in_camera_affadavit_yeates

Page 1

0

,~

II III

seeK!. ( '

I

I

__ •

_ - - - -

t;

.:~. ~

n':,

.• :

i FLYING OBJECTS SECRECY, ,f !

i

v.

I'

I~

} } } ) )

NATIONAL SECURITY AGENCY,

I~

.; • .-i .; I'

.:'

t./ 'r .'~ ," ,',.~.,.J

}

Plaintiff,

I; n

"

0

} } }

! CITIZENS AGAINST UNIDENTIFIED

,-

...

UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLUMBIA

j

,"

CJ i\qr!J"-'~

~pr r-=-- .,--' .._-_.

I

,

',

'."

".;; '.~',:

il - - - - - -Defendant. --------) IN CAMERA Ii AFFIDAVIT OF EUGENE F.

Civil Action No. 80-1562 : ...~

YEATES

I

I

I ; County of Anne Arundel

ss:

I

I

,:

State of Maryland

l'

Ii I::1

Eugene F. Yeates, being duly sworn, deposes and 1.

I:

(U)

s~ys:

I am the Chief, Office of Policy, of the National

I:

Security Agency (NSA).

I: II r ,:

responsible for processing all initial requests made pursuant

u

As Chief, Office of Policy, I am

to the Freedom of Information Act (FOIA) for NSA recoras.

The

statements herein are based upon personal knowledge, upon my

j!"

i· personal review of information ava~~able to me in my offici~l

i:

capacity, and upon conclusions reached in accordance therewith.

i~

\: .:

I

1

;:

1.

This affidavit supplements my unclassified affidavi~ (U) 2. , . I , I executed on September 30, 1980 regarding all documents which h~ve iI

I'i

been located by NSA pursuant to plaintiff's FOIA request but

j

I submit

I

i; I

II I I

I

! I I

I I

I

! i r

I

I II

! I

I I

I i

I i

which have been wi thhe1d

\~ho1ly

or in part by NSA.

this affidavit in camera for the purpose of s~ating facts, wh i ch cannot be publicly disclosed, that are the basis for cxemptiny ~he

records

to the plaintiff. beginning of each paragraph of this

affidavit, the letter or letters within parentheses designat~(s) the degree of sensitivity of information tb~ paragraph contains.

I I

i i

i

!


.. ..:

'I

',:,.~' ';~.

'.:' .:"\'.1".,; . ....: ',"

...

i i

II

Ii ,

.... The letters "U", "C", "s" and "TS" indicate respectively that the information is unclassified or is classified CONFIDENTIAL,

.Ii'

SECRET or TOP SECRET •

1\

"SECRET CODE~iORD" and "TOP SECRET CODEWORD",' respectively.

i;

The symbols "(SC)" and ~(TSC)" stand for

11 "CODEWORD" refers to one of the distinctive five-letter words

,

used to identify the source of the information as communications intelligence (COMINT), to distinguish between COMINT categories and sub-categories, and to facilitate the application of regulations for the dissemination and use of COMINT. ~he codeword

rl

1\ "UMBRA" appearing in conjunction with the TOP SECRET classifica-

tion at the top and bottom of each page of this affidavit, is the codeword applicable to Category III (the highest category)

u II COMIN~ Documents revealing sensitive details about the pro\!

,-

I' I! "

duction of COMINT must bear the classification and codeword

appropriate to the highest category or sub-category of COMINT to which they relate, even though they may not contain COMINT

" "

11

I:

as such. G'he symbol "CCO", which stands for the caveat "HANDLE

I:,

VIA COMINT CHANNELS ONLY", is used to designate information

I:

..;,

related to COMINT or COMINT activities, which, although it does

"

!',. not require codeword protection, must be kept within COMINT I.

I! channels, i.e., disclosed only to persons eligible to

I;

!:

r I! !!

I'

.'

receive COMINT itself~ THE RELEVANT DOCUMENTS

'~.~In

"i: total Ii

Ii,:

processing the plaintiff's FOIA request, a

of two hundred and thirty-nine documents were located

in NSA files.

Seventy-nine of these documents originated with

p other 9Qvernment agencies and have been referred by NSA to 11

Ii

those agencies for their direct response to the plaintiff. I

One document, which I addressed in paragraph 20c of my public

Ii IiI' affidavit, was erroneously tr~ated as part of the subject matter -, Ii of plaintiff's FOIA request. It is an account by a person

Ii"

2

1\

H u Ii i'

t.

II

F

i:


L

assigned to NSA of his attendance at a UFO

s~nposium ~nd

it

\

cannot fairly be said to be a record of the kind sought by the

,

~Od of my

Another document, discussed in paragraph Ii plaintiff. public affiqavit, was recently declassified and released i"'

\:

" "

'

,

\;

plaintiff.

to'

Two additional non-COMINT records have been

I; released to the plaintiff with the exempted material deleted.

I'

I

I;Ii

The deletions in these documents are explained below: a.

••

II

Qy~stio~

A document entitled UFO nypothesis and

Sur~ival

was released to the plaintiff witb the deletion on

II

"I I, page seven of the name of the employee who prepared the draft

.

I and I

i

a deletion of a reference to his NSA component.

I

1'\s I

I

i

II I

i

.j

II I

I

I

i

I; d~scussed in paragraph 20b of my public affidavit.

i~ I; ""

I

!

II

entitled YFO'~rand the I~telliqence C9J!munity Blind Spot to

!

Surprise or Deceptive Qata:] In this document, the author discusses what he considers to be a serious shortcoming in the Agency's COMINT interception and reporting procedures --~e

I

I

i

I I

inapility to respond correctly to surprising information or

I'II

deliberately deceptive data] He uses the UFO phenomena to

Ii"

illustrate his belief that ~ the inability of the U.S. intelli-

Ii Ii

gence community to process this type of unusual data adversely

II

Ii I:

(1)

"

i

! i

discusses

"

I

!j

All of the title after UFO, which addresses

Ii r

I

I

the perceived shortcoming, and all of paragraph one, which

'I:,

ii

in this document were made as follows:

I!

I:

I

affects U.S. intelligence gathering capabilities,] Deletions

\,

Ii

I

~e

i

I

employee's pe<ception of the negative implication!]

I

; Uj:

.


! i I

~ a?p'"j.'r~ t:":... ~...

'["~. -..- .. ~_.~.- ~~ --~ .P

~

I

II

:~:.: : ..

_iiRA . .:.-...

"

'"

of the handling of UFO phenomena uS it demonstrates what he

II

believe,s is the rIess than optimum ability of the intelligence

i I

,

.

.)

-

.\

community to process and evaluate highly unusual dat~ As I

'1

stated in mt public affidavit (paragraph 20b), the type of

i

Ii candor that is reflected in this record must be encouraged

Ii

especially in an intelligence Agency where the most meaningful

II

'1

suggestions regarding ways to promote the efficiency of the

I:

\~

critical Agency mission will of necessity come from within.

1\

n Public disclosure of such information, especially when it

l! advances a novel theory, could have I candor by the risk of diminutiOn of I

i

the effect of stifling such

I I employee runs if subsequently found wrong.

II Ii

"

professional standing the Thus, this matter

was deleted pursuant to 5 U.S.C. ยง552(b)(5). (2)

II1,

Paragrriph

thre~

of this document uses a signals

., intelligence operation ~~insiJ I'

to illustrate

I:I;

the ~uthor's point. This paragraph contains information abou~ : ,. \; SIGINT activities that is currently and properly classified and, ~

I:

Ii

thus, is exempt from disclosure pursuant to 5 U.S.C. 5552(b)(l).

i!"

The material in this paragraph also concerns the organization

i:

\, ,

',.f

and operational activities and functions of NSAGiirected agains!j

.. -;

This material is exempt from disclosure uncer

l.

...~

.,

"I' 5.U.S.C. S552(b)(3) which exempts from release under the FOIA

I

I:

r"

matters specifically exempted from disclosure by another statute.

i

As noted in paragraph 20, sub-paragraph b of my public affidavit,

I I

:;

I:'I

Public Law 86-36 pr.ovides that no law shall be construed to require disclosure of the org,mization or any function of the NSA or any information with respect to activities thereof.

,.,

I;

";.. .

(3)

Paragraph four of the memorandum states the

conclusions and recommenda tions of the au thor.

\'lhile it talkS

of the ability of the Agency employees to deal with unusual 11I'

!~

phenomena it is not responsive to the pluintiff's request 4

1\

Ii I; " I'

\! I,

1\

, :.


~.

..... :. . " : ..

......

regarding UFO or UFO phenomena. ,

I~

I~

any event, as I stated in

my public affidavit (paragraph 20b), the subject that

parag~aPh .Ls

exempt

fro~

m~tte~

of

disclosure because it contains the

: ..

"

employee's'specific r eccmmenda cLons for addressj.ng· the problem of For the reasons stated in

responding to surprise material. !

I i.

sub-paragraph (1) above, these r ecommenda t.Lcns are exempt from

ji disclosure pursuant to 5 U.S.C. §552(b)(5).

One specific recom-

I!

mendation suggests an operational approach to solving the problem

I:

which reveals NSA activities and is, therefore, exem~t from

1\ disclosure pursuant to 5 U.S.C. §552(b)(3) as

It of " " I;.;'". tactl.CS

III it

i

rj;

This section talks~bout deceptive communications

used biJthe Vietnamese against U.s. forces and does not

not responsive to plaintiff's request.

I:

I!I

report.

include any reference to UFO or UFO phenomena and is, therefore,

g matter ,;

The final deletion is in appendix A, paragraph 10

(4)

11

eXPlai~ed above.

Nonetheless the subject

of sub-paragraph 10 is currently and properly classified.

II 1

'.i.'hus, even if it we r e deemed to be within the scope of Plaintiff,::;l request, it is exempt from disclosure pursuant to 5 U.S.C. §552 (b)(l).

I

CorUNT REPOR'rs 5.

~ 'l'he

i II i

remaining one hundred and fifty-six r eco r d s

;: ,: being withheld are communications intelligence (COMINT) reports \, I; which were produced between 1956 and 1979. For purpo~es of my

\

I;

I

j; p discussion here, these records are organized into three groups

Il

based upon the source of the report.

a. produced by

One hundred and fifteen of these reports were

~he

oignals intelligence

1111.... ~hese

org~nization~~

COMINT reports are provided to

NS~

I

I

I

I i i \

: \

5

I I

I

I I

I r:»


___ ... _:l

r:

.... __ ~. I~····'" .~~,..,:·--.·t

"Or'"

)

"' "! "I

I

I

I

(1)

j'

"

i

by

i'l: : ;

Two of the records at issue here were

s~eme::Slt~.• :

If/_~as

provided to

NS~.

prcduce~ .G'he

[The .

772mp L

j:

1;

j: j

0'

r.

t'

Two of these

CO~INT

reports originatc9 from

6

o

I; I'

I!

I"

I

l: r i:

II I

~po,t "om;:,'1

Iii!

b.

I

P"~


.:

in exchange for the sharing of technology and COl-lIN'l' inrormtltion.

, ..

,. .-,,

.,

~

'!.

'.

,

c.

The remaining, thirty-nine

CO~IIN'r

I

\;

qo.cuments we r e

produced by NS/\ or relate to NSA SIGINT operations.

~ \:

That is,

.'.

these reports originated 'at liSA itself oi in field sites under

\

the operational and technical control of NSA.

I'I:

6.

I:

Ii

(U)

All of the COMINT reports are in either message or

summary format.

"

A report in message format contains a single

underlying communication

pres~nted

in a classic cable format,

i.e., the verbatim text of the particular transmission, preceded and followed by "extcrrials" consisting of:

data about the ce nde c

i and the recipient; the dates and times of transmission; and

r:

I!

other technical information.

I!

/\ summary, as the label suggests,

provides in summary form the contents of a single message or

jJ

II

\:

of a small number of related intercepted commun Lc a.t Lo ns , often

j:

accompanied by some'technic"ll datu.

I

7.

~one

hundred and fifty-four of the one hundred

and fifty-siy. COMINT reports are based \~holiy upon intercepted communications of foreign governments transmitted on non-public

. :. -.

cO~Runications

facilitieu in my public

The other record which is not on intercepted communications,

froiJ"gOvernme~t ne!',i, [facilities,

7

Ii

! I

~h IiI.

ii

.,i!

.',....)

(") ~L.,

~a9C~

!: • ' .•z ,

S... D .J.


!0::;; ,

a description of an incident purported to have beon Le a r ne d

\

from U.S. interception and analysis

I

I~ommunicatiohs:.1 , I;

8.

G"'~he C01HNT

Ii ~an

r:

a.

ll:!

I?

mEr,

ElF

-

i

format, was produceu-b~"II.

F~cilities.

:

...

1

; (forn-

.-

I

summaz y --

I I

;

-r

I

,"

I

the intercepteci communications between tH0

i

~ircrafts and a 9found controller i~JtIIIf

I: U9 71 • .

1- 1F1~e- . . .

hi

oil

in the sky north

\1

\

on~lEeport, in

!TIunications

I

COMIN'r Reports tvhich-'

-

Ii

!

~argets as fOl~o~siJ

_Target Communications Tr.ansmi tteel on]·

l ~rom

bV~:1iI7'1 .•

be' further described in terms of

sources and intelli9:nce

i

reports originated

-.

report a "phenomena"

F.frhre~eports

are

aummard e s 0 i l _ G e s s a g e s intercepted froEl) . • • • • • •

I~~o~munications.

I'-..-r: STlOi k~l!.adar ·operators

Ii ~I;essages,

i

The messages. were transmitted frolii]

to a central control station.

th~

_I

In thestLJ

&erators report everything that

"I: " appears on their radar l;jcreens-.

t'1hen they cannot identify a

1\

: [!extJ

!

\

1\

b.

~'l:_Hep'ortslihich

~ommunica~ions

~tinc

hundred

an~

System

T?rget the]

oiT

nine documents in summary

I I

i

I

!

uses

·unidentified

i II

,: particular object, they report it as an unidentifiable object.

I:

I

~orm:~rreport

i

I

:

II

I I

i i _

..

I' on intercepted communications b e t w e e n _ · raelar

I:j:

I:

operators and a central control point.

r ,similar il

These summaries arc

to the reports de s c r Lbed in SUb-po/Cl9raph a above arid

n Ii

IiII

I:

i!

ii

I

a

1 I i

"it .~

J

!!

IiI'

I

I

I

r

_1'" r«r

. . .( ..:.,i.._

'~'?5e'l"

i

I

II

I I i _.._.a I__ ':".:


II

I!

Ii

11

~gain,

( ..5TET-~ unformation pertaining to the radar ST£r#~

/i operator's report of objects 0...n---:1-11..-·s--r-a-=di"r screen' whi ch ho I:

,

I;

I

II

cannot identifyJ

I;

c. JIIIIIIIIIIIII£COMINT Report Which Targets]

I"

~ommunications. This document is a

I;. . . . I;

summary of intercepted messages prepared ·in 1976 which report]

"

j!

rad~T~~aCking information

Ii Ii

central control point.

from

~"""'~a~; station

to a

It is similar. to the reports described

I I!

in sub-paragraphs (a) and (b) above~

d.~OMINTReport Which Tarqets]

j:

TRlcommunic:ations.

Ii . . . .

Ii

This summary was prepared

••• 0t

in 1966 bi)

I:

contains a

1\ summary of intercepted communications which were transmitted

IiI!

and the]

between the

&ommande~ regarding a.yellow objebt that

Iij;

was reported to have fallen into tile -sea,

~overnment ne~"l!acility.J

L were transmitted along

,:

0:.

j!

Product of

:: SIGINT I:" I..:.:==~=.:::...=..;:=.:.:=.-=-::.:::-=~=:.::-=::-. I'

of

i.

i

.

produced from

These messages

Jfie~' fiite

which

ommunications

[The

tW<;l

....

reports wer e

i~(2perated by

the

C:!he reports were.prepared in 1966 and contain summaries o£ the communica~Sn:1

tions transmitted bi1~adar operators as discussed in

Ii I~

sub-paragraph b, above.

\;

Ii

report to the other.

One of the two reports is a follow-up

The relevant activity reported deals

0:

:' with the tracking of an object approximntely .50 nau t Lca L

I;

l' ~iles i:

l!acility.

E

I;

I Ii

I

!

!"

.

northeast

oil~Gy

As ,,,ith the messages described above, these cmlINT

reports are summaries of

th~ ~essagesJ 9


9. i; I·

~,

.

--;t:t~:;b~7.i:~~:::~~ .,J:'·3~~~~f.*:'~" .~

·'

~. ~~~~:rigi~a:ed reDort~ -

Thirty-eight

docu~ents

~re the direct prcd~ct of NSA SIGINT operations and one document describes classified SIGINT

acti~ities.

These documents cnn be

I'

':

I

further des6ribed

QS

I. I;

Ii

j I

a.

The document uescribing SIG!NT operations r epo r t si

I

.1

[3.n alleged intercept oij

I

factual circumstances of the incident

J,

i; were received I; l: /pl~~tiff and :'1LI

IJi!S.ommunic;;J.tions. repo~tea

The

in this record

-~'"='"---~----~ by NSA from ran Fon!, requester other than the'

are considered to be fictitious by NSA analysts.

i~ I:

b.

One record is a 1973 report which summarizes

••1'.. I

UI&essa9.e transmi tted)

Cfromthj _ _

purported UFO zighting

i

l:

I'

i· 1

I

!:

F I i~ L i:

biJlllllllll,

10

i

L ..

i

I

,1

follows:

i

!1

I

." - . ...., . :i

U

'.

>iu,ri",'j ITUX• •"'"

I


Ii II

I'

I~

c.

Ii

Twelve NSA-originated COMINT reports target

the communications links and systems of• • • • • Two documents, in summary format, report t h e ~

i'

,

commun ica t.ions.

I:

Two of the records are

~

format and report the~"II,,"""II"

Ii

A. ~ ~n.~essa?e,

~

~~

tions which relate that an unidentified flying object :::municasighted in the air by a

I

ji

nit.

\; contains a summary of _

I;

One report

activity based upon communica-

tions in reaction to an unidentified flying object along the

!~"""""""' .. '

1;""-"-"

Two documents report on communications

transmitted between

and_

.

.. ;,t.• • •~..ho report visual observations of luminous spheres. One "

is a summary of a transmission

Finally, "

four documents in this group of twelve were intercepted from other. • • • • •

communications targets. One document is based

on the intercei?ted transmission-of"a:; reporting a bright light.

,.

The second record is based on the

i' intercept of a transmission of an

to

i

I: a ~ station seeking a report on any shining phenomena or

falling meteorites observed on specified dates.

The third and

I

i

fourth reports are a summaries of on-going debates on UFOs among

based on intercepted communications t,ansmitted

Ii I

I

reports

\: :,

All five of these

Ii n H

. units and

reporting observa-

11 tions of luminous objects in the sky.

t:

r\;

I~

~:

r

11

,:

r

I

I

I Ii I I

I:

I

I:!'

I I

j.

I

"j:

I

I,

Ii 1;¥:f,'.,C

II I

;\' ~.

I

A,*:* .

.i~",,,:*•.

y~

..

;

::,


Il~tl~g!!tji~~J:>i?~~2tl1Zii:;lIfi~~ME~]1if~~~~~~if.~i~Ri2~i~t', " ':, .....) J~<.);r...\..d IiI ::i"iDA. _ .... I.

~

I:

"

,

j:

.

I

.

~

-

~Q:'..~~:-----..

.,i."io!t'.,,_·/C)l

""A .

e.

Four NSA-originated COMINT reports target

-:Ij ~ communications links

or systems.

Three 'reports are in

i

message~trans.

summary formrt and are based on an intercepted mitted

I

~

sites

unidentif.i~~flying object

reporting an

::.:..:e.r Y high altitude;

11'1t

an intercepted message transmitted from ........

\:

rT'. reporting

I.

that an unidentified flying object with two

.

,

.'_n·

\~~,li9htS"ha:d passed over _ a n d an intercepteo

\. • ns.. .

i,.~oicJ message transmitted to

s&

facility by a

' - w h o :·reported an unidentified flying

L object.

lI!.,.~he

The fourth report is based upon a message bet\:/eenl?

'~~.un its ~

.

f.

'bovernment

p

sightincr~

'Sixteen NSA-originated COMINT reports target

,net:tcomDlu~:,~ations:~ystemsand lin~:'Of

r:a,e'/eral different 1:

regarding a UFO

I

countrie.~.

This group contains summaries

of intercepted transmissions bet\'1een ....• • •

.J'

(two reports based on communica-

j:

tions o f._ · . _ and an unidentified senc1er reporting

I:I:

sightings of a UFO), . . . .

\, on communications \: flying objects),

7.

(two reports based

by1

reporting unidentified

7'.( a

report based on a message from a

I i _ t o an unidentified receiver

li- -

reporting a sighting of unidentified flying object"s},

II: . . I:l:

.r.

in~

(a report from an . . ,

SUMO

>i.to t h e _

in _ _ reporting an object that appeared based on

to be a rocket over

I:

I;

an~

communications between two

l.

uni~entif1'e-d ~i:ilonJint..hich.:~reported

j:

an

I

sightings of bright or light spots),

I:

(a r epo r t" based

I:

I! j;

Ii

Ii

12

i

I

I'

I

r

II

i:

I

i: i:

I


I

II I,

.. .

I'

I"'"

.~

,"-1.:- .'"

f""~ ~'? e'~'''''' it..... 'f''! 'j" 1- .. • . , "'"...".. I

I'.

. - -.

r-~

··.

·,,·iit ')

J .; ':, :.: :_-~ ., ':,..

•.••••. •

I!i on atr.nsm~s~o: fro~:-:~~;;;":it t~-

reporting a sighting of an unidentified flying object),~

I: ,

2

.•

j: (a report based on a message f r o m ' - ' t o an a~ unidentified i: recipient whli.ch provided instructions for reporting the sighHng

I,

I I I

"

I:

(a report based upon a trans-.

j1 of flying objects), and

mission b e t w e e n _ reporting that some

..

:>aw a ball of light about the size of an orange moving overhead).

I:

I:

One document in· summary format is the product of an inteI;cepted

I:

transmission reporting the sighting

H I! ball of fire.

I:

l: . . . . to the' Il unidentified flying reports

1:

frem , .

. reporting an

object.

One document in summary format

th~text

i" 1:

an elongated

One document in message format reports the text

of a _message sent by the

i:

of

..

which was transmitted&lOng a Ugovernment

It reports, among other items, -:n increase in UFO

ne~ facility.

act~ity.

I~ The last three documents in this group report on intercepted I'

I:

Each report

communications of • • • • •

I.

:: contains information 'derived from intercepted transmissions I:

i.

I: ""'''''''''''-

SrE;T

reporting the tracking of unidentified aircraft by ~Crada~

n operators.

IiIi i: j!

EXEMPTION OF THE COMINT REPORTS 10.

'-iE, 6)

Pprimary and often overriding consideration

I.

regarding the classification of CmlIN'r reports is tha t the need

II

to protect communications intelligence sources and methods is

I:

greater than the need to protect sensitive contents of the

i

underlying intercepted message$. Nevertheless, no portion of j; j; the contents of COMINT reports may be disclosed, where, as here, I' I: revealing the information would have the effect of identifying

rI ~ I·

13

i:

I:

I:

Ir~

:: j:

i:

I'

i:

.....'m., ..... '10,.. TF -",._:.,.1."_, .. 'II' I' ~~ i ?J IIfi 6l';~~ T ..."..,. ....... ",.:.....

_,T

...

I:

'..


£or the target communicat6rs the specific communications that had been

"

-:

;.-0.

intercep~ed

and exp1oLted.

One hundred and fifty-four of

the CONINT reports being \'lithheld are the product of intercept operations directed against_foreign' government

,

"

ccmmun Lca t Lcrls systems within their territorial boundar Le s ,

1::

In 1'·1 ; c:evea :l.ng the con ten ts of these r cpo r ts I ,.-. i

I;

'\ l '.

controrl~~

capabil i ty of NSA to target munication systems.

\~ould }i;is'close

the .-

thes!1~vernme.nt'controlle~om-

Even where the .underlying commun Ica-

Hons

1\ I'

I; proces~ing

had been intercepted ,£or

by NSA.

Moreover, the

disclosure of these reports would reveal much more than the identity of the targeted communications systems •., It

\~ould

reveal as

I:,:

I!

communication~

11.

sources involved in

I: I:

this case -- which are specified or implicitly identified in

"

r:. the CO!'lINT repor ts being \d thheld by NS~ --L,E-re· the s~urC'e:of"

I

extremel~

I

l~ ;

valuable. communications'

range of kinds of information

~ctiViti~s

l'

til

illt~ligence covering

a broad

gl ~n~Glatter.s.J

,,!

\: melease of these d oc ume n cs would seriously damage the ability of

n

the United States ~o gather this vital "intelligence information

I'!,

for the following reasons: a) would

Disclosure'of the report diSCUSsed in paragraph 9b

infor~.

communications

I

I'lm

U:hat their

b~nternationat common' carrie~acilitiesJ -

' ..

fro~e&nd othe~

I:C

I~

I

"1I1I~~an

.e. be intercepted and selected

out by NSA, and, even more importantly, that

th~

14

• v.

,

.'

"


i; l:

j;

I

,

i

more, revealing the NSi\ intercept cpe r a t i.o n

I:

tional

I

II

commo~

access carrier

i:

to the communication.:;

in::eJi:1a-

rout.~Ghi':h yielded, th~

~;le

! : ' - f e s s a g e could :ause

!:

<:!.g<lin:::;ll~e"

un i ted sr a tez to lose acc e s s

oiJ~her foreign governments

wh o use tlElt

-'''-~

i same communications rOllt~ Ii

l:

j !: ~;

(lbl'

ta .rnu fne

70

The

at issue here, based on messages transmitt~d~;ia :J~,

international common access carrier this Agency's capac I cc~tions

tiJ:o

As I

to the extent of

h~ve

NS~'s

potenti~l

i:

I:

I; "

I

i

intelligence value. ___

stated in my open affidavit, when

ale~ted

capability, and if given information from

15

I

reveal

select from such in tercepted communi-

those messages having

(c)

facilitii.~~OUld also


;' \;hich inferences could be drawrl as to the prcc~zsing !~ethods

i' I

used, foreign intelligence services defeat portions of NSA's present

I~,

r[iargetinili,rlternational I

could

~;culd

for~ign

,

be able to

e~a~e

or

intelligence efforts

common carrier linW

'rhcs~

countries

~e expected to use different routes of com~unic~tion or

I I'i

,.I i:

i.

I!

r I

I,

i;

Ii

I: j;

r. " I:

\:

!'

j: l'

j;

j:

r.

disclosure of other records at issue here, would

r

!:

I'

r

result in the loss of the intelligence

informatio;f~~thered .,v,..:.

!: from the interception of the government net communications

,

i t.

L

systems:"'-·, The value of the intelligcnce data collccted fl."om s' these sources is obvious.

1:-

Ii i:

(a)

I!

I:I:

example, analysis of data collected from

of~G.ommllniCatiOn~t.2&.7£/~f.J government:j.b"I~._lUli.' •••

the intercept

1 foreign Il"

~or

(paragraphs (lo, o, c , e and 9f) I

,.. nll'(£ommllnications

(p~rilgraph

{paragraphs

9cl, or transmissions I: ,

~

I'

I

I " !:

J: I,

, " L

~"',ij~~:J~j'.'.it .... '

•••.. vtiisn."iat• -'.. . - -•llff' -.'

~

'.

-.~


1J~~i[&~tt:i~~~t}~~!iL~~~~;~[~~~~~~!4~$~~~~I~i~:\":\ '.;:. Ii

:rOP'eeeRE7~ i~j"ta!i£.::r.r

'i

!;

iI:l~easurably aids U.S. analysts'

!: 3d and 9d, e, f) j:

~.,: th~_ a

3

..... ::~'."

,

\

I:

on

~nalysts

I

studies of

I I

This information enables planners in turn to assess

I the capabil i ty ofl I : . J

i &nd \;

.

b'.

, ,

til~~c~ivity

: _ f!y monitorirnr..

l;_~ansmissions u.S. analyst

j ! I

! and other

II

targetei7t1111111t~ommuni-

i' cations provide critical technical

as dati]

I· i i'i' 'the

is vital to

i'

developrn~nt

I

re9ardin~eir nation'i)

\: LIntentions, in both the short and long ter'ms.

;\~overnment net systei:.l~scribed here .

l-loreover, .thi]

corrt.Lnue to yield valuable

-,CC

th~.'• • • • • • • •

I

intelligence data -- including

I:

tion systems discussed in paragraph

9g.

communica-

••••••••••r

·~

Ii i.

I.

I:

l: !:'rom these sources u. S. analysts,. are able to compile reports on ,.

!:

Si9nific~ d

r. I'

.

&Ctivit~J t:

and~~vents. ,Also, by monitoring thes~

·-" ..····T~~ranSmiSSi.'bnS, analysts are ab,le to obtain d a t a to) l . . . . . . . .~ :..J - ,. i: 17 i'

i'

L \.

[":

~.

'r

'ssH&

j

among th2f

!; ~urces of intelligence information

I

I . I

of U. S. countermeasures.

. t '_~ominunicati"ons-are

....

I

and relating' it to geographic areas, the

,:

,

I

useful in evaluating!

;~ the performance capabilities o i ) '

..

I

1

' .

transmitte~_ommunicationsis

,':,

I

\

are able to report

th~.:::Ipabilitiesof forei9~.Un. . . ill

generally.

'I"

..11 U

F•

\

!

'.: ,':,


i.

j

I:

',: II:

(~'I'he

13.

~I

\:

.' ':- .

need to ,prote.ct against any identification

of the target.s of intercept operat.ions is equaled by th.e need to protect against revealing the identity of the

.

'.

i; @sclosu::e

..

..".

r

I..

.,

have ex·treme1~r adverse repercussions

L '

.,I~.'

..... ":.'

of the

I:

i!

....,

sources

:.:.'

. ';

to the U. S. over

...-

..

:

':.

..

;

r"

"

.':

.

.

~.

..;.

,.'11

;" • _,' ,'..'

...

.....

...

'

~

.~.

...,,.,....

. .......t_,,;, ..... ·

L"';. ..~t-... -:.

:

I;'

..


,,:'

: ...

CLASS~FICATION

OF THE 'WITHBELD COMINT REPORTS

1I~""IIII".reports relating to COMINT

activities at issue H

rl."

he~e

of foreign governments or SIGINT operations and, thus, remain properly classified.

F

are based on intercepted communications

In conducting this review I have weighed

I

!,

the significant need for openness in government against the

j'

i! likelihood of

d~.m3ge

to our national security at this time and

~: I

I

I, 1:

have determined that each record should continue No meaningful portion can be segregated from the records without revealing classified information about the intercepted communi-

! cations un.:lerlying the CO/'IINT reports. Because each record ! each portion thereof is properly classified under Executive !. Order 12065, it is exempt from 'disclosure pursuant to 5 i

and

U.S~C.

I,

I, S552(b) (1).

....

II

I;

!i

r J "

:: .. '

interception, processing and exploiting ~ of fOrei?~ communications sent o.~:,internatiOnal common carrier

. 15.

..... "}

l~ facilitia}. or by government net channels are within the COMIN'l'

j:'--

i. mis~ion

II III.

of NSA.

,j;

Ii

These

I' functions and activities of NSA are particular j' I'

I. that may be withheld under 5 U.S.C. r. I"

!!

, I

I: "

i, t r

~~

r

19

typ~s

of matters

ยง552(b)(3)" since Section 6

"

"

;.,


':.:

~~'~:~I' ;.~l::~~~ .:; :~;;;:.:~~~rq~ti:i~;~:.~~: ~~~:f..~::' '~;,;'~i,;:;~ii;:: ~~~~.k~~ ~.:..:~~~A~ ~:::{~·~~~r:!'~?;~~~~ . ;~::~~~t:ts~.::~t~~~~~~l/~tJ~t~; . :.~~~ ".".:, ~~:~ . ;;J.~~~"~~':i:1"5*tii*"W·~~.s-d'··A'g}.;,~~·@Jiih't;·~A:-s '·-9;"\j,,.q&'''''~t~·it·; '4~:~;j;,,·t ¥i;';:a~~....,

i:

"

?"~~~\Q G C giii] P -:"''"1'' U99.W(~7'.RJii ..... ..;d, f::0, .. .....' ,. ,-_........ ..... _ ... v

I,;,

"~

'Ii

• '-'"'

. th e Agency . t 0 re f use t 0 re 1 case tl1em. o f PublJ.·c Law -8·...6 :36 permJ.ts

,;

,

u

\ &

iI 'I

\

Ii In this case, the COMINT reports reflecting those functions and

I

";~,fficac~..

,

I;

activities must be withheld to avoid compromising the

!:

of the sourc'es of CONINT information involved.

I:

:'

\ill/J'" Information

16.

I!

L I'!'

about the interception, pro-

cessing and exploitation C?f the foreign communications underlying the records being wi thheld by NSA is classified information

" concerning communications intelligence activities of the , 1\\ United States the unauthorized disclosure of which is prohibited by 16 U.S.C.

I,:"

S798, paragraphs (a)(3) and (a) (4).

This information because

I! i

I I

1 I

i I

I I

it is prohibited from disc;.losure by statute, is exempt from

II

IiI!,;

release under the FOIA pursuant to 5 U.S.C. §552(b)(3).

I'

r

that would be disclosed by these records is information about

IiI;

17.

,;

(U)

As stated in my public affidavit, the information

I: intt!lligence sources and methods protected from unauthorized

disclosure under 50 U.S.C. 5403(d) (3).

i",;',

The reports are therefore

II

i ' Iii,

exempt from release under Exemption 3 of the FOIA. 5 U.S.C.

r !'

S552(b)(3).

18.

I:,.

(U)

In view of the foregoing, and in order to

protect existing sensitive and important foreign intelligence

I.

I.

i I I !

Ii I

j

L sources and processing techniques vital to the national

I: security,

I certify that disclosure of past and present foreign

!

I

I: intolligence communications activities of NSA reveal€d in the · ...

I!I; records

the plaintiff seeks would endanger highly valuable

:: sour cea of foreign intelligence.

I;, 19. (U) Finally, I respectfully I: Court treat this affidavit in the same

request that the secure manner as it

j;

has been handled in submission to the Court, and to return

j:

it to appropriate personnel of the Department of Justice

I'

!'

as soon as possible after review by the Court.

The Department

i

"[:

20

I

\'

j'

! j'

1

..

~

i

.i


,:

.;

I

I: I.

i;

11 Ii

I;

..;

I; of Justice will retain custody of this document under the !. i; ,. Court's seal, subject to any further orders of this Court

~

,

!';.

"

"

i

I

or any other' court of competent jurisdiction.

.t.

\I; I I j,

I:: t'll1UJ.._&.1tg..:A...~

1

I

~P. YE~ES~'~~~-------

i:

Chief,

I:

0~ce

of Policy

Ii ..· .... ·· . ..•••l~ ,Sll.b!?Cf ibeu and sworn to before me this

.. ' ~. -I~;;;.:.c}ay of October 1980. '.

\

~~

: I.,;

~. , I ~ .0...

"

I'

i!

J:

,',

. ".

"

,. :,., ,

.' j t

.

.....

.. . .' .. \ "~. .... .::. ' M~ . ~.omrii·ission expires

,'.

Ifrl2

:

!

!:

i.

I:

L

-.~

I

l'

, I:

!

I I

I I

j

.... ::

,

I '.

I

-,'

-.

r

I

I

I

,I:

I

I"·

,

1:

ii

. t•

'

,I

I:

!:

:

II

I

j

::

,"

"

i:

!:

"

I

!.

21

I, !:

.'

!

,. i:

I

I'

p

I:

j

I:b .'.' I'

i:

I.

I: .t. :'

r

,

I~':"!i;~"~~ ti L..:-j ~t-·.~:~~

W \.t..~· ~\

I

I.

'.'


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.