INFORMATION SECURITY OVERSIGHT OFFICE ANNUAL REPORT TO THE PRESIDENT FY 1985

Document Type: 
Collection: 
Document Number (FOIA) /ESDN (CREST): 
CIA-RDP90B01390R000100050013-0
Release Decision: 
RIPPUB
Original Classification: 
K
Document Page Count: 
40
Document Creation Date: 
December 22, 2016
Document Release Date: 
October 26, 2010
Sequence Number: 
13
Case Number: 
Content Type: 
REPORT
File: 
AttachmentSize
PDF icon CIA-RDP90B01390R000100050013-0.pdf2.68 MB
Body: 
Sanitized Copy Approved for Release 2010/10/26: CIA-RDP90B01390R000100050013-0 15 May 1986 Thank you for your assistance and cooperation in the recent count of classification decisions. This was the first of the two samplings scheduled for FY 86. The second sampling will be taken in September. An analysis of'the two samplings will be the basis for the Agency's annual report to the Information Security Oversight Office (ISOO). Attached is a copy of the ISOO FY 85 Annual Report to the President. The statistics we collected last year concerning classification are compiled in this report. STAT STAT IRMD 1236 Ames Sanitized Copy Approved for Release 2010/10/26: CIA-RDP90B01390R000100050013-0 Sanitized Copy Approved for Release 2010/10/26: CIA-RDP90B01390R000100050013-0 Information Security Oversight Office Annual Report to the President FY 1985 Sanitized Copy Approved for Release 2010/10/26: CIA-RDP90B01390R000100050013-0 Sanitized Copy Approved for Release 2010/10/26: CIA-RDP90B01390R000100050013-0 April 11, 1986 Dear Mr. Garfinkel: Thank you for your 1985 Annual Report on the status of the system we have established under Executive Order 12356 to protect national security information. I am pleased to note that the system continues to work well. Your report noted the current efforts to improve the information security program which the National Security Council has since approved in principle. Your interagency committee is to be commended for these efforts. These initiatives, in conjunction with other security and counterintelligence initiatives, should assist in further strengthening the information security program. Please accept my thanks for the outstanding work of your organization and the other dedicated personnel throughout the government who are working so hard on behalf of protecting our national security. Mr. Steven Garfinkel Director Information Security Oversight Office 18th and F Streets, N.W. Washington, D.C. 20405 Sanitized Copy Approved for Release 2010/10/26: CIA-RDP90B01390R000100050013-0 Sanitized Copy Approved for Release 2010/10/26: CIA-RDP90B01390R000100050013-0 Information Security Oversight Office Washington, DC 20405 March 24, 1986 I am pleased to submit the Information Security Oversight Office's (ISOO) 1985 Annual Report to the President. Since you issued Executive Order 12356, "National Security Information," in 1982, the ISOO has regularly reported that the information security system established under it has functioned very well. That success continues. Nevertheless, you have also recognized the need for ongoing efforts to improve the security classification program, seeking better protection for national security information without excessive classification. In 1985, the ISOO commenced an interagency effort to seek even further improvement in the information security program. The ISOO is now working to implement the proposed initiatives that resulted. These are discussed in greater detail in the Report. Your support of the information security system has been constant and remains vital to its continued success. As we seek further improvement, we proceed with the knowledge of your continued interest. Respectfully, Steven Garfinkel Director The President The White House Washington, DC 20500 Sanitized Copy Approved for Release 2010/10/26: CIA-RDP90B01390R000100050013-0 Sanitized Copy Approved for Release 2010/10/26: CIA-RDP90BO1390R000100050013-0 Sanitized Copy Approved for Release 2010/10/26: CIA-RDP90B01390R000100050013-0 Sanitized Copy Approved for Release 2010/10/26: CIA-RDP90B01390R000100050013-0 Table of Contents Letter to the President ......................... 1 Agency Acronyms or Abbreviations ........... 4 Summary of FY 1985 Program Activity ........ 5 The Information Security Program FY 1985 ... 6 Program Reviews and Inspections ....... 6 Statistical Reporting ...................... 7 Original Classification Authorities ....... 8 Original Classification .................... 9 Derivative Classification .................. 12 Total Classification Activity .............. 13 Mandatory Review for Declassification ........................14 Systematic Declassification Review ..... 16 Agency Self-Inspections .................. 18 Exhibits 1. Original Classifiers, FY 1971-FY 1985 ....................... 8 2. Number of Original Classifiers ........... 9 3. Comparison of Original Classification Activity .................. 9 4. Original Classification Decisions ......... 10 5. Original Classification Decisions by Agency, FY 1982-FY 1985 ..............11 6. Original Classification Decisions Scheduled for Automatic Declassification ........................ 11 7. Original Classification/ Declassification Assignments ......... 12 8. Comparison of Derivative Classification Activity ..................12 9. Derivative Classification Decisions by Agency, FY 1982-FY 1985 ..........13 10. Comparison of Combined Classification Activity .................. 13 11. Mandatory Review Requests Received ............................... 14 12. Mandatory Review Workload, FY 1983-FY 1985 .......................14 Improving the Information Security System ... 19 Appendix A: DoD Sampling Systems .........24 B: Classified Information Nondisclosure Agreement .... 27 C: Highlights of ISOO Symposium ...................28 D: ISOO Inspections: FY 1983- FY 1985 ........................ 30 13. 14. 19. 20. Mandatory Review Actions ............... 15 FY 1985 Mandatory Review Actions by Agency .............................. 15 Mandatory Review Appeals Workload, FY 1983-FY 1985............ 16 Pages Reviewed for Declassification ........................ 16 Percentage of Reviewed Pages Declassified ............................ 17 FY 1985 Systematic Review Actions by Agency ............................. 17 Agency Self-Inspections ................. 18 Infractions ................................ 18 Sanitized Copy Approved for Release 2010/10/26: CIA-RDP90B01390R000100050013-0 Sanitized Copy Approved for Release 2010/10/26: CIA-RDP90B01390R000100050013-0 Agency Acronyms or Abbreviations Used in this Report ACDA Arms Control and Disarmament NARA National Archives and Records Agency Administration AID Agency for International NASA National Aeronautics and Space Development Administration AIR FORCE Department of the Air Force NAVY Department of the Navy ARMY Department of the Army NLRB National Labor Relations Board BIB Board for International NRC Nuclear Regulatory Commission Broadcasting NSA National Security Agency CEA Council of Economic Advisers NSC National Security Council CIA Central Intelligence Agency NSF National Science Foundation COMMERCE Department of Commerce OA, EOP Office of Administration, DARPA Defense Advanced Research Executive Office of the President Projects Agency OJCS Organization of the Joint Chiefs DCA Defense Communications of Staff Agency OMB Office of Management and Budget DCAA Defense Contract Audit Agency OMSN Office for Micronesian Status DIA Defense Intelligence Agency Negotiations DIS Defense Investigative Service OPIC Overseas Private Investment DLA Defense Logistics Agency Corporation DMA Defense Mapping Agency OPM Office of Personnel Management DNA Defense Nuclear Agency OSD Office of the Secretary of Defense DoD Department of Defense OSTP Office of Science and Technology DoE Department of Energy Policy DoT Department of Transportation OVP Office of the Vice President ED Department of Education PC Peace Corps EPA Environmental Protection Agency PFIAB President's Foreign Intelligence EXIMBANK Export-Import Bank Advisory Board FBI Federal Bureau of Investigation PIOB President's Intelligence Oversight FCA Farm Credit Administration Board FCC Federal Communications SBA Small Business Administration Commission SEC Securities and Exchange FEMA Federal Emergency Management Commission Agency SSS Selective Service System FHLBB Federal Home Loan Bank Board STATE Department of State FMC Federal Maritime Commission TREASURY Department of the Treasury FRS Federal Reserve System TVA Tennessee Valley Authority GSA General Services Administration USDA Department of Agriculture HHS Department of Health and USIA United States Information Agency Human Services USPS United States Postal Service HUD Department of Housing and USTR Office of the United States Trade Urban Development Representative ICC Interstate Commerce VA Veterans Administration Commission ISOO Information Security Oversight Office INTERIOR Department of the Interior ITC International Trade Commission JUSTICE Department of Justice LABOR Department of Labor MMC Marine Mammal Commission 4 Sanitized Copy Approved for Release 2010/10/26: CIA-RDP90B01390R000100050013-0 Sanitized Copy Approved for Release 2010/10/26: CIA-RDP90B01390R000100050013-0 Summary of FY 1985 Program Activity Inspections The FY 1985 Report to the President is the third to examine the information security program under E.O. 12356. The following data highlight ISOO's findings: ? The number of original classification authorities rose slightly to 7,014. ? Original classification decisions decreased to a record low level of 830,641. ? By classification level, 3.9% of original classification decisions were "Top Secret," 35.6% were "Secret," and 60.5% were "Confidential." ? Under E.O. 12356, originally classified information has been marked for automatic declassification 34% of the time, in contrast to the estimated 10% rate under E.O. 12065. ? Derivative classification decisions rose 15% over FY '84, to 21,492,254. ? The total of all classification actions, 22,322,895, was a 14% increase over FY '84. ? Agencies received 4,037 new mandatory review requests. ? Agencies processed 3,621 cases, 18% fewer than in FY '84, but declassified in full 265,197 pages, 101,632 more than in FY '84, and declassified in part 47,920 additional pages. ? Agencies received 282 new mandatory review appeals. ? Agencies acted on 522 appeals, 23% more than in FY '84, and declassified additional information in whole or in part in 87% of the cases. ? Under the systematic review program, agencies declassified 8,107,047 pages of historically valuable records, 2.4 million pages fewer than in FY '84. ? Agencies conducted 28,319 self-inspections, a slight increase over FY '84. ? Agencies reported 15,154 infractions, 21 % fewer than in FY '84. Sanitized Copy Approved for Release 2010/10/26: CIA-RDP90B01390R000100050013-0 Sanitized Copy Approved for Release 2010/10/26: CIA-RDP90B01390R000100050013-0 Information Security Oversight Office The Information Security Program - FY 1985 Under Executive Order 12356, the Information Security Oversight Office (ISOO) is responsible for monitoring the information security programs of those executive branch activities that generate or handle national security information. Originally established by Executive Order 12065, ISOO continues to be the primary oversight organization in the system prescribed by President Reagan's Order of April 2, 1982. In this role, ISOO oversees the information security programs of approximately 65 departments, independent agencies and offices of the executive branch. E.O.12356 also requires the Director of ISOO to report annually to the President about the ongoing implementation of the Order's provisions. This Report summarizes Government-wide performance during FY 1985, the system's third year. ISOO is located administratively in the General Services Administration but receives its policy direction from the National Security Council. The Administrator of General Services appoints the ISOO Director upon approval of the President. The ISOO Director appoints the staff, which numbers between 13-15 persons. For FY 1985, ISOO's budget was $660,000. ISOO fulfills its assigned responsibilities under E.O.12356 in a variety of ways. First, it develops and issues implementing directives and instructions regarding the Order. Second, ISOO conducts on-site inspections or program reviews of agencies that generate or handle national security information. During FY 1985, ISOO also monitored agency implementation of the signing by all cleared employees of the Classified Information Nondisclosure Agreement, Standard Form 189, prescribed by National Security Decision Directive 84 (NSDD 84), as a condition of access to classified information. Appendix B, p. 27, reports on the status of implementation of this requirement by each agency. Third, ISOO gathers, analyzes and reports statistical data on agencies' programs. Fourth, it evaluates, develops or disseminates security education materials and programs. During FY 1985, ISOO held a symposium entitled "National Security Information: Different Perspectives," at which time Government and contractor employees, scholars and journalists heard varying views on the topic from a panel of experts assembled from the public and private sectors. Appendix C, p. 28, contains quotes highlighting the meeting. Fifth, ISOO receives and takes action on suggestions, complaints, disputes and appeals from persons inside or outside the Government on any aspect of the administration of the Order. In this area, ISOO serves as the final appellate authority for the mandatory declassification review of presidential materials. Sixth, it conducts special studies on identified or potential problem areas and on programs to improve the system. During FY 1985, the ISOO Director chaired an interagency effort to develop initiatives to improve the Government-wide information security system in five perceived problem areas: overclassification or unnecessary classification; the overdistribution of classified information; classification management; revitalization of the "need-to-know" principle; and unauthorized disclosures. These initiatives are discussed in greater detail in the narrative section, p. 19. Seventh, ISOO maintains continuous liaison with monitored agencies on all matters relating to the information security system. This Report is based upon program reviews and inspections conducted by the ISOO staff and the compilation and analysis of statistical data regarding each agency's program activity. Program Reviews and Inspections ISOO's program analysts serve as liaison to specific agencies to facilitate coordination and to provide for continuity of oversight operations. The analysts must stay abreast of relevant activities within each agency's information security program; coordinate with assigned agency counterparts on a continuing basis; and conduct formal inspections of the agency's program in accordance with a planned annual inspection schedule, which includes visits to selected field activities as well as offices in the Washington metropolitan area. ISOO also undertakes compliance reviews of selected contractor facilities as part of its inspection Sanitized Copy Approved for Release 2010/10/26: CIA-RDP90B01390R000100050013-0 Sanitized Copy Approved for Release 2010/10/26: CIA-RDP90B01390R000100050013-0 program. Appendix D to this Report p. 30, lists those activities that ISOO has inspected during the period FY 1983-1985. These on-site surveys encompass all aspects of the information security program, including classification, declassification, safeguarding, security education, and administration. The inspections always include detailed interviews with agency security personnel, classifiers, and handlers of national security information. To the extent possible, ISOO analysts review a sampling of classified information in the agency's inventory to examine the propriety of classification, the existence of necessary security markings and declassification instructions, and compliance with safeguarding procedures. ISOO analysts also monitor security training programs to determine if the agencies adequately inform personnel about classifying, declassifying, marking and safeguarding national security information. When weaknesses in an agency's program are identified, ISOO analysts recommend corrections, either on-the- spot or as part of a formal inspection report. Critical reports require immediate remedial attention by the agency prior to a follow-up inspection by ISOO. These inspections are a necessary means of identifying and resolving problem areas. They provide specific indicators of agency compliance or noncompliance with E.O. 12356 that are not apparent simply from the analysis of statistical data. Statistical Reporting To gather relevant statistical data regarding each agency's information security program, ISOO developed the Standard Form 311, which requires each agency to report annually the following information: 1. The number of original classification authorities; 2. the number of declassification authorities; 3. the number of original classification decisions, including the classification level of those decisions and the duration of classification; 4. the number of derivative classification decisions by classification level; 5. the number of requests received for mandatory review for declassification and agency actions in response to these requests in terms of cases, documents, and pages; 6. the number of pages of national security information reviewed during the year under systematic declassification procedures and the number declassified; 7. the number of formal self-inspections conducted by the agency; and 8. the number of security infractions detected by the agency within its own program. The statistics reflected in this Report cover the period October 1, 1984, through September 30, 1985. Some of the larger agency programs, including CIA and DoD, calculate their classification actions on the basis of sampling systems approved by ISOO. For FY 1985, DoD utilized two sampling methods in reporting its statistics to ISOO. The first is based on electronic message traffic only, and has been in use since ISOO began collecting these statistics. The second, which was begun this year, includes a wider range of document types, including memoranda and reports. For FY 1985, ISOO is using the data provided by the message traffic system in the body of the Report to allow for more accurate comparisons with previous years. In future reports ISOO intends to use the statistics provided by the new sampling method, because it is likely to produce more reliable figures. Appendix A, p. 24, describes the two sampling systems in greater detail, and contains the statistics reported by DoD using the new method. 7 Sanitized Copy Approved for Release 2010/10/26: CIA-RDP90B01390R000100050013-0 Sanitized Copy Approved for Release 2010/10/26: CIA-RDP90B01390R000100050013-0 Original Classification Authorities Up Slightly (Exhibits 1 and 2) Original classification authorities are those individuals specifically authorized in the first instance to classify information in the interest of national security. These classifiers are designated in writing, either by the President or by other officials, primarily agency heads, named by the President. Limiting the number of original classifiers to the minimum necessary for efficient management is one way to control the volume of overall classification activity. ISOO encourages agencies to conduct regular surveys to ensure that the number of original authorities is in line with operational requirements. ORIGINAL CLASSIFIERS Exhibit 1 1971 - 1985 E.O. 10501 E.O. 11652 E.O. 12065 E.O. 12356 1971 1972 1976 1982 1983 1984 1985 13,976 E 7,056 7,010 6,987' Totals Reported in FY 1984 ISOO Report Changed to Reflect Addition of 87 Secret Classifiers in DoD Not Previously Reported to ISOO 8 Sanitized Copy Approved for Release 2010/10/26: CIA-RDP90B01390R000100050013-0 Sanitized Copy Approved for Release 2010/10/26: CIA-RDP90B01390R000100050013-0 The number of executive branch employees authorized to classify originally has decreased significantly since 1972, when the figure was 59,316. In FY 1985, there were 7,014 individuals with original classification authority. This is slightly higher than the revised total of 6,987 reported in FY 1984, and approximates the 7,010 original classifiers registered in FY 1983. Responsibility for the higher figure during FY 1985, rests with three agencies that reported substantial increases. They are FEMA, up 13 (+325%), Treasury, up 26 (+30%) and State, up 136 (+8%). These numbers more than offset decreases at CIA, DoD and OSTP. The number of "Top Secret" authorities rose at the greatest rate (+3%), although "Confidential" authorities also increased by 1 %. "Secret" authorities declined by 1%. During FY 1986, ISOO will press each agency that accounted for this year's increase, and others, to make a concerted effort to reduce the number of original classifiers, especially at the "Top Secret" level. ISOO is convinced that some designations of original classification authority continue to be based solely on the purported prestige that attaches to it. This is unacceptable because the only valid justification is the need of the official to exercise such authority in the performance of his or her employment responsibilities. Original Classification Declines to Record Low Level (Exhibits 3 through 7) An original classification decision is an initial determination by an authorized official that information requires protection from unauthorized disclosure in the interest of national security. The determination is accompanied by the placement of required classification markings on the medium that contains the information. The number of original classification decisions is probably the most important statistic reported by ISOO each year because of its wide ranging impact on all aspects of the information security program. In FY 1985, the number of original classification decisions decreased by 51,302 (-5.8%) to 830,641. This figure represents the lowest number of original actions reported since ISOO began collecting such statistics in FY 1979. The total is 21 % lower than the 1,055,152 decisions reported in FY 1982, the last year under the previous Executive order. NUMBER OF COMPARISON OF ORIGINAL ORIGINAL CLASSIFIERS Exhibit 2 CLASSIFICATION ACTIVITY "Top Secret" Authorities: (1 559) , "Secret" Authorities: (4 293) , "Confidential" Authorities: (1 161) , Total: (7,014) = 500 Authorities Exhibit 3 Sanitized Copy Approved for Release 2010/10/26: CIA-RDP90B01390R000100050013-0 Sanitized Copy Approved for Release 2010/10/26: CIA-RDP90B01390R000100050013-0 Despite the positive overall figure for FY 1985, ISOO notes that the number of original "Top Secret" actions increased substantially during the year. They rose by 12,016 (60.1 %). "Secret" actions increased by 34,539 (13.2%). These numbers were offset by a dramatic decrease of 97,857 (-16.3%) in "Confidential" decisions. ISOO is concerned that a trend may be developing for agencies to classify at increasingly higher levels, and will be watching carefully to ensure that any continued movement in such a direction is justified. ORIGINAL CLASSIFICATION DECISIONS "TOP SECRET" ORIGINAL CLASSIFICATION Exhibit 4 DECISIONS TOTAL ORIGINAL Sanitized Copy Approved for Release 2010/10/26: CIA-RDP90B01390R000100050013-0 Sanitized Copy Approved for Release 2010/10/26: CIA-RDP90B01390R000100050013-0 Four agencies classify originally more than 99% of the actions within the executive branch. Of these, DoD reported an increase of 39,577 (11 %) and Justice a rise of 6,341 (10%). The CIA and State reported decreases of 32% and 5%, respectively. The decline of 84,500 actions by the CIA was the primary factor for the lower total figure in original classification decisions. A comparison of original classification decisions by agency for the period FY 1982-1985 shows a dramatic decrease by the CIA from a high figure of 413,521 reported in FY 1982, to this year's total of 181,688. Similarly, the numbers for Justice demonstrate a marked decline in original classification activity from FY 1982- FY 1985. The figures for State remained relatively constant during the period. The only major classifier to register increases each year is DoD, which reported 291,831 original decisions in FY 1982, and 385,496 in FY 1985, a 32% increase. ORIGINAL CLASSIFICATION DECISIONS BY AGENCY 1982-1985 In Thousands During FY 1985, 35% of the decisions specified a particular date or event for automatic declassification. This is 3% greater than the figure reported in FY 1984. The average of 34% under the current Executive order continues to be considerably better than the estimated 10% under the predecessor system. The DoD's automatic declassification rate remained an impressive 71 % during FY 1985. However, at several other agencies the rate declined sharply from the percentages reported in FY 1984. They were the CIA (5% in FY 1984, to 1 % in FY 1985), DoE (15% to 7%), State (12% to 8%), and Treasury (16% to 9%). ORIGINAL CLASSIFICATION DECISIONS SCHEDULED FOR AUTOMATIC Exhibit 5 DECLASSIFICATION Sanitized Copy Approved for Release 2010/10/26: CIA-RDP90B01390R000100050013-0 Sanitized Copy Approved for Release 2010/10/26: CIA-RDP90B01390R000100050013-0 During the course of its on-site inspections, ISOO analysts examine documents to determine the propriety of the classification and the proper use of markings. Frequently, analysts review items that could contain a specific date or event as the declassification instruction but instead bear the indefinite designation, "Originating Agency's Determination Required." Examples of documents that should contain a specific date or event as the declassification instruction are memoranda relating to itineraries abroad by U.S. officials or to this country by foreign dignitaries. This is an area in which further improvements are achievable. ISOO will continue to press agencies to use a date or event whenever possible. Derivative Classification Continues to Rise (Exhibits 8 and 9) Derivative classification is the act of incorporating, paraphrasing, restating or generating in new form classified source information. Information may be derivatively classified in two ways: (a) through the use of a source document, usually correspondence or publications generated by an original classification authority; or (b) through the use of a classification guide. Only executive branch or Government contractor employees with the appropriate security clearance who are required by their work to restate classified source information may classify derivatively. In FY 1985, executive branch agencies made 21,492,254 derivative classification decisions, a 14.8% increase over FY 1984. Of the total, 510,179 (2%) were classified at the "Top Secret" level, 6,539,860 (31 %) at the "Secret" level, and 14,442,215 (67%) at the "Confidential" level. These figures represent an increase at each level, with the number of "Secret" actions rising the greatest at 18%. "Top Secret" and "Confidential" decisions increased 11 % and 13%, respectively. ORIGINAL CLASSIFICATION! COMPARISON OF DERIVATIVE DECLASSIFICATION ASSIGNMENTS Exhibit 7 CLASSIFICATION ACTIVITY 1985 Agency % Assigned Date % OADR (Must be % or Event for Declassification Reviewed Before Declassification) "TS" DoD 71% 29% 1% 18% 81% CIA 1% 99% 14% 75% 11% State 8?i? 92% 0.1% 20.9% 79% Justice 0.4% 99.6% 4% 70% 26% Treasury 9% 91% 0% 5% 95% All Others 21% 79% 2% 25% 73% Totals 35% 65% 4% 36% 60% Sanitized Copy Approved for Release 2010/10/26: CIA-RDP90B01390R000100050013-0 12 Sanitized Copy Approved for Release 2010/10/26: CIA-RDP90B01390R000100050013-0 Combined Classification Activity Increases (Exhibit 10) An examination of the data from FY 1982 through FY 1985 indicates that DoD and CIA account for nearly all of the derivative classification decisions. The figures for DoD show annual increases during the period from a low of 13,738,420 in FY 1982, to a high of 18,090,961 in FY 1985. The increase from FY 1984-1985, was 11 % or an additional 1,826,923 derivative classification actions. The CIA had experienced declines in each year from FY 1982-1984. However, in FY 1985 it registered a 42% increase in the number of derivative classification decisions. Two agencies reporting substantial percentage decreases in FY 1985, were FEMA (-57%) and Justice (-13%). Given the wide disparity in figures reported by DoD and CIA for FY-1985, ISOO is concerned that the sampling systems currently in use may not result in the most accurate numbers. Both agencies project the totals based on samples taken over a single one week period. It is likely that in one year the week selected may be relatively quiet while, in another, it may be unusually active. To overcome this potential problem, ISOO is recommending that the DoD and CIA develop systems that sample classification activity during more than a single one week period. DERIVATIVE CLASSIFICATION DECISIONS BY AGENCY Exhibit 9 1982-1985 In Millions 2.7 2.4 32 2.3 1982 1983 1984 1985 17 16 06 06 All Others During FY 1985, the combined number of original and derivative classification decisions was 22,322,895. This was an increase of 2,715,159 (14%) over FY 1984. The primary reasons for the rise were the substantial increases reported by DoD in both original and derivative actions and the 42% increase registered by the CIA in derivative decisions. As in the past, ISOO worked with the agencies whose original or derivative classification decisions accounted for the significant increases to help determine the causes. Among the reasons, several agencies cited greater counterintelligence efforts, particularly in the area of combating international terrorism. As discussed in the section on derivative classification, p. 12, ISOO suspects that the difference is partly the result of sampling that concentrates on one week of the year. In FY 1986, ISOO will devote additional energy to the review of documents during its on-site surveys to ascertain the appropriateness of classification. ISOO will also be seeking greater involvement by the agencies themselves to undertake similar spot checks to determine the propriety of classification decisions. The percentage of all decisions classified at the "Top Secret" level remained at 2% for the second straight year. However, there was a shift of one percent from "Confidential" to "Secret." The former now comprise 67% of the total, the latter 31 % COMPARISON OF COMBINED CLASSIFICATION ACTIVITY Exhibit 10 FY Total Actions % "TS" % "S" % "C" 1981 17,374,102 1982 17,504,611 1983 18,005,151 1984 19,607,736 1985 22,322,895 5% 3% 3% 2% 2% 29% 66% 31% 66% 30% 67% 30% 68% 31% 67% 13 Sanitized Copy Approved for Release 2010/10/26: CIA-RDP90B01390R000100050013-0 Sanitized Copy Approved for Release 2010/10/26: CIA-RDP90B01390R000100050013-0 Mandatory Review Continues to Produce Impressive Results (Exhibits 11 through 15) Under E.O. 12356, the mandatory review process allows agencies or citizens to require an agency to review particular national security information for purposes of seeking its declassification. Such requests must be in writing and must describe the information with enough detail to permit the agency to retrieve it with a reasonable amount of effort. Mandatory review is a process popular with researchers as a less contentious alternative to Freedom of Information Act requests. The number of mandatory review requests received in FY 1985, declined by 613 to 4,037. Despite the decrease, this figure represents the fourth highest number of new cases received since the program was instituted in FY 1972. When the 1,523 cases carried forward from FY 1984, are added to the new cases received, agencies had a total caseload of 5,560 during FY 1985. They acted on a total of 3,621 cases, 18% fewer than in FY 1984. MANDATORY REVIEW REQUESTS RECEIVED Exhibit 11 2,246 4,192 Since FY 1983, ISOO has collected data on agency actions in response to mandatory review requests in terms of cases, documents and pages. A comparison of the figures for each category for the three years indicates that the numbers for FY 1985, are considerably better than those for FY 1983, but not quite as good as those reported in FY 1984. The 3,621 cases acted on in FY 1985, comprised 84,767 documents totaling 329,945 pages. The number of pages acted on was only 4% less than the record number reported for FY 1984. MANDATORY REVIEW WORKLOAD CASES/DOCUMENTS/PAGES Exhibit 12 14 Sanitized Copy Approved for Release 2010/10/26: CIA-RDP90BO1390R000100050013-0 Sanitized Copy Approved for Release 2010/10/26: CIA-RDP90B01390R000100050013-0 Of the 3,621 cases completed in FY 1985, 1,866 (52%) were granted in full, 1,344 (37%) were granted in part, and 411 (11%) were denied in full. The percentage of cases denied in full marked the first time in three years that the figure exceeded 10%. Of the 84,767 documents acted on in FY 1985, 79,693 (94%) were granted in full, 3,180 (4%) were granted in part, and 1,894 (2%) were denied in full. The number of documents declassified in full increased by an impressive 54,789 (220%) over the FY 1984 figure. Similarly, the number of pages released in full rose 62% from 163,565 in FY 1984, to 265,197 in FY 1985. This was 80% of the pages reviewed during the last fiscal year. Of the remaining pages, 47,920 (15%) were released in part and 16,828 (5%) were denied in full. During FY 1985, 313,117 pages were either declassified in full or in part, slightly below the combined figure of 325,530 for FY 1984. Nevertheless, the percentage of pages released in full rose to 80% in FY 1985, as compared to 47% in FY 1984. Much of the credit for the improvement rests with DoD, which increased the number of pages released in full from 140,505 in FY 1984, to 207,329 in FY 1985. MANDATORY REVIEW ACTIONS E.O. 12356 also gives requesters the right to appeal mandatory review denials to officials of the denying agencies, or, with respect to classified presidential materials, to the ISOO Director. During FY 1985, agencies received 282 new appeals in addition to the 782 carried over from the previous year. Of these 1,064 pending cases, the agencies closed 522 in FY 1985. This represented a notable 23% improvement over FY 1984. Justice was the agency primarily responsible for the improved figure. FY 1985 MANDATORY REVIEW Exhibit 13 ACTIONS BY AGENCY Exhibit 14 Agency Total Cases Acted On % Granted in Full % Granted in Part % Denied in Full State 867 43% 44% 13% DoD 770 62% 28% 10% NSC 677 39% 57% 4% Justice 442 88% 4% 8% NARA 434 41% 39% 20% CIA 281 28% 48% 24% All Others 150 75% 21% 4% Totals 3,621 52% 37% 11% Sanitized Copy Approved for Release 2010/10/26: CIA-RDP90B01390R000100050013-0 Sanitized Copy Approved for Release 2010/10/26: CIA-RDP90B01390R000100050013-0 Systematic Review Results Disappointing (Exhibits 16 through 18) Of the 522 appeals completed, 193 (37%) were granted in full, 262 (50%) were granted in part, and 67 (13%) were denied in full. These appeals totaled 10,669 documents and 56,332 pages, increases of 80% and 113%, respectively, over the figures reported for FY 1984. Of the documents reviewed on appeal during FY 1985, 5,473 (51%) were released in full, 5,036 (47%) were released in part, and only 160 (2%) were denied in full. Of the 56,332 pages reviewed, 28,938 (51%) were declassified in full, 26,750 (47%) were declassified in part, and 644 (2%) remained fully classified. During FY 1985, the numbers of documents and pages released in full or in part showed substantial gains over the comparable figures for the previous year. Documents rose from 5,723 in FY 1984, to 10,509 in FY 1985, while pages released in full or in part increased from 24,791 to 55,688. Once again it was Justice that accounted for the significant improvement in the figures. APPEALS WORKLOAD "Systematic review for declassification" is the program, first introduced in 1972, in which classified, permanently valuable (archival) records are reviewed for purposes of declassification after the records reach a specific age. Under E.O. 12356, NARA is required to conduct a systematic review of its classified holdings as they become 30 years old, except for certain intelligence or cryptologic file series which are to be reviewed as they become 50 years old. While other agencies are not required to conduct a systematic review program, they are encouraged to do so if resources are available. In recent years, the product of the systematic review program has declined as a result of two factors. First, the records that are now being reviewed are not generally susceptible to the bulk declassification methods that were frequently adequate in declassifying World War II era records. Second, the resources available for systematic review have continued to dwindle. From FY 1980 to FY 1983, with the World War II era records almost entirely declassified, the number of pages reviewed under systematic declassification declined precipitously to 12.4 million. Following a call for increased attention by the Assistant to the President for National Security Affairs, in FY 1984, the number increased to 12.8 million pages. PAGES REVIEWED FOR CASES/DOCUMENTS/PAGES Exhibit 15 DECLASSIFICATION Exhibit 16 Sanitized Copy Approved for Release 2010/10/26: CIA-RDP90B01390R000100050013-0 Sanitized Copy Approved for Release 2010/10/26: CIA-RDP90B01390R000100050013-0 Last year's Report expressed the hope that the slight increase registered in FY 1984, was a sign that the program was on the mend. However, the numbers reported for FY 1985, were the lowest since the program was initiated. During the year, agencies reviewed 10.4 million pages, down approximately 2.4 million (18%) from FY 1984. Of the pages reviewed, 78% were declassified. Although this is lower than the 86% declassification rate reported last year, it is still substantially higher than the 63% registered in FY 1983. While NARA reviewed 9% more pages in FY 1985 than in FY 1984, this increase was offset by the 29% decline reported by DoD. In FY 1985, DoD reviewed 2.8 million fewer pages under the systematic program than in the previous year. Despite this decline, it is important to note that DoD still reviewed more than 6.8 million pages and declassified just over 5 million pages. Under the Executive order, DoD is not required to conduct any systematic review program. Its voluntary efforts in this area continue to deserve special recognition, and ISOO is hopeful that, at a minimum, DoD will be able to maintain the current program. PERCENTAGE OF REVIEWED PAGES DECLASSIFIED Exhibit 17 Ultimately, the success of the systematic dec!assification review program rests with NARA. It is the only agency that is required to conduct such a program. A small amount of progress has been made to implement the recommendations of a special task force established by the Archivist of the United States in 1984. There has been some increase in the resources devoted to NARA's systematic review program. Most of NARA's systematic review activity during FY 1985, resulted from a contract between NARA and State to review State's central files through 1955. NARA has signed a similar agreement with AID and has tentatively reached a new agreement with State to review certain of its records through 1959. In spite of these efforts, the 3,141,949 pages reported for FY 1985, is well below the 5 million pages recommended by the Archivist's task force and the 10 million pages that ISOO believes NARA must review annually to ensure a viable systematic declassification program. FY 1985 SYSTEMATIC REVIEW ACTIONS BY AGENCY Exhibit 18 Pages Pages % Reviewed Declassified Declassified DoD 6,803,568 5,074,439 75% NARA 3,141,949 2,808,035 89% AID 352,576 166,062 47% State 59,345 50,670 85% Justice 20,767 3,243 16% DoT 20,000 500 3% All Others 43,810 4,128 9% Totals 10,442,015 8,107,047 78?i? Sanitized Copy Approved for Release 2010/10/26: CIA-RDP90B01390R000100050013-0 Sanitized Copy Approved for Release 2010/10/26: CIA-RDP90B01390R000100050013-0 Agency Self-Inspections Increase Marginally (Exhibits 19 and 20) While the Executive order authorizes the Director of ISOO to conduct on-site inspections of those agencies that generate or handle classified information, it places primary responsibility for internal oversight on the agency heads themselves. The Order requires that agency heads establish and maintain "an active oversight and security education program." Agencies report to ISOO the number of self-inspections that they undertake each year. They also report the number and type of infractions found during the year. Infractions are minor violations of the Order, the implementing ISOO Directive or agency regulations. These statistics do not include the more serious security violations that agencies must report to ISOO as they occur. For FY 1985, agencies reported that they had conducted 28,319 self-inspections. This was a disappointing 2% increase over FY 1984. Those agencies showing significant decreases included CIA (-14%), DoT (-35%), State (-65%), and Treasury (-53%). Agencies reporting major increases were DoD (+2%), NSC (+93%), and NASA (+46%). AGENCY SELF-INSPECTIONS ISOO is concerned not only with the quantity of self-inspections the agencies undertook in FY 1985, but also with their quality. This concern arises from the fact that during the self-inspections conducted in FY 1985, agencies found 4,003 fewer infractions than in FY 1984. The total of 15,154 reported for this fiscal year is 21 % lower than the figure for the previous year. The average number of infractions discovered per inspection fell 22% from FY 1984, to FY 1985, to .54. This is far fewer than the number found during ISOO's regular program reviews, and calls into question the thoroughness of the self-inspections the agencies are conducting. ISOO is particularly concerned that agencies increase their review of classified holdings to ascertain the appropriateness of classification and the correctness of security markings. Exhibit 19 INFRACTIONS Exhibit 20 Total FY 82 Total FY 83 Total FY 84 Total FY 85 % Change 84-85 Unauthorized Access 475 620 483 440 - 9% Mismarking 11,499 10,849 7,503 6,642 - 12% Unauthorized Transmission 1,197 1,294 1,773 1,688 - 5% Improper Storage 4,222 3,844 7,363 5,089 - 31% Unauthorized Reproduction 207 249 190 143 - 25% Overclassification 290 220 302 164 - 46% Underclassification 365 317 351 265 - 25% Classification w/o Authority 392 238 597 109 -82% Improper Destruction 665 581 475 322 - 32% Other 967 132 120 292 + 143% Totals 20,279 18,344 19,157 15,154 - 21% 18 Sanitized Copy Approved for Release 2010/10/26: CIA-RDP90B01390R000100050013-0 Sanitized Copy Approved for Release 2010/10/26: CIA-RDP90B01390R000100050013-0 Improving the Information Security System When the Information Security Oversight Office (ISOO) issued its last Annual Report in April 1985, it was, fittingly, recapping the recent past in order to anticipate the future. Little did ISOO realize, however, how quickly several of its pronouncements would occupy some of 1985's most spectacular news stories. Less than a month later, the FBI's arrest of John Walker commenced the so-called "Year of the Spy," and highlighted the subject of national security information like never before. In its Report, ISOO expressed ongoing concern about several program weaknesses: The excess of security clearances; the apparent erosion in the "need-to-know" principle; the overdistribution of classified information among and within agencies and offices; and the continuing problem of overclassification, that is, the classification of information whose sensitivity doesn't merit this extraordinary protection. Within weeks of the issuance of the ISOO Report, daily news accounts of the Walker investigation exposed these subjects to the public in a way that ISOO and the rest of the security apparatus within Government could never accomplish. To be sure, many news accounts grossly exaggerated the link between instances of espionage and perceived weaknesses in the personnel and information security systems. For example, it became almost commonplace for commentators to blame the espionage, in part at least, on the vast numbers of individuals holding security clearances and on the classification of too much information. In each new case, however, the facts belied the logic of these assertions. While far too many people hold unneeded security clearances, all of the accused who held clearances occupied positions that clearly required them. And while the problem of overclassification persists, it is farfetched to establish a direct link between overclassification and espionage. The information at issue in the recent spy cases obviously warranted classification. The actual or intended procurers of the information certainly placed great value upon it, and the Government, in hearing after hearing, has justified the classification of the information to the satisfaction of the judges and juries. An Opportunity To the Government's security apparatus, however, the Walker case and its cousins presented something far more important than a challenge -- they presented an opportunity. Upon the release of its FY 1984 Report to the President, ISOO noted little interest within the executive branch to embark upon a program to improve an information security system that ISOO itself pronounced in generally good shape. It was the publicity over the Walker affair that created a hospitable environment in which to attack the problems that continued to nag the system. ISOO welcomed the opportunity. In July 1985, the National Security Council endorsed ISOO's request to commence an interagency review of the information security system, focusing on five program areas that both the NSC and ISOO perceived as most in need of attention. These were overclassification, or unnecessary classification; the overdistribution of classified information; classification management; revitalization of the "need-to-know" principle; and unauthorized disclosures. That same month the ISOO Director chaired a meeting of representatives of those agencies most heavily involved in the security classification program, including the Departments of State, Treasury, Justice, Defense, Army, Navy, Air Forcc and Energy, the Central Intelligence Agency, the National Security Agency and the Federal Bureau of Investigation. That meeting produced five task forces, each consisting of at least one civilian and one defense agency, responsible for recommending initiatives pertinent to one of the five problem areas. By the end of October, the interagency group had reached a consensus on thirteen separate initiatives that the ISOO Director transmitted to the Assistant to the President for National Security Affairs. During testimony before the Senate Select Committee on Intelligence (SSCI) in November 1985, the ISOO Director invited the Committee's 19 Sanitized Copy Approved for Release 2010/10/26: CIA-RDP90B01390R000100050013-0 Sanitized Copy Approved for Release 2010/10/26: CIA-RDP90B01390R000100050013-0 input on the proposed initiatives. Subsequently, the NSC concurred in ISOO's recommendation to invite the input of other interested committees of Congress as well. To date, the NSC and ISOO have received four congressional responses, including a comprehensive package from the SSCI. Each of these responses has endorsed the initiatives wholeheartedly. As this is being written, ISOO is anticipating the NSC's imminent approval to begin those actions necessary to implement the initiatives. The Initiatives The thirteen initiatives will not alter the basic structure of the current information security system. Each of the agencies participating in their formulation agreed that the structure of the system established by President Reagan in 1982, is fundamentally sound and, for the most part, working quite well. Rather, the initiatives strive for increased knowledge and increased accountability among the many people who are entrusted with making the system work as it should. Although they are few in number and quite modest in potential cost, ISOO firmly believes that they will spark the improvement of the information security system. 1. Overclassification The placement of overclassification as the first problem area was intentional. Although the problem of overclassification is not nearly as severe as the popular media portrays it to be, it is a continuing nuisance that eats away at the credibility of the entire system. Critics proclaim that overclassification is the mechanism the bureaucracy uses to hide its mistakes, to shield it from embarrassment, and to cover up its misdeeds. In ISOO's experience, the principal causes of overclassification are far less intriguing. Very few classification decisions are the tools of a cover-up, albeit even one casts a lingering shadow. Instead, ISOO believes that just about every instance of initial overclassification results from one or more of the following reasons. First, overcaution. Many classifiers believe, and with some reason, that it is better to err on the side of protection than on the side of disclosure. Second, rote classification. It is almost always easier to do things the way they've been done before. Independent thought takes time and effort. Third, status or prestige classification. Some misguided individuals believe that it elevates their stature to elevate the protection of their product. For status classifiers, "Confidential" is never high enough, and "Secret" is merely tolerable. Fourth, and related to status classification, exclusionary classification. This occurs when an official decides that the classification of his product will establish a more exclusive environment, free from routine oversight. Fifth, incorrect, inadequate or nonexistent classification guidance. Poor guidance results in inaccurate derivative classification actions and, quantitatively, is probably the most significant cause of overclassification. And sixth, the lack of portion markings in documents used as sources for derivative classification. If the entire text of a document is classified, even though some portions need not be, documents derived from those portions will be needlessly classified. There are primarily three initiatives that will attack the problem of overclassification, although others will certainly impact upon it. First, ISOO will issue a directive that establishes minimum requirements for mandatory training of original and derivative classifiers, including those who either issue or use classification guides. Too often these officials are receiving little or no training about the classification system and process, and because of their positions, the agency employees who are supposed to provide this training are reluctant to require it. By mandating training, this directive will provide those responsible with the ammunition they need to enforce adequate familiarity with the information security system. The directive will also require that agencies keep records of the training that each of these officials receives. Second, ISOO will issue a directive on agency self-inspections that establishes minimum 20 Sanitized Copy Approved for Release 2010/10/26: CIA-RDP90B01390R000100050013-0 Sanitized Copy Approved for Release 2010/10/26: CIA-RDP90B01390R000100050013-0 criteria for internal oversight. This directive will include the requirement that agencies periodically and routinely examine a sample of their classified product to ensure the validity of classification and the existence of appropriate markings. Most current agency self-inspections concentrate almost exclusively on physical security arrangements and largely ignore the information being protected. Third, ISOO will ask the President to amend Executive Order 12356, "National Security Information," to require employees to report instances of improper classification. Currently, the system strongly encourages, but does not require employees to report classification actions that they believe to be incorrect. In practice, this rarely occurs. If amended, the Order will also require agencies to establish effective procedures for employees to challenge improper classification free from the fear of retribution. This fear is believed to be a primary reason that employees and contractors are not challenging classification decisions today. To be sure, this initiative may result in many unfounded complaints. This seems to be a reasonable price to pay for improving the quality of classification decisions. II. Overdistribution The overdistribution of classified information has become a very serious problem in recent years. The widespread availability of copiers and the proliferation of automated information processing systems has multiplied the wholesale distribution of classified information. Increased distribution results in increased security costs and increased vulnerabilities. With much more classified information around, it becomes far more difficult to enforce the requirement that no one, even with a security clearance, may have access to classified information without a job related need to see it. To attack the problem of overdistribution, therefore, is also to help restore the "need-to- know" principle. Three initiatives confront the problem of overdistribution. First, ISOO will ask the President to issue a statement to the heads of agencies that addresses, among other problem areas, the overdistribution of classified information. A presidential statement will highlight overdistribution as a serious threat to security, not just an administrative burden. Second, ISOO will amend its current Government-wide directive to require agencies to review, at least annually, the automatic or routine distribution of all classified information. Distributors will be required to update automatic distribution lists and to verify the continuing "need-to-know" of recipients. This initiative should remedy the too frequent situation in which a onetime bona fide recipient is placed on an automatic distribution list and continues to receive the unneeded classified product of the distributor. Third, ISOO will also amend its current directive to encourage originators of classified information to widen controls on its reproduction, unless there are countervailing reasons to permit uncontrolled reproduction. Currently, "Top Secret" information may not be reproduced without the permission of the originator. Although originators may place similar controls on the reproduction of "Secret" and "Confidential" information, they rarely do so. With copiers available in just about every office, copies of classified documents proliferate. This initative should increase both control and accountability, and reduce the overdistribution of national security information. III. Classification Management ISOO has termed the third problem area "classification management." Although classification management is not a new term by any means, here it refers broadly to the management of classified information by classifiers, security specialists, and others whose work has a significant impact upon its creation and handling. The initiatives on classification management will clearly impact as well on each of the other problem areas. First, ISOO will seek the amendment of E.O. 12356 to identify the management of classified information as an area requiring agency head attention. Specifically, this initiative would Sanitized Copy Approved for Release 2010/10/26: CIA-RDP90B01390R000100050013-0 Sanitized Copy Approved for Release 2010/10/26: CIA-RDP90B01390R000100050013-0 require that the responsibilities for managing classified information be included as critical elements in the performance rating systems of civilian and military personnel who are original classifiers, security managers, or who are otherwise significantly involved in managing classified information. Perhaps more than any other, this initiative will confirm that personal accountability is the most effective means of improving the operation of the information security system. Second, ISOO will ask that the Assistant to the President for National Security Affairs call upon the Director of the Office of Personnel Management to review and revise the security specialist position series, to include proper recognition for the special skills necessary for the management of classified information. In many respects security specialists occupy the lowest rung of the professional ladder. They receive little respect, low salaries, and few opportunities for advancement. All too often the best people leave the security field as quickly as they can. The Government must improve the professional standing of security specialists, so that it can attract and retain competent, motivated people in these critical jobs. Third, ISOO will ask that the President direct the Secretary of Defense to study the feasibility of expanding the Defense Security Institute to provide basic training for all executive branch security personnel. Security education plays a fundamental role in assuring the effectiveness of the information security program. Today, however, basic security training is not always available to those who need it. The Defense Security Institute offers an existing school with excellent instructors in the necessary security disciplines. The demand for its courses far exceeds its current capacities. To increase the Institute's course offerings and enrollment, the Secretary of Defense should have the option of seeking reimbursement from the agencies whose employees and contractors would benefit from its expansion. IV. "Need-to-Know" The criteria for access to classified information have long been the security clearance plus the "need-to-know". With the proliferation of clearances, reliance upon "need-to-know" becomes even more critical. Instead, there is the clear perception of widespread indifference to this principle. The obvious security threat is not the only unfortunate consequence of the relaxed enforcement of the "need-to-know" principle. Another is the increasing use by agencies of special access programs to help protect classified information. These programs have all too often substituted for the absence of enforced "need-to-know". The initiatives to attack the overdistribution of classified information should also serve to revitalize the "need-to-know" principle. In addition, ISOO seeks two other initiatives. First, ISOO will ask that the President issue a statement to agency heads that stresses the importance of revitalizing the "need-to-know" principle. To avoid duplication, this would be part of the presidential statement proposed to address other problem areas as well. Second, ISOO will seek the amendment of E.O. 12356 to require agency heads to ensure effective internal oversight of special access programs, including periodic reconfirmation of their continued need. Special access programs may be established by some agency heads for particularly sensitive information upon a determination that normal management and safeguarding procedures do not control access sufficiently. At present, too many special access programs actually receive less security oversight than normal programs. In addition, a number of these programs are probably unnecessary. This initiative aims for both improved security and increased scrutiny of these costly programs. V. Unauthorized Disclosures Unauthorized disclosures is a subject that the executive branch has explored repeatedly in recent years. There are many ongoing and pending actions to deal with this very serious problem. To complement these actions are two additional initiatives. First, ISOO will coordinate with the Security Committee of the Intelligence Community in seeking the development of Sanitized Copy Approved for Release 2010/10/26: CIA-RDP90B01390R000100050013-0 Sanitized Copy Approved for Release 2010/10/26: CIA-RDP90B01390R000100050013-0 educational materials, both unclassified and classified, that address the damage caused by unauthorized disclosures. ISOO is particularly interested in the development of effective, unclassified materials, although it recognizes that the production of these is far more difficult without the aid of classified examples. Second, ISOO will ask that the President call upon the Attorney General to review and revise existing guidelines on the investigation of unauthorized disclosures. Revised guidelines would cover both internal agency investigations and external investigations by the Department of Justice and the FBI. Currently, investigations of unauthorized disclosures rarely lead to successful prosecutions or even administrative sanctions. Revised investigative guidelines may improve upon this record. Conclusion: The Unceasing Need for Improvement Some months ago the Director of ISOO hosted a meeting with an official of an allied democracy. That official had requested the meeting in order to learn more about the American information security system. In describing his government's slow but methodical pace toward greater freedom of information, he cited the American system of access as an ideal, even if flawed, to which all democracies should strive. That conversation illustrated, perhaps as well as any, the constant irony of the American information security system. Even as other democracies are attempting to cope with the rudiments of open government, officials of the United States Government are struggling to improve the system that protects only a very small portion of the tremendous amount of information it produces every day, so that less, not more information, will remain hidden. From ISOO's experience, just about every person entrusted with protecting that information wouldn't want it any other way. 23 Sanitized Copy Approved for Release 2010/10/26: CIA-RDP90B01390R000100050013-0 Sanitized Copy Approved for Release 2010/10/26: CIA-RDP90B01390R000100050013-0 Appendix A - DoD Sampling Systems For most of the agencies that ISOO monitors, the statistics reported each year are based on an actual count of items in each category. From the beginning of ISOO's data collection efforts, however, it was known that such an item-by- item tabulation of classification actions by the agencies with the largest programs was not possible. This was particularly true in the case of DoD, with its large number of components and the enormous volume of its classification activity. Therefore, ISOO agreed that DoD could devise a system to sample the number of its classification decisions, and then project the total for a given fiscal year. ISOO's approval for use of a sampling system, however, did not include the other categories that agencies must report annually, and DoD's data on classification authorities, declassification actions, self-inspections and infractions are based on actual counts. The original sampling system developed by DoD, and in use since ISOO began collecting program activity statistics, was based entirely on electronically transmitted message traffic. At the time, it was believed to be the only feasible means for DoD to sample its classification activity. Initially, the sample was derived exclusively from the Defense Communications Agency Switch Network Automatic Profile System. Subsequently, NSA also began sampling its message traffic because of its significant involvement in the classification process. Although ISOO approved the message traffic system, ISOO and DoD were never completely satisfied that it was producing the most accurate statistics, because it was believed that message traffic skewed certain statistics about classification, including the raw numbers. Nevertheless, ISOO recognized that the consistent application of this system successfully identified the trends in DoD's classification activity. Recently, ISOO and DoD agreed to develop a revised sampling system that would produce more reliable data. As a result, in FY 1985, DoD devised a new method. It requires all DoD components to sample classification actions over a one week period. The numbers obtained are then multiplied by 52. While the figures reported under the revised system are not based entirely on an item-by-item tabulation of original and derivative classification actions, ISOO is convinced that the results are more accurate than those registered under the previous system. First, the sample is not grounded exclusively on message traffic data. The new system includes other document types, including memoranda and reports. Second, the statistics provided are based on data supplied from a greater number of DoD components, including all of the major activities of the military departments, the DIA and NSA. For FY 1985, DoD used both systems, and reported the results separately. Although ISOO intends to use the data compiled under the new sampling system in future Reports to the President, it did not do so with this Report without first explaining the reasons why the revised method is likely to produce more reliable numbers. For this reason, the main body of the Report reflects the statistics provided by the electronic message traffic system. Use of the revised method at this time would not allow for an accurate analysis of the trends because there are no prior data available for comparative purposes. 24 Sanitized Copy Approved for Release 2010/10/26: CIA-RDP90B01390R000100050013-0 Sanitized Copy Approved for Release 2010/10/26: CIA-RDP90B01390R000100050013-0 A comparison of the data furnished by the two systems indicates that there are substantial differences. First, the volume of original classification using the new method is considerably higher. Under the previous system, DoD reported 385,496 original decisions. Under the new, the figure is 702,208. Of these, 22% of the original actions were assigned a date or event for declassificaton, as compared to a 71 % rate under the old method. By classification level, the number of "Top Secret" original decisions was 9,327 higher under the new system, while "Secret" and "Confidential" actions were 283,547 and 23,838 greater, respectively. A second difference is that the amount of derivative classification activity is markedly less under the revised sampling system. DoD reported 18,090,961 derivative decisions using the message traffic system, and 10,571,652 utilizing the new method, 42% fewer. There are also significant differences regarding the classification level percentages, except with respect to "Top Secret" actions, which represent 2% of the total under both systems. Using the revised method, "Secret" actions account for 38% of the total, while "Confidential" decisions comprise 60%. Under the old system, the figures were 21 % and 77%, respectively. DoD ORIGINAL CLASSIFICATION Exhibit A DoD DERIVATIVE CLASSIFICATION Exhibit B Actions Assigned Date or Event for Declassification Actions Requiring Review by Originator (OADR) 702,208 Old Sampling System New Sampling System Old Sampling System S Classification C Classification New Sampling System Sanitized Copy Approved for Release 2010/10/26: CIA-RDP90B01390R000100050013-0 Sanitized Copy Approved for Release 2010/10/26: CIA-RDP90B01390R000100050013-0 Due to significantly fewer derivative decisions, and despite a greater number of original actions, the combined classification reported under the new sampling system is 7,202,597 less than under the old method. Overall classification level percentages also vary considerably, indicating a tendency to classify a greater amount of information at the "Secret" level. Under the new system, 39% of the combined actions are "Secret," while 59% are "Confidential." This is in contrast to the 21%/77% ratio when the old method is utilized. DoD COMBINED CLASSIFICATION Exhibit C TS Classification S Classification C Classification New Sampling System Old Sampling System Although ISOO believes that DoD's new system will provide more accurate statistics, it also believes that the system should be refined further. Current instructions require that DoD components undertake the sampling over a single one week period. ISOO is concerned that relying exclusively on such a limited time period may result in skewed numbers. For example, during one year the week selected might be unusually slow in terms of the volume of classified information generated. Thus, the numbers reported will be too low. On the other hand, the week selected the following year might be crisis-ridden and result in unrealistically high figures. To avoid this possibility, ISOO has recommended to DoD and CIA that each agency conduct the sampling of its classification activity on more than one occasion during the year, and then report an average of the data. 26 Sanitized Copy Approved for Release 2010/10/26: CIA-RDP90B01390R000100050013-0 Sanitized Copy Approved for Release 2010/10/26: CIA-RDP90B01390R000100050013-0 Appendix B - Classified Information Nondisclosure Agreement Paragraph 1(a) of National Security Decision Directive 84, "Safeguard- ing National Security Information," of March 11, 1983, directed ISOO to issue a standardized nondisclosure agreement to be executed as a condition of access to classified information. In September 1983, ISOO issued the Standard Form 189, "Classified Information Nondisclosure Agreement," and directed agencies to work toward complete implemen- tation as quickly as possible. The chart below provides an agency by agency breakdown of progress to date. Implementation for New Full No Employees and/or Agency-wide Implementation Apparent Planning Reinvestigations Implementation In Some Full Agency Implementation Implementation Only In Progress Components Implementation Sanitized Copy Approved for Release 2010/10/26: CIA-RDP90B01390R000100050013-0 Sanitized Copy Approved for Release 2010/10/26: CIA-RDP90B01390R000100050013-0 Appendix C National Security Information: Different Perspectives An audience of 750 from Government, the media and industry heard six noted authorities address their own particular ideas about classified information. The speakers included: R. Scott Armstrong - Author and former reporter for The Washington Post. Current Executive Director, National Security Archive. Samuel Gammon - Former Ambassador and current Executive Director of the American Historical Association. Guenter Lewy - Author and Professor of Political Science at the University of Massachusetts. Mark H. Lynch - Litigator with the American Civil Liberties Union, National Security Project. Edward F. Sayle - Former Curator of the Central Intelligence Agency's Historical Collection and current editor of Periscope Magazine. Richard K. Willard - Assistant Attorney General, Civil Division, Department of Justice. The following quotes reflect some of the divergent opinions expressed by the speakers. They are intended as highlights, not comprehensive statements. Arrangements can be made with ISOO for copies of the complete transcript or videotape, or selected excerpts of either. Scott Armstrong on the source of leaks The vast majority of the information that makes its way to the newspaper... comes from multiple sources, from multiple interviews, from career bureaucrats. It comes from those people who themselves would not initiate a story or a leak but who will, when faced with a significant disclosure coming out of the room just down the hall from the Oval Office, will correct the information, will put it into context, will say, "That's really not quite right. It really happened this way." A symposium sponsored by the Information Security Oversight Office December 5 1984 Department of Interior Auditorium Guenter Lewy on rationalizing unauthorized disclosures What honestly may appear to the military as information that should be withheld for reasons of security may as honestly appear to the media as information that the American people have a right to know.... The fact that both the media and military act honestly is entirely irrelevant. The question is, "Who should have [the] final ?" say... Samuel Gammon on declassification Historians are not just working on the decline and fall of the Roman Empire or the administration of George Washington .... The woods are full of scholars who are toiling away on the Nixon and Ford administration[s] and there are plenty of them already working on Carter, and I daresay some getting started on the [Reagan] administration. So, actually, we want it yesterday, as far as declassification is concerned. Richard Willard on overclassification Overclassification can be just as much a danger to an effective information security program as can inadequate classification or inadequate protection. 28 Sanitized Copy Approved for Release 2010/10/26: CIA-RDP90B01390R000100050013-0 Sanitized Copy Approved for Release 2010/10/26: CIA-RDP90B01390R000100050013-0 Mark Lynch on secrecy and public debate [T]he Manhattan Project and the decision to drop the bomb on Hiroshima... [were] so closely held that the options of not dropping the bomb or dropping a demonstration bomb were never seriously considered. Scott Armstrong on the law I can say as a matter of practice that I don't steal and I don't accept stolen property.... The act of dubious legality [is] showing me the information. Guenter Lewy on journalistic ethics [T]here's no justification for the view that a citizen who... comes into possession of [a] secret and who knows that it is a secret, should be free to... harm the nation by passing on the secret as he pleases. Journalists too are citizens. They should have the same obligations as anyone else. Mark Lynch on the scope of Freedom of Information costs I'm willing to wager that the propaganda public relations efforts of the Department of Defense alone are far greater than the amount of money spent on Freedom of Information processing. The Singing Sergeants, the airplanes that do loop-de- loops at parades and that sort of thing, I'm sure represent a far greater expenditure of funds than FOIA requests. Edward Sayle on secrecy in American history Benjamin Franklin and Robert Morris... looked at the intelligence and they reached an agreement which they committed to paper. "We agree... that it is our indispensable duty to keep it a secret even from Congress. We find by fatal experience the Congress consists of too many members to keep secrets." And they only had 13 colonies. Richard Willard on preventing a double standard We need to make it clear that rules on information security apply throughout the administration from the very top to the very bottom. We need to make it clear that people are going to be held to a high level of trust regardless of their position in the administration. Mark Lynch on the perils of compartmentation [I]f... compartmentation is increased, you may cut down on leaks, but you're also likely to get an increase of ill-conceived operations being put into effect because enough... disinterested people within the policy making arms of the Government won't have an opportunity to render a second, third or fourth opinion. Samuel Gammon on "intelligence sources and methods" It is widely rumored, though as far as I know never confirmed, that in 1961, the CIA ran a urinalysis on Khrushchev in Vienna during the summit meeting. A brilliant piece of intelligence work. Possibly what one might call an unauthorized leak. Edward Sayle on secrecy in American history When ... Tom Paine was determined to have made an unauthorized disclosure of very sensitive diplomatic information, he was dismissed from his job as Secretary to the Foreign Affairs Committee, and stigmatized publicly by a resolution of the Congress. Now that's handling a security violation . ... Do you think we have the same will today? Scott Armstrong on the source of leaks The President doesn't have to look very far from his keester to find most of the sources of serious disclosure in this administration. Richard Willard on misguided disclosures [T]here are a lot of people in the administration who don't know the difference between an authorized and an unauthorized disclosure. There are probably a lot of political appointees who may think that they're helping out the President, and they really aren't because this President does not believe that every political appointee has the authority to declassify information whenever he thinks it will help with the bureaucratic game. Samuel Gammon on recovering disclosed information To the best of my knowledge, even the State Department medics, good as they are, are not competent to perform prefrontal lobotomies on people [who] have learned things. So once its gone, it's gone.... Edward Sayle on the effect of leaks [U]nless steps are taken to stop this escalating pattern of leaks and to move against those Government employees who are responsible, be it either appointees or careerists, I fear that [a] filtration process may eventually settle in at all levels of this Government, denying our nation's leaders the details essential... for policy level decision making .... Guenter Lewy on anti-leak legislation The harm which irresponsible press conduct can do in revealing national security information in some cases will indeed be irreparable.... I do not think it is realistic to rely exclusively on the good will of reporters and editors.... I favor legislation that will give national security information the same protection now available to next year's soybean crop estimate. 29 Sanitized Copy Approved for Release 2010/10/26: CIA-RDP90B01390R000100050013-0 Sanitized Copy Approved for Release 2010/10/26: CIA-RDP90B01390R000100050013-0 Appendix D ISOO Inspections FY 1983 - 1985 Agency for International Development Bureau for Latin America and the Caribbean, Office of Caribbean Affairs Bureau for Africa, Office of East Africa Affairs Bureau for Asia Office of Security Office of the Special Assistant to the Deputy Administrator Arms Control and Disarmament Agency Office of Administration Communications Section General Advisory Commission on Arms Control Bureau of Multilateral Affairs Bureau of Strategic Programs Strategic Affairs Division Bureau of Nuclear Weapons and Control, International Nuclear Affairs Division Board for International Broadcasting Central Intelligence Agency Directorate of Intelligence Directorate of Administration Directorate of Science and Technology Directorate of Operations Other Major Activities Defense Advanced Research Projects Agency Strategic Technology Office Tactical Technology Office Defense Science Office Directed Energy Office Information Processing Techniques Office Administrative Services Office Defense Communications Agency Headquarters Joint Data Systems Support Center, Pentagon Command and Control Systems Organization, Arlington Hall Station Defense Communications Engineering Center, Reston, VA Joint Data Systems Support Center, Reston, VA Defense Contract Audit Agency Security Branch Defense Industry American Telephone and Telegraph Technologies, Inc., Burlington, NC American Telephone and Telegraph Technologies, Inc., McLeansville, NC ITT Electro-Optical Products Division, Roanoke, VA Reynolds Metals Company, Richmond, VA Science Applications International Corporation, Huntsville, AL Research Triangle Institute, Research Triangle Park, NC CAS Incorporated, Huntsville, AL Teledyne Brown Engineering, Huntsville, AL SCI Systems, Inc., Huntsville, AL BDM International, Inc., Huntsville, AL Defense Intelligence Agency Directorate of Security and Counterintelligence Defense Intelligence College Directorate for Estimates Directorate for Scientific and Technical Intelligence Directorate for Intelligence and External Affairs Directorate for Communications Directorate for Foreign Intelligence Directorate for JCS Support Directorate for Research Directorate of Technical Services and Support 30 Sanitized Copy Approved for Release 2010/10/26: CIA-RDP90B01390R000100050013-0 Sanitized Copy Approved for Release 2010/10/26: CIA-RDP90B01390R000100050013-0 Defense Investigative Service Headquarters Capital Region, Alexandria, VA Defense Logistics Agency Headquarters Defense Technical Information Center Defense Fuel Supply Center Defense Mapping Agency Headquarters, Office of Security Office of Distribution Services Hydrographic/Topographic Center Special Security Office Defense Nuclear Agency Intelligence and Security Directorate Counterintelligence Detachment Classification Management Division Security and Operations Division Radiation Directorate Shock Physics Directorate Office of the Inspector General Office of the Deputy Director for Science and Technology Nuclear Assessment Directorate Technical Information Directorate Department of Agriculture Employee Management and Training Staff (Security) Foreign Agriculture Service Office of Management Services Trade Policy, Planning and Analysis Division Western Europe and Inter-American Division Asia, Africa and Eastern Europe Division Communications and Records Cables Division Office of Emergency Planning Department of the Air Force Assistant Chief of Staff, Intelligence Assistant Chief of Staff, Information Systems Deputy Chief of Staff, Plans and Operations Deputy Chief of Staff, Research, Development and Acquisition Deputy Chief of Staff, Programs and Resources 1947 Headquarters Support Group - Air Staff Air Force Systems Command, Andrews AFB Electronics Systems Division, Hanscom AFB Aeronautical Systems Division, Wright- Patterson AFB Foreign Technology Division, Wright- Patterson AFB Air Force Logistic Command Headquarters, Wright-Patterson AFB Space Command, Denver, CO North American Aerospace Defense Command, Denver, CO Office of Special Investigations, Bolling AFB Air Force Intelligence Service Air Force Academy Strategic Air Command, Offutt AFB 31 Sanitized Copy Approved for Release 2010/10/26: CIA-RDP90B01390R000100050013-0 Sanitized Copy Approved for Release 2010/10/26: CIA-RDP90B01390R000100050013-0 Department of the Army Assistant Chief of Staff for Intelligence Deputy Chief of Staff for Operations Military District of Washington Criminal Investigation Command Comptroller of the Army Logistical Command Military Traffic Management Command Office of The Adjutant General National Guard Bureau Intelligence and Security Command Corps of Engineers Materiel Development and Readiness Command Missile Intelligence Agency, Huntsville, AL Ballistic Missile Defense Systems Command, Huntsville, AL U.S. Army Missile Command, Huntsville, AL Communications - Electronics Command, Ft. Monmouth, NJ U.S. Army Natick Research and Development Command, Natick, MA Army Materials and Mechanics Research Center, Watertown, MA White Sands Missile Range, Las Cruces, NM Inspector General Army Electronics Research and Development Command Judge Advocate General U.S. Army Information Systems Command, Ft. Huachuca, AZ U.S. Army Intelligence Center and School, Ft. Huachuca, AZ Department of Commerce Headquarters' Office of Security National Telecommunications and Information Administration International Trade Administration Bureau of the Census National Oceanic and Atmospheric Administration Patent and Trademark Office Department of Education Office of the Secretary Office of the Under Secretary Office of Inspector General Office of Postsecondary Education Office of Vocational and Adult Education Office of Planning, Budget, and Evaluation Department of Energy Energy Information Administration Office of Classification Office of Computer Services and Telecommunications Management Office of General Counsel Office of International Security Affairs Office of Management and Administration Office of Safeguards and Security Department of Health and Human Services Office of the Assistant Secretary for Health Office of the Secretary Food and Drug Administration National Institutes of Health Department of Housing and Urban Development Immediate Office of the Secretary Assistant for International Affairs Assistant Secretary for Administration Inspector General Department of the Interior Headquarters' Office of Security U.S. Geological Survey Bureau of Mines Office of the Secretary Office of the Solicitor Office of Environmental Project Review Office of the Assistant Secretary - Water and Science Office of Information Resources Management Assistant Secretary - Land and Minerals Management 32 Sanitized Copy Approved for Release 2010/10/26: CIA-RDP90B01390R000100050013-0 Sanitized Copy Approved for Release 2010/10/26: CIA-RDP90B01390R000100050013-0 Department of Justice Federal Bureau of Investigation Immigration and Naturalization Service Drug Enforcement Administration El Paso Intelligence Center Bureau of Prisons Foreign Claims Settlement Commission Main Justice Antitrust Division Civil Division Criminal Division Justice Management Division Tax Division Office of Intelligence Policy and Review Office of Information and Privacy Department of Labor Office of Emergency Preparedness Planning (Information Security) Bureau of International Labor Affairs Bureau of Labor Management Relations and Corporate Programs Department of the Navy Office of the Chief of Naval Operations Naval War College, Newport, RI Naval Underwater Systems Center, Newport, RI Naval Underwater Systems Center, New London, CN Naval Intelligence Support Center Naval Research Laboratory Joint Cruise Missile Project Office Office of Command Control U.S. Atlantic Fleet Headquarters, Norfolk, VA Commander Naval Surface Forces, U.S. Atlantic Fleet, Norfolk, VA Headquarters Fleet Marine Force Atlantic, Norfolk, VA Commander Submarine Force, U.S. Atlantic Fleet, Norfolk, VA Commander Naval Surface Forces Pacific, San Diego, CA Space Command and Control Directorate Navy Ocean Systems Command, San Diego, CA Marine Corps Base, Camp Pendleton, CA Department of State Classification/Declassification Center Information Systems Office Information Systems Security Staff Office of Security Domestic Operations Education and Training Staff Bureau of Intelligence and Research Office of the Executive Director Office of Economic Analysis Office of Analysis for Inter-American Republics Bureau of East Asian and Pacific Affairs: Japan United States Mission to the United Nations, New York, NY Office of Administrative Affairs Reference Section Political Section Economic and Social Section Communications Section Security Resources Management Bureau of European Affairs Office of Soviet Union Affairs Bureau of Inter-American Affairs Office of Central American Affairs Office of Caribbean Affairs Bureau of Politico - Military Affairs Office of Strategic Nuclear Policy U.S. Embassy, Ottawa, Canada Office of the Deputy Chief of Mission Personnel Section Political Section Economic Section Administrative Counsellor Department of Transportation Office of the Secretary Federal Aviation Administration United States Coast Guard: Headquarters; Miami; New Orleans; El Paso Intelligence Center, El Paso, TX; National Narcotics Border Interdiction System, Miami, FL Maritime Administration Federal Highway Administration 33 Sanitized Copy Approved for Release 2010/10/26: CIA-RDP90B01390R000100050013-0 Sanitized Copy Approved for Release 2010/10/26: CIA-RDP90B01390R000100050013-0 Department of the Treasury Office of the Secretary U.S. Customs Service Internal Revenue Service U.S. Secret Service Bureau of Alcohol, Tobacco, and Firearms Bureau of Engraving and Printing Bureau of Public Debt Bureau of Government Financial Operations Comptroller of the Currency Bureau of the Mint Environmental Protection Agency Facilities and Support Services Branch Personnel Security Division Office of the Associate Administrator for International Activities Executive Office of the President, Office of Administration Export-Import Bank Federal Communications Commission Office of Science and Technology Office of Plans and Policy Mass Media Bureau Emergency Communications Division Internal Review and Security Division Federal Emergency Management Agency Emergency Operations Directorate Office of Security Document Control Branch National Preparedness Programs Directorate Federal Home Loan Bank Board Federal Maritime Commission Bureau of Investigations Office of Policy Planning and International Affairs Federal Reserve System Office of Security International Information Center General Services Administration Office of Internal Security Federal Property Resources Service Information Resources Management Service International Trade Commission Interstate Commerce Commission Office of Compliance and Consumer Assistance Staffing and Employee Relations, Personnel Office Marine Mammal Commission National Aeronautics and Space Administration Office of Aeronautics and Space Technology Office of Space Science and Applications Office of Space Flight Office of Space Tracking and Data Systems Goddard Space Flight Center John F. Kennedy Space Center, Kennedy Space Center, FL National Archives and Records Administration Administrative Services Division Records Declassification Division Lyndon B. Johnson Library, Austin, TX Nixon Presidential Materials Project National Labor Relations Board National Science Foundation National Security Agency National Security Council National Transportation Safety Board 34 Sanitized Copy Approved for Release 2010/10/26: CIA-RDP90B01390R000100050013-0 Sanitized Copy Approved for Release 2010/10/26: CIA-RDP90B01390R000100050013-0 Nuclear Regulatory Commission Office of International Programs Office of the Deputy Executive Director for Operations Standardization and Special Projects Branch Division of Security Information Security Branch Facilities Personnel Security Branch Systems Security Branch Policy and Operational Support Branch Division of Technical Information and Document Control Records Services Branch Office of Nuclear Material Safety and Safeguards Division of Rules and Records Office for Micronesian Status Negotiations Office of Management and Budget Office of Personnel Management Personnel Security Division Compliance and Investigations Group Office of Science and Technology Policy Office of the Secretary of Defense Executive Secretariat Under Secretary of Defense for Policy Assistant Secretary of Defense for International Security Policy Assistant Secretary of Defense for International Security Affairs Net Assessment Defense Guidance Staff Emergency Planning Assistant Secretary of Defense for Health Affairs Assistant Secretary of Defense for Legislative Affairs General Counsel Under Secretary of Defense for Research and Engineering Assistant Secretary of Defense, Comptroller Assistant Secretary of Defense, Manpower, Installations and Logistics Assistant Secretary of Defense for Reserve Affairs Assistant Secretary of Defense for Public Affairs Inspector General Defense Security Assistance Agency Assistant to the Secretary of Defense for Atomic Energy Washington Headquarters Services Assistant to the Secretary of Defense (Intelligence Oversight) Program Analysis and Evaluation 35 Sanitized Copy Approved for Release 2010/10/26: CIA-RDP90B01390R000100050013-0 Sanitized Copy Approved for Release 2010/10/26: CIA-RDP90B01390R000100050013-0 Office of the United States Trade Representative Organization of the Joint Chiefs of Staff Office of the Secretary Office of the Director, Joint Staff Office of the Chairman Manpower and Personnel Directorate Operations Directorate Logistics Directorate Plans and Policy Directorate Support Services Directorate Joint Analysis Directorate Command, Control and Communications Systems Directorate Joint Planning Staff for Space Strategic Plans and Resource Analysis Agency Joint Special Operations Agency United States Readiness Command, Tampa, FL United States Central Command, Tampa, FL Overseas Private Investment Corporation Peace Corps President's Foreign Intelligence Advisory Board President's Intelligence Oversight Board Securities and Exchange Commission Selective Service System Small Business Administration Physical and Personnel Security Branch United States Information Agency Office of Security Physical Security Division Office of American Republics Affairs Office of North African, Near Eastern, and South Asian Affairs Office of Public Liaison Office of Administration and Technology Classified Library Bureau of Management Secretariat Staff Afghan Media Staff Office of International Visitors Office of East Asian and Pacific Affairs Communications Center United States Postal Service Office of the Chief Postal Inspector Inspection Service Veterans Administration Assistant Inspector General for Policy, Planning and Resources Department of Medicine and Surgery Office of Data Management 36 Sanitized Copy Approved for Release 2010/10/26: CIA-RDP90B01390R000100050013-0 Sanitized Copy Approved for Release 2010/10/26: CIA-RDP90B01390R000100050013-0 Information Security Oversight Office Washington, D.C. 20405 Sanitized Copy Approved for Release 2010/10/26: CIA-RDP90B01390R000100050013-0