Published on CIA FOIA (foia.cia.gov) (https://www.cia.gov/readingroom)


DIA PRESENTATION

Document Type: 
CREST [1]
Collection: 
General CIA Records [2]
Document Number (FOIA) /ESDN (CREST): 
CIA-RDP79M00095A000100030030-8
Release Decision: 
RIPPUB
Original Classification: 
S
Document Page Count: 
17
Document Creation Date: 
December 20, 2016
Document Release Date: 
July 10, 2006
Sequence Number: 
30
Case Number: 
Publication Date: 
February 3, 1977
Content Type: 
MEMO
File: 
AttachmentSize
PDF icon CIA-RDP79M00095A000100030030-8.pdf [3]782.85 KB
Body: 
Approved For Relee 2007/03/06: CIA-RDP79M00095A0000030030- DEFENSE INTELLIGENCE AGENCY WASHINGTON, D.C. 20301 U-019/DC 3 FEB 1977 TO: Mr. E. H, Knoche Acting Director-of Central Intelligence Washington, D. C. 20505 SUBJECT: DIA Presentation 1. Attached is a copy of the presentation I made to the Interagency Classification Review Committee. 2. It was carefully coordinated within the Intelligence Community and represents, I believe, a fair assessment of the issues related to the need for protection of national security information versus the public's right to know. 3. You might find this helpful in developing presentations along similar lines. FOR THE DIRECTOR: 1 Enclosure a/s DIA review(s) completed. OHN T. HUGHES Senior intelligence Adviso Approved For Release 2007/03/06 : CIA-RDP79M00095AO00100030030-8 IS!{ (Iiic za_s) SA (Showers) CFI (Sc(,- 't) :`ti-L IB (Swc' t) li;I') T efaisd(I0/ %Y: CifAIftbA7.?MAAb095A0=00030030-8 051 When circled - cy has been furnished. Approved For Release 2003/06.: Approved For ReIe 207/03/06: IA-R 1~T - srr , -ET EXECUTIVE SECRETARIAT Routing Slip Approved For Relepse 2007/61/06,: `CIA-RDP79M00095A000100030030-8 ~ Approved For Rel 2007/03/06: CIA-RDP79M00095AOOQ00030030-8 PROTECTION OF NATIONAL SECURITY INFORMATION 1 DEC 1976 The invitation to address this symposium specified that I speak for the Intelligence Community on behalf of the need to protect selected national security information from unauthorized disclosure to the public. Before I discuss the basic issues, I would like to say three things in introduction. First, although what I say does represent a fairly strong consensus for more openness within the Intelligence Community, I cannot "speak for" the Community as a whole. The subject of public disclosure is controversial, not only in the public sector, but also within the government. Second, like many in the Intelligence Community, I firmly believe there can be compatibility between the public's right to know and the government's need to withL.;;ld selected national security information of which our foreign intelligence information is a special consideration. It must be remembered that the Intelligence Community collects, analyzes, and reports information on foreign powers in order to, give U.S. policymakers the information they need to make vital decisions affecting the nation as a whole -- and, indeed, the free world. We in the Intelligence Community recognize that the general public also plays a role in policy development. The people themselves, their representatives in the Congress, and the elected and appointed members of the Executive Branch -- all need information of varying types and degrees in order to make or support sound decisions. The third point to be made in introduction is that the Intelligence Community recognizes that preventing the unauthorized disclosure of truly important Approved For Release 2007/03/06 : CIA-RDP79M00095AO00100030030-8 Approved For Rele 2007/03/06 : CIA-RDP79M00095AO00100030030-8 secrets depends, to a fairly large degree, on keeping the number of those secrets relatively small. This supports the earlier thesis that there can be harmony between disclosure of essential information and secrecy, since disseminating such information not only informs the public, it also reinforces the security discipline necessary to protect truly sensitive and source revealing information, With these thoughts in mind, I will now focus on. three basic areas. First,. the essential and continuing need for a security classification system to protect intelligence sources and methods, as well as other national security information. Second, the growing support for greater release of intelligence information to the American people to insure broadened awareness about national security issues of urgent concern. Third, some actions underway to increase public access and awareness while protecting vital national security information, especially that concerning intelligence collection .sources and methods and analytical, procedures. Let me turn now to the first major theme, the need for protecting selected national security information from unauthorized disclosure. In doing so, I will concentrate on examples closely related to my own special area of interest -- intelligence collection sources. What is that truly sensitive information that must be protected against disclosure? The Intelligence Community is primarily concerned about protecting the sources of its intelligence information and protecting certain analytical methods employed to develop meaningful findings and estimates. Everyone, I think, accepts the fact that a human agent with access to the secrets of a Approved For Release 2007/03/06 : C1 -RDP79M00095AO00100030030-8 Approved For Release 2007/03/06: CIA-RDP79M00095AUP100030030-8 foreign power? if identified, will be neutralized, and will no longer be able to give intelligence analysts, or the U.S. pu,blic, any useful information. The Intelligence Community believes that the need to protect source identity far outweighs any benefit to the public through explicit disclosure of a sensitive source. In fact, such a disclosure would be self-defeating to the very public who needs the intelligence products. Clearly, the public's right to know ought to include the right not to have intelligence sources negated through needless publicity about the identity of such sources. Of course, a great deal of information these days is not obtained from spies or agents but from very sophisticated, highly technical means of intelligence collection. The effectiveness of these sophisticated collection systems can often, through unauthorized disclosure, be neutralized by a foreign power, sometimes as easily as a human agent. Preserving the flow of information from technical sources depends very largely on concealing what those sources are and how effectively they work. Clearly, by breaking an enemy communica- tion code (as we did against the Japanese during WW II), we can obtain vital information on an enemy's plans and intentions. Once he learns we have broken that code, however, it is an easy matter for him to change the code, and thereby, either shut off that source of vital information or make our future collection and analytical efforts more difficult and costly. There is another aspect of intelligence information and source protection which should be considered; that is the impact of accurate and timely intelligence on allocation of national resources to defense by the President and the Congress. We all recognize that maintaining U.S. military forces 3. Approved For Release 2007/03/06 : CIA-RDP79M00095AO00100030030-8 Approved For ReleW 2007/03/06 : CIA-RDP79M00095A00Q p0030030-8 as a credible deterrent in today's world is an undertaking which is becoming more and more costly, One of the contributors to growing costs is uncertainty -- uncertainty about the military capabilities of potential adversaries. If the U.S, leadership knew with greater precision the detailed Soviet plans for deployment and improvement of their strategic nuclear forces, the U.S. could design its own deterrent forces against a much narrower range of capabilities. Any unauthorized disclosures which lessen our collection capability would contribute to greater uncertainties or imprecisions in the quality of our intelligence information and could generate requirements for even larger defense expenditures to cover an even broader range of deterrent possibilities. If through disclosure of the intelligence sources we do have, and the consequent loss of vital information, the range of uncertainty is increased, then our weapons costs will probably go up. Another aspect of the defense resources problem concerns the costs of intelligence collection systems themselves. You realize that the U.S. develops and operates some very sophisticated collection systems to get necessary information about foreign military capabilities which is not available from overt sources. You also recognize that the Soviet Union is a closed society which permits few overt sources to exist, and thus appreciate that this means the U.S. must employ expensive collection systems to get necessary information about Soviet military capabilities. Compromise of the vulnerable aspects of these expensive systems would not only deny us needed information, it could also force us into ever greater expenditures on new collection systems and processing techniques. Competition in armaments is expensive, but accurate Approved For Release 2007/03/06 CPA-RDP79M00095A000100030030-8 Approved For Rase 2007/03/06 : CIA-RDP79M00095 ,00100630030-8 and timely intelligence helps keep the cost down, Competition in intelligence collection is also expensive, but good security - protection of information about sources and methods -- helps keep the cost down in this realm, too. Let me move to another major point about the need for security classification. Requests for disclosure of defense and foreign intelligence information are often accompanied by the comment that: "we are not asking the government about its sources, we just want to have the information -- to know the facts.' In some instances, the facts can be provided. However, there are other facts which can only have come from a particular and sensitive sources, and disclosing those facts would automatically reveal the source. For this reason, the Intelligence Community must disguise some facts -- "sanitize" them as we say in our jargon -- so that the foreign target of our intelligence collection will not learr the source identity. Sanitization involves rounding off details, generalizing and, most important, combining individual raw items of information with other less sensitive information, thus making more difficult the foreign intelligence analyst's job in tracing the facts back to a particular source. Sanitization is never easy, and sometimes it is impossible. Unfortunately, when a fact cannot be effectively sanitized, it is hard for the Intelligence Community to explain or prove to the general public how a given fact reveals the source of that information. I think this particular problem is a major cause of many disagreements today, between those who argue for greater disclosure and those who argue for greater security. You often read a sensitive item in the papers which was published because neither the reporter nor his informant knew enough about sensitive intelligence 5 Approved For Release 2007/03/06 : CIA-RDP79M00095AO00100030030-8 Approved For l ease 2007/03/06: CIA-RDP79M000954DO100630030-8 collection and processing methods to recognize how damaging that disclosure could be. The Intelligence Community in turn cannot explain publicly this relationship without making the loss of that source even more likely. What I am saying here is that, to a degree,..you cannot expect the Intelligence Community always to be prepared to explain publicly, in comp complete and convincing detail, why a particular item of information is sensitive, because the explanation itself may very well be sensitive. We must often ask the public's forbearance when we say that a certain item would reveal sensitive sources and methods. I feel the public understands this and wants to prevent disclosure of intelligence vital to national security. I said in my introduction that there is a consensus in the-Community these days toward more openness. Many have come to believe that some sources are not so easily ;;eopardized through disclosure as we once feared. Hence, many now believe that we can afford to risk disclosures which reveal some kinds of sources more than we once were willing to. We are trying to narrow our definition of what is a vulnerable source and to be more liberal in regard to dissemination of intelligence information from the least sensitive source. We are working on this approach and making some progress, but just as there are some who are working hard toward this goal, there are others -- dedicated public servants -- who are not persuaded that the risk of security compromise is acceptable in many of these cases. Since an intelligence source once lost is seldom regained, we have to move prudently, and this is another area in which the public can be helpful. Compromises and leaks naturally generate 6 . Approved For Release 2007/03/06 : CIA-RDP79M00095AO00100030030-8 Approved For R ase 2007/03/06 : CIA-RDP79M000954WO100630030-8 support for more restrictiveness. The more the public is willing to recognize that some intelligence sources are vulnerable and need protection, and not press for complete disclosure, the more progress we can make. Up to this point, we have focused attention on the need to protect information about intelligence sources and methods. There are other.kinds of information which need protection. Over the past 50 years, there has evolved a set of circumstances, including the threat of war, which justifies withholding certain defense-related information from the public sector and, thereby, from easy access by a potential adversary. In time of war or crisis, advance information concerning military plans could result in. the defeat of major military operations. Even during peacetime, the disclosure of information about contingency military plans or data concerning certain aspects of U.S. military technology can assist foreign powers in coping more effectively or in developing countermeasures. Let me give you some examples of the importance of keeping some kinds of defense-related information secret. Those of us who are intelligence collectors, have gained some insight into the value of information on foreign weapons systems and military plans. The kinds of things we collectors go out looking for on foreign powers, are precisely the kinds of things the U.S. has to keep secret as far as our own forces are concerned. The first example has to do with missile guidance systems. You have all seen in the papers recently that the U.S. Navy was prepared to spend over a million dollars to recover a Phoenix air-to-air missile, along with the F-14 aircraft, 7 Approved For Release 2007/03/06 CIA-RDP79M00095AO00100030030-8 from the iur`t~e sea, ii'r orcie rOt7o0p reventAi-tssPrecoovery '? tee u sslans. This expenditure was justified by the fact that the effectiveness of the Phoenix hinges, to a considerable degree, on keeping some of its operating characteristics from a potential enemy. If these characteristics -- operating frequencies, coding devices, guidance logic--- are known to a potential enemy, he can design electronic countermeasures equipment which will seriously reduce its effectiveness. We are then placed in the position of having to change those characteristics, or design counter-countermeasures, which add immeasurably to the cost. We also lose time, which can mean a much reduced effective life for the operating system. If we are anxious enough to spend a lot of money to prevent physical recovery by a potential enemy, it is clear that we are not going to publish the detailed system characteristics in the newspaper to save them the trouble of having to collect the information. Classifying and withholding this kind of information contributes to the effectiveness of the weapon in combat, hence increases the likelihood that the U.S. will win an engagement in which the weapon is used. Conversely, disclosing the information will increase the likelihood that the weapon would be defeated and such an engagement won by a potential enemy. Another example from recent news reports is instructive. Many of you, I am sure, have read in the press about recent proposals to restructure the military posture of the NATO forces in Central Europe, because of a belief that the Soviet Union is capable of a standing start offensive against the West. Such proposals may involve considerable expenditure of funds, and could affect the capability of the NATO powers to respond to a surprise offensive. This example is adduced to point up that precise knowledge of Soviet readiness, 8 , Approved For Release 2007/03/06 : CIA-RDP79M00095A0001.00030030-8 Approved Forlease 2007/03/06 CIA-RDP79M0009000100030030-8 and Soviet Plans for an offensive in Europe, would permit the Western Allies to position their forces most effectively to counter an offensive, and with maximum resource efficiency. Not knowing those plans and that readiness forces us into difficult choices, it raises the chance of ineffectiveness or inefficiency in structuring our conventional force deterrent. The Soviet Union thus gains a real advantage by withholding from us information on their readiness and their plans. In exactly the same way, we seek an advantage keeping from the Soviets (and unavoidably the U.S. public) detailed information on U.S. readiness and U.S. plans for defense of Western Europe. Let me conclude this discussion of the needs for security classification with the observation that intelligence officers do not consider themselves the adversary of public affairs officers, newsmen, or citizens. By and large, intelligence officers are dedicated to dissemination of information -- which is acquired at such great cost and personal effort -- to the Congress and the public, where feasible, so that they can use it in-effectively performing- their role in the political process of this country. Now let us turn to the second major portion of this discussion -- the high level awareness of the need to disclose selected national security information to the Congress and the public, and review some case histories of key releases. I have been involved in three significant efforts by three Secretaries of Defense to disclose important national security information to the public 9 Approved For Release 2007/03/06 CIA-RDP79M00095AO00100030030-8 Approved Forplease 2007/03/06 : CIA-RDP79M00095*000100030030-8 which was derived from sensitive sources. I'm sure there have been and will be others. A brief summary of the three illustrates how the government is broadening its efforts to inform the public about foreign military capabilities The first instance was the Cuban Missile Crisis of 1962. Once we had obtained direct evidence from photographic reconnaissance of Soviet strategic missiles in Cuba, President Kennedy decided that this threat to national security was so important to the security of the country that the people as well as the Congress needed to be fully informed. The objective was first to clearly establish that the Soviets had installed the missiles, and later that the Soviets had removed all strategic weapons from the Island and returned them .to the Soviet Union. Initially, a series. of classified presentations were provided to the Congress. Subsequently, Secretary McNamara sponsored a televised press conference at which aerial photography, acquired during the Crisis, was displayed and explained to the public. To my knowledge, this was the first revelation of our U-2, quality photography and of our comprehensive knowledge of the nature of the Soviet presence. The second and more recent example resulted from Secretary Schlesinger's belief that the Congress and the public should be informed of the hard evidence on the growing Soviet presence in Somalia and the implications for U.S. Indian Ocean policy. In 1974, the Secretary of Defense gave a series of presentations to the Congress using sensitive imagery of Somalia and including many facts related to the imagery which we had initially learned through other sources. Concurrent arrangements were also made to provide a presentation before an open Senate session and to release copies of the photographs themselves to the public. 10 Approved For Release 2007/03/06 CIA-RDP79M00095A000100030030-8 Approved For4olease 2007/03/06 : CIA-RDP79M0009 600100630030-8 The third example is one In which. DI'A is now engaged. At the direction of Secretary Rumsfeld, an unprecedented series of classified-presenta- tions has been given to the Congress about current Soviet military capabilities and trends, using information-derived from extremely sensitive sources. The Congress published an unclassified version in the Congressional Record. Let me make one very important point about these three examples of public disclosure. All of the briefings were primarily classified and addressed-first to the Congress. This reflects a recognition that, even though.sources may be vulnerable and all information cannot always .be revealed to the general public, it must be revealed to the public's elected representatives in the Congress. Where we can declassify, we will. Where we cannot, we must ensure that the Congress is always informed. I would like to emphasize that the most difficult problem we deal with in these briefings is how to get the hardest possible evidence (which means unfortunately the most source-revealing) before the public. In this instance, I can tell you that we are still uncertain as to how open we can be without endangering these critically important sources. I can say that we are carefully and gradually working towards what I think will be a new more liberal information release policy, with many implications for all of the government in the future. 11 Approved For Release 2007/03/06 : CIA-RDP79M00095AO00100030030-8 Approved For-Tease 2007/03/06 : CIA-RDP79M0009O00100030030-8 Now, for the last of the three major subjects, let me describe some specific proposals to increase public access and awareness, which are currently being discussed within the Intelligence Community. First,. we need to be much more disciplined i_ii the way we write intelligence reports. We must make the greatest possible effort to use highly sensitive material only when necessary, and then have it clearly identified so that any sanitization of reports for public release (either on our own initiative or in response to FOI requests) will not jeopardize sensitive information and be more timely. Some things we are looking at in this area are: the problem of "inherited classification" (classifying a document because of the documents which preceded it rather than its actual substance); the need for greater differentiation between reports written for intelligence analysts who need source details and users of intelligence who need the substantive results of analysis. Further, we are making a major effort to reduce to some degree the use of special compartmentation and dissemination restrictions, which hinder down- grading and declassification. Second, we need more emphasis in the Intelligence Community on policing disclosure procedures. The mechanisms which exist inside the Intelligence Community to prevent overciassification are in a more rudimentary state than those outside the Community. In this area, we can learn from you. Third, we are thinking hard about formalizing public disclosure arrangements. We are considering the need to establish mechanisms within the major 12 Approved For Release 2007/03/06 : CIA-RDP79M00095AO00100030030-8 Approved Forlease 2007/03/06: CIA-RDP79M000900100030030-8 intelligence element, for regular, routine, and more frequent preparation or release of unclassified reports, In summary, I have talked first about the reasons for keeping sensitive national security information secret; second l have cited some examples in which Defense has disseminated source-revealing information to the public while maintaining essential security; and third I-have described specific steps in progress or under consideration towards improving the balance between secrecy and disclosure. I think it should be clear to any reasonable person that certain information must be protected against disclosure, in order to ensure that the flow of vital intelligence about foreign powers is able to continue. Other national security information also must be protected against disclosure in order to make more difficult a potential enemy's efforts to counter our military plans, operations and weapons systems. While vital intelligence information must be protected, I believe we are doing much to maximize the flow of information to the Congress and the public, and can and will do more. Fundamentally, I believe a balance between secrecy and disclosure can be struck which will meet both goals. 13. Approved For Release 2007/03/06 : CIA-RDP79M00095AO00100030030-8 STAT Approved For Release 2007/03/06 : CIA-RDP79M00095AO00100030030-8 Approved For Release 2007/03/06 : CIA-RDP79M00095AO00100030030-8

Source URL: https://www.cia.gov/readingroom/document/cia-rdp79m00095a000100030030-8

Links
[1] https://www.cia.gov/readingroom/document-type/crest
[2] https://www.cia.gov/readingroom/collection/general-cia-records
[3] https://www.cia.gov/readingroom/docs/CIA-RDP79M00095A000100030030-8.pdf