Senate bill calls for advisory board on declassification

A special board of advisers on declassifying federal records would improve what has become a costly and time-consuming process for security agencies, according to witnesses at a Senate hearing Wednesday.

The Senate Governmental Affairs Committee heard testimony on S. 1801, the Public Interest Declassification Act of 1999, which calls for a nine-member declassification board to make recommendations to the President on declassification policy and agency programs.

The proposed board would advise the President on whether or not certain information should be released to the public, but would not have the authority to declassify documents.

In 1995, President Clinton issued Executive Order 12958, mandating declassification of historically valuable information that is at least 25 years old.

Committee Chairman Fred Thompson, R-Tenn., said declassification is a delicate balancing act. "It's a question of striking the right balance-of finding a way to release needlessly classified information without preventing our security agencies from accomplishing their missions or letting sensitive information escape," Thompson said.

According to a 1998 report from the Information Security Oversight Office , 850 million pages were declassified under various review programs between 1980 and 1998. The bulk of that material was released after the President's 1995 executive order.

The bill's sponsor, Sen. Daniel Patrick Moynihan, D-N.Y., introduced similar legislation in 1997, along with Sen. Jesse Helms, R-N.C. Moynihan said there is currently enough classified material to stack up as high as 441 Washington monuments.

S. 1801 seeks to alleviate the burden created by special search requests. These comprehensive reviews of classified information on topics such as human rights violations in Guatemala and Nazi war crimes are overwhelming the staffs and budgets of security agencies. The President, members of Congress, and agency heads can all request such ad hoc searches-resulting in many redundant requests, according to Rep. Porter J. Goss, R-Fla., chairman of the House Intelligence Committee.

"Members of Congress, executive branch policymakers, and interest groups have asked the intelligence community to conduct and complete no fewer than nine separate searches since 1993 for records on the churchwomen murdered in El Salvador," Goss said.

To reduce the drain on resources, the Clinton administration has occasionally used a system of "bulk declassifications." One bulk declassification at the Energy Department, however, accidentally released 25 documents containing sensitive nuclear weapons-related data.

Dr. Warren Kimball, Robert Treat professor of history at Rutgers University in New Jersey suggested the board should meet two or three times a year and that current government officials should be excluded from membership.

"The board must have the public's confidence that it is independent if it is to confirm the comprehensiveness of declassification programs and legitimate "special searches," said Kimball.

R. James Woolsey, former director of the CIA, stressed the importance of selecting a board members with diverse experience with classified material. He suggested placing historians side by side with former intelligence and military officers. However, he said that funding for the board was crucial to attract people of the highest caliber.

Many agency-review boards already advise government officials on declassification policies, including an Interagency Security Classification Appeals Panel and the State Department's Advisory Committee on Historical Diplomatic Documentation.

Stay up-to-date with federal news alerts and analysis — Sign up for GovExec's email newsletters.
Close [ x ] More from GovExec

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

  • Sponsored by One Identity

    One Nation Under Guard: Securing User Identities Across State and Local Government

    In 2016, the government can expect even more sophisticated threats on the horizon, making it all the more imperative that agencies enforce proper identity and access management (IAM) practices. In order to better measure the current state of IAM at the state and local level, Government Business Council (GBC) conducted an in-depth research study of state and local employees.

  • Sponsored by Aquilent

    The Next Federal Evolution of Cloud

    This GBC report explains the evolution of cloud computing in federal government, and provides an outlook for the future of the cloud in government IT.

  • Sponsored by LTC Partners, administrators of the Federal Long Term Care Insurance Program

    Approaching the Brink of Federal Retirement

    Approximately 10,000 baby boomers are reaching retirement age per day, and a growing number of federal employees are preparing themselves for the next chapter of their lives. Learn how to tackle the challenges that today's workforce faces in laying the groundwork for a smooth and secure retirement.

  • Sponsored by Hewlett Packard Enterprise

    Cyber Defense 101: Arming the Next Generation of Government Employees

    Read this issue brief to learn about the sector's most potent challenges in the new cyber landscape and how government organizations are building a robust, threat-aware infrastructure

  • Sponsored by Aquilent

    GBC Issue Brief: Cultivating Digital Services in the Federal Landscape

    Read this GBC issue brief to learn more about the current state of digital services in the government, and how key players are pushing enhancements towards a user-centric approach.


When you download a report, your information may be shared with the underwriters of that document.