Secrecy Report Card 2006

By most available measures, official secrecy continued to expand last year, according to a new “Secrecy Report Card” issued by the coalition OpenTheGovernment.org.

“Every administration wants to control information about its policies and practices,” observed coalition director Patrice McDermott, “but the current administration has restricted access to information about our government and its policies at unprecedented levels.”

See “Secrecy Report Card 2006: Indicators of Secrecy in the Federal Government” (pdf), a report by OpenTheGovernment.org, September 2006.

Perhaps as significant as any of the report’s findings is the existence of the OpenTheGovernment.org coalition itself.

“Notwithstanding you,” former Information Security Oversight Office director Steven Garfinkel told me in a 1993 interview, “very few people give a tinker’s damn about the security classification system.”

That is manifestly not the case today. In addition to OpenTheGovernment.org, which is a broad coalition of politically diverse organizations including FAS and other veteran advocates of greater transparency, there are several other new efforts to confront official secrecy, including the Coalition of Journalists for Open Government, the Sunshine in Government Initiative, and Sunshine Week.

Navy Declassification Policy

Detailed information on U.S. Navy policy regarding declassification of 25 year old documents is presented in a new Navy Instruction.

Along with policy and procedures, the document provides an extensive listing of Navy programs and systems that may be subject to declassification.

The Instruction is marked For Official Use Only. A copy was obtained by Secrecy News.

See “Declassification of 25 Year Old DON Information,” OPNAVINST 5513.16B, August 2, 2006 (72 pages in an unnecessarily large 30 MB PDF file).

See, relatedly, “Department of the Navy Classification Guides” (pdf), OPNAVINST 5513.1F, December 7, 2005.

See also “Limitations on Public Release and Disclosure of Information About Improvised Explosive Device Efforts” (pdf), Secretary of the Navy, April 2006.

FRUS on the Opening to China, 1969-72

“Engaging the People’s Republic of China in a dialogue is perhaps the most dramatic and far reaching decision undertaken by the Nixon administration,” as noted in a new volume of the U.S. State Department’s official Foreign Relations of the United States (FRUS) series devoted to that topic.

A 1972 NSC memorandum for Henry Kissinger published in the new volume expressed concern about efforts by the Federation of American Scientists and its then-President Jeremy J. Stone to promote scientific exchange with China.

“The Chinese, by encouraging Stone, are effectively undercutting the Committee on Scholarly Communication with the PRC, a group we have recommended to Peking,” complained NSC staffer John H. Holdridge in his August 28, 1972 memo to Kissinger (see document 248).

Is China A Threat to the U.S. Economy? (CRS)

“The emergence of China as a major economic superpower has raised concern among many U.S. policymakers,” according to a new report from the Congressional Research Service.

“Some express concern that China will overtake the United States as the world’s largest trade economy in a few years and as the world’s largest economy within the next two decades. In this context, China’s rise is viewed as America’s relative decline.”

See “Is China a Threat to the U.S. Economy?” (pdf), August 10, 2006.

Some other notable new CRS reports include these:

“Israeli-Arab Negotiations: Background, Conflicts, and U.S. Policy” (pdf), updated August 4, 2006.

“The Public Health and Medical Response to Disasters: Federal Authority and Funding” (pdf), August 4, 2006.

NSA Mobilizes Against Leaks

The National Security Agency has instructed all of its employees to “actively” watch for unauthorized disclosures of classified information in the press and online, and to report such disclosures to the authorities.

“All NSA Components shall actively monitor media for the purpose of identifying unauthorized disclosures of classified NSA information,” a March 20 NSA directive stated.

“Media” here is defined as “any print, electronic, or broadcast outlet (including blogs) where information is made available to the general public.”

The new NSA policy on leaks was first reported by Siobhan Gorman in “NSA Strives to Plug Leaks,” Baltimore Sun, July 23, 2006.

An annex to the NSA directive lists a series of questions to be asked about unauthorized disclosures in order to assess their significance, including: “Is the disclosed information accurate?” Has the information been requested under the Freedom of Information Act? “If yes, identify the requester.”

In response to a FOIA request from the Federation of American Scientists earlier this month, the National Security Agency refused to release most of the new directive (pdf), which is marked “for official use only.”

But the full text was obtained independently by Secrecy News.

See “Reporting Unauthorized Media Disclosures of Classified NSA/CSS Information,” NSA/CSS Policy 1-27, 20 March 2006.

DNI Intelligence Community Directives Disclosed

The policy infrastructure of U.S. intelligence community is defined by directives issued by the Director of National Intelligence on everything from security policy to roles and missions to relations with Congress.

The new system of policy statements, known as Intelligence Community Directives (ICDs), is the successor to the former Director of Central Intelligence Directives (DCIDs). The new ICDs are gradually supplementing, modifying or replacing the existing DCIDs.

The DNI has also issued a series of Intelligence Community Policy Memorandums (ICPMs), which are initial statements of policy that have not yet been formalized as an ICD.

Several ICDs and ICPMs have recently been released by the Office of the DNI in response to a Freedom of Information Act request from the Federation of American Scientists.

They cover such topics as open source intelligence, personnel security, the role of the IC analytic ombudsman, the roles of the various Deputy Directors of National Intelligence, and the use of portable electronic devices in secure facilities.

Selected CRS Reports

Some notable recent reports of the Congressional Research Service include the following (all pdf).

“Extraterritorial Application of American Criminal Law,” updated August 11, 2006.

“U.S. Nuclear Weapons: Changes in Policy and Force Structure,” updated August 10, 2006.

“NATO in Afghanistan: A Test of the Transatlantic Alliance,” August 22, 2006.

“Radioactive Tank Waste from the Past Production of Nuclear Weapons: Background and Issues for Congress,” updated June 13, 2006.

FISA Surveillance Can Target Non-Spies

The Foreign Intelligence Surveillance Act (FISA) can be used to monitor U.S. persons who engage in unlawful collection of classified or controlled information even if they are not acting on behalf of a foreign power.

That is the upshot of an August 14 ruling (pdf) disclosed last week in the case of two former officials of the American Israel Public Affairs Committee (AIPAC).

The defendants had argued that they were improperly subjected to FISA surveillance since FISA requires that the target be “an agent of a foreign power” and, they insist, they were never acting on behalf of a foreign power.

Judge T.S. Ellis, III, rejected that defense argument.

But in doing so, he redefined and significantly expanded the meaning of “agent of a foreign power” to include non-foreign agents who may be involved in unlawful information gathering.

FISA “plainly allows a FISC [Foreign Intelligence Surveillance Court] judge to issue an order allowing the surveillance or physical search if there is probable cause to believe that the target… may … be involved in unlawful clandestine intelligence activities, or in knowingly aiding and abetting such activities,” Judge Ellis wrote.

And what are “unlawful clandestine intelligence activities”?

“Although the phrase ‘clandestine intelligence gathering activities’ is not defined in FISA,” he noted, “such ‘activities’ would include, for example, ‘collection or transmission of information or material that is not generally available to the public’.”

Some such collection and transmission of information is protected by the First Amendment, the Court acknowledged, and cannot by itself serve as the basis for FISA surveillance.

But earlier this month, Judge Ellis ruled that the collection and transmission of national defense information can be a violation of the Espionage Act, even if it is conducted by private citizens who are not spies, if they act knowingly and willfully with an awareness that the information is restricted and that it could be used to harm the United States or to aid a foreign nation.

Building on that prior ruling, the Court has now redefined the meaning of “agent of a foreign power” so as to justify the FISA surveillance in the AIPAC case.

“The FISC [the Foreign Intelligence Surveillance Court that originally authorized surveillance of the AIPAC defendants] had ample probable cause to believe that the targets were agents of a foreign power quite apart from their First Amendment lobbying activities.”

But under the Court’s new definition, “agents of a foreign power” need not literally be “agents of a foreign power.” Rather, the term now includes other persons who engage in unlawful information gathering.

“While the defendants’ lobbying activities are generally protected by the First Amendment, willful violations of sec. 793 [the provision of the Espionage Act that prohibits collection and disclosure of national defense information] are not, and … the FISC had probable cause to believe that such violations had occurred in this case,” Judge Ellis explained.

To reiterate: the Court did not find that there was any reason to believe the defendants were acting on behalf of a foreign power. (The prosecution has conceded that they were not.)

Instead, Judge Ellis expanded the scope of the term “agent of a foreign power” to include someone who clandestinely gathers restricted information in a probable violation of the Espionage Act, even if there is no reason to suppose he is a spy or a terrorist.

By the Court’s logic, it does not take an big imaginative leap to envision the application of FISA surveillance to members of the press or others who deliberately solicit classified or controlled information or who report on classified programs in willful defiance of official directives to the contrary.

A former FBI official with extensive experience in FISA policy and practice expressed doubt that the FISA could now be easily invoked against the press or the public for ordinary reporting or research activities since, he said, these do not normally involve the requisite intent to violate the law.

“There is quite a bit on the periphery that is not included in this Order,” the official told Secrecy News.

“The judge referred to the information ‘not generally available to the public’ in the context of clandestine activities that are violations of, for example, 18 USC 793 and 794 [the Espionage Act]. These are statutes that require an intent to harm the United States or benefit another power. Judge Ellis may have been parsimonious in his words, but he hasn’t advocated the position that worries you,” he said.

Even so, the FBI FISA expert agreed that the new court order does “make it possible to be ‘an agent of a foreign power’ for FISA surveillance purposes without having any actual connection with a foreign power whatsoever.”

The new order also called for a leak investigation to determine the sources of a August 2004 CBS News story about the AIPAC case.

Selected CRS Reports

The Congressional Research Service does not make its reports directly available to the public. Recent CRS reports obtained by Secrecy News include the following (all in pdf).

“Detection of Explosives on Airline Passengers: Recommendation of the 9/11 Commission and Related Issues,” updated August 9, 2006.

“Defense: FY2007 Authorization and Appropriations,” updated August 7, 2006.

“Defense Procurement: Full Funding Policy — Background, Issues, and Options for Congress,” updated July 26, 2006.

“The FY2007 National Defense Authorization Act: Selected Military Personnel Policy Issues,”
July 21, 2006.

“Emergency Communications: The Emergency Alert System (EAS) and All-Hazard Warnings,” updated July 17, 2006.

“Homeland Security Department: FY2007 Appropriations,” updated July 5, 2006.

“Privacy: An Abbreviated Outline of Federal Statutes Governing Wiretapping and Electronic Eavesdropping,” updated May 5, 2006.

Costs of Secrecy Skyrocket to $9 Billion

The annual financial costs attributable to the national security classification system reached a record high of $9.2 billion in 2005 according to a new report (pdf) from the Information Security Oversight Office (ISOO).

Classification-related costs include not merely the direct costs of classifying information, which are modest, but also the derivative costs of the personnel security clearance system, physical security for classified material, classified computer security, and more. Most of these costs are incurred within government, but some are due to the handling of classified information within industry.

“The Government cost estimate for FY 2005 is $7.7 billion, which is a $420 million, or 5.8 percent increase above the cost estimates reported for FY 2004,” the Information Security Oversight Office reported. “The industry estimate is up by $696 million.”

“This makes the total 2005 cost estimate for Government and industry $9.2 billion, which is $1.2 billion more than the total FY 2004 cost estimate for Government and industry.”

These figures do not include classification cost estimates for the Central Intelligence Agency, because the CIA has classified its cost data.

See “2005 Report on Cost Estimates for Security Classification Activities,” Information Security Oversight Office, August 2006.

If the classification system were functioning properly to enhance national security, these billions of dollars might all be money well spent. But there is abundant reason to doubt that such is the case.

“There’s over 50 percent of the information that, while it may meet the criteria for classification, really should not be classified in terms of what we lose,” said ISOO director William Leonard at an August 24, 2004 hearing of the House Government Reform Committee.

“The price we pay for classification outweighs any perception, any advantage we perceive we gain,” he told the Committee.

The Information Security Oversight Office, which was established by Executive Order, reports to the President on national security classification policy.

Mr. Leonard criticized the Washington Post in a remarkable letter to the editor today for reporting “irrelevant” negative information about the personal history of a critic of the classification system.

“Publishing it served no useful public purpose and could, in fact, discourage citizens who take seriously their civic responsibility to lodge complaints regarding the activities of their government,” he wrote.

Army Reg on Conscientious Objection

U.S. Army policy for dealing with military personnel who assert a conscientious objection to military combat is set forth in a newly updated Army regulation (pdf).

Criteria for likely approval or rejection of a conscientious objection claim are described. Claims that are insincere or “based on objection to a certain war” will “not be favorably considered.”

The Regulation accepts the reality of conscientious objection with due respect.

“Care must be exercised not to deny the existence of beliefs simply because those beliefs are incompatible with one’s own,” it states.

In any case, “The burden of establishing a claim of conscientious objection as grounds for separation or assignment to noncombatant training and service is on the applicant.”

See “Conscientious Objection,” Army Regulation 600-43, 21 August 2006.

Homeland Security Intelligence (CRS)

The first in a new series of Congressional Research Service reports on homeland security intelligence presents a broad introduction to the subject.

“The proliferation of intelligence and information fusion centers across the country indicate that state and local leaders believe there is value to centralizing intelligence gathering and analysis in a manner that assists them in preventing and responding to local manifestations of terrorist threats to their people, infrastructure, and other assets,” the CRS report suggests.

See “Homeland Security Intelligence: Perceptions, Statutory Definitions, and Approaches,” August 18, 2006.