POLICY ON UNAUTHORIZATION DISCLOSURES AND ON DAMAGE ASSESSMENTS
Document Type:
Collection:
Document Number (FOIA) /ESDN (CREST):
CIA-RDP94B00280R001200050001-0
Release Decision:
RIPPUB
Original Classification:
S
Document Page Count:
13
Document Creation Date:
December 22, 2016
Document Release Date:
March 23, 2009
Sequence Number:
1
Case Number:
Publication Date:
October 28, 1982
Content Type:
MEMO
File:
Attachment | Size |
---|---|
![]() | 895.14 KB |
Body:
Approved For Release 2009/03/23: CIA-RDP94B0028OR001200050001-0
SECRET
DIRECTOR OF CENTRAL INTELLIGENCE
Security Committee
SECOM-D-344
28 October 1982
MEMORANDUM FOR: Members, DCI Security Committee
SUBJECT: Policy on Unauthorized Disclosures and on Damage Assessments
1. In response to SECOM tasking, the Unauthorized Disclosures Investi-
gations Subcommittee (UDIS) submitted reports on the subject topics. These
were intended for use by the CIA member in responding to tasking from the
Interagency Group/Countermeasures. SECOM members were briefed on and dis-
cussed these reports at the 12-13 October seminar. Copies of the reports, and
of covering memorandum to me, are attached for your information
and review.
2. Members agreed at the seminar that there was.no need for another
iteration of the Willard Report, and that the DCI should again ask Judge
Clark to complete his evaluation of it and provide recommendations to the
President. Members also agreed to forward the paper on unauthorized
disclosures to the CIA member for his use in responding to the IG/CM.
3. The SECOM was unable to address the paper on a national policy on
damage assessments. Members are requested to review the attached report on
OFFICIAL USE ONLY WHEN
SEPARATED FROM ATTACHMENT
SECRET
Approved For Release 2009/03/23: CIA-RDP94BOO28OR001200050001-0
Approved For Release 2009/03/23: CIA-RDP94B00280R001200050001-0
r SECRET, 0
12 October 1982
MEMORANDUM FOR :
Chairman, DCI Security Committee
Chairman, Unauthorized Disclosure
Investigations Subcommittee (UDIS)
SUBJECT: UDIS Report on Unauthorized Disclosure
and Damage Assessment Policy
1. Pursua t to tasking by the Security Committee, the UDIS
met on 17 and 24 September and on 1 and 8 October, 1982, to re-
examine the Willard Report and to make recommendations with
respect to that report. UDIS also met to discuss issues related
to damage assessments. The results of our deliberations are
embodied in the two attached papers.
2. The first paper, "National Policy on Unauthorized
Disclosures," presents three options to stimulate action
regarding the problem of unauthorized disclosures. The majority
view was that the Community continue to urge Presidential action
on the Willard Report in its current form.
3. The second paper, "Points for Consideration Relative to
a National Policy on Damage Assessments," represents the views of
UDIS on this matter and was unanimously agreed to by all of the
members who attended the 8 October 1982 meeting (Air Force, Army,
CIA, DIA, Energy, FBI, Treasury, and Navy).
4. The UDIS also discussed the initiative by the Attorney
General which calls for establishing an inter-agency group which
would review leak cases which are submitted to the Department of
Justice with the recommendation that they be investigated by the,
FBI. Deputy Attorney General Mark Richard had indicated that he.
wanted Intelligence Community participation in the group and, in
fact, had suggested that the UDIS might constitute this review
group. UDIS members attending the 8 October 1982 meeting felt
that the UDIS did have a role to play in this area and requested
guidance from the Security Committee as,to whether UDIS should .
either participate in, or form the nucleus of, this inter-agency
group.
SECRET
UNCLASSIFIED WHEN
SEPARATED FROM
ATTACHMENT
Approved For Release 2009/03/23: CIA-RDP94B00280R001200050001-0
Approved For Release 2009/03/23: CIA-RDP94BOO28OR001200050001-0
. .
NATIONAL POLICY ON UNAUTHORIZED DISCLOSURES
I. Background
Unauthorized disclosures of classified information represent
a lack of discipline within the U.S. Government which may result
in one or more of the following: 1) the disclosure of classified
or other sensitive government information, 2) the compromise and
negation of various intelligence sources and methods, and 3) the
foreclosure of policy options available to senior governmental
decision makers. In many circumstances, unauthorized disclosures
have a negative and. debilitating impact upon the effective and
efficient functioning of government.
Over the years, successive Administrations have attempted
with varying degrees of success to eliminate such disclosures.
.It is clear, therefore, that a national policy on unauthorized
disclosures does exist, i.e. unauthorized disclosures must be
stopped. The most recent examination of the problem of unautho-
rized disclosures occurred in early 1982. At that time, an
interdepartmental group consisting of representatives from
Central Intelligence Agency, and the Departments of Defense,
Energy, Justice, State and Treasury, prepared a report (the
Willard Report) designed to improve the Government's ability to
protect classified information and prevent unauthorized
disclosures. The remedial steps suggested were:
a. that the Administration support legislation to
strengthen existing criminal statutes that prohibit the
unauthorized disclosure of classified information.
Rather than trying to prosecute federal employees under
the espionage laws, it was recommended that a new
statute be enacted which would make it a criminal
offense. for a federal employee or contractor to disclose
classified information to unauthorized. persons.;
b. that all persons with authorized access to
classified information be required to sign binding and
enforceable secrecy agreements acknowledging that they
OFFICIAL USE. ONLY
Approved For Release 2009/03/23: CIA-RDP94BOO28OR001200050001-0
Approved For Release 2009/03/23: CIA-RDP94BOO28OR001200050001-0
OFFICIAL USE ONLY
have been informed of their obligation to protect the
classified information to which they have access. These
secrecy agreements would include a prepublication review
requirement;
c. that agencies adopt appropriate policies to govern
contacts between media representatives and government
officials;
d. that each agency that originates or stores
classified information adcnt internal procedures to
ensure that unauthorized disclosures of classified
.information are effectively investigated and that
appropriate sanctions are imposed for violations;
e. that where the Department of Justice and the
affected agencies believe an investigation is warranted,
the FBI be permitted to investigate unauthorized
disclosures of classified information under circum-
stances where the immediate result of a successful
investigation would be imposition of administrative
sanctions rather than criminal prosecution;
f. that existing agency regulations be modified to
permit the use of polygraph examinations of government
employees under carefully defined circumstances; and
go that authorities for the federal personnel security
program be revised and updated.
There appears to be broad support for the recommendations set
forth in the Willard Report with the exception of the polygraph
and prepublication review provisions. There was some concern
that the polygraph would be objectionable to senior government
officials and military personnel and that it was too drastic,*
intrusive and unreliable to be used in most leak investiga-
tions. The proponents of polygraph testing, on the other hand,
point to thirty years of experience in utilizing the polygraph in
security investigations. This experience suggests that the
polygraph is not. only reliable, it serves as an important
deterrent to inappropriate handling of classified information.
Moreover, it was noted that the polygraph recommendation was very
narrowly focused. The polygraph would only be used when a small
number of individuals had been identified as potential suspects
and the examination itself would be limited to the unauthorized
disclosure being investigated and would not include lifestyle
questions.
Approved For Release 2009/03/23: CIA-RDP94BOO28OR001200050001-0
Approved For Release 2009/03/23: CIA-RDP94B00280R001200050001-0
? OFFICIAL USE ONLY ?
In a similar vein, the prepublication review requirement has
been viewed in some circles as inappropriate for senior
government officials and others whose post government activities
would involve the writing of numerous works for publication.
Proponents argued that existing secrecy agreements already
restricted such publication. They noted, moreover, that the U.S.
Supreme Court has indicated that the prepublication review
requirement was implied. in the granting of access to classified
information, whether or not an agreement had been signed.
Proponents, therefore, suggested that including a prepublication
clause in the secrecy agreement served only to make explicit
existing legal requirements. They argued, moreover., that it was.
only fair that individuals signing secrecy agreements be placed
on clear notice as to what their obligations were in this regard.
The Willard Report, after being approved by the Attorney
.General, was forwarded to Judge Clark,. Assistant for National
Security Affairs, for presidential approval and promulgation.
The Report has been with Judge Clark for some time and the
prospects of it being sent to the President prior to the November
elections appear dim. We.understand that Judge Clark has
requested explanations of the various provisions of the Report
from his legal officer but it is unclear when the Report will be
forwarded to the President. .
II. Issues for Decision:
There are three suggested strategies to stimulate action on
the Willard Report. The first option is to withdraw the Willard
Report, and begin again with a new study containing a different
mix of recommendations. For example, access to controlled
government facilities might be withdrawn if individuals (e.g.,
journalists) with such access knowingly compromised classified.
information. A new and restructured report might recommend an
Executive Order on the subject of unauthorized disclosures rather
than the National Security Decision Directive suggested by the
Willard Report.
The advantage of this option is that it capitalizes on the
additional thinking within the Community that has occurred since
the writing of the Willard Report. A paper with all of the
strengths but none of the supposed weaknesses of the Willard
Report could be written. The risk associated with this strategy
is that the new paper would compete against the Willard Report
and,'r.ather than stimulating action, would cause additional delay
and inaction resulting from a new protracted period of review.
Alternatively, the two reports might be returned to the Community
with the request'that a third draft be prepared which would meld
,the two papers. (SUPPORTERS OF OPTION 1: None);
Approved For Release 2009/03/23: CIA-RDP94B00280R001200050001-0
Approved For Release 2009/03/23: CIA-RDP94BOO28OR001200050001-0
? Vr r .Lk_L ILLJ VJti vLVL1 ?
The second option would be to retain the Willard Report
while eliminating the most controversial items. Each recom-
mendation would be evaluated in terms of its effectiveness in
addressing the leak problem, ease of implementation and degree of
controversy. On the basis of a cost-benefit analysis the
controversial issues would be eliminated to ensure implementation
of the remaining recommendations in the Willard Report.
The advantage of this approach is that it would diffuse the
controversy which has surrounded the Report and turn it into a
consensus document which would be palatable to all Community
agencies and presumably to those who would have to promulgate
it. The disadvantage of this strategy is that it might
prematurely compromis,7 two of the most important recommendations
(polygraph and prepublication review) contained in the Report
and, thus, reduce the effectiveness of efforts to eliminate
unauthorized disclosures of classified information. In this
regard, the view was expressed that despite deep Administration
concern about the problem of unauthorized disclosures, it should
be expected that the Community will have only one opportunity to
have this issue addressed by the President. Consequently, if the
Willard Report is weakened, it is unlikely that the Community
will be able to go back with additional recommendations.
(SUPPORTERS OF OPTION 2: Energy, State, OSD, DIA)
The third option is to support the Willard Report in its
entirety. The Report has been presented to Judge Clark as the
recommendation of the Interagency Group on Unauthorized Dis-
closures. The Report was signed by the Attorney General and is
fully supported by the Director of Central Intelligence. It is
for Judge Clark to take into account the comments of the various
agencies and to present the President with his recommendation.
Rather than prejudging this recommendation, option three would
simply encourage Judge Clark to reach a decision-as expeditiously
as possible.
The advantage of this strategy is that we will not be
negotiating against ourselves by revising our proposal even
before a response to our proposal has been received. By
supporting the Willard Report in its entirety, we ensure that all
of the recommendations will be fully considered. The dis-
advantage of this strategy is that the continued presence of the
controversial items, May result in continued paralysis of action
and may delay implementation of any part of the Willard Report.
(SUPPORTERS OF OPTION 3: Justice, Treasury, CIA, Army,. Navy, AF,
FBI, NSA,
Approved For Release 2009/03/23: CIA-RDP94BOO28OR001200050001-0
Approved For Release 2009/03/23: CIA-RDP94BOO28OR001200050001-0
0
POINTS FOR CONSIDERATION RELATIVE TO A
NATIONAL POLICY ON DAMAGE. ASSESSMENTS
L. Background
This paper represents a preliminary effort to examine the
damage assessment process to determine what, if anything, could
be done to optimize the process. Rather than attempting a
definitive study of the subject, an effort has been made to
identify issues which require further exploration. Positions
taken on these issues wi71-1pt-ermine what additional work is
necessary in this area.
As a point of departure it is useful to note that a national
policy on damage assessments is articulated in Information
Security Oversight Office (ISOO) Directive go. 1. (32 CFR.Part
2001). This Directive, which is binding on the various
departments and agencies, was promulgated pursuant to authority
granted the Director of that Office by the President in Section
5.2 of Executive,Order 12356 (April 6, 1982). The Directive
states in Section 2001.47:
Any person who has knowledge of the loss or
possible compromise of classified,information shall
immediately report the circumstances town official
designated for this-purpose by the person's agency
or organization. The agency that originated the
information shall be notified of the loss or
possible compromise so that a damage assessment may
be conducted and appropriate measures taken to
negate or minimize any adverse effect of the
compromise. The agency under whose cognizance the
loss or possible compromise occurred shall initiate
an inquiry to (a) determine cause, (b) place
responsibility, and (c) take corrective measures
and appropriate a, dmm'._pistrative, disciplinary, or
legal action.
The ISOO'Directive attacks the problems of loss or compromise
of.classified information along two dimensions. First, the
originating agency, that is the agency which owns the. material,
is charged with the responsibility to conduct a damage assessment
and to.take appropriate measures to negate or minimize any.
adverse effect of the compromise. Second, the agency with
responsibility for .the loss or compromise is required to
Approved For Release 2009/03/23: CIA-RDP94B0028OR001200050001-0
Approved For Release 2009/03/23: CIA-RDP94BOO28OR001200050001-0
? S E C R E T 49 -
determine how the loss occurred, to take corrective and remedial
steps to prevent the problem from recurring and to take
administrative, disciplinary. or legal action against those
responsible for the loss.
In discussing damage assessments, an expansive definition of
the term, and of the process, has been adopted. When an incident
.occurs, it would be expected that a four-step process would
begin:
First, a preliminary inquiry would be
undertaken to determine whether ther-.a has been a
compromise of classified information. If a
compromise has occurred, then a preliminary
judgment must be made as to whether the compromise
could reasonably be expected to cause damage to the
national security.
Second, if a compromise of classified
information has occurred and the probability of
damage to the national security cannot be
discounted, then an inventory of the classified
information involved would be prepared and the
impact of the compromise on the national security
would be evaluated.
Third, if it is determined that the compromise
could have a significant impact on the national
security, appropriate countermeasures to negate or
minimize the effect of the compromise would be
identified.
Fourth, remedial or corrective action would be
specified. An attempt would be made to identify
the person(s) responsible for the compromise and
administrative, disciplinary or legal action would.
be proposed to deal with the situation. Even when
it is not possible to identify the person
responsible for the compromise, it may be possible
to examine what went wrong. If existing procedures
are deemed adequate, but implementation has been
sloppy, employee notices or additional training may
be appropriate. If systemic problems or gaps in
regulations- or procedures are identified, then more
extensive corrective action would be required.
A. National Level Guidance With Respect To Damage
'Assessments- Investigative Triggers
There was near unanimity that a full-blown damage
assessment would not-be appropriate in every case and
inflexible requirements would be--counterproductive. If, for
2 -
Approved For Release 2009/03/23: CIA-RDP94BOO28OR001200050001-0
Approved For Release 2009/03/23: CIA-RDP94B00280R001200050001-0
0
?
example, a safe were left open in a controlled facility and
discovered by a security guard soon afterward, cataloging all
of the items in the safe and assessing the national security
impact of the possible compromise may not be necessary. On
the other hand, even in the above circumstance, if the open
safe contained a master list of safe combinations, it would
be prudent to change all of the safe combinations. Even at
the other end of the spectrum discretion is desirable. If,
for example, a diplomatic pouch containing large sums of
money were broken into and the money taken while other
material and documents were left untouched, a damage
assessment might not be required unless the theft were.
considered to be a cover for the photographing of the
documents.
Despite the unanimity that discretion must be built into
the system,. there was a division of opinion as to whether
there should be any national level guidance. It was
suggested that when specialized intelligence equipment or
classified military equipment is lost, a human source or a
technical collection system is jeopardized, a diplomatic
pouch containing classified information is lost, a secure
facility is penetrated, or espionage occurs, a full damage
.assessment should be required unless the agency head or
Apni-cs1Zee expressly determines that this is not necessary.
B. Improved Quality Control
At present there is no way of evaluating, outside of
existing chains of command, whether damage assessments when
done are well done. Although there is no clear evidence that
damage assessments are deficient, there is considerable
question about the extent to which they are merely
descriptive rather than analytical and prescriptive. There
is, moreover, no current ability to hold up a particularly
good damage assessment. as a model for others to emulate.
There is always the suspicion, however ill-founded, that
damage assessments prepared by the components most intimately
involved are self-serving documents which may inflate or
devalue impacts or which may mask or minimize problems,
procedural inadequacies or poor personnel or program
management
There was a clear consensus, however, that agencies
should not lose control of the damage assessment, process.
Each agency should conduct its own damage assessment and
should be free to structure an investigative: framework which
adequately reflects the realities of that agency. On the
other hand, there was less clarity as to whether adequate..
quality control could be assured at the program manager level
or whether a broader agency perspective would be helpful.
3 -
Approved For Release 2009/03/23: CIA-RDP94B00280 R001200050001-0
Approved For Release 2009/03/23: CIA-RDP94B00280R001200050001-0
? S E C R E T ?
It?was suggested that it might be useful to establish a
separate mechanism within each agency to ensure the timeli-
ness and quality of damage assessments. There was some
feeling that a separate mechanism which focused exclusively
on the quality and timeliness of such assessments could in
time appreciably enhance the value of such asssessments to
each agency.. The specific mechanism would vary according to
the unique configuration and structure of each agency. Each
quality control mechanism, however, would be empowerer' to
make recommendations involving specific damage assessments to
the extent that discrete deficiencies are found. In
addition, by analyzing large numbers of damage assessments
over time, the quality control mechanism could make
recommendations concerning improvement in the methodology and
approach taken in putting together such assessments. For
example, it could ensure that the substantive and technical
expertise represented by the operational components whose
information was compromised and the specialized knc,.vledge of
the analytical components able to assess the impact of the
compromise had been adequately utilized. In addition, it
could ensure that security, counterintelligence and
inspection or program audit perspectives had been included.
It also could review whether damage assessments could better
be conducted by individuals or teams specially designated to
examine a particular leak or by units with a permanent
membership. It could assess whether organizational changes
were needed in order to spur new thinking or whether there
was a need to create or improve institutional memory and
level of experience in examining compromises.
C. Assessment Implementation
The-most significant parts of a damage assessment are
its forward looking aspects. Obviously countermeasure
recommendations help to make a bad situation better. The
remedial or corrective steps which are designed to determine
cause, to place responsibility, to recommend administrative,
disciplinary or legal action, or to implement policy and.
procedural.chang.es are critically important. There is
considerable question, however, about the extent to which any,
recommendations which are made are actually implemented. It
is suggested,. therefore, that a tickler or review system .je
established to revisit damage assessments after a three or
six-month interval to determine. whether it is still "business
as usual," or whether the changes which have been made are
really working and are adequate to prevent a recurrence.
Opponents suggest that under current procedures, the
chain of command is -responsible for implementing corrective
or remedial measures; and that there is no need for any change
in the system. Proponents suggest that under the current
system the status of damage assessments, the status of.
various recommended courses of action, or even whether the
case has been closed from an administrative,,-disciplinary or
4 -
Approved For Release 2009/03/23: CIA-RDP94B00280R001200050001-0
Approved For Release 2009/03/23: CIA-RDP94BOO28OR001200050001-0
? S E C R E T ?
legal point of view often is unclear. In sum, proponents
suggest that there is such a variety and diversity of
disclosures which are reported through so many different
chains of command that appropriates r.dination and necessary
feedback very often is lacking.
D. Sharing of Information
The present damage assessment system is deficient
because of the paucity of mechanisms by which lessons learned
can be shared. There is some dissatisfaction with the
current, informal, ad hoc system of exchanging information.
It is recognized that there is a natural concern about airing
"dirty linen" in public. There are justifiable concerns
about security, particularly when compartmented or "bigoted"
programs'are involved. There also is the view that many of
the remedial measures proposed may be program or organization
specific with little relevance outside a very narrow
circle. To be sure there may be natural boundaries beyond
which the costs of sharing information may exceed the
benefits. However, even if it is argued that it is not
useful to share information outside these natural boundaries,
greater sharing of information than currently is the case
should be encouraged.
It is suggested that there is-a military hardware or
weapons system grouping. There is an Intelligence Community
and within that there is an SCI Community. At least within
each of these groupings information can be pooled. Mistakes
which have been made on one program or compartment may later
be made by individuals working on another program or in
another compartment. It often is possible to generalize from
remedial measures taken in one program so that other program
managers can benefit. More to the point, this can'be done
without touching upon the particularly sensitive
information. In the Boyce-Lee case, for example, it was not
necessary to discuss the specific company, or the specific
intelligence system involved in order to share with other
program managers the utility of the two person rule or the
desirability of instituting an industrial polygraph
program. The issue here is whether there should be some
national level guid,=.nce which encourages or mandates sharing
of information or whether the present system, which largely
leaves sharing of information to each program manager, is
adequate. ~
Currently, the Air Force has a newsletter (published 3
to 4 times a year) that synopsizes various cases involving
unauthorized disclosures of SCI which the Air. Force
determines to be of 'general applicability and interest. The
Air Force disseminates this newsletter throughout the SCI;
Community, both inside and outside the Department of
Defense. By means of this newsletter the SCI Community is
given the benefit of. Air Force experience in.a variety of
- 5 -
Approved For Release 2009/03/23: CIA-RDP94BOO28OR001200050001-0
I 1\GIGGJG LVV V/VV/LV VIlI-1\VI VZVVVLVVI\VV ILVVVVVVV 1-V
S E C R E T ?
unauthorized disclosure cases and is able to apply any
preventive measures necessary to safeguard against a
repetition elsewhere in the Community of the circumstances
which led to particular unauthorized disclosures.
It is suggested that the Air Force newsletter serve as a
model for other newsletters which would address the needs and
interests of various appropriate communities. The SECOM
could publish such a newsletter regarding cases of broad
interest to the Intelligence Community, in general, or to the
SCI Community, in particular. Similarly, the ISOO could be
tasked with publishing such a newsletter concerning
unauthorized disclosures within various communities of
interest that relate to the world of collateral classified
information. It is significant to note that DCID 1/19, as
currently revised, provides for sharing with the SECOM and
the DCI summaries of investigations and actions in
cases involving significant compromises.
Another area of discussion centered upon the proposed
establishment of an unauthorized disclosure data base. It
appears that the Department of Justice (DOJ) an,_: the Federal
Bureau of Investigation (FBI) are moving inexorably toward
establishing a data base which would contain all information
relating to unauthorized disclosures reported to them. DOJ
strongly believes that such a i.ata base would be useful to it
and to the FB-I in getting an analytical handle on the problem
of unauthorized disclosures. That is to say, DOJ is
interested in analyzing large numbers of unauthorized
disclosures to determine if there are any significant
commonalities, patterns, or trends that emerge from the data
that would aid the FBI in its investigations of such
matters. With this DOJ initiative on the horizon, it is
believed that an even broader data base would be useful to
agencies within various appropriate communities.
Under a proposal for a broad data base, the
participating agencies would, above some pre-determined level
of triviality, contribute information on unauthorized
disclosures to a central system, whether or not the
disclosures were reported to DOJ. The greatest concern with
the establishment of such a system was that in order for the
system to be. effective, it would require that all relevant
information regarding unauthorized disclosures be fed into
the stem. This might include very sensitive information.
The concern expressed fails?to take into account the?
fact that other very sensitive data bases already exist with
appropriate safeguards. For example, there is a Government-
wide register of human intelligence sources which, though
extremely sensitive, provides an invaluable reservoir of
- 6 -
Approved For Release 2009/03/23: CIA-RDP94B00280R001200050001-0
Approved For Release 2009/03/23: CIA-RDP94B00280R001200050001-0
I S E C R E T Q
information that enables the Intelligence Community to more
efficiently and effectively conduct its assessment and
recruiting activities. To avoid widespread dissemination of
sensitive information relating to unauthorized disclosures,
the. proposed system could be similar in design to the 4C
System, which is intended to contain an equally sensitive
data base of all SCI accesses for all SCI programs. Only a
limited number of people would have access to the proposed
system and an even more limited number would have access to,
the particularly sensitive information in such a system.
Hopefully, as a comprehensive analytical platform, such
a data base could ultimately become an important diagnostic
tool for the participating agencies. The data base would
provide useful information concerning the specific types of
information being disclosed, any correlation between types of
disclosures and government processes, any correlation between
types of disclosures and media representatives, and past
disinformation programs. The information gained from the
analysis of such a data base would assist in evaluating
existing security practices and developing any new ones
determined to be necessary. It would assist in developing
models of the various types of inadvertent disclosures. It
would assist in concentrating security resources in specific
areas where the risk of disclosure is high. It would quickly
identify old releases, isolate chronic leakers, develop
countermeasures for disinformation and deception programs.
Finally, it may be useful in predicting future trends with
-respect to unauthorized disclosures so that anticipatory
countermeasures may be implemented.
F. Regulations
As a final point it was noted that it would be useful
for those agencies which have not yet issued regulations
implementing ISOO Directive No. 1 to do so. In addition, if
any of the above recommendations are adopted, they might be
included-in existing or new regulations.
- 7 -
Approved For Release 2009/03/23: CIA-RDP94B00280R001200050001-0