THE SECURITY CLEARANCE PROGRAM AND ITS RELATION TO POSSIBLE UNAUTHORIZED DISCLOSURES OF CLASSIFIED DEFENSE INFORMATION

Document Type: 
Collection: 
Document Number (FOIA) /ESDN (CREST): 
CIA-RDP81-00142R000700040003-1
Release Decision: 
RIPPUB
Original Classification: 
K
Document Page Count: 
32
Document Creation Date: 
December 12, 2016
Document Release Date: 
September 13, 2001
Sequence Number: 
3
Case Number: 
Publication Date: 
February 24, 1978
Content Type: 
REPORT
File: 
AttachmentSize
PDF icon CIA-RDP81-00142R000700040003-1.pdf1.74 MB
Body: 
EVdA /1/0RT E U.CIA- TY SERVICES / -'' ~' l '- t ' Approved Fori fease 200RDP81-00142M00700040QOi`~_ Crystal House I, Apt. 202 1900 South Eads Arlington, Virginia 22202 (703) 979-6540 W. Donald Stewart, President Security Consultant - Investigations February 24, 1978 Statement by Mr. W. Donald Stewart The Security Clearance Program and Its Relation to Possible Unauthorized Disclosures of Classified Defense Information The Senate Select Committee on Intelligence Approved For Release 2001111/08 : CIA-RDP81-00142R000700040003-1 Approved For lease 2001/11/08: CIA-RDP81-00142600700040003-1 Page (s) Qualifications of the Author 1 Purpose 1 - 2 The Meaning of a Security Clearance 3 Who Has Access to Classified Data 2 5 (A) The Press 2 - 3 (B) The Congress 3 (C) The Military 3 - 5 (I)) Civilians 5 Variations in the Investigative Criteria for a Top Secret Clearance Adjudications The Polygraph for Security Screening 5 - 6 6 - 7 7 - 9 Approved For Release 2001/11/08 : CIA-RDP81-00142R000700040003-1 Approved Fo lease 2001/11/08 : CIA-RDP81-0014 600700040003-1 The Security Clearance Program and Its Relation to Possible Unauthorized Disclosures of Classified Defense Information Approved For Release 2001/11/08: CIA-RDP81-00142R000700040003-1 Approved For'*1ease 2001/11/08 : CIA-RDP81-00142V00700040003-1 Unauthorized Disclosures of Classified Defense Information This statement is being voluntarily furnished by W. Donald Stewart to the Senate Select Committee on intelligence specifically for the at- tention of the Subcommittee on Secrecy and Disclosure. Qualifications of Author I served as an FBI Agent from July 1951 until August 1965, the last nine years as an Espionage Supervisor at FBI Headquarters, and from August 13, 1965 until December 1972 as Chief Investigator for the Office of the Secretary of Defense with the primary responsibility of investi- gating Unauthorized Disclosure cases. Because the Directorate for Inspection Services (DINS), cornonly known then as the Secretary of Defense's Inspector General group, was phased out for economy purposes, I was appointed Inspector General of the newly formed (October 1972) Defense Investigative Service where I remained until I retired on June 30, 1975. During my tenure in DINS.I handled 222 Unauthorized Disclosure investigations and numerous major criminal and counterintelli- gence investigations in accordance with the provisions of Department of Defense Directive 5210.50 entitled "Investigation of and Disciplinary Action Connected with Unauthorized Disclosures of Classified Defense Information" dated April 29, 1966, which made DINS the focal point of all such violations, and with the provisions of Department of Defense Instruction 5200.22 entitled "Reporting of Security and Criminal Viola- tions" (to DINS) dated September 12, 1966. In April 1969 I prepared a pamphlet entitled "Analysis of Unautho- rized Disclosure Investigations." This consisted of a review of 125 investigations conducted between March 1965 and March 1969. I described the whole program - Background, Authority, Source of Unauthorized Dis- closures, Mechanics of Handling, Program Improvement, Positive Results, Personality Characteristics of Individuals Responsible for Unauthorized Disclosures, the Question of Prosecution, and Observations. Since I retired I have written a book entitled "Leaks" (not yet published) and Founded Stewart Security Services. Purpose The purpose of this paper is twofold. One purpose is to show how haphazard the Security Clearance Program operates, and secondly to show that weaknesses in our Security Clearance Program could be responsible for unauthorized disclosures of classified information through the improper- conferring on of a security clearance on an undeserving person 1 Approved-For-?Release -200Il1-1/68: CIA-RDP8142R000700040003-1 Approved ForElease 2001/11/08: CIA-RDP81-0014200700040003-1 or through the failure to remove a person's security clearance when the person becomes a security risk for one of several reasons. Specifically, this paper reflects who has access, legally and illegally, to classified Defense data; examples of weaknesses in our Security Clearance Program permitting undesirables to obtain a security clearance; variations in the investigative criteria for a Top Secret clearance; how security clearances are adjudicated, along with an idea for a Central Adjudication Branch for economy, security and privacy purposes, and finally the introduction of the use of the polygraph for pre-employment checks and for background checks. The polygraph could minimize invasion of an individual's privacy, expedite his date of employment and clearance, and save the U.S. Government a large amount of money in various ways. Hopefully, the Committee will recognize the need to bring the entire Security Clearance Program into proper focus with appropriate standardization and safeguards to all persons concerned. The Meaning of a Security Clearance What does a security clearance mean? Actually it means that a designated authority has sanctioned a person's access to view classified defense material at a level of Confidential, Secret, or Top Secret. Actually there are also what are called "Exotic" clearances or "Special" clearances which are over and above Top Secret. Who Has Access to Classified Data (A) The Press The press does not, in fact, legally get a security clearance; however, they are often given "Backgrounders," which are familiarization lectures in order to~prepare them to write a story. These generally contain classified defense information. There is a stipulation that the data imparted is "Off the Record." In 1969, there was a case where a Vice Admiral compromised our 14 year lead over the Soviets on Anti- Submarine Warfare. Reportedly the press was not told the "backgrounder" was "off the record" and 14 papers ran the story. But, then again, what authority exists by anyone to confer a clearance on any rnerber of, the press through a "backgrounder," "off the record." When members of the press are taken into the Defense Departz:ent's Office of Public Affairs, a Top Secret background investigation is conducted before the clearance is conferred. Approved For Release 2001/11/08 : CIA-RDP81-00142R000700040003-1 Approved For lease 2001/11/08: CIA-RDP81-0014M00700040003-1 What proof of identification must he have to enter the service and later obtain his Secret clearance? He must produce a high school diploma and a birth certificate. Are they verified? Yes, the mili- tary recruiter causes checks to be made at the high school and the appropriate Bureau of Vital Statistics. What does that do? It merely informs the recruiter that John Jones graduated from Holy Mount High School - it does not tell the recruiter if John Jones is white or black, tall or short, blonde or redheaded. The Bureau of Vital Sta- tistics merely informs that one male was born on such and such a date to William and Doris Jones, perhaps it might gratuitously give the baby's nacre as John. Can the required documentation be fabricated? Yes, I've had a couple of national news stories on this weakness in our security program, but to no avail. Additionally, no change has been made even in view of the fact that last sinner it was discovered that 500 Panamanian aliens enlisted in the U.S. Marine Corps by util- izing fabricated documents. Can this be stopped? Yes, by requiring the enlisted to submit the names and addresses of three references who should be interviewed to verify the John Jones is the person he pur- ports to be, and also to have the FBI do a search of his fingerprints from the fingerprint card he submits. Do you have any examples of people entering the service illegally other than the above 500 Panamanians? Yes, about two years ago I had a national news story about Thomas Ragner Faernstrcan who reenlisted fictitiously ten times during a 13-month period between November 1973 and January 1975, collecting approximately $30,000 in bonus. Subse- quent interviews with him revealed he had done this over a 10-year period and bilked the U.S. Government out of $600,000. A check of his fingerprints would have uncovered him at any stage. Last July a 28 year old North Carolina ran, was arrested and held 40 days as a deserter from the Army in spite of his protests that he never joined. Someone else joined using his identification which he had previously lost. An FBI fingerprint check would have probably nipped this fraudulent enlistment in the bud at the enlistment stage as the fraudulent enlistee most likely couldn't get in under his own identity.. In January 1975, a sailor in Seattle, Washington hi-jacked a Navy pane and was subsequently caught. Later it was developed that a year before he had been discharged from the Marine Corps as a rental case. An FBI fingerprint check would have surfaced him. Actually on the subject of poor security I have acted in the ca- pacity of a one-man vigilante committee before 1 retired and for 2-1/2 years since without success. I could cite example after example, but the purpose here is not to show how the vulnerability to our security exists from the fact that you are an accepted person. Since you live with people who have Top Secret clearances, they are likely Approved For Release 2001/11/08 : dIA-RDP81-00142R000700040003-1 Approved FoIease 2001/11/08 : CIA-RDP81-001400700040003-1 to impart data to you because you are a serviceman like them. Further, you have a legitimate right to be in the proximity of certain areas which contain Top Secret data and are likely to learn about them be- cause you are accepted as another service person. Actually, one ser- vice person does not enter a room and say, prior to a conference, "Rio's got Top Secret here? I want to 'shoot my mouth off'." The 500 illegal Panamanian aliens who joined the U.S. Marine Corps undoubtedly got some exposure that probably the Marines wish they hadn't. Further, wouldn't it be ironic if our U.S. Marine Corps be- came engaged later in a battle in Panama and met stiff resistance and learned later the enemy was trained in our U.S. Marine Corps camps? Hopefully that won't happen. (D) Civilian Employees Civilian employees and Department of Defense contractor employees have access to classified information. Most are awarded a Secret clear- ance on a straight National Agency Check (NAC). If, however, any deroga- tory data develops, an investigation is undertaken to resolve the matter. Civilian employees requiring a Top Secret investigation undergo a thorough background check involving verification of birth data, resi- dencies, employment, and interviews of references. Variations in the Investigative Criteria for a Top Secret Clearance The FBI, Defense Investigative Service (DIS), and the Civil Service Commission.(CSC) each do background investigations for Top Secret clear- ances. Possibly State Department and the CIA also do their own. How- ever, my point is that the criteria differ and to this end I'll speak of the variations in the FBI, DIS, and CSC criteria for a Top Secret clearance. If there is any specific interest here, I have written a detailed paper dated February 25, 1975 entitled "Criteria for Security Clearances" where I go into greater depth. Briefly, the FBI is the only one of the three which is recognized as a policf agency and thereby permitted to review all police agency criminal files in checking for a reference to the person being cleared for Top Secret. This being so, why do we worry about a person being a homosexual in connection with his getting a clear- ance since DIS and CSC are not likely to surface this data? As you may know, mast homosexual subjects are often booked by a police department in the category of "Disorderly Conduct," given a small fine and released. For example, a former Special Assistant to former President Lyndon Johnson was arrested at a YMCA in Washington, DC, in about 1963, for his Approved..For. Release .2001/11/08: CIA-RDP8 1142R000700040003-1 Approved For Rese 2001/11/08 : CIA-RDP81-00142R000700040003-1 rw participation in a homosexual affair. If this affair had happened in New York City, for example, and DIS or CSC had been conducting a background check based on the fact that Jenkins lived in New York once, neither having access to NYPD files could have uncovered this arrest, but, of course, the FBI, having such access, would have the data, would probably have caused him to be denied a clearance as a possible security risk. There are also other crimes which would not necessarily cause the person's fingerprints to be forwarded to FBI Headquarters and his arrest would go undetected during a fingerprint check of FBI files. Let's look at the scope of an investigation. The FBI does neighborhoods for only the last five years unless derogatory data is developed. DIS and CSC go back for 10-15 years. The FBI verifies birth data from records and not Bureau of Vital Statistics' records as does DIS and CSC. FBI checks three listed references and no de- veloped references are sought unless derogatory data is developed. if a listed reference is not available when the FBI knocks on his door, no effort is made to locate him again. DIS and CSC locate all listed references if possible. The House Appropriations Coirmittee hearings in April 1975 re- flected that based on its. review of DIS and CSC from May 1974 to November 1974, the following was noted. DIS charged $390/investigation and CSC charged $604. At that time FBI charged $799. DIS cases aver- aged 19.8 leads/case whereas CSC averaged 30.7. DIS reports averaged four pages and CSC averaged 21 pages. FBI then operated under a 30-day deadline whereas DIS and CSC were taking in the neighborhood of 45-60 days. in regard to updating Top Secret clearances, FBI never updates those of its personnel; CIA updates its personnel every 3-5 years, and the Defense Department does a 5-year bring-up. Adjudications Who decides who gets the clearance after the background investi- gation is done? The Defense Investigative Service at one time ser- viced 1400 customers. That meant that each customer would get a full background investigation on its person and determine if he or she qualified for a clearance. I can't personally state that much addi- tional investigation was often requested because the adjudicator wouldn't make a decision on the facts available. Yet, rrore than likely another adjudicator in the same agency could have - that's the differ- ence between experience and lack of it. . Most important is the fact that the 1400 agencies had in their files much personal data on the person being cleared and this data, in my opinion, should not be in the files of the agency. The natural solution would be a Central Adjudication Branch within DoD, Approved For Release 2001/11/08 CIA-RDP81-00142R000700040003-1 Approved FolWelease 2001/11/08 : CIA-RDP81-0014000700040003-1 employee, a new recruit must be found. Secondly, in a case that homo- sexuality may be developed during an investigation, a polygraph with the applicant would reflect deception and confronted with same the person might make a full disclosure. The alternative to his lack of cooperation on that subject or other subjects of possible personal embarrassment is to resolve the derogatory data in a full field in- vestigation. Even if the person is determined not to have committed the suspected act, be what it may, the line of questioning pursued in neighborhoods where the person now lives and formerly lived, as well as present and past employment, leaves him with a stigma. In the case of the military enlistee, the polygraph again being used to just verify what the enlistee has told us becomes an excellent screening device and may even serve to expedite his entrance into the service. On the other hand, at the recruiter level, the utilization of a polygraph at the recruiter level may also surface a potential fraudulent enlistee, thereby saving the U.S. Government a great deal of money by eliminating associated cost with processing and training a recruit. The polygraph could indicate-that the potential recruit is or has been a drug user, is presently a fugitive from. justice, or has served time for a crime which would disqualify him from military ser- vice, is not the person he purports to be, has certain physical limi- tations, etc. Again, only his questionnaire is being revied with him. In a July 8, 1976 Las Angeles Times newspaper article entitled "At Least .1 in Every 250 Recruits Enlisted Fraudulently, Pentagon Figures Disclose" by Norman Kempster, 1,935 cases of fraudulent en- listments came to the attention of the military during a 15-ionth period ending March 31, 1976. at the article does not bring out is that these people for the most part surfaced themselves in order to get discharged. We have to admit that when economic conditions are not the best that the $403/month pay, plus room and board and a cloth- ing allcrwance for a Private in the military, can look awfully good. Locally I can think of Army Private Angel, who killed two Montgomery County (Maryland) police officers after a bank robbery about two years ago as being one of the persons falling into the fraudulent enlistment group. He was not truthful in the papers he executed before entering the service. Whether it would or would not have altered the death of the two Montgomery County police officers, I cannot say. I can say that a pre-enlisnt screening by polygraph would probably have excluded him and saved the Army a great deal of time and expense associated with his induction and training and em- barrassment to its service. Angel was also a suspect in a murder prior to entering the service. Approved For Release 2001/11/08 : CIA-RDP81-00142R000700040003-1 Approved Fo lease 2001/11/08: CIA-RDP81-0014M00700040003-1 for example, which would handle and retain all background investiga- tive reports and simply inform the customer that based on the results of the background investigation the Department of Defense is awarding John Jones a Secret or Top Secret clearance. Much is saved in logis- tic costs in this manner because every agency doing its own adjudica- tion must have its own classified file room complete with personnel. Also, many potential invasion of privacy suits could be avoided be- cause personal background data would be much more restricted. No one at the agency has any need to know personal type data offered during the investigation about one of the employees being cleared. I per- sonally have had complaints from employees. about the discussion of such personal data such as age, past marriages, etc., contained in investigative reports on Personal History Questionnaires executed by the person being cleared. The Polygraph for Security Screening When the idea of using a polygraph is mentioned, instant resent- ment takes place. Immediately every one thinks in terms of its use being to convict someone; however, the polygraph is often used for exculpating purposes. Also, it is used for a veracity check such as was recently done during the interviews in Korea with Tongsun Park. Its use in connection with the Justice Department interviews of Park more or less set a precedent as far as the Government is concerned in that it places a great deal of belief in the ability of the polygraph to show deception which does not necessarily mean guilt. Now, let's consider using the polygraph for general security screening. What I would propose is simply taking in hand the Person- nel Security Questionnaire, FD 398, which all persons requiring a clearance must execute, and one by one reviewing each question with the applicant. For instance, is your name John Jones? Were you born April 10, 1928 at.New York, New York? Have you ever been arrested? Did you reside at 1212 Vermont Avenue, Ventnor City, New Jersey from 1964-1972? etc. This is not an invasion of privacy since we are only reciting what the applicant has told us. We are not going to dis- qualify him if he shows deception on the above residence question and arrest question. We are going to instruct the field investigator to dig into these areas. We may very well be able to eliminate all other areas if no deception is noted. What is the advantage of the polygraph in this type of screening? There are several. One is probably a quicker clearance for a pre- employment check enabling the person to report to work earlier. Often while the U.S. Government is checking out someone, the person becomes tired of waiting and gets other employment; hence, all the investiga- tive effort is lost and if the person was to become a Government Approved For Release 2001/11/0f : CIA-RDP81-00142R000700040003-1 ? Approved For lease 2001/11/08 : CIA-RDP81-00142 00700040003-1 Another point, not only in favor of expediting the investiga- tion of a civilian or military employee and saving related costs, is that many areas where a person may have formerly resided or was employed are now considered "high risk" areas and are not normally entered by Defense Investigative Service agents because of possible personal jeopardy. Therefore, to develop the fact a person lived there or worked there, other investigation must be launched to verify same. A similar but less dangerous type of a case is one where a person has listed a residence or employment, necessary to be verified being in that part -of this country which is 400-500 miles from the nearest investigative office, making it necessary for an investigator to take a road trip to the location. A poly- graph might well resolve our interests in this matter. In closing, I believe our present Security Clearance Program and pre-employment check could be upgraded by use of the polygraph. At the same time in many cases there would be a substantial saving to the U.S. Government and a minimum of invasion of privacy to an applicant. Approved For Release 2001/11/08 : CIA-RDP81-001"42R000700040003-1 9 Approved For lease 2001/11/08 : CIA-RDP81-001421 0070004D A R , ~- UNCLASSIFIED CONFIDENTIAL j_L EXECUTIVE SECRETARIAT Routing Slip ACTION INFO DATE INITIAL 1 DCh ,, w/ of 2 DDCI X w/ of DDA X 4 L.C x 5 6 7 8 9 10 11 12 To 3: In his memo of 22 February, the DCI sent along to you Mr. Stewart's earlier testimony before the SSCI. The attached is provided for your information and appropriate action in that ftaa. 28 Feb 78 Approved For Release 2001/11/08 CIA-RDP81-00142R000700040003-1 STATINTL ROilTlid AHD TRANSMITTAL SLIP, o P" approved ForWlease 2001/11/08: CIA-RD '8f-bb 4 d07 f -'-^ 2 04TE I N i T I A :.S CO:iRO{NAT ION FILE // ~- LATE INFORMATION Ik:TIALS NOTE ANII RETJ RN - sILL --- GATE PER co. - VER-SATION SEE Me . - N. T I ALS DAVE SIGNATURE REMARKS . /' Gam, C!r a ' -5 17P e Do P: 1T use this focm as a RECC(RD of ai.pres3'.s, concutrences, disapprovals, clearances, and simiiat actions FROM ATE HONE OPTIONAL FORM 41 AUGUST 1967 GSA FPMR (41C:FR) 100-11.206 Approved For Release 2001/11/08 : CIA-RDP81-00142R000700040003-1 STEWART SECURITY SERVICES 1ntry Approved ForiWease A/AJW1, - P81-0014 7 Q 03 1 L J 1900 South E;ads Arlington, Virginia 22202 W. Donald Stewart, President ~..L~t'f 2 L'Lstc. L. (703)979-6540 Security Consultant - Investigations 4 / 1 t ~'YJ 27- '0 1~ -411 Approved For Release 2001/11/08 : CIA-RDP81-00142R000700040003-1 S CIZVJ(.ES Approved For Lease 26Dltt4 Oei 'CIA'.iRDP81-00142E 0700040003-1 flO) Srutli Eris 1Ar;i:t,)#or., Viry ni:f .;>^i?() L (703) 979 - 6540 W. Donaaid Stewart, Pr'e.:ident S cur tj (!_St~i. i'!i - Jnves f~%ition f Eti1,t f J `' 3. I) J d STATEMENT BY MR. W. L`ONALD STEWART IJNNAUTH011UZED DISCLOSURES OF CL,1..:;LFlEl) Ili?FENSE INFORMATION THE SENATE SELECT COI`tMl FFJ'u: W; 1 WELL IG !-"N CE Approved For Release 2001/11/08 : CIA-RDP81-00142R000700040003-1 AM INDEX qualifications of the Author Three Types of Unauthorized Disclosures Security Problems Possible Solutions Discussion Overt Leaks Categories of Leaks Covert Leaks Potential Leaks Approved For Release 2001/11/08 : CIA-RDP81-00142R000700040003-1 Approved For Release 2001/11/08 : CIA-RDP81-00142R000700040003-1 Approved For Lease 2001/11/08: CIA-RDP81-00142l 0700040003-1 Unauthorized I).isciosuri_'s of cd Defense Inforrnati.or, This statement is 'being voluntarily furnished by W. Donald Stewart for the benefit and interest of the Senate Sd>Ject Committee on Into]...L1-- genc.e. Qualifications of Author I served as an FBI Agent from July 1951 until August 1965, the last nine years as an Espionage Supervisor It FBI Headquarters, and from August. 13, 1965 until December 1972 as Chief Investigator for the Office of the Secretary of Defense with the primary responsibility of investi- gating Unauthorized Disclosure cases. Because the Directorate for Inspection Services (DINS), commonly known then as the Secretary of Defense@.s Inspector General group, was phased out for economy purposes, I was appointed Inspector General of the newly formed (October 1.972) Defense Investigative Service where I remained until I retired on June 30, 1975. During my tenure in i)INS I haudLed 222 Unauthorized Disclo- sure investigations and numerous major criminal and counterintelligence investigations in accordance with the provisions of Department of Defense Directive 5210.50 entitled "lnvestig:,cion of and Disciplinary Action Connected with Unauthorized Disclosures of Classified Defense Information" dated April. 29, 1966, which made DINS the focal point of all such viola- tions, and with the provisions of I)epartn;ent of Defense Instruction 5200.22 entitled "Reporting, of Securfty and Criminal Violations" (to DINS) dated September 12, 1966. In April 1969 I prepared a pamphlet entitled "Analysis of Unautho- rized Disclosure Investigations." TbLa consisted of a review of 125 investigations conducted between March 1965 and March 1.969. 1 described the whole program - Background, Authority, Source of Urauthori.zed Dis- closures, Mechanics of Handling, Program Improvement, Positive Results, Personality Characteristics of individuals Responsible for Unauthorized Disclosures, the Question of Prosecution, and Observations. Since I retired I have written a took entitled "Leaks" (not yet published) and founded Stewart Security Services. Approved For Release 2001/11/08 : CIA-RDP81-00142R000700040003-1 Approved For Release 2001/11/08 : CIA-RDP81-00142R000700040003-1 Thre_ types of U~~a_Ith: rizf cl f From December 1972 until present I have continued to follow un- authorized disclosure matters in the press ;,aci iiavc:.. amassed a file of public source information. My experien-e h:I ieJ ue to conclude that there are three types of u laUtfl;_:? i7 '_ ' 1: (::t; , 1r ; c;f concern; namely, the Overt, Covert, and Potential. 'Iilc?Se .~! Ll be described in the sec- tion entitled "Discussion." But briefly tii , Overt types are those we read about in the newspapers and fall nt.o one of eight categories of leaks also set out in the "Discussion" section. The Covert types are ones we know little about until an informant advises someone is attempt- ing 'co provide enemy foreign intelligence with classified Defense data. The third type, Potential, is one which I speculate that few have little knowledge of because there is no mechanism for reporting these and, until the advent of the above Dal) Instruction 52)O.22, even the Secre- tary of Defense would remain uninformed. This type develops from civilian or military personnel who have becomce disenchanted. Each person has the potential of orally disclosing Classified data to enemy foreign intelligence. Additionally, another Potenttial type of dis- closure can result from a lost Classified documeent, such as in one case of the lost Atomic Stock Pile Reports. Security Problem Our main security problem cnncer.ni:ig "leak.::" is that there is no one in overall charge of leak Natters in the U.S. Intelligence program which presently operates like amateur night. each U.S. a ge.ncy and mili- tary department operates independently of each other with practically no internal coordination. Matters of natirnnal security interest are often buried rather than have the military department or Government agency suffer any embarrassment resulting from a "goof" by one of its employees. Within the Defense Department, there is no such group as an Intel- ligence Security Advisory Board to specifically determine direct appro- priate action concerning Dol) personnel who pose a threat in that they might compromise highly classified intelligence data. Not having com- mitted a crime, prosecution is not the solution and, after the potential crime .has been committed, the person may not be around to prosecute. We have had some potentially serious such cases which are mentioned in Potential Leaks in the Discussion section. Neither the FBI nor the CIA is normally notified. Some persons have been discharged to solve the military corunander's problem. One was "granted immunity" to confess an espionage contact by the person's Commanding Officer, such immunity is normally the prerogative of the Justice Department. Approved For Release 2001/11/08 : CIA-RDP81-00142R000700040003-1 Approved ForYWIease 2001/11/08 : CIA-RDP81-0014M00700040003-1 A second offering is tl~at the Sol ?t- Sena e l:nt.c'l fig cence Coamit:tee make it: self o): some of her: a ) r:; prIatc t,?_dy the Inc I~. r-1 i. I I t for report ln.g all occurrences of and invest iGa.tion ? o; una+uIhc,ri,.ed disclosures of classified data. This body could titer be in rh poi i.t.ion through monitor- ing to force a determination of whether the c.lass.Hled dat:a in question couldn't be declassified now or later or prosecution purposes. This would insure in most cases that the + n tat:inns received a review by the Justice Department. In all clue respect , must: General Counsels of con- cerned agencies often know little abour. tl)i: type of Fe,ic?r.-A. law, including the possibility of prosecut ic.,:; under the Conspiracy to Commit Espionage Act, but often usurp the Ju.;t:ice llepartmcnt's prerogative. by rendering their own opinion that the case can't be prosecuted. If there was an office, such as DLNS, with the responsibility to oversee all leak investigations, it would be able to insure an investi- gation was not prematurely aborted when the next obvious lead might very well surface the culprit, as has often happened. DINS (Directorate for Inspection Services) did function in focal point manner within DoD and it was able to for-ca more investigative effort from the military services than it intended and such pressure often was beneficial. Lastly, the enactment of some type of In Camera judicial procedure would be most helpful and could be reserved for special cases. It could. be an outstanding asset in prosecution. I now think of the case of the NSA military sergeant who recently was reported in the press as having sold Top Secret information to foreign agents. Prosecution is stymied because of certain prosecutive prohibitions. Of course, thought could be given to putting this case on the "back burner" until these prohibi- tions are no longer valid and then re:urrecting the prosecution so long as it still falls within the Statute of Limitations. Finally, we must make a stronger effort to bring leakers to crimi- nal justice or at least administrative justice so we can build a history of positive actions which will serve as a dfeterrent. To do this, all leak cases must be investigated aggressively. Military and other DoD components, since the abolishment of the Investigation Division of DINS in December 1972, have reportedly fallen back on the old "cop out" that "distribution has been too widespread for any investigation to be pro- ductive." Aggressive investigation in itself would make people within DoD, for example, aware of the Secretary of Defense's displeasure. I hope that this statement will, if nothing else, convey the thought that to have tight security you must really want tight security and there be no exceptions. Otherwise all concerned are wasting their efforts. Approved For Release 2001/11/08 : CIA-RDP81-00142R000700040003-1 rwwl~ Approved For Release 2001/11/08: CIA-RDP81-001428000700040003-1 There is no U.S. Covcrnr-rcn'_ focal E, ,i;)t for unauthori;:?od discetc,- surer within the Intelligence e~)Omun I.t `; . the- i'li I , for instance, only be- comes aware of a disclosure ]lieu it is r:-ported by a Government component or the White House orders i.t to invest. i,= t?:. Mo:~r disclr}surf-s are handled in-house. Within 1)oD military a encies, there is a bull_t-in conflict of interests. No r:llitary af;r n _ will t,ri barrass itself by identifying a high ranking individual as th soi r-r of classified mat- ter. Only the former Directorate of Inspc .lion Services had that capability. Most important is that there is to much r.eluctanc=e to declassify material appearing in the press to initiate an investigation. Military services, for example, tenaciously defend a clasri.fication which by its own downgrade stamp may have already dropped fr.o,mi Secret to Confident- ial, or even if it has already been declassified in an open hearing. Other prohibitions against declassifying may be valid for the time, allowing the culprit to escape prosecution rather- than allov- tile U.S. to suffer national security damage, but never have 1 known anyone to moni- tor the case for further prosecution when the original prohibitions ceased to exist, bearing in mind the Statute of Limitations. On occasion, an In Camera trial would be appropriate but our prin- cipal problem most frequently centers on the fact that the investigation is often aborted because of character:, and "privfleged leakers" (high Government officials and memb`rs of the U.S. House of Representatives and U.S. Senate) involved. ::apples are t'rovide f in thee Overt Lear. section under the Discussion part. Prosecution of leaks of classified data is generally considered under the Espionage Act, Sections 793 and 794, U.S. Ccd_ Title 18, and Section 2774, Title 42, U.S. Code of the Atomic Energy Act. These sec- tions relate to "leaks" to the news media. In both instances punishment. of the "leaner" can only be achieved if it is determined the person in- tended to injure the United States or provided data for the advantage of a foreign nation. Rarely can it be shown for criminal prosecution pur- poses that the "leaker" wanted to injure the United States. Yet it cannot be ignored that a "leaner" in causing such a disclosure to be made in the press has to be very naive not: to know that enemy foreign agents are reviewing our newspapers and benefit in g from the classified disclosures-. Therefore, an appropriate amendment to Sections 793 and 794 and the Atomic Energy Act might be that it mu,-.t be presupposed that in furnishing classified data which will ippear in the press enemy foreign intelligence will become aware. Approved For Release 2001/11/08 : CIA-RDP81-00142R000700040003-1 Approved For PWfease 2001/11/08: CIA-RDP81-001420700040003-1 Discussion Overt Leaks No one could be more correct than the cartoon character, Pogo, to the effect that "We have met the enemy and they is us." .For many years there has been much concern over "leaks" of classi- fied Defense information and there has been a great outcry about tight- ening the sections of the Espionage Statute which concerns itself with leak matter; promoting a British Official Secrets Act within the U.S. which shifts the burden of proof in some instances to the defendant as where a defendant is in receipt of classified information without authority;' and to legislating an "In Camera" judicial procedure for holding a non-public trial involving the contents of classified docu- ments, thereby precluding the need to declassify it for prosecution purposes, a. current major stumbling block. The practical side of the matter of curtailing "leaks" is that we wouldn't have very many if the investigatory process is allowed to proceed to the end which could result in criminal and/or administrative action taking place. For the greater part this doesn't happen because the investigation is often obstructed because of the characters and privileged leakers (high Government officials, Senators, Congressmen) who become involved and because of a dual standard of prosecution which exists. We always stand ready to take action against a GS-4 employee or a low ranking military person, but not against a high ranking person. Some examples of the above follow. 1. Neil Sheehan of The New York Times had published articles on Vietnam dated March 9- and 21, 1968. Both were referred to the FBI for prosecution. The classified data in the March 19 article came from CIA documents. Because the new Secretary of Defense, Clark Clifford, desired to have better relations with the press, the FBI was told that DoD had changed its mind about declassifying data in the March 21 article. Accordingly, when the CIA learned of this, it took the position that since DoD didn't want to go ahead with an investigation it would not pur- sue its case. The Assistant Attorney General therefore advised the FBI to cease its action. The March 19th article would have uncovered Daniel Ellsberg as its source. His identification would. have spared us the Pentagon Papers, the Pentagon Plumbers, and all that followed including Watergate and President Nixon's resignation. Ellsberg confirmed he would have been trapped. Approved For Release 2001/11/08 : CIA-RDP81-00142R000700040003-1 Approved For Release 2001/11/08: CIA-RDP81-00142R000700040003-1 2. Can March 26, 1970, arc i le - ..: t1 d "Unaher in ti e Middle of the Chau Ai { .ill' appc`;iCe?.1 I: t}tt,' Quo iv?Cl }? iltz%on Star-News. Subsequent revelation- 1-t vea}e?i that the then Under Secretary of State, Edict P i , irdso i, was responsible for allowing Daniel E.llsberg to rnvi higi ly classified cables and that Ellsberg i lue;ii it c[ the data to the newspaper. The purpose r.ep;tcten -,n no that Richaidson could f-oc:us President Nixon' s .:tf Ct:' ii err the plight of Tran Ngoc Chau, a Vietn.caese a sse a1'i va!an arrested by the Thieu regime. An investigation devc? c ped and the results were made known to Secretary of SL._t_ William Rogers but the matter was never reported to thn i and no action was taken against I:llsborg. T t con Idn' = he w.i shout Richardson being accused also. 3. On May 23, 1969, an article apt; red In the Washington Post entitled "Cost Study U"Ses Scuttling of Ten i-Subs,t! by George Wilson. The data was t=ikes from a Secret memo entitled "FY 70 Budget" dated May t. 1969. A bootlegged copy had been sent to Senator .lo}ui C. Stennis' Senate Armed Services Committee. Subsequent iilvost igat ion developed an excellent suspect. As the strings aie being drawn tight, Senator Stennis contacted Se.cre`arv wi Defense Melvin Laird and threatened if we did not cease am investigation he would initiate one on the Defeaso !1:?,wrtmeut:. Case Closed'. 4. On May 10, 1970, an article app-aired in the Washington Post entitled "Secret Laird Memo ban:; Any Talk Even Binting ABM Halt is Desirable." A referenc:v, but not a detailed article, appeared in the New York Tim as. The Post had totally published an April 22, ie,-;tl, Secretary of Defense, Melvin Laird, Secret-Sensitive memo, to all senior. Pentagon officials and senior echelon ntilitar cr_r{ t..?r is .nstractng DoD personnel not to carry on any ci t5 :ussion remotely suggest- ing a halt to the ABM (Anti-Ballist i Missile) Program was desirable. A copy of the Laird memo was furnished anonymously to the Washington Post and The New York 'i' t?ies newspapers. Subsequent investigation identified rho cu 1 pr i.t and the matter was referred to the Justice Depart.ra: whi :}1 had the FBI standing by to move in but Mr. Lair! itu': Ic ci the inventigat i.on back, claiming he made a deal with } [:its ^r of The New 4"urk Times that if he returned the ropy ,-'f the memo in ciuestiou, only "Administrative Action" woulu taken. the Air Force Captain concerned was never direr t I ?? :cc'i ;c d and nothing was ever placed in either his Per , nn?-".1 i i..e or Security file to reflect his deed. Had he -i% ~ np t-or Pia;or he would have been promoted. Approved For Release 2001/11/08: CIA-RDP81-00142R000700040003-1 Approved ForIease 2001/11/08 : CIA-RDP81-00142V000700040003-1 5. The case breaking in Decomher 1911 invol.vi.ng Yeoman Charles Radford and the transrtittr.:i of Iii -Oily classified documents stolen from the briefca.os of Dr. Henry Kissinger and General Alexander Haig was a c l t:;:a ir.. case of an investi- gation being impeded by not only the Wfi f tcc House but by Senator Stennis and his Senate Armocl ~E rv ices Gomm it tee. Although Radford confessed to purl:+in.lug these documents, and his boss, Rear Admiral ThoTna; M. Wciander, and Welander's boss, Admiral Thoma,a M. 1-loorc?r, admitted re- ceipt of them, no action was taken. Senator Stennis' final report suggested that the actions of Radford and Welander should be considered in their next efficiency reports. Neither David Young or Egil Krogh (Co-Plumber Chiefs), my- self (Chief Investigator of the UoD case), John Ehrlichman, or Jack Anderson was ever called b the Stennis Committee which held only 19-1/21 hours of hearings, including recess time covering 3-1/2 days over a 2?--r!.on th period, and there- after took 8 months to generate a ridiculous 11-page final report. The matter was never tumee over to the Justice Department for a prosecutive opinion and the FBI was never requested to assume the investigation. It did piecemeal work, but never knew the full stor,.-. 6. On July 23, 1971, The New York. T' nes carried an article entitled "U.S. Asks Soviets to Join in a Missile Moratorium," by William Beecher. Never have I seen the White House so shook up. President Nixon was furious because Beecher's article dis- closed our fall-back position in the SALT discussions planned in the next day or two. Presidential tape conversations re- leased of his July 27, 1971 conver-,ation:; with Egil Krogh and John Ehrlich:nan demonstrated his c?:ra t h toward a then suspect, Dr. William Van Cleave. Again, this investigation met with obstruction. CIA t".. .. polygraphers were brought in sub-rasa and the FBI polygraphers were dropped at the. last minute. Al-hough the investigation led to the doorstep of Senator Henry Jackson, the FBI never was given authorization to interview him. Beecher, who was the subject of 22 investigations and, I be- lieve, responsible for all principal SALT leaks from 1968 through 1973, was made Deputy Assistant Secretary of Defenses in April. 1973 and in September. 1974 became Acting Assist aL Secretary of Defense, departing in ?lay 1975. Two months later he announced Top Secret informations n an arti;.le in the Boston Globe dated July 31, 1975, entitled "U.S. Believes Israel Has More Than 10 Nuclear Weapons." ?.ate r a former DIA official confirmed Beecher's statem.unt amid- rt +ttsaLs of cotimients from our State Department and the Isra 1 of f i.clals'. Approved For Release 2001/11/08 : CIA-RDP81-00142R000700040003-1 Approved For Release 2001/11/08 : CIA-RDP81-00142R000700040003-1 7. Briefly I'll. Admirals who were gui1, of unau1*it?.~rErF?cl +Js.sclusure:;, but only received a "slap on the wri: r . Oars receiti?ed .3r ad- ministrative transfer to Tokyo in 1967; are >tr,er who com- promised our 10-rear leaf uv.}r ti. Warfare in 1969 received an oral. r r r rtc, ;r? ;c!tt .tor or Congressman Ch-_'t. tiol if icld, an Atomic Energy Cod uitte:_ , advised he of D:_ ie>rse by letter dated November 17, 19() that he was satisfied with the oral reprimand and requested ttn writtou repr .mand be_ placed in the Admiral's file. Dr. Foster, then Director of the Directorate for Defense Research and E igiaeering, was so incensed that he was ready to declassify necessary material for a prosecution; and lastly we have the Admiral who in April 1971 was strongly suspected of giving a Dr. Kissinger highly classified report to the president of an aircraft corporation and was allowed to "coast out" of the service into retirement a few months later unscather-d although grounds existed for a prosecution. 8. Page 24 of. Newsweek Nafazine dated Jua:y 1, 1974, reflects a picture of Senator Lowwell P. WWeicker whL, admitted being the source of "key leaks in the early Watergate investigation." He stated he did it to promote the truth in the Watergate mat- ter. Of course, there was no prosecution, not even a referral to Justice Department. 9. Congressma*_iflichael Harrington in June: 1975 admitted fur- nishing the press highly classified data about Central Intel li- gen-ce Agency operations in Chile, causing great national security consequences. Chairman John J. Flynt of the House Ethics Committee dismissed the complaint against Congressman Harrington of unauthorized disclosure of ca Secret CIA trans- cript because when the data was learned by Harrington it was not an official session of the House Armed Services Committee and no quorum was present. The case was never referred to the Justice Department. 10. And then there was the famous case or Daniel Shorr, who admitted he provided a House Tntcl l Igence Committee report to the newspaper Villae Voice. Again this matter was never re- ferred to the Justice Department, but ins!ead the House Ethics Committee called in a team of former iBl agents to investigate, when the matter clearly fell within the Ft;T's jar-i.sdiction. Approved For Release 2001/11/08 : CIA-RDP81-00142R000700040003-1 -8- Approved For Lease 2001/11/08: CIA-RDP81-00142E 60700040003-1 11. And lastly we have Ur. f E" lr~ i!lgc r S self-;Ilor Lf.ionit iron) leaks such as in the Edward R. F. i!,rr~ art!cle enti.t-led "How Kissinger Did It; Step by Stye 1:. i.l Middle East" and the hundreds of more White Deportment and Military, leaks to publicize the rer.pe _t ive ,i.ri,oirlt > and budget requests. Only the little, person gets Globe. ": Categories -of-J"