INITIATIVES TO COMBAT UNAUTHORIZED DISCLOSURES OF CLASSIFIED INTELLIGENCE INFORMATION

Document Type: 
Collection: 
Document Number (FOIA) /ESDN (CREST): 
CIA-RDP94B00280R001200010020-3
Release Decision: 
RIPPUB
Original Classification: 
S
Document Page Count: 
38
Document Creation Date: 
December 22, 2016
Document Release Date: 
March 23, 2009
Sequence Number: 
20
Case Number: 
Publication Date: 
April 6, 1984
Content Type: 
MEMO
File: 
AttachmentSize
PDF icon CIA-RDP94B00280R001200010020-3.pdf2.1 MB
Body: 
Approved For Release 2009/03/23: CIA-RDP94B0028OR001200010020-3 DCI/ICS 84-3007 6 April 1984 MEMORANDUM FOR: Director of Central Intelligence FROM: Eloise R. Page Deputy Director, Intelligence Community Staff SUBJECT: Initiatives to Combat Unauthorized Disclosures of Classified Intelligence Information 1. On 30 March 1984 I convened a meeting in response to your charge to develop administrative, security and legal initiatives which could be taken to help deal with the problem of unauthorized disclosures. At this meeting, which was attended by the Executive Director, the General Counsel, the Director of Security, the Deputy Director of Legislative Liaison, the Chairman of the Security Committee and senior General Counsel representatives, including the Chairman of SECOM's Unauthorized Disclosures Investigations Subcommittee, the papers at Tab A were presented. After some discussion, it was decided that the following proposals should be submitted for your consideration. Nothing is more necessary at this point than to break the cycle of futility by finding an appropriate leak case, having it thoroughly investigated and having the leaker identified and appropriately disciplined. A. Presidential Statement -- Congressional and media focus on certain aspects'of NSDD-84 diverted attention away from the problem of intelligence leaks and, if anything, the problem has gotten worse. More recently there has been some Congressional recognition of the seriousness of such leaks and we again need to signal Executive Branch concern. DOWNGRADE TO UNCLASSIFIED WHEN SEPARATED FROM TAB A Approved For Release 2009/03/23: CIA-RDP94B0028OR001200010020-3 Approved For Release 2009/03/23: CIA-RDP94B00280R001200010020-3 ? MEMORANDUM FOR: Director of Central Intelligence FROM: Eloise R. Page Deputy,Director, Intelligence Community Staff SUBJECT: Initiatives to Combat Unauthorized Disclosures of Classified Intelligence Information 1. On 30 March 1984.I convened a meeting in response to your charge to develop administrative, security and legal initiatives which could be taken to.help deal with the problem of unauthorized disclosures. At this meeting, which was attended by the Executive Director, the General Counsel, the. Director of Security, the Deputy Director of Legislative Liaison, the Chairman of the Security Committee and 'senior General Counsel representatives, including the Chairman of SECOM's Unauthorized Disclosures Investigations Subcommittee, the papers at Tab A were presented. After some discussion, it-was-decided that the following proposals should be, submitted for your consideration. I. INVESTIGATION Nothi-ng is more necessary at this.point than to.brea.k the cycle of futility by finding an appropriate leak case, having it thoroughly investigated and'having theleaker identified and appropriately disciplined. A. Presidential Statement -- Congressional and media focus on certain aspects of NSDD-84 diverted attention away from the problem of intelligence leaks and, if anything, the problem has gotten worse. More recently there has been some Congressional recognition of the seriousness of such leaks and we again need to signal Executive Branch concern. 25X1 DOWNGRADE.TO UNCLASSIFIED WHEN SEPARATED FROM TAB A Approved For Release 2009/03/23: CIA-RDP94B00280R001200010020-3 Approved For Release 2009/03/23: CIA-RDP94B0028OR001200010020-3 w *We recommend a forceful Presidential statement to his Cabinet and senior White House officials, decrying the harmful effects of leaks upon the national security, holding them .personally responsible for security in their respective organizations, and directing the Attorney General to vigorously investigate intelligence leaks even if administrative sanctions, rather than criminal prosecution will be the end result. Expressions of Congressional support from the intelligence oversight committees would help immeasurably. B. Use of a Special Prosecutor -- Current investigative timidity may derive from the recognition that there are political costs in pursuing an aggressive investigation of media leaks. *We recommend Attorney General appointment of a special prosecutor (independent counsel) to pursue sensitive leak investigations. The special prosecutor should have all necessary .powers, including the ability to bring witnesses before a grand jury. -- Use of a special prosecutor in appropriate cases will help assure the.public, and particularly the media, that the investi- gation will be impartial and objective and neither politically motivated nor politically constrained. C. Creation of a Separate FBI Leak Investigation Unit Although we report a significant number of leaks to Justice each year, very few are .investigated.because Justice is not. sanguine about solving such cases and prefers to use FBI resources on other types of cases. *We recommend creation of a special unit within the FBI to do nothing but investigate intelligence leaks.. The Intelligence Community should support a line-item appropriation to finance this unit. . Bureau assistance is necessary because certain key government components have no investigative staffs and in other departments. and `'S.`E.C R-E"`T ' Approved For Release 2009/03/23: CIA-RDP94B0028OR001200010020-3 Approved For Release 2009/03/23: CIA-RDP94B00280R001200010020-3 a w agencies responsibility and authority are. solely internal,. with one agency unable to investigate what happened to its information when disseminated to a second agency. -- Intelligence Community security organizations and the DCI Security Committee must provide appropriate assistance and work closely with this FBI unit. II. REGULATION OF.GOVERNMENTAL CONTACT WITH THE MEDIA *We recommend: a) Centralizing within each agency the regulation of all press contacts so a single official is aware .of all authorized contacts; b) Elimination of press building passes giving unsupervised or .unrestricted access to government buildings; c) Requiring employees to record all press contacts relating to their official positions and duties; and d) Establishment ofguidelines ,for backgrounders and indoctrination of employees on press tactics and proper responses. III SECURITY EDUCATION The public generally regards intelligence leaks as .interesting, even titilating and perhaps useful in exposing governmental excess but basically harmless. Leakers are seen as vaguely heroic figures akin to whistleblowers, and leaks are viewed as a kind of game in which the government tries to :S tE. C; R'E Approved For Release 2009/03/23: CIA-RDP94B00280R001200010020-3 -- Contact between government officials and the press very often is salutary, contributing to public knowledge and informing public debate. .Government officials, however, have no license to jeopardize intelligence sources and methods or mishandle classified information. Nevertheless, newsmen regularly brag that they have daily .access to some of our most sensitive intelligence .;publications. S R C R E T Approved For Release 2009/03/23: CIA-RDP94B00280R001200010020-3 1 hide information while the media trys to find the secrets. Until the public understands that compromises of intelligence, sources and methods erode our ability to obtain vital intelligence and hurt the national security more than they contribute to public debate, public support for needed security measures will be lukewariq at best. A. Presidential Commission *We recommend creation of a Presidential Commission to review intelligence leaks, to examine steps which can be taken to protect intelligence sources and.methods from unauthorized disclosure, to review existing investigative and legal constraints and to make recommendations to improve the situation. -- Intelligence leaks have been a problem in both Democratic and Republican administra- tions. A nonpartisan blue ribbon panel could help to generate greater public understanding of the problem and support for appropriate remedial steps. Defense Departments, the National Security reach policy level officials in the State and Security Briefings *We recommend a redoubling of efforts to Council, and on the staff of the intelligence recitation of rules. Instead, the. briefing must focus on the specific audience, citing the actual official being briefed listens passively to a oversight committees. These security briefings should not be in a lecture format in which the damage caused by leaks and explaining how, with a ,modicum of care, intelligence sources and methods could have been protected with minimum impact on the underlying news story or policy issue. There on how intelligence material must be safeguarded in dealing with the press. awareness of the fragility of intelligence Outreach Program *We recommend an effort to increase public . sources and methods and the national security implications of intelligence leaks. Senior intelligence officials and public affairs officers should take the time to develop this issue .in speeches, articles and other programs which,_.riii,ll r.e:ach mpor;ta,ntseg.m;ent of the public. Approved For Release 2009/03/23: CIA-RDP94B00280R001200010020-3 Approved For Release 2009/03/23: CIA-RDP94B00280R001200010020-3 IV. LEGISLATION Arguably, unauthorized disclosures of classified information are in violation of the espionage laws but Justice has never successfully prosecuted a leaker under these statutes. In part, this may be because it is necessary to prove that the individual transmitting the national defense information did so with reason to believe it would be used to the injury of the United States or to the advantage of a foreign nation and in part, because of a reluctance.to treat leakers as spies. A. Criminalizing Leaks *We recommend new legislation (Tab B) criminalizing the willful unauthorized disclosure of classified information by government employees or other persons with authorized access to classified information. - Such legislation would be free of the intent requirements in the current espionage laws and would make willful unauthorized disclosure of classified information illegal per se. -- It is unlikely that this could be passed in this session of Congress and we might consider deferral of this legislation until next year. Injunctive Relief -- At the appropriate time after passage of legislation criminalizing the unauthorized disclosure of classified information, we might consider seeking legislation (Tab C) providing for injunctive relief in leak cases similar to that available under the Atomic Energy Act. 2. To the extent appropriate, implementation of these committees. In this manner, we can capitalize on the growing Congressional concern about damage to intelligence from leaks and,can avoid triggering a partisan political response to actions which seek to deal with a very serious and very .urgent problem facing the Community. recommendations should be discussed with our oversight Eloise .R. ,Page Attachments: : As .::stated.. S., E C :R:`E: T Approved For Release 2009/03/23: CIA-RDP94B00280R001200010020-3 Approved For Release 2009/03/23: CIA-RDP94B0028OR001200010020-3 t t ~}~~i:F Elul,"E1 r imp Approved For Release 2009/03/23: CIA-RDP94B0028OR001200010020-3 Approved For Release 2009/03/23: CIA-RDP94B00280R001200010020-3 MEMORANDUM FOR: General Counsel SUBJECT: Associate General Counsel/Chairman, Unauthorized Disclosures Investigation Subcommittee, SECOM Intelligence Leaks 1. Unauthorized disclosures have become so commonplace, investigative action has been so timid, success in solving leak cases has been so infrequent, punishment of the few leakers actually found has been so mild and so hidden and prosecution of leakers has become so improbable that leaking has emerged as a virtually risk-free activity. Indeed, a recent expression of presidential concern about leaks was greeted not by a renewed national resolve to protect fragile intelligence sources and methods, but instead by the concern that security might actually be tightened and that leakers might actually be inhibited. Leakers were turned into heroes and security officials into villains. Leakers have been emboldened and security officials intimidated. 2. It.really is time to turn this around by a more vigorous program of security awareness within the Government, and by educating the public at large about the pernicious -nature of disclosures which do great damage to our intelligence sources.and to the continued availability of vitally needed information while contributing only minimally to public debate. We must pursue leak investigations more vigorously. We must remove those who violate their trust from Government service in a very public and visible way and deal even more harshly with senior officials who should know better and who should set a responsible example for the rest of the bureaucracy.. Finally, we need better laws.. We need a mechanism to make leak investigations a bipartisan undertaking and we need to stop confusing leakers with either whistleblowers or spies. We must have a law, separate from the espionage statutes, which criminalizes the unauthorized disclosure of classified information by Government employees. But most of all we must reject the conventional wisdom that nothing can be done and eschew those who, as.a result Of .frustratian, counsel..inactivity and urge us to accept. and be resigned .too ,the current :deplorable state of affairs. Approved For Release 2009/03/23: CIA-RDP94B00280R001200010020-3 Approved For Release 2009/03/23: CIA-RDP94B0028OR001200010020-3 3. "Security is not an exact science and even the best system occasionally will fail. Nevertheless, the CIA has put together what must be regarded as a model system. Security processing of applicants is rigorous and security indoctrination begins from the moment the employee comes on board. A loyalty to the Agency and an esprit de corps is fost'ered and a value system geared to protecting intelligence sources and methods is inculcated by security education and security awareness programs. Media contacts are centralized and controlled. The probationary and reinvestigation polygraph programs serve not only to deter unauthorized disclosures, but also to catch the few who become sloppy or who don't care. Leaks are investigated. Security breaches .yield predictable punishment and potential leakers know that their jobs will be forfeited. 4. The problem is that CIA and the other intelligence .agencies are in the business of disseminating intelligence but the same security controls as exist, for example, at CIA and. NSA, do not exist in the consumer agencies. We have, therefore, a security edifice which is very much like a bank with a door of steel 12 feet thick in front but with a rickety screen door in back and until we can insist on the same standards on both. the producer and consumer side of the business we will find it very hard to reassure our depositors. 5. There is no single solution, no panacea but there are a number of steps which can be taken. To soir:e extent we must get back to basics and practice the fundamentals. For example, we must more carefully scrub our finished intelligence so that intelligence sources and-methods are better protected. We must periodically prune dissemination lists and stop confusing "nice to know" with "need to know." We should make consumers justify their need for continued access to particular publications. We should have more flexible publication formats so that those who need to know about Denmark don't routinely receive reporting on Iran. We should increase our "read and return" programs. We should have exit search programs in Government buildings where ,.classified information is present so people cannot casually walk out with a briefcase full of classified documents, or build up a cache of documents at home. 6. To some extent we need'to change the way we routinely do business and to develop new approaches. For example, it simply is not a good idea to give newsmen building passes which enable them to wander at will through Government offices. . Approved For Release 2009/03/23: CIA-RDP94B0028OR001200010020-3 Approved For Release 2009/03/23: CIA-RDP94B0028OR001200010020-3 ? V 7. We should be moving now to try to build into computer-assisted dissemination systems, the kind of security modules which will provide a record as to which document was disseminated to which person, and also to indicate when a hard copy is printed out. Indeed, the computer can generate a unique number for each document which is printed. 8. We need to focus on the growing use of personal microcomputers since this technology can mean that individuals can put highly classified data into the memory of extremely small and highly-portable personal computers. At a minimum, sources and methods information should be protected against being incorporated into such personal computers. 9. We need to cut down the practice of photocopying highly-classified intelligence publications, avoid having them "lying around" and worse yet being passed from desk to desk. As we move more and more into a computerized environment, we can do this by developing for senior policy customers outside the Intelligence Community a "classified executive suite,".an attractively furnished room where senior officials can go to read classified intelligence publications. The individual with a key to this "classified executive suite" will log onto a computer terminal and receive his classified mail on the screen. He or she will be able to go to this facility at any convenient time to read the NID or other publications which he is entitled to see. The key to the executive suite will give the consumer the required status and prestige, but the actual reading material can be tailored to his particular needs. The custodian or librarian in the "classified executive suite" can take care of any requests for hard copy and can keep appropriate records as to who received what. 10. When intelligence leaks do occur they must be investigated or at least reviewed. At present this is not done in a systematic way. More needs to be done to evaluate leaks, to prepare damage assessments and to conduct post mortem reviews of the investigation and of the damage after a sufficient passage of time has occurred. Investigations conducted by the various agencies often are inadequate because in many cases responsibility and authority stops at the water's edge and one agency cannot easily investigate what happened to its information when disseminated to a second agency. Thus, it is necessary for the Department of Justice and the FBI to rigorously investigate the unauthorized disclosure of classified intelligence information especially when intelligence %sources and methods are involved. Approved For Release 2009/03/23: CIA-RDP94B0028OR001200010020-3 Approved For Release 2009/03/23: CIA-RDP94B00280R001200010020-3 11. The problem is that very,few of the.leaks reported to Justice by CIA are investigated. We routinely receive as a response to our leak report a form letter which states: "In view of the acknowledged level of dissemination of the information, we are reluctant to direct the FBI to investigate this matter unless you are in a position to identify likely suspects or suspect organizational components. Accordingly, we are unwilling to commence an inquiry until such time as you can narrow the list of potential subjects." 12. The notion that the FBI will not investigate until we identify the suspects is incredible. It is akin to the police saying that they will not investigate a bank robbery at 42nd Street and Fifth Avenue because too many people were in the area but if the bank identifies likely suspects, then the police will investigate. Not only is this bad policy, it proceeds from a false factual predicate. Not all recipients of classified information are equally probable suspects. In most cases, the more junior officers are not credible suspects. In most cases, individuals involved with the intelligence program have equities which are damaged by the unauthorized disclosure and they would have no incentive to leak. Thus, a simple examination of who stands to benefit from the leak can help to focus an FBI investigation. Unhappily, even when our Office of Security has lead information, we rarely find Justice interested in pursuing the matter Indeed, the decision not to investigate unless the number of persons exposed to the material is very small means, in effect, that leaks from the NID and other similar intelligence publications simply will not be investigated. 13. The reason for this apparent reluctance to investigate leaks derives from the perceived payoffs or lack .thereof. The Department of Justice has clearly stated that it regards the chances of solving a leak case as poor and it preferred to husband scarce FBI resources for espionage rather than leak investigations. Justice openly stated that before a newsman could be interviewed by the Bureau, the Attorney General himself needed to give permission and that such permission was not likely to be forthcoming. In sum, it is fair to say that Justice and the Bureau do not see much glory or career enhancing statistics emerging from leak investigations and they act accordingly. 14. One solution would be to create a special unit within the FBI to do nothing but investigate leaks. The Intelligence Community might detail experienced security officers to help staff the unit and support a line-item appropriation to finance the unit. If the unit would analyze Approved For Release 2009/03/23: CIA-RDP94B00280R001200010020-3 Approved For Release 2009/03/23: CIA-RDP94B00280R001200010020-3 a W the intelligence leaks reported to it and then simply question a few individuals who stood to benefit from each leak, the perception of federal interest in preventing leaks would be dramatically strengthened. In addition to this limited effort, major components of the Intelligence Community could be informed as to how many major leak investigations could be undertaken in view of the unit's manpower and budget. If the DCI, for example, knew that the unit could handle ten major CIA leak investigations in the current fiscal.year, Agency recommendations could be made to Justice as to which leaks the DCI wanted the unit to focus upon. 15. A number of other initiatives need to be taken to improve leak investigations. One step is to loosen the restrictions on interviewing the press. Although it is not practical to turn-every leak case into a First Amendment confrontation,. FBI interviews should be a far more routine practice. Moreover, in an appropriately serious case, the only way to proceed may be to call a member of the press 'before a grand jury. It is recognized that there could be a political cost in doing this but that could be dissipated by use of a special prosecutor so that the leak investigation is not perceived as a political exercise but rather as an impartial and independent effort to stop the hemorrhaging of national security information. There is now authority for the Attorney General to appoint a non-statutory special counsel and there is authority (28 U.S.C. ? 591(c)) for the Attorney General to petition the court for' appointment of a special counsel when he determines that an investigation may result in a political conflict of interest.' Despite these authorities, consideration should be given to recommending separate legislation to specifically authorize the President to appoint an independent counsel to investigate leaks upon the recommendation of a senior official such as the DCI. A draft bill is included at Tab A. 16. In addition to improved investigations of leaks, two additional legislative initiatives should be considered. The ,first is to seek legislation which would criminalize the unauthorized disclosure of information by federal employees and others who have authorized access to classified information. Arguably, such disclosures of classified information already are covered by the espionage laws, (i.e., 18 U.S.C. ? 793) but Justice has never successfully prosecuted a leaker under these statutes. In part, this may be because it is necessary to prove that the individual transmitting the national defense information did so with reason to believe it would be used to the injury of the United States or to the advantage of a foreign nation, and in part because of a reluctance to treat.leakers as spies. Approved For Release 2009/03/23: CIA-RDP94B00280R001200010020-3 Approved For Release 2009/03/23: CIA-RDP94B0028OR001200010020-3 17. The draft legislation at Tab B would eliminate the intent requirement and make it unlawful for a Government employee or contractor or any person with authorized access to classified information to willfully communicate such information to a person who is neither a Government employee nor a person with authorized access to such information. In order to ensure that an individual does not evade the law by making such disclosure after leaving the Government or after the termination of authorized access, the draft legislation also would criminalize such disclosures made within five years after leaving the Government or losing access. This legislation (without the five year after-service provision)' was drafted by Gary Chase and George Clarke in 1982, and it was coordinated with the Justice Department and cleared by the Administration for transmittal to the Congress, but it never actually was sent to the Hill. 18. The second and related legislative initiative is to, seek legislation allowing for injunctive relief when an individual has engaged or is about to engage in any acts which would violate the proposed law prohibiting unauthorized disclosures of classified information. (Tab C) At present, similar language is contained in the Atomic Energy Act. 19. There are many other steps which can be proposed but there are practical limitations on the implementation of additional,-security controls, the imposition of more effective administrative procedures, the resort to more powerful, investigative techniques or the development of new legal remedies. The first constraint is cost. It is well understood that security cannot be made. so tight that necessary dissemination or use of intelligence is inhibited. There is a tradeoff, for example, in the clearance process between speed and efficiency on the one hand and care and h as a thoroughness on the other. We all know that security price tag and we regularly engage in a cost-benefit analysis in, an effort to achieve a proper balance. 20. The second, and perhaps more important constraint, ~Js public opinion, but we rarely pay sufficient attention to .this factor. Nevertheless the public mood sets the limits as to what is tolerable and acceptable. Requiring persons who have had access to sensitive intelligence information to submit writings on intelligence for prepublication review is regarded within the Intelligence Community as a sensible measure to ensure against the inadvertent disclosure of classified information. Media and congressional judgments on this.procedure.have:been quite different and quite negative. Approved For Release 2009/03/23: CIA-RDP94B0028OR001200010020-3 Approved For Release 2009/03/23: CIA-RDP94B00280R001200010020-3 ? V Even though the intelligence agencies can do nothing more than advise the author as to the existence of classified information, and must go to court in order to enjoin publication.of classified information, prepublication review is labeled "life-time censorship" stifling public debate and the free flow of ideas. On the other hand, a far more intrusive practice, the search, without a shred of probable cause, of all passengers and their luggage at airports, although initially controversial, now excites little opposition or criticism. In the one case, the security measure is poorly understood and the need for it even less understood. In the second case, the overriding concern for personal safety makes a far more draconian security measure totally acceptable. The public must come to realize that disclosure of legitimately classified information -- and there should be no other kind -- poses a clear and present danger to their security and their safety in an ever more dangerous world. They must come to realize that intelligence sources can easily dry up, that expensive technical systems can become subject to countermeasures and intelligence relationships painfully built up can quickly be lost. Depriving policy makers in the defense and foreign policy arenas of information needed to make rational choices among policy alternatives, harms each and every one of us, hurts us in our pocketbooks, and erodes the quality of life for American citizens. 21. The current rather casual public attitude toward leaks has not sufficiently been challenged and a climate of opinion conducive to leaks has been allowed to develop virtually unchecked. It is extremely important, therefore, .that the Intelligence Community embark upon a public program of security education. It is only when the reasons for our profound concern about intelligence leaks are understood that we will be able to count on public support for protecting our vital intelligence sources and methods. Only then will leakers be outcasts and not vaguely heroic figures. Approved For Release 2009/03/23: CIA-RDP94B00280R001200010020-3 Approved For Release 2009/03/23: CIA-RDP94B00280R001200010020-3 OFFICIAL [!SE 011LY DIRECTOR OF CENTRAL INTELLIGENCE securitycommittes SECOM D-069 29 March 1984 STAT MEMORANDUM FOR: Director, Intelligence Community Staff FROM: Chairman STAT SUBJECT: Intelligence Leaks REFERENCE: DCI MEMO, dated 23 March 1984, Subject: Intelligence Leaks and Counterterrorism Capabilities 1. The referent memorandum and the recent SSCI hearings have raised new hopes that something can be done at last about those who breach their oaths and reveal classified intelligence to the news media. The following observations- on the leak situation may be useful to you in carrying out the DCI's charge. 2. While Senator Biden's helpful attitude is gratifying, there is a need to stimulate public opinion against leaks of classified information. There is a great groundswell of apathy about leaks, both within the government and among the general public. It is essential that new leak legislation, if it can be passed, not be regarded with the same enthusiasm as the Volstead Act. 3. There has been little opportunity to take the anti-leak message to rank-and-file government employees. Even worse, the public receives all its information about leaks and anti-leak efforts from the news media. While the DCI videotape has been shown to high-level audiences in some, not all, Intelligence C,\ommunity agencies, it has not been generally presented to middle and lower graded personnel, even in CIA. 4. We are not doing enough to create a climate of acceptance for anti- leak efforts. Almost without exception, audiences viewing the DCI leak videotape have expressed the belief that no progress will be made until senior officials of the government stop leaking classified information for their own purposes. The opinion persists that the public chastisement of one or more identified high level leakers is essential to marshalling any anti-leak support. The message is clear--mere words are not enough. The government must demonstrate that leaks are a sufficiently severe problem to warrant decisive, well-publicized action against senior,,.well-connected officials. Approved For Release 2009/03/23: CIA-RDP94B00280R001200010020-3 Approved For Release 2009/03/23: CIA-RDP94B0028OR001200010020-3 ?. 1 5. There is a reasonable reluctance to use the Espionage Act to prosecute leakers. Legislation is needed to deal specifically with the disclosure of classified information by cleared individuals to unauthorized persons. No matter how one views it, this is a different crime from espionage. Nevertheless, it is no less a breach of trust by a federal official than illegal use of a limousine, disclosure of crop futures, or misappropriation of federal funds. It deserves its own law. We should not.- drive tacks with a sledge hammer. We have offered, then withdrawn, legislative proposals on this topic for the past two years. 6. As the leak situation grows worse, our posture to combat leaks,.also seems to be going downhill. The Brooks Bill, if passed, would hamper the anti-leak effort. More important, it would send a message that efforts to combat leaks are somehow immoral, unconstitutional, or worse. It is essential that Congressional liaison officers throughout the Community do everything possible to educate members of both Houses on the pernicious nature of leaks. and the extremely disadvantaged posture of the government in combatting them. A solid defeat for the Brooks Bill is an indispensable step in our effort to turn public opinion around. 7. CIA and the rest of the Community need to determine as precisely as possible what the leak story is and how much of that story can be told publicly; how much more can be told to Congressional leaders, and how much can be told to top Administration officials. Unless we can present a credible story that the US intelligence effort is being significantly damaged by leaks, no amount of hand wringing is likely to have any effect,. whatsoever. 8. We need to determine ways to get the general story before the public and the specifics to those who can help lead the way back from apathy. Having a good story doesn't help unless we can get people to listen. The DCI anti- leak videotape has been an excellent counsciousness-raising exercise, but there has been a constant uphill struggle to get audiences to view it. We need to produce a new, hard-hitting, factual message on leaks and obtain authority to require cleared personnel throughout the government to attend. 9. The fact that after four decades, the DCI still finds the slogan - on their part. ".loose lips sink ships" useful indicates that posters are a powerful medium.. We should mount a poster campaign against leaks throughout the government. ,Posters provide the message to masses of people without requiring any action .10. As has been reiterated, the current procedures for--investigation of ..unauthorized disclosures are geared to failure. The fragmented, agency-by- agency approach to investigating leaks of information that is disseminated government-wide doesn't provide a uniform effort. In order to ensure that competent investigative resources are concentrated on areas most likely to yield results, an overall, coordinated effort by a single agency is required. The FBI is the only agency capable of doing the job. It is also essential to the continued protection of intelligence sources and methods that the investigation. be closely coordinated with senior Intelligence Community 2 Approved For Release 2009/03/23: CIA-RDP94B0028OR001200010020-3 Approved For Release 2009/03/23: CIA-RDP94B0028OR001200010020-3 officials who can determine the risk of additional revelations of classified information at every step of the investigation and recommend appropriate action to avoid compounding our problems. 11. The fragmented approach to investigation does not permit any analysis of leaks for possible patterns. Centralized investigation and coordination would afford the opportunity to analyze the content, apparent intent, possible sourcing, etc., in order to focus investigative efforts where they are likely to yield results. Sophisticated investigative and analytical techniques, as currently being applied to the fight against narcotics, need to be used against leaks. The current simplistic approach does not work. 12. To avoid having an anti-leak effort evaporate in a cloud of frustration, there should be personnel and other resources dedicated to the investigation and prosecution of leaks, preferably with a Congressional mandate. The current unsophisticated, relatively low level, effort appears to result from reluctance to devote resources to a no-win situation. If the resources and appropriate guidelines can be made available, we can win, at least some of the time. A concerted effort to mount a strong pilot operati offers the best chance of success. 13. Senator Biden's concern about lack of utilization of "graymail" procedures illustrates two points that must not be ignored. The first is that the passage of legislation, per se, is not enough to cure a bad situation. The second is that nothing can be done about the leak problem unless some of the offenders-are identified and penalized. 14. 1 have telephoned all the members of the Security Committee and requested their thoughts on new approaches to the leak problems. Their responses will be provided to you when received. 15. Finally, I propose that we consider recommending appointment of a presidential commission on unauthorized disclosure of classified .information.. A bi-partisan group of distinguished present and former members of all three'branches of government could be given all the facts and asked to report and recommend remedial action. Coming from such a broad-based group, the recommendations should command widespread support and would provide a .'means of informing the American people of the gravity of the threat, if not the details of it. Formation of a commission would provide a way to meet several of the needs enumerated above. The primary drawback is that this is an' election year. Although timing is important, the action could be taken after the election, because the problem will still be with us.- Approved For Release 2009/03/23: CIA-RDP94B00280R001200010020-3 Approved For Release 2009/03/23: CIA-RDP94B0028OR001200010020-3 Director Intelligence Community Staff Washington. D.C. 20505 ICS-0802-83 MEMORANDUM FOR: Director of Central. Intelligence VIA: Deputy Director of Central Intelligence FROM: Director, Intelligence Community Staff SUBJECT: Unauthorized Disclosures of Classified Information 1. Senior members of the Intelligence Community Staff have met to consider responses to your call for proposals to-Counter the unauthorized disclosures of classified intelligence which are increasing in number and severity. The recommendations of the group are in five basic categories -- education, legislation, investigations, media interface and information control. This memorandum discusses proposals in each of these categories. 2. Edncatiao - There appears to be a lack of appreciation of the consequences of t e unauthorized revelation of classified intellipence information, both to the national security and to the individual making the disclosure. Each recipient of Sensitive Compartmented Information (SCI) is indoctrinated on the potential damage to the national security of such revelations, as well as the penalties prescribed in Title 18, Sections 793 through 798. Nevertheless, incidents continue which indicate that these elements of risk are not being taken seriously. Recipients of classified intelligence must be convinced that its.unlawful- revelation is reprehensible, and that individuals who take it upon themselves to decide when the system may be' ignored place the national security and themselves in jeopardy. 3. In wartime, the population recognizes .the need to keep military secrets. The concept that "loose lips*sink-ships"?is well accepted. We need a campaign, beginning with the President, to convince all concerned that classified information must be protected if we are to avoid national disaster. A vigorous Presidential charge to the Cabinet and the Executive Office. of the President, relayed through channels to all levels, is an essential element of this campaign. 4. Awareness of the importance of security to intelligence must be extended to the Congress. The whole-hearted cooperation'of both- legislators and staff members is indi-spensab e. Not only is Legislative Branch support needed to safeguard the materi.al provided to the Congress, but also to put teeth into the anti-leak effort. CL BY SIGNER Approved For Release 2009/03/23: CIA-RDP94B0028OR001200010020-3 Approved For Release 2009/03/23: CIA-RDP94B00280R001200010020-3 5. To make this effort credible, documents must be classified properly and concern about disclosures should be limited to those affecting national security. 6. A one-time effort to sensitize the government and-the public to the disastrous consequences of illegal disclosures, even one kicked off by the President, has a limited half-life. There must be a planned follow-up. In - addition to the obvious reindoctrination efforts, consideration should be given to an ongoing program of damage-oriented "lessons learned" presenta tions. These are envisioned as timely,'specific, succinct and technically competent videotape shows detailing the nature of the unauthorized disclosure -and the specific losses suffered as a- result. They would be shown to audiences cleared for the compromised information as a means of reinforcing .the need for strong security. 7. Because of the general derision with which the media regard government efforts to stop leaks and because the generic term "leak" is associated with disclosures that are politically Embarrassing, It may be advisable to avoid that term and speak only of "unauthorized disclosures of classified information." 8. Legislation - The existing espionage laws were drafted to protect U.S. secrets from foreign agents. They did not contemplate the hemorrhaging of. classified data that has followed the media explosion. The divulgence of classified -information to the Russians by way of Jack Anderson's column, for example,. is a relatively new phenomenon. Even though the intentions of the 'leaker may be to nobly inform the public of facts he thinks. should be known, the results are the same as directly transmitting the information to the KGB. .9. Attached is*a copy of the proposed bill to prohibit certain unauthorized disclosures of classified information. Formulated on the basis of the Willard Report, it is an excellent vehicle for closing the .l oophol e that allows individuals to ignore classifications and make their own decisions about what must or must not be kept secret. Passage of such a bill would make_ it clear that both the legislative and executive branches are serious about .preserving our ability to keep our national security secrets. It would then :remain for the judiciary to show the same resolve. 10. The chances of passing the unauthorized disclosures bill are, directly related. to the Congress's perception of how responsibly the Executive Branch uses its classification powers. As noted above, the effort to educate government employees (and the-public, to the extent possible) on the need for effective secrecy must also include the Congress and legislative staff personnel. The means of reaching this objective are he same for both branches of government -- graphic demonstrations _tt unauthorized disclosures are costly in terms of money, national defense, intelligence capabilities, and sometimes, human lives. 11. Legislation also: is needed to make the unauthorized possession of classified material a. crime. ItNis`illogi`cal forl,the~:U.S.'Government .:to,:be Approved For Release 2009/03/23: CIA-RDP94B0028OR001200010020-3 Approved For Release 2009/03/23: CIA-RDP94B0028OR001200010020-3 unable to bring charges against, or at least sue to recover classified material from, Jack Anderson, who makes a mockery of classification, or from Aviation.}leek_and_Space_?.echnalo.gy, which has printed classified satellite imagery. the U.S. would take action against an ordinary citizen, it should act with the same vigor against journalists who damage the national security. The Attorney General and the General Counsels of the Intelligence community should begin a crash program to draft a legislative proposal and to review the .possibilities of action even without'a new law. 12. Whether or not the effort to pass new legislation is successful, it is vital that Congress be included in any awareness-raising program. A .secondary objective would be to raise the security standards of the congres- sional staffs. Many staffers have access to more sensitive information than some CIA or NSA personnel, who are polygra-plied as well as backgrounded,. and. are subject to periodic reprocessing. Congressional staffers are not steeped in the discipline of security as are the intelligence professionals, and would almost certainly benefit from a greater appreciation for the need for secrecy. 13. ? Finally, the problem of reinforcing the.. responsi bil i ties of formerly cleared recipients of classified information to continue to maintain secrecy requires attention. A periodic reminder by mail might be considered, but except for CIA and NSA, it could be difficult to identify those who should- receive them. In the future, the archival file of the Community-wide,- Computer-assisted Compartmented Control (4C) System, which will contain the identities of individuals formerly approved for access to SCI, should assist with -this problem. Meanwhile, the message needs to be spread that our "old boys" can do a lot of harm by talking too much. Cleared persons still employed in government must be reminded frequently and forcefully that those- who have retired, or. taken jobs in the industrial sector, may not legally receive classified information unless they are specifically cleared for it. 14. Investigations - The investigation of._ unauthorized disclosures has rarely proven successful over the years. The broad dissemination require of intelligence reporting, the lack of an effectual investigative program -throe hout the government, an Apparent tolerant attitude toward those who make ;Illicit disclosures, and the absence of a legislative basis for action have -made for a highly frustrating situation. NSDD-84 offers hope for greater success in the future, but there is muc to :be done. 15. Although leak investigations are searches for needles in haystacks, occasionally good investigative work will produce results. - Unfortunately, R '-- unauthorized disclosures to the media are consensual acts between two parties, neither of whom is likely to admit participation, and one of whom enjoys a special degree of privilege under the First Amendment. Legislation will help, but there can't be a trial until a defendant is identified. The abysmal track ,record of leak investigations to date dictates that the Federal Bureau of ,Investigation is the only agency with any chance of success. Fragmented. singy le-agency efforts simply do not work. Nor does the proposal to form interagency units to -investigate unauthorized disclosures offer any reasonabl hope for improvement. 3 SECRET Approved For Release 2009/03/23: CIA-RDP94B0028OR001200010020-3 There seems no reason why the government cannot re,qu.i,re. the reporting of, contacts with the 'news-imedta, during or ,outside ofy,':duty hours, in which Approved For Release 2009/03/23: CIA-RDP94B0028OR001200010020-3 ? SECRET 0 . 16. Even the FBI will require some help -- the full cooperation of other agencies, the legislation discussed earlier, and _guidelines that permit the use of as full a range of investigative tools as: possible. The Attorney General and the Director of the 51 sou be ins ruc e y the President to provide the most permissive guidelines possible, consistent with the protec- tion of civil liberties, for FBI investigations of!unauthorized disclosures of: classified information. In addition, appropriate manpower allocations to the FBI should be made to ensure a vigorous effort to solve unauthorized disclo- sures. Without this, the Bureau cannot be expected to neglect other important investigations to undertake tasks that offer a low probability of success'and almost certain criticism in the press. 17. Because of the nature of unauthorized disclosures, the likelihood of developing conclusive evidence is low. In fact, the investigative tool most likely to*succeed is the polygraph, if conventional investigation can narrow the number of suspects sufficiently to employ it. If a suspect confesses as a result of polygraph interview the case is solved. If, however, in the face of clear-cut polygraphic evidence of deception he continues to deny culpability, the problem of acceptability of polygraph evidence arises. .18. While prosecution on the basis of polygraph charts is extremely unlikely to succeed, the government could revoke the individual's clearances or access , approvals on'that basis. This would effectively neutralize future disclosures by that individual, but could result in a lawsuit to regain the approvals. The Justice Department and Intelligence Community legal counsels should be tasked to research the grounds-upon which such a suit could be defended and the likelihood of success. 19.. Action based primarily upon polygraph results is certain to bring - strong media criticism. he al aph__pr=ess is little understood and the' press has fostered this misunderstanding by pressing the theme that e i nstrument itself is unreliable. Consideration should be given to. preparing an educational program to be used first with senior officials of-the Executive Branch and with legislators. It should demonstrate-that the effectiveness of the process doesn't depend totally upon the machine, but is a technique to aid a skilled interrogator. If a convincing.-,effort can be mounted, it could be brought to the public and even to the news media.. If the Intelligence Community can't provide objective, rational.- evidence, that .the palygrapb' process is reliable, the entire effort to-'comba't unauthorised disclosures may e in serious trouble. 20. P_ress_Interiace -JSDD-84 'mandates policies to govern contacts ... between media representatives and agency personnel, leaving implementation to the individual agencies. The effort to eradicate u~a'uthorized disclosures would be assisted greatly by the adoption of uniforln rules, for all agencies. 21.. The discussion'of government information, especially secnsitivt intelligence, by a government employee is not a'private, personal matter. Approved For Release 2009/03/23: CIA-RDP94BOO28OR001200010020-3 Approved For Release 2009/03/23: CIA-RDP94B00280R001200010020-3 ? JG\.RG 1 government business is discussed. Failure to follow such a rule could be made subject to administrative sanctions of varying severity. Data on such contacts could be computerized, by names of government employees, names of media representatives, subjects of discussions and dates of contacts, pro- viding a means of determining a great deal of information that could take inordinate amounts of investigative effort. It wouldn't tell who made unauthorized disclosures, but it would provide a means of determining who might have had the means and the opportunity, and possibly even the motive to have done so:. 22. It would be ideal, from the standpoint of security, to abolish back. grounders. Recognizing that this isn't going to happen, there should be firm control of background briefings to-the-press. There must be clear-cut -guide- lines on who may authorize and present backgrounders. Every such briefing should be attendedby a security or public affairs officer who._knnws_Xhat._is sensitive about the topic being discussed an is ca a e o offering guy ance to the briefer. A record should be kept of briefings by names o par icipants ? and authorizing officials,. dates and topics, preferably in a computerized mode. Presenters of background briefings should tie required to prepare summaries of what was presented. These should be cross-referenced to the automated index of background briefings. The documentation of this informa- tion and its retrievability will not only serve as an invaluable investigative resource, but its existence will promote prudence in the presentation of backgrounders._and in other. dealings with the press. 23. Even if'all these proposals were adopted, there would be individuals who would continue to divulge classified information to the press. But they would find themselves. operating at considerably greater risk. Simple failure to comply with. the reporting requirements would be cause for administrative sanctions, and it would become easier to detect such failures by having a reliable record of compliance. It is likely that associations between government personnel and media representatives are known to at least some associates of both, and the possibility of being reported by a concerned colleague would be enhanced by the revised rules. An effective education program about leaks should have the salutary effect of highlighting to their associates those who may deal with the media without -observing the reporting requirements. If those who comply are sufficiently convinced of the need for regulation of press contacts, they mad be::inc)ined' to blow, the whistle:" It would then be necessary for the government to demonstrate the. seriousness of .its intent by taking administrative action against the nonreporting individuals, regardless of their positions 24. The matter of "authorized" or."official" leaks needs close atten- tion. If the appropriate official determines it is-4n the national interest to release for publication information that was classified until that point, there should be a means of recording that fact. Such a record would appropriately be kept somewhere in the Executive Office of. the President. This record could provide a2means of avoiding the expenditure of resources to investigate such disclosures as "leaks." - 5 Approved For Release 2009/03/23: CIA-RDP94B00280R001200010020-3 Approved For Release 2009/03/23: CIA-RDP94B0028OR001200010020-3 rrrn~ 25. Finally, the revolving door practice of appointing national media personalities as top level government press officers should be carefully reexamined. Such appointments must face the incumbents with conflicts of interest and severely ambivalent feelings, both during and after their federal service. It may be unrealistic to expect them to deny their colleagues .information which they feel is unjustifiably classified and to expect theme to forget, and never use, information they received officially. 26. 1nfnnaation-Control - Some people believe there are enough - information control po icies, procedures and regulations on the books to bring the government to a complete halt if they were strictly applied. While this view may have some merit, it should not serve as an excuse for not trying to secure our sensitive information. The concept that security is everybody':s business must not be given lip service and then cast aside. 27. Except for the need for developing a strong, national information control program for the emerging electronic information systems, it is unlikely that more document control regulations are needed or practicable. What is needed is for everyone to be educated in-the existing policies and procedures and to make a renewed effort to comply. While everyone claims to know the regulations, it is likely that few could pass a comprehensive test on information security and control. 28. Steps to,improve information control would include detailed comparison of practices with policies; 'the reeducation of all personnel in in orma 'ion security, an a motivations program to enhance awareness of the consequences of improper handling of sensitive intelligence. Better information control is needed, but it must come from motivated people. More . regulations are not the answer. 29. Summary - Unauthorized public disclosures of classified information in the news media are damaging to the national security. Our defense against them must come from within, from those who are cleared for access to, and who have signed agreements to protect, classified information. It is clear that some of these people, for reasons of their own, have not kept their word. It also appears that neither the overall level of concern about this situation . .''action is up to the job. nor the government's capability for remedial 30. To encourage wholehearted support of our efforts to protect classi- fied information, we must convince those who have agreed to keep the secrets that they have a moral and legal obligation to keep that conversant. The rules on SCI are simple and-clear. -It is inconceivable that-,anyone who gives such information to uncleared individuals is unaware of?what he is doing. Therefore, such persons must be unconvinced of the/seriousness of the security program. 31. 'A massive reeducation program for all legitimate recipients of classified information is:-the first s:teP in ..attempti ng! to achieve the - necessary change in attitude. Approved For Release 2009/03/23: CIA-RDP94B00280R001200010020-3 Approved For Release 2009/03/23: CIA-RDP94B0028OR001200010020-3 ? 32. A policy and resource commitment to the solution of at least the most flagrant cases of unauthorized disclosure is also needed. This means the devotion of sufficient FBI assets to investigations and an all-out effort to obtain passage of unauthorized disclosure laws. 33. A severe tightening of policies concerning relationships of cleared individuals with media representatives is essential. To be meaningful, this must include strict guidelines, reporting procedures, information retrieval- capabilities, and impartial administrative penalities for noncompliance. 34. Renewed awareness of information'control policies and procedures and their importance to the national security is needed. If classified documents can be turned over to the media or other unauthorized persons without being noticed, the system isn't working. .It must be made clear that the system" really is the people who operate-it. ' 35. If you wish elaboration or action on any of the above items, appropriate elements of the Intelligence Community Staff are prepared to assist in any way possible. Attachment: - Draft unauthorized disclosures bill .All paragraphs of the text _ are classified SECRET ,7 "SECRET Approved For Release 2009/03/23: CIA-RDP94B0028OR001200010020-3 Approved For Release 2009/03/23: CIA-RDP94B0028OR001200010020-3 Approved For Release 2009/03/23: CIA-RDP94B0028OR001200010020-3 Approved For Release 2009/03/23: CIA-RDP94B0028OR001200010020-3 New version of proposed 18 U.S.C.-791 is attached. Note that the cover language specifies that the proposal would have to be recoordinated within the Administration before being sent to the Congress Approved For Release 2009/03/23: CIA-RDP94B0028OR001200010020-3 Approved For Release 2009/03/23: CIA-RDP94B00280R001200010020-3 In the course of Administration development of the Fiscal Year 1984 Intelligence Authorization Bill, the Intelligence Community obtained from the Office of Management and Budget clearance of a proposal to establish criminal penalties for certain unauthorized disclosures of classified information. The proposal was based in part on the report of the Interagency Group on Unauthorized Disclosure of Classified Information, chaired by Deputy Assistant Attorney General (Civil Division) Richard K. Willard. It was coordinated with Deputy Assistant Attorney General (Criminal Division) Mark Richard, as well as with the Office of the Secretary of Defense/Legislative Affairs. For a number of reasons, including the issuance of NSDD-84 just before the Authorization Bill was forwarded to the Congress, and in deference to the intelligence committees' preference for handling the Intelligence Authorization in as unobtrusive a manner as possible, the unauthorized disclosures proposal ultimately was not transmitted as part of the Authorization Bill. The climate for transmittal of the proposal as part of the Fiscal Year 1985 Intelligence Authorization Bill also was considered unfavorable, due to continuing controversy over NSDD-84. =?.The proposal.(attached) has been modified to include former officers or employees for a period of five years following termination of their government service. It has been reconfigured as a separate bill, and prepared for transmission Approved For Release 2009/03/23: CIA-RDP94B00280R001200010020-3 Approved For Release 2009/03/23: CIA-RDP94B0028OR001200010020-3 at an opportune moment as an initiative from the DCI. The proposal would have to be recoordinated within the Administration before being sent to the Congress. Approved For Release 2009/03/23: CIA-RDP94B0028OR001200010020-3 Approved For Release 2009/03/23: CIA-RDP94B0028OR001200010020-3 ? W To protect against injury to the national defense and foreign relations of the United States by prohibiting certain unauthorized disclosures of classified information. Be it enacted by the Senate and House cf Representatives of the United States of America in Congress assembled, That Chapter 37 of title 18, United States Code, is amended by adding at the beginning thereof the following new section: "S 791. Unauthorized Disclosures or havihp within the last five years been (a) Whoever, being/an officer or employee of the United States or a person with authorized access to classified information, willfully discloses, or attempts to disclose, any classified information to a person who is not an officer or employee of the United States and who does not have authorized access to it, shall be fined not more than $10,000, or imprisoned not more than three years, or both. (b) Whoever, being an officer or employee of the United States, willfully discloses any classified information to an officer or employee of the United S tates,with the intent that such officer or employee disclose the information, directly or indirectly, to a person who is not an officer or employee of the United States and who does not have authorized access to it, shall be fined not more than $10,000, or imprisoned not more than three years, or both. (c) As used in this section- (i) the term "classified information" means information or material designated and clearly marked or represented, pursuant to the provisions of a statute or Executive order, as requiring protection against unauthorized disclosure for reasons of national security; . (ii) the term "disclose" or "discloses" means to communicate, furnish, deliver, transfer, impart, provide, publish, convey, or otherwise make available; Approved For Release 2009/03/23: CIA-RDP94BOO28OR001200010020-3 :ICdSC LUU~/UJ/LJ L,IH-MUI"t7'+DUULOUP000 ILUUU IUULU-J (iii) the term !authorized access" means having authority, right, or permission to receive information or material within the scope of authorized intelligence activities or pursuant to the provisions of a statute, .Executive order, directive of the head of any department or agency who is empowered to classify information, order of any United States court, or provisions of any'Rule of the House of Representatives or resolution of the Senate which governs handling of classified information by the respective House of Congress. (d) Nothing in this section shall be construed to establish criminal liability for disclosure of classified information in accordance with applicable law to: (i) any court of the United States, or judge or justice thereof; or (ii) the Senate or House of Representatives, or any committee, subcommittee or joint committee thereof.". SEC. 2. The table of contents of Chapter 37 of title 18, United States Code, is amended to include the following caption: "791. Unauthorized Disclosures". Approved For Release 2009/03/23: CIA-RDP94BOO28OR001200010020-3 Approved For Release 2009/03/23: CIA-RDP94B00280R001200010020-3 SECTION BY SECTION ,EXPLANATION Section 1 of the Bill amends chapter 37 of title 18, United States Code, to include a section 791 prohibiting certain unauthorized disclosures of classified information. Section 2 of the Bill makes the corresponding changes in the table of contents for chapter 37 of title 18. Proposed section 791 of title 18, United States Code, provides criminal penalties for willful unauthorized disclosures of classified information by federal employees and others who have authorized access to classified information, such as government contractors. With the narrow exceptions of unauthorized disclosures of atomic energy Restricted Data, communications intelligence/cryptography information, and the identities of covert agents, willful unauthorized disclosures of classified information by those entrusted with it by the government are not per se offenses under existing federal criminal statutes. Subsection (a) of S 791 prohibits willful disclosure or attempted disclosure of classified information, by a federal civilian or military officer or employee or other person with authorized access to such information, to any person who is , neither a federal civilian or military officer or employee nor a person with authorized access to such information. The subsection provides criminal penalties of not more than three years imprisonment or a $10,000 fine, or both, for such willful unauthorized disclosure of classified information. Subsection (a) of 9 791 would prohibit unauthorized .disclosures by persons who are, or who have within the last five years been, officers or employees of the United States. It also would apply to persons who have authorized access to 'classified information or who have nad such access witnin the `last five years.' This limited retroactive-feature is important to ensure that criminal liability under proposed section 791 is not evaded by an individual who begins to make unauthorized disclosures shortly after leaving government service or having had authorized access. Subsection (b) of 5 791 prohibits willful disclosure of classified information by a federal civilian or military officer or employee to'.an_other such officer or employee with the intent that the latter disclose the information, directly or indirectly such as through a chain of intermediaries, to a person who is neither a federal civilian or military officer or employee nor a person with authorized access to the classified information. The criminal penalties for such an offense are identical to those provided for the offense defined in subsection (a). Approved For Release 2009/03/23: CIA-RDP94B00280R001200010020-3 Approved For Release 2009/03/23: CIA-RDP94B00280R001200010020-3 Subsection (c).of.S 791 defines key terms employed in subsections ('a) 'and (b) in defining the offenses of willful unauthorized disclosure. Paragraph (i) defines "classified information" to consist of information or material designated as requiring protection against unauthorized disclosure for reasons of national security pursuant to a statute or Executive order. Paragraph (ii) defines the term "disclose" or "discloses" to include all forms of disclosure enumerated in the existing provisions of 18 U.S.C. SS 793-798 and 50 U.S.C. S 426. Paragraph (iii) defines the term "authorized access" to include authority or permission to receive information within the scope of authorized intelligence activities or pursuant to the routine security clearance processes of the Executive branch, orders of the courts of the United States, or rules of either House of Congress. Authorized intelligence activities are those conducted pursuant to statute or Executive order, such as the current Executive Order 12333 governing United States intelligence activities. Subsection (d) of S 791 assures that no criminal liability will attach under subsections (a) or (b) to otherwise lawful disclosure of classified information to the Congress or the courts. Approved For Release 2009/03/23: CIA-RDP94B00280R001200010020-3 Approved For Release 2009/03/23: CIA-RDP94B00280R001200010020-3 a IV Honorable Thomas P. O'Neill, Jr. Speaker of the House of Representatives Washington, D.C. 20515 Dear Mr. Speaker: This letter transmits for the consideration of the Congress legislation to provide criminal penalties for the unauthorized disclosure of classified information by individuals who have had authorized access to such information. The legislation is designed to deter unauthorized disclosures of classified infor- mation, which damage the national security interests of the United States and raise grave questions about the ability and willingness of the United States Government to protect its secrets. With.the exception of disclosures of information in the narrow categories of atomic energy Restricted Data, communi- cations intelligence or cryptography, and identities of covert agents, disclosures of classified information by government employees and others with authorized access to classified information, such as government contractors, do not constitute per se criminal offenses. In many circumstances such conduct would violate the Espionage Act or statutes protecting .government property from theft, but a variety of legal and practical problems usually prevent such prosecutions. The proposed legislation contains straightforward, easily understood, and readily enforceable provisions prohibiting willful unauthorized disclosure of classified information by government employees and others)U authorized access to 'classified information. who have had ':The proposed legislation has been narrowly tailored to establish criminal sanctions for unauthorized disclosures of ....classified information only when. committed by individuals who, by virtue of their acceptance of employment in positions of trust involving the national security, have freely undertaken the legal and moral obligation to protect classified information. The legislation has also been crafted carefully to preserve access to classified information by the executive, legislative, and judicial branches of government. Approved For Release 2009/03/23: CIA-RDP94B00280R001200010020-3 Approved For Release 2009/03/23: CIA-RDP94B00280R001200010020-3 Timely consideration of this legislation of great importance to the continued security of the nation would be greatly appreciated. The Office of Management and Budget has advised that enactment of the proposed legislation would be in accord with the President's program. Sincerely, William J. Casey Director of Central Intelligence Approved For Release 2009/03/23: CIA-RDP94B00280R001200010020-3 Approved For Release 2009/03/23: CIA-RDP94B0028OR001200010020-3 to 1w Is Approved For Release 2009/03/23: CIA-RDP94B0028OR001200010020-3 Approved For Release 2009/03/23: CIA-RDP94B0028OR001200010020-3 ? V Two versions of the Injunction Provision Approved For Release 2009/03/23: CIA-RDP94B0028OR001200010020-3 ai Approved For Release 2009/03/23: CIA-RDP94B0028OR001200010020-3 ? Version 1 Injunction Against Violation of Proposed ? 791 To protect against injury to the national security and foreign relations of the United States by preventing certain unauthorized disclosures of classified information. Be it enacted by the Senate and House of Representatives of the United States of America in Congress assembled, That Chapter 37 of title 18, United States Code, is amended by adding the following new subsection: 791a. Injunction Proceedings Whenever in the judgment of the Director of Central Intelligence any person has engaged or is about to engage in any acts which constitute or will constitute a violation of any provision of section 791 of this title, the. Attorney General on behalf of the United States may make application to the appropriate federal district court tor an order enjoning such acts, and upon a showing that such person has engaged or is about to engage in any such acts, a permanent or temporary injunction, restraining. order, or other order may be granted.". SEC. 2. The table of contents of Chapter 37 of title 18, United States Code, is amended to include the following caption: "791a. Injunction Proceedings". Approved For Release 2009/03/23: CIA-RDP94B0028OR001200010020-3 Approved For Release 2009/03/23: CIA-RDP94B0028OR001200010020-3 0 7 Version :.2 Injunction Against Violation of Proposed S 791 and Against Publication of Information Disclosed in Violation of that Section A BILL To protect against injury to the national security and foreign relations of the United States by preventing certain unauthorized disclosures of classified information. Be it enacted by the Senate and House of Representatives of the United States of America in Congress assembled, That Chapter 37 of title 18, United States Code, is amended by adding the following new subsection: "S 791a.. Injunction Proceedings Whenever in the judgment of the Director of Central Intelligence any person has engaged or is about to engage in any acts which constitute or will constitute a violation of any provision of section 791 of this title, or has published or is about to publish information disclosed in violation of that section, the Attorney General on behalf of the United States may make application to the appropriate federal district court for an order enjoning such acts or publication, and upon a showing that such person has engaged or is about to engage in any such acts, or in the case of publication that such publication would ,cause grave, immediate, direct and irreparable harm 'constituting a clear and present danger to the national .'security or foreign relations of the United States, a permanent or temporary injunction, restraining order, or 'other order may be granted.". SEC. 2. The table of contents of Chapter 37 of title 18, United States Code, is amended to include the following caption: "791a. Injunction Proceedings". Approved For Release 2009/03/23: CIA-RDP94B0028OR001200010020-3