from the FAS Project on Government Secrecy
Volume 2006, Issue No. 116
November 6, 2006
Secrecy News Blog: http://www.fas.org/blog/secrecy/
Support Secrecy News: http://www.fas.org/static/contrib_sec.jsp
COVERT ACTION POLICY MAY NEED UPDATING, SAYS CRS
U.S. intelligence policy on covert action, including presidential authorization and congressional notification requirements, is "less than clear," according to a new report from the Congressional Research Service, and may need to be updated to encompass activities performed by the Department of Defense.Covert action generally refers to CIA operations undertaken abroad against foreign targets in which U.S. sponsorship is concealed. But increasingly, some DoD special operations seem to fit the criteria for covert action. "Senior U.S. intelligence community officials have conceded that the line separating CIA and DOD intelligence activities has blurred, making it more difficult to distinguish between the traditional secret intelligence missions carried out by each," according to the new CRS report. The Department of Defense contends that there is a difference between its "clandestine operations," which do not entail any unique oversight requirements, and CIA "covert actions," which cannot be conducted without a written presidential finding and congressional notice, mandated by a 1991 statute. As explained by CRS, "a clandestine operation is an operation sponsored or conducted by governmental departments or agencies in such a way as to assure secrecy or concealment. Such an operation differs from a covert action in that emphasis is placed on concealment of the operation rather than on the concealment of the identity of the sponsor." In certain DoD special operations, however, "an activity may be both covert and clandestine." The CRS report presents a menu of policy questions for lawmakers to consider in evaluating whether to modify U.S. policy on covert action. A copy of the report was obtained by Secrecy News. See "Covert Action: Legislative Background and Possible Policy Questions," November 2, 2006:
ARMY PRESENTS STANDARD CLASSIFICATION METHODOLOGY
U.S. Army intelligence (G2) has developed a new methodology for applying national security classification controls and for training personnel in the proper use of classification restrictions.Failure to classify correctly has consequences, a tutorial on the new approach points out. "Over-classification is costly, inefficient and can cause slow downs to development/operation. Under-classification can cause compromise, inadvertent disclosures and confusion." But getting it right is easier said than done, because it involves the conscious exercise of informed judgment. "The descriptors used in addressing damage at the confidential (damage), secret (serious damage) or top secret (exceptionally grave damage) levels are subjective." The new Army methodology "provides a standardized method of making an objective decision about a subjective issue," wrote Lt. Gen. John F. Kimmons, U.S. Army Deputy Chief of Staff for Intelligence, in a cover memorandum. See "Standardized Methodology for Making Classification Decisions," Office of the Army Deputy Chief of Staff, G-2, October 25, 2006:
Secrecy News is written by Steven Aftergood and published by the Federation of American Scientists.
The Secrecy News blog is at:
To SUBSCRIBE to Secrecy News, send an email message to firstname.lastname@example.org with "subscribe" (without quotes) in the body of the message.
To UNSUBSCRIBE, send a blank email message to email@example.com.
OR email your request to firstname.lastname@example.org
Secrecy News is archived at:
SUPPORT Secrecy News with a donation here: