0
,~
II III
seeK!. ( '
I
I
__ •
_ - - - -
t;
.:~. ~
n':,
.• :
i FLYING OBJECTS SECRECY, ,f !
i
v.
I'
I~
} } } ) )
NATIONAL SECURITY AGENCY,
I~
.; • .-i .; I'
.:'
t./ 'r .'~ ," ,',.~.,.J
}
Plaintiff,
I; n
"
0
} } }
! CITIZENS AGAINST UNIDENTIFIED
,-
...
UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLUMBIA
j
,"
CJ i\qr!J"-'~
~pr r-=-- .,--' .._-_.
I
,
',
'."
".;; '.~',:
il - - - - - -Defendant. --------) IN CAMERA Ii AFFIDAVIT OF EUGENE F.
Civil Action No. 80-1562 : ...~
YEATES
I
I
I ; County of Anne Arundel
ss:
I
I
,:
State of Maryland
l'
Ii I::1
Eugene F. Yeates, being duly sworn, deposes and 1.
I:
(U)
s~ys:
I am the Chief, Office of Policy, of the National
I:
Security Agency (NSA).
I: II r ,:
responsible for processing all initial requests made pursuant
u
As Chief, Office of Policy, I am
to the Freedom of Information Act (FOIA) for NSA recoras.
The
statements herein are based upon personal knowledge, upon my
j!"
i· personal review of information ava~~able to me in my offici~l
i:
capacity, and upon conclusions reached in accordance therewith.
i~
\: .:
I
1
;:
1.
This affidavit supplements my unclassified affidavi~ (U) 2. , . I , I executed on September 30, 1980 regarding all documents which h~ve iI
I'i
been located by NSA pursuant to plaintiff's FOIA request but
j
I submit
I
i; I
II I I
I
! I I
I I
I
! i r
I
I II
! I
I I
I i
I i
which have been wi thhe1d
\~ho1ly
or in part by NSA.
this affidavit in camera for the purpose of s~ating facts, wh i ch cannot be publicly disclosed, that are the basis for cxemptiny ~he
records
to the plaintiff. beginning of each paragraph of this
affidavit, the letter or letters within parentheses designat~(s) the degree of sensitivity of information tb~ paragraph contains.
I I
i i
i
!
.. ..:
'I
',:,.~' ';~.
'.:' .:"\'.1".,; . ....: ',"
...
i i
II
Ii ,
.... The letters "U", "C", "s" and "TS" indicate respectively that the information is unclassified or is classified CONFIDENTIAL,
.Ii'
SECRET or TOP SECRET •
1\
"SECRET CODE~iORD" and "TOP SECRET CODEWORD",' respectively.
i;
The symbols "(SC)" and ~(TSC)" stand for
11 "CODEWORD" refers to one of the distinctive five-letter words
,
used to identify the source of the information as communications intelligence (COMINT), to distinguish between COMINT categories and sub-categories, and to facilitate the application of regulations for the dissemination and use of COMINT. ~he codeword
rl
1\ "UMBRA" appearing in conjunction with the TOP SECRET classifica-
tion at the top and bottom of each page of this affidavit, is the codeword applicable to Category III (the highest category)
u II COMIN~ Documents revealing sensitive details about the pro\!
,-
I' I! "
duction of COMINT must bear the classification and codeword
appropriate to the highest category or sub-category of COMINT to which they relate, even though they may not contain COMINT
" "
11
I:
as such. G'he symbol "CCO", which stands for the caveat "HANDLE
I:,
VIA COMINT CHANNELS ONLY", is used to designate information
I:
..;,
related to COMINT or COMINT activities, which, although it does
"
!',. not require codeword protection, must be kept within COMINT I.
I! channels, i.e., disclosed only to persons eligible to
I;
!:
r I! !!
I'
.'
receive COMINT itself~ THE RELEVANT DOCUMENTS
'~.~In
"i: total Ii
Ii,:
processing the plaintiff's FOIA request, a
of two hundred and thirty-nine documents were located
in NSA files.
Seventy-nine of these documents originated with
p other 9Qvernment agencies and have been referred by NSA to 11
Ii
those agencies for their direct response to the plaintiff. I
One document, which I addressed in paragraph 20c of my public
Ii IiI' affidavit, was erroneously tr~ated as part of the subject matter -, Ii of plaintiff's FOIA request. It is an account by a person
Ii"
2
1\
H u Ii i'
t.
II
F
•
i:
L
assigned to NSA of his attendance at a UFO
s~nposium ~nd
it
\
cannot fairly be said to be a record of the kind sought by the
,
~Od of my
Another document, discussed in paragraph Ii plaintiff. public affiqavit, was recently declassified and released i"'
\:
" "
'
,
\;
plaintiff.
to'
Two additional non-COMINT records have been
I; released to the plaintiff with the exempted material deleted.
I'
I
I;Ii
The deletions in these documents are explained below: a.
••
II
Qy~stio~
A document entitled UFO nypothesis and
Sur~ival
was released to the plaintiff witb the deletion on
II
"I I, page seven of the name of the employee who prepared the draft
.
I and I
i
a deletion of a reference to his NSA component.
I
1'\s I
I
i
II I
i
.j
II I
I
I
i
I; d~scussed in paragraph 20b of my public affidavit.
i~ I; ""
I
!
II
entitled YFO'~rand the I~telliqence C9J!munity Blind Spot to
!
Surprise or Deceptive Qata:] In this document, the author discusses what he considers to be a serious shortcoming in the Agency's COMINT interception and reporting procedures --~e
I
I
i
I I
inapility to respond correctly to surprising information or
I'II
deliberately deceptive data] He uses the UFO phenomena to
Ii"
illustrate his belief that ~ the inability of the U.S. intelli-
Ii Ii
gence community to process this type of unusual data adversely
II
Ii I:
(1)
"
i
! i
discusses
"
I
!j
All of the title after UFO, which addresses
Ii r
I
I
the perceived shortcoming, and all of paragraph one, which
'I:,
ii
in this document were made as follows:
I!
I:
I
affects U.S. intelligence gathering capabilities,] Deletions
\,
Ii
I
~e
i
I
employee's pe<ception of the negative implication!]
I
; Uj:
.
! i I
~ a?p'"j.'r~ t:":... ~...
'["~. -..- .. ~_.~.- ~~ --~ .P
~
I
II
:~:.: : ..
_iiRA . .:.-...
"
'"
of the handling of UFO phenomena uS it demonstrates what he
II
believe,s is the rIess than optimum ability of the intelligence
i I
,
.
.)
-
.\
community to process and evaluate highly unusual dat~ As I
'1
stated in mt public affidavit (paragraph 20b), the type of
i
Ii candor that is reflected in this record must be encouraged
Ii
especially in an intelligence Agency where the most meaningful
II
'1
suggestions regarding ways to promote the efficiency of the
I:
\~
critical Agency mission will of necessity come from within.
1\
n Public disclosure of such information, especially when it
l! advances a novel theory, could have I candor by the risk of diminutiOn of I
i
the effect of stifling such
I I employee runs if subsequently found wrong.
II Ii
"
professional standing the Thus, this matter
was deleted pursuant to 5 U.S.C. ยง552(b)(5). (2)
II1,
Paragrriph
thre~
of this document uses a signals
., intelligence operation ~~insiJ I'
to illustrate
I:I;
the ~uthor's point. This paragraph contains information abou~ : ,. \; SIGINT activities that is currently and properly classified and, ~
I:
Ii
thus, is exempt from disclosure pursuant to 5 U.S.C. 5552(b)(l).
i!"
The material in this paragraph also concerns the organization
i:
\, ,
',.f
and operational activities and functions of NSAGiirected agains!j
.. -;
This material is exempt from disclosure uncer
l.
...~
.,
"I' 5.U.S.C. S552(b)(3) which exempts from release under the FOIA
I
I:
r"
matters specifically exempted from disclosure by another statute.
i
As noted in paragraph 20, sub-paragraph b of my public affidavit,
I I
:;
I:'I
Public Law 86-36 pr.ovides that no law shall be construed to require disclosure of the org,mization or any function of the NSA or any information with respect to activities thereof.
,.,
I;
";.. .
(3)
Paragraph four of the memorandum states the
conclusions and recommenda tions of the au thor.
\'lhile it talkS
of the ability of the Agency employees to deal with unusual 11I'
!~
phenomena it is not responsive to the pluintiff's request 4
1\
Ii I; " I'
\! I,
1\
, :.
~.
..... :. . " : ..
......
regarding UFO or UFO phenomena. ,
I~
I~
any event, as I stated in
my public affidavit (paragraph 20b), the subject that
parag~aPh .Ls
exempt
fro~
m~tte~
of
disclosure because it contains the
: ..
"
employee's'specific r eccmmenda cLons for addressj.ng· the problem of For the reasons stated in
responding to surprise material. !
I i.
sub-paragraph (1) above, these r ecommenda t.Lcns are exempt from
ji disclosure pursuant to 5 U.S.C. §552(b)(5).
One specific recom-
I!
mendation suggests an operational approach to solving the problem
I:
which reveals NSA activities and is, therefore, exem~t from
1\ disclosure pursuant to 5 U.S.C. §552(b)(3) as
It of " " I;.;'". tactl.CS
III it
i
rj;
This section talks~bout deceptive communications
used biJthe Vietnamese against U.s. forces and does not
not responsive to plaintiff's request.
I:
I!I
report.
include any reference to UFO or UFO phenomena and is, therefore,
g matter ,;
The final deletion is in appendix A, paragraph 10
(4)
11
eXPlai~ed above.
Nonetheless the subject
of sub-paragraph 10 is currently and properly classified.
II 1
'.i.'hus, even if it we r e deemed to be within the scope of Plaintiff,::;l request, it is exempt from disclosure pursuant to 5 U.S.C. §552 (b)(l).
I
CorUNT REPOR'rs 5.
~ 'l'he
i II i
remaining one hundred and fifty-six r eco r d s
;: ,: being withheld are communications intelligence (COMINT) reports \, I; which were produced between 1956 and 1979. For purpo~es of my
\
I;
I
j; p discussion here, these records are organized into three groups
Il
based upon the source of the report.
a. produced by
One hundred and fifteen of these reports were
~he
oignals intelligence
1111.... ~hese
org~nization~~
COMINT reports are provided to
NS~
I
I
I
I i i \
: \
5
I I
I
I I
I r:»
___ ... _:l
r:
.... __ ~. I~····'" .~~,..,:·--.·t
"Or'"
)
"' "! "I
I
I
I
(1)
j'
"
i
by
i'l: : ;
Two of the records at issue here were
s~eme::Slt~.• :
If/_~as
provided to
NS~.
prcduce~ .G'he
[The .
772mp L
j:
1;
j: j
0'
r.
t'
Two of these
CO~INT
reports originatc9 from
6
o
t·
I; I'
I!
I"
I
l: r i:
II I
~po,t "om;:,'1
Iii!
b.
I
P"~
.:
in exchange for the sharing of technology and COl-lIN'l' inrormtltion.
, ..
,. .-,,
.,
~
'!.
'.
,
c.
The remaining, thirty-nine
CO~IIN'r
I
\;
qo.cuments we r e
produced by NS/\ or relate to NSA SIGINT operations.
~ \:
That is,
.'.
these reports originated 'at liSA itself oi in field sites under
\
the operational and technical control of NSA.
I'I:
6.
I:
Ii
(U)
All of the COMINT reports are in either message or
summary format.
"
A report in message format contains a single
underlying communication
pres~nted
in a classic cable format,
i.e., the verbatim text of the particular transmission, preceded and followed by "extcrrials" consisting of:
data about the ce nde c
i and the recipient; the dates and times of transmission; and
r:
I!
other technical information.
I!
/\ summary, as the label suggests,
provides in summary form the contents of a single message or
jJ
II
\:
of a small number of related intercepted commun Lc a.t Lo ns , often
j:
accompanied by some'technic"ll datu.
I
7.
~one
hundred and fifty-four of the one hundred
and fifty-siy. COMINT reports are based \~holiy upon intercepted communications of foreign governments transmitted on non-public
. :. -.
cO~Runications
facilitieu in my public
The other record which is not on intercepted communications,
froiJ"gOvernme~t ne!',i, [facilities,
7
Ii
! I
~h IiI.
ii
.,i!
.',....)
(") ~L.,
~a9C~
!: â&#x20AC;˘ ' .â&#x20AC;˘z ,
S... D .J.
!0::;; ,
a description of an incident purported to have beon Le a r ne d
\
from U.S. interception and analysis
I
I~ommunicatiohs:.1 , I;
8.
G"'~he C01HNT
Ii ~an
r:
a.
ll:!
I?
mEr,
ElF
-
i
format, was produceu-b~"II.
F~cilities.
:
...
1
; (forn-
.-
I
summaz y --
I I
;
-r
I
,"
I
the intercepteci communications between tH0
i
~ircrafts and a 9found controller i~JtIIIf
I: U9 71 • .
1- 1F1~e- . . .
hi
oil
in the sky north
\1
•
\
on~lEeport, in
!TIunications
I
•
COMIN'r Reports tvhich-'
-
Ii
!
•
~argets as fOl~o~siJ
_Target Communications Tr.ansmi tteel on]·
l ~rom
bV~:1iI7'1 .•
be' further described in terms of
sources and intelli9:nce
i
reports originated
-.
report a "phenomena"
F.frhre~eports
are
aummard e s 0 i l _ G e s s a g e s intercepted froEl) . • • • • • •
I~~o~munications.
I'-..-r: STlOi k~l!.adar ·operators
Ii ~I;essages,
i
The messages. were transmitted frolii]
to a central control station.
th~
_I
In thestLJ
&erators report everything that
"I: " appears on their radar l;jcreens-.
t'1hen they cannot identify a
1\
•
: [!extJ
!
\
1\
b.
~'l:_Hep'ortslihich
~ommunica~ions
~tinc
hundred
an~
System
T?rget the]
oiT
nine documents in summary
I I
i
I
!
uses
·unidentified
i II
,: particular object, they report it as an unidentifiable object.
I:
I
~orm:~rreport
i
I
:
II
I I
i i _
..
I' on intercepted communications b e t w e e n _ · raelar
I:j:
I:
operators and a central control point.
r ,similar il
These summaries arc
to the reports de s c r Lbed in SUb-po/Cl9raph a above arid
n Ii
IiII
I:
i!
ii
I
a
1 I i
"it .~
J
I·
!!
IiI'
I
I
I
r
_1'" r«r
. . .( ..:.,i.._
'~'?5e'l"
•
i
I
II
I I i _.._.a I__ ':".:
II
I!
Ii
11
~gain,
( ..5TET-~ unformation pertaining to the radar ST£r#~
/i operator's report of objects 0...n---:1-11..-·s--r-a-=di"r screen' whi ch ho I:
,
I;
I
II
cannot identifyJ
I;
c. JIIIIIIIIIIIII£COMINT Report Which Targets]
I"
~ommunications. This document is a
I;. . . . I;
summary of intercepted messages prepared ·in 1976 which report]
"
j!
rad~T~~aCking information
Ii Ii
central control point.
from
~"""'~a~; station
to a
It is similar. to the reports described
I I!
in sub-paragraphs (a) and (b) above~
d.~OMINTReport Which Tarqets]
j:
TRlcommunic:ations.
Ii . . . .
Ii
This summary was prepared
••• 0t
in 1966 bi)
I:
contains a
1\ summary of intercepted communications which were transmitted
IiI!
and the]
between the
&ommande~ regarding a.yellow objebt that
Iij;
was reported to have fallen into tile -sea,
~overnment ne~"l!acility.J
L were transmitted along
,:
0:.
j!
Product of
:: SIGINT I:" I..:.:==~=.:::...=..;:=.:.:=.-=-::.:::-=~=:.::-=::-. I'
of
i.
i
.
produced from
These messages
Jfie~' fiite
which
ommunications
[The
tW<;l
....
reports wer e
i~(2perated by
the
C:!he reports were.prepared in 1966 and contain summaries o£ the communica~Sn:1
tions transmitted bi1~adar operators as discussed in
Ii I~
sub-paragraph b, above.
\;
Ii
report to the other.
One of the two reports is a follow-up
The relevant activity reported deals
0:
:' with the tracking of an object approximntely .50 nau t Lca L
I;
l' ~iles i:
l!acility.
E
I;
I Ii
I
!
!"
.
northeast
oil~Gy
As ,,,ith the messages described above, these cmlINT
reports are summaries of
th~ ~essagesJ 9
9. i; I·
~,
.
--;t:t~:;b~7.i:~~:::~~ .,J:'·3~~~~f.*:'~" .~
·'
~. ~~~~:rigi~a:ed reDort~ -
Thirty-eight
docu~ents
~re the direct prcd~ct of NSA SIGINT operations and one document describes classified SIGINT
acti~ities.
These documents cnn be
I'
':
I
further des6ribed
QS
I. I;
Ii
j I
a.
The document uescribing SIG!NT operations r epo r t si
I
.1
[3.n alleged intercept oij
I
factual circumstances of the incident
J,
i; were received I; l: /pl~~tiff and :'1LI
IJi!S.ommunic;;J.tions. repo~tea
The
in this record
-~'"='"---~----~ by NSA from ran Fon!, requester other than the'
are considered to be fictitious by NSA analysts.
i~ I:
b.
One record is a 1973 report which summarizes
••1'.. I
UI&essa9.e transmi tted)
Cfromthj _ _
purported UFO zighting
i
l:
I'
•
i· 1
I
!:
F I i~ L i:
biJlllllllll,
10
i
L ..
i
I
,1
follows:
i
!1
I
." - . ...., . :i
U
'.
>iu,ri",'j ITUX• •"'"
I
Ii II
I'
I~
c.
Ii
Twelve NSA-originated COMINT reports target
the communications links and systems of• • • • • Two documents, in summary format, report t h e ~
i'
,
commun ica t.ions.
I:
Two of the records are
~
format and report the~"II,,"""II"
Ii
A. ~ ~n.~essa?e,
~
~~
tions which relate that an unidentified flying object :::municasighted in the air by a
I
ji
nit.
\; contains a summary of _
I;
One report
activity based upon communica-
tions in reaction to an unidentified flying object along the
!~"""""""' .. '
1;""-"-"
Two documents report on communications
transmitted between
and_
.
.. ;,t.• • •~..ho report visual observations of luminous spheres. One "
is a summary of a transmission
Finally, "
four documents in this group of twelve were intercepted from other. • • • • •
communications targets. One document is based
on the intercei?ted transmission-of"a:; reporting a bright light.
,.
The second record is based on the
i' intercept of a transmission of an
to
i
I: a ~ station seeking a report on any shining phenomena or
falling meteorites observed on specified dates.
The third and
I
i
fourth reports are a summaries of on-going debates on UFOs among
based on intercepted communications t,ansmitted
Ii I
I
reports
\: :,
All five of these
Ii n H
. units and
reporting observa-
11 tions of luminous objects in the sky.
t:
r\;
I~
~:
r
11
,:
r
I
I
I Ii I I
I:
I
I·
I:!'
I I
j.
I
"j:
I
I,
Ii 1;¥:f,'.,C
II I
;\' ~.
I
A,*:* .
.i~",,,:*•.
y~
..
;
::,
Il~tl~g!!tji~~J:>i?~~2tl1Zii:;lIfi~~ME~]1if~~~~~~if.~i~Ri2~i~t', " ':, .....) J~<.);r...\..d IiI ::i"iDA. _ .... I.
~
I:
"
,
j:
.
I
•
.
~
-
~Q:'..~~:-----..
.,i."io!t'.,,_·/C)l
""A .
•
e.
Four NSA-originated COMINT reports target
-:Ij ~ communications links
or systems.
Three 'reports are in
i
message~trans.
summary formrt and are based on an intercepted mitted
I
~
sites
unidentif.i~~flying object
reporting an
::.:..:e.r Y high altitude;
11'1t
an intercepted message transmitted from ........
\:
rT'. reporting
I.
that an unidentified flying object with two
.
,
.'_n·
\~~,li9htS"ha:d passed over _ a n d an intercepteo
\. • ns.. .
i,.~oicJ message transmitted to
s&
facility by a
' - w h o :·reported an unidentified flying
L object.
lI!.,.~he
The fourth report is based upon a message bet\:/eenl?
'~~.un its ~
.
f.
'bovernment
p
sightincr~
'Sixteen NSA-originated COMINT reports target
,net:tcomDlu~:,~ations:~ystemsand lin~:'Of
r:a,e'/eral different 1:
regarding a UFO
I
countrie.~.
This group contains summaries
of intercepted transmissions bet\'1een ....• • •
.J'
(two reports based on communica-
j:
tions o f._ · . _ and an unidentified senc1er reporting
I:I:
sightings of a UFO), . . . .
\, on communications \: flying objects),
7.
(two reports based
by1
reporting unidentified
7'.( a
report based on a message from a
I i _ t o an unidentified receiver
li- -
reporting a sighting of unidentified flying object"s},
II: . . I:l:
.r.
in~
(a report from an . . ,
SUMO
>i.to t h e _
in _ _ reporting an object that appeared based on
to be a rocket over
I:
I;
an~
communications between two
l.
uni~entif1'e-d ~i:ilonJint..hich.:~reported
j:
an
I
sightings of bright or light spots),
I:
•
(a r epo r t" based
I:
I! j;
Ii
Ii
12
i
I
I'
I
r
II
i:
I
i: i:
I
I
II I,
.. .
I'
I"'"
.~
,"-1.:- .'"
f""~ ~'? e'~'''''' it..... 'f''! 'j" 1- .. • . , "'"...".. I
I'.
. - -.
r-~
··.
·,,·iit ')
J .; ':, :.: :_-~ ., ':,..
•.••••. •
I!i on atr.nsm~s~o: fro~:-:~~;;;":it t~-
reporting a sighting of an unidentified flying object),~
I: ,
2
.•
j: (a report based on a message f r o m ' - ' t o an a~ unidentified i: recipient whli.ch provided instructions for reporting the sighHng
I,
I I I
"
I:
(a report based upon a trans-.
j1 of flying objects), and
mission b e t w e e n _ reporting that some
..
:>aw a ball of light about the size of an orange moving overhead).
I:
I:
One document in· summary format is the product of an inteI;cepted
I:
transmission reporting the sighting
H I! ball of fire.
I:
l: . . . . to the' Il unidentified flying reports
1:
frem , .
. reporting an
object.
One document in summary format
th~text
i" 1:
an elongated
One document in message format reports the text
of a _message sent by the
i:
of
..
which was transmitted&lOng a Ugovernment
It reports, among other items, -:n increase in UFO
ne~ facility.
act~ity.
I~ The last three documents in this group report on intercepted I'
I:
Each report
communications of • • • • •
I.
:: contains information 'derived from intercepted transmissions I:
i.
I: ""'''''''''''-
SrE;T
reporting the tracking of unidentified aircraft by ~Crada~
n operators.
IiIi i: j!
EXEMPTION OF THE COMINT REPORTS 10.
'-iE, 6)
Pprimary and often overriding consideration
I.
regarding the classification of CmlIN'r reports is tha t the need
II
to protect communications intelligence sources and methods is
I:
greater than the need to protect sensitive contents of the
i
underlying intercepted message$. Nevertheless, no portion of j; j; the contents of COMINT reports may be disclosed, where, as here, I' I: revealing the information would have the effect of identifying
rI ~ I·
13
i:
I:
I:
Ir~
:: j:
i:
I'
i:
.....'m., ..... '10,.. TF -",._:.,.1."_, .. 'II' I' ~~ i ?J IIfi 6l';~~ T ..."..,. ....... ",.:.....
_,T
...
I:
'..
£or the target communicat6rs the specific communications that had been
"
-:
;.-0.
intercep~ed
and exp1oLted.
One hundred and fifty-four of
the CONINT reports being \'lithheld are the product of intercept operations directed against_foreign' government
,
"
ccmmun Lca t Lcrls systems within their territorial boundar Le s ,
1::
In 1'·1 ; c:evea :l.ng the con ten ts of these r cpo r ts I ,.-. i
I;
'\ l '.
controrl~~
capabil i ty of NSA to target munication systems.
\~ould }i;is'close
the .-
thes!1~vernme.nt'controlle~om-
Even where the .underlying commun Ica-
Hons
1\ I'
I; proces~ing
had been intercepted ,£or
by NSA.
Moreover, the
disclosure of these reports would reveal much more than the identity of the targeted communications systems •., It
\~ould
reveal as
I:,:
I!
communication~
11.
sources involved in
I: I:
this case -- which are specified or implicitly identified in
"
r:. the CO!'lINT repor ts being \d thheld by NS~ --L,E-re· the s~urC'e:of"
I
extremel~
I
l~ ;
valuable. communications'
range of kinds of information
~ctiViti~s
l'
til
•
illt~ligence covering
a broad
gl ~n~Glatter.s.J
,,!
\: melease of these d oc ume n cs would seriously damage the ability of
n
the United States ~o gather this vital "intelligence information
I'!,
for the following reasons: a) would
Disclosure'of the report diSCUSsed in paragraph 9b
infor~.
communications
I
I'lm
U:hat their
b~nternationat common' carrie~acilitiesJ -
' ..
fro~e&nd othe~
I:C
I~
I
"1I1I~~an
.e. be intercepted and selected
out by NSA, and, even more importantly, that
th~
14
• v.
,
.'
"
i; l:
j;
I
,
i
more, revealing the NSi\ intercept cpe r a t i.o n
I:
tional
I
II
commo~
access carrier
i:
to the communication.:;
in::eJi:1a-
rout.~Ghi':h yielded, th~
~;le
! : ' - f e s s a g e could :ause
!:
<:!.g<lin:::;ll~e"
un i ted sr a tez to lose acc e s s
oiJ~her foreign governments
wh o use tlElt
-'''-~
i same communications rOllt~ Ii
l:
j !: ~;
(lbl'
ta .rnu fne
70
The
at issue here, based on messages transmitt~d~;ia :J~,
international common access carrier this Agency's capac I cc~tions
tiJ:o
As I
to the extent of
h~ve
NS~'s
potenti~l
i:
I:
I; "
I
i
intelligence value. ___
stated in my open affidavit, when
ale~ted
capability, and if given information from
15
I
reveal
select from such in tercepted communi-
those messages having
(c)
facilitii.~~OUld also
;' \;hich inferences could be drawrl as to the prcc~zsing !~ethods
i' I
used, foreign intelligence services defeat portions of NSA's present
I~,
r[iargetinili,rlternational I
could
~;culd
for~ign
,
be able to
e~a~e
or
intelligence efforts
common carrier linW
'rhcs~
countries
~e expected to use different routes of com~unic~tion or
I I'i
,.I i:
i.
o·
I!
r I
I,
i;
Ii
I: j;
r. " I:
\:
!'
j: l'
j;
j:
r.
disclosure of other records at issue here, would
r
!:
I'
r
result in the loss of the intelligence
informatio;f~~thered .,v,..:.
!: from the interception of the government net communications
,
i t.
L
systems:"'-·, The value of the intelligcnce data collccted fl."om s' these sources is obvious.
1:-
Ii i:
(a)
I!
I:I:
example, analysis of data collected from
of~G.ommllniCatiOn~t.2&.7£/~f.J government:j.b"I~._lUli.' •••
the intercept
1 foreign Il"
~or
(paragraphs (lo, o, c , e and 9f) I
,.. nll'(£ommllnications
(p~rilgraph
{paragraphs
9cl, or transmissions I: ,
~
I'
I
I " !:
J: I,
, " L
~"',ij~~:J~j'.'.it .... '
•••.. vtiisn."iat• -'.. . - -•llff' -.'
~
'.
-.~
1J~~i[&~tt:i~~~t}~~!iL~~~~;~[~~~~~~!4~$~~~~I~i~:\":\ '.;:. Ii
:rOP'eeeRE7~ i~j"ta!i£.::r.r
'i
!;
iI:l~easurably aids U.S. analysts'
!: 3d and 9d, e, f) j:
~.,: th~_ a
3
..... ::~'."
,
\
I:
on
~nalysts
I
studies of
I I
This information enables planners in turn to assess
I the capabil i ty ofl I : . J
i &nd \;
.
b'.
, ,
til~~c~ivity
: _ f!y monitorirnr..
l;_~ansmissions u.S. analyst
j ! I
! and other
II
targetei7t1111111t~ommuni-
i' cations provide critical technical
as dati]
I· i i'i' 'the
is vital to
i'
developrn~nt
I
re9ardin~eir nation'i)
\: LIntentions, in both the short and long ter'ms.
;\~overnment net systei:.l~scribed here .
l-loreover, .thi]
corrt.Lnue to yield valuable
-,CC
th~.'• • • • • • • •
I
intelligence data -- including
I:
tion systems discussed in paragraph
9g.
communica-
••••••••••r
·~
Ii i.
I.
I:
l: !:'rom these sources u. S. analysts,. are able to compile reports on ,.
!:
Si9nific~ d
r. I'
.
&Ctivit~J t:
and~~vents. ,Also, by monitoring thes~
·-" ..····T~~ranSmiSSi.'bnS, analysts are ab,le to obtain d a t a to) l . . . . . . . .~ :..J - ,. i: 17 i'
i'
L \.
[":
~.
'r
'ssH&
j
among th2f
!; ~urces of intelligence information
I
I . I
of U. S. countermeasures.
. t '_~ominunicati"ons-are
....
I
and relating' it to geographic areas, the
,:
,
I
useful in evaluating!
;~ the performance capabilities o i ) '
..
I
1
' .
transmitte~_ommunicationsis
,':,
I
\
are able to report
th~.:::Ipabilitiesof forei9~.Un. . . ill
generally.
'I"
..11 U
F•
\
!
'.: ,':,
i.
j
I:
',: II:
(~'I'he
13.
~I
\:
.' ':- .
need to ,prote.ct against any identification
of the target.s of intercept operat.ions is equaled by th.e need to protect against revealing the identity of the
.
'.
i; @sclosu::e
..
..".
r
I..
.,
have ex·treme1~r adverse repercussions
L '
.,I~.'
•
..... ":.'
of the
I:
i!
....,
sources
:.:.'
. ';
to the U. S. over
...-
..
:
':.
..
;
r"
"
.':
.
.
~.
..;.
,.'11
;" • _,' ,'..'
...
.....
...
'
~
.~.
...,,.,....
. .......t_,,;, ..... ·
L"';. ..~t-... -:.
:
I;'
..
,,:'
: ...
CLASS~FICATION
OF THE 'WITHBELD COMINT REPORTS
1I~""IIII".reports relating to COMINT
activities at issue H
rl."
he~e
of foreign governments or SIGINT operations and, thus, remain properly classified.
F
are based on intercepted communications
In conducting this review I have weighed
I
!,
the significant need for openness in government against the
j'
i! likelihood of
d~.m3ge
to our national security at this time and
~: I
I
I, 1:
have determined that each record should continue No meaningful portion can be segregated from the records without revealing classified information about the intercepted communi-
! cations un.:lerlying the CO/'IINT reports. Because each record ! each portion thereof is properly classified under Executive !. Order 12065, it is exempt from 'disclosure pursuant to 5 i
and
U.S~C.
I,
I, S552(b) (1).
....
II
I;
!i
r J "
:: .. '
interception, processing and exploiting ~ of fOrei?~ communications sent o.~:,internatiOnal common carrier
. 15.
..... "}
l~ facilitia}. or by government net channels are within the COMIN'l'
j:'--
i. mis~ion
II III.
of NSA.
,j;
Ii
These
I' functions and activities of NSA are particular j' I'
I. that may be withheld under 5 U.S.C. r. I"
!!
, I
I: "
i, t r
~~
r
19
typ~s
of matters
ยง552(b)(3)" since Section 6
"
"
;.,
':.:
~~'~:~I' ;.~l::~~~ .:; :~;;;:.:~~~rq~ti:i~;~:.~~: ~~~:f..~::' '~;,;'~i,;:;~ii;:: ~~~~.k~~ ~.:..:~~~A~ ~:::{~·~~~r:!'~?;~~~~ . ;~::~~~t:ts~.::~t~~~~~~l/~tJ~t~; . :.~~~ ".".:, ~~:~ . ;;J.~~~"~~':i:1"5*tii*"W·~~.s-d'··A'g}.;,~~·@Jiih't;·~A:-s '·-9;"\j,,.q&'''''~t~·it·; '4~:~;j;,,·t ¥i;';:a~~....,
i:
"
?"~~~\Q G C giii] P -:"''"1'' U99.W(~7'.RJii ..... ..;d, f::0, .. .....' ,. ,-_........ ..... _ ... v
I,;,
"~
'Ii
• '-'"'
•
. th e Agency . t 0 re f use t 0 re 1 case tl1em. o f PublJ.·c Law -8·...6 :36 permJ.ts
,;
,
u
\ &
iI 'I
\
Ii In this case, the COMINT reports reflecting those functions and
I
";~,fficac~..
,
I;
activities must be withheld to avoid compromising the
!:
of the sourc'es of CONINT information involved.
I:
:'
\ill/J'" Information
16.
I!
L I'!'
about the interception, pro-
cessing and exploitation C?f the foreign communications underlying the records being wi thheld by NSA is classified information
" concerning communications intelligence activities of the , 1\\ United States the unauthorized disclosure of which is prohibited by 16 U.S.C.
I,:"
S798, paragraphs (a)(3) and (a) (4).
This information because
I! i
I I
1 I
i I
I I
it is prohibited from disc;.losure by statute, is exempt from
II
IiI!,;
release under the FOIA pursuant to 5 U.S.C. §552(b)(3).
I'
r
that would be disclosed by these records is information about
IiI;
17.
,;
(U)
As stated in my public affidavit, the information
I: intt!lligence sources and methods protected from unauthorized
disclosure under 50 U.S.C. 5403(d) (3).
i",;',
The reports are therefore
II
i ' Iii,
exempt from release under Exemption 3 of the FOIA. 5 U.S.C.
r !'
S552(b)(3).
18.
I:,.
(U)
In view of the foregoing, and in order to
protect existing sensitive and important foreign intelligence
I.
I.
i I I !
Ii I
j
L sources and processing techniques vital to the national
I: security,
I certify that disclosure of past and present foreign
!
I
I: intolligence communications activities of NSA reveal€d in the · ...
I!I; records
the plaintiff seeks would endanger highly valuable
:: sour cea of foreign intelligence.
I;, 19. (U) Finally, I respectfully I: Court treat this affidavit in the same
request that the secure manner as it
j;
has been handled in submission to the Court, and to return
j:
it to appropriate personnel of the Department of Justice
I'
!'
as soon as possible after review by the Court.
The Department
i
"[:
20
I
\'
j'
! j'
1
..
~
i
.i
,:
.;
I
I: I.
i;
11 Ii
I;
..;
I; of Justice will retain custody of this document under the !. i; ,. Court's seal, subject to any further orders of this Court
~
,
!';.
"
"
i
I
or any other' court of competent jurisdiction.
.t.
\I; I I j,
I:: t'll1UJ.._&.1tg..:A...~
1
I
~P. YE~ES~'~~~-------
i:
Chief,
I:
0~ce
of Policy
Ii ..· .... ·· . ..•••l~ ,Sll.b!?Cf ibeu and sworn to before me this
.. ' ~. -I~;;;.:.c}ay of October 1980. '.
\
~~
: I.,;
~. , I ~ .0...
"
I'
i!
J:
,',
. ".
"
,. :,., ,
.' j t
.
.....
.. . .' .. \ "~. .... .::. ' M~ . ~.omrii·ission expires
,'.
Ifrl2
:
!
!:
I·
i.
I:
L
-.~
I
l'
, I:
!
I I
I I
j
.... ::
,
I '.
I
-,'
-.
r
•
I
I
I
,I:
I
I"·
,
1:
ii
. t•
'
,I
I:
!:
:
II
I
j
::
,"
"
i:
!:
"
I
!.
21
I, !:
.'
!
,. i:
1·
I
I'
p
I:
j
I·
I:b .'.' I'
i:
I.
I: .t. :'
r
,
I~':"!i;~"~~ ti L..:-j ~t-·.~:~~
W \.t..~· ~\
I
I.
'.'