LETTER TO MR. NORVILL JONES, STAFF MEMBER FROM OLC

Document Type: 
Collection: 
Document Number (FOIA) /ESDN (CREST): 
CIA-RDP83B00823R000800030005-2
Release Decision: 
RIPPUB
Original Classification: 
C
Document Page Count: 
24
Document Creation Date: 
December 14, 2016
Document Release Date: 
February 21, 2003
Sequence Number: 
5
Case Number: 
Publication Date: 
June 4, 1974
Content Type: 
LETTER
File: 
AttachmentSize
PDF icon CIA-RDP83B00823R000800030005-2.pdf1.24 MB
Body: 
t. r I Cif C.1,1 Pk 1 C- proved-For Release 26633/64/2-5?: cClkgDP83B00823R000800630005-2 CONFIDENTIAL State Department review(s) completed. Mr. Norvill Jones, Staff Member Committee on Foreign Relations United States Senate Washington, D.C. 20510 Dear Mr. Jones: inne 4,1974 This letter is in partial reply to your letter of February 12, 1974, addressed to the Legal Adviser. regret the delay in this response. Unfortunately answers to some of the questions posed in the questionnaire you enclosed are still under consideration. The answers in this letter are as complete as possible at this date. Because of the contents, this letter and some enclosures, are classified. Where particular responses are un- classified, this is so indicated. BEGIN UNCLASSIFIED With respect to the first several questions, which are among those for which answers are still under consider- ation, I would like to make clear that the Department of State has not been asked by the FBI to approve any surveillance of any American in the United States or abroad, nor has the Department asked the FBI to institute any surveillance of Americans in the United States or abroad. There are no regulations on that subject. With this general introduction, our specific responses for the present begin with question 7. 7. ,For any electronic surveillance of an American which was initiated, approved, or conducted by the Department during each of the last ten years, or is currently in operation, please state: (al) where the request originated (State, FBI, etc.); ? (b). the name of the highest State official to approve the reuest; Classified by SUBJECT TO C.'77-1.7...7j_ DECI ,f7?.S,;;!7iCAT:!.."';' OcL?...rldizfil)c-D ER Vti `LASSiFizp _ CROUP 1 Excluded automa-:tio dev,-n.zrading and - ? uNATION[ SECURITY declassifica.;tion Unauthori::: CRC, 2/12/2003 Approved For Release 2063/04/25 : CIA-RDP83B00823R000500030005-2. Approved-For Release 2003/04/25 : CIA-RDP831300823R000800030005-2 (-) tflle ant and (1) ths ntt?ora1 ecuri4- ju-tificati,= A fl,-3arch b2 the tate 1)elnartnentIs records ;1c.'sr tha Lariz),..1 1954-1374 has dl id no inztance of -?.lactronic s-ar7e1llance of Azaerican citizana having 1,4SA r-l'ac?leted Or coilducted by the Dapar-!=ant of 11;tata-Nie i10 haw ot t'ae D'apaxt=ent 3tate having a:Ipro-ied 3uch ,-,;=r7e111.:v1c0. z?a are a-Aiaro of 0...mly one insFal,ca (aes.cribed h,c0,,,,o) 0F anA-.11'0.assaaor or et.Lutr, Decart=entliar in a -cost a:zt-road participating iu the avuroval pr,=e3$ Zor such we ceismot e=luda the possi2al1it7 that other Zmbezsv-ased personel ayha7s. participatad. ol.4.a.-ent of the D4fanze :3eparnt .a.;?loyed a telephone t_a? it ;la A.-gericaa Zaa;:..assv at aR -)v,r3-eas :'.ocation during 21-27:iarch 1973. This t4i,ler';,hozle intercept used in the office of aA Zziericaa military ne.elber who *:ias th,e subjftct 02 a =4-air...a3 lutftetigation tether wizh 7nrious local national 3-asi,aects. it was carried out tha proylsions of 1:t_f) Directi7e 5200.24 and r-,-;:ertaa. to L.he tiflace of the Secret-1-y of 7--.4faAse az r3snired by that r iitit The action was ten with the concurrance of the Chia/ of 14Issioz b4s-ed on prob- abl*-calase which was dotarnined by th.a 5ubjects nilitary coomander. Lrietigatiort In7olved va,s joillt17 cond=cted by Unitod States nilitar7 in7esti- gative personntel local aational 7.olice authorities. The invastigatiort vas of vmtual c;c.4.Acern to both cotIntriee. in this instaaca, the acttiroval an conduct originat.2d with the 1"3partzent of Deianse an,Jer the 'rciiisicus DCD regulation aa cited above. Since the z..2...-mcusreltce Or the Chief of :Aisi$ion wao obtained, however, it is being Included in our ret-417. _9- What wou14 be the affect or, the opernica ol? the _";eeartmft,nt 12 a Jr:a-IA-1A1 warrant were rr!tquired 3:or initiatics o 11 olatft:mniz surveillance:IshLc axo now i:litiattld or clearad b7 the 9. Th e Da:partm*ut of Stats haa n intereat in an tjitatelliTeneleotmeritelligees prosx,ter btlt would aa;-!ar to tl..0 operating alencies conc;erniug the i=plications c) a warrant p=30te(i2xe :Izr :their crogra.. To tha tnIt.ent that a -?larl-ant -,)roce'..ire incr_la.3e ri3k 01 -X1)40aUr.21 :ther'sCa1d alz:o ezaz.m?ag to rn,,A1 3.tates forign rzlations. Approved For Release 2003/04/25 : CIA-RDP83600823R000800030005-2 Approved_For Release 2003/04/25 : CIA-RDP831300823R0008000300053Z 11. For each of the last ten years please provide the. number of: (a) surveillances of Americans within the U.S. initiated, approved, or conducted by the Department of State, broken down between wiretaps, electronic eavesdropping ("bugs"), physical surveillance, cover surveillance, and other surveillance? (b) surveillances of Americans abroad which were initiated, approved, or conducted by the Department of State, broken down between wiretaps, electronic eavesdropping ("hugs"), physical surveillance, cover surveillance, and other surveillance (please indicate any overlaps, e.g., if an American was the subject of both a wiretap and a bug)? 11.(a)(b) A search in the State Department records for the period 1964-1974 has disclosed no instance in which surveillance of Americans, either in the United States or abroad, has been requested, approved, or conducted by the Department of State, except for the special case, mentioned in 7 above. Cs. 12. With :reference to electronic or personal surveillance of Americans abroad: (a) Are there any regulations governing the clearance and conduct of such 'operations? 12.(a) Yes, the general regulations on special investigative techniques previously furnished apply to this kind of case as well as to others (see SY 433;10 .enclosed Tab A). 12. With reference to electronic or personal surveillance of Americans abroad: (13) Does the FBI or CIA normally ask for the ambassador's approval for such operations? If so, does the ambassador seek the Department's advice or keep the Department informed about such requests? Approved For Release 2003/04/25 : CIAIRDP83B00823R0008000300-05--2- Approved For Release 2003/04/25 : CIA-RDP83800823R000800030005-2 4. 12.(3) Nb. The President's letter of December 9, 1969 places on each Ambassador full responsibility to direct and coordinate the activities and operations of all elements of his mission. He is responsible for the activities of all personnel present in. the country to which he is accredited with the exception of members of military commands controlled by the President through the Secretary of Defense. Senior Representatives of other .governmenti_acgencies are required to seek the Ambassadors' guidance on policy matters but the Ambassador is not expected to be cognizant of operational details or to inform the Department of them. The FBI, however, does not normally carry out investigations overseas; it carries out liaison activities with foreign police and security units. 12. With reference to electronic or personal surveillance of Americans abroad: (c) Does the Department know how many Americans abroad are currently under U.S.-initiated surveillance, either beiri'g carried out by a U.S. agency or by cooperating foreign officials? 12.(c) No. 12.- With 'reference to electronic or personal surveillance of Americans abroad: (d) In what proportion of the cases is surveillance of Americans abroad carried out withbut the approval or knowledge of the ambassador? 12.(d) Not known. 13. With reference to investigations for leaks, please provide: (a) the number of investigations for leaks in each of the last ten years, including the specific leak investigated. Approved For Release 2003/04/25: CIA-RDP83800823R000800030005-2 Apnved orReleas_e 2003/04/25 : CIA-RDP83B00823R000800030005-2 uuring u-ie past ren y-E -s, tne uepartment has investigated 23 cases of unauthorized disclosure of classified or privileged information. In many cases, the Department's inquiries were but a part of a broader investigation involving other Federal agencies. The incidence of cases, by year, was as follows: 1964: 2 1969: 3 1965: 0 .1970: 2 1966: 1 1971: 8 1967: 0 1972: 3 1968: 4 1973: 0 For specific leak investigated see summary at Tab B. CONFIDENTIAL 13. With reference to investigations for leaks, please provide: (b) for each investigation, please indicate those in which the leak was traced to the source. 13:(b) (At Tab B is a summary of leak cases which provides supplementary responses to questions 13(b) through (f)). In two cases investigation identified the source of the unauthorized disclosure. As noted in the summary, a number of cases concerned informati6n which had been distributed to other agencies as well as the Department of State. Because some of those cases were controlled or investigated by the other agencies concerned, we are unable to state what degree of success they might have had in identifying sources. 13: With reference to investigations for leaks, please provide: (6) for each investigation in which a lie detector was used, a list of the names of Department of State personnel subjected to testing. Approved For Release 2003/04/25 : CIA-RDP83600823R000800030005-2 6. Approved For Release 2003/04/25 : CIA-RDP83B00823R000800030005-2 13..(c) The. polygraph was used in the investigation of only one case, which was neither requested no-r- conducted by the Department of State. The informa- tion had been available to certain Departmental officials, however, and three were asked to undergo polygraph examination which they voluntarily did. The name's of these officers are contained in investigative files which believe should not be disclosed in order to protect the integrity of the files and the privacy of the officers. 13. With reference to investigations for leaks, please provide: (d) for each year, the number of "special investigative techniques" used in an effort to track down leaks. Give full details on the leak involved, the number of people subject to the "special investigative techniques", the nature of the "special investigative techniques", who carried out or administered those techniques, etc. 13:(d) Other than the aforementioned use of the polygraph in one case, none of the other investiga- tions involved any special investigative techniques. All investigations were limited to interviews with persons known or believed to have had access to the documents or information involved. BEGIN UNCLASSIFIED 13. With reference to investigations for leaks, please provide: (e) for each leak investigated, the name of the official who originated the request for the investigation -- either within the Department or outside. 13:(e) Originators of the requests for investigation of unauthorized disclosure have been identified in the summary enclosed at Tab B. Approved For Release 2003/04/25 : CIA-RDP83600823R000800030005-2 STATI NTL 't Approved For Release 2003/04/25 : CIA-RDP831300823R000800030005-2 ? 13. With reference to investigations for leaks, please provide: (f) copies of all reports prepared within the Department as a result of investigations of leaks over the last ten years. 13:(f) The relevant questions about the investiga- tions have been answered in the summary at Tab B. These reports are contained in investigative files which We believe should not be disclosed in order to protect the inte6=-r1ty of the files and the privacy of those under investigation. 13. With reference to investigations for leaks, please provide: (g) copies of all regulations, instructions, or orders issued within the Department, or applicable to the - Department, during the last ten years relative to investigations for leaks (which have not already been supplied). 13:(g) Attached at Tab C are extracts of the instructions relative to the investigation of leaks of information. , 14. With reference to the U.S. Intelligence Board, please provide the following information insofar as it is known from Departmental participation in the Board: (a) Does the-Board ever recommend the initiation of electronic surveillance operations? (b) Is the Board apprised of the existence of electronic surveillances for national security purposes? If so, in what manner? (6) Describe the Board's role, if any, in investigations for leaks. Approved For Release 2003/04/25 : CIA-RDP83600823R000800030005-2 Approved-For Release 2003/04/25 : CIA-RDP831300823R000800030005-2 8 . (d) What was the Board's involvement, if any, in the investigations for leaks of information regarding the SALT negotiations, the Pentagon Papers, the Jack Anderson documents and other leaks during the period 1969-1972? (e) Does the Board ever consider inter-agency matters relating to U.S. electronic surveillance activities? 14. While the Department of State has membership on the United States Intelligence Board, its Chairman is the Director of the Central Intelli- gence Agency and the Department believes that any questions concerning the Board's activities or policies would more properly be addressed to the Chairman. 15. How many electronic surveillances initiated, approved, or carried out by State were terminated as a result of the Supreme Court decision in the Keith case, United States v. United States District Court, 407 U.S. 297 (1972)? 15. State had no such surveillances. 17. For each of the last ten years, please indicate the number of each of the various types of "special investi- gative techniques" carried out on Americans by Department of State personnel, broken down by type of "technique" used, whether in the U.S. or abroad, and whether the subject was an employee of the Department of State, a reporter, or other private citizen. 17; To the best of the Department's knowledge, none of its personnel has employed any "special investigative techniques" in relation to any American citizens at home or abroad in the past ten years. la. How many reports have been received from posts abroad for each of the last five years concerning U.S. citizens traveling abroad who "indicate a disaffection toward the United States", as specified in 11 FAN 430.1? Approved For Release 2003/04/25 : CIA-RDP83600823R000800030005-2 9. Approved For Release 2003/04/25 : CIA-RDP83B00823R000800030005-2 11 There is no statistical .urea_kdown possible on this. A. manual check of passport records would be necessary. 19. How many reports have been made pursuant to the telegram of November 2, 1972, concerning the reporting- by U.S. diplomatic posts on the activities of U.S. military absentees in foreign countries? 19. The Department of State does not record these reports, which are primarily of concern to the Defense Department. 20. Please supply the following information for the Department of State: (a) Number of personnel on the Department's rolls with the technical skills to conduct electronic surveillance (either bugging or tapping). 20:.(a) The Department assumes that virtually anyone who can operate a home tape recorder could effect an electronic surveillance. Anyone with any of a wide variety of technical skills or experience would be even more likely to be able to do so, using equipment readily available in open commerce. Thus, it is a virtual impossibility to determine the number of personnel on the Depart-. -ment's rolls with adequate technical knowledge to conduct electronic surveillance. To be sure, any of the engineers or technicians of the Office of Security who are involved in the effort to counter electronic and other forms of surveillance of State premises and personnel presumably could conduct positive surveillance but none do nor. are there any personnel on the rolls or on contract to the Department of State whose duties are to engage in such surveillance activities. 20. Please supply the following information for the Department of State: (b) The number of pieces of equipment owned by or in the control of the Department capable of being used for: Approved For Release 2003/04/25 : CIA-RDP83600823R000800030005-2 Approved For Release 2003/04/25 : CIA-RDP83B00823R000800030005120 (1) telephone surveillances, (2) microphone surveillances, (3) recording telephone calls without knowledge of the caller. 20.(b) Again, assuming virtually any tape reco7-der could be used to record telephone or other conversa- tions surreptitiously, any effort to account for all such pieces of equipment would require the review of literally hundreds of inventory records and to little practical purpose. In actual fact, the Department does not engage in electronic surveillance and, therefore, has no equipment intended for that purpose. 21. Please provide a copy of any forms used in connection with: (a) the initiation, clearance, implementation, or termination of any type of surveillance of American citizens. - 21.(a) The Department of State has no forms for use in connection with the initiation, clearance, imple- mentation, br termination of any type of surveillance on American citizens. ?? 21. Please provide a copy of any forms used in connection --(b) the use or storage of information obtained through surveillance initiated or approved by the Department of State.- t; 21.(b) There is no form specifically designed for oA:1[PAcc!oN_I such?infarmatiou. 21., Please provide a copy of any forms used in connection with: (d) requests from the FBI or other agencies to the Department, or requests initiated within the Department, for information on Americans abroad. Approved For Release 2003/04/25 : CIA-RDP83600823R000800030005-2 Approved For Release 2003/04/25 : CIA-RDP831300823R000800Q3000541. 21.(C) The Department of State has no forms for use in connection with requests for information on Americans abroad. 22. Please provide: (a) all effective directives concerning relations with the FBI. 22.(a) Copies of Foreign Affairs Manual Circular NO. 102A and Department of State Instructions CW-4099 (November 9, 1961) and CW-4999 (December 19, 1961) were submitted previously in the informal stage of this review. Executive Order 10450 (Section 8-d), of course, requires referral to the FBI of any information developed during the background investigation of an applicant or employee which indicates the individual may have been guilty of disloyalty or certain other activities adversely affecting the national security 22. Please provide: (b) copies of all existing statutes, executive orders, and regulations concerning reporting on Americans resiaent abroad. 22.(b) See 11 FAM 430 previously furnished. 23: Does the Department maintain files on individual U.S. citizens who could be classified as potential "trouble makers" for foreign policy or security reasons? If so, please describe the extent of these files. Describe the inter-agency procedures in effect for sharing information of this nature. 23: Under Department regulations (22 C.F.R. 51.70(b)(4)) a passport may be refused to a person ! when the Secretary determines that his activities abroad are causing or are likely to cause serious damage to the national security or the Approved For Release 2003/04/25 : CIA-RDP83600823R000800030005-2 Approved For Release 2003/04/25 : CIA-RDP83E00823R000800030005-2 12 foreign policy of the United States. Information received by the Department bearing on the appli- cation of this regulation to a particular individual would be placed in the passport file of that individual. Also under Department regulations (22 C.F.R. 51.33), information in passport files is privileged and may not be released except: "(b) Pursuant to a subpoena or court order directing the production of passport records. "(6) At the request of another Government agency. "(d) When expressly authorized by the Secretary." Finally, as indicated in the enclosure (Tab D) labeled 'Protective Intelligence", the Office of Security maintains some files on what might be called "trouble-makers." 24. Has the United States entered into international agreements for commitments concerning electronic sur- veillance operations involving foreign diplomatic missions in the U.S.? If so, please provide the text of tilose agreements or commitments? 24.. There are no agreements of this kind. The Department is not aware of any commitments of this kind. Telephone Addition to List of Questions: When the Vienna Convention on Diplomatic Relations was submitted to the Senate, was any consideration given to the relationship of Article 22 to wiretaps or other electronic surveillance of foreign diplomatic missions? Approved For Release 2003/04/25 : CIA-RDP83B00823R-000800030005-2 Approved For Release 2003/04/25 : CIA-RDP831300823R000800030005/ 3 ANSWER: We have no record that this matter was considered. However, our records do indicate that Article 22 was one which was considered by the United States as reflective of existing customary international law and United States practice and was not a change in law. We note the provisions of Article 47, paragraph 2, as of potential relevance. Enclosures: As stated. Cordially, Linwood Holton Assistant Secretary for Congressional Relations - Approved For Release 2003/04125 : CIA-RDP83600823R000800030005-2 - pproved For Release 2003/04/25 : CIA-RDP83B00823R000800030005-2 ? 433.10 Special Investigative Techniques The Special investigative technique's. such as trash cover, mail cover, technical or physical surveila.nce, or the polygraph, will not be used without prior approval of Head- quarters. If the Special Agent in Charge deems a special Technique to be necessary the will submit his request in writing to the Deputy Assistant Secretary for Security through the Chief, Division of Investigations. Under no circumstances will any of the . special techniques mentioned above be initiated without prior approval of the Deputy Assistant Secretarysfor Security. ? ? CROUP 1 rxeluded from automatio Covngradlng and deolassificatIon 5-20-66 TL:SY-i CONFIDENTIAL Approved For Release 2003/04/25 : CIA-RDP83600823R000800030005-2 COI,TFIDENTIAL Approved For Release 2003/041257-CIA=RDP83B00823R000800d30005-2 ISUMARY OF LEAK OF INFO7ATION INVESTIGATIONS COi\!DUCTID BY TE OYZICE CF SECuaTTy 1964 On March 26, 1964, the Associated Press and columnists Robert S. Allen and Paul Scott of the Northern Virginia Sun carried articles concerning a sensitive project LT-Tended to determine the location of American defectors. No special investigative techniques were used and the source of the unauthorized disclosure was not identified. The Administrator of the Bureau of Security and Consular Affairs requested the inquiry. In 1964 the Central Intelligence Agency requested investigation of the suspected unauthorized disclosure of a classified CIA document which had been distributed to the Department of State and other agencies. Inves- tigation revealed that the document was handled in an irregular manner but that there was no actual compromise. No special investigative techniques were used. 1965 None conducted. 1966 On March 23, 1966, the New York Times published an ---.- article written by John D. Pomfret which revealed infor- mation from an administratively controlled:airgram to the American Embassies in Paris and Moscow and also details of a classified internal memorandum which rebuked the Departmental official who was mistakenly thought to have authored the airgram. The source of the dis- closure of the airgram was identified but the individual ?responsible for the disclosure of the classified memo ' was not. No special investigative techniques were used. The investigation was requested by the then Deputy Under Secretary for Administration. None conducted. 1967 CONFIDENTIAL 1 fre;II 'automatic -Ar3rTroved-FOr Release-2003/04/25 '.--CIA:RDP83B00823-RaGG8-0063.0005-2 - In 1 Witck468-FiakEi126'0144 5 t'IA:RnindiEittOgin314000800011TOOT-2ed about leak of certain sensitive in- Juse adminittrative natters to the local diplomatic community, reauested an investigation. by the Office of Security. No special investigative techniques were used and the source of the disclosures was never identified. In 1968 the text of a Department of State classified telegram to the Embassy at Panama became known to a private American businessman. The Deputy Assistant Secretary for the area requested an investigation but the source of the disclosure was never identified. No special investigative techniques were used. In 1968 the Inspector General, Department of Agriculture, requested investigation of the alleged unauthorized possession by an American businessman of a classified telegram which originated with the Agricultural Attache at the American Embassy, Saigon. The Office of Security began an inquiry but, when the matter appeared to come within the jurisdiction of the Inspections Staff of the Agency for International Development, the case waS turned over to the latter agency. Tn articles appearing in the October 18, 1968, and November 17, 1968, issues of the Washington Post, re- --porter Warren Unna revealed classified information con- cerning the sale of military equipment to Pakistan. The. source of the unauthorized disclosure was never identified. No special investigative techniques were -employed. The Assistant Secretary for Near Eastern and South Asian Affairs requested the investigation.' ;1969 In 1969 the Department learned of the pos-sibility that a classified report from the American Embassy, Montevideo, may have been disclosed to an American missionary in Uruguay while the latter was on leave in the United tk:States. Investigation failed to identify the source of the .disclosure. No special investigative techniaues were used. The inquiry was conducted at the initiative of the Office of Security. On February 25, 1969, an article in the Washington Post by Flora Lewis revealed classified information concerning U.S.-Spanish negotiations relating to U.S. bases in Spain. No special investigative techniaues were used and the source of the unauthorized disclosure was not identified. The Country Director reported in advance CONFIDENTIAL Approved For Release 2003/04/25 : CIA-RDP83600823R000800030005-2 CONFIDF2TTIAL Approved For Release 2003/04/25 : 01A-RDP831300823R000800030005-2 that the article was due for publication and the results of the inquiry were reported to the Under Secretary. On June 18, 1969, an article in the New York Times by Peter Grose revealed classified information derived from a meeting of the U.S. Intelligence Board. The ?Attorney General requested limited inauiries and affidavits prepared by those Departmental officials -who had had access to the information were submitted to the Department of Justice. No ?special investiga- tive techniques were used in the Departmental phase of the inquiry and State was not informed of the eventual resolution of-the matter. 1970 On January 25, 1970, an administratively controlled telegram from the American Embassy, Ottawa, which concerned a deserter from the U.S. Navy, was shown and read on Canadian television. No special investi- gative techniques were used. The source of the dis- closure was traced to U.S. Navy authorities in Boston who had received the message from an unidentified source in the Defense Attache Office, American Embassy, Ottawa. The investigation was requested by the American Embassy, Ottawa., In 1970 the FBI requested investigation of an apparent unauthorized disclosure cE one of its documents which had been disseminated to the Department of State and-- --other agencies. The Department phase of this inquiry did not identify the source of the disolosUre. No -special investigative techniques were used and the Department does not know whether the source of the -disclosure was ever identified. 1971 In a Washinuton Post article on February 7, 1971, Michael Getler revealed highly sensitive information derived from CIA information which had been distributed to several Federal agencies, including the Department of State. No special investigative techniques were used in the State phase of the inquiry and we do not know whether the source of the unauthorized disclosure was ever identified. The investigation was requested by CIA. CONFIDENTIAL Approved For Release 2003/04/25 : CIA-RDP83600823R000800030005-2 In /,,.paivealrdERddhaseD2093/1)4/2051AIRCAROBOOMFP00099_31:Wt; American _asinessman was in possess_Lon of a Secret telegram originated by the American Embassy, Singapore. Investigation by State and the Department of Defense identified the source of the unauthorized disclosure as an official of the Department of Defense. No special investigative technicues.were used in the Departmental phase of the inquiry. Results of the _investigation were reported to the Executive Secretary of the Department of State and to the Secretary of Defense. In an article in the Washington Evening Star on March 23, 1971, Jeremiah O'Leary disclosed highly classified information believed to have been derived from telegrams originated at the U.S. Embassy, Quito, and distributed to several Federal agencies. Inves- tigation by State and Defense failed to identify the source of the leak. No special investigative techniques Were used. Investigation was requested by the U.S. *Mbassy, Quito. An article by George C. Wilson in the Washington Post on March 21, 1971, revealed information derived from a. sensitive document which had been disseminated to a ?71umber of Federal agencies. Investigation of the State Department phase of the inquiry failed to disclose the source of the disclosure. No special investigative techniques were used. The U.S. Intelligence Board re- quested the investigation. In his July 27, 1971, article in the Washinaton Post, Jack Anderson revealed information derived from an ex- change of classified telegrams between the American Embassy at Nairobi and the Department of State. Inves- tigation did not disclose the source of the unauthorized disclosure. Contrary to a subsequent Anderson columlon September 30, 1971, no special investigative techniques were used. The inquiry was requested by the Deputy Under Secretary for Management. On July 23, 1971, a New York Times article by William Beecher revealed highly classified information con- cerning the U.S. negotiating position in the SALT Talks.. Atthe direction of the White House and with the qualified concurrence of the Secretary of State, three CONFIDENTIAL Approved For Release 2?03104125: CIA:RDP83B013873RD-0080D0-301705=2---- offiaioPiUleWhVS-Taig:brAqq_IFfilioOk231146#661A130005-2 examinati administerea by ano,_er _eaera agency. The Secretary's .approval was conditioned upon the willingness of the three officials and all three voluntarily participated. No other special inves- tigative techniques were used by or in relation to Departmental Personnel and, to the best of the Depart- ment's knowledge, the source of -the disclosure was -never identified. The Departmental phase of the investigation was reauested by the Executive Secretary of the Department and all results were reported to Mr. Egil Krogh at the White House. On August 13, 1971, an article in the New York Times by Tad Szulc revealed information derived from a classified CIA document which had been distributed to the Department of State. No special investigative techniques were used and the source of the disclosure was not identified. The Departmental phase of the investigation was requested by the Deputy Under Secretary for Management and the results were reported to Mr. Egil 'Krogh at the White House. In 1971 several foreign newspaners published the .sub- _stance of a Secret telegram which had been sent to our embassy at 'Paris and to our "interests section" at Algiers. . _Investigation revealed that the unauthorized disclosure probably occurred in the United States and possibly :through one of the several other agencies which were .includ-ed on the distribution of the telegram but the --actual source was not identified. No special investi- gative techniques were used during the Denartme.ntal- - ?phase of the inquiry. The Office of Security initiated the investigation upon learning that the Algerian Govern- --ment apparently had a cony of the telegram and the results of the inquiry were reported to the Country Directors most directly concerned.' 1972 On July 26, 1972, a syndicated article by Jack Anderson concerning U.S.-Paraguayan efforts to control narcotics traffic revealed information derived from or attributed to classified State Department telegrams. The Country - Director brought the matter to the attention of the CONFIDENTIAL Approved For Release 2003/04/25 : CIA-RDP83600823R000800030005-2 Office of Security but did not specifically request 14 an inAve st (ertfi easeldpa 5 talibizi83r6.66gtiQ8tOkidaftid likelrge? m or tne di cE;-ure was classified re- port prepared by the Bureau of Narcotics and Dangerous Drugs which included the Department's information. Under the circumstances, the investigation was not continued by the Department of State. No special in- vestigative techniques were used in the inquiry and the source of the disclosure was not identified. On October 2, 1972, a syndicated column by Jack Anderson revealed information derived fronl or attri- buted to a classified telegram from the American Embassy at Kuwait. The Office of Security was not requested to conduct any investigation of the leak but did report the internal Departmental distribution of the telegram to the National Security Council at the latter's request. No special investigative techni- ques were used and there is no indication in the file that the source of the disclosure was ever identified. On July 24, 1972, an article in the New York Times by Seymour Hersh revealed classified information from a report of the International Narcotics Control Task .Force on Air and Sea Smuggling. An investigation by the Office of Security was unable to resolve conclusively the source of the disclosure. No special investigative techniques were used. The investigation was requested by the Deputy Under Secretary for Management. 1973 No investigations of unauthorized disclosure were __conducted. CONFIDENTIAL Approved For Release 2003/04/25 : CIA-RDP83600823R000800030005-2 Approved For Release 2003/04/25 : CIA-RDP831500823R000800030005-2 446 Miscellaneous Lives tigations 446.1 Leak of Information Cases 446.l1 General A leak of information case arises when classi- fied or administratively controlled informatior becomes available to a person or persons not authorized to receive it. Obviously a person unauthorized to receive classified information Is unlikely to reveal the source from which he obtained it. Therefore, the Special Agent, in all probability, will have to use an indirect Method of investigation. Cases of this kind are extremely difficult to solve, since.infor- rnation may be disseminated in a variety of ways. However, certain inquiries may aid in determining how the material was compromise or at least indicate some of the ways in which compromise could have occurred. 5-20-66 CONFIDENTIAL CROUP 1 tv!lu'led fren auf-or.latio dow)grAdln and slaelmssIftosktton ? Approved For Release 2003/04/25 : CIA-RDP83B00823R000800030005-2 TL:SY-1. 416.12 Origin of the Inf.,rmat!?ol The Depa rtrri fiPrTYc F,oirt-Bopqggr?pp,m4/25 : CIA-RDP83B00823R000800030005-2 hticed- offices abroad. other ?_....o..ertm?to,,, other United States agencies, and individual addition to information ti!it ,riHnates in th. Department. The first st. p in a leak of infor- -rnation that has been compromisc.d. After determining the origin and the date of it arrival in the Department of t.de, the -pecial Agent should look into the possibilities of compromise outside the Department. In this regard it may be necessary to request that inquiry be made abroad or by some other agency through Headquarters. 446.13 Investigation of Possibility of Leak ? in the Department In following up possibilities of t ompromlse within the Department, the number of copies of the basic document involved, together with the distribution given the copies, should be determined. If the basic document is (1) an Operations Memorandum; (2) a telegram; (3) a WIROM; or (4) an airgram, this information should be obtained from the Records Services Division. If the document in question is an Official-Informal letter or an office memo- randum, the office of primary interest (action.) will have to be contacted. Following this, --inquiry must be made at each office receiving copies to determine the names of the individuals ? who received the document; the present location of the copies; whether any copies have been -destroyed; and Whether or not any person having access to the compromised information made the document available to others, dis- cussed it with others, or discussed it in any place where the information might be in- ? advertently overheard by others. Inquiry must also be made to establish if any copy -has been left exposed in an unoccupied office, hag been taken from the Department, or otherwise handled in a way that might lend Itself to compromise. In making these in- vestigations, the Special Agent should coordi- tate with the appropriate unit security officers. the cooperation of the Special Assistant for Press Relations has been valuable in such taaes, and he may be contacted. Representa.- Allies of the Press are not to be interviewed by Special Agents in connectiot, with these Cates without special permission from !lead- curlers. CROUP 1 Excluded from automstlo downgrading and declassification TL:SY-1 5-20-66 CONFIDENTIAL ApgroVed FO? Rele-ate- 20D3104/25 CIA-RDP.8313008-2iMAJOB-001Y3DU05:2- cu14.1.'10=IAL Approved-For Release 2003/04/325 : CIA-RDP83B00823R00089030005-2 - - PROTECTIVE INTELLICE7TCE In fulfilling its responsibilities for the protection of the Secretary of State and certain other dignitaries, the Office of Security maintains files concerning Per- sons who have written threatening letters or otherwise made themselves suspect as rtential threats to the safety of the Secretary or other persons protected. The relevant portion of our-Instructions_and Procedures -is quoted below: ? '"The Office of Security maintains a 'crank and threat' file. The file is maintained in two parts: 1, alphabetical, by name; 2, geograiphical. The file consists of all 'crank and threat' letters ,received by mail, summaries of all crank telephone calls, summaries of statements made by and the Physical :descriptions of all unauthorized visitors to the Secretary of State and foreign dignitaries visiting the United States, and information l'urnished by other intelligence agencies of the U.S. Government. When the Secretary of State travels abroad or visiting . dignitaries travel in the United States, pertinent inf6r- mation from this file is forwarded to the Special Agents and Security Officers concerned." When the Secretary or other persons being protected travels to a different jurisdiction either home or abroad and we have reason to believe any potential serces of threat are located in these jurisdictions, it is our practice to provide a summary of information available ?.regarding these sources of threat to the local official 'sharing the protective responsibilities. We also share protective intelligence information with the United States __Secret Service and other Federal agencies as appropriEte - when the nature of the information suggest that it falls within the scope of the latter's lawf-L_IaL7Isporlities. 1/FLOW CONFIDENTIAL MOUP'T Ec1urd.2a -1:ro automatic e.dirig and ? do.clasifi_cation. - Approved For Release 2003/04/25 :.CLA-RDP83B00823R000800030005-2 Approved_For Release 2003/04/25 : CIA-RDP83130_0823R000800030005-2 TRANSMITTAL SLIP, DATE 19 June 1974 T0 ROOM NO. 4E60 BUILDING REMARKS: Per conversation with Section of pages. done. concerned is clipped at top Please return to OLC when FROM: OLC ROOM NO. 7D43 BUILDING EXTENSION Hqs FORMHO.24 1 REPLACES FORM 36-8 1 FEB 55 WHICH MAY BE USED. (47) STAT STAT STAT Approved For Release 2003/04/25 : CIA-RDP83600823R000800 OS REGISTRY R.5Z? 66)7SZ