25X1A
Approved For Release 2001/03/06 : CIA-RDP83B00823R000100080020-7
Next 3 Page(s) In Document Exempt
Approved For Release 2001/03/06 : CIA-RDP83B00823R000100080020-7
_' ? ~r' ear , vt:~'CLI
'LA r%
MIV13MIV Z' e 2001/03/06 CIAO 110 -3 j
^ UNCLAS.S-~r~oved
p 3 000100
ROUTING AND RECORD SHEET
SUBJECT: (Optional)
Office of Security Contribution
to Sources and Methods Listing
FROM.
25X1 A
EXTENSION
NO.
Policy and Plans Group
5311
DATE
7 March 1975
TO: (Officer designation, room number, and
building)
DATE
OFFICER'S
COMMENTS (Number each comment to show from whom
RECEIVED
FORWARDED
INITIALS
to whom. Draw a line across column after each comment.)
1.
C/PPG
7
7~
2.
DD/P$M
3.
DD/Security
7 975
1 975
4.
5.
6.
7.
OS Registry
8.
9.
10.
11.
12.
13.
14.
15.
A Fill 4 1
111 11111
-R-QQ AA
FORM USE
3-62 610 EDITIONS T:T SECRET CONFIDENTIAL USE ONLY ^ UNCLASSIFIED
V4 Approved Release 2001/03/06 : C.IA-RDP~00823R000100080020-7
Protection of Agency Intelligence Sources and Methods
1. Both the National Security Act of 1947 and the CIA Act of 1949
provide that "the Director of Central Intelligence shall be responsible for
protecting intelligence sources and methods from unauthorized disclosure."
Neither Act specifies the method or methods by which this is to be
accomplished.
2. There are a number of methods that can. be used to protect
intelligence sources and methods-from. unauthorized disclosure. Some
are currently in practice while others are being reviewed to determine if
they could supplement the current methods. One method of protection is
to deny access. We currently practice such a method by locking up docu.-
ments containing sources and methods information. We also deny access
by our compartmentization techniques and need-to-know rules.
3. Another method of protection is through the classification
authority. The authority for today's classification system is derived from
a series of Executive orders issued by the President pursuant to his own
constitutional and statutory authorities. The current classification authority
specifies, in a general sense, what types of information qualifies for pro-
tection and provides declassification procedures, which, even for infor-
mation originally classified by the Agency, does not give the DCI the .final
authority as to what will be declassified.
4. Other methods of protection are criminal sanctions and contractual
restrictions. Both of these methods have been employed. in connection. with
the classification system. The Espionage Laws make it a criminal act to
reveal certain classified information. Unfortunately, these laws are not neces-
sarily directly applicable to an act of unauthorized disclosure of an Agency
intelligence source or method. Further, these laws require the Government to
prove an intent to injure the United States was associated with the disclosure
of the classified information. Proving intent to injure the United States is
difficult. There have been some proposals to make the unauthorized .
revelation of Agency sources and methods by an Agency employee a crime
If such a proposal were adopted by Congress, the sources and methods
determinations described in the latter paragraphs of this paper will probably
be required. Even if such criminal sanctions are not adopted however, the
determinations as outlined below will be useful in protecting sources and
methods.
Approved For Release 2001/03/06 : CIA-RDP83B00823R000100080020-7
Approved For Rel.e 2001/03/06 : CIA-RDP83B00 R000100080020-Z,
5. Many parts of the Government, including the Agency, require
prospective employees to sign a secrecy agreement prior to or coincident
with their initial employment. Under such agreements, Agency employees
agree not to reveal or publish classified material without authorization from
the Agency. Such agreements have been upheld by the courts as valid and
enforceable.
6. The Agency's most recent experience in enforcing such an
agreement is the "Marchetti Case." There, the Agency, having learned that
ex-employee Marchetti intended to publish a book about the Agency, obtained
an injunction prohibiting his doing that until after the Agency had removed
the classified materials from the proposed manuscript. Furslaant to the
injunction, Marchetti submitted the completed manuscript prior to publication
and the Agency found a number of items that we maintained were classified.
Disagreeing with that finding, Marchetti filed suit challenging the validity of
the classification. The Government then had the burden of proving that
the previous finding was proper. Some items were relatively direct. A
manual could be produced which evidenced a previously made determination
that certain information should be classified at a specific level. For example,
such a manual might have contained the determination that the resolution of a
particular photographic reconnaissance system is to be classified SECRET.
The District Court, in examining each of the contested items, could easily
see the evidence of the prior determination, compare it to what. Marchetti
wanted to publish and find justification for requiring it to be withheld from
publication. In those cases in which such documented evidence could be
introduced, the court upheld the Agency position. In a number of cases,
however, such documented prior determinations did not exist. In general,
the court ruled against the Agency on these items. While this ruling has been
just overruled by the Court of Appeals, an improtant point is evident.. That
point is that the most direct and comprehensible method of protection of
intelligence sources and methods will probably get the widEst support by
thhe,courts.a
7. While for the moment, pending re-hearing in the District Court
and/or grant of certiorari by the Supreme Court, the Agency seems to be
"on top" of the Marchetti-type situation. However, we face a multitude of
Freedom of Information Act (FOIA) cases. Under that Act there are nine
exemptions which can be the basis for denying a request for Agency docu-
ments pursuant to the Act. The first is material classified pursuant to
Executive order. The third is for material specifically exempted from dis-
closure by statute. While it has not been litigated, it is reasonable to assume
that the sources and methods provisions of the 1947 and 1949 Acts fall within
the scope of this third exemption.
Approved For Release 2001/03/06 : CIA-RDP83B00823R000100080020-7
Approved Release 2001/03/06: CIA-RDF~B00823R000100080020-7
8. When the Agency is involved in FOIA litigation, as it will most
assuredly be, it will be convincing to be able to argue that a request should
be denied because it is for materials containing information which is exempted
from disclosure by the sources and methods provisions of our 1947 and 1949
Acts. However, to be able to pursue this route, the Agency should be able
to be in the position of showing that a prior determination had been made by
the Director that the particular aspect of either a source or method that is
now the subject of the FOIA request is within the scope of his statutory
responsibility.. In otherwords, the DCI should, at the earliest possible date,
undertake to adopt, pursuant to his statutory responsibility, .;a detailed'. list% ngr-
of the various. aspect ~f i tellig nce sources an d -':the various aspects o
intelligence, e4lzvd hat r qw. a protection fro .a unauthorized disclosure?-
s {
In order to be able to undertake such an adoption f. a list of these aspects
10. The list should consist of an itemization of each individual aspect
of intelligence sources and each individual aspect of intelligence methods that
require protection. The individual aspects hopefully can be to some degree
general yet without being so general that they would include aspects that do
not require protection. As an example, the listing of "all names of agents of
the Agency" as an aspect of intelligence sources that should be protected would
probably be too broad as the name itself is not what requires protection. What
requires protection is the association of the name with the Agency. Accordingly,.
the aspect should be described as "the association of the name of any Agency
agent with the Agency." This kind of general description, property limited,.
precludes the necessity of having to list the specific name of each Agency agent
as an aspect that requires protection. Similarly, an item such as "the names of
all Agency employees" would be too broad as the Agency openly acknowledges
the names of some of its employees. A more limited description might be
"the name of any Agency employee, who has served, is serving or may serve.
under cover, the revelation of which might damage the future effectiveness of
such cover arrangements. "
11. The objective of the current undertaking is to definitively list each
aspect of intelligence sources and methods in enough detail so as not to include
non-protectable information, yet in enough generality that can protect the full
scope of the particular aspect. Each Agency office should list all those aspects..
within their particular responsibility. Hopefully the first draft of such lists
can be forthcoming by no later than 21 February.
- 3
Approved For Release 2001/03/06 : CIA-RDP83B00823R000100080020-7
25X1A
Approved For Release 2001/03/06 : CIA-RDP83B00823R000100080020-7
Next 1 Page(s) In Document Exempt
Approved For Release 2001/03/06 : CIA-RDP83B00823R000100080020-7
Approved ForgPlease 2001/03/06 : CIA-RDP8310823R000100080020-7,
26 February 1975
MEMORANDUM FOR: Deputy Director of Security (P&M)
ATTENTION Chief, Policy and Plans Group
SUBJECT Protection of Agency Intelligence
Sources and Methods
REFERENCE Form 610 to DD/PTOS from DD/P&M,
dtd 18 Feb. 75, same subject
1. The PTOS Directorate, with its focus on
physical and technical security, has a composite
security methodology which must be considered, for
purposes of reference exercise, an intelligence metho-
dology requiring protection. In essence, the real
concern lies, of course, not in identifying the com-
ponent parts (left column below) of the composite
methodology, but rather with the specifics of these
component parts, i.e., the modus operandi, equipment
specifications, specific techniques, etc. (right
column below).
2. It is suggested the total PTOS methodology
be dissected as follows with the items in the right
column considered appropriate candidates for method
protection tactics:
25X1A
Approved For Release 2001/03/06 : CIA-RDP83B00823R000100080020-7
25X1A
Approved For Release 2001/03/06 : CIA-RDP83B00823R000100080020-7
Approved For Release 2001/03/06 : CIA-RDP83B00823R000100080020-7
Approved Fltelease 2001/03/06 : CIA-RDPMB00823R000100080020-7
25X1A
2. Please contact the undersigned for any elaboration
or discussion of the approach taken above.
25X1A
Deputy Director o'f Security (PTO
Approved For Release 2001/03/06 : CIA-RDP83B00823R000100080020-7
Approved For *lease 2001
0823R000100080020-7
2 5 FEB 1975
25X1A
MEMORANDUM FOR: Deputy Director of Security (P&M)
ATTENTION Chief, Policy and Plans Group
SUBJECT Protection of Agency Intelligence
Sources and Methods
1. Reference is made to your request of 18 February
1975 that this Directorate submit a list of intelligence
sources and methods which require protection.
2. A review of the activities of this Directorate
has been conducted and the following intelligence sources
and methods items require protection from unauthorized
disclosure:
T
Approved For Release 2001/03/06 :
A-RDP83B00 3R000.1D0.0$0Q2O-
Approved For lease 20", C E 4 P83,0823R000100080020-7
25X1A
3. Please advise if any additional data are desired.
25X1A
Deputy Director of Security (PSI)
n
ON Ft
C
E ,1AL
Approved For Release 2001/03/06 : CIA-RDP83B00823R000100080020-7