REPORT OF THE INTERDEPARTMENTAL GROUP ON UNAUTHORIZED DISCLOSURES OF CLASSIFIED INFORMATION
Document Type:
Collection:
Document Number (FOIA) /ESDN (CREST):
CIA-RDP84B00049R001102740032-7
Release Decision:
RIPPUB
Original Classification:
K
Document Page Count:
64
Document Creation Date:
December 20, 2016
Document Release Date:
August 6, 2007
Sequence Number:
32
Case Number:
Publication Date:
March 31, 1982
Content Type:
MEMO
File:
Attachment | Size |
---|---|
CIA-RDP84B00049R001102740032-7.pdf | 2.54 MB |
Body:
Approved For Release 2007/08/06: CIA-RDP84B00049RO01102740032-7
C 3ffiuP d t4p kta PR (r Pxwra.1
Was4ingtun,T. QL 2II 3D
March 31,-1982
MEMORANDUM FOR THE PRESIDENT
SUBJECT: Report of.the Interdepartmental
Group on Unauthorized Disclosures
of Classified Informa :ion
At the request of William P. Clark, I convened an
interdepartmental group to study the effectiveness of
existing statutes and Executive orders prohibiting unau-
thorized disclosure of classified information. This group
was chaired by Deputy Assistant Attorney General Richard K.
Willard and included representatives of the Secretaries of
State, the Treasury, Defense, and Energy, and the Director
of Central Intelligence. Attached is the report of this
group. _
Unauthorized disclosure of classified information
constitutes. a serious threat to our national security.
It is a complex problem that cannot be solved easily or
quickly. However, the effectiveness of our enforcement
effort can be improved by adopting the recommendations of
this report, which I. endorse.
Attorney General
Attachment
William Frerich"Smith- .
DOJ Review
cc: The Secretary of State
The Secretary of the Treasury
The Secretary of Defense
TI),ee Secretary of Energy
jfhe Director of Central Intelligence
The Assistant to the President for-
National Security Affairs
Approved For Release 2007/08/06: CIA-RDP84B00049RO01102740032-7
Approved For Release 2007/08/06: CIA-RDP84B00049RO01102740032-7
REPORT OF THE
INTERDEPARTMENTAL GROUP
ON UNAUTHORIZED DISCLOSURES
OF CLASSIFIED INFORMATION
March 31, 1982
Chairman:
Richard K. Willard.
Deputy Assistant Attorney General
Department of Justice
Members:.
Daniel W. McGovern
Deputy Legal Adviser
Department of State
Jordan Luke
Assistant General Counsel
Department of the Treasury
Kathleen A. Buck
Assistant General Counsel
L. Britt Snider
Director for Counterintelligence
and Security Policy
Department of Defense
James W. Culpepper
Deputy Assistant Secretary
for Security Affairs
Department of Energy
Deputy General Counsel
Central Intelligence Agency
STAT
Approved For Release 2007/08/06: CIA-RDP84B00049RO01102740032-7
Approved For Release 2007/08/06: CIA-RDP84B00049RO01102740032-7
Introduction
This interdepartmental group was convened by Attorney General
William French Smith at the request of William P. Clark,.the
Assistant to the President for National Security Affairs. Members
of the group were designated by the heads of participating depart-
ments and agencies. The group met throughout February and March
of 1982, and this report generally reflects the consensus of the
individual participants. However, the report and its recommenda-
tions have not received the approval of the participating
departments and agencies. We anticipate that the proposed
National Security Decision Directive would be circulated for
formal agency comment before being approved.
RICHARD K. WILLARD
Deputy Assistant Attorney General
Department of Justice
Chairman
Approved For Release 2007/08/06: CIA-RDP84B00049RO01102740032-7
Approved For Release 2007/08/06: CIA-RDP84B00049RO01102740032-7
Table of Contents
A. Executive Summary
B. Nature of the Problem and Scope of Report
C. Laws Pertaining to Unauthorized Disclosures
D. Protective Security Programs
E. Past Experience with Leak Investigations
F. Proposed New Approach to Leak Investigations
G. Draft National Security Decision Directive
Approved For Release 2007/08/06: CIA-RDP84B00049RO01102740032-7
Approved For Release 2007/08/06: CIA-RDP84B00049RO01102740032-7
Approved For Release 2007/08/06: CIA-RDP84B00049RO01102740032-7
Approved For Release 2007/08/06: CIA-RDP84B00049R001102740032-7
Tab A
EXECUTIVE SUMMARY
Unauthorized disclosure of classified information is *a long-
standing problem that has increased in severity over the past
decade.. This problem has resisted efforts at solution under, a
number of Administrations. Yet the protection of national
security information remains a fundamental constitutional duty of
the President. The continuing large number of unauthorized
disclosures has damaged the national security interests of the'
United States and has raised serious questions about the
government's ability to protect its most sensitive secrets from
disclosure in the media. We must seek more effective means to
prevent, deter, and punish unauthorized disclosures. At the same
time, we must recognize that this.complex problem is unlikely to
be solved easily-or quickly.
The scope of this report is limited to unauthorized disclo-
sures of classified information where there is no apparent
involvement of a foreign power. Such disclosures primarily occur
through media "leaks" by anonymous government employees, or in
publications and statements by former employees. Beyond the scope
of this report are the following kinds of disclosures:
--clandestine disclosures of classified information
to foreign powers or their agents, which is espionage
in the classic sense;
--authorized disclosures of classified information
by government officials who are not publicly
identified;
--leaks of unclassified information; and
--compromise of classified information through
negligence.
Although the foregoing kinds of disclosures also present serious
problems, we have limited the scope of this report in order to
produce a more comprehensible set of recommendations.
It should be noted that some high ranking officials
erroneously believe they have the authority to leak classified
information in furtherance of government policy. Such disclosures
may only be made by persons with declassification authority under
Executive order 12065 or otherwise from the President. Without
Approved For Release 2007/08/06: CIA-RDP84B00049R001102740032-7
Approved For Release 2007/08/06: CIA-RDP84B00049RO01102740032-7
ft-4
such authority, "friendly" leaks are just as unlawful as any other
unauthorized disclosure of classified information.
Laws Pertaining to Unauthorized Disclosures
The unauthorized disclosure of classified information has
been specifically prohibited by a series of Executive orders
dating back at' least to 1951. Such disclosures also violate
numerous more general standards of conduct for government
employees based on statutes and regulations. It is clear that any
government employee may be discharged or otherwise disciplined for
making unauthorized disclosures of classified information.
Moreover, in virtually all cases the unauthorized disclosure of
classified information potentially violates one or more federal
criminal statutes.
However, there is no single statute that makes it a crime as
such for a government employee to disclose classified. information
without authorization. With the exception of certain specialized
categories of information, the government must ordinarily seek to
prosecute unauthorized disclosures as violations of the Espionage
Act or as the theft of government property. Such prosecutions
have not been undertaken because of a-variety of legal and
practical. problems.
Therefore, it would be helpful if Congress enacted a law-
providing criminal penalties for government employees who, without
authorization, disclose information that is properly classified
pursuant to statute or Executive order. Such a law would be
appropriate in view of the substantial body of criminal statutes
punishing unauthorized disclosure of other kinds of sensitive
information by government employees, such as banking, agricultural
and census data. Classified national security information
deserves at least the same degree of protection.
A promising development in recent years has been the judicial
recognition that the government-may enforce secrecy agreements
through civil litigation. Many government employees sign secrecy
agreements as a condition of employment with intelligence agencies
or to obtain access to classified information. In a series of
cases culminating in the Supreme Court'-3 1980 decision in United
States v. Sne o, the Justice Department has obtained injunctions
and monetary remedies from individuals who seek to publish
classified information in violation of their secrecy obligations.
Such civil litigation avoids many of the procedural problems that
would be encountered in criminal prosecutions. The effectiveness
of this program would be increased by greater use of properly
drafted secrecy agreements.
Approved For Release 2007/08/06: CIA-RDP84B00049RO01102740032-7
Approved For Release 2007/08/06: CIA-RDP84B00049R001102740032-7
n-a
Protective Security Programs
The overall effectiveness of the government's programs for
safeguarding classified information undoubtedly affects the
frequency of leaks. Tight security measures--including limiting
access to classified information to those with a real "need to
know"--reduce the opportunities for unauthorized disclosure. By
contrast, lax security measures may encourage leaks. by causing
employees to believe that classified information does not really
require protection.
As a general rule, protective security programs serve a
.number of objectives besides prevention of unauthorized
disclosures, and therefore this report does not consider these
programs in great detail. The following observations are made:
Greater emphasis should be given to security
education programs for senior officials.
Better controls on copying and circulation of
classified documents would reduce dissemination
and aid the task of investigating leaks.
The federal personnel security program under
E.O. 10450 and implementing regulations should
be revised and updated.
We also considered whether there should be a government-wide
program to regulate contacts with media representatives by govern-
ment officials with access to classified information. Such
contacts, especially when they occur on a frequent and informal
basis, may give rise to deliberate as well as negligent
disclosures of classified information. However, the operational
considerations among the agencies vary greatly.. Therefore, each
agency should be required to develop its own policy regarding
contacts between journalists and employees who have access to
classified information.
Past Experiences with Leak Investigations
Leaks are extremely'difficult to investigate because they
involve a consensual transaction. Both the leaking official and
the receiving journalist have a strong incentive to conceal the
source of the information.
Leak investigations do not focus on the receiving journalist
for a variety of reasons. Rarely is there sufficient probable
cause to justify a search or electronic surveillance of the
_,,, Approved For Release 2007/08/06: CIA-RDP84B00049R001102740032-7 __" " "
Approved For Release 2007/08/06: CIA-RDP84B00049R001102740032-7
A-4
journalist. The use of. some kinds of investigative techniques
may raise First Amendment concerns to which we should be
sensitive. Finally, journalists are unlikely to divulge their
sources in response to a subpoena for documents or testimony
before a grand jury, and contempt sanctions against journalists in
other types of cases have not.been effective.
Therefore, leak investigations generally focus on government
employees who have had access to the information that-is leaked.
In most situations, hundreds or thousands of employees. have had
access to the information, and there is no practical way to narrow
the focus of the inquiry. Also, the leaking official is unlikely
.to confess-his offense in response to a simple inquiry. The
polygraph can be an effective tool in eliciting confessions, but
existing regulations do not permit compulsory use of the-polygraph
for many employees.
Leaks of classified information constitute a potential viola-
tion of the espionage laws and other statutes that fall within the
FBI's investigative jurisdiction. (By contrast, many agencies
that originate classified information are not authorized to go
beyond their own employees in investigating leaks.) However, FBI
has been reluctant to devote its resources to leak investigations.
The burden. of such investigations falls almost entirely on the
Washington Field Office. Such investigations frequently involve
high ranking government officials, who may be uncooperative.
Sometimes a time-consuming investigation is undertaken, only to
reveal that the source of the leak was .a White House or Cabinet
official who was authorized to disclose the information. Finally,
it is very rare for an investigation to identify the leaking
official, and even rarer that a prosecutable case is developed or
that administrative action is taken against a leaker.
The Criminal Division of the Justice Department has developed
the practice of screening leak cases before referral to FBI, for
the purpose of eliminating those that are unlikely to lead to
criminal prosecution. This practice involves the frequently
criticized "eleven questions" that agencies are expected to answer
when they report leaks to the Criminal Division and that include
an advance commitment to provide and declassify such classified
information as may be required to support a prosecution.
In summary, the past approach to leak investigations has been
almost totally unsuccessful and frustrating to all concerned.
There have been frequent disputes between the Justice Department
and agencies complaining about leaks. This ineffectual system has
led to the belief that nothing can be done to stop leaks of_class-
ified information.
Approved For Release 2007/08/06: CIA-RDP84B00049R001102740032-7
Approved For Release 2007/08/06: CIA-RDP84B00049RO01102740032-7
A-5
Proposed New A
Unless new criminal legislation is enacted, we should
recognize that leak investigations are unlikely to lead to
successful criminal prosecutions. However, the present system
would be greatly improved if employees who leak classified
information could be identified and fired from their jobs..
Therefore, we should recognize that the likely result of a
successful leak investigation will be the imposition of
administrative sanctions except for cases in which exacerbating
f actors suggest that criminal prosecution should be considered.
We should also recognize that resources are available to
investigate only a small fraction of leaks. All leaks should be
evaluated in light of criteria developed through consultation
between the Justice Department and affected agencies. These
criteria would include:
--the level of classified-information disclosed;
the resulting damage to national security;
--the extent to which the information had been
disseminated at the time it was leaked; and
--the presence of specific "leads" to narrow the
focus of investigation.
Agencies should be encouraged to conduct more extensive
preliminary investigations before referring leaks to the
Department of Justice for investigation. Affected agencies should
be consulted by the Department of justice in determining which
leak cases warrant investigative priority. A decision to
undertake criminal prosecution would not be required as a
prerequisite to FBI investigation. FBI should be specifically
authorized to investigate unauthorized disclosures that
potentially violate federal criminal law, even though
administrative sanctions may be sought instead of criminal
prosecution.
The polygraph is an investigative technique occasionally used
in leak investigations. By regulation, most federal agencies are
not permitted to take adverse actions against employees who refuse
to be polygraphed. However, there is no constitutional or
statutory bar to requiring federal employees to take a polygraph
examination as part of an investigation of unauthorized
disclosures of classified information. We recommend that existing
roach to Leak Investigations
Approved For Release 2007/08/06: CIA-RDP84B00049RO01102740032-7
Approved For Release 2007/08/06: CIA-RDP84B00049RO01102740032-7
A-6
regulations be changed to permit greater use of the polygraph in
leak investigations.
Use of the polygraph is a controversial technique, but secur-
ity specialists believe it can be effective in situations where a
leak investigation turns up a limited number of suspects. Under
this approach the polygraph is used sparingly and as a last
resort. Such polygraph examinations can be limited to the circum-
stances of the disclosure indnot involve
questions of.a personal nature
offensive.
Finally, when investigations identify employees who have
disclosed classified information without authority, they should
not be let off with a slap on the wrist. The full range of
administrative .sanctions --including discharge--is available. Most
employees have certain procedural rights, including notice,
haveHowever,
hearing and administrative
difficulty na.a head who
shouldappeal.
follows proper procedures
disciplining or discharging leakers. it would be helpful for the
Merit Systems Protection Board and other administrative bodies to
adopt "graymail"-type procedures to protect classified information
that maybe involved in such situations.
Summary of Recommendations
1. The Administration should support new legislation to
criminal statutes that
strengthen existing
information.t the
unauthorized disclosure 2. All persons with authorized access to classified
information should-be required to sign secrecy agreements in a
form enforceable in civil actions brought by the United States.
For persons with access to eshmost ouldsalsotincludedprovisions=f ord
information, these agreements
prepublication review.
3. Agencies should adopt appropriate policies to govern
contacts between media representatives and government officials,
so as to reduce the opportunity for negligent or deliberate
disclosures of classified information.
4. Each agency that originates or stores
information should adopt internal procedures are eff unauthorized disclosures of classifi impo' _edtfor violationslvely
investigated and appropriate
Approved For Release 2007/08/06: CIA-RDP84B00049RO01102740032-7 ?
Approved For Release 2007/08/06: CIA-RDP84B00049RO01102740032-7
5. The Department of Justice, in consultation with affected
agencies, should continue to determine whether FBI investigation
of an unauthorized disclosure is warranted. The FBI should be
permitted to investigate unauthorized disclosure of.cla3sified
information under circumstances where the likely result of a
successful investigation will be imposition of administrative
sanctions rather than criminal prosecution.
6. Existing agency regulations should be modified to permit
the use of polygraph examinations for government employees-under
carefully defined circumstances.
7. All agencies should be encouraged to place greater:
emphasis on protective security programs. 'Authorities for the
federal personnel security program should be revised and updated.
Approved For Release 2007/08/06: CIA-RDP84B00049RO01102740032-7
Approved For Release 2007/08/06: CIA-RDP84B00049RO01102740032-7
Approved For Release 2007/08/06: CIA-RDP84B00049RO01102740032-7
Approved For Release 2007/08/06: CIA-RDP84B00049RO01102740032-7
NATURE OF THE PROBLEM AND SCOPE OF REPORT
Unauthorized disclosure of classified information has become
an increasingly common occurrence. It is not a new phenomenon,
but its severity, has increased greatly over the past decade. The.
theft of the "Pentagon Papers" and their publication by the New
York Times in 1971 ushered in an era of heightened media interest
in the exposure of classified information. Many of these
disclosures occurred in the context of revealing improper
government activities. After a time, however, disclosures
continued while revealing no wrongdoing. Indeed, a few
journalists seem to believe that quoting from "highly classified"
documents is an appropriate means of entertaining, as-well as
informing, the public. Today the unauthorized publication of
classified information is a routine daily occurrence in the United
States.
The harm caused by these frequent unauthorized disclosures is
manifold.
--Particular items of information appearing in
the press provide valuable intelligence for
our adversaries concerning the capabilities
and plans of the United States.for national
defense and foreign relations.
Approved For Release 2007/08/06: CIA-RDP84B00049RO01102740032-7
Approved For Release 2007/08/06: CIA-RDP84B00049R001102740032-7
B-2
--Unauthorized disclosures interfere with the
ability of our government effectively to carry
out its policies. This "veto by leak"
phenomenon permits a single bureaucrat to
thwart the ability of our democratic system of
government to function properly.
--Disclosures about U.S. intelligence programs
are particularly damaging, because they may
cause sources to dry up. Lives of human
agents are endangered and expensive technical
systems become subject to countermeasures.
--In particular, foreign governments-are
reluctant to cooperate with the United States V
because we are unable to protect confidential
information or relationships.
This report has been kept unclassified, and as a result specific
examples of harmful. unauthorized disclosures have not-been
included. Such examples can be provided separately.
The scope of this report is limited to unauthorized
disclosures of classified information where there is no apparent.
involvement of a foreign power. Such disclosures primarily occur
through "leaks".by anonymous government officials to the media, or
in publications or statements of former officials.
Officials who make unauthorized disclosures may persuade
themselves.that they are serving the larger national interest by
disclosing information that the public has a right to know. Such
officials may seek to advance their personal policy objectives by
leaks of classified information, on the assumption that there will
be no serious harm to national security. Because leaks are so
Approved For Release 2007/08/06: CIA-RDP84B00049R001102740032-7
Approved For Release 2007/08/06: CIA-RDP84B00049RO01102740032-7
r?
prevalent and leakers rarely caught, some officials may believe
there is nothing wrong with leaking classified information and
that everyone does it.
Similarly, many journalists appear to believe they have a
duty to divulge virtually any newsworthy secret- information that
can be acquired.-by whatever means they choose to employ. To their
way of thinking, leaks are part of a game.in which the government
tries to keep information secret and the media tries to find it
out. Some journalists are unwilling to assume responsibility for
damage to the national security in 'ituations where they win this
"game. "
Under these circumstances, only a fundamental change in
prevailing attitudes will alleviate the problem of unauthorized
disclosures. We must seek to develop a sense of discipline and
self-restraint by those who work with or obtain classified
information. This goal will not be achieved easily or quickly.
But without a change in attitudes, no program to deal with
unauthorized disclosures can possibly be effective.
Certain kinds of disclosures are beyond the scope of-this
report, but should be described briefly for purposes of
comparison.
(1). Classic Espionage. Clandestine disclosures of
classified information to foreign powers or their agents is
Approved For Release 2007/08/06: CIA-RDP84B00049RO01102740032-7
Approved For Release 2007/08/06: CIA-RDP84B00049R001102740032-7
B-4
espionage in the classic sense. Investigating such matters is
primarily the responsibility of FBI's foreign counterintelligence.
program. The threat in this area is increasing because of the
increasing number of known or suspected hostile intelligence
agents in the United States. President Reagan's recent Executive
Order 12333 and'new implementing guidelines will strengthen FBI's
ability to deal with this serious problem.
(2) Authorized disclosures. High ranking officials often
believe they are authorized to disclose otherwise classified
information to the press in furtherance of government policies.
Since the classification system is established on the authority of
the President, he certainly has the power to authorize disclosures
that amount to a de facto declassification of such information..
However, only the President can authorize the declassification of
information other than as provided in Executive Order 12065. A
high ranking official who discloses classified information without
authorization under the Executive order or otherwise from the
President violates the.law. Such'disclosures should be
investigated and penalized in the same manner as other
unauthorized disclosures of classified information. Applying a
double standard that overlooks "friendly" leaks of classified
information breeds disrespect for the law and can undermine the
effectiveness of any enforcement program.
Approved For Release 2007/08/06: CIA-RDP84B00049R001102740032-7
Approved For Release 2007/08/06: CIA-RDP84B00049RO01102740032-7
B-5
(3) Unclassified leaks. Some of the most embarrassing leaks
do not involve classified information at all. We believe that
leaks of classified information cause more serious and long-
lasting damage, and thus warrant separate. treatment as provided in
this report. That is not to say that nothing can or should be
done about leaks of unclassified information. The government is:
entitled to protect a variety of information from disclosure,
including law enforcement investigatory information, proprietary
data, predecisional memoranda and other information pertaining to
internal government deliberations. Depending upon the
circumstances, disclosure of such information may be unlawful,
unethical, or a violation of applicable standards of conduct for
government employees.
(4) Negligent disclosures. The compromise of classified
information through negligence violates regulations and, depending
upon the circumstances, may constitute a criminal offense. Such
disclosures involve sufficiently different causes and consid-
erations as to fall beyond the scope of this report. It is worth
noting, however, that many of the apparent media leaks involve
inadvertent disclosures. High ranking officials are particularly
Approved For Release 2007/08/06: CIA-RDP84B00049RO01102740032-7 1
Approved For Release 2007/08/06: CIA-RDP84B00049RO01102740032-7
B-6
susceptible to such disclosures because they have access to a
large volume of sensitive classified information and are required
deal with the press on a frequent.basis. The compromise of
classified information.would be reduced if officials would
exercise greater care in their dealings with media repre-
sentatives.
Approved For Release 2007/08/06: CIA-RDP84B00049RO01102740032-7
Approved For Release 2007/08/06: CIA-RDP84B00049RO01102740032-7
Approved For Release 2007/08/06: CIA-RDP84B00049RO01102740032-7
Approved For Release 2007/08/06: CIA-RDP84B00049R001102740032-7
Tab C
LAWS PERTAINING TO UNAUTHORIZED DISCLOSURES
1. Executive Orders
The protection of national security information is a
fundamental constitutional responsibility of the President.
This responsibility is derived from the President's powers as
Chief Executive, Commander-in-Chief, and the principal
instrument of United States foreign policy. The courts-have
recognized the constitutional dimension of this responsi-
bility. Chicago & Southern Air Lines, Inc. v. Waterman
Steamship Corp., 333 U.S. 103, 111 (19481; United States v.
Curtiss-Wright Export Corp., 299 U.S. 304, 320 (1936); United
States v. Marchetti, 466 F.2d 1309, 1315 (4th Cir.), cert.
denied, 409 U.S.-1063 (1972).
In a number of civil and criminal statutes, Congress has
also recognized the President's authority to safeguard
national security information by adopting Executive orders
providing for a system of classification. E.g., 5 U.S.C.
552(b)(1) (Freedom of Information Act); 5 U.S.C. 552b(c)(1)
(Government in the Sunshine Act); 5 U.S.C. 2302(b)(8)(A)
(Whistleblower Statute); 18 U.S.C. 798; 50 U.S.C. 783(b).
In a series of Executive Orders datin back at least to
1951, Presidents have provided for a system of classification
Approved For Release 2007/08/06: CIA-RDP84B00049R001102740032-7
Approved For Release 2007/08/06: CIA-RDP84B00049R001102740032-7
C-2
to safeguard national security information. Since these
Executive orders are issued in fulfillment of the President's
constitutional responsibilities, they have the force and
effect of law.
The present Executive order on National. Security
Information, Executive order 12065, prohibits the
unauthorized disclosure of classified information. It
provides that officers and employees of the government shall
be subject to appropriate administrative sanctions if they
knowingly, willfully and without authorization disclose
properly classified information or compromise such.
information through negligence. Sanctions may include
termination of classification authority, reprimand,
suspension and removal.
The new draft executive order on national security
information provides for similar prohibitions and sanctions
and applies to government contractors, licensees and grantees
as well as government officers and employees.
2. Criminal Statutes
In analyzing whether an unauthorized disclosure of
classified information constitutes a criminal violation, it
is necessary to consider three categories of criminal
statutes: (a) those explicitly prohibiting the disclosure of
"classified information"; (b) the so-called "espionage" laws,
Approved For Release 2007/08/06: CIA-RDP84B00049R001102740032-7 ;
Approved For Release 2007/08/06: CIA-RDP84B00049RO01102740032-7
C-3
which prohibit the disclosure of "national defense"
information; and (c) the statute prohibiting theft of
government property.
a. Classified Information Statutes.
There is no general criminal penalty for the unauthor-
ized disclosure of "classified information" as such; however,
several criminal statutes prohibit unauthorized disclosure of
classified information in particular situations. Section
783(b) of Title 50 prohibits government employees from
disclosing any classified information to agents of foreign
governments or members of communist organizations. It is
unlikely that this statute would be construed to apply to
unauthorized disclosures of classified information to the
media, even though the information could find its way into
the hands of an agent of a foreign government or a member of
a communist organization as a consequence of its
publication.
Section 2277 of Title 42 prohibits government employees
and contractors from knowingly communicating "Restricted
Data" to any person not authorized to receive such informa-
tion. "Restricted Data" constitutes classified information
concerning atomic weapons and nuclear material. Section 2274
of Title 42 prohibits anyone having possession, access or
control over Restricted Data from disclosing it with the
Approved For Release 2007/08/06: CIA-RDP84B00049RO01102740032-7
Approved For Release 2007/08/06: CIA-RDP84B00049RO01102740032-7
C-4
intent or reason to believe it will be used to injure the
United States or secure an advantage to a foreign nation..
In addition to these provisions, 18 U.S.C. 798 prohibits
any person from disclosing to any unauthorized person
"classified information" concerning communications intelli-
gence and cryptographic activities.
These three sets of provisions are the only criminal
statutes that punish the unauthorized disclosure of
"classified information" as such.
b. Espionage Laws.
Certain provisions of the espionage laws may also be
violated by unauthorized disclosures of sensitive informa-
tion. The two provisions that would most likely be violated
by an unauthorized disclosure of classified information to
the media would be 18 U.S.C. 793(d) and (e). Section 793(d)
prohibits any person having authorized possession of
materials such as documents or photographs "relating to the
national defense" or "information" relating to the national
defense, if there is "reason to believe" that this informa-
tion can be used "to the injury of the United States or to.
the advantage of any foreign nation," from transmitting such
materials or information to "any person not entitled to
receive it." Similarly, section 793(e) prohibits any person
having unauthorized possession or access to such materials or
information from transmitting them to other unauthorized
Approved For Release 2007/08/06: CIA-RDP84B00049RO01102740032-7 1
Approved For Release 2007/08/06: CIA-RDP84B00049RO01102740032-7
C-5
persons or failing to deliver them to an authorized
government officer or employee.
These provisions have not been used in the past to
prosecute unauthorized disclosures of classified information,
and their application to such cases is not entirely clear.
However, the Department of Justice has taken the position
that these statutes would be violated by the unauthorized
disclosure to a member of the media of classified documents
or information relating to the national defense, although
intent to injure the United States or benefit a foreign
nation would have to be present where the disclosure is of
"information" rather than documents or other tangible
materials. These laws could, also be used to prosecute a
journalist who knowingly receives and publishes classified
documents or information.
One category of classified information that would
probably not be covered by these provisions is information
that could not fairly be characterized as "relating to the
national defense." In Gorin v. United States, 312 U.S. 19,
28 (1940), the Supreme Court stated that in the context of
this statute "national defense" is "a generic concept of
broad connotations, referring to the military and naval
establishments and the related activities of national
preparedness." Currently information may be classified under
Executive Order 12065 if it relates either to "the national
Approved For Release 2007/08/06: CIA-RDP84B00049RO01102740032-7
Approved For Release 2007/08/06: CIA-RDP84B00049RO01102740032-7
C-6
defense" or to "the foreign relations" of the United States.
Because the term "national defense" was so broadly defined in
Gorin, it is likely to cover most information relating to
"foreign relations" that is properly classified. However, it
is possible that the two terms do not overlap completely, and
if so, only the disclosure of information relating to the-
national defense would be covered by sections 793(d) or (e).
c. Theft of Government Property.
18 U.S.C. 641 provides criminal penalties for the
unauthorized sale or disposal of "any record, voucher, money,
or thing of value of the United States," or the knowing
receipt of the same "with intent to convert it to his use or
gain." Convictions under this statute have been upheld
in cases where government documents or information have been
taken. United States v. Friedman, 445 F.2d 1076 (9th Cir.),
cert. denied, 404 U.S. 958 (1971) (conviction for receipt of
copy of secret grand jury transcript); United States v.
Lambert, 601 F.2d 69 (2d Cir. 1979), cert. denied, 444 U.S.
871 (1979) (convictions for selling information derived from
Drug Enforcement Administration computer).
There has been no definitive court test of the
applicability of section 641 to unauthorized disclosures of
Approved For Release 2007/08/06: CIA-RDP84B00049RO01102740032-7
Approved For Release 2007/08/06: CIA-RDP84B00049R001102740032-7
C-7
* The Department of Justice
classified information.*
has taken the position that prosecution under this statute
would be warranted in cases of unauthorized disclosure of
classified information. Of course, the substantive
applicability of this statute remains to be established. In
addition, many-of the procedural barriers to successful.
criminal prosecution would remain.
d. Practical Barriers to Successful Prosecution
Although there are numerous unresolved questions about
the substantive applicability of the foregoing criminal
statutes, it is clear that most unauthorized disclosures
potentially violate one or more of these statutes. Yet the
fact remains that no criminal prosecution has been attempted
since Daniel Ellsberg and Anthony Russo were indicted for
leaking the "Pentagon Papers." (Prosecution.in that instance
was dropped because of governmental misconduct in investi-
gating the case.)
One problem is that leak cases are hard to solve. But
even when a suspect is identified, there are numerous
practical barriers to criminal prosecution. These barriers
may be summarized as follows.
Compare United States v. Truong, 629 F.2d 908, 927 (4th
Cir. 1980) with id. at 932; see United States v. Boyce, 594
F.2d 1246, 1252 (9th Cir.), cert. denied, 444 U.S. 855
(1979).
Approved For Release 2007/08/06: CIA-RDP84B00049R001102740032-7
Approved For Release 2007/08/06: CIA-RDP84B00049R001102740032-7
C-8
First, criminal prosecution serves to confirm the
accuracy and sensitivity of the information that has been
disclosed. For this reason, many agencies do not want cases
prosecuted, in order to maintain doubt as to the accuracy of
the disclosed information.
Second, criminal prosecution generally requires the
Government to prove that the disclosures in question were
damaging to national security, which may require further
public disclosures of classified information. Such proof is
often required under the espionage statutes and, as a
practical matter, is extremely helpful in giving any
prosecution jury appeal.
Third, criminal trials are normally conducted before a
jury and open to the public. Defendants can threaten to
require disclosures of sensitive information in the course of
trial -- the so-called "graymail" problem. The Classified
Information Procedures Act of 1980 alleviates this problem to
some extent but does not solve it entirely.
In summary, the costs of criminal prosecution in terms
of harm to national security are likely in many cases to
outweigh the benefits of deterrence and respect for the law.
Of course, the availability of criminal sanctions is
important and should be considered in appropriate cases. New
legislation could reduce the practical barriers to successful
prosecution. But the primary focus of the effort to enforce
Approved For Release 2007/08/06: CIA-RDP84B00049R001102740032-7
Approved For Release 2007/08/06: CIA-RDP84B00049RO01102740032-7
C-9
the laws against unauthorized disclosure should involve
administrative and other civil remedies.
3. Civil Remedies.
There is'no general statute providing for civil penal-
ties or injunctive relief in cases of disclosure of classi-
fied information. The absence of such an authorizing statute
was noted by several members of the Supreme Court in the
"Pentagon Papers" case. However, it appears that a majority
of the Court in-that case would have permitted the Govern-
ment, even absent a statute, to enjoin the disclosure by the
media of classified information that threatened "direct,
immediate; and irreparable damage to.our Nation or its
people." New York Times Co. v. United States, 403 U.S. 713,
730 (1971) (Stewart, J., concurring). -As applied in the
Pentagon Papers case, this is an extremely difficult standard
to meet. It is not clear that, as a practical. matter, the
First Amendment would permit a statute authorizing
injunctions against the media under a significantly lower
standard.
There are specific statutes providing civil remedies for
unauthorized disclosure of atomic energy information. 42
U.S.C. 2167, 2168, and 2280. The latter statute was
successfully relied upon in obtaining a district court
Approved For Release 2007/08/06: CIA-RDP84B00049RO01102740032-7
Approved For Release 2007/08/06: CIA-RDP84B00049RO01102740032-7
C-10
injunction against disclosure of H-bomb information. United
States v. Progressive, Inc., 467 F. Supp. 990 (W.D. Wis.
1979), appeal dismissed, 610 F.2d 819 (7.th Cir. 1979).
Government employees who engage in unauthorized disclo-
sures of classified information are subject to discipline or
discharge for."misconduct pursuant to 5 U.S.C. 7513 or equiva-
lent statutes governing specialized employment systems.
Applicable standards of conduct are found in Executive order
12605 and implementing agency regulations prohibiting
unauthorized disclosure of classified information, as well as
the criminal statutes discussed previously. In addition,
unauthorized disclosure of classified information would
violate a number of general standards of conduct for govern-
ment employees. See, e.g., 5 C.F.R. 735.201a(c) (impeding
government efficiency); id. 735.201a(e) (making a government
decision outside official channels); id. 735.201a(f)
(affecting adversely the confidence of the. public in the
integrity of the government); id. 735.206 (misuse of
information not made available to the general public) ; id.
735.209 (conduct prejudicial to the government).
In addition to the normal administrative sanctions for
misconduct, 5 U.S.C. 7532 provides for suspension or removal
of certain employees if such action is found to be "necessary
in the interest of national security." This statute is
implemented in Executive Order 10450 and various agency
Approved For Release 2007/08/06: CIA-RDP84B00049RO01102740032-7 1
Approved For Release 2007/08/06: CIA-RDP84B00049RO01102740032-7
C-il
regulations. These authorities are part of the federal
personnel security program and are designed to ensure that
persons who are "security risks" do not serve in sensitive
positions.
Executive Order 10450 was promulgated. in 1953 and
seriously needs revision to take into account subsequent
court decisions and changes in government organization.
These shortcomings do not prevent'the government from-
disciplining or discharging employees for unauthorized
disclosure of classified information, since such disclosures
constitute misconduct for which normal administrative
sanctions are available. However, revision of Executive
Order 10450 would be helpful in streamlining the authority of
agencies to revoke security clearances and take other
personnel actions in the interest of national security.-
In addition to standards imposed by regulation; many
present and former government employees are bound by
contractual or fiduciary obligations not to disclose
classified information in an unauthorized manner. The
Department of Justice has had considerable success in
enforcing such obligations in civil litigation against former
government employees. Since such persons no longer work for
the government, the possibility of administrative sanctions
is not a deterrent to their making unauthorized disclosures.
Nondisclosure agreements typically have one or both of
the following key provisions. First, the employee agrees
Approved For Release 2007/08/06: CIA-RDP84B00049RO01102740032-7
Approved For Release 2007/08/06: CIA-RDP84B00049R001102740032-7
C-12
never to disclose classified information to an unauthorized
person. Second,'the employee promises not to publish any
material related to classified activities without the express
prior approval of the agency. This second provision is"
implemented through a mechanism for prepublication review of
manuscripts submitted by present or former employees for
deletion of classified information.
Key judicial decisions have held that the government is
entitled to an injunction against former employees who seek
to publish without obtaining clearance pursuant to their
obligations to comply with prepublication review programs.
Once an agency conducts such prepublication review, it is
entitled to delete classified information, subject to
judicial review under the same general standards as applied
in litigation under the Freedom of Information Act. Finally,
a person who publishes in violation of-his prepublication
review obligations forfeits the right to any profits from his
publication, which can be impressed with a constructive trust
for the benefit of the Government. United States v. Snepp,
444 U.S. 507 (1980); Knopf v. Colby, 509 F.2d 1362 (4th
Cir.), cert. denied. 421 U.S. 992 (1975); United States v.
Marchetti, 466 F.2d 1309 (4th Cir.), cert. denied, 409 U.S.
1063 (1972). In addition, persons who violate injunctions to
comply with nondisclosure obligations risk sanctions for
Approved For Release 2007/08/06: CIA-RDP84B00049R001102740032-7 1
Approved For Release 2007/08/06: CIA-RDP84B00049RO01102740032-7
C-13
contempt of court, which can include both civil and criminal
penalties.
The present policy of the Justice Department, as stated
by Attorney General Smith on September 3, 1981, is vigorous
and even-handed enforcement of nondisclosure obligations
under the Snepp guidelines. This policy statement revoked
guidelines issued under the Carter Administration-that
.suggested the Snepp doctrine would be*invoked only under
limited circumstances.
The availability of civil.remedies under the Snepp
doctrine suggests that greater attention should be paid to
the use of nondisclosure agreements for persons with
authorized access to classified information. At a minimum,
all such persons should be required to agree never to
disclose classified information without authorization. In
addition, persons with access to the most sensitive kinds of
classified information should be required to agree to a
system of prepublication review.. At present, nondisclosure
agreements are used only in certain agencies, and only State,
CIA and NSA have prepublication review programs.
4. Recommendations for New Legislation
As indicated above, criminal sanctions for unauthorized
disclosure of classified information as such apply only in
Approved For Release 2007/08/06: CIA-RDP84B00049RO01102740032-7
Approved For Release 2007/08/06: CIA-RDP84B00049RO01102740032-7
C-14
limited. situations involving information concerning the
national defense, nuclear weapons and materials, and
communications and crytographic intelligence. v.:reover,
there are a number.of substantive and procedural barriers to
successful criminal prosecution in most. cases of unauthorized
disclosures to members of the media.
To close the gaps in the present law, we recommend the
introduction of legislation imposing a criminal penalty for
all unauthorized disclosures of classified information by
government employees. Such a statute should be simple and
general in order to cover all situations, and might provide
as follows:
Whoever, being an officer or
employee of the United States or a person
with authorized access to classified
information, willfully discloses, or
attempts to disclose, any classified
information to a person who is not an
officer or employee of the United
States and who is not authorized to
receive it shall be fined not more than
$10,000, or imprisoned not more than
three years, or both.
In addition, there should be appropriate definitions of the
terms employed. It would be helpful to have a specific
Approved For Release 2007/08/06: CIA-RDP84B00049RO01102740032-7
Approved For Release 2007/08/06: CIA-RDP84B00049RO01102740032-7
C-15
procedure for establishing that information forming the basis
for, prosecution was in fact properly classified, which does
not require public disclosure of additional classified
information. A similar statutory provision could be drawn to
apply to former employees who disclose classified
information.
An alternative approach to filling the legislative gap
would be to amend 18 U.S.C. 641 to make it clear that
classified information is a "thing of value" subject. to the
penalties of that statute.
Enactment of these or similar provisions would clarify
current criminal prohibitions, close the loopholes in these
statutes, and give notice that all unauthorized disclosures
of classified information are sufficiently serious to warrant
criminal sanctions. They would also alleviate -- but not
solve entirely -- certain of the practical problems likely to
be presented in criminal prosecutions.
Present civil statutes and regulations permitting
disciplinary action for unauthorized disclosures by
government employees are generally adequate, except that they
apply only to persons who disclose classified information,
not to those who receive it. A person who solicits and
receives classified information may be no less responsible
for an unauthorized disclosure of such information than the
Approved For Release 2007/08/06: CIA-RDP84B00049RO01102740032-7
Approved For Release 2007/08/06: CIA-RDP84B00049RO01102740032-7
C-16
government employee who transmits it, but his conduct is not
prohibited by any civil statute. Although we make no
recommendation with respect to introduction of legislation
providing for civil penalties or other remedies against
persons who receive classified information, we believe-the
subject meritsfurther study as an effective., though probably
controversial, method of deterring unauthorized disclosures.
Approved For Release 2007/08/06: CIA-RDP84B00049RO01102740032-7
Approved For Release 2007/08/06: CIA-RDP84B00049RO01102740032-7
Approved For Release 2007/08/06: CIA-RDP84B00049RO01102740032-7
Approved For Release 2007/08/06: CIA-RDP84B00049R001102740032-7
Tab D
PROTECTIVE SECURITY PROGRAMS
Careful attention to the fundamental elements of a sound
security program will undoubtedly discourage leaks -- and have a
number of other beneficial effects on the safeguarding of national
security information. Among these elements are the following:
--Security clearances should be given only to
individuals who have been determined to be
trustworthy on the basis of adequate background
information.
--National security information should be clearly
identified with the proper classification'and
stored in a physically secure manner.
--Access to classified information should
be given only to persons with the proper
clearances and requisite "need to-know."
These principles seem obvious -- and yet they are frequently
ignored in many government agencies. Violation of these rules is
often most common at the highest levels of government.
To be sure, adherence to these security principles will not
stop the deliberate leaker. But disregard for these principles
may encourage leaks by causing employees to believe that it is
not really important to protect classified information. Good
security practices constantly remind people who handle classified
information of their obligation for its safekeeping.
Approved For Release 2007/08/06: CIA-RDP84B00049R001102740032-7 ,
Approved For Release 2007/08/06: CIA-RDP84B00049RO01102740032-7
D-2
Protective security programs are generally outside the scope
of this report. The Security Committee (SECOM) established by the
Director of Central Intelligence in DCID 1/11 has responsibility
for security programs involving intelligence and intelligence
sources and methods. SECOM is composed of the directors of
security for all agencies represented on.the National-Foreign
Intelligence Council. In addition, the Information Security
Oversight Office (ISOO) of the General Services Administration has
responsibility for the government-wide program. of safeguarding
national security information under Executive Order 12065.
Finally, the Office of Personnel Management is responsible for
implementing the federal personnel security program. These
organizations deserve support in their efforts to strengthen the
government's protective security programs.
Two particular aspects of protective security deserve
emphasis because of their impact on the problem of unauthorized
disclosures. First, security education programs for senior
officials deserve greater emphasis. Such officials are often too
busy to receive detailed briefings on proper security procedures,
yet they generally have access to the most sensitive kinds of
information. In particular, senior officials need to be aware of
potential pitfalls of dealing with journalists in areas where
classified information is involved. SECOM has produced a security.
orientation especially designed for senior officials, who should
be encouraged to avail themselves of this briefing.
Approved For Release 2007/08/06: CIA-RDP84B00049RO01102740032-7
Approved For Release 2007/08/06: CIA-RDP84B00049RO01102740032-7
D-3
Second, better controls on the copying and circulation of
classified documents would reduce unauthorized disclosures by
restricting dissemination of classified information. Such
controls can also assist in leak investigations by identifying
persons who had access to the information that was disclosed.' A
recent study t"APEX") demonstrated that there are insufficient
resources to permit better controls on the tremendous volume of
classified information that must. be circulated within the
government. This problem should be reconsidered in the context of
implementing the successor to Executive Order 12065.
Another problem that deserves attention is the federal
personnel security program. This program is governed by Executive
Order 10450, which was adopted in 1953. The order has not been
revised to take into account subsequent court decisions and
changes in government organization. The FBI no longer collects
?information about subversive organizations so as to provide a data
base for this program because of uncertainty regarding legal
constraints and Attorney-General guidelines. Because of these
and other shortcomings, the federal personnel security program is
largely defunct. It is unlikely that improvements in this program
would reveal persons who are likely to leak classified information
to the media, but a better effort would.reduce our vulnerability
to clandestine infiltration of sensitive positions.
Finally, consideration should be given to rules concerning
contacts between media representatives and government officials
Approved For Release 2007/08/06: CIA-RDP84B00049RO01102740032-7 1
Approved For Release 2007/08/06: CIA-RDP84B00049RO01102740032-7
D-4
who have access to classified information.. Such contacts.--
especially when they occur frequently and on an informal basis -
may lead to negligent or deliberate disclosures. Therefore,
programs to regulate media contacts could serve to reduce
unauthorized disclosures. Possible approaches would include one
or more of the following elements:
--requiring prior approval of a senior official
before discussing official matters with a
journalist;
--requiring all media contacts to. be arranged
through the agency's public affairs office;
--requiring a record to be kept of all media
contacts;
--requiring reports to be prepared describing
all matters discussed with journalists; and
--restricting access of journalists to areas
where classified documents are stored and
used.
It would be difficult to develop a program in this area to
apply throughout the government. Each agency. has its own
particular organizational and functional characteristics.
However, each agency should be required to consider this problem
and develop a specific program to reduce the opportunities for
negligent and deliberate disclosures to the media. We recommend
that each agency be directed to promulgate appropriate regulations
(if it does not already have them) and ensure that its policy is
communicated to all employees with access to classified
information.
Approved For Release 2007/08/06: CIA-RDP84B00049RO01102740032-7
Approved For Release 2007/08/06: CIA-RDP84B00049RO01102740032-7
Approved For Release 2007/08/06: CIA-RDP84B00049RO01102740032-7 1
Approved For Release 2007/08/06: CIA-RDP84B00049R001102740032-7
Tab E
PAST EXPERIENCES WITH LEAK INVESTIGATIONS
Leaks of classified information to the media over the past
twenty years have been so numerous that only a small fraction
could be investigated. These investigations have rarely been
successful in identifying the sources of such disclosures. In a
number of the cases that were solved, no adverse action was taken
against the government employee found to have leaked classified
information. There has never been a successful criminal
prosecution for leaking classified information.
The Government's dismal record in leak investigations has a
number of explanations. By their nature, leaks to the media are
difficult to investigate. Leaks are consensual transactions in
which both parties--the leaking official and the receiving
journalist--have a strong incentive to conceal the source of the
information. Self-imposed limitations on the use of certain
investigative techniques have made the task even more difficult.
The development of more productive approaches to leak.investiga-
tions has been hampered by misunderstandings between the Justice
Department and agencies whose information is leaked. We cannot
Approved For Release 2007/08/06: CIA-RDP84B00049R001102740032-7
Approved For Release 2007/08/06: CIA-RDP84B00049R001102740032-7
E-2
expect to do better in the future without understanding these
problems encountered in the past.
Agencies whose classified information is leaked have limited
powers to conduct investigations. Since most leaks.of classified
information potentially violate criminal. statutes, leak investiga-
tions are viewed as involving a law enforcement function. The
National Security Act of 1947 provides that the CIA "shall have no
police, subpoena, law-enforcement powers, or internal security
functions."-!/ Similar limitations apply to the military
services and the Department of Energy.**-/ Executive Order
12333, ?1.7(d), requires agencies in the intelligence community to
report crimes such as leaks of classified information to the
Justice Department. Implementing procedures for this provision
limit agency authority to conduct preliminary investigations of
such matters generally to interviews of current employees and
examination of agency premises. And, as a practical matter, most
government agencies do not have the capability to conduct
investigations outside their own areas of programmatic
responsibility.
* 50 U.S.C. 403(d)(3). However, the Director of Central
Intelligence is given specific responsibility for protecting
intelligence, sources and methods. Id. Therefore, the DCI is
appropriately concerned with leaks that endanger intelligence
sources and methods.
**/ 18 U.S.C. 1385 (Posse Comitatus Act); 42 U'.S.C. 2271(b).
Approved For Release 2007/08/06: CIA-RDP84B00049R001102740032-7 1
Approved For Release 2007/08/06: CIA-RDP84B00049RO01102740032-7
E-3
Current Department of Justice Policy
These legal and practical limitations have caused-the burden
of leak investigations to fall on the FBI. Current Justice
Department policy in this regard dates back to. the early 1960's.
At that time, the FBI was inundated with numerous requests for
investigation regarding possible violations of the espionage laws
as.they relate to "media leaks" and other. mishandling of
classified information.
Espionage investigations that have no apparent foreign
connection are investigated as "Espionage-X"- matters*by the FBI.
Those investigations-regarding the mishandling of classified
information, loss of classified information through negligence, or
other violations unrelated to media disclosures, are investigated
upon receipt by the FBI. In these types of investigations, the
subject is generally known and the scope of investigation limited..
Although the Criminal Division is notified at the inception of
these investigations and is kept advised of their status, it does
not initiate these investigations.
Media leaks, however, pose different problems, require more
investigation, and are far more numerous. Current policy regard-
ing media leaks requires that prior to any investigation by the
FBI, eleven questions must be answered by the injured agency.
These questions are utilized to the Criminal Division to determine
which cases should be investigated by the FBI. Such screening is
Approved For Release 2007/08/06: CIA-RDP84B00049RO01102740032-7
Approved For Release 2007/08/06: CIA-RDP84B00049RO01102740032-7
E-4
necessary due to the vast amount of media leak investigation
requests and the often large number of interviews to be conducted
in this type of case. The responses to the eleven questions are
also crucial in targeting the early stages of any investigation
that is undertaken. These questions can be dissected into three
categories.
Questions 1 through 3 pertain to the identification of the
article(s) contained in the media and the nature of the classified
information contained therein. These questions are:
1. The date and identity of the article or articles
disclosing the classified information.
2. Specific statements in the article which are considered
classified and whether the data was properly
classified.
3. Whether the classified data disclosed is accurate.
This information is necessary to determine whether a violation
has occurred and to assist the FBI in the investigation, if a
violation has occurred.
Responses to questions 4 through 8 serve to identify the
sources of the classified information disclosed. These questions
are:
4. Whether the data came from a specific document and, if
so, the original of the document and the name of the
individual responsible for the security of the
classified data disclosed.
5. The extent of official dissemination of the data.
Approved For Release 2007/08/06: CIA-RDP84B00049RO01102740032-7 ,
Approved For Release 2007/08/06: CIA-RDP84B00049RO01102740032-7
6. Whether the data-has been the subject of prior official
releases.
7. Whether prior clearance for publication or release of
the information was sought from proper authorities.
8. Whether the material or portions thereof, or enough
background data has been published officially or in the
press.to make an educated speculation on the matter
possible.
Responses to these questions are a prerequisite for FBI investi-
gations in that they furnish initial leads and may give direction
toward the person or persons responsible for the disclosure. Some
of these questions further assist in determining if a violation
has occurred or if the information could have been obtained from
some unclassified source or prior publication.
Questions 9 through 11 pertain to the prosecutive future of
the investigation. These questions are:
9. Whether the data can be declassified for the
purpose of prosecution and, if so, the name of
the person competent to testify concerning the
classification.
10. Whether declassification.had been decided upon
prior to the publication or release of the data.
11. What effect the disclosure of the classified data
could have on the national defense.
The responses to these questions are used by the Criminal
Division to determine if a successful prosecution can be made,
should the perpetrator be identified.
Approved For Release 2007/08/06: CIA-RDP84B00049RO01102740032-7
Approved For Release 2007/08/06: CIA-RDP84B00049RO01102740032-7
E-6'
If the responses to the "eleven questions" indicate it is not
likely that the perpetrator will be identified due to extensive
dissemination of the material and/or that successful prosecution
cannot be mounted, the Criminal Division will not request that the
.FBI conduct an investigation. There is, however, an-exception to
this policy. The Criminal Division will request an FBI investiga-
tion, if, in spite of the responses to the above questions, it can
be demonstrated that: (a) the disclosure constitutes a very
serious compromise of classified information and it is imperative-
that the person responsible be identified so as to preclude
further disclosures; (b) there is a real possibility that the
investigation will be fruitful, e.g., the information had very
limited distribution; and (c) the originating agency has not
finally decided against declassification for prosecutive
purposes.
Problems With the Current Policy
Although current Justice Department policy requests that
complaints concerning media leak matters be forwarded to the
Criminal Division for their review, often the complaint is
initially forwarded to the FBI. Also, agencies that report leaks
occasionally omit the responses to the eleven questions or furnish
incomplete. information. This practice causes delay while the
Criminal Division corresponds with the agency and requests
responses to the eleven questions or more detail regarding the
Approved For Release 2007/08/06: CIA-RDP84B00049RO01102740032-7 1
Approved For Release 2007/08/06: CIA-RDP84B00049R001102740032-7
E-7
responses that may have been furnished. When the initial
complaints are furnished in a complete package, FBI investigation
can generally be completed in a reasonable period of time
depending on the number of interviews to be conducted and other
investigative considerations.
The Criminal Division receives numerous complaints requesting
investigation in media leak matters which are never referred to
the FBI, based upon the above criteria. If all of these
complaints were fully investigated,-the manpower used would be
substantially higher. Leak investigations are manpower-intensive
and the burden falls primarily upon FBI's Washington Field Office.
Investigating a larger number of leak cases would necessarily
divert FBI's resources from other important priorities such as
foreign counterintelligence and terrorism investigations.
Moreover, a number of legal and policy restrictions limit the
ability of FBI to conduct effective leak investigations in cases
that are referred. In most cases,. the principal "lead" is the
published media account of the leaked information. But investiga-
tions are generally not permitted to focus on the journalist who
published the information. Rarely is there sufficient probable
cause to justify use of Fourth Amendment techniques, such as
searches or electronic surveillance. Current Department of
Justice regulations strictly limit the circumstances under which
Approved For Release 2007/08/06: CIA-RDP84B00049R001102740032-7
Approved For Release 2007/08/06: CIA-RDP84B00049R001102740032-7
E-8-
journalists can be questioned. or subpoenaed, and require express
prior approval by the Attorney General in each case. 45 Fed. Reg.
76436 (Nov. 19, 1980), to be codified at 28 CFR 50.10. Current
informal policies also preclude physical surveillance of journal-
ists or the use of informants directed at the media in leak
cases. Use of these and other investigative techniques is
appropriately limited because of First Amendment concerns.
Since FBI cannot investigate journalists who receive the
classified information, they must focus on government employees
who have had access to the information that has been leaked.
Often hundreds or thousands of employees have had access to the
information in question. Unless the information received more
limited distribution or there are other "leads" that permit
narrowing the scope of inquiry, there is no practical means to
conduct an investigation.
Even where the inquiry can be limited. to a manageable number
of employees, FBI has very little ability to conduct a successful
.investigation. The leaking official is unlikely to confess in
response to a simple inquiry. The polygraph can be an effective
investigatory technique, but most government employees can be
polygraphed only if they volunteer for the examination.
Present policy of the Office of Personnel Management (OPM)
sharply limits use of the polygraph for employees in the
competitive service. Federal Personnel Manual, chapter 736,
Approved For Release 2007/08/06: CIA-RDP84B00049R001102740032-7
Approved For Release 2007/08/06: CIA-RDP84B00049R001102740032-7
E-9
appendix D; see memorandum from Llewellyn H. Fischer, Acting
Associate General Counsel of OPM, to Lawrence A. Wooby, Security
Appraisal Officer of DEA, September 30, 1981. This policy
requires, among other things, that employees must-voluntarily
consent to be polygraphed and that a refusal to consent cannot be
made part of their personnel file. Other agencies, including the
Department of Defense and Department of State, have similar
policies regarding some or all of their employees who would not
otherwise be covered by the OPM policy.
Certain intelligence agencies, including NSA (for civilian
employees) and CIA, regularly use the polygraph to screen
candidates for employment as well as in investigations of
employees. Department of Justice policy generally permits use of
the polygraph in investigating unauthorized disclosure cases, and
an adverse inference may be drawn from an employee's refusal to be
examined. FBI policy permits an employee to be discharged for
refusing an order from the Director to take a polygraph
examination; an adverse inference may be drawn if the employee
declines a request to be examined. See Memoranda from Attorney
General Civiletti to William H. Webster and Michael E. Shaheen,
dated May 14, 1980. See also Memorandum of John M. Harmon,
Assistant Attorney General, Office of Legal Counsel, May 1, 1980.
In addition to limitations upon the techniques that can be
Approved For Release 2007/08/06: CIA-RDP84B00049R001102740032-7
Approved For Release 2007/08/06: CIA-RDP84B00049R001102740032-7
employed, FBI often finds that high-ranking government officials
are uncooperative with leak investigations. FBI does not have the
authority to compel government employees'to give interviews, sign
affidavits, or -- even if agency regulations are not.a bar -- take
polygraph examinations. Such compulsion can only be exercised by
agency heads who may be reluctant to discipline high-ranking
officials who refuse to cooperate with leak investigations.
In summary, past experience with leak investigations has been
largely unsuccessful and uniformly frustrating for all concerned.
Agencies have been unable to conduct investigations outside their
own organizations, and yet Justice has been unwilling to permit
FBI to investigate most cases. FBI has been asked to investigate
a number of leaks without being permitted to use adequate tech-.
piques to solve cases. There have been frequent disputes and mis-
understandings. On the rare occasions that leaking officials are
identified, they often escape even administrative sanctions. This
whole system has been so ineffectual as to perpetuate the notion
that the government can do nothing to stop leaks of classified
information.
Approved For Release 2007/08/06: CIA-RDP84B00049R001102740032-7 1
Approved For Release 2007/08/06: CIA-RDP84B00049RO01102740032-7
Approved For Release 2007/08/06: CIA-RDP84B00049RO01102740032-7
Approved For Release 2007/08/06: CIA-RDP84B00049RO01102740032-7
PROPOSED NEW APPROACH TO LEAK INVESTIGATIONS
We should recognize that the threat of criminal prosecution
is so illusory as to constitute no real deterrent to the
prospective leaker. A more promising approach involves better
efforts to identify leakers and the resolve to impose
administrative sanctions. For most'governmen t employees, a
realistic prospect of being demoted or fired for leaking
classified information would serve as a deterrent. An effective
administrative enforcement program would-also reverse the common
percept-ion-that the Government is powerless to stop leaks of
classified information.
The authority and responsibility of agencies that originate
classified information should, be. clarified. All serious leaks
should be evaluated and investigated internally by the agency that
originated the information. Agencies should adopt procedures to
assure that these steps are taken in a timely manner.
Agencies whose classified information is the subject of an
unauthorized disclosure should assume greater responsibility for
conducting preliminary investigations. All agencies are author-
ized to conduct preliminary internal investigations of such
matters, including interviews with current employees and
Approved For Release 2007/08/06: CIA-RDP84B00049RO01102740032-7
Approved For Release 2007/08/06: CIA-RDP84B00049R001102740032-7
F-2
contractors and the examination of agency premises. Agencies are
also authorized to make inquiries of other agencies to which the.-,
information had been disseminated to determine the extent of
further dissemination and the present location of the documents in
question. Such preliminary investigations at recipient agencies
may be conducted either by the recipient agency or by the
originating agency with the recipient's consent.
The purposes of such preliminary investigations are: (1) to
gather sufficient information for the Justice Department to decide
whether FBI investigation is warranted, and (2) to provide the
originating agency with data necessary to assist in properly
safeguarding classified information. At any point that a
preliminary investigation develops information indicating that a
particular person is responsible for the unauthorized disclosure,
then the matter should be immediately referred to the Department
of Justice. Otherwise, unauthorized disclosures should be
reported to the Department of Justice only after the preliminary
investigation is completed, unless there are exigent
circumstances.
Current requirements for reporting unauthorized disclosures,
as reflected in the "eleven questions," should be revised so that
prosecutive potential is no longer a decisive factor. FBI's
authority should be clarified to include investigation of
Approved For Release 2007/08/06: CIA-RDP84B00049R001102740032-7
Approved For Release 2007/08/06: CIA-RDP84B00049RO01102740032-7
? = F-3
unauthorized disclosures of classified information under
circumstances where the likely result of a successful
investigation will be imposition of administrative sanctions
rather than criminal prosecution. As a consequence, agencies
would no longer be required to make a commitment to declassify
information at the. time of referral.
In consultation with affected agencies, the Department of
Justice should develop new standards for reporting and evaluation
of unauthorized disclosures for possible investigation by FBI.
There is a general consensus that the following basic criteria
must be considered:
--the level of classified information disclosed;
--the extent of resulting damage to national
security;
--the extent to which the information had been
disseminated at the time the disclosure
occurred; and
--the presence of specific "leads" to narrow the
focus of investigation.
For example, it would ordinarily be an inappropriate use of
FBI's resources to investigate the leak of a "confidential" level
document of which thousands of copies had been disseminated
throughout the government. Timeliness is also an important
factor, as leak investigations are more difficult to conduct when
the trail is cold.
Approved For Release 2007/08/06: CIA-RDP84B00049RO01102740032-7
Approved For Release 2007/08/06: CIA-RDP84B00049R001102740032-7
F-4
Even if properly evaluated and screened, there are likely to
be too many leaks for FBI to investigate each one. Again in
consultation with affected agencies, the Department of Justice
must decide on priorities for the use of available FBI resources..
Even if cases.cannot be investigated, however, the process of
reporting and analyzing them can provide a useful data base for
developing protective security-measures and investigating future..
leaks.
The foregoing proposals requiring consultations between the
Department of Justice and affected agencies should be implemented
through an interagency advisory panel. One possibility is to use
an existing group such as the Security Committee (SECOM), estab-
lished by the Director of Central Intelligence. However, the
authority of SECOM is limited to the protection of intelligence
and intelligence sources and methods. Therefore, a new advisory
panel should be established, although SECOM could certainly be
included in the new group.
FBI's approach to investigating unauthorized disclosure cases
should be reviewed by the Department of Justice in order to remove
unnecessary restrictions on the use of certain techniques.
The polygraph can. be a useful tool in leak investigations
under certain circumstances. It should be used selectively and
its results considered within the context of a complete
Approved For Release 2007/08/06: CIA-RDP84B00049R001102740032-7
Approved For Release 2007/08/06: CIA-RDP84B00049RO01102740032-7
investigatI.cn. The polygraph should not be used for dragnet-type
screening of a large number of suspects or as a substitute for
logical investigation by conventional means. It is most. helpful
when conventional investigative approaches have identified a small
number of individuals, one of whom is fairly certain to be
culpable, but there is no other way to.resolve the case. A
polygraph examination in this situation can be limited to the
unauthorized disclosure that is being investigated and should not
include questions about life style that many employees would find
offensive. Moreover, polygraph results should not be relied upon
to the exclusion of other information obtained during an
investigation.
There is no constitutional or statutory prohibition on use of
the polygraph to investigate unauthorized disclosure of classified
information by government employees. An employee may be
discharged for refusal to cooperate with an investigation of his
fitness for continued employment. See, e.g., 5 C.F.R.
735.201a(c), 735.201a(f) and 735.209; Lefkowitz v. Turley, 414
U.S. 70, 84 (1974). Statements that an employee is compelled to
make in this fashion cannot be used as evidence in a criminal
prosecution. Garrity v. New Jersey, 385 U.S. 493 (1967).
However, such statements may be used in an administrative
proceeding to discipline or discharge the employee. Lefkowitz V.
Approved For Release 2007/08/06: CIA-RDP84B00049RO01102740032-7 -
Approved For Release 2007/08/06: CIA-RDP84B00049R001102740032-7
F-6
Turley, saga. This authority also supports requiring government
employees to submit to polygraph examinations in connection with
investigations of unauthorized disclosures. See Memorandum of
Larry A. Hammond, Acting Assistant Attorney General, Office of
Legal Counsel, February 22, 1980.
OPM and other agencies with more restrictive policies on use
of the polygraph should be directed to amend their regulations if.
necessary to permit adverse consequences to follow an employee's
refusal to cooperate with polygraph examinations used to
investigate unauthorized disclosures of classified information.
Such polygraph examinations could be limited to the circumstances
of the unauthorized disclosure being investigated, and would not
include unrelated questions. The employing agency would be
permitted to deny security clearances, to draw adverse evidentiary
inferences, or to take other administrative action, as appro-
priate, against an employee who refuses to cooperate with such a
polygraph examination.
Finally, agency heads should be directed to impose
appropriate administrative sanctions in situations where employees
fail to cooperate with investigations or are found to have
disclosed classified information without authorization. This will
provide assurance to all involved in the investigatory process
that their efforts will be worthwhile. There is clear authority
Approved For Release 2007/08/06: CIA-RDP84B00049R001102740032-7
Approved For Release 2007/08/06: CIA-RDP84B00049RO01102740032-7
F-7
to discipline or discharge employees for the unauthorized
disclosures of classified information or for failure to cooperate
with an investigation. What is required is the determination to
use this authority in appropriate cases.
Approved For Release 2007/08/06: CIA-RDP84B00049RO01102740032-7
Approved For Release 2007/08/06: CIA-RDP84B00049RO01102740032-7
Approved For Release 2007/08/06: CIA-RDP84B00049RO01102740032-7
Approved For Release 2007/08/06: CIA-RDP84B00049R001102740032-7
Tab. G
DRAFT NATIONAL SECURITY DECISION DIRECTIVE
1. Each agency of the Executive Branch that originates or
stores classified information shall adopt internal procedures to
safeguard against unauthorized disclosures of classified informaa
tion. Such procedures shall at a minimum provide as follows:
a. All persons with authorized access to classified
information shall be required to sign anondisclosure
agreement as a condition of access. All such agreements
must be in a form determined by the Department of
Justice to be enforceable in a civil action brought by
the United States. This requirement may be implemented
prospectively by agencies for which the administrative
burden of compliance would otherwise be excessive.
b. All persons with authorized access to Sensitive
Compartmented Information (SCI) shall be required to
sign a nondisclosure agreement as a condition of access
to SCI and collateral classified information. All such
agreements must include a provision for prepublication
review to assure deletion of SCI and collateral
classified information and, in addition, must be in a
form determined by the Department of Justice to be
enforceable in a civil action brought by the United
States.
c. Appropriate policies shall be adopted to govern
contacts between media representatives and agency
officials, so as to reduce the opportunity for negligent
or deliberate disclosures of classified information.
All persons with authorized access to classified
information shall be clearly apprised of the agency's
policies in this regard.
2. Each agency of the Executive Branch that originates or
stores classified information shall adopt internal procedures to
govern the reporting and investigation of unauthorized disclosures
of such information. Such procedures shall at a minimum provide
that:
a. All such disclosures that the agency considers to be
seriously damaging to its mission and responsibilities
shall be evaluated to ascertain the nature of the
information disclosed and the extent to which it had
been disseminated. .
Approved For Release 2007/08/06: CIA-RDP84B00049R001102740032-7
Approved For Release 2007/08/06: CIA-RDP84B00049R001102740032-7
G-2
b. The agency shall conduct a preliminary internal
investigation prior to or concurrently with seeking
investigative assistance from other agencies.
c. The agency shall maintain records of disclosures so
evaluated and investigated.
d. Agencies in the possession of classified information
originating with another agency shall cooperate with the
originating agency by conducting internal investigations
of the unauthorized disclosure of such information.
e. Employees determined by the agency to have refused
cooperation with investigations of such unauthorized
disclosures or to have made such disclosures will be
denied further access to classified information-and
subjected to other administrative sanctions as
appropriate.
3. The Department of Justice shall continue to review
reported unauthorized disclosures of classified information to
determine whether FBI investigation is warranted. Interested
departments and agencies shall be consulted in developing criteria
for evaluating such matters and in determining which cases should
receive investigative priority. The FBI is' authorized to
investigate such matters as constitute potential violations of
federal criminal law, even though administrative sanctions may be
sought instead of criminal prosecution.
4. Nothing is this directive is intended to modify or
preclude interagency agreements between FBI and other criminal
investigative agencies regarding their responsibility for
conducting investigations within their own agencies or
departments.
5. The Office of Personnel Management and all departments
and agencies with employees having access to classified
information are directed to revise existing regulations and
policies, as necessary, so that employees may be required to.
submit to polygraph examinations, when appropriate, in the course
of investigations of unauthorized disclosures of classified
information. As a minimum, such regulations shall permit an
agency to decide that appropriate adverse consequences will follow
an employee's refusal to cooperate with a polygraph examination
that is limited in scope to the circumstances of the unauthorized
disclosure under investigation. Agency regulations may provide
that only the head of the agency, or his delegate, is empowered to
order an employee to submit to a polygraph examination. Results
of polygraph examinations should not be relied upon to the
exclusion of other information obtained during investigations.
Approved For Release 2007/08/06: CIA-RDP84B00049R001102740032-7 _
Approved For Release 2007/08/06: CIA-RDP84B00049R001102740032-7
G-3
6. The Attorney General, in consultation with the Director,
Office of Personnel Management, is requested to establish an
interdepartmental group to study the federal personnel security
program and recommend appropriate revisions in existing Executive
orders, regulations and guidelines.
7. The Assistant to the President for National Security
Affairs will monitor the development of agency regulations that
implement this Directive and will supervise its implementation
within the White House Office.
Approved For Release 2007/08/06: CIA-RDP84B00049R001102740032-7