an organization advocating the overthrow of the Government by force or violence, on the part of one sharing the specific intent to further the organization's illegal goals, may be made criminally punishable It is also well settled that Bar examiners may ask about Communist affiliations as a preliminary to further inquiry into the nature of the association and may exclude an applicant for re- fusal to answer lemphasis added]. It must be noted that question number 26 was worded in a manner that carefully conformed to the Court's decisions Elfbrandt and Keyi- shian. In effect, however, this wording leaves it up to the applicant to make a subjective decision on whether or not his membership was knowing membership and whether or not he had the specific intent to further the unlawful aims of the organization to which he belonged. If he decides that he didn't really know, he could answer question 26 in the negative. The question as drafted is much better than asking no questions at all about membership in subversive organizations-and it also makes nonsense of the argument that Supreme Court decisions made it mandatory to eliminate such questions from the standard ap- plication form for federal employment. It seems, however, that, in deal- ing with applications for employment in sensitive government positions, it would make more sense to simply inquire about membership, leaving the government agency to decide, on the basis of further investigations, whether or not the applicant was a knowing member and whether or not he had the required specific intent. The emphasized segment of the Court's decision strongly suggests that this is the sequence the Court had in mind. The applicant could be informed in a footnote to the question that mere membership is not a bar to federal employment, that the quality of the membership would have to be taken into consideration, including whether or not it was knowing membership and whether or not he had the specific intent to further the illegal aims of the organiza- Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 tion. This should be sufficient to make the question conform to any re- quirements of previous Court decisions. (A draft of a proposed question, relating to membership in subversive organizations, is included in the recommendations at the end of "The Essential Requirements: II".) Justice Department and OPM officials with whom the author dis- cussed the matter could not recall a single case since Keyishian where the government has attempted to deny employment on the basis of membership in subversive organizations-even when the government was in possession of hard evidence of such membership. Instead, in a number of the most serious cases, it has had to resort to the subterfuge of finding some other valid suitability grounds to justify the denial of employment. In cases where the position involved was not critical-sensi- tive and the personal record of the applicant did not appear too out- rageous, the tendency has been to pursue the path of least resistance. Another historic decision was handed down in 1967 in United States v. Robel, which held that even employment in industrial defense facili- ties could not be denied to the applicant because of membership in the Communist Party, in accordance with the provisions of the Subversive Activities Control Act of 1967. The Warren Supreme Court was responsible for most of the decisions that have created difficulties for the Federal Employee Security Pro- gram. A number of the key decisions were the product of 5 to 4 votes. It is altogether probable that, if the same cases had come before the Burger Supreme Court, the vote would have gone the other way. During its his- tory, the Supreme Court has on more than one occasion reversed deci- sions taken by antecedent Courts when experience has demonstrated the inherent untenability of such decisions. Conceivably the Burger Court would look with favor on legislation which in effect reverses some of the previous decisions. While the previous two decades, thanks to court decisions and ad- ministrative restrictions, had witnessed a significant weakening of the Federal Employee Security Program, over the past seven years a rapid succession of retreats has resulted in its near-total demolition. Many of the retreats during this period were not mandated by the courts but were the product, rather, of exaggerated administrative reactions or of excessive interpretations of the requirements of the law by the Civil Service Commission. In September 1975, the Commission closed down the extensive per- sonal reference card system-the so-called Security Index-maintained by its Security Research and Analysis Section, against which all appli- cants were supposed to be checked under EO 10450. The reason given for the action was that it was probably in violation of the Privacy Act. In October 1976, the CSC eliminated loyalty questions from applica- tion forms for employment in the federal civil service. This time the reason given was that "recent court decisions have prohibited routine Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 inquiry into an individual's membership in certain organizations." This directive, however, had a caveat which permitted the asking of such questions where sensitive positions were involved. In a follow-up direc- tive issued one year later, this caveat was cancelled in the case of sensitive positions because "the commissioners accepted the legal opinion of the Commission's General Counsel that Question 21 has a chilling effect on First Amendment rights and Question 22 is unconstitutionally vague."* The question must be raised whether all the retreats ordered by the Civil Service Commission were really made mandatory by Supreme Court decisions and by the Privacy Act. For example, the November 12, 1973, memorandum which finally led to the elimination of questions dealing, with organizational affiliations said that "recent decisions of the Supreme Court make it clear that mere membership in an organiza- tion that espouses the unlawful overthrow of the government may not be inquired into, and that the only fact of relevance is membership with knowledge of the unlawful purpose of the organization and with specific intent to carry out that purpose." But at the point where the Commis- sion moved to eliminate all questions relating to membership in the Communist Party or other subversive organizations and issued rulings that even third parties could not be asked such questions about appli- cants for employment and that such information could not be incorpo- rated in the investigative record if offered on a voluntary basis, the Commission was imposing an interpretation that went far beyond the requirements of the Supreme Court decisions. Before a determination can be made that an applicant has been a knowing member of the Communist conspiracy, sharing a specific intent to carry out its pur- poses, it is clear that the fact of membership must first be established. The 1976-1977 CSC rules governing applications for federal employ- ment made it impossible to arrive at such a preliminary determination. (As has been pointed out previously, OPM rules today do encourage in- vestigators to inquire about membership in questionable organizations, but such questioning has limited impact because of the mayhem wrought on domestic intelligence and the absence of approved guidelines for government departments and agencies.) It is to be noted that the Defense Department placed no comparable construction on the Supreme Court's decisions. Similarly, without waiting to see whether the extensive personal ref- erence card system maintained by its Security Research and Analysis Section could withstand legal scrutiny in the light of Privacy Act and Supreme Court decisions, the Civil Service Commission in 1975 moved *A detailed account of these developments is to be found in a report entitled "The Ero- sion of Law Enforcement Intelligence and Its Impact on the Public Security" put out by the Senate Subcommittee on Criminal Laws and Procedures in December 1978. The author of this paper was also the author of the report. Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 to inactivate and seal these records, basing this action on the advice of Counsel that it was required by the Privacy Act. In so doing, the Com- mission greatly weakened its ability to alert dependent federal agencies to the existence of adverse information on applicants for employment, pointing to the need for full field investigations. This reduction in its in- house capabilities was all the more damaging because of the increasing difficulty of obtaining information from local law enforcement agencies and institutions and because of the drastically diminished capabilities of the FBI in the field of internal security. Since then, all the reference cards and files of source documents have been boxed and placed in storage, and the entire Security Research and Analysis Section (SRAS), whose task it had been to compile and maintain these files, has been dis- banded. With this matter we shall deal in more detail in a later section. The Destruction of the Domestic Intelligence Data Base From the standpoint of screening out elements whose employment might pose a danger to the national interest or national security, it is imperative that those responsible for administering the Federal Em- ployee Security Program have at their disposal a domestic intelligence data base, which would enable them to identify at least a substantial proportion of those applicants who are, or have been, associated with a broad variety of extremist and subversive or front organizations. These would include: ? organizations committed to the violent overthrow of the government ? organizations committed to the use of violence for political pur- poses ? organizations which conspire to deny civil rights to any group of American citizens ? organizations which operate under the control of or in collusion with hostile foreign powers ? organizations which serve as fronts or support organizations for any of the above categories ? organizations which have engaged in conspiratorial activities di- rected against the security of the United States government or the integrity of its operations. In the 1950s and 1960s such a domestic intelligence data base did ex- ist. It had three principal components. The first component was the very large body of domestic intelligence on file with the FBI. The sec- ond consisted of the organization files and reference library and per- sonal reference cards maintained by the Security Research and Analysis Section of the Civil Service Commission. The third component was the mass of detailed information on file with state and local law enforcement agencies, many of which had vigorous domestic intelligence programs. Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 There were also two ancillary components of the domestic intelligence data base that should be mentioned. First, there were the files of the House Internal Security Committee (formerly the House Un-American Activities Committee). The files of the House Committee were regularly consulted by investigators for the Civil Service Commission in accordance with the requirements of EO 10450. Second, there were the domestic intelligence files on violence- prone and revolutionary groups in the custody of the U.S. Army. These files had their beginnings in the 1950s, when President Eisenhower used the Army repeatedly to enforce school desegregation in the southern states and the Army found it necessary to equip itself with intelligence about the KKK and other violent segregationist organizations and ele- ments in order to discharge its duties. In the late sixties, the focus changed. Then it was a matter of dealing with mass rioting in the cities, organized subversion in the armed forces, and sabotage of the war ma- chine and other illegal acts to impede the military by extremist groups in the anti-war movement. The Army's files were shared with other de- fense agencies which confronted similar problems, although they were not involved in the containment of the many devastating big-city riots. Today all the components of the domestic intelligence data base have either ceased to exist or have for all practical purposes been lost as in- vestigative resources available for the support of the Federal Employee Security Program. The Department of Defense, bowing to strong congressional consen- sus against military involvement in domestic intelligence, instructed the services in March 1971 to terminate all domestic intelligence activities targeted against non-DOD personnel, and ordered their existing files destroyed.* The House Internal Security Committee was terminated in 1975.** The files of the Committee are in storage, where their useful- ness is nil. The Security Research and Analysis Section of OPM has been *In 1972, one year after the Defense Department discontinued all domestic intelligence activities and ordered its files destroyed, the Supreme Court, in Laird v. Tatum. dismissed a complaint that DOD's activities were unconstitutional. In effect, the Court decided that, because the plaintiffs had not suffered objective harm, the Court could not reach the merits of the plaintiff's suit. The Court of Appeals decision, which the Supreme Court was reviewing, had, however, dealt with the question of constitutionality in these terms: To quell disturbances and to prevent further disturbances the Army needs the same tools and, most importantly, the same information to which local police forces have access.... No logical argument can be made for compelling the mili- tary to use blind force. When force is employed, it should be intelligently directed, and this depends on having reliable information... in time.... The information gathered is nothing more than a good newspaper reporter would be able to gather by attendance at public meetings and the clipping of articles from publications available on any newstand. **The House had previously defeated by a wide majority a move by the Committee on Committees to eliminate the Committee on Internal Security. But then the Democratic Caucus circumvented the House vote by failing to include the Internal Security Commit- Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 completely closed down. The FBI and local and state law enforcement agencies have seen their capabilities in the field of domestic intelligence reduced almost to the vanishing point. How did all this come about? In the case of OPM, the erosion of its ability to contribute signifi- cantly to the personnel security process stems from the implications of the Privacy Act of 1974, the erosion of the domestic intelligence data base, and a series of self-imposed restrictions, to which we have already referred, and which we shall discuss in more detail later. In the case of the FBI, the enactment of a far more stringent Free- dom of Information Act of 1974 and the 1975-76 investigation by the Church committee on the Senate side and the Pike committee on the House side both resulted in serious curtailment of the Bureau's internal security activities. But the final blow was the Domestic Security Guide- lines issued in March 1976 by the then Attorney General, Edward Levi. Under these guidelines for the conduct of domestic intelligence opera- tions, a full investigation could not be launched unless it was preceded by a "preliminary investigation" and then a "limited investigation." A "preliminary investigation" in the field of internal security could be undertaken on the basis of allegation or information that an organiza- tion or an individual was engaged in, or was about to engage in, crimes of violence. These investigations, under the guidelines, were to involve the use of only the least intrusive techniques. If the preliminary investi- gation suggested the need for further information, FBI headquarters or the Special Agent in Charge was given the power to authorize, in writ- ing, a "limited investigation." "Full investigations" could be authorized only by FBI headquarters on the basis of "specific and articulable facts," giving reason to believe that the individual or group was engaged or might be engaged in violations of the federal law involving the use of force or violence. The guidelines limited a preliminary investigation to several months and a full investigation to one year-a time limit that could be extended only on the written authorization of the Department of Justice. There are some extremist organizations engaged in acts of violence or terrorism which meet the requirements for a full investigation under the Levi guidelines. Examples of such organizations would be the KKK, the Weather Underground, and the FALN, the major Puerto Rican ter- rorist organization. But there are far more organizations in the extrem- ist spectrum that do not meet these criteria. Among these are groups like the Socialist Workers Party (a Trotskyite organization), the Revo- lutionary Communist Party, the Progressive Labor Party, and a variety tee in its report establishing the House committee structure for the session. This was not subject to amendment on the floor. Despite widespread indignation, the House voted to approve the report on committees because it had no practical alternative. Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 of other self-designated Marxist-Leninist groups, all committed to the forceful overthrow of the U.S. government and to working for its defeat in the event of war. None of these groups was found to meet the Levi criteria because the ultimate crime to which they are committed may still be many years away; for the moment, they are simply engaged in organizing and propagandizing in support of this ultimate crime, fo- menting subversion in the armed forces, and creating as much conflict and chaos as they can in the industrial sector-all activities that can in- voke the protection of the First Amendment. Also excluded by the Levi guidelines would be organizations such as the U.S. Peace Council, the American affiliate of the World Peace Council-without question the most notorious and most effective of Mos- cow's international front organizations; the National Lawyers Guild, which both House and Senate committees have described as a legal front for the Communist Party, but which has over the past two decades developed into a legal action group representing an array of radical left organizations and terrorists; and the North American Congress on Latin America (NACLA), whose echoing of the Castro propaganda line throughout the Americas, supported by frequent direct contact with the Castro government and pro-Castro groups in other countries, raises serious questions of a domestic security nature. Ideally, the United States government should have at its disposal information about all such organizations so that it would be in a stronger position to resist their efforts to infiltrate government agencies. But with no intelligence available and no criteria to guide administrators, the government obvi- ously can offer no effective resistance. It is not a matter here of arguing that membership in front organiza- tions should be treated in precisely the same way as membership in the Communist Party or other subversive organizations. There are numer- ous dupes and innocents who are in no way committed to the violent overthrow of the U.S. government and whom many would consider public-spirited citizens, who have permitted themselves to be drawn into various front activities. Membership for a period of time in a single front organization is not today, and should not be, a bar to federal em- ployment. But as Professor Sidney Hook once observed, while one may excuse membership in one or two front organizations on grounds of in- nocence, by the time an individual has served in twenty such organiza- tions over an extended period of time, a pattern is established which exceeds the plausible boundaries of innocence. Membership in a front organization is a legitimate personnel security consideration because it raises the question of whether it is part of a larger pattern. The Levi guidelines predictably had an immediate and devastating effect on what remained of the FBI's domestic security program. In 1974, the FBI opened or reopened over 55,000 cases on "subversives and extremists," according to a GAO report. Two years later, the GAO Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 reported that "as of early October 1977, 17 organizations and approxi- mately 130 individuals were under domestic intelligence investigation." The situation since that time has continued to go downhill. How bad the situation had become by mid-1978 was frankly admitted by Sebastian S. Mignosa, Chief of the Domestic Security Section of the FBI, in an appearance before the House Permanent Select Committee on Intelligence on July 31, 1978. When Mr. Mignosa was asked whether his section handled subversive organizations coming under the Loyalty and Security Program called for by Executive Order 10450, his reply was, "We don't have any of those." When he was next asked who in the FBI dealt with such organizations, he replied, "There isn't any at the moment .... There isn't any of those type cases at the moment." Actually the FBI still does maintain surveillance of a handful of orga- nizations committed to terrorism and violence or involved in foreign es- pionage. But according to highly knowledgeable sources, its current domestic intelligence operation represents a cutback of perhaps 95 to 98 percent from the levels of the 50s and 60s. This may well be an un- derstatement. In testimony before the Senate Subcommittee on Secu- rity and Terrorism on August 11, 1982, FBI Director Webster informed Senator Denton that the FBI had active domestic intelligence investiga- tions going on four organizations and ten individuals. In 1965 the CSC referred the cases of 2,223 applicants to the FBI for full field investigations because preliminary evidence based on NACs had turned up information bearing on the national security. By 1977 the number was down to 81. The author was told that the last NAC report converted to a full FBI field investigation was in 1978. The report on the attempted assassination of President Reagan issued by the Treasury Department in August 1981 states: Interviews for this report with FBI and Secret Service personnel indicated that the total number of preliminary, intermediate, and full domestic se- curity investigations involving both individuals and groups which were open at the time of our inquiry was far less than at any time covered by the GAO report (emphasis in original text). The Treasury Department's report discussed the Attorney General's guidelines at considerable length because of the impact these guidelines have had on the capabilities of the Secret Service. It said that "the Secret Service's protective capabilities have been impaired by the decline in the quantity and quality of intelligence collected by the FBI, which is the primary source of.the Service's domestic intelligence," and it sug- gested that the Attorney General's domestic security guidelines for the FBI be modified in a manner which permits the FBI "to pursue domes- tic security investigations where no criminal predicate is available." The same arguments would be applicable to the reintegration of the FBI into the Federal Employee Security Program. Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 At the state and local levels, the 1970s also witnessed a massive de- struction of intelligence files dealing with extremist organizations of both the far left and the far right. The State of Texas Public Safety Division destroyed its domestic intelligence files in 1974. The files of the New York State Police have been under lock since 1975; Washing- ton, D.C., Baltimore, Pittsburgh, and other cities destroyed their files; the files of the Chicago Police Department have been locked up since March 1975; while in New York City, Los Angeles, and other major cities there has been a wholesale destruction of files, in most cases ex- ceeding 90 percent of the previous total. Many law enforcement agencies at state and local levels have com- pletely abandoned the domestic intelligence function and terminated their domestic intelligence units. By itself, the abandonment of the domestic intelligence function and the massive destruction of domestic intelligence files would be cata- strophic enough. But, as we shall discuss later, the situation has been further aggravated by the fact that, as a result of the fears generated by privacy legislation at the federal and state levels, law enforcement agen- cies-which in the past always freely shared intelligence-no longer share the little intelligence they still have on hand. The Devaluation of the NACI and the Background Investigation It is not surprising that today's NACIs and Background Investigations produce far less substantive reports than those of ten or fifteen years ago. In the old days, the Civil Service Commission could count on the complete cooperation of federal, state, and local agencies, and a very high degree of cooperation from private citizens, institutions, and cor- porations. There were also, as we have pointed out, extensive domestic intelligence files maintained by state and local law enforcement agen- cies, as well as the files of the FBI and of the Security Research and Analysis Section. But the priceless reservoir of domestic security intelli- gence at state and local levels has for the most part been destroyed or locked up; the FBI has for all practical purposes been out of the domes- tic intelligence business since 1976; and SRAS no longer exists. Private citizens, all the way up to the level of federal judges, frequently refuse to cooperate if they have adverse information because, under the Pri- vacy Act and Jane Doe v. U.S. Civil Service Commission, the OPM can no longer guarantee confidentiality, if the information furnished in confidence is used as the basis for an adverse employment decision. One respected federal judge told the author that he does not know a single colleague on the federal bench who would provide derogatory in- formation, if he possessed it, about an applicant for federal employ- ment. The result of all this has been a dramatic decline in the value of Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 the NACI and the Background Investigation, especially as they relate to organizational affiliations that pose a danger to the national security. In testimony before the Senate Subcommittee on Criminal Laws and Procedures in 1978, Stuart Knight, Director of the Secret Service, esti- mated that the Service was receiving at the most 50 percent of the amount of intelligence it used to receive to assist it in the protection of the president and the government, and that if one took into considera- tion the reduced quality and detail of the intelligence that was still available, the total loss of information was probably in the neighbor- hood of 75 percent. Substantially the same testimony was given by the Secret Service on July 31, 1981, before the Senate Subcommittee on the Constitution. It is common knowledge that the Secret Service, precisely because its mission is to protect the president, receives an exceptionally high degree of cooperation from local, state, and federal agencies. If the intelligence available to the Secret Service today stands at approxi- mately 25 percent of what it used to be, it would not be an unreasonable assumption that the information bearing on the national security brought together by the standard NACI procedure probably rates sub- stantially less than 25 percent of that of a decade ago or two decades ago. The NACI still remains the minimal investigation for employees in non-sensitive and noncritical-sensitive positions. It cannot be aban- doned because then we would have nothing. Clearly it must be retained, despite its very much reduced value in recent years. Instead of retaining the NACI, however, it is now being proposed that for Level I employ- ees, in a five-level system being considered as a replacement for the present three-level system (Level I embraces the majority of the federal employees surveyed in an interagency task force study), the NACI be reduced to an NAC. This means that no form letters will'be sent out to check on the identity of the applicant, on whether he has a local criminal record, etc. According to OPM, this position constituted a concession to the insistence of DOD in the interagency task force which produced the proposal for the five-level system. Having helped to produce the re- port, however, DOD, because of residual differences, refused to sign it. The standard Background Investigation has not fared much better than the NACI. The basic reasons for the reduced quality of the BI have already been discussed. On top of this, the BI has suffered from successive reductions in scope. Before 1961, the BIs of applicants and appointees went back to 1937 or the subject's eighteenth birthday. In 1960, recognizing that a fixed 1937 starting point was illogical, the CSC reduced the period covered by the BI to fifteen years, or the period since the eighteenth birthday. Within this new scope, a serious effort was made to conduct third-party interviews covering that span of time. In 1968 the CSC, after consulting the agencies, again reduced the scope of the standard BI-this time to five years' intensive coverage. The Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 DOD followed suit a few years later in its BIs on military personnel. The intelligence and law enforcement agencies still generally adhere to the fifteen-year scope, but in OPM, DOD, and other agencies, the trend is still downward. While the OPM still retains the five-year scope, veteran investigators say that today's investigative reports are quantitatively and qualitatively inferior to those of ten or fifteen years ago and this by a factor of some 25 to 30 percent. This is something that should be easily verifiable. As matters stand today, the average BI conducted by OPM involves some 31 contacts of all kinds, of which sixteen are personal interviews. The average investigation of civilian employees previously conducted by DOD involved a total of fourteen contacts, according to the same re- port. (There was no figure given for the number of personal interviews, but it was substantially less than fourteen per case, and it is conceded that many of these interviews were conducted over the phone. This was prior to July 1981. Since that time, DOD has suspended third party in- terviews entirely and has switched to subject interviews for military per- sonnel.) Measures under discussion today raise the serious possibility that the program may be further downgraded. Under the five-level sys- tem which is now under serious consideration by OPM and other agen- cies, Level I employees, as indicated above, would be subjected to an NAC only; Level II employees (in whose case the risk is defined as "op- portunity for significant but reversible damage to the national security") would be subjected only to an NACI; while Level III employees (in whose case the risk is defined as "opportunity for effecting serious but generally reversible damage to the national interest") would be sub- jected to a Limited Background Investigation (LBI), involving an NAC plus one year of personal coverage plus four years of written inquiries. The coverage specifications call for "in-person interviews with a mini- mum of three knowledgeable people." In the case of the standard BI, there are in-person interviews with anywhere from twelve to 30 or more witnesses. The standard BI is proposed for retention at the more sensi- tive Level IV. A fifteen-year Special Background Investigation is pro- posed for the most sensitive positions at Level V. Thus, in effect, the quality of the Federal Employee Security Pro- gram has been squeezed from two sides. On the one hand, it has become progressively more difficult to obtain information; and on the other hand, there has simultaneously been a progressive reduction in the amount of time and energy invested in personnel investigations. The FBI's reduced domestic intelligence activities, which have made it impossible for the Bureau to put its impressive capabilities at the dis- posal of the Federal Employee Security Program, constitutes yet another factor in the weakening of the BI. In the old days, if a preliminary in- vestigation turned up evidence pointing to the possibility of subversive involvement, the case would automatically be referred to the FBI, and Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 the FBI would then conduct a full field investigation of its own and report back to the Civil Service Commission or the other government agency involved. Over the past few years, however, when OPM has sent the FBI cases requiring further investigation because of evidence or allegations of subversive involvement, the FBI almost invariably has re- turned the case to OPM with the suggestion that OPM itself conduct the investigation. Obviously, if the FBI has relevant information, it does forward it to the requesting agencies. This is not a simple matter of the FBI's withdrawing from its respon- sibilities. In defense of the FBI, it must be noted that under the restric- tions imposed by existing laws and existing guidelines it has become virtually impossible to conduct an effective domestic intelligence opera- tion. To compound the damage, law enforcement agencies are at risk of having to pay a heavy price for intelligence operations they conducted in the past. The Socialist Workers Party, for example, has been suing the FBI for $40 million on the allegation that it was subjected to illegal surveillance. In another suit recently settled in Chicago, after seven years' litigation, the presiding judge noted that the FBI had furnished documents "at a rate substantially in excess of 1,000 pages per week... from mid-1977 through late 1980," and that these documents, totalling "several hundred thousand pages... reflect an extensive cross section of FBI domestic intelligence activities in the Chicago area during the period 1940 through 1980." As a result of a FOIA request, each of these several hundred thousand pages had to be gone through on a line-by- line, word-by-word basis before they were released-a chore that must have accounted for tens of thousands of man-hours. In summing up this section, it should be repeated that, despite the serious devaluation of the NACI and the BI, the background checks be- ing conducted today do have an important, if limited, utility, because they still do turn up criminal history information and other information having a general bearing on the question of suitability. But for the rea- sons already set forth, they turn up very little information directly re- lated to national security requirements. Closing Down the Civil Service Commission's SRAS A more detailed history of the Security Research and Analysis Section of the CSC/OPM would be in order at this point because there is much evidence that the old Civil Service Commission was not simply restricting the Section's functions in response to mandatory rulings by the Su- preme Court but was, instead, eager to seize at every legal and bureau- cratic pretext for diminishing the function of the SRAS because there were those in the CSC who were philosophically opposed-some on bu- reaucratic, some on civil libertarian, some on quasi-legal grounds-to the requirements of an effective personnel security program. Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 The SRAS had the specific assignment of helping the CSC, through a careful search of its records, to meet the requirements for National Agency Checks under Executive Order 10450. From the early 1950s, when President Eisenhower promulgated EO 10450, until the early 1970s, the Security Research and Analysis Section (previously known as the Security Research Section) was a very active operation with an expe- rienced and dedicated staff of over 40 people; by 1975, it was down to 20. By the end of 1979, the staff had been reduced to the point where it consisted of the section chief and two assistants, one a Grade 4 and the other a Grade 5. The chief of the Section, W. ("Rush") Yarosh, was a man with im- pressive qualifications who had served with military intelligence in the U.S.A., Germany, Japan, and other countries from 1945 to 1961; had retired with the rank of Lieutenant Colonel; had then served for a pe- riod of ten years as a Special Assistant for Security to the Director of the Intergovernmental Committee on European Migration in Geneva, Switzerland, screening refugees and Displaced Persons admitted to the United States (this position gave him access to, and liaison with, the in- telligence communities of ICEM's 28 member nations); and had then moved in 1970 into the position of chief of the Security Research and Analysis Section. It is indicative of the attitude of the bureaucracy to the SRAS that, although Yarosh made repeated efforts on their behalf, there was no promotion in grade for any of the SRAS employees during the last five years of the Section's existence. Over a period of years, the SRAS was able to build up some for- midable resources that greatly facilitated the task of preliminary in- vestigation and saved the country many millions of dollars, at the same time as it enhanced the quality of our personnel security program. First, there were several million personal and organizational refer- ence cards, based overwhelmingly on public record sources. Since each news item was indexed on a separate card, individuals with extensive and consistent records of extremist activities were sometimes the sub- jects of numerous cards pointing to the original source items that car- ried their names. Second, there were organizational files containing research materials culled from the national and local media, and from the publications of the various left-revolutionary and front organizations and of right-wing extremist groups. Third, there was a massive library of newspapers and publications put out by the Communist Party USA and other Marxist-Leninist orga- nizations committed to the revolutionary overthrow of the United States government. This library, for example, contained bound vol- umes of the Daily Worker (organ of the Communist Party), going back to the 1920s. The bound publications occupied some 50 feet of wall space, floor to ceiling, in the office of the Security Research and Analy- Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 sis Section. These publications were supplemented by a large library of reference books and by complete sets of the many hundreds of volumes of hearings and reports published by the Senate Subcommittee on In- ternal Security and by the House Internal Security Committee (previ- ously the House Committee on Un-American Activities) from the time of its inception to the time of its termination in 1975. Finally, there was an extensive library of urban telephone directories and city directories, going back many years. This was an invaluable re- source, which enabled the SRAS and CSC to verify identity and do quick checks of the various addresses listed by the applicant, and to pinpoint neighbors in each community at the time he claimed to have lived there. These were basic tools with which the Security Research and Analysis Section worked. None of these now exist. The argument used by the CSC General Counsel in recommending the sealing of the SRAS reference card system was that such record keeping was, in effect, prohibited by Section (E)(7) of the Privacy Act, which reads: Agencies shall maintain no record describing how any individual exercises rights guaranteed by the First Amendment unless expressly authorized by statute or unless pertinent to or when in the scope of an authorized law enforcement activity. Instead of sealing the personal reference cards, CSC could have re- acted at the time by exploring three different possibilities. First, they could have argued that their uncollated personal reference card system did not constitute a system of records or files on individuals. Alterna- tively, they could have held that their responsibilities for the Federal Employee Security Program made them an authorized law enforcement activity of the U.S. government and that the reference cards were essen- tial to the discharge of these responsibilities. As still another alterna- tive, they could have sought authorizing legislation on an urgent basis. Instead, they capitulated without a struggle. Needless to say, this capit- ulation greatly impaired the ability of the SRAS to gain access to the vital information contained in the files. How did the sealing of the SRAS Security Index come about? On June 3, 1975, Robert J. Drummond, Jr., Director of the Bureau of Personnel Investigations, wrote a lengthy memorandum to Robert E. Hampton, Chairman of the CSC, in which he recommended that the Commission discontinue the use of the personal reference cards imme- diately. The key paragraphs of this memorandum indicate the defeatism and lack of understanding that have characterized a substantial num- ber of the CSC's high command in years past. These paragraphs are quoted below, together with a running commentary. Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 In FY 1974, approximately 450,000 cases were searched through the files of the Security Research and Analysis Section (SRAS). This number represents all of the cases on which the Civil Service Commission con- ducts a National Agency Check plus about 32,000 cases on which searches are conducted, but a National Agency Check has not been scheduled, etc., special searches for experts, consultants, instructors and other types of persons who are exempted from the investigatory requirements of Ex- ecutive Order 10450. For the same period the SRAS produced informa- tion regarding possible identity on 6,255 cases (1.39 percent), and after research reported records out on 2,919 cases (0.65 percent). [COMMENT: The fact that SRAS produced information bearing upon possible subversive associations in 2,919 cases out of 450,000 cases searched through its files is clearly intended to belittle its per- formance-especially when the number of cases is restated as 0.65 percent. In reality, this is a rather impressive accomplishment. The overwhelming majority of those who apply for government employment are loyal citizens. The entire purpose of a personnel security program in government is to try to weed out the one in 100 or one in 200 whose as- sociations do raise serious questions about suitability for government employment on security grounds. If SRAS had reported records out on five percent, or even three percent, of the cases referred to it, this would have been excessive enough to raise serious questions about the discre- tion exercised by the Section. If, in practice, SRAS found evidence pointing to a need for further FBI investigation in 0.65 percent of the cases, it suggests that it performed in a careful and responsible manner.] It is true that a substantial portion of the information in the files is in the form of published hearings or has been published in newspapers, maga- zines, and other periodicals. The thrust of the question is that since the information is already in the public domain, where is the invasion of pri- vacy. In my view, the infringement on individual rights and privacy comes about once we take this information that is in the public domain and index it by name. Then we are maintaining files on how individuals exercise their First Amendment rights. In the public notice required by the Privacy Act we are identifying the Se- curity Research and Analysis Index as records on "individuals who may be listed in an investigative leads file composed of information obtained from investigative reports, the public records, and various publications." I am sure this will pique the interest of sufficient numbers of citizens to cause us considerable workload responding to their requests as to records that we have on them. In many cases we will be unable to respond prop- erly without further investigation to determine whether the requestor is the same "John Doe" mentioned in the Index. [COMMENT: The personal reference cards in the Security Research and Analysis Index were not really files on individuals but simply in- vestigative leads to the source documents containing the items refer- Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 enced. A file, as, such, did not come into existence until an individual applied for federal employment. At this point it became mandatory to open an investigative file on the applicant, and the published items referenced in the index became part of this file. In the case of the great majority of applicants, there were no references. In the case of those whose public record activities raised questions related to the national security, a search of the files could, and quite often did, result in the compilation of a number of public record items which pointed to the need for further FBI investigation. Certainly there is validity to the ar- gument that the SRAS procedure was not the equivalent of "maintain- ing files on how individuals exercise their First Amendment rights." And certainly the investigative process makes it mandatory that govern- ment agencies be placed in a position to assemble the bits and pieces of an applicant's personal record at the point where he applies for federal employment.] As indicated in my memorandum of February 18, even if we were to con- clude that the keeping of such a file is an essential part of our investiga- tive responsibilities, and thus, pertinent to and within the scope of an authorized law enforcement activity, I think that continued maintenance and use of the file will eventually bring embarrassment to the Commis- sion. (I am not sure we could successfully argue that the Commission is engaged in an "authorized law enforcement activity" by virtue of our re- sponsibilities for administering the merit system through various statutes and executive orders.) Privacy aside, it is one thing for the Commission to maintain records on individuals who are applicants or employees. However, in the case of the Security Research and Analysis Index, we maintain records on individu- als who are neither applicants nor employees of the federal government and may never be applicants or employees. [COMMENT: The answer to the statement that it would be difficult for the Commission to argue that it was an "authorized law enforce- ment activity" is the fact that the CSC/OPM does today refer to itself as such an activity. The objection to maintaining records "on individu- als who are neither applicants nor employees of the federal government and may never be applicants or employees" is characteristic of the ultra-civil libertarian approach which characterized many of the Com- mission's findings during this period. If there does not exist in some form records against which applicants for federal employment can be checked, then clearly it would be impossible to create such records at the point of application. In effect, this is an argument for no federal security employee program at all in deference to the supreme right of privacy.] The sealing of the personal reference cards, however, did not affect the SRAS organizational files, which were probably the most complete Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 records of their kind maintained by any government office. In the course of personnel investigations it frequently happens that the name of some relatively unknown organization will crop up and the question that has to be confronted by reviewers and adjudicators is how much impor- tance they should attach to association with such an organization. The files of SRAS contained vital information bearing on such questions- and since the FBI had virtually taken itself out of the internal security field in 1976, SRAS was the only office in the U.S. government where such current information was available. By the end of 1978, however, even this important residual function had, for all practical purposes, come to an end because neither the Civil Service Commission nor the agencies for whom they handled personnel investigations appeared to be interested in domestic intelligence bearing on subversive and vio- lence-prone organizations. The SRAS organizational files were still there-but they were not being used. With the reference cards locked up, the staff reduced to a meaning- less level, and organizational files largely unused, Peter Garcia, the new Assistant Director of OPM for Personnel Investigations, found it difficult to justify the operation. In January of 1980, Yarosh was given five days to clean out his office and he was then assigned to another posi- tion. The 130 file cabinets containing research materials were jammed into 50 file cabinets for moving, and the entire office was reduced to two desks manned by the Grade 4 and Grade 5 assistants (who were, inci- dentally, much more qualified than their grades suggest). On July 9, 1980, the OPM wrote to Karen Boyd, President of Local 32 of the American Federation of Government Employees, informing her that the Division of Personnel Investigations "is preparing to inacti- vate the Security Research and Analysis Section ... on or about July 21, 1980," that all SRAS records would be sent to storage as soon as possi- ble, and that the two remaining employees in the Section would be reas- signed to other duties. And so the research files, the extensive reference library, the organizational index, and the telephone directories and city directories were boxed and sent elsewhere. The CSC/OPM, through this series of actions, has deprived itself of virtually every in-house investigative tool that previously used to serve the old Civil Service Commission. Certainly, this series of acts, which added up to a decision not to maintain research files of any kind-even files based on public record material-flies in the face of common sense. When appropriate agen- cies of the United States government deny themselves the right to com- pile, from media sources, information essential to identify personalities or organizations whose commitments and activities pose a potential threat to the national security or to the national interest, they are, in ef- fect, denying the government the basic right to take reasonable action to preserve itself. Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 In its early days, the Federal Employee Security Program attracted many knowledgeable and dedicated people who, through years of per- sonal exposure to the problem, were able to bring expertise to the ad- ministration of the program. But the progressive degradation of the program over the past decade has resulted in the early retirement of the great majority of the experienced personnel security hands. Their places have been taken, for the most part, by young, inexperienced people who are now trying to perform a job they do not understand- with no internal security background, little or no training, no in-house data base to assist them, no guidelines, and no encouragement. It is not their fault that the Federal Employee Security Program, in most depart- ments and agencies, has now become a costly and almost meaningless charade that is doing grave damage to our national security. They, too, are victims of the system. The Freeze on the Exchange of Domestic Intelligence These self-inflicted injuries to the Federal Employee Security Pro- gram have been compounded by the progressive chill on the exchange of data between state and local agencies and the federal government. In the past, these agencies always freely shared such intelligence. Com- menting on the situation that has arisen in consequence of privacy leg- islation at the federal and state levels, Captain Justin Dintino, Chief of Intelligence for the New Jersey Police, told the Senate Subcommittee on Criminal Laws and Procedures in 1978: The free flow of intelligence between Federal, State, and local agencies is essential to an effective law enforcement operation. To the extent that this flow is restricted, law enforcement is handicapped. And today this flow is terribly restricted, at every level and in every direction: From city- to-city, from State-to-State, from State agencies to Federal agencies, and from Federal agencies to the State and local level. This is a disastrous sit- uation and we've got to find some way of reversing it. Commenting on the same situation, a previous GAO report dated December 16, 1977, said: Due to legal constraints and nonresponses to inquiries, CSC cannot check some local enforcement records, even though the check is required by Executive Order 10450. By September 1976, the Chicago area [of CSC] had stopped sending [requests for information] to law enforcement agencies in New York, California, Minnesota, New Mexico, Massachu- setts, and Illinois, and 86 cities in other States, because the agencies refused to release criminal information to CSC. Some of the larger cities are Detroit, Indianapolis, and Washington, D.C. Thus, an investigation cannot surface criminal information on individuals who reside in these areas, unless the information is also on file with the FBI. Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 When Alan K. Campbell, Chairman of the U.S. Civil Service Com- mission, appeared before the Senate Subcommittee on Criminal Laws and Procedures in March 1978, he confirmed that this was an accurate description of the situation that existed in 1976 and he said that there had been no improvement since that time. In August 1980, in an effort to induce a more cooperative attitude on the part of state and local law enforcement authorities, OPM mailed out a pocketsized brochure captioned "The U.S. Office of Personnel Management: An Authorized User of State and Local Criminal History Information." The booklet described the OPM program, made the ar- gument that its need for criminal history information is critical to the national security and interest, and pointed out that its requirement for such information is based on statute and is consistent with the regula- tory requirements of the Law Enforcement Assistance Administration. OPM believes that it is now getting improved cooperation from many law enforcement agencies as a result of its continuing exercise in educa- tion and public relations. But the situation nationwide is still very bad, with some of the major industrial areas, including New York City, Penn- sylvania, New Jersey, and Massachusetts, not cooperating at all or co- operating in a very niggardly manner. As recently as January 1981, an internal information bulletin of the OPM Personnel Investigations Di- vision indicated that OPM continues to operate under the same handi- caps that so crippled the operation of the Civil Service Commission. The bulletin said: Since the enactment of the 1974 Privacy Act, many state and local au- thorities have become increasingly sensitive to the issue of individual pri- vacy. A number of these authorities have interpreted their responsibilities in the area of individual privacy to include increased restrictions on the dissemination of criminal history data in state and local files to noncrimi- nal justice agencies in the federal government, even though the legal and regulatory authorities of these agencies, including the investigative au- thorities of the OPM, meet all of the requirements for access. Privacy consideration and a number of other factors, such as the workload involved in processing federal agency requests for information, have been used by a number of state and local authorities as a basis for denying federal agencies access to all or part of the information in their files. Suitability: The Dilemma of the Adjudicator Personnel security is intertwined with "personnel suitability." "Suit- ability" has to do with such things as general character, trustworthiness, and reputation. It has important implications for the personnel security program because those who are untrustworthy or engage in "criminal, dishonest, infamous or notoriously disgraceful conduct," or drink ex- cessively, or use drugs, are clearly at risk from a personnel security standpoint. Although it is manifestly impossible to screen out all such Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 "security risks," it is a reasonable assumption that the great majority of those who have been recruited by the Soviets on a mercenary basis or as a result of sex or blackmail suffered from some such flaws. If a signifi- cant percentage of such elements can be eliminated in the course of the employee screening process, the government stands to gain, both in terms of performance and in terms of enhanced security. Executive Order 10450 was intended to establish a government-wide program embracing both personnel suitability and personnel security. We have up to this point concerned ourselves primarily with the decline of the personnel security program. However, there has at the same time been a parallel decline in the quality of the personnel suitability pro- gram-and for much the same reasons. What it all boils down to is that, as the General Accounting Office has pointed out in several reports, it has become much more difficult to obtain information of any kind from government offices as well as from the private sector because the disclosure provisions of the Privacy Act have had a chilling effect on potential witnesses possessing derogatory or other than favorable information about applicants or appointees. In addition to this, there has been a dramatic change over the past two decades in legal and social philosophies, so that information, which would have resulted in disqualification ten or twenty years ago, is sim- ply considered immaterial or unactionable today. The government's personnel suitability program has been further be- deviled by the so-called nexus principle, which emerged from the D. C. Circuit Court's decision in the case of Norton v. Macy (417 F. 2d 1161, C.A.D.C. 1969). Under this principle, if an applicant's record contains information which might otherwise disqualify him, he may not be dis- qualified unless a "nexus," or specific rational connection, can be dem- onstrated between his conduct or weakness and his ability to perform satisfactorily his duties in the position for which he has applied. In all divisions of the United States government, the adjudicators who make the final recommendations on suitability for government em- ployment play a role of critical importance in the employee selection process. This is so because it is the adjudicator who makes the final de- cision in all cases where there is derogatory information to be evaluated or where the information developed by the investigation is considered insufficient by the reviewer. Adjudicators, of course, have to have guidelines. The guidelines for adjudicators (Federal Personnel Manual System/United States Civil Service Commission, "Determining Suitability for Federal Employment," FPM Supplement 731-1) lists a number of factors that may serve to disqualify an applicant for employ- ment. But each factor is now conditioned by so many caveats and ex- ceptions that the poor adjudicator more often than not is left wondering which way to turn. (The manual, which was published in 1975, is still in current use.) Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 An applicant can be disqualified because of delinquency or miscon- duct in previous employment. However, in order to do so, "the evidence must show a pattern of conduct which would be incompatible with suc- cessful performance in the position applied for or employed in." Applicants can be disqualified for federal employment if they have committed "serious crimes involving basic questions of honesty, integ- rity and character, unless they have established records of rehabilita- tion." But the caveats here are numerous. Under the Prisoner Rehabilitation Act of 1965, government depart- ments and agencies were enjoined to provide employment opportunities for rehabilitated criminals. The theory was that, if government wanted private enterprise to provide such employment opportunities in order to reduce the rate of recidivism, then government itself had to provide the lead. Initially the procedure was to defer the consideration of such ap- plications for two years. If at the end of that time the subject had not become involved in any new difficulties with the law, he was considered rehabilitated and eligible for employment. As matters stand today, however, good behavior in prison is considered evidence of rehabilita- tion, and a convict emerging from prison with a one- or two-year good behavior report is theoretically-and quite frequently in practice- eligible for immediate employment, even in sensitive positions. Offenders who violated the law before their eighteenth birthday and whose offenses were finally adjudicated in juvenile courts or under youth offender laws, are not required to admit to the arrest and sen- tencing in filling out their civil service employment application forms. If, despite this fact, the investigator learns from other sources that the subject was sentenced in a juvenile court, this information may not be used to disqualify the applicant for appointment to a position in the federal competitive service. This would make it possible for a youthful offender who committed a number of burglaries just before he turned eighteen and was thereafter sentenced to six months' detention by a ju- venile court, to come out of prison and walk right into a job as a govern- ment guard. Nor does an applicant have to admit to a conviction under state or federal law prior to age 26 if the conviction has been set aside pursuant to the provisions of the Federal Youth Corrections Act. Nor does he have to admit to it if the record of his conviction has been expunged under state or federal law. The personnel suitability handbook provides that applicants for gov- ernment employment can be disqualified if they have engaged in "no- toriously disgraceful conduct." However, it warns that "evaluators must be careful to avoid letting personal disapproval of such conduct influence their decisions. Disqualification in such cases is warranted only "when the notoriety accompanying the conduct can be reasonably Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 expected to affect adversely the person's ability to perform his or her job or the agency's ability to carry out its responsibilities." The handbook further notes that "court decisions require that per- sons not be disqualified from federal employment solely on the basis of homosexual conduct." This apparently is a blanket rule which applies equally to nonsensitive, noncritical-sensitive, and critical-sensitive posi- tions. The handbook lists current excessive use of intoxicating beverages as another justification for denying employment. However, it points out that under Public Law 91-616, enacted on December 21, 1970, "no per- son may be denied or deprived of federal civilian employment ... solely on the ground of prior alcohol abuse or alcoholism." One would imag- ine that, in determining what constitutes rehabilitation, the handbook would at least stipulate a six-month or one-year period of absti- nence-which used to be the practice. The section dealing with this matter, however, is so vaguely worded that, in theory, a one-month ab- stinence could be considered proof of rehabilitation. "Rehabilitation," says the section, "is not necessarily time-framed. There can be strong evidence of rehabilitation covering a brief period of time...." An applicant can also be denied employment because of the current illegal use of narcotics, drugs, or other controlled substances. However, the handbook notes, "if it is determined that an applicant, or an ap- pointee serving a probationary period, is currently using any substance listed in Appendix A, Schedule of Controlled Substances, the fact of such illegal use will not necessarily, in and of itself, be sufficient to deny eligibility for appointment of an applicant or removal of an appoin- tee.. . .all circumstances surrounding the use of the controlled sub- stance must be examined to determine whether a rational relationship exists between the individual's conduct and some identifiable detriment to the efficiency of the service." Each case, says the handbook, should be adjudicated on its own mer- its, and the adjudicator should take into consideration the kind of drug used, the patterns of use, how the drug was obtained, the date on which use started and the last date used, circumstances and environment at the start of drug use, assistance in cure and rehabilitation, nature of treatment and prognosis, social behavior and attitude since discontinu- ance of drug use, history of previous rehabilitation efforts, circum- stances and environment at the time of discontinuance of drug use. In order to make an intelligent adjudication that takes into consider- ation all of these factors, an adjudicator would have to be a combina- tion of King Solomon, a professional psychologist, a sociologist, and a drug expert. The handbook says that, while continuing use of LSD, marijuana, and other controlled substances is disqualifying, "no specific period of Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 rehabilitation can be established." This wording would suggest that an applicant who had abstained or said he had abstained for a month's time from the use of marijuana, LSD, cocaine, or other drugs, might be considered eligible for government employment even in a sensitive posi- tion. Actually the situation is somewhat worse than this. So tolerant has the system become today, according to several personnel security pro- fessionals interviewed, that, even in the case of someone who currently uses drugs in his off time, it would be necessary to demonstrate a vir- tually absolute "nexus" between the applicant's off-time drug use and his ability to perform his job before he could be disqualified. In the case of those who have already been appointed to government positions and are discovered to be drug users, present regulations re- quire that they be given an opportunity to seek counseling, with the time off counted as sick leave. Only if the appointee refuses to seek counseling, or if he seeks counseling but fails in his effort at rehabilita- tion, can he be terminated. The handbook states that "traitorous or disloyal acts" are disqualify- ing, as is "knowing and active membership in an organization whose stated aim is destruction of the constitutional form of government by unconstitutional means, with the specific intent to carry out that des- truction." It justifies disqualification where there is "a reasonable doubt of the loyalty of the applicant or employee to the government of the United States." It then goes on quite properly to note that "peace- ful protest and dissent are rights guaranteed by the Constitution," and gives as examples of such peaceful protest, participation in the anti- Vietnam war demonstrations or demonstrations for or against the bus- ing of school children. But it provides absolutely no guidelines for the adjudicators in helping them to determine what kind of associations and activities are protected by the Constitution and, on the other hand, what kind of associations and activities would constitute justification for reasonable doubt of loyalty. The situation has been further complicated by the fragmentation of the adjudication program subsequent to the Civil Service Reform Act of 1978. Previously, the adjudication program for the complex of some 55 departments and agencies serviced by the Office of Personnel Manage- ment (OPM) was concentrated in the Civil Service Commission (OPM's predecessor organization). This at least had the advantage of making for uniform standards of adjudication. Today, the major portions of the adjudication program have been delegated to various agencies and departments by OPM. Standards of adjudication in the departments and agencies tend to be extremely lax because this is the direction in which the guidelines point, because many agency directors do not have a feeling for the importance of personnel security, and because it is only natural that the adjudicators should further weaken the program in Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 making their own interpretations of the legal interpretations that have been handed down to them in the form of guidelines. Standards of adjudication are significantly better in the intelligence community, the law enforcement agencies, the Department of Justice, and the Department of the Treasury. Within the limitations imposed on them by court decisions and acts of Congress, these agencies appear to be making a serious effort to protect the national interest through the adjudicative process. How difficult this has become, however, is ap- parent from the statement of a senior Justice Department lawyer who said that, in the absence of some dramatic factor justifying disqualifi- cation on other grounds, it would almost be necessary to prove a case of treason in order to justify nonselection of a technically qualified appli- cant with a revolutionary record. A senior officer in the Navy's Civilian Personnel Department, when asked how the Navy would react to the knowledge that an applicant for a sensitive position was a long-time member of the Communist Party, replied that she frankly did not know how the implications of member- ship in the CPUSA would be regarded. As for homosexuality, mari- juana, and excessive drinking in their off hours, it would be necessary to prove the existence of some absolute nexus between these weaknesses and the on-duty performance of the applicants in order to deny them employment. A presumption of a nexus, or of a potential nexus, in such cases, would certainly not be unreasonable-indeed, on a common-sense basis, most ordinary mortals would favor such a presumption in the in- terest of not putting the government or the armed forces at risk. As the rules are interpreted and applied today, however, such risk is apparently considered a matter of secondary importance. The nexus principle is badly flawed for another reason. It is fre- quently impossible to provide proof of the existence of a nexus before an applicant has worked on the job for a while. Once an applicant has been put on the payroll, however, it becomes extremely difficult to get rid of him-despite the fact that he is theoretically on one year's proba- tion-because the criteria for separation are much more stringent than the criteria governing initial employment. Commenting on all of the restrictions under which adjudicators to- day must operate, an old-time professional told the author that the ad- judicator's lot is not a happy one because, in effect, he has been hired to do a job which he cannot satisfactorily perform. There is no quick fix for this situation. To effectively remedy the per- sonnel suitability and security programs is going to require (1) some new legislation, (2) the reestablishment of a domestic intelligence data base, (3) some additional funds for the government personnel security operation, and (4) a basic rewriting of handbooks such as "Determin- Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 ing Suitability for Federal Employment" in a manner which places the optimum interpretation on existing laws and which, at the same time, strikes a better balance between the prerogatives of the individual ap- plicants and appointees and the prerogatives-and responsibilities-of the government as employer. Getting new legislation enacted is going to take a number of years. Some things can be done in less time, however. In relatively short order, for example, it should be possible to examine the body of regula- tions and directives based on interpretations of existing laws, and to rewrite them wherever there appears to be a possibility of interpreting the law in a manner more in harmony with the requirements of sound personnel security and suitability practices. There is absolutely no reason, for instance, why the regulations governing the employment of former criminals, alcoholics, and drug abusers should not stipulate specific time limits for proof of rehabilitation. It might be stipulated that ex-prisoners would be considered eligible for employment in non- sensitive positions if they had not violated the laws for one year after release; and that they would be eligible for employment in sensitive positions after two years of good behavior. And there are many other common-sense things that could be done without delay through the simple process of rewriting legal interpretations and administrative directives. Until recent years, it was the accepted concept that employment by the federal government was a privilege rather than a right. As things are today, however, federal employment has come to be regarded as an inalienable entitlement, and the government in effect has come to be regarded as the employer of last resort. This concept appears to have taken charge of the entire adjudication process. This by itself tends to create a situation highly prejudicial to sound personnel security prac- tices. It is mandatory that we find our way back to the old-fashioned principle, upheld in repeated court decisions, that, while every citizen has the right to apply and compete for government service, on a basis of equality with other applicants, federal employment itself must continue to be regarded as a privilege. Cutting the Costs of Personnel Security: A Study in False Economy There are factors other than FOIA and the Privacy Act and con- straints on investigators that have contributed to the decline of the Federal Employee Security Program. One of these has been the low priority which most government agencies-including the Department of Defense but not including the intelligence and law enforcement com- munities--have assigned to their personnel security programs since the early 1960s. Personnel security divisions have been starved for funds and starved for staff and their programs have been deemphasized and cheapened to the point where many conscientious senior employees Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 have taken their retirements early out of a feeling of complete frustra- tion. Although the implementation of an effective security program re- quires personnel of high competence and superior judgment, those assigned to jobs in the field of personnel security have all too frequently been employees of inferior competence and limited background. This tendency has been exacerbated by the fact that few officials with per- sonal ambition gravitate voluntarily to the area of personnel security because it is a field where the prospects for advancement are limited and where it is virtually impossible to make a name for oneself. Every ambitious officeholder wants to do a good job. But the field of govern- ment personnel security is today encumbered by so many restrictions that even the most conscientious bureaucrat would find it impossible to turn in a truly effective performance. In harmony with all this, it has been a frequent practice on the part of government agencies, when economies were called for, to effect these economies primarily at the expense of the personnel security machin- ery. (The tendency to do so has no doubt been further encouraged by the fact that the various offices directly concerned with the personnel security program produce an invisible and unquantifiable product- better security.) The examples are numerous. In 1965, the Civil Service Commission eliminated the requirement for full field investigations in the case of noncritical-sensitive posi- tions-which are in most departments far more numerous than critical- sensitive positions. In 1972, it stopped budgeting for an investigators training program.* It progressively reduced and then dismantled the Security Research and Analysis Section. It cut back on the scope and reduced the thoroughness of Background Investigations. Finally, there is the matter of the limitations placed on the Investiga- tions Evaluation Branch (IEB) which is supposed to function as a quality control unit in the field of investigation. Theoretically, IEB is required to review each agency every two years by doing spot checks on their per- sonnel security procedures. According to a September 1980 report,** because of IEB's limited resources, some agencies and offices, in- cluding OPM itself, had not been reviewed in five or more years, and some had never been reviewed. [OPM now states that this situation has improved and that the IEB since January 1981 has had the resources to cope with its assignment.] It should be emphasized once again that the systematic budgetary starvation of the Federal Employee Security Program is not limited to the OPM. It is government wide, and the responsibility is shared by *In the latter part of 1979, Peter Garcia, the present Assistant Director for Personnel Inves- tigations of DPI, reinstituted a one-week training program for investigators and four such one-week programs have now taken place. But from 1972 to 1979 there was no training. **Office of Internal Evaluation, OPM, Personnel Investigations: Ways to Improve Serv- ices and Reduce Costs, September 1980. Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 Congress as well as the federal bureaucracy. It was Congress, for exam- ple, which in 1976 mandated a 27 percent cut in the personnel of the Defense Investigative Service (DIS)-a reduction in force that has played a major role in the almost paralyzing backlog of Background In- vestigations against which the Department of Defense is now struggling. One of the most dramatic examples of excesses perpetrated against the personnel security program in the name of economy is to be found in the Department of Health and Human Services, which has a total staff of some 170,000 employees. A number of years back, the Depart- ment's Office of Internal Security, whose primary function was person- nel investigation, had a staff of 38. As recently as two or three years ago, there were ten professional and support staff in the Division of Personnel Investigations. Today it is down to a staff of three-the director, one specialist, and one clerk. As a result of the inversion of values imposed by the Carter Administration, there still are, by way of contrast, 333 investigators and staff assistants assigned to the civil rights division of HHS. It is not that civil rights are unimportant-but surely, in any rational plan of things, personnel security would have to be assigned at least equal importance. The General Accounting Office must also be given a portion of the blame for the government-wide tendency to cut back on the costs of personnel security programs. Indicative of the recurring theme of its several studies of the situation is its August 1979 report, "Costs of Fed- eral Personnel Security Investigations Could and Should Be Cut." It has yet to produce a report entitled "The Quality of the Federal Em- ployee Security Program Must Be Improved." It would, perhaps, be too much to expect GAO, whose strong point is managerial expertise, to manifest a sophisticated understanding of the need for an effective employee security program and the myriad prob- lems involved in such a program. Internal security has over the past two decades become an increasingly arcane profession. The great majority of those who might qualify as experts are now out of government, and of those who remain, it is highly questionable that GAO possesses any meaningful representation. The pressure brought: to bear on OPM by the GAO proposal is re- flected in the five-level system being proposed by an interagency task force for designating the sensitivity of positions and activities. Of a total of 1,652,083 positions tentatively surveyed in connection with the rec- ommended system, 1,098,166 fall in Level I under the new arrange- ment. In order to save $11 per position, the new plan proposes to reduce personnel investigations in Level I from an NACI to an NAC ($36.29 against $25.05).* The NACI, as we have pointed out, has traditionally *These figures, compiled in 1981, represent the total cost of processing NACs and NACIs -the cost to OPM, the cost to the employing agency, and the costs to the FBI, DOD, and to the other agencies with whom records are checked. Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 been considered a minimal investigation. Reducing it to an NAC means that letters will not even be written to local police departments (unless there is information indicating that such checks are necessary) asking whether the applicant has a criminal record-indeed, without the in- quiries to reinforce the National Agency Check, the employing agency would not even be able to confirm that the applicant is who he says he is. Veteran investigators with whom the proposal was discussed feel that, for the sake of achieving a minimal saving, the quality of the in- vestigation that is going to be accorded the great majority of govern- ment employees will suffer seriously. The punitive budgetary treatment of the offices concerned with per- sonnel security might lead one to think that it was a matter of saving billions or at least hundreds of millions of dollars. Actually, the total annual cost of the government's personnel security program, compared with its purpose and importance, is ridiculously low. A report put out by the Comptroller General in August 1979 gave these figures for the cost of the program, government wide, but not including the Depart- ment of Defense, for fiscal year 1978: costs Number (millions) Full field investigations 152,057 $61.6 Other investigations, such as updates, NACI, and NAC 1,140,812 10.1 If we add to this the rough figure of $90 million for the Department of Defense and make some allowance for agency investigations not covered by the GAO survey, the total cost for 1978 would be substan- tially under $200 million. There are many areas in the bloated federal bureaucracy where cuts- even heavy cuts-can be imposed to advantage. But that is not the case with the Employee Security Program. Like our national defense estab- lishment, this program has to be rescued from the incremental econo- mies imposed on it year after year. If the entire operation were beefed up to the point where it cost double what it costs today, it seems to the author of this paper that this would still be little enough to pay for en- hancing the quality of the Federal Employee Security Program. A decision of far-reaching significance for the future of the Federal Employee Security Program was handed down on January 16, 1980, by the Federal Court for the Southern District of New York (Jane Doe v. U.S. Civil Service Commission). Jane Doe was a candidate for a White Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 House fellowship. In the course of an investigation by the Civil Service Commission, two of the 35 witnesses interviewed stated that she ap- peared to be afflicted with kleptomania, that she had stolen some very small items from them. Their statements were given on condition of confidentiality. When Jane Doe was not selected for the White House fellowship, she petitioned under the Privacy Act for a copy of her inves- tigative file. She was given a copy of her file, with the identities of the two adverse witnesses deleted. She then sought to persuade the Civil Service Commission to eliminate from her file the information provided by the adverse witnesses, or alternatively, to compel the adverse wit- nesses to come forward and confront her. The Civil Service Commission turned down this request. She then brought suit against the Civil Serv- ice Commission charging that the Commission had unconstitutionally violated her liberty interests by disclosing derogatory allegations against her without affording her an opportunity to refute the charges. In its decision, the Court upheld her complaint. It ruled that "if the agency wants to include the derogatory report in Doe's file, she must have a chance to question the sources and challenge their credibility." The Court also found that the CSC's investigatory and disclosure proce- dures violated Doe's right to due process and it ordered the agency to provide Doe with an opportunity to refute the allegations, with appro- priate discovery if necessary. Finally, the Court found that Doe had "a constitutionally based cause of action against the named defendants in their individual capacity." Presumably this ruling could also be ex- tended to investigative witnesses. In the aftermath of Jane Doe v. U.S. Civil Service Commission, the Office of Personnel Management on November 28, 1980, proposed sweeping changes in the conduct of personnel investigations. The pro- posal, while conceding that OPM investigative reports have tradition- ally contained information from confidential sources, suggested that in future investigations, if a source refuses to withdraw his request for confidentiality, the information from that source would not be reported. The proposal also stated that: When an agency, as a result of information in an OPM report of inves- tigation, changes a tentative decision (selection, promotion, grant clear- ance, etc.) to an unfavorable decision, it must provide the subject the specific reason(s) for the decision based on the information in the report, and allow the person a specified period of time, fifteen (15) calendar days, to respond. An extension of time to respond may be granted for suf- ficient cause. The subject must be given an opportunity to respond orally, in writing, or both, and to have the right of representation. Going beyond the changes that may have been indicated by the Court's decision in Jane Doe v. U.S. Civil Service Commission, OPM proposed changing the retention schedule of investigative files from Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 twenty years to seven years. This is a completely arbitrary time frame. If an investigation terminates in nonselection, and if the subject of the investigation eight or nine years down the line reapplies for employment in the federal government, the record of his previous investigation would not be available under OPM's proposed retention schedule. In the case of those who are selected for government employment, it would seem far more logical to retain investigative files for the duration of their employable years. In the case of those who are rejected for reasons related to loyalty or security, files should be retained at least until they reach age 65, and retained indefinitely where they deal with case his- tories that have a continuing application or are of historical interest. The OPM reports that no action has yet been taken on the Novem- ber 28, 1980, proposal although the proposal itself and agency com- ments on it are under active consideration. The Doe decision will, if permitted to stand unchallenged, have a very serious effect on future investigations under the Federal Employee Security Program. It has been recognized in the past that there are many valid reasons why witnesses who possess adverse information about applicants for federal employment may condition their coopera- tion on a pledge of confidentiality. When, under the old system, several confidential witnesses provided corroborative accounts of an adverse nature, this evidence would be weighed very seriously. Today, all that is over. Even more distressing are the implications of the Court's decision upholding the right of Jane Doe to claim damages from investigators and Civil Service Commission officials who had contact with her case. For reasons of simple human nature, investigators will be far less likely to report adverse information that comes to their attention, and adjudi- cators and personnel directors will be far less likely to make adverse determinations if this can result in a suit for tens of thousands of dol- lars. Indeed, quite a few investigators and officials working in the field of personnel security have taken out insurance against this possibility. Clearly the safest course for them to follow would be to avoid all adverse information and all adverse determinations, except in the most glaring cases. It is common knowledge in the personnel security community that this is precisely what many investigators and reviewers do-al- though there are a surprising number who still report the facts and exercise their objective judgment despite the uncertainties attendant on doing so. There can be no contesting the Court's contention that Jane Doe should have been advised of the allegations against her and should have had an opportunity to respond to the allegations before the information was passed on to the panel in charge of selections for the White House fellowship program. The question is whether this basic due process re- quirement could not be achieved without insisting on the identification Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 of confidential witnesses and without making investigators and officials civilly liable for information recorded or decisions reached in good faith. Long before the Privacy Act, it was the Civil Service Commission practice to advise applicants about whom derogatory information had been received of the general nature of this information and invite their response. But this did not give them access to the investigative file and adjudicative report. The Department of Justice wanted to appeal the Jane Doe decision precisely because it was felt that the Court had gone far beyond the ac- tual requirements of due process in the restrictions it imposed on future investigative procedures. Unfortunately, the CSC/OPM, instead of ap- pealing, made a settlement with Jane Doe for $25,000 in actual dam- ages, and agreed to restore her name to the list of those eligible for White House fellowships. Having settled the case, the OPM automati- cally made a future appeal against the Court's decision impossible. The Jane Doe decision, in consequence of this failure, now constitutes a precedent that may very well become the law of the land. In this in- stance, as in so many instances before it, the CSC surrendered valuable ground without putting up a fight to the finish in the courts. In doing so, it has compromised the operations of the personnel security pro- grams in all sectors of the government. In the first part of 1980, the OPM's Division of Personnel Investiga- tions (DPI) made an effort to change the rules in a positive direction. Under its newly defined rule, if a witness refused to recommend an ap- plicant, the investigator was instructed to report his reason or reasons, no matter what they were, approximately in the witness's words. The rationale for this was that the inclusion of the information did not have to be defended, since it was simply a matter of reporting accurately the witness's reason for refusing to recommend. The Jane Doe decision, however, introduces an element of ambiguity into this more rational approach. Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 Personnel Security Procedures in Individual Agencies Personnel security procedures vary dramatically from agency to agency. Some are better; some are worse. In the following chapter, we examine the procedures in the Department of Defense, the intelligence agencies and the FBI, and the Departments of State, Justice, and Energy. The Department of Defense The Defense Department, it has been estimated, is responsible for some 75 percent of all Background Investigations conducted within the Executive Branch. This is only natural, given the size of the defense es- tablishment.and the highly classified nature of much of its activity. The quality of the personnel security program in the Department of Defense is, therefore, of vital concern. Civilian employees of DOD fall under the provisions of Executive Or- der 10450. Military personnel are not governed by EO 10450, but in- stead are screened under a parallel program which is basically similar to that which governs the civilian employees, but whose authority de- rives from the president's inherent power as commander-in-chief of the armed forces, rather than from an executive order or act of Congress. The present military personnel security program is based on DOD Di- rective 5200.2-R, 1979. The purpose of this directive is stated in the fol- lowing terms: To establish policies and procedures to ensure that acceptance and re- tention of personnel in the Armed Forces, acceptance and retention of civilian employees in the Department of Defense (DoD), and granting members of the Armed Forces, DoD civilian employees, and other affili- ated persons access to classified information are clearly consistent with the interests of national security. Like all other government departments, DOD's personnel security program has suffered grave damage as a result of the destruction of the domestic intelligence data base, the virtually complete suspension of Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 domestic intelligence activities by law enforcement agencies, and the impact of privacy legislation on the investigative process. Defense De- partment officials claim a much higher degree of cooperation from gov- ernment agencies and private institutions and citizens than does the OPM. (OPM challenges this.) But the degree of cooperation makes very little difference when there is no domestic intelligence available. The director of the Defense Investigative Service (DIS) told the author that, while his service does receive a good deal of criminal history infor- mation from local law enforcement agencies, he could not recall a sin- gle item of information from local sources in recent years that had to do with the matter of subversive associations. The FBI does possess extensive domestic intelligence files going back beyond 1976, but it has added precious little new intelligence since that year. Since virtually all military enlistees are in the 18 to 21 age group, the FBI's pre-1976 domestic intelligence files have very little relevance as a data base for screening out youthful left-wing and right-wing ex- tremists who might pose a danger to the integrity of the armed forces- as potential saboteurs, as inciters of racial incidents, as espionage agents, or as revolutionary agitators who might at some future date sur- face on command. About the best DOD can hope to do is to keep a care- ful eye open for troublemakers after they pass the point of induction. Although the DOD does much better when it comes to simple crimi- nal history information, even in this area it has been having a lot of dif- ficulty. A study by SEARCH GROUP, Inc.* reported that the recruiting services were having major problems in obtaining criminal justice or re- lated data. It said that "the recruiting -commands are often denied ac- cess to criminal history data even in states that provide access to other DOD components and to other federal agencies." It quoted the follow- ing paragraph from the December 1978 issue of DOD's Command magazine: A Marine Corps study found that the flaw in current recruiting is not so much malpractice as it is the recruiter's inability to check out the ap- plicant's statements. Many school and police jurisdictions simply take a strict approach and provide no personal information. It leaves recruiters with no means of checking out statements. The SEARCH study points out that DOD's ability to obtain access to criminal history information varies significantly from one state to an- other. Because of sealing and purging standards and other limitations, only 17 states release both conviction and nonconviction data to DOD requestors; 15 states release only conviction data; four states provide *Search Group, Inc., "Federal Access to State and Local Criminal Justice Information for Federal Personnel Security and Employment Suitability Determination," Sacra- mento, California, March 1979. Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 little or no access to records; and the remainder are a mixed bag. While noting that most states do cooperate in one degree or another with DOD, the study reports that "only a small group of states disclose all criminal history under all circumstances to all DOD components." The blame for this situation stems to a large degree, says the study, from a restrictive interpretation of Law Enforcement Assistance Ad- ministration (LEAA) regulations. Under these regulations, state and local agencies receiving LEAA assistance are barred from disclosing nonconviction data to a noncriminal justice agency unless the disclo- sure is for a purpose authorized by "statute, ordnance, executive order or court rule." The restrictions persist despite a finding by LEAA's General Counsel that under various statutes and executive orders, the DIS does qualify to receive nonconviction information. Senior DOD officials concerned with the program told the author that, while they feel that they do better than most other government agencies, their difficulties in accessing information, instead of dimin- ishing, have continued to grow in recent years. Thanks to all these limitations, there are some worrisome shortcom- ings in DOD's personnel security procedures at several levels. Enlistees, as has been pointed out, are required to undergo an ENTNAC, which is an NAC without a fingerprint check. This is sup- plemented at the point of recruitment by form inquiries sent out by the various recruiting commands to high schools and to state and local criminal justice agencies. DOD officials feel that this makes the ENTNAC the virtual equivalent of an NACI, minus the fingerprint checks. DIS says that it dispenses with the fingerprint search in the case of enlistees because an ENTNAC search comes back in 28 days, while a full NAC takes an average of 59 days. This delay, they say, could have a serious adverse effect on the recruiting process. The ques- tion remains whether it would not be sounder procedure to induct enlistees on the basis of an ENTNAC, and then proceed with the finger- print check. To this, DOD replies that their studies have shown that very little potentially disqualifying information has been lost through omitting the fingerprint check from the ENTNAC program. On this point, DOD's evaluation appears to be in conflict with that of other agencies, including the intelligence and law enforcement agencies. Per- haps this is an area where a study conducted by an independent panel of experts might be helpful. If the ENTNAC turns up no disqualifying information, the enlistee is taken aboard and qualified for access to information and technology up to the level of Secret. This is reason for serious concern when one con- siders, to take one possibility of many, that a youthful radical, com- mitted to the defeat of the United States in the event of war (a cardinal tenet of all Marxist-Leninist groups), might easily qualify as a crew member aboard a nuclear missile submarine or, after taking a course of Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 instruction, as a computer programmer. (While all officers aboard nu- clear submarines undergo a background check-now an IBI-the ma- jority of enlisted men do not.) Unfortunately, DOD, with the best of intentions, can do nothing about this situation in the absence of a do- mestic intelligence program and data base, and in the absence of any official guidelines. The dangers inherent in recruiting youthful followers of the numer- ous Marxist-Leninist groupings and organizations become apparent from even a random reading of their press. For example, Challenge, the newspaper of the Maoist Progressive Labor party, said in its issue of December 23, 1981: Our Party is actively organizing some working class youth across the U.S. to win them to the fight for socialist revolution in the schools, in the communities, and inside the military. Those of our comrades and friends in the military are organizing there to win soldiers and sailors to join with the rest of the working class to turn imperialist World War III into a civil war for socialism... . This is the vintage Leninist position on the duties of revolutionaries in imperialist countries in the event of war. With minor variations, it is one of the most frequently repeated dogmas of the entire revolutionary left. It would be prudent for the Free World to take with deadly serious- ness the Marxist-Leninist commitment to work for the defeat of their own country and to turn the "imperialist" war into a civil war for socialism. Civilian employees are accepted by DOD on the basis of an NACI, with access, again, up to the level of Secret. To the author this appears to be a quite inadequate level of investigation in a department where much of the information to which such a clearance gives access is so extremely sensitive. DOD officials with whom the matter was discussed were quite frank in admitting that even the NACIs they receive are frequently un- satisfactory or incomplete. They said that OPM, which conducts the NACIs for DOD civilian employees, frequently sends in reports which fail to follow through on the disposition of arrest information, fail to check or develop negative information by subject interviews, and suffer from gaps in the Inquiries portion of the NACI because OPM does not make a second effort to obtain a reply if its first communication is ig- nored. The armed services have on occasion sent back such incomplete NACIs to OPM with the request that they make a special effort to ob- tain the additional information. OPM claims that the problem is very much exaggerated. In a recent letter to DOD dealing with this com- plaint, OPM noted that, over the period April 1, 1980, to June 30, 1981, it had conducted a total of 90,000 NACIs for DOD, of which 65, or 0.07 percent, were returned for further investigation. Of the 65 re- Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 turned NACIs, 22 received further investigation. The other 43, OPM decided, did not require further work. Members of the armed forces can now be cleared for access to Top Secret information on the basis of an "Interview-oriented Background Investigation" (IBI), consisting of a one-hour interview (average re- ported duration), an NAC, a credit check, and, in some cases, "select scoping," in which investigators seek to zero in on problem areas sug- gested by the interview or the NAC. (The IBI will be discussed in more detail in the pages that follow.) Civilians, however, whose clearances are governed by OPM rules, must undergo a full field Background In- vestigation to qualify for Top Secret. This is supplemented, as is always the case, with an NAC. Retired FBI officials and personnel security of- ficers with whom the author discussed the matter uniformly expressed the opinion that, although personal interviews can be very useful tools, the IBI by itself is a seriously inadequate investigative procedure to jus- tify access to Top Secret. Access to the most sensitive kind of information, Sensitive Compart- mented Information, requires a full fifteen-year BI. More than this would be unreasonable. There is reason for concern, too, about the state of DOD's industrial security program for industrial contractor personnel. For Confidential clearances, DOD relies on checks make by the contracting companies. For Secret clearances, it requires an NAC-a procedure, to repeat again, that has been gravely devalued from a national security standpoint. For Top Secret clearances the rules require an IBI. The investigations are conducted by the Defense Investigative Service (DIS), but the actual clearance decision is made by the Defense Industrial Security Clearance Office (DISCO). If DISCO refuses clearance, the case is sent to the Pen- tagon for review. If the decision is still negative, there are provisions for the company or employee to appeal with an assurance of due process. A GAO report of September 15, 1981, "Faster Processing of DOD Personnel Security Clearances Could Avoid Millions in Losses," stated that, to avoid extensive delays in some programs, DOD has had to issue an increasing number of interim clearances to industrial personnel. Like the waivers of pre-employment security investigations that have been granted so extensively by other government departments, the in- terim clearance is followed at some later date by a National Agency Check and a Background Investigation. The GAO report said that 9,600 interim clearances were issued to industrial personnel in 1980, compared to 6,100 in 1978. It noted that an unknown number of the in- terim clearances issued had to be revoked subsequently because of dis- qualifying derogatory information developed by the investigation. "GAO believes," said the report, "that the increase in the use of in- terim clearances increases the risk to the national security." Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 In response to this criticism, DOD says that interim clearance proce- dures are based on many factors, including the clearance level required, the sensitivity of the assignment, etc. They point out, for example, that in the case of a request for Top Secret clearance, an interim clearance may be granted only after an NAC has been favorably completed and the IBI has been initiated. This interim procedure, says DOD, when properly implemented, provides a judicious balance between security considerations and the manpower needs of DOD. As things stand today, those in charge of personnel security at DOD may be correct in this appraisal. The question is whether it would not be far better to provide the DIS with the necessary manpower to enlarge the scope of their investigations, and, at the same time, to keep up with their investigative workload so that no significant detriment to the de- fense production program would result from the delay in processing clearances in the proper sequence. It would also be helpful if DOD could fill in the quantity for the "unknown number of interim clear- ances" which the GAO said had to be revoked subsequently because of disqualifying derogatory information. This situation has come about primarily because the Defense De- partment's personnel security program has suffered drastically from budgetary constraints. In 1976, Congress, in an ill-considered action, mandated a 27 percent cut in the personnel of DIS. By June of 1981, DIS had a backlog of some 83,000 investigations waiting to be com- pleted. This figure included prospective employees, defense contractor employees, and officers and enlisted men awaiting assignment in sensi- tive positions. According to a June 1981 memorandum to the secretaries of military departments, the Chairman of the Joint Chiefs of Staff and directors of Defense agencies, DIS was at that time opening a thousand cases a week more than it closed, and this had produced a situation in which large numbers of personnel could not be productively utilized be- cause they did not have security clearances. This had resulted in a seri- ous degradation of operational readiness. It was also delaying, in some cases by more than a year, the finalization of contracts for classified hardware because new contractors and their employees had to undergo security checks before they entered into production. For once, the General Accounting Office, which has generally called for more economy in the government's personnel security program, came to the rescue. On September 15, 1981, the Comptroller General sent to the Congress a report, previously quoted, captioned, "Faster Processing of DOD Personnel Security Clearances Could Avoid Millions in Losses." The GAO stated: Security clearance requests for DOD and industry personnel have in- creased substantially since 1978 without a corresponding increase in DOD and FBI personnel who investigate and process the requests. Pro- Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 cessing delays-some averaging 220 days-are costly and could weaken national security. Based on an industry study, GAO estimates that 1982 productivity losses could cost the government as much as $920 million- $340 million for industry and $580 million for DOD. The report noted with approval that the Deputy Undersecretary of Defense for Policy had asked the Secretary of Defense for an additional $12.5 million for DIS to cover 880 new positions, including 595 investi- gators. In December 1981, 768 additional spaces were authorized for DIS, approximately two-thirds of which will be filled by investigators. The authorized expansion of DIS is still in process. It will contribute somewhat to reducing the backlog, but almost certainly not enough- especially if DOD cancels the abandonment of reinvestigations and returns to the requirement for full field Background Investigations, in- stead of IBI's, for all those with access to Top Secret and over. The report also noted that the FBI Identification Division, which checks fingerprints in connection with all government employee secu- rity programs, was badly understaffed, with the result that its turn- around time had increased from fourteen workdays in 1978 to 58 calen- dar days in June of 1981. This obviously contributed to the processing backlog at DOD. It recommended that the Identification Division be substantially augmented, suggesting the addition of 570 new positions at a cost of about $7.8 million. The amounts suggested in connection with both of GAO's recom- mendations are miniscule against the standards of contemporary gov- ernment spending. They are expenditures that are vital to the domestic and national security. The question remains whether Congress and the Administration will show sufficient understanding of the problem of personnel security to make the very modest budgetary changes recom- mended by the GAO. To help cope with its horrendous investigative backlog, the June 1981 DOD memorandum, signed by Undersecretary Frank Carlucci, called for a moratorium on all periodic reinvestigations, a blanket prohibition on BIs for those whose access was at the Secret or lower level, and the reassignment of investigators from other military departments to the DIS. In the case of military personnel under consideration for Top Secret clearance, it called for substituting the IBI, consisting of an in- tensive interview with the subject, for the full field BI, which involves personal interviews with a substantial number of third parties and searches of records. By mid-September 1982, the backlog had been brought down to ap- proximately 50,000 cases. Senior DOD officials concerned with the personnel security program take the stand that the shift to the IBI was made in the interests of im- proved quality rather than the interests of economy. They refer to a Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 study conducted by DOD* in which 471 cases-appropriately divided between military personnel, DOD civilians, and industrial contract em- ployees--were evaluated according to both the old method and the new method. According to the report, the two types of investigation turned up a total of 186 items of significant adverse information. Of the 186, both the old and the new forms of investigation produced adverse infor- mation in 92 cases, or 49 percent; the old type investigation turned up adverse information in another 22 cases, or 12 percent; and the IBI turned up adverse information in another 72 cases, or 39 percent. DOD officials further point out that the evaluation of the IBI pilot project was accomplished by senior adjudicators of the various DOD components, who carefully reviewed the entire investigative process. Long-time personnel security professionals express serious reserva- tions about these findings. One reason for their skepticism is that the DOD report gives no indication of the degree of thoroughness of the BI. They say it is important to know how many witnesses were interviewed, whether the interviews were conducted in person or over the telephone, how many records were searched, and the facts about other variables. They point out that the figures themselves do not indicate the type of adverse information volunteered by the witnesses or its gravity. As an example, they argue that if an interviewee were a member of the Com- munist Party or some other extremist organization, he would almost certainly not volunteer this information in response to a question-al- though he might, to achieve credibility, admit to some nondisqualifying peccadillos in his past record. They also take issue with DOD's asser- tion that the old-fashioned full field investigation has become ineffec- tive because there is no real "take" from neighborhood investigations or interviews with persons given as references, professors, etc. They point to the fact that our law enforcement and intelligence agencies all insist on full field Background Investigations. Personnel security officials in other agencies also point to a 1980 sur- vey of the comparative effectiveness of neighborhood investigations conducted by OPM and DIS. A joint memorandum signed on May 7, 1980, by William R. Fedor for the Office of the Secretary of Defense and Harold T. Johnson for OPM reported that, in 109 cases reviewed by OPM, 20 neighborhood checks, or 18 percent of the total, produced "less than favorable information," and 11 percent of this information was not available from other areas of coverage. In the case of DIS, of 188 cases reviewed, only five cases, or 2.6 percent, produced "less than favorable information." The striking difference in results is probably due to the fact that OPM did much more neighborhood interviewing than DIS and that OPM interviews are all conducted on a personal ba- *Department of Defense, Test Results, New Background Investigation, Washington, D.C., March 1981. Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 sis whereas DIS has frequently tolerated telephone interviews in an ef- fort to economize on manpower and money. The results do, however, strongly suggest that properly conducted neighborhood interviews can add significantly to the information on which adjudications have to be based in the case of critical-sensitive positions. DOD officials counter these criticisms with the argument that they have had more experience with investigations than any other agency and the other agencies are simply behind the times. Discussions with officials in a number of departments and agencies, however, revealed no one in the field of personnel security who did not have serious misgivings about the IBI. A senior State Department official said that, while they find their personal interviews with applicants for sensitive positions highly useful, such an interview is, at the best, an adjunct to a full field investigation rather than an adequate substitute for it. A senior CIA personnel security professional went further. He said that he considered the IBI a very serious danger to the national securi- ty. He noted that the CIA interviews applicants in depth before they are brought to Washington for polygraphing and processing-and it has been their experience that many applicants, when interviewed in the field by skilled professional investigators, will pass muster with flying colors, while they flunk the polygraph miserably when the same ques- tions are pat to them in Washington. The Department of Energy refuses to accept an IBI conducted by the Defense Department as an adequate background investigation for mili- tary officers assigned to the Atomic Energy Commission. Several re- tired FBI officials who were interviewed also expressed grave misgivings about the IBI. The situation calls for a thorough reexamination of the adequacy of the IBI. DOD personnel security officials readily agree that the most effective system would be to combine the in-depth subject interview with the old- fashioned BI based on third-party interviews and document searches- as the intelligence and law enforcement agencies and the State Depart- ment do. Their argument is that they have to accept budgetary con- straints as a fact of life, that this compels them to make a choice between the two approaches, and, confronted with this choice, they have opted for the IBI over the BI. This argument really goes to the heart of the matter confronting those concerned with the problem of personnel security in our defense establishment. By and large they are competent and dedicated profes- sionals who have a genuine understanding of the importance of sound security practices. But they do not make budgets or determine policy; these things are done at higher levels of government. Only within very narrow limits can they resist the restrictions on personnel security prac- Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 tices that have been accepted by the OPM and most of the agencies it services. They derive some satisfaction, for example, from the fact that when OPM ruled in 1975 that applicants could no longer be asked whether they were members of the Communist Party or other revolu- tionary organizations, the Defense Department did not follow suit. But it should be noted, conversely, that OPM has some legitimate criticisms of its own regarding the personnel security procedures of DOD. There is nothing DOD can do about the destruction of the domestic intelligence data base or about the major damage done to federal em- ployee security investigations by the Privacy Act and other privacy legis- lation. As for their operating budgets, like good soldiers they have been disposed to accept what has been given to them and have tried to do their best in the face of incremental cutbacks that inevitably strike at the integrity of the investigative process. They would be the first to agree that with more staff they could do a better job. But until Congress and the Administration remove some of the restrictions and provide them with the necessary means, about the best we can hope for is the sadly inadequate-and dangerous-investigative product we are now getting. The Intelligence Agencies and the FBI There are two areas where government agencies still adhere or try hard to adhere to fairly stringent personnel security requirements-the intelligence community and the law enforcement community. In September 1979 the Subcommittee on Oversight of the House Per- manent Select Committee on Intelligence, after holding hearings with the various agencies involved, brought out a staff report on Security Clearance Procedures in the Intelligence Agencies. The report reviewed procedures in both the intelligence-producing agencies (the CIA, the Defense Intelligence Agency, and the National Security Agency) and the major intelligence-using agencies (the State Department and the Department of Defense). It found tremendous differences in standards and procedures. "Each agency," it reported, "conducts its own investi- gation, and all such investigations differ one from the other in depth, scope and technique." The investigation of the Subcommittee focused heavily on the procedures used to screen applicants for access to Sensi- tive Compartmented Information (SCI), a category of intelligence data that calls for special controls in handling restricted information within a compartmented intelligence system. Despite the very limited value of the current National Agency Checks and the restrictive effects of privacy legislation, the CIA and the NSA have made great efforts to keep their background checks effective. While most government agencies check back only on the last five years of an applicant's life (or the years from the eighteenth birthday, which- Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 ever period is shorter), the CIA's Background Investigation of appli- cants goes back fifteen years (or the years from the eighteenth birthday). It interviews a minimum of five character references with a view to establishing the habits, loyalty, character, and morals of the in- dividual. In addition to organizational associations, it considers such factors as emotional stability, personal idiosyncracies, financial respon- sibility, employment record, marital difficulties, alcohol abuse and other drug use, homosexuality, and gross character deficiencies. The applicant must submit to both a physical exam and a psychiatric screen- ing. The CIA also requires polygraph examination of all applicants. Everyone who has unescorted access to the CIA premises must undergo such an examination, including guards, cleaners, contractor personnel, and military personnel. According to the House subcommittee report, the CIA turns down approximately 10 percent of all applicants for reasons of trustworthi- ness or security-a very high percentage when compared with other government agencies. Of the ten percent rejected, fully 75 percent were turned down because of their polygraph performance or because of the combination of this performance with Background Investigations. Only 24.5 percent were turned down because of information developed by the Background Investigation itself. In addition, many of those-ap- proximately 5 to 6 percent-who apply to CIA do not make it beyond the screening unit that receives their applications and gives them pre- liminary interviews. An additional 7 percent fall by the wayside after the initial screening and security check for reasons of suitability. In all, therefore, approximately 23 percent of those who apply to CIA do not make it. The CIA tries hard to be fastidious about periodic reinvestigations of its employees. The first two and one-half years are considered a proba- tionary period. At the end of this time, the employee must undergo an- other investigation, which includes a complete polygraphic examination, including questions about life style. Thereafter, the reinvestigations are conducted at five-year intervals. If anyone receives an overseas assign- ment, his entire file is rescreened before he is dispatched. If there is any reason to have doubts about an employee because of his behavior or be- cause of adverse information received subsequent to his employment, an investigation, again including a polygraphic examination, can be or- dered at any time. The guidelines for adjudicators are considerably more stringent than they are in other sectors of the government. For example, whereas other government departments tend to regard the use of marijuana at the best as a medical problem with no application to security, the CIA con- tinues to regard marijuana as a legitimate security issue. A basically similar procedure, with certain differences, is followed by the National Security Agency. The polygraph examination is the first Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 step in the NSA's clearance process for civilian employees, and NSA ex- plicitly uses the polygraph as a primary tool for the development of adverse information. Unlike the CIA, the NSA does not, however, re- quire military personnel attached to their agency to submit to the poly- graph unless they volunteer to do so. NSA reported to the Subcommittee that at least 95 percent of all neg- ative information on applicants came from the polygraph. Of 2,531 ap- plicants who were processed during fiscal year 1978, 775, or 32 percent, were rejected. Still more striking were NSA's statistics on clearances granted. for access to Sensitive Compartmented Information (SCI). Of 1,799 applicants whose processing was completed during fiscal year 1978, only 1,024 were granted SCI clearance while 775 were denied clearance. These results appear draconian when compared to those of the Defense Intelligence Agency which granted SCI clearances to 5,937 employees in the same fiscal year while denying clearance to only 48, or to those of the Army which granted SCI clearance to 9,790 while deny- ing it in 710 cases. No study exists of personnel investigative procedures of the FBI com- parable to the report on the intelligence community procedures that we have just quoted. But it is noteworthy that the FBI, in its comment on the report proposing the establishment of the new five-level personnel security program (see page 46), made the observation that it would con- tinue to give all applicants for employment with the Bureau a fifteen- year Background Investigation. The Departments of State, Justice, and Energy While the focus of this paper is primarily on the Office of Personnel Management and the Department of Defense, which together account for the bulk of the Federal Employee Security Program, the author spent some time with the personnel security officials in the Department of State, the Department of Justice, and the Department of Energy. The notes that follow indicate what some government departments have done to try to cope with the limitations and prohibitions imposed on them by court decisions, or bureaucratic interpretations of court decisions, and the agonizing paucity of funds for personnel security purposes. The Department of State While the State Department has all of its National Agency Checks conducted by the OPM, the bulk of its Background Investigations- roughly 1,200 to 1,400 per year-are conducted by its own corps of Spe- cial Agents. These Special Agents are highly trained: they have to go to school for nine or ten weeks before they are assigned. In addition to do- ing the personnel investigations for the Department, they have other Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 duties such as the protection of visiting VIPs, the investigation of fraud, etc. For all positions with access to Top Secret and all Foreign Service po- sitions, the Department requires a seven-year full field Background In- vestigation and for a limited number of highly sensitive posts it requires investigations of fifteen-year scope. The Special Agent reinforces the field investigation of the applicant with a one to one and one-half hour personal interview. If information is developed in the course of the ini- tial BI and personal interview that suggests the need for further investi- gation, the applicant may be called back for a re-interview that may run from one to three hours. The file is then sent to an evaluator (the equivalent of adjudicator in other departments), who makes a decision based on the information in the file. The Department's personnel security division confronts the same dif- ficulties as other government departments in trying to do the job it is supposed to do. The Privacy Act and the absence of a domestic intelli- gence data base render their National Agency Checks virtually worth- less from the standpoint of screening out subversives and extremists, and of limited utility in identifying applicants with criminal back- grounds. Drug usage and homosexuality are matters of serious concern to them, but under the "nexus principle" (It's giving us fits," one of- ficer told the author), there is frequently not much they can do when such information crops up in the course of an applicant investigation. Like all other government departments, they are bound by the laws and by the decisions of the Justice Department. Their evaluators must be cautious in arriving at any negative deter- mination (1) because the Jane Doe decision makes all of them liable to court suits if the applicant takes exception to their ruling; (2) because under the Privacy Act, applicants can access not only the investigative file, but also the evaluator's report; and (3) because, in the case of liti- gation, they know that the Justice Department lawyers are reluctant to defend, and there must always be some uncertainty about the financial costs to the employee if the case actually does come to court. The pres- ent position is that the Justice Department will defend an investigator or a personnel security official if he has not himself acted in violation of the law. The trouble is that there are differing interpretations of the law, and the conscientious personnel security officer would, in some cases, interpret the law in a manner not acceptable to the Justice Department because he considered the applicant a serious security risk or otherwise unworthy of government employment. There are many such cases involving various government departments before the courts today-this despite the fact that the government bends over backwards to grant administrative due process to disap- pointed applicants. In the case of any adverse decision, the evaluator's report will probably go for review to the division chief. If there still re- Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 mains some question, it may be referred for final review to the director of personnel security for the Department. And if the adverse determi- nation still stands, the applicant can ultimately appeal his case to the Undersecretary for Management. Those in charge of personnel security at the State Department have strong feelings about the advisability of keeping waivers of pre-employ- ment Background Investigations to a minimum, and they say that the Reagan Administration has been pretty good about not pressuring them for such waivers. They strongly endorse the importance of pe- riodic reinvestigations at five-year intervals and they try to conduct such investigations for the most sensitive positions. But they are frank in admitting that, because of budgetary limitations, they are not able to meet the problem as well as they would like to. They thought that they might be conducting regular reinvestigations of perhaps 10 percent of the Department's employees who have secret access clearances. When such investigations are conducted, they generally include a review of the file, an updated NAC, a credit check, and personal checks with the employee's last supervisor and perhaps one or two developed sources. They express concern about the Defense Department's acceptance of the IBI (Interview-oriented Background Investigation) because they are afraid that, if its use becomes the accepted practice in a department as sensitive as DOD, the pressure will be on other sensitive government agencies to economize in the manner of DOD. From their own experi- ence with background interviews, they consider them very useful as adjuncts to full field Background Investigations, but definitely not a substitute for them. In the case of the State Department, as in the case of several of the other agencies with whom interviews were conducted, one has the im- pression of a dedicated group of professionals trying hard to do an ef- fective job under limitations that make it utterly impossible. The Department of Justice The Department: of Justice (DOJ) has its own Personnel Security Reg- ulations. The regulations currently in use, published on August 18, 1978, bear the identifying number DOJ 2610.2. Under these regula- tions, within the limitations imposed by existing law, the Department appears to be doing a conscientious job of trying to optimize an exceed- ingly frustrating and difficult situation. Attorneys, law clerks, Schedule C employees, and all employees in the office of the Attorney General and his senior aides, as well as all po- sitions in the FBI, are investigated by the FBI itself. Applicants for all other positions are investigated by the CSC/OPM, unless the OPM del- egates the responsibility for the investigation to an alternate investiga- tive agency. Unlike most other departments in government, the Department of Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 Justice has only nonsensitive and sensitive positions-the sensitive be- ing interpreted in a manner which embraces both sensitive and critical- sensitive as these terms are used by the OPM. The section defining sen- sitive positions within the DOJ is much more comprehensive than the comparable definitions in the personnel security regulations of most other agencies.* However, even in the Justice Department, there have been problems in defining sensitive positions and then designating them. Under Department orders promulgated several years ago, for ex- ample, a sensitive position is defined as one where the occupant has ac- cess to national security information. By common-sense standards, however, there are many highly sensitive positions where the occupants do not have such access. This includes law enforcement officers, Drug Enforcement Agency (DEA) employees, and U.S. marshals and their supporting clerks who in some cases may be involved in very sensitive operations such as witness protection. The officers in charge of the personnel security program of the De- partment of Justice are keenly aware of the gravity of the problem throughout the government, not excluding their own department. They point out that their own regulations still take a strong stand against the hiring of applicants to fill sensitive positions prior to the completion of full field Background Investigations, without the signature of the head of the organizational unit to which the applicant is to be assigned, af- firming that the waiver is in the national interest. This certainly puts them significantly ahead of most government agencies, where the waiver of pre-employment investigation has, as we have pointed out, now become the general rule. They also insist that, despite the limitations of funds, they try hard to conduct periodic reinvestigations of incumbents of all sensitive posi- tions at intervals of five years as is required by the regulations. They note, however, that in their own department, as in all other depart- ments, there is a built-in conflict between the personnel division and the division in charge of personnel security. Officials in the personnel division are primarily interested in filling vacant positions with bodies that can put out an acceptable performance. They are not oblivious to the requirements of personnel security; on the other hand, because their positions demand no such competence, they have only limited knowledge and understanding in this area. Conversely, officials in the division of personnel security are concerned primarily with the require- ments of security and are perhaps inclined to underestimate the prob- lems of personnel directors. One of the core problems, they feel, is the need for a firm and clear definition of sensitive positions. At the very least, it is their belief, the definition should be stretched to cover all positions directly involved in Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 law enforcement activities. How difficult the situation has become is apparent from the remarks of one prominent Justice Department lawyer, who said that, "As things are today, in order to disqualify someone who has a revolutionary record for employment, we would just about have to be in a position to prove a charge of treason against him." The Department of Energy: Problems of Personnel Security in Atomic Energy Installations The state of our personnel security program in our atomic energy in- stallations calls for special consideration because most of the installa- tions and activities covered by the program operate with contract employees. These activities include the research and development, manufacture and testing of nuclear weapons, production of special nuclear material, and the Navy's nuclear reactor program. As far as its own employees are concerned, the Department of Energy (DOE) appears to have reasonably tight procedures-at least somewhat tighter than in many other sectors of the government. To a large de- gree, this is because of the provision written into the Atomic Energy Act of 1954; Section 145, for example, stipulated that nothing in any execu- tive order shall conflict with the provisions of the Act, while Section 161B authorized the Commission to promulgate its own rules and regu- lations designed to protect the security of its operations-including the physical security of installations and special nuclear materials; to pro- tect the health of its employees; and, in general, to minimize the danger to life and property. In other government agencies, the classification of information is an administrative action. In the case of the Atomic En- ergy Commission /Department of Energy, restricted data is classified by law. The Atomic Energy Act of 1954 requires that all contractors and con- tractor employees be the subjects of security checks. The Atomic En- ergy Commission (now the Department of Energy and the Nuclear Regulatory Commission) was made responsible for determining the scope of these checks, while the CSC/OPM has the responsibility for conducting the security checks. EO 10450 calls for an NACI as the min- imum investigation for federal employees. However, in the case of the many thousands of contractor personnel who work in noncritical-sensi- tive positions, the Atomic Energy Commission interpreted the Atomic Energy Act as meaning that only government employees had to be cov- ered by NACIs and that other contract personnel at this level could be covered by National Agency Checks only. This resembles the situation in DOD, where contractor personnel have access to Secret on the basis of an NAC. Such an arrangement, as has been pointed out several times, has become almost completely worthless because of the destruc- tion of virtually the entire domestic intelligence data base. There are, needless to say, many thousands of critical-sensitive posi- Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 tions in our atomic energy installations that are filled by contract em- ployees. In recent years the filling of such sensitive positions has required an average of approximately 15,000 Background Investiga- tions per year, which represent roughly two out of three of all Back- ground Investigations conducted by the OPM for all government agen- cies. These investigations are conducted at an average cost today of $1,600 per case, for a total expenditure on personnel security of $24.3 million. Here again, because of the limitations that affect all sectors of the federal establishment, we wind up with what might be described as a general suitability investigation devoid of any significant national secu- rity component. Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 Three Areas of Special Weakness Waiver of Pre-employment Field Investigations for Sensitive Positions From a personnel security standpoint, one of the most dangerous practices that has established itself over the past two decades is the widespread resort to the waiver of full field investigations prior to filling critical-sensitive positions with applicants or appointees. Executive Order 10450 provided for the use of such waivers only "in case of emergency"; in each case the head of the agency had to approve the appointment as "necessary in the national interest." The justifica- tion universally invoked in defense of this increasingly widespread prac- tice is that the OPM's Division of Personnel Investigation (DPI) generally took from 80 to 110 days to complete the average full field in- vestigation and that this delay greatly complicated the hiring process. In the interest of moving ahead and filling vacant critical-sensitive posi- tions, a majority of the agencies apparently now feel that the cost of leaving such positions unfilled for several months outweighs any risk that may be involved in a post-appointment investigation. How widespread the waiver practice has now become may be gauged from the following table, reproduced from a survey put out in Septem- ber 1980 by OPM's Office of Internal Evaluation. Percentage of Background Investigations Processed Post-Appointment 6-1-80 to 7-15-80 Agriculture 98% (42 of 43 cases) FCC 100% (2 of 2) HHS (HEW) 96% (73 of 78) IDCA (AID) 34% (23 of 68) Justice-BOP 94% (137 of 146) Justice-DEA 32% (14 of 44) NSA* 67% (6 of 9)* SEC (no reports during this period) SBA 90% (9 of 10) DCT 90% (26 of 29) VA 100% (4 of 4) *The percentage given for NSA is really misleading because OPM processes only guard positions for the Agency. NSA processes the great majority of its own applicants and grants very few waivers for sensitive positions. Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 When waivers of pre-employment investigations have become the general rule, it is obvious that the heads of the agencies no longer ad- here to the requirement that each such appointment be justified as "necessary in the national interest." Nor do they follow the require- ment of both OPM and EO 10450 that, where there is a waiver of pre- employment investigation, the request for investigation be filed no later than three days from the day of appointment. Waivers are bad practice, from both the standpoint of weeding out se- curity risks and the standpoint of weeding out incompetents, criminals, and other undesirable elements. It is self-evident that most administra- tors find it a much more difficult exercise in interpersonal relationships as well as government-employee relationships to dismiss an employee after he has been in the office for two or three months than they would to deny him employment in the first place if a full field investigation turned up information justifying denial or raising serious questions of suitability. In addition, to dismiss someone after appointing him to a sensitive position is also a reflection on the judgment of the selecting administrator. The study from which the above table was reproduced points out that "the three agencies which process a substantial propor- tion of their Background Investigations reports prior to appointment (IDCA, DEA and NSA), reported making other than a favorable deter- mination at a rate nearly double that of the other eight agencies." (Em- phasis in the original.) The waiver of pre-employment field investigations has over the years been the subject of recurring complaints by officials of the CSC/OPM and the Department of Justice concerned about sound personnel secur- ity practices. For example, on March 7, 1972, Robert E. Hampton, Chairman of the CSC, sent a three-page letter to the heads of all agen- cies strongly criticizing the waiver practice that had become common in many agencies and urging a return to the pre-employment full field in- vestigation as the normal procedure. The letter quoted the following paragraphs from a communication sent earlier that year by Robert C. Mardian, Assistant Attorney General, Internal Security Division, De- partment of Justice: I question the wisdom of such a practice at any time, and I am par- ticularly disturbed that such a practice apparently is being utilized on a fairly widespread basis. The fact that an individual is not permitted ac- cess to classified information pending completion of a full field investiga- tion only deals with one aspect of the problem. As you well know, access to classified information is but one of the criteria utilized for designating a position as critical-sensitive. A person in such a position may very well be in a position to make or effect policy decisions of the utmost impor- tance.... The Department of Justice considers it extremely important that ap- plicants for or appointees to critical-sensitive positions receive a full field investigation prior to appointment... . Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 The Hampton letter pointed out to the delinquent agencies that a number of agencies, including the Department of Justice, had resorted to waivers only on rare occasions, and had found it "both feasible and advantageous to conduct pre-employment full field investigations." In addition to the obvious advantages from a security standpoint, the let- ter said, pre-employment investigations also serve the selection process by helping to develop advance information about general abilities, growth potential, trustworthiness and personal integrity, and other qualities that call for consideration. But despite the almost universal recognition of the dangers of post- employment investigations, the practice has become more widespread, year by year, until today it has become the norm in many government agencies. Under its current director, Mr. Peter Garcia, DPI has now reduced the average time requirement for a full field investigation to 73 days and hopes to get it down to 60 days. However, the government agencies queried by the Office of Internal Evaluation indicated that DPI would need to provide 30-day or better service before they would be willing to delay appointments pending completion of investigation. This attitude on the part of the agencies really begs the question. It must be emphasized again that when we talk of full field "Background Investigations" we are really talking of the very small percentage of government positions that have been designated "critical-sensitive." For such investigations, it makes no sense to aim for a rigid 30-day deadline. A majority of the cases are simple enough to be processed in 30 days or even less-especially if the applicants can be persuaded to voluntarily provide copies of their school records, birth records, their divorce papers if they are divorced, and other documents that are not readily available to the investigator, but about whose substance he must seek to be informed. On the other hand, there are many very com- plicated cases involving subjects who have held numerous positions in different cities and different countries. Such cases may require more than 60 days, even with the best of effort. And if adverse information is turned up in the course of the investigation, checking it out carefully in the interest of fairness is a process with unpredictable time requirements. There are no shortcuts to sound personnel security procedures-as was dramatically demonstrated recently by the forced resignation of Max Hugel, who had been appointed director of CIA's covert intelligence operations after an expedited seven-day background investigation. So, while it is proper and helpful to aim for a mean deadline of 30 days, this deadline should not be too rigidly construed. Abandonment of Reinvestigations The Federal Personnel Manual, as has been pointed out, calls for pe- riodic reinvestigations of employees in sensitive positions at five-year in- tervals. The Manual has this to say on the subject: Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 The incumbent of each critical-sensitive position shall be required, five years after his appointment, and at least once each succeeding five years, to submit an updated personnel security questionnaire to the appropriate security officer in his department or agency. This questionnaire shall be reviewed, together with the personnel file of the incumbent, previous reports of investigation concerning him, and any other appropriate docu- ments. A determination shall then be made regarding what further ac- tion, if any, is appropriate; for example, a check of local police and credit records, a national agency check, or an updated full field investigation. It would be folly to assume that from the standpoint of the national security, one can stop worrying at the point where an applicant has been employed on the basis of a positive Background Investigation. Common sense suggests the importance of periodic rechecks, and the five-year interval stipulated by EO 10450 and by the Federal Personnel Manual is not unreasonable. There is general agreement among personnel security professionals on the importance of regular periodic reinvestigation. Even people of good background and apparently solid character are frequently vulner- able to financial pressures, sexual enticement, or blackmail. Indeed, employees who pass their Background Investigations with flying colors may succumb to such vulnerabilities. As matters stand today, however, the reinvestigation, or the "update" investigation as it is sometimes called, is far more frequently honored in the breach than in the observance. The Department of Defense, as has been pointed out, has indefinitely suspended reinvestigations in an ef- fort to reduce its investigative backlog. OPM, which conducts reinvesti- gations at the request of most other government agencies, reports a dramatic falling off in the number of such requests received from key departments and agencies in recent years. Between 1977 and 1981, the number of requests received from GAO fell from 277 to 84; the State Department from 114 to 50; NASA from 254 to 151. The figures for previous years are not available, but there is no question that they were substantially greater than for 1977. This is an area where dramatic improvement would be possible, given a combination of a firm administrative directive and the funds necessary to restore the entire reinvestigative program to an adequate level. Americans Employed by International Organizations On January 9, 1953, as one of his last acts in office, President Truman promulgated Executive Order 10422, which set up, by agreement with the United Nations, procedures governing the investigation of United States citizens either employed or being considered for employment in the Secretariat of the U.N. and its various agencies. The action was Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 motivated by the embarrassment caused, both to the State Department and the U.N., when 27 Americans in the employ of the U.N. were called before the Senate Subcommittee on Internal Security during the course of 1952, and repeatedly invoked the Fifth Amendment in response to questions about communist associations. The employees in question were dismissed by Secretary General Trygve Lie. When they appealed their case, the Secretary General set up a commission of internationally prominent jurists to consider their appeal and also to consider the larger matter of how to avoid such situations in the future. Based on recommendations of the Commission, there emerged an agreement be- tween the Secretariat and the United States government under which the U.N. committed itself not to employ any American national without first submitting his name for a background check by the United State government. The Commission of Jurists denied the appeal of the dismissed em- ployees and recommended against reinstatement. Speaking about the uniform use of the Fifth Amendment by the plaintiffs, the Commission said: In our opinion, a person who invokes this privilege can only lawfully do so in circumstances where the privilege exists. If, in reliance upon this privilege, a person refuses to answer a question, he is only justified in do- ing so if he believes or is advised that in answering he would become a witness against himself. In other words, there can be no justification for claiming this privilege unless the person claiming the privilege believes or is advised that his an- swer would be evidence against himself of the commission of some crimi- nal offense. It follows from this, in our opinion, that a person claiming this privilege cannot thereafter be heard to say that his answer, if it had been given, would not have been self-incriminatory, or, if not, he has in- voked his constitutional privilege without just cause. As, in our opinion, he cannot be heard to allege the latter, he must, by claiming privilege, be held to have admitted the former. Moreover, the exercise of this privilege creates so strong a suspicion of guilt that the fact of its exercise must be withheld from a jury in a criminal trial. The Commission of Jurists advised the Secretary General of the United Nations that he should regard it as of the first importance to re- frain from employing any United States citizen who he has reasonable grounds for believing is, or is likely to be, engaged in espionage or sub- versive activities against the United States. The Commission further advised the United States that it should make available to the Secretary General information on which the Sec- retary General might make a reasonable determination as to whether sufficient grounds existed for believing that a U.S. citizen had engaged, or was likely to engage, in espionage or subversive activities. Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 Two paragraphs of the Preamble to EO 10422 are worth quoting: WHEREAS in the participation by the United States in the activities of the United Nations it is in the interest of the United States that United States citizens who are employees of the Secretariat of the United Nations be persons of the highest integrity and not persons who have been, are, or are likely to be, engaged in espionage or subversive activities against the United States; and WHEREAS it is in the interest of the United States to establish a pro- cedure for the acquisition of information by investigation and for its transmission to the Secretary General in order to assist the Secretary General in the exercise of his responsibility for determining whether any United States citizen has been, is or is likely to be, engaged in espionage or subversive activities against the United States... The Executive Order established an International Organizations Employees Loyalty Board inside the Civil Service Commission. This board was given the authority in cases referred to it of inquiring into the loyalty to the government of the United States of U.S. citizens who were either employed, or under consideration for employment, by the seven- teen United Nations organizations or the 63 other international organi- zations of which the United States is a member. The United States, like other member nations of the United Nations, is provided with a certain quota of the U.N. Secretariat staff. The quota, which is based on a rather complicated formula, will vary from year to year. Last year this quota came out to 17 percent of the total number of staff positions. Of the 508 professional positions provided for by the American quota, quite a number were in senior policy areas. While they are not employees of the American government, their em- ployment impinges in a very direct way on the national security-not only because U.N. activities are important but also because the KGB is formidably represented in the U.N. apparatus. It was only reasonable, therefore, that President Truman and the U.N. Secretariat should have decided that it was in their mutual interest to set up a program provid- ing for background investigations of American applicants for U.N. em- ployment. Under the agreement, the U.N. Secretariat forwarded to the State Department copies of all applications for employment by U.S. citizens. The State Department had the Civil Service Commission con- duct a Background Investigation; adverse findings were submitted for the consideration of the International Organizations Employees Loy- alty Board with provision for due process; and the results of the investi- gation were forwarded to the U.N. The same procedure was followed in the case of other international organizations. The total number of ap- plicants processed annually has approximated 1,500 in recent years. In December 1975, EO 10422 was modified by President Gerald R. Ford in Executive Order 11890. While most of the original language of Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 EO 10422 remained intact, the revision substituted a much reduced level of investigation, the NAC, for the standard full field background investigation that had previously been required. As has been repeatedly pointed out in this monograph, today's NAC has very little substantive significance. Indeed, as a background investigation bearing on loyalty, it is close to worthless. Actually, the NAC now required for applicants for employment by international organizations is substantially less than the standard NAC. Apparently the State Department took the stand that it would serve no purpose to gather background information dealing with suitability be- cause the only question really at issue was the applicant's loyalty. In line with this, the CSC/OPM was instructed not to check criminal his- tory files and not to make fingerprint checks. This is a questionable ap- proach to the problem because it leaves the entire matter of suitability checks to the international agencies-which, for obvious reasons, have far more difficulty than the U.S. government in obtaining law enforce- ment information and other information bearing on character and in- tegrity. It is also a questionable procedure from a security standpoint because, as we have pointed out, a criminal background makes an em- ployee more vulnerable to recruitment as a result of blackmail or mone- tary enticement. The international organizations are very important places, and many of the positions being filled are highly important positions. It is not just the U.N., but an entire phalanx of related organizations like the World Bank, the World Health Organization, the International Monetary Fund, etc. For the year ending September 30, 1981, OPM processed the NACs of 1,130 American citizens who applied for positions with the U.N. and the other international organizations. This figure by itself provides some indication of the scope of the problem. -It is of vital im- portance that the United States government assure itself of the basic loyalty of all those who move into such positions. It is of almost equal importance, because every American employed by an international or- ganization is in effect an ambassador of his nation, that criminals and scoundrels of various varieties be flagged down before they are ap- pointed to positions from which it would be difficult to remove them. In further harmony with the general tendency to downgrade person- nel security investigations, the form questionnaire that applicants for positions in international organizations were obliged to fill out for the State Department was reduced from five pages to one page. One of the reasons given for retreating from a full field BI to a demi- NAC was that, with the Civil Service Commission's investigative back- log running from 90 to 120 days, it was unreasonable to impose such delays on the personnel hiring process in the U.N. It is true that, from an administrative standpoint, a 120-day delay in getting clearance for a U.N. applicant would create all kinds of difficulties. But if Congress Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 thinks it is important that we should be able to assure ourselves of the loyalty of the American contingent of professionals at the U.N., then clearly the solution is to provide OPM's Division of Personnel Investi- gations with the manpower necessary to keep their investigations on a 30-day basis. Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 Measures Necessary to Resuscitate the Program So much damage has been done that, even with the most energetic effort, it is going to be a long and difficult task to recreate a viable Fed- eral Employee Security Program. In the paragraphs that follow we shall examine some of the recommendations that have been made and out- line those measures that the author considers essential to the revitaliza- tion of the program. Despite a potentially harmful overemphasis on cost cutting and effi- ciency and inadequate emphasis on quality, the General Accounting Office in a series of reports has made some recommendations that merit attention. In its last report ("Costs of Federal Employee Security Investigations Could and Should Be Cut") dated August 31, 1979, the GAO recommended "that the Congress consolidate into one law the authority to investigate and judge the suitability of federal employees, including the potential of employees in sensitive positions to impair na- tional security." It also said that Congress should consider: ? Restrictions imposed on personnel investigations by other laws such as the Privacy Act of 1974 and court decisions protecting in- dividuals' constitutional rights. ? Whether OPM should investigate occupants of nonsensitive posi- tions only to determine prior criminal conduct, leaving to employ- ing agencies the responsibility for assessing applicants' efficiency. ? The need to define, in a manner acceptable to the courts, disloyal acts which should bar federal employment. ? The scope of investigation needed for the several levels of security clearance granted federal employees. ? Whether there is a need in the legislation for provisions to aid OPM to obtain local law enforcement information: for example, reim- bursing local law enforcement agencies for supplying information, receiving assistance from federal law enforcement agencies, or clarifying OPM's legal authority to have local arrest information. Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 These recommendations had originally been offered in a previous re- port by GAO. GAO had also recommended in a prior report that, in the interests of economy and the application of uniform investigative standards, consideration be given to consolidating personnel investiga- tions under one agency. In its August 31, 1979, report it seems to have backed off somewhat from this last position. On the one hand, it points out that "costs may increase as a result of consolidation because some agencies have indicated a strong desire to retain their investigators for other work, and the Office of Personnel Management may need more staff." On the other hand, it appears to have been impressed by the re- sistance to the consolidation proposal offered by most of the agencies that today conduct all or even some of their own investigations. These include the Department of State, the FBI, the Bureau of Engraving and Printing, and the constituent law enforcement agencies of the Treasury such as the IRS, the Secret Service, the Customs Service, and the Bu- reau of Alcohol, Tobacco and Firearms. "These agencies," said the 1979 report, "explain that their positions required special investigative work and that their investigators were more qualified and had access to more criminal and fiduciary records than OPM." While this may very well be true with regard to criminal and fiduciary matters, it is probably not true with regard to the experience of their investigators in the na- tional security field. While conceding that applicants for certain sensitive positions today undergo inadequate investigation, the GAO report argued that in many cases the degree of investigation exceeds the requirement of the posi- tion and that much money could be saved by abbreviating and stream- lining investigations, encouraging the sharing of investigative resources by the federal agencies and by having OPM adopt some of the demon- strated. improvements that have already undergone testing in other agencies. Finally, it urged that OPM move to develop adequate classifi- cation criteria-that is, criteria defining which positions require which degree of investigation. The author of this paper, after long consideration, has come to the conclusion that the advantages of centralizing personnel investigations and adjudications far outweigh the disadvantages. The DOD, the intel- ligence community, the FBI, and other segments of the law enforce- ment community have requirements that exceed and are very different from the requirements of other government agencies. It would make sense, therefore, for these agencies to continue to operate their own personnel security programs. However, once we have made these excep- tions, the case for consolidating the personnel security apparatus be- comes compelling. It is not just a matter of applying uniform investigative and adjudica- tive standards, important though this is in its own right. The consolida- tion of personnel investigations and adjudications under a single agency Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 would also save money at the same time as it improved the quality of the employee security program. Clearly, it will be easier to maintain high standards for investigators and adjudicators, if the program is in the hands of a single agency, than it is today with the adjudicative pro- gram fragmented on a government-wide basis. Changes Proposed by the Interagency Task Force In response to the GAO report, the OPM set up an interagency task force to study the implementation of the GAO recommendations. The task force report, which has now been finalized, centers around a pro- posal for a new five-level system for designating the sensitivity of federal positions. As has been pointed out, OPM and the other government agencies currently conducting investigations operate on the basis of a three-level system in which the designations are nonsensitive, noncritical- sensitive, and critical-sensitive. The chart below lists, in the words of the report, the five levels of the proposed system and the degree of in- vestigation proposed for each level. Level I Opportunity for effecting limited but reversible damage to the national interest. Level II Opportunity for effecting significant but reversible damage to the national interest. (Level 11 has access to national defense materials through Secret.) Level III Opportunity for effecting serious but generally reversible damage to the national interest. (Involves duties concerning matters of considerable importance to the national defense; rights and interests of individuals; protection of property and lives; enforcement of federal laws, regulations or rules...; or the economic well- being of the nation.) Level IV Opportunity for effecting exceptionally grave, not easily reversible damage to the national interest. (Involves duties concerning matters of clearly major importance to the national defense, with access through Top Secret; rights and interests of individuals; protection of lives; enforcement of federal laws; economic well-being of the nation; general public safety and internal security; or continued effectiveness and integrity of the federal service.) National Agency Check and Inquiries (NACI), supplemented by a credit check for financial type positions. Basic NAC plus Limited Background Investigation (LBI), involving one year personal coverage plus four years' written inquiry plus credit check. Intensive coverage for the most recent year to include in-person interview of a minimum of three knowledgeable witnesses. Basic NAC plus Background Investigation (BI) of five years' scope, or back to age 18, with at lease three years' coverage. Credit check. Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 Basic NAC plus Special Background Level V Opportunity for effecting inestimable, not easily reversible Investigation (SBI) of 15 years' damage to the government's scope, or back to 18th birthday. ability to effectively conduct the Fifteen-year employment check; public's business domestically; five-year credit check; five-year retain the public's confidence residence check; 15-year and trust; defend the nation from education check, including three foreign aggression; carry out the years' personal coverage; five- nation's foreign policy objectives; year foreign travel check, plus or protect against internal full coverage for overseas subversion, espionage, sabotage residences of more than five years. or other illegal acts which threaten the public's safety or internal security of the nation. It was the thinking of the task force that the vehicle for implementing the new five-level system should be a new executive order to replace Ex- ecutive Order 10450, as amended, which is, by general consent, now outdated. The task force also felt that in anticipation of a new executive order, the participating agencies should move immediately to imple- ment the new five-level system. Although OPM has made no formal decision to move to the five-level system, it is clear that there is widespread support for it. Certainly, a fifteen-year background check appears in order for Level V positions, and the degree of investigation required in the case of Level IV also ap- pears adequate. But old hands in the field of personnel security share the opinion that the degree of investigation called for in the cases of Levels 1, II, and III is inadequate. In particular, they express misgiv- ings about the proposal to reduce the NACI to an NAC in the case of Level I positions. Foregoing written inquiries, they point out, would make it impossible to find out whether the subject is who he claims he is, or has lived where he said he lived, or has done what he said he has done. Serious consideration should be given to firming up the investigative procedures in the proposed five-level system by ? increasing the NAC to an NACI in the case of Level I, ? adding an in-depth subject interview to the NACI in the case of Level II, ? substituting a standard Background Investigation (BI) in the case of Level III, ? adding an in-depth subject interview to the Background Investiga- tion in the case of Level IV, ? adding an in-depth subject interview to the Special Background Investigation (SBI) in the case of Level V. Subject interviews, it should be pointed out, have been found to be particularly effective by the State Department and the intelligence agencies as well as the Defense Department. Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 Essential Requirements I: Some Areas Where "Quick Fixes " Are Possible After this recitation of facts, it would be natural to ask if our Federal Employee Security Program was not beyond repair, or at least beyond repair in any reasonable time frame. Certain of the most basic repairs are going to be very difficult and time-consuming because they will re- quire legislation. There are, however, a number of "quick fixes," espe- cially in the case of the suitability program, that can be made without serious delay-a few months, a year, perhaps a bit longer-by adminis- trative action only, without the enactment of new legislation. Broadly perceived, the Federal Employee Security Program, as has been pointed out, really consists of two parts. One part has to do essen- tially with suitability; the other part has to do with loyalty. There is, however, a strong overlapping between the two because those who are untrustworthy or engage in "criminal, dishonest, infamous or notori- ously disgraceful conduct," or drink excessively, or use drugs are clearly more vulnerable targets for the many KGB recruiters who are active in this country, or more liable to be careless with confidential information or documents to which they have access. In fact, the majority of those convicted of espionage since World War II did not become agents for ideological reasons; they succumbed rather because of monetary or sex- ual enticements or blackmail. The other part of the personnel security program has to do with secu- rity strictly perceived-that is, in the sense of screening out elements whose associations with organizations found to be subversive rendered them unsuitable for employment on national security grounds. Which part of the personnel security program is more important would be very difficult to state in quantitative terms; both parts are important. While the mercenary agents are more numerous than ideo- logical agents, the long-term mole who enters government as a junior employee and over the years rises to a policy-making position of great importance unquestionably constitutes a much greater danger in terms of his capacity for damage to the national security. (Harry Dexter White, who served as Assistant Secretary of the Treasury under Roosevelt, is a prime example of the damage that can be done by a solidly entrenched mole. Kim Philby in Britain is another.) While all quantification is dif- ficult, it is probable that in time of peace, the suitability side of the per- sonnel security program-properly conducted-is as important or even more important. Today, this suitability program is in a shambles. How- ever, if it ever came to war, we would almost certainly find that we face far greater dangers because of our abandonment of a personnel security program per se. Reconstitution of the personnel security program proper is bound to Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 take many years because there are a number of major legislative and at- titudinal obstacles to overcome. But there is no reason why those in charge of personnel security cannot make a number of "quick fixes," on a purely administrative basis, that would in reasonably short order enhance the quality of our personnel suitability program and even of the personnel security program. Administrative directives not supported or required by law can very easily be replaced by directives from the new administrators. Hand- books prepared under previous administrations can be replaced by new handbooks designed to enhance the quality of our personnel suitability program. In the paragraphs that follow, some of the possible "quick fixes" are discussed. [A notation at the end of each section indicates whether it relates to the suitability program or the personnel security program or to both programs.] I. The lax 1975 suitability guidelines for adjudicators, currently in use by OPM, should be completely rewritten. 2. The Office of Personnel Management can also do a good deal to bring about an early improvement in the situation by promulgat- ing new directives that have the effect of nullifying at least the more questionable of the restrictive directives put out by the Civil Service Commission and the OPM on the advice of counsel in re- cent years. Obviously, these new directives would have to be in compliance with Supreme Court decisions, but, where doubt exists, the issue should be resolved on the side of improved personnel security. No concession should be made to diminished personnel security procedures unless these concessions are specifically or- dered by the courts. [Personnel Security and Suitability] 3. The Office of Personnel Management and the Justice Depart- ment must team up to represent the interests of the Federal Em- ployee Security Program before the courts far more vigorously and effectively than heretofore. There are admittedly some points where privacy rights come into conflict with the right of the gov- ernment to safeguard itself against the danger of infiltration by elements ideologically committed to its destruction or in the service of hostile intelligence. The problem is to strike a balance between these two "rights." If privacy rights are zealously repre- sented in a whole series of court cases related to the Federal Em- ployee Security Program, and if there is no comparably forceful presentation of the security requirements and rights of the United States government, inevitably the judges are going to come down on the side of absolute privacy. [Personnel Security and Suitability) Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 4. The serious problem inherent in the waiver of pre-employment Background Investigations for critical-sensitive positions will al- most certainly prove to be completely untractable unless the agencies charged with the responsibility for Background Investi- gations are provided with adequate personnel to keep their workload on a current basis. Government departments and agencies have indicated that they would be willing to make pre- employment investigations the rule rather than the exception if the waiting time for an investigative report could be reduced to 30 days. But so long as the average report takes 90 days or more to produce, personnel directors, anxious to fill important posi- tions, are almost certain to compromise on the call for a full field Background Investigation before an applicant can be entered into a critical-sensitive government position. In the latter part of 1981, the OPM investigative staff was sharply reduced in strength. The justification for this was that the government was hiring far fewer employees on a monthly basis. Without the cut- backs, OPM might have been able to liquidate its backlog and put its investigative program on a 30-day basis. With the cut- backs, the chances are that the backlog will remain as it is today. [Personnel Security and Suitability] 5. The implementation of a more effective Federal Employee Secu- rity Program not only requires more investigators than are cur- rently servicing the various agencies but also calls for more intensive training of investigators and adjudicators. The Project 10 Report of February 1975 placed very heavy emphasis on the matter of training. In the case of investigators, it called for a minimum of two weeks of formal classroom instruction and on-the-job train- ing encompassing at least the first year of duty. This was to in- clude "an initial period during which the trainee accompanies an experienced investigator to learn by example; a succeeding period during which the trainee is accompanied by an experi- enced investigator who observes his work and coaches him on proper technique and approach; a period of close review of com- plete work, tapering off as the trainee gains experience; frequent supervisory consultations on the trainee's progress"; participa- tion with other trainees in periodic conferences; and repeated re- fresher training courses. The proposed investigator training program outlined by the Project 10 Report was almost encyclopedic in its coverage. It in- cluded general indoctrination on the agency investigative mis- sion and the government-wide investigations program; full field Background Investigations; information sources, witness selec- tion, and interviewing techniques; treatment of loyalty-security Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 issues; subject interviews; prohibited areas of inquiry or prac- tice; constitutional rights, civil rights, and privacy considera- tions; suitability and misconduct investigations; indoctrination in adjudication principles; work planning, office procedures, and travel and mileage conservation; investigatory attitudes, ap- pearance, and conduct; and practice sessions in interviewing and reporting. The Project 10 Report also discussed at length the question of adjudicator qualifications and training. Adjudicators perform a function of very great importance. If they are unqualified or in- adequately trained, they may make personnel decisions which are potentially damaging to the national security. Conversely, an ill-prepared adjudicator may do injury to the rights of applicants because he does not know how to evaluate the evidence provided by the investigative staff. Most of the government agencies sur- veyed reported that they did not require prior training of adjudi- cators, that they received their training on the job. In addition, the survey conducted revealed no discernible uniform pattern of supervision for adjudicators. The Report recommended that persons selected as adjudicators should not only possess in high degree the attributes of integrity, maturity of judgment, objec- tivity, and discretion, but that they should have "varied experi- ence in investigations, security, suitability, or field, requiring significant skills in the organization and evaluation of evidence;" a familiarity with the legal framework within which adjudica- tions are conducted; and a "general knowledge of subversive or- ganizations, their ideologies, sources of information on these organizations, and hostile intelligence techniques." The Report also recommended that all adjudicators be required to attend an intensive basic training course in adjudication and that an effort be made to standardize adjudicator selection criteria, training, and supervision. Needless to say, investigator training and the selection, train- ing, and supervision of adjudicators fall far behind the quality recommended by Project 10. [Personnel Security and Suitability] 6. The Civil Service Commission witnesses who appeared before the Senate Subcommittee on Criminal Law in 1978 made the point that over the previous ten years not a single applicant had been denied appointment to the federal service on the basis of reason- able doubt as to loyalty, and that from 1956 to 1968 only twelve applicants had been denied employment on this basis. This, they said, was because of a reluctance over the entire history of the Federal Employee Security Program to stigmatize individuals as "loyalty risks" or "security risks." There were, however, over Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 500 applicants who were denied employment and employees who were dismissed on general suitability grounds, when the real rea- son was the existence of serious doubt as to loyalty. Many years ago some of the hardest heads in the Federal Em- ployee Security Program had come to the conclusion that it was self-defeating to deny employment on findings that an applicant was a "loyalty risk" or "security risk." They proposed, instead, that applicants should be rated either "suitable" or "unsuitable." An applicant could be unsuitable for reasons related to insubor- dination or inadequate performance or a criminal background record; or he could be unsuitable because he was a chronic drunk or a sexual pervert or a person afflicted with wanton care- lessness-someone, in short, whose personal conduct under the old rules would have stigmatized him as a "security risk"; or he could be unsuitable because of membership in or a sympathetic association with fascist, communist, or other subversive organi- zations or of organizations committed to the use of force or vio- lence to deny other citizens their constitutional rights. The various reasons justifying rejection of the applicant would have to be separately and specifically set forth. The applicant would have to be informed of the charges or allegations and provided with an opportunity to defend himself, and with a further opportunity to appeal if he is turned down. But an adverse determination would simply state that the applicant had been found "unsuitable" for federal employment-not that he had been turned down as a "loyalty risk" or "security risk." [Personnel Security] 7. Consideration should be given to using the polygraph for critical- sensitive positions throughout the United States government. [Personnel Security] 8. The investigation of employees of the U.N. and other interna- tional organizations called for by EO 10422 should be upgraded from an NAC to a full field Background Investigation. [Person- nel Security] 9. DOD should, at the earliest possible date, abandon the Interview- oriented Background Investigation (IBI) and return to the re- quirement of a full field Background Investigation for all those with access to Top Secret or higher. [Personnel Security] 10. Some formula must be found for recasting the nexus provision so that agencies are not placed in the ridiculous position of having to hire employees whom they have many valid reasons for not hiring, but about whose flaws and weaknesses they cannot pro- vide a definite nexus to ability to perform the job. [Suitability] Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 11. Despite the difficulties created by the long-term task of reestab- lishing a comprehensive domestic intelligence data base, the Ad- ministration, basing itself on the Supreme Court's decision in Law Students Research Council v. Wadmond et al., should instruct the Department of Justice to prepare a revised questionnaire for all applicants for sensitive and critical-sensitive positions in the United States government. Among other things, this special questionnaire should include a question or series of questions bearing on the matter of loyalty. In the paragraphs that follow, the author has made a first effort at the wording of such a ques- tion. Proposed Question to be Included in the Federal Government Ques- tionnaire for Applicants for Employment in Sensitive and Critical- Sensitive Positions ? Have you ever belonged to ? any organization committed to the violent overthrow of the govern- ment of the United States or any subdivision thereof, or to the use of violence for political purposes? ? any organization which conspires to deny civil rights to any group of American citizens? ? any organization which operates under the control of or in collu- sion with hostile foreign powers? ? any organization which serves as a front or support organization for any of the above categories? ? any organization which has engaged in conspiratorial activities di- rected against the security of the United States government or the integrity of its operations? *Note that mere membership in such organizations, by itself, does not disqualify an applicant for employment. The sensitivity of the po- sition applied for, and the quality of the membership, including whether or not it was knowing membership and whether or not the applicant shared the specific intent to carry out the unlawful pur- poses of the organizations, must also be considered. If the answer to the above question is yes, please write a brief sum- mary of your membership, including such facts as the duration of your membership in the organization in question, whether or not you ever held office at any level or played a leadership role at any level, whether or not you ever made speeches or wrote articles or state- ments for publication, and the nature of any other activity in which you engaged as a member. Also state in your summary whether you were aware at the time of your membership of the unlawful purposes of the organization, and whether you shared the specific intent to carry out these purposes. Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 Essential Requirements H: Long-Term Problems Involved in Restoring the Employee Security Program The revitalization of the personnel security program, as distinct from the suitability program, will require much more time and effort- although here, too, there are some things that can be undertaken with- out delay (e.g., rewriting the domestic intelligence guidelines imposed on the FBI by Attorney General Levi). While the GAO and OPM proposals have much merit, they do not address two of the central problems. The first is the lack of specific or- ganizational criteria to guide agency directors, adjudicators, and inves- tigators; and the second is the destruction of the domestic intelligence data base at the federal, state, and local levels, and the virtual cessation of all domestic intelligence activities. The criteria available for the guidance of adjudicators and agency heads today-to the extent that any exist-are vague and ambiguous, often contradictory, and leave so much open to interpretation that in- vestigators, who are naturally fearful of committing a transgression against rules they do not understand, frequently tend to avoid negative reports out of the fear that they may get themselves into trouble. An in- vestigator is always safe if he compiles no adverse information bearing on loyalty about the applicants he is assigned to check out. But if he pursues his investigation conscientiously and reports adverse informa- tion as it is given to him-especially information of a national security nature-he enters an area of undefined risks, which have now been en- hanced by the Jane Doe decision. It is not sufficient for the rules governing disqualification to speak in general terms about membership in or a relationship with "any foreign or domestic organization, association, movement, group or combina- tion of persons which is totalitarian, fascist, communist or subversive, or which has adopted, or shows, a policy of advocating the commission of acts of force or violence to deny other persons their rights under the Constitution of the United States, or which seeks to alter the form of government of the United States by unconstitutional means." (This is the language which has been used since the Truman Executive Order 9835 of March 21, 1947. It is indicative of the lack of sophistication of those who wrote executive orders and legislation at the time. The lan- guage quoted suggests that the order was directed against five different types of organizations. Actually, the Communist Party would have qualified under every criterion but "fascist" in this five-part enumera- tion.) Adjudicators and agency directors cannot be expected to accept the responsibility for interpreting such general language in a manner which covers the hundreds of organizational affiliations that may come to light as a result of applicant investigations. They have to be provided Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 -presumably by the Department of Justice-with specific and authori- tative and constantly updated criteria, setting forth the essential facts about those organizations in which membership would automatically raise questions about the applicant's loyalty and reliability. Partly because of the post-Watergate hysteria on the issue of domes- tic intelligence programs, partly because of the traditional hostility of the media to law enforcement activities in the field of domestic security, any talk about reinstituting some kind of domestic intelligence pro- gram is bound to encounter serious obstacles. Whoever is brave enough to take the initiative will not find it easy sledding. There will be brick- bats and threats of legal challenges and denunciatory editorials, charg- ing "McCarthyism." But we have to come back to the basic fact that, without concrete organizational criteria, presumably provided by the Department of Justice, it will be impossible to get any meaningful per- sonnel security program back in operation; and to the correlated fact that, without a domestic intelligence program, it will be impossible to reconstitute the data base essential for an effective personnel program. If it were simply a matter of having a clear conception of what the Communist Party and the KKK were all about, the situation would be relatively simple, because every personnel security officer knows about the CPUSA and the KKK. But there are many more organizations, some of them on the right, the great majority of them on the left, that should be the object of continuous monitoring operations in the interest of the national security. Thanks to the deceptively bland names they sometimes bear, there is much public confusion about these organiza- tions. The Socialist Workers Party and the National Lawyers Guild, to take two prime examples, have names sounding innocent enough, and the press almost invariably writes about them without indicating their true political nature. The SWP, for instance, is almost invariably refer- red to by the press as a "socialist organization," whereas it is in fact a Marxist-Leninist organization. The NLG, similarly, is generally re- ferred to as a "civil rights organization," whereas in reality it operates as a legal front for the Communist Party and other revolutionary groups. The Chinese Communists, Castro, and more recently the San- dinistas in Nicaragua and the guerrillas in El Salvador have all been portrayed as benign agrarian reformers by important segments of the media, when they were making their bids for power. Not surprisingly, there exists today a whole host of revolutionary organizations, some of them fronts for the Soviet Union or the Communist Party, some of them Trotskyists, some of them controlled fronts of the Castro govern- ment, some of them Maoists, some of them New Left revolutionaries (these are in most cases sympathetic to Castro, sometimes sympathetic to North Korea, occasionally sympathetic to China). The total number of the organizations covered by these various spectrums may very well exceed 100. Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 Among the frankly revolutionary organizations-pro-Moscow, pro- Chinese, Trotskyist, or New Left-we would have to include, in addi- tion to the Communist Party (CPUSA), the Communist Labor Party, the Marxist-Leninist party of the USA, the Revolutionary Socialist League, the Revolutionary Communist Party, the Communist Party Marxist-Leninist, the Socialist Workers Party (Trotskyists), the Sparta- cist League (a breakoff from the SWP), the Workers League, the Workers World Party, the Young Workers Liberation League (the youth organization of the SWP). None of these organizations, with the exception of the CPUSA and its youth organization, is directly con- trolled by Moscow. Most of them (but not the Maoists as of this mo- ment) are committed to the disruption of our defense in the event of war with Russia. All of them have contact in varying degrees with Cuba, and some of them are in liaison with the Chinese Communists. Cuba, in addition, commands a formidable array of its own front op- erations. There is the so-called Nicaragua Network, committed to the support of the Sandinista regime in Managua. There is the National Network in Solidarity with the People of Guatemala, committed to the support of the Castroite guerrillas in that country. There is the U.S. Committee in Solidarity with the People of El Salvador, which plays the same role with regard to that country. There is the Puerto Rican Social- ist Party, a frankly Castroite organization, operating in mainland USA as well as Puerto Rico, which maintains a permanent representation in Havana. There is the Armed Forces of National Liberation (FALN), a terrorist organization whose actions are enthusiastically supported not only by the Puerto Rican Socialist Party, but also by front organizations such as the Puerto Rican Solidarity Committee, and allied organiza- tions such as the Puerto Rican Nationalist Party. It was the last-named organization that was responsible for the attempted assassination of President Truman in 1951. There is also a host of communist front or- ganizations, such as the National Lawyers Guild, the U.S. Peace Coun- cil, and the National Emergency Civil Liberties Committee, etc. Not all the organizations that should be designated and monitored are Marxist-Leninist or communist fronts. Other organizations should be monitored because they pose a threat to domestic and national secu- rity. These would include: ? Organizations which engage in or threaten criminal actions di- rected against the civil liberties of any of our citizens. ? Organizations which conspire against the U.S. government in a manner affecting the national security and the integrity of govern- ment operations. ? Terrorist organizations which engage in bombings, hijackings, and other violent actions, or engage in threats of violence, for the traditional terrorist purposes of influencing policy or intimidating Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 their opponents, e.g., the Weather Underground, the FALN, and the Palestine Liberation Organization. ? Organizations which law enforcement authorities and the Depart- ment of Justice determine pose a danger to the tranquility of our communities and/or to the security of the nation, e.g., the Black Panthers, the American Nazi Party, the Young Lords. The proposal that the FBI engage in surveillance against terrorist or- ganizations should encounter no opposition. However, the proposal that it be instructed to reinstitute surveillance of the other categories of organizations listed above will unquestionably bring protest from civil libertarians in the center as well as from the organized left wing which will point hysterically to the abuses of the past. True, there were some abuses in the past, though they were very rare. (In the case of COIN- TELPRO, for example, only a tiny percentage of the 2,370 COINTEL- PRO activities approved and acted on by the FBI and an infinitesimal percentage of all the 10,500,000 investigations conducted during the same period of time involved demonstrable improprieties.) With the ex- istence of effective oversight and with a chastening knowledge of the damage that can be done by a single impropriety, domestic intelligence activities in the future will be able to avoid some of the pitfalls that helped bring about the current paralysis of domestic intelligence opera- tions at all levels. In the past, unquestionably, there have been some adjudicators-not very many-who could not distinguish politically between membership in the Communist Party and membership in the Norman Thomas so- cialist movement, or who failed to draw a line between the identifiable Marxist-Leninist elements who played a decisive role in the leadership of the anti-Vietnam war movement and the very large numbers of peo- ple, by no means radical, who provided the masses for the series of anti- war demonstrations. With a more careful selection of personnel, better training, more sophisticated direction, and clearer guidelines, there is also every reason for believing that any future domestic intelligence op- eration will properly confine its surveillance activities to the hard-core extremists and will avoid extending them to embrace the innocents who get caught up in these activities. Reinvolving the FBI in domestic intelligence operations would pave the way to the reestablishment of a list of organizations, membership in which would raise serious questions of suitability for government em- ployment. But the reestablishment of such a list is something that will have to be done with great care. A lot can be learned from the experi- ence with the so-called Attorney General's List. This list, which became a favorite target of the left-liberal establishment in later years, was set up by President Truman in March of 1947 under Executive Order 9835. As noted, it was to embrace totalitarian, fascist, communist, or subver- Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 sive organizations, organizations committed to the use of unconstitu- tional means to effect political change, and organizations which seek to deny other persons their constitutional rights. In practice, most of the groups listed were communist action organizations, communist front organizations, and organizations that had been heavily infiltrated by the communists. At its apogee, the list contained the names of over 200 such organizations. It was used as a guide by the Federal Employee Se- curity Program, and applicants for employment were given copies of the list and asked whether they belonged to any of the named organiza- tions. The Attorney General's List, although it performed useful service for a number of years, suffered from several weaknesses. One of its weak- nesses was that the Attorney General had to take entire responsibility for the designation of organizations-which led to the accusation that he was serving as policeman, judge, and jury. It would have been much better if the responsibility for designation had been given to a board of eminent citizens. A second weakness was that there was no provision for constant reviewing and updating of the list. A third weakness was that, on the Marxist-Leninist side, the list was confined to organiza- tions under the control or influence of the Communist Party USA; ap- parently no one foresaw the explosive proliferation of independent Marxist-Leninist and violence-oriented organizations not directly con- trolled by the CPUSA. In the 60s and early 70s, the Attorney General's List, which had be- come increasingly dated, fell into progressive disuse. After seeking un- successfully to obtain congressional funding for an expanded operation of the Subversive Activities Control Board, President Nixon in June 1974 promulgated EO 11785, which added to EO 10450 the amend- ment that "the list of organizations previously designated is hereby abolished and shall not be used for any purpose." How does one go about establishing a list of organizations, member- ship in which would raise serious questions of suitability for govern- ment employment? It has been suggested that, if a list of organizations is ever reestab- lished for the guidance of law enforcement and personnel security offi- cials, it should not be made public because this might open the way to challenges by all or many of the organizations listed. It is highly ques- tionable that Congress would sustain such a procedure, because a se- cret list would be eagerly seized upon by all those who are opposed to any kind of federal employee security program. If there is a list, it should, as in the past, be made public. It might even be advantageous to provide in each case a public summary of the reasons for the designation. Obviously, there will be situations where, in the interest of security, some of the reasons for the designation have to be withheld. But such instances are a minority. In the majority of the Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 cases the designation can be justified on the basis of the public record -publications, statements made by leaders and activists, activities, evidence of control or influence by a hostile foreign state, and the rec- ord of involvement by members in criminal activities. Francis W. Niland, in the study already quoted,* reports on an inter- view he had with Robert Keuch, Deputy Assistant Attorney General for the Justice Department's Criminal Division, which focused on the prob- lem of guidelines. Keuch told him that in 1969-1971 the Internal Secu- rity Division of the Department of Justice had sought to amend EO 10450 in a manner that would have transferred the "designation" func- tion from the Attorney General to the Subversive Activities Control Board. The proposal provided, said Mr. Niland, "that the SACB, after full notice and hearing, would make recommendations to the Attorney General concerning those organizations that should be listed pursuant to the provisions of the executive order." The SACB would hold such hearings and make such findings only upon a petition by the Attorney General. Mr. Keuch expressed the opinion that an appropriate manner in which to handle the problem of "designation" would be to set up a sep- arate Board under the Domestic Council which would function in much the same manner as the SACB did under EO 10450 before it was termi- nated. His proposal also provided for "delisting" hearings to be held in the case of organizations which had evolved away from those character- istics that led to their original "designation." Keuch apparently be- lieved that this proposal still had merit at the time of the interview. The Keuch concept in several respects is superior to the Attorney General's List as a vehicle for establishing specific loyalty-security crite- ria. Its major weakness is that the time involved in giving every organi- zation an administrative hearing before being "designated" would mean that it would take many, many years for the board to conduct hearings on the hundred or more organizations and front organizations that fall in the extremist spectrums. In the interest of making the pro- posal operational in a reasonable period of time, it would be essential to provide for provisional designations, subject to a later hearing and re- view whenever the designation was challenged by the organization in question. (It is noteworthy in this connection that, of the 200 organiza- tions listed in the Attorney General's List, only a handful challenged their designation.) Each designation would be supported by a summary of the information which led the board to make the designation. Let us examine a few possible summaries. In the case of the Puerto Rican Socialist Party (PSP), a summary might state that the Party's positions on international matters have *Francis W. Niland, The Present Dilemma of the Federal Employee Loyalty/Security Program (Washington, D.C.: The National War College, May 1977). Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 consistently and faithfully mirrored the positions of Fidel Castro; that on every issue where there was a conflict between the Castro regime and the United States, its publications have sided with the Cuban govern- ment against the American government; that it has sympathetically covered all acts of terrorism committed by the FALN and that at least several members have been arrested as FALN bombers; that it main- tains a permanent office in Havana; and that, based on these essential facts, the PSP would have to be considered an organization in which membership would automatically raise serious national security ques- tions about suitability for sensitive government positions. In the case of the Socialist Workers Party, a summary might state that the SWP, although not formally affiliated with the Fourth Interna- tional, is a part of it for all practical purposes. It provides most of the money for its international operation, and one of its members sits on the executive committee of the International-ostensibly in an individ- ual capacity. The Fourth International is an organization which unites the many Trotskyist communist movements scattered around the world. It is a Marxist-Leninist group committed to forceful revolution and establishment of a proletarian dictatorship after the revolution. It supports the Soviet Union critically and Fidel Castro by and large un- critically; although it is denounced by the Soviet communists, it has had frequent contact with Cuba. Although it presents itself as a non- terrorist organization and has not to this date itself engaged in terrorist activities in the United States, it does not oppose the terrorist activities conducted by its sister organizations of the Fourth International in Latin America, Ireland, and other countries. It supports and has close ties with the Palestine Liberation Organization. In certain cases, it has even raised funds for Trotskyite-terrorist comrades who have been ar- rested in other countries. Based on its total record, the SWP would have to be put down as an organization in which membership automati- cally raises serious national security questions about suitability for sen- sitive government positions. In the case of the KKK, the summary might say that it is an organi- zation, or complex of organizations, which is basically racist and anti- Semitic in orientation; that it has a long record of violent actions directed against blacks in particular and against black churches and synagogues; that its activities constitute a continuing danger to the country, especially in the case of its armed forces. For these reasons, the KKK is also designated as an organization in which membership would raise serious questions of suitability for government employment. In order to avoid indefinite delays and instill public confidence in the integrity of the operation, the organizations initially to be targeted for monitoring should be designated by the Attorney General, in consulta- tion with the FBI and an independent advisory board of citizens drawn from the academic community, the judicial community, and labor and Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 business. This board might be called the Domestic Intelligence Advi- sory Board (DIAB). Organizations designated as belonging to one of the categories listed above would be free to appeal the designation to the DIAB-with the stipulation that the review procedures be imple- mented within a fixed time frame. The government should not be required to provide absolute proof of intent to engage in criminal activity in order to bar identified members of extremist organizations from sensitive positions. If the evidence is strong enough to raise serious doubt as to the advisability of employing members or associates of such organizations in sensitive positions, that should be enough. In cases where the evidence is strong, but still leaves an element of doubt, the government should have the right to resolve the doubt on the side of protecting the national security rather than the right of the individual to employment in a sensitive position. Where the nature of the position is such that the consequences of mistaken judg- ment would do no damage, or easily reparable damage, to the national security or national interest, consideration might be given to resolving the doubts about an applicant's suitability in his or her favor. This discussion points back to two conclusions: 1. Somewhere in government there must be criteria-there must be an official list of organizations, membership in which would raise serious questions of suitability for government employment. 2. As matters stand today, the FBI has withdrawn from internal se- curity activities to the point where it is no longer monitoring and clipping extremist publications. In order to enable the Attorney General to provide guidance criteria and in order to provide meaningful replies in response to National Agency Checks, the FBI will have to be instructed to resume the active monitoring of extremist organizations of the far right and far left. This will in- volve the complete rewriting of the domestic intelligence guide- lines promulgated by Attorney General Levi in 1976. In order to avoid indefinite delays, the organizations initially to be targeted should be designated by the Attorney General, in consultation with the FBI, and a citizen's committee to be called the Domestic Intel- ligence Advisory Board. The restoration of a personnel security program will, however, re- quire a series of long-term measures that go beyond the reactivation of the FBI in the field of domestic intelligence and the establishment of concrete criteria for investigators and adjudicators. 1. In order to provide itself with an in-house research and analysis capability, the Office of Personnel Management will have to re- constitute the Security Research and Analysis Section, which served the Civil Service Commission well for many years, and re- Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 activate and update its research files, which are now in storage. [Personnel Security] 2. The Freedom of Information Act and Privacy Act will have to be amended in a manner that exempts from disclosure the actual files developed by the federal government in connection with the investigation of applicants and appointees for federal positions. The GAO report already quoted underscored the difficulty of ob1 taining information both from institutions and from members of the public when they are advised, as they must be, that any infor- mation they provide may be made available to the applicant or appointee under the Privacy Act or the Freedom of Information Act. Even federal judges informed the GAO that, if they pos- sessed adverse information about an applicant, they would not make this information available to government investigators be- cause of the knowledge that it could be released in response to a privacy petition. [Personnel Security and Suitability] The argument will unquestionably be made that such an exemption might open the way to denunciations of applicants and appointees on various grounds by neighbors or acquaintances who are motivated to do them harm. There are two answers to this criticism. The first answer is that, without such an exemption, it will be impos- sible to operate an effective personnel security program. The second answer is that the nature of the investigative process by itself would be enough to nullify the testimony of a single vindictive witness. If twenty people who are interviewed in connection with an application for fed- eral employment have only affirmative things to say about the appli- cant, and if a solitary interviewee against this record were to come up with some serious adverse information, it is virtually inconceivable that this one piece of adverse testimony, in the absence of confirmation from any other source, would serve to disqualify the applicant. Indeed, any competent investigator, when confronted with such information, would immediately ask whether there was proof available from other sources to confirm the allegations. The argument will also be made that, unless applicants for govern- ment employment are given access to the derogatory information in their files that might serve to disqualify them, due process will be im- possible. This matter has already been discussed in the section on the Jane Doe decision. The difficulty lies in giving them access to their files with the totally inadequate precaution of blacking out the names of wit- nesses. Clearly, every applicant should be entitled to know the general nature of any disqualifying derogatory testimony so that he will be in a position to respond to it. The question is whether administrative due process cannot be observed by providing applicants, before a decision on nonselection is made, with a summary of the derogatory information Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 in his file and inviting his response-which is the way things were han- dled in the days before the Privacy Act. In addition to this, a nonse- lected applicant already has the right to appeal an adverse decision to an autonomous board of arbiters, the Merit Systems Protection Board. [Personnel Security and Suitability] 3. The GAO report of 1978 discussed the possibility of legislation that would compel the cooperation of state and local authorities with the OPM, the DOD, and other government agencies in the matter of personnel investigations. The GAO also suggested the possibility of offering to compensate them on a per capita basis for the cost of this cooperation. The enactment of such legislation would unquestionably result in a marked enhancement in the co- operation of state and local officials. [Personnel Security and Suitability] 4. The Federal Tort Claims Act should be amended to provide relief from personal liability to investigators, adjudicators, and admin- istrators if they have acted in good faith. Such legislation is now pending in both the House and Senate. [Personnel Security and Suitability] 5. There is a need for a blue ribbon panel similar to the Loyd Wright Commission set up in 1955. It ordinarily takes a very long time for such a commission to conduct an in-depth inquiry and draft a re- port. Because of the urgency of the situation, perhaps it would not be inappropriate to suggest that the commission be instructed to submit its report six months after it begins its deliberations. In anticipation of the establishment of such a blue ribbon panel, the newly established Senate Subcommittee on Security and Terrorism might consider the advisability of taking testimony from those who have knowledge of the situation for the purpose of calling the problem to the attention of Congress and the public. [Personnel Security and Suitability] In discussing the erosion of the Federal Employee Security Program with the author, the recent director of the employee security office in a major federal agency expressed the conviction that the program had been going downhill for the past twenty years or more because no presi- dent since Eisenhower and Truman had manifested a strong personal interest in the situation. If the negative or indifferent attitude of so many government bureaucrats toward personnel security is ever to be trans- formed into a positive attitude, President Reagan must speak out on the issue and promulgate rules facilitating the restoration of the program. Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 These are some of the many things that will have to be done over the period of the coming years if the U.S. is to restore a meaningful Federal Employee Security Program. The problems are unquestionably enor- mous-but they must be addressed because the penalty for failing to do so jeopardizes the security of the nation. Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 Appendix I Department of Justice Definition of Sensitive Positions (taken from DOJ 2610.2) b. Sensitive Positions within DOJ will be those positions which: (1) Involve legal, fiduciary, public contact, or other duties de- manding the highest degree of trust, including all attorneys, law clerks and supergrade positions; (2) Require access, or afford ready opportunity to gain access, to classified national security information and material de- scribed in Executive Order (E.O.) 11652 as Top Secret, Se- cret, and Confidential, which includes classified information revealing intelligence sources, methods, and analytical pro- cedures; (3) Require access, or afford ready opportunity to gain access, to any classified information which is controlled by special access procedures established by the head of a department or agency (e.g. access to Sensitive Compartmented Informa- tion granted by the U.S. Intelligence Community pursuant to the provisions of Director of Central Intelligence Directive 1/14; access to Restricted Data so classified by the Depart- ment of Energy (formerly AEC and ERDA "Q" clearance), and/or access to NATO, CENTO information, etc.); (4) Entail final authority for recommending or approving the collection, grant, exchange, loan, payment or other use of property or funds of high individual or aggregate value, such that it impacts on the national welfare; (5) Involve duties directly concerned with the enforcement of laws, or which involve the protection of individuals or prop- erty; (6) Entail involvement in the design, operation or maintenance of Federal computer systems, or access to data contained in manual or automated files and records of Federal computer systems, when such data relates to the national interest, per- sonal, investigative, proprietary or economically valuable in- formation, or when the duties or data relate to distribution of funds, requisition of supplies, or similar functions involv- ing significant monetary value; (7) Entail responsibility for making selections and appointments Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 of persons performing any of the duties listed in (1) through (6) above, investigative duties, the issuance of personnel se- curity clearances, or the making of personnel suitability and security determinations; (8) Involve responsibility for security education or orientation of DOJ personnel; (9) Are temporary positions in direct support of sensitive activi- ties or functions described above; (10) Are so designated by the Attorney General or his designees. Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 Appendix II Cost of Personnel Investigations, By Agency (Taken from GAO report "Costs of Federal Personnel Security Investigations Could and Should Be Cut, "August 31, 1979) Number of investigations Cost per investigations OPM: Full-field investigations 23,760 $ 836.00 Limited field investigations 2,477 458.00 NACI 270,148 8.81 NAC 59,761 7.25 Total 356,146 DIS: Special background 48,572 394.00 Background 57,723 208.00 Special background-update investigation 12,747 108.00 Background-update investigation 1,300 178.00 Expanded NAC 21,826 60.00 Special investigative inquiries 1,934 - Limited inquiries 2,357 - NAC 364,343 3.57 Entrance NAC 391,437 ) Total 902,239 FBI: Administrative Services Section: Special agent 1,057 5,452.006 FBI support 3,000` - Maintenance, contractors, vendors with access to Hoover Building Civil Rights and Special Inquiries Section: Nonreimbursable full-field investigation 2,173 - Reimbursable full-field investigations 1,579 979.00 National FBI Academy: Limited full-field investigation of candidates Total Department of Treasury: IRS: Security (full-field investigation) 39 $1,058.00 Character 4,312 1,095.00 Limited characters 6,881 194.00 Security-clearance 46 Security-5-year update investigation 4 276.00' Preappointment 217 NACI 380 Police check 197 Enrollee applicant 1,374 34.00 Total Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 Cost per Number of investigation investigations (note a) Customs Services:t Full-field investigation 1,796 700.00 Bureau of Alcohol, Tobacco and Firearms: Full-field investigation 432 242.13 Update investigation 375 - Total 807 Bureau of Engraving and Printing: Full-field investigation 112 250.00 Update investigation 11 - Total 123 Secret Service: Full-field investigation 600 750.00 Update investigation 1,200 225.00 Total 1,800 Department of State: Full-field investigation 2,630 613.00 Update investigation 245 - Total 2,875 U.S. Postal Service: Full-field investigation 1,516 Update investigation 893 Total 2,409 Coast Guard:h Background investigation 147 - Department of Commerce: Full-field investigation 2 - National Aeronautics and Space Administration: Full-field investigation 1 - Agency for International Development: Full-field investigation 356 650.00 NACI and NAC 654 - Total 1,010 ACTION: Full-field investigation 50 500.00 Update investigation 5 - Total 55 investigation. for IRS. 'Limited character investigation for nonsensitive (specified) positions is scheduled to be eliminated. Positions will be reclassified as nonsensitive and OPM will conduct a NACI sons with limited access receive NACIs. dPersons with regular access to the FBI building receive full-field investigations. Per- `Estimated. positions. hMilitary personnel only. Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 Appendix III Results of Interagency Study on GAO Recommendations (1981) STATISTICAL SUMMARY (not including DoD, State, or CIA)' TOTAL POSITIONS [Federal Civilian Service] Number of Old Number of New % at Each Positions Positions of New (Including ADP) (Including ADP) Levels Nonsensitive 1,388,891 I 1,098,166 66% Noncritical-Sensitive 190,998 II 399,046 24% III 97,078 6% Critical-Sensitive Normal 55,539 IV 44,864 3% 5 Year BI V 19,528 1 %u Critical-Sensitive More Than 5 Year BI 23,254 ADP III ADP II ADP I % at each Number of Old Number of New of New Positions Positions Levels 39,681 I 22,818 21% 62,988 II 52,572 48% 7,040 111 29,432 27% IV 4,651 4% V 236 - NON-ADP POSITIONS [Federal Civilian Service] Number of Old Number New % at each Positions Positions of New (Excluding ADP) (Excluding ADP) Levels Nonsensitive 1,349,210 I 1,075,348 69% Noncritical-Sensitive 128,010 II 346,474 22% III 67,646 4% Critical-Sensitive Normal 48,499 IV 40,213 3% 5 Year BI V 19,292 2% Critical-Sensitive More Than 5 Year BI 23,254 'DoD estimates included civilian positions as well as military and contractor activities. A breakdown of civilian positions from the DoD total was not available. State and CIA did not provide estimates. Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 Selected Heritage Foundation Policy Studies Agenda '83: A Mandate for Leadership Report edited by Richard N. Holwill (1983, $12.95, hardcover; $6.95, paperback) The Annual Guide to Public Policy Experts 1983 edited by Robert Huberty and Catherine Ludwig (1983, $4.00) Annual Insider Index to Public Policy Studies edited by Mary Sutphin (1983, $4.00) The First Year: A Mandate for Leadership Report edited by Richard N. Holwill (1982, $10.95, hardcover; $6.95, paperback) Constraining Inflationary Government by Antonio Martino (1982, $4.00) Essays in Supply Side Economics edited by David G. Raboy (1982, $10.95, hardcover; $5.95, paperback) Back to Basics by Burton Yale Pines (1982, $13.50, hardcover) The Inter-American Foundation by Cleto DiGiovanni, Jr. (1981, $4.00) U. S. -Japan Mutual Security: The Next 20 Years edited by Edwin J. Feulner, Jr. and Hideaki Kase (1981, $5.00) Mandate for Leadership edited by Charles L. Heatherly (1981, $21.95, hardcover; $12.95, paperback) Agenda for Progress: Examining Federal Spending edited by Eugene J. McAllister (1981, $11.95, hardcover; $6.95, paperback) U.N. Studies UNCTAD: An Organization Betraying Its Mission by Stanley J. Michalak (1983, $3.00) The International Labor Organization: Mirroring the U.N. 's Problems by Walter Galenson (1982, $3.00) Critical Issues Social Security Reform: The Family Plan by Peter J. Ferrara (1982, $3.00) Safety Nets and the Truly Needy: Rethinking the Social Welfare System by Charles A. Murray (1982, $3.00) Strategic Minerals: The Economic Impact of Supply Disruptions by James T. Bennett and Walter E. Williams (1981, $3.00) Corrigible Capitalism, Incorrigible Socialism by Arthur Seldon (1981, $3.00) East Germany: Marxist Mission in Africa by John M. Starrels (1981, $3.00) Reforming the Military edited by Jeffrey G. Barlow (1981, $3.00) The Economics of Education Tax Credits by E. G. West (1981, $3.00) The Failure of Socialism: Learning from the Swedes and English by Arthur Shenfield (1980, $2.00) The Soviet Strategy of Terror by Samuel T. Francis (1981, $2.00) The Family, Feminism, and the Therapeutic State by Onalee McGraw (1980, $2.00) For a complete list of publications-or to order any of the above-write: Dept. G, The Heritage Foundation, 513 C Street, N.E., Washington, D.C. 20002 Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2 CE Are there persons working for the federal government who do not serve the best interests of the United States? Are there incompetents? Subversives? The federal government can- not answer these questions. It does not know because it no longer has the relevant data. At one time, the U.S. could insure that its employees did not endanger national security. But appeals to "fairness," budget-cutting, burdens imposed by the Freedom of Informa- tion Act, Privacy Act and many court decisions, plus the domestic intelligence guidelines of former Attorney General Edward Levi, have transformed a viable loyalty-security pro- gram into a shadow of its former self. The current program, in fact, barely passes muster as a suitability check. How federal personnel security policy got into its present mess and what can be done to remedy it are the central themes of this study by David Martin. A twenty-year veteran of the Senate Subcommittee on Internal Security, Martin details the sorry state of personnel policy and its frightening implications: 1. Priceless files, sources of checking applicants for critical and critical-sensitive posi- tions, have been destroyed at national, state, and local levels. 2. The FBI has withdrawn from the domestic security business. 3. The vicious "nexus" principle has made it nearly impossible to run even an adequate suitability check. Such flaws as heavy drinking cannot disqualify a candidate unless a definite nexus between the weakness and the applicant's possible performance can be proved. 4. Staffs within agencies for investigations have been so severely cut that waiving even the most cursory security checks has become the order of the day. Despite these developments over the past decade, most Americans blithely trust that their government protects itself-and them-adequately against disloyal, not to say treasonous infiltration. David Martin performs a valuable service in exposing the facts of U.S. security weak- ness and suggesting specific measures to remedy the situation. Among them: completely revising the current lax guidelines for adjudicators and investigators; and reactivating the FBI's domestic intelligence division and the Security Research and Analysis Section at the Office of Personnel Management. The problems, Martin concludes, unquestionably are enormous. But they must be ad- dressed because failing to do so jeopardizes the security of the nation. David Martin is a former senior analyst with the Senate Subcommittee on internal Secu- rity. Since retiring from the Senate, he has served as a consultant for the Standing Com- mittee on Law and National Security of the American Bar Association. i Wf GHefitage `Fonndatiort 513 C Street, N.E. ? Washington, D.C. 20002 Approved For Release 2008/01/15: CIA-RDP85M00364R002204190005-2