LEAKOLOGY: THE WAR OF WORDS

Document Type: 
Collection: 
Document Number (FOIA) /ESDN (CREST): 
CIA-RDP91-00561R000100080079-7
Release Decision: 
RIPPUB
Original Classification: 
K
Document Page Count: 
7
Document Creation Date: 
December 22, 2016
Document Release Date: 
February 23, 2012
Sequence Number: 
79
Case Number: 
Publication Date: 
July 1, 1977
Content Type: 
OPEN SOURCE
File: 
AttachmentSize
PDF icon CIA-RDP91-00561R000100080079-7.pdf1.07 MB
Body: 
Declassified in Part ~AKfl f~ ~ frt. r 0~ or y Lieutenant ~ m i finder r? SttNa ?STAT Having ac it in testimony to c n r e" ~` a d B acknowledged his e/ artar2 ' ," ounta ili y o Abe Nearly, tb s vete -as . y ,min istrator as trying Jo Unfit siauen b mouths inevitably egsn to July 1977 Declassified in Part - Sanitized Copy Approved for Release 2012/02/23: CIA-RDP91-00561 R000100080079-7 Sanitized Copy Approved for Release 2012/02/23: CIA-RDP91-00561 R000100080079-7 Declassified in Part - Sanitized Copy Approved for Release 2012/02/23: CIA-RDP91-00561 R000100080079-7 II "Of course it is unfortunate and I regret that information and some misinformation regarding our preliminary thinking came out in the public press before we had a chance to consult informally with the Congress. I guess after eight years away, I still have to relearn how to view with some equanimity the inevitability of such leaks to the press. ? Harold Brown, Secretary of Defense Testimony before Senate Armed Services Committee, 25 January 1977 Loose lips can do more than sink ships; they can also sink or wound government policy and strategic planning. Leaks concerning national security are more serious than in any other area of government since the survival of our own society and safety of the members of the armed forces may well be at stake. Leaks of classified or sensitive information can have short-term effects (tactical leaks) which could, for example, result in a Soviet intelligence trawler leav- ing her normal area and appearing in an area where highly classified operations were going on. Or there can be longer-term (strategic) leaks where a leaked piece of information or several little bits of informa- tion can be used together to verify a new weapon system's capability. Because of the serious consequences that can result from such leaks, the military professional-whether he is a private in South Korea, a sailor in the Sixth Fleet, or an admiral in Washington-must under- stand how and why leaks occur and how-to, in Secre- tary Brown's words, ". . . view with some equanim- ity the inevitability of such leaks." Leaks are not limited to any particular part of the government or military establishment. At sea or in the field, commanders and commanding officers are faced with leaks of information which reflect on their commands' readiness. The leak may concern a mate- rial problem, a manning shortfall, or a training defi- ciency. The seat of government in Washington has been called by some people the "leak capital" of the nation. The 3 May 1976 Time magazine declared, "Nowhere do secrets have a higher mortality rate than in Washington, D.C. The capital swarms with leaking bureaucrats and a prying press corps. Incura- ble gossips are wall to wall." Much of this juicy gos- sip, whether true or false, appears to have been born in the form of a leak. Late last year, the top secret annual National In- telligence Estimate (NIE) leaked. Former Director of Central Intelligence George Bush faced a national television audience and commented on the NIE leak saying, "I'm a little disillusioned because I never thought that we could be in this kind of phantom duel where you're battling with unnamed sources. . . . I just thought that we were more dis- ciplined within the intelligence community."' Since many of the most sensitive public affairs problems facing commanders and their public affairs officers involve "leaks," a closer examination of "leakology" is in order. First, some general observa- tions: Leaks in the context of this discussion are defined as both classified and unclassified. They include politically sensitive government information that is provided in an unauthorized manner to persons who do not have a current government authorization to have access and a "need to know." ~ It takes at least two people to spring a leak, an inside source and an outside receiver. ~ It takes a transmitter (usually a news outlet) to spread or publicize the leaked information. - Leaks of classified or sensitive government infor- mation appear to be widespread throughout the gov- ernment. Leaks usually feed controversy and, therefore, ben- efit the vested interests of the source and sometimes the economic and prestige interests of the news transmitter. Leaks generally "spring" around key and contro- versial events or actions and are timed in relation to key decision milestones in a manner which may in- fluence the making of such decisions or policies. Once a leak is put into the public domain, by such means as the news media, its future course cannot be controlled by anyone, including the source, receiver, or transmitter of the leak. In other words, the final effect of the leak on decision-makers may have the opposite reaction to that anticipated by the source. Leaks from inside a bureaucracy may reflect an internal difference of opinion or power struggle in which a source has a perceived interest in airing pub- licly. Leaks may have a "multiplier' effect, with one leak stimulating another countermeasure leak cham- pioning the opposite position. ~ Leaks, by their nature and the nature of humans and mass media transmitters, highlight the more dramatic aspects of an issue and seldom attempt to present a balanced or detailed view of complex is- 1For footnotes, please turn to page 49. I Declassified in Part - Sanitized Copy Approved for Release 2012/02/23: CIA-RDP91-00561 R000100080079-7 Declassified in Part - Sanitized Copy Approved for Release 2012/02/23: CIA-RDP91-00561 R000100080079-7 Fem.'n&J sties. In short, leaks oversimplify issues. ' Finally, leaks are almost impossible to track down, and an investigation of leaks, while it may be neces- sary, can itself be counterproductive, adding more fuel to the public affairs problems of commanders or other military officials. Before going into some of the dynamics of leakol- ogy, it is important to pause and reflect on why mil- itary officials in the United States are put on the defensive more often by leaks than are their counter- parts in any other country. One thing is certain in the public affairs "rules of the road," and that is that the American commander or public affairs officer is always the "burdened vessel" in a crossing situation with leaked information, because of the nature of the public affairs system in this country. American Public Affairs System: The acceptance and defense of our constitutional form of government in- volves a public affairs. "triad" which has functioned for the past 200 years with the following major players: government, news media, and public. Of course, this player definition is simplified since each part of the triad can have different faces. For exam- ple, the government could represent the military of- ficial in the executive branch or a Congressman, with quite different defense views, in the legislative branch. Also, the public could represent various spe- cial interest groups (pro- or anti-military), and the news media could mean electronic or print media with quite different physical reporting problems, not to mention various editorial or reporter viewpoints. Within this triad there is a constant tug-of-war in making information public. Public's Right To Know: In the wake of the Viet- nam conflict and the Watergate affair, we have seen both the government and the news media suffer from the so-called credibility gap. The past public frustra- tion with the perceived lack of candor (or worse) on the part of the executive branch has led to a new dimension in the relationship of the players and has resulted in a number of "sunshine" laws. These laws have the objective of opening up more government proceedings and records to public scrutiny. In a 17 November 1975 The Washington Star article entitled, "Too much 'Sunshine' can cause government chaos," Charles Bartlett stated that openness in government has become a de facto yardstick of integrity. The 1974 Privacy Act, the Freedom of Information Act (as amended in 1974), and the Government in the Sunshine Act of 1976 are examples. From a military point of view, these sunshine laws add to the already often confusing demands of free- dom of information on the one hand, and both the need for personal privacy and the protection of prop- erly classified national security information on the other hand. Columnist Jack Anderson, well known for his use of leaked material, broke the story of the recovery of part of a Soviet "Golf'-class submarine by the Hughes Glomar Explorer in March 1975, even though he was asked to withhold the story as other news organiza- tions had done in the interests of national security. Anderson claimed that national security was not at stake and that ". . . news belongs to the people and not to the government." Secretary of Defense Brown, while expressing frus- tration over leaks in the press, at the same time has adopted an active stance in taking defense issues to the public in order to foster public understanding and support. The day after the appearance before Congress during which he cited the problem of leaks, he held his first meeting with the Pentagon press corps and stated that he recognized, ". . . the value and indeed the vital importance to the proper functioning of the Defense Department in a way re- sponsible to the public [and] sufficiently cognizant of its accountability to the public." It is clear that the American public has a right to government and military information (with reason- able national security and personal privacy restric- tions considered). Indeed, public support demands information access in order to understand security is- sues. But this does not excuse the unauthorized re- lease of classified information. In the heat of the de- bate over the 1976 reorganization of the nation's in- telligence community, former President Gerald Ford stated: "Openness is a hallmark of our democratic soci- ety, but the American people have never believed that it was necessary to reveal the secret war plans of the Department of Defense, and I do not think Declassified in Part - Sanitized Copy Approved for Release 2012/02/23: CIA-RDP91-00561 R000100080079-7 i Declassified in Part - Sanitized Copy Approved for Release 2012/02/23: CIA-RDP91-00561 R000100080079-7 they wish to have true intelligence secrets revealed either."2 Whether one takes a positive view of the need for public information or treats it as a necessary evil, we still come face to face with the challenge of com- municating with the public whose support we need. Without the "artillery of the press," including radio and television, there would be little opportunity to reach the public with our information. It is during the public affairs squalls, brought on by leaks, that military officials must be the most careful in at- tempting to heal the sores of misinformation. Under- standing the players in leakology is helpful in this regard. The Players: The first is the unnamed source. Stories often quote "informed defense officials" or other inside sources. Their anonymity greatly com- plicates the military official's task in answering alle- gations. The word "complicate" is used here because the unnamed source can either help or hinder the named official who is held accountable for his actions and must reply "on the record." If the story appears to further the government's point of view, journalists may refer to the information as a "plant" rather than a "leak." One can readily imagine a situation wherein there might be confusion over whether a "leak" is a "plant"; the beauty is in the eye of the beholder. Harrison Salisbury of The New York Times, appearing on the 27 April 1976 CBS morning news, commented, ". . . on the question of leaks and dis- closures, a double entry bookkeeping system is used by the CIA. The favorable leaks are okay. It is the embarrassing ones they want to suppress." Growing out of the stormy history of the press- government relationship has come the technique of interviewing & government official source under the cover of mutually agreed ground rules;- wherein the exact name or position of the official is not used. These are the so-called background (not for direct attribution), deep background, or off-the-record in- terviews.3 The original reason for the growth of these agreed press-government official interview tech- niques was to allow the official to put stories into a more balanced context and in some cases to answer speculative types of questions ("What if?") which he could not answer on the record. The problem with using these informal techniques is that many news persons refuse to adhere to them because they con- sider them to be platforms for "plants" and don't wish to risk the possibility of professional embar- rassment for either party to the interview. In the light of the perceived dangers from either side of such an interview, most military officials or com- manders stick to the on-the-record interview. Many reporters openly brag about their ability to routinely piece together major stories from several unnamed sources. These sources may be from differ- ent branches of government, from different executive departments, or from former officials who have re- cently left government service. A story with leaks may result from a composite of sources. In this multi-source method, journalists theoretically sort the wheat from the chaff, and seemingly insignifi- cant bits of information are blended together to pro- duce a "blockbuster" story. One of the problems here is that the source's motives are not usually men- tioned in the news story. Instead, the source is treated in a neutral manner. A 19 April 1976 The Wall Street Journal article by Edward Jay Epstein en- titled "The Grand Cover-Up" was stimulated by the film "All the President's Men" and concerned the use of multiple sources and the manner in which the film painted sources as neutral. According to Epstein, the movie was an example of a naive view of accidental leaks by sources who were unaware of the potential of the bits of information they disclose. Epstein stated: "This accidental view of news is convenient, and indeed functional, to journalists who want to conceal the identity of sources and protect their relations with them. "The alternative view that information is delib- erately leaked to journalists by sources with an interest at stake in the story would raise serious problems for journalists: It would suggest that the 'leaks' are in fact plants, and that they are merely ammunition-carriers for the surreptitious authors of the story who are engaged in a power struggle.. "Even for the best of reasons, if journalists rep- resent news as being accidental when in fact it is deliberate, then they may willy-nilly assist in camouflaging the interest behind the disclosure, and thereby be part on a grander scale of the cover-up of an intra-government power struggle." The receiver is another player in the game of leakology. In most cases wherein' a government offi- cial is involved, the receiver of a leak is a news per- son. Just as in the case of a good intelligence agent, the receiver (reporter) protects his sources. Also, as in the case of an intelligence agent, the reporter keeps his source confidential as an insurance policy to keep channels open for future exchanges of informa- tion. Some reporters will cite sources remote from the actual sources in order to protect them. For example, the reporter may cite a "Navy official" when his actual source is in the State Department or vice versa. A reporter may even "invent" a source. In Declassified in Part - Sanitized Copy Approved for Release 2012/02/23: CIA-RDP91-00561 R000100080079-7 commenting on Bob Woodward and Carl Bernstein's The Final Days in The New York Tinier Book Review of 18 April 1976, Richard Reeves touched on the in- vented source technique as a means of protecting real sources. Siding with those people who believed that "Deep Throat"-the famous source with alleged White House connections-was a fabrication, Reeves stated, ". . . I have never been convinced that Deep Throat existed. The whole thing was too much like an old newspaper tactic that I have used myself inventing a secret source that would talk only to me, thereby keeping other reporters off a good story and editors off balance." One of the obvi- ous messages from such a discussion is that an official might attempt to track down an alleged source, thinking it was in his area, and spin the investigat- ing wheels searching for someone who either did not exist in the first place or was in another4mrt of gov- ernment. How do reporters develop their sources? Aside from the source who contacts the reporter on his own to champion a specific cause, right a perceived griev- ance, or get a "news tip" reward, reporters develop their sources in various ways. While the public af- fairs office is certainly an official source, it is not usually involved in the context of this covert'source discussion. As an example of how a source is devel- oped, one reporter explained his technique as fol- lows: First, he would avoid the command's public affairs office and go directly to the office that had people who had probable access to the type of infor- mnation he desired. Second, he would "shotgun" telephone calls to that targeted office and would at- tempt to talk with as many people as he could (hav- ing a government directory of the office personnel was a great help). Third, he would, through his con- tact with the command's public affairs office, at- tempt to find out if his calls were reported to the public affairs office and if so by whom. Finally, after he learned who had reported their conversations to the public affairs office, he dropped them from his list. He then went after the persons he had talked to, but who -had not reported that contact, until he es- tablished a "source." This is only one example of an investigative reporter's technique. The third player in the triad is the transmitter. Those who read the book All The President's Men and the millions more who saw the movie with Dustin Hoffman as Carl Bernstein and Robert Redford as Bob Woodward, were introduced to that consummate leaker "Deep Throat" and can decide for themselves whether most leaks are deliberate or, as the film seemed to suggest, accidental. Most leaks reach the public through the news media. It is difficult for a commander or other military offi- cial to forget the adversary relationship between the military and the news media which seemed to reach a boiling point during the Vietnam War. In fact, one should not erase this memory but use it instead as a constructive -reminder that the military-media rela- tionship has long been a stormy one. News media artillery rounds will' continue to fall short of the truth, in the view of military officials, and those same officials, from the news person's view, will con- tinue to be overly secretive and prone to double-talk. Phil Tracy, writing in the 4 May 1976 issue of The Washington Post on "Why Nothing Works in Wash- ington," aired the all-too-familiar stereotyped news media view of the military: "It is a closed system, the Pentagon, not unlike those ecosystems of which the conservationists are so fond. There is really no way to penetrate it. It has a language all its own, composed of technolog- ical terminology, awkward abbreviations, and out- right evasion, designed not to communicate in- formation indiscriminately, but to limit it to the military brotherhood." In the face of this natural military-media tug-of- war, 'it follows that both sides have to do their homework. The military, when talking to the public through the news media, must limit the jargon and thus allow clear communications to flow. But there is also an obligation on the part of editors to train reporters to understand specialized reporting areas, including the military "beat." Problems usually occur when a reporter with little knowledge of the military services is assigned to write or rewrite a mil- itary story. In all fairness, the government official who is caught in the leak or negative story "crossfire" should understand that the military pro- fession is not the only profession facing a daily chal- lenge of how to deal with news media relations. Donald S. MacNaughron, board chairman of the Prudential Insurance Company, recently pointed to the news media's alleged sins of suspicion, over- simplification, and lack of understanding. Putting blame for the confusing and strained relationship on both sides, he said that well-motivated business Declassified in Part - Sanitized Copy Approved for Release 2012/02/23: CIA-RDP91-00561 R000100080079-7 I Declassified in Part - Sanitized Copy Approved for Release 2012/02/23: CIA-RDP91-00561 R000100080079-7 48 U. S. Naval Institute Proceedings, July 1977 people and news people ". . . meet in apparent har- mony, discuss at cross purposes, and come up with nterchange. two different understandings of the interchange." Leak Damage Control: Investigating leaks in order to plug them up is usually a fruitless task, according to W. Donald Stewart, who headed the Defense De- partment investigations of unauthorized disclosures from 1965 until 1972. A description of Stewart's views was published in a 25 February 1976 story in The New York Times and included the following ob- servations: ~ Of the 222 substantive complaints of unauthorized disclosures processed by his office from 1965-1972, about two-thirds were actually investigated by the individual military services. Sanctions were imposed in only a handful of cases. In several other cases, government employees were dismissed or transferred from sensitive positions. But, when his office urged prosecution and the case was in the hands of the FBI, the Department of De- fense declined to declassify the information involved so that it could be used as evidence in court. There have been more recent indications that the balance between compromise of classified national se- curity information and the decision to prosecute has resulted in a decision not to take a case to court.5 The story which outlined Stewart's views also stated, "At other times, several sources said, the ac- tual source of a news leak was such a high official that investigations and prosecutions were halted to avoid political embarrassment." While these views are of interest to the official who has the authority to initiate an investigation of leaks, they should not deter him from his duty to take whatever law- ful steps are necessary to protect classified informa- tion. Myth of the controlled leak: Call it what you will, a "trial balloon," a "plant," or a "leak," it is a myth that one can control or manage the final result and thus use it as a tactic in public information. Leaks cannot be orchestrated once they are in the public domain. A leak can stimulate, prolong, or confuse a public debate, but it can do little to ensure public understanding and, therefore, should be avoided. Leak defensive options: As has been pointed out, a leak usually involves controversial information and, in the case of the Defense Department, issues may involve classified or sensitive information that may be damaging to the national security. The problem often is how to reply to a leak on the public record without further damaging national security or fan- ning the flames of controversy. Also, by definition one is put on the defensive in answering leaks. Gov- ernment officials and their public affairs officers usu- ally resort to one or a combination of the following six defensive options: ll~ Refusal to confirm or deny-"No comment" in reply to allegations. This may be the only option when classified matters are involved. Some view this op- tion as a neutral one. However, from the public's view, the net effect of such an option may be for the person on the street to say, "There must be some truth to it, or they would give an answer." ~ Demand a retraction or write a letter to the editor. Complaining to the editor or publisher can be a mixed blessing even if you get your viewpoint aired. A news medium will rarely run a retraction, and if it does, the placement in the newspaper or newscast will never be in the same context as the original story. The audience and impact will differ and may prolong the debate with other people stimulated to comment on your comment. Issue a statement or press release. Usually this option is reactive and fighting to catch up after the damage is done. Also, unless requested by the media- it will get less than full coverage and may prolong the pub- lic confusion and debate. ` ll~ Call a news conference. This involves the same prob- lems as in the previous option. However, if an alle- gation must be answered, this may be the best on- the-record manner of answering the allegation face to face with reporters. ll~ Hold a "backgrounder." Many news reporters will refuse to attend such a session where the interview is not for direct attribution. What they need to keep the story boiling is on-the-record comments, not more unnamed sources. k Prepare an answer to query. This is a passive tech- nique which is useless if the right question is not asked. A derivative of this technique is the "side- by-side" answer to query wherein each allegation is commented upon with the official viewpoint, back- ground material, and approved statement to be given out to the press, if asked. In the 18 February 1976 edition of The Wall Street journal, Irving Kristol outlined some of the above options in a discussion of how. to reach the public with an economic message from business leaders, in the face of a press with an anti-business bias. Dis- counting the value of the above options, Kristol ob- served that the "Best Defense" option is an offensive one attacking the credibility of any biased story. He explained: "They [journalists] may not give a damn what the business community thinks of them, but they care very much what kind of professional reputa- tion they have among their peers. When they Declassified in Part - Sanitized Copy Approved for Release 2012/02/23: CIA-RDP91-00561 R000100080079-7 bl- Declassified in Part - Sanitized Copy Approved for Release 2012/02/23: CIA-RDP91-00561 R000100080079-7 commit a flagrant error, they are at least mildly disturbed; when they are publicly exposed as hav- ing committed such an error, they are embar- rassed; and when such public exposure occurs re- peatedly, they feel humiliated. So, incredible as it may seem, journalists are vulnerable to the truth. The question is: Who is,going to be telling this truth if the journalists themselves do not?" In short, to set. the record straight, Kristol rec- . ornmended to businessmen a strong public rebuttal of any misinformation or slanted reporting. He suggests that when publicly shown in error, reporters are' likely be much more careful the next time they deal with a comparable issue and that this is gain enough (and, in his words, all that can be expected) on the news media battlefront. Offensive Public Affairs Strategy: It is always more comfortable to be on the offensive, charting a posi- tive course of action. Damage control and defensive options are necessary, but what is recommended is a more open public affairs approach. Before a leak sends the commander to "general quarters," it is good preventive maintenance to establish working re- lationships with the news media. If such a relation- ship is routine, it may well serve as a dialogue to prevent misinformation springing from leaks. A re- porter who personally knows the commander is more likely to call informally after he gets his news tip in order to get the official's reaction. This dialogue is useful to the official as both an "early warning" of a possible had story and the chance to get some bal- ance into the story before it is printed or aired. 'The very fact that an official must react to a story that is already in the public domain limits his public affairs options. Stephen Rosenfeld, writing in the 14 January 1977 issue of The Washington Post stated: "The best way to balk 'damaging' leaks of special-interest material, however, is to make a broad range of material available routinely in a context devised not by the special interest but by the government itself. Call it preemptive leaking, or public information."' In the final analysis, there are security limits to what information we can release in the Defense De- partment, but it is public opinion that dictates the strategic military options open to policymakers in the American democracy. It is unrealistic to ignore that fact. It is to the benefit of the government, news media, and the public to have factual and bal- anced public information. Who will tell our story if we don't? A 1963 NROTC graduate of Northwestern University, Lieutenant Commander Baker initially served in the USS Okinawa (LPH-3) prior to his designation by the Secretary of the Navy as a special duty (public affairs) officer in 1965. He holds a master's degree in jour- nalism from the University of Wisconsin. His duty as- signments have included: press officer, CinCLant/ CinCLantFlt staff; deputy special assistant (public affairs) to the CNO; public affairs officer on the staffs of Commander Task Force 77, Com- mander First Fleet, and Commander Third Fleet. He is now serving as special assistant (public affairs) to Director Joint Staff of the Joint Chiefs of Staff. t Warren Brown, "Bush 'Appalled' By Leak of New CIA Estimate," The Washington Post, 3 January 1977, p. A2. 2 "Text of Ford Plan on Intelligence Units and Excerpts From His Executive Order," The New York Times, 19 February 1976, p. 30. a Meg Greenfield summarized the ground rules as follows: "We have 'on the record,' which permits source and story ('Chicken Little announced yesterday that 'the sky is falling.'). At the other end we have 'off the record,' in which both source and story are ruled out of print (we can 'know' but not 'use.'). In between there is 'background' or 'not for at- tribution, in which source is camouflaged but the story remains ('A usually well-informed official has told the Gazette the sky is falling'). A variation on this is 'deep background' or 'Lindley Rule,' in which the source disappears altogether, leaving only his valuable nugget of news ('The sky is falling, it can be revealed.')." See Meg Greenfield, "Telling It (Sort of) Like It Is," Newsweek, 22 July 1974, p. 50. Charles B. Seib, "Business and the Media," The Washington Post, 26 March 1976, p. A27. See also Anthony Marro, "National Security Questions Termed Issue in Inquiry Into 1973 Testimony by Helms," The New York Times, 15 Feb- ruary 1977, p. C15. Passing Remark In the spring of 1902, Admiral George Dewey was strolling in Washington when an effusive stranger rushed tip to him and, grasping his hand, said, "Georgie, I'll bet you don't know me." The admiral answered grimly, "You win," and continued his stroll. Captain Edgar K. Thompson, USN (Retired) (The Naval Institute will pay $25.00 for each anecdote published in the Proceedings.) Declassified in Part - Sanitized Copy Approved for Release 2012/02/23: CIA-RDP91-00561 R000100080079-7