PROPOSED DOD STUDY OF UNAUTHORIZED DISCLOSURE OF GOVERNMENT SECRETS

Document Type: 
Collection: 
Document Number (FOIA) /ESDN (CREST): 
CIA-RDP94B00280R001200110004-0
Release Decision: 
RIPPUB
Original Classification: 
C
Document Page Count: 
20
Document Creation Date: 
December 22, 2016
Document Release Date: 
April 20, 2010
Sequence Number: 
4
Case Number: 
Publication Date: 
April 27, 1976
Content Type: 
MEMO
File: 
AttachmentSize
PDF icon CIA-RDP94B00280R001200110004-0.pdf850.5 KB
Body: 
Sanitized Copy Approved for Release 2010/04/20: CIA-RDP94B00280R001200110004-0 ? l DCI/IC 76-004 27 April 1976 MEMORANDUM FOR: Chairman, Security Committee Executive Assistant, ICS Proposed DoD Study of Unauthorized Disclosure of Government Secrets 25X1 25X1 b. desires a similar paper, again answering the foregoing questions, on the work that Proctor's people are doing on this subject. feels that the papers need not be long; i.e., no more than two pages each. c. Please prepare a letter to Mr. Ellsworth in response to his 21 April letter to Mr. Bush. The letter should be pleasant but firm, and should include a concise statement on what we are doing with respect to secrecy and declassification. REFERENCE Your memorandum dated 26 April, same subject, SECOM-D-147 requests that you or your Committee take the following actions to close the loop on this problem. a. Prepare a paper on the Security Committee work regarding this subject; what are recommendations, what are the milestones on implementation, what problems are still unsolved, and what is the future course of Committee action. 2. lalso desires that a talker be prepared for the DCI, should Mr. Bush decide to discuss this subject with General Scowcroft. Another talker should be prepared for discussion of this subject at the CFI. Ts,, Sanitized Copy Approved for Release 2010/04/20: CIA-RDP94B00280R001200110004-0 Sanitized Copy Approved for Release 2010/04/20: CIA-RDP94B0028OR001200110004-0 M CONFIOFAMM~ M UNITED STATES INTELLIGENCE BOARD SECURITY COMMITTEE SECOM-D-147 26 April 1976 MEMORANDUM FOR: Deputy to the DCI for the Intelligence Community 25X1 FROM SUBJECT REFERENCE y Mr. E savor wou usurp some o - 11 National Security Act of 1947 states: Chairman, Security Committee Proposed DoD Study of Unauthorized Disclosure of Government Secrets Letter to the DCI from Mr. Ellsworth, Dated 21 April 1976 1. The broad Government-wide study proposed by /~- The th 1A - f th DCI' authorit "The DCI shall be responsible for protecting intelligence sources and methods from unauthorized disclosure. " "The DCI will ensure that appropriate programs are developed which properly protect intelligence sources, methods and analytical procedures. IT ILLEGIB ILLEGIB 2. At the present time Dr. Edward Proctor, DDI, is chairing a group of senior officials in the Intelligence Communi the purpose of which is to develop principles and guidelines for the, classification and control of intelligence. The goal of his group is to protect those aspects of intelligence sources and methods that truly deserve protection and to allow broader access to intelligence by applying the lowest appropriate classification and minimum dissemination controls. This includes declassification and release to the public. Attachment LiUonV i P - Downgrade LO Unc asst ie ~?_ E ,^? d 1 when removed from RBI I T4O PEFit i~,IrOYal5 GNU GLLnS~PF"l-er -~ f d OF E. 0. 11552, AUTOGa1ATiCALLY OtDV.' 1 ! ------------------- (Insert date or event) Sanitized Copy Approved for Release 2010/04/20: CIA-RDP94B0028OR001200110004-0 Sanitized Copy Approved for Release 2010/04/20: CIA-RDP94B00280R001200110004-0 4D CCNFICEPWI. 40 3. The Intelligence Community has been greatly frustrated by unauthorized disclosures of classified information for many years. A working group of the Security Committee completed a study on unauthorized disclosures of sensitive intelligence sources and methods. In its report dated 16 December 1975 (attached), nine recommendations were made. The Security Committee has I not reached a final agreement on these recommendations. 4. The current DoD proposal appears to go beyond protection of sources and methods. Mr. Ellsworth indicates Yarmolinsky's group will cover not only intelligence data and methods, but military and diplomatic secrets as well. Such a broad-sweeping study by people outside of government of protection of government secrets should more appropriately be ordered by the National Security Council rather than by a department of the Executive Branch. 5. Such a study by people outside of government might prove valuable at this time. Numerous studies by the Intelligence Community have not led to a solution of this frustrating problem. Recommendation by an unbiased public group might find support in both the public sector and government circles. RECOMMENDATION: The DoD proposal goes beyond the DCI's responsibilities for protecting intelligence sources and methods. The establishment of such a non-government group to make a study encompassing "all government secrets" should more appropriately be tasked by the NSC. Cooperation by the government agencies concerned would be greater if such a study were undertaken at the request of the NSC rather than DoD. Chairman, Security Committee CONF!DENTIMM Sanitized Copy Approved for Release 2010/04/20: CIA-RDP94B00280R001200110004-0 Sanitized Copy Approved for Release 2010/04/20: CIA-RDP94B0028OR001200110004-0 DEFENSE ' INTELLI'GENCE' AGENCY WASHINGTON, D.C. 20301 16 DEG 1975 C-52,673/DS-6 MEMORANDUM FOR THE UNITED STATES INTELLIGENCE BOARD, CHAIRMAN, SECURITY COMMITTEE SUBJECT: Unauthorized Disclosures of Sensitive Intelligence Information (U) Reference: Memorandum USIB-D-9.2/57, subject as above, 8 October 1975. 1. (FOUO) This memorandum responds to your request that the Ad Hoc Working Group, which prepared the report forwarded with reference, look into the broader aspects of subject problem. 2. (U) A just-completed DIA study on this subject prepared by Colonel'Richard L. Cary, provided much of the material contained in this report. Input was also furnished by CIA; LtCol E.B. Haworth of the Air Force; Mr. John R. Brock, General Counsel of DIA who prepared the legal brief attached to this report. 3. (C) DISCUSSION: a. (C) SUMMARY: In preparing this study, we analyzed reports of investigation dealing with unauthorized disclosures of sensitive intelli- gence information in the news.media covering the past two years. Note was taken of recent Intelligence Community action to examine the effective- ness of present regulations and procedures to cope with this difficult problem to include the review of dissemination lists; introduction of color-coded Defense Intelligence Notices (DIN's) by DIA to emphasize sensitivity, warn of criminal penalties, and insure that recipients re- ceive only information of concern to their particular office; and brief- ings of high-level officials to insure they are familiar with security review procedures. Additionally, note was taken of the general feeling that there is a lack of any enforceable legislation for punishing personnel found to be making unauthorized disclosures to reporters. Our primary recommendation is that there is an urgent need for a central office of record to track action taken by member agencies concerning leaks which jeopardize sensitive sources and methods. Additionally, it was noted that we repeatedly and erroneously express concern with leaks which allegedly damage sensitive sources when in fact the information concerned is from the source rather than about it. b. (U) NO ONE OFFICE OF RECORD: Currently there is no one office in the Intelligence Community which maintains a complete record of those unauthorized disclosures of sensitive intelligence information which Jeopardize important collection programs. As a result, there is no 1 I.'I----------7 A~ljp'9.V----------. Sanitized Copy Approved for Release 2010/04/20: CIA-RDP94B0028OR001200110004-0 Sanitized Copy Approved for Release 2010/04/20: CIA-RDP94B0028OR001200110004-0 effective Intelligence Community-wide system for ensuring that appropriate investigation of these leaks is conducted and that the extent of real damage to sensitive sources and the costs concerned may be determined. Such data could prove most useful for supporting needed legislation with criminal sanctions for "leakers" and for informing Congress of the cost to the tax- payer of unauthorized disclosures which compromise sensitive and costly intelligence collection programs. c. (C) LEAKS ARE LOCAL: The timing and nature of unauthorized dis- closures indicates they are being made in the Greater Washington area by, other than action officer level, personnel interested in supporting a particular cause or policy (see enclosure 1 for listing of leaks and apparent motive for unauthorized disclosure). Not all of these leaks originate in the Executive Branch of the Government. d. (FOUO) Investigations of unauthorized disclosures of sensitive intelligence to representatives of the news media have been conducted primarily to attempt to identify the person(s) making such unauthorized disclosures. Such attempts have been unsuccessful primarily because of investigative restraints and the wide dissemination of intelligence reports. It is believed that insufficient effort has been made to assess the real damage to sensitive sources and methods. In many instances, we have been prone to accept assessments indicating grave damage to sensitive sources and methods when, in fact, the compromised information was from, rather than about, the source and/or method concerned. e. (FOUO) The agencies in the Intelligence Community which produce intelligence reports have repeatedly reviewed the dissemination given such reports in order to reduce the number of recipients, if possible. In spite of such efforts, there is still legitimately a relatively wide dissemin- ation of these reports within and outside of the Executive Branch of Government which, together with investigative limitations, make it difficult, if not impossible, to identify the person(s) making unauthorized disclosures. f. (FOUO) All so-called press leaks do not necessarily result from intent on the part of the individual to disclose.classified information. In some instances inadvertant disclosures are made simply because the in- dividual is not aware that he is in fact providing classified information. It is not difficult under this circumstance for a capable aggressive in- vestigative reporter to extract classified information from several un- witting persons together with other sources (such as congressional testimony), combine- ' such information and prepare articles containing material which the Government maintains is highly classified. Sanitized Copy Approved for Release 2010/04/20: CIA-RDP94B0028OR001200110004-0 Sanitized Copy Approved for Release 2010/04/20: CIA-RDP94B0028OR001200110004-0 g. (U) Normally, the assignment of TOP SECRET, SECRET, or CONFIDENTIAL markings should provide adequate protection to the vast majority of intelli- gence reports. The assignment of inflated classifications or the placing of unwarranted restrictive handling caveats, or both, on such reports degrades the entire information security system. h. (U) There is now legislation "on-the-books" which has primary application to the leak problem, specifically Section 793 of Title 18, USC. Notwithstanding this, however, there has been reluctance to effect criminal prosecution of person(s) making unauthorized disclosures to rep- resentatives of the news media. A legal brief on the "Legal Authorities,: for Protection of Security Information; Punitive Actions Applying to Breach of Security" prepared by Mr. John R. Brock, General Counsel of DIA is contained in enclosure 2. Mr. Brock concludes that "The espionage statutes and other miscellaneous provisions, are in my opinion more sig- nificant as enforcement tools than could be indicated by the limited number of incidents in which they have been used." In addition, the Senate Committee on the Judiciary currently has under study Bill S-1, Criminal Justice. Reform Act of 1975, which would provide some additional measures for dealing with this difficult problem. i. (U) A degradation of the information security system and of the morale of our personnel is a natural consequence of seeing continued dis- closures of highly sensitive information in the news media combined with the feeling that little can be done to prevent such leaks. j. (U) Many recipients of intelligence information are unsure as to what specific information is classified. The classification guide is an essential part of the security program. Vast sums of money are expended in safeguarding classified information and great detail given to controlling and accounting for classified documents. But not enough attention seems to be given to the actual act of classifying information. When some official classifies information, this causes such information to be entered into a system of guards, safes, locks, alarms, vaults, security investigation, controls and accountability--not to mention the very complex and expensive industrial security program to protect the production of classified hardware. Quite often classification actions are subjective and without any sub- stantial basis for classification in the first place. Up-to-date classi- fication guides, in proper content and in a usable format, covering all plans, programs and projects are considered necessary in order to provide for consistent and justifiable classification actions. k. (U) When unsuccessful in satisfying their story requirements through normal public affairs channels, news media representatives frequently de- velop their own sources. Often, officials in the Washington area, particu- larly those newly assigned, are at a loss as to how to react to aggressive 3 Sanitized Copy Approved for Release 2010/04/20: CIA-RDP94B0028OR001200110004-0 Sanitized Copy Approved for Release 2010/04/20: CIA-RDP94B0028OR001200110004-0 00 00 reporters when direct contacts are made. They are unaware as to what extent policy permits or encourages their cooperation with the news mdeia.%/ Officials who are called on to brief reporters are in a particularly vulnerable position when the subject being briefed has many aspects that are classified. 1. (FOUO) In addition to tightening up personnel, physical and in- formation security procedures, there are a number of other actions that the intelligence producers/disseminators can take. These include the ex- pedite authorized releases to the public of leak-prone information after a proper security review (see enclosure 3 for additional recommendation). 4. (FOUO) CONCLUSIONS: a. Highly sensitive intelligence information can be protected over extended periods of time only by severely limiting access to such in- formation. b. There is an excessive amount of source and technical data in general dissemination reports. c. While measures must be taken to reduce the number of leaks, it will be difficult to completely eliminate such unauthorized disclosures because of the nature of our open society, with its aggressive and competent investigative reporters and special interest, groups. d. A central office to maintain a record of bona fide unauthorized disclosures of highly sensitive intelligence information for the Intelli- gence Community is needed. Currently such a record is not available. Additionally, some agencies/departments expend much time and effort investigating these leaks, while others take little or no action as a result of such unauthorized disclosures. e. DIA investigation of the leaks of information during the past two years has disclosed that most involved information from, rather than about, a sensitive intelligence source. 5. (FOUO) RECOMMENDATIONS: a. That USIB member agencies support Senate Bill S-1. b. That the IC Staff be assigned the task of recording leaks to the press of sensitive intelligence information and action taken by the USIB member agencies to investigate and otherwise combat this difficult problem. Such effort should include the cataloging of those sources and methods Sanitized Copy Approved for Release 2010/04/20: CIA-RDP94B0028OR001200110004-0 Sanitized Copy Approved for Release 2010/04/20: CIA-RDP94B0028OR001200110004-0 00 compromised by past leaks and the real damage to sensitive collection programs (e.g. compromise of sensitive sources and methods) rather than expending an inordinate amount of time and effort in dealing with "in- formation" disclosed by the leaks concerned. Much assistance, including computer time, could be provided by CIA, since it is colocated with the IC Staff and currently has the nucleus of a program. c. That producers of intelligence take positive action to review in- telligence reports prior to their publication to ensure that they do not contain information which could reveal and damage sensitive sources and methods. d. That detailed source and highly technical data not be included in general dissemination reports but provided only to those relatively few officials with a clear need-to-know and interest in such information. e. That detailed paragraph marking be required in all intelligence documents. f. That security classification guides be prepared for all intelligence documents. g. That a vignette be prepared under the cognizance of the IC Staff for presentation to senior officials in the Washington, D.C. area who may have dealings with news media representatives. The presentation should deal with the philosophy, procedures, and restrictions governing their relations with the news media. It should explain how and why sensitive sources and methods can and must be protected. This vignette could take the form of a film strip and portable projector self-contained in an attache case. The presentation should be no more than 8-10 minutes and made available to an official to be viewed at his own convenience by merely flipping a switch. (DIA has on hand several recent briefings presented to the Assistant Secretary of Defense (Public Affairs) and his principal assistants which can be made available). 3 Enclosures a/s Q GEOR A. HARIAS Chaff n, o king Group on Unauthori d Disclosures Sanitized Copy Approved for Release 2010/04/20: CIA-RDP94B0028OR001200110004-0 Sanitized Copy Approved for Release 2010/04/20: CIA-RDP94B0028OR001200110004-0 OFFICIAL ROUTING SLIP UNCLASSIFIED 1 ONFIDENTIAL SECRET TO Attached are the papers you requested on the Security Committee deliberations and Dr. roctor's activities in regard to secrecy and compartmentation. STAT STAT ~x~..l~ Ado K1 w STAT STAT 4/28/76 UNCLASSIFIED CONFIDENTIAL j j SECRET FOIM NO. 237 Use previous editions ^ 1-67 Sanitized Copy Approved for Release 2010/04/20: CIA-RDP94B0028OR001200110004-0 Sanitized Copy Approved for Release 2010/04/20: CIA-RDP94B0028OR001200110004-0 ? UNITED STATES INTELLIGENCE BOARD SECURITY COMMITTEE SECOM-D-148 28 April 1976 STAT FROM . SUBJECT 11 Deputy to the DCI for the Intelligence Community In( Chairman, Security Committee Intelligence Information 1. This memorandum is in response to your request of 27 April 1976 for information about the Security Committee's actions regarding unauthorized disclosures of sensitive intelligence infor- mation. 2. A working group of the Security Committeeccompleted a study on unauthorized disclosures focusing on those appearing in the news media covering the past two years. The recommendations were rather broad and to a certain degree will probably overlap some of those which are being considered by Dr. Proctor's group. The Committee has been considering which recommendations should be forwarded to USIB, but to date has not arrived at an agreed upon paper. It is again sc eduled for iscu on a our12May meeting. ng. Recommendations will then be sent to USIB for their approval and implementation in the community. 3. Some of the major recommendations being considered are as follows. Additional ones are attached. (a) That the IC Staff be assigned the task of recording leaks (community leak data base) and action taken by member agencies to investigate and otherwise combat this problem. Sanitized Copy Approved for Release 2010/04/20: CIA-RDP94B0028OR001200110004-0 Sanitized Copy Approved for Release 2010/04/20: CIA-RDP94B0028OR001200110004-0 (b) That producers of intelligence take positive action to review intelligence reports prior to publication C. to ensure that they contain no information which could d I reveal and damage sensitive sources and methods. g g y data not be included in general dissemination reports. (d) Use of detailed paragraph markings where feasible. (e) That security classification guides be O J C prepared for all intelligence documents. 4. Probably the major problem now being encountered is resources. The costs for establishing a leak data base could be c nsi le, and since we are co-located with CIA, it was felt ,' that they would have that burden. They are reluctant to agree to ~/ such a proposal under these circumstances. The manpower required to carry out other of these recommendations could also be To undertake extensive reviews of material, educational programs, etc. , require extra burdens to be placed on already over-extended per sonnel. STAT Sanitized Copy Approved for Release 2010/04/20: CIA-RDP94B0028OR001200110004-0 technical (c) That detailed source and hi hl Sanitized Copy Approved for Release 2010/04/20: CIA-RDP94B00280R001200110004-0 RECOMMENDATIONS OF THE AD HOC WORKING GROUP ON UNAUTHORIZED DISCLOSURES 1. Conduct a review of current hard-copy distribution categories to identify those recipients who have a valid need to be informed of current intelligence information in general terms, but who do not have a "must know" need for the type of highly-detailed reportage contained in intelligence publications. 2. Institute the use of a publication similar to the Executive Summary (EXSUM) as a substitute for NIB/DIN distribution to those recipients who do not require such detailed information. 3. Establish new and more restrictive distribution list for high-leak potential intelligence reports. Utilize such lists to further reduce dissemination of "high-risk" items. Also utilize authorized disclosures via special high-level ad hoc groups,formed for this purpose. 4. Carefully edit reports with high-leak potential to remove sensitive source data and collection capability indicators. Also, reduce unessential technical details, wherever possible. 5. Encourage high-level policy planners-to seek assistance in sanitizing intelligence reports that they consider suitable for release to the press. 6.- Establish an indoctrination program for all personnel concerned to acquaint them with: a. The real threat to sensitive and costly intelligence collection programs posed by unauthorized disclosures. B. The means of preventing such disclosures. c. Possible ways to reduce the impact of an anticipated unauthorized disclosure. d. The personal responsibilities of each individual in this endeavor. 7. Publish security flyers periodically to remind all concerned of the threat posed by unauthorized disclosures. Such flyers should be disseminated to both personnel involved in the production of intelligence reports and to recipients of intelligence information. 8. Institute a system of staggered distribution of high-leak potential items, utilizing EXSUM, ORCON or otheijhighly restrictive security markings, for initial distribution in order to reduce the attractiveness of such items. 9. Consider the usage of special "no copy" paper for highly sensitive items identified/selected for extremely limited local distribution. ILLEGIB Sanitized Copy Approved for Release 2010/04/20: CIA-RDP94B00280R001200110004-0 Sanitized Copy Approved for Release 2010/04/20: CIA-RDP94B0028OR001200110004-0 DoD Study of Unauthorised Disclosure of Government Secrets Talking Paper, w Proposal -- A broad study of unauthorized disclosure of government -- Study effort chaired by Adam Yarmolinsky. Panel to consist of people outside of government. The study to give some .improved insight into the nature and sources of the problem. Panel's Terms of Reference -- Will address itself to the problem of securing better protection for those secrets, including not only intelligence data and methods, but military and diplomatic secrets as well. It will examine: - Motivation for disclosure. - The impact of mistrust and alienation in popular attitudes toward government. - The feasibility of better methods of selecting and training persons handling classified materials. - The affects of over cla s sification and delayed declassification. - The tradeoffs between wider dissemination and better protection of secrets both within and outside of the government. - The possibilities for reducing unnecessary dissemination of secrets within,-goviitnment. Sanitized Copy Approved for Release 2010/04/20: CIA-RDP94B0028OR001200110004-0 Sanitized Copy Approved for Release 2010/04/20: CIA-RDP94B00280R001200110004-0 DCI Authority The National Security Act of 1947 states: The DCI shall be responsible for protecting intelligence sources and methods from unauthorized disclosure. Executive Order 11905 states: The DCI will ensure that appropriate programs are developed which will properly protect intelligence sources, methods and analytical procedures. The DCI will establish a vigorous program to downgrade and declassify foreign intelligence information as appropriate and consistent with E. 0. 11652. Actions Currently Underway Dr. Proctor's Group: - Dr. Proctor is chairing a group of senior intelligence community officials concerned with guidelines for classification and control of intelligence, - The goal of this group is to protect those secrets which must be protected, and - Provide for broadest possible dissemination to those who have a need-to-know intelligence information. - Includes declassification and release to the public. -- Security Committee: - A working group of the Security Committee recently completed a study on unauthorized disclosures of sensitive intelligence sources and methods. - Covered reports of investigations dealing with unauthorized disclosures appearing in the news media over past two years. Sanitized Copy Approved for Release 2010/04/20: CIA-RDP94B00280R001200110004-0 Sanitized Copy Approved for Release 2010/04/20: CIA-RDP94B0028OR001200110004-0 ILLEGIB Sanitized Copy Approved for Release 2010/04/20: CIA-RDP94B0028OR001200110004-0 Sanitized Copy Approved for Release 2010/04/20: CIA-RDP94BOO28OR001200110004-0 TRANSMITTAL SLIP I D TO: D/DCI/IC ROOM NO. I BUILDING REMARKS: FROM: DCI ROOM NO. BUILDING EXTENSION FORM N REPLACES FORM 3r,8 (47) 1 FES 505 -241 WHICH MAY BE USED. Sanitized Copy Approved for Release 2010/04/20: CIA-RDP94B00280R001200110004-0 Sanitized Copy Approved for Release 2010/04/20: CIA-RDP94B0028OR001200110004-0 DIRECTOR OF IN' AIR DAN: What does order say on this. On attached I have scribbled some thoughts. If I am clear in my recollection that the order gives DCI the lead on this then we should advise Elsworth (as I scratched out in rough on pages attached) that a. he is free to he wants. but b) I have the lead on this and if the study is to have any affect on policy- the guy should make his stuff av available to us mn timely fashion. I think I need a consicse statemnt on what we are now doing on a. secrecy b. declassifification...... Please darft pleasant but firm letter tp Ellsworth for prompt mailing..... GB 4-R25 Sanitized Copy Approved for Release 2010/04/20: CIA-RDP94B0028OR001200110004-0 Sanitized Copy Approved for Release 2010/04/20: CIA-RDP94B0028OR001200110004-0 'UNCLASSIFIED I I AWMIDENTIAL I I SECRET EXECUTIVE SECRETARIAT Routing Slip ACTION INFO DATE INITIAL 1 DCI 2 DDCI 3 S/MC 4 DDS&T 5 DDI 6 DDA 7 DDO 8 D/DCI/IC 9 D/DCI/NI 10 GC 11 LC 12 IG 13 Compt 14 D/Pers 15 D/S 16 DTR 17 Asst/ DCI 18 AO/ DCI 19 20 21 22 we- /91/= /. ,,1 e s Z_ g- , te A.-,cG' Executive Secretary 3637 (1-75) Sanitized Copy Approved for Release 2010/04/20: CIA-RDP94B0028OR001200110004-0 Sanitized Copy Approved for Release 2010/04/20: CIA-RDP94B0028OR001200110004-0 THE DEPUTY SECRETARY OF DEFENSE WASHINGTON, D. C. 20301 Honorable George Bush Director of Central Intelligence Washington, D. C. 20501 r being studied are, o course, o gene 21 APR 1976 A broad' study of unauthorized disclosure of government secrets is going to be undertaken at my initiative. The study effort will be chaired by Adam Yarmolinsky. A panel of. people outside of government will be con- stituted and focused on the problem. I am especially interested that the study give us some improved insight into the nature and sources of this problem. The terms of reference agreed with him are attached. When the panel has been formed and the list of its other members is completed I will send it to you. Adam will want to talk to you in more detail about the objectives of the study and how it should proceed. You may want to follow the study as it proceeds since the problems ' al concern f f Warm regards. .1) 16 wW k