affadavit_yeates

Page 1

':-

.

.,y:..(.. .: ......

UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLUMBIA

':.'.

.~.

·

".,

,..... :

· ..". ':." · .~ '.' .'. : '; ... ;

CITIZENS AGAINST UNIDENTIFIED FLYING OBJECTS SECRECY

........ "

--.. ,'

Plaintiff

'~­

::~«".:

) ) ) ) ) ) ) )

v.

.....

CIVIL ACTION NO. BO-1562

) ) )

NATIONAL SECURITY AGENCY _Defendant

----------------) AFFIDAVIT OF EUGENE F. YEATES State Of Maryland

) )

SSe

County Of Anne Arundel) Eugene F. Yeates, being duly sworn, deposes and says: 1..

I am the Chief, Office of Policy, of the National

Security Agency (NSA).

As Chief, Office of Policy, I am

responsible for processing all initial requests made pursuant to the Freedom of Information Act (FOIA) for NSA records.

Complaint in this case.

The statements herein are based upon

my knowledge, upon my personal review of information available

.

to me in my official capacity, and upon conclusions reached in -'.

accordance therewith. 2.

I submit this affidavit regarding all records that

have been ~ocatedby the BSA pursuant to the plaintiff's ForA requests, in support of the Agency's Motion for Summary Judgment. To supplement this testimony, I will execute an additional affiBavit, classified TOP SECRET, to provide highly classified information which is not available in the public realm and which specifically identifies the NSA records being withheld from the plaintiff for the Court's in camera consideration. roved. f o '\

~

I

.-

\

; <t":


. -.~~~ ~:.: ... ~

11

..

.,

··.i~_·.;'

d 'i,

.: ~}~~~ :i;~

THE REI. EVANT DOCUMENTS

I

3.

.~ " ;fo

....... ''''l'~. .•.~ .~ .-; ..':1~: -.~;;;

This Agency received four separate referrals (described ';

'.: ;",.;: v. !....

.:.3 .~.

below') from the Central Intelligence Agency (CIA) concerning'NSA~'~ .

.

i'~

-f"

·:f~".

.....! -'.,;~." :.~.~ ",~~~~ ,-;,;;t

documents located by that Agency when 1t was engaged an FOIA

.1

litigation concerning information pertaining to UFOs.

II

.;:.

Saucer Watch v. CIA, D.D.C'- 17B-859.)

I

I 9,

I

I

\

. '. . .S;:t.-;~;'::1 _..~ (Ground :.'/: .i·'C~:

I

1~7B

r.

y

:."

The first was on Noven;b~'r:':~

'. . '. ':'..; ~!

when this Agency received copies of· fifteen Agency documen

located by CIA.

• I .' .. ~~ .•.

The NSA also received two other referrals from

CIA on December 4, 197B which provided three additional NSA

I documents.

. :~t~='~j'~~ . ,. -c , ~

Subsequently by

,I

attorney for the plaintiff, Peter A. Gersten

rJ

attorney of record in the CIA litigation) was the referral of the documents to this Agency.

'jl

,

'.

filed a request with NSA for the eighteen do~~ents- in his own

"

~i

dated 'January 9, '1979; name on December 22, -1978 •. In a letter . . . - -. Roy R. 'Banner, thief, ~olict Staff, advised Mr. Gers~en that·~·

l'"

,II the NSA records that had been referred to this Agency by CIA II were exempt from release under 5 U.S.C.S 552(b)(1) because they..

.' -.......

11.) are classified in their entirety, and exempt from release under

· I ,

5 U.S.C. S 552(b)(3) because they are exempt from release

by 18 C.S.C. S 798, 50 U.S.C. S 403(d)(3) ~nd Section 6 of

I! Public Law 86-36 I is I

(50 U.S.C. 402 (note». j

attached to the Complaint as Exhibit C. I

copy is also attached to this affidavit 4. Ii

~s

'~A

copy of this

A true and correct Exhibit 1.)

By letter dated January 29, 1979 Mr. Gersten appealed

the denial of the documents referred by the CIA.

Iof

~etter

(A copy

this letter is attached to the Complaint as Exhibit D.

A

i true, and

correct copy of this letter (less enclosures) is also

II attached

to this affidavit as Exhibit 2.)

1\ the

NSA Freedom of Information Act/ Privacy Act Appeals Authority

! affirmed

IIII

On .1arch 2" 1979

the denial of the request for release of the information 2

• 'I

'.-

.•~(~

..",

<:....


~

...,

li<:' , E=-~.

~~"

~~,-.

on the same grounds, i.e., that the information is classified in its entirety and therefore exempt from release under 5 U.S.C.·

5 552(b)(1) and that the information is exempt from release

"\

,:':::~.:J './~:: ,

s

552(b)(3)

,

~-5i' ~;

unde~

~'.'.

for the reason that other statutes prevent , "'.' i,;,..

its disclosure, to wit:

::.

'

f:"~'f")

,;;- '.:",

5 U.S.C.

..:

f?'~~,:. "

18 U.S.C. § 798, 50 U.S.C. S 403(d)<'3}·.

'le"', ,

.

F,;i." "":"'.

and Section 6 of Public Law 86-36.

~" . . . .

(A copy of this letter is

attached to the Complaint as Exhibit E.

Sft:., ,

is also attached to this affidavit as Exhibit 3.) 5,.

t.'

On February 16, 1979 plaintiff in the instant case,

by counsel, filed an

rcrx

.1

A true 'and correct copy

request with NSA for all

.

.

~,..

~r~, 1J?

\.

docum~nts, ':'~\

.

,'"

'

"

"

it.i.:' ,,;', <,

':.

in possession or under the control of NSA relating to UFOs :';"~':':',/::':.'~ .';.~.~ I~{ .",-. r. -; ,,:~ . ~"' t4 ~/ and the UFO phenomena. (A copy of this letter is attached ,to '::";","'" :..: ~!;:

I

,"

, ...:.:.:..:~. ,:';':':,I,L

the Complaint as Exhibit F.

A copy is also attached hereto and --:' :;5~ f(i;

:::::: ':::::::d4:~0 ::c:::::: :::::nJ::~a::o::'0:9:::

:::u~i;~:;;.t '[~ ~ : .. :-:0: .. ,;.!.~

deletions of information exempt under the provisions of 5 . ,·:·:o;~~:.!,;:;i:~' .. ,.~ U.S.C.

s

:·:;:~··~,,·;·t:·~ ." ·:~c tl~

documents existed but were exempt from release und~r 5 U,S:C'-".

552(b) (1) because they are classified in their errt r r e cy r exempt

1\ iI

I Ii I I

I, I

II \:

I;

I'

I',I II I' I;

i: " I. I'

1I

Ii

I:

II

,:'

U"S'C~

5798, 50 U.S.C. 5

~;'.'

,~~.

.

~

from release under 5 U.S.C. 5 552(b)(3) because disclosure of themwas prohibited by 18

',:':

s.:. j c_.~ If~;

- .'.

I: I: Ii

. .:

>};j' ~. NSA,:./\~~;.):;~:,I~l

552(b)(1) and (b)(3) were taken prior to that rel~a~e.~;~

Plaintiff was also advised in this letter that other

l'

~~.

I\% '

'. :.:.. ~~1· . 403(d)(.3~;>·~'~':J.:.i ~l1

..

Publl.c Law 86-36; exempt from d a s c Lo su r e under 5 U.S.C. 5·':·,.'~;;'~';-!:i.; ,:~,~ ~~

•.''. '~~j.:':",~.

552 (b) (5) because they are intra agency memoranda, or letters ~ .•.>

, ,'~'" ,t

§

ff;;.

-.h , ....,

U. S:';~:~~i /~~ ~ . '.

SS2(b) (6) because they are to personnel or similar files the -£

disclosure of which would constitute a clearly

::;~

~'~:~':"::i~;J .~ m. ~: "

which would not be available by law to a party other than agency in Ii tiga tion wi th this Agency; ·or exempt under 5

~~~-:::. ff~'

',0:

e ,.:-.

;:':f;~: ::t~:i~

~". Q~~~ .

-.

unwarrante~...,.:::~\,~~:~ "~1 ~~':' >.',:;' ':.::,

invasinn nf personal privacy. (A copy of this 1eter is ~tt;;;~e;. . ". ~. '.' . . . . t

to the Complaint as Exhibit G.

A true and correct copy is

also attached to this affidavit as Exhibit 5.)

.The

:"~~'>:;j. r~"~;;

Jan~a~Y;{:.f..:if~ ,~\:i

letter also advised the plaintiff that certain l.nformatl.on,

::.".'': ,....

3:;f~N;~ .

.~. :':~:l: ~~i:~ :.:,r:',

1.:? &'.'

I,'" , ":.:, ,_,

g.. pot::

I· ~

~.'

, .•••.


..

.

' ",

originating with other Federal agencies or components would be referred to the originating agency.

A total of seventy-nine

documents were referred to various agencies for their direct .:

response to plaintiff.

.:

6.

~

:

An additional NSA document was referred to the NSA' by , (The fourth and final CIA referral.)

the CIA on July 27, 1979.

In a letter dated December 19, 1979, Mr. Banner responded to the referral by again advising Mr. Gersten that this record is exempt from release under 5 U.S.C. § 552(b)(1) because it was classified in its entirety, and exempt from release under 5

'\

U.s.C. S 552(b)(3) because disclosure of it was prohibited by 18 u.S.C. § 798, 50 U.S.C. § 403(d)(3) and Public Law 86-36.

(A

true and correct copy of this letter is attached as Exhibit 6.)

7.

-

By letter dated January 23, 1980, plaintiff

"

i,

the denial of the information referred by

!.

,

CI~

~ppealed

-' and the subsequent .,'

denial of ·his general FOIA, request of February:16, 1979.

:1

.

'By

.

reply letter dated March 24, 1980, the NSA Freedom o~ Informa-

, ~::

tion Act/Privacy Act Appeals Authority affirmed the denial of plaintiff's request for release of information on the same grounds as cited above.

(A copy of this letter is attached

the Complaint as Exhibit K.

IiII

.

'... I I to

I

A true and correct copy is also

attached to this affidavit as Exhibit 7.)

I I

I

8.

Finally, a portion of a document which is respon:ive

to the plaintiff's request was

rece~tly

.

I

declassified and released

to counsel for the plaintiff by letter dated September 15, 1980.

Ii I!.,

(A true and correct copy of this letter less the enclosure is attached as

~xhibit

·.:·I~~'.:-

8.)

THE STATUS AND MISSION OF NSA

II

9~

NSA was established by Presidential Directive in

, I

,I

Ii

II

I, , j; 11

ii

Ii

October 1952 as a separately organized Agency within the Department of Defense under the direction, authority, and control of the Secretary of Defense, who was designated by the President as Executive Agent of the Government for conducting 4

.. ' ..


".i.;:~~~ ~l~

.. "

the communications security activities and signals intelligen~e;~(~ activities of the United States.

A primary signals

intell~g~~~~A~. . '~~"I.;7v:~.~ -l'~~

(S~GINT) mission of NSA is to intercept radio communications' t~ ~~~

, ':':":'J~-:,--:~:~

sent to or from foreign governments in order to obtain foreign ~q ~;..~

· '::::~"::!;~f~~

:;:H

-~'.~.~-:.:.;:.:.

in telligence information necessary to the national defense,

Th~·.:!:'fl!f~~:~

national secur ity, or the conduct of foreign affairs.

'.;:~~~~.4:l~~"~

intelligence information derived from the intercept of fore1.gn·''''

:J>01

·-t·~····~

communications is called communications intelligence

.(COMINT):~~\! ~~~ .... : .. .-.. .. '.,;..', ~

"' .. : .::.~.:"':..:!': .':~,,:;

Of the NSA records at issue in this case, only four are not .

COMIN~

reports and will be addressed

separ~tely.

..

~~~~~~ .~~ .~~~:..::::. '~':'.~:'. .........

..~"!

All of the '':;:-;~2 -:~:

,...;. :~·~·jk;)·

.

remaining records sought in this civil action are the product

.;. "1~~ L,....

j.

.,:'r

10.

I'

:~:';: ...-..'~

", f;.

",

'.

~

"

"

II

L

..

own radio transmitter and receiver facilities not available for'

'':{';:

public use.

~1~

... ;,,:"f~;~,~i.._:~.; r ....:

~

.::,;.:<:'~.

".' .,:.r.

Such communications links are known as agovernme'nt .-: ~ ::;;;'..:.~::';,':

.~

net" communications. A foreign government may use other means ... ,

,

I:

~:

"I '

: roo.

~ ~.l

. . :-:

· . :::', ,~..~.:~.i' .~~\;~

, r ' .

";.~~./.~!:ff~.i:!il :;72.

These COMINT activi ties include the. targeting of .~~:;~:~7t~I?::

foreign governments' communications both within their borders. :--:?~ ~ ,-~: .: .~: "'~:~ /':·:f,~. ~ J;: and to and from communicants abroad involving the use of their .: ~ ~:.:::-~

,-:::' . ;:.

... :

.01'

". :.:"::':'::~~;'.;-; ;...:".;;

of signals intelligence activities.

:~

.~:.~~

(~,~.~

,.-::..:..;.:~

...

for sending and receiving international radio communicatio~~••.!~.:~.;r_ addition to or instead of its own government facilities. ···'··~·~>~~r··

i,

Ii

iil:

(International radio communications as used here includes

,; i'

communications passed at least in part by wire.)

This

':"<:';:1,',:

i~~~~~~~:;1:2:

the foreign government's use of the facilities of an international ~~ ..

.

"

-. i

,.

I!

communications common-carrier which is also available

I!,

by the public.

'\

fo~'~;~~'~;':~{?HI~ . ;::.':':i:;

I

! which more than half the encrypted. and plain text radio ca tions of foreign governments, foreign organiza tions, their representatives are carried.

'."

.",'"'

~~~mt;!:l .~. and:" :~~t~~~l· ~l .. ~~;.:...:. ,.' :i;tc

.. ....:t~~~1~~ :} '.-" .•..•~'.:",~~:'~•.~.'.

....;,~fo

It is common knowledge that the total volume of radio 'l~~ ..... : ..": .';'~.~: ·J.;~I ].",~ It is also gen~r~UX .;.;.'~~ signals transmitted on a given day is vast.

..... ".

11.

.. '"

;'~'7:.

such common-access carriers supply the means by"~:;·.:;'71

· ..': :; ~~~;.~~!

.

./~

known that radio transmissions can be received by anyone". :'~~:::-~:r,{..~ :.~~ 5

.: "': ..

-

... .-. ~

:.

':.~~~.~ • '. : :r".. ~ -.,;ftr

'

'.:' :·~·~:;;~f;~i~~

/~:~£.'

.: ·:·~\.:?~t~~~ .. \ .

~ ..

...

".

~.:

... -. ....

. .:~~~. "

'

I

;...

:~ ". '

.~'


. -:

.'!"

tti ... f~' ~:"~.'. ~ ..

P::::

,:.;

.'

:::r::;:: :::e~ro:::S:e::~v:::t e::::m::: ::nt::t::::k:t o'~:df1 '.~ f"''~" :~L.':" foreign offici.'s that such .interception of radio communica.~~.~.~;J"t~ .I.;.,_. ;.: :.·

"

.1

~.: ~.:

•:..•. . . :.,•.••.:.•.;. .•.•. .•. .•.•;.• .•.

." . .~.';-'"

communications is generally known.

so, too, a s ~t

nown to

:~*

.....

·.'J.: .;-.· ••

is a

". '.

prima~y

mission of the NSA.

':'.;: ~H~., :fi~

Foreign officials may be

expected to know, ~lso, that NSA cannot possibly intercept eV~~:~f';,:; &'~ ~.

;.'.J.'.:

.:.".::'-; ."

taking account of the fact that NSA's activities involve: .:<~:~~~.::~;

".

":".1

~~ ~:f:

a significant percentage of all such communications, espeCiaIIY.·~·:~:~

..

:.~

".

'.

worldwide communications, not solely those having a United

:\~ ,j~

.'.:::;)).

The number is simply too vast to be handled" ;;S :'~j! ." "_:.f. ~ . ~~.;:~ ~',~~ with any reasonable amount of personnel and equipment. Moreover~ :'::~

States terminal.

; .a:.; .....':', ~ ...:: ~:i:

......

.-....

·

.:

i

the cost and effort of such interception would be disproportiori~1:~~

II

II ,.

ate _t:2~he,:::::~i::n:: :::~: ::r:::nr:::::::gence. target~~.,~~

t, ......

presumably know well' -- NSA must focus its interception ac·tivi-.;,~~ .,:,-::~

pO:.

.

-'

'.

-

...': :-. ;...",~-I·~;;~'

;~;~

.ties on those particular communications lines,- channels, links '.J~' .;~1 .

-.

",

'::'.~~ .j:.i.

.'

...··4,:;

or systems which yield the highest proportion of useful foreigri··:~ ~·:~t

,-'I

.

intelligence information.

.-.'

'-.

~' :.~:~,

'.;..

-...,~~

What foreign government official~ }:.;~.:.;-=:t~

not know, however, is which of the vast numbe~ of radio commun.~:~·I"(:: cations NSA attempts to intercept, which are intercepted, and, I~

· .. · ...... .' . ~

.. ·.1 -.. .~. ..-. "

.,,: "

'. ......

·

~

. .' ~

','

I!

.. ~,.':". : ~.: of those that are intercepted, which yield. to NSA procesSing.:-, <~.::.

.1

methods and techniques.

)

I:

;,[r

It is the protection of this critical

"information that is at the heart of the instant ~ase • .

li!

13.

,.~:

.:';':••

..': . ~~~:! .~:.;~

,·:,:.);;~t~::i1

The continued efficacy of NSA' s vi tal ~ntell~g~~C~,;·./:t$3:'~i~{

j

activities requires that the lines, channels, links and systems -; ~'i':';

II

actually monitored remain

\1

obtains suffic"fe'nt reason to suspect that NSA is able to'

~~iden·tified.jf a

foreign

gO~:~'~i;~i~ij <~'.t~~i§: :~~

intercept and process that government's radio communications,' '.::~~•. ~.: '.~.

that "government would be expected to take immediate steps to

:.:: ' ..~

of ways.

1.

=.'-.'

...

"

~:

.~.

..... :

.,

I'

r:

.~

.!.

This can be accomplished in a number. iJ;~~':':d

.

.,.~·.i~~Y~~~.: ;7~·

A foreign government might shift to communications .:·:·;rr· .:;.: : ..:. <:~:(l~~:~~: "~: 6

Ii;~

...

'~)"',7: ',''';~

. :~'.::: :.".".:-

defeat that capability.

.:

.~i;,~~ .~

". . " -~ ... ~.....'1 '1 ~.,

'I

. <S;,~~~·~

I

i

I I

I

.',

I

.!.'.~

':.

.:- ."


links the U.S. cannot intercept.

~:. ~

I

It may also choose to use

alternate methods of communications.

The foreign governments

may possess the technical capability to either upgrade or

'.

!;

initiate cryptography to secure its communications.

Tori .;:

:

-".

!i

,"

Finally, a .,

!.

.

.',

communication channel believed to be targeted by NSA can

!:

,

,; ~

I

:i

'be used by a foreign government to pass misleading information.

;.

'.

r

'.

!"~

;

t;

i:

p "

\

~!

14.

If a foreign power is successful in defeating an

interception operation, all of the intelligence from

tha~

source is lost unless and until NSA can establish a new and

i~ ;, j:

equivalent intercept.

I'.

mation produced by NSA includes political, economic, scientific

The risk involved is great.

The infor.

.... ::

.

:\

r:

I.

i!,. "I, t •

I:I'

and military data which is of im~easurable value to the Presiden~ I

the Secretary of Defense, the Secretary of State and other policymakers.

Obviously, if a

f

~OMINT

source used by the Agency

,.

becomes unavailable, policymakets must operate without the .

I:

information that source produced.

r:

!: i:

."

to establish a new and equivalent intercept and the source is

I"'

i,r :

lost permanently. Those losses are not only extremely harmful

,".

to the national security but also impose a heavy burden on the

"

limited resources of NSA which must attempt to recover the old

r:

!

.

Sometimes it is impossible

,. I I

i I

!

I,

I'

I!

source or establish an equivalent source of information.

"

15.

':

i,

:t

II

Ii "I

I

Even after targeting only a small proportion of

.

.

all available electromagnetic communications for interception, , the number of n~ssages intercepted is extremely large.

NSA

thus is faced with a considerable task in selecting out those

\

messages that will be reviewed for pos~ible intelligence.

I'

interest.

II ~ I

degree of reliability and success its methods enjoy are SUbjects

n P

The manner in which NSA does this selection and the

l:

about which virtually no authoritative information has ever

;,

been released to the pUblic.

Ii I i,

Information about these subjects

would enable foreign observers to further assess, and thus take 7

"/-.

I! o·

I: t,

_jESSiE] j£ 2 ELI, £ 2212",122£

,

.ZWU UU.C 2 JSJ ;

ttJSi

52iU.ibU

&I.e •


~

~,

~~

!;

;j

.I:'

techniques.

~.

~~'

RELEASE OF COMINT REPORTS

.~~ 16.

~i~· li~ ",~

B:

purposes.

I

If ;; .'

s:

Without~entifYing the

11 tions.

f# ~, };::.. ~~'

-I

I

These communications targets and the processing techniques!

11

them would' permit foreign

inferences and I collection and I

I

intelligen~e

:

.

.

officials to draw

make assessments about this nation's COMINT processing activities that would enable them to

"

I~~

t:~, ~...r.i ~ lor, J,

:

..

'(I~

..

to successfully process the underlying communica-

are, current intelligence sources and methods. __ Disclosing

"

,~ ~:

targeted and intercepted and NSA's

1!r

..

'

.

.

~,::

repo~~~j Also disclosed would be the communications lines, sys~ems

:

I<lit

communications underlying the communications intelligence

/I capa~ilities

l!

intelli-

No meaningful portion of any of the records

11 channels, links, and

,

~: ....:

could be segregated and released

I

,

p'

The

I that had been successfully intercepted and processed for

- II

:

"

~'

disclosure of these records would identify the communications

II

,-

\0 • •

The COMINT reports being withheld from the plaintiff

are all based on intercepted foreign communications.

I gence

..

~~1~

steps to defeat, the capabilities of NSA's intelligence gathering

.

r~

~~ ..... ~¥:

..

I~~~.

C,r,of. . ;:;.:~

•• :0'

i~

~~

f·":'

~}1'

r·' ;r~ r~ ,~,

I capabilities

take counter-measures, as described above, to defeat the

17.

of NSA's intelligence gathering techniques.

The COMINT reports being withheld from the plaintiff

~

klY.' -

~ u;~·

r:.{

,-'

~:

sources and methods. When originated, certain of the recosds were properly classified Top Secret pursuant to Executive Order ,

10501, Section lea), providing Ifor the application of that classification to information, the unauthorized disclosure of which could res~lt in exceptionally grave damage to the nation, such as ,the ·compromise of ••• intelligence operations ••• vi tal 'to the national defense.·

Other documents were properly

classified Secret pursuant to Executive Order 10501, Section

.

~~I!> ' ~.,t

~;;: ~1.

~~~.

,

I?:

~~'

.~~

~ ~"-'!.~~

"

.

~~~: .

:

tiiiJ

~.,

.",..

:

~~,

f' ,

~1; "

ffi'~~ pI.

"

"

:

L'

l(b), providing for the application of that classification to , information, the unauthorized 1isclosure of which could result in

'I

1'\,

" w,' }~

~-

;..J.

1}~':

~,

~: f.'~

r.- ~

I

6', I

..

IIi:J

"

.. ..


'.'t

tI 'I

ji

serious damage to the nation, such as by "compromising •••

d information revealing important intelligence operations."

Ii,- rest,

The

which were originated after June 1, 1972, were properly

,II'

classified TOp Secret pursuant to Executive Order 11652, Section

I,'I

lCA), providing for the application of that classification to

il

I,

I' 'I

Ii

information, the disclosure of which could

"

resuI~

..

.. : .

", '.;;: ....'e,

in exceptionally

I'fl I:II IJ I"!

\ .. '~'.' :".;

"

.. :-

I! \I

il'J

11652,' Section I(B), providing for the application of that

h " classification

II

I!

.

.; .

......

~~~~~.

/

...

to information, the unauthorized disclosure of. :?~~.~;. ...........".

which could result in serious damage to the national security, ,I~~ .. ..: .~

! sucfi I

~s

the revelation of significant intelligence operations.

I

Ii

~""~~l ".I~

::

COMINT record was appropriately marked I Each na ted. Each cOMINT record and each portion

dproperly I'(I

_~i

so classified.

when it was origi.

thereof remains

-' .. :,

~',

"

These cOMINT records meet the criteria

for classification in Section 1-3 of Executive Order 12065, and

II, they are properly classified 'dthin the categories provided-'II in Section 1-1 of the Order. I have reviewed all of the COM IN; . I I

I,

I

records being withheld from the plaintiff for possible declassi-

I fication or downgrading according to the provisions of Sections . I

-, ~

!I 3-1

.

I r-

and 3-3 of Executive Order 12065 and I find each portion of :..

..

,~

" . • _:v ;·;~··'l

.

each record remains properly classified and thetefore exclu~.e,~.",.:~.± In conducting this ':~:~~~.';:.~ \ . review, I weighed the significant ne~d for openness in governmen~

from declassification or downgrading.

.

,";

:.:~I·~~~"~·':.:!

..

~'--'.:";~

against the likelihood of damage to our national security at .~·cf'f:i(.' ··:~.~··. !JJ.~."':··:t/

this time and determined that the records should continue to be,,':..;.;

. ..~.-:;:~ ~~~ ~\

classified because of the damage their unauthorized disclos~re...

•.~ \. ~.': !:=.'

.:

".:'

would reasonably be expected to cause to communications

.

in~elli~,~ ,~ ~\.::.,t..-::,::. .~.~

-~. e ,

gence activities of the United States Government.

Because

..

.

.... ..; .

, ~

are properly classified und:r Executive Order 12065. the

!Ii

l!

they.. :.::~~ ':~.0:;1

;~?~~

.

.

..','

-.',

:··~~~~~rt%.;t! .~ :. ;~."

"

-


:

~~r

{',"

r..~ J

.:.~:

..

., records are exempt from disclosure pursuant to 5 U.S.C.§552(b) (1)'.: I·

18.

I' .", .~.:,,=--

.

.-:-

.i :

:;r..

....<"

1

-.

information about the nature of NSA's activities including

I' I'

mission of the Agency.

W·:····,·

(See paragraphs 11 through 15 above.)

This mission of the NSA is singular and unique.

d~«

Public disclo-

~

l sure of specific information about the records in the context

I

I of

Ii'I

Section 6 of Public Law 86-36, 50 U.S.C. S 402 (note).

l!

the disclosure of these classified records or of specific

-infor~

matiun about them would reveal information protected by 18 U.S.C.

.\1

S 798 prohibiting the unauthorized disclosure of classified

II

"I;';

Moreover,

II

.......

";;!: ~.<>,

that singular mission would reveal certain functions and

activities of the NSA which are protected from disclosure by

II

'

t~ :~.:'.: ~,':\

its functions and thereby jeopardize the intelligence collection

I! I! II II

.•

of the COMINT records being withheld from

"1 the plaintiff or any portion of any of them would disclose II

.": ...

~ele~se

~,

I

I

~.

I i

·Ii info rrna tion concernin·g. the communications intelligence act'ivi ties' ! ~;~ nr of the United States. The disclosure. of these records or any por- ~....

:.:.

o

il

: ..

,

!l

~

taining to intelligence sources and methods protected from

.~,

,:;, O{.

by Section 103(d){3) of the National Security Act of

1947 (50 U.S.C.

s

..

;;L:: t.~~

f:'.:

403(d) (3».

~~'

Accordingly, it was determined !

that the COMINT records are exempt from release under 5 U.S.C. §

Public Law 86-36, 18 U.S.C.

§

~f

..

t=~: l';;

~

552(b) (3) of the Freedom of Information Act because each portion of each record is protected from disclosure by Section 6

.'

~% '11

the

~~

798, and by Section 103{d)(3) of

,

I

~

.....

.

'

.'

I COMINT

It should be noted that the classification of these

I I

:

..

.. ';

:

.. -. ..';':

.i 'I !~

tive content of the documents but also on the characteristics of the reports that identify the intelligence sources and methods that would be seriously jeopardized by the disclosure plaintiff

I~

'.

~

~"

records and the withholding of them pursuant to FOIA

exemptions (b) (1) and (b)(3) are not based only on the subs tan-

~

.

of • • • • •

.--_ ...

1

.

~!. .' ..

the National Security Act of 1947. 19.

:

';

'~ .~ ..::'.

tion of them would also compromise classified information per-

II I!! disclosure

.: ..

~~

I

".:

': , .'

~L~:.: '~

~.,:::)::

••

o

i I~{>-· I ! i I

10

ij

~ j.:.:..

~r-: .'.: .

-

.

\'

I

".

..

'"

".


.,

'j

seeks.

i-

one exception)' are based on messages which were intercepted from government net communications systems.

J

:1

•1

originally transmitted.

'I

!

-.~

,

.

(See paragraph 10, above.

Moreover, almost all of these messages were enciphered when

.

:J ./

'i

That is, all of the COMINT reports at issue here (with

I

I

I

II I

-\

I

Thus, release of any portion of the

sUbstantive .. message would not only risk identifying the ability of NSA to intercep.t a particular line of communications but would also risk revealing the capability of NSA to read a foreign government's enciphered messages.

Similar harm 'would

result from the disclosure of any material that might help to identify the communications intercepted by¡ NSA, such as information about date, time, origin or manner of transmission or receipt.

Also, the revelation of the substantive content of

the reports would allow foreign officials to determine which channels or types of communications are being monitored.

The

public disclosure of either the content of the reports or of any identifying characteristics would have the same adverse consequences on the communications intelligence activities of the United States.

All such information relates to classified

communications intelligence functions of NSA that have not been pUblicly disclosed by the Agency in any other

conte~t.

RELEASE OF NON-COMINT RECORDS 20.

Three of the four non-COMINT records at issue here

were released in large part, with certain deletions. these records was withheld in its entirety. a.

On~

of

These documents are:

A document entitled UFO Hypothesis and Survival

Questions which

--_.-

~as

prepared by an Agency employee.

The

entire report has been released except for the name and organization of the preparer of the document.

This is not a

COMINT report and contains no reference to SIGINT activities. It is a draft of a monograph that was located in an Agency 11


file where it had been retained for historical reference The deletion was made pursuant to 5 U.S.C. § 552(b)(3)

purposes.

which provides that the FOIA does not apply to matters that are specifically exempted from disclosure by statute. .. "

.. ,

I'

i:

;:

i.

~tatute

applicable

,

exempts from disclosure the names and

titles of NSA employees. b.

The second non-COMINT document is a memorandum

which discusses the UFO phenomena as the author believes they may

.'

I;

r~late

to the intelligence community. ,This document was

released with deletions of the descriptive references to the

I I

"

i~

I!: ~

COMINT operations of the Agency.

The deletions contain

tion -which I have determined ,to be

curr~n!-ly

informa~

and prop_erly

classified and, thus, exempt from disclosure under 5 U.S.C.

!

S 552(b)(I). _ Portio~s of the material deleted also ~oncern

i

.information witr respect to the organization and operational, :'

,"

activities and functions of NSA which are exempt from disclosure

i

" I:

pursuant to 5 U.S.C"S 552(b)(3) which provides that the FOIA does not apply to matters that are specifically exempted from

I

I,

disclosure by another statute.

Section 6 of Public Law 86-36

provides that no law shall be construed to require disclosure

I

I: I:

of the organization or any function of the NSA or any information

Ii

with respect to the activities thereof.

I:

Moreover

disclos~re

I

of

u.s.c.

§798 which prohibits the unauthorized disclosure of

classified information concerning COMINT activities and by the ,!

National secur1iy Act of 1947 (50 U.S.C. S403(d)(3»

which

I, I

i: !i

prohibits the disclosure of information pertaining to intelli-

I'

gence sources and methods.

I' ., ;

'.

A portion of this document was

deleted pursuant to 5 U.S.C. §552(b)(S) because it represe?ts this employee's expression of opinion on how the topic relates 12

I,

I,

i Ii

II

I i

this information would reveal information protected by 18

-,

'.

"

': o!:

,. ~'.

in this instance is Section 6 of Public Law

specif~cally

86-36 which

The

I

-:

..

.

-'.

';

",


. : .~. .

·:.r

.!{

.'

.,' .

to the mission of the Agency.

.~.-

This deletion is non-factual and

does not represent finalized Agency policy. kind of

: ..•~ ..

an~lysis,

It includes the

frank comment and recommendations, which· an

agency must encourage and protect from public disclosure to avoid a chilling effect upon free and candid internal discussions in .... .. \

.

I:

support of optimum decision making wi thin the Agency.

Finally,

..

a portion of this record in addition to being. exempt from dis.. ....:..' ~

closure under 5 U.S.C. S552(b)(l) and (b){3) is being withheld .

:'.~

for the reason that it is not within the scope of plaintiff's

.-

:~.

.

request. c.

The third non-COMINT document is a memorandum for

the record by an NSA assignee that was originally withheld in its entirety pursuant to 5 U.S.C. S 552(b)(5) and (b)(6).· In my review today I have ascertained, however, that this memorandum .

is neither in whole nor in part responsive to the plaintiff's

"

request.

It does not deal with UFOs or the UFO phenomena.

Rather, it is a document voluntarily prepared by the assignee

I.

to report an incident that occurred during his attendance at a UFO symposium. It is the assignee's personal account of his

II.1 Ii

~ctivities

Ii

ph~nomena •

and does not include reference to any UFO sighting or

il

.i /

d.

lj

The final

non~COMINT

record is a report which

Ii! \ was addressed in paragraph 8, above.

I

The portion of the record

responsive to this FOIA request has been released to plaintiff's

I;

p attorney, (See Exhibit 8, attached hereto). The remaining

.:: .

r

.

Ii

portions of the record contain no reference relating to UFOs or

.'"

UFO 'phenomena and are, therefore, not responsive to plaintiff's

I, I

I;i:

request.

p

I: 'I

I,

.; I'

"

, .

.~

..... :. ,

!:

-.~

'

f·· ...

~

13

.....

I

~'•..... :"

.'.'

.:' '.

~

.

..:...

:~

....'


:: '...

21.

,

Further information about the records or portion's:'.

thereof being withheld is contained in the in camera affidavit executed by me. I' I.

.,.t:' ;!

"

_---:~~~e.11J e.u t "-I EU NE F. Y~ES

Chief, Off1ce of Polley . NSA

. I

Subscribed and sworn to" before me this ~~~ay of September 1980.

\

~.::~/

.:

-.

".

--...

':~.'-'

i

!

.......

'.'

.'? .

-. "",

:::'. '.'

• ! :

i

.

J;

...,.,:

.....

'. ,.

.

I' :,

I'

. "'~.. ~'.-:--

",

-

....

"~\

I: !~ \!

r ;1

Ii

1\

i I

I

il

. '.~ '.'

) 11

..,: .

',. ,

"

.-..<- .' ":', .: .... .. . . '."

IiP. ~

14

11

I!I; .....

- .... ....

... ......

.'

.- .

!,

:;

'."

'

.. ':.'

:.'.:. .. ~

." -: ".:,

!:

..... : ...

!:

.. . :~:.~.. . ,~

.~

.. '

.

Ii

I

:'.

.. "

-.'

:.'


Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.