412
94TH CONQBEES > SENATE REPORT 2d Session h-0. 94-755 INTELLlGENCE ACTIVITIES AND THE RIGHTS OFAMERICANS BOOK II FINAL REPORT OF THE SELECT COMMITTEE TO STUDY GOVERNMENTAL OPERATIONS WITH RESPECT TO INTELLIGENCE ACTIVITIES UNITED STATES SENATE TOGETHER WITH ADDITIONAL, SUPPLEMENTAL, AND SEPARATE VIEWS APRIL 26 (legislative day, APRIL 14), 1976 U.S. GOVERNMENT PRINTING OFFICE 68-786 0 WASHINGTON : 1976 For sale by the Superintendent of Documents, U.S. Government Printing Office Washington, DC. 20402 - Price $3.60

Church Committee: Reports-- Book II

Embed Size (px)

DESCRIPTION

Intelligence Activities and the Rights of AmericansBook II moves from foreign and military intelligence to domestic intelligence. The report is concerned primarily with the FBI's COINTELPRO counter-intelligence campaign, but also discusses the CIA's Operation CHAOS, whereby the CIA engaged in domestic intelligence work in violation of the CIA charter. Other agencies including the NSA and Army Intelligence are also discussed. Illegal electronic surveillance, mail opening, infiltration of dissident groups, "black bag" break-in jobs, media manipulation, IRS targeting, and the intense campaign waged against Martin Luther King, Jr. are all subjects of this report. The overriding theme is the violation of the rights of Americans as identified in the U.S. Constitution.

Citation preview

Page 1: Church Committee: Reports-- Book II

94TH CONQBEES

> SENATE REPORT

2d Session h-0. 94-755

INTELLlGENCE ACTIVITIES AND THE RIGHTS OF AMERICANS

BOOK II

FINAL REPORT

OF THE

SELECT COMMITTEE

TO STUDY GOVERNMENTAL OPERATIONS

WITH RESPECT TO

INTELLIGENCE ACTIVITIES

UNITED STATES SENATE

TOGETHER WITH

ADDITIONAL, SUPPLEMENTAL, AND SEPARATE

VIEWS

APRIL 26 (legislative day, APRIL 14), 1976

U.S. GOVERNMENT PRINTING OFFICE

68-786 0 WASHINGTON : 1976

For sale by the Superintendent of Documents, U.S. Government Printing Office Washington, DC. 20402 - Price $3.60

Page 2: Church Committee: Reports-- Book II

SENATE SELECT COMMITTEE TO STUDY GOVERNMENTAL OPERATIONS WITH RESPECT TO INTELLIGENCE ACTIVITIES

FRANK CHURCH, Idaho, Ohdrman JOHN 0. TOWER, Texas, Vfce Chairman

PHILIP A. HART, Michigan HOWARD H. BAKER, JR.. Tennessee WALTER F. MONDALE, Minnesota BARRY GOLDWATER, Arizona WAUTER D. HUDDLESTON. Kentudty CHARLES McC. MATHIAS, JB.. Maryland ROBERT MORQAN, North Carolina RICHARD 8. SCHWEIKER, Pennsylvania GARY HART, Colorado

WILLIAM G. MILLER, Btofl DErector FB~DEBICK A. 0. SCHWAB& Jr., Chtef Counsel COBTIS R. SMOTHERS, CouneeZ to the Yinoritl

AUDBPY HATBY, CZerk of the Committee

ml

Page 3: Church Committee: Reports-- Book II

LETTER OF TR~~SSJIITTAL

On behalf of the Senate Select (‘ommitter to Stutly Governmental Operations with Respect to Intelligence A1c+i\.itirs, ant1 piirsiiitnt to the mantlate Of Senate Resolution 21, I am transmitting herewith to the Senate the volume of the Committee’s Final Report. which presents the results of the Committee’s investigation into Fctleral tlomcstic intelligence activities.

The Committee’s fintlings anal conclusions concerning :I~IISCS in intel- ligence activity and \ycaknesses in the system of accom~tabilit~ and control are amply docnmcntrtl. I brlicw they lnakt~ a compelling case for substantial reform. The l~rconlmclldatio~~s section of this vo1111mr sets forth in detail the Committee’s l~rOposals for reforms nectssay to protect the right of Americans. The facts revealed by the (‘ornmlt- tee’s inquiry into the dcrelopmcnt of tlomestic intelligence activity are outlined in the balance of the volume.

I n-Onlcl add one principal comment on the results of the Commit- &e’s inquiry: The root cause Of the excesses \vhich onr record amply tleiiioiistrates has been failure to apply the wisdom of the constitn- tional system of checks ant1 balances to intelligence activities. 0111 c~sperienw as a nation has tniyht. 11s that we must, place our trust. in l:~ws, ant1 not solely in nien. The founding f:dliers foresaw exc(?ss as the inevitable cOnsequence Of granting any part Of ~government uli- chcckcd p~wr. This has been tlcnlonstr:~trtl in the mtelligcncc field where. too often, constitutioii:~l principles were. subortlinwted to :L prag- matic course of periiiitting tlesirctl cwtls to dictate and justify in1proper 111ca11s.

Onr ~rcomnirntlntioiis arc tlesipnctl to l)lace intelligence activities xithiii the coiistitiitional scliemc for controlling r p\-cImllcllt po\wl’.

The members of this (‘oinniittw liavc WI,\-et1 wtli utmost tliliprnce ant1 tlctlication. We Ilaw hat1 1% Full (‘onlniittcr nwcting.3. scores of other sessions at which Senators pwsitle(l at tlcl)ositions for the tak- ing of testimony, ant1 over 40 s~~b~ornniitter meetings tlevotetl to tlrafting the t1v-o vol~~rlirs of 0111’ final report. I thank each ant1 every 0110 of lll;v c0llc:lglles for their hart1 work illl(1 for their tlctermina- tion that the job be clonr fully ant1 fairly.

,Jolln Tower’s se].\-ice as I’ice (‘ll:~iAlil~l n-as essential to 0111’ rflcc- ti~wicss from start to finish. This inquiry c~oultl ha\-c been tlistixctetl by partisan aiyuinei~t~ over allocating the blairic~ for iiitellipncc cs- CCSSCS. Tnsteatl. we hare unanimously conclutlrtl tllitt intelligcww prob- lems ill’c f:ll* IllOl’C flllldilIll~~llt~l. Then are not tllc 1)1’0clll(*t of :lll;v single aclniinistr:ltion. part\-. or man.

.\t the outset, of this part’iwlnr vo1~11nc . special iii~wtioii is ills0 tlllc to Senator Walter F. J[ontlalc for his chairinnnship of the subcwm- rnittcc chaiyd with tlrafting the final report On tloiiiestic intclligencc activity. T)iii*ing 0111’ hearings. Senator SIontlale hclpctl to bring into focus the threats posctl to the rights of A~inc~ricaii citizens. Tic illltl his

(III)

Page 4: Church Committee: Reports-- Book II

Iv

domestic subcommittee colleagues-Senator Howard Raker, as rank- ing Minority member, and Senators Philip Hart,, Robert Morgan and Richard Schweiker-deserve great credit for the complete and com- pelling draft which they presented to t,he Full Committee.

The staff of the Committee has worked long, hard and well. With- out their work over t.he past year-and during many long nights and weekends-the Committee could not have come close to coping with its massive job. I commend and thank them all. The staff members whose work was particularly associated with this volume and its sup- plementary detailed reports are listed in Appendix C.

FRASK CHURCH, Chairman.

Page 5: Church Committee: Reports-- Book II

In .Janunr~ lD’i5. the Senate resol\-etl to establish a C’onlnlittee to:

contlwt an inr-cstigation mid study o$ ~overilnlental Opera- tions with respect to intelligence activltlrs ant1 the extent, if any, to which illegal, iniproper~ or unethical activities were engaged in by any agency of the Federal Gorernmcnt.l

This C’onlmittee, n-as organized shortly thereafter anti has conducted a year-long inr-estigation mto the iiitelllgencc activities of the Vnited States Governnient. the first substantial inquiry into the intelligence conmimity since World War TI.

The inquiry arosc out of allegations of substantial wrongdoing by intelligence agencies on behalf of the administrations which the? served. A deeper concern unclerlyi,n,p the investigation was whether this (+overnii~ent’s intelligence activities were go~ernecl and controlled consistently Cth the fundaiiiental principles of ,Iiiierican constitu- tional go\-ernliieiit-that power niust be checked and balanced and that the preservation of liberty requires the restraint, of laws, and not simply the gootl intentions of nicn.

Our investigation has confiriiwtl that l)roperly controlled and lawful iiitellipcnce is vital to the nation’s interest. ,I strong ant1 effective intelligence system serves. for example. to monitor potential military threats from the Soviet I-nion ant1 its allies, to verify compliance with international agreements such as SALT. ant1 to combat espionage and international terrorism. These, ant1 nlany other necessary and proper functions are, perfomietl by detlicntctl and hard working employees of the intelligence coirininnity.

Tlw Conlnlittee’s investigation has. however. also confinned subst’an- tial wrongdoing. And it has demonstrated that intelligence activities hnvc not. gcne~~allv been governed and controlletl in accord with thn funtlan~ental p&ciples of our constitutional systerii of go\-ernment.

The task faced by this Committee was to propose eflectlre measures to prevent intelligence excesses. and at the same time to propose sound gGde.lines anal oversight proceclnres with which to govern and co.ntrol legitimate activities.

Having conrlnded its investigation, the Comiiittee issues its reports 2 for the purposes of:

providing a fair factual basis for informed Congressional and public debate on critical issues affecting the role of go\-- eminental intelligence actiritirs in a free society; and

* Senate Resolution 21. January 27. 19775, Sec. 1. The full text of S. Res. 21 is printed at Appendix A.

aTlir Committee’s final rfport is divided into two main volumes. The I~lance of this volume covers domestic activities of int~llieeucc nwncies and their activi- ties owrseas to the extent that they affect the r&titutiokl rights of Americans. Thr other rolnme cowrs all other activities of Vnitecl States foreign and military intelligence agencies.

The Committee has previously issued the reports and hearing records set forth in Appendix R.

Page 6: Church Committee: Reports-- Book II

VI

recommending such legislative and executive action as, in the judgment of the Committee, is appropriate to prevent re- currence of past abuses and to insure adequate coordination, control and oversight of the nation’s intelligence resources, capabilities, and activit,ies.

In elaboration of the broad mandate set forth at the outset of this Report, the Senate charged the Committee with investigating fourteen specific. “matters or questions” and with reporting the “full facts” on them. The fourteen enumerated matters and questions concern: (i) what kind of activities have been-and should be-undertaken by intelligence agencies ; (ii). whether those activities conform to law and the Constitution; and (iii) how intelligence agencies have been- and should be-coordinated. controlled and overseen.3

In addition to in\-estipatiltp the “full facts” with respect to such matters, the Committee was instructed to determine :

Whether any of the existing laws of the. United States are inadequate, either in their provisions or manner of enforce- ment, to safeguard the rights of ,4merican citizens, to im- prove executive and legislative control of intelligence ancl related activities and to resolve uncertainties as to the au- thority of United States intelligence and related agencies. [Id., Sec. 2 (12) ]

B. THE MAJOR QUESTIOXS

Our investigation addressed the structure, history, activities and policies of America’s most important intelligence agencies. The Com- mittee looked beyond the operation of individual agencies to examine common themes and patterns inherent in intelligence operations. In the course of its investigation, the Committee has sought to answer three broad questions :

First, whether domestic intelligence activities have been consistent with law and with the ‘individual liberties guar- anteed to dmerican citizens by the Constitution.

Second, whether America’s foreign intelligence activities hare served the national interest in a manner consistent with the nation’s ideals and with national purposes.

’ S. Res. 21, Ser. 2. Examples of the “matters or questions” include: “The conduct of domestic intelligence or counterintelligence operations against

United States citizens” by the FBI or other agencies. [Sec. 2 (2) I ; “The violation or suspected violation of law” by intelligence agencies [Sec.

2(10)1; Allegations of CIA “domestic” activity, and the relationship between CIA

responsibility to protect sources and methods and the prohibition of its exer- cising law enforcement powers or internal securit.v functions [Sec. 2(l), (6)l ;

“The origin and disposition of the so-called Huston Plan” [Sec. 2(7) (9)l ; “The extent and necessity’ of “covert intelligence activities abroad [Sec.

2(14)1; Whether there is excessive duplication or inadequate coordination among

intelligence agencies [Sec. 2 (4) (13) ] and The “nature and extent” of executive oversight [Sec. 2(i’) (9) ] and the “need

for improved, strengthened or consolidated’ Congressional oversight [Sec. Z(7) (9) (11)l.

Page 7: Church Committee: Reports-- Book II

VII

Third, whether the institutional procedures for directing and controlling intelligence agencies have adcqnately emured

their compliance with policy and law, and I\-llether those pro- cedures have been based upon the system of checks and bal- ances among the branches of Constitution:

government required by 0111

The Comn1itte.e fully subscribes to the premise that intelligence agencies perform a necessary and proper function. The Preamble to the Constitution states that our government was created. in part, to “insure domestic tranquility [and] proTide for the common defense.” ,\ccnrate and timely intelllpence can and does help meet those goals.

The Committee is also mindful, however, of the danger which in- telligence collection, and intelligence operations, may pose for a so- ciety pronnded in democratic principles. The Preamble to our Con- stitution also declares that our government was created to “secure the blessings of liberty-” and to “establish justice”. If domestic intelli- gence agencies ignore those principles, they may threaten the very \-alues t.hat form the foundation of our society. Similarly, if the gov- ernment conducts foreign intelligence opcratlons overseas which are inconsistent with 0~11' national ideals, our reputation, goals: and in- fluence abroad may be undercut.

1. SELECTIOS OF AGESCIES, PROGRAJIS ASD CASES TO EJIPIL~SIZE

Secessarily, the Committee had to be selective. To investigate every- thing relevant to intelligence-and even everything relevant to the fmndamental issues on which we llad decided to fouls-would take for- ever. Our job was to discover-anal suggest solutions for-the major problems “at the earliest practical date”.*

-4ccordingly. the Committee hat1 to choose the particr1lar Goveni- mental entities ~ipon which we wo~ild concentrate and then further llad to choose particular cases to investigate in depth.

Many agencies, departments or bureans of the Federal Gorernment have an intelligence function. Of these, the Committee spent the over- \\helming preponderance of its energies on fire :

The Federal I3nrean of Investigation ; The Central Intelli- gence Agency; The Kational Security ,Igency ; The national intelligence components of the Defense Department (other than KS*\) ; and The Sational Security Council ant1 its com- ponent parts.”

The agencies upon which the Committee concentrated are those whose powers are so great and whose practices were so extensive that they miist be iindcMoot1 in order fairly to jntlge whether the intelli- gence s;!-stem of the Thitetl States neetls reforni ant1 change.

ITavmg selected the agencies to en11)liasize. the Committee also had to sclecat I,cl~res(~iit:\ti\-r programs ant1 policies on which to concentrate. Tlierc were many more possible issues and allegations to investigate

’ S. Res. 21 ; SW. 5. G Sulwtnntinl wnrk was also dnnp nn intelligrnw activities of the Internal Rrre-

nue Srrvicr and the Statr I)elmrtment.

Page 8: Church Committee: Reports-- Book II

VIII

than could be covered fully and fairly. The principles which guided our choices were :

(1) More is learned by investigating tens of programs and incidents in depth rather than hundreds superficially. Our goal was to understand causes and. where appropriate, to sug- gest solutions.

(2) Cases most likely to produce penrrnl lessons should receive the most attention.

(3) Programs were examined from each administration beginning with Franklin Roosevelt?. This assured nnder- standing of the historical context within which intelligence activities have developed. Fundamental issues concerning the conduct and character of the nation deserve nonpartisan treatment. It has become clear from our inquiry. moreover, that intelligence excesses, at home and abroad, have been found in every administration. They are not the product of any single party, administration. or man.

2. LIMITATIOXS ASD STRESGTHS

(a) The Focus on Problem Anm The intelligence community has had broad responsibilitv for activi-

ties beyond those which we investigated as nossibly “illcpal. improper, or unethical”. Our reports primarily address problenl areas and the command and control question gencrallv. However, the intelligence community performs vital tasks outside the areas on which our inves- tigation concentrated. This point must be kept in mind in fairness to the agencies, and to their employees who have devoted their careers to the naGon’s service. Moreover, one of many reasons for checkins intel- ligence excesses is to restore the confidence, good name, and effective- ness of intelligence agencies so that they may better serve the nation in the future.6

(6) Caution on Questions of Individual “Gu.ilt” 01’ “Innocence”

A Senate Committee is not a prosecutor, a grand jury or a court. It is far better suited to determine how things Tvent. wrong and what. can be done to prevent their going wrong again, than to resolve disputed questions of individual ‘(guilt” or “innocence”. For the resolution of those questions we properly rely on the courts.

Of course, to understand the past in order to better propose guid- ance for the future, the Committee had to investigate the facts under- lying charges of wrongdoing. Facts involve people. Therefore, the Committee has necessarily had to determine what particular individ- uals appear to have done and, on occasion, to make judgments on their responsibility. We. hare, however. recognized our limitations and at- tempted to be cautious in reaching those judgments; the reader should be similarly cautious in evaluating our judgments.

The Committee’s hope is that this report will provoke a national debate not on “Who did it ?!‘, but on “How did it happen and what can be done to keep it, from happening again?”

‘Indeed, it is likely that in snme cases the high priority giren to activities that appear qurstionahle has reduced the attention Siren to other rital matters. Thns, the FRI. for example, has placed more emphasis on domestic dissent than on nrgx- nized crime and, according to some, let its efforts against fnreign spies suffer because of the amount of time spent checking up on American protest groups.

Page 9: Church Committee: Reports-- Book II

Ix

(c) Ability to See the FUZZ Xcopc of the Probkm This Committee examined a verv broad range of issues and com-

piled a hughe factual record i whi‘ch covers:

(i) the origins and development, of intelligence programs over seven administrations;

(ii) intelligence activities both at home and abroad; and (iii) the programs and practices of the several most im-

portant intelligence agencies.

Thus, for the first time, based upon the Committee’s investigation, it is possible to examine the patterns of intelligence activity and not’ merely isolated incidents.

The issues for the country to rcsolre arc best posed by looking, as we hare done. at the aggregate, rnthw than at particular incidents in isolation. Keithcr the dangers, nor the causes. nor the possible solutions can be fairly evalnatcd without considering both the broad patterns of intelligence activity TThich emerge from examining par- ticular cases over the past several decades. and the cumulative effect of activit,ies of different agencies. For example, individual cases or programs of governmental sur\-eillnnce may constitute interference with constitutionally protected rights of privacy and dissent. But only by examining the cumulatiw impact of man); such programs can the danger of “Big Brother Government” be rrallstically assessed. Only by understanding the full breatltb of governn~entnl efforts against dissenters can one weigh tllc extent to which those efforts ma,y chill lawful assembly and free expression.

II. TIIE PURPOSE OF THE COJZJII’I~E’S FISOIXGS .\ND RECOJIMESDATIONS

The central goal of tlic Committee is to ninkc inforiiwd Iwolll-

mendations-based upon a detailed ant1 balanced factual investiga- tion-about :

(1) which intelligence activities ought to be permitted, and which should be rcstrictcd or prohibited; and

(2) n-hat controls and organizational structure are needed to keep intelligence operations both cffcctire and consistent with this country’s most basic 1~1aes and fundamental in- terests.

‘Some 800 witnesses were rsnmined, appr0simatel.v 250 under oath in esecutire sessions, 50 in pnl,lic sessions, and the hnlance in inten-iews. Tlv? nggregate number of trnnscript pages is nlmost 30.000. Approsiniatelg 310.000 document pages were obtained from the rnrious intelligence agencies (still more were preliminarily reviewed at the agencies). as dell xs from the White House, nresidential lil,rnrirs. and other sources. _

Over the course of its investigntion the C’ommitter has hnd genenlly good cooperation in obtaining information from the intelligence agencies nnd the Ad- mi&trwtion. Of course, there were problems, particulnr1.v 3t the outset+om- Irliance took too long; burenucmtic rules snch ns the “third agency rule” (which required agencies other than t.hr custodian of the document to review it if the7 were mentioned) were frustrating. Rnt our experience suggests thnt those proh- lems can IW worked out.

The most important lesson to be derived from our experience is thnt effective oversight is impossible without regular access to the underlying working doru- merits of the intelligence ?ommunit;r. Top level l)riefings do not adrquntrly de- scribe the renlitirs. Fl,r that the documents nre n necessary supplement and at times the only source.

Page 10: Church Committee: Reports-- Book II

X

The first step for this Committ,ee, its successor oversight Committees and the Congress as a whole is to devise the legal framework within which intelligence agencies can! in the future, be guided, checke.d and operate both properly and efficiently. A basic law-a charter of pow- ers, duties, and limitation-does not presently exist for some of the most important intelligence activities (e.g.? FBI’s domestic intelli- gence or NSA) or, where it does exist, as w-lt,h CT,\, it is vague, con- flicting and incomplete.

The absence of laws and the lack of clarity in those that exist has had the effect, if not the intention, of keeping vit,al issues of national importance away from public debate.

This Committee’s job was to pose the issues that have been ignored for decades. The technique for doing so was to investigate and then to propose basic laws and other rules as to what can and cannot be done, and on the appropriate command and control structure for in- telligence activities.

There are many other questions, such as the efficiency, cost and quality of intelligence, which are also of vital national importance. We have also examined these matters and consider them in this re- port. But, the main emphasis of our investigation was on what should be done and not on how it should be done. We seek in our rec- ommendations to lay the underlying legal foundation, and the con- trol and oversight structure for the intelligence community. If these are sound, then we have faith that the other questions will be an- swered correctly in the future. But if the foundation is unsound or remains unfinished--or if intelligence agencies continue to operate under a structure in which executive power is not effectively checked and examined-then we will have neither quality intelligence nor a society which is free at home and respected abroad.

Page 11: Church Committee: Reports-- Book II

CONTENTS

Letter of Transmittal_-- _____.__ -___- ______ - __._____ -_-.- .____ ----- Preface____-------------------------------------------------------

I. INTRODUCTION AND SUMMARY_- _______. -------_- _____ - A. Intelligence Activity: A New Form of Governmental Power

to Impair Citizens’ Rights- ____ -_-_----- ________ - ______ B. TheQuestions__------------------.--------..----------- C. Summary of the Main Problems- _ __________________ -- - -.

1. The Number of People Affected by Domestic Intelli- gence Activity ____ --- ______ - ____ -___-_- ______.

2. Too Much Information Is Collected For Too Long-- 3. Covert Action and the Use of Illegal or Improper

Means-----~--------..---~----~--~--~~-~--.-- a. Covert Action- _______ -_-_- _________ - ___.-

(1) The FBI’s COINTELPRO-_-------. (2) Martin Luther King, Jr _____ - -- _. _ _

b. Illegalor Improper Means___-----------.-- (1) Mail Opening ____ -- _.____.___ - -_._- (2) NSA Monitoring- _ ____ _ _ _ - _ - - - _. - _ _ (3) Electronic Surveillance__-_-----.-.~. (4) Political Abuse..----.. __ _ - _ ___-. . - _- (5) Surreptitious Entries- - - - -__ - _ - _. _. _ (6) Informants-_--- ._._ ---_-----~.-.-_

4. IgnoringtheLaw.- ____ ---_-----_- ____._-.__.-.-- 5. Deficiencies in Accountability and Control-- - _ - _ _. . _ 6. The Adverse Impact of Improper Intelligence Ac-

tivity-----_____----~---------~~-------~~---.- a. General Efforts to Discredit ____ -__. -_- -_._. b. Media Manipulation ________ -_---_--- _____ c. Distorting Data to Influence Government

Policy and Public Perceptions-__---_.---. d. “Chilline” First Amendment Rights_- _. _ - . - _ e. Prevent&g the Free Exchange OF Ideas- __ _ _ _

7. Cost and Value ____ -_--- __._____________..__----- II. THE GROWTH OF DOMESTIC INTELLIGENCE, 1936 to 1976:

A. Summary_-_____-_-__________--~_-_-___-~---~~-..------ 1. The Lesson: History Repeats Itself ____.___ _____-_- 2. The Pattern: Broadening Through Time ______ ______ 3. Three Periods of Growth for Domestic Intelligence-..

B. Establishing a Permanent Domestic Intelligence Structure: 1936-1945---____--_-_______-----------------------------

1. Background: The Stone Standard----- ___ __ - _- __ __ - 2. Main Developments of the 1936-1945 Period----- __ _ 3. Domestic Intelligence Authority: Vague and Conflict-

ing Executive Orders _______________ ----- __.____ a. The Original Roosevelt Orders- _ _ _ ___-__- _. b. Orders in 1938-39: The Vagueness of “Sub-

versive Activities” and “Potential” Crimes- c. Orders 194943: The Confusion Continues- - -

4. The Role of Congress-- ___________ --_------- _____ a. Executive Avoidance of Congress- _ ___ - ____ _ b. Congress Declines to Confront the Issue- - - - -

(XI)

Page . . . 111 V 1

i 5

t

13 14

ii: 15

16

::: 18

21 21 21 22

23 23 24

25 27

ii 29

Page 12: Church Committee: Reports-- Book II

II. THE GROWTH OF DOMESTIC INTELLIGENCE-Continued B. Establishing a Permanent Domestic Intelligence Structure-

1936-1945 Continued 5. Scope of Domestic Intelligence--- __.____________ -_

a. Beyond Criminal Investigations- _ - _ - __- ___ _ b. “Infiltration” Investigations--------------- c. Partisan Use- ___ __ - ____ _ - - __ _________ ____ d. Centralized Authority: FBI and Military

Intelligence _____ --------------: _______. 6. Control by the Attorney General: Compliance and

Resistance____.------------------------------- 7. Intrusive Techniques : Questionable Authorization - - -

a. Wiretaps: A Strained Statutory Interpreta- tion~__--------------------------------

b. Bugging, Mail Opening, and Surreptitious Entry___------------------------------

C. Domestic Intelligence in the Cold War Era: 1946-1963--_- 1. Main Developments of the 1946-1963 Period__ _ _ - _ _. 2. Domestic Intelligence Authority- __- _ _ _ _ _ - _ - _ - ___. _

a. Anti-Communist Consensus - _ _ - _ _ - _ _ _ _ - - _ _ _ b. The Federal Employee Loyalty-Security Pro-

gram_--------------------------------- (1) Origins of the Program---- __ _. _ -_ _ _ (2) Breadth of Investigations----- _ - _ _ _ _ (3) FBI Control of Loyalty-Security In-

vestigations _____ - _- ___ ______ _ ___ c. Executive Directives: Lack of Guidance and

Controls----------------------------------- 3. Scope of Domestic Intelligence- - _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ -

a. “Subversive Activities”-_ _ _ _ _ _ - - _ _ _ _ _ _ _ _ _ _ _ (1) The Number of Investigations- _ - _ _ _ (2) Vague and Sweeping Standards- _ _ _ _ (3) COMINFIL---or--~~~m~~~~--~~- (4) Exaggeration

fluence------------------------- b. “Racial Matters” and “Hate Groups”- _ _ _ _ _ c. FBI Political Intelligence for the White

House__------------------------------- d. IRS Investigation of Political Organizations- _

4. Accountability and Control-_ _ _ - _ _ _ - - _ _ _ - _ _ _ _ _ _ _ _ _ a. Emergency Detention Act- _ _ _____ _- __ _ ____ b. Withholding Information- _ _ _- __ _- __ __ _ __ _- c. CIA Domestic Activity-- - _ _ _ _ _ _ _ - _ _ _ _ _ _ _ _ _

(1) Vague Controls on CIA- _ _ _ _ _ _ _ _ _ _ - (2) Drug Testing and Cover Programs--

5. Intrusive Techniques----_ _ _ _ - _ _ _ _ - __ __ _ _ _ __ __ - _ _ _ a. Communication Interception: CIA and NSA- b. FBI Covert Techniques_-_-- __ _ _ _ _ __ - _ _ _ _ _ _

(1) Electronic Surveillance--- _ __ __ _ __ _ _ (2) “Black Bag” Jobs- _ __-___________- (3) Mail Opening---- ____ --___-__- ____

c. Use of FBI Wiretaps-- __- _________ -__ __ ___ 6. Domestic Covert Action __________________ -__ - -___

a. COINTELPRO: Communist Party--------- b. Early Expansion of COINTELPRO--- _ - - _ _ _

D. Intelligence and Domestic Dissent: 1964-1976- -________-_- 1. Main Points During the 1964-1976 Period------ __ _ - 2. Scope of Domestic Intelligence_ _ _ _ _ _ _ - - _ _ - _ _ _ - - _ _ _

a. Domestic Protest and Dissent: FBI_-- _ _ ___ - (1) Racial Intelligence- - - __ _ _ _ _ _ _ _ _ _ _ - (2) “New Left” Intelligence _ _ - - _____ _.

b. FBI Informants _____ -___-_-___-___-___--_ (1) Infiltration of the Klan _ _ _ _- _ _ _ _ _ _ _

tZ 47 48

49 50

58 58

70 71

ii 74

Page 13: Church Committee: Reports-- Book II

XIII

II. THE GROWTH OF DOMESTIC INTELLIGENCE-Continued D. Intelligence and Domestic Dissent: 1964-1976-Continued

2. Scope of Domestic Intelligence-Continued b. FBI Informants-Continued

(2) “Listening Posts” in the Black Com- munity----- __._____._.__ ~_----

(3) Infiltration of the “New Left” -- - - - _ _ c. Army Surveillance of Civilian Political

Activity--_-------_-_-_- __.____ -_----__ d. Federal Encouragement of Local Police

Intelligence _.___ -~---------------_- ____ e. The Justice Department’s Interdivision In-

formation Unit (IDIU)--__- ______ ~---~_. f. COhlINFIL Investigations: Overbreadth- __ _

3. Domestic Intelligence Authority- _. _. . . _ __ _ _ - - - __ _ a. FBI Intelligence-~-----~---------~---~~~~~ b. Army Intelligence_._------------~--~.~.~~~ c. FBI Interagency Agreements-~-~------._..~

4. Domestic Covert Action-------------------~~ a. COINTELPRO---- __________._.._. ---_..

(1) Klan and “White Hate”- - _ ________ (2) “Black Nationalist” COINTELPRO. (3) “New Left” COINTELPRO _...___

b. FBI Target Lists--- _________________ ----_. (1) “Rabble Rouser/Agitator” Index._ _ _ (2) “Key Activist” Program-------___. (3) “Key Black Extremist” Program- _. . (4) Security Index ____________ ~_------

c. Internal Revenue Service Programs_ - - - - _. . _ (1) Misuse by FBI and CIA----------- (2) The Special Service Staff: IRS Tar-

geting of Ideological Groups- _ - - - _ 5. Foreign Intelligence and Domestic Dissent _ - _ - _ _ _ _

a. Origins of CIA Involvement in “Internal Se- curity Functions”--- ___________ ---- ____

b. CIA Intelligence About Domestic Political Groups________--_-___________________

(1) (2)

CIA Response to FBI Requests- _ _ - _ Operation CHAOS- _ _ _ _. _ _ _ _ _ _ _ - - _

c. CIA Security Operations Within the United States: Protecting ‘Sources” and “Methods”-

d. NSA Monitoring ____--_____________ -_-_-- 6. Intrusive Techniques- _ _ _ _ _ _ _ _ _ _ _ _ __ _ _ _ _ _ - - - _ _ _ _ _

a. Warrantless Electronic Surveillance- _ _ _ _ - - - - (1) Executive Branch Restrictions on

Electronic Surveillance: 1965-68-. - (2) Omnibus Crime Control Act of 1968_ (3) Supreme Court Restrictions on Na-

tional Security Electronic Surveil- lance: 1972_-___-________------~

b. CIA Mail Opening-- ________ -_----- _______ c. Expansion of NSA Monitoring- _ _ - - - - - _ _ _ _ _ d. FBI Cutbacks_.____--__--________________

(1) T20tong Subcommittee Tnvestiga-

(2) Director Hoover’s Restrictions-- _ _ _ _ 7. Accountability and Control-- _ _ _ _ _ _ _ - - - - _ _ _ _ _ _ _ _ _ _

a. The Huston Plan: A Domestic Intelligence Network--_-------_-___________________

(1) Intelligence Community Pressures- - _ (2) The Interagency Committee Report-- (3) Implementation___-------- ________

78 81

ii

94 96

96

98

zi

102 104 104 105

105 106

107 107 108 109

109 110 111

111 112 113 115

Page 14: Church Committee: Reports-- Book II

xiv

II. THE GROWTH OF DOMESTIC INTELLIGENCE-Continued D. Intellieence and Domestic Dissent: 1964-1976Continued

77 Accountability and Cantrol-Continued b. Political Intelligence--_- _ _ _ _ _ _ _ _. _ _ _ _. _ _ _ - -

(1) Name Check Requests_ _ _ _ _. _ _ _ _ _ - - (2) Democratic National Convention, At-

lantic City, 1964.----_- ______ ---- (3) By-Product of Foreign Intelligence

Coverage__-----------~~-~------ (4) The Surveillance of Joseph Kraft

(19s9)----------------~--~~-~~~ (5) The “17” Wiretaps- _ _ _ _ _- - - _. . . . .

c. The Justice Department’s Internal Security 122 Division____._____---------------------- ~~~

(1) The “new” Internal Security Division- 123 (2) The Sullivan-Mardian Relationship. _ 124

d. The FBI’s Secret “Administrative Index”_-_-- 125 127 8. Reconsideration of FBI Authority-. . . ._._ ._._. ~. .

a. Develonments in 1972%1974- - _ -. - _ __ _. _. -. 128

Page

116 116

117

119

121 122

b. Recent Domestic Intelligence Authority- - - - - 131 III. FINDINGS___------~-------------~~------~--~~-..-~--.------ 137

A. Major Finding: Violating and Ignoring the Law-.-----..-_-- 137 - Subfindings: - _ -

(a) Violating Statutory Law and Constitutional Rights______-__-___----------.-------.--

(b) IgnoringIllegalIssues--------_-__-- _________ (c) Continuing Legal Activities-_-----_-_-~------ (d) Tightening Security for Illegal Activities- _ _ _ _ _ (e) Concealing Illegal Activities __._____ __ _ __ _. _ __ (f) Weakness of Internal Inspection ._____ - ______. (g) Weakness of Oversight by Senior Administration

Officials-___---------~..~---~~------~----- B. Major Finding: The Overbreadth of Domestic Intelligence

Activity--_~-------_-~~-- ____ ------_-_-- _______ I__._ Subfindings:

(a) Broad Scope of Investigations ________________ (b) Imprecise Standards for Investigations- - - - - _ _ _ (c) Overinclusive Targeting-_---_--~------------ (d) “Vacuum Cleaner” Approach - _ _ _ _ _ _ _ - _ _ _ _ _ _ _ (e) Excessivelv Long Investigations---------_-_-..

C. Major Finding: Excessive Use of Intrusive Techniques_-__-- - Subfindings :

(a) Insufficient Legal Standards and Procedures - _ _ fb) Excessive Collection Counled with Violent and \ ,

Illegal Activities of Informants and Difficulty of Limiting Surveillance- -__ _ _ _ _ _ _ _ _ _ _. _ _ _ _

(c) Imprecise Labels Lead to Abusive Use of Techniques--_- ____._ ----- _____._________

D. Major Finding: Using Covert Action to Disrupt and Dis- credit Domestic Groups__-. _ - - - _ - _ _ _ _ _ _ _. _. _ _ _ _ _ _ _ _ _ _ _

Subfindings : (a) Targeting Law-Abiding Citizens--- _ __ __ __. __ _ (b) Interference With First Amendment Rights---- (c) Dangerous Covert Tactics- - _- __ _ __ __ __. __ __ _ (d) Actions Against Dr. Martin Luther King, Jr---

E. Major Finding: Political Abuse of Intelligence Information- _ - Subfin

(a dings : I) Political Intelligence for the White House- __-

(b) Dissemination of Incidental Political or Personal Information_--- _____ -----_- __._________-

(c) Volunteering Information to the White House and Targeting Critics and Political Figures--

(d) Influencing Social Policy and Political Action- -

139 140 141 146 149 152

157

165

:z3 172 178 179 183

185

192

205

211

213 214 216 219 225

226

232

237 240

Page 15: Church Committee: Reports-- Book II

III. FINDINGS-Continued: F. Major Finding: Inadeouate Controls on Dissemination and

retention--~_-------- ____ -__--__-__-__- _____ ---___--. Subfindings :

(a) Volunteering Irrelevant Information and re- sponding Unquestioningly to Requests- _ _ - _ -

(b) Excessive Dissemination- _ _ _ _ ___ _ __ _ _. _ __ _ _. (c) Federal Employee Security Program- - _ _ _ _ _ - - _ (d) FBI Retention of Sensitive, Derogatory, and

Illegally Obtained Information-- ______._.__ G. Major Finding: Deficiencies in Control and Accountability- _

Subfindings : (a) Presidential Failure to Limit and Control

Intelligence Activities._- ___ - _ _ _ ___ __ ______ (b) Attorneys General Failure to Limit and Con-

trol FBI Intelligence Activities.-------__-~~ (c) Encouraging Political Intelligence _ _ - - _ - _ _ - - _ (d) Executive Failures to Inquire___--__----__--- (e) Congressional Failure to Oversee Intelligence

Activity and Exert Legislative Control-- _ - - _ (f) Intelligence Agencies Act with Insufficient

Authorization------- ________ --__----__--_ (g) Termination of Abusive Operations- _ __ _______

IV. CONCLUSIONS AND RECOMMENDATIONS ________________ A. Conclusions---_--------------------------------------- B. Principles Applied in Framing Recommendations and the

Scope of Recommendations ______ -_ -_ ____ _____ __ __ _- ___ C. Recommendations __-__ _ _ _ _ _ - _ _ __ _-_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ - - _ _ -

1. Intelligence Agencies Are Subject to the Rule of Law (Recommendations l-3) _____ --__--_-__-- _______

2. United States Foreign and Military Agencies Should Be Precluded From Domestic Security Activities (Recommendations 4-27) ___ _ _ - _ _ _ _ - - _ _ - - _ _ _ _ _ _ _

a. Central Intelligence Agency (Recommenda- tions 4-13)___-___-__--___~----~~-~--~--

b. National Security Agency (Recommendations 14-19)______-_--__-_------------~----~~

c. Military Service and Defense Department Investigative Agencies (Recommendations 20-26)___-_-_____-_-~~-~--~------~-----

3. Non-Intelligence Agencies Should Be Barred From Domestic Security Activity (Recommendations 27-37)___--_-_--_---~~~~.~-~----~~----~---~-~

a. Internal Revenue Service (Recommendations 27-35)___________-__-------------------

b. Post Office (U.S. Postal Service) (Recommen- dations 36-37)---.-__--__-__--~---------

4. Federal Domestic Security Activities Should Be Limited and Controlled to Prevent Abuses Without Hampering Criminal Investigations or Investiga- tions of Foreign Espionage (Recommendations 38-69)---~-----~~--~..~.~~.-------~~--~~~~-~.~

a. Centralize Supervision, Investigative Re- sponsibility, and the Use of Covert Tech- niques (Recommendations 38-39) _ _ _. _ _ . _

b. Prohibitions (Recommendations 40-41) - . - --- c. Authorized Scope of Domestic Security In-

vestigations (Recommendations 42-49). _ _. d. Authorized Investigative Techniques (Rec-

ommendations 50-63).~.~.-~--------~-~~ e. XInintennnce and Dissemination of Informa-

tion (Recommendations 64-68)------.---- f . Attorney General Oversight of the FBI,

Including Termination of Investigations and Covert Techniques (Recommendation 69)--

‘Page

253

254 259 261

262 265

267

270 274 275

277

281

% 289

292 296

296

297

297

308

310

313

313

315

316

316 317

318

324

330

332

Page 16: Church Committee: Reports-- Book II

XVI XVI

IV. CONCLUSIONS AND RECOMMENDATIONS-Continued IV. CONCLUSIONS AND RECOMMENDATIONS-Continued C. Recommendations-Continued C. Recommendations-Continued

5. The Responsibility and Authority of the Attorney The Responsibility and Authority of the Attorney General for Oversinht for Federal Domestic Securitv General for Oversinht for Federal Domestic Securitv Activities must be clarified and General Counsel and Inspectors General of Intelligence Agencies Strengthened (Recommendations 70-86) _ _ _ _ _ _ _ _

a. Attorney General Responsibility and Rela- ship With Other Intelligence Agencies (Recommendations 79-74) _ _. _ _ _ _ _ _ - _ - _ - -

b. General Counsel and Inspectors General of Intelligence Agencies (Recommendations -- ^a. ‘~S-trl~_-----__--_-_____________________

c. Office of Professional Responsibility (Recom-

6.

7.

8.

9.

10.

11.

12.

13.

mendation 82) ________ I_______ ~------- _ _ d. Director of the FBI and Assistant Directors

of the FBI (Recommendations 83-85) _ _ _ _ Administrative Rulemaking and Increased Disclosure

Should Be Required (Recommendations 86-89)~~~~~~~~~~~~~~_--~-~-~~~~~~~~~~~

a. Administrative Rulemaking (Recommenda- tions86-88)____________________________

b. Disclosure (Recommendations 89-90) _ _ _ _ _ _ _ Civil Remedies Should Be Expanded (Recommenda-

tion 91)_-_-______-_-_____----~---------------- Criminal Penalties Should Be Enacted (Recom-

mendation 92) ______ _________ __________________ The Smith Act and the Voorhis Act Should Either Be

Repealed or Amended (Recommendation 93) - - - _ _ The Espionage Statute Should Be Modernized

(Recommendation 94) __________ _________ ____ ___ Broaden Access to Intelligence Agency Files Should

Be Provided to GAO, as an Investigative Arm of the Congress (Recommendation 95) _______ __ _____

Congressional Oversight Should Be Intensified (Recommendation 96)___-----------------------

Definitions ______ -----_- _____________ -___-_---___ n . . . .̂ Appendix A: Senate Eesolutlon ~I---------_-_----------------- ____ -- Appendix B: Previously Issued Hearings and Reports of Senate Select

Committee~~~~~~~~~--~------------~~--------------- Appendix C: Staff Acknowledgments------ _______ - _____ --__-_---_-___ Additional Views:

339 339 343

355 357

Philip A. Hart_-____--~----~~--------------~--------------~--- RobertMorgan__-_-_-_-_-_---~---~------~-~----~-~---~-----~- Introduction to Separate Views of Senators John G. Tower, Howard

359 363

H. Baker, Jr., and Barry Goldwater- - _ _. _ ___ ___. __ __ __ _ __ __ _ _ - 367 John G. Tower---___----_------~---------~-----~---~-------~-~ 369 Howard H. Baker, Jr__--_----~~.-----_------- _____ -_----__---- 373 Barry Goldwater_______________________________------.-.------ 389 Charles McC. Mathias, Jr _________ ---__--_-_-_-----_----------- 395

Page

332

333

333

335

335

336

336 336

336

338

339

339

339

Page 17: Church Committee: Reports-- Book II

I. INTRODUCTION AND SUMMARY

The resolution creating this Committee placed greatest emphasis on whether intelligence activities threaten the “rights of American cit,izens.” 1

The critical question before the Committee was to determine how the fundamental liberties of the people can be maintained in the course of the Government’s effort to protect their security. The deli- cate balance between these basic goals of our system of government is often difficult to strike, but it can, and must, be achieved. We reject the view that the traditional American principles of justice and fair play have no place in our struggle against the enemies of freedom. Moreover, our investigation has established that the targets of intelli- gence activity have ranged far beyond persons who could properly be characterized as enemies of freedom and have extended to a wide array of citizens engaging in lawful activity.

Americans have rightfully been concerned since before World War II about the dangers of hostile foreign agents IikeIy to commit acts of espionage. Similarly, the violent acts of political terrorists can seriously endanger the rights of Americans. Carefully focused intelli- gence investigations can help prevent such acts.

But too often intelligence has lost this focus and domestic intelli- gence activities have invaded individual privacy and violated the rights of lawful assembly and political expression. Tinless new and tighter controls are established by legislation, domestic intelligence activities threaten to undermine our democratic society and fundamentally alter its nat,ure.

We have examined three types of “intelljgence” activities affecting the rights of American citizens. The first 1s intelligence collection- such as infiltrating groups with informants, wiretapping, or opening letters. The second is dissemination of material which has been col- lected. The third is covert action designed to disrupt and discredit the a&ivities of groups and individuals deemed a threat to the social order. These three types of “intelligence” activity are closely related in the practical world. Information which is disseminated by t,he in- telligence community 2 or used in disruptive programs has usually been obtained through surveillance. Nevertheless, a division between collect.ion, dissemination and covert action is analytically useful both in understanding why excesses have occurred in the past and in de- vising remedies to prevent t,hose excesses from recurring.

‘S. Res. 21, sec. 2(12). The Senate specifically charged this Committee with investigating “the conduct of domestic intelligence or counterintelligence op- erations against, United States citizens.” (Sec. 2(2) ) The resolution added several exhmnles of snecific charees of nossil~le “illeeal. imnroner or unethiral” governmrnta~intellig~nce akiritibs as mitters to he fully inbeskgatrd (Sec. (2) (l)-CIA domestic activities; Sec. (2) (3)-Huston Plan: Sec. (2) (lo)-surrep titnus entries. electronic surveillance, mail opening.)

‘.lust as the term “intellieence actiritr” encomnasses artirities that EO far heyond the collection and analysis of information: the term “intelligenc& com- munity” includes persons ranging from the President to the lowest field opera- tives of the intelligence agencies.

(1)

Page 18: Church Committee: Reports-- Book II

2

A. Intelligence Activity: A Nezo Fawn of Glocem~men.tai! Power to 1m- pair Citizens’ 1Zights

A tension betwen order and libcrtv is inevitable in any society. A Government must protect its citizens-from those bent on engaging in violence and criminal behavior. or in espionage and other 110s

tile foreign intelligence activity. Many of the intelligence programs revie\yed in this report were established for those purposes. Intelli- gence work has, at times, successfully prevented dangerous and abhor- rent acts, such as bombings and foreign spying, and aided in the prosecution of those responsible for such acts.

Rut, intelligence activity in the past decades has, all too often, exceedecl the restraints on the exercise of governmental power which are imposed by our country’s Constitution, laws, and traditions.

Excesses in the name of protecting security are not a recent develop- ment in our nation’s history. In 1708, for example, shortly after the Bill of Rights was added to the Constitution, the Alien and Sedition Acts were passed. These Acts, passed in response to fear of pro- French “subversion”, made it a crime to criticize the Government.3 During the Civil War, President Abraham Lincoln suspended the writ of habeas corpus. Hundreds of American citizens were prose- cuted for anti-war statements during World War I, and thousands of “radical” aliens were seized for deportation during the 1020 Palmer Raids. During the Second World War, orer the opposition of J. Edgar Hoover and military intelligence ,4 120,000 Japanese-hmericalls were apprehended and incarcerated in detention camps.

Those action.s, however, were fundamentally different from the intelligence activities examined by this Committee. They were gener- ally executed overtly w~tler the authority of a statute or a public executive order. The victims knew what, was being done to them and could challenge the Government in the courts and other forums. Intel- ligence activity. on the other hand. is generally covert. It is concealed from its victims 5 and is seldom described in statutes or explicit execu-

3The Alien Act provided for the deportation of all aliens judged “dangerous to the peace and safety” of the nation. (1 Stat. 570, June 25, 1798) The Sedi- tion Act made it a federal crime to publish “false, scandalous and malicious writing” against the United States government, the Congress, or the President with the intent to “excite against them” the “hatred of the good people of the United States” or to “encourage or abet any hostile designs of any foreign nation against the United States.” (1 Stat. 596. Jnlv 14. 1708) There were at least 25‘arrests, 15 indictments, and 10 convi&innk under the Sedition Act. (See James 11. Smith, Frwdom’s Fetters: Tile Alien and Sedition Laws and Bmcrica~ Ciz;iZ Liberties (Ithaca : Cornell IJ. Press, 19X) .)

4 Francis Biddle, Zn Brief .~uthority (Garden City : Doubleday. 1962), p. 224; Roger Daniels. Concentration, (‘nnrp~ 17RA: Jnpanesc Americans u,,d World War II (Xem Pork : Holt, Rinehart, and Winston, 1951) , p. 66.

‘Many victims of intelligence activities have claimed in the past that thrr were being subjected to hostilr action I)$ their government. Prior to this invest;- gation, most Americans would hare dismissed these allegations. Senator Philip Hart aptly described this phenomenon in the course of the Committee’s public hearings on domestic intelligence activities :

“As I’m sure others hare, I have been told for years by, among others, some of my own family. that this is exactly what the Bureau was doing all of the time, and in nix great wisdom and high office, I assured them that ther were [wrong]-it just wasn’t true, it couldn’t happen. They wouldn’t do it. What

you have described is a series of illegal actions intended squarely to deny

XVI

Page 19: Church Committee: Reports-- Book II

3

tive orders. The victim may never suspect that his misfortunes are the intended result of activities tmdertaken by his government, and accord- ingly may have no opportunity to challenge the actions taken against him.

It is, of course, proper in many circumstances-such as developing a criminal prosecution-for the Government to gather information about a citizen and use it t.o achieve legitimate ends, some of which might be detrimental to the citizen. But in criminal prosecutions, the courts have struck a balance between protecting the rights of the accused citizen and protecting the society which suffers t,he conse- quences of crime. Essential to the. balancing process are the rules of criminal law which circumscribe the techniques for gathering evi- clence,G the kinds of evidence that may be collected? and the uses to which that evidence may be put. In addition, the criminal defendant is given an opportunity to discover and then challenge the legality of how the Government collected information about him and the use which the Government intends to make of that information.

This Committee has examined a realm of governmental informa- tion collection which has not been governed by restraints comparable to those in criminal proceedings. We have examined the collection of intelligence about the political advocacy and actions and the private lives of American citizens. That information has been used covertly to discredit the ideas advocated and to “neutralize” the actions of their proponents. As Attorney General Harlan Fiske Stone warned in 1924, when he sought to keep federal agencies from investigating “political or other opinions” as opposed to “conduct . . . forbidden by the laws” :

When a police system passes beyond these limits, it is dan- gerous to the proper administration of justice and to human liberty, which it should be our first concern to cherish.

becdie There is always a possibility that a secret police may a menace to free government and free institutions be-

cause it carries with it the possibility of abuses of power which are not always quickly apprehended or understood.?

Our investigation has confirmed that warning. We have seen seg- ments of our Government, in their attitudes and action, adopt tactics unworthy of a democracy, and occasionally reminiscent of the tactics of totalitarian regimes. We have seen a consistent pattern in which programs initiated with limited goals, such as preventing criminal

First Amendment rights to some Americans. That is what my children have told me was going on. Sow I did not believe it.

“The trick now, as I see it, Mr. Chairman, is for this committee to be ahle to figure out how to persuade the people of this country that indeed it did go on. And how shall we insure that it will never happen again? But it will happen repeatedly unless we can bring ourselves to understand and accept that it did go on.” Senator Philip Hart, 11/18/75, Hearings, Vol. 6, p. 41.

‘AS the Supreme Court noted in Miranda v. Arizona, 384 U.S. 436, 483. 486 (1966), even before the Court required law officers to advise criminal suspects

Of their constitutional rights before custodial interrogation, the FBI had “an exemplary record” in this area-a practice which the Court said should be “emulated by state and local law enforcement agencies.” This commendable FBI tradition in the general field of law enforcement presents a sharp contrast to the widespread disregard of individual rights in FBI domestic intelligence opera- tions examined in the balance of this Report.

’ New York Times, S/13/24,

Page 20: Church Committee: Reports-- Book II

4

violence or identifying foreign spies, \Tere expanded to what wit- nesses characterized as "vacuum clcaners”,8 sweeping in information nbollt lawful activities of -1merican citizens.

The tendency of intclligcnce activities to expand beyoutl their initial scope is a theme which runs through every aspect of our investi- gative findings. Intelligence collection l)rograms naturally gciicrate c~cl.-incl.easing demands for new data. ,1nd once intelligence has been collected, there are strong pressures to use it against the target.

The pattern of intelli,gcnce agencies expanding the scope of their activities was well described by one witness, who in 10’70 had coordi- nated an effort by most of the intelligence community to obtain authority to undertake more illegal domestic activity:

The risk was that you would get people who would be sus- ceptible to political considerations as opposed to national security considerations, or would construe political considera- tions to be national security considerations, to move from the kid with a bomb to the kid with a picket sign, and from the kid with the picket sign to the kid with the bumper sticker of the opposing candidate. and you just keep going down the line?

In l!MO, ;\ttorney General Robert Jackson saw the same risk. He recognized that using broad labels like “national security” or “sub- version” to invoke the vast power of the government is dangerous because there are “no definite standards to determine what constitutes a ‘subversive activity’, such as we have for murder or larceny.” Jack- son added :

&tirities Khich seem benevolent or helpful to wage earners, persons on relief, or those who are disadvantaged in the strug- gle for existence may be r!garcled as ‘subversive’ by those Trhose property interests might be burdened thereby. Those who are in office are apt to regard as ‘subversive’ the activi- ties of any of those who would bring a’bout a change of ad- ministration. Some of our soundest constitutional doctrines were once punished as subversive. We must not forget that it was not so long ago that both the term ‘Republican’ and the term ‘Democrat’ were epithets with sinister meaning to de- note persons of radical tendencies that were ‘subversive’ of the order of things then dominant.lO

This wise warning Iv-as not heeded in the conduct of intelligence activity, where the “eternal vigilance” which is the “price of liberty” has been forgotten.

B. The Questions

We hive clirected our investigation toward answering the follow- ing questions :

Which governmental agencies have engaged in domestic spying? How many citizens hare been targets of Governmental intelligence

activity 1

a 11~~ Jo Cooli testimony, 12/2/Z, Hearings, Vol. 6, p. 111; James B. Adams testimony, 12/2/i% Hearings, Vol. 6. p. 135.

‘Tom Charles Huston testimony, g/23/75. Hearings, J-01. 2, p. 45. ‘” “The Federal Prosecutor”, Journal of the .lmerica?z Judicature Society

(June, lWO), p. 18.

Page 21: Church Committee: Reports-- Book II

5

What standards have governed the opening of intelligence investiga- tions and when have intelligence investigations been terminated 1

Where have the targets fit on the spectrum between those who com- mit violent criminal acts and those who seek only to dissent peacefully from Government, policy ?

TO what extent has the information collected included intimate details of the targets’ personal lives or their political views, and has such information been disseminated and used to injure individuals!

What actions beyond surveillance have intelligence agencies taken, such as attempting to disrupt, discredit., or destroy persons or groups who have been the targets of surveillance ?

Have intelligence agencies been used to serve the political aims of Presidents, other high officials, or the agencies themselves?

HOW have the agencies responded either to proper orders or to exces- sive pressures from their superiors’? To what extent have intelligence agencies disclosed, or concealed them from, outside bodies charged with overseeing them Z

Have intelligtince agencies acted outside the law? What has been the attitude of the intelligence community toward the rule of law?

To what extent has the Executive branch and the Congress con- trolled intelligence agencies and held them accountable?

Generally, how well has the Federal system of checks and balances between the branches worked to control intelligence activity?

C. Summary of the Main Problem The answer to each of these questions is disturbing. Too many people

have been spied upon by too many Government agencies and to much information has beeen collected. The Government has often undertaken the secret surveillance of citizens on the basis of their political beliefs, even when those beliefs posed no threat of violence or illegal acts on behalf of a hostile foreign power. The Government, operating pri- marily through secret Informants, but also using other intrusive techmques such as wiretaps, microphone “bugs”, surreptitious mail opening, and break-ins, has swept in vast amounts of informat.ion about the personal lives, views, and associations of American citizens. Investigations of groups deemed potentially dangerous-and even of groups suspected of associating with potentially dangerous orga- nizations-have continued for decades, despite the fact that those groups did not engage in unlawful activity. Groups and individuals have been harassed and disrupted because of their political views and their lifestyles. Investigations have been based upon vague stand- ards whose breadth made excessive collection inevitable. Unsavory and vicious tactics have been employed-including anonymous attempts to break up marriages, disrupt meetings, ostracize persons from their professions, and provoke target groups into rivalries that might result in deaths. Intelligence agencies have served the political and personal objectives of presidents and other high officials. While the agencies often committed excesses in response to pressure from high officials in the Executive branch and Congress, they also occa- sionally initiated improper activities and then concealed them from officials whom they had a duty to inform.

Governmental officials-including those whose principal duty is to enforce the law-have violated or ignored the law over long periods of time and have advocated and defended their right to break the law.

Page 22: Church Committee: Reports-- Book II

6

The Constitutional system of checks and balances has not adequately controlled intelligence activities. Until recently the Executive branch has neither delineated the scope of permissible activities nor estab- lished procedures for supervising intelligence agencies. Congress has failed to exercise sufIicient oversight, seldom questioning the use to which its apropriations were being put. Most domestic intelligence issues have not reached the courts, and in those cases when they have reached the courts, the jucliciary has been reluctant to grapple with them.

Each of these points is briefly illustrated below, and covered in sub- stantially greater detail in the following sections of the report.

1. The Number of People Affected by Domestic Intelligence Activity

United St.ates intelligence agencies have investigated a vast num- ber of L4merican citizens and domestic organizations. FBI hesdquar- ters alone has developed over 500,000 domestic intelligence files,‘l ancl these have been augmented by additional files at FBI Field Offices. The FBI opened 65,000 of these domestic intelligence files in 1972 alone.** In fact, substantially more individuals and groups are subject to intelligence scrutiny than the number of files would appear to indicate, since typically, each domestic intelligence file contains in- formation on more than one individual or group, and this information is readily retrievable through the FBI General Name Index.

The number of Americans and domestic groups caught in the domes- tic intelligence net is further illustrated by the following statistics :

-Nearly a quarter of a million first class letters were opened and photographed in the United States by the CIA between 1953-19’73~ producing a CIA computerized index of nearly one and one-half million namesI

--At least 130.000 first class letters were opened and photo- graphed by the FBI between 19@-1966 in eight U.S. cities.14.

-Some 300,000 individuals were indexed in a CL4 com- puter system and selparate tiles were created on approximately 7,200 Americans and over 100 domestic groups during the course of CIA’s Operation CIIhOS (1967-1973) .I5

-Millions of private telegrams sent from, to, or through the United States were obtained by the Nat,ional Security Agency from 1947 to 1975 under a secret arrangement with three United States tele.graph companies.‘”

-An estimated 100,000 Americans were the subjects of United States ,4rmy mtelligence files created between the mid-1960’s and 1971.”

-Intelligence files on more than 11,000 individuals and groups were created by the Internal Revenue Service between

I1 Memorandum from the FBI to the Senate Select Committee, 10/6/X ” Jlemorandum from the FBI to the Senate Select Committee, 10/6/75. I3 James Angleton testimony, 9/17/X, p. 28. I’ See Mail Opening Report : Section IV, “FRI Mail Openings.” I’ Chief, International Terrorist Group testimony, Commission on CIA Activi-

ties Within the United States, 3/10/75. pp. 14851489. I6 Statement by the Chairman, 11/6/E; re: SHAMROCK, Hearings, Vol. 5,

pp. 57-60. *‘See Military Surveillance Report : Section II. “Tll~ Collection of Information

about the Political Activities of Private Citizens and Private Organizations.”

Page 23: Church Committee: Reports-- Book II

7

1969 :and 1973 and t,ax investig$ions were started on the basis of political rather than tax criteria.‘8

--at least 26,000 individuals were at, one point cut.alogued on an FBI list of pe,rsons to be rounded up in the event of a “national emergency”.1s

2. Too Mwh Information Is CoRected For Too Long Intelligence agencies have collected vast amounts of information

about the intimate details of citizens’ lives and about t)heir participa- tion in legal and peaceful political activities. The targets of intelli- gence activity have included political adherents of the right and the left, ranging from activitist to casual supporters. Investigations have been directed against proponents of racial causes and women’s rights, outspoken apostles of nonviolence and racial harmony ; establishment politicians; religious groups; and a.dvocates of new life styles. The widespread targeting of citizens and domestic groups, and the exces- sive scope of the collection of information, is illustrated by the fol- lowing examples :

(a) The Women’s Liberation Movement” was infiltrated by in- formants who collected material about the movement!s policies, leaders, and individual members. One report included the name of every woman who attended meetings,20 and another stated that each woman at a meeting had described “how she felt oppressed, sexually or other- wise”.‘l another report concluded that the movement’s purpose was to “free women from the humdrum existence of being only a wife and mother”, but still recommended that the intelligence investigation should be continued.2z

(b) A prominent civil rights leader and advisor to Dr. Martin Luther King, Jr., was investigated on the suspicion that he might be a Communist “sympathizer”. The FBI field office concluded he was not.23 Bureau headquarters directed that the investigation continue- using a theory of “guilty until proven innocent :”

The Bureau does not agree with the expressed belief of the field office that ------------------24 is not sympathetic to the Party cause. While there may not be any evidence that --------- --- is a Communist neither is there any substantial evidence that he is anti-Communist.25

(c) FBI sources reported on the formation of the Conservative American Christian Action Council in 1971.26 In the 1950’s, the Bu- reau collected information about the John Birch Society and passed

I8 See IRS Renort : Section II. “Selective Enforcement for Nontax Purooses.” lB Memorandum from A. H. Belmont to L. V. Boardman, 12/a/54. Many-of the

memoranda cited in this report were actually written by FBI personnel other than those whose names were indicated at the foot of the document as the author. Citation in this report of specific memoranda by using the names of FBI personnel which so appear is for documentation purposes only and is not intended to presume authorship or even knowledge in all cases.

ao Memorandum from Kansas City Field Office to FBI Headquarters, 10/26/70. (Hearings, Vol. 6. Exhibit 54-3)

n Memorandum from New York Field Office to FBI Headquarters, 5/28/69, p. 2. (Hearings, Vol. 6, Exhibit 54-l)

*‘Memorandum from Baltimore Field Office to FBI Headquarters, 5/11/70, p. 2.

3 3lemorandum from New York Field Office to FBI Headquarters, 4/14/64. ” Name deleted by Committee to protect privacy. 2j Memorandum from FBI Headquarters to New York Field Office 4/24/64, re

CPUSA, Negro question. X James Adams testimony, l2/2/75, Hearings, Vol. 6, p. 137.

Page 24: Church Committee: Reports-- Book II

8

it to the White House because of the Society’s “scurillous attack” on

President Eisenhower and other high Government olliciuls.” (d) Some inr-estigutions of the lswrul activities of pea&u1 ,groups

have continued for decades. For example, the KAACP was mvesti- gated to determine whether it *‘had comlections with” the Communist Party. The investigation lasted for over twenty-five years, although nothing was found to rebut a report during the first year of the investi- gation that the KAACP had a “strong tendency” to “steer clear of Communist activities.” 2b Similarly, the FBI has admitted that the Socialist \\‘orkers Party has committed no criminal acts. Yet the Bureau has investigated the Socialist Workers Party for more than three decades on the basis of its revolutionary rhetoric-which the FBI concedes falls short of incitement to violence-and its claimed international links. The Bureau is currently using its informants to collect information about SWP members’ political views, including those on “U.S. involvement in Angola,” “food prices,” “racial mat- ters,” the “Vietnam War,” and about any of their efforts to support non-SWP candidates for political office.“”

(e) National political leaders fell within the broad reach of in- t,elligence investigations. For example: -1rmy Intelligence maintained files on Senator hdlai Stevenson and Covgressman Sbner Mikva because of their participation in peaceful pohtlcal meetings under sur- veillance by Army ?gents.30 A letter to I&chard Nixon, while he was 3 candidate for President in 1068~ was intercepted under CL4’s mall opening program.3* In the 1960’s President Johnson asked the FBI to compare various Senators’ statements on Vietnam with the Commu- nist Party line 33 and to conduct name checks on leading antiwar sena- tors.33

(f) Ss part of their effort to collect information which “related even remote!.?’ to people or groups “active” in communities which had “the potential” for civil disorder, Army intelligence agencies took such steps as: sending agents to a Halloween party for elementary school children in Washin&on, D.C., because they suspected a local “dissident” might be present : monitoring protests of weifare mothers’ organizations in Milvaukce; infiltrating a coalition of church youth groups in Colorado: and sending agents to a priests’ conference in TVashin&on, D.C., held to discnss birth control measures.3*

(g) In the late 1960’s and cnrl~ 1SSO’s. student proups were sllb- jetted to intense scrutinv. In l!Ro-the FRT ordered investi.crations of cverv mcmhcr of the Students for a T)cmocratic ,Societv and of “every Black Student Thion and similar group rerardlcss of their past or

“Memornndum from F. .J. Ramnmrdner to William C. Sullivan. s/29/63. r21 Memorandum from Oklahoma City Field Offire to FRT Headquarters. g/19/41.

See Development of FBI Domestic Intelligence Inwstigations : Section IV, “FBI Target Lists.”

?g Chief Robert Shackleford testimony. 2/6/76. p. 91. 3o Senatr Jndi?iarF Snhcommittce on Cnnstitutinnal RiFhts. Report. 1973. p. 57. 31 Senate Select Committee Staff summary of HTLINGUAL File Review,

g/5/75. 31 FRT Summary ?@morandum. l/31/75. re : Coverare of T.V. Presentation. 31 T,etter from .J. Edgar Hnnrer to Marvin Watson, 7/15/66. ” See Militav Report : Sec. II, “The Collection of Information About the PO

litical Activities of Private Citizens and Private Organizations.”

Page 25: Church Committee: Reports-- Book II

9

present involvement in disorders. ‘: 3Z Fiies were opened on thousands of young men and women so that, as the former head of FBI intelligence explained, the information could be used if they ever applied for a government job.“”

In the 1960’s Bureau agents were instructed to increase their efforts to discredit LLNew Left” student demonstrators by tactics including publishing photographs (“naturally the most obnoxious picture should be used”) ,3i using “misinformation” to falsely notify members events had been cancelled, and writing “tell-tale” letters to students’ parents.39

(h) The FBI Intelligence Division commonly investigated any in- dication that “subversive” groups already under investigation were seeking to influence or control other groups.4o One example of the ex- treme breadth of this “infiltration” theory was an FBI instruction in t,he mid-19603 to all Field Offices to investigate every “free university” because some of them had come under “subversive influence.” 41

(i) Each administration from Franklin D. Roosevelt’s to Richard Nixon’s permitted, and sometimes encouraged, government agencies to handle essentially political intelligence. For example :

-President Roosevelt asked the FBI to put in its files the names of citizens sending telegrams to the White House opposing his “national defense” policy and supporting Cal. Charles Lindbergh.42

-President Truman received inside information on a former Roosevelt aide’s efforts to influence his appointments,43 labor union negotiating p1ans,44 and the publishing plans of journalists.45

-President Eisenhon-er received reports on purely political and social contacts with foreign officials by Bernard Baruch,46 Mrs. Eleanor Roosevelt.47 and Supreme Court Justice William 0. Doug1as.47”

-The Kennedy -1dministration had the FBI wiretap a Congres- sional staff member,48 three executive officia1s,4” a lobbyist,50 and a. Washiqton law firm.5* ,\ttornev General Robert F. Kennedy received t.he fruits of a FBI “tap” on liartin Luther King, vJr.,52 and a “bug” on a Congressman both of which yielded information of a political nature.53

Qj Jlemorandum frnm FBI headquarters to all SAC’s, U/4/70. ” Charles Brennan testimonr. g/25/75. Hearings. vol. 2 D. 117. 3’ Memorandum from FBI H’eadqu&t& to all?&%, ‘7/5/68. 98Ahstract~ of New Left Documents #lSl. 115, 43. Memorandum from Wash-

ington Field Office to FBI Headquarters; l/21/69. 38 Memorandum from FBI Headquarters to Cleveland Field Office, 11/29/68. ” FBI Manual of Instructions, Sec. 87, B (2-f). ‘I Memorandum from FBI Headquarters to San Antonio Field Office, 7/23/69. Ip Memorandum from Stephen Early to .J. Edgar Hoover, 5/21/40; 6/17/40. ‘3 Letter from J. Edgar Hoover to George Allen, 12/3/46. U Letter from ,J. Edgar Hoover to Maj. Gen. Harry Vaughn, 2/15/47. 46 Letter from J. Edgar Hoover to 11. J. Connelly. l/27/.50. ‘81detter from J. Edgar Hoover to Dillon Anderson, 11/7/55. ” Letter from .J. Edgar Hnorer to Rohert Cutler, 2/13/58. I” Letters from J. Edgar Hoover to Robert Cutler, 4/21/53-4/27/53. 48 Memorandum from ,J. Edgar Hoover to the Attorney General. 2/16/61. @Memorandum from J. Edgar Hoover to the Attorney General. 2/14/61. 6o Memorandum from J. Edgar Hoover to the Attorney General, 2/16/U. m Jlemorandum from J. Edgar Hoover to the Attorney General 6/26/62. 5? Memorandum from Charles Brennan to William Sullivan, 12/19/66. WMemorandum from J. Edgar Hoover to the Attorney General. 2/X3/61.

Page 26: Church Committee: Reports-- Book II

10

-President ,Johnson asked the FBI to conduct “name checks” of his critics and of members of the staff of his 1964 opponent! Senator Barry Goldwater.3.’ He also requested purely political intelligence on his critics in the Senate, and received extensive intelligence reports on political activity at the 1964 Democratic Convent.ion from FBI elec- tronic surveillance.55

-President Kixon authorized a program of wiretaps which pro- duced for the White House purely political or personal information unrelated to national security, including information about a Supreme Court justice.56

3. Coved Action nnc7 the T'.qe of Z77egaZ m~Z?npToper Means

(a) Covert Action.--,Qpart from uncovering excesses in the collec- tion of intelligence, our investigation has disclosed covert actions di- rected against Americans, and the use of illegal and improper surveil- lance techniques to gather information. For example :

(i) The FBI’s COINTEI~PRO-counterintelligence program-was designed to “disrupt” groups and “neutralize?’ individuals deemed to be threats to domestic security. The FBI resorted to counterintelli- gence tactics in part because its chief officials believed that t,he existing lam could not control the activities of certain dissident groups, and that court decisions had tied the hands of the intelligence community. Whatever opinion one holds about the policies of the targeted groups, many of the tactics employed by the FBI xe,re indisputably degrading to a free society. COINTELPRO tactics included :

-Anonymously attacking the political beliefs of targets in order to induce their employers to fire them;

-Anonymously mailing letters to the spouses of intelligence targets for the purpose of destroying their marriage,s; 57

-Obtaining from IRS the tax returns of a target and t,hcn attempt- ing to provoke an IRS investigation for the rspress purpose of de- terring a protest leader from attending the Democratic National Convention ; 58

-Falsely and anon;vmonsly labelin, w as Government informants mrmbrrs of groups kno\vn to be violent. thcrrby rsposing the falsely lsbelled member to expulsion or physicial attack; 5g

--Pursuant to instructions to use “misinformation” to disrupt demonstrations. employing such means as broadcasting fake orders on the same citizens band radio frequency usecl by demonstration marshalls to attempt to control denlonstrntions.60 and duplicating and falsely filling out forms soliciting housing for persons coming to a demonstration. thereby causing “long and useless journeys to locate these acldresses”; 61

64\C~moranrlnm froni .T. Edgar Hoorer to nil1 Meyers. 10/27/64. 65ilemorandum from C. D. DeLoach to .John Mohr, S/29/64. 58 T,ettcr from .T. Ed,onr Hoover to H.R. Haldemnn. 6/25/70. ” Mrmornndum from FBI Headquarters. to San Francisco Field Office,

11 /X/OR. i8JIemorandum from [Midwest City] Field Office to FRT Headquarters.

S/i/M: memorandum from FBI Headquarters to [Midwest City] Field Office, S/A/Ci.

” 1Iemorandum from Columbia Field Office to FBI Headquarters, 11/4/70, re : COTSTDT,PRO-New Left.

@ Memorandum from Charles Rrennnn to William Snlliran. 3/15/&Q. Q Memorandum from Chicago Field Office to FBI Headquarters, 9/9/M.

Page 27: Church Committee: Reports-- Book II

11

-Sending an anonymous letter to the leader of a Chicago street gang (described as “violence-prone”) stating that the Black Panthers were supposed to have “a hit out for you”. The letter was suggested because it “may intensify . . . animosity” and cause the street gang leader to “take retaliatory action”.62

J (ii) F rom “late l!X3” until his death in 1068, Martin Luther King,

, r.. was the target of an intensive campaign bv the Federal Bureau of Investigation to “neutralize” him as an effe&ire civil rights leader. In the words of the man in charge of the FBI’s “war” against Dr. King, “No holds were barred.:: 63

The FBI gathered information about Dr. King’s plans and activi- ties through an extensive surveillance program, employing nearly every intelligence-gathering technique at the Bureau’s disposal in order to obtain information about the “private activities of Dr. King and his advisors” to use to “completely discredit” them.64

The program to destrqv Dr. King as the leader of the civil rights movement included efforts to discredit him with Executive branch officials, Congressional leaders. foreign heads of state, American am- bassadors, churches. universities, and the press.65

The FBI mailed Dr. King a tape recording made from microphones hidden in his hotel rooms which one agent testified was an attempt to destroy Dr. King’s marriage. G6 The tape recording was accompanied by a note which Dr. King and his advisors interpreted as threatening t.o release t,he tape recording unless Dr. King committed suicide.G7

The extraordinary nature of the campaign to discredit Dr. King is evident from two documents :

--At the August 1963 March on Washington, Dr. King told the country of his “dream” that :

all of God’s children, black men and white men, Jews and Gentiles, Protestants and Catholics. will be able to join hands and sing in the words of the old Negro spiritual, “Free at last, free at last,, thank God Almightly, I’m free at last.”

The Bureau’s Domestic Intelligence Division concluded that this “demagogic speech” established Dr. King as the “most dangerous and effective Negro leader in the country.” 68 Shortly afterwards, and within days after Dr. King \vas named”“Man of the Year” by Time ma~gazine. the FBI decided to “take him off his pedestal,” reduce him completely in influence.” and select, and promote its own candidate to “assume the role of the leadership of the Negro people.” 6Q

-In early 1968, Bureau headquarters explained to the field that Dr. King must be destroyed because he was seen as a potential “messiah” who could “unify and electrify” the “black nationalist movement”. Indeed, to the FBI he was a potential threat because he might “aban-

” Memorandum from FBI Headquarters to Chicago Field Office, l/30/69 re : COTNTELPRO. Black Xationalist-Hate Groups.

a3 William C. Sullivan testimony. 11/l/75. p. 49. (u Jlemorandnm from Banmgardnw to Sullivan, 2/4/M Q Memorandum from Chicago Field Office to FBI Headquarters, 12/16,&M;

memornnclum from FBI Headquarters to Chicago Field Office, l/30/69, re: COTNTELPRO. Blark Satinnalist-Hate Groups.

OB William C. Sullivan. 11/l/75. pp. 104-105. us Andrew Young testimony. Z/19/76. p. 8. m Memorandum from Sullivan to Belmont. S/30/63. (18 Memorandum from Sullivan to Belmont, l/8/64.

Page 28: Church Committee: Reports-- Book II

12

don his supposed ‘obedience’ to white liberal doctrines (non-viol- ence) .:’ i” In short, a non-violent man was to be secretlv attacked and destroyed as insurance, against his abandoning non-biolence.

(6) 177egal 01' Improper Ncn,,s.-The surveillance which we in- vestigated was not’ onlv vnstlg excessive in breadth and a basis for degrading counterinteliigenrc actions, but, was also often conducted by illegal or improper means. For example :

(1) For approximately 20 years the CL4 carried out. a pro- gram of indiscriminatelv opening citizens’ first class mail. The Rnrenu also had a mail opening program. but cancelled it in 1966. The Bureau continued. however. to receive the illegal fruits of CL4’s program. In 1970, the heads of both agencies signed a document for President Xixon, which cor- rectly stated that mail opening was illegal, falsely stated that it had been discontinued, and proposed that the illegal open- ing of mail should be resumed because it would provide use- ful results. The President approved the program, but with- drew his approval five days later. The illegal opening con- tinued nonetheless. Throughout, this period CIA officials knew that mail opening was illegal, but expressed concern about the “flap potential” of exposure, not about the illegality of their activity.71

(2) From 1947 until May 1975, NSA received from inter- national cable companies &llions of cables which had been sent by American citizens in the reasonable expectation that they would be kept private.72

(3) Since the early 1930’s. intelligence agencies have frequently wiretapped and bugged American citizens with- out the benefit of judicial warrant. Recent court decisions have curtailed the use of these techniques agninst domestic targets. Rut, past subjects of these surveillances have included a United States Congressman. a Congressional staff member, journalists and newsmen. and numerous individuals and groups who engaged in no criminal activity and who posed no genuine threat, to the national security, such as two White House domestic affairs advisers and an anti-Vietnam War protest group. While the prior written approval of the Attor- ney General has been required for all warrantless wiretaps since 1940, the record is replete with instances where this requirement was ignored and the Attorney General gave only after-the-fact authorization.

Until 1965. microphone surveillance by intelligence agen- cies was wholly nnremllated in certain classes of cases. Within weeks after a 1954 Supreme Court decision denouncing the FBI’s installation of a microphone in a defendant’s bedroom, the nttorney General informed the Bureau that he did not believe the decision applied to national security cases and

” Memorandnm from FBI Headquarters to all SACS, 3/4/M. ‘I See Mail Opening Report. : Section II, “Legal Considerations and the ‘Flap’

Pntentinl.” % SW SSA Report : Section I. “Introduction and Summary.”

Page 29: Church Committee: Reports-- Book II

13

permitted the FBI to continue to install microphones sub- ject only to its own “intelligent restraint”.73

(4) In several cases, purely political information (such as the reaction of Congress to an Administration’s legislative proposal) and purely personal information (such as COV- ernge of the extra-maEita1 social activities of a high-level Ex- ecutive official under surveillance) was obtained from elec- tronic surveillance and disseminated to the highest levels of the federal government.74

(5) Warrantless break-ins have been conducted by intelli- gence agencies since World War II. During the 1960’s alone, the FBI and CIA conducted hundreds of break-ins, many against American citizens and domestic organizations. In some cases, these break-ins were to install microphones ; in other eases! thev \TTere to steal such items as membership lists from organizations considered “subversive” by the Bureau.75

(6) The most pervasive surveillance technique has been the informant.. In a random sample of domestic intelligence cases, 83% involved informants and 5% involved electronic surveill’ance.iG Informants have been used ‘against peaceful, law-abiding groups ; thev have collected information about personal and political l:iems and activities.?? To maintain their credentials in violence-prone groups, informants have involved themselves in violent activity. This phenomenon is well illustrated by an informlant in the Klan. He was present at the murder of a civil righti worker in Mississippi and sub- sequently helped to solve the crime ,and convict the perpetra- tors. Earlier, however, while performing duties paid for by the Government, he had previously “beaten people severely, had boarded buses and kicked people, had [gone] into res- taurants and beaten them [blacks] with blackjacks, chains, pistols.” is Although the FBI requires agents to instruct in- formants that they cannot be involved in violence, it was understood that in the Klan, “he couldn’t be an angel and be a good informant.” 7g

4. Zgnorhg the Lau! Officials of the intelligence agencies occasionally recognized that

certain activities were ,illegal. but expressed concern only for “flap potential.” Even more disturbing was the frequent testimony that She law, and the Constitution were simplv ignored. For example, the author of the so-called Huston plan testified :

Question. Was there any person who stated that the activity recommended. which you ,have previously identified as being

” ~~ernoramlnrn from Attorney General Rrownell to J. Edgar Hoover, 5/20/54. “See finding on Political Ahuse. To protect the privacy of the targeted

individual, the Committee has omitted the citation to the memorandum concern- ing the example of purelv personal information.

m Memorandum from W. C. Sullivan to C. IX DeTlnach, 7/19/66, p. 2. ‘” General Accounting Office Report on Domestic Intelligence Operations of the

FRT. Q/75. * Mary .Jo Cook testimnnp. 12/2/‘75, Hearings, Vol. 6. p. 111. ” Gary RoKe deposition, 10/17/75, p. 9. 79 Special Agent No. 3 deposition, 11/21/75, p. 12.

Page 30: Church Committee: Reports-- Book II

14

illegal opening of the mail and breaking and entry or bur- glary-was there any single person who stated t.hat SUCK ZLC-

tivity should not be done because it was unconstitutional? Answer. X0. Question. Was there any single person who said such activ-

ity should not be done because it was illegal ? Answer. Ko.~O

Similarly, t,he man rho for ten years headed FBI’s Intelligence Division testifod that :

never once did I hear anybody. including myself, raise the iuestion : “Is this course of action which we have agreed upon lawful, is it legal, is it et:hical or moral.” We nerer.gave any thought to this lme of reasoning, bec.ause ~-e were just natu- rally pragmatic.81

Although the statutory law and the Constitution were often not “[given] a thought’:,8z t.here was ‘a general attitude that intelligence needs were responsive to a higher law. Thus, as one witness testified in just,ifying the FBI’s mail opening program :

It was my assumption that what we were doing Teas just.ified by what we had to do . . . the grea.ter good, the national s5curity.83

5. Deficiencies in Accountability and Control The overwhelming number of excesses continuing over a prolonged

period of time were due in large measure to the fact that t.he system of checks and balances-created in our Constitution to limit abuse of Governmental power- was seldom applied to the intelligence com- munity. Guidance an’d regulation from outside the intelligence aagen- ties-where it has been imposed at all-has been vague. Presidents and other senior Executive officials, particularly the At.torneys Gen- eral, h,ave virtually abdicated their Constitutional responsibility to oversee la.nd set stmandards for intelligence activity. Senior government officials generally *pave the agencies broad, general mandates or pressed for immediate results on pressing problems. In neither case did they provide guidance to prevent excesses and t,heir broad mandates and pressures themselves often resulted in excessive or improper intelligence activity.

Congress has often declined to exercise meaningful oversight, ‘and on occasion has passed laws or made statements which were taken by intelligence agencies as supporting overly-broad invest,igations.

*’ Huston testimony, g/23/75. Hearings. Vol. 2, n. 41. 81 William Sullivan testimony, 11/l/75, pp. 92-93. 82The quote is from a Bureau official who had supervised for the “Black

Nationalist Hate Group” COINTET,PRO. “‘Qtlertiofl.. Did anybody at anv time t.ha#t you rememher during the courSe of

the programs discuss the Constitutionality or the legal au,thorlty, or anything else like that?

“Answer. NO, we never gave i’t a tihough,t. As far as I know, nobody engaged or ever had any idea that they mere doing anything other than what was the policy of the Bureau which had been policy for a long time,” (George l\loore deposition, 11/3/75. p. 83.)

85 Branion, 10/g/75. p. 41.

Page 31: Church Committee: Reports-- Book II

15

On the other h’and, the record reveals instances when intelligence agencies have concealed improper &ivities from their superiors in the Execut,ive branch and from the Congress, or have elected to dis- close only the less questionable aspects of their sot.ivities.

There has been, in short, a c1~a.r and sustlained failure by those responsible to control the Intelligence communi,ty and to ensure its nc,countability. There has been ‘an equally clear and sustained fiailure by intelligence agencies to fully inform the proper authorities of their activities and to comply with directives from those authorities.

6. The Adverse Impact of Improper Intelligence Activity Many of the illegal or improper disruptive efforts directed against

American citizens and domest,ic organizations succeeded in inluring their targets. Although it is sometimes difficult to prove that a target’s misfortunes lyere ca’used by a counter-intelligence program directed against him, t.he possibility that an arm of the United States Govern- ment intended to cause the harm and might have been responsible is itself abhorrent.

The Committee has observed numerous examples of the impact of intelligence operations. Sometimes the harm was readily apparent- destruction of marriages, loss of friends or jobs. Sometimes the atti- tudes of the public and of Government offici$ls responsible for formu- latinz policy and resolving vital issues were influenced by distorted intelligence. But the most basic harm was to the values of privacy and freedom which our Constitution seeks to protect and which intelligence activity infringed on a broad scale.

(a) General Efforts to Discredit.-Several efforts against individuals and groups appear to have achieved their stated aims. For example :

--,4 Bureau Field Office reported that the anonvmous letter it had sent to an activist’s husband accusing his wife of infidelity “contributed very stronglv” to the subsequent breakup of the marriage.84

-Another Field Office reported that. a dra’t counsellor delibe,rately, and falsely, accused of being an FBI informant was “ostracized” by his friends and associates.85

-Two instructors were reportedlv put on probation after the Bu- reau sent an anonvmous letter to a university administrator about their funding of an anti-administration student newspaper.86

-The Bureau evaluated its attempts to “put a stop” to a contribu- tion to the Southern Christian Leadership Conference as “quite successf111.” 8’

-An FBI document. boasted t,hat a “pretext” phone call to Stokeley Carmichael’s mother telling her that members of the Black Panther Party intended to kill her son left her “shocked”. The memorandum in- timate.d that the Bureau believed it had been responsible for Carmi- chaPI’s flircht to Africa the followin,rr day.88

(6) Media Manipu7&ion.-The FBI has attempted covertly to in- fluence the public’s perception of persons and organizations by dis- seminatimcr der.opatorv information to the press. either anonymously or through “friendly” news contacts. The impact of those articles is

sl Xpmorandum from St. T‘ouis Field Office to FBT Headquarters, 6/19/‘70. EJ Memorandum from San IMezo Field Office to FBI Headquarters, 4/30/69. 88 Memorandum from Mobile Field Office to FRI Headquarters, 12/g/70. m Memorandum from Wick to DeLoach, 31/9/66. 88 Memorandum from Sew York Field Office to FBI Headquarters, 9/9/M.

Page 32: Church Committee: Reports-- Book II

16

generally difficult to measure, although in some cases there are fairly direct connections to injury to the target. The Bureau also attempted to influence media reporting which would have any impact on the pub- lic image of the FBI. Examples include:

-Planting a series of derogatory articles about Martin Luther King, Jr., and the Poor People’s Campaign.8Q

For example, in nnt.icipntion of the 19fi8 “poor people’s march on Washington, D.C.,” Bureau Headquarters granted authority to furnish “coopernti& news media SOIII.WS” an article “designed to cur- tail success of Jlart.in Luther King’s fund raising.” 93 .Another memo- randum illustrated how “photographs of demonstrators” could be used in discrediting t,he civil rights mowment. Six photographs of partic- ipants in the poor people’s campaign in Cleveland accompanied the memorandum with the following note attached : “These [photo- graphs] show the militant a ~ggwssire appearance of tlic l)articipants and mi&t be of interest to a cooperative nc,ws SOIIIW.” 91 Information on thr Poor Peol)lc’s Campaign was proridcd by the FBI to friendly reporters on the conclition that “the Bureau must not be revealed as

the source.?’ O2 -Soliciting information from Field Offices “on a continuing basis”

for “prompt . . . dissemination to the news media . . . to discredit the New Left movement and its adherents.!’ The Headquarters direc- tive requested, among other things, that:

specific da*ta should be furnished depicting the scurrilous and depraved nature of many of the chara.cters. activities, habits ,and living conditions representative of New Left adherents.

Field Offices were to be exhorted that: “Every arrnue of possible rm- barrassment must be rigorously and enthusiastically explored.” 93

-Ordering Field Officw to gather information which would dis- prove allegations IX the “liberal press, the blredin,rr hearts. and the forces on the left” that the Chicn8co police used undur force in dealing with demonstrators at the l%?? Drmocrntic Conventinn.

-Taking advantage of a. close relationship with the Chairman of the Board-described in an FBI memorandum as “our rood friend”-- of a magazine with national circulat.ion to influence articles which re- lated to the FBI. For example, through this relationship t,he Bureau : “squelched” an “unfavora,ble article ?,gainst, the Bureau” written by a fre.e-lance writer about an FBI inrest,l,nation : “postponed publicat.lon” of an article on another FBI case; “forestalled publication” of an ar- tkle by Dr. Martin Luther King, ,Jr. ; and received informa.tion about proposed editing of King’s articles96

(c) Distorting Dnta to [email protected] Government Policy and Pub- lic Perceptions

~~ccurake intelligence is a prerequisite to sound government policv. However. as the past head of the FBI’s Domestic Intelligence Divisik reminded t,he Committee :

88 Sw King Report : Sections T’ and VTT. wMemorandnm from G. C. Moore to IV. C. Sullivan. 10/26/68. n Memorandum from G. C. Moore to W. C. Sullivan. 5/17/68. ~1lemornndnm from FRI Headquarters to Minmi Fi~lrl Office. ‘i/9/68. 83 Afemorandum from C. D. Rrennan to W. C. Snllivan. 5/22/68. 05Memorandum from FBI Hpadguarters to Chimp7) Field Office, S/28/68. m Memorandum from W. H. Stapleton to DeLoach, U/3/64.

Page 33: Church Committee: Reports-- Book II

17

The facts by themselves are not too meaningful. They are somet.hing like stones cast into 8 heap.97

On certain crucial subjects the domest.ic intelligence agencies reported the “fact6” in ways that gave rise to misleading impressions.

For example, the FBI’s Domestic Intelligence Division initially dis- counted as an “obvious failure” the alleged attempts of Communists to influence the civil rights nlovenlent.“S Without any significant change in the factual situation, the Bureau moved from the Dirision’s conclusion to Director Hoover’s public congressional testimony charac- terizing Co~nimunist influence on the c,ivil rights movement as “vitally importa.nt.” 98a

FBI reporting on protests ‘against the Vietnam War provides an- other example of the manner In which the information provided to de,cisioii-iiialiers can be skewed. Tn ncqlliescence with a judgncnt al- ready expressed by President ,Johnson. the Bureau’s reports on dem- onstrations against tlie Kar in Yietnnm emphasized Communist efforts to influence the anti-war moremcnt and underplayed the fact that the vast majority of demonstrators were not ~Conimunist contr011ed.9g

(cl) “Chil7ing” First Amendment Rights.-The First Amendment protects the Rights of American citizens to engage in free and open discussions, and to associate with persons of their choosing. Intel- ligence agencies hare, on occasion. expressly attempted to interfere with those rights. For example. one internal FBI memorandum called for (‘more intervicn-s” with T\‘ew T,rft subjects “to enhance the paranoia endemic. in these circles” and “get t,he point across there is an FBI agent behind every mailbox.” loo

Nero importantly. the government’s surveill~ance adivities in the nggrcgate-whether or not expresslv intended t.o do so-tends, as the Comniittcr concludes n’t 1). 290 to deter the exercise of First Amended rights br hmrrican citizens who become aware of the go\-- ernmtnt’s domestic intelligence procram.

(e) Prevenfino the Free Eachange of Ideas. Speakers. teachers, writers. and publications t,hemselves were targets of t.he FBI’s count,er- intelligence pro,rrram. The FBI’s efforts to interfere with t.he free ex- change of ideas included :

--12nonymoilslg attemptin? to prevent. an alle,rred “Communist- front” ,croup from holding a forum on a midwest campus. a.nd then inresti.Ming the judge who ordered that. the meeting be allowed to proceedlO1

-Vsin.cl. nnothcr “confidential source,” in a foundation which con- tributed to a local college to apply pressure on the school to fire an activist professor.

--Anonymously contactinp a university official to urpe him to “per- SIVI~C” two professors to ston funclinr a st.ndent newspaper, in order to “eliminate what voice the Sew Left has” in the area.

87 Snlliran. 11/l/7.5. p. 48. 88JIemorandnm from Rnnmgnrdner to Snlliran. 8/26/M p. 1. Hnnwr himself

construed the initial Dirision estimate to mean that Communist influence was “infinitesimal.”

OR’ SW Fnidine on Pnlitirnl .2bnse. p, 225. m SW Findine on Politiral A\bnse. p. 225. lM “XPIV T.&t Nntw-Philadelohin.” R/16/70. Edition #l. ““~T~morandnm frnm TWrnit Field Office to FRT Hendqnnrtws 10/26/f%?:

Mrmornndnm from F’BT Headquarters to Detroit Field Ofice 10/27, 28, 31/W; Memorandum from Baumgardner to Belmont, 10/26/60.

68-786 0 - 76 3

Page 34: Church Committee: Reports-- Book II

18

-Targeting the New Mexico Free University for t,eaching “con- frontation politics” and “draft counseling training”.102

7. Cost and VaZue Domestic intelligence is expensive. We have already indicated the

cost of illegal and improper intelligence activities in terms of the harm to victims, the injurv to constitutional values, and the daniagc to the democratic process i&elf. The cost in dollars is also significant. For example, the FBI has budgeted for fiscal year 1976 over $7 million for its domestic security informant program, more than twice the amount. it spends on informants against organized crinle.1o3 The aggregate budget for FBI clomest.ic security intelligence and foreign counterintelligence is at least $80 million. lo4 In the late 1960s and early 197Os, when the Bureau was joined by the CTA. the military, and SSA in collecting information about the anti-war movement and black activists, the cost was substantially greater.

Apart from the excesses described above, the usefulness of many domestic intelligence activities in serving the legitimate goal of pro- tecting society has been questionable. Properly directed intelligence investigations concentrating upon hostile foreign agents and violent terrorists can produce valuable results. The Committee has examined cases where the FBT uncovered “illegal” agents of a foreign paver engaged in clandestine intelligence activities in violation of fe,deral law. Information leading to the prevention of serious violence has been acquired by the FBI through it.s informant penet.ration of ter- rorist groups and through the inclusion in Bureau files of the names of persons actively involved with such.,zroups.105 Sevcrtheless, the most sweeping domestic. intelligence surveillance programs have produced surprisingly fern useful returns in view of their extent. For example:

1m See COISTELPRO Report: Section III. “The GoaLs of COTXTELPRO: Preventing or disrupting the exercise of First Amendment Rights.”

‘“The budget for FBI informant programs inrludes not only the payments to informants for their services and expenses, but also the expenses of FBI per- sonnel who supervise informants, their support costs. and administrative over- head. (Justice Department letter to Senate Select Committee. 3/2/Z).

lwTThe Committee is withholding the portion of this figure spent on domestic security intelligence (informants and other investigations combined) to pre- vent hostile foreign intelligence services from deducing the amount spent on counterespionage. The $80 million figure does not include all costs of separate FBI activities whirh may be drawn npon for domestic security intelligence pnr- poses. Among these are the Identification Division (maintaining fingerprint records). the FiIes and Communications Division (managing the storage and retrieval of investigative and intelligence files). and’ the FBI’Lahnratnry~

lO”Esamples of valuable informant reports include the following: one informant reported a plan to ambush police officers and the location of a cache of n-capons and drnamite: another informant rennrted nlans to transnnrt illegally nhtained weapons to Washington. D.C. : two-informants at one meeiing discovered plans to dynamite two ritv hlncks. All of these plans were frustrated hy further investigation and protective measnres or arrest. (FBI memnrandnm to Select Committee, 12/10/75: Senate Select Committee Staff memorandum: Intelligence Cases in Which the FBI Prevented Violence, undated.)

One es-ample of the use of information in Bureau files involved a “name check” at Secret Service request on certain persons applying for press credentials to rover the visit of a foreign head of state. The discnrerv of data in FBI files indicating that one such person had been actively involved with rinlent groups Ird to further investigation and ultimately the issunnoe of a sear& vvarrant. TIIP search l~rndured rridence. inclnding weapons. of a plot to assassinate the foreign head of state. (FBI memorandum to Senate Select Committee, 2/23/76)

Page 35: Church Committee: Reports-- Book II

19

-Betwce.n 1960 and 1974, t.he FBI conducted over 500,000 separate invest.igat.ions of persons and groups under the “subversive” category, predicated on the possibility that they might be likely to overthrow the govermnent of the United Sates. lo6 Yet not a single individual or group has been prosecutetl since 1957 under the laws which prohibit planning or advocating action to overthro\v the government and which are the main alleged statutory basis for such FBI investigations.‘07

-A recent study by t,he General Accounting Office has estimated that of some 17,528 FBI domestic intelligence investigations of in- dividuals in 1974. only 1.3 percent resulted in prosecution and con- viction. and in only “about 2 percent” of the cases was advance knowl- edge of any activity-legal or illegal-obtained.la8

--One of the main reasons advanced for expanded collection of intelligence about urban unrest and anti-war protest was to help re- sponsible officials cope with possible violence. However, a former White House official with major duties in this area under the ,John- son administration has concluded, in retrospect, that “in none of these situations . . . would advance intelligence about clissident groups [have] been of much help,” that what was needed was “physical intel- ligence” about the geography of major cities, and that the attempt to “predict, violence” was not a “successful undertaking.” lo9

-Domestic intelligence reports have sometimes even been counter- productive. A local police chief, for example, described FBI reports which led to the positioning of federal troops near his city as:

. . . almost completely composed of unsorted and unevalu- ated stories. threats, and rumors that, had crossed my desk in New Haven. Many of these had long before been discounted by our Intelligence Division. But they had made their way from New Haven to Washington, had gained completely un- warranted credibility, and had been submitted by the Di- rector of the FBI to the President of the United States. They seemed to present a. convincing picture of impending holocaust.“O

In considering its recommendations. the Committee undertook an evaluation of the FBI’s claims that domestic intelligence was neces- sary to combat terrorism, civil disorders, “subversion,” and hostile

lmThis figure is the number of “inrestigatire matters” handled hg the FBI in this area, including as separate items the inrestipatire leads in particular cases which are followed up by various field offices. (FBI memorandum to Select Committee. 10/6/75.)

‘07 Schackelford 2/13/X p, 32. This official does not recall any targets of “sub- rersil-e” investigations having been even referred to a Grand Jury under these statntes since the 1950s.

lo8 “FBI Domestic Intelligenre Operation-Their Purpose and Scope : Issues That Need To Be Resolved.” Report by the Comptroller General to the House Judiciary Committee. 2/21/X. pp. 13%14i’. The FBI contends that these statis- tics mar be unfair in that they concentrate on investigations of individuals rather than groups. (Ibid.. Appendix V) Tn response. GAO states that its “sample of organization and control files was sufficient to determine that generally the FRT did not repnrt advance knowledge of planned violence.” In most of the fourteen instances where swh advance knnrrledpe n-as nhtained. it related to “snch activities as speeches, demonstrations or meetings-all essentially non- violent.” (Ihid.. p. 1M)

lo9 .Jnseph Califann testimony. l/27/76. nn. i-8. L10 James Bhern testimony. l/20/76, pp. 1617.

Page 36: Church Committee: Reports-- Book II

20

foreign intelligence activity. The Committee rericmd voluminous materials bearmg on this issue and questioned T3umau officials, local police officials, and present and former federal executive officials.

\\‘c Ii:\\-c fonntl that x-c arc‘ in f1indxmcntnl agrtcnwnt with the wis(1011i of AIttorncy C;cncrnl F3tonc’s initial warning that, intclligcncc ngc~nc*ivs Ililist not hc ‘~concc~rncd with political or other opinions of intli\-itlklals” ant1 iiiiist lw liniitcd to investigating rssentialIv only ‘*r;~~c~ll conthwt as is forbitltlcn 1)~ the Ian-s of tlw Tinitctl kStatc<.” Thr C’olrilllittcc’~ record tltnlonstratc5 that domestic intclligcncc which dc- parts from this standartl raises grave risks of nndermming the demo- cratic prowls ant1 harnling tlw intt>rcsts of indiritlual citkcns. This tlang~r v-c>iglis liw\-ily agaiwst tlic spcculatiw or ncgligil)lc lwnefits of tlw ill-tlcfinctl ant1 owrl~roacl investigations alitliorizrd in the past. Tlllrb. tlw basic ~~~~rposc of tlw rc~colrllllciltlatiolls containctl in Part I\’ of tllis iv~)ort is to liliiit tliv I;131 to inr-citigatiiig conduct rather than itlras or :b~ociations.

Tllc CS~~~SS~S of the past (10 not, however, justify tlepriring the I-nitcvl States of a clearly rlcfiiietl and rtfccti\-tly controlled domestic intelligence capability. The intelligence services of this nation’s inter- national adversaries continue to attempt to conduct clandestine, espio- nap operations within the 17nited Statcs.“l Our recomiiieiidatioiis provide for intelligence investigations of hostile forcipi intelligence activity.

3lorcowr, terrorists hare engagrd in scrioiis acts of violence which liavc> l)roilglit tlcatli ant1 injlirv to A\mcric*ans ant1 tlircntcn further such acts. Tlicse acts. not. tlic politics or Iwlicfs of those n-ho n-oriltl coriilllit, thrlii. arc the proper focus for inwstigations to anticipate terrorist violww. A\ccortlingly, tlic Conimittcr wonltl prrniit, properly con- trolled intelligence inr-estigations in those narrow circimxtances.llz

(‘onccntratlon on iniminrnt violrncc can nvoi(l tlic wastrful dis- lwrsion of rcsoiirccs which has clinractcarixctl the sn.ccl)inr(. (ant1 friiit- lrss) domestic intelligence inrrstigations of the past. But the most important~ reason for the fundamental change in the domestic in- tcllipcncc operations which 0111 Ticcoliililelldntiol~s propose is the nrcd to protect. the constitutional rights 06 ,Imcricans.

Tn light, of tlir record of al~isc rrwalf(l 1)~ our inquiry, the Com- mitts is riot satisfkd with tIlta position that mwc c~sposlirc of n-lint has occurred in the past mill prevent its recurrence. Clear legal stantlartls an(l c~fft~ctivc ovcrsi:ylit alit1 controls arc’ 11 ‘(‘:~:-s:Lt~y to (‘11 il 'it

that. tlomrstic intclligcncc activity (1013 not it-self lintlcrminc the (lrmocratic systrnl it is intended to protect.

lLI An indication of the scnp~ of thp prol~l~m is the increasing nmnher nf nficial rq)w*ent:ltirw of communist gorwnments in the Vnitrd States. For c?s~mple. the nnmher of Snri4 officinls in this country has incrfwwd from 333 in 1961 to 1.079 lb\- early 1975. There were I.CPJ3 East-West exrhange risitors and 1.500 porn- mrrcinl visitors in 1971. (F‘BT Mrmnrandnm. “Intelligence Activities Within the Vnitetl States hr Foreign Gnrrrnments.” 3/20/75.1

‘12.\rrnrdine & the F’RT. there werp S9’homhings attrihlltahk to terrorist xctiritr in 397.5. as cnmpawd with 4.5 in 1974 and 21 in 1%X Sis r)ewons died in trrroriet-claim4 hnmhings and 76 persons were injured in 19i5. Fiw other deaths wcw reported in othw types of terrorist inridfwts. Monetary dnmnw rrpnrtfd in terrorisl Iv~mllinfs rscwdwl 2.7 million dollnrs. It should he not&. hnn-ever. that terrorist hnml~inrs r7rP only n frnrtion of the total nmnlwr of l,Oml,inps il; this c.cjrnltry. Tlrns. thp A9 terrorist I)omlIincrs in 19i.5 wcrp nlnrrnrr n total of 0v~1 1.900 Ixnnhings:. most of which xwre not. according to the FRI. attrilmtnhlf* cle~lrlr to terrorist actiritF. (FBI memorandum to Senate Select Conimittee. ?/23/76. )

Page 37: Church Committee: Reports-- Book II

II. THE GROWTH OF DOMESTIC ISTELLIGEKCE : 1936 TO 1976

1. The Lesson: aistol,yRepecrtsZtself

During and after the First World JYar, intelligence agencies, in- cluding the predecessor of the FBI, engaged in repressive activit:y.’ ,I new Attorney General, Harlan Fiske Stone, sought to stop the m- vestigation of ‘apolitical or other opinions.” 2 This restraint was em- bodied only in an executive l~ro11o1111celllellt, however. So statutes wtr~ passed to prevent the kind of improper activity which had lwcn es- posed. Thereafter, as this narrative will show. the abuses returned ,in a new form. It is now the responsibility of all three branches of gor- ernment to ensure that the pattern of abuse of domestic intelligence activity does not recur.

2. TAe Patte’m: R~~oaclcning Thv-ough Time 8ince the re-establishment of federal domestic intelligence programs

in 1936, there has been a steady increase in the government’s capa- bilit? and willinylwss to pry into, and even disrupt, the political ac- tivities and personal lives of the people. The last forty years have witnessecl a relentless expansion of domestic intelligence activity be- yond investigation of criminal conduct toward the collection of polit- lcal intelligence ancl the launching of secret offensive actions against Americans.

The initial incursions into the realm of ideas and associations were relatetl to COIK~~M about the influence of foreign totalitarian powers.

‘Repressive practices during World War I included the formation of a vol- untwr auxiliary force. known as the American Protective League, which as- sisted the Justice Denartment and militarr intrllieence in the inrestieation of “ml-.bierican activities” and in the mass ronnd-up of 50,000 persons to discover draft evaders. These so-called “slacker raids” of 1918 inrolved xvarrantless arrests ~vithout sufficient probal~le wuse to l)r!ieYc that crime had been or was about to be committed (FBI Intellieence Division memorandiim. “An Analysis of FRI Ikmiestic Srckitr Intelli~&ce Investigations.” 10/%/7;T.)

The American Protective League also contributed to the 1)ressnrw which re- sulted in near1.v 2.000 Drosecutinns for disloral utterances and activities durinr World War I, h policy-described br .John I&l O’Brien, Attorney General Orei: nry’s Sl,rcial Assistant. as one of “wholesale repression and restraint of public ol)ininn.” (Zrchariah Chafer. I;‘wP Spcwh iu the TTnitcd Stntcs (Cambridge : Hnrwrtl T’niversitF Press. 1941) 1,. 69.1

Shortly after the war the Justice Department and the ISurmml of Inrestiga- tinn jointly l)lanned the notorious “Palmer Raids”. named for Attorney Ben- rral I\. Mitchell I’nlmcr who ordered the overnight round-111, and detention of snmc IO.000 prrsnns who w?re thought to lw “anarchist” or “rernlntionary” alielis sulkjwt to deportation. (William Prcstnn. Alims cfntl Disse~~frra (Cam- Ibritlw : IT:irrard l’niwrsity Press. 1963). c+is. ‘i-S : Stanley (‘nlwl. -1. Mitchc7Z Pfclwrr: Politiciccil (Sew York : Cnlnmlbia I’nirrrsity Press. 1063), chs. 11-12.)

’ See L\ttoriiey Gciit~rnl Stone’s full statement. 1,. 23.

(21)

Page 38: Church Committee: Reports-- Book II

22

Ultimatrlg, howver. intelligcmx activity vx3 directed against do- mestic groups ad\-orating chnngre in Ameiicn, partic.nlarly those who most vigorously opposed the Vietnam war or sought to improve the contlitions of racial minorities. Similarly. the targets of intelligence investigations wcrc hrondened from groups perceived to be violence prone to include groups of ordinary protesters.

.?. Th we Z’e7-ior78 of Gowth fo7. Domestic II-zfe77igence The expansion of domestic intelligence activity can nsefnlly he di-

vided into three broad periods: (a) the pre-war and World \TTnr II period; (b) the Cold War era; rind (c) the period of domestic dissent beginning in the mid-sixties. The main developments in each of these stages in the evolution of domestic intelligence may be summarized as follows :

CI. LO.?&7-19.$.5 Bv presidential directire-rather than statute-the FBI and mili-

tar!- intclligcnc<e :Igcncics wrc anthorized to conduct domestic intelli- gcnw inrcstigntions. These inrcstipations included n vaguely defined mission to collect intcllipencc about “subversive Rctirities” which were sometimes nnrclated to law enforcement. JJxrtime exigencies cn- courngwl the, nnrcgiilated use of intmsire intrlligence techniques; and thr FIST brgnn to resist supervision by the Attorney General.

Colt1 Var frnrs nnd danprrs nurtured the domestic intelligence pro- grams of the FBI and military. and they became permanent features of gorcrnmrnt. Con,cress rlcferwd to t.hr rsecntire branch in the orersi,qht of these programs. The. FBI became increasingly isolatrd from effective outside control. even from the Attorne,vs Grnrral. The scope of investigations of “subversion” wirlrncd gently. Iynder the clank of vcrecv. thr ITT institntecl its COINTET,PRO operations to “disrupt” and “neutralize” “snbrersires”. The National Security Agency, the FBI, and the CIA1 re-instituted instrusire wartime SLW-

veillance techniques in contravention of lam.

c. 19&-197s Tntrllipence techniques Khich previonslv had been concentrated

up011 foreign threats rind domestic grollps s&d to be under Communist influence n-we applied with incrrnsing intensity to n wide range of do-

mrstic activity lx A2mericnn citizens. These trchniqnrs were utilized against pencefnl ‘civil rights and a&war protest nctiritv. nnd there- after in reaction to civil unrest. often without rrgnrd for the conse- quences to .\mcricnn liberties. The intelligrnce aqencics of the United Stntcs-sometimes abetted by public opinion and often in rrsponsr to pressure from ndministrntion officials or the Con,rrrrss-fI.eclnentlv dis- regnrtlrtl thr law in their conclnct of massive snrrrillance and wgrrs- sire coilnterintelli,~e~~ce oprrntions nqainst A1merican citizens. Tn the past frx ywrs. somr of tlirsr actiritles werr ciirtnilrd. pnrtl~ in rr- sponsr to tlir motlrration of the domestic crisis: hiit all too often im- propri. pi~ogrnms wrrr terminntrcl only in rrsponse to rsposnrr. tlw threat of tsposiiw. or n clinngr in thr climate of public opinion. snch as that triggered l,- thr Wntergnte affair.

Page 39: Church Committee: Reports-- Book II

23

IS. EST.\BLISIIING A PERJLWEST Do~r~snc IXTELLIGESCE STIICCTUIW : 1036-1945

1. Baclcgrowul : The Stone Standard The first substantial domestic intelligence programs of the federal

gorernmcnt were established during World War I. The ,Justice Department’s Bureau of Investigation (as the FRI

ww then known), military intelligence, other federal investigative ngencics. ant1 the \-olunteer’-~~llericaii Protecti\-e League were. involved in these p19granis.~ In the period inimetlintely following World Wal I, the. Bureau of Investigation took part in the notorious Palmer Raids and other activities agamst persons characterized as “subve.rsivc.” 4

Harlan Fiske Stone, who became Attorney General in 1024, described the conduct of Justice Department and the Bureau of Investigation before he took office as “lawless, maintaining many activities which were, without any authority in federal statutes, and engaging in many practices which were brutal and tyrannical in the extreme.” 5

Fearing that the investigative activities of the Rurcau could invade privacy and inhibit political freedoms, Attorney General Stone announced :

There is allvays the. posibilit,y that a. secret police may be- come a menace to free government and free institutions, because it carries with it the possibility of abuses of power which are not always quickly apprehended or understood.

. It is important that its activities be st.rictly limited to the ~erformxncr of those functions for which it was created and that its agents themselves be not above the law or beyond its reach. . . . The Bureau of Tnvcsti.gation is not concerned with political or other opinions of ind:viduals. It is concerned only with their conduct and then only with such conduct as is for- bidden by the laws of the TTnited States. When a police sys- tem passes beyond these limits, it is dangerous to the proper administration of justice and to human liberty, which it should be our first concern to cherish.6

When Stone appointed ,J. Edgar Hoover as Acting Director of the Bureau of Investigation. he mstructed Hoover to adhere to this standard :

The activities of the Bureau are to be limited strictly to in- vestigations of violations of law, under my direction or under

3 SW .Toan Jensen. The Price of T’iqilnncc (Chicago: Rand McNally, 1968). One FRI official recalled later, “There were nrohahlr seven or eight such active organizations onerating at frill force during war dars‘and it was not an uncommon experience for an Agent of this Rnreau to call nbon an individual in the course of his inrestigation. to find nut that sis or seven other Government agencies had heen around to interview the party nhnnt the same matter.” (Memorandum of F. S. O’Donnell. Subject: Operations Thiring Wnrld War 1. 10/4/38).

‘See footnote 1. n. 21. ‘Tetter from J&ice Harlan Fiske Stone to Jack Alexander, 9/21N’, rited in

Alpheus T. Mason, Harlan Fiske Stone: Pillar of the Lair (Sew York, Viking. 19.-O), p, 149.

’ New Pork Times, S/10/24.

Page 40: Church Committee: Reports-- Book II

24

the direction of an A1ssistnnt Attorney General regularly con- dlIcting the work of the Department of ,Justice.’

Xeverthelcss. beginning in the mid-thirties. at White House direction, the FI31 reentered the realm of collecting intelligence about ideas and associations.

,o. dfc~in DewT0pment.s of the 19.X-lLJ$5 PwiocZ In the years preceding World War II. domrstic intelligence activi-

ties were rcinstitntrd, rxpaiide~l. and institutionnlizcd. IkEed npoll vaqne and conflicting orders to investigate the undefined areas of “siibwrsion” and “potrntial crimes” related to national security, the FBI commenced a broad intelligence program. The FBI was author- ized to preempt the field, although the military engaged in some in- rcsti,yat<on of civilians.

The FBI’s donwstic intclligencr jurisdiction went be;vond invest@- Cons of crime to include a \-ngllr mandate to inwstipnte for+gn m- I-olwnicnt in A\nwricnn affairs. In the csrrcisc of this jurisdictional authority. the Rnrcnn byan to inrcstipnte law abiding domestic yronns and indiridilnls: its program was also open to misuse for politicnl p~lrposcs. The most intrnsirr intelligence tcchniqnes-ini- t.iallF ISC~ to mwt wnrtinle esigencics-were basrtl on questionable stntntorp interprctntion. or lnc~lic~tl any forninl lt,gxl :~~~tlioi~ization.

The csecntivc intentionally kept the issue of domestic intrlligcncr- pnthcring an-ay fuxu the Congress until 1939, and thereafter* the Con~wss appears to hare tlclibcratcly dcclincd to confront the issue. The FRT generally complied with the Attorney Gencml’s policies, b!lt byyan to wsist .Jnsticc Department rcvicw of its activities. On one occns~on. the T3nwnn nppcnrs to have disregarded an -1ttorncg Gen- eral’s policy. dirrctirr.

TIowerer mlportant thcsc dcwlopmcnts vxre in themsclws, thr en- dnrinc significance of this period is that it openccl the institutional door to greater excesses in later y2ars.

.7. Domesf~c I1zfc77igence Autho7v’fy : T’ny/ue and Qon~jcf ing Ez~cufiw Orclcrs

The esecntiw orders upon which the Bnrcan based its intelligence activity in the decade brforc World War II were wpne and conflict- mp. T3y usinp words lilic “slll)\.t‘rsioli”-:i term which u--as never dcfinctl--and by permitting the inrcstigntion of “potential” crimes, and matters “not within the specific provisions of j)rcvniliii,~ statutes”. the foundation was laid for cscessirc intclligrnce gathering about Americans.

‘Stone to Hoover. S/13/24. mot& in Mn~on. Hwlnn Fislic Rfonf. at n. 151. Although Hool-rr hnd sewed & hind of the Ger&al Jntelligence Dirision’of the .Justicr Department nt the time of the “Palmer Raids” 2nd became an Assistant Director of the Rnrwn in 1921. he persnnd~~~ Attorney Gaeral Stow and Roeer Baldwin of the .Imcricnn Civil Jilwrties J’ninn that he hnd nlarcd nn “nnwill- ing part” in the ~xwsws of the past. and 11~ a8rwcl to dishnnd the Rnreml’s “radical dirisinn.” RaIdwin ndTised Stone. “J think we were n-rong in nnr esti- mate of his nttitnde.” CI%nldwin to Stone. S/6/94. nnntrd in Donald .Johnsnn, The Chnllcn.qc to .4nzcr-icrr~~ Frccdomn (Vnirersity of Kentucky Press, 19&‘3), pp. 174-175.)

In December 1921. Stone made Hnorcr Dirertnr of the Rurean of Inrestigntinn.

Page 41: Church Committee: Reports-- Book II

25

a. The Original Roosecelt &ders In 1934, according to a memorandum by ,J. Edgar Hoover, Presi-

dent Roosevelt ordered an inwstipat,ion of “the Sazi movement in this countlT.” In response, the FBI conducted a one-time inr-estiga- tion, descrlbecl by FBI Direct,or Hoover as (‘a so-called intelligence investigat,ion.!’ It concentrated on “t.he Sari group,” with particular reference. to “anti-racial” and “ant,i-Aillericaii” actlvlties having “any possible connection with official representatives of the. German gov- crnnie~nt. in the 17nited States.” s

Two years later. in Au,gnst 1936, according to a file memorandum of Director Hoover, Presiclent~ Roosevelt asked for a more systematic collection of intelligence about :

subversive activities in the TTnitecl States, particularly Fas- cism and Communism.

Hoover indicatecl further that the President want,ed :

a broad picture of the. general movement and its activities as [they] may affect the economic a.nd poWcal life of the country as a wvhole.

The President and the FBI Director discussed the means by which the Bureau might collect “general intelligence information” on this subject.g The only record of Attorney General IIomer Cummings knowledge of: or authorization for, this intelligence assignment, is found in a memorandum from Director Hoover to his principal assist- ant.l”

b. OrcZcm in 19.%-.X9: The Vagueness of “Subve&ve Activities” a72d "Potential7 CTirnCS

In October 1938, Director IIoover advised President Roosevelt of the “present purposes and scope” of FRI intelligence investigations, “together with sug,rrestions for expansion.” His memorandum stated that the FBI was collecting :

a Memorandum from J. Edgar Hoover to Mr. Cowley, 5/10/34. ’ J. Edgar Hoover memorandum to the files, B/24/36. This memorandum states

that. earlier in the conversation, Director Hoover had told the President : (i) Communists controlled or planned to take control of the West Coast long-

shoreman’s union, the United Mine Workers Union and the Newspaper Guild (and using those unions would be “able at any time to paralyze the countr.v”) ;

(ii) “activities . . inspired by Communists” had recently taken place in the Government, “particularly in some of the Departments and the Sational Labor Relations Board” ; and

(iii) The Communist Internationale had recently issued instructions for all Communists to “vote for President Roosevelt and against Governor Landon be- cause of the fact that Governor J,andon is opposed tn class warfare.”

These comments indicate that the Bureau had already begun some intelli- gence gathwing on Communists and activities “insnired” bv them DriOr to anv Presidential order. In addition, Hoorer’s memoraninm referred to briar intelli- gence collection on domestic right-lving figures Father Charles Coughlin and Gen- eral Smedler Butler.

“‘Hnnrer stated that Secretary of State Hull “at the President’s suggestion, re- qnestrd of me. the representative of the Department of .Justice, to have investiga- tion made of the subversive activities in this country, including communism and fascism.” He added that “the Attorney General rerball~ directed me to proceed with this investigation.” (Memorandum from J. Edgar Hoover to E. A. Tamm, g/10/36.)

Page 42: Church Committee: Reports-- Book II

26

information dealing with various forms of activities of either a subversive or so-called intelligence type.l’

Despite the references in Director Hoover’s 1938 memorandum to “subrersivc-type” investigations, an accompanying letter to the Pres- ident from llttornev General Homer Cummings made no mention of “subversion” and ci’ted only the President’s interest in “the so-called espionage situation.” I2 Cummings’ successor , Attorney General Frank Murphy, appears to hare abandoned the term “subversive activit.ies.” I3 Moreover, when Director Hoover provided Attorney General Frank Murphy a copy of his 1938 plan, he described it, without mentioning “subversion,” as a program “intended to ascertain the identity of per- sons engaged in espionage. counterespionage, and sabotage of a nature not within the specz’fk promkiows of pe~vi7iug sttrttites.” I4 [Emphasis added.] Murphy thereafter recommended to the President that he issue an order concentrating “inr-cstigation of all espiop?ge, countcr- espionage, and sabotage matters” in the FBI and mllltary intelli- gence.15

President Roosevelt agreeed and issued an order which? like Murphy’s letter, made no mention of “subversive” or general intel- ligence :

It is my desire that the investigation of all espionage, coun- tcr espionage, and sabotage matters be controlled and handled by the Federal Bureau of Inrest.igation of the Department of Justice, the Military Intelligence Division of the War De- partment, and t.he Office of Naval Intelligence in the Navy Department. The directors of these three agencies are to funct,ion as a committee to coordinate their activities.

So investigations should be contlllcted by an)- investigative ‘agency of the Government into matters involving actually or potentbUy any espionage? counterespionage, or sabotage, ex-

1l Memorandum on “domestic intelligence,” prepared by .J. Edgar Hoorer, enclosed with letter from Attorney General Cummings to Roosevelt, 10/20/38. Director Hoover met with the President who, according to Hoover’s memo- randum, “approved the plan which I had prepared and which had been sent to him by the Attorney General.” (Memorandum to the files from J. Edgar Hoover. 11/7/38.)

“Letter from Attorney General Cummings to the President, 10/20/38. I3 On 2/7/39, the Assistant to the the Attorney General wrote letters to the

Secret Service, the Bureau of Internal Revenue. the Sarcotics Bureau, the Cus- toms Service, the Coast Guard, and the Postal Inspection Service stating that the FBI and military intelligence had “undertaken activities to investigate matters relating to espionage and subversive activities.” (Letter from .J. B. Keenan. As- sistant to the Attorney General, to F. .J. Wilson, Chief: Secret Service, 2/T/39.)

A letter from Attorney General Murphy to the Secretary of the Treasury shortly thereafter also referred to “subverisivc activities.” (Letter from Attorney Gene& Murphy to the Secretav of the Treasury, 2/16/36.)

However, a similar letter two days later referred only to matters “involving espionage, counterespionage, and sabotage,” without mentioning “subversive ac- tivities.” (J&ter from Attorner General Xurnhr to the Secretarv of the Treas- ury, 2/X3/39.) This may hare reflected a decision hg Murphy to cease using “suh- versive activities” to describe FBI investigations. The record does not clarify the reasnn for his deletion of the phrase.

‘“\Iemornndam from .J. Edgar Hoover to Attorney General Murphy. 3/16/39. ll&phy was anFare that the FBI contemplated investigations of subversive ac- tivities. since Hoover enclosed his 1938 plan with this memorandum.

I5 Letter from Attorney General Murphy to the President, 6/17/39.

Page 43: Church Committee: Reports-- Book II

27

cept by the three agencies mentioned above. [Emphasis aclded.] IF

Precisely what the Pi~c5iclciit’i wferencc to “potentid” espionage or salwtagc was intcntlctl to (9wr was m~lcar. Whntcrcr it meant, It was al)parentlv intentlet to be. consistent, with 1)irector Hoover’s earlier tlescript.ioll of tile FI3T progranl to ,\ttornev General Murphy.”

Three months later. after tlicl ontl)renli o$ war in Enrope. I>irector ,Hoo\-er indicated his ~~onccrn that private citizens might provide infornintion to the “sal)ot:qc sq1ia~ls” which local police depxrtmcnts TYCW creating rather than to the FI<I. IIoowr urged the Attorney (~cncr:~l to ask the I’rcsitlent to rcqwst local oflkials to give the FBI all inforniation cwiccrning “cspi&iiagc. c~onntcrrspioiia~e, snbotapc. snbrwsirc activities. and iwi~tlalitr rrgnlations.” IS

The President immccliatcl~ i&d a statement which continued the confnsinq treatment of thr breadth of the FBI’s intelligence authority. On the one hnlltl, the statement began by noting that the FRI had been instrnctecl to inrestignte :

matters relating to cspionagt~. . wbotage. and violations of the neiitrnlity regnlntions.

On the other hand. the President conclncled bv adding “snbrersive activities” to the list of information local lam enforcement, officials sho111d relay to the FT3T.1D

Presidcnt~ Roosevelt nsed the term “snbwrsive activities” in tl secret dircctire to .1ttorne\- General Robert .Tnc*ltson on wiretapping in 1940. Rrfcrriw to activities of othrr nations engn,rrccl in “propaganda of so- called ‘fifth ~01nmns’ ** and “preparation for sabotage,” he directed the A\ttorney General to anthorize wiretaps “of persons snspected of snbrersire nctiritics n,cIninst the Government of the T’nited States. inclnclin:~ snsnwtecl sl,ies.” The Prtsidwt instrwtrcl that such wire- taps be limited “insofar as possible” to aliens.?0 SPither the President

I8 Cnnfidential JIw~orandum from the President to Department Heads. g/26/39. Ii Jlemorandum from Hoover to 3furphy. 3/16/39. enclosing Hnorer memoran-

dum on “domestic intelligence.” 10/“0/38. ‘sMemorandum from J. Edpar Hoover to Attorney General Murphy, g/6/39. ” Statement of the President. 9/R/39. President Roosevelt never formalls defined “suhrersire activities”-a term

whose meurness has nrnven a r,rol)lcm throuehout the FBI’s histnrr. However. a hint. as to his definiti& is contnined in his remarks at a press conference on S&p- temlwr 9. 1939. At national rmergenry had just been declared. and pursuant thereto. the I’resident had issued an authorization for up to 1.50 extra FBI agents to handle “additional duties.” In esplaining that action. he stated he n-as cwncerned ahnut “thines that hnppenrd” before World War T. specifically “sahn- tare” and “propaganda l>.v both l~ellifermts” to “wvay public opinion. . rIit is to guard against that and the spread 1)~ any foreign nation if propaganda in this nation whirh would tend to he snhwrsire-I heliere that is the wnrd- of our form of Government.” Cl939 Public Papers of Franklin I). Roosevelt, pp. 4%996. )

?” Confidential memnrxndnk from President Rnnserelt to .\ttorne,v General .Tacksnn. 5/21/40. In 31n.v 1941. the Secretary of War and the Swretary of the Snrr nrred “a hrnndening of the inrcstirratiw rwpnnsihility of the Federal Bureau of Investigation in thp fields of ~u1rwrsiv-t control of lnhnr.” (1Iemorxn- dum from the Swretarr nf War and the Secretary of the Say- to the Presi- dent, 5/29/41.) Thp President relblied that he n-as sendine their letter to the Attnrne.v General “n-ith my gpnPra1 apnroral.” ~Jlemorandunr from President Roosevelt to the Secretaries of War and Say. 6/4/41.)

Page 44: Church Committee: Reports-- Book II

28

nor the Attorney General subsequently clarified the scope of the FBI’s authority to investigate “subversive activity.”

The confusion as to the breadth of President Roosevelt’s authoriza- tion reappeared in ,Qttorney General Francis Biddle’s description of FBI jurisdiction in 1942 and in a ne\v Presidential statement in 1943.

Biddle issued a lengthy order defining the duties of the various parts of the Justice Department in September 1942. Among other things, the FBI was charged with a duty to “investigate” criminal offenses against the United States. In contrast, the FBI was to function as a “clear- ing house” with respect to “espionage, sabotage, and other subversive matters.” 2t

Four months later, President Roosevelt renewed his public appeal for cooperation by police and other “patriotic organizations” with the FM. In this statement, he described his September 1939 order as grant- ing “investigative” authority to the FBI for “espionage, eabotage, and violation of the neutrality regulations.!’ The President did not adopt Attorney General Riddle’s “clearing-house” characterization, nor did he mention “subversion.” 22

4. The Role of Congress

a. Executive Avoidance of Congress In 1938, the President, the i4ttornep General, and the FBI Director

explicitly decided not to seek le.gislat,lve authorization for the expand- ing domestic intelligence program.

Attorney General Cummings cautioned that the plan for domestic intelligence “should be held in the &rice& confidence.” 23 Director Hoover contended that no special legislat.ion should be sought “& order to avoid witicism 01’ objections whic.11 might be raised to such an expansion by either ill-informed persons or individuals with some ulterior motive.” [Emphasis added.] Hoover thought it “undesirable to seek any special legisldt,ion which would draw attent.ion to the fact that it was proposed to develop a special counter-espion?,qe drive of any great magnit.ude” because the FBI’s intelligence actlvlty was al- ready “much broader than espionage or counterespionage.” 24

Director Hoover contended that the FBI had authority to engage in intelligence activity beyond investigating crimes at the request of the --

21 Attorney General’s Order l;o. 3732, g/25/42. p. 19. But see Delimitation Agreement between the FBI and Military Intelligence, 2/9/42. at footnote 56.

12 Statement of the President on “Police Cooperation,” l/8/43. A note in the President’s handwriting added that the FBI was to receive information “relat- ing to espionage and related matters.” (Copy in FDR Library.)

a Cummings to Roosevelt, 10/20/38. El Hoover memorandum. enclosed with letter from Cummings to Roosevelt,

10/20/38. Director Hoover’s full point was that: “In considering the stew to be taken for the exnansion of the nresent structure

of intelligence w&k, it is believed imperative th& it be proceeded with, with the utmost degree of secrecy in order to avoid criticism or objections which might be raised to such an expawion b.v either ill-informed persons or individuals having some ulterior motive. The word ‘espionage’ has long been a word that has heen repugnant to the American people and it is beliewd that the structure which is already in existence is much broader than espin’nage or counterespionage, but covers in a true sense real intellieenre values to the three serrires interested. namely, the Navy, the Army, and-the civilian branch of the Government-the Department of Justice. Consequentlg. it n-nuld seem undesirable to seek any spe- cinl ledslation which would dram ,nttentinn to the fact that it was proposed to develop a special counterespionage drive of any great magnitude.”

Page 45: Church Committee: Reports-- Book II

29

Attorney General or the Department of State. He relied on an amend- ment to the FBI Appropriations _1ct, passed before 1Vorld War I, authorizing the Attorney General to appoint officials not only to “de- tect and prosecute” federal crimes but also to :

conduct. such other investigations regarding official matters under the control of the Department of ,Justice, or t,he Depart- ment of State, as may be directed by the ,4ttolmey General.*5

After conflicts with the State Department in 1939, holvercr, the FBI no longer relied upon this vague statute for its auth0rit.y to conduct intelligence investigat,ions, instead relying upon the Executive ordersZ6

6. Congress Declines to Confront the Issue Even though Execnt.ive officials originally avoided Congress to

prevent criticism or objections, after the. President’s proclamation of emergency in 1939 they began to inform Congress of FBI intelligence activities. In November 1939, Directo’r Hoover told the House Appro- priations Committee that the Bureau had set up a General Intelli- gence Division, “by authority of the. President’s proclamation.” 27 And in January 1940, he told the same Committee that the FBI had author- ity under the President’s September 6, 1939 statement to investigate espionage, sabotage, neutrality violations, and “any other subversive act’ivities.” 28

There is no evidence that the Appropriat.ions Committee objected or inquired further into the meaning of that last, vague term, although members did seek assurance that FBI int.elligence could be curtailed when the wartime emergency ended.2a

In 1940, a joint resolution was introduced by Rem York City Con- gressman Emmanuel Celler which would have. given the FBI broad jurisdiction to invest.igate, by wiretapping or other means, or “frus- t rate” any “interference with the national defense” due to certain specified crimes (sabotage, treason, seditious conspiracy, espi- onage! and violations of the neutrality lalxx) or “in any other man- ncr.” 3o L41though the resolution failed to reac,h the House floor, it seems likely that,, rather than opposing domestic intelligence investigations, Congress was simply.choosinp to avoid the issue of defining the FBI’s inte.lligence jurisdiction. This view is support.ed by Congress’ passage in 1940 and 1941 of t.wo new criminal statutes: the Smith Act made it a crime to advocate the violent, orerthro\T of t,he Government; 31 and the Voorhis Act required “snb\-ersire” organizations advocating the

=28 U.S.C. 533(3). =The conflicts hetween the FBI and the State Department in 1939 are dis-

cussed at footnote 54. n Emergency Supplemental Appropriation Bill, 1940, Hearings before the House

Appropriations Committee, 11/30/39, pp. 303-307. In fact. the FBI had established a General Intelligence Section in its Investi-

gative Division shortly after the President’s 1936 requests. Congress was not advised of the Bureau’s activities undertaken prior to September 1939, nor of the Pre.sident’s earlier directives.

**.Tnstice Department Appronriation Bill. 1941. Hearings before the House Appropriations Committee. l/5/40, p. 151. The President’s 1939 statement did not spwificallg sag that the FBI had authority to investigate “snhversiw activi- ties.”

28 1939 Hearings, p. 307: First Deficienqv Appronriation Bill, 1941, Hearings before the Hause Appropriations Committee, 2/19/41, pp. X3%189.

a0 H.J. Res. 571. 76th Cong., 2d Sess. (1940). aa 18 U.S.C. 2385.2387.

Page 46: Church Committee: Reports-- Book II

30

Government’s violent’ overthrow and having foreign ties to register or be subject to crinlinal pena1ties.32

Although, as indicated, the Executive branch disclosed the fact that the FBI ~vas doing intelligence work and Congress gen- erally raised no objection, there was one occasion when an Esecu- tive clescription of the Bureau’s work was less than complete. Follow ing Director Hoover’s testimony about the establishment of an Intelligence Division and some public furor over the FBI arrest of several Communist, Party members in Detroit, Senator George Norris (R. Neb.) asked whether the Bureau was violating Attorney General Stone’s assurance in 19% that it lvould conduct only criminal in- vestigations. Attorney General Jackson replied :

Mr. Hoover is in agreement with me that the principles which Attorney General Stone laid down in 19% when the Federal Bureau of Investigation was reorganized and Mr. Hoover appointed as Director are sound, and that the useful- ness of the Bureau depends upon a faithful adherence to these limitations.

The Federal Bureau of Tnvestipation mill confine its activi- ties to the investigation of violation of Federal statutes, the collecting of evidence in cases in which the United States is or may be a party in interest, and the service of process issued by the courts.33

The FBI was, in fact, doing much more than that and had informed the Appropriations Committee of its practice in general terms. Attor- ney General ,Tackson himstlf stated later that the FBI ~8s conducting “steady surveillance” of persons beyond those who had violated fed- eral statutes, including ~wrsons 1~110 were a “likely. source” of federal law violation because they were designs of foreign dictators.!’ 34

“sympathetic with the systems or

5. Scope of Domestic I~?feTligence

a. Beyond C&-ninaZ Ineestigations According to Director Hoover’s account of his meeting with Presi-

dent Roosevelt in 1936, the President wanted ‘ra broad picture” of the impact of Communism and Fascism on American life.35 Similarly, the FBI Director described his 19X8 plan as “broader than espionage” and covering “in a true sense real intelli,rrence.” 36 Thus it appears that one of the first purposes of FBI domestic intelligence was to perform the “pure intelligence” function of supplyiw rsccntiw officials with information bclievcd of value for making policy decisions. This aspect of the assignment to inv-rsti,rratc “subversion” Kas entirely unrelated to the enforcement, of federal criminal laws. The second purpose of FBI dom&ic intelligence gathering was essentially “preventive,”

= 18 TJ.S.C. 2386. 31 Letter from Attorney General Jackson to Senator Norris, 86 Gong. Rec.

5642-5643. a1 Proceedinrs of the Fpdwal-State Conference on T,aw Enforcement Problems

of National Defense. R/.5-6/40. Several months earlier. AbtorneT General .Tackson had warned federal prose-

rntors ahont the dnnwrs of nroswntinz “suhwrsivw” lwcnnsr of the lark of standards and the dnneer of orcrhreadth. (Robert H. .Tacksnn. “The Federal Prwwntor.” Jo~cr~~ol nf tllr .4 nicricnn .T1/~7licnfu~x Swift?/, 6/40. n. 18.)

s Hnnrer memnrandnm to the files. S/24/36. 38Hoorer memorandum, enclosed with Cummings to Rooserelt, 10/M/38. see

p. 28.

Page 47: Church Committee: Reports-- Book II

31

in compliance x-it11 the President’s June 1939 directive to investigate “1)otential” espionage or sabotage.3i As war moved closer, preventive intelligence investigations focused on individuals who might be placed on a Custodial Detention List for possible internment in case of TTar.=

Both pure intelligence about “subversion” and preventive intclli- gence about’ “potential” espionage or sabotage involved investigations based on political affiliations and group membership and association. The relationship to law enforcement was often remote and speculative; the Bureau did not focus its intelligence gathering solely on tangible evidence of preparation for crime.

Directives implementing the general preventive intelligence instruc- tion to investigate “potential” espionage or sabotage were vague and sweeping. In 1939? for instance, field offices we.re told to investigate persons of German, Italian, and Communist “sympathies” and any other persons “whose interests may be directed primarily to the inter- est of some other nation than the United States.” FBI offices were directed to report t,he names of members of German and Italian so- cieties, “whether they be of a fraternal character or of some other nature,” and members of any other groups “which might have pro- nounced Nationalistic tendencies.” The Bureau sought lists of subscribers and officers of German, Italian, and Communist foreign- language newspapers, as well as of other newspapers with “notorious Nat,ionalistic sympathies. ” 39 The FBI also made confidential inquiries regarding “various so-called radical and fascist organizations” to identify their “leading personnel, purposes and aims, and the part they are likely to play at, a time of national crisis.” 4o

The criteria for investigating persons for inclusion on the Custodial Detention List was similarly vague. In 1939, the FBI said its list in- cluded persons with “strong Nazi tendencies” and “strong Communist tendencies.?’ *I FBI field offices Tvere directed in 1940 to gather infor- mation on individuals who would be considered for the list because of their ‘Communistic, Fascist, Nazi, or other nationalistic back- ground.” 42

b. L’~nfilCmtion~7’ Investigations

The FBI based its pure intelligence investigations on a theory of subversive “infiltration” which remained an essential part of the rationale for domestic intelligence after the war: anyone who hap- pened to associate with Commmlists or Fascists or was simply alleged to have such associations became the subject of FBI intelligence re- ports. 43 Thus, “subversive” investigations produced intelligence about

” Confidential memorandum from the President to Department heads, 6/26/39. 3R See pp. 3P3B. 3pTh~ above-mentioned directives mere all contained in a memorandum from

5. Fklgar Hoover to FPT Field Offiws, 9/Z/39. ” JIemorandum from Clyde Tolson to J. Edgar Hoover, 10/30/39. ” Internal FBI memorandum of E. A. Tamm. 11/g/39. fl Memorandum from J. Edgar Hoorer to FBI Meld Offices, 6/G/40. ‘3 Director Hoover declared in 1940 that advocates of foreign “isms” had “SUC-

weded in boring into every phase of American life, masquerading behind ‘front’ organizations.” (Proceedings of the Federal-State Conference on Law Enfnrce- ment Problems of Satinnal Defense. August ,%6, 1940.) In his best-selling book on Communists. Hoover stated, “Infiltration is the method wherehbp Party members mnre into noncommunist organizations for the purpose of exercising influence for cnn~muniani. I f control is secured. the organization becomes a communist front.” (J. Edgar Hoover, Nasters of Deceit (New York: Henry Halt, 19531, Ch. 16.)

Page 48: Church Committee: Reports-- Book II

32

a wide variety of lawful groups and law-abiding citizens. By 1938, the FBI was ‘investigating alleged subversive infiltration of :

the maritime industry ; the steel industry ; the coal industry ; the clothing, garment, and fur industries; the automobile industry ; the newspaper field ; educational institutions ; organized labor organizations; Negroes ; youth groups; Government, a.ff airs ; and the armed forces.44

This kind of intelligence was transmitted to t.he White House. For example, in 1937 the Attorney General sent, the President an FBI report on a proposed pilgrimage to Washington to urge passage of legislation to benefit American vouth. The report stated that, the American Youth Congress, whiih sponsored the pilgrimage, was understood to be strorrgly Communistic. 45 Ilater reports in 193’7 dc- scribed the Communist Part.v’s role in plans by the Workers nlliance for nationwide demonstrati’ons protesting t.he plight. of the unem- ployed, as well as the Slliance’s plans to lobby Congress in support of the federal relief program.46

Some inv&igat,ions and reports (which went into ,Justice Depart- ment) and FBI permanent files) covered cntirelp legal political activi- ties. For example. one local group checked by the Bureau was called the League for Fair Play, which furnished “speakers to Rotary and Kiwanis Clubs and to schools ancl colleges.” The FBI reportecl m 1941 that :

the organization was formed in 1937, apparently by two Ministers and a businessman for the purpose of furthering fair play, tolerance, adherence to the Constitmion, democracy, liberty, justice, understanding and good will among all creeds, races and classes of the United States.

A synopsis of the report stated, “X0 indications of Communist acti&ties.” *7

In 1944, t.he FBI prepared an extensive intelligence report on an active political group, the Independent Voters of Illinois, apparently because it was considered a target for Communist “infiltration.” The Independent Voters group was reported to have been formed :

for the purpose of developing neighborhood political units to help in the re-election of President Roosevelt, and the elec-

” Hoover memorandum. enclosed with Cummings to Roosevelt. 10/20/X%. 6 L&&r from Attorney General Cummings to the President (and enclosure),

l/30/37 (FDR Lihraw). “‘Tkter from Attorney General Cummings to the President (and enclosure),

8/l .1/X (FDR T,ihrary ) “ Report nf Sew York City field nffice. 10/22/41. summariaed in .Tustice Denart-

merit memorandum from S. Brodie to Bssistant Attorney General Quinn, 10/10/47.

Page 49: Church Committee: Reports-- Book II

33

tion of progressive congressmen. Apparently, IVI endorsed or aided Democrats for t,he most part, although it was stated to be “independent.” It does not appear that it entered its own candidates or t,hat it end0rse.d any Communists. IV1 sought to help elect t,hose candidates who would favor fight- ing inflation, oppose race and class discrimination, favor international cooperation, support a “full-employment” pro- gram, oppose Facism, etc.48

T~ILIS, in its search for subversive “influence,” the Bureau gathered extensive informat,ion about the lawful activities of left-liberal polit- ical groups. At the opposite end of the political spectrum, the activities of numerous right-wing groups like the Christian Front and Christian Mobilizers (followers of Father Coughlin) , the American Destiny Party, the American Xationnlist Party, and even the less extreme “America First” movement were reported by the FBI.49

c. Partisan Use The collection of pure intelligence and preventive intelligence about

%ubwrsiws” led to the inclusion in FBI files of political intelligence about the President’s partisan critics. In May 1940, President Roose- velt’s secretary sent the FBI Director hundreds of telegrams received by the White House. The attached letter stated:

~1s the telegrams all were more or less in opposition to na- tional defense, the. President thought you might like to look them over, noting the names and acldresses of the senders.5o

Additional tclrgrams espressing approval of a speech by one of the I+sident’s leading critics, Colo&l Charles Lindbergh, were also re- ferred to the FBI.“* A domestic intelligence program without clearly defined boundaries almost invited such action.

d. Centralized Au.thority: FBI mu2 :IliZitary Intelligence The basic policy of President Roosevelt and his four Attorneys Gen-

eral was to cent,ralize civilian authority for domestic intelligence in the FBI. Consolidation of domestic intelligence was viewed as a means of protecting civil liberties. Recalling the hysteria of World War I, Attorney General Frank Murphy declared :

Twenty years ago, inhuman and cruel things were done in the name of justice; sometimes vigilantes and others took over the work. We do not want such thin.crs done today, for the work has now been localized in the FBI.53

Centralization of authority for domestic intelligence also served the FBI’s bureaucratic interests. Director Hoover complained about

“Report of Chicago field o5ce. X2/29/44. summarized in Justice Department memorandum from S. Brodie to Assistant Attorney General Quinn, 10/g/47.

Is .Tustice Department memorandum re : Christian Front, 10/28/41. M Letter from Stephen Early, Secretary to the President, to J. Edgar Hoover,

:5/Y /4O (FDR Library). 5’Memorandnm from Stephen Early, Secretary to the President, to ,J. Edgar

Hoover, g/17/40. 53 Xew York Times, 10/l/39, p. 38.

Page 50: Church Committee: Reports-- Book II

34

attempts by ot.her agencies to “literally chisel into this type of KO~” 54 He exhorted : “We don’t want to let it slip aWay from us.” 55

Pursuant to President Roosevelt’s 1939 directive authorizing the FBI and military intelligence to conduct all investigations of “poten- tial” espionage and sabotage, an interagency Delimitation Agreement in ,June 1940 assigned most such domestic intelligence work to the FBI. As revised in February 1942, the Agreement covered “investiga- tion of all activities coming under the categories of espionage, sub- version and sabotage.” The FBI vas responsible for all investigations “involving civilians in the Cnited States” and for keeping the military informed of “the names of individuals definitely known to be con- nected with subversive activities.” 56

The military intelligence agencies were interested in intelligence about civilian activity. In fact, they requested extensive information about civilians from the FBI. In May 1939, for instance, the Army G-2 Military Intelligence Division (MID) transmitted a request for the names and locations of “citizens opposed to our participation in war and conducting anti-war propaganda. ” 57 Despite the Delimitation Agreement, the MID’s Counterintelligence Corps collected intelligence on civilian “subversive activity” as part of a preventive security pro- gram using volunteer informers and investigators.ss

6. Control by t?ie Attorney General: Compliance and Resistance The basic outlines of the FBI’s domestic intelligence program were

approved by Attorney General Cummings in 1938 land Att.orney Gen- eral Murphy in 1939. 5g Director Hoover also asked Attorney General Jackson in 1940 for policy guidance concerning the FBI’s “suspect list

64 Memorandum from J. Edgar Hoover to Attorney Genernl Murnhy. 3/16/39. The “literally chisel” reference reflects concern with‘s State Department attempt to “coordinate” all domestic intelligence. It may explain why, after 1938, the FBI no longer relied for its intelligence authority on the statutory nrovision for FBI investigations of “official mafters under control of . . the ‘Department of State.” Director Hoover stated that the FBI required State Department author- ization only where “the subject of a particular investigation enjoys any diplomatic stat11s."

“Note attached to letter from Col. J. M. Churchill, Army G-2, to Mr. E. A. Tamm, FBI, 5/16/39.

58 Deiimitation of Investigative Duties of the Federal Bureau of Investigation, the Office of Naval Intelligence, and the Military Intelligence Division. 2/g/42.

” Memorandum from Colonel Churchill, Counter Intelligence Branch, MID, to E. A. Tamm, FBI, 5/16/39.

w Victor J. Johanson. “The Role of the Armv in the Civilian Arena, 192&1970,” U.S. Army Intelligence Command Study (lG71). The scope of wartime Army intelligence has been summarized as follows :

“It reported on radical labor groups, communists, Nazi sympathizers, and ‘semi-radical’ groups concerned with civil liberties and pacifism. The latter, well intentioned but impractical groups as one corps area intelligence officer labeled them, were playing into the hands of the more extreme and realistic radical ele- ments. G-2 still believed that it had a right to investigate ‘semi-radicals’ because they undermined adherence to the established order by propaganda through ne\vspnpers. periodicals, schools. and churches.” (Joan 11. Jensen, “Military Sur- veillance of Civilians, 1917-1967,” in ,?filitnr?/ Tnte~igcncc. Hwrings before the Senate Subcommittee on Constitutional Rkhts (1974). DD. 174-175.)

68 Letter from Att0rne.v General Cummi& to’the Pk%dent, 10/20/38; letter from Attorney General Murphy to the President, 6/17/39. The confusion as to whether Attorner General 3Inrghr. AttorntAy General .Jnckson and Attorney General Riddle defined the FBI’s duties to rover investigation of “subversive ac- tivities” is indicated at footnotes 13, 21 and 34.

Page 51: Church Committee: Reports-- Book II

35

of individuals whose arrest might be considered necessary in the event the United States becomes involved in war.” (i”

The FBI Director initially opposed, however? Attorney General ,Jnc~kson’s attenlpt to require mow detailed supervision of the FRI’s 1.01~. in the Custotlial Detention Prqgram. To oversee this program and others, Jacakson created a Seutrallty Laws Unit (later renamed t.he Special Kar Policies Cnit.) in the ,Just,ice Depart,ment. When the I-nit proposed to review FBI intelligence reports on individuals, Director Hoover protested that turning over the FBI’s confidential reports n-011ltl risk the possibility of “leaks.” He argued that if t.he it1entit.v of confidential informants became known. it would endanger their ,‘life and safety” and thus the Department would ~‘abandon” the “subversives field.” 61

After five months of negotiation, the FBI was ordered to transmit its “dossiers” to the Justice Department TTnit.6Z To satisfy t.he FBI’s concerns. the Depart.nient sgreed to take no formal action against an intliritlual if it, “might interfere with sountl investigative techniques” alld not to disclose. confidential informants without the Bureau’s “prior approral.” G3 Thus. from 1041 to 104% the dustice Department had the machinerg to oversee at, least this aspect of FBI domestic intelligence.‘j4

In 1943, howevey, Attorney General Riddle ordered that) the Cus- todial Detention I,lst should be abolished as “impractical. unwise. and dangerous.” His directive stated that, there was “no statutory author- ity or other present justification” for keeping the. list. The Attorney General concluded that the system for classifying “dangerous” persons was ‘*inherently unreliable ;” the evidence used was “inadequate ;” and the standards applied lvere “defective.” 65 Biddle observed :

the n&ion tdiat it is pos:‘iblc to nialw a valid determination as to how dangerous a person is in the abstract and without reference to Itime. rnk-ironment! ant1 other relevant circnm- stnncrs, is ‘impract icnl, unwise, and dangerous.

Returning to the basic standartl espoused by Attorney General Stone, At,torney General Xdtlle declared :

l’he Department fulfills its proper function by investigaking the activities of persons who mar liavc violated the law. It is nok nitled in this work by classifiing persons as to dangerons- ness.66

” M~morandnm from ,J. Edgar Hoover to Attorney General ,Jackson, 10/16/40. ‘I Jlemorandmn from J. Edgar Hoover to L.M.C. Smith, Chief, Neutrality Law

I.nit, 11/28/40. “‘Memorandum from M. F. McGuire, Assistant to the Attorney General, to

J. Edgar Hoover and J,. 11. C. Smith, 4/21/41. BJIIemorandum from 11. F. JIcGuire, Assistant to the Attorney General, to

.J. Etlmr Hoover. 4/15/41. ” The Custodial Detention Program should not be confused with the intern-

ment of .Japanese Americans in 1942. The mass detention of Americans solely on the I)asis of race was exactly what the Program was designed to prevent, lyy making it possil)le for the government to decide in indiyidual cases whether a prsnn should 1~ arrested in the e‘rrnt of war. Whrn the Program was imgle- mf%trd after Pearl Harbor, it, was limited to dnngerous enemy aliens only. FBI I)irwtor Hoover opposed the mass round-up of Japanese Americans.

” ~Iemorandnm from Attorney General Riddle to Assistant .ittorney General COY and .J. Edgar Hoover, Dire&or, FBI, ‘i/16/43.

ta Memorandum for Attorney General Riddle to Assistant -4ttorney General Cox and .J. Edgar Hoover, Director, FBI, ‘i/16/43.

Page 52: Church Committee: Reports-- Book II

36

‘I’llis iucitlent provitlrs :~n cs:~nll)lc of thr FI3T’s ability to rondwt domrstic intelligencr operations in opposition to the policirs of a11 .\ t toriiry G.~nc~~al. I )c..pitr _\ ttornry (;rnrrnl I<itltllc’a ortlrr. thr “tlnll- .grroii~nrss” list continurtl to br krpt. aid iiiwstigations in snpport of tli:ltj list. continiicd to bc a significant part of thr 13nrenn’s work.

7. Ztittvsiw TecAt~iy1ir.s: Quexfioifd7c :lufllol'i~"NfiO~l

This or&r was issurd in thr facr of the Frdrral Commllnicntions Act of 1934, which had prohibited wiretnppinp.69 Howerer, thr .ittor- nev General interpreted thr _1ct of 1934 so as to permit powmmrllt wT-i;*rtnpping. Sincr tlir ,\ct made it unlawful to “intciwpt~ n77d tli- vulp” comnllulicntions, A1ttorncy Gtneral ,Jncl~~on contrndrtl that it did not. npplg if thrw K~F no tlirulgrnce oufsidc~ the ~~ovrixmrnt. ~TGnplinsis nclclrcl.~ T0 A\ttorney Genrml ,J~~lmm~s q~wstionnble in- trrprctntion was accepted by sncceeding ,\ttorneys Grncrnl (until lN23) hit iirw’1’1y the milds.il

.Jaclrson informed thr Congrrss of his intrrpretation. Congress con- sidrrrd rnncting an exception to the 19.34 i\ct, and lirld hearings in which Director IIoorer said wiretapping was “of consitlerable im- portance” bccanse of the “gravity” to “national safety” of snc11 of-

” JItm~ornndnn~ from .J. Edgar Hoover to ITRI Ficiltl Offices. Rc : Dnngero77sness Clnssiflcxtion. S/14/-J3. This is tile n7llr tlocnmcnt 77crtaini71-z to Dircctnr IInnvrr‘s tlwisiotl \vhicll :7l,lwnrs i11 thr 171:7terinl prnvidctl IIF tl1<> FRI tn the Sckct Com- mittfv covering I<nreau lwlicics for the “Sec77rity 1~1~s.” The FBI interpreted the .\ttnrnr,v Grnr~ml’s ortlfr ns npplyiug nnlr to “thr d:lngc~rnn‘: cl:7ssificxtio71s p?rinnsly mndv by the Special War Pniicirs I’nit” of the Justicr Depart- 771cnt. (The frill test of tl1c Attor11ey Gnirrnl’s nrtlr>r and tlit? FI’.I directive nlrpmr iii II~nrings. Vol. 6. pl? 412-415.)

Bs Confidential m(Lmora7ld77777 fro711 President Rnnwrelt to &\ttnr71cy General

OD47 U.S.C. 605. The Snpreme Cnnrt 11rld that this Act mndr wiretap-obtained rl-idcnw or the fr77its thereof innd717issihle in fedrrnl crimi71al caws. Sn,doiic r. r~?l.itccl. stotcn. 302 T’.S. 379 (1937) : 308 T’.S. 338 (1030).

” J,etter from Attorney General .Jncltson to Rep. IIntton Snmmers. 3/10/41. 71E.g.. L’,literZ A’tnte.? T. Brcfmko. -1% F.2d 593 (3d Cir. 1074). cert. t7ert8ierl

sub no771. I?.n)loz: v. linifctl Stnten. 419 T7.S. 881 (1X4). The Conrt of .\ppenls held in this (we that warrantless wirctnpping co17ld mrly Iw jnstifird 077 n theory of i77hfwnt I’residefiti:71 power. :intl qncstinned the stnti7tc~r.v intrrl)rrtntin71 relied qmn since .4ttomcy Gcnf~rnl .J;~cksc~n’s timrl. I’ntil l!Hii. thr S77l)rrwlc Co77rt did 11nt r77lc that n-irctnppin g vinlntwl tl7p Fnnrth A711rnd7nc~nt. [ Ol~~~.stcrrrl v. T.uitctl Sffftf’?, 35 V.S. 5Si (19X) ; Zi~t: T. U~itcd States. 3SD 1J.S. 317 Cl!Ifji).j

Page 53: Church Committee: Reports-- Book II

37

fenses as espionage and sabotage.‘” Appnrcntlv relying 11pon .Jnckson’s stntutoq interpretation, Congress tlicn clroI~p~c1 ‘tlw mnttc~r. Icaving the authorization of wiretaps to Esccutirc cliscl*etion. witllout cithcr statutory stantl;~rds or the iqnireinent of n judicial warraik7”

The potential for misuse of wiretappin, (r was clcmonst rated during tliis l)ci.io(l 1)~ w\-~131 FIlI wiwtalw a~~~~x~\-d by tlw A\tt0t31c~y Gt~llcf~al

or h\- tllct 7\‘11itp TI0u.w. In 1!)41. .\ttorlw\- (;clnc~txl Hitltllr :II)pN~\~cd :, \~i*rrtap 011 thr I,05 ~h,~~~lW (‘1l;l1ll1N’r of’~‘o,lllllc~l~c~e witI1 t11c c~:,vc:lt :

There is no record of espionage at this timcl; and. l~nlcss within a month from today there is some ericlcncc comrct-

ing the Chamber of Commerce with espioiiage~ I think tllc sllrvcillanw slioi~ltl I)c ~liscoiltiniwtl.7~

However, in another case Biddle tlisxpprovecl an FBI request to wirc-

tap a. I’l~iladelpl~ia I,ookstorc “engaged in the sale of CommmGst litcra- t ILW” and ftwp2ntctl I,\ ‘*important C’oumiwGst, Itatlr~~s” in 1!)41.‘”

Xatcrials locxtcd in i)ilwtw TIoo~~ci~‘s *bOflic~i:~l :ind (‘ontitlcnti;~l” tile inclicatc tlint~ I’ivsitlcnt~ r\ooscvclt~‘s :iitltl TIarq IIopkins :lskctl the kwr to wirctnl) his own h011lc telel)honc in 1944. ,~tltlitioiial reports flYH11 “te~hllic~,l” Sllrvt~ill:lllCe of ill1 ,Illitlrlltifict~ target WCI’C SPJlt, t0

I Iqdiins in May and ,Jul? 1945. when hc sc~~xd as an aitlc. to 1’1wi-

clcllt Tl~lllll:~ll.7~

lu 19-G two Triuiinn White IIouse aiclcs. I<:. L). JIcKiiii ant1 (general II. II. \‘a~glii>~ rccci\-ccl reports of clrctronic slirvcillance of a Iii@ csccuti\-e ofiic~ial. One of the reports inclr~cletl ‘Yranscripts of tele- ~)llonc (~o~~\-(~~*s;~ti~>~ls Iwtween [ tlw oficial] :11ltl ,Jrldiw Felix Flx11k-

furter ail:1 betwwn 1 tlir oflicial] ant1 I)rcw l’carson.” 7”n From ,Junc 1!)45 until Slav 194S. (;cncral \‘aughn rewind reports

from clcctronic survcill:ince Kf it fornwr Roow\clt \Yliitc I~ousc a,ide. Ai II,C~,~OIX~~~IUI~ by ,J. I~Xgxr Iioo\-ci~ i,,dicatcs tht ,\ttoriwy (~c,K~Ix~

‘~o,ll (‘l:lIk “~~l,t~loi’iZN~ tlW ]Jl:,C’illg Of :l twlll,iC;ll Slli’\~~ill~~ll(‘e” 011 thk

iiitlivitluil and that, a~cordil~g to (‘lark. l’wsidfiit Tiwm:ni “was par- ticlllarly concern~d~’ about the acti\-itics of this individual %nd his assoc~i;~tcs” ant1 wanted “a \-13.y thorough invcsfigatioii” so that. “steps m,i.ght IJ~ t&n, if pssiblc~ to see that such actor-ities (lid rwt interfe.rc with the proper :itllliiiiistratioi~ of .go\~cixJ~Jrrlt.” Iloowr’s 1Il(‘JnOJ*all-

tliiiil did not, indicate what thcsc “ndivities” werc.‘G”

” Hearings before the IIouse ,Jndicinr.v Committee. To Anthorizr \Virt+nltl)ing. 77th Gong., 1st Ress. (1941), y. 112.

i3 Congress contiiincd to wfrain from setting wiretap stnndards until 5968 when the Ominbus (‘rime Control Act u-as ~~:lssed. The Act u-as limited to rrimi- lml cases and, onw again, a\-oided the issue of intelligence wiretnps. [ 1S 1T.S.C. L’511(3).]

” Memomndnm from Attornty General Bidclle to .J. Edgar Hoover, 11/19/41. I%iddk advised Hoorer thxt wiretaps (or “technicnl snrreillances”) would not 11r nuthorizetl unless there was “information Icnding to the conclusion that the actirities of any pnrticulnr indi\-idnal or grollp are connected with espionage or are nnthorized swrces outsidr of this country.”

ia 3Itwor:~ndnm from .J. Edgar Hoor-er to A1ttornry General Biddle, 10/2/41 : Illt’iliornll(liiil11 from *\ttorney Qwernl Biddlr to .J. Edgar IIoorer, 10/Z/41.

“’ Jlt~mornntlum from FBI to Srlwt (‘ommittecl, X/X/TG rind enclosures. ‘“’ .\lt~nlor:l1ltlnfll from I). ;\I. 1,atltl to Hoovrr. 5/Z/43. “” Hoover memorandum. ll/lZ/lR : n m~m~r:~ndum headed “Summaries De-

livtiwrl t’) that \\‘hite IIoi~ac” list8 ov1br 175 rcalxjrfs wilt to (:eneral \T;lngh~l from this rl~rrc~ill:~ncc : mcmorandmn from FBI to Select Committee. 3/%/7G. anil (~nclosnrw.

Page 54: Church Committee: Reports-- Book II

38

h. ullggi,M/, Xtrib flpening, win Xrt7Ycptitiolts l:'ntly.

Intrusive tecliniques such as bagging, mail opening ant1 surreptitious entrv were usctl 11-j tile FI31 without e\-en the kind of formal Presi- tlel:t‘ial authorization and requirement of -Utorncy General approval that, applied to warrantless wiretapping.

During the war, the FBI began ‘bcllanlfering” or surreptitious mail opening. to suppleii~cnt the o\-crt censorship of international mail :~utliori&d by statute in wartinie.77 The practice of surreptitious en- try-or l)reakilifi-anti-eiiteriii~-~~-as also usctl by tllc FBI in war- &r: intelligence opcrations.7” Tlio Bureau continncd or rcsunied the iisc of these techniques after the war without explicit oiitside :~utl~orization.

Furtlierniort. the installation of microl~lionc surwillance ("bllgS"),

tither \vitli or without trespass, was exempt from the procedure for

Alttorney General al~l~rowl of wiretaps. ,Justice Department, records

indicate that no Attorney General formally considered the question of microphone snrwillancc in\-olvin g trespass, except on a hypotheti- cal basis, unt.il 1952.‘”

C. DOMESTIC ISTELLICESCE IS TIIE COLD WAR ERA: 1946-1963

The domestic intelligence programs of the FBI and the military inte.lligence agencies. which were established under presidential au- thority before World War II, did not cease with the end of hostilities. Instead~ they set the pattern for decades to come.

Despite Director Hoorer’s statement that the intelligence structure could lx “tliscontinued or very materially curtailed” with the termi- nation of the national emergency, after the war intelligence operations were neit,her discontinued nor curtailed.80 Congressional deference to the executive branch, the broad scope of investigations, the growth of the FBI’s power, and the substantial immm1it.y of the Bureau from effective outside supervision became increasingly significant features of domestic intelligence in the United States. Kew domestic intelligence functions were added to previous responsibilities. So at.tempt was

ii FBI memorandum from C. E. Hennrich to A. H. Belmont, 9/7/61. ‘* Memorantl77ni from the FBI to thf, Senate Select Com7nittee, 9/23/X. TO A 1044 Justice Department memorandum discussed the “admissibility of

eridriicr obtained 11s trash fwvcrs and microphone surveillance,” in rqxmse to n series of hyl)otheticnl questions submitted 1)~ the FRI. The memorandu777 c~oiwluded thnt cvidcnce so obtnined was admissible eve77 if the microphone sur- willnnce inrolrefl n trespass. ( JIemornndum from Alesander Holtzoff, Sl7ecial .\ssistant to the Attorney Gcntrnl. to ,T. Edgar IIoorer, i/4/44 ; cf., 7nemnr:~77d77m fro777 .\ttnrne$ General .J. Howard JIcGrnth to J. Edgar Hoover, 2/26/,X) See fOOtll0tc 229 for thr l!XOs considerntinn nf bugs by the AttOrlley General.

aa In early 1941, Director Hoe\-er had had the following es(shange with members of the IIo77se AItl,rol)rintio77s Co777t77ittee :

“Mr. J,un~ow. A1t the close of the present emergency, when peace comes, it WOllld nlcall that nlnch of this emergency KOrk npcessnrily will be discOntinue~L"

“>Ir. HOOVk:R. That is correct. If the llntinnnl emerpency sl7077ld terminate, the structure> denli77g With nntiom~l defensp ~711 ln77~7e(li77tely be discontinued or wry ni:~teri:7lly cnrtailfd :rwortli77g to the wishes of Congress.” (First Dcficipl7p,7/ -4~~ww~intion Hill. l!l61, IIeari77gs lwfore the 11077se Com777ittee on Apl)rogria- tions, 3/19/1/-1X pp. lH,SlW.)

Page 55: Church Committee: Reports-- Book II

39

made to enact a legislative charter replacing the wartime emerpq orders. as was tlonc in the forrip intelligence ficltl in 1947.

The main tlcvelopmrnts durln, 0. t11c (‘old ITar cl’:1 111ay he 511111311a-

rizecl as follows :

a. Domestic Z?ltelligeuce duthorzity During this period there was x national conscnsns regarding the

danger to the c-nitetl States from (‘onimunisni ; little tlistinction was made between the threats posed by the Soviet Lnion and by Comma- iiists \ritliin this colmtry. I)omcstic intclligciicc activit:v w:Is sill)portetl by that co~isensi~s. althoi~gh not specificall~y authorized by the Congress.

Formnl authority for FBI inr-estigatlons of “silbrerA\-c activity” and for the ngrccmcnts between the 1~131 ant1 military intelligence w-as esplicitly granted in cuect&irc tlirevtiws from I’rcsitlcnts Tr-11mal1 and Eisenhower, the Sxtionnl Secwritv (‘oimcil. and A1ttorncy Gen- eral Iiennedy. These directives po&ktl 110 guidnnw. l~owercr, fol c~oiitlwting or controllinp s~lch inr-estigntions.

6. lCropr of Domestic Z,i tel7igence The breadth of the FBI’s investigation of “snb\-ersive infiltration”

cont.inuetl to produce intell@nce reports and massive files on lawful groups and law-abiding cltlzens who hi~ppened to associate., cl-en lm\vittilLgly. with (‘omnlunists or n-it,11 socialists uncwnnected with the Soviet 1 nion who used revolutionary rhetoric. -it. the same time, the scope of FI31 intelligence csl~ancled to corer civil rights -protest actir- ity as well as violent ‘*Klan-type” and ~‘linte” groups, vocal anticom- munists, and pronlinent opponents of racial integration. The vagne- IWSS of the FBI’s in\-est,igntire mandate and the overbreadth of its collect ion programs also placetl it. in position to snpp~y the White IIouse with numerous items of tlomcstic political intelllgcnce nppar- cntly desired by Presidents and their titles.

In respon:‘c to White IIon~e and congressional interest in rightS- wing organizations, the Internal Revenue Service began comprehen- sive investigations of right-wing groups in 1961 and later expanded to left-wing organizations. This effort was directed at identifying caontribntions and ascertnining whether the organizations were entitled to maintain their cstmpt status.

c. A~lccmLnftr7dify tritd PO,l.fl~Ol

Pervasive secrecy enabled the PI31 a~lcl the ,Jnstice Department to tlisrcgnrtl as ‘~lmw~rkablc” the Emel;penc~~ IMention ,!ct intended to set stnntlards for aspects of domestic ~ntellqp~cr. The FI3I.s independ- ent position also allowed it to withholcl significant infornlation from a presidential commission and from every ,1ttorney General; and no -1ttornex General inquired fully into the 13ureaii’s operations.

T)uring the same periocl, ap~~relicnsions :ibont. having 2 “security police.” infiuenccd Congress to prohibit, the Central Intelligence ,1gency from exercising law cnforcenlent powers or performing “inter- nal seulrity frinctions.“ Se\-crtliele~s, in secret and witliollt effective internal (wiitrols, the CIA1 imtlcrtook l)r?pranis for testing chemical 2nd biological agents on iinwitting .\nicricans, sometimes with tragic conseqnenccs. The CL1 also used A1nierican priyate institntions as

Page 56: Church Committee: Reports-- Book II

40

“cover!? and used intrusive techniques affecting the rights of Americans.

The CIA and the Sationnl Security A.gency illegally instituted pro- grams for the interception of international communications to and from American citizens, primarily first, class mail and cable traffic.

During this period, the FBI also used intrusive intelligence gather- ing techniques against. domestic ‘%ubversives” and couiiterintelligenco targets. Sometimes tlwsc techniques were covered by a blanket dele- gation of authority from the Attorney General, as with microphone surveillance ; but frequently they were used without outside authoriza- tion, as with mail openings and surreptitious entry. Only conventional wiretaps required the Attorney General’s approval in each case, but this method was st,ill misused clue to the lack of adequate standards and procedural safeguards.

In the nlicl-fifties. the FBI developed the initial COISTET,PRO operat.ions, which ~wd aggressive covert actions to clisrupt and dis- credit Communist Part); activities. The FBI subsequently expanded its COISTETJ?RO ,actlr-ities to discreclit peaceful protest groups whom Comnlunists had infiltrated but. did not control, as well as groups of socialists who used revolutionary rhetoric but had no con- nections with a hostile foreign power.

Throughout this period, there was a mixture of secrecy and dis- closure. Executive action was often substituted for legislation, some- times with the full knowledge. and conscnt~ of Congress and on other occasions without, informing Congress or by advising only a select gro~lp of legislators. There is no question that, Coitgress. the courts, and the, public expected the FBI to gather domestic mtclligcncc about Communists. But the broad scope of FI51 investigations, its specific programs for achie\-ing “pure intelligence” and “prcwntive intelli- gence,” objectives, and its use of int rusivc techniques and tlisruptive coiinterintelliFrlice measures against tlomestic “subwrsircs” were not) fully known by anyone outside the Bureau.

3. Domestic I,ztclligeucc Aiitho~~ity

During the Cold \\‘ar era. the strong consensus in favor of gowrn- nicnt,al a&on against Conimunists was reflected in tlecisions of the Supreme Court ant1 acts of Congress. In the Korean \Var period, for instance, the Suprtmc COLLit upheld the conviction of donlestic Coni- munist, l’arty leaders under the Smith ,1ct. for conspiracy to advocate violent owrtlirow of the gorerniilent. The Court pinned its decision upon the conspiratorial nature of the Communist I’arty of the I*nited St!ates and its ideological links with the Soviet Union at, a time of stress in Soviet-American relations.81

‘I The Court held that the grave and probable danger posed by the Cornnlunist I’arty jmtified this restriction on free syrech wider the First .\mrndn~ent :

“The formation by petitioners of such a highly organized conspir;~cr. \vitll rigitllr discil)lined members subject to call when the lrndrrs, these petiiioners. felt that the time had come for action, coul~letl n-ill1 the inflammi~l~le nature of

Page 57: Church Committee: Reports-- Book II

41

Several statutes buttressed the FBI’s claim of legitimacy for at least some aspects of domestic intelligence. A1ltliougl~ Congress never di- rectly authorized Burenn intclligcnw operations. Congress enactccl the Internal Security ;1ct of 1950 OT-er President Trw~lan’s reto. Its two main provisions were : the Subversives _Ictivities Control Act, requil.- ing the registration of members of commmiist and communist “front” groll~)s; and the I+iierpncy Dctriition Act, proI-icling for the intern- mcnt in nn cniergencv of lwrsoiis who might engage in espionage or snhotn~c. Ill tliis _I&. Congress matlc findings that, the Communist Party was “ a disciplined or Cgxniz:ltioii” operating iii this nation “ullclF1

Sol-id TTnion control” with tht aim of installing “a Soviet style tlic- tntorship.” ,‘? (;oiiig cwn filrtlier in 192. Congress passed tllc Colll- mnnist (~‘olltrol -\ct. which providctl that the Commnnist Party xls “not entitled lo any of the rights, privileges, and immnnitics attt~liclant iilxni legal 1)otlies crcatctl iunclcr the jurisdiction of the law of the l’iiitccl St:ltrs.“S3

In 19X. the SLI]~~C~W Court rwognizecl tilt existence of FBI intelli- gence aimed at Y’onrmllnist stditiolls acti\-itics.” y1 The basis for 8mith Act. prnwciitions of “sul~versivc nctirit;v” Was 11nrrowccl ill 1n.r,7, how-

rwr. when the Voilrt overturned the convictions of second-string (‘omiiiimist lenders. holding that the porcrnment nlnst show aclrocncy

“of action and not mcrclv al)strnct tloctrinc.” 8A In 1961, tile Court sustained the constitntionnlitv under the First Amendment of the re- qiiircnicnt. that the Comnim;ist Party register dtli the Siibrersivc .\civitics Control 130nrdSF

Thn tonsens~~ shol~ld not 1~ portrayed RS monolithic. President, Truman was concerned about risks to constitntional go\-ernment posed

v3rld conditions. and the touch-and-go nature of our relations with countries Mth whom petitioners ~v2re in the rery least ideologically attuned, coiirince us that their convictions were iustified on this score.” [Dc~?lis v. 7,:nifcd b’fafcs. 331 1-.s.494.;1~~-.-,11 cl!t.st,.l

p3 6-2 Stat. 9X7 (1930) The Subrersire Activities Control Act’s registration pro- vision n-as hr~ltl not to violate the First Amendment in 19Gl. [Communist Party v. h’uhwrsirc :icfirifics Co~frol Boa,d. 3G7 T-.S. 1 (19Gl) .] However, registration of Communists under the Act was later held to violate the Fifth Amendment I!rivilcge against self-incrimination. [AZhtrtnon. r. Sltbrcrsiwc AcWifie.9 Control Iiotr,-(7, :K? T:.S. 70 (196) .] The EmrrgencF Detention Act was repealed in 1971.

” GS Stat. 7% (1954), 33 V.S.C. 841-S44. The constitutionality of the Communist Control Act of 1954 has never been tested.

” In light of the facts now known, the Supreme Court seems to hare orerstated the degree to which Congress had explicitly “charged” the FBI with intelligence responsibilities :

“Congress has devised an all-embracing program for resistance to the various forms of totalitarian aggression. It has charged the Federal Bureau of Tnr-rstigntion and the Central Intelligence Agency with responsibility for intelli- WIWC rnnrrrning Communist seditious actirities against our Government, and 1~s denominated such activities as part of a world conspiracy.” [Pewzsylrawia v. Sr~lno,t. X0 T.S. 497. FS50.5 (l%G).]

This decision held that the federal eorernment had nreemnted state sedition Inns. citing President Roosevelt’s Sepfember 1939 statement-on FBI authority and an address hg FBI Director Hoover to state law enforcement officials in Angnst 1940.

R5 Yate.9 v. United Stntes, 354 U.S. 298. 325 (1957). “.Jnstice Douglas, who dissented on Fifth Amendment grounds, agreed with

the majnrity on the First Amendment issue : “The Bill of Rights xw designed to give fullest play to the exchange and dis-

semination of ideas that touch the politics. culture, and other aspects of our life. Khrn an organization is used by a foreign power to make advances here, ques- tions of security are raised beFond the ken of disputation and debate between the people resident here.” [Commwdt Party V. Subversive Activities Control I3oard.3677.S.1,174 (1961).]

Page 58: Church Committee: Reports-- Book II

42

by the zealous nllti-Comilllu~islil in Congress. A1ccorcling to one White IIousc staff member’s notes during the debate over the Internal Security Act :

The Presiclent, said that the situation . . . was the worst it had been since the. Alien and Sedition Lair-s of lZX3, that a lot of people on the Hill should Iwow better but had been stampeded into runnin, ~7 \I-ith their tails between their legs.

Truman announced that he would \-eta the Internal Securitp Act “regardless of how politic~allv unl~~ln~ln~~ it n-as-election year or no election ;~ear.‘~ bi But Presi’dcnt Truman’s veto vxs overrihden by an o\-crwlielming margin.

71. The Fcdovr7 En,ployec Lo!/alty-Zccurity Propam (1) /)~*iyirls of the Z-‘,,ogr,/(1,1.--Presidcnt’ Truman established a

federal employea loyalty progranl in 1947. iR Its basic features were retained in the federal emply,w security program authorized by Prtsiclent Eisenhower in public I+kxutive Order lOf50. which, with some modifications, still applies today.“”

Although it had a much broader reach, the program originated out of well-founded concern that Soviet intelligence was then using the Communist Party as I vehicle for the recruitment of espionage awnts.90 President Truman appointed a Temporary Commision on I&ployee Loyalty in 19~ to examine the problem. FBI Director Hoover submitted a mcmoran(llml on the types of activities of “sub- ve,rsire or disloyal lwrson~” in government service which would con- stitute a “tlirea’t” to securky. As Hoover saw it, howver, the danger was not limited to espionage or recruitment. for espionage. It extended to “influencing” government polivies in favor of “the foreign country of their ideological choice.” Consequently, he urged that attention be given to the associations of government emplovees with “front” organizations, including “teniporarv organizaticks. ‘spontaneous’ campaigns, and pressure movements so frequently used by subversive groups.” O1

The President’s (‘ommission ncceptetl Dire.ctor Hoover’s broad view of the threat. along with the view endorsed by #a Presidential Com- mission on Civil Kigllts that. there also was a danger from “those who w0111t1 subrcr-t OllI’ dcllloclxc~ 1,). . . . groups.” 92

destroying ,the civil rights of some Consequentl\-, the Executive Order included, as ‘an indica-

“File memorandum of S. J. Spingarn, assistant counsel to the President. 7/22/50. (Spingarn Papers, Harry S. Truman Library.)

@ Executive Order 9835.12 Fed. Reg. 1933 (1947). *’ Executive Order 10450,18 Fed. Reg. 2489 (1953). “A report by a Canadian Royal Commission in June 1946 greatly influenced

rnited States gorernmrnt policy. The Royal Commission stated that “a number of young Canadians, public servants and others. who begin with a desire to advance causes which they consider worthy, hare been induced into joining stlldp groups of the Commnnist Party. They are persuaded to keep this adherence secret. They have been led step 1)~ step along the ingeneons psychological derelop- ment course . nntil under the influence of sophisticated and nnscrupulous leaders they hare been persuaded to engage in illegal activities directed against the safety and interests of their own society.” The Royal Commission recom- mended additional srcnritF measures “to prevent the infiltration into positions of trust under the Government of persons likely to commit” such acts of (The Report of the Royal Commission. G/27/40. pp. F2-F3. GSCM%9.)

espionagp.

m JIemorandum from the FRI Director to the President’s Temporary Commis- sion on Employee Loyalty, l/3/47.

O’President’s Committee on Civil Rights, To Secure These 1Zighf.v (1!)37), p. 52.

Page 59: Church Committee: Reports-- Book II

association with groups rlesig-

the C’onstitiition of the I7nited St:ites. or as seeking to alter

stand:lrtls of the .\ttorne~- (knelxl’.s list fl*equelltly bec~allle ‘2 IlleNlS

l’lo)-ee:~ 1,V lllcL;\JI5 Of th “Jl;llll1~ CllCCk” of I~llJX’:\U filCS. ‘rh?W ill\-Cd-

@oils dso ser\-ed the “pure intelligence” fnnction of inforniinp the Attorney General of the influence and organizational affiliations of So- called Gibrrrsi~es.” Oi

“3 Ikecutire Order DS3.i. nnrt I. section 2: cf. Esecutire Order 10460, section S(n) (3).

” In lW0, for instance. the .Jwtice Iklx~rtnlent :rtlrisctl the FBI to continue investigating an orgnnimtioll not on the .\ttorney General’s list in order to secure “ndditionnl inforuialinli relative to the criteria” of the eriiplo.we security c!rtler. C ~Iemornndun~ from .\s:ai~tnnt At torner General .J. Wxlter Tengle~ tfl J. Ed&* Hoorer, 5/17/60.)

‘,’ FBI “nnnie clieclts” arc dntllorized as one of the “national agencies rhwks” reouiretl 1~ Esecutirc Order 10450. wction 3 (a)

‘Ii The FBI official in charge of the Tnlernal Security SwCon of the Intelli- gency Division iu the fifties rind early sixties testifird that, the Iwimnry purpose of FBI irirestiz:~tions of communist “inflltrntitrn” wna to advise the .\ttorne.\- Genexxl so thni 11~ could cletermi~~e whtlier a q-oup slionltl po on the .tttnrnei Gtwer:tl’s list. He :11so testified that inr-estigttions for this lTnrI)ose continued :tftw the A\ttornry General c-eased ntlditl :’ nnmw of Eroups to tllv list. (F. .J. Rnumenrdner testinionr. 10/8/7.5. 1)n. 4,%49. i Set nn. 4,y39 for discussion of the I~~I%I’s‘~Cl~IISFII, l,ro&m. _ -

__

” Jleniorn~~tl:~ from the .\ttorney General to Ileads of Depnrtmrnts xnd Agenries, 4/29/:X3 ; ‘i/l.;/3 : 9/3/.X : l/L’L’/.74. Gronlw tl~~sig1mtetl prior to tlmt timr incalntlctl nnmerow tlefmwt German ant1 .TnJniiwt~ societies. (‘onlmnnist ant1 Corn- mniiist “front” or,ganiz:ltions. the Soci:llist \Vorliers l’xrty. the Sntic~mtlist I’nrty of l’nerto Rico. and several Ku Iilur Klan nrg,?nizations.

no Executive Order lM50, section 8 (a) (5).

Page 60: Church Committee: Reports-- Book II

44

Director rroovcr hat1 objcctctl that Prcsitlrwt ‘l’rr~mnn’s ortlcr did not give the FRI cscnsiw pox-er and tlirentciictl “to witlitlraw from this field of investigation rather than to eiigngc~ in n tug of war with the Ci\-il Service (‘ommission.” lo3 I’rrsidcnt Truman xx3 apprcliensire nl)ont tllc FBI’s growing power. The notes of 01ie l~r~+,ideiitial aide on a meftiiig with the President reflwt that T17ima1i felt “wrv strongly anti-FHI” on the issue and wanted ‘*to 1x1 SIIW ant1 holtl Ih3T clown. afraid of ‘Gestapo.’ ” Ina

Presidrntinl assistant Clark Clifford rel-iewed the situation and came down on the side of the FBI as “better qnalifiecl” than the Civil Service Commission.lO~ TZiit, the Presiclcnt~ insisted on a compromise which gxw Civil Service “discretion” to call on the, FBI “if it wislits.” In6 I)ircctor TToo\-cr l~rotfstetl this “coiifiision” about the FEI’S juriscliction.‘“7 When ,Jnstict Department, officials w-arnecl that Con- grcss wx~ld “fintl flaws” with the compromise. President Truman noted on a iilciiio~‘:lii(li~iii from Clifiorcl :

J. Edgar will in all probability get this bacli~~~l looking Congress to give him xhat lie, w-ants. It’s ~l:iiigeroi~s.~~”

President’s Trmmnn’s prediction x-as correct. His lmdgrt request of $16 nlillion for Civil Service and $8.7 million for the FBI to conduct loyalty iiir-est.igations v--as revisetl 4y Conprfss to allocate $7.4 million to the FBI and onl;v.@ million to Civil Service. loo The issue was finally resolrrtl to tllc FISI d satisfaction when the l’resitlfnt issnecl a state- ment, declaring that, there every “to be 110 exceptions” to the rule that the FBI n-odd ni:tke all loyalty iri~-esti:mtions.‘l”

Irn The FBI’s field offices were supplied dth such “tlinml)-nail sketches” or clinmctt,rizntioils to snpl)lement, the .\ttorne,~,(:enc,r:ll’s list alld tlip reports of the House Committee on I~wAhlrric:tll Activltles. (I:.([.. S;\(’ Letter X(1. fi(L34. i/12/00.)

‘“I Executive Order 10450. section S(d). lo2 The reference to R “full field inrestigation” where there n-as “derogatory

information with rrsl)ect to loyrnlts” did uot, ill the Trumxn order. sny who would conduct the inreetigation. (Executive Order !N%, llnrt I, section 4.)

I”’ Jlrmornnda from .J. Edgar Hoover to Attorney General Tom Clark, 3/N/47 and 3/31/4i.

I*’ File menio~andum of Grorge 11. Else~, .5/Z/47. (Harry S. Truman Library.) In’ JIemor:~ndum from C’lIIk Clifford to the I’resident. Ti/i/4ii. l”JIemorandum from Clark Clifford to the President, 5/O/47; letter from

President Truman to H. B. Mitchell. C.S. Civil Service Commission, 5/9/4i. (Harry S. Truman I,il)txrr. 1

Irn %morandum from J. Edgar IIoover to Attornev General Clurk. S/12/47. 10SJIemor~ndlm~ from Clark Clifford to the Pr&ident. 5/9/4i. (IInrrs S.

Irn Eleanor Bonttcon. TII? Fctlonl Loualfy-Scotritl Progwou (Ithaca : Cornell University Press, 3953). lq,. 33-34.

I” .\lcmorandum from J. R. Steelman, Assistant to the President. to the Attor- ney General, 11/3/4i.

Page 61: Church Committee: Reports-- Book II

45

c, fivortire Ijitwfiws: Lock 0.f (:lritlcf,?cc unr7 Confl~ols

‘I’wo l)ill)lic~ 1)wsitlential statenlrnts on Fl{I tlomestic~ intcll~pencc au- thorit---by I’resitlent Truman in 19.X) wilt1 1)~ Prrsidcwt Eisenhower in 11)3~~-sl~~~~~ific:~ll~~~le~l~~r~~~l that, the FBI n-as authorized to investi- gate “snl)~-ef5ive activity.” electing the broatler inteq~retntion of the conflicting Roosevelt tlikectiws. JIoi~eovcr. a coiifitlentinl clirechce of the Sntionnl Sccllrity (‘ouwil iii 1949 grnntctl :lutliority to the FBI and militnrv intelligence for investigation of ‘~subvcrslve activities.” In 1962 I’rekiclent, Iienncd\- issuetl a confitlential ortler shifting snpcr- vision of these investigati&s from the SSC to the Attorney General, and the XX’s 1040 antliorizations were reissued by Attorney General IZennedy iii 1064.

As with the earlier Roosevelt directives, these statelncllts, orderS

ancl antliorizntions fnilrtl to provide piiitlwnce on conducting or con- trolling “sihwrsiv3” investigations.

I-ii&r I’resitlent Tixinaii. the Iiitei~tlcl)ai~tiiIriit:il Iiitellipiiw (‘on- fcrcncc (IIC) I11 was formally alithorized in 1949 to si1perrise coordination beheeii the I?131 and the military of “all inr-est,igation of domestic espionngc, conntci.esl)ionngc. sabotage. suh~~rwio~r, and ofhe

wlnfc~l iufe77igcncc nzntfcrs affecting internal secilrity.” “* [Emphasis ntltletl.]

T11c confidential 1)eliiiiitatiolis Agreement l~etwwii the FRI and tlie military intelligence agencies was :ilso revisctl in 1!)1!) to rerjuirc greater escl~aiipc of ‘~iiiformation of iiiiitual interest” and to rcqiiirc the 1~~131 to ad\,& military iiitelligcnw of develolm~cnts concerning “sul~vci~sivc” groi~ps wlio n-err “potciitinl” tlwiigers to tlir security of tlic I’nitctl Statcs.113

‘I’ In a March l!H9 directire on coordination of internal security President ‘I’rnn~:~u approved the creation of the Interdepartmental Intelligence Conference ( “II( Jlemorandum by J. I’. Coyne. Major Chronological Developments on the Subject of Internal Security, -l/8/49 (Harry S. Truman I,ihrary). and SSC Memorandum li/4, 3/23/49.

I” SS(: JIrmomndum li/.?. 6/15/49. The National Security Council was estalj- lislied Iw the Sationnl Securitr A(+ of 1047. which authorized the SSC to advise the President with respect to “the integration of domestic, foreign, and military policies” relating to the “national security.” (%&on 101 of the Sational Se- vnritr .\ct of 1947.) T*nder this authority. the SSC then approved a secret charter for the ICY’, composed of the FBI Dire&or (as chairmanj and the heads of the three militarr intrllieence aernrics.

“‘Delimitntion 0;’ Inr.&&ative Duties and Agreement for Coordination, 2/23/49. A sul)l)lemrntnry agreement required FBI and military intelligence officials in the field to “maintain close p&sonal liaison,” particuiarly to avoid “tlulllicntion in . the use of informers.” Where there w-as “doubt” as to whether another ngenq- was interested in information. it “should be transmitted.” (Si~~~~~lementnl L\preenlrnt So. 1 to the Delimitation Agreement, 6/2/49. )

I” Letter from .\ttnrnpy General JIcGrnth to Charles S. JIurphF, Counsel to the President, i/11/50.

“’ Statenlrnt of President Truman, 7/24/50.

Page 62: Church Committee: Reports-- Book II

46

Despite concern among his nssistnntr.ll”a President Truman’s st atcnicnt ~1~x1~1~ placed liim on tlicl record as endorsing FBI in\-csti- ptions of “sl~l)\-c~rsi\-e activities.” The statement saitl that such ill- I-cstigations Ilad lvxw nl~thorizetl initially 1)~ President Roosevelt’s “dirccti\-es” of Scptenllw 1939 and .J:~nnnrr 1943. Howe\-cr. those l’articnlar tlirccti\-(3 had not nwl this prcc1sc lan.pqe.1’6

Shortly after Prrsitlcnt I<isenhonrr took office 111 1933. the FBI ntlrisecl the X’hitc ITousc that its “internal security responsil)ilitv” went, beyond “statlitory” anthorit\-. The I%urcnl~ attached n cop of the Truman statement. bnt not the Roosevelt tlirectire. The FI3T again broadly intcrpwtrtl thr Roost\-clt directive by sal-ing that it lint1 an- thorizcd “inr-estignti\-c work” rclntctl to “sul~\-&ire activities.” II7

In Dcccmlwr 1953 Prcsitlcnt Eisenhower issued n statement reiternt- ing Prcsidcnt Trllmnn’s ~‘tlircctivc” and extending the FI3T.s mandate to investigations iliitler tlir -\tonlic Ener,py A1ct.118

President Kc~nncdy issued no lml)lic stntenlcnt comparable to the Roosevelt, Tnlman. and Eiscnhon-cr ‘*tlircctiws.” I-Towrer. in lW2 he did transfer the Tntcl.clcl)al~tlllclltal Intcllipnce Conference to “the supervision of the -1ttorney General :” I18 and 1n19M Attorney General Robe,rt I~cnnctl~- w-issued the ITC charter. citing RS authority the President’s 1962 order and retaining the term “subwrsion.” The char- ter adtlecl that it did not ‘*niotlify” or ‘%ffect” the previous “Presi- dential Directives” relating to the clnties of the FRT, anal that, the Dc.limitations A1greet~~ent bctwvx the FBI and military intelligence “shall remain in full force and effect.” 12”

None of the directives, orders. or charters provided an\- definition of the broad and loose terms “subversion” 01 “subversive activities ;?’ and none of the xtliiiitiisti,Rtioiis provided effective controls over the FBI’s investigations in this area.

3. Scope of Zlonwstic Zn.te77igence

The breadth of the FM’s in\-tsti,cations of “subrersive acti\-ity” led to massive collection of information on law abiding citizens. FI31 domestic intelligence inrestiptions extended beyond know1 or sus- pected Communist Party ~llenlbcrs. They included other indi\-iduals w-ho repardetl the Soviet I-nion as the “chntllpion of u superior way of life” and “persons holding important positions who hxl-c shown sym- pathy for (‘ommunist objectives and policies.:’ Members of “non-Stal-

‘I” One noted, “This is the most inscrutable Presidential statement I’ve seen in a long time.” Another asked, “How in H-- did this get out?’ A third rrl~lied, “Don’t kno\17--I thought, you were handling.” Sotes initialed D. Bell. 13.78 ( R. .J. Slnngarn), and GWE (George W. Elsey) , i/2425/50 (Elsey Papers, Harry S. Truman Library). Even before the statement was issued, one of these aides had warned the President’s counsel that the Justice Department was attempting “an end run.“ [Jlemorandum from G. 11’. Elsey to Charles S. Murphy. Conn+el to the President, i/12/50. (Jlurphq- Papers. Harry S. Truman Library.) ]

11’ See footnotes 19 and 22. ‘Ii Letter from J. Edgar Hoover to Sherman Adams, Assistant to the President,

l/28/53, and attached memorandum on “FBI Liaison Activities,” l/26/53. I’* Statement of President Eisenhower, 12/15/53. 11o Sational Security Action Memorandum 161, Subject : U.S. Internal Security

Programs. 6/9/W?. I’” Jleniorandnni from Attorney General Krnnedr to J.

man, Interdepartmental Intelligence Conference, 3)5/64. Edgar Hoover, Chair-

Page 63: Church Committee: Reports-- Book II

“I Memorandum from J. Edgar Hoover to Attorney General Clark, 3/S/46. “’ ~I(‘111or~lfldI1111 from the FBI to the SewI tr Select Committee, IO/%+%. An

indication of the I)rradth of the investigations is illustrated 11.v tlw fact that the uumlwr of filw far esctwl~tl the Burcnu’s rstimatt~ of tlic “all time high” iu ( ‘ornmllriist Party mcmlwrsllip which n-as SO.000 in 1!)11 and steadily dfclinrtl tlit~rcaftc~r. (\Villiam (‘. Sullirau testimony-. ll/l/i5. pp. 33-34.)

“I” Rqwrt to the IIonsc (‘olnmi ttw ou the Judiciary by the Comlhwllrr General of thr I.nitrtl States. L’/L-l/X. m). llCL-119.

“’ Suc~h ilirestigatious were cc~utlucted Iwause the Communist Party had issued instructious that “slrrlrrrs” should leave the Party awl go “n~lderaro~~nd,” still maiutnining secret links to the I’nrty. (Jlrmornnd~m~ f&n J. F. Bland to A. II. Belmont, i/3O/T,S.)

“Refusal to coolwratr” with au FBI agent’s interview n-as “taken into con- sideration along n-itli other facts” in detrrminin g whether to contiuue tlw in- vestigation. (~lcmornndum from J. Edgar Hoover to I)el)uty Attorury (;tqleral I’fyton Ford. F/Z‘S/Zl.)

I” l%W FBI JInnunl Sfv+ion Si, 1,. 5. 1X 1960 FBI Jlanual Scctiou 87. 11. 5.

Page 64: Church Committee: Reports-- Book II

lri The Supreme Court’s last decision upholding n Smith Act conriction was Rcnlcs v. 7:~zitctl Stntes. 367 I-.S. 203 (1961). which reitprxtfvl that there must he “adrocncy of action.” Sep 17ntrs v. T7riifcd Sfnfcs, 354 I*.S. 298 (19S7).

12q Jlemorandunl from .\ssistnnt Attorney General Tompkins to IJirector, FI31. 3/l r)/Iio.

lS ~Iemorandum from Assistant Attorney General Tender to Ijirector. FBI. . . .‘,/li/GO.

I’” 1960 FBI JIaiiunl~Sectioii Si, p. 5. Ia* 1960 FRT Manual Section $7, 1,~. S3-S1. 13’ 1960 FBI Manual Section 87. $ 5-11. ]a Annual Report of the .\ttorney General for Fiscal Tear 19.55. p. 195. 1s Annual Report for 1958. p. 33% ‘= Annual Report for 19G1,p. 3i5. I18 (Esamples of such reports to the White House are set forth later. pp. 51-

53.) The Chief of the Internal Swnrity Section of the 121~1 Intelligence Diri- sion in 1938-1966 testified that thr Bureau “had to be certain” that a group’s position did not coincide with the Cnmninnist line “jnst by accident.“ The FBI WO1lld not “opr’ll :, c:lw” until it had “al~rcific information” tlmt “tile (‘ommnllists were there” and were “influencing” the group to “assist the Communist move- ment.” (F. J. Bnmiigartlnc~r testimony. lo/S/i2 11. 47.)

Page 65: Church Committee: Reports-- Book II

Intt~lli~t~nct~ Inrrsti,wtions. I3 Report of Oltl:~homn City Field Office. !)/19/41. This report continued :

“Scrertheless. there is a strone morement on the nart of the Communists to at- tempt to don&ate this group . y Conscquentlr, the artirities of the SAACI will IN c~l04y obscured ilnd scrutinized in the future.” [EmI)hnsis ridded. ] This stress on C’omnlunist “attcml)ts” rather than their nctunl achievements is tgpicnl of (‘O~IISFII, rel)orts. The nnnunl renorts on the FEI’s COJIISFIL inrestiention of the S.khCI; indicate that the Communists consistently failed in these “at- tc~llll~ts” :it tlic nationnl lerrl. nltliough the I3urenu took credit for using roved txctics to prevent n Communist takeover of n major SAACI chnlder. (T&ter from J. Etlglr IIoovrr to A1ttorney General-elect Rolwrt F. Kennedy. l/10/61 ;~tt:~chc~tl 11t~~i11or~~idl11~1, eul~jvt : Comnlunist Party. IvS.\bFI<I (‘olIntt~mtt:lck.)

I”’ Annual Report of the -1ttorney Gencrnl for Fiscal Tear 19X, 1)p. 247-248. “I 3Irmor:~nd~m~ from .J. Edgar Hoover. Chairman. Iiiterdel~nrtmelitnl Intel-

ligenrc (‘onferencr, to JIcGeorge I3undy. Slwci:ll Assistant to the President for Sationnl Secnrity, ‘i/3/01, enrlosing ITC Report, Status of Iy.S. Intcrnnl Securit.\

PIWgKUllS.

I” \Yillinm C. Sullivan testimony, 11/l/75. pp. W-41.

68-786 0 76 5

Page 66: Church Committee: Reports-- Book II

50

proposd or actual activities of incliridunls, officials, commit- tees, legislatures, organizat~ions, etc.! in the racial tielcl.“’

The FBI’s “intclli,gtncc function” was to advise “npproprintc” fecl- era1 and local officials of “pertinent information” about> “racial inci- dents.” 148

A briefing of the Cabinet by Director Hoover in 19% illustrates the breadth of collection and ~lisscminntioii under the racial matters program. The briefing covered not only incidents of violence ant1 the “efforts” and “plans of Communists to “influence” the civil rights movement. but. also the legislnt.iw strntcFy of the S.\.1CT’ and the activities of Sontliern Govcixors and Coiigwssiiien on l)clinlf of gronps oplxxing intcpxtion peacefully.“” -

14X 19GO FBI JLnnual Section 122, p. 1. “( SA\C Letter So. 63-27, G/ll/G3. “‘The FBI has denied that it ever conducted a “security-trlle inwstijiation”

of the Rirch Society or JVelch, Ijut states the Coston field ofllce “was iustrncted in 1959 to olbtain I)ackgrouud data” ou Welch using 1 mlklicb sources. (~Iru~orau- dum from thr FBI to the Senate Sfhlflct Committcr. L’/lO/‘iG.) A 19G3 intrmal FBI niernoraudunl stated that the Bureau “checlted into the i~ncl~~ronnd of the Birch Society because of its scurrilous attack on President F:iwullower ant1 other high Government officials.” ( JIcmoraudum from b’. .J. li:~un~g:~rtlncr to IV. (‘. Sullivan, Z/29/G:l.) Reports were sent to the White House, SW footnote, 104.

lw Letter from Assistant Attorney General Toml)ltins to Sllermnll Atl:ImS:.

Assistant to the I’rtssident. 11/22/X; letters from J. Etlgar Hoover to Rolwt Cntler, SIwial Assistant to the President. lO/lS/a7, and l/U/S. (Eiwnhowcr J,ibrar.v. )

I” 19GO FBI Manual Section 122, pp. T-G. I” 1X0 FBI _\Ianual Section 122, 1~1,. 5-G. I” “Racial Tensions and Civil Rights,” 3/l/30, statrlncllt used l)y the FRI

Director at Cabinet briefing, 3/g/56.

Page 67: Church Committee: Reports-- Book II

51

c. FBI Political Imkdligence for the White WOUSC

President Triunnn and his aides received rcgi~lar letters from D- rector HOOI~CI~ labcletl “I’cwOn:~l ant1 (‘onfitlcntinl” contnining tidbits of political intelligence. The letters ~~eportecl on swll snbjccts as: insick iuforniation about tllc ncpotiating positiou Of :I non-Corlmw nist labor union ; lzl the activities Of n forincr Rooserelt~ aide who u-as trying to infht~ncc the Trrl~nan ntlnrillistI.atioIl’s appointments: IS4 n report from n bhconfitlential source” that, n ‘wandal” was hwving which wonld be “very einbnrrassiIig ” to the Ih~ocratic atlininistrntion; lo3 a rcpolT fro111 n “very confitlential so~irec” abont, a meeting Of ncm- paper rcprcsmtatives iii Chicago to plan piiblic2tion of stories espOS- ing organized crime ant1 coim~pt politicians; lz4 the contents of an in-liouse coinm~micatio~i from L\7eu*.97wefi magazine rcportcrs to tlieil editors about a story the\- hat1 obtninccl fro111 the State Ikp:ll~tlllellt,l””

and criticism of the goveminent’s internal security progralM by R former Assistant to the Attorney Gcnernl.l”F

Letters discussing Coininiinist “influence” provided n considerable amonnt. of estraneoiis information abont tlic legislatirr process, in- cliitling lobbyiiy activities in support Of civil rights legislation I’7 and tlic political acti\-ities of Senators and Co~gressn~en.~“~

President Eisenhower and his nitlcs received siinilar ticl-bits of p- litical intelligence, inclnding an nclvnnce test of n sprccl~ to be. deli\-- ered by a prominent, labor l~ndrr.~~~~ reports from I31irenu “soiirces” on the meetings of an SAACP delegation with Senators Paul Dongdns and Everett Dirlrwn of Illinois; lGn the report, Of an “infornxmt” on tile role of the I-nitrd AIldo M’orkers lSnion at an S,IAICP confer- crql”’ smmmries of tlatn in FBI files on thirteen persons (inclncling SOIIIXIII ThOnlas, Linus Palding. and Bertrand Russell) who had filed srlit to stop nuclear testing,lfi2 a wport. Of :t “conficlential s0iiiw” on plalls of Mrs. Eleanor Roosfrelt to hold ;L reception for the heat1 of

‘X Srr 1). 37 for discussion of White House wiretnl) requests in 194Sp194fi. ‘X Ixtter from J. Edgar IIoover to George E. Allen. I)irector, Recoustructio~~

Finance Cormration. 12/13/46. (Hnrrv S. Tknnn Lilmrr.) lG3 Letter frh J. Edgar Iioorer to &j. Gen. Harry H.’ 7’augh, Military Aide to the I’resident, 2 / . / 17 47 (Harry S. Trunu~n Library.)

“” Letter from Hnorer to Vaughn. ci/5/4i. (Harry 8. Trun~n l,il)rary.) la Letter from .J. Etlenr Homer to ;\Intthew .J. ~‘onnrllv. Srcrrtarv to the I’resi-

dmt, 1/2i/SO. (Harry %. Trnmn~l T,il,rnry.) .> .

“’ Xemorandum from J. Eclgnr Hoover to Attorne,r Gcnernl (:I;t rli. 4/l/46. ( IInrrr S. Truinnn Library.)

““’ J,ettcbr from .J. I:tlgar Hoover to J1n.j. Gen. Harry H. Vauglli~. Military ;\itle to the President, 11/13/4i. (Ilarry P. Trnninn I,il)rary.)

“’ I&tters frnnl .J. Edgar IIoovcr to Brig. Gen. Harry H. \7anpl~n, Military Aide to the I’rf5itlent. I/11/46 n11t1 l/lT/4f?;. (IInrrv S. Trrrrnnn Libmrr.)

I” Letter from J. Edgar IIonrer to George .E. Allm, Director, keconstrnctim Finance Corl~orntioii. S/29/19. (Harry 8. Trumnli J,ilirnry.)

ljg Jkter from J. Edg:lr IInorer to Dillon Anderson. Slrecinl Assistant to the President, 4/Z/55. (Eisenlloxer I,il,rnry.)

‘K Letter from Hoover to ,tntlcrson, 3/G/.SG. (Eisenhower Library.) lo1 T,etter from Homer to .\nderson. 3/5/X. (Eisrnl~ower J,ibrary.) “‘Lettt~r from .J. Edgar Iloorpr to Jhllon ~\ndcrson. Special Assistant to the

President, 4/11/58. (Eisenllower Library.)

Page 68: Church Committee: Reports-- Book II

“‘Letter from .T. Edgar Hoover to Robert Cutler, Special Assistant to the President, 2/13/,X (Eisenhon-er Lil)rarg.) The group n-:is tlrscrilwtl :w the “successor” to a group cited by the House 1~ikAmerican Activities C’ommittee as a “communist front.”

IN Letters from J. Edgar Hoover to Gordon Gray, Special Assistalit to the Presidtnt, o/11/59 and O/16/59.

“’ Ixtter from Hoover to Cutler, 6/6/.X. (Eisenhower Library). This involved cwntnrt with a foreign official whose later contacts with U.S. officials were reported by the FRI nnder the Kennedy Administration in connection \vith the “sugar lol~lly.” scv *,l>, 6-6.5.

lo8 Letter from J. Edgar Hoover to Dillon Anderson, Special Bssistant to the President, 11/7/5.5. (Eisenhower Library.)

I”’ T,rtters from J. Edgar Hoover to Robert Cutler, Administratire Bxsistant to the President. -1/21/53 and 4/2i/Ti3. (Eisenhower Library.)

Ifi’ J,etter from Hoover to Cutler, 10/l/.57. (Eisenhower Library.) ‘“@ Letter from Hoover to Gray, 11/S/59. (Eisrnhnlr-er Library.) Hoover added

that membership in the group “does not, of itself, connote membership in or sympnthg with the Communist Party.”

I’” Requests antler the Rnosewlt and Truman administrations, including wirc- tap requests. are discnssed at I)I), 33 and 37.

1;1 IAter from J. Edgar Hoover to Thomas E:. Stephens. Secretary to the President, -I/13/X. (Eisenhower Library.)

I” JIemorandum from J. Edgar Hoover to R. F. Kennedy, 2/10/M, “Personal.” (.John 1’. Kennedy Libraqr. )

I” Jlemnrandum from the Attorney General to the President, S/20/63, attach- ing Il~~~lllorillldLl~l~ from Hoover to Deputy Attorney General Katzenbach, S/13/63. (John B’. Kennedy Library.)

I” JIcmnr:~ndm~~ from J. Edgar Hoover to R. F. Kennedy, 2/6/61, “Personal.” (.John F. Kennedy Library.)

I” JIemornntlnm from J. Edgar Hoorer to R. F. Kennedy, 2/8/61, “Personal.” (.John F. Kennedy Library.)

Page 69: Church Committee: Reports-- Book II

info~mntioii from :I Bni~enll “SOIIIYC” ix~gartliiy plnns of :I gv.3111) to p~~l~lisl~ :Illc::itioiis ahut tllc l’iwitlcnt’s lw~o~inl lifc.17”

In 1962 the FHI conlplirtl Illlcl”estionillFl!- with :I vcqlwst frown -It- to1Xey Gene121 Iiclllwtl~- to interview 2 Steel (‘onipi~~ esecrltirc and sevcd relxxtei5 who 1i:id written dovies about the Steel executive. The interviews wew cond~lctcd late at Ilight and early in the nlorninp lmxnsc. according to the r~~sl)onsil)lc FI3T ofiticinl. the .1ttorney Gen- era1 indicated the infowlation was nwtlctl for a Wllitr ITousc nleeting the 11cst day.‘7;

Tllronghont~ the period. the Bureau also cliswn~in:~tcd reports to high esecuti\-c oficinls to tliscredit its criticx Tlw FT3I‘s inside infor- lnntion on plans of the T,awyeix (;uild to denounce ISiii~enli +iir\-eil- lance in 194!) gave the Alttoi7icy Geneixl the oppo~tnni_t~- to pwl~aw n rebuttal well in :itl\xnce of the eslwctetl cl.iticisni.17s 11 lifii the KlloS-

\-ille ,bea 13un~:u~ Relations Council clla~ycd in 1960 that the FRI w-as practicing racial disclimillation. the FE1 did “MIW clwc~ks” on ~ncn- her of the Council’s boai~l of direct015 and Pent the wsults to the &it- tornc? General. The 11anw clwcks dwclpr~d 111) deroptol.~ ;~llcptions from as far hack as the late thirties and early foities.l’!’

(1. IEA\‘I?? rc’xtigcrtiom of Polificnl olyn,iiwtio/Ls The IRS propane that canoe to 1~ used against the tlomrstic clissi-

(hits of the 1960s was fiixt lised against Comninnists in tllc 1950s. -1s part of its COISTI~I,PRO :yCist tlie Conimlinist Party. the FI31 alxu~petl for IRS investiptlons of I’ady menlhers. and ob- tainecl their tns i.etiiixs.“” In its efforts against the Coii~ninnist PartJ. tlie FBI Iiad unlimited :~cwss to tax returns: it never told the TRS w11) it uxntccl thenl. alltl IRS never attcnlptetl to find ollt.‘“’

Iii 1961. i~esponcliiip to White House ant1 congwssional interest in @d-wing olyanizations, the IRS l~evn coml)~ehensivc in\-cstiga- tions of right-wing groups to idcnti&z coiitvilnitors and ascertain whether or not. soiiie of tlwrii were entitletl to tlieii~ tax escnipt st:ltllS.1”2 Left-wing gwnl)s wew later adtlcd. iii an effort to ;i\-oitl charges that sncl~ TRS ac$i\-ities were all :iinled at one l)art of the political spcctiwu. J3otll AgIlt- :ind left-wjii g gro~~l)s w13r sclwtctl for review ;iiid inxsti- gation lxxiliw of their 1)olitic:il activity ant1 not brcnusc of any infov iiiatioii that the\- had violated the tax la~s.“~

1Wlc the IfiS ctfoib hep~fi in l!Kif to in\-cstigate the lwlitical acti\-itics of tas bscllll)t 01 yaiiizations wew not as cstensi\-e as later

*‘” ~Irmornndnm from J. Edgar IIoorer to R. I”. Kenwdly, 11/‘70/&3. (John F. Kennetly Librnry.)

Iii JIemorandum from Attorney Gencsil Krunrdg to the President, 4/12/W en- closing memornndum from Director. FRI. to thr Attorney Grnr~r:ll. -l/12/6” ; ttaht imong of C’onrtney Evans, former A*ssist:lnt Director. E’III. 11’/1/7.7. 1,. :?9.

liy I,ettrr from Attorney Genernl JIcGrntli to I’resitlent Truman. 12/T/-l!); letter from .J. Edgar IIoo\-tar to Jlnj. Gen. Harry II. ~auglm, Military .Liflcb to the Presi- tlrnt. 1/1qao.

lie Jlrmornudum from a. Edgar Hoover to A1ttorneF General William I’. Rogers, .i/2.-,/c;o.

Irio Jlrmornnduni from *\. II. Rclmont to I,. \-. l%~~ardm:ln. S/28/X. I). 4. Ii’ Lron Grrrll trstimong. 9/12/T.;. 1,~‘. GS. I” M~wiornntlun~. William Lorl~, Assistant (‘ommit;sic,iit~r. C’oniI)li;riiw to Dem.

.J. Rnrrou. I)irwtor of .\lltlit, ll/:X)/(il. I” JIeiiior:~irtlnlil. Attorney *\ssistnnt to (‘nmmissiou to Dirrc.tor. IRS Audit

Division, 4/2/W

Page 70: Church Committee: Reports-- Book II

54

p~~ogrmns in 1969-1973. the): were a si:pificwnt tlclmhre 11,~ the IRS from normal rnforcm~ent cmteria fos nlvcstigating persons or, groups on tile l)asis of information indicating noncoml~linnce. 137 directing tax audits at individuals antl,groulx solely lxxause of their political beliefs, the Ideological Organwations 12ndlt Project (as the 1!)61 pro- ~I’:1111 \vas l<llowll) 1’4 cstal~lislrctl 3 l)recetlcnt for :I far 111ore elal)oratc progran~ of targeting ‘btlissitlcnts.” 1’S

4. ;lcco7inttrhi7ity trtitl C.‘odfl307 During tlic (‘oltl War lwriocl. there were scriolls wxl~ncsscs in the

system of :lccoiuitabili~y and control of tlonirstic intcllipcnw acti\.ity. On occasion the executive chose not to con1l)ly with the will of (‘ongrrss with wslxct to internal sccllritg polie~ : c qntl the (‘ongrcssional attempt to cscl~~tlc I-.$. foreign intelligence agencies froill tlonwstic acti\-itics was erntlctl. Intelligence agencies also contlucte(1 covert l)rogran~s iii violation of laws 1)rotecting the rights of ,1nicricans. I’rol)leii~s of ac- countability U-crc co~iil~oui~tletl by the lack of cffccti\,c congressional o\-crsight ant1 tlic \-qwiirss of csecuti\-e o~~~lers, \vliicli allon-et1 intelli- rreliw npciwics to ewapc olltsitlc scrutiny. c--

n. The Emcqeury I)rfc ~Ifiou Acf In 1946. four years hforc the I+hergcncy Dctcntion A\ct of 1050

was l)assed, the FBI ad\-ised Attorney General Clark that it had secretly conipilctl it sccwrit> intlcs of ‘*l~otcntinll,y tlaiigerons” per- solls.‘i” The .Justiw Ikl~art~~wnt then nradc tcntatlrc l)l:~~ for enter- gencv tletcntion basctl on suspension of the privilege of the writ of llabeas corl~us.*~~ I)cpartnwnt officials tlclihately a\-oitletl going to c’oiqpess. ntlvising the I;131 in a bbl)liiitl 1ii(‘i1lol.a1idli1li :”

The present is no time to seek legislation. To ask for it woultl only bring on a loud ant1 acrinionious discussion.liq

In 1950, Iiowxer. (‘ongess lwxd the Eniergency Detention Act which cstablislwtl standartls and l~rocedurcs for the tlrtrntion, in the event of war, invasion or insurrection “in aid of a. foreign enemy,” of any l~erson :

as to whom there is reasonable ground to belie\-e that such person l~robal~lyv will eligage in, or 1)robably n-ill conspire with others to cllgagc iu, acts of cspiouage or sabotage.

Tllo ;1ct did not authorize the suspension of the privilege of the writ Of 1l:lbcns corl)us. ant1 it l)ro\.iclctl that detained l~cixms could appeal to a review l~oartl :intl to the courts.1‘9

Shortly nftcr passage of the Detention Set, awording to a Bureau document, Attorne?- (;eneral J. IIonartl JIcGrath told the FBI to

Ii’ IRS referred to it as Tax Politicnl Action Gronps Project. It was npparently lnlwled ns :~l)ore l~y the .Toint Conlurittw on Internal Rewnne Tnsation.

I”’ SW 111’. !)4-!Hi for tliscnssion of lat(‘r IRS l,r<~#ri~l~~S. ‘VI 1\le11~ornntl~m from .T. IMgar IIoo~t~i- to Attorney General (‘lmk, 3/S/46. See

footlllltr 67 for the origins of the Security Indes in contravention of Attorney (h~ilc~r:ll Ritltllr’!: policy.

I” _\Ic~llor:~~~dn~n from alssistnnt ,ittnrney General T. I,. C’au(lle to Attorney Gen- era1 Clnrli. i/11/4&

liq &oted in internal FRI n~cmornntlnm from I). >I. I,:~dd to .J. Edgar Hoover. I /2y4R

Page 71: Church Committee: Reports-- Book II

disregard it and to L’l)roct~e~l xitli tlie 1)rop:\1~1 as prt~rionsly ontlincd.” Ikp;ll~tlllCllt of?ic~i:lls statct1 tl1:tt t11c .\ct was Sbiii conflict with” their l’l:llls. :111tl n-:15 ~‘~ln\\-ol~l~:~l,lt~.~~ 14’131 ofic~inl~ :~gi~wl that the statlltory ]“rot~“‘llll~cs~~ll~~l~ as “~wt~urst~ to tllc courts” inste:ttl of swpt~nsion of lialxxs c~oi*l”i-‘--\roliltl “tlcstroy” tllt~ir ~~1~0,gx~ill. l!“’ JIorco\-rr. tlie Secu- rity Tiitltls usctl l~roadcr A:indnrtls to (letermine “potent i:ll tlaiigei’- olisness” tli:iil tllow l)rtwriIwl iii the s;t:ttlite: alltl. iinlilic tlic ,1ct. I )cpartnlcnt l)laiih l)ro\-itletl for issuing a Jlastcr Scarcli T~:ll~~allt and :I ,\I:lstcl~ A\lTtst ~I~alTallt.‘!” ‘I’\\-0 slllFqwllt A~ttolxc~s (;Cllflxl

t~i~tlor~3td the tlccisioli to ignore tllc I+~nlergentyi I)etenti0ll .\t*t.“”

0. lT~if7/ho7t7iliy /l/~olw///fiol/ Sot onl\- tlitl tllc I;ISI ant1 tile .Jllstice I)rpartn~ent jointly krcp tllcii

Iloiit~oiiil~linilt~~~ wit11 tlir IMention A1ct secret from Congress. lmt the !‘III I\-itlil~eld inilwrtant asj)et*ts of its l~iyyani froni the AItt0121cy

~hwixl. FBI lwrsonnel had hen instructed in 1949 that : no mention liiiist l)e matlc iii any invcstigatire rcl)ort relating to the classifications of tol) fnnctioiinries and key figures, no1 to the Dctcom and Cornsal, Progral~ls, nor to tlw Security Tntlrs or the (‘ommuiiist Index. ‘I%.3 invcstipatirc l)roct- dues and administrative aides arc confidential and slionld llot be known to an\- ontsitle agency.‘!‘”

FI31 documents indicate that only tile Security Index was made I~nOwll

to the .Jnstice Dcpartmcnt. Iii 1%X, the FBI tightcnctl formal stanclnrds for the Security Index.

redwily its size from 26,lf4 to 12.870 by 1958.19-’ However, there is no indication that the FBI told the Department that it kept the names of persons taken off the Security Tntles on a Communist. Inclcx, lxx:~nse the I3urenu l~eliered siicll persons remained “potential threats.” lgaa The secret Conununist Index was renamed the Reserve Index in 1960 ant1 eslxuided to include “influential” persons deemed likely to “aid subversive elcliients” in nii cmergtwq because of their “sub\-ersive as- sociations and itleolog,v.” Sncll individuals fell under the following categories :

Professoi5+ teachers. niicl cducntors : labor union organizers and leaders : writers, lecturers. newsmen and others in the mass metlia field : lawyers, doctors, and scientists : other po- tentially influential l~ersons on x local or national level ; indi- viduals who could potentially furnish finnncinl or material aid.

loo .\Iemorandnm from A. H. Belmont to D. 31. Ladd, 10/15/52. ‘81;\Ien~o~andnm from n. 11. 1.ntltl to J. Edgar Hoover, 11/13/X?. “’ ~Iemor~ndun~ from Attorney General James JlrGrnnery to J. Edgar Hoover.

1 l/?.j/Z:! : memorandum from A1ttorney General Herbert Brownell to .J. Edgar Hoover. 4/2i/33.

lM SAC I,ettcr So. 07. Series 19-U, 10/19/W. Field offices gnre special attention to “ke>- fkures” and “top functionnhrs” of the Communist Party. The “Cornsal)” l)rogmm concentrnted 011 1)otentinl Communist nnbotenrs, and the “Detcom” pro- gram uxs the FBI’s o\vn “priority arrest” list. The Communist Index was “a corn- wellensire rompilntion of indiritlm~ls of interest to the internal secllritF.”

‘“I ~~emornlldum from J. Edgar Hoover to Attorney Genehl Brownell. 3/9/5!j : ~~~t~l~~nr:lixdlii~~ from .J. F. Bland to A. H. Brlmo~~t, ‘7/3O/.jS.

I”’ Xworandnm from -1. II. Belmont to I,. \-. Boardman, l/1.4/35.

Page 72: Church Committee: Reports-- Book II

36

of tliis list is illllstratetl l)y the incl&ion of the names of author Sornian Jlnilrr ant1 a professor 7~110 merely praised the Soviet Union to his ~1~s.~~”

In addition to keepin g these 1~1qyxms secret, tllc FE1 witl~lwlcl infoi2lintion :ihllt cq)ion:ige froni tllc ,JIl+ticc Iklxlrtlllrnt OJI at least two occasions. Iii 1946 tlw I;I<I liatl “itlcntifietl o\-er 100 lwi*5ons” whom it “s~qwcte~l of being in the Go\-crnnicnt (‘oiiiniiinist I~iitlcrgro~~~~tl.” Seitlier this nuniber nor any names from tliis list were given to the Ikpartmciit~ lwanse Director IIoo\-cr feared “leaks.” a/id hause the Bui~enli coiicetlctl in its internal documents that it did “not have cridcncc, n-licthw admi~sil~lc or othrr~vise, wflecting actual member- ship in tlic Communist I’arQ.” I96 Thus the Hurean’s “snspicions” were not tcstrtllry ontsidc review by tile ,Jllstice I)cpartment zwtl the inresti- gatiolls collld continw. In 1!51 tile FI31 again witllllcld from the I)cpi~tment naiiies of certain espionage wbjccts “for security reasons,” since disclosure “woid~l dcsti~oy chances of penetration and control.” loi

I:\-en the I’resitlciit’s ‘l’e~iil~oixi~y (‘ollmiiskioii 011 Ihil)loyee Lo,wlt~ coultl not, get highly relevant infornlation fro111 tllc I~m~ral~ FBI AS- sihtant I>ircctor I). ,\I. I,:idtl told the C’omiiiission in 1040 that there was a ~~hiil~~f:iiiti:tl*’ :iiiioiiiit of (‘oiiiliiimi5~ “infiltixtion of the pv- ermiieiit.” ISlit Latltl tlec~liiic(l to aii~n-er ~licii (“olliiiiis~ioii iiiciiihrs nkctl for iiiorc tlctail:, of 1’131 iiitellipwre operations illld the infor- mation wliicli 5ci~vctl as tlie lxisis for his clinixctcrization of tlic cs- tent of iiifiltration.“” The (‘oliriili~5ioii l~i~el~:~rcd a lid of qiwtions fol tlic FIST ant1 :1k~1 that I)ild01~ I IOOVC~ ;rppear in l)erson. Instead. A1ttOIYlc~ GC~Il~l~ill (‘lark lllntlc :I11 “iiifwmal” appenrnnce ant1 supplied a r~ic~iioi~:i~idii~ii dating that tlic niiiiil~~r of “s~il)wi5ives” in govern- ment, lint1 “not yet rc:~cllrcl scriolls l)roportions.” ht that the possibility of “eren mif disloyal pri5oii” “swioiis threat.” 19n

in govei~nnicnt service constituted a Tllns. the I’rc~itlcnt’s Conmiission chose not to

insist upon making :i serious crnliutioii of FI31 intelligence operations ol’tllc Pstcllt of t11v dallgel~.

( 1) J71yur (“outwl~c (1~ C’I. I.-Tllc \-;y~~rncss of Congress’s I)JY- Iiibitioiis of **iiiteiwil scclirity fiiiictioiis” 1)~ tlie (‘IA1 left room for tlic

Page 73: Church Committee: Reports-- Book II

A\gC1lcy’s sulm?queiit tlomcstic actix-ity. &\ restriction against. bbpolice, 1:lw ~~Jlff~J~f~~~lll~llt or iiiterii;~l scc~iwity fluic~tions” first nplxxrecl in I’mitlrnt. ‘~l~~~rl:~n’s ortler establishing the (~‘entml Tntellipence (;mllp in l!Gfi.‘“’

(h~~lt~~l ~-i~~~~I~~~~l)~ll~~. tlleu I )ircctor of (yelltlxl Tntellipcnc~e, testified in 19-G tll:lt tllis J~c~~tJ~ictioJl n-as iJltcJJtl(afl tf) ‘*dJxn- t]lc 1iJJpS very

sll:q~l~ l)ct\\.ccll t11c (‘I(; ;111cl t IlC I;I{I” :llltl to “assllre t11at the C’cntlx1 Tlltelli>c~llcc~ (~VOII~) c*;ln I~PV(‘I’ IKYY)I~I~~ a (;cstal)o or security IJolicc.” xl?

Svctvt:lr\- of tllc S:l\-v .Jmws Fowcstal testified that the Ci_1 woultl be ‘.li~~tite~l‘tlrfiiiitel~ tf; ~~iiiyfhcs 0JLtsitlc of tilis country, except tlie col- lection of information gatliewtl by otlicr government agencies.” The IT111 woiilfl 1~ wlif~fl iipoii b*ff)J. floJJlestif~ activitirs.” 2o3

111 tliv IIorw floor tlchtc (‘ongms~n1:1n Holifieltl stressctI that the \\-orlc of the CIA1 :

is strivtlv in the ficltl of swwt foreign intclli~elice~\~llat is kJi0\~1i :iS f*l:1ii(kstilw ii~trlligcilcf~. Tlit>\- liave no right in the clomestic ficbltl to collcck iiiforiiiatioii of’2 cl;tiitlestine military natuw. They can evaluate it ; )-es.20’

(‘oli~cqiifJltl~-. tlic Sational Security -\ct of 1947 pro\-ided specifically t11nt t11r (‘I*\

sllxll ha\-c JJO 1Jolice. siibpo~~Ji;~. ~~l~~--eIlfO~~Cfll~~Jlt powers. 01

internal security flln(~tions.““”

Ilowever. the l!GT -1ct also coJit:iincfl :I \-n,~uc a~itl iu~definetl tlllty to l)rotcct, intclligcncc “SOIllYx’S :lJld nlc~tllotls” which later was usctl to justify cloincstic activities ranging froin electronic surveillanw ant1 break-ins to penetration of protest gr~ups.~“”

(2) Dl,lrq ?'estiHq trod ~?OWI' f’r0q1?/m3-111 the (WJ’1y l!),i()s. the

(‘1.i brgnu :I prograin of slu.reptitioilsl?,testing c*lwlliical alit1 bi?logi- cal llx~teria~s. which iJiclutlctl tlI’iig tcstlii~ 011 iiJl\\-ittillg L~lllerJcalX5.

Tlie esisteilce of sucli a prqyxul was kept secret because, as the CIA’S Tiqcctor (heixl wrote 111 19.57, it n-as iwcessnr~ to “protwt opel’-

LltiOJlS fro111 CY’X~‘OSllJ’f’” to “the hiciimii public” ns well as “eiieiy forces.” Public. lmo~lcdgc of the (II,Y’s ‘bunetliical aid illicit :ict,lv- ities” was tlio~lglit. likely to ha\-e serious ‘bl~oliticnl repercussions.” 3x CIA drug csperiiiieJJtfm tlisrrgartlecl instructions of their superiors within the ,&wc,v nut1 failed to take “i~easonnblc pwcautions” wlie,n

“” I’residentinl IJirectiw. (‘norflillntic)n of Feflf~ral Foreign Intrlligencr .\ctiri- ties, l/22/46, 11 Fed. Reg. 1337. Fears that ;I foreign intelligence agency ~n~ld intrude into domestic matters went tmcli to 1944, sullen Genernl Willinnl DonO- van, hrnfl of the Officc~ of Stmtfy$c Serrices (the CI.\‘s wartime predecessor) l~rol~~~l that OS;S Iw tr:lnsformetl from n wnrtinle tmsis to :I lwrmment “central intelligencr service.” 1Jonor:m’s 1,1:~n n-as leaked to the f’hicngo Trihwte, al- lrgcflly 1)~ I+‘RI IJircc+nr IIoover, nnfl it was flfmonnced as a “snprr spy w-stem“ which wo~dd “11ry into the tires of citizens xt hnnle.” [Corey Ford, TJo~omn of thv OS’S (Iloston : I,ittle, Brown, 1070), 1~ 303-301.1

“’ Hearings before the Senate ,\rmcd Services Cmnmittee On S. 758, SOth (‘ong. ( l!H’i) ( p. 457.

‘03 Hearings l)eforc the Honse Cnmnittee on Expenditures in the IheClltiYe Ikl~nrttnents on 1I.R. 2319. SOttl Cow. (19473. p. 127.

*“’ 93 Cong. Rec. !J430 (1947). zgr, -50 I’.S.(‘. 403(d) (3). ?‘” SW 1q,, 102-103. ?“’ Inspector General’s Report on tllv Tr~clinlcnl Sewices IXrision. Central

Intelligence a\\gency. 1957.

Page 74: Church Committee: Reports-- Book II

58

Thronghont~ the cold war period. the intclligencc agencies used covert techniques n-hich in\-atlet lwxsoii:~l l)ri\-:q to execute their vn.gw. uncontrollrtl. and o\-erly broad m:uxlnte to collect intelligcncc. 1ntelligcnc.e techiiic~nw wcrc not l~i~ol~rrl~ controlled bx. responsible authorities: sonw of the technicpies wire misnsctl b\- senior adminis- tration oflicialy. On the otlicr 1i:u~d. the I1atuc of the programs- and, in some casts. their \-cry existence-was often conccalcd from those authorities.

II. Conznzunicutiom Z~tei~cptio7z: CIA-i ntzd NSfl L)uring the 19.50s the Criltral Intellipnce Agency instituted n.

major picogram for openin, w mail bet ween the I-nitcd St&es and the ,So\-ict 1 n10n as it pissed throngli postal facilities in Xew York CitT.“” T -( tl \I > 0 ier short-term CIA projects in the fifties also inrolvcd the. opening of inteniationnl mail within the I-nited States, through access to Customs Service fncilities.213 JLorcol-er. in the late l!Mk t.he I>cpartment. of Defcnsc made arrnngeliicnts with swcral communi- c&ions companies to rccriw internationnl cable. traffic, reinstating 8 relationship that, had existed during World War II.?** These pro- grams violated not only the ban on internal security functions by foreign intelligence agencies in the 1947 Act. but also specific statutes protecting the privacy of the mails and forbidding the interception of co11iIiiiiliicat,ioiis.?‘j

ma Memorandum from the CL\ General Connscl to the Inspector General. 1/5/w.

?O” V.S. ArrnF Intelligence Center Staff Study : Material Testing Program EA 1729, 10/1s/ao.

‘I” CT-I Inslwctor General’s Reljort. 1063. “’ This issue is examined more fully in the Committee’s Report on Foreign

and Militaryi Iatelligvnce Avtivitics. ‘I3 Jlemorandum from James Angleton, Chief, Counterintelligence Staff, to

Chief of Operntiolw 11/21/55 (attacl~ment). 213 CIA Memorandum rv : Project SETTER, nndatrd (Sew Orleans) ; Uemo-

randum from “Identity #13” to Deputy Director of Security, 10/9/.ji (Sew Orleans) : Rockefeller Commission Staff Summ:lry of CIA Office (Hicer Interyiey, 3/lS/T.Z (Hawaii).

I”’ Robert Ah~tlrcn-s. Spwi:ll .\ssist;lnt to the General Counsel, Del)nrtmrnt of Ibffwsc. testimony. 9/23/T>. 1,1,. 31.-40.

x2 1S l..S.C. liOl-1’703 (maill ; 47 IT.S.C. G0.j (Federal Commwlicntions ‘\ct of 1934).

Page 75: Church Committee: Reports-- Book II

39

\Tllile their original purpose was to obtain foreign intelligence, the 1)1’0gramS freque~~tl~~ (lid not distinguish betwwn the messages of for- eigners and of ~\~~lc’l.i(‘ilils.~“’ Furt licrn~ore, 1,~ the late fifties and early sixties, the CL\ and SS.\ were sharing the “take” with tile FBI fol domestic intelligence l~~irlwsc.;.~~~

In this lwriotl, the (‘I&\ opened mail to and from the So\-iet I’llion large!y at raiido111. iiitercel)tiiig letters of ,1iiirricaiis iiiirclated to for- eign mtelligence or comnterintelligence.218 After the FBI learned of the (-‘I-\ l)rograii1. it lr\,ird reqwsts in certain categories. -\part from foreign c.o~llltc,rilltc~llig~,llc~~ criteria, the 13uwan expressed interest, in letters from citizens professing ~‘l”‘o-Commluiist sympathies” ‘lo ant1 “data re I-.S. peace groups going to Russia.” 220

7’11~ secret al’i’:lii~C~iifiits wit11 c:il~le companies to obtain col)ies of iii- ternational tixfic ux’re initially ai~tliorized 1x Secretary of Ikfrnse .Tarnes Forrestal and *\ttornc\- ‘(;eneral ‘I’ol~l (“lark, alth&$ it is not clear that they knew of the interception of -1merican as well as foreign iiicssages.““’ ‘l‘lw~- dt\~eloped ii0 formal legal rationale. and their lateI*

successors were lie\-er consulted to renew the autllorization.222 The (‘IAt sought no outside :\utllol~izatiol~ before instituting its mail

opening program. Several Post Wice oflicials were misled into belier- inp tllaf tllc (‘TA1’s rql~est for address to the niail onlr involwtl esaming the exterior of the envelopes.‘23 President IGxmed~~‘s Postmaster Gen- eral, .J. T~~dward I)ay, testified that 1~ told (‘IA Director ,111en Dnlles lie did not want to “know anythin, (r al)oiit.!’ what the CIA was doing.2z” I~cvond mitlocumrnted assuml)tions by (‘I.1 officials, there is no evi- tlrlk that the President or the ,\ttornev (knrral v-as ever informed about any aspect. of CTA mail-openin, G operations in this period.225

‘la (‘IA\ liiel1io~r:i11tl1111~ “For the Rewrtl” fronl Tllomns B. A1l)erlIntlly. X/‘?l/fil ; Dr. IA)uis Tordella. former Deputy Director, Sational Security Agency, testimony lO/“l/i5, pp. li-20.

I”: High FBI officinls decided to use the CIA\ mail ol)ening 1nwpxnr for “our internal security olbjectires” in l!KS. Tllf~g did not want the Rure,au to “:wsume Hiis cowmge” itself Iwr;iuse its “sensitive nnturr” crrntetl “inherent dangers” and due to its “coml~lesity, size. ant1 esl~enae.” Instead. the Rurean would hold (‘IA “resl~c~~nsilde to share their corerape with us.” (3lemormldum from .\. H. Rel- mont to JIr. Roardnian. l/L”d/X) The initial FRI recruest to SSA involved “com- lllcrciill ant1 1)erson:il col;l*llmii(::~ti(,Ils Iwtwwn *wrsc;ns in (‘UIM :lntl the 17nited Skates.” (JIen~trrandun~ from TY. R. \V;~l~nall to W. (‘. Sullivan, A\ssist:lnt Director. I kmirstic Intelligence Division. 5/1S/C?.)

‘la Abernathr memorandum. S/21/61. “’ JIeu~ornnhwu from W. a: Ikaliigan to W. C. Sullivan (attaclunent). s/21/61. ‘m JI~niorandmii from W. A. Ilrnlligilll to W. C. Sl~lli~illl. 2/lS/t2. (‘(” Select (‘ommittee JIrll~ora~ldunl,~Subject : Review of Documents at DOD Re-

garding IA’ JIEDI,ET, 9/17/X. (“IA’ _\IEDI,ET” was the C1.1’~ cotlennme for this 1,rograrn ; the SK\ codename ~~-ns SHL\JIRO(‘K.)

Fz Secretary Forrestal’s immediate successor, I,ouis Johnson, renewed the nr- rnngement in 1949. To the knowledge of those interriewecl bg the Committee. this \vxs the last instance in which the conilwCes raised any cluestion as to the auf!iorit.\- for the arrangements. ( A\ntlrews, 9/23/X 1~). 34, 40.)

--I Richard Helms ‘Testimony, 10/22/iL Hearings, Vol. 4, lx Kz. JIemorandum from Richard IIelms to Sheffield Etlwartls. 1)irector of Security. G/17/34.

2?’ .J. Edward Day Testimony. 10/22/7.X Herrrings. Vol. 4. 1,. 45. However, a coliCe~nl)omriec,us <‘I.\ mfmor:~nduni stated that “no relevant details” were witll- held from D:I.v when he was briefed in l!Kl 1)~ Cl&\ n~ffici;~ls. (Jlemorandum from RicJard Helms to Deputy Chief of the Counterintelligence Staff, 2/16/61.)

--_) IIf~Ims. 10/22/i>. Hearings, Vol. 4. *,p. 87-80.

Page 76: Church Committee: Reports-- Book II

60

b. PIYZ C’owtv! I’echiiiyuex

(1) mwtm1ric AC'llYMi77coicp.

(a) The Qrrestio,, ot’ Authority: In 1046 Atto7mv Gcnr~~al Tom Clnlk nsl;rtl Pimitlcnt T7*77777:777 th w77ew tl7e a7itllo7,i’z:7tio77 fo7. war- 7~:77ltlrs~ wiwtappi77g ibhur(l 1)~ I’wside77t Rooserelt ii7 1940. Clark’s 7~1~~11707~:771t177111, 17oW-c\-e7~, ditl not 7.rfe7, to tile portion of tllc Roosel-elt tlilw*tixx~ ml7icsh bait1 viix~taps ~1707~1~1 be liinited ‘*insof:n~ as possible to nlirns.” It st7vsbxtl tlir tln77ge7. from liomr.”

“sulmrsiw artirity here at n77cl 7Wl77rstetl autliorityv to wiretap

the dolnrstic sec777,ity.” 32(i “i7i ~asfs Ctally affecting

Tile P7~esidcnt gal-e his approval. Tr71177~71’s aidrs lntcr tliscwwiwl A\tto7,77rv Grnernl Clark% omissio77 ant1 the Prrsiclent ctonsitlerctl. hut drcicietl against. wtnrning to tluz terms of Roosewlt’s nntho7.izntion.??

111 19.x t17c suplwll~ (‘olll*t dcllollllcctl t17r Follrtll A\lllc71tll17mt

\-iolxtio77 by polic*c n-170 plac~vl :7 711ic:7-opl1o7ir in :7 Iwlroon7 in n locxl gainl)li7ig c:~sc.~~~

~Soon thr7wftcr. despite tl7is tlccision-and tlcspitr his piwlrcrsso7~‘s 7’77li77c that timpasso7y- inst:7llntio77 of hqs was in tlir “niw” of tile Fo77rtl7 ~\777entl777e77t-~\tto7.77r~r (+cnr7,:71 IIr7*hrrt ~rownell nutllorizrd tlir “niirrstrirtrd 77sr” iii the ‘“7iatioiial intrrrst” of ‘YrtspasS in tlir i7istnllntioii of 77~ic7~01~1i07irs.” 220

From 1954 nutil 19K.5. u-1~17 Aitto~77ry General Sicholas Katzenl~ach 7wo77sidr7wl tl7c policy :177d i777posed stricter regulations.230 thr FBI had misnlwi~vised disrretioii to use 7iiicrol~lionr snr~rillnncr and to ronduct s77r7~rptitions cnt7+rs to install n7ic7*ophonrs. TI771s~ the safe- gnard of nl~pimxl 1~ tile A1tto7*7irv Genrral for racli wiretap Iind lxx77 7777tle7mlt by the FB’T’s ability to’int7xdt into othr7*. oftell 7norr inti- mate co77rr75x7tioiis 1,~ niiri~ol~l7o77r “1~nggin.g.”

(h) h:‘SfPH.Yi/‘C’ c~cgyi,J</: In Ma\- 1961. Ihiwtor ITower advises1 Tkputy .1tto7,7wy Gr77e7xl I3\-7,077 JT’l;itr that tlw FE1 was usi77g”micro- 1~17077~ s777~\-rill:i7icr~s” invol<iiig “tix5pnss” for L’i7itelligr7icc pui~l~ows” iii tlir “i7itr7~7inl scc7li.ity firltl.” lrr called White’s nttriition to the 19.i4 I37-ow7lrll 777C777O7.n77d77777, altllo77pll hr saitl mic7mphones we7*c usrd “on a i~rst7~icttd Ix\sis” and cited as esaml)lrs only “Sol-iet ii~tcllipvwz agrids and (‘077i7777inist Party leaders.” 23*

Tn fact. the FBI had nl7wclv used microphone snrwillance fo7 1~7mtlr7* co\-r7qy tl7a77 Co77~7717777i&s 07’ sljirs. hidred, it hat1 “hgged” n hotrl roo171 owul~irtl 1)~ n (‘o77press7nnn in Febmary 1961. There is no r\-idrnce that .\ttoixey General Rcnned~ or Depity Attorney

zR Letter from dttornep General Clark to President Truman, +i’/l’i/+UJ. 227 JIemorandum from G. 31. Elsey, Assistnut Counsel to the President, to S. .J.

Spingaru : memorandum from Elsey to the President, 2/2/50, (Spingarn Papers. Harry S. Truman Library).

?29 JIemornudum from A\ttnrney General Rrowuell to J. Edgar Hoover. s/20/54. 111 1952 Attnruey General J. Howard JI(~Grath refused to authorize microphone surveillance involving treslxtsn because it was “in the area of the Fourth Amend- ment.” ~Memnrandum from Attorner General McGrath to a. Edgar Hoover, ._ 2/26/52.)

=” See p. 105. (The Chief Cnuusel to the Select Committee disguwlified himself from participating iu Committee delilwratinus cnnceruing either Mr. Kntzeulrnch or former Assistant Attorney General Kurke l\Inrsliall because of a previous :~ttornryclicwt relatinnsl~ip with those txo persnus.)

“I JIemornntlum from J. Edgar Hoover to Ikput~ A4ttorney (kueral Iiyrnu White, T,/A/Gl.

Page 77: Church Committee: Reports-- Book II

61

Genelxl Wllite~ were specificnll~ informed of this surveillance. But the A\ttorney General received information wl-llicll came from the “bug” ant1 :~utliorizctl :I wiretap of the Congressman’s secretary.2”3

The I’131 iii:~iiitainccl ii0 “wiitral file or index” to record all iiiicro- l~l~mc slur\-eillanws in tlii:, lwi~iotl. ant1 FBI recoixls tlitl not (listiiigllish “hgs” iii\-olviiig tresl)ass.23G

(2) -Hlnck /:“I/ ./oh.“- ‘I‘lici~ is no iiitlicat ion that any Attorner General was informed of FBI “1~1~1~ lq::‘~ jobs, and n “Do Sot File” l~roced~~re ~1s tlvsigiictl to l~iwllltlr olithl~lv ~llhco\x~ry of tllc FBI’S rb;e of the tccliiiiqric.

So periiiaiieiit iwoids wvrc lwld for al~l~i~~~als of “l~lacli bag jobs.” or suiwptitious entries cwitliictetl for piiiyoses otlici~ than installing n %11g. ” 7%~ FUI has hci~ild the l~~wwd~~l~t~ for aiitliorizatioii of Slw- rcl~titioiis entries as rcquiriii, 0. the :il~l~iw\-al of I~irector IIoo\-er or his ,h3sistaiit C’lvtlc ‘I’olson. ‘I’h arltllorizing 1ii~1iiol’:illdllll1 was filet1 iii tllr .\wist alit I)i’ix~ctoi~‘s ofKc*c 113i~lcr :I *‘I>0 Sot I~ilv” l”.occ~lllrc~. alltl tllelY-

A\t the instruction of ICwc+or IIoover, tlir I:lirc~;~u itlatalltd a mi~rol~liont~ ill tile ll~,tt~l room to rwc)rtl this meeting. ( I.‘l<l ~llt,lll(~r:llldlllll, L’/l.G/til : .\Irmo- I.illldlllll flYIll I). p:. l\Ioorr to A\. II. I~r1111011t , 2/lc;/c;l. 1 The rtwilts of the mwl iilg n-ere sul~scqucntlg tlisscmiimted to the .~ttomr;r Gr11rra1. (JIellloralldn1ll fro111

.J. I*:dgar Hoover to .ittornry General Kennrdy, 2/1S/til.) h re\-i\v of this cxse 1)~ E‘I$I officials in 1fMi ~ouclndrtl that “our files cniitain

iin clrar indic:~tion that the -1ttoriir~y (klt~ral was slwilically advised that n microphone sur~rillancr was Iwin:: Iltilizetl. .” ( JIrlllor:tlldnlll fro111 \~:lllllnll to Siillirau, 12/2l/(iti. 1 It \vas noted, liowc~rrr. that 011 the morning of Febru- ;~rs- 17, 1961-after the microphone was ill place lbut ml hour or twn before the mreting actually occnrrrtl--l)irt,~tor IIoo~er slwkc with i\ttnrnry (:ener:il Iieiitiedy rind. arcording to IIooT-er’s ~c,lltellll,clr;llleous iiiei1loraIidiilii. :idrised him that the (‘noley meeting was to take l)lncr that day 2nd that “we are tq-iw to coyer” it. (Memorandum from .J. Edgar Hoover to Mrssrs. Tnlsnn, I’:~rsn~ ,\Olllr‘ Rellllollt, and I)eI‘nncll, 2/17/61.)

“’ Acrnrdine to records comniled hr thr FBI, there was FBI microvhone sur- veillance of one “black sepnritist g&p” iii 1960 ; one “black sel,nm~ist group” ilIlt one “black separatist group functionnr~” in l%l ; two “lbltlck separatist gi-~nllw,” one “black separatist groul, frmctinnary,” and one “(white) racist organizntioii” in 1W2 ; and two “blnck sel):iratist groups” and one “black wl)aratist grnnl, fnnctionnry” in 1963. (Jlemorandnm from FBI to Select (‘om- mittre, 10/23/7.X)

z:S The Select Committee lms determined that the FBI, on at least niie occasion, maintained 110 records of the am,roral of a micwmhnne snrwillnnce authorized by an Assistant Director. ( FBi ~l\~moraiidnxn. l/~O/X, Subject : Special Squad at Democratic Satinnnl (‘onvrntiou, .\tlantic City, Sex -Jersey, S/L’“8/64.)

““Memorandum from the FBI to the Scnnte Select Committee, 10/17/75. This memorandum also states that, 011 the I):lsis of the rwollections of agents and a review of hcndqunrtt~rs files. the FBI 11ns “been nblfb to identify” the following number of “surreptitinns entries for microphone installations” in “internnl sfv~urity. intelligrnc~c. nntl ~oluntcriiit~~lli~eli~~~” iiirestigltions : l!WiO : 49 : l!YX : ti’< l!Xi:! : 75 : 1903: 79; and the followin, . . q nnmtwr of such entries “in rriminnl inYestig:ntions” (as ol~x~srd to intelligence) : 1960: 11 ; 1961 : GD: 1x2 : 106; 1’963 : s1.

Page 78: Church Committee: Reports-- Book II

T11c :,l,tllol,i%~ltiol, for wil&:lpl,illg issued 1)~ T’rrsitlent. T~~un~nn in 1946 allowed the -1ttoriirT Gencrnl to nppore wiretaps in tlir inr-csti- @ion of “subversi\-e activity” to l)rotec+ tlie “doincstic security.” ‘242

23QIemorai~dun~ from the FBI to the Sennte Select C‘ommittre. O/93/75. ‘.‘* Jlemor:~ntlnm from \V. (‘. Sullivan to (‘. I). IkI,o:~cll, 7/19/G& Snlbject :

“Rlnrlt Rnq” .Tol~ Initials on this memorr~nd~m~ intlicnte that it was wem1red

sllortly i,&fc,rtl Iris de:ltli. (Helen Gmidy deposition, 11/12/75, pp. 4-O.) Tllr FBI wml~iletl :I list of t lie *‘domwliv sul)rt~rsirr” t:rrpt+s, I~;laetl “rlpoll

Tile list states “nt least f,,llrttwi domestic sill,;-ersike targets n-t;rr tlie 5:nlbjwt of at 1e:rt 23s eutritls from l!M:! to .1l,ril 1%X Ii1 :l(ldition. at lwst three domestic

Page 79: Church Committee: Reports-- Book II

63

,\_ wiretap on an official of the Kat.ion of Islam, originally nntl~orized I)v -1ttorney (heral Herbert ~rowncll in 1057, continued thereafter u’it.llout rc-:lutliorizntion until 1!X~5.24” -1ttornry General Robert. ICrn- nctl~ :tpprow(l I~‘I\I rccpcsts for wiretaps on a;I Allnlzun;~ Klan leader ill lC)(j”, lil , ? and on 1)lack sel)aratist group leader JIalcolm S in 1064. 2Ar, Kenneyl?; also authorized wiretap coverage requested by the Warren (‘onlniis~ioii in l!Ki4.2’f~ I<cnnc~l~‘s nl~l~rov:~l of FBI requests for wire- taps on Dr. JZartin Lutl~er King and several of his associates are dis- cusetl in,greatcr detail elscwliere in the C’oininittee’s report.2Ji

h ndclition, ,Utorney General Kennrcl;v approrcd wiretaps on four Ahcrican citizens duhg investigations of “classified information Iwks.” The taps failed to disco\w the SOIII’CCS of the alleged “leaks” and involved pro~cdnral irregularities. In 1061 Attorney General Kennedy told Director Hoe\-rr that the President wanted t’lle FBI to determine who WIS responsible for an apparent “leak” to Se\Tsweek reporter rliOyci Sorman, nnthor of an article about. American mili- tary plans in G~rmany.~‘~ Ijut the ,btorney General was not asked to approve a wiretap on Sonnan’s residence until after it, was installed.

Ahcording to contc~lll)~~~~~lleo”s I<nrcall mcmornnda. wiretaps in 1962 on the residence of Sew Xr-ork Times reporter Hanson Baldwin :Intl his secretary to determine tlic source of an article about Soviet missile sites were also iiistit1lted without prior written approval of the ,Utorney General: and one of them-the tap on the secretary- was instituted without the Attorncv (+eiieral’s prior 1~now1edge..*‘8 Kennedy’s written approval was olk’aintd, however, three days after the Baldwin tap was installed ant1 four days after the tap on the secretary was installed.2z0

The pattern. including ex IMS$ facto approval, was repeated for wiretaps of a former FBI agent w-ho disclosed “confidential” Bureau information in a pul)lic forum. Tile first tap lasted for eight days in 106% ant1 it w-as reinstituted in 1963 for RJI m~determined periodS2”’ Attorney General Kennedy v-as advised that the FBI desired to place, the initial coverage; but he. was not informed that it had been effected the day before, and he did not grant written approval until the day

*” JIemornndum from Iioorer to Brownell, 12/31/56. *” Jlcmornndnm from Hoover to Kennedy, 10/9/63 “’ Memorandum from IIoorer to Kennedy, 4/l/64. ‘* JIemnranclum from Hoorer to Kennedy, 2/24/64. “‘See Findings C and G and Committee Report on the FBI and Dr. Martin

T,nthrr King. .Tr. M JIemorandum from R. D. Cotter to IV. C. Sullivan, 12/15/66. On the SRIIIP

(lay. and without specifir authorization from the Attorney General, the FBI l)lnced a wiretap on Sot-man’s residence. Attorney General Kennedy was informed of the wiretap two dars later, and ngprored it the following da.r. (Memnrandnm from J. Edgar Hoover to A\ttnrney General Kennedy, 6/S/61.) The tap rontinned for four da.rs tinti Sorman went on \-ncntion. (Memorandum from S. B. Dnnnhoe to W. C. Sullivan. ‘i/3/61. t At no time did this or any other aspect of the FBI’s inyestigxtion prndure any evidence that Sorman had actn- ally obtained ~lnssifird information. An FBI summar.r stated : “The majority of those interviewed thought a competent. well-informed reporter could hare writ- ten the article without having reriewed or received classified information.” (JIeniornndnn~ from Cotter to Sullivan, 12/15/66.)

w Jlemornndum from .T. Edgar Hoover to Attorney General Kennedy, ‘i/27/62. “031emorandm~~ from J. Edgar Hoover to .\ttornep General Kennedy, 7/31/62.

The tap on the serretary lasted three weeks, and the tap on Baldwin a month. Jlemnrnndn from W. R. Wannall to IV. C. Sullirnn, X/13/62 and R/28/62.

*X ITnaddressed memorandum from A. II. Belmont, l/9/63.

Page 80: Church Committee: Reports-- Book II

64

it was trrininatrd.“’ It nppears tlint only oral nnthorization wns ol)taiiictl for rrinstitiiting tlrr t al) in l!KS’“”

Tn Frbrnar\- 1961. ~Mmq- ~;enc~xl Ihnrtl~ rrcpr~~rtl tlir FBI to initiate an ii,\-estig:ltion for the puqmsr of flcvrlopiilg:

intrlligrnm data wllicll wo~iltl pro\-iflc Pwsiflcnt Kcnnccl;v n pictlirc of what n-as brliind piws~iws cscrtecl on l)cllnlf of [a forf~igii coiiiitiy] wgarflin g sligar qllota tlclil)ci,;\tions in Con- gress . . . in f~oniicf$ion wit11 lwnfling siigar lcgi51ntion.2”’

This inwstigntion lastrd nl~l~roxinintel~ nine weeks. and w-as rein- stitutrtl for a three-niontl~ lwriofl in niifl-1962.

,1ccortling to an FBI nxmorandun~ tile ,\ttorney Grnrrnl author- ized tlir v-iretaps in 1961 on the tlirory that “thr aflniinistrntion has to act if nioiiw or (Gfts are being passe~l by the [rrprrsentatives of a foreign coiint;*v].“77Z Specifically, he al~l~ro\ml wiretal)s on several Alnlerican citizens: tllrrc oflicinls of the A\griclllture Drpartnvmt (resi- clriicrs only) : ?lG tlw clerk of the TTO~ISC Connnittee on ~~gricnltnrc who m-m also srcretnry to the chni~iiinn (wsiflcncr only) ; ‘ST ant1 a Wg-

isteretl agrnt of the forrip coniitr\- (hot11 residence and lmsiiirss tele- p1ioi1es).2”S ,\fter passage. of tlic ,~flmiliist~ntioll’~ owl s;ug:lv IGIl in ;\pril 1961. these wirctnlx5 werr fliscolltiiillrcl.?“!’

‘I’lw invrstiption n-as winstit ntrtl in ,Jnnr 1962, wllrn tllc Bwenu 1r:wnrtl that rrl,l.csciit;lti\-cs of the 5:;1331e foi~rigii cowitrv iiCgaiii niiglltj hr iiiflli(~iif*iiig congx5siollnl tlrliberntions coiicr~ming in anieiihent to tlifl sugar q~iot:~ lrgislatioii.“‘“’ -Utornry Grneral Kennetly approved wirrtaps on tlif> office trlrl)llolle of an attorney lwliel-et1 to be an agent of tlir foivign cmuntry and. apin, on tlif> iwitlrnce telephone of the Clerk of the 11011s~ .\gricllltuw (‘(oll~l~littrf~.““’ ‘The latter tap continiwtl for olw month, but the foimrr al)pi’f~iitly lnstcfl for tllrce nm11tllS.2””

“’ Jlemornnflum from J. Etlgnr Hoover to .\t torncy General Iicnuedy. 10/19/62. 2;.3 l~nnddressefl iii~ii1~)r:1i1d1ii1i from “ll~vg” (Director IIooT-fir’s scf*retxry was

IIfile~i IV. Gallfly), 1/9/f%. This mcmornnfllll~l rf~atls : “Mr. m1111011t c:1lletl to SW ( C’~~urtnc~y) Erans spoke to the Attorney Gt~nt~rnl relblncing the tech on [former FBI acent] again. nnfl tllfx A\ttc,rnty Gel1f~ral aid 11.v all nlenns flo this. Mr. Ibl- n1ont has instrnctrfl Sew Tork to do so.” C Assistant Director Courtllry F:r:lns \Kls tlirt I<‘lII’s normal liaison with .\I tomcay (:cller:fl Iielnletly.)

‘x JIemnralldun~ from TV. Ii. Wnuall to W. C. Snllir:in, 12/2’2/fiF. Tlle HllgZfr I,ol)lby inwati~atinn is also fliscussefl at footnotr~ 33.

“& ZIf~inor;intl~ui~ frnin .\. II. Ilrlmollt to .\lr. I’arsons. Z/14/61. 2mfi 3Irinornntl~ini from J. Edgar Hoover to .Lttornry Gmeral Kenllfdy, Z/14/61. “’ JIe~~~nr:~dmu frmn Hoover to tllra .\ttnrncy Gcnc~r:ll. 2/16/N. zi9 JIf~lllor:lllflnlll fro111 IIllo\-f’r to 1llC ,\t torllf~r (:cllc~r:ll. “/l(i/(il.

not ff~f~l there wls justification for rontinuing this f~stf~wire illrestigntion.” (JIcmoranfluiii from c’. AL Evans to Mr. I’:\rsons 4/14/(il.) ‘I’lie iurcstigation did cliscovcr l~ossil~lg unlndul influewf~ n-as I)fai1ig exf,rtefl IJ~ rq~wsentntives of the fowign ronntry inrolrfd. I~nt it tlifl Ilot rt~vf~rl tllat mollry \wd :fctllillly Ibeiiig pnssefl to nny Executive or congrwsiolml offivinl. (1Iemornuflum from Wnmmll to Sullivan, 12/22/W)

“‘” I+‘III letterhe:~d m~moranfl:~. Q/1.5. 1 S. l!),/tiZ. n1 ZIemnrnndum from J. Edgar Hoover to the .\ttnrncy General, fij%/tX ‘“’ ‘l%f~ wiwtap on the Howe Conin!ittcc Clerk 11nd “l~rodl~ccfl no information

of T-aluc.” 1Tllile therf~ is 110 illflicntiol1 that the other wirf+:llbs. inclrltlillg five flirf~ctfd at fnrf4gri tnrgets, Ibrnducc~fl f~riflellce of :1ctn:tl ~myoffs, they (lit1 rcrcnl that lw~sil~ly uulawful inflnclicf~ uxs :Ig:ilill Iwill:: f~xf~rtefl IIF tl1ci forckigii god- f1171111f~111. nnfl intf~rmil I<llrt~:fl1 l)f~rnlis<ion x:18 c~lbt:~iuf~fl to (.olltilllle them for sixty tl:rys Iwy~~Ilfl thfl initi:ll thirts-flay lwrlotl. (JIf,il1c,r:lllfln111 from \V. IL. \Vall- mill to IV. C. Yulliran. 8/l(i/ti2. \

Page 81: Church Committee: Reports-- Book II

Iw’ h \YhitP IInnsf~ “brieflug lbalber,” l~rrlutred in I”ebruary 1961. stated. “It is thollgllt by snulc iufonned obwrvers that the nutcnulc of the sugar legislation wllic*h comw 111) for rellrn-nl in the I-.8. (‘onzxw4s ill Mnrch 19til \vill be all- iul1mrtant to tile future of Y.S./ iforcipu coGtry) relations.” ( JIrn~oranduu~ froul Kic~liartl AI. Iliswll. .Jr. to ;\I~(kwrgc~ I{lu~tl.\ , L’/lT/(il.) Another White Houw “briefing 311e1i1~)r:1ii(liiii1” in Jnue 1%X stated. “The action takea Iby the House of Representatives in l):lsAng the IInusc .\gricultnre (‘oumittee Ililt (The (‘ooley hill) has created a furor iii tllrb (foreigu country) . .” Officials of that country said that the legielntion “\vonld 1)~ disastrous” to its “economy.” (Jlenmrnnduui froni \Villi;lm II. Brlllwvlc to .\Iv(:ec~rgc~ liuutly alit1 JIycr ~eldnlnn, (i/23/62.) (.JE’Ii I,il)rarg.)

x The circwnstances indicntike tliis nosail~ilitr and the ereutunl dcterniiua- tiori that the nllegatiou was n~if~~~iiitl~tl~nrc set ‘forth in n u~eumrnuduiii from I)irvctor IIoo\-er to A\ttornt,y General Iirnnedy iu 19&l. (Hoover to Kennedy, R/4/C& nud enclosure. (.Tnhu I”. Kenucdq- Librnrg) )

2ui The FBI rermestcd the wiretnu ou t!ic editor and an accouinnnvinr tan ou a \Vnsliingtnii ntforney in contact \\-it11 the editor lwcnu.se of its-co&e& aimut pnssilblp “leaks” of iuforumtinti nlmnt VIII loyalty-security iiirestigntinns of goi-ernmeut nfficials. Director FInover advised that l~nl~licntinu of this “c~lassi- fied jnfnrmitiou” constituttvl “a danger to tile intcrnnl srmritp of the ITnited States.” (~It,lllor;llltlntll from FIonl-rr to IGrtzcnl~:rcli. 4/19/C;,.) FIm-ever. in l!W Dir’ec+or IIoc)\-ctr li:ltl vollint ~cbrcvl to .\t t~~rilry- 1:cnt~ral Iitanedg information :rllout tllr 1lulbli(2tirlll of tli(s Imol; :lllt,gill:: iuillrcqlrirty. The :~~ithnr hinrsrlf had slllq~lic~tl informltioil :lll<,ut tllcx tmok t(t the Is’nJ. ( .\Iemonltltl~ from Hoowr to .\t toruey Geuer:il Ktmuedy, 7/8/G and ‘i/l.i/M.)

Page 82: Church Committee: Reports-- Book II

66

The second line of preexisting T3urrnn policy involved propaganda to discredit the Communist Party public,lT. For example, in 1946, an earlier head of the FBI Intelligence Division proposed that efforts be made to release “educat.ional material” through “arailable channels” to influence “public opinion.‘! The “educational’! purpose was to under- mine Communist support among “labor mlions,” “persons prominent in religious circles,” and “the T,rberal elements,” and to show “the basi- cally Russian nature of the Communist Party in this country.” z69 Ry 1956, a propaganda effort was mlclerway to bring the Party and Its

leaders “into disrepute before the ,1merican public.” 2yo The evidence indicates that the. FRI did not beliero that the Com-

munist, Party. n-hen the COTSTET,PRO program was formalized tin 1956. comkitutetl as serious a threat in terms of actual espionage as it had in the 1940~.~~~ Nevertheless, the FRT systematized its cortrt action program against the Communist Party in part because the surfacing of informants in legal proceedings had somewhat lim~itcd the Rure~au’s coverage of Park a&ivit ies land also ‘to take advantage of internal c,onflicts &thin the ‘Party.?;2 Covert “disruption” was also clesigned to make sure that the Party would not reorganize under a ne.w label and thus would remain an easier ,tnrget for prosecuCon.2’3

2BTTe~timnny of William C. Sullivan, Assistant Director for the Domestic In- telligence Division (1961-1970) and Assistant to the Director (197&1971), 11/l/78, pp. 4243.

288 JIemorandum from A. H. Belmont to I,. \‘. Boardman. 8./28,/56. 269Memorandum from D. JI. Ladd to .T. Edgar Hoover, 2/27/46. According to

this memorandum the underlying reason for such Bureau propaganda was to anticipate and counteract the “flood of propaganda from Leftist and so-called Liberal sources” which \vould “he encountered in the event of extensive arrests of Communists” if war with the Soviet Union broke out.

zI0 Belmont to Boardman, S/28/56. mA Bureau monograph in mid-1955 “measured” the Communist Party threat

as : “Influence over the masses. ability to create controrersv leading to confusion

and disunity. penetration of specific channels in .\merican life where public oninion is molded, and espionage and sabotage pofenfial.” [Emphasis supplied.1 (Letter from .T. Edgar Hoover to Dillon .biderson, Special Assistant to the President. ‘i/29/65. and enclosed FBI monograph, “The Menace of Communism in the United States Today.” pp. ir-r.)

The FBT official who served as Director Hoover’s liaison with ‘the CIA in the 1950s stated that “the Communist Party provided a pool of talent for the Soviet lintelligence] services” in the “30s and into the 40s.” During that period the Soviets recruited agents “from the Party” to penetrate “the U.S. Government” and “scientific circles.” He added, however. that “primarily because of the action and counter-action taken t)p the FRI during the late 4Os, the Soviet services changed their tactics and considerably reduced any programs or projects de- signed to recruit CP members. realizing or assuming that they were getting heavy attention from the Bureau.” (Testimony of former FBI liaison with CIA, Q/22/75. p. 32. )

“’ Belmont to Boardman. s/28/65. xi3 Belmont to Boardman, 9/5/56 ; memorandum from FBI headquarters to

SAC, Xew York, Q/6/56.

Page 83: Church Committee: Reports-- Book II

In the years after 1936. the l~iii~l~ose of tlic (‘ommunist Party COIX TEI.PRO chnngctl sonlcwht. Snpremc Court decisions substantially curbed criminal I)rosecution of Conmunists. 2i4 Subsequently, the FBI ‘htionalc” for C~)IXTEI,PRO was that it had become “inlpossible to prosecute (‘oiniiinnist l’arty i~~ci~ib~~i~s” ant1 sonic altcrnxtivc was needed “to contain the threat.” 273

6. Gtrl~7y z:‘~p”“sio,l of COZ‘~7’ELPZZO I~‘IY)III l9.X lInti 1%X), tllc COTSTII:I,PRO progran~ was primarily

ainlet at the Co~iiiiiimist~ l’arty organizntion. But. in March 1960, l)ai.tic,il):itin:~ FliT ficltl offices ww tlirectrd to niake efforts to pre- \-cnt Comnl,inist 5iifiltrntion” of “lcgitinmte iii:155 oiyanizutioiis, sncll as PaI’(‘llt-‘I‘(~:I(‘li(‘I. .1ssocintioiis. civil oiyanizations, and racial and wligioi!s gm~1lk3.‘~ ‘1’11~ initial twlmicjiw u-as to notify a lcadcr of the orgallimtion. often l~v “:~iion~n~oi~s conlnliiiiicatioiis,” about the xl- lrgwl Coini~iiliiist iii its iili~lst:‘y” In SOIIIC easrs~ both the (‘omiiiin~ist trlltl the ‘biiifiltratctl” orgxiiizatioii mire targeted.

This marlxd the begmning of the progression from targeting Corn- miiiiist I’:lrty IIICI~I~W~S, to tllose :~lltpedl~ nncler Communist “influ- WICC.” to persons taking positions sl~l)portcd by the C”onmunists. For csan~plc. in I%S tnrgrts untlcr the Communist Parts COISTELI’RO label included n group wit11 some Conmnnist parti’cipants urging in- creased cmployiicnt of minorities 2ii and a non-Coinnmnist group in opposition to tlw Hoiisc Committee on I-n-Abnericwn AdivitkZ7”

Tn 1961. n COTSTET,PRO opwation was initiatetl against the So- cialist Worlrci~ Party. The oripinntiiig nirniorantliiiii said it was not a “cras!1” 1”‘0~““11’ :’ and it was never given high 1jriority.2’” The SWP’S support for “such vaiiscs as (‘Iastro’s Citba and integration I)roblw~ arising in the Sollth” were note(l as factors in the FBI’s clwision to tnrpct the oiyanizntioii. The I3iirenu also relict1 upon its ass~~ssnieiit that the SJYP was “not just mother socialist groiip but follows the wvoliitionar,v principles of Xnrs. Iknin. and Engrls as intrrl?rcted by I,con Trotsky” and that it \~as ‘k freqllent contact wit11 lntcrnntionnl Trotskite pmnps stopping short of open and direct contact wit11 these groi~lx:~’ ?qO The SW’ hat1 hen designated as “snh- versivc” on the “A\ttorney General’s list” since the 1910~.~“*

T). hl-lXT,TGESCE .\SD hl\IESTIC ~ISSEST : 1%-2-1976

1. loin Ik w7opnwnf.c of the IN&l9?6 PPGOC? Twinning in the nlid-sixties. the Vnitetl States experienced a period

of clonicstic unrest and protest iuip:~r:~llclcd iii this ccntnry. Violence eriiptcd in the poverty-stricken iirban ghettos. ant1 opposition to a\mcrican intervention iii Vietnam prodncctl massire demonstrations. --

2i’E.g., I’cctC.9 r. T’nifcd Stntcs,354 T‘.S:. 498 (1057). 2x %position of Suprrrisor, Internal Security Section, FBI Intelligence

Dirision. 10/16/76. pp. 10, 14. ITo ~Iemornndnn~ from FI<I Hradqmrtrrs to Sew York field office, 3/31/60. 2ii Jlrmorandum from E’RT IIcntlqnarters to Snn Franc5sco field offirr. l/16/64. (r” JIemor~~ndnm from FBI IIradqnnrtcrs to Clrrel:~ntl field office, 11/6/t%. “’ Forty-five actions were 21,prnred 11y IcXT Hendqiurters under the SW!?

COISTET.PRO from 1961 until it was disc~ontinnrd ill 1969. The SWP prngram was then snl~snm~tl under tlics Sew T.cft (‘OISTET,PRO. see pp. SX-89.

‘* Mfworilndun~ from Director. FRr. to Sew York field ofice, 10/E/61. 281JI~n~or~ndiini from the Attorney General to IIeads of Departments and

Agencies. 4/B/63.

Page 84: Church Committee: Reports-- Book II

A1 small minority tlclilwratelv rwd I-iolcnce as a method for ac.hiering small minority tlt~libcixtcl~ 1w~1 violence as a niethod for achieving political goals-rangiiip fAni the bnital nllirder ant1 intin~idation of black ~~mrr~cans in parts of thr South to tli:> terrorist bombiiy of of- fice buildings and do\-erniiiciit-slll)l~orte~l unversity facilities. But tl,rcc Presidential commissions found that the larger outbreaks of via- lence in tll? gllettOs alld 011 tllf c:~lllpllst~S Wc~‘1’C 1llOst. Often S1~OlltilllPOllS

reactions to events in a climate of social tension and i~l~heava1.2”Z During this period. thol~santls of ~onng ;1mcricans :;nd members of

racial minorities came to beliew in civil disobedience as a vehicle for protest and dissent.

The government could hare set an example for the nation’s citizens and prevented spiraling lawlessness 1~;~ respecting the law as it took step”, to predict or prevent violence. But agencies of the I-nitcd States, sometimes abetted by public opinion and government officials. all too often disregarded the Constitutional rights of -\merican in their con- duct of tlome5tic intelligence operations.

The most significant dewlopments in domestic intelligence activity during this period may be summarized as follows :

a.Scope of llomesficInte7ligence

FBI intelligence reports on protest activity and domest.ic dissent accumulated massive information on lawful activity and law-abiding citizens for vaguely defined “pure intelligence” and “prerrntire intelligence” purposes related only remotely or not. at all to law enforce- ment, or the prevention of l.iolence. The FRT exaggerated the extent of domestic Communist influence, and CO;\IISFIT~ in\-esti.gations improperlv included groups with no significant connections to Commnni&s.

The FBI expanded its use of informers for gathering intelligence about domestic political groups. sometimes upon the urging of the Attorney General. So significant limits were placed on the kind of political or personal information collected by informers, recorded in FBI files. and often disseminated outside the ISure’au.

Army intelligence developed programs for the massive collection of information about, and surveillance of, civilian political activity in the I-nitecl States and sometimes abroad.

In contrast. to previous policies for centralizing domestic intelligence investigations. the Federal Gorernment encouragetl local police to establish intelligence programs both for their own use and to feed into the Federal iiltelligencr-gatherings process. This greatly expanded the domestic intelligence apparatus. making it harder to control.

The .Jnstice Department established a unit for storing and evaluat- ing intelligence about civil disorders which n-as designed to use non- intelligence agencies as regular sources of information, which. in fact., drew on military intelligence as well as the FBI, and which trans- mitted its computer list of citizens to the CL1 and the IRS.

b.Don,,csticIntellige?1ce-~~-llcfho~ity

Intelligence gathering related to protest activity was generally increased in response to vague requests by Attorneys General or other

“’ Rrport of the Sationnl Adrisory Commission on Civil Disorders (1968), ch. 2; Report of the Sntionnl Commission on tire Causes and Prevention of J’io- lence (1969) ; Report of the President’s Commission on Campus Unrest (1970).

Page 85: Church Committee: Reports-- Book II

69

officials outside the intelligence agencies : such incrcascs wcrc some- tinics ratified retroactively by wch officials.

The FBI’s esclnsiw control over civilian tlomestic intrlligencc at, the Fetlcral Ic\-el was consolitlntcd by formal agreements nit11 the Secret &Service regarding protecti\-c intelligence ant1 wit11 thcl 1311rcau of A\lcol~ol, Tobacco, and Firearms regarding terrorist bombings.

The FTST derrlopecl iielv covert programs for disrupting and tlis- crediting doiilcstic political groups, using the tccliniqws oripi- nally applied to Communists. The most intensive tlomestic intelli- gence investigations, and frequently COISTELPRO operations, \yerc targeted agamst persons itlentifictl not as criminals 01’ criminal suspects, but as “rabble rousers, ” “agitators.” “key activists.” or “kr? black extremists” brcanse of their militant rh<+or~c an<1 group leaders- ship. The Secnrit\- Index was revisetl to inclutlc sllch l~~~rsons.

Withoutj imposing adequate safeguards against. misiw. the Ii~tc~imal Revenue Service passed tax information to the FI<I ant1 (‘IA. in some cases in I-iolation of tax regulations. *it the iirging of the White House and a Congressional Committee. the IRS established a l)ro:pram for in\-estigating politically active groups ant1 iiitli\-itliials;, which included auditing their tax returns.

d. Foreign InteUigencc md Dome.8tic I~isw0f A 1966 agreement concerning ‘~coordination” between the (‘IA and

the FBI permitted CIA1 invol\-emcnt in internal security functions. Thder pressure from the ,Johnson and Sison V’hite Houses to deter- mine whether there was “foreign influence” behind anti-war protests and black militant activity. the CL1 began collecting intelligence about domestic political gronps.

The CIA also conducted operations within the I-nited States antler overly broad interpretations of its responsibility to protect the physical security of its facilities and to protect intelligence “sources” and “methods.” These operations included surreptitious entry, recruit- ment of informers in domestic political groups. and at least one instance of varrantless wiretapping approved by the Attorney General.

In the same period, the Kational Security -1gency monitored inter- national communications of Americans involved in clomestic dissent despite the fact that its mission was supposed to be restricted to collecting foreign intelligence and monitoring only foreign communi- cations.

e. Intrusize Technipes As domestic intelligence operations broadened and focused upon

dissenters, the Gorernment increased the use of many of its most intrusive surveillance techniques. During the periotl from 1!)61 to 1972, the standards and procedures for warrantless electronic survcil- lance were tightened, but actual practice was sometimes at odds with the articulatecl policy. .Ilso during these years. CIA mail opening expanded at the Ekeau’s request. and SSA monitoring expanded to target domestic dissenters. Howercr. the FRI cut back use of certain techniques lmder the pressure of Congressional probes ant1 changing public opinion.

Page 86: Church Committee: Reports-- Book II

70

f. Accountability a.nd Cos trol During this period several sustained domestic intelligence efforts

illustrated deficiemies in the system for comrolling intelligence agen- cies and holding them accountable for their ac,tions.

In 1970, presidential approval was temporarily granted for a plan for interagency coordination of domestic intelligence activities which included several illegal programs. Although the approval was sub- sequently revoked. some of the programs were implemented separate- ly by various agencies.

Throughout the administ.rations of Presidents Johnson and Sixon, the investigative process was misused as a means of acquiring political intelligence for the White House. At the same time, the Justice De- partment’s Internal Security Division, which should have been a check against the excesses of domestic intelligence. generally failed to re- strain such activities. For example, as late as 1971-1973. the FBI con- tinued to evade the will of Congress, partly with ,Justice Department approval, by maintaining a secret “Administ,rative Index” of suspects for round-up in case of nat.ionnl emergency.

g. Reconsideration of FEZ Authority Partly in reaction to congressional inquiries, the FBI in t,he early

1970s began to reconsider the extent of its authority to conduct do- mestic intelligence activities and requested clarification from the At- torney General and an executive mandate for intelligence investiga- tions of “terrorists” and “revolutionaries”.

In the absence of any new standards imposed by statute, or by the Attorney General, the FBI continued to collect domestic mtelligencc under sweeping authorizations issued by the Justice Department in 1974 for investigations of “subversives,” potential civil disturbances. and “potential crimes”. These authorizations were explicitly based on broad theories of inherent. executive power. Attorney General Edward H. Levi recently promulgated guidelines which represent the first significant attempt by the ,Justice Department to set standards and limits for FBI domestic intelligence investigations.

2’. Scope of Domestic Intelligence During this period the FBI continued the same broad investigations

of the lawful activities of Americans that were based on the Bureau’s vague mandate to collect intelligence about “subversion.”

In addition, the Bureau-joined by CIA. SSA, and military in- telligence agencies-took on new and equally broad assignments to investigate “racial matters,” the “Sew Left,” “student agitation,” and alleged “foreign influence” on the antiwar movement.

a. Domestic Protest and Dissent: FBI “We are an intelligence agency,” stated a policy directive to all FBI

offices in 1966, “and as such are expected to know what is going on or is likely to happen.‘! 283 Written in t.he context of demonstrations over the Vietnam war and civil rights, this order illustrates the general attitude among Bureau officials and high administ.ration officials who established intelligence policy : in a country in ferment, the FBI could, and should, know everything that might someday be useful in some undefined manner.

253 SAC letter 6i-Zi, S/3/66.

Page 87: Church Committee: Reports-- Book II

71

(1) RncinZ ZnfclZigcnce.--nurin,rr the l!XOs, the FRT, partly on its own and partly in response to outside requests, derclopccl sweeping programs for collecting domestic intelligence concerning racial mat- tern These programs liad roots in the late IO~@S.~~~ 13y t,hc enrly,l!XOs. they had growi to the point. that the Bureau was gathering intclli- gence about proposed “civil drmonst.rations” and t,lir related activities of “officials, committees, legislatures, organizations, etc.,” in the “racial ficlcl*!’ 285

In 196!, FBI field offices vxre directed to supplv “complete” infor mat,ion (mcluding “postponement or canccllntion”) :

regarding planned racial activity, such as de.monstrations, rallies! marches, or threatened opposit,ion to activity of t.his kind.

Field offices reported their full “coverage” of “meetin@ and “any ot.hcr pertinent information concerning racial activities.“iSG

In late 1066. field offices were instructed to begin preparing semi- monthly summaries of “existing racial condit.ions in major urban areas,” relying upon “established sources,” and “racial,” “criminal,” and “security informants.” These reports were to describe the “general programs” of nil “civil rights organizations” and “b1ac.k nationalist organizations,” as well as snbverslrc or “hate-type” groups. The infor- mation to be gathered was to include : “rcadilv available personal back- ground data!’ on “leaders and individuals in t.he civil rights move- ment.” and other “leaders and individuals involved,” as well as any data in Bureau files on “subversive associations” t,hey might have; the “objectives sought by the minority community;” the community reac- tion to “minoritv demands ;” and “the number, character, and inten- sity of the tcchl~iqucs used by the minorit.y community, such as pick- eting or sit-in demonstrat.ions, to enforce their demands.” 28’

Thus, t.he FBI was mobilized to used all its available resources to discover evcrvthing it could about “general racial conditions.!’ While the st.ated objective was to arrive at an “evaluation” of potential for violence, the broad sweep of the directives issued to the field resulted in the collection and filing of vast. amounts of information unrelated to violence.

Some programs concerning “general racial matters” were directed to concentrate on groups with a “propensity for violence and civil disorder.” B* Rut even thrse programs were so overboard in the.ir appli- cation as to include Dr. Martin Luther King, Jr. and his non-violent Southern Christian Leadership Conference in the “radical and vio- lence-prone” “hate group” category. The stated iustification, unsnp- ported by any facts. was that, Dr. Ring might. “abandon his supposed ‘obedience’ to ‘white. liberal do&rims (nonviolence) and embrace black nationalism.” 289

Another leading civil rights group, the Congress of RaGal Equality (CORE), was investigated under the “Rac.ial Matters” Program be- cause the ?3ure.au concluded that it. was moving “a.way from a legiti-

284 see 50. p. 2cb 7964 FBI Manual Section 122, p. 1. m 1065 FBI Manual Section 122, PD. G8. =‘FRI Manual Section 122, rerised 12/13/M, pp. 8-9. ?68 Memorandum from FBI Headquarters to all SACS, 8/25/W. 298 Memorandum from FBI Headquarters to all SACS, 3/4/68.

Page 88: Church Committee: Reports-- Book II

72

mate civil rights organization” and “assnming a militant, black nation- alist. posture.” The FBI reached this conclusion on the gro~mds t.hat “some leaders in their public statements’? had condoned “violence as

a me,ans of a.ttwining Negro rights.” The, investigation was intensified, even though it was recognized there \vas no information that its mcn- hers “advocate violcnw:’ or “part.icipatr in actual violence.” *9”

The same orerbreadth characterized the FBI’s collection of intelli- gence about “white milit,ant groups.” Among the groups investigated were those “known to sponsor demonstrations agamst integration and against the, busing of Negro students to white s~hools.‘~ As soon as a new organization of this sort was formed, the Bureau used its inform- ants and “established sources” to determine “the aims and purposes of the organization, its leaders, approximate n~en~bershil~,~’ and other “background data,” bearing upon “the militancy” of the crroup.2”01

(2) ‘(A’Pw Left’? ZntP77iwncc.-The FBI collected intelligence uncle1 its VTDEM (Vietnam Demonstration) and STAG (Student A4pita- tion) Programs on “anti-C*ol-crnni~llt demonstrations and protest ral- lies” which the Bureau considered “disruptive.” Field offices were warned against “incomplete and nonspecific reporting” which neg- lected such details as %nmber of protesters present. identities of orga- nizations. and identities of speakers and leading activists.” 201

The FBI attempted to define the “New Left,” but with little success. The Bureau agent who eras in charge of New Left, intelligence conceded that :

It has never been strictly de’fined. as far as I know. . . . It’s more or less an attitude, I would think.

He also stated that the definition was expanded cont,inually.2g2 Field offices were told that the New Left was a “subversive force”

dedicated to destroying our “traditional values.” Although it had “no definable ideology, ” it was seen as having “strong Marxist, rxistential- ist, nihilist and anarchist overtones.” Field offices were instructed that “proper areas of inquiry” regarding thr subjects of “Ne\r TRft” in- vestigations were “public statements. the wriiings and the leadership activities” which might est.ablish their “rejection of law and order” and thus their “potential” threat to security. Such persons would also be placed on the Security Index (for detention in a time of emergency) because of these “anarchistic tendencies,” even if the Bureau could not prove “membership in n subversive organization.” 293

A Bureau memorandum which recommended the use of disruptive techniques against the “NeK Left” paid particular attention to one of its “anarchistic tendencies” :

m SAC T&tter 6%16, 3/12/t%. Subject : Congress of Racial Equality. m8 SAC I,etter 6,%25,4/30/68. 281 SAC, JIemorandum l-72; s/23/72, Subject: Reporting of Protest Dem-

onstrations. ‘WJ Supervisor, FBI Intelligence Division, deposition, 10/28/75, pp. 7-8. 285 SAC Letter 68-21. 4/2/68. This directive did caution that “mere dissent and

opposition to Governmektal policies pursued in a legal rnnstitutional manner” was “not sufficient to warrant inclusion in the Security Index.” Moreover, “anti- Vietnam or peace group sentiments” were not, in themselves. supposed to “justify an investigation.” The failure of this admonition to achieve its stated objective is discussed in the findings on “Orerbreadth” and “Covert Action to Disrupt.”

Page 89: Church Committee: Reports-- Book II

73

the Ken- IRft has on many occasions vicionsly and scnrrilously attacked the IXrectorand the Bureau in an attempt to hamper our inrcstigations and drive 11s off the college campnses. ‘04

Later instrnctions to the field stated that the term “Kcw Left” did not refer to 5 definite organization,” out to a “loosely-boimcl. free- wheeling, college-oriented movement” and to the “more tAreme and militant anti-Virtnam war and antidraft protest organizations.” These instructions directed a “comprehensive stndy of the whole movement” for the purpose of assessing its “dailgerolisiless.” Quarterly reports JT-erc to be prepared. and “subfiles” opened, nnder the following headings :

Organizations (“when organized, objecbires, locality which active. whether part of a national organization”)

Membership (and “sympathizers’-use “best available in- formants and sources”)

Financrs (inclnding identity of “angels” and f nnds f ram “foreign sources”)

Comnunist~ Influence Publications (“describe pnblications, &OK circnl,ation and

principal members of editorial staff”) Violence Religion (“support of movement by religious groups or in-

dividnnls”) Race Relntlons Political Activities (“details relating to position taken on

polit.ical matters including efforts to influence public opin- ion, the electorak and Government bodies”)

1deolog.y Educntlon (“cowses given together with any educational out-

lines and assigned or snggested reading”) Social Reform (“demonstrations aimed at social reform”) Ilabor (“all activity in the labor field”) Public Appearances of Leaders (“on radio ant1 television”

and “before gronps. such as labor, chnrch and minority gronps.:’ inclucling “slm~mary of snbject matter discussed”)

Factionalism Secnritv Measures Interna’tional Relations (“trawl in foreign colmtries,” %t-

tacks on I-nitrd States foreign policy”) Mass Media (“indications of support of New hft by mass

media”)

Throngh thesr massive rrports, the FBI hoped to discover “thr true nahre of the sew Left movemrnt.” 2gB Fe= Bureau programs better reflect “pnrc intelligence” objectives which extended far beyond even the most generons clrfinition of “prerent.ive intelligence.” *N

2Dl Menioranduln from C. D. Brennan to W. C. Sullivan. 5/9/f%. m ~Im~orandum from FRI Headquarters to all SSCs. 10/28/G& and enclosure,

Subject : Sew Left JIovemmt-Report Outline. ?O”A fnr~liri- renson for rollerting information on the Sew Left was pnt for-

\~:~rtl I1.v Assistant Dirwtor Rrennnn. head of the FRI Intclli~encr Division in 7 970-1!)71. Since Srtr- Left “le;~dcrs” had “l)ul~lid.r ~~roftwrtl” tllrir desire to overthrow the (:owrnmt~nt. the I%nrcau slionl(l file the names c,f anyone who “joiwtl ill mr~mlwrslii~~” for “fntnrc wfcrenw” in case thw ever “ol~tnined a smsitire Governmrnt I)osition.” (Charles Brrnnan testimo&, O/25/75, Hear- ings. Vol. 2, pp. 116117.)

Page 90: Church Committee: Reports-- Book II

74

Apart from the massive general reports required on the ‘Wem Left,” examples of particular investigations included : a stockholders group planning to protest t.heir corporation’s war product,ion at. the annual stockholders meeting; *R a university professor who was “an active participant in Xew Left demonst,rat.ions,” publicly surrendered his draft card. and had been arrested in antilvar demonstrations, but not convicted; 298 and two university instructors who helped support a student “underground” near-spa#per whose editorial policy was de- scribed as “left-of-center, anti-establishment, and opposed [to] the X-ni\-crsitv administration.” 290

The FBI also investigated emerging “New Left” groups, such as “Free Universities” attached to various college campuses, to determine whether they were connected “in any way” with “subversive groups.” For e.xample, when an article appeared m a newspaper stating that one “Free University” was being formed and that it was “anti-institu- tional,” the FBI sought to determine its “origin,” the persons respon- sible for its “formation,” and whether they had “subversive back- grounds. ” 3oo The resulting report described in detail the formation, curriculum content? and associates of the group. It was disseminated to military intelligence and Secret Service field offices and headquar- ters in Washington as well as to the State Department and the Justice Department..301

The FBI Manual has never significantly limited informant report- ing about the lawful political activities or personal lives of American citizens, except for prohibiting reports about legal defense “plans or strategy, ” “employer-employee relationships” connected with label unions, and “legitimate campus activities.” 302 In practice, FBI agents imposed no other limitations on the informants they handled and, on occasion, disregarded the prohibitions of the Manual.303

(1) Znfiiltration of the Klan.-In mid-1964, ,Just.ice Department of- ficials became increasingly concerned about the spread of Ku Klux Klan act.ivity and violence in the Deep South. Attorney General Ken- nedy advised President Johnson that, because of the 5mlque difficulty” presented by a situation where “lawless activities” had the “sancti;)n of local law enforcement agencies,” the FBI should apply to the Klan the same “techniques” used previously “in the infiltration of Commu- nist groups.” 304

Former Attorney General Katzenbach, under whose tenure FBI activities against. the Klan expanded, vigorously defended this deci-

~Memorandum from Minneapolis field office to FBI Headquarters. 4/l/70. 208 Jfemorandum from FFZI Headquarters to Pittsburgh field office, 5/l/70. 298JIemorandum from Nobile field office to FBI He&iquarters, 12/g/70. 3oo 3Iemorandum from FBI Headquarters to Detroit field offices, 2/17/t%. 301 Memorandum from Detroit field office to FBI Headquarters, 4/15/66. 3m FBI Manual, Section 107. m See Findings on rise of informants in “Intrusive Techniques,” p. 39.2. 3N31emorandum from Attorney General Kennedy to the President, June 1964,

quntwl in Victor Sarasky. Rmncrlq Jgtstice (Sew York : Atheneum. 1971)) pp. 10.5-106. The President asked fnrmer CIA Director Allen Dnlles to evaluate the situation in Mississippi. Upon his return from a surrey of the state, Dnlles en- dorsed the Attorney General’s rerommendation that the FRI he used to “cnntrnl the terrorist activities.” (“Dulles Requests More FBI Agents for Mississippi,” New York Times, 6/27/M)

Page 91: Church Committee: Reports-- Book II

75

sion as necessary to “deter violence” by sowing “deep mistrust among Klan members” and making them aware that they were “under con- stant observation.” 3oz The FBI Manna1 did, in fact,, advise Bureau agents against “wholesale investigations” of persons who “mererly at- tencl meetings on a regular basis.” 30ti But FBI intelligence officials chafed under this rest.riction and sought expanded informant cover- age.aoT Subsequently, the Manual was revised in 1967 to require the field to furnish the “details” of Klan “rallies” and “demonstrations.” 308 Ry 19’71, the Special ,ipents in Charge of field offices had the discre- tlon to investigate not only persons with “a potential for violence,” but also anyone else who in the SAC’s “judgment” was an “ex- tremist.” 3oo

(2) “Listening Posts’? iv the R7nck C;‘omrnunit,~.-Tvo special in- formant programs illustrates the breadt.11 of the Bureau’s infiltrat.ion of the black community. In 1970. the FBI used its “established inform- ants” to determine the “background, aims and purposes, leaders and Key ,4ctivists” in every black student. group in the country, “regard- less of [the group’s] past or present involvement in disorders.” 3*o Field offices were, instructed to “target, informants” against these groups and to “derelop such cowrage” where informants were not already avnil- ab1e.311

In response to Attorney General Clark’s instructions regarding civil disorders intelligence in 1967, the Bureau launched a “ghetto informant. program” which lasted until 197X312 The number of ghetto informants expanded rapidly : 4,067 in 1969 and 7,403 by 197L313 The original concept was to establish a “listening post” .?I4 by recrniting a person “who lives or works in a ghetto area” to provide infonnwtion rc- garding the “racial situation” and “racial activities.” 315 Such inform- ants co~lltl include “the proprietor of a candy store or barber shop7 .Zs the program drvelopcd, hoverer. ghetto Inforniants were :

utilized to attend public meetings held by extremists, to iden- tify extremists passing through or locating in the ghett,o area, to identify purveyors of extremist literature as well as given specific assignments where appropriate.316

30jTestimonr of Sicholas deB. Katzenbach 12/3/75. Hearings, Yol. 6, p. 207. m 1DG FBI mnnnnl. Section 122. pp. 1-2. 9o’ FBI Executives conference memorandum, 3/24/f%, Subject : Establishment

of a Special Squad Against the Ku Klux Klan. eca 1967 FBI manual, Section 122, p. 2. Jw 1971 FBI manual, Section 122, p. 2. “‘Memorandum from FBI Executive Conference to Mr. Tolaon, 10/29/70. ‘I’ 3Iemorandmn from FBI Headquarters to all SACS. 11/4/70. m Memorandum from G. C. Moore to William C. Sullivan, 10/11/W. For At-

torney Gclnernl Clark’s nrder, see np. (q-84. “’ ;\lemorandnm from FBI to Select Committee, S/20/75 and enclosures.) =‘ 3kmorandum from Cr. C. Moore to E. S. Miller. 9/R/72. “‘Memorandum from G.-C. Moor; to C. D. Brennan. 30/27/70. n” Memorandum from Moore to Miller, R/27/72. This Dropram continued until

19X n-hen the FBI derided to rely on its regular estremist informants “for ‘by- nroduct information on civil unrest.” The most “nroduetiw” ghetto informants nere “rnnwrted” into regular informants. (FBI Inspwctinn Grision Memnrnn- dum, U/24/72; Memorandum from Director Clarence 11. Kel1e.v to all SAC%. 7/31/7X)

Page 92: Church Committee: Reports-- Book II

76

Material to be furnished by ghetto informants included names of “Afro-Smerican type book stores” clientele.” 31i

and their “owners, operators and

(3) z?lfiltmfio,l of the “nTct(- Left”.-The FBI used its “securit.v” informant program to report extensivelv on all activities relating to opposition to the Vietnam war. Jloreover3”informants already in groups considered “subversive” by the FBI also reported on the activities of other organizations and their members, if the latter were being “infil- trated” by the former groups.318

to The agent who handled one informant, in an antiwar group believed

be infiltrated by “subversive groups and/or violent elements” testified that the mformant told him “everything she knew” about the chapter she joined.“‘” Summaries of her reports indicate that she ~re1~orte.d estrnsivolv about personal matters and lawful polit,ic’al activity.320 This informant estimated that her reports identified as many as 1,000 people to the FBI over an 1%month period. The vast n1alority of these persons were members of peaceful and law-abiding groups, including the T’nited Church for Christ, which were engaged in joint social welfare projects with the antiwar group whlCll the informant had infiltrated.32l

Other FRT informants rcportcd, for esamplc, on the Women’s Liberation Jloremcnt, identifying its members at several micl-western universities 322 and reporting statements made by women concerning their personal reasons for participating in the women’s n~ovement.323

Jlorcovcr, as in the case of informants in the black community: efforts were made toegreatly increase the number of informants who could report on antiwar and related groups. In 1860, the Justice Department specifically asked the FBI to use not) only “existing sources.” but, also “any other sources you lnny ,be able to develop” to collect, information about “serious campus disorders.:’ 3Z4 The Bureau orclcred its field offices in 1970 to “make every effort” to obtain “informant coverage” of evrrv “New Left commune.” 323 Later that year, after Director Hoover lifted restrictions against recruiting 18 to 21-year-old informants, field offices were urged to take advantage of this “trenienclons opl~ortunity~~ to expand coverage of New Left “collectives, communes, ancl staffs of their underground ncws- papers,:’ 326

n7 Philadelphia Field Office memo S/12/68, re Racial Informant. ‘I8 FRI Manual Section 87. 318Testin~onr of FRI ‘Rnecill Agent. 11/20/75, p. 55. 320 Staff review of informant report summaries. 321 Mary Jo Cook. testimony. 12/2/7X Hearings, Vol. 6. pp. 111, 119-129. 323 Report of Kansas City Field Office. 10/20/76. “a Memorandum from Sew York Field Office to FRI Headquarters, 5/28/69. ~Jtemorandnm from Assistant Attorney General J. Waiter Yeagleq’ to

J. Edgar Hoover, 3/3/69. This memorandum stated that the Department -xas considering “conducting a grand jury investigation” under the antiriot act and other statutes.

32’JIemorandnm from FRT Headquarters to all SACS. 4/17/70. This dirwtire defined a “commune” as “a group of individuals residing in one location who practice communal living, i.e., they share income and adhere to the philosophy of a Marxist-T,eninist-Jlanist-oriented violent rernlution.”

Z+ SAC T,etter 7648, 9/15/70. This directive implemented one provision of the “Hustnn Plan,” n-hich had been disapproved as a domestic intelligence package. See pp. 113,116.

Page 93: Church Committee: Reports-- Book II

77

In the early 1960s. after several commitments of troops to control racial disturbances ant1 enforce court orders in the South, Army intelligence began collecting information on civilian political activity in all areas where it brlirvetl civil disorders might occur. The growth of the ,4rmy’s domestic intclljpcncc program @p&s, once again, the general tendency of information-gathering operations to continually broaden their coverage.

Shortly after the Army was callftl upon to quell civil clisorclers in Detroit and to cope with an antiwar drmonstration at. the Pentagon in 1967, tlie Army Chief of Staff approved a recommendation for “continiions colintcl~ilitclligeIlce investigations” to obtain informa- tion on “subversive personalities, groups or organizations” and their “inflllence on i~rl)an populations” The Arm;v%

in promoting civil distlirbances.327 ‘.collcction plan” for civil disturbances specifically

targeted as L‘dissident elements” (Ivithout further definition) the “civil rights movement” and the “anti-Vietnam/anti-draft move- ments.” 32y ;\s rc&d later. Army intelligence-gathering extended bryontl “subversion” and “dissident groups” to “prominent persons” who wcrc “friendly” with the “lcaclers of the disturbance” or “s~mpathctic with their plans.” 32g

d. Feclern7 E?~cownge?nent of Locnl Po7ice Intelligence

In reaction to ciril disorders in 1965-1066, Attornev General Katz- enbnch tnrncd for advice to the newly created President’s Commis- sion on Law Enforcemwlt and Administration of Justice. After hold- ing a conference with police and Sational Guard officials, the Presi- dent’s Commission urged police not to react with too much force to dis- order “in the course of demonstrations,” but to make advance plans for “a true riot situation.” This meant that police should establish “pro- cetlnrcs for the acquisition and channeling of intelligence” for the use of “those who need it.” 330 Former Assistant Attornev General Vinson recalled the ,Justicr Department’s concern that local police did not have “any useful intcllipcnce, or knowledge communfties in the big cities.‘! D*

about, ghettos, about black

During the winter of lHRi-1968. the ,Justice Department and the National Advisory Commission on Civil Disorders reiterated the mes- sage that) local police should establish “intelligence units” to gather and disseminate information on “potential” civil disorders. These units would use “undercover police personnel ancl informants” and dram on “community. leaders, agencies, and organizations in the ghetto.” 332 The Commission also urged that. these local units be linked

97 See Memorandum for the Record from Milton B. Hyman, Office of the General Conmel. to the Army General Counsel, l/23/71, in dfilitar~/ A’urwil- lance. Hearings before the Rubcnmmittee nn Constitutional Rights, Committee on the .Judiciary. United States Senate, 93x1 Cnng., 2nd Sew. (1974), p. 203.

“2RF~tl~r~l Dntn Rn~kr. Coniputcm awd thr Rill of Rights. Hearings before thz%Srnate Rnbcnmmittee on Constitutional Rights (1971), at pp. 1120-1121.

* F’cdo-n7 IInto Rnnkn. Helrines, at pp. 112.%1138. w President’s Commission on Law Enforcement and Administration of Justice,

The Chnllmgc of Crime in a Free society (1967), pp. 118-119. =’ Fred 31. Vinsnn testimony. l/27/76, p. 32. JJ* Report of the National Advisory Commission on Civil Disorders (1968),

p. 487 (Bantam Books ed.).

Page 94: Church Committee: Reports-- Book II

78

to “a national center and clearinghouse” in the ,Justice Department.333 One consequence of these recommendations was that the FBI, because of re,vulnr liaison with local police, became a channel and repository for much of this intelligence data.

Local police intelligence provided a convenient manner for the FBI to acquire information it wanted while avoiding criticism for using covert techniques such as developing campus informants. For exam- ple, in 1060. Director Hoover decided “that additional student in- formants cannot be developed” by the Bureau.334 Field offices were instructed. however. that. one way to continue obtaining intelligence on “situations having a potential for violence’? was to develop “in- depth liaison with local law enforcement agencies.” 335 Instead of re- cruiting student informants itself, the FBI would rely on local police to do so.

These Fe,deral policies contributed to the proliferation of local police intelligence activities, often without adequate controls. One result was that. still more persons were subjected to investigation who neither engaged in uniawful activity, nor belonged to groups which might be violent. For example: a recent state grand jury report on the Chicago Police Department’s “SecuritT Section” described its “close working relationship!’ with Federal i;ltelligence agencies, including ,2rm?: intelligence and the FI31. The report found that the police intelligence system produced “inherently inaccurate and distortive data” which contaminated Federal intelligence. One police officer testified that he listed “any person” vho attended two “public mcet- ingsTs:’ of a group as a “member.” This conclusion ~-ns forwarded “as a fart” to the FBI. Subsequently, an agency seeking, “background information” on that person from the Bureau in an employment, investigation or for other purposes would be told that the individual tras “a member.” The grand jury stated :

Since federal agencies accepted data from the Security Sec- tion without questioning the procedures followed. or met,hods used to gain information. the federal government cannot escape responsibility for the harm done to untold numbers of innocent persons.336

Joseph Califano, President qJohnson’s assistant in 1967, testified that the Sew-ark and Detroit riots were a “shattering experience” for Justice Department officials and “for us in the White House.” They xvere concerned about the “lack of intelligence” about. “black groups.” Conscquentlv, “there was a desire to hare the ,Justice Department have better ‘intelligence, for lack of a better term. ahout dissident groups.” This desire “precipitated the intelligence unit” established by Attorney General Ramsey Clark in late 1067. According to Califano,

535 Report of the National Adtisorv Commission, p. 490. = SAC Letter 69-16, 3/U/69. This order “recognized that with the graduation

of senior classes, gou will lose a certain percentage of your existing student in- formant coverage.” Rut this would “not be accepted as an escuse for not devel- oping the necessary information.”

aJI SAC Letter 69-44. S/19/69. 91) “Improper Police TntelIigence Actirities.” A Report by the Extended March

1975 Cook County (Illinois) Grand Jury, 11/10/75.

Page 95: Church Committee: Reports-- Book II

79

the President and the Khite House staff were insisting: “There must be a way to predict violence. We’ve got to know more about this.” 337

In Srptcmbrr 1907 A1ttorncy General Clark asked ,&istant -1ttornq General ,John Dear to review tbc Dcpartmcnt’s “facilities” for civil disorders intrlligencc: 33y T>onr recommended creating a Departmental ‘5ntclligence nnlt” to analyze FBI information aboutj “certain persons and groups” (without further definition) in the urban ghettos. He proposed that its “scope be very broad initially” so as to “measure the influence of partirulnr groups.” Doar recommended that, in addi- tion to the FBI. agencies who should “funnel information” to the unit should include :

Community Relations Service Poverty Programs Seighborhood Legal Services Program T&or Department Programs Tntclligence I-nit of the Internal Revenue Service ~\lcohol, Tobacco, and Firearms Division of the Treasury

Department Snrcotics Bureau (then in the Treasury Department) Post Office Department

Doar recognized that the Just,icc Department’s Con1munit.y Relations Service, designed to conciliate racial conflicts, risked losing its “credi- bility” and thereby its ability to help prevent riots, but he assured the Attorney General that. t,he “confidentiality” of its information could be protected.33”

A later study for Attorney General Clark added the following agencies to Dear’s list :

President’s Commission on Civil Disorders New Jersey Blue Ribbon Commission (and similar state

,agencies) St.ate Department Army Intelligence Office of Economic Opportunity Depart.ment of I-Tousing and Urban Development (surveys

and Model City applications) Central Intelligence ,2gency National Security Agency

This study recommended that FBI reports relating “to the civil dis- turbance problem” under the headings “black power, new left, pacifist, pro-Red Chinese, anti-Vietnam war, pro-Castro, etc.” be used to de-

&” .Joseph Califano testimony, l/27/76, pp. 6-9. Califano states in retro- speet that the attempt to “predict violence” was “not a successful undertaking,” that “advance intelligence about dissident groups” would not “have been of much help.” and that what is “important” is “physical intelligence about geography, hospitals, power stations, etc.” (Califnno, l/27/76. pp. 8. 11-12.)

338 In 1966, the .Justice Department had started an informal “Summer Project,” staffed by a handful of law students, to pull together data from the newspapers, the T7.R. Attorneys, and “ snme Bureau material” for the purpose, according to former Assistant Attorney General Fred Vinson. Jr., of finding out “what’s going on in the black communit.r.” (Vinsnn, l/27/76 p. 3.1.)

JBM~mnrandum from Assistant Attorney General John Doar to Attorney General Clark, n/27/67.

Page 96: Church Committee: Reports-- Book II

80

velop “a master index on individuals, or organizations, and by cities.” 340

Attorney General Clark approved these recommendations and estab- lished the Interdivision Information Unit (IDIU) for :

reviewing and reducing to quickly retrievable form all infor- mation that may come to this Department relating to orga- niza.tions and individua.ls who may play a role, whether purposefully. or not, either in instigating or disorders, or In preventing or checking them.341

spreading civil

In early inst,ructions, Clark had stated that the Department must “endeavor to increase” such intelligence from “external sources.” 342

In fact, according to its first head, the IDIU did use intelligence from the Srmy, the Internal Revenue Service, and “other investiga- tive agencies.” Sometimes IDIU information was used to “determine whether or not:’ the Community Relations Service should “mediate” a dispute. 343 ‘The Unit developed a computer system which could gen- erate lists of all “members or affiliates” of an organization, their loca- tion and travel, “ all incidents” relating to “specific issues”, and “all information” on a “planned specific demonstration” 344

By 1070, the IDIU computer was receiving over 42,000 “intelligence reports” a year relating to “c.ivil disorders and campus disturbances” from :

the FBI, the U.S. ,4ttorneys, Bureau of Warcotics, Alcohol, Tobacco, and Firearms Division of the Treasury Department and other intelligence gathering bodies within the Executive Branch.“5

IDIU computer tapes, which included lo-12,000 entries on “numer- ous anti-war activists and other dissidents,” were provided to the Central Intelligence Agency in 1970 by Assistant Attorney General ,Jerris Leonard. then the ,4ttornev General’s Chief of Staff for Civil Disturbance and head of the Civil Rights Dirision.348 This list of per- sons was sent to the Internal Revenue Service where the Special Services staff opened intelligence files on all persons and organiza- tions listed. Many of them were later investigated or audited, in some casesmerely because they were OJI the list.

In 19’71, the IDIU computer included data on such prominent, per- sons as Rev. Ralph :4bernathy, Caesar Chavez. Boslep Crowther

sM Memorandum from Messrs. Maroney, Nugent, Mc!I’iernan, and Turner to Attorney General Clark, 12/6/67.

JL* Xemorandnm from Attornev General Clark to Assistant Attorneys General John Dear, Fred Yinson, Jr., Roger W. Wilkins. and J. Walter Yeagley, 12/M/67.

‘a Memorandum from Attorney General Clark to Kevin T. Maroney, et al., 1 l/9/67.

Jo Testimony of Kevin T. Maroney (Deputy Assistant Attorney General), l/27/76, pp. 59-60.

s” Memorandum from Assistant Attorney General YeagIey to Deputy Attorney General Richard Kleindienst. 2/6/69.

31’ -Justice Department memorandum from James T. Devine, g/10/70, Subject : InterdirisionaI Information Unit.

“’ Statement of Deputy Attorney General Laurence H. Silberman, *Justice Dennrtment. l/14/7.5. Arcordine to this statement. a .Tustiw Denartment inonirv in IN’.‘, concluded that Leonard~“initiated the transaction hy rehuestinp the’CIk to check against its omn sources whether any of the individuals on the IDIU list were engaged in foreign travel, or received foreign assistance or funding.”

Page 97: Church Committee: Reports-- Book II

81

(former New York Times film critic), Sammy Da%, Jr., Charles Evers, James Farmer, Seymour Hersh, and Coretta K&p. Organiza- tions on which information had been collected included tile KABCP, the Congress of Racial Equality, the Institute for Policy Studies, VISTA, United Farm Workers of California, and the Urban League. Ordinary private citizens who were not nationallv prominent were also included. One was described as “a local civil riihts worker,” another as a “student at Merritt, College and a member of the Peace and Freedom Party as of mid-68,” and another as “a bearded militant who writes and recites poetry.” 347

Thus, beginning in 1967-1068, the IDIU was the focal point of a massive domestic intelligence apparatus established in response to ghetto riots, militant black rhetoric, antiwar protest, and campus dis- ruptions. Through IDIU, the A4ttorney General received the benefits of information gathered by numerous agencies, without setting limits to intelligence reporting or providing clear policy guidance. Each component of the structure-FBI, Army, IDIU. local police, and manv others-set its own generalized standards and priorities, result- ing in excessive collection of information about law abiding citizens.

f . COMINFIL Znrestigationa: Owrbreadth In the late 1!36O?s the Communist. infiltration or association concept

continued to be used as a central basis for FBI intelligence investiga- tions. In many cases it led to the collection of information on the same groups and persons who were swept into the investigative net by the vague missions to investigate such subjects as “racial matters” or the “Xew Left. As it had from its beginning, the COMINFIL concept pro- duced investigations of individuals and groups who mere not Commu- nists. Dr. ?Ilartin Luther King, Jr. is the best known example.348 But the lawful activities of many other persons were recorded in FBI fib and reports because thev associated in some wholly innocent way Rith Communists, a term which the Bureau required its agents to “interpret in its broad sense” to include “splinter” and “offshoot” groups.349

During this period, when millions of Americans demonstrated in favor of civil rights and against the Vietnam war, many law-abiding citizens and groups came under the scrutiny of intelligence agencies. Under the COJIINFIL program, for example, the Bureaa compiled extensive reports on moderate groups, like the NA4hCP.350

%‘Staff Memorandum for the Subcommittee on Constitutional Rights, United States Senate. g/14,/71.

a# See detailed report on Martin Luther King, Jr. 3(8 FBI Manual, Section 87. =The Bureau freauentlr disseminated renorts on the NAACP to military

intelligence because ias one report put it) 0; the latter’s “interest, in matters pertaining to infiltration of the NAACP.” (Report from Los Angeles Field Oface to FBI Headquarters, 11/5/65.) All the national officers and board members were listed. and anv data in FBI files on their nast “association” with “sub- versives” was inrludled. Most of this information ‘event back to the 1940’s. (Re- port from New York Field Office to FBI Headquarters, 4/15/65.) When changes occurred in the SAACP’s leadership and board, the Bureau once aeain went back to its files to dredge up “subversive” associations from the 1940’s. (Report from New York Field Office to FBI Headquarters, 4/15/66.) Chapter member- ship information was sometimes obtained hi “pretext telephone cali . . . utilizing the pretext of being interested in joining that branch of the NAACP.” (Memoran- dum from Los Angels field office to FBI Headquarters, 11/5/65.) As discussed previously, the Bureau never found that the NAACP had abandoned its consistent anti-Communist policy. (See p. 49).

Page 98: Church Committee: Reports-- Book II

82

The FBI significantly impaired the democratic decisionmaking P~OCSS by its distorted intelligence reporting on Communist intil- tration of and influence on domestic political activity. In private re- marks to Presidents and in public statements, the Bureau seriously exaggerated the extent of Communist influence in both the civil rights and anti-Vietnam war nlovements.351

3. Domestic Intelligence Aut?writy During this period there were no formal executive directives out-

lining the scope of authority for domestic intelligence activity of the sort previously issued by Presidents Roosevelt, Truman, Eisenhower, and Kennedy. w However, there was a series of high-level requests for intelligence concerning racial and urban unrest directed to the FBI and military intelligence agencies. 1%~ with the earlier formal Presidential directives on subjects like “subversion.” these instructions provided no significant guidelines or controls.

a. FBI Zntetligeme Since the early 1960s the Just.ice Department had been making

sporadic requests for intelligence related to specific racial events. For example, the FBI was requested to provide a tape recording of a speech by Governor-elect George Wallace of Alabama in late 1962 353 and for “photographic coverage” of a civil rights demonstration on the 100th anniversary of the Emancipation Proclamation.354 On its own initiative, the FBI supplied the Civil Rights Division with in- formation from a “confidential source” about plans for a demonstra- tion in Virginia, including background data on its L‘sponsor” and the intention to make “a test case. ” 355 The Civil Rights Division pre- pared regular summaries of information from the Bureau on “dem- onstrations and other racial matters.” 356

m See examples of the exaggeration of Communist influence set forth in Find- ings on Political Abuse. Such distortion continues today. An FBI Intelligence Division Section Chief told the Committee that he could not “think of rery many” major demonstrations in this country in recent years “that mere not caused by” the Communist Party or the Socialist Workers Party. In response to questioning, the Section Chief listed eleven specific demonstrations since 196.5. Three of these turned out to be principally SDS demonstrations, although some individual Communists did participate in one of them. Six others were organized br the Kational (or Sew) Mobilization Committee. which the Section Chief stated was subject to‘Communist and Socialist Workers Part.r “influence.” But the Section Chief admitted that the mobilization Committee “probably” included a n-ide spectrum of persons from all elements of American soeietg. (R. L. Shackleford deposition, 2/13/76, pp. 3-8.) The FBI has not alleged that the Socialist Workers Party is dominated or controlled by any foreign government. (Shackelford testimony, 2/6/76, pp. 73-77,114.)

w See Sections B-3 and C-2. 565Memorandum from Director, FBI, to Assistant Attorney General Burke

Marshall (Civil Rights Division), 12/4/62. m Memorandum from St. J. B. (St. John Barrett) to Burke Marshall, 6/X3/63. 565Memorandum from J. Edgar Hoover to Attorney General Robert Kennedy,

7/U/63. 358 Memorandum from Carl W. Gabel to Burke Marshall, 7/N/63. This memo-

randum described twenty-one surh “racial matters” in ten states, including states outside the South such as Ohio, Xew Jersey, Pennsylvania, Indiana. and Sevada. While some of the items in this and later summaries related to violent or poten- tiaIIy violent protest demonstrations, they went beyond those limits to include entirely peaceful protest actiritv and group activities (such as conferences, mcet- ings. leadership changes) unrelated to demonstrations. (Memoranda from Gabel to Marshall. 7/22 and 7/25, 8/2 and S/22/&3) The Justice Department’s role in expanding FBI intelligence operations against the Klan is discussed at pp. -.

Page 99: Church Committee: Reports-- Book II

83

A formal directive, for a similar purpose, was sent by, Attorney Gen- eral Kennedy to U.S. Attorneys throughout the South m May 1963. It instructed t,hem to “make a survey?’ to ascertain “any places where racial demonstrations are expected within the next 30 days” and to make “assessments of situations’: in their districts. The FBI was “asked to cooperate.:’ 357

President Johnson ordered the FBI to investigate and report on the origins and extent of the first small-scale Sorthern ghetto disturbances in the summer of 1962.358 After the FBI submitted a report on the Watts riot in Los Aneeles in 1965, however, Attorney General Kat- zenbach advised President Johnson that the FBI should investigate “directly>’ only the possible “subversive involvement.” Katzenbach did not belikve that the FBI should conduct a “general investigation” of “other aspects of the riot,” since these were local law enforcement mat- ters. The President approved this “limited investigat,ion.” 35Q None- theless, internal Bureau instruct,ions in 1965 and 1966 went far beyond this limitation.360 By 1967 new httorney General Ramsey Clark re- versed the Department’s position on such limitations.

After the riots in Newark and Detroit in the summer of 1967, President Johnson announced that the FBI had “standing instruc- tions” for investigating riots “to search for evidence on conspiracy.” 361 This announcement accompanied the creation of a National Advisory Commission on Civil Disorders to investigate the “basic factors and causes 1eadin.g to” the riots, including the “influence” of groups or persons “dedicated to the incitement or encouragement of violence.” The President ordered the FBI in particular to “provide investigative information and assistance” to the Cummission.362 Director Hoover also agreed to investigate “allegations of subversive influence, involve- ment of out-of-state influences, and the like.” 363

In September 1967, Att,orney General Clark directed the FBI to :

use the maximum resources, investigative and intelligence, to collect and report all facts bearing upon the question as to whether there has been or is a scheme or conspiracy by any group of whatever size, effectiveness or affiliat.ion, to plan. promote or aggravate riot activity.36*

a67 Telegram from Attorney General Kennedy to U.S. Attorneys, 5/27/63. sirs The basis for the inquiry was explained in the most general terms : “Keeping

the peace in this country is essentially the responsibility of the state government. Where lawless condEtions arise, however, with similar characteristics from coast to coast, the matter is one of national concern even though there is no direct con- nection between the events and even though no Federal law is violated.” (Text of FBI Report on Recent Racial Disturbances, Sew York Times, g/27/64.)

360 Memorandum from Attorney General Katzenbach to President Johnson, 8/17;%

w ‘See p. 71. 981 Remarks of the President, 7/29/W, in Report of the National Advisory Cont-

mission ok Civil Disorders (1968). D. 537 (Bantam Books ed.) =a Execut.ire Order 113&5 7/29/67. 3(13 Memorandum from C. D. DeLoach to Mr. Tolson, 8/l/67, Subject : Director’s

Testimony Before Sational Advisory Commission on Civil Disorders. This mem- orandum indicates that, following this testimony, Director Hoover ordered his subordinates to intensify their collection of intelligence about “vociferous rabble- rousers.” The creation thereafter of a “Rabble Rouser Index” is discussed at pp. RHO.

38( Jlemorandum from Attorney General Ramsey Clark ‘to .J. Edgar Hoover, 9/14/67.

Page 100: Church Committee: Reports-- Book II

84

Justice Department executives vere generally aware of, and in some cases sought to widen, the scope of FBI intelligence collection. In a lengthy review of Bureau reports, John Doar, Assistant Attorney General for the Civil Rights Division, expressed concern that the FBI had not “taken a broad spect.rum approach” to intelligence col- lection, since it had “focused narrowly” on “traditional subversive groups” and on persons suspected of “specific statutory violat,ions.” 365

Reiterating this viewpoint, Attorney General Clark told Director Hoover that “existing intelligence sources” may not have. “regularly monitored” possible riot conspirators in “the urban ghetto.” He added that it was necessary to conduct a “broad investigation” and that

sources or informants in black nationalist organizations, SNCC (Student Nonviolent Coordinating Committee) and other less publicized groups should be developed and ex- panded to determine the size and purpose of these groups and their relationship to other groups . . ?@

Clark described his directive as setting forth “a relatively new area of investigation and intelligence reporting for the FBI.” 367

In response to t.he Attorney General’s instructions, the FBI advised its field offices of the immediate “need to develop additional penetra- tive coverage of the militant black nationalist groups and the ghetto areas.” 368

6. Army Intelligence On January 10, 1968, a meeting took place at t,he White House for

the purpose of “advance planning for summer riots.” The White House memorandum of the meeting reported :

The Brn-17 has undertaken its own intelligence study, and has rated various cities as to their riot potential. They are mak- ing contingency plans for troop movements, landing sites, facilities, etc.

It added that the Sttorney General and the Deputy Secretary of De- fense “had agreed to coordinate their efforts.” 360 The Army General Counsel’s memorandum of the meeting stated t.hat Attorney General Clark had “strewed the difficulty of the intelligence effort,” especially because there were “only 40 Negro FBI agents” out of t.he total of about 6$00. Clark added that “every resource” was needed in “the in- telligence collection effort,” although he asked the Defense Depart- ment to “screen” its “incoming intelligence” and send “only key items” to t.he Justice Department.370

m Memorandum from Assistant Attorney ‘General John Doar to Attorney Gen- eral Clark, 9//27/67.

w Memorandum from Clark to Hoover, g/14/67. ZS’ Clark to Hoover, g/14/67. The Department’s establishment of a special unit

for intelligence evaluation is discussed at pp. 1X5-116. m SSC Letter 67-72, 10/17/67. The scope of the “ghetto informant program” is

dewrihed at pp. 7576. w Memorandum from Joseph Califano to the President, l/18/68. Those present

were Bttorney General Clark, Deputy Attorney General Warren Christopher, Deput.r Secretary of Defense Paul Nitze, Acting Army General Counsel Robert Jordan, and Presidential assislxnts Matthew Nimetz and Califano.

“’ Memorandum from the Army General Counsel to the Under Secretarv of the Army, l/10/68. Former Army Chief of Stiff Hrlrold K. .Tohnson has s&d that thwo n-ere several other meetings at the White House lvhere the Army was urged to take a greater role in the civil disturbance collection effort. (Staff summary of Harold K. Johnson interview, U/18/75.)

Page 101: Church Committee: Reports-- Book II

85

There is no record that at this or any other similar meeting in this period t.he Attorney General or White House aides explicitly ordered the army to conduct intelligence investigations using infiltration or other covert surveillance techniques. However, even though Army col- lection plans which were circulated to the Justice Department and the FBI 371 did not mention techniques of collection, the information they described could only be obtained by covert surveillance. No objections Kere voiced by the Justice Department.

Not until 1069 was there a formal civilian decision specifically authorizing Army surveillance of civilian political activity. At that time, Attorney General John Mitchell and Secretary of Defense Mel- vin Laird considered the matter and over the objections of the Army General Counsel, decided that the Army would participate in intelli- gence collection concerning civil disturbances.3’2 The Army’s collec- tion plan was not rescinded until June 1970, after public exposure and congressional criticism.3’3

c. FBI Interagency Agreemm ts After the assassination of President Kennedy, the FBI and the

Secret Service negotiated an ‘agreement which recognized that the Bureau had “general jurisdiction” over “subversion.” The term was defined, more narrowly than it had been defined by practice in the past, as “knowingly or wilfully adrocat [ing]” overthrow of the Government by “force or violence” or by “assassination.” Except for “temporary” action to “neutralize” a threat to the President, the Secret Service agreed to “conduct no investigation” of “members of subversive groups” without notifying the FBI. The Bureau, on the other hand, would not investigate individuals “solely” to determine their “danger- ousness to the President.” 374

m Federal Data Banks, Hearings, at p. 1137. On at least one occasion, Deputy Attorney General Warren Christopher thanked an Army intelligence o5cer for spot reports and daily summaries. (Letter from Deputy Assistant General Chris- topher to Maj. Gen. William P. Yarborough, Assistant Chief of Staff for Intelli- gence, 5/15/68.) The Justice Department’s intelligence analysis unit received “army intelligence reports” during 1968 on persons and groups involved in “racial agitation.” (Memorandum from Assistant Attorney General J. Walter Yeagley to Deputy Attorney General Richard G. Kleindienst, 2/6/69.)

m Memorandum from Secretary of Defense Melvin Laird and Attorney General John N. Mitchell to the President, 4/l/69. Subject: Interdepartmental Action Plan for Civil Disturbances. This reflected a failure on the part of the Army General Counsel to persuade the Justice Department to relieve the Army of its domestic intelligence-gathering role. (Memorandum from Robert E. Jordan, Army General Counsel, to the Secretary of the Army, Subject: Review of Civil Disturbance Intelligence Historv, in Biilitaty Surz;eiZZance, Hearings, p. 296.)

578 Letter from Robert E. Lynch, Acting Adjutant General of the Army, to sub- ordinate commands, 6/g/70, Subject : Collection, Reporting, Processing, and Stor- age of Civil Disturbance Information.

See discussion of the termination of this program in Section III [“Ter- minations” Sub-finding under “Accountability and Control”].

“‘Agreement Between the Federal Bureau of Inrestipation and the Secret Service Concernine Presidential Protection, 2/3/65. The FBI was to report to Secret Serri.ce information about “subversives, ultra-rightists, racists and fascists” who expressed “strong or violent anti-U.S. sentiment” or made “state- ments indicating a propensity for violence and antipathy toward good order and government.”

These reporting standards were modified in 1971 to require the FBI to refer to Secret Service: “Information concerning civil disturbances, anti-U.S. demon- strations or incidents or demonstrations against foreign diplomatic establish-

(Continued)

Page 102: Church Committee: Reports-- Book II

86

After Congress enacted antibombing legislation in 19’70, the FBI was assigned primary responsibility for investigating “offenses perpetrated by terrorist/revolutionary groups." 375 When these guidelines were developed, the FBI shifted supervision of bombing cases from its General Investigative Division to the 1ntelligenc.e Division because, as one official put it, the specific criminal investigations were “so inter- related with the gathering of intelligence in the racial and security fields that overlap constantly occurs.” ~0

The agreement with Secret Service and the “guidelines” covering bombing investigations did not give the FBI any additional domestic intelligence-gathering authority. They simply provided for dissemina- tion of information to Secret Service and allocated criminal investiga- tive jurisdiction between the FBI and the Alcohol, Firearms, and Tobacco Division. Nevertheless, both presupposed that the FBI had broad authority to investigate “subversives” or “terrorist/revolution- ary groups.”

$. Domestic Covert Action

a. COINTELPRO The FBI’s initiation of COINTEI,PRO operations against the Ku

Klux Klan, “Black Nationalists” and the “New Left” brought to bear upon a wide-range of domestic groups the techniques previously devel- oped to combat Communists and persons rvho happened to associate with them.

The start of each program coincided with significant national events. The Klan program followed the widely--publicized disappearance in 1964 of three civil rights workers in Mississippi. The “Black Na- tionalist” program was authorized in the aftermath of the Newark and Detroit riots in 1967. The “New Left” program developed shortly after student. disruption of the Columbia TJniversity campus in the spring of 1968. While the initiating memoranda approved by Director Hoover do not refer to these specific events, it is clear that they shaped the context for the Bureau’s decisions.

These programs were not directed at obtaining evidence for use in possible criminal prosecut.ions arising out of those events. Rather, they were secret programs-“under no circumstances” to be “made known outside the Bureau” 377 -which used unlawful or improper acts to “disrupt” or “neutralize” the activities of groups and individuals targeted on the basis of imprecise criteria.

(1) Klan and “WJzite flute?’ GOZNTELPRO.-The expansion of Klan investigations, in response to pressure from President ,Johnson and Attorney General Kennedy,378 was accompanied by an internal

(Continued) ments :” and “information concerning persons who may be considered potentially dangerous to individuals protected by the [Secret Service] because of their . . . participation in groups engaging in activities inimical to the United States.” With respect to organizations, the FBI reported information on their “officers.” “size,” “goals,” “source of financial support,” and other “background data.” (Agreement Between the Federal Bureau of Investigation and the United States Secret Service Concerning Protective Responsibilities. 11/26/71.)

3xInvestigative Guidelines: Title XI, Organized Crime Control Act of 1979, Regulation of Explosives.

“’ FBI Inspection Report, Domestic Intelligence Division, August 17-Septem- ber 9. 1971, pp. 224-38.

311 Memoranda from FBI headouarters to all SAC’s, g/2/64 ; g/25/67 ; 5/g/68. ns See pp. 74-75.

Page 103: Church Committee: Reports-- Book II

87

Bureau decision to shift their supervision from the General Investiga- tive Division to the Domestic Intelligence Division. One internal FBI argument for the transfer \Tas that ihe Intelligence Division was ‘*in a position to launch a disruptive connterintellige~Icc program’! against the Klan with the “same effectiveness” it had against the Communist Party.379

Accordingly, in September 1964 a directive was sent to seventeen field offices instituting a COINTELPRO against the Klan and what the FBI considered to be other ‘White Hate” organizations (e.g., American Nazi Party, National States Rights Party) “to expose, dis- rupt, and otherwise neutralize” the activities of the groups, “their leaders, and adherents.” 3~0

During the 1964-1971 period, when the program was in operation, 287 proposals for COINTELPRO actions against Klan and White Hate” groups were authorized by FBI headquarters.381 Covert tech- niques used in this COINTELPRO included creating new Klan chap- ters to be controlled by Bureau informants and sending an anonymous letter designed to break up a marriape.382

(2) “Black Nationalist” 001iVTELPRO.-The stated strategy of the “Black Nationalist” COIXTELPRO instituted in 1967 was “to expose, disrupt., misdirect, discredit, or otherwise neutralize” such groups and their “leadership, spokesmen, members, and supporters.” The larger objectives were to “counter” their “propensity for violence” and to “frustrate” their efforts to “consolidate their forces” or to “re- cruit new or youthful adherents.” Field offices were instructed to exploit conflicts within and betrveen groups; to use news media con- tacts to ridicule and otherwise discredit groups; to prevent “rabble rousers” from spreading their “philosophy” publicly ; and to gather information on the “unsavory backgrounds” of group leaders.383

In March 1968, the program was expanded from twenty-three to forty-one field offices and the following long-range goals were set forth :

(1) prevent the “coalition of militant black nationalist groups ;”

(2) prevent the rise of a “messiah” who could “unify and electrify” the movement, naming specifically Dr. Martin LU- ther K&g, ,Jr., Stokely Carmichael, and Elijah Muhammed;

(3) prevent violence bv pinpointing ‘(potential trouble- makers” and “neutralizing” them before they “exercise their potential for violence;”

(4) prevent groups and leaders from gaining “respectabil- ity” by discrediting them to the “responsible” Negro com- munity, the “responsible” Tvhite community, “liberals” with

~TQ filemorandum from J. H. Gale to i\fr. Tolson, 7/30/64 (Gale was Assistant Director for the Inspection Division).

380 1Iemorandum from FBI Headquarters to all SACc;, 9/Z/64. mThe average of 40 “White Hate” actions per war may he compared to an

average of over 100 per year against the Communist Party from 1%6-19’71 (Walling 1636). Exhibit. 11, Hearings, rol. 6, p. 371.

aaThese techniques and those ILS~ against the other target groups referred to l~elom zre discussed in greater detail in the COINTELPRO detailed report and in the Covert Action section of the Findings. Part ITT. p. 211.

m Memorandum from FBI Headquarters to all SACS, S/25/67.

Page 104: Church Committee: Reports-- Book II

88

“vestiges of sympathy” for militant black nationalist+ and “Negro radicals;” and

(5) “prevent these groups from recruiting young people.” 384

After the Black Panther Party emerged as a group of national stat- ure, FBI field offices were instructed to develop “imaginative and hard-hitting counterintelligence measures aimed at crippling the BPP.” Particular attention was to be given to aggravating conflicts between the Black Panthers and rival groups in a number of cities w-here such conflict’ had already taken on the character of “gang lvar- fare with attendant threats of murder and reprisals.” 383

During 1967-1971. FRT headquarters approved 379 proposals for COIXTELPRO actions against “black nationalists.” 386 These opera- tions utilized dangerous and unsa.vory techniques which gave rise to the risk of death and often disregarded the personal rights and dignity of the victims.

(3) “flew Left" C’OZflTZ?LPRO.-The most vaguely defined and haphazard of the COINTF,T,PRO operations was that initiated against the “Ne\v Left” in May 1968. It was justified to the FBI Director by his subordinates on the basis of the following considcra- tions :

The nation vas “undergoing an era of disruption and violence” which was “caused to a large extent” by individ- uals “generally connected with the New Left.”

Some of these. “activists” were urging “revolution” and calling for “the defeat of the United States in Vietnam.”

The problem was not just. that they committed “unlawful acts,” but also that they “falsely” alleged police brutality, and that they “scurrilously attacked the Director and the l3u- reau” in an attempt to “hamper” FBI investigations and to “drive us off the college campuses.” 387

Consequentlv, the COTXTELPRO was intended to “e.xpose, disrupt,. and otherwise neutralize!’ t,he activities of “this group” and “persons connected with it.” 388 The lack of anv clear definition of “New Left” meant, as an FRI supervisor test.ifie& that “legitimate” ,and nonvio- lent antiwar groups were targeted because they were “lending aid and comfort” to more disruptive groups.388

Further directives issued soon after initiation of the progTam urged field offices to “vigorously and enthusiastically” explore “erery avenue of possible embarrassment” of New Left adherents. Agents were instructed to gather information on the “immorality” and the “scurrilous and denraved!’ behavior, “habits, and living conditions” of the members of tarpeted rrroups. 3Qo This message was reiterated s\vral months later. when the offices were taken to task for their failure to remain alert for and seek specific data denicting the “de- praved nature and m6ral looseness of the New Left” and to “use this

“‘~lemorandum from FRT H~dguarter~ to ~11 8.4%. 3/4/t%. SJ ifemorandum from FBI Headquarters to SACS. 11/25/68. m The average was over 90 per year. (Exhibit 11. Hearings. Vol. 6, P. 371.) ~Memorandum from C. D. Brennan to W. C. Sullivan, 5/9/68. Isa C. D. Brennan to W. C. Sullivan, 5/g/68. 588 Sulwrvisor, FBI Intelligence Division, lo/%/$% D. 39. 3L*) Memorandum from FBI Headquarters to all SACS, s/z/68.

Page 105: Church Committee: Reports-- Book II

89

material in a vigorous and enthusiastic approach to neutralizing them.:’ 3Q1

In July 1968, the fie,ld offices were further prodded by FBI head- quarters to :

(1) prepare 1eaflet.s using “the most obnoxious piotures” of Kew Left leaders at various universities ;

(2) instigate “personal conflic,ts or animosities” betlveen New Left leaders ;

(3) create the impression that, leaders are “informants for the Bureau or other law enforcement agencie,s” (the “snitch jacket.” technique) ;

(-1) ~encl articles from student or “underground” news- papers which show “depravity” (“use of narcotics and free sex”) of Sew Left leaders to university officials, donors, legislators, and parents;

(6) have members arrested on marijuana charges; (6) send anonymous letters about a student’s activities to

parents, neighbors3 and the parents’ employers; (7) send anonymous letters about Sew Left, faculty mem-

bers (signed “A Concerned Alumni” or <‘A Concerned Tax- payer”) to university officials, legislators, Board of Regents, and the press ;

(8) use “cooperative Dress contacts;” (0) exploit the “hostility” between New Left and Old Left

groups ; (10) disrupt Ne.w Left, coffee houses near military bases

which are attrmpting to “influence members of the Armed forces :”

5?i~hle” the Nen Tkft use cartoons photographs, and nnon;vmous letters to

(12) use “n~isinf~rn~t;tioil: to “confuse and disrupt” New Left activities, such as by notifying members that events have been cancelled.3Q2

During the period 1968-1971. 291 COIKTELPRO actions against the “Xew Left!’ were, approved by headquarters.3Q3 Particular emphasis w-as placed upon preventing the tar@ed individuals from public speaking or teaching and providing “misinformation” to con- fuse demonstrators.

6. FBI Tnrget Lists The FBI’s most intensive domestic intelligence investigations and

COISTELPRO operations were directed against persons identified, not. as criminals or criminal suspects, but in vague terms such as “rabble rollser.” “agitators.” “keg activists,” or “key black extremists.” The Secruity Index for detention in time of natlonal emergency was revised to include such persons.

(1) “RahUe Rousel,/Agitntor” Z&e.r.-Following a meeting with the Kational A1drisory Commission on Civil Disorders in August 1967. Director Hoover ordered his subordinates to intensify collection of

“* Jlemoranclum from FBI Headquarters to all SACS. 10/9/M -a \Icmorandnm from FBI HeaclqnartPrs to all SAC’s, 7/6/68. 3”Appr~ximately 100 per year (Exhibit 11, Hearings, Vol. 6, p. 371.).

Page 106: Church Committee: Reports-- Book II

90

intelligence about “vociferous rabble-rousers.” 3838 He ,also directed “that an index be compiled of racial agitators and individuals who have demonstrated a potential for fomenting racial discord.” 3Q4

The already vague standards for the Rabble Rouser Index were broadened in Nwcmber 1967 to cover persons with a “propensity for fomenting” any disorders affecting the “internal security”--as opposed to only racial disorders-and to include persons of local as v~ell as national interest. This included “black nationalists, white suprema- cists. Puerto Rican nationalists, anti-Vietnam demonstration leaders, and other extremists.” A rabble rouser was defined as :

a person who tries to arouse people to violent action by appealing to their emotions, prejudices, et cetera; a demagogue.3”5

In March 1968, the Rabble Rouser Index was renamed the Agitator Index and field offices were ordered to obtain a photograph of each person on the Index. 3L)G However, expanding the size of the Agitator Index lessened its value as an efficient target list for FBI intelligence operations. Consequently, the Bureau developed a more refined tool for this purpose-the Key Activist Program.

(2) “JIcv -4~fi~i~t” P~og~ccnz..-Instructiolls were issued to ten ma- jor field offices in January 1968 to designate certain persons as “Key .ictirists,” who were defined as

individuals in the Students. for Democratic Society and the anti-Vietnam war groups [who] are extremely active and most vocal in their statements denouncing the ‘t’nited States and calling for civil disobcclience and other forms of unlaw- ful and disruptive acts.

There was to be an “intensive investigation” of each Kry Activist, which might. include “high-level informant coverage” and “technical surveillances and physical surveillances.” 3g7

The “Yew TRft’! COISTET,PRO was designed in part to “neutral- ize” the Key ,4cti\-ists. who were “the moving forces behind the New Left.” 3gR One of the first techniqrles employed in this program was to obtain the Federal income tas returns of Key Activists for use in disrupting their activities. 399 In October 1968, the Key Activist Pro- gram was expanded to virtuallv all field offices. The field agents were in- structed to recommend adclitional persons for the program and to “consider if the individual was r~nclered ineffective would it. curtail [disruptive] activity in his area of influence.” While the FRI consid- ered Federal prosecution a “logical’! result of these investigations and “the best deterrent,” Key 14ctlrists were not selected because they were suspected of committing or planning to commit any specific Federal crime. 400

381n JIemornndum from C. n. DeT,oach to Mr. Tolson. 8/l/67. (At the meeting, n Commission nwmlwr had asked the Bureau to “identify the number of militant

38’?I~ninrandum from C. I). Brennnn to 11’. C. Sullivan, 8/3/6i; SSC Letter G7-&9/12/67 ,_--,

38.i K\C Letter So. 67-70. 11/28/Ri. 380 ;\f~n~nrandnn~ from FE1 Hendqnnrters to all S.\Cs. 3/21/W. “’ Memorandum from FBI Hwtlqnartrrs to all SACS, l/30/68. 38q ~Irninrandnm from C. D. Brennnn to V. C. Snlli\xn. 5/9/W ‘08 \Iemnrandum from C. D. Erwinan to W. C. Sullivan. 5/2+/W. ‘Wkemorandum from FBI Headquarters to all SSCs, 10/24/68.

Page 107: Church Committee: Reports-- Book II

91

(3) “Rey R7ncXI Ertrcmisf Progmm.-A “Key Black Extremist” target list for concentrated investigation and COIXTEI~PRO actions was instituted in 1970. Key Black Extremists were defined as

leaders or activists [who] are particularly extreme, ngitatire, anti-Gal-crnnlcllt, and vocal in their calls for terrorism and violence. 4o1

Field ofices wre instructed to place all Key Black Extremists in the top priority category of the Security Index and in the Black Nation- alist Photograph Album. which concentrated on “militant black nationalists” who trawled cxtensirclg. In addition, the following steps were to be taken :

(1) All aspects of the finances of a KBE must be deter- minecl. Bank accounts must be monitored. . . .

(2) Continuing consideration must be given by each office to develop means to neutralize the effectiveness of each KBE. . . .

(3) Obtain suitable handwriting specimens. . . . (4) Particular efforts should be made to obtain records of

and/or reliable witnesses to, inflammatory statements. . . . (5) Where there appears to be a possible violation of a

statute within the investigative jurisdiction of the Bureau, [it should be] yigorously investigated. . . .

(6) Particular attention must be paid to travel by a KBE and every effort made to determine financial arrangements for such travel. . . .

(7) The Federal income tax returns of all KBEs must be chicked annually. . . .

Reports on all Key Black Extremists were to be submitted every ninety days, and the field was urged to use “initiative and imagination” to achieve “the desired results.” 403 Once again, the “result” was not limited to prosecution of crimes and the targets were not chosen because they were suspected of committing crimes.

(4) Security Index.-The Agitator Inclex was abolished in 1971 because “extremist, subjects” were “adequately followed” through the Security Index. M* In contrast to the other indices, the Securitv Index was not reviewed by the FBI alone. It. had, from the late 1946’s, been largely a joint FBI-Justice Department program based on the De- partment,‘s plans for emergency cletention.4o5 According to FBI mem- oranda, moreover, President ,Johnson was directly involved in the updating of emergency detention plans.40G

After a large-scale March on the Pentagon against the Vietnam War in October 1967, President Johnson ordered a comprehensive review of the government’s emergency plans. Attorney General Clark was appoint,ed chairman of a comn;ittee to review the Presidential Emer- gency A&ion Documents (PE,iDs) preparrcl under the Emergency Detention Program. One result of this review? in which the FBI took part, was a decision to brin g the Detention Program into line with the

“I Memorandum from G. C. Moore to C. D. Rrennan, 12/22/iO. ‘On 3l~morandum from FRI Headynarters to all SACS, 12/23/70. ‘(*I Memorandum from C. D. Brennan to IV. C. Sullivan, 4/30/M. 4w Rre 1,~. 54-T,Z. HxI C. D. Brennan to TV. C. Sullivan, 4/30/68.

Page 108: Church Committee: Reports-- Book II

92

Emergencv Detention Act of 1950, reversing the previous decision to “disregard” as “unworkable” the procedural requirements of the Act, which \vere tighter than the standards which had been applied by FBI and Justice.*o7

The Bureau also had to revise its criteria for inclusion of names on the Security Index, which since 1950 had disregarded the statutory standards. However: the definition chosen of a “dangerous individual” was so broad that it enabled the Bureau to add persons not previously eligible. A “dangerous individual” was defined as a

person as to whom there is reasonable ground to believe that such person probably will engage in, or probably will conspire with others to engage in, acts of espionage and sabotage, including acts of terrorism or assassination and any intey*- ference with or threat to the survival of and effectiw opern- tion of the national, state, and local governme& and of the national defense effort. [Emphasis added.] 408

The emphasized language greatly broadened the Security Index stand- ards. It gave FBI intelligence officials the opportunity to include on the Security Index “racial militants”, “black nationalists”, and in- dividuals associated with the “New Left” who were not affiliated with the “basic revolutionary organizations ” as the Bureau characterized the Communist Party, which had previously been the focus of the Security Index.40g Once again, the limitations which a statute was intended to impose were cffectlvely circumvented by the use of elastic language in a Presidential directive.

Moreover, the Bureau adopted a neK “priority” ranking for appre- hension in case of an emergency. Top priority was non- given not only to leaders of “basic subversive organizat.ions.” but also to “leaders of anarchistic groups.‘1 410 It was said to be the “anarchistic tendencies” of New Left, and racial militants that made them a “threat to the internal security.” *I1

Initiallv. the Justice Department approved informally these changes in the criteria for L‘the persons listed for apprehension.” 412 After several mont.hs of “study,” the Justice Department% Office of Legal Counsel formallv approved the new Security Index criteria. This was the first time since 10% that, the Department had fully considered the matter, and the previous policy of disregarding the procedures of the Emergency Detention Act of 19.50 was formally abandoned. If an emergency occurred. the Attorney General would abide by “the requirement that any person actually detained will be entitled to a hearing at, which timr the cridencc will hare to satisfy the standards of [the. Actl.” However. the Office of Legal Counsel declared that the Security Index criteria themselves could be-as thev were-less precise than those of the net because of the “needed flexil;ilitV and discretion at the operating level in order to carry on an effective surveillance

‘01 See pn. W-5.5 and Report on FBI Investigations. a Presidential Emergency -4ction Document 6, as quoted in Brennan to Sulli-

ran. 4/30/i%. ‘OQ Memorandum from C. D. Brennan to IV’. C. Sullivan, 4/30/X. ‘lo C. D. Brrnnan to W. C. Sullivan. 4/30/W. “I C. D. Brennan to W. C. Sullivan, 4/30/68. ‘I’ Memorandum from J. Edgar Hoover to J. Walter Teagley, 5/l/@: Peagley

to Hoover, 6/17/t%.

Page 109: Church Committee: Reports-- Book II

93

“4~ Thus while the plan to ignore Congress’ procedural E!%%s was aba;doned. Congress’ substantive standards were dis- regarded as insufficiently “flexible.”

c. Internal Rccenue Serwkc Program (1) Misuse by FBI and CIA.-IRS information was used as an

inst.rument of domestic intelligence mainly by the FBI. For example, in 1965, the Bure.au obtained t.he t.ax r&urns of Ku Klux Klan mem- bers in order to develop “discredit.ing or embarrassing” information as part of t.h e Bureau’s COINTELPRO against the K1an.414 The procedure by which FBI obtained access to tax returns and related information held by IRS was deemed “illegal” when it was discovered by the Chief of the IRS Disclosure Branch in 1968.4’5 The FBI had not followed the procedures for obtaining returns which required written application to the IRS Disclosure Branch. Instead the Bureau had arranged to obtain the returns and information surreptitiously through cont,acts inside the IRS Intelligence Division. The procedure for FBI access was regularized by the IRS after 1968 : a formal request on behalf of the Bureau was made to the IRS Disclosure Branch, by the Internal Security Division of the Justice Department.

During t,his same period, the CIA was obtaining tax returns in a manner similar to the FBI, although in much smaller numbers. Yet even after procedures were changed for the FBI’s access to tax in- formation in 1968, the IRS did not re-examine the CIA’s practices?16 Therefore, CIA continued to receive tax return information without filing requests as required by the regulations.

Between 1968 and 1974, either directly or through the Internal Security Division of the Justice Department, the FBI requested at least 130 tax returns for domestic intelligence purposes. This included the returns of 46 “New Left activists” and ‘74 “black extremists,” 417 as part of Bureau COINTELPRO operations to “neutralize” these indi- viduals.418 These requests were not predicated upon any specific in- formation suggesting delinquency in fulfilling tax obligations.

Even after a formal request was required before supplying the FBI with tax returns, t.he IRS accepted the Justice Department’s undocu-

“‘Among the criteria specifically approved by the Justice Department which went beyond the statutory standard of reasonable likelihood of espionage and sabotage were the expanded references to persons who have “anarchistic or revolutionary beliefs” and are “likely to seize upon the opportunity presented by a national emergency” to commit acts which constitute “interference wi’th” the “effective operation of the national, state and local governments and of the defense effort.” (Assistant Attorney General Frank M. Wozencraft, Of&e of Legal Counsel, to Assistant Attorney General J. Walter Yeagley, Internal Security Division, 9/9/f%.) The standards as approved were transmitted to the FBI, and its Manual was revised accordingly. (Yeagley to Hoover, g/19/68; Hoover to Yeagley, O/26/68; FBI Manual, Section 87, p. 45, revised 10/14/68.) The FBI still maintained its Reserve Index, unbeknownst to the Department.

‘I’ One of the express purposes was to use tax information to “expose” the Klan members “within the Klan organization [or] publicly by showing income bevond their means.” (Memorandum from F. J. Baumgardner to W. C. Sullivan, 5/10/65. ) Disclosure of tax information “publicly” or “within the Klan organiza- tion” is prohibited by staltute.

‘= Xemorandum from D. 0. Virdin to H. E. Snyder, 5/2/68. Subject : Inspection nf Returns by FBI.

‘I’ Donald 0. Virdin testimony, g/16/75, pp. 69-73. “‘Staff Memorandum: Review of Materials in FBI Administrative File on

“Income Tax Returns Requested.” I”I Memorandum from C. D. Brennan to W. C. Sullivan, 12/6/68.

Page 110: Church Committee: Reports-- Book II

94

mentcd assertions that tax information was “necessary” in connection with an “official matter” involving “internal security.” 41g Yet in mak- ing such assertions, the Justice Department’s Internal Security Divi- sion relied entirely on the Bureau’s judgment’. Thus, \vhile the IRS is required by the statute to release tax information only where neces- sary, it in effect delegated its responsibility to the Internal Security Division which in turn delegated the decision to the FBI. Although most FBI requests for tax information were for targets of various COINTELPRO operations, the Justice Department official who made the requests on behalf of the Bureau said he was never informed of the existence of COINTELPR0.420

Even after 1968, the Bureau sometimes used tax information in improper or unlawful ways. For example, the Bureau attempted to use such information to cause IRS to audit a mid-western college pro- fessor associated with “new left” activities at the time he was planning to attend the 1968 Democratic Party National Convention in Chicago. The FBI agent in charge of the operation against the professor ex- plained its purpose in a memorandum :

if IR,S cont.act with [the Professor] can be arranged within the next two weeks their demands upon him may be a source of distract.ion during the critical period when he is engaged in meetings and plans for disruption of the Democratic Na- tional Convention. Any drain upon the time and concentra- tion which [the Professor], a leading figure in Demcon planning, can bring to bear upon this activity can only accrue to the benefit of the Government and general public.421

Among the tax returns which the CIA obtained informally from IRS in an informal and illegal manner were those of the author of a book, the publication of which the CIA sought to preventp2 and of Ramparts magazine which had exposed the CIA’s covert use of the Nat’ional Student Association .423 In the latter case? CIA memoranda indicate that its officials were unwilling to risk a formal request for tax information without first learning through informal disclosure whether the tax returns contained any information that would be helpful in their effort to deter this “attack on the CIA” and on “the administration in general.” 424

(2) The Special Service Staff: IRS Targetin.g of Ideological Groups.-In 1969, the IRS established a Special Service Staff to gather intelligence on a category of taxpayers defined essentially by political criteria. The SSS attempted to develop tax cases against the targeted taxpayers and initiated tax fraud investigations against some who would otherwise never have been investigated.

The SSS originated as a result of pressure from the permanent Sub- committee on Investigations of the Senate Committee on Government Operations 425 and from President Nixon, acting through White House

‘Ia Leon Green deposition, g/12/75, pp. 6-S. ‘20 Statement of J. W. Yeaglev to Senate Select Committee, September 19% ‘n Memorandum from ;\Iidw& City Field Office to FRI Headquarters, 8/l/68. o CIA memorandum, Subject : BUTANE-Victor Marchetti. a CIA memorandum, Subject : IRS Briefing on Ramparts, 2/2/67. ‘*’ CIA memorandum. Subject : IRS Briefing on Ramparts, 2/2/67. *Leon C. Green testimony. 9/12/75, p. 36.

Page 111: Church Committee: Reports-- Book II

95

assistants Tom Charles Huston and Dr. Arthur Rurn~.~*~ According to the IRS Commissioner’s memorandum, Dr. Burns expressed to him the President’s concern

over the fact that. tax-exempt funds ma7 be supporting a&iv- ist. groups engaged in stimulating riots both on the campus and \Tithin our inner cities.427

The administration did not supply any facts to support the assertion that such groups were riolating tax Inn-s.

After the SSS was established, the FBI and the Justice Depart- ment’s Interdivisional Information Vnit (IDIV) became its largest sources of names. An Assistant, IRS Commissioner requested the FBI to provide information regarding “various organizations of predoml- nantlv dissident or extremist nature and/or people prominently identi- fied &thin those organizations.?‘~8 The FBI agreed, believing, as one intelligence official put it, that SSS would “deal a blow” to “dis- sident elements.” 42Q

Among the material received bv SSS from the FBI was a Iist of 2.300 organizations categorized as “Old Left.” “New Left,” and “Right J\7ing.?y 430 The SSS also receired about 10,000 names on IDITJ com- puter printouts.431 SSS opened files on all these taxpayers, many of whom were later subjected to tax audits and some to tax fraud investi- gations. There is no reason to believe that the names listed by the FBI or the ID117 were selected on the basis of any probable noncompliance +th the tax Ian-s. Rather, these groups and mdividunls were targeted because of their political and ideological beliefs and activities.432

The SSS. by the time it was disbanded in 1973, had gone over apnroximately half of the IDITT index and established files on those individuals on whom it had no file. Xames on the SSS list included Nobel Prize winner Linus Pauling, Senators Charles Goode11 and Ernest Gruening, Congressman Charles Diggs, journalists Joseph alsop and Jimmv Breslin. and attorney Mitchell Rogovin. Orpaniza- tions on the SSS list included : political groups ranging from the John Birch Society to Common Cawe; religious organizations such as the B’nai Brith -4ntidefamation League and the Associated Catholic Charities: professional associations such as the ,4merican Law Insti- tute and the L$pnl ,4icl Society: private foundations such as the Car- negie Foundation : publications ranging from “Playboy” to “Com- monwealth :” and government institutions including the United States Civil Rights Commission.433

85% officials hare conceded that some cases referred to the field for tax inrestirrations would not hare qualified for referral but for the ideological category in which they fell. While IRS field offices closed out many cases because of the lack of tax grounds upon which legal

‘26“Tn~e~tigation of the Special Service Staff of the IRS” II.+- the staff of the -Joint Committee on Internal Rerenue Ta\-ation, 6/5/i%. pp. 17-18.

m Memorandum of IRS Commissioner Thrower, 6/16/69. 128 Memorandum from D. W. Bacon to Director. FBI, 8/S/69. ‘ZO Memorandum from D. .J. Rrennan, .Jr., to TV. C. SuIliran, R/15/69. ‘Jo SSS Bi-weekly Report, 6/l s/70. ax SSS Bi-weekly Report. S/29/69. ‘a’ For a discussion of IDTU standards. see pp. i%-81. 122-123. UJDonald Alexander testimony, 10/2/25, Hearings, Vol. 3, pp. 2s-30.

Page 112: Church Committee: Reports-- Book II

96

action could be taken, referral from the SSS probably resulted in the examination of some cases despite the lack of adequate grounds. Inter- views wtih IRS field personnel confirm that this did occur in several inst,ances.433a

Upon discovering that its functions were not tax-related, new IRS Commissioner Alesancler ordered the Special Service Staff abolished. He testified:

Mr. ALEXASDER. I ordered the Special Service st.aff abol- ished. That order was given on -4ugust the 9th, 19'73. It was implemented by manual supplements issued on August the 13th, 1973. We held the files. 1 ordered the files be held intact- I’m not going t,o give anv negative assurances to this Com- mittee-in order that t.his Committee and other Committees could rerielv these files to see what Ivas in them, and see what, sort of information m-as supplied to us on this more than 11,000 individuals and organizations as to whom and which files Kere maintained.

I suggested, Mr. Chairman, that at the end of all of these inquiries, I would like to take those files to the Ellipse and have the biggest bonfire since 1814.

The CHATRM.IS. Well. I concur in that, judgment. I would only say this to you; in a wrap, it might be a more important bonfire than the Boston Tea Party when it comes to protect- ing individual rights of American citizens. I am glad you feel that way. I am glad you took t.hat action.434

5. Foreign, Intelligence and Domestic Dissent In the late 1960’s, CIA and NS4, acting in response to presidential

pressure, turned their technological capacitv and great resources to- wa.rd spving on certain Americans. The initial impetus was to deter- mine whether the antiwar movement-and to a lesser extent the “black power” movement-were controlled bv foreigners. Despite evi- dence that there was no significant foreign influence. the intelligence gathering which culminated in CIA’s “Operation CHAOS” followed the general pattern of broadening in scope and intensity. The pro cedure for one aspect of t.hese programs was established by an informal agreement between the CIA and FBI in 1966, which permitted CIA to engage in “internal security” <activities in t.he United States.

a. Origins of CIA Involvement in “Internal Security Func- tions”

The National Security Act of 1947 explicitly prohibited the CIA from exercising “police, subpoena, or law-enforcement powers, or internal security functions.” But, t.he. Act did not address the question of the CL43 authority to conduct clandestine intelligence activity within the TTnited States for what Secretary Forrest.al called “pur- poses outside of this country.” 435

IJnder Director Hoover, the FBI interpreted the term “internal security functions” broadly to encompass almost “a*nyt.hing that CIA

“” Green. 9/12/75, pp. 65-66, 73-74 : Statement of Auditor, San Francisco Dis- trict. 7/30/75. p. 1: statement of Collector. J&R Anceles Diatrirt. 8;/3/75.

cu Donald Alexander testimony, 10/2/75, Hearings, Vol. 3, pp. N-11. “Hearings before the House Committee on Exnenditures in the Executive

Departments, on H.R. 2319, 80th Cong. (1947), p. 127.

Page 113: Church Committee: Reports-- Book II

97

might, be doing in the United States.” 436 Throughout. the 1950% and into the early 1960’s, Director Hoover’s psition led to jurisdictional conflicts between the CL4 and the FBI.

The Bureau insisted on being informed of the CIA’s activity in the 1Tnite.d States so that it couId be coordinated with the Bureau. as the FBI liaison with the CIA in that period recalled, “CL4 would t.a.ke action, it would come to our attention and we Kould have a flap.” 437

In 1966 the FBI and CIA negotiated an informal agreement to regu- larize their coordination. This agreement was said to have “led to a great improvement” and almost eliminated t.he “flaps.” 438

Under the agreement, the CIA would “seek concurrence and coordi- nation of the FBI” before engaging in clandestine activity in the United St.ates and the FBI would “concur and coordinate if the pro- posed action does not conflict with any operation, current or planned, including active investigation of the FBI.” 430 When an operative recruited by the CL4 abroad arrived in the United States, the FBI would “be advised” and the two agencies mould “confer regarding the handling of the agent in the United States.” The CIA would continue its “handling” of the agent for “foreign intelligence?’ purposes. The FBI would &o become in\-olred where there were “internal security fac,tors,” although it was reclgnized that the CL.4 might continue to “handle” the agent, in the United States and provide the Bureau with “information” bearing on “internal security matters.” NJ

Bs part of their handling of “internal security factors,” CIA opera- tives were used after 1966 to report on dome&c “dissidents” for the FRI. There were infrequent instances in rhich, according to the for- mer FBI liaison with CIA :

CIA had penetrations abroad in radical, revolutionary organizations and the individual was coming here to attend a conference, a meeting, and would be associating with leading dissidents. and the question came up, can he be of any use to us, can we have access to him during that period.

In most instances, because he was here for a relatively short period, we would levy the requirement or the request upon the CL.4 to find out what was taking place at the meetings to get his assessment of the individuals that he was meeting. and any other general intelligence that he could collect from. his asso- ciations with the people who were of interest. to us.441

The policies embodied in the 1966 agreement and the practice under it clearly involved the CL4 in the performance of “internal security

u Former FBI Liaison with CIA testimony, Q/22/75, p. 9. uI Former FBI liaison with CIA testimony, Q/22/75, pp. Q-11. -Liaison, Q/22/75. p. 11. For a discussion of liaison problems between FBI

and CIA in 1970. see up. 112-113. -Liaison, Q/22/75, p. 52. “Central Intelligence Agency Operations in the

United States,” FBI-CIA Memorandum of Understanding, 2/7/66. ‘W Liaison, Q/22/75, p. 55. “* T,iaison, Q/22/75, pp. 57-58. These “internal security” aspects of the lQ66

FBI-CIA agreement were not the only pre-CHAOS arrangements bringing the CIA into liaison with the FBI. For example, as early as 1963 the FBI Manual was revised to state that information concerning “proposed travel abroad” by domestic “subversives” was to be “furnished by the Bureau to the Department of State” and the “Central Intrlligrnre Agency :” and field offices were ‘advised to recommend the “extent of foreign investigation” which was required. (FBI Manual Section 87, p. 33a, revised 4/15/63.)

68.786 0 76 - 8

Page 114: Church Committee: Reports-- Book II

98

functions.” :Yt no time did the Executive branch ask Congress to amend the 1947 act to modify its ban against CIA exercising “internal secu- rity functions.” Sor n-as Congress asked to clarify the ambiguity of the 194’i act. about the CIA% authority to conduct clandestine foreign intelligence and counterintelligence activities within the United States. a matter dealt. with even today bv Executive Order.442

Moreover, Sational Securitv’Council Intelligence Directive 5 pro- vided authority within the Executive Branch for the Director of Cen- tral Intelligence to coordinate. and for the CIA to conduct. counter- intelligence activities abroad to protect the I’nited States against not only espionage and sabotage, but also “subversion.” 443 However. XSCID 5 did not purport to give the CIA authority for counter- intelligence activities in the United States. as provided in the FBI- CL4 agreement of 1966.

6. CIA Intelligence About Domestic Po7itical Groups In the late 1960s the CIA increasingly was drawn into collecting

intelligence about domestic political groups, particularly the anti-war movement, in response to FBI requests and to pressure from Presidents .Johnson and Sison. A principai assistant to President Johnson testi- fied that high governmental officials could not believe that

a cause that is so clearly right for the country. as they per- ceive it, would be so widely attacked if there were not some [foreign] force behind it.k44

The same pressures and beliefs led to CIA investigations of “militant black nationalists” and radical students.

(1) CZA Response to FBI Requests.-The FBI was the main chan- nel for mobilizing foreign intelligence resources and techniques against domestic targets. The FBI regularly notified the CIA that it wished coverage of Americans overseas.444a Indeed, the CIA regarded the mention of a name in anv of the thousands of reports sent to it by the FBI as a standing requirement from the FBI for information about those persons. 445 FBI reports flowed to the CL4 at a rate of over 1.000 a month.4a From 1967 to 1974, the CL4 responded with over 5.000 reports to the FBI. These CL4 disseminations included some reports of information acquired by the CIA in the course of its own operations, not sought in response to a specific FBI request.447

The FBI’s broad approach to the investigations of foreign infiu- ence which it coordinated with the CL4 is shown by a memorandum

ua President Ford’s Executive Order 11905,2/18/76. This order, discussed more fuIlr in Part IV. Recommendations, in effect reinforces the 1966 FM-CIA agree- ment and defines CIA counterintelligence duties abroad to include “foreign sub- version” directed against the United States.

‘u The Sational Security Council Intelligence Directives, or NSCIDs, have been promulgated by the R’ational Security Council to provide the basic organization and direction of the intelligence agencies.

“’ .Toseph Califano testimony, l/27/76. p. 70. M’ Richard Ober testimony, 10/30/75. p. 88. u5 Ober, 10/28/75, p. 45. 4(8 Memorandum from Richard Ober to James Angleton, 6/9/70, p. 9. “‘Letter from Director W. Colby to Vice President Rockefeller, s/8/75, p. 6 of

attachment.

Page 115: Church Committee: Reports-- Book II

99

prepared in the Intelligence Division early in 1969 summarizing its “coverage of the New Left :‘!

Foreign influence of t,he New Left movement offers us a fertile field to develop valuable intelligence data. To date there is no real cohesiveness between international Yew Left groups, but . . . despite the factionalism and confusion now so preva- lent, there is great potential for the development of an inter- national student revolutionary movement. [Emphasis added.]

The memorandum expressed concern that “old line” leftist groups were

. . . making a determined effort to move into the New Left movement . . New Left . . .

. [and were] influencing the thinking of the against the police in general and the FBI in

particular, to drive us off the campuses; as well as attacks against the new administration to degrade President tiixon.448

There was no mention of, or apparent concern for, direct influence or control of the “New Left” by agents of hostile foreign powers. In- stead, the stress was almost entirely upon ideological links and sim- ilarities, and the threat of ideas considered dangerous by t,he FBI.

The enlistment of both CL4 and NSB resources in domestic intel- ligence is illustrated by the “Black Nationalist” investigations. In 1967, FBI Headquarters instructed field offices that:

. . . penetrative investigations should be initiated at this time looking to\vard developing any information regarding contacts on the part of these individuals with foreign elements and looking toward developing any additional information having a bearing upon whether the individual involved is cur- rently subjected to foreign influence or direction. . . .

During your investigative coverage of all militant black nationalists, be most alert to any foreign travel. Advise the Bureau promptly of such in order that appropirate overseas incestigatiom may be conducted to establish activities and contacts abroad. [Emphasis added.] 44Q

The FBI passed such information to the CIA, which in turn began to place individual black natimonalists on a “watch list” for the inter- ception of interna:tional communica,tions bv the National Security Agency. After 1969. the FBI began submitting names of citizens en- gaged m domestic protest. and violence to the CT,4 not only for inresti- gaition a,bmad. but also for placement on the “watch list?’ of the CIA’s mail opening project. Similar lists of names rent from the FBI to the Sational Securitv ,4gencv. for use on a “watch list” for monitoring other channels of’internat’ional communication.

(2) Opemtiou Cn,4OS.-The CT,4 did not restric.t itself to serric- ing t.he FBI’s requests. Under White House pressure, the CL4 derel- oped its awn program-Operation CHhOS-as an ‘adjunct to the

*“Bfemorandum from C. D. Brennan to TV. C. Sullivan re New Left Move- meni 2/3/69.

H8 SAC Letter No. 67-66,11/7/67.

Page 116: Church Committee: Reports-- Book II

100

CId’s foreign coun~t~rintellige~~~e activities, although CIA officials rccognizctl from the outset that it had “definite domestic counterin- tellipncr nsprcts.” ajo

Former CIA Director Richard Helms testified that he established the program in response to President .Johnson’s persistent interest in the extent of foreign influence on domestic dissidents. According to Helms. the President would repcatedlv ask. “How are you getting along with your examination?” information on this subject ?!’ 451

and “Hal-c you picked up any more

The first. CH.408 instructions to CT,4 station chiefs in August 1967 described the need for “keepin, v tabs on radical students ancl U.S. Negro expatriates as wrll as travelers passing t,hrough certain select aresas abroad.” The originnllv stated objective was “to find out [the] extent. t,o which Soviets, Chiiaoms (Chinese Communists) and Cubans are exploiting our domestic problems in terms of espionage and sub- version.” 452

Following the consistent pattern of inte,lligence activities, those original instruc.tions graduallv broadened v&hout any precision in the kind of foreign contacts which were to be targeted by CT-4 operations. For example :

-President Johnson asked the CIA to conduct a study of “International Connections of the U.S. Peace Jiovement” fol- lowing the October 1967 demonstration at the Pentagon.453 In response, ,CIA headquarters sent a directive to CIA sta- tions seeking information on “illegal and subversive” connec- tions between U.S. aotivists and “communist, communist front, or other anti-American and foreign elements ‘abroad. Such connections might range from casua7 contacts based mere7y on mutunl interest to closelv controlled channels for party directives.” [Emphasis added;] 454

-In mid-1968, the DDP described CHaOS to CIA stations as a “high priority program” concerning foreign “contacts” with the “Radical Left.” which was defined as : “radical stu- dents, antiwar activists. draft rrsistrrs and deserters. black nationalists, anarchists. and assorted ‘New Leftists.’ ” 455

-In 1969, President Nixon’s White House required t,he CIA to study foreign communist support of American protest groups and stressed that “support” should be “liberally con- strued” to include tries. 456

“encouragement” by Communist coun-

-In the fall of 1969, CL4 stations were asked to report on any foreign support, guidance, or “inspiration” to protest activities in t,he United States.d57

u” Memorandum from Thomas Karnmessines to James Angleton, 6/15/67, p. 1. &* Helms. Rockefeller Commission, 4/28/75, pp. 2434-24.35. UZCIA Headquarters cable to several field stations, August. lS67. p. 1. w Memorandum from Richard Helms to President .Johnson. 11/15/67. 1M VIA Cable from Acting DDP to various field stations, November 1967,

pp. 1-2. *’ CIA Cable from Thomas Karamessines to various field stations, .Julr 1968,

p. 1. ‘“Mmmorandum from Tom Huston to the Deputy Director. CI4, 6/26/69. p. 1. &’ Cable from CIA headquarters to stations, Xorember 1969.

Page 117: Church Committee: Reports-- Book II

101

Thus, this attempt to ascertain and evaluate “foreign links” was so bNXld1~ dt?filWd that it required much more than bacligrOlUlCl infor- mation or in\-estigation of a few individuals suspcc,ted of being agents tlirec:ted by a hostile power. Instead, at a time when there was considerable international communication and travel by L4nlericans engaged in protest, and clisscnt, a substantial segment by American protcst~ groups was encompassed bv CIA co&.&on requirements to investigate foreign “encouragement’;” “inspiration,” “casual contacts” or “mutual interest.” Once again, the use of elastic words in mandates for intelligence activity resultecl in orerbroacl coverage and collection.

In addition to their intelligence activity directed at Americans abroad, CHAOS undercover agents, while in the United States in preparation for overseas assignment or between assignments, provided substantial information about lawful domestic activities of dissident American groups, as well as providing leads about possible foreign ties.458 In a few instances, the CL4 agents appear to have been encour- aged to participate in specific protest activity or to obtain particular domestic information.45” The CHAOS program also involved obtain- ing information about Americans from the CIS mail opening project and other domestic CL4 components 460 and from a National Security Sgency international con~munications intercept program.461

CL4 officials recognized that the CIA’s examination of domestic groups violated the Bgency’s mandate and thus accorded it a high degree of sensitivity. As CIA Director Richard Helms wrote in 1969, when he transmitted to the White House the CIA’s study of “Restless Youth :”

In an effort to round out our discussion of this subject, we hare included a section on American students. This is an area not within tl1c charter of this Agency. so I need not emphasize how extremely sensitive this makes the paper. Should anyone learn of its existence. it would prove most. embarrassing for all concerned?*

The reaction to such admissions of illegality was neither an instruction to stop the program or an attempt to change the law. Rather, the White House continued to ask for more information and continued to urge the CL4 to confirm the theory that American dissidents were under foreign contr01.4G3

Director Richard Helms testified that the only manner in which the CL4 could support its conclusion that there was no significant foreign influence on the domestic dissent, in the face of incredulity at the White House, was to continually expand the coverage of CHAOS. Only by being able to demonstrate that it had invest1patcd 071 anti-war persons and a71 contacts between them and any foreign

‘a Charles Marcules testimony, Rockefeller Commission, 3/10/75. pp. 153%1547, l.%G1567: Olwr. R,E4/i5, p. 46. (For security reasons, the CHAOS agent case officer testified as “Charles Marcnles”.)

“’ JIarcules Contact Report, 4/17/71; Marcules, Rockefeller Commission, 3/10/ 7.5. pp. lR%-1.558.

(a 3Iemornndnm from Richard Oher to Chief, CI Project. 2/15/72. M* Olwr. 10/30.7S nn. lFc17. uI’ T,etter from Richard Helms to Henry Kissinger, 2/M/69. u” Richard Helms deposition. Rockefeller Commission, 4/24/75, p. 223.

Page 118: Church Committee: Reports-- Book II

102

person could CL4 “prove the negative” domination4G4

that none were under foreign

In 1972, the CIA Inspector General found “general concern” among the overseas stations “over what appeared to constitute a monitoring of the political views and activities of Americans not known to be. or suspected of. being involved in espionage.” Several stations had “doubts as to the nature and lcgitimacv of the program” because requests for reports on “prominent personS’” were based on “nebulous” allegations of “subversion.” 465 This led to “a reduction in t,he intensity of attention to political dissidents.” 466 although the program was not terminated imtil March 1974.467

By the end of the CHAOS program. 13,000 different files were accu- mulated, including more than 7.200 on ;4merican citizens. Documents in these files inclndcd the names of more than 300,000 persons and groups, indexed by computer. 468 In addition to collectine information on an excessive number of persons. some of the kinds of information were n-holly irrelevant to the lepitimatc interests of the CIA or any other government agency. For example. one CT-4 agent supplying information on domestic activities to Operation CHAOS submitted detailed accounts of the activities of women who were interested in “women’s liberation.” 46g

c. CIA Security Operations Within the United States: Pro- tecting “So~lwes” and “Methods”

The National Security Act of 1947 granted the Director of Central Intelligence a vaguely-worded responsibility- for “protecting intelli- gence sources and methods from unauthorized disclosure.” “’ The legislative history of this provision suggests that it was initially intended to allay concerns of the militarv services that the new CIA would not operate with adequate safeguards to protect the military inte.llipence secrets which would be shared with the CIA4” However, this authority was later read by the CIA to authorize infiltration of domestic groups in order to protect CL4 personnel and facilities from possiblv violent public demonstrations. It was also read to permit elect.rohic surveillance and surreptitious entry to protect sensitive information.

The CL4 undertook a series of specific security investigations within the T’nited States, in some cases to find the’ source of news leaks and in others to determine whether government employees were involved in espionage or otherwise constituted “security risks.” These investiqa- tions were directed at former CL4 employees, employees of other government agencies, newsmen and other private, citizens in this countrv.4’2 Among the techniques used were physical surveillance,

M Helms deposition, Rockefeller Commission, 4/24/75, p. 234 ; Ober deposition, Rockefeller Commission. 3/28/75, pp. 137-138.

w Memorandum from Inspector General to Executive Director-Comptroller, 11/9/72. p. 1.

a Memorandum from Executive Director-Comntroller to DDP. 12/20/72. M Cable from CIA Director William Colby to Field Stations, March 1974. w Rnckefeller Commission Report, p. 23. a’ Awnt 1. Contact Report, Tolnme II. Agent 1 file. “o5O T’.R.C. 403(d) (31. ‘Ti I,nwrence How&on testimony, Rockefeller Commission. 3/17/7.5. pp. 1654-

lch55. “I Rockefeller Commission Report, pp. 162-166.

Page 119: Church Committee: Reports-- Book II

103

mail and tax information coverage, electronic surreillance, and sur- re.ptitious entry. Attorne,;y General Robert Kennedy appears to have authorized CIA wiretappmg in one of these inrestlgations. With this exception, however, there is no suggestion that’ the CIS’s security investigations were specifically approved by the attorney Genera1.473

The CL4 Office of Security est~ablished two programs directed at protest, demonstrations which involved the CIA ,in domestic aEairs on the t,heory that doing so was necessary to safeguard CIA facilities in the T’nited States.“4 Project MERRII\IACI~ (196’7 to 1973) in- volved the infiltration by CIA agents of Washington-based peace groups and Black activist groups. The stated purpose of the program was to obtmain early warning of demonstrations and other physical threats to the CIA. However. the collection requirements Kere broad- ened to include general information about the leadership, funding, activities, and policies of the targeted groups.

Project RESIST,\KCl? (1967 to 1973) was a broad effort to obtain general background information about radical.groups ,across the coun- try, particularly on campuses. The CIA justified this program as a means of predicting violence which mi,ght threaten CIA installations, recruiters, or contractors, and gathermg information with which to cvaluatc applicants for CL\ employment. Xuch of the reporting by CIA field offices to headounrters was from open sources sucll as news- papers. But additional information was obtained from cooperating police departments, campus officials, and other local authorities, some of whom in turn were using collection techniques such as informants.

These programs illustrated fundamental weaknesses and contra- dictions in the statutory definition of CIA authority in the 1947 Act. While the Director of Central Intelligence is charged with responsi- bility to protect intelligence “sources and methods,” the CIA is for- bidden from exercising law enforcement and police powers and “internal sccuritr functions.!’ The CIA4 never went to Congress for a clarification of this ambignitv. nor did it seek interpretation from the chief legal officer of the T-&ted Statrs-the Attornrv Genernl- except on the rarest of occasions.477

‘X According to n “memorandum for the record” sent by CL4 General Counsel I,awrence R. Houston to Deputy Attorney General William P. Rogers in 1954, an agreement was reached at that time allo\Tina the CI.4 to inrestieate on its own a& “actual or probable violation of criminal statutes” involving the CIA’s “corert operations” and to determine for itself, without consulting the *Justice Department, xx-hether there were “possibilities for prosecution.” The Justice Denartment n-onld not he informed if the Cr.4 decided that there should be noAproserntion on the gronnd that it mizht lead to “revelation of highly classified information.” (Memorandnm from Hnustnn to Ropers. 3/1/M. and enclosed memorandum from Hovstnn to the Director of Central Tntelliwnce. 2/23/54.)

This practice was reviewed and re-confirmed internally n*ithin the CIA on at least two snhsqnent nrcacions. (Memnrnndnm from Houston to the Assistant to the Director, CIA, l/6/60 : memnrnndnm from Houston to the Deputy Director of Centrnl Intelligence. 6/10/64.) It was not terminated nntil 1975. (Memo- rnndvm from John 8. Warner, CIA Gonnral Counsel. for the record. l/31/75.)

“‘These CIA activities, Projects JIERRTMA2CK and RESTSTASCE. n-ere de- scribed in great detail hp the Rockefeller Commission. (Rockefeller Commission Renort. Chs. 32 and 1.3.)

4ii Tli~ Rnckcfeller Commission Rrwort describw “. two cases in which tellc- phnn~s of thrw newsmen were In&ed [One7 occurred in 1962. apparently with the knolr-ledge and consent of Attorney General Kennedy.” (Rockefeller Commission Report, p. 164.)

Page 120: Church Committee: Reports-- Book II

104

d. h7SA Monitoring The Kational Securitv Agency ~-as created by Executive Order in

19.52 to conduct “signals intelligence,” includi?g the interception and analysis of messages transmitted by electromc means. such as tele- phone calls and telegrams. 4i* In contrast to the CIA, there has never been a statuton- “charter” for KSA.

The executire directives which authorize SSA’s ,activities prohibit the agency from monitoring communication between persons within t,he United States and communication concerning purely domestic affairs. The current SSA Director testified :

[The] mission of XL4 is directed to fore&n intelligence ob- tained from foreign electrical communications. . . .47Q

However. SSh has interpreted “foreign communications” to include communication where one terminal is outside the United States. Vnder this interpret&ion. XSA has. for many years, intercepted communica- tions between the Pnited States and a foreign country even though the sender or receiver was an ,4merican. Durmg the past decade, NSA increasingly broadened its interpretation of “foreign intelligence” to include economic and financial matters and “international terrorism.:’ 480

The overall consequence. as in the case, of CIA activities such as Project CHAOS! was to break down the distinction between “foreign” and “domestic” Intelligence. For esamplc. in the 1960s. PI’SA began adding to its “match lists,” at the request of various intelligence agen- cies. the names of ,L~rericans suspected of involvement’ in civil clis- turbance or drug activitv which had some foreign aspects. Second, Operation Shamrock. which began as an effort to acquire the tele- grams of certain foreign targets. expanded so that SSA obtained from at, least, two cable companies essentially all cables to or from the Cnitecl States, including millions of the private communic.ations of Americans.

6. Zwtmsice Techniques As domestic intelligencr activitv increasingly broadened to cover

domestic dissenters under many d’ifferent, programs. the government intensified the use of covert techniques which intruded upon individual privacy.

Informants were used to gather more information about more Americans, often targeting an inclividual because of his political views a.nd “regardless of past or present involvement in disorders.” 483 The CIA’s mail opening program increasinglv focused upon domestic groups, including “protest and peace orpa&zations” which were cov- ered at the FBI’s request. 484 Similarly, XS14-largely in response to Ammy, CL& and FBI pressures---expanded its international intercep- tion program to include “information on I-.S. organizations or indi- T-iduals who are engagecl in activities which may result in civil

“* Memorandum from President Truman to Secretary of Defense, 10/24/52. ““General IRW Allen testimony, 10/29/75, Hearings, Vol. 2. p. 6. M’ Allen, 10/29/75. Hearings, rol. 2. p. 11. The programs of NSA are discussed

further in the succeeding section, “Intrusire Techniques.” p. 183. “’ Memorandum from FBI Esecutire Conference to Mr. Tolson, 10/29/iO. See

pp. 74-76. @’ Memorandum from Hoover to Angleton, 3/10/72.

Page 121: Church Committee: Reports-- Book II

105

disturbances or otherwise subvert the nat,ional security of the United sta&.*:’ 485

During this period, Director Hoover ordered cutbacks on t.he FBI’s use of a number of intrusive techniques. Frustration with Hoover’s cutbacks was a substantial contributing factor to the effort in lOTO- coordinated by White House .\ide Tom Charles Huston and strongly supported by CL% Director Helms. SS-1 Director Gaylor and Hoover’s Intelligence Division subordinates-to obtain Presidential authorization for numerous illegal or questionable intelligence techniques.

n. Warmnt7css Blcctro,lic Surmei77ance (1) Exec-uticc Bmnch RPstrictiona on Electwmic SurzwYTunce :

1SG.i-19&!?.-In March 1965, Attorney General Sicholas deB. Katzen- bath established a new requirement for the FBI’s intelligence opera- tions: the Bureau had to obtain t,he written approval of the Attorney General prior to the implementation of any microphone. surveillance. He also imposed a six month limitation on both wiretaps and micro- phone surveillances. after v:hich time new requests had to be sub- mitted for the Attorney General’s re-autliorization.486

Upon Katzenbach’s recommendation, President Johnson issued a directive in June 1065 forbidding all federal government wiretapping “except in conjunction security.” 487

with investigations related to national This standard n-as reiterated by Attorney General Katzen-

bath? for both wiretapping and microphone surveillances three months later. and again in ,July 1966.4s7a

While the procedures were tightened, the broad “national security” standard still alloTT-ed for questionable authorizations of electronic surveillance. In fact, Katzenbach told Director Hoover that he would “continue to approve all such requests in the future as I have in the past.” He saw “no need to curtail any such activities in the national security field.” 488

In line with that policy, Katzenbach approved FBI requests for wiretaps on the Student Non-Violent Coordinating Committee,48s Students for a Democratic Society, 490 the editor of an anti-communist newsletter,4g1 a Washington attorney with whom the editor was in frequent contact,4Q2 a Klan official:93 and a leader of the black Revolu- tionary Action Movement. 494 According to FBI records. Katzenbach also initialed three memoranda informing him of microphone surveil- lances of Dr. Martin Luther King, Jr.4g5

&Memorandum from XSA MINBRET Charter, 7/l/69. m Memorandum from Hoover to Katzenbach, 3/30/65. un Memorandum from President .Johnson to Heads of Departments, 6/30/65. m’ Memorandum from Katzenbach to Hoover, 9/27/65 : Wpplemental Memo-

randim to the Supreme Court in Black v. United States, Julv 13 1966. Katzenbach also stated to Hoover that while he belieT’ed kh techniques

could be properly used in cases involving organized crime, he would not approve any such requests in the immediate future “in lkht of the present atmosphere.”

L88 Memorandum from Katzenbach to Hoover, Q/27/65. uD Memorandum from Hoover to Katzenbach, 6/15/65. w Memorandum from Hoover to Katzenbach, 5/25/65. “I Memorandum from Hoover to Katzenbach, 4/19/G, see footnote 266. ‘Ba\Iemorandum from Hoover to Katzenbach, B/7/65, see footnote 266. lD3 kemorandnm from Hoover to Katzenbach, S/28/64. “’ Memorandum from Hoover to Katzenhach. 3/3/65. ‘X Memoranda from Hoover to Katzenbach, 5/17/65, 10/19/65, 12/l/65.

Page 122: Church Committee: Reports-- Book II

106

There were no similar electronic surveillance authorizations bv Attorney Gmcrnl Ramsey Clark in cases involving purely domestcc “national secilrity” considerations.49G Clark has stated that his policy was “to confine the area of approval to international activities directly related to the military security of the United States.4”7

(2) Omnibus GGxe Gon.trol Act of 1.96X-111 response to a 1967 Supreme Court decision that required judicial warrants for the use of electronic surveillance in criminal cases,498 Congress enacted the Omni- bus Crime Control lZct of 1968. This Act established warrant, proce- dures for wiretapping and microphone surveillances, but it included a provision that neither it nor the Federal Communications Act of 1934 “shall limit the constitutional power of the President.” 499 Although Congress did not purport to define the President’s powerq500 the Act suggested five broad categories in which warrantless electronic sur- veillance might be permitted. The first three categories related to foreign intelligence and counterintelligence matters :

(1) to protect the nation against actual or potential attack or other hostile acts of a foreign povver;

(2) to obtain f’oreign intelligence information deemed essen- tial to t,he security of the United States; and

(3) to protect national security information against for- e@ intelligence activities.

The last two categories dealt with domestic intelligence interests:

(4) to protect the United States against overthrow of the government by force or other unlawful means, or

(5) against any other clear and present danger to the struc- ture or existence of the government.

Thus, although Conpress suggested criteria for warrantless electronic surveillance for intelligence purposes, it left to the, courts the task of defininp the scope of the national security exception, if any, to the warrant, requirement.

Between 1969 and 1972, the Nixon administration used these criteria to justify a number of questionable wiretaps. One New Left organiza- tion was tapped because. among other factors, its members desired to “take the radical politics t.hep learned on campus and spread them among factory workers.” 5o1 Four newsmen were wiretapped or bugged during this period. as were sixteen executive branch officials, one

‘s+ For example, Clark turned down FRI requests to n-iretap the National Mobilization Committee Office for Demonstrations at the Democratic National Convention in Chicago in 1963. (Memoranda from Hoover to Clark 3/11/f%, 3/22/W 6/31/681. Clark derided that there was not “an adeanate rlemnnstration of a direct threat to the national security.” (Clark to Hoover, 3/12/68) (These memoranda appear at Hearings, Vol. 6, pp. 740-7L%.

4w Clark has stated that he denied requests “tn tap Ahha Eban when he mas on a visit to this country, an employee of the United Nations Secretariat. the Organization of Arab Students in the U.S.. the Tanzanian Mission to the T’.N.. the offire of the Agricultural Counselor at the Soviet Bmhasnv and a cnrreannndenf of TARS.” [Statement of Former Bttnrney General Ramsey Clark, Heariws before the Snhcnmmittee nn Administrative Practice and Procedure. Committee nn the Iudiciary. Fnited States Senate (39i41 .l

‘@ Kofz v. linifed Strifes. 397 TJ.S. 347 (1967). This case explicitly left open the qnwtinn of n-arrantless electronic snrreillance in “sitnation (s) involving the national secnritv.” (39i P.S.. at 358 n. 23.)

"0818 V.S.C. 2511(3). 5oo SW T’nitcd Stntcs r. Vnitm7 Sfntcs District Cnurt. 407 T’.S. 297 (1972). 60’Memorandum from Hoover to Attorney General Mitchell, 3/16/70.

Page 123: Church Committee: Reports-- Book II

107

former executive official, and a relative of an executive official.” 502 There were nun~crow wiretaps and some microphones used against the Black Panther Party and similar domestic group~.~O~ Attorney Gen- eral ,John Mitchell approved FBI requests for wiretaps on organiza- tions involved in planning the November 1969 antiwar “JIarch on

T\‘ashington,” including the moderate Yietnam Moratorium Com- nlittee.503a

(3) XrcpTe7ne Court Rcsfktions on National Xecwity Electronic Surwillan~e~ 197%:The issue of national security electronic surreil- lance was not addressed by the Supreme Court unt;l 1972, when it held in the so-called Keith case that the President did not have the “con- stitutional power’? to authorize viarrantless electronic surveillance to protect the security of the nation from “domestic” threats.50* The Court still remained silent. however, on the legality of warrantless electronic surveillance There there was a “significant connection with a foreign power. its agents or agencies. )’ 505 As a result of this decision, the JUS- tice Department eliminated as criteria for the use of warrantless elec- tronic surveillance the tsvo categories, described by Congress in the 1968 Act, dealing with domestic intelligence interests.506

b. Cl,4 Nail Opening Although Director Hoover terminated the FBI’s own mail opening

propramscin 1966, the Bureau’s use of the CIA program continued. In 1969. upon the recommendation of the official in charge of the CIA’S CHAOS program, the FBI began submitting names of domestic po- litical radicals and black militants to the CIA for inclusion on its mail opening “Watch List.” 5o7 By 1972, the FBI’s list of targets for CIA

e mail opening included :

New Left activists, extremists, and other subversives. Extremist and Scm Left organizations. Protest and peace organizations, such as People’s Coalition

for Peace and Justice, Kational Peace Action Committee, and Women’s Strike for Peace.

Subversive and extremist groups. such as the Black Pan- thers. White Panthers. Black Nationalists and Liberation Groups. Students for a Democratic Society, Resist, Revolu- tionary Union, and other New Left Groups.

50? See Findings C and E, pp. 183 and 2%. 5o3 For example. at one time in March 1971 the FBI wan conducting one micro-

phone surveillance of Black Panther Park leader Huey Sewton, seven wire- taps of Black Panther Party offices including Sewton’s residence, one wiretap on another black estremist group. one wiretap on Jewish Defense League head- quarters, one wiretap on a “New Left extremist group”. and two wiretaps on “Sew Left extremist actirities.” (Memorandum from TT. R. WannaIl to C. D. Brennan. 3/29/il, printed in Hearings, Vol. II, pp. 2’iO-271.)

so’” Jlemoranda from Hoorer to Attorney General Xitrhell. 11/s/69 and 11/i/69. This and other aspects of eiectronic surveillanre in this period are discussed in Findings C and E in greater detail. pp. 183 and 225.

sM T-nitfd Stntfa v. Pnitcf7 Rfnfcs Dintrid Court. 407 Iy.S. 49i (1972). srii T7vitcr7 Sfntrx r. 7-nifcrl Sfnfcs Dintrift Court. 407 T-.8.. at 309 (1972). sm Jlemnrnntlum from William Olson to Elliott Richardson, .June 1973. Vntil

19% hnw?rer. the .Jusltice Department stretched the term “cwnnpqtinn with a fnrci?Zn poW?r” to inrludr domestic groups. such as the .Jevish Defense T,eague, WhnS? protest actions against a fnreim nation were beliered to threaten the J’nited Statec’ relations with that nation. [Xwcibon v, J~ifchcU, ,516 F. 2d 594 CD.C. Cir. lSiZ).]

ran Memorandum from FBI/CL4 Liaison Agent to D. J. Brennan, l/16/89.

Page 124: Church Committee: Reports-- Book II

108

Traffic to and from Puerto Rico and the Virgin Islands showing anti-U.S. or subversive sympathies.5o8

Thus, the mail opening program that began fourteen years earlier as a means of discovering hostile intelligence efforts in the United States had expanded to encompass communications of domestic dissidents of all types.

c. Expnnsion of NXL4 Monitoring Although NSA began to intercept. and disseminate the communica-

tions of selected Americans in the early 196Os, the systematic inclu- sion of a wide range of American names on the “Watch List” did not occur until 1967.

The Army Chief of Staff for Intelligence requested “any informa- tion on a continuing basis” that NSA might intercept concerning :

A. Indications that foreign governments or individuals or organizations acting as agents of foreign governments are controlling or attempting to control or influence the activities of TJ.S. “peace” groups and “Black Power” organizations.

B. Identities of foreign agencies exerting control or influ- ence on U.S. organizations.

C. Identities of individuals and organizations in U.S. in contact with apents of foreign governments.

D. Instructions or advice being given to U.S. groups by agents of foreign governments.50g

Two years later. MA issued an internal inst.ruction intended to ensure the secrecv of the fact, that it was monitoriw and disseminat- ing commnnications to and from Americans.510 This memorandum described the “Watch List” program in terms which indicated that it had widened beyond its originally broad mandate. In addition to describing hhe pro,cram as covering foreigners who ‘Lare attempting” to “influence, coordinate or control” U.S. groups or individuals who “mav foment civil distnrbance or otherwise undermine the nstional security of the U.S..” the memorandum indicated that the program intercepted communications dealing with :

Information on 1T.S. orpanizations or individuals who are engaged in activities which may result in civil distnrbances or otherwise subvert the national securit.y of t,he U.S.“”

This standard. which was clearly outside the foreim intelligence mandate of NM,, resulted in sweeping coverage. Communicat,ions such as the follow~g were intercepted, dissemmated. and stored in Government files: dlswssion of a peace concert: the interest of t.he wife of a 1J.S. Senator in peace causes; a correspondent’s report from Sout.heast Asia to his ma.gazine in New York; an anti-mar activist’s request for a speaker in New York.

,Qccording to testimony before the Committee. the material which resulted from the “Watch List” was of little intellipnce value; most

508 Routing Slip from J. Edgar Hoover to aames Angleton (attachment), 3/10/72.

‘08 JI0JI Cable. Yarhorough to Carter, 10/20/67. ‘lo S&4’s name, for example, was to be kept off any of the disseminated

“product.” ‘II MINBRET Charter, 7/l/69.

Page 125: Church Committee: Reports-- Book II

109

intercepted communications were of a prirat.e or personal nature or involwd rallies and drmonstrations that were public kno~vled~e.“lz

d. FBI Cutbacks

The reasons for ,J. Ecl~~ar Hoovrr’s cutback in 1966 on FBI use of several covert techniques are not clear. Hoover’s former assistants have cited widely divergent factors.

Certainly bv the mid-1960s. Hoover was highly sensitive to the possibility of damage to the FBI from public exposure of its most intrusive’ intrlligence techniques. This sensiti\-itg 1v-a~ reflected in a nwmoranclun~ to .\ttorner General Kat’zenbach in September 1965, whew Hoover referred to’“thc present atmosphere” of “Con,rrressional and public alarm and opposition to any act.ivitp which could in any way be termed an invasion of privacv.” j13 The FBI Director was particularly concerned about, an inquiry by the Subcommittee on Administrative Pract.ice and Procedure of the Senate Judiciary Com- mittre rhnired by Senator Edward Long.

(1) The Lo?lg h’zrbcommittee Znccstigrrtion.-The Senate Subcom- mittee was primarily inresti@irq elect,ronic surveillance and mail cover. The Bureau was seen as a major subject of the inquiry, al- thou,rrh the Internal Revenue Service and other Executive aencies wrre also included.

In Febnlsrv 1965. President Johnson asked Attorney General Katzenbach td coordinate all matters relating to the investi,rration, and Katzcnba.ch then met with senior FBI officials to discuss the problems it raise,d.“lJ According to a memora.ndum by A. H. Belmont, one of the FBI Director’s principal assistants. Katzenbach st.ated that he planned to SW Senator Ed~~ard Lor)$. the Subcommittee chairman. for the purpose of “impressinp on him that the committee would not want to stumble b\- mistake, into an area of extreme inter- est to the national secnritr.” General added that he.

Accorclin,rr to Belmont. the Attorney “miyht, have to resort to pressure from the

President” and that he did not want, the Subcommittee. to “under- mine the rtstrictrd and tiphtl,v controll~rl oprrations of the Bureau.” FBI officials had assured Katzenbach t.hat their activities were, in- deed, “ti,nhtly controlled” and restrictecl to “important security matters.” 516

The following note on the memorandum of this meeting provides a sign of Director Hoowr’s attitude at that time :

I don’t see what all the excitement is about. I ~~oulcl have no hesitancy in discontinuing all techniques-technical cover- ape. mlcroghonrs. trash covers, mail covers, etc. While it miqht handicap us I doubt, they are as valuable as some

‘I’TT. R. W?nnnll (FRT Assistant IXrwtor for Intellieenw). 10/3/75. p. 13. “The feeling is that there 1~a.c wry little in the wan of goorl prodnct as a result of nllr 1lqrin.c snnnlicrl names to SS.1.”

m3 1lemornn~nm from Hnorer to Katzenharh. 9/14/C%. This memorandnm dealt enwificnlly with electronic snrreillnnce and did not mention mail openings or “Rlnck Rnr .Tolw.” Hnowr said the FBI had “discnntinnwl” microphone snrwil- Innws (hnw). a restriction which Attorney General I<atzcnlxwl~ said went tou far. (Ti?tawhnch to Honrw. 9/27/0.5.)

““Mw~nr~nrl~~m from A. H. Relmont to Mr. Tolsnn, 2/27/G. Ratzenhach testi- mnnr. 12/3/i5. Hearings. Pnl. 6. p. 204.

“’ Jlrmnrandum from A. H. Belmont to C. Tolson. 2/27/65.

Page 126: Church Committee: Reports-- Book II

110

believe and none warrant the FBI being used to justify them.“17

Several days later, according to a memorandum of the FBI Director, the &torney General “a~vled that he had talked to Senator Long,“ and that tile benzator “salti he clid not want to get 111tO ally llaLlolU1 security area.“ jib Katzenbach has confirmed that he ‘*would have been concerned” in these clrcunxtances about the Subcornnnttee s demands for information about “matters of a national security nature” and that he was “declining to provide such information” to Long.51V

Again in 1966, the FBI took steps to, in the wortis of Bureau of- ficial Cartha DeLoach, “neutralize” the “threat of being embarrassed by the Long Subcommittee.” 5LI0 This time the issue involved war- rantless electronic surveillance by the FBI, particularly in organized crime matters. DeLoach and another ranking Bureau official visited Senator Long to urge that he issue a statement that “the FBI had never participated in uncontrolled usage of wiretaps or microphones and that FBI usage of such devices had been completely justified in all- instances.” 521 The Bureau prepared such a statement for Senator Long to release as his own, which apparently was not used.522 At another meeting with DeLoach, Senator Long agreed to make “a commitment that he would in no way embarrass the FBI.” When the Subcommittee’s Chief Counsel asked if a Bureau spokesman could appear and “make a simple statement,” DeLoach replied that this would “open a Pandora’s box, in so far as our enemies in the press were concerned.?’ Senator Long then stated that he would call no FBI witnesses.523

(2) Director Hoover’s Restrictions.-The Director subsequently issued instructions t.hat the number of warrantless wiretaps installed at any one time be cut in half. One of his subordinates speculated that this was done out of a concern that the ‘Subcommittee’s “inquiry might get into the use of that technique by the FBI.” 5z4

In July 1966, after hundreds of FBI “black bag job” operations had been approved over many years, Director Hoover decided to eliminate warrantless surreptitious entries for purposes other than microphone installations. 525 In response to an Intelligence Division analysis that such break-ins were an “invaluable technique,” although “clearly illegal,” Hoover stated that ‘<no more such techniques must be used.” 526 Bureau subordinates took Hoover’s “no more such tech-

“’ Hoover Note on Belmont Memorandum to To&on. 2/27/S. m8 Memorandum from Hoover to Tolson, et al., 3/2/65. “’ Katzenbach testimony. 12/3/75, Hearings, Vol. 6, pp. 205-206. 62o Memorandum from DeLoach to Tolson. l/21/66. sn Memorandum from DeT,narh to Tolwn. l/10/66. M Memorandum from M. A. Jones to Robert Wick, l/11/66. W IZemorandum from DeLoach to Tolson, l/21/66. 62’C. D. Brennan denosition. 9/23/7X, p. 42, %According to FBI records and the recollections of Bureau agents, the fol-

lowing number of microphone surveillances involving “surreptitious entry” were installed in “internal security, intelligence, and counterintelligence” inrestiga- tions: 1964: SO: 19%: 59: 1966: 4: 1967: 0: 1968: 9: 1969: 8: 1970: 15: 1971: 6; 1972 : 22 : 1973 : 18 : 1974 : 9 : 1975 : 13. The similar figures for “criminal inrestiga- tinns” (including installations authorized by judicial n-arrant after 1968) are : l!XA: 8.1: 1965: 41: 1966: 0: 196i: 0: 1968: 0: 1969: 3: 1970: 8: 1971: 7: 1972: 19 19i3 : 27 : 1974 : 22 : 1975 : 11. (Memorandum from FBI to Select Committee, 10/17/75.)

624Hoover note on memorandum from Sullivan to DeLoach. i/19/66. This memnrandum cited as a “prime example” of the utilitr of a “black hag jobs" a break,in to steal records of three high-ranking Klan officials relating to finances

Page 127: Church Committee: Reports-- Book II

111

niques?’ language as an injunction against the Bureau’s mail opening program as well.>” Apparently, a termination order was issued to field offices by telephone. FBI mail-opening was suspended, al- though the Bureau continued to seek information from CIA’s illegal mail-opeuing program until its suspension in 1973.

A year and a. half before Hoover’s cutbacks on n-ire-tapping, “black bag jobs,” and mail-opening, he prohibited the FBI’s use of other covert, techniques such as mail covers and trash covers.528

FBI intelligence officials persisted in requesting authority for “black bag” techniques. In 1967 Director Hoover ordered that “no such rec- ommendations should be submitted.” jz9 At about this time, Attorney General Ramsey Clark was asked to approve a “breaking and enter- ing” operation and declined to do so.j30 There was an apparently un- authorized surreptitious entry directed at a “domestic subversive tar- get” as late as April, 1968. 531 A4 proposal from the field to resume mail opening for foreign counterintelligence purposes was turned down by FBI officials in 1970.532

7. Accountability and Control

a. The Hustoll. Plan: A Domestic Intelligence Network In 19’70, pressures from the White House and from within the in-

telligence community led to the formulation of a plan for coordinat.ion and expansion of domestic intelligence activity. The so-called ‘LHuston Plan” called for Presidential authorization of illegal intelligence tech- niques, expanded domestic intelligence collection, and centralized eval- uation of domestic intelligence. President, Nixon approved the plan and then, five days later, revoked his approval. Despite the revocation of official approval, many major aspects of the plan were implemented, and some techniques which the intelligence community asked for permission to implements had already been undeway.

In 1970. there was an intensification of the social tension in America t,hat had provided the impetus in the 1960s for ever-widening domestic intelligence operations. The spring invasion of Cambodia by United States forces triggered the most extensive campus demonstrations and stude.nt “strikes’? in the history of the war in Southeast Asia. Domestic strife heightened even further when four st.udents were killed by Na- .-~

and membership which “we have been using most effectively to disrupt the oreanization.”

in Wannall, 10/13/75, pp. 4546. There is to this day no formal order pro- hibiting FBI mail-oneninp. although Assistant Director Wannall contended that general FBI Manuai instructions now applicable forbid ang unlawful technique.

525 These technicties were not prohibited by law. Their use vias banned in all cases. including serious criminal investigations and foreign counterintelligence matters. (Memorandum from TV. C. Sullivan to A. H. Belmont. 9/30/64.) Mail covers. which mag be used to identify from their exteriors certain letters which can then he opened lvith a judicial n-arrant. were reinstituted with Justice De- partment approval in 1971. (1\Iemnrandum frnm Hoover to 1\Iitchell, 7/27/71; Memorandum from Assistant Attorney General Will Wilson to Hoover, g/31/51.)

621 Memorandum from Hoover to Tnlsnn and Delnach, l/6/67. GJo “Once Mr. Hoover, apparent& at the request of the Satinnal Security Agency,

sought approval to break and enter into a foreign mission at the Inited Sations to procure cryptographic materials to facilitate decoding of intercepted trans- missions. The request was presented \vith some urgency, rejected and presented again on perhaps srr~rnl occasions. It was never approved and constituted the nnl~ request nf that kind.” [Statement of former .~ttorne,v Genera1 Ramsey Clark. Hearings hefnre the Senate Judiciary Subcommittee on Administrative Practice and Prncednre. (1974) .l

531 Memnrnndnm from FRI to Senate Select Committee. 2/23/E. =’ Memorandum from W. A. Branigan to TV. C. Sullivan, 3/31/70.

Page 128: Church Committee: Reports-- Book II

112

t.ional Guardsmen at Kent State University. Wthin one tlventy-fonr hour period, there were 400 bomb threats m New York City alone. TO

responcl, \\‘hite Ilousc Chief of Staff: H. R. Haldenlnn, assigned prin- cipal responsibility for domestic intelligence planning to st.atf assist- ant Tom Charles I~77ston.533

Since June 1969, Huston had been in touch with the head of the FBI Domestic Intelligence Division, Assistant Director William C. Sullivan. Huston initially contacted Sullivan on President Xxon’s be- half to request “all information possibly relating to foreign influences and financing of the New Left.” 534 Huston also made similar requests to CIA, NS+, and the Defense Intelligence Agency. The quality of the data provided by these agencies, especially the FBI, had failed to satisfy Huston and Presidential assistant John Ehrlichman.535 There- after, Huston’s continued discussions with awistant Director Sulli- van convinced him that the restraints imposed upon domestic intelli- gence techniques by Director IIoover impeded the. collection of im- portant information about dissident activity.536

(1) I~~telZigence Community PT*ess?cres.-The interest of the White House in better intelligence about domestic protest activity coincided with growing dissatisfaction among the foreign intelligence agencies with the FBI Director’s restrictions on their performance of foreign intelligence functions in America.537

The CIA’s concerns crystallized in March 1970 when-as a result of a “flap” over the CIA’s refusal to disclose information to t,he FBI-Hoover issued an order that “direct liaison” at FBI head- quarters with CIA “be terminated” and t,hat “any contact with CL4 in the future” was to take place “by letter only.” 538 This order did not bar interagency communication ; secure tele,phones were installed an d \vorking-level contacts continued. But the position of FBI “liaison agent” with CIA was eliminated.539

CIA Director Helms subsequently attempted to reopen the question of FBI cooperation with CIA requests for installing electronic surveillances and covering mail. 540 Hoover replied t,hat he agreed with Helms that there sl~ould be expanded “exchange of information be- tween our age.ncies concerning New Left and racial extremist. mat- ters.” However, he, refused the request, for aid with electronic sur- veilla,nce and mail coverage. Hoover cited the “miclespread concern

631 Memorandum from John R. Brown to H. ‘R. Haldeman. 4/30/70. 534 Memorandum from Sullivan to DeLoach, 6/20/69 ; Memorandum from Hus-

ton to Hoover, 6/20/69. 535 Tom Charles Huston testimony, 5/23/75, p. 19. 630 Huston, 5/23/75, pp. 23, 28. 551 Helms deposition, g/10/75, p. 3 ; Bennett deposition, 8/5/75, p. 12 ; Gayler

deposition, 6/19/75, pp. &7. As early as 1963, the FBI Director had successfully opposed a proposal to the President’s Foreign Intelligence Advisory Board by CIA Director John McCone for expanded domestic wiretapping for foreign intelligence purposes. (Memorandum from TV. C. Sullivan to C. D. DeLoach, 3/7/70). In 1969, CIA Director Richard Helms was told bg the Bureau. when he asked it to institute electronic surveillance on behalf of the CIA. that he should “refer such requests directly to Attorney General for approral.” (Mgmorandum from Sullivan to DeLoach. 3/30/70.) The administrators of NSA also failed to persuade Director Hoover to lift his restraints on foreign intelligence electronic surveillance. (Staff summary of Louis Tnrdella interrirv. 6/16/75.)

b38 Snte by Hoover on letter frnm Helms to Hnorer. 2/26/70. 58 Former FBI Liaison with Cl.4 testimony, 9/22/Z?. p. 3. aoMemorandum from Sullivan to DeLoach, 3/30/70, pp. 1-2, 4.

Page 129: Church Committee: Reports-- Book II

113

by the American public regarding tlic possible misuse of this t;vpe of co~crage.” Their lw in “tlomestic investigations;” pow1 legal problems not, enconntcrcd *,in similar olwrations abrond.” Zioo\-cr adtletl, ‘+The FI3l’s effecti\-encss has always depended in large nieasure on our capacity to retain tlic full coiifidcncc of the -\merican people.” :a1

(2) Yhc I7,fe~/~e~~!/ (‘o/n 7rliffec~ Z~e~~u~~f.--Iii the following months, Tom C’harlw 1Tnst on arr:in~ed :I meeting l,etwwn President Kixon and tlw directors of the FBI, (‘IA, SSL and DLL\ on June 5, 1370.” The President% cnlpllasis jv\-ns 111)on improved coortlination among the agencies to strengthen their capabilities to collect intelligence about “revolutionarv ncti\isiil” ant1 “the sul)port-ideological and other- wise-of forbign 1)o~crs” for these activities. The talking paper prepared by Il~~ston for the President to wad at the meeting declared, “IT’c are non- cor~froiitcd with a nc~v and grave crisis iii our country- one which we know too little about.zf3

From this meeting emanated the Special Report of the Interagency Committee on Intelligence (*id Hoc), prepared jointly by represents- tives of the FBI, CIA, XS& and DIh, and submittecl to the President a month later.“J’k The report presented the President a series of options, and Huston recommended that the President approve the following :

(1) “coverage by SS,l of the communications of U.S. citizens using international facilities;”

tra(Z!ms” “intensification” of “electronic surveillances and pene-

directed at individuals and groups “who pose a major threat to the internal security” and at. “foreign na- tionals” in the United States “of interest to the intelligence community ;”

(3) removal of restrictions on “legal” mail coverage and relaxation of “restrictions on covert coverage” [mall open- ing] on “selected targets of priority foreign intelligence and internal security interest ;”

(4) modification of “present restrictions” on “surreptitious entry” to allow “procurement of vitally needed foreign cryp- tographic material” and “to permit selective use” against “high priority internal security targets;”

(5) rela,xatlon of “present restrictions” on the “develop- me.nt of campus sources” to permit ‘(expanded coverage of violence-prone and student-related groups 1’

(6) “increased’! coverage bp CIA “of American students (and others) traveling or living abroad ;”

(7) appointment of a “permanent committee consisting of the FBI, ,CI;1, NS;2, DIA. and the military counterintelli- gence agencies” to evaluate “domestic intelligence” and to “carry out the other objectives specified in the report.” 545

Huston also raised and dismissed questions about the legalit,y of tvio collection techniques in particular. “Covert [mail opening] cov-

“’ 3Icmorandum from Hoover to Helms, 3/31/70. w Hnston deposition, 5/23/75, p. 32. w Presidential Talking Paper, F/5/70, from the Nixon Papers. 544 The renort was written br the Research Section of the FBI Domestic Intel-

ligence Di&ion on the basis of committee decisions and FBI Director Hoover’s rerisions (Staff Summary of Richard Cotter interriew, g/15/75.)

KJ The seren recommendations were made in an attachment to a memorandum from Huston to Haldeman, 7/70.

68.786 0 - 76 - 9

Page 130: Church Committee: Reports-- Book II

114

erage is illegal, and there are serious risks involved,” he wrote. “HOT- ever, the advantages to be derived from its use outweigh the risks.” 54G As for surreptitious entry, Huston advised :

Use of this technique is clearly illegal : it amounts to burglary. It is also highly risky and could result in great embarrass- ment if exposed. However, it is also the most fruitful tool and can produce the type of intelligence which camlot be ob- tained in any other fashion.” 64i

Huston testified that his recommendations “reflected what I under- stood to be the consensus of the working group” of intelligence officials on the interagency comniittee.548

Just over a week later, the FBI, CIA, NSA, and DIA were advised by Huston that “the President has. . . made the following decisions”- to adopt all of Huston’s recommendations. 54g Henceforth, with Presi- dential authority, the intelligence community could intercept the international communications of Americans; eavesdrop electronically on anyone deemed a “threat to the internal security ;” read the mail of ,4me&an citizens; break into the homes of anyone regarded as a security threat ; and monitor the activities of student politicad groups at home and abroad.

There is no indication that the President, was informed at this time that SSA was already covering the international communications of Americans and had been doing so for domestic intelligence purposes since at, least 1967. Kor is there ‘any indication that he was told that the CIA was opening the mail of Americans and sharing the contents with the FlZI and the militarv for domestic intelligence purposes. In effect, the “IIuston plan” suppiied Presidential authority for operations pre- viouslv undertaken in secret without such authorczation. For instance, the p1hn gave FBI Assistant Director Sullivan the “support” from “responsible quarters” which he had believed necessary to resume the “black bag jobs”’ and mail-opening programs Director Hoover had terminated in 1966.550

Nevertheless, the FBI Director was not satisfied with Huston’s memorandum concerning the authorization of the plan.551 Hoover Irent immediately to Attorney General Mitchell, who had not known of the prior deliberations or the President’s “decisions.” 552 In a memo- randum, Director Hoover said he would implement, the plan. but only with the explicit approval of the Attorney General or the President :

bM Memorandum from Huston to Haldeman, 7/i’O. 64’hlemorandum from Huston to Haldeman. i’/i’O. In using the word “hur-

glary.” Huston said he sought to “escalate the rhetoric . . to make it as bold as possible.” He thought that, as a staff man, he should give the President “the worst possible interpretation of what the recommendation would result in.” (Huston deposition. 5/22/75. p. 69.)

&1q Huston deposition. S/22/75. p. 8. “’ M~morandnm from Tom Charles Huston to Jntelligence Directors, ‘i/23/70. “’ Memorandum from Sulliran to DeLoach, 4/14/70. sm An assistant to the head nf the Defense Jntelligence Agency recalls agreeing

with his superior that the memorandum from Hustnn to the intelligence dirertnrs shnved that the White House had “passed that one down ahnnt as low as they could go” and that the absence of signatures by the President or his ton aides indicated “That a hot potato it was.” (Staff summary of James Stillwell inter- riew. 5/21/75.)

“’ Nitchell testimony, 10/24/55, Hearings. Vol. 4, p. 122.

Page 131: Church Committee: Reports-- Book II

115

Despite my clear-cut and specific opposition to the lifting of the various investigative restraints referred to above and to t,he creation of a permanent interagency committee on do- mestic intelligence, the FBI is prepared to implement the instructions of the White House at your direction. Of course, we would continue to seek your specific authorization, where appropriate, to utilize the various sensitive investigative techniques mvolred in individual cases.5j3

CIA Director Helms shortly thereafter indicated his support for the plan to the Attorney General, telling him “WP had put our backs into this exercise ” 554 Nonetheless, Mitchell advised the President to with- draw his al;proval.““j Huston was told to rescind his memorandum, and the White House Situation Room dispatched a message requesting its return.5jG

(3) Iml,lementation.-The President’s withdrawal of approval for the “H&on plan” did not, in fact, result in the termination of either the NSA program for covering the communications of Smericans or the CIA mail-opening program. These programs continued without the formal authorization which had been hoped for.“57 The directors of the CIA and NSA also continued to explore means of expanding their involvement in, and access to, domestic intelligence.558 A new group, the Intelligence Evaluation Committee (IX), was created by Attorney General Mitchell within the Justice Department to consider such expansion.5”9 NSX, CL4. Army counterintelligence, and the FBI

M3 Memorandum from Hoover to Mitchell, 7/25/70. “’ Helms memorandum for the record, ‘7/28;70. w Jlitchell. 10/24/75, Hearings. Vol. 4, p. 123. 658 Huston deposition, 5/23/75, p. 56; staff summary of David BIcManus inter-

view, 7/l/75. %‘Director Helms thinks he told Attorney General Mitchell about the CIA

mail program. Helms also believes President Nixon may have known ahout the nrogram although Helms did not nersonallv inform him. (Helms, 10/22/75, Hearings. Vol. 4:nn. 88-89.) JIitchell denied that Helms told him of a CIA mail- opening program- and testified that the President had no knowledge of the program, “at least not as of the time xve discussed the Huston Plan.” (Mitchell, j/24/75. Hearings, Vol. 4, pp. 120, 138.)

W In Xarch 1971. SSA Director Soel Gavler and CIA Director Helms met with Attorney General Mitchell and Director Hoover. According to Hoover’s memo- randum of the meeting, it had been arranged hv Helms to discuss “a hroadening of operations, partirularly of the very confidential type in covering intelligence both domestic and foreien.” Hoover was aeain “not enthusiastic” because of “the hazards involved.” 3‘iitrhell asked Helms’and Gavler to prepare “an in-depth examination” of the collection methods they desired. (Memorandum for the files hy J. Edgar Hoover, 4/12/71.) It was less than two months after this meeting that. according to a CIA memorandum. Director Helms hriefed Mitchell on the mail program.’ (CIA memorandum for the record, G/3/71.) Even before this meet- ing, SSA Director Gnvler sent a memorandum to Attorney General Mitchell and Defense Serretarv JIelrin Lnird describing “SSA’s Contribution to Domestic Intelligence.” This memnrandnn~ refers to a discussion with hot11 Mitchell and Laird on how X8.1 could assist with “intelligeuce bearing on domestic problems.” The memorandum mentioned the monitoring of foreign support for subversive activities. as well as for drug trafficking. although it did not discuss sperificnllp the SS.\ “Watch List” of Amerirans. (Memoralldnni from SSA Director Soel Gayler to the Serretnrv of Defenre and the dttornev General. .Jnnuarv 26, 1971.) SSA offirial Benson Bnfflian~ recorded that he personally showed this memo- r;11rdn771 to JIitrhell and had been told b,v the Military Assistant to Secretary T.aird that the Secretary had read and agreed with it. (Memorandum for the rerord b.v Benson I<. Buffham. 2/3/Z.)

558 Memorandum from Assistant Attorney General Robert Mardian to Attorney General Mitchell, 12/4/70.

Page 132: Church Committee: Reports-- Book II

116

each sent representatives to the IEC. X%4 Director Gayler provided the IEC with a statement of S&Y’s capabilities and procedures for supplying domestic intclligence.“GO Although the IEC merely evalu- ated raw intelligence data, over 90 percent of which came to it through the FBI, it had accrss to domestic intelligence from KSA coverage and the CL.43 mail-opening and CH140S programs, which was channeled to the FBI jG1

Two of the specific reEommendations in the “Huston Plan” were thereafter implemented by the FBI-the lowering of the age limit for campus informants from 21 to 18 and the resumption of “legal mail COVerS.” 562 Two men I\-ho had participated in developing the “Huston Plan” were promoted to positions of greater influence within the Bureau.563 More important the Bureau greatly intensified its domestic intelligence investigations in the fall of 107b without using “clearly illegal” techniques. The Key Black Extremist Program was inaugu- rated and field offices were instructed to open approximately 10,500 new investigations, including investigations of all black student groups “regardless of their present or past involvement in disorders.” All members of “militant XeFv Left campus organizations” were also to be investigated even if they were not, “known to be violence prone.” The objective of these investigations was “actual extremists.” 564

“to identify potential” as well as

The chief of the Domestic Intelligence Division in 1970 said the “Huston Plan” had “nothing to do” with the FBI’s expanded intelli- pence activities. Rather, both the “Huston Plan” and the Bureau inten- sification represented the same effort by FBI intelligence officials “to recommend the types of action and programs which they thought necessary to cope wi*th the problem. ” 565 Brennan admit.s that. “the FBI was getting a tremendous amount of pressure from the White House,” although he attributes this pressure to demands from “a vast majority of the American people” who wanted to knolv “why something masn% being done” about violence and disruption in the country.566

6. Political intelligence

The FBI practice of supplying political information to the White HOUSC and’ on occasion, responding to White House requests for such information was established before 1964. However, under the administrations of President Lyndon Johnson and Richard Xixon, this practice grew to unprecedented dimcnsions.56’

(1) Fame Check* RPqzteafs.-IVhitr House aides serving under Presi- dents .Johnson and Nixon made numerous requests for “name checks”

KBo Memorandnm from Ga~ler to Laird and 1Iitrhell. l/26/71 w1 For a discussion of the FBI as “consumer.” see pp. 107-109. 562The reslmlption of mail corers is discussed ahove at footnote 528. FRI

field offices were inctrncted that they cnnld recruit I%21 year-old informers in Scntemher 1970. (SAC Ietter No. 70-M. 9/15/70.) See. p. 76.

683The head of the FRI Domestic Tntellieencr IErisinn. William C. Snllirnn. --as promoted to he Assistant to the Director fnr all investigative and intelli- gence activities. His successor in charge of the Domestic Intelligence Division was Charles IP. Rrennan.

%’ Eserntives Cnnferenw to Tnlson, 10/29/71I : Memoranclnm from FRI Hcad- qiiarters to all S.4C.s. 71/a/70.

6G Rrennan denonition. 9/23/7X. nn. 2X31 508 Rrrnnnn testimony. 9/25/75. Hearinrrs. Vol. 2. n. 108. “‘!I%P inrnlrement of the Central Tntelliaence Agency in improper attirities

for the White House is described in the Rockefeller Commission Report, Ch. 14.

Page 133: Church Committee: Reports-- Book II

117

of FBI files to elicit all Enreau information on particular critics of ~~11 administration. ,Johnson aides requested such reports on critics of the escalating war in ~-ietnan~.“Gq President ,Jolmso~~‘s assistants XISO requested name checks on members of the Senate staff of Presi- dential candidate Barry Goldwater in 1964,jc” on ,Justice and Treasury Department officials responsible for a phase of the criminal invest]- gation of ~Johnson’s former aide Bobby Baker,j”“” on the authors of books critical of the Warren Commission report,570 and on prominent newsmen.571 President Sixon’s aides asked for similar name checks on anot,her newsman! the Chairman of Ame.ricans for Democratic Xction, and the producer of a film critical of the J?residcnt.5’z

According to a memorandum by Director Hoover, Vice President Spiro Ameb received ammunition from Bureau files that could be used in Gdestroying [the] credibilitv” of Southern Christian Lead- ership Conferen’ce leader Reverend Ralph Abernathy.573

(2) Democratic National Gonve?? tion, Atlrrntic City, 1964.-On August 22, 1061, at the request of the White House, the FBI sent a “special squad” to the Democratic National Convention site in Atlantic City, New Jersey. The squad was assigned to assist the Secret, Service in protecting President Lyndon Johnson and to ensure that the convention itself would not be marred by civil disruption.

But it went beyond these functions to report political intelligence to the White House. Approximately ‘30 Special Agents. headed by Assistant Director Cartha DeLoach, “were able to keep the White House fully apprised of all major developments during the Con- vention’s course” by means of “informant coverage, by use of various confidential techniques, by infiltration of key pr&ps through use of undercover agents, and through utilization of agents using appro- priate corer as reporters.” 574 Among these “confidential techniques” were,: a wiretap on the hotel room occupied by Dr. Martin Luther King, Jr., and microphone surveillance of a storefront serving as head- quarters for the Student Nonviolent Coordinating Committee and another civil rights organization.575

sBB Letter from J. Edgar Hoover to Marvin Watson, 6/4/65. mMemorandum from Hoover to Jloycrs, 10/27/64, cited in FBI summary

memorandum, subject : Senator Barry Goldwater, l/31/75. w” Jfemorandum from DeLoach to Tolson, l/17/67. 6’0Memorandum from Hoover to Marvin Watson, U/8/66. si18~e Finding on Political Ahnse. p. 225. “‘T etter from .J. Edgar Hoover to *John D. Ehrlichman, 10/6/69; House

.JudiriarF Committee Hearings. Statement of Information (1974), Book VII, p. 1111; Book VIII, p. la?. Director Hoover volunteered information from Rureau files to thp Johnson White House on the ,author of a play satirizing the President. (Jfemorandum from Hoover to Watson. l/9/67.)

“’ Jfrmnrandum fmm Hoover to Tolson. ct al., 5/N/70. A&w admits having rewired snrh information. hut denies having asked for it. (Staff summ&ry of Spiro Agnew intwriew, 10/15/75.)

5“~Temnrandum from C. D. DeLoach to Mr. Mohr. s/29/64. “’ DpLnach memorandum. s/29/64 : Carthn DeJ,narh testimony, 12/3/75. Hear-

ing% Vol. 6, p. 177. A 1975 FRT Inspection Report has speculated that the SNCC hug may have been planted berause the Rureau had information in 19M that “an apparent member of thp Cnmmunist Partv. TJRA, was engaging in con+rlwnhlc 3ctirit.v. mnrh in a Ieadwship rapacity in the Student Xnnvinlent Coordinating Committee.” (FBI summary memorandum. l/30/75.) It is unclear, hnwrer. whcthrr this hue XIS rwn approved internally 1)~ FRI Headquarters, as nrrlinnril~ required 11~ Bnrenn pmcednres. DeI,nnch stated in a contempo- raneous memorandum that the microphone surveillance of SSCC was instituted

(Continued)

Page 134: Church Committee: Reports-- Book II

118

Neither of the electronic surveillances at Atlantic City were spe- cifically authorized by the Attorney General. At that time, Justice Department procedures did not require the written approval of the Attorney General for bugs such as the one directed against SNCC in Atlant\ic City. Bureau officials apparently believed that the wiretap on King was justified as an extension of Robert Kennedy’s October 10, 1963, approval for surveillance of Kin, 0‘ at his then-current address in Atlanta, Georgia, or at any future address to which he might move.576 The only recorded reason for institutin.g the wiretap on Dr. King in Atlantic City, however, was set forth In an internal memo- randum prepared shortly before the Convention :

Martin Luther King, Jr., head of the Sout,hern Christian Leadership Conference (SCLC), an organization set, up to promote integration which we are investigating to deter- mine the extent of Communist Party (CP) influence on King and the SCLC, plans to attend and possibly may indulge in a hunger fast as a means of protest.577

Walter Jenkins, an Administrative Assistant to President Johnson who was the recipient of information developed by the Bureau, stated that he was unaware that any of the intelligence was obtained by wiretapping or bugging. 578 DeLoach, moreover, has testified that he is uncertain whether he ever informed Jenkins of these sources.578

Walter Jenkins, and presumably President Johnson, received a significant volume of information from the electronic surveillance at Atlantic City, much of it purely political and only tangentially re- lated to possible civil disturbances. The most important single issue for President Johnson at the Atlantic City Convention was the seat- ing challenge of the Mississippi Freedom Democratic Party to the regular Mississippi delegation. SO From the electronic surveillances of King and SNCC, the White House was able to obtain the most intimate details of the plans of individuals supporting the MFDP’s challenge unrelat.ed to the possibility of violent demonstrations.

Jenkins received a steady stream of reports on political strategy in the struggle to seat the MFDP delegation and other political plans and discussions by the civil rights groups under surveillance.581 More- over, the 1975 Inspection Report stated that “several Congressmen,

(Continued) “with Bureau approval.” (Memorandum from DeLoach to Bohr, 8/29/64.) But the Inspection Report concluded that “a thorough review of Bureau records fails to locate any memorandum containing [internal] authorization for same.” (FBI summary memorandum. l/30/75.)

md Mr. DeLoach cited the fact that in the summer of 1964 “there was an on- going electronic surveillance on Dr. Martin TAuther King . . as authorized by Attorney General Kennedy.” (Cartha DeT,oach testimnyv. 11/%/75. p. 110) ‘T%P Inspection Report noted that the Special Agent in Charge of the Newark office n-as instructed to institute the Tiretap on the ground that “the Burenn had au- thoritr from the Attorney General to cnrer any residences n-hich King may use with a technical installation.” (FBI summary memorandum l/30/75. Sub- Ject: “Special Squad at Democratic National Convention. Atlantic City. Sew ,Jersev. Bugust 2228. 1964.“)

“’ >Temnrandum from W. C. Sullivan to A. H. Relmont. 8/21/M “’ Staff summarv of Walter aenkins interview-. 12/l/75. 5’S DeT,nach. 11/2R/i5. p. 174. GsoTheodore White. Inking of tke Pr~niclw~t 1.964 (Sew York : Athenium. lM5).

np. 277-280. Walter Jenkins also confirmed this characterization. (Staff sum- mary of Jenkins interview. 12/l/75).

* Memorandum from DeLoach to Mohr, 8/29/&I.

Page 135: Church Committee: Reports-- Book II

119

Scllators, and Governors of States” were overheard on the Icing tap.5s2 Accorcling to both Cartha Deloach and Kalter ,Jenkins, the Bu-

reau% coverage in Atlantic City ~vas not designed to serve political ends. DeLoach testified :

I was sent there to provide information . . . which could reflect on the orderly progress of the convention and the danger to distinguished mdividuals, and particularly the danger to the President of the Unitecl States, as esempli- fied by the many, many references [to possible civil disturb- ances] in the memoranda furnished Jlr. Jenkins. . . .583

Jenkins has stated that the mandate of the FBI’s special unit did not encompass the gathering of political intelligence and speculated that the clissemination of anv such intelligence was due to the inability of Bureau agents to dis&uish dissident activities which represented a. genuine potential for violence. 584 Jenkins did not believe the White House ever used the incidental political intelligence that was received. However, a document located at the Lyndon B. Johnson Presidential Library suggests that at least one political use was made of Mr. De- Loach’s reports.585

Thus, although it may hare been implemented to prevent violence at the Convention site, the Bureau’s coverage in atlantic Cit,y---which included two electronic surveillances-undeniably provided use,ful PO-

litical intelligence to the President as we11.58G (3) By-Product of Foreign Intelligence Covercxqe.-Throu,ph the

FBI’s coverage of certain foreign officials in Washington, D.C., tihe Bureau was able to comply with Presiclent Johnson’s request for re- ports of the contacts between members of Congress and foreign officials opposecl to his Vietnam policy. According to a summary memorandum prepa.red by the FBI :

On March 14, 1966, then President Lyndon B. Johnson in- formed Mr. DeLoach [Cartha DeLoach, Assistant Director of the FBI] . . . that the FBI should constantly keep abreast of the actions of [certain foreign officials] in making contact with Senators and Congressmen and any citizen of a. prom- inent nature. The President stated he strongly felt that much of the protest concerning his Vietnam policy, particularly the hearings in the Senate, had been generated by [certain foreign officials] .587

‘*’ Jfemorandllm from H. S. Bassett to Mr. Callahan, l/29/75. jg3 DeLoach. U/26/75. n. 139. 58( Staff summary’ of jenkins interview, l/21/75. x Eshihit 68-2. Hearings, Vol. VI, p. 713. z86 FRI memoranda indicate that in 1968 Vice President Hubert Humphrey’s

l?xecutire Assistant, Bill Connell. asked the Bureau to send a “srwcial team” to 1-1~~ forthcoming Democratic Sutional Conrention. since President Johnson “al- 1r:edl.v told the Vice President lhnt the FBI had been of ,--rent service to him and he had been given considerable information on a timely basis throxhout the entire convention.” (Memorandum from DeLoach to Tolson, R/7/68). Mter talk- ing with Conwll, Director Hoover advised the SAC in Chirngo that the Bureau was “not going to pet into anything political but anything of extreme action or violence contemplated ve want to let Connell know.” (Memorandum from Honrrr to T~~lsnn. et al.. S/15/6%) Dpmocrntic Party Treasurer John Criswell made a similar request. stating thnt Postmaster General Sfnrvin Watson “had informed him of the great serrice performed by thr FBI durin E the I.ast Democratic Cnn- rentinn.” (Jlemornndum from DeLnach to Tolson, S/22/68.)

‘8~ FBI summary memorandum, 2/3/75.

Page 136: Church Committee: Reports-- Book II

120

As a result of the President’s request, the FBI prepared a chronolog- ical sluniilary-nppal~eiltl~ based in part on csistiiq electronic sllrvcil- lances-of the contacts of each Senator, Reprcsentatire, or legislative staff member viho communicated with sclrctcd forei,cn officials during the period ,Jul;v 1. 1964. to March 17. 1966. This t,T-paw snmmar;v was transmitted to the White House on Xarch 21, 1966, with a note that certain foreign officials were “making more contac.ts” with four named Senators “t,han with other United States legislators.” 585 A second sum- mary. prepared on further contacts between Congressmen and foreign officials, was transmitted to the Yhitc House on May 13, 1966. From then until the end of the Johnson -1dministration in January 1969, biweelclv additions to the second summary were regularly disseminated to the JThite H~use.~~”

This practice was reinstituted during the Nixon Administration. On July 27? 1970, Larry Higby? Assistant to H. R. Haldeman, in- formed the Bureau that Haldeman “wanted any information pas-

sessed b- the FBI relating to contacts between [certain foreign offi- cials] and Members of Congress and its staff.” Two days later, the Bureau provided the White House with a statistical compilation of such contacts from ,January l7 1967, to the present. Unlike the case of the information provided to the Johnson White House, however, there is no indication in related Bureau records that Presiclent Xxon or his aides were concerned about critics of t,he President’s policy. The Bu- reau’s reports dicl not identify individual Senators: they provided overall statistics and two examples of forei,? recruitment, attempts (with names removed) .590

In at least one instance the FBI, at the request of the President and with the approval of the Attorney General, instituted an elect,ronic surveillance of a foreign target for the express purpose of intercept- ing telephone conversations of an American citizen. An FBI memo- randum states that shortl,v before the 1968 Presidential election, Pres- ident Johnson became suspicious that the South Vietnamese were trying to sabotage his peace negotiations in the hope that Presidential candidate Nixon would win the election and then take a harder line toIT-ard North Vietnam. To determine the validitv of this snsnicion, the White House instructed the FBI to institute physical surveillance of Mrs. Anna Chcnnault, a prominent Republican, as well as electronic surveillance directed a,cainst a South Vietnamese target.591

The electronic surveillance was authorized by Attorney General Ramsey Clark on October 29. 1968. installed the same clay, and con- tinued until ,Januarv 6. 1969.5”* Thus. a “foreign” electrohic surreil- lance was instituted io tarret indirectlv an American citizen who could not be lepitimatelv surveilled directl-. Also as part of this investiga- tion, President dohnson personally.ordered a check of the long distance toll call records of Vice Presidential candidate Spiro Agnew.593

685 FBI summary memorandum, 2/3/75. sw FBI summarT memorandum. 2/3/X. 680 FRT summary memorandum. 2/3/X See Findings on Political Abuse. “I FRI summnrr memornndum. 2/l/75. 582 Memorandu& from Director.’ FBI tn Attorney General, 10/2%&R : mcmo-

mndnm from Director. FBI to Attorney General, 10/30/t%?; memorandum from Dirertnr. FRT to Attorney General. 3/27/69.

Attorney General Clark testified that he was unaware of any surveillance of Mrs. Chennault, (Clark, 12/3/75. Hearings, Vol. 6, pp. 251-252.)

683 See Findings on Political Abuse, p. 225.

Page 137: Church Committee: Reports-- Book II

121

(4) 1’72~ 8103cc;i77n~ice of Joseph Kt~nf’t (l%Y).-There is 110 sukkm- tin1 indication of any gcnuinc iiational sec.lll.itJ yatiollale for tile elec- tronic surveillance o\-erseas of colunmist ,Josvpl~ Kraft in 19ti9. Jolln Erlicliinan testified before tlic Senate \Vatcrgate C‘oinniittee that the national security was in\-olved, but did not elaborate furtlier.594

13c;vond this, general clail~i, liowt~\~~~~, there is little erideiicc that anr national sccurlty isme v-as in\-olwtl in tlic cast. Former Deputy Attor- ney General and Acting FI<Z I)irector Villiam Rnckelsl~aus testified that, after reviewing the matter lw “could never see any national se- curity justification” for the sur\-cillance of K&t. Ruckelsl~aus stated that the dclmiiiistration’s “justification” for bugging ICraft’s hotel room was that lie was *%3lring questions of some members of the Sort11 T’ietiiainese Go\-criiinciit.” I~uckelsllaus belie\-cd that this was not an adequate national secllrity justification for placing “any kind of sur- velllance on an American citizen or newsman.” 595 Xr. Kraft agreed that, he vas in contact, Fit11 Sort11 Yietnauitsc officials while he was abroad in 1069, but noted that this XLS a common practice among journalists and that “at the time” hc never knowinpl~ published any classified information.5”G

The documentary recorcl also reveals no national security justifica- tion for the FI3I’s electronic surveillance of Mr. Rraft overseas. The one memorandum which referred to V’ossible Leaks of Informa- tion” by Kraft, does not indicate that there clearly n-as a leak of na- tional security significance or that Xr. Kraft was responsible for such a leak if it occlwred.597 Furthrrmore, the hotel room bug did not pro-

duce anr evidence that &-aft received or published any classified information.z9s

ES’ John Ehrlichman testimony. Senate Watergate Committee, 7/24/73, p. 2.535. Arcorcling to the trnnscri])t of the White House tapes, President Sison stated to John Dean on April l&1973 :

“What I mean is I think in the case of the Kraft stuff x-hat the FBI did. they were both fine. J hare checked tt- facts. There were snme done through privatk sources. JIost of it was done through the Bureau after \ve got-Hoover didn’t want to do Kraft. What it involved apparent&, ,John, was this: the leaks from thr SW rSatinna1 Securitr Cnnnrill. Ther were in Kraft and others columns and n-e were trying to plug the leaks rind & had to get it done and finally we turned it over to Hnorer. And then when the hnllahaloo developed we just knncked it off nltogrther. . .” (Suhmissinn of Recorded Presidential Cnnversa- tinns tn the Cnmmittep on the Jur1iciar.v of the House of Representatives by President Richard Xi’isnn. 4/W/74.) The Presidpnt’n statement was made in the rontpst of ‘coaching’ .Jnhn Dean on TX-hat to say to the Watergate Grand Jury.

w William Ruckleshaus testimony before the Subcommittee on Administrative Practice and Procedure. s/9/74. p. 320.

-Kraft testified that Henry Kissinger, then the President’s Special Adviser for Satinnal Security, informed him that he had no knowledge of either the wire- tan or the hntcl rnnm bnz. Kraft also stated that former i\ttnrnev General Elliot Rirhardsnn indicated to iirn that “there was no justification for t%ese activities.” (.Jnse~h Kraft testimony. Senate Subcommittee on Administrative Practice and Prow&w, 5/10/74. p. 381.)

w LMer from TV. C. Sullivan to 1lr. Hoover. 7/12/69. 688While the summaries sent to Hoover by 8ulliran did show that Kraft cnn-

tacted North Vietnamese nfficials (Letter from ~ulliran to Hoover, 7/12/M). the Rnrenu did not discover anv imnrnnrieties or indiscretions on his part. When Rnrkelshaus was asked if iis r&i& of these summaries revealed to him that Kraft engaged in any conduct n-hile abroad that posed a danger to the national swnritr. hr rqvliwl : “.4bwlntely not.” (Rnckelshnns testimony before the Suh- committee on Bdministratire Practice and Procedure, 5/g/74. p. 320.)

Page 138: Church Committee: Reports-- Book II

122

Similarly, there is no evidence of a national security justification for the physical surveillance and l~roposecl electronic surveillance of

Kraft in t,he fall of 1969. A Bureau n~en~ora.nclun~ suggests that the Attorney General requestecl some t?pe of coverage of kraft,Z”g but the record reveals no purpose for this coverage. The physical surr-cillance was discontinued after fire weeks because it had “not been produc- tive.” -1pparcntly. the -1ttornev General himsrlf was unconvinced that a genuine national securit$ justification supported the Kraft surveillance : he refused to autho;*ize the requested wiretap, and it was consequently never inil~lemcnted.~OO

(5) The “17” Wiretqs.-The relative ease J&h which high admin- istration officials could select. improper intelligence targets was demon- strated by the ‘;17’! wiretaps on Executive officials ancl newsmen in- stalled betlveen 1969-1971 under the. rationale of determining the

SOLUTC of leaks of sensitive information. fxoa In three cases no national security claim was even advanced. While national security issues were at least arguwblv involrrd in the initiation of the other taps, the pro- gram continued‘in tx-o instances against persons who left the govern- ment ancl took positions as advisors to Senator Edmund Muskie, then the leading Democratic Presidential l~rosl~ect.Go1

The records of these wiretaps were kept separate from the FBI’S regular electronic surveillance files, * 602 their duration in many cases went beyond the period then requirecl for re-authorization 13p the At- torney General; and in some cases the Attorney General did not au- thor& the tap until after it had begun.F03 In 1971. the records were removed from the FBI’s possession and sent to the White House.

Thus. misuse of the FBI had progressed 1);~ 19.71 from the regular receipt by the VlCte House of polltlcal “tid-bits” and occasional re- quests for name checks of Bureau files to the use of a full array of intelligence operations to serve the political interests of the admin- istrat,lon. The final irony was that the Sison administration came to distrust Director Hoover% reliability and, consequently, to develop a White House-basecl covert intelligence operation.604

C. The Justice Departmen.t’s Internal Security Divisi~t FBI intelligence reports flowed consistently to the Justice Depart-

ment. especially to the TDIU established by Attorney General Clark in 1967 and to the Internal Security Division. Before 1971, the Justice Department provided little guidance to the FBI on the proper scope of domestic intelligence investigations .605 For example, in response to a Bureau inquiry in 1964 about whether a group’s activities came “within the criteria” of the employee securit,y program or were “in

688 Memorandum from W. C. Sullivan to Mr. DeLoach, U/4/69 w” Memorandum from Sullivan to DrLoach. 12/11/69. Bw’ For discussion of dissemination of political intelligence from the “1’7” wire-

taps, see Finding nn Political Abuse, p. 225. 8o1 Sen. Edmund Muskie testimony, Senate Foreign ReIations Committee,

9/10/7X Esecntire Srwinn. pn. .%&51. soa Memorandum from W. C. Sullivan to C. D. DeLoach, 5/11/69. B”3Report of thy House Judiciary Committee. fi/BO/C4. pp. 14&1.54. w!l%e creation of the “plumbers” unit in the White House led inexorably to

Watergate. See Report of the House Judiciary Committee, S/20/74, pp. 157-162, 16&170.

‘Oi An example of a generalized Departmental instruction is Attorney General Clark’s order of September 1967 (see p. 79) regarding civil disorders.

Page 139: Church Committee: Reports-- Book II

123

violation of any other federal statute, sion replied that there was

” 6oG the Internal Security Divi- “insuficient evidence” for prosecution and

that the gronp’s leatlers were “becoming more cautions in their ut- terances.” (joy Sevcrthcless, the FBI contmued for years to investigate tile goup wit11 tile liwwledge ax1 approval of tile I>ivision.

(1) The “h’ew” Internal Security Dieisio?z..-When Robert Mardian was appointed Assistant -4ttorney (;eneral in late 1970, the Internal Security Division assumed a more active posture. In fact, one of the alternatives to implementatiol~ of the “Huston Plan” suggested to Attorney General John Mitchell by White House aide John Dea.n was the invigoration of the Division. 6o8 This included Jlardian’s es- tablishment of the IEC to prepare domestic intelligence estimates. Equally significant. however: was Xardian‘s preparation of a new Esecutlre Order on federal eml)loyee security. The new order assigned to the moribund Subrersire .4cti\-ities Control Board the function of designating groups for what had been the “Attorney General’s list. ” 60g This attempt, to assign broad new functions bv Esectltive fiat td a Board with limited statutory responsibilities clearly disregarded the desires of the Con,rrress.610

According to Mardlan, there. was a “problem” because the list had “not been updated for 17 years.” He expected that the revitalized SACB wo~rld “deal specifically with the revohItionnr~/terrorist or- ganizations which have recently become a part of our history.” 611

Assistant Attorney General Mardian’s views coincided with those of FBI Assistant Director Brennan, who had seen a need to compile massive data on the “Xew Left” for fut.ure employee security pur- poses.612 Since FBI intelligence invest.igations were based in part on the standards for the “,\ttorney General’s list.” the new Executive Order substantially redefined and expanded FBI authority. The new order included groups who advocated the use of force to deny individ- ual rights w&r the “laws of anv State” or to overthrow the povern- ment of L’8any State or subdivision thereof.” 613 The new order also continued to use the term “subversive,” although it was theoretically more restrictive than the previous standard for the Attorney Gen- eral’s list because it required ‘Lunlawful” advocacy.

B”Jlemorandnm from FBI Director to Peagley, l/31/64. BwMemorandum from Yeaglep to FBI Director, 3/3/W There was no reau-

thorization of the continnine inrestieation between 1966 and 1974. w Memorandum from Dean to Mitchell, 9/N/70. BoB Erecntive Order 7 1605, 7/71. 810 Ry 1971. the SL%CB had the limited function of making findings that sDe-

rific individuals and groups were Communist. Its registration of Communist had been declared unconstitutional. [AZbwtdo?l v. &‘ubz;ersi?‘e Activities Control Board, 38” U.S. io cl!%.?,.1

811 Robert C. Mardian, address before the Atomic Ener,qv Commission Security Conference, Washinzton. D.C. 10/2i/il. Mardian added that the “problem” was that, withont an updated, formal list of subversive organizations, federal agen- cies \wre required “to individually evaluate information regarding membership in allqedly snbwrsire organizations based on raw data furnished by the Fed- eral Bureau of Inl-estigation or other governmental sources.”

‘I’ Rrennnn testimony. 9/25/iEi. Hearings, Vol. 2, 11&117. m3Erecutire Order ~1605. i/71. By contrast. the prior order had been limited

to zronns seckinp forcil)le violation nf rights “under the Constitution of the United States” or seeking “to alter the form of government of the United States h.v unconstitutional means.” Executive Order 10450 (1933).

Page 140: Church Committee: Reports-- Book II

124

Mardian made it clear that, under the order, the FBI was to provide intelligence to the Subversive Activities Control Board :

We have a new brand of radical in this country and we are trying to address ourselves to the new situation. With the in- vestigative effort of the FBI, we hope to present petitions to the Board in accordance with requirement of the Execu- tive Order.614

FBI intelligence officials learned that the Internal Security Division intended to “initiate proceedings against the Black Panther Party, Progressive Labor Party, Young Socialist Alliance, and Ku Klux Klan.” They also noted: “The language of Executive Order 11605 is very broad and generally coincides with the basis for our investiga- tion of extremist groups. ” 615 Mardian had, in effect, provided a new and wider “charter” for FBI domestic intelligence.616

(2) The ~ullica?2-illal,clian, ReZatimsl~ip.--ln 1971, Director Hoover expressed growing concern over the close relationship developing between his FBI subordinates in the Domestic Intelligence Division and the Internal Security Division under Jlardian. For example, when FBI intelligence officials met with Mardian% principal deputy, ,4. William Olsen, to discuss “proposed changes in procedure” for the Attorney General’s authorization of electronic surveillance, Hoover reiterated instructions that Bureau officials be “ver? careful in our dealings” with Mardian. Moreover, to h’ave a source of legal advice independent of the Justice Department, the FBI Director created a new position of Assistant Director for Legal Counsel and required that he attend “at any time officials of the Department are being contacted on any policy consideration which affects the Bureau.” 617

In the summer of 1971, William C. Sullivan openly challenged FBI Director Hoover. possibly counting on JIardian and ,ittornep General Mitchell to back him up and oust Hoover. 618 Sullivan charged in one memorandum to Hoover that other Bureau officials lacked “objectiv- ity” and “independent thinking” and that “they said what they did because they thought this was what the Director wanted them to sav 7: 619

‘ihortly thereafter, Director Hoover appointed 1’. Mark Felt, for- merly Assistant Director for the Inspection Division?, .to a newly cre- ated position as Sullivan’s superior . -4pparentl;v reallzinp that he was on his way out, Sullivan gave Sssistnnt llttorney General Mardian the FBI’s documents recording the authorization for, and dissemination

Q’ Hearings on the appropriation for the Department of Justice before the House Subcommittee on Appropriations, 92nd Cony., 2nd Sess., (1972), p. 673.

a5 Inspection Report, FBI Domestic Intelligence Division, Bugust 17-Sep- tembrr 9, 1971.

‘I8 The hostile Congressional reaction to this Order. xvhich shifted duties by Kkwutire fiat to a Board created hr statute for other nurnoses. led to the death of the SACB when no appropriation &as granted in 1972: A ’

‘Ii FBI Executives Conference Memorandum. 6/2/71. The first Assistant Direc- tor for Legal Counsel was Dwight DalbeF. who had for years been in charge of the legal training of Bureau agents. Dalbey’s elevation ear& in 1971. and Hoover’s requirement that he review all legal aspects of FBI policy. including intelligenre matters. was a ma,jor change in Bureau procedure. (Memnrandum from Hoover to ,\11 Bureau Officials and Supervisors, 3/R/71.)

m8 FBI Summary of Interview with Robert Jlardinn, s/10/73, pp. l-3. Q8Memorandum from Sullivan to Hoover, 6/16/71.

Page 141: Church Committee: Reports-- Book II

125

of, information from the ‘ili” wiretaps placed on Executive officials and nc\vsmen in l!K9-1971. The absence of these nlaterials was not dis- covered by otller FBI officials until after Sullivan was forced to resign in September 19T1.6’” Mardian cvcntuallv took part in the transfer of theye records to the Vhite House.G” ”

Thus, the Attornev General’s princ~ipal assistant for internal secu- rity collaborated with a ranking FBI official to conceal vital records, ultimately to be secreted away,in the White House. This provides a striking example of the manner in which channels of legitimate author- ity within the Executive Branch can be abused.

d. The FBZ’s Secret “Administmtice Index’?

In the fall of 1971, the FBI confronted the prospect of the first seri- ous Congressional curtailment of domestic intelligence investiga- tions-repeal of the Emergency Detention ,4ct of 19X-and set a course of evasion of the mill of Congress which continued, partly with ,Justice Depart,ment approval, until 1973.

An FBI Inspection Report viewed the prospect of the repeal vvith- out great alarm. In the event the Act was repealed, the FBI intended to continue as before under “the Government’s inherent right to pro- tect itself internally.” 6Z2 After the repeal took place, Bureau officials elaborated the following rationale for keeping the Security Index of “potentially dangerous subversives :”

Should this country come under attack from hostile forces, foreign or domestic, there is nothing to preclude the President from going before a joint session of Congress and requesting necessary authority to apprehend ant1 tletain those who would constitute a menace to national defense. At this point, it would be absolutely essential to have an immediate list, such as the SI, for use in making such apprchensions.623 [Em- phasis added.]

Thus, FBI officials hoped there would be a way to circumvent the repeal “in which the essence of the Security Index and emergency detention of dangerous individuals could be utilized under Presiden- tial powers.” 624

Bssistant Director Dwight Dalbeg, the FBI’s Legal Counsel? recom- mended writing to the attorney General for (‘a reassessment” m order to “protect” the Bureau in ease “some spokesman of the extreme left” claimed that repeal of the Detention Act eliminated FBI authority for domest,ic intelligence activity. Dalbey agreed that, since the Act “could easily be put back in force should an emergency convince Con-

aw Memorandum from T. J. Smith to E. S. Bliller. 5/13/73. pp. 1.8. 821 FBI Summary of Interview with Robert Mardian, i/10/73, pp. 2-3. The

Watergate Special Prosecutor investigated these events. and did not find suffi- cient evidence of criminal conduct to bring an indirtment. Homcrer, they occurred at the time of intense White House pressure to rlerelop a criminal prosecution against Daniel Ellsberg over the Pentagon Papers matter. The dismissal of charges against Ellsherg in 1973 was largely due to the belated discorerg of the fart that Ellsherg had been overheard on a nirctap indicated in these records, xrhich were withheld from the court. preventing its determination of the perti- nency of the material to the Ellsberg case.

e Tnspection Report. Domestic Intellieence Dirisinn. S/17-9/9/71, p. 98. En Memnrandum from R. II Cotter to E. S. Miller, g/21/71. 824 Memorandum from Cotter to Miller, g/17/71.

Page 142: Church Committee: Reports-- Book II

126

gress of its need,” the Bureau should “have on hand the necessary action information pertaining to individuals.” G25 Thereupon, a. letter was sent to Attorney General Mitchell proposing that the Bureau be allowed to “maintain an administrative index” of individuals who “pose a threat. to the internal security of the country.” Such an index would be a,n a.id to the Bureau in discharging its “investigative re- sponsibility.” However, the letter made no reference to the theory pre- vailing within the FBI that the new “administrative index” would serve as the basis for a revived detention program in some future emergency.625a

Thus? when the Attorney General replied that the repeal of the Act did not prohibit the FBI from compiling an “administr+ive index” to make “readily retrievable” the “results of its invest.igatlons,” he did not deal with the question of whether the index would also serve as a round-up list for a future emergency. The attorney General also stated that the Department did not “desire a copy” of the new index, abdicat- ing even the minimal supervisory role performed previously by the Internal Security Division in its review of the names on the Sef\urity Index.626 FBI officials realized that they were “now in a position to make a sole determination as to which individuals should be included in an index of subversive individuals.” W’

There were two major consequences of the new system. First,, the new “administratire index” (ADEX) was expa,nded to include an elastic category : “the new breed of subversire.“628 Second, the pre- vious Reserve Index, which had never been disclosed to the Justice Depa.rtment, was incorporated into the ADEX. It included “teachers, writers, la-ivyers, etc.” who did not. actively participate in subve,rsive activity “but who were nevertheless influential in espousing their respective philosophies.” It was est.imated that the total case load under the ,4DEX would be “in excess of 23,000.” ~2~

One of the FBI standards for placing someone on the ,4DEX list demonstrates the vast breadth of the list and the assumption that it COUICI be used as the basis for detention in an emergency :

An individual who, although not a member of or participant in activities of revolutionary organizations or considered an activist in affiliated fronts, has exhibited a revolutionary ideology and is likely to seize upon the opportunity presented

-- Baj?\lemorandum from D. J. Dalhev to C. Tolson, Q/24/71. @’ Memorandum from Hoover to Mitchell, 9/30/71. a= Memorandum from Mitchell to Hoover, 10/22/71. an Memorandum from T. J. Smith to E. S. Miller, 11/U/71. It was noted that in

the past the Department had “frequently removed individuals” from the Security Index because of its strict “legal interpretation.”

ma This new breed was described as follows : “He map adhere to the old-line rerolutibnary concepts but he is unaffiliated

with any organization. He may belong to or follow one New Left-tsDe grouD today and another tomorrow. He may simplr belong to the loosely knit $ou$ ofrevoli- tionaries who have no particular political philosophy bnt who continuously plot the overthrow of our Government. He is the nihilist who seeks only to destroy America.”

“On the other hand, he may be one of the revolutionary black extremists who, while perhaps influenced by groups such as the Black Panther Party. is also unnfWiated either permanently or temporarily with any black organization but with a seething hatred of the Tvhitr establishment will assassinate, explode, or otherwise destroy white America.” (T. J. Smith to E. S. Miller, 11/11/71.)

m Memorandum from T. J. Smith to E. S. Miller, 11/11/71.

Page 143: Church Committee: Reports-- Book II

127

by natiod emergemy to commit acts of espionage or sabo- tage, including acts of terrorism, assassination or 071~ infe?*- ference with or threat to the survival and effective operation of the national, state, and local governments and of the defense efforLs. [Emphasis aclclecl.]G30

These criteria were supplied to the Justice Department in 1972, and the Attorney General did not question the fact that the *IDES was more than an administrative aid for conducting investigations, as

he had previously been told.G31 A Bureau memorandum indicates that “representatives of the De-

partment” in fact agreed with the view that there might be “cir- cumstances” where it would be necessary “to quickly identify persons who were a threat to the national security” and that the President could then go to Congress “for emergency legislation permitting ap- prehension and detention.” 632

Thus, although the Attorney General did not formally authorize the ADEX as a continuation of the previous detention list, there was informal Departmental knowledge that the FBI would proceed on that basis. One FBI official later recognized that the ADEX could be “interpreted as a means to circumvent repeal of the Emergency Detention Act.” 633

8. Reconsidemtion of FBI Authority In February 1971, the Subcommittee on Constitutional Rights of

the Senate Judiciary Committee began a series of hearings on federal data banks and the Bill of Rights which marked a crucial turning point in the development of domestic intelligence policy. The Subcommittee, chaired by Senator Sam J. Ervin of North Carolina, reflected growing concern among Americans for the protection of “the privacy of the individual against the ‘information power’ of government.” 634

Largely in response to this first serious Congressional inquiry into domestic’intelligence policy, the army curtailed its extensive surveil- lance of civilian political actirity. The Senate inquiry also led, after Director Hoover’s death in 19% to reconsideration by the FBI of the legal basis for its domestic intelligence activities and eventually to a request to the Attorney General for clarification of its authority.635

63o Memorandum from FBI Headquarters to all S.4Cs, 11/15/71. 831Xlemorandum from Hoover to Mitchell, Z/10/72 ; cf. memorandum from

Hoover to Mitchell, S/30/71 for the previous statement. 832 Memorandum from T. J. Smith to E. S. Miller, S/29/72. 633 Jlemorandum from Domestic Intelligence Division. Position Paper: Scope

of Authority, Jurisdiction and Responsibility in Domestic Intelligence Investiga- tions. 7/31/72.

w Federal Data Banks, Hearings, Opening Statement of Senator Ervin, Febru- ar.v23.1971, p. 1. Senator Ervin declared that a major objective of the inquiry was to look into “programs for taking official note of law-abiding people who are active politically or who participate in community activities on social and political issues.” The problem. as Senator Errin saw it, was that there were citizens who felt “intimidated” by these programs and were “fearful about exercising their righIts under the First Amendment to sign petitions, or to speak and \vrite freely on current issues of Gorcrnment policy.” The ranking minority member of the Subcommittee. Senator Roman Hruska, endorsed the need for a “penetrating and sw;ching” inquiry. (Hearings, pp. 4, 7.)

.ilsn during JIarch 1971. an FRT offirr in Media. Pennsylvania was broken into : a substantial nnmlwr of docnments were remored and soon began to appear in the press. One of these was captioned COTSTEI,PRO. The Burenu reacted by ordering its field offices to “discontinue” COISTELPRO operations “for

(Continued)

Page 144: Church Committee: Reports-- Book II

128

a. Det~elopmtw ts in 197,?-1974 There is no indication that FBI ‘bguidelines” material or the FBI

Xannal provisions tlwmsclves were submitted to, or requested by, tile ,Jnsticc Dcpartnlent prior to 197~. 3 G3G Indcecl, when Dcput~ Attorney General Richard Rlcindicnst tcstificd in Fchrnar\- 1Vi5! at the hear- ings on his nomination to be A1ttornc>- General, he stated that he was “not sure” what gliidelines wcrc wed 1)~ the FBI. Klcinclienst also stated that he belie\-rd FBI investigations vxc *‘restricted to criminal conduct or the likelihood of criminal conduct.” GRY Director Hoover noted on a newspaper report of the testimony. “Prepare succinst memo to him on our guidelines.” 638

_U’tcr Hoowr’s death in 197% $1 shnrl) split derelol)ed within the Domestic Intelligence DiGion over whether or not the Burtan should continue to rely on the various Esrcuti\-e Orders as a basis for its autliority.G39

,\cting Director Gray postponed making npg formal decisions on this matter; he dicl not formally request adr-we from the Attorney Gcneral.G40 Meanwhile, the Domestic Intelligence Division proceeded

(Continued) security reasons because of their sensitirit?.” It was suggested, however. that “counter-intelligence action” would be considered “in escrl~tinnnl instances” so long as there were “tight procedures to insure absolute secrecy.” (Memorandum from IIrennan to Sullivan, 4/27/71; $lemorandum from FBI Headquarters to all SAC’s 4/28/71.) For actions taken thereafter, see COISTELI’RO report.

“‘.tfter repeal of the Emergency Detention kt in the fall of 1971, the FBI’s Assistant Director for 1,eeal Counsel recommended that the Bureau’s renuest for ,approval of its new AIkX also include a mnre general request for re-affirma- tinn of FBI domestic intelligence authority to investigate “sulwrrsire activity.” (Memorandum from D. .J. Dalber to Mr. To&on. g/24/71.) The letter to the attor- ,.

nep General reviewed the line of “Presidential directives” from 1939 to 1953. (Memorandum from Hoover to Mitchell, g/30/71.) The Attorney General replied with a general endorsement of FBI authority to investigate “subrersire activ- ities.” (Memorandum from Mitchell to Hoover. 10/22/71.)

w Richard Kleindienst testimony, Senate Judikary Committee, 2/?4/‘i’1, p. CJ 835 FBI routing slip attached to JVnrhi)1qfon Poxt article. 2/24/Z. The FBI’s

summary of its “guidelines,” submitted to the ,4ttorney General stated that its investigations were partly based on criminal statutes, but that “subversive nctir- ity . often does not clearly involve a specific section of a specific statute.” Thus. investigations were also bared on thr 1939 Roosevelt directives which were said to hare been “reiterated nxd b?wctlo~crl by subsequent Directives.” /Attach- ment to Hoover memorandum to Kleindienst. 2/25/72.) (Emphasis added.)

BmThe background for this development may be summarized as fc~llnws: In May 1972, FBI intelligence officials prepared a “position paper” for Scting Direc- tor I,. Patrick GraF. This paper merely rerited the xarinus Presidential directives, Executive Orders, delimitation agreements. and general authorizations from the Attnrnw General. with no attemnt at analrsis. (FBI Domestic Intellieence Divi- sion. Position Paper : Investigations o’f Sui~rminn. 5/19/72.) Assistant Director E. R. Miller. head of the Domestic Intelligence Division. withdrew this paper at ,a conference with Gray and other top Bureau officials : Jliller then initiated worli on a more estensire position paper, which was completed in July. It concluded that domestic intelligence investigations ccnld prarticahl,v be baled on the “cnn- crpt” that their purpose was “tn prevent a violation of ,a statute.” The paper also indicated that the ADEX vwald br revised so that it could not be “interpreted as a means to circumvent repeal of the Emewency Detention Act.” (FBI Dnnrwtic~ Intelligence Division: Position Paper: Scope of FBI Authority, 7/31/72; T. J. Smith to E. S. Miller. 8/l/72.)

&lo Gray did order that the Bureau shnnld indicate its “jurisdictional authority” to investigate in every rnse, “by citing the pertinent prnrision of the I’.%. Cndp. or other ,nuthnrity.” and also that the Bureau should “indicate whether or not an inr-eatigfltion was directed 11,x- D.J (Department of Justice). or n-e opened it n*ithnut any request from D.T.” In the latter case, the Bureau was to “cite our reasons.” (FBI routing slip, S/27/72.)

Page 145: Church Committee: Reports-- Book II

129

A revision of the FBI Manual v-as completed !~y Nay 19?3. It was

descrilwd as % major step” auxv front “hearv relm~cc upon Presiden- t ial Directi\-es” to an al~l~roach ‘“based on existing Federal statutes.G4” ,1khougll field offices xere instructed to “close” investigations not meeting tile new criteria. headqnarters did not want “a massire rwiew on crash basis” of all existing cas~s.~“’

After a series of regional conferences with field office superrisors. the standards were yevised to allox greater flcsibility.G’z For the first time in FBI history: a copy of the Manual section for “domestic sub rersire inrestigations7’ was sent to the Attorney General.G4F

After Clarence JI. Kelley WC confirmed as FBI Director, he au- thorized a request fol pnidance from Attornef Genei*al Elliot Rich- ardson.“” IlelleT advised that it “would be folly’! to limit the Burean

011 One official observed that there were “some individuals non- included in -IDES even though they do not realistically pose a threat to the national secu- ritv.” IIe added that tllii: would leave the Burcaii “in a vnlnernl~le position if our guidelines tvere to be scrutinized by interested Congressional Committees.” (JIem- orandnm from T. J. Smith to E. S. Miller, 8/29/72.)

w’ Mrl~~orniitlnm from Smith to Jliller. r;/L!)/Z.L The anticipated reduction was from 15.259 (the current fi,exre) to 4.iSfi (the tqt lxvo priority categories). The .Tustice Donartment n-as advised of this change. (Memorandum from Gras to Kleindienst. n/18/72.)

c

“‘Draft copies were distributed to the field for suggestions. (E. S. Miller to JIr. Felt, 5/22/73.)

@’ Jlrmorandum from FBI Headquarters to all SACS. 6/7/73. The memorandum to the field stated, looking back on past Bureau policy, that since the FBI’s au- thority to investigate .kubversire elements” had never been “seriously challenged until recently,” Bureau personnel (and “the general public”) had accepted “the FBI*s right to handle internal secnritF matters and investigate subversive actir- itirs without reference to specific statutes.” But the “rationale” based on “PreSi- dential Dirertires” was no longer “adequate.”

‘The field n-as advised that the “chief statutes” upon which the new criteria Jvere Iased were those dealing with rebellion or insurrection (18 U.R.C. 2583), seditious conspiracy (18 U.S.C. 2584) and advocating overthrow of the govern- ment (18 U.S.C. 2528). The ADEX P;as to be “strictly an administrative device” and should play no part “in investigative decisions or policies.” The revision also eliminated “overemphasis” on the Communist Party.

a~ For esample. the field offices saw the need to undertake “preliminary in- rpiiries” beforeit \vas known “mhether a statutory basis for investigation exists.” This specifically applied xhere a person had “contact with known subversive groups or subjects,” but the Bureau did not know “the nurpose of the contact.” These preliminary investigations could go on for at least 9O days, to determine wbetber “a statutory basis for a full investigation exists.” Moreover. at the urging of the field supervisors. the period for a preliminary investigation of an allegedly “subversive organization” WIS expanded from 45 to 90 days. (Memorandum from FRI Headquarters to nll’SACs, 8/8/73.)

“’ T1li.s was apparently “in connection with” a request made earlier by Senator Edward 31. Kennedy, who had recluested to see this section at the time of the confirmation hearings fnr Attorney General Kleindienst in 1972. (Kleindienst, Senate ,Judiciarv Committee, 2/24/72, p. 64; memorandum from Kelley to Rich- ardson. 8/i/73.)

Rli In a memorandum to the Attorney General. Director Kelley cited Senator Sam .T. Ervin’s r-iexv that the FBI chould be prohibited by statute “from investi- gating any person nithni7t the individual’s consent. unless the Government has reason to believe that the person has committed a crime or is about to rommit a crime.” Keller then summarized the position paper prepared by the Domestic

(Continued)

68.786 0 76 - 10

Page 146: Church Committee: Reports-- Book II

130

to investigations only lrhen a crime “has been committed,” since the government had to “defend itself against revolutionarv and terrorist efforts to destroy it.” Conseqnentl~-. he urged that the President eser- cise his “inherent Executive power to e,z~~~d by further tlefijli~g the FBI’s investigative authorit;v to enable it to develop advance informa- tion” about the plans of “terrorists and revolutionaries who seek to overthrow or destroy the Government.: M [Emphasis added.]

Director Kelley’s request initiated a process of reconsideration of FBI intelligence authority by the Attorney G~neral.“~”

The general study of FBI authority was supcrceded in December 1073 when Acting -1ttorney General Robert BOA, in consultation with Attorney General-designate \T’illiam Sasbe . gal-e hi,gher priority to a Departmental inquiry into the FBI’s COIKTELPRO pract,ices. Re- sponsibility for this mquirg was assigned to a committee headed by 14ssistant Sttorney General Henry Peterson.65o

Even at this stage, the Bureau resisted efforts by the Department to look too deeply into its operations. Director Kelley advised t,he. ,Qcting Sttorney General that the Department should exclude from its review the FBI’s “extremely sensitive foreign intelligence collection tech- niques.” 651 (Continued) Intelligence Division and the Bureau’s current policy of attempting to rely on statutory authority. Holyever. he observed that the statutes upon which the FBI was relying were either “desi,qmed for the Civil War era. not the Twentieth Century” (the rebellion and insurrection laws) or had been “reduced to a fragile shell lay the Supreme Court” (the Smith Act dealing with advocacy of over- throw). Moreover, it was difficult to fit into the statutory framework groups “suth as the Ku Klux Klan, which do not seek to overthrow the Government, but nevertheless are totalitarian in nature and seek to deprive constitutionally guaranteed rights.”

Kelley stated that, while the FBI had “statut’ory authority,” it still needed “a definite requirement from the President as to the nature and type of intelli- fence data hc reauires in the nursuit of his resnonaibilities based on o?(r statutorv nuthority.” (Emphasis added.) While the statutes gave “authority,” an Esecd- tive Order “would define our national security objectives.” The FBI Director added :

“It would annear that the President would rather snell nut his own rennire- merits in an Egbcutire Order instead of having Congre& tell him what the FBI might do to help him fulfill his obligations and responsibilities as President.”

B18 Memorandum from Kelley to Richardson. g/7/73.- -o Even before Keller’s reouest. Denutv Attorner General-Designate William

Ruckelshaus (who had se&d fo; two months as Acting FBI Director between Gray and Kelley). sent a list of questions to the Bureau to begin “an in-denth examination of some of the problems facine the Bureau in the future.” (Memo- randum from Ruckelshaus to Kellev. 7/20/i%) The Ruckelshaus study was interrupted by his departure in the “Satnrdar Xight Massacre” of October 1973.

Bso Memorandum from Bork to Kel1e.r. 12/5/73. 851 These techniques xvere handled within the Bureau “on a strictlv need-to-

know basis” and Keller believed that they should not he inrluded in a study “which will be beyond the control of the FBI.” (Memorandum from Keller to Bork. 12/11/73.)

One Bureau memorandum to the Petersen rnmmittw even suggested that the Attorney General did nnt have authority over the FRT’s fnreirn counterintelli- penre onerations. since the Bureau was accnI~ntnhle in this area directlr to the United Statw Intrlliwnw Rn?rd and the Sntinnal Rwurity Cnnncil. (Petersen Committee Rennrt. pp. 34-35.) The Petersen Committee shnrplr rejected this view. wwciallr hernnce the nrl 7rnc pqniralent of the T’.S. Tntellieencp Tbnrd hnd nnnrored the discredited “Hustnn plan ” in 19iO. The Committee ~PCIRI-PA:

“There can he no doubt that in the awn of fnreien cn~~uterintclliepn~p. as in all its other fllnrtinws. the FBT is snhjwt to the nnwer and authority of the Attorney General.” (Petersen Committee Report. p. 35.)

Page 147: Church Committee: Reports-- Book II

131

*ls a result, the Petersen committee’s review of COISTELPRO did not consider anything more than a brief FBI-prepared summary of foreign coluite~llitcllig~~llce olwrati0ns.622 Moreover, the inquiry into domestic COISTELPRO cases was based mainly on short summaries of each incident compiled by FBI agents, with Department attorneys making only spot-checks of the underlying files to assure the accuracy of the snnm~aries. Thus. the inquiry n-as unable to consider the complete story of COISTELPRO as reflected in the actual memoranda discussing the reasons for adopting particular tactics and the means by which they mere iniplenlented.G”3

Thus, at the same time that the Bureau was seeking guidance and clarification of its authority, vestiges remained of its past resistance to otttside scrutiny and its desire to rely on Executive authority? rather than statute. for the definition of its intelligence activities.

6. Recent Domestic Intelligence Authority In the absence of any new standards imposed by statute? or by the

Attorney General, the FBI continued to collect domestic mtelligence under sweeping authorizations issued by the Justice Department in 1974 for investigations of “subversives,” potential civil disturbances, and “potential crimes.” These authorizations were explicitly based on conceptions of inherent Executive power. broader in theory than the FBI’s own claim in 1973 that, its authority could be found in the criminal statues. Attorney General Levi has recently promulgated guidelines which stand as the first significant attempt by the, Justice Department to set standards and limits for FBI domestic intelligence investigations.G55

(1) Execzttiue Orcle~ l/?&50> -4s 4wewZc~.-The Federal employee securitv program continued to serve as a basis for FBI domestic intel- lipen& investigations . An internal Bureau memorandum stated that the .Justice Department’s instruction regarding the program :

specifically requires the FBI to check the names of all civil applicants and incumbents of the Executive Branch against our records. In order to meet this responsibility FBIHQ records must contain identities of all persons connected with subversive or extremist activities, together with necessary identifying information.656

FBI field offices were instructed in mid-1974 to report to Bureau headquarters such data as the following :

Identities of subversive and/or extremist groups or move- ments (including front groups) with which subject has been identified, period of membership. positions held, and a sum- mary of the type and extent of subversive or extremist activi- tie.s engaged in by subject (e.g., attendance at meetings or

FZL’ FBI Memorandum. “Orerall Recommendations-Counterintelligence Actiritp.” Appendix to Petersen Committee Report.

ax Henry Petersen Testimony. 12/8/X. Hearings. Vol. 6, pp. 276-71. “’ .\ttorney General’s Guidelines : “Domestic Security Investigations,” “Re-

porting on Civil Disorders and Demonstrations Involving a Federal Interest,” ant1 “White Honsr Personnel Security and Background Investigations.”

OX Jlrmorandum from A. R. Fnlton to Mr. Wnnnall. T/10/74. See pp. 42-G for discussion of the initiation of the program.

Page 148: Church Committee: Reports-- Book II

132

other functions, fundraising or recruiting activities on behalf of the organization, contributions, etc.) .65T

In .Jnne 19’74. President Bison formally abolished the “A%ttorney General’s list,” upon the recommendation of Attorney General Saxbe. However, the, President’s order retained a revised definition of the types of organizations. association wl!ich wonld still be considered in evaluating prospective federal en~ployees.G58 The .Jnstice Department instructed the FBI that, it should “detect organizations with a poten- tial” for falling within the terms of the order and investigate “indi- viduals who are active either as members of or as affiliates of” such organizations. The Department instructions addecl :

It is not necrssarv that a crime occur before the inrestipa- tion is initiated, but onlv that. a reasonable evaluation of t,he available information suggests that the activities of the orga- nization may fall within the prescription of the Order. . . .

It is not possih?e to set definite pnrametcrs corem'ng the

initiation of investigations of potential oqanizations falling within the Order but once the investigation reaches a sta-ge that offers a basis for determining that t.he activities are legal in nature, then the investigation should cease, but if t.he investigation suggests a determination that the organization is engaged in illegal activities or potentially illegal activities it. should continue. [Emphasis added.]

The Department applkd “the same yard&l? to investigations of individuals “when information is received suggesting t,heir involve- ment.” 65g

(2) C&G7 IG~rr7ern In tP77igcnce.-The Justice Department also instructed the FBI in 1974 that, it should not, as the Bureau had sug- gested. limit its civil disturbance report’ing “to those particular situ- aCons which are of such a serious nature that, Federal military personnel may be called upon for assistance.” The Department advised that t,his suggested “guideline” was “not practical” since it “would place the burden on the Bureau” to make an initial decision as to “\vhether militarp personnel mav ultimatelr be needed.” and this responsibility rested “legally” wit.h the President. Instead, the FBI was ordered to “continue” to report, on

857 Memorandum from FBI Headquarters to all SACS, 8/X/74. 858E~ecutive Order 11785, 6/4/74. The new standard: “Knowing memher-

ship with the specific intent of furthering the aims of, or adherence to and active partiripation in, anr foreign or dnmcnfic orrranization, association, mnrement. group. or combination of persons (hereinafter referred to as organizations) which unlawfully af7nocatea or practices the commission of acts of force or rinlence to prerent others from exercising their rights under the Constitution or laws of the Vnited States or of an?] ntnte. or which seeks to nrerthrnw the Gnrern- ment of the United States or any State or 8z~bdiz;isions thereof h.r unlawful mesns.” [Emphasis added.]

6’oJIemorandum from Glen E. Pommerenine. Assistant Attorney General for Administration, to Kelley, 11/17/74.

With respect to one organization. the Department advised the Bureau that “despite the abolition” of the Attorney General’s list, the group “would still crime within the criteria” of the emnlnree seruritv nrngram if it “mar have enraged in nctirities” of the sort prns&ilrrd by t’he rrrisrd executive‘ order. (Memorandum from Henry E. Petersen to Clarence Kelley, U/13/74. )

Page 149: Church Committee: Reports-- Book II

133

all significant incidents of ci\-il unrest. and should not, be restricted to situations where, in the judgment of the Bureau, military personnel cremually may be u~ed.66~

Xoreover, under this authority the Bureau was also ordered to “continue” reporting on

all disturbances where there are indications that extremist, or- panizations such as the Conmiuiiist Party, Ku Klux Klan, or Black Panther Partv are belkvcd to be involved in efforts to instigate or exploit them.

The instructions specifically declared that, the Bureau “should make t,imely reports of significant disturbances, even when no specific viola- tion of Federal law is indicated.” This was to be done., at least in part? through “liaison” with local law enforcement, agencies.661

Even after the *Justice Department’s IDIC dismantled its com- puterized data bank, its basic, functions continued to be performed hv a Civil Disturbance I-nit in the office of the Deputy attorney Gen- eral, and the FRI was under instructions to disseminate its civil dis- turbance reports to that IYnit.c62

FBI officials considered these instructions “significant” because they pave it “an official, written mandate from the Department.” The Department’s desires were viewed as “consistent wit.h what we ha.ve already been doing for the past several years!” although the Bureau Manual was reJvritten to “incorporate into it excerpts from the Department’s letter.” D63

(3) “Potentin.7” C%mes.-The FBI recently abolished completely the administrative index (,4DEX) of persons considered “dangerous now.‘? However, the, ,Justice Department has advanced a theory t,o support broad power for the Executive Branch in investigating groups which represent a “potrntial threat to the public safetv” or which have a “potential” for violating specific statutes. For example, the Depart- nient advised the FBI that the General Crimes Section of the Criminal Division had “recommended continued investigation” of one group on the basis of “potential violations” of the antiriot statutes.6G5 These same

Om “On the other hand.” the instructions stated ambiguously, “the FBI should not report every minor local disturbance n-here there is no apparenst interest to the President, the Attorney General or other Government officials and agencies.” ( JIemorandum from Petersen to Keller. 10/22/74. )

Oel Jiemorandum from Petersen to Iielley. 10/E/74. The FRI was espected to “be aware of disturbances and natterns of disorder.” althoueh it is not to renort “each and every relatirely insignificant incident of a strictly local nature.”

“’ Memorandum from Petersen to Kelley-. 10/22/74. Frank Syland testimony, l/27/76. pp. 46-58.

~B”Memorandun~ from J. G. Deegan to W. R. Wannall. 10/3O/i4. From a leaal viewpoint, the Justice Department’s instructors dealing with the col- lectinn of intelligence on potential civil disturbances xrere significant because 1 hw relied for authority on : (1) the President’s nnwers under .\rticle IV. section 4 of the Constitution to protect the states. upon alq,lication of the legislature or the rxeriitire. against “domestic rinlence :” (2) the statute (10 U.S.C. 331. et serl.) authorizing the use of troops ; and (3) the Presidential dirertire of l%Q tlesi,an~ttina the Attorney General as chief civilian nffirer to coordinate the Government’s respnn*e to ciril distnrl,ances. (JIemorandnm from Petersen to Keller. 10/42/74: Memorandum from Melvin Laird and John Xitchell to the President. 4/l/69.)

mz 18 U.S.C. 2101-2102.

Page 150: Church Committee: Reports-- Book II

134

instrnct.ions added that there need not bc a “potential” for violation of any specific statutc.GG”

(4) CVni712. of Inhcwnt E,w~l/tjw Pozpej,.-The Department’s theory of executirc power w-as set forth in 1X& testimony before the House Internal Secllrity Comniittec. According to Deljuty Alssistnnt -1ttorney Gene2xl Kevin JI:\ronev. “the primary hsis” for FBI domestic intcl- ligeuc’e authority rests in “the constitntionnl poviers and rcspousibili- ties vested in the Presiclent under Article II of the Constitution.” These powers were specified as : the Prtsitlent’s dut7 undertalw1 in his oath of oflice to “preserve. protect. and defend the Constitution of the United States ;” nGi the Cliirf Esccntire’s dllty to “take Cure that the Laws be faithfully executed ? c(is the President’s responsibilities as Coll7lnaiider-iii-Cl~ief of the military; and his “po”rer to conduct Our

foreign relations.” FBU The chairman of the Internal Security Committee, Rep. Richarcl H.

Icllord. stated nt that time that, csc,ept ‘in limited alws. lllc Colyy.ess “has not directly imposed upon the Fl3I clear!y defined duties ln the acquisition, use, or clisscmination of domestic or internal security intelligence.” 67D

Subsequently, the FBI Intelligence Dirision revised its 1972-1973 position on its legal anthorit,y, and in a paper completed in 1975 it returned to the view “that the intelligence-gathering activities of the Fl31 have had as their basis the intention of the President to delegate

Bui Memorandum from Petersen to Keller, 11/13/74. This memorandum added : “[W]ithnut a broad range of intelligence information, the President and the

departments and agencies of the Esecutive Branch could not properly and ade- quately protect our nation’s security and enforce the numerous statrrtes pertain- ing thereto . . [T]he Department, and in particular the Attorney General, must continue to be informed of those organizations that engage in violence which represent a potc&ictZ thrcnt to tha pftdlic snfrt?/.” [Emphasis added.]

““iTlle opinion of the Supreme Court in the United States v. Unifcd States District Court, 407 U.S. 297 (1972)-the domestic security wiretapping case- stated. “Imnlicit in that dutr is the newer to nrotect our Government against those &ho \\‘ould subvert or o\.rrthrolT- ‘It by nnla~~~fnl mpans.:’

<,

+‘@A 19th century Supreme Court opinion xvas cited as having interpreted the word “laws” broadly to encompass not only statutes enacted by Congress, but also “the rights. duties. and oblieations eromine nut of the Constitution itseIf. our international relations and ill the nrotecti& implied by the nature of Gov: ernment under the Constitution.” [In Re ATeagle, 135 U.S. 1 (1890).]

Me The latter Dower n-as said to relate “more narticularlv to the Executive’s power to conduct foreign intelligence activities her; and abrnkd.” (Kevin Maronev te.+inion.v, “Domestic Intelligence Operations .for Internal Security Purposes,” Hearings before the House Committee on Internal Security, 93d Cong., 2d Sess. (1974). nn. 3332-3335.1 Mr. Maronev added :

“We r&gnize the complexitv anb difficultr of adequately spelling out the FBI’s nutl1nrit.v and responsibility to conduct homestic intelligence-type investi- gations. The concept national security is admittedly a broad one, while the term subversive activities is even more difficult to define.”

Mr. JIaronep also cited the follnwing from the Supreme Court’s opinion in the domestic serurity n-iretapping raw : “The gathering of secnri@ intelligence is often long-range and involves the interrelation of various sources and types of information. The wart targets of such surveillance mar 1)~ more diffirnlt to identify . Often, too. the emphasis of domestic intelligence gatherine is on the prercntion of unlawful activity or the enhnnrement of the Gnrernment’s pre- paredness for snme possible future crisis or emergenc,v. Thus. the focus of dnmcrtic surveillance may be Iws precise than that directed against more con- ventional t.vpes of prime.” [United Rtnfcs T. Unifed Sfnfcs District Cmrt, 407

- 9 u.2q6 2C)r 32 (19 2j.J ” Go&e Comm<ttee on Internal Security Hearings. 1974, pp. 333G-3331.

Page 151: Church Committee: Reports-- Book II

135

his Constitutional authority,” as well as the statutes “pertaining to the national securitp.” 671

The Attorney (‘rcncral has continnetl to nsscrt the claim of inherent csecntirc l~ou-c~~ to c0ntlrtc.t waixmtlcss clertrollic swvcillance of American citizens, although this po~wr has been csercised sl~ariiiply.ci2 The .Justicc I)epartnlr~nt has also claimed that this inherent executive l~ower l~eiwits wai~rantless surrcptitiow eiitrie5.“73 Hon.evcr, the Esec- Iltive Branch has recentlv joined a bipartisan group of Senators and Rcl~rcsentati\-cs in sl~ons~r~ng a lcpislatire l~rolmsal requiring judicial warrants for all electronic sw\-cillance b\- the FIJI.

(5) A ttomey Gene4 Leci?s GuicZeZi,;es.--Duringr 1075, the Con- grrss and the Esecwti\-c ISranch bepn major efforts to review the field of doniestic intcllipcilcc. _I Presidential comnlission headed b;v T’ice President 12ockefrllcr inquirctl into the CIA’s improper SW- veillance of ~~iiiericans.“7’ A1ttorncy Creneral Edwaul H. Levi cstab- lishcd a committee in the .Jwtirc Dcpartnlcnt to tlcvclop “guidelines” for the FRI.“;” and the ,Justicr Tkpartment began to wol~k on draft legislation to require warrants fol: national security electronic SW- veillance.67”

These efforts hnl-c brpn to bear flatlit in recent months. President Ford 1~s issnrtl an Esceuti\-c Or(lcr regulating foreign intelligence activities : Fii -1ttorncy Crcneral I,evi has l~roiiiiilgated several sets of “guidclincs” for tllc FI3I.“7’ -\nd the administration has endorsed a specific bill to cstnblish a warrant l~imxli~rc for all national secnrity n-irrtnlx and biys iii the T-iiitctl States.“79

“I W. Rnymond Wnnnnll, Assistant Director for the Intelligence Division. 1\Iemnr:7nd1im on the “Tktsic for Ia’T%T Sntionnl Security Tntelli~cnre Inrestign- tioni;.” Z/13/7*5.

‘l” After wwr:ll repent trnnsfomlntinns. the policy of the Attorney General lens wt:il~lial~c~tl as nutllorizing warrantless snrwillnnrc~ “only when it is shown tllat its anbjerts nre the active, consc*ion?: agents of foreign pn\vers :” and this st:lndard “is npplicd with pnrticulnr striI1,wllcy n-hcrr the snbjects are .\mcricnn citizens or perlilnnwt resident nlifws.” (.Tnstiw Drpnrtmpnt memnr~ndnm from Ron Cur. Special Assistant to the Attorney General. to Mike Shahecn, Counsel OII I’rofcssionnl Responqil~ility, S/‘%/‘i(i.)

‘a In Jlny 197.7. for the first time in .\mrricxn history. the Department of .Tnstirr pnhlicly aswrtrd the l?nn-er of the Esrcntirc Rrnnch to conduct warrant- less snrreptitinns entries unconnected XT-it11 the nw of electronic surwillance. This wcnrred in n letter to thr Vnited States Court nf A1pprnls for the District nf Cn- lmnl~in concerning an appeal II)- John Ehrlicllmnn. Ehrlichmmi was npi,enling R conrirtion arising from tlic I,rrnl;-in at the oflice of Daniel Ellslwrg‘s l,sycllintrist nftr~ lnil~lic7ltinn of the “Prntngnn Papers” in 1971.

The Justice Department’s position war; that “warrantless searches involving l~llysic71 entries into prirntr l)rt~liiisrs” r:i** Iw “l:lwful llntlcr the Fourth Amrnd- meirt.” if they are “rcry rnrpfnlly cwntrolled :”

“Thew must be solid reason to 1)elierr that foreign wpionn,w or intelligenw is ir;rolrccl. In addition. thr intrnsion into any mnr of cslwrted prirncy nlnst hr kcnt to the minimum and tllere must Iw prrsonnl nntliorixatinn Ily the Prrsident or the .\ttnrney General.” (Letter from John C. KenneT, Acting Assistant AttnrneY Gfwwnl. to ITngh E. Cliuc. Clerk of the T.iiited States Court of Appeals for the 1)ivtl.i~t of C0lnmhin. 5/9/Z.,

g;4 Rnckrfeller Commission Report. “’ T.cvi. 12/11/7ri. Hwrilrgs. Vol. 6. p!‘. X1&317. “’ T,cri. 11/G/7.5. Hearings. Vol. 5. p. 90. ‘ii frwiitire Order 11509. Z/lS/‘ifi. “’ .\t toriicy Gcnprnl’s Gnitlclinw “T)omc~stir Swuritr Iiir-estiwtions”. “Wliitp-

110nw Pprsmrncl Sernrity and Rnrkgrmlntl Tnrwtign tions”. ant1 “Relmrtin~ on Cix-il Disnrtlcrs ant1 Drninnatmtinns InT.nlx-ing n Fcdernl Interest”, 3/10/76.

m S. 3197, introduced 3/P3/76.

Page 152: Church Committee: Reports-- Book II

136

These Executive initiatives are a major step forward in creating safeguards and establishing standards? but, they are incomplete Cth- out legislation.C’O Ah~ong the issues left open by the President’s Executive Order>, for example, are : (1) the definition of the term “foreign sub\-erslon” used to characterize the coLulter-intelligeilce responsibilities of the CIA and the FM; and (2) clarification of the vague provisions in the Sational Secxrity _1ct of 1947 relating to the authority of the Director of C’cntral liitclligence to l)rotrct “sources” and *methods ;” and (3) nmplificatioll of the 1~47 11cat’s prohibition against the CIA’s exercise of “law cilforcemeiit powers” or “internal security functions.”

Although they represent only a partial answer to the need for per- manent restraints, the ilGtiati;-es of the Executive Branch tlemon- strate a willingness to seriously consider the ncecl for legislative action. The Attorney General has recognized that Ihecutive “guicle- lines” are not, ellongll to regulate aud authorize FBI intelligence activities.““’ Tlw (‘ommittce’s conclusions and recomnlenclations in Part IV of this report indicate the areas most in need of legislative attention.

e80Tlle major questions posed by the President’s Executive Order and the Attorney General’s guidelines for the FBI are di?;cnssed in the recommendation section of this report, as are the problems with the national security electronic surveillance bill.

“I Levi Testimony, 12/11/75, Hearings, Tel. 6, p. 345.

Page 153: Church Committee: Reports-- Book II

III. FINDISGS

The Committee makes seven major finclil~gs. Each finding is accom- panied py subfindings and Q- an elxboratlon which draws upon the cvidentlary record set forth m our historical narrative (Part II here- in) and in the thirteen detailed reports which will be published apse sup- plements to this volume. T17e have sought to analyze in our findir)gs characteristics shared by intelligence programs, practices which In- volved abuses, and general problems in the system which led to those abuses.

The findings treat the following themes that run through the facts revealed by our investigation of domestic intelligence activity : (9) Violating and Ignoring the Law; (B) Overbreadth of Domestic In- telligence ,Ictirity ; (C) Excessive Use of Intrusive Techniques; (D) ITsing Covert -1ctlon to Disrupt and Discredit Domestic Groups; (E) Political Abuse of Intelligence Information ; (F) Inadequate Controls on Dissemination and Retention ; (G) Deficiencies in Con- trol and Accountability.

Viewed separately, each finding demonst,rates a serious problem in the conduct and control of domestic intelligence operations. Taken together, they make a compelling case for the necessity of change. Our recommendations (in Part IV) flow from this analysis and pro- pose changes which the Committee believes to be appropriate in light of the record.

A. VIOLATING SND IGNORING THE LAW

MAJOR FISDING

The Committee finds that the domestic activities of the intelligence community at times violated specific statutory prohibitions and infriltgcd the constitutional rights of Smericnn citizens.l The legal questions involved in intelligence programs were often not considered. On other occasions, they were intentionally disregarded in the be- lief that, because the programs served the “national security” the law did not apply. While intelligence officers on occasion failed to disclose to their superiors programs which were illegal or of questionable le- gality, the Committee finds that the most serious breaches of duty were those of senior officials, who were responsible for controlling intelligence activities and generally failed to assure compliance with the law.

Subfindings (a) In its attempt to implement instructions to protect the security

of the TTnited States. the intelligence community engaged in some ac-

1 This section discusses the legal issues raised by particular programs and ac- tirities only : a discussion of the aggregate effect upon constitutional rights of all domestic surveillance practices is at p. 290 of the Conclusions section.

( 137 )

Page 154: Church Committee: Reports-- Book II

138

tivities which violated statutory law and the constitutional rights of

Anierican citizens. (b) Legal issues were often overlookctl by iilai~y of the intelligcncc

officers who directed these operations. Some held a pragmatic view of intelligence activities that. did not regularly attach sufficient signifi- cance to cliiestions of legality. The qrlestion raised was aswtlly not

whetlwr a particular program was legal or ethical. but whether it worked.

(c) On some occasions when agenc,y ofhcials did assume. or were told, that a program ~1s illegal. they still permitted it to continue. They justified their conduct in some cases on the “the memy” to play by the rules

ground that the failure of granted them the right to do likewise.

and in other cases on the ground that t.he “national securit,y” per- inittetl programs that would otherwise be illegal.

((1) Internal recognition of the illegality or the questionable le- gality of many of these activities frequently lecl to a tightening of se- curity rather than to their t.ermination. Partly to avoid exposure and a pubbc “flap.” knowledge of these programs was tightly held within the agencies. special filmg procedures were used. and “cover stories” were devised.

(e) On occasion. intelliqencc agencies failed to disclose candidly their programs and prac&es to their own General Counsels, and to Attorneys General, Presidents. and Congress.

(f) The internal inspection mechanisms of the CL4 and the FBI did not keep-and, in the case of the FBI, were not, designed to keep- the activities of those agencies within lepl bounds. Their primary concern was efficiency, not Iepalitv or propriety.

(g) When senior administration officials with a duty to control domestic intelligence activities knew. or had a basis for suspecting, that questionable activities had occurred. they often responded with silence or approval. In certain cases, they were presented with a par- tial description of a program but did not ask for details. thereby abdicating their responsibility. In other cases, they. were fully aware of the nature of the practice and implicitly or explicitly approved it.

E7aboration of findings The elaboration which follows details the general finding of the

Committee that inattention to-and disregard of--legal issues was

an all too common occurrence in the intelligence community. While this section focuses on the actions and attitudes of intelligence officials and certain high policv officials, the Committee recognizes that a pattern of lawless activity does not result from the deeds of a single stratum of the government or of a few individuals alone. The imple- mentation and continuation of illegal and questionable pro,rrrams \vonld not have been possible without the cooperation or tacit approval Of people at all levels within and above the intelligence community, through many.successire administrations.

The agents in the field. for their part. rarely questioned the orders they rcceivecl. Their often irncertain knowledge of the law. coupled wit11 the natural desire to please one’s superiors and with simple bureaucratic momentum. clearly contributed to their \villingiress to participate in illecnl and questionable programs. The absence of anv prosecutions for law violations by intelligence agents jllerjtably af-

Page 155: Church Committee: Reports-- Book II

139

fected their attitudes as lvell. Under pressure from above to nccom- plish their assigned tasks, and without the realistic threat of prosecu- tion to remind them of their legal obligations, it is understandable that these agents frequently acted without concern for issues of law and at times assumed that normal legal restraints and prohibitions did not apply to their activities.

Significant,ly, those officials at the highest levels of government, who had a duty to control the activities of the intelligence community, sometimes set in motion the very forces that permitted lan-lessness to occur-even if every act committed by intelligence agencies was not known to them. By demanding results without carefully limiting the means by which the results were achieved ; by over-emphasizing the threats to national security without ensuring sensitivity to the rights of American citizens; and by propounding concepts such SLS the right of the “sovereign” to break the law, ultimate responsibility for the consequent climate of permissiveness should be placed at their door.Z

hhbfinding (a) In its attempt to implement instructions to protect the security Of

the United States, the intelligence community engaged in some activi- ties which violated statutork la#w and the constitutional rights of American citizens.

From 1940 to 19’73, the CIA and the FBI engaged in twelve covert mail opening programs in violation of Sections 1701-1703 of Title 18 of the United States Code which prohibit the obstruction, intercep- tion, or opening of mail. Both of these agencies also engaged in war- rantless “surreptitious entries”-break-in-against American citizens within the ITnited States in apparent violation of state laws prohibit- ing trespass and burglary. Section A05 of the Federal Communications Act of 1934 was violated by SSA!s program for obtaining millions of telegrams of Americans unrelated to foreign targets and by the Army Security Agency’s interception of domestic radio communi- cations.

All of these activities, as well as the FBI’s use of elect,ronic surveil- lance without, a substantial national security predicate, also infringed the ri,chts of countless Americans under the Fourth Amendment protection “against unreasonable searches and seizures.”

The nl)usive techniques used by the FRI in COINTELPRO from 1936 to 1971 inclutled violations of both federal and state statutes pro- hibiting nlail fraud, wire fraud, incitement to violence, sending obscrno material through the mail, and extortion. More fundamental$, the harassment of innocent citizens engaged in lawful forms of poht- ical expression did serious injury to the First ,Ymendment guarantee of freedom of speech and the ;,ight of the people to assemble peaceably and to petition the government for a redress of grievances. The Bureau’s maintenance of the Sccuritv Index. which targeted thousands of -\merican citizens for detention iii the event of national emergency, clearly overstepped the permissible bounds established by Congress in tllc Emergency Detention -ict of 1950 and represented. in contra- vention of the Act. a potential general suspension of the privilege

‘The accoiintnIClity of senior administration officials is noted here to place the details n-hich follow in their proper context, and is developed at greater length in Finding G, p. 265.

Page 156: Church Committee: Reports-- Book II

140

of the writ of habeas corpns secured by ,Wiclc I, Section 9. of the Constitntion.

~2 distrcssinq nnmler of the programs and techniqnes developed by the intelligence commnnitv involved transgressions against hnman clccencv that were no less sfrions than anv technical violations of law. .Sonlc of the nlost fnnclan~cntnl valnes of this society \vcrc tl~ientcncd l)y activities snch as the smear campaign against Dr. Martin Luther King, .Jr., the testing of dan~erons drugs on unsuspecting American citizens. the dissemination of infornintion abont the sex lives. drinking habits, ant1 marital problems of electronic surveillance targets. and the COIR’TET,PRO attempts to turn dissident organizations against one another and to destroy marriages.

Rubfinding (b) Legal issues were often overlooked by many of the intelligence

officers who directed these operations. Some held a pragmatic view of intelligence activities that did not regularly attach sufficient sig- nificance to questions of legality. The question raised was usually not whether a particular program was legal or ethical, but whether it worked.

Legal issues were clearly not R primary consideration-if they were a consideration at all-in many of the programs and techniques of the intelligence community. When the former head of t,he FBI’s Ra- cial Intelligence Section was asked whether anvbody in the FBI at any time during the Is-pear course of COI?rTTET,PRO discussed its constituhionnlitg or Iera authority. for example, he replied : “No, we never gave it a thought.” 3 This att,itude is echoed by other Bureau officials in connection with other programs. The former Section Chief of one of the FRI’s Counterintelligence sections, and the former Assistant Director of the Rnrean’s Domestic Intelligence Division both testified that legal considerations lvere simply not raised in policy decisions concerning the FBI’s mail opening programs.4 Similarly. when the FRT was presented with the opportunity to assume responsl- bility for the CIA’s New York mail opening operation, legal factors played no role in the Bnrean’s refusal: rather. the opportunity was declined simply because of the attendant, expense, manpolver require- ments. and security problems.5

One of the most abusive of all FBI pro,grams was its attempt to discredit Dr. Martin Luther King, Jr. Yet former FBI *4ssistant Director William C. Snlliran testified that he (‘never heard anyone ra,ise the qnestion of legality or ronstitutionwlitv. never.” 6

Former Director of Central Intelligence Richard Helms testified publicly that he never serionslv questioned the legal status of t.hc twenty-year CL4 Xew York mail opening project, because he assumed his predecessor. Allen Dulles, had “made his legal peace with [it] .” 7

’ George C. Moore testimong. U/3/75. p. 83. ’ Bran&an testimony, 10/Q/75, pp. 13. 139, 140; Wannall testimony, 10/24/75,

Hearings. Vol. 4. p. 149. 6Branigan. 10/9/75, p. 89. ’ William C. Sullivan testimony, 11/l/75, JYVJI 49,50. ‘Richard Helms, 10/22/X. Hearings, Vol. 4. p. 94. This testimony is partially

contradicted. hoverer. 11~ the fact that in 19iO Helms signed the Hnston Report. in which “covert mail co~ernprp”-define~l as mail qwnin,q--n-as specifically described as illegal. (Special Report. June 1950. p. 30.)

Page 157: Church Committee: Reports-- Book II

141

‘i

tioi . [F]rom time to time,”

out of it,” 8 he said, “the ,tgency got useful informa-

so he permitted it to cont.mue throu&out his seven- year tenure as Director:

The Huston Plan that, was prepared for President Richard Nixon in .June 1970 constituted a virtual charter for the use of intrusive and illegal techniques a,cninst ,1merican dissidents as well as foreign agents. Its principal amhor has testified, hon-crer, that during the drafting sessions with representatives of the FRI. CL%, NSA. and Defense Intelligence Agency. no one ever objected to any of the rec- ommendations on the grounds that they involved illegal acts. nor was the legality or const,itntionality of any of the recommendations ever discussed.9

William C. Sullivan, who participated in the drafting of the Huston Plan and served on the TTnite.d States Intelligence Board and as FBI *\ssistant, Director for Intelbgence for 10 years, stated that in his entire experience in the intelligence community he never heard legal issues raised at all :

We never gave cause we were j

any thought to this realm of reasoning. be- ust naturally pragmatists. The one thing we

were concerned about Tvas t,his: Will this co~wse of action work, n-ill it get us what we want, will we reach the ob- jective that we clesire to reach? As far as legality is con- cerned, morals, or ethics, [it,] was never raised by myself or anybody else . . . I think this suggests really in government that 1ve are amoral. In government-I am not speaking for everybody-the general atmosphere is one of anlorality.1o

~~ztbfincling (c)

On some occasions lvhen agency officials did assume. or were told, that. a program was illegal. they still permitted it, to continue. They justified their conduct in some cases on the ground that the failure of “the enemy“ to play bv the rules granted them the right to do likewise, and in other cases on the ground that the “national security” permitted programs that ~onld otherwise be illegal.

Even when agency officials recognized certain proprams or tech- niques to be illegal. they sometimes advocated their implementation or permitted them to continue nonetheless.

This point. is illustrated br a passage in a 1954 mcmorandnm from an FBI -1ssistant Director to d. Edgar Hoover. which recommended that an electronic listening device be planted in the hotel room of a suspected Communist sympathizer : _ “ Although such San installation will not be legal. it is believed that. the intelligence. information t,o be obtained n-ill make such an installation necessary and desirable.“1’ Hoover approrcd the installation.‘2

More than a decade later. a memorandum was sent to Director TToover which described the current FRI policy and procedures for ‘*black baq jobs” (warrantless break-ins for purposes other than micro- phone installation). This memorandum read in part :

a Helms. 10/22/75. Hearings. Vol. 4. p. 103. ’ Huston. 9/23/X. Hearings. Vol. 2, p. 21. I” Sullivan, 11/l/76. pp. 92, 93. ‘* Memorandum from Mr. Boardman to the Director, FBI, 4/30/54 “Ibid.

Page 158: Church Committee: Reports-- Book II

142

Such a technique involves trespass and is clearly illegal ; thcreforc. it would be impossible to obtain any legal sawtion for it. Dcspitc this. “blacl; bag” jobs haw bwn usctl because the\- represent, an invaluable, technique in combatting snb- verii\~e activities . . . aimed directly at undermining and de- stroying our nati0n.13

In other word?, breaking the law, was seen as useful in conlbating those who thrratened the legal fabric of s0ciet.y. ~Uthongh Hoover terminatetl the. general use of %laclr bag jobs” in *July 1966. they were employed on a large scale before that time and have been used in isolated instances since then.

Another example of disregard for the law is found in a 1969 memo- randum from 1TTilliam C. Sullivan to Director Hoover. In June of that, year, Sullivan was requested by the Director. apparently at the urgi<g of White House officials to travel to France for the purpose of electronically monitoring the c.onversations of journalist ,Joseph 1iraft.l 1Vith the cooperation of local authorities, Sullivan n-as able to hare n microphone installed in &aft’s hotel room, and informed IIoover of his success. “Parent.hetically,” he wrote. in his letter to the Director, “I might, add that such a corer is regarded as illegal.” I5

The attitude that legal standards ancl issues of privacy can be over- ridden by other factors is further reflectecl in a memorandum written bv Richard Helms in connection with the testing of dangerous drugs oil unsuspecting American citizens in 1963. Mr. Helms wrote the Deputy Director of Central Intelligence :

While I share your uneasiness and distaste for any program which tencls to intrude on an individual’s private and legal prerogatives, I believe it is necessary that the Agency main- tain a central role in t.his activity, keep current on enemy capabilities in the manipulation of human behavior, and maintain an offensive capability. I, therefore, recommend your approval for continuation of this testimony pro- gram . . .15a

The history of the CIA’s New York mail opening program is re- plete with examples of consc.ious contravention of the law. The origi- nal proposal for large-scale mail opening in 1965, for instance, cx- plicit.ly recognizecl that “[t]here is no overt, authorizecl or legal cen- sorship or monitoring of first chass mails which enter, depart or transit the TTnited States at the present time.” I0 A 1962 memorandum on t.lic. project notecl that its exposure coulcl “give rise to grave charges of criminal misuse of the mails by Government agencies” and that “existing Federal statutes pmclucle the concoction of any legal excuse for the violation . . .” I7 llnd again in 1963, a CIA officer wrote: “There is no legal basis for momtoring postal conlnluIlications in the T-nitetl States except. during time of war or national einargency . . .” lb:

Ia JIvmornndnm from IT’. C. Rullirnn to C. D. DeI,onch, 7/19/t% ” Iieljort of the House Judiciary Committee, S/20/74, p. 150. la ;\Irmnrandum from William c’. Sullivan to J. Edgar Hoover, G/30/69.

I” Memorandum from Richard Helms to the Deputy Director of Central Intelli- p?ncc. l’/li/C~.

lo JSlilld memorandum, 11/7/55. Ii Mrmorandum from Dcput.r Chief, Counterintelligence Staff, to Director. (If-

five of Swnritv 2/l/62. I8 1\Iemoranii&i from Chief, CI/Projwt to Chief, Division, g/26/63.

Page 159: Church Committee: Reports-- Book II

143

Both the former Chief of the, Counterintelligence Staff and the formel I>ircctor of Security-who were in charge of the Sew York projcct- testified that they believed it to be illegsl.l” One Inspector General who reviewed the project in 1060 also flatly stated : “[O]f course, me knew that this was illegal. . . . [Elverybody knew that it was [illegal). . . .“20

In sl2ite of the general recognition of its illegality, the Pl’e\v York mail opening proJect continued for a total of 20 years and Vas not terminated until 1973, when the Watergate-created political climate llad increased the risks of esposure.21

With the full knowledge of J. Edgar Hoorcr, moreover, the FBI continued to receive the fruits of this project for three years after the FBI Director informed the President of the United States that “the FBI is opposed to implementing any covert mail coverage because it is clearly illegal . . .‘* 2z The Bureau’s ox-n mail opening programs had I)ecn terniinated in 1966, but it continued intentionally and knowingly to benefit from the illegal acts of the CIA until 1073.

The Huston Plan is another disturbing reminder of the fact that intelligence programs and techniques map be adr-ocated and author- ized with the knowIcdge that they are illegal. At least two of the options that were presented to President Nixon were described as unlawful on the face of the Report. Of “covert mail coverage” (mail opening) it was written that “[tlhis coverage, not haring the sanction of law, runs the risk of any illicit act magnified by the involvement of a Government agency. “23 The Report also noted that surreptitious entry “involves illegal entry and trespass.” 21 Thus, the intelligence community presented the nation’s highest executive official with the option of approving courses of action described as illegal. The fact that President Nixon did authorize them, even if only for five days, is more disquieting still.25

TVhen Prcsidrnt Sison eventually revoked his approval of the Hus- ton Plan, the intelligence community nevertheless proceded to initiate some programs suggested in the Plan. Intelligence agencies also con- tinued to employ techniques recommended in the Plan, such as mail opening which had been used previously without presidential ap-

I0 Angleton, g/24/75. Hearings, Vol. 2, p. 61; Howard Osborn, deposition, S/28/73. p. 90.

” Gordon Stewart, g/30/75, p, 28. ” See e.g., Howard Osborn deposition, S/2S/75. p. 89. 22 Special Report, June 1970, p. 31. 2X Sl)ecial Report, June 1970, p. 30. ” Special Report, June 1970, p. 32. s President Nixon stated that he approved these activities in part because they

“had been found to be effective.” (Response of Richard 11. Sison to Senate Select C’ommittee Interrngatory 19, 3/g/76, p. 13.)

“For a description of the techniques which continued or were subsequently instituted. see pp. 115-116.

Ai memorandum from John Dean to John Mitchell suggests that, after Presi- dent Sison’s relocation of approval for the Huston Plan, the White House itself supported the continued pursuit of some of the objectives of the Huston Plan. l’llrongh an iuteragenry unit known as the Intelligence Evaluation Committee. ( JIci~~or:~~idum from John Dean to the Attorney General, 9/B/70.) In this

Illt~liloriiii(llllil. Dean suggested the creation of such a unit for “both operational ant1 evaluation purposes.” He wrote in part :

“[T~he unit can serve to make appropriate recommendations for the type of intelligruce that should be immediately pursued by the various agencies. In

(Continued)

Page 160: Church Committee: Reports-- Book II

144

The recent histor?- of -1rrn~ intclligx~ncc proritlcs a11 ntl(litional es- ample of continning ail a&\-it\- tltwrilwd as illeg~al. Reginniilg in 1967. the llrnir Securitv -1gciic+ ii~oniioiwl the rntlio coiiiiiliuiicntions of amatenr ra&o operitors in this coiultrr to determine if dissident elements plannctl disr77ptirc acti\-it!- at pa7?icnlnr d~nionstl.ntioiis and events. Bcca7lse Y1rmI- officials q1wstionfxl Tyhcthe7. s77ch monitoring was legal mnder Section 605 of the Federal Comnlmlications Act of 19% they req7lested a legal opinion front the Fctlcral (‘o7llnlnnicatiolls Commi&on. At a nlrcting heltl in ,\ng77st 1968. the FCC adrised the Arm7 that wch monitoring was illegal 77nder the, _1ct. FCC repre- sentatives also stated that the matter had been raised Trith Attorney General Ramsey Clark and that hc had disapproved the program.” The FCC agreed. hoverer. to s7tbmit a written reply to the Armv, stating onlv that it could not “provide a positive anw-er to the Arm& proposal.” 28

Desl,ite haviny heen told that their monitoring actiritv was illegal, and that the Attornev General himself disapproved it, the Army Security Agency continued to monitor the radio communications of Smerican citizens for another two vears.2”

Several factors may explain the intelligence commnnitg’s frequent’ disregard of legal issnes.

Some intelligence officials expressed the view that the legal and ethical restraints that applied to the rest of society simplv did not apply to intelligence activities. This concept is reflected in a 1959 memoranclum on the hrmv’s covert dmg testing procram : “In intelli- gence, the stakes involved and the interest of national secnritp may permit, a inore toltmnt intrrpretation of moral-ethical valiies . . .” 3o

As William C. Snllivan also pointed ant, many intelligence officers had been imbued with a “war psycholopr.” “I&alitv was not qaes- tionetl,” he said. “it, was not an iswe. ” M In war, one simply did what

(Continued) regard to this . . point. I believe we agreed that it would be inappropriate to have any blanket removal of restrictions: rather. the most appropriate pro- cedure would be to decide on the tppe of intelligence we need, based on an assessment of the recommendations of this unit. and then to proceed to remove the restraints as necessary to obtain such intelligence.” (Dean memorandum, 9/18 /70.)

nllemornndum for the record by Army Assistant Chief of Staff for Tntelli- genre. S/16/68; Staff summary of Rql T indenbaum (former Executive Assistant to the Mtorner General) interview. 5/8/i5.

28JIemnrnndum fnr the record by Army Assistant Chief of Staff for Intelli- genre. S/16/68.

“The Army’s genwal domestic snrrr4lanre prngrnm provides an example of evasion of a departmental ntier which had heen issned nut of concern with legal issues. The practice of rnllecting vast amounts of information on American citizens was terminated in 1971. when new Department of Defense restrictions came into effect calling for the de.structinn nf all files on “unaffiliated” persons and organizations. Rather than destroying the files, however. several Army intelligence nnita pimply tnrned their intelligence files on dissident indiridnnl and grnnns nvw to local pnlire authc)ritiPS : and one .\ir Fnrw eonntprintelligpnce unit in San Diego began to rwnte new films the next year. (Hearings hefore Rnh- committee on Cnnstitntinnal Rights. Cnmmittw nq th@ Jndiciary. I1.S. Spnate. 92nd Congrew, 1st swsion. 1971. n. 3297: HenrinTs ” phicnnn Trihwnc. 6/21/75. p. 3.)

“Es-FBI Aid Accused in Police Spy

aa T’SATNTC Staff Study : Material Testin? Prngram EA 1729). 19/15/59. 31 Snlliran attrihutw mnrh of this attitnde to the molding inflnenpe of World

War 11 won Young intelligence agents who later rose to positions nf influence in

Page 161: Church Committee: Reports-- Book II

145

one m-as ‘~cspccted to do as a soldier. ” 32 “It was 1-p~. assumption,” said cm2 FI31 oflicial conncctccl with the IZi1rcai1’~ mall opening programs, “that what we were doing was jllstifietl I)? n-list ~7 had to do.” a3 Since the “eneni~” did not l)la?- 1)~ the rules. nioreoverY intelligence officials often belie\331 tlicr collld not afford to do so either.“-

One, FBI intelligence okcer al~peared to attribute the disregard of the lag in the I~LWC~U'S ('OIST4',LPRO operations to simple restless- ness on the part of “nction-oi.icntc(I” FBI agents. George C. Jloore, the Racial Intelligence Section Chief, testified that :

. . . the FBI’s connterintelligrellce program came LIP because if vou llnre anytlling in the FB$ you llave an action-oriented gro~~p of people who see somethmg happening and want to do something to take its place.36

Others in the intelligence community have contended that ques- tionable and illegal acts were justified by a law higher than the ITnitrd States Code or thr Const-‘itution. ,111 FBI CoLunterintelljRrence Section Chief. for example. stated the following reason for believing in the neccssitr of techniques such as mail opening:

The greater yood. the national security, this is correct. This is Tvhat I believed in. W~F I thought. these programs were good, it wts that the national security required this. this is correct.37

Similarly, when intelli~~ence officials secured the cooperation of tele- grnph company esecutlres for Project SIIAUIROCI<, in which NSL4 received millions of copies of international telegraph messages with- out the sender’s knowledge. the? assured the executives that they would not bc subjected to crinlinal habilitg because the project was “in the high& interests of the nation.” 38

tile intelligence commnnitF. iSnllirnn. 11/l/75. pp. 91-95.) Disregard of the “niceties of law,” he stated. continued after the war had ended :

“Along came the Cold War. We pursued the same course in the Korean War, and the Cold War continued. then the Vietnam War. We never freed ourselves from that ps.vrho1og.v that we were indoctrinated with. right after Pearl Harbor, you see. I think this accounts for the fact that nobody seemed to be concerned about raising the question is this IawIul. is this legal, is this ethical? It was just IifiP n wldier in the battlefield. When he shot don-n an enemy he did not aSli himself is this legal or lawful, is it ethical? It is what he was expected to do as a soldier.”

“We did what we were expected to do. Jt became part of our thinking, a part of nur personality.” (Snllirnn.11/1/7S.pp.SS.9R.)

Unfortunntely, it made too little difference xhcther the “enemy” was a foreign spy. a civil rights leader, nr a T’ietnam protester.

” Sullivan, 11/l/75. p. 96. X3 Rranigan. 10/S/75. n. 41. ” Staff summary of William C. Sullivan interview, 6/10/75. 3F Moore deposition, 11/3/76. p. 79. 3’Rranigan deposition, l/9/76. p. 41. Richard Helms referred to another kind

of “greater good” when asked to speculate about the possible motivation of a CIA scientist who did not heed Presirlpnt Sison’s directive ‘to destroy all biologl- en1 and chemical toxins. Soting that the scientist might have “had thoughts allout immunization or treatment of disease where [the toxin he had devel- opwl1 miht lw wwful.” Helms saitl that the retention of this biologiral agent could be explained as “yieldinz to that human impulse of the greater good.” iRich:~rtl Helms testimony. S/15/75. p. S6.)

RR Rolwrt L%ndren-s testimony 0/23/X 1,. 34 : See S.S.4 Report : “RFI.~SIROCK.” n.v coolwrating with the Government in SIIAJIROCK. executives of three com- panies chose to ignore the advice of their respective legal counsels who had recom-

(Continued)

68-786 0 76 II

Page 162: Church Committee: Reports-- Book II

146

Perhaps the most novel reason for advocating illegal action vas proffered by Tom Charles Huston. Huston explained that he believed the real threat to internal security was potential repressison by right- wing forces within t,he United States. He argued that the “Sew Left” was capable of producing a climate of fear that. would bring forth every repressive demagogue in the country. Huston believed that the intelligence professionals, if given the chance, could paotect the people from the latent forces of repression by monitoring the Ken- Left,, including by illegal means. 39 Illegal action directed against the New Left, in other words. should be used by the Government to forestall potential repression by the Right.

In attempting to expIa.in why illegai activities were advocated and defended, the impact of the attitudes and actions of government officials in supervisory positions-Presidents. Cabinet officers, and Congressmen-should not be discounted. Their occasional endorsement of such a.ctivities, as well as the at.mosphere of permissiveness created by their emphasis on national security and their demands for results, clearly contributed to the notion that strict adherence to the law was unimportant. So, too, did the concept. propounded ]3y some senior officials, that a “sovereign” president may authorize rlolat.ions of the law.

Vhaterer the re.asons. however. it is clear that. a number of intclli- gence officers ac.ted in knotting contravention of the law.

thtb finding (d) Internal recognition of the ille,rrality or questionable legality of

many of these activities frequently led to a tightening of security rather than to their termination. Partly to avoid exposure and a public, “flap.” knowledge of these programs was tightly held within the agen- cies. special filing procedures were used. and “corer stories” were devised.

When intelligence agencies realized that certain programs and tech- niques were of questionable legality. they frequently took special security precautions to avoid public exposure. criticism. and embarrass- ment. The CIA’s study of student unrest throughout the world in the late 1960s. for example, included a section on student dissent in the United States, an area that was clearly outside the Agency’s statutory charter. DCI’s Hichard Helms urged the President’s national secu- rit,v advisor, Henry Kissinger. to treat it. with extreme sensivitv in light of the acknolrledged jurisdictional violation :

“Herewith is a suwev of student dissidence world-lvide ‘as re- quested by the President. In an effort to round out our discus- sion of this subject, we have included a section on American students. This is an area not Kithin the charter of this ,4gency, SO I need not emphasize how extremelv sensitive this makes the paper. Should anvone learn of its ex’istence, it. would prove most embarrassing for mall concerned.” QI

Concern for the FBI’s public image prompted security measures which nrotected numerous questionable activities. For example, in

(Continued) mended against participation hccnuse t1le.r wnsidered the program to Ix? in violation of the law and FCC rrgwlations. OTemornndnm for the record, knwd Forces Recurit Agency. Subject : SHA\31ROCK Operation. S/2.5/.50.)

38 Tom Charles Huston deposition, 5/22/E. p, 43: Staff Summarp of Tom Charles Huston interview, s/22/75.

(o Letter from Richard Helms to Henry Kissinger, 2/18/69.

Page 163: Church Committee: Reports-- Book II

147

approving or denying COISTEI,PRO proposals, many of which were clearly illegal. a main consideration was prr\witing “embarrassment to the r~llrCR11.” 41 ,4 characteristic cantion to FBI agents appears in the letter which initiated the COTSTELPRO against “Black Sationalists” :

You are also cautioned that the nature of this new endeavor is such that under no circumstances should the existence of the program be made known outside the Bureau and appro- priate within-office security should be afforded to sensitive operations ancl techniques considered unc1e.r the program.

Examples of attention to such security are that anonymous letters had to be written on commercially lmrchased stationery; newsmen had to bo so completely trustworthy that they were guaranteed not. to reveal the Uureau’s interest ; and mquiries of law enforcement, officials had t.o be made under the pretext of a criminal inr-estigat,ion.

A similar preoccupation with security measures for improper act.ir- itics affected both the SSA and the Army Security Sgency.

SSA’s guiclelines for its watch list. adivit,y provided t.hat NSB’s name should not be on any of the disseminated watch list material involving Americans. The aim was to “rest,rict, the knowledge that such information is #being collected and processed” by NSA.“3

The Army Security Agency’s radio monitoring activity, which con- tinued even after the Army was told that the FCC and the attorney General regarded it. as illegal, also had to be conducted in secrecy if a public outcry was to be avoided. When Srmy officials decided to per- mit radio monitoring in connection n-ith the military’s Civil Dis- t,urba’nce Collection Plan, t.heir instruction provided t,hat all ASA personnel had to be “disguised” either in civilian clot.hes or as members of re,#ar military units.*4

The perceived illegality-and consequent “flap potential?‘-of the CIA’s Ken- York mail opening project led -4genc.y officials to for- mulate a drastic strategy to fallow in the event of public exposure. A review of the project 1,~ the Inspector General% Office in the early 1960s concluded that it would be desirable to fabricate a “cover story.” A formal recommendation was therefore made that “[a]n emergency plan and cover story be prepared for the possibility that the operation might be blown.” 45 In response to this recommendation, the Deputy Chief of the Colmterintelligence Staff ‘agreed that. “a ‘flap’ will put US ‘out of business’ immecllatelv and may give rise to grave charges of criminal misuse of the mails by government agencies,” but he argued :

‘l See COIKTELPRO Report : Sec. V, “ Outside the Bureau” memorandum ; from FBI Headquarters to all SAC’s, 8/26/67.

w Buffham, 9/12/X, p. 20 ; JIIXTARET Charter, 7/l/69. At other times, however, NSA’s special security measures were applied to

protect documents which concerned far more than SSA. Thus, at Richard Helms suggestion, Huston Plan working papers and documents were all stamped with legends designed to protect SSil’s lawful communications activity. although only a small portion of the documents actual& concerned SSA. (Unaddressed memo- randum, Subject : “Interagency Committee on Intelligence, Working Subcom- mittee, Minutes of the First 3Ieeting,” O/19/70.)

” lkpartment of kmy Message to Subordinate Commands, 3/31/68. ” CL4 memorandum, Subject: Inspector General’s Survey of the Office of

Security-, Annex II, undated.

Page 164: Church Committee: Reports-- Book II

148

Since no good purpose can be served by an official admission of the violation. and existing Federal statutes preclude, the concoction of any legal excuse for the. violation, it must be recognized that no cover story is available to any Gol-ern- merit Agency. Therefore, it is important, that all Federal law enforcement and ITS Intelligence Agencies vigorously deny any association. direct or indirect, Iv-it11 any such activity as charged. . . . I-nless the charge is supported by the presenta- tion of interior items from the Project, it should be relatively easy to “hush up” the entire affair. or to explain that it consists of legal mail cover activities conducted by the Post Office at the request of authorized Federal agencies. Under the most unfavorable circumstances . . . it might be necessary after the matter has cooled off during an extended period of inresti- gation? to find a scapegoat to blame for unauthorized ta.mper- ing wnh the mails. Such cases by their very nature do not have much appeal to the imagination of the public, and this would be an effective way to resolve the initial charge of censorship of the mails.46

This strategy of complete denial and transferring blame to a scape- goat was approved by the Director of Security in February 19RL4’

Another extreme example of a security measure t.hat was adopted be- cause of the threat, that illegal activity might be e.xposed was the out.- right destruction of files.

The FBI developed a special filing system-or, more accurately. a destruction system-for memoranda written about illegal techniques, such as break-ins,@ and highly questionable operations, such as the mi- crophone surveillance of .Joseph ICraft.‘” T’nder this system-which was referred to as the “DO SOT FILE” procedure-authorizing doc- uments and other memoranda were filed in special safes at headquarters and field offices until the next annual inspection by the Inspection Di- vision. at which time they were to be systematically destroyed.50

* AJIemorandum from Deputy Chief, CI Staff, to Director Office of Security, 2/l/62.

‘7 Memorandum from Sheffield Edwards, Director of Security, to Deputy Di- rector for Support. 2/21/62.

‘* Memorandum from TV. C. Sullivan to C. D. DeLoach. 7/19/66. The same docu- ment that describes the annlication of the “DO XOT FILE” nrocrdure to “black bag jobs” also notes that Before a break-in could be approrecl within the FBI, the Special Agent in Charge of the field office had to assure headquarters that it could be accomplished without “embarrassment to the Bureau.” (Sullivan memo- randum. ‘7/19/t% 1

An isolated’instance of file destruction apparently occurred in th? Los Angeles o&x of the Internal Rer-enne Service in December 1974, at a time when Con- gressional investigation of the intelligence agencies was imminent. This office had roliected large amounts of essentially political information regarding black mil- itants and political activists. In Tiolatiou of internal document destruction pro- cedures the files were destroyed prior to their proposed review 1)s IRS author- ities. See IRS Report; Sec. IV. ‘The Information Gathering and Retrieval Sys- tem” ; Staff Summary of interview with Chief, IRS Division, Los Angeles, 8/l/75.

” For example, letters from W’. C. Sullivan to J. Edgar Hoover, F/30/69. ‘7/2/69, 7/3/69, i/7/69. These letters lvere sent to Hoover from Paris, where Sullivan roordinated the Kraft surveillance. All of them bear the notation “DO SOT FILE. ”

~“JIemorandun~ from W’. C. Sullivan to C. D. Deloach, 7/19/66.

Page 165: Church Committee: Reports-- Book II

149

on occasion, intelligence agencies failed to disclose candidly pro- grams ant1 practices to their own General Counsels, and to Attorney Cherals, Presidents, and Congress.

(i) Concenlnzcnt Jt*om Exccutizx Rmid~ Oficids Intelligence officers frequently concra.lrd or niisrrpresentetl illegal

act,ivities to their own General Counsel and superiors within and ont- side the agtncies in order to protect these actix?ties from exposure.

For example, during the entire N-year history of the CLl’s mail opening project, the Agency’s General Counsel was never informed of its existence. ,Iccording to one Agency official, this knowledge was purposefully kept from him. Former Inspector General Gordon Stew- art testified :

Well, I am sure that it was held back from [the General Counsel] on purpose. ,4n operation of this sort in the CL4 is run-if it is closely held, it is run by those people immediately concerned, ancl to the extent’ that it, is really possible, accord- ing to the practices that we had in the fifties and sixties, those persons not immediately concerned were supposed to be ignorant of iL51

The evidence, also indicates that two Directors of Central Intelli- gence under whom the Sew York mail operations continued-John McCone and Admiral Raborn-were never informed of its existence.” In 1954, Postmaster General arthur Summerfield was informed that the CIA operated a mail cover project in New York, but he was not told that the Agency opened or intended to open any mail.” In 1965, the CIA briefly considered informing Postmaster General John A. Gro- nouski about t.he project when its existence was felt to be jeopardized by a congressional subcommittee that was investigating the use of mail covers and other investigative techniques by federal agencies. Accord- ing to an internal memorandum, however, the idea was quickly re- jected “in view of various statements by Gronouski before this sub- committee.” 54 Since Gronouski had agreed with the subcommittee that tighter administrat.ive controls on mail covers were necessary and gen- erally supported the principle of the sanctity of the mail, it is reason- able to infer that CIA officials assumed he would not be sympathetic to the technique of mail opening.”

” Gordon Stewart, 9/30/Z?, p. 29. 52 M&one, 10/g/75, pp. 34; Angleton. g/17/75, p. 20; Osborn, 10/21/75; Hear-

ings, Vol. 4. p. 38. M Memorandum from Richard Helms to Director of Security, 5/17/74 ; Helms,

10/X2/75. Hearings, Vol. 4, p. 84. By the CIA’s own account, moreover, at most only three Cabinet-level officials may hare been told about the mail opening as- pects of this project. Each of these three-Postmasters General J. Edward Day and Winton 11. Blount, and Attorney General John Mitchell-dispute the Agen- cy’s claim. (Day. 10/22/75, Hearings, Vol. 4, p. 45; Blount. 10/22/75, Hearings, Yol. 4, p. 47 ; Xitchell, 10/2/75. pp. 13-14.)

oI Blind memorandum from “CIA Officer.” 4/23/t%. ;“‘lbid. Mr. Gronouski testified as follows about the CIAl’s successful attempt

to keep knowledge of the Sew York project from him : “When this news [about CIA mail opening] broke [in 19731. I thought it was

incredible that a person in a top position of responsibility in Government in an agency should have something of this sort that is very illegal going on within his on-n agency and did not know about it. It is not that I did not try to know about these things. I think it is incumbent upon anybody at the top office to try to know everything that goes on in his organization.” (Gronouski, 10/22/75, Hearings, Vol. 4 p. 44.)

Page 166: Church Committee: Reports-- Book II

150

The only claim that any President may hare known about the proj- ect was made bv Richard Helms, who testified that “there was a pos- sibility’! that he “mentioned” it to President Lyndon Johnson in i967 or 1968.“” So docluiientar;v evidence is available that either supports 01 refutes this statement. During the preparation of the Hust.on Plan, neither CL1 nor FBI representatives informed Tom Charles Huston, President Sison’s representative, that the mail opening project, existed. The final interagency report on the Huston Plan [email protected] by Richard Helms and J. Edgar Hoover, was sent to the President with the st.atement, contrary to fact, that all mail opening programs by federal agencies had been discontinued.5i

In connection wit,h another CIh mail opening project, middle-level Agency officials apparently did not even tell their own superiors with- in the CIA that they intended to open mail, as opposed to merely in- specting envelope exteriors. The ranking oflicixls testified that they approved t.he project believing it to be a mail cover program only.“’ No Cabinet officials or President knew of this project and the approval of the Deputy Chief Postal Inspector (for what he also beheved to be a mail cover operation) was secured through conscious decepti0n.j”

A pattern of concealment was repeated by the FBI in their mail opening programs. There is no claim by the Bureau that any Post- master General, Attorney Genera!, or President was ever advised of the true nature and scope of its mall projects. One FBI official testified that it was an unofficial Bureau policy not to inform postal officials with whom they dealt of the actual intention of FBI agents in receiv- ing the mail, and there is no indication that this policy was ever violated.GO At one point in 1965, Assistant Director Alan Belmont and Inspector Donald Moore apparently informed Attorney General Nicholas deB. Katzenbach that FBI agents received custody of the mail in connection with espionage cases on some occasions.G1 But Moore testified that the Attorney General was not told that mail was actually opened. When asked if he felt any need to hold back from Katzenbach the fact of mail openings as opposed to the fact that Bu- reau agents received direct access to the mail, Moore replied :

It is perhaps difficult to answer. Perhaps I could liken it to . . . a defector in place in the KGB. You don’t want to tell anybody his name, the location, the title, or anything like that. Sot that you don’t trust them completely, but the fact

m Helms, 10/23/73, pp. 28,3&U. ” Special Report, p. 29. Richard Helms testified as follows about this inaccu-

rate statement: “ the only explanation I have for it was that this applied entirely to the

FBi g;d had nothing to do with the CIA, that we never Bdrertised to this Com- mittee or told this Commitlee that this mail operation Gas going on, and there was no intention of attf&inP to a lie. .”

“And if I signed this t&g, then maybe I didn’t read it carefully enough.” “There was no intention to mislead or lie to the President.” (Helms. 10/22/73,

Hearings Vol. 4. D. 95). jb Hokard Osbkn, k/28/75, pp. 58, 59 ; Thomas Karamessines, 10/s/75, p. 12 :

Richard Helms, g/10/75, p. 127. ” For example, Chief, Security Support Division memorandum, 12/24/74 ;

Memorandum from C/TSD/CCG/CRB to the file, 3/26/69; memorandum from C/TSD/CCG/CRB to the file. 9/X/69.

‘Bo Doliald E. Xoore, 10/l/75, p.’ i9. El Moore, 10/l/75, p. 31; Katzenbach, 12/3/i& Hearings, vol. 6, pp. 204, 205.

Page 167: Church Committee: Reports-- Book II

is that any tinie one additional person lvxoincs aware of it, there is a potential for the information to . . . go further.“’

Another Burexii agent spwilat~d that tht Attom~ Gcm?lxl v-a!:

not told lwcaasc mail opening “was 11ot legal, as far as I 1<11ew: lx

Similarlv, there is no incbcation that the FBI ever infornietl any .1ttorncy i+eneral about its use of “black bag jobs” (illegal break-ins for purposes other than microplione installations) ; the full scope of its activities in COISTELPRO: or its submission of names for inch- sion on either the CIA’s “Watch List” for mail opening or. before 1073, on the SSA’s YVatch List” for electronic monitoring of international coinmuiiicatioiis.G~

After J. Edgar Hoover disregarded Attorney General Biddle’s 1043 order to terminate the Custodral Detention Lrst by merely chang- ing its name to the Security Index moreover, Bureau headquarters instructed the field oflicers that the new list should be kept “strictly confidential” and that it should never be mentioned in FBI reports or “discussed with agencies or individuals outside the Bureau” except for military intelligence agencies. For several years thereafter, t.he Attor- ney General and the ,Justico Department Jverc not informed of the FBI’s decision.65

An incident, which occurred in 1967 in connection with the Bureau’s COISTELPRO operations is particularly illustrative of the lengths to which intelligence agencies would go to protect illegal pro.granis from scrutiny by executive branch officers outside the intelligence conl-

mu&y. As one phase of its disruption of the United Klans of America, the Bureau sent, a letter to Klan officers purportedly prepared by the highly secret “Sational Intelligence Committee” (NC) of the Klan.GF The fake, letter purported to fire the Sorth Carolina Grand Dragon for personal misconduct and misfeasance in office, and to suspend Imperial l\‘izard Robert Shelton for his failure to remove the Grand Dragon. Shelton complained to the FBI and the Post Office about, this apparent violation of the mail fraud statutes--\~itliout realizing that the Bureau had in fact sent the letter.“’ The Bureau, after solemnly assuring Shelton that his complaint xx.5 not within the FBI’s Juristliction, approached the Chief Postal Inspector?+ o&e in Washington to determine what action the Post Ofice planned to take regarding Shelton’s allegation. The FBI was ad\-ised that the matter had been referred to the Justice Department’s Criniinal Division.“* .1t no time did the Bureau inform either the Post OfFwe or the .Justicr 1)epartment that FBI agents had authored the letter. T\‘hen no investi- gation was deenied to be warranted by the Criminal Division, FBI Headquarters directed the Bureau’s Charlotte, Sort11 Carolina office to prepare a. second phony SIC letter to send to Klan officia1s.F” This

‘*Moore 10/l/%, p. 48. See Mail Report : Sec. IV, “S*ature and Value of the Product Receiwd.”

“I FBI went testimonr. 10/10/75. n. HO. --A--~

” See Ski Report : S%. II. “Summary of SSA Watch List Activity.” G Memorandum from a. Edgar IIoorer to FBI Field Offices, X/14/43. ” Jlemorandum from Atlanta Field Office to FBI Headquarters. 6/7/67. “’ Memorandum from Birmingham Field Office to FBI Headquarters, 6/14/G. R9 I’ostal officials told Bureau liaison that since Shelton’s alleviations “aplwar

to inrolw an intcrnnl struggle for control of Ku Klux Klan activities in Sort11 (‘arolimt ant1 since the eridGnce of mail frnntl was somewlmt tenuous in nature, the I’ost Office did not contenil~late any investigation.” ( JIeniori~nduni from Spe- cial A\gent to I). .J. Brennan. C/11/G. 1 Hat1 tlic FBI informed the Post Office tlmt Burrnu agents had written the letter, it w)nld hnre been apparent that Shcltnu‘s allegations \yerc mt based on nn “internal struggle” within the KKK.

BB Memorandum from FBI Headquarters to Charlotte Field Office, S/21/67.

Page 168: Church Committee: Reports-- Book II

152

letter was not mailed. however, because the Charlotte office propoSed

ant1 iu~l~lenientctl a tliffercnt idea-the formation of an FBI-controlled alternatire Klan organization, which eventually attracted 2.50 niembers.‘”

The Huston Plan itself was prepared without the kno\rledge of the ,ittorncT General. Keither the ,\ttorneF General nor anyone in his office wa’s invited to the drafting sessions at Langley or consulted dur- ing the proceedings. Huston testified that it never occurred to him to confer with the Attorney General before making the recommen- dat.ions in the Report, in part because. the plan was seen as an in- telligence matter to be handled by the intelligence agency directors.71

Similarly. the CI,\‘s General Counsel was not included or consulted in the formulation of the Huston Plan. As James Angleton testified. “the custom and usage was not to deal \Tith the General Counsel, as a rule, until there were some troubles. He was not a part of the process of project approval.” 73

(ii) Concea,lnwnt frown ColLgress At times, knowledge of illegal programs and techniques has been

concealed from Congress as well as executive branch officials. On two occasions, for example, officials of the Army Security +gency ordered its units-in apparent violation of that, ,4gency’s jurlsdlction-to con- duct general searches of the radio spectrum without regard to the source or subject matter of the transmissions. ASh did not report these incidents to ranking -1rniy officials. even when specifically asked to do so as part of the Armv’s preparation for the hearings of the Senate Subcommittee on Cons&tutional Rights in 1971.7’

Events surrounding the 1965 and 1966 investigation by Senator Ed- ward Long of Missouri into federal agencies’ use of mail covers and other investigative techniques clearly showed the desire on the part of CIA and FBI officials to protect their programs from congressional review.75 Fearing that the Xew York mail opening program might be discovered by this subcommittee, the CIA considered suspending the operation until the investigation had been completed. An internal CL4 memorandum elated April 23: 1965, reads in part :

Mr. Karamessines [Assistant, Deputy Director for Plans] felt that the dangers inherent in Long’s subcommittee activi-

ia Memorandum from Charlotte Field Office to FBI Headquarters 8/22/67. ” Huston, 9/23/i’& Hearings, Vol. 2, p. 24. When J. Edgar Hoover informed Attorney General John Mitchell about the

Report on July 27, 1970, Mitchell objected to its proposals and influenced the Preside& to withdraw his original approral.

According to John Xitchell, he believed that the proposals “were inimical to the best interests of the country and certainly should not be something that the President of the United States should be allproving.” (John Mitchell testimony, 10/24/75. Hearings, Vol. 4, p. 2.3.)

” James A4ngleton. g/24/73. Hearings. Vol. 2. n. 77. ” See Milit<rs Surveillance Repori :’ Sec. I, -‘I Improper Surveillance of Private

Citizens by the Military” ; Inspector General Report, Department of the Army, 1/3/i2.

I5 The .Johnson Administration itself attempted to restrict the Long Subcom- mittee’s investigation into national seewitS matters, although there is no indica- tion that this attempt was motivated bg a desire to protect illegal activities. (E.g., Memorandum from -4. H. Belmont to Mr. Tnlson. 2/25/66; memorandum from J. Edgar Hoover to Messrs. Tolson, Belmont, Gale, Rosen, Sullivan, and DeLoach, 3/2/65.)

Page 169: Church Committee: Reports-- Book II

153

ties to tile security of the I’roj,ect’s operations in Sew York should bc tlioro~ighly Atlied in ortler tiiat II clcternlin;ltioi1 Cm1 be lnadc as to whether tliese operations ~liould be partially 01’ fully suspended until the 5nbcommittec’s investigations arc con~l~letecl.7F

When it w-as lenrnecl that Chief Postal Tnspwtor TIrnl:y Montague had been contacted about the Long invwti.gntion ant1 bclirve~l that it K-0111d “s0011 cool oRf”. hole\-er. it v-as tlecitlrtl to c.ontiniw the opera- tion without susl~ension.7i

The FT3I was also concerned tililt the slibcoinnlittcc lllight expose its llulil opening progran~s. I~urrau memoranda indicate that the FBI in- trntlrtl to “warn the T,ong (‘ommittee nwaz from ,thosc areas which n-ould be injrlrious to the national defense. ;’ .J. Edgar 11001~cr l>e~‘- sonall\- contacted the (‘hairman of the Senate ,Judiciary (‘ommittee.” and u<ged him “to see T,ong not later than Veclnesday morning to cau- tion him that [the Chief (‘onnwl] must not, go into the kind of ques- tion he made of Chief Inspector Montague of the Post Mice T)epar- merit” 80 -questioning that had threatened to rcwal the FBI’s mail l)rojrct the previous wwk.S1

When the Long subcommittee began to investigate electronic sur- veillance practices several iiiontlis later: I3wcau officials convinced Senator Edv~~rtl T,onp that there n-as no need to 1~1rsuc such an in- vestigation since, the\- snitl. tlic FHT’s operations were tightly con-

trolled and properly iinplementecl. 82 According to Bureau documents, FT31 agents wrote a press release for t!lc Senator from ;\Iissollri, with his npproval, that stated his snbconimittee had

contlucted exhausti\-c research into the activities, procedures, and techniques of this agency [and] lwsecl upon careful stud?- . . . n-c are fall!- satisfied that the FE1 has not participated 111 highliai~ded or uncontrolled uhage of wiretaps. niicrol~lionrs. or other electronic equil>nient.h”

Sot 0111~ w:ts this rcle:w written by the FBT itself, it was misleading. ‘I’ll0 “r&iisti\-c research” apparently consistecl of a ninety-minute briefing b\- FM officials describing their electronic surreillnnce prW- tices; neiilier the Senator nor the public learned of the instances of improper electronic survcillanccs that had been conducted by the I’BI.$’ Khen Senator Etl~arcl Long later asked certain FBI officials to testify about the Hurean’s electronic surreillanw policy before the Subcommittee. they refused. arguing: “. . . to put an FBI wtness on the

” Blind memorandum from “CL1 Officer,” a/23/65. ” Ibid. ‘a Jlemomndum from A. II. Belmont to Xr. Tolson, 2/27/65. m Memorandum from J. Edgar Hearer to JIessrs. Tolson. Belmont. Gale, Rosen,

Sullivan. and DeLoach, 3/l/65. ” JIen~orandun~ from J. Edgar Hoover to Messrs. Tolson, Belmont, Gale, Rosen,

Sullivan. and DeLoach 3/l/66. ” Mail Rrllort Part IV. Sec. TII, “Concern with Exposure.” At the time of his

testimony Iwfore the Long Sul~committre. Chief Postal Inspector Montague knew of ongoing FBI projerts in which Bureau agents received custody of the mail. but he was apparently unaware that these projects involved mail openings.

“For examnle. Mrmornndum from C. D. DeLoacli to JIr. Tolson. l/10/66. ” JIemoraudnm from 11. A. *Jones to Mr. Wick, Attachmen’r, l/11/66. v See pp. 62-65. 105, 203-206 for a description of some of these improper

surveillances.

Page 170: Church Committee: Reports-- Book II

154

stand w-oultl be, an attempt to open a Pandora’s box, insofar as OLU

enemies in the press were concerned. . . .” 85 -1fter the press release had been delivered to Senator Long and

the refusal to testify had htrn acceptetl. one FBI official wrote to the -1ssociate Director that while some l~~~ol~lrms still existed. “we have nentralized the threat of being embarrassed by the Long Snbcom- mittee . . .” s6

8rsbfincling (f)

The internal inspection mechanisms of the CIA and the FBI did not keep-and. in the case of the FBI, were not designed to keep-the activities of those agencies within legal bounds. Their primary concern was efficiency. not legalit,y or propriety.

The internal inspection mechanisms of the CT,1 and the FBI were ineffective in ensuring that the activities of these agencies were kept within legal bounds. This failure was sometimes dne to structural deficiencies which kept knowledge of rli~cstionable programs tightI,! compartmented and shielded from those who could eralnate the11 legality.

As noted above,, for example, the CIA’s General Counsel was not informed about either the Sew York mail opening project or CIA’s participation in the Huston Plan deliberations. The role of the CIA’s General Connsel was essentially a passive one; he did not initiate inquiries bnt, responded to requests from other Agency components. As James Angleton stated, the General Connsel was not a part of the normal project. approval process and generally was not consulted imtil “something was going wrong.” 8i

When the General Counsel was consulted, he often exerted a posi- tive influence on the conduct of CIA1 activities. For example, the CIA stopped monitoring telephone calls to and from Latin ,%merica after the General Connsel issued an opinion describing the telephone inter- cepts as illegal.“” Bnt internal CL1 regulations have never required employees who know of illegal, improper. or questionable activities to report them to the General Counsel; rather! employes with sucli knowledge are instructed to inform either the Director of Central Intelligence or the Inspector Ge,neral. The Director and the Inspector General may refer the matter to the General Counsel but nntil recently t,liey were not obligated to (10 ~0.~~~ As Richard Helms stated. “Somc- times we did [consult the General (‘o~mscl] ; sometimes we did not. 1 think the record OJI that is rather spotty, quite frankly.!’ 89

Intleed, the record snpgests that those program.5 that were most qnestion:lble-sncll as the Sew York mail opening project and Project CHAOS-were not referred to the General Counsel because they were

gj Jlemoraudum from C. D. DeLoach to Mr. Tolson, l/21/66. R” DeLoach memorandum, l/21/66. This incident also illustrates that Congress

has at times permitted itself to he “neu’tralized.” The general reluctance of Congress to discharge its responsibilities toward intelligence agencies is dis- cussed at pp. 27i-281.

hi James Angleton. 9/1i/'i5. D. 48. w Memorandum from Lawrence Houston to Acting Chief, Division D, l/29/73. 5R’ Proposed regulations drafted in response to Executive Order 11905 (Mnrclt

1976) require the Inspector General to refer “all legal matters” to the Office of General Counsel. (Draft Reg. HR l-3.)

SO Helms deposition, g/10/55, p. 59.

Page 171: Church Committee: Reports-- Book II

considered extremely sfnsitive.~‘” Even when questionable activities xero called to the at’trntion of the General Counsel: moreover. the in- ternal Agency regulations tlicl not guarantee him unrestrictetl access to all relevant information. Thus, the General Counsel was not in a position to condnct a complete evaluation of the propriety of pal.- titular progranis.

Part of the failure of internal kpection to terminate improper pro- warns and practices mar be attributed to the fact that, the primar) ?ocus of the CIA’s Of& of the Inspector General and the FBI’s In- spection Dir-ision has been on efficiency ant1 effectiveness rather than on proprietr.

The CIA’s Insprotor General is charged with the respons~ibility. :w~~ng ot1lr.r mattclr+ of in\-rstiFating activities which might be COP strued as ‘*illegal. improper. and outside the C’IA’s lcgislatirc ~hartcl~.” gL In at least one (aasc, the Inspector General did force the suspension of a suspcat activity : the snrrcpt,itious atlministra,tion of LSD to unwitting, non-rolimteer. himinn subjects which was sus- pended in 1963. 92 An earlier Inspector General’s review of the larger, more general program for the testing of b&a\-orial control agents. however. had labeled that program ‘Wnethical and illegal” and it none- theless continued for another seven ytar~.~‘~ In general, as the Rocke- feller <Iommission pointed out. “the focus of the Inspector General ~omponrnt review3 was on operational efiectivciiess. Examination of the legality or propriety of CL1 activities was riot normally a primar;y ('011c.c1'11.' ” y4 Two separate reviews of the Sew York mail opening pro]- rcts by the Inspector tieneral’s ofice. for example, considered issues of administration and sccurit3 at length but did not even mention legal collsiderations.3S

Internal inspect’ion at, Ithe FBI has traditionally not encompas.sed legal Or ethical questions at all. According to W. JlClrli Felt, the As. sistant. mr IJirec!:or in charge of the Inspect’ion I)ivision from 1964 to 1971, his job was to ensure that 13urean prog~~n~ were being opera&et1 efliciently. not, corlstiltiltioliallS : “There was no instruction to me,” she stated. “nor tlo I belie-r-e there is any instruction in the Inspector’s manuals, ‘that inspectors shonltl be 0L the alert to see that constit.u- tional values are beling protectetl.” g6 IIe could not recall any program which was terminate~l because it might have been violating someone’s c.ivil righkg7

‘” Gordon Stewart deposition, 4/30/X, 1,. 29 ; Rockeller Commission Report, p. 146; Report on the Offices of the General Couusel and Inspector General : The General Counsel’s Responsibilities, 9/30/75, p. 29.

” Regulation HR 7-k (6). ” Jlemorandum for the Record by J. S. Earman, Inspector General, 11/29/63 :

Memorandum from Helms to DCI. 11/9/M. h? 19X LG. Inspection of the Tedhnical Services Division. w Rockefeller Commission Report, G/G/X, p. S9. ” Jlemorandum from L. Ii. Tvhite, Deputi Director for Support, to Acting In-

wector General, Attachment. 3/g/62 : blind mrmorandum. undated (19691. The Ikwector General under whoke’a&pices the second revi& WM cond&~d stated ‘* [Ol f course we knew that this was illegal.” but he believed that it was “un- nerrssary” to raise the matter of its illegality with Director Helms “since every- I)ody kuex that it xvas [illegal] and it didn’t wcm . . . that I would be telling Mr. Helms anything that he dicln’t know.” (Gordon Stewart, S/30/75, p. 32.) 1). 3’2. i - wI W. Mark Felt testimony, Z/3/75, lx 66.

*’ Felt, 2/3/i& p. 57.

Page 172: Church Committee: Reports-- Book II

156

A number of questionable FBI programs were apparently never in- spected. Felt could recall no inspection, for instance. of either the FBI mail opening programs or the Bureau’s participation in the CIA’S

1y Sew York mail opening project., Even when improper programs were inspected, the Inspection Division did not attempt to exercise oversight in the sense of looking for wrongdoing. Its responsibility was snnplv to ensure that FBI policy, as defined by J. Edgar IIoovel was effectively implemented and not to question the propriety of the policy.99 Thus, Felt testified that if, in the course of an inspection of a field office, he discovered a microphone surveillance on Martin Luther King, Jr., the only questions he would ask were whether iit had been approved by the Director and whether the procedures had been prop- erlv followed.100

iThen Felt was asked whether the Inspection Division con- ducted any investigation into the propriety of COISTELPRO, the following exchange ensuecl :

Mr. FELT. Soft into the propriety. Q. So in the case of COIKTELPRO, as in the case of

SSA interceptions, your job as Inspector was to determine whether the program was being pursued e.ffectively as op- posecl to \vhether it was proper ?

Mr. FELT. Right., with this exception, that in any of these siituations, Counterintelligence Program or whatever:. it very frequently happened that the inspectors, in revie\ving jthe files, wo~dcl direct thalt a certain investigation be discont’mued, that, i:t was not productive, or that there was some reason that it, be discontinue.d.

But I don’t recall any cases being discontinued in the Cotmterintelligence program.101

As ,a result of this role clefinition. ,the Inspection Division became an active participant in some of the most questionable FBI programs For example, it was responsible for reviewing on an annual basis all memo- randa relating to illegal break-ins prior to their destruction under the “DO XOT FILE!’ procedure.

Improper programs and t.echniques in the FBI were protected not only by t.he Inspection Division’s perceptlion of its function, but also by the maxim that FBI agents shoulcl never “embarrass the Bureau.” This standard, which served as a shield to outside scrutiny, was explicitly reflecte.d in the FBI Manual :

Any investigation necessary, to develop complete essent,ial facts regarding any allegation against Bureau employees must be mstitutcd promptly: and every logical lead wh~h Tvill establish the true facts should be completelv run out unless su,ch act&m u~ulcl em3nrrus.s fhf: Bureau . . 1 in which event the Bureau will weigh the facts, along with the recom- mendations of t.he division head. [Eml~hnsisadded.]‘O*

” Felt, 2/3/75, pp. 54, 55. m Felt, 2/3/75, pp. 59-60. I* Felt, 2/3/75, p. 60. ‘01 Felt, 2/3/75, pp. 56, 57. lo2 When asked about this Nunual provision, Attorney General Ed\vard Levi

stated : “I do believe . some further explanation is in order. First, the Bureau in-

forms me that the provision has not been interpreted to mean that an inrestiga-

Page 173: Church Committee: Reports-- Book II

157

Such an instruction. couplet1 with the lnspwtion Division’s inattell- tion to the law: could only inhibit or prevent thr trrminat.ion ant1 es- posure of illegal practicr5.

8u~bfinclitzg (g)

When senior administration officials with a duty to control domestic intelligence activities knew, or had a basis for suspecting, that ques- tionable activities had occurred, they often responded with silence or approval. In certain cases, they were presented with a partial descrip- tion of a program but did not ask for details, thereby abdicating their responsibility. In other cases, they were fully aware of the nature of the practice and implicitly or explicitly approved it.

On several occasions, senior administration officials with a duty to control domestic intelligence activities were supplied with partial details about questionable or illegal programs but they did not ask for additional information and the programs continued.

Sometimes the failure to probe further stemmed from the admin- istration official’s assumption that an intelligence agency \yonld not engage in lawless conduct. Former Chief Postal Inspector Henry Montague, for example, was aware that the FBI received custody of the mall in connection with several of its mail opening programs- indeed, he had approved such custody in one case-but he testified that he believed these were mail cover operations only.1o3 Montague stated that he did not ask FBI officials if the Bureau opened mail because he :

never thought that n-ould be necessary. . . . I trusted them the same as I would another [Postal] Inspector. I would never feel that I would have to tell a Postal person ,that you cannot open mail. By the same token, I would not consider it necessary to emphasize it to any great degree with the FBI.lo4

A former FBI official has also testified, as noted above, that he informed Attorney General Katzenbach about selected aspects of the FBI mail opening programs. This official did not tell Katzenbach that mail was actually opened, but he testified that he “pointed out [to the Attorney General] that we do receive mail from the Post Office. in certain sensitive areas.‘: lo5 While Katzenbach stated that he never knelt mail was opened or that the FBI gained access to mail on a regular basis in large-scale operat,ions,106 the former Attorney

tbon should not take place and that hny interpreCation that an investigation would not be instituted because of the possihili’ty of embarrassment to the Bureau was never intended and, in fact, has never been the policy of this Bureau.’ I am told that ‘what was intended to be conveyed was that in such eventuality FBI Headquarters desired to be advised of the matter before investigation is in- stituted so that Headquarters would be on notice and could direct the inquiry, if necessary.’ ”

“Second, the manual provision dates back to March 30, 1%55.” “YlJhird, I am informed by the Bureau th,at ‘immediate steps are ‘being taken to

remove that phraseology from our Manual of Rules and Regulations.’ ” f Letter from Attorney General Levi to Senator Richard Schmeiker, 11/10/‘75.)

loa Henry Montague testimony, 10/2/75, pp. 55, ‘71. ‘01 Henry Montague, 10/2/75, pp. E-16. I05 Donald Moore, 10/l/75. p. 31. lo8 Nicholas Katzenbach. 10/11/75, p. 35.

Page 174: Church Committee: Reports-- Book II

158

General acknowledged that he did learn that. ‘*in some cases the out- side of mail might have been examined or even l~liotogral~l~ed bv persons other than Post Oflice eml~loyecs’~.107 IIowercr. neither at this time nor at, any other time did the ,Justice Dcpa14tment make any inquiry to determine the full scope of the FBI mail operations.

Similarly-, former Attorneys General Sicholns Katzenbnch and Rnm- sey Clark testified that they were familiar with the FBI’s efforts to disrupt the Ku Klux Klan through regular investigative techniques but said ther were unan-are of the ofl’ensive tactics that occurred in COIKTEiPRO. Katzenbach said he did not believe it neces-

sary to explore possible irregularities since “[iIt never occurred to me t.hat the Bureau would engage in the sort, of sustainetl imprope] activity which it apparently did.” lo8

Both Robert Kennedy and Nicholas Katzenbach were also aware of some aspects of the FBI’s investigation of I)r. Martin Luther King, Jr., yet neither ascertained the full details of the Bureau’s campaign to discredit the civil rights leader. Kennedy intensified the original “com- munist influence” investigation in October l!X3 b\- nuthorlzing wire- taps on King’s home and office telephones. 1~ KenKeclv requested that an e.raluation of the results be submitted to him & thirty days in order to determine whether or not to maintain the taps, but the erxlua- tion was never deli\-wed to him and he did not insist on it.*‘O Since he never ordered the termination of the wiretap, the Bureau could, and did, install additional wiretaps on King by invoking the original aut~l~ori7ation.*11 According to Bureau memoranda apparently ini- tialled by Attorney Genepal Katzenbach, KatzenbaA received after the fact notification in 1Otij that three bugs had been planted in Dr. King’s h&e1 rooms.*1* h t.ransmittal memorandum \I-ritten by

loi Katzenbach statement, 12/3/i5, Hearings, Vol. 6, p. 205. 1(16 Katzenbach testimony, 12/3/Z, Hearings, Vol. 6, p. 207: Ramsey Clark,

12/3/75 ; Hearings. Vol. 6 p. 235 ; KatzenbacT’s and Clark’s knowledge of disrup- tire owxations is discussed at greater lencth in Finding G : “Deficiences in Con- trol and Accountability” p. 265.-

lee Memorandum from J. Edgar Hoover to the Attorney General, 10/7/63; memorandum from J. Edwr Hoover to the Attornev General.~lb/lP/63.

‘lo Memorandum fromk. A. Ernns to Mr. Bel&nt 10/21/63. In May 1961, Robert IiennedF also became aware of the CIA’s use of organized

crime figures in connection with “clandestine efforts” against the Cuban gorern- merit. (Memorandum from J. Edear Hoover to the Attorner General. 5/22/61.) But he‘did not instruct the CIA-to terminate its involvement with &~erkorld figures either at tha’t time or in Jlay 196% when he learned at a briefing by CIA officials that an assassination attemPt had occurred. Accordinz tn the CIA’s Grn- era1 Counsel, who parkipated in the 1962 briefing, I<(ennedy o&y said, I‘. . . if we were going to get involved with Mafia personnel again he wanted to be informed first.” (Lawrence Houston deposition, 6/2/L?, 11. l-2.)

The CIA’s use of underworld fi~ires clearlv nosed nroblems for the FBI’s on- going investigation of organized &me in thh~nited States, which had in large part been initiated by AUorneF General Kennedy himself. (Senate Select Com- mittee. “hllrged Assassination Plots Involving Foreign Leaders,” pp. 12>129.)

‘I1 The FBI institutti additional wiretaps on King on four separate occasions between 1964 and 1965. Since .Justice Department policy before March 1965 imposed no limit on the durati,on of wiretaps and they were approved by ‘the Attorney General. the Bureau claimed that the King tans \T-ere iustified as a con- tinuation oP the tap originally authorized by Iienn&ly in Cktob& 1963. (For es- ample. mrmorandum from FBI Ilmdquartrrs to Atlanta Field office. 4/19/G-i : 1Cnrtin Luther King Report : Sec. IC, “Wiretap Surwillancr of Dr. King and the SCT~C.”

I” Katzcnbach’s initials appear on memoranda nddrwsed to the Attorney Gen- eral advising him of these bugs. but he cannot recall seeing or initialing them.

Page 175: Church Committee: Reports-- Book II

159

1Yhilc there is 110 cl-itlcnce that the fllll estcnt of tlw Fl%I’s caml~a~gl~ to tlisciwlit 1)1*. King \Vi\S :anthorizctl b\- 01’ knoWn to ;UlY011e 0lltSlCle of the I<ureau. thcw is witlencc that officials resl)onsiblc i’or snpervis- inp the 12131 rccrivrtl iiitlications that sonle sucll eflorts ~crc being ~u~tlc~rtalic~~ E’or example. former Attorney General K’atzenbach and fornwr A1ssistant, ,1ttorncv General 13urke ~Iarshall both test.ified that in Iatr 1964 thcr learn~tl that the 12uwau hat1 oticrctl tape recortl- ings of I)r. King to certain ne\vsJilcn in n’ashington, D.C. They fur-

ther stxtctl that the\- inforuw(l I’rrsident ,Johnson of the FBI’S offc~~;.~'~ The Committee has discoveretl no evitlence: however. that. the Presitlcnt or rflisticr Department oficials made any further effort to halt the discrediting campaign at this time or at, any other time; in- deed. the Bnwau’s campaign continued for several years after this incident.

On some occasions! ntlministration officials di(l not request fnrthel details about intelligence programs because they simply did not want to know. Fornler I’ustmaster General .J. Edward I jay testified that. when Allen IMles and Kichard Helms spoke to him abont a (‘1-i project, in I!)til, he interruptetl them before they could tell him the purl~osc of their \%it (which Helms saitl was to say mail n-as being openetl). Day stated :

. . . Mr. Dnlles, after so~lle preliminary visiting ant1 so on, said that he waiitetl to tell IIIC somctliing very secret, alit1 I said. “Ijo I ha\-P to know about it ?” Ant1 hc said. “So.”

I said. “My esl)erience is tllat where there is something that is \-err secret. it is likel- to leak out, ant1 anybody that knew about It is likely to be suspected of having been part of leak- ing it out. so I ~~-ould rather not know anything about it.”

TT’hnt additional things were said iii connection with him building up to that, I don’t know. Hut 1 am swc . . . that I n-as not. told anything about opening mail.” 1’S

By his own account, therefore. Mr. I)ay did not learn the trne nature of this project because he “would rather not know anything about it.” Although rarely expressed in such unequivocal terms, this attitude appears to have been all too common among senior government officials.

(Memoranda from J. Edgnr Hoowr tu the Attorwy General, S/17/63, 10/19/65, E/l/G.?: Kntzenhach. E/l/E. Hearings, Tel. 6, p, 211. 11. -I&) IIe stated. liow- ever. that if hc had read these docliments. he would hare “done something about it.” (IQatzenbach, Hearings. Vol. 6. 1,. 230.)

‘I’ .i transmittal slip, ~hic11 the FBI chims Ilad been attached to the 12/l/65 memorandum, notes that “these are l)articnlnrly delicate surveillances” and that “we sl~oultl be rery cautious in terms of the non-FBI people who may from time to time necessarily Iw involved ill some aspect of installation.” (JIemo- l’~lKldUlll from Sicllolas Ibtzenbach to .J. Edgar IIoorer, E/10/63.) This mes- sage is Siglled I,$ Ihtzeuhach. l)nt he testified that lie 1s UnSUre it related to the Iiine sumeillarlcrs. ( Iiatzcnl~ac1~. E/,?/T.‘i. Hearings, Vol. 6, 1,. 229.)

Iii IGltzenl~ncll. 12/3/9Z. IIrarings, Vol. G, 1,. 210 ; JSUrlie Xarsliall testimony. 3/3/x. pp. 3s43.

Page 176: Church Committee: Reports-- Book II

160

Eren when administration officials were fully apprised of the illegal or questionable nature of certain l)ropran~~ ant1 tec~lmiqucs. they. somc- times permitted them to continue . Ah exanil~lr of acquiescence is pre- sentecl in the case of Williaiii (‘otter. a fornier Chief Postal Inspector Who knew that the. CL1 openc(l mail iii coniiection with its Scn York project but took no direct action to terminate the project for a period of four vcars.ll” Cotter had learned of this project in his capacity as a CIA ofKcia1 in the mid-1930’s and he knew thnt’it was continuing when he was sworn in as Chief Postal Inspector in -April 1060.” Be- cause the primate- responsibility of his position was to insure the sanctity of the mails, he was unclerstnndablv “very. very uncomfort. able with [knowledge of the XIX- York] project,” 11* bnt he felt con- st.rained by the letter and spirit of the secrecy oath which he hacl signecl when he left the CL1 in 1969 “attesting to the fact that I would not divulge secret information that came mto my possession during the time that, I was with the CIA.” I19 Cotter stated : “After coming from eighteen years in the CIA, I was hypersensitirc. perhaps, to the pro- tection of what, I ‘believed to be a most sensitive project . . .” lzo For several years, he placed the dictate of the secrecy oath above that of ihe Ian- he was charged with enforcing.

Former White House adviser John Ehrlichman also stated that he learned of a program of intercepting mail between the Dnited States and Conimunist~ countries “because I had seen reports that cited those kintls of sources in connection with this, the bombings, the dissident activities.” lZ1 Yet he cannot recall any White House inquiry that was mado into such a program nor can he recall raising the matter with the President.122

When President, Sixon learned of the illegal techniques that were recommended in the Huston Plan. he initially endorsed, rather than disavowed them. The former President stated that “[t]o the extent that I reviewed the, Special Report of Interagency Committee on In- telligence, I would have been informed that certain recommendations or decisions set forth in that report, were, or might be construed to be, illegal.” lz3 He nonetheless approved them. in part. because they repre- sented an efficient method of intelligence collection. As President Sixon explained, “[M]y approl-al was based largely on the fact that the pro- cedures were consistent with those employed by prior administrations and had been found to be effective by the intelligence agencies.” lZ4

Mr. Nixon also apparently relied on the theory that a “sovereign?’ President can authorize the kiolation of criminal‘laws in the name of “national security” when the President, in his sole discretion, deems it appropriate. He recently stated :

UBIn 1973, however, Mr. Cotter was instrumental in effecting the termination of the CIA’s Sew York project. (Cotter, S/7/75, p. 45.)

I” Cotter, S/7/75, p. 45. I18 Ibid. US Cotter 10/22/X, Hearings, Vol. 4, p. 74. I” Ibid. 121 John Erlichman testimony, President’s Commission on CIA Activities

Within the United States, 4/17/76. p. 9% 12p Erlichman testimony, President’s Commission on CIA Actirities Within the

United States, 4/17/76, p. 98. ‘=Answer of Richard 11. Sison to Senate Select Committee Interrogatory 23,

3/S/76, p. 13. 121 Answer of Richard 31. Sison to Senate Select Committee Interrogatory 19.

3/9/76, p. 13.

Page 177: Church Committee: Reports-- Book II

161

It. is quite obvious that there are certain inherently govern- mental actions which if untlertaken by the sovereign in protec- tion of the interest of the nation’s security are lawful but which if undertaken by private persons are not. . . .

. . . [I]t is naive to attcml)t to categorize activities a Pwsi- dent might authorize as ,‘legal” or “illegal” without refer- cnce to the circumstances nntlrr which he concludes that the activity is necessary. . . .

In Aort. there linl-c lw~i--ant1 will be in the futiur--cir- cumstances in which Presitlents may lawfully authorize ac- tions in the intewsts of th(> sccnrit? of this colultI;y, which if Ilntlcrtaken by other persons. or C\‘EII by the Prcwdent under clitYrrcnt. circumstances. ~onlcl be illepal.12”

As the former President describecl this doctrine, it could apply not only to actions taken openly. which are subject to later challenge by Congress and the courts. but also to actions such as those rccommendcd in the Huston Plan, which are covert11 endorsed and implemented. The dangers inherent in this theory are clear. for it permits a Presi- dent to create exceptions to normal legal restraints and prohibitions. without review by a neutral authority and without objective stand- nrcls to guide llin1.12G The Huston Plan itself serves as a reminder of t licse d&gers.

Significantly, President Sison’s revocation of approval for the IInston Plan was basecl on the possibility of “media criticism” if the iw of these techniques was revealed. The former President stated :

Mr. Mitchell informed me that. it was Director Hoover’s opin- ion that initiating a program which would permit several governments intelligence, agencies to utilize the. investi@ire techniques outlined in the. Committee’s report. woulcl slgnifi- cantly increase the possibility of their public disclosure. Mr. Mitchell explained to me that Mr. Hoover believed that al- though each of the intelligence gathering methods outlined in the Committee’s recommendations had been utilized by one or more previous Administrations. their sensitivity would likely generate, media criticism if they were employed. Mr. Mitchell further informecl me that it was his opinion that the risk of disclosure of the possible illegal actions, such as unauthorized entry into foreign embassies to install a microphone transmit- ter, was greater than the possible benefit to be derived. Based upon this conversation with attorney General Mitchell, I cle- tided to revoke the approval originally extended to the Conl- mittee’s recommendation5.‘27

In more than one instance, administration officials outside the in- telligence commnnit;v hare specifically requested intelligence agencies to undertake questionable actions. SSh’s program of monitoritig tele- phonic communications between Sew Pork City and a city in South America, for example, n-as undertaken at the specific request of the Hureau of Narcotics and Dangerous Drugs. a law enforcement agency.

‘% Answer of Richard JI. Sison to Senate Select Committee Interrogatory 34, 3/9/76. nn. lG17.

128 President Ford has recently rejected this doctrine of Presidential power. ‘2’Answer of Richard JI. Sison to Senate Select Committee Interrogatory 17,

3/9/R, pp. 11-12.

Page 178: Church Committee: Reports-- Book II

162

BSDD officials had been concerned about drug deals that were anpar: rjltly :lrrangerl in calls from public telephones in Sew York to South ,1inerica. but they felt that ther could not le.gally wiretap these tcle- plNmc booths. I** In order to avoid tapping a limited number of ]>honeS in SCV York, BNDD submitted the names of 450 --\nwrican citizens for inclusion in SSh’s JT’atch T&t. and requested SS.\ to monitor a communications link between Sew York and South -1nlerica \vhich necessitated the interception of thousands of international telephone calls.12”

The legal limitations on domestic wiretapping apparently did not concc~rn certain o%rials in the White House or ,%ttorneys General who requested the FBI to do their biddin,. (I In some instances, they specif- ically requested the FBI to institute wiretaps on ,4merican citizens with no substantial national security predicate for doing so.‘“”

On occasion, Rttorneys General have also encouraged the FBI to circumvent the will of both Congress and the Supreme Court. I\s noted above, after Conpress passed the Emergency Detention ,4ct of 1950 to regulate the FBI program for listing people to be detained in case of war or other emergency, Justice Department officials concluded that its procedural safeguards and substantive standarcls were “nnwork- able”. ,Attorney General J. Howard McGrath instructed the FBI to disregard the statute and “proceed with the [Security Index] program as previously outlined.” IS1 Two subsequent Attorneys &neral-*James McGranery and Herbert Brownell-endorsed the decision to ignore the Emergency Detention Act.13”

In 1954, the Supreme Court denounced the use of microphone sur- veillances bv local police in criminal cases: I33 the fact that a micro- phone had been installed in a defendant’s bedroom particularly ont- raged the court. Within weeks of this decision, however, Attorney General Herbert Brownell reversed the existing ,Justice Department policy prohibiting trespassorp microphone installations by the FBI, and Irave the Bureau sweeping new authority to engage in bugging for intelligence purposes-even when it meant planting microphones in bedrooms.134 Brownell wrote J. Edgar Hoover:

Obviously. the installation of a microphone in a bedroom or in some comparablv intimate location should be avoided whenever possible. It. mav appear. however, that. important intelligence or evidence relating to matters connected with the national security can onlv be obtained by the installation of a microphone in such a location. . . .

. . . I recognize that for the FBI to fulfill its important in- telligence function. considerations of internal security and the national safety are paramount and, therefore. may compel the unrestricted use of this technique in the national interest.13”

**’ Xilton Iredell, 9/B/75. p. 99. 12s Memorandum from Ingersoll to GarIer. 4/10/70. 130 See Findings, “Political Ahuw” and “Intrusive Techniques” for examples. 1a Memorandum from A. H. Belmont to n. 11. Ladd, 10/15/52. lga ~bmorandum from Attorney General James McGranery to J. Edgar Hoover.

11/25/52: memorandum from Attorney General Herbert Brotvnell to a. Edgar Hoover, 4/27/53.

x33 lrcine v. California. 347 U.S. 128 (1954). lM Memorandum from the Attornev General to the Director, FBI, s/20/54. ‘3’Memorandum from the Attornei General to the Director. FBI, G/20/54.

Page 179: Church Committee: Reports-- Book II

163

Brownrll did not even require tlw ~m~au to seek the, Attornev Gen- eral’s prior approval for micropl~one installations in par’ticular cwses.‘36 In tlic face of the Iwine decision, therefore. he gave the FBI nntllority to bug II-liomerer it wished wherever it wislied in cases that, the I3~wrau--and not the ,1ttorncy CTeiieral--dctermincd were “in the national interest.”

In short, disregard of the law by intelligence officers was selclom corrected, and sometimes encouraged or facilitated, by officials out- &k the agencies. Whether by inaction or direct participation, these administration officials contr?bnted to the perception that legal re- stra.ints did not apply to intelligence, activities.

138 Ibid.

Page 180: Church Committee: Reports-- Book II
Page 181: Church Committee: Reports-- Book II

B. THE OVERBREhDTH OF DOMESTIC IXTELLIGESCE ACTIVITY

MAJOR FISDIXG

The Committee finds that domestic intelligence activity has been overbroad in that, (1) many ,imericans and domestic groups hare been subjectecl to investigation who were not suspectccl of criminal activity

and (2) the intelligence agencies have regularly collected mformation about personal andpolitical activities irrelevant to any legitimate gov- ernmental interest.

~Yubfindings

(a) Large numbers of law-abiding Americans and lawful domestic groups hare been subjected to extensive intelligence investigation and surveillance.

(b) The absence of precise standards for intelligence investigations of Americans contributed to orerbreadth. Congress did not enact stat- utes precisely delineating the authority of the intelligence agencies or defining the purpose and scope of domestic intelligence act,irity. The executive branch abandoned the standard set bv ,%ttorney General Stone-that the government’s concern was not with political opinions but with “such conduct as is forbidden bv the laws of the United States.” Intellige’nce agencies’ superiors issued over-inclusive direc- tiyes to investigate “subversion” (a term that was never defined in presidential dir&tires) and “potential” rather than actual or likely criminal conduct, as well as to collect general intellige,nce on law- ful political and social dissent.

(c) The intelligence agencies themselves used imprecise and over- inclusive criteria in their conduct of intelligence investigations. Intel- ligence investigations extended beyond ‘*subversive” or violent targets to atlditional groups ant1 individuals sul)irct to minimal ‘%ubversive influence” or having little or no “potential” for violence.

(d) Intelligence agencies i>nrsned a “vacuum cleaner” approach to intelligencr collection-drawing in all available information about groups and individuals, including their lawful political activity and details of their personal lives.

(e) Intelligence investigations in many caSes continued for exces- siv+ IOllg periods of time. resulting in snstaine(l povernnlenta] moni- tormg of political activity in the al)sence of any intlication of criminal conduct or “subversion.” E7aborafion 0.f FiruZingc~

The central problem posed by domestic intelligence activity has been its departure from the standards of the law. This departure from law has meant not only the violation of constitutional prohibitions and explicit statutes, but also the adoption of criteria unrelated to the Ian- as the basis for extensive investigations of Americans.

C 165)

Page 182: Church Committee: Reports-- Book II

166

In 1917-1924, the fedcral.go\-ern~~l~~iit, often assisted l!y the private vigilante American Protecti\-e hgne. coiidlwtcd swcpinp investiga- tions of dissenters, war protesters, labor organizers, ant1 alleged “anar- chists” and ‘,re\-olutioiiaries.” These in\-cstlgations let1 to mass ‘arrests of thousands of persons in the 1920 “I’alnier raids.” Reacting to these and other abuses of investigative powr, *\ttorllrv (;cllcral Elarlm

Fiske Stone in 1924 confined the Bureau of Inrest’igation in the ,Jus- tice Department to the investigation of fetlrral crimes. -1ttornry Gen- eral Stone articulated a clear nncl workable standard :

The Bureau of Investigation is not concerned with political or other opinions of indi\-iduals. It is concerned only with their conduct and then only such conduct as is forbidden by the laws of the United States.’

Nevertheless, his restriction lasted for little more than a decade. In the mid-1930s the FBI resumed domestic intelligence functions,

carrying out President Roosevelt’s vague order to investigate “sub- versTve activities.” The 1’ resident and the Attorney (;eneral n~nthor-

ized FBI and militarv intelligence in\-estigations of conduct explicit13 recognized as “not, Githin the specific provisions of prevailing stat- utes.” As a result, ideas and associations, rather than suspicion of criminal oflenses, once a.gain became the focus of federal investigations.

The scope of domestic intelligence in\-estigwtions consistentl-$ wid- enecl in the decades after the 1930s. reaching its greatest extent 111 the late l!XOs and early 1970s.

Domestic intelligence inwstigations were permitted under criteria which more nearly resembled political or social labels than standards for governmental action. Rather than Attorney General Stone’s stand- ard of investigating “only such conduct as is forbidden by the laws of the rnited States,” domestic intelligence used such labels as the fol- lowing to target intelligence investigations :

-“rightist” or “extremist” pro~~ps in the “anticommunist, field

-persons with “anarchistic or revolutionary beliefs” or who were “espousing the line of revolutionary movements”

-“general racial matters” -“hate organizations” -“rabble rousers” -“key activists” -“black nationalists” - “white supremacists” -“agitators” --“key black extremists”

These broad and imprecise labels reflect the ill-defined mission of domestic intelligence, which resulted from recurring demands for progressively wider investigations of Americans. Without the firm

’ Nex York Times, 5/10/21. Attorney General Stone implemented this policy by issuing a directive to Acting Director J. Edgar Hoover of the Bureau of Jnves- tigation : “The activities of the Bureau are to be limited strictly to investigations nf rioLations of law, under my direction or under the direction of an Assistant Attornep General regularly conducting the work of the Department of .Tustice.” (Memorandum from Attorney General Stone to .J. Edgar Hoover. .5/X3/24. cited in Alphws Thomas Mason. Anrlon Fiske Stone: Pillnr of the L,aw [Sew York : Viking Press, 1956), p. 151.1

Page 183: Church Committee: Reports-- Book II

167

guidance provided by lair-. intelligence activities intruded into areas of American life which are protected from ~governmental inquiry by the constitutional guarantees of personal privacy and free speech and assembly.

S’ubfinding (a) Large numbers of law-abiding Americans and lawful domestic

groups have been subjected to extensive intelligence investigation and surveillance.

Some domestic intelligence acti\-ity has focused on specific illegal conduct or 011 instances where there was tangible evidence that illegal conduct was likely to occur. But domestic intelligence has gone far beyond such matters in collectin, (p massive amounts of data on Amer- icans. For esample :

FRZ Dmnestic Znte7Zigcnce.-The FBI has compiled at its head- quarters over 480.000 files on its 33,000 files on its “extremism”

“subversion” inrestig:itions and over investigations.” During the kenty

years from 1%5 to 19f5, the FBI conducted ‘?40.000 investigations of “subversive matters” and 100,000 in\-estigations of “extremist mat- ters.” 3 The targets for FBI intelligence collection have included :

-the Women’s Liberation No\-ement ; -the conservative Christian Front and Christian Mobiliz-

ers of Father Coughlin : -the conservative American Christian d&ion Council of

Rev. Carl McIntyre ; -a wide variety of university, church and 1)olitical groups

opposed to the Vietnam war : -those in the non-violent civil rights mo\-ement. such as

Martin Luther King’s Southern Christian Leadership Coun- cil, the Sational dissociation for the Advancement of Colored People (SAiCP) , and the Council on Racial Equality (CORE).

L4rmy SurveiZ7mce of Ciz,i7ia?z.$.-The .kny’s nationwide intel- ligence surveillance program created files on sonic 100,000 Americans and an equally large number of domestic orcr‘ virtually every

,nnizations. encompassing

including : group seeking peaceful change in the United States

-the John Birch Society ; -Young Americans for Freedom ; -the Sational Organization of Women ; -the SAACP ; -the Urban League : -the ,~nti-Defal~iation League of B’nai B’irth ; and Business Executives to End the War ,iii Vietnam.”

PZ-4’s (‘HA08 Progrnm.-The CIA’s extensive CHAOS pro- gram-which compiled‘intelligencc on domestic groups and individ- uals protesting the Vietnam war and racial condition-amassed some

’ JIrmorandum from FBI to Select Committee. lO,%/iT,. 3 ~Lemorandum from FBI to Select Committee, Re : Investigative Matters, re-

ceived 11/12/X These statistics include as separate “matters” investigative leads pursued h;r different FBI offices in the same case.

’ Senate .Judiciary Sulwommittee on Constitutional Rights, “Federal Data Banks, Computers, and Bill of Rights,” 1971. lx 264.

Page 184: Church Committee: Reports-- Book II

168

10,000 intelligence files on -4ineric~nn citizens and groups and indexed 300.000 names of -Americans in (‘T-4 comptlter rccor~ls.’

IRAY ,~electiw Tit22 III wxtic/utiot~s of Z)j~.S.C/,tr/,k.--Bet\~--ceii 1969 mtl 1973! the Internal Rc\-cni~e ,ier\-ice. till~ongil a scrrct “Special Service Staff” (SSS) , targeted mow than 10,000 intli~iduals and groups for tax examinations because of their political ac.tivit\-.F The FBI and the Internal Security Division of the *Justice I)epartment gave SSS lists of taxpayers deemed to be “activists” or “itleological organizations:” the FBI, in providing SSS wit11 a list of over d.000 groups and in- diriduals classified as ‘.Right Wing,” ‘*Sew Left,” and “Old Left,” cxpressecl its hope that SSS tax examinations would “deal a blow to dissident elements.” i A smaller though more intensive selective en- forcement program. the ‘~Ideological Organization Project.” was es- tablished in 1oorember 1961 in response to White House criticism of “right-wing extremist” groups. s On the basis of such political criteria, 18 orgauizations were selected for specGa1 audit although there was I10 evidence of tax violation.” In 1964. the IRS proposed to esl)and its program to make “10,000 examinations of [tax] exempt organizations of all types includin g the extremist groups.” lo Although this program nerer fully materialized, the ‘*Ideological Organizations Project” can be viewed as a precursor to SSS.

CI4 and FBI Nail Opening.-The 12 mail opening programs con- ducted by the CL4 and FBI between 1940 and 1973 resultecl in the ille,gal opening of hundreds of thousands of first-class letters. In the 1960s and early 1970s. the international correspondence of large num- bers of Americans who challenged the condition of racial minorities or who opposed the war in Vietnam was specifically targeted for mail opening by both the CI,1 and FBI.

The orerbreadth of the longest CIA mail opening program-the 20 year (1953-1973) program in Sew York City-is shown by the fact that of the more than 28 million letters screened by the CIA, the ex- teriors of 2.7 million vere photographed and 214,820 letters were opened. I1 This is further shown by the fact that, American groups and incliriduals placed on the JTatch List for the project included:

-The Federation of Smcrican Scient.ists; -authors such as John Steinbeck and Edward Albee; -numerous Anieric’an peace gronps such as the American

Friends Service Committee and Women’s Strike for Peace; an d

-businesses, such as Praeger Publishers. I2 By one CIA estimate. rnnclom selection accounted for ‘75 percent of

the 200~000 letters opened, including letters to or from American political figures. such as Richard Sixon, while a presidential candidate in 1968. and Senators Frank Church and Edward Kennedy.13

’ See CHAOS Report : Sec. II D, “Operation of the CHAOS Program and Re- lated CIA Projects.”

‘See IRS Report : Part II, Sec. II, “Special Service Staff.” ’ Xemovandum from D. J. Brennnn to W’. C. Sullivan. 8/E/69. a Memorandum from William Loeb to Dean Barron, 11/30/61. ’ JIemorandum from Nitchell Rogovin to Dean Barron, 12/20/M. I0 \Iemoranclum from Commissioner, IRS to Myer Feldman, 7/U/63. I1 see Mail Report : Part I. “ Domestic CIA and FBI Xnil 0l)ening Programs.“ ” See Mail Report : Part II, Sec. II B(1). “Selection Criteria.” *‘See Mail Report: Part II, Sec. II B(l), “Selection Criteria.”

Page 185: Church Committee: Reports-- Book II

169

:1’XA’s Watch List a& XHAXROCK Progtwns.--The Sational Security Agency’s SHAMROCIZ program, by which copies of mil- lions of telegrams sent to: from? or through the United States were obtained between 1917 and 1973, involved the use of a Watch List from 1967-1973. The watch list. included groups and intlividuals se- lected by the FBI for its domestic intelligence investigations and by the CIA for its Operation CHA40S program. In addition. the SHAM- ROCK Program resulted in X$4’s obtaining not, only telegrams to and from certain foreign targets? but countless telegrams between Americans in the I-nited States and American or foreign parties abroad.”

In short. virtually every clement of our society has been subjec.ted to excessive government-ordered intelligence inquiries. Opposition to gov- ernment policv or the expression of controversial views was frequently considered s&cient for collecting data on ,\mericans.

The committee finds that this extreme breadth of intelligence actir- ity is inconsistent with the principles of 0~1r Constitution which pro- tect the rights of speech, political activity, and privacy against un- justified governmental intrusion.

Snbfidng (b) The absence of precise standards for intelligence investigations of

,4mericans contributed to overbreadth. Congress did not enact statutes precisely delineating t.he. autl1ori:t.y of the intelligence agencies or cl&ring the purpose and scope of domestic, intelligence activity. The Executive branch abandoned the standard set bv ,\ttorney General Stone-that. the government’s concern was not with political opinions but, with “such conduct as is forbidden by the laws of the I-nited States.” Intelligence ‘agencies’ superiors issued overinclusive direct.ives to investigate “subversion” (a term that was ncrer defined in presi- dential directives) ‘and “potential” rather than actual or likely crim- inal conduct, as well as to collect. political ‘and social dissent.

general intelligence on lawful

Congress has never set out a specific stat,utory charter for FBI domestic intelligence activity delineating the standards f’or opening intelligence investigat,ions or defining the purpose and scope of do- mestic intelligence activity.l”

Nor have the charters for foreign intelligence agencies-the Cen- tral Intelligence Agency and the Kational Security Agency-articu- lated adequate standards to insure that, those agencies did not be- come involved in domestic intelligence activity. While the 1947 Na- tional Security act provided that the CL4 shall have no “police, subpoena, law enforcement powers or internal security functions,” I6

I’ sff “National Security Agency Surveillance Affecting Americans”, NSA Report: See. II A, “Summary of SSA Watch I,ist Activity”.

15 The FBI’s statutory authority provides that the Attorney General may ap- point officials : “(1) to detect and prosecute crimes against the United States ; (2) to assist in the protection of the President; and (3) ‘to conduct such in- vestigations regarding official matters under the control of the Department of Justice and the Department of State as may be directed by the Attorney Gen- eral.” (28 U.S.C. 533.)

Attorney General Edward H. Levi told the Select Committee “that the statu- tor.v basis for the operations of the Bureau cannot be .said to be fully satisfac- tory.” (Edward H. -Levi test’imony, E/11/75, Hearings, Vol. 6, p. 313.)

I650 U.S.C. 403 (d) (3).

Page 186: Church Committee: Reports-- Book II

170

the Act was silent concerning \vhether the CIA was authorized to target ,1niericans abroad or to gather intelligence in the I-nited States on Amrric.ans or foreign nationals in connection with its foreign in- telligence responsibilities. 133 classified presidential directive, the CIA was authorized to conduct co~ulterintelligellce operations abroad and to maintain central counterintelligence files for the intelligence coin- niunity.li Connterintclligence actkty was defined in the directive to include protection of the, nation against “subversion,” a term which, as in the, directives authorizing FBI domestic intelligence activity, was

not defined. In the absence of specific standards for CIA activity and given the

susceptibility of the term “sub\-ersion” to broad interpretation, the CIA conducted Operation CHAOS-a large scale intelligence pro- gram involving the gathering of data on thousands of Americans and domestic, groups to determine if they had bbsubversive connections’- and illegally opened the mail of hundreds of thousands of Americans.

Moreover, the *4ct, does not define the scope of the authority granted to CIA’s Director to protect intelligence “sources and methods.” I8 This authority has been broadly interpreted to permit surveill~ance of present and former CIA employees in the United States as well as domestic groups thought to be a threat to CIA installations in the United States.

No st.atute at. <all deals with the Kational Security agency. That Agency--one of the largest. of the intelligence agencies--n-as created by Executive Order in 1952. Although KSh’s mission is to obtain foreign intelligence from “foreign” communications, this has been interpreted to permit N&4 to-intercept communications where one terminal--the sender or receiver-was in the United States. Conse- quent,ly when an Smerican has used telephone or telegraph facilities between this country and overseas, his message has been subject to interception by SSA. KSA obtained copies of millions of private telegrams sent from, to or throvgh the Cnited States ?n its SHAM- ROCK program and complied with requests to target the international communications of specific Americans through the use of a watch list.

In addition to t,he failure of Congress to enact precise statutory stlandards, members of Congress have put pressure on t,he intelligence agencies for the collection of domestic intelligence Kithout adequate regard to constitutional interests. lo hforeover, Congress has passed statutes, such as the Smith Act, which, although not directly authoriz- ing domestic intelligence collection, had the effect of contributing to the excessive collection of intelligence about ,4mericans.

Three functional policies, established by the Executive branch and acquiesced in by Congress, were the basis for the overbreadth of in- telligence inves’tigations directed at ,imericans. These policies ten- tered on (1) so-called “subversion investigations” of ‘attempts by hostile foreign governments and their agents in this country to in- fluence the Course of American life; (2) the investigation of persons and groups thought to have :I “potential” for I-io]ating the ]aw 01 committing violence.; and (3) the collection of general intelligence on wlitical and social movements in the interest of pre(]icting ant] controlling civil disturbances.

I7 Sational Security Intelligence Directive So, 5. l-60 U.S.C. 403 (d) (3). I0 See Finding 011 Deficiencies in Control and Acronntability. pp. ZTi-zi1).

Page 187: Church Committee: Reports-- Book II

171

Each of these policies grew out of a legitimat,c concern. Nazi Ger- many? Japan and the Soviet Union mounted intelligence efforts in this country before World 7T’ar II; and Soviet operations continued after the war. In the 1~0s and early l!EOs, racist groups used force to deprive Americans of their civil rights, some American dissidents engaged in violence as a form of political protest, and there were large-scale protest demonstrations and major civil disorders in cities stemming from minority frustrations.

The Committee recognizes that the government had a responsibiMy to act in the face of the very real dangers presented by these develop- ments. But appropriate restraints, controls, and prohibitions on in- telligence collection were, not devised ; distinctions between legitimate targets of investigations and innocent citizens were forgotten; and the Government’s actions were never examined for their effects on the con- stitutional rights of Americans, either when programs originated or as they continued over the years.

The policies of investigating Americans thought to have a “po- tential” for violence and the collection of general intelligence on po- litical and social movements inevitably resulted ,in the surveillance of hmerican citizens and domestic groups engaged in lawful political activity. “Subversive” was never defined in the presidential directives front Presidents Roosevelt to Kennedy authorizing FBI domestic intelligence activity. Consequently, “subversive” investigations did not focus solely on the activities of hostile foreign.governments in this county. Rather. they targeted Americans who dissented from admin- istration positions or whose political posi’tions ‘were thought to re- semble those of “subversive” groups. ,4n example of the ultimate re- sult of accepting the concept- of “subversive” investigations is the ~Tohnsou White House instruction to the FBI to monitor public hear- ings on Vietnam policy and compare the extent to which Senators’ views “followed the Coinniunist Party line.” 2o

Sinlilarly, investigations of those thought to have the “potential” for violating laws or conimitting violence and the collection of general intelligence t,o prepare for civil disturbances resulted in the surveil- lance of ,imericans n-here there was not reasonable suspicion to believe crinlc or violence were likelv to occur. Broad categories of ,4merican socie’tv-conservatives, liberals. blacks, women, yonng people and churches-were targeted for intelligence collection.

Donlcstic intelligence expanded to cover widespread pol~itical pro- trst. movenlents in the late 1960s and early 19’70s. For example, in Septenlber 19K7. ,ittornev General Ramsev Clark called for ‘a “new arena of inr-rstigation and intelligence rrpor~ing” by the FBI regarding the possibility of “an organized pattern of violence” by groups in the ‘*ttrban glietto.” He instructed FBI Director Hoe\-er:

. . . \vc nlnst lilalie ccrtnin that, evcrv nttenlpt. is being made to get, all infornlation bearing upon- these problems; to take every stel’ possible to dcternline whether the rioting is pre- plnlllwl or organized. . . . A4s a part of the broad investigation which iiiust, bc contlnctetl . . . sources or infornrants in blmack nationalist, organizations. SSCC and other less pttblicized groups ~houltl be developed and expanded to determine the

?” FBI summnrr memorandnm. l/31/75.

Page 188: Church Committee: Reports-- Book II

172

size and purpose of these groups and their relationship to other gl.ou~)s.~~

Such instructions did not limit investigation to facts pointing to par- ticular criminal or violent activit.y but called for intensive intelligence surveillance of a brcrad category of black groups (and their connec- tions &h other groups) to determine their “size and purpose.”

Similarly, the Army’s broad domestic surveillance program re- flected admmistration pressure on the Army for information on groups and individuals involved in domestic dissent.Z2 As a former Assistant Secretary of Defense testified, the Army’s sweeping collection plan “reflected the all-encompassing and uninhibited demand for informa- tion directed at the Department of the Army.” 23

Presidents Johnson and Nixon subjected the CL4 to intensive pressure to find foreign influence on the domestic peace movements, resulting in the establishment of Operation CHSOS.‘” When the Nixon Administration called for an intensification of CIA’s effort, the CIB was instructed to broaden its targeting criteria and strengthen it,s collect,ion efforts. CIA was told that “foreign Communist support” should be “liberally construed.” 25 The White House stated further that “it appears our present intelligence collection capabilities in this area may be inadequate” and implied that any gaps in #CIA’s collection program resulting from “inadequate resources or a 101~ priority of attention” should be corrected.26

In short, having abandoned Attorney General Stone’s standard that restricted Government investigations to “conduct and then only such conduct as is forbidden by the laws of the United States,” the Government’s far-reaching domestic intelligence policies inevitably produced investigations and surveillance of large numbers of law- abiding Americans.

&&finding (c) The intelligence agencies themselves used imprecise and over-inclu-

sive criteria in their conduct of intelligence investigations. Intelligence investigations extended beyond “subversive” or violent targets to additional groups and indi&duals subiect to minimal “subversive in- fluence” or having little or no “potential” for violence.

Having been given vague directions by their superiors and sub- jected to substantial pressure to report on a broad range of matters, the intelligence agencies themselves often established orerinclusive targeting criteria. The criteria followed in the maior domestic intel- ligence programs conducted in the 1960s and 1970s illustrate the breadth of intelligence targeting :

“General! Racial Matters”.-The FBI gathered intelligence about proposed “civil demonstrations” and related activities of “officials, committees, legislatures, organizations, etc.” in the “racial field.” *’

n Memorandum from Ramsey Clark to J. Edgar Hoover, S/14/67. *‘See Military Surveillance Report: Sec. II C. 21 Robert F. Froehkle testimony, Senate Judiciary Subcommittee on Constitu-

tional Rights. 1971, cited hereinafter as 1971 Hearings. 24 See pp. 99-101. as Memorandum from Tom Charles Huston to Deputy Director of CIA, 6/20/69.

1,. 1. ?B Memorandum from Tom Charles Hnston to Deputy Director of CIA, 6/20/69,

p. 1. n 1964 FBI Manual Section 122, p. 1.

Page 189: Church Committee: Reports-- Book II

173

FBI Field Offices were directed to report the **general programs” of all “civil rights organizations” and “readily available personal background data” on leaders and individuals 511 the civil rights movement,” as well as any “subversive association” that might be recorded in Field Office files. *8 In addition, the FBI reported “the objectives sought by the minority community.” z

These broad criteria, were also reflected in the FBI’s targeting of “white militant groups” in the reporting of racial matters. Those WOO were ‘*known to sponsor clemonstratibns against integration and against the busin, (r of Negro students to white scl~ools” were to be investigatecl.30

‘.lYezo Left” Zntelliye~m~.--In conducting a “comprehensive study of the whole %ew Left movement” (rather than investigating particular violations of law), the FBI defined its intelligence target. as a “loosely- bound, free-wheeling, college-oriented movement.” 31 Organizations to \:e investigated were those who fit criteria phrased as the “more extreme and militant anti-Vietnam lvar and antidraft organizations.” ‘*

The use of such imprecise criteria resulted in investigations of such matters as (1) two university instructors who helped support a student newspaper whose editorial policy was described by the FBI as “left- of-center, antiestablishment. and opposed to the I-nirersity Admin- istration” ; 33 (a) a clissiclent stockholder’s group planning to pro-t a large corporation’s war production at the annual stockholder’s meet- ing; 31 and (3) “Free Universities” attached to college campuses, whether or not there were facts indicating any actual or potential violation of 1aw.35

“Rubble Xou.yev” Zw&a~.-Beginning in August 1967, the FBI con- ducted intensive intelligence in\-estigations of individuals identified as “rabble rousers.” The program was begun after a member of the Sational Advisory Commission on Civil Disorders asked the FBI at, a meeting of the Commission “to identify the number of militant Segroes ant1 J\‘hites.” 3G This vague reference was subsequently used by the FBI as the basis for instructions implementing a broad new program: persons were to be investigated and placed on the “rabble rouser” index who were “racial agitators who have demonstrated a potential for fomenting racial discord.” 3i

IXmately, a “rabble rouser” was defined as :

A person who tries to arouse people to violent action by appealing to their emotions. prejudices, et. cetera; a denlagogue.3S

Thus, rather than collecting information on those who had or were likely to commit criminal or violent acts, a major intelligence program \\-a~ launched to identify “demagogues.”

zs FBI Manual, Section 122, rerised 12/13/66, p. S-9. ” FBI Manual. Section 122, revised E/13/66,1). <SO. ” SAC Letter. 6S-25.4 /3O /68. 31 mmnrandun~ froln ktii Headquarters to all SAC’S, 10&S/68. ‘* Memorandum from FBI HeadUnarters to all S.IC’s 10/2S/68. “’ Jlemorandnm from Molbile Field Office to FBI Hcadqnarters. U/9/70. ” Memorandum from FBI Headquarters to Minneapolis Field Office, 4/23/70. z JIemorandum from Detroit Field Office to FRI Headqnarters, -I/15/66. ‘Ia JIemorandum from Cartha DeLoach to Clyde Tolson. S/1/67. x Xemnrandum from Charles Brennan to William Sullivan, S/3/67 ; S*kC Letter

67-56, g/12/67. 38 SAC Letter So. 67-50, 11/28/67.

Page 190: Church Committee: Reports-- Book II

174

Amy Do?neatic A~ur,:eillcowc of “Zlisside~~ ts.“-Extremely broad criteria IT-ere used in the Arm~‘s’ nationwide sur\-eillance program conducted in the late 1960s. Such general terms as “the civil rights movement” and the “anti-~ietnam/anti-[lraft movements” were used to indicate targets for investigation.“” In collecting information on these “movements” and on the “cause of civil disturbances,” Army intelligence was to investigate %istigators,” “group participants,” and “subversire elements”-all undefined.

Under later revisions, the ,1rmy collection plan extended even be- yond “subversion” and “dissiclcnt groups” to “prominent l)ersons” who were “friendly” with the “leaders of the distutibance” or “sym- pathetic with their plans.” *O

These imprecise crtieria led to the creation of intelligence files on nearly 100,000 Americans, including Dr. Martin Luther Ring, Major General Edwin Walker, Julian Bond, Joan naez, Dr. Benjamin Speck, Rev. William Sloane Coffin, Congrressman Abner Mikva, Sen- ator Adlai Stevenson III,” as well as clergymen, teachers, journalists, editors, attorneys, industrialists, a laborer, a construction worker, rail- road engineers, a postal clerk, a taxi driver, a chiropractor, a doctor, a chemist, an economist, a historian, a playwright, an accountant, an entertamer, professors, a radio amlouncer, athletes, business executives and authors-all of whom became subjects of Army files simply because of their participation in political protests or their association with those who were engaged in such political actirity.12

The IRS Computerized ZnteZlige,nce Zcdcx.--In 1973, IRS estab- lished a central computer index-the “Intelligence Gathering and Retrieval System”-for general intelligence data, much of it unrelated to tax law enforcement. More than -l65.000 ,imericans were indexed in the IRS computer system. including J. Edgar Hoover and the IRS Commissioner, as well as thousands of others also not suspected of tax violation. Sames in newspaper articles and other published sources were indexed n-holesale into the IRS computer. Under the system, in- telligence gathering preceded any specific allegation of a violation, and possible “future value” was the sole criterion for inclusion of information into the Intelligence Gathering and Retrieval System.

CIA’s Opemtion CHAOS.--In seeking to fulfill White House re- quests for evidence of foreign influence on domestic dissent, the CIA gave broad inst.ruct.ions to its overseas stations. These directives called for reporting on the “Radical Left” which included, according to the CTA, “radical students, antiwar activitists, draft resisters and desert- ers, black nationalists. anarchists, and assorted ‘Se\v Leftists’.” 43 CL1 built its huge CHAOS data base on the assumption that to know whether there was significant foreign involvement in a domestic group “one has to know whether each and every one of these persons has any c~onnection to foreigners.” 4a CL1 instructed its stations that even “casual contacts based merely on mut~oal interest” between Americans opposecl to the Vietnam war and “foreign elements” were deemed to

gg 1971 Hearilzgs, pp. 1120-1121. "'1972 Hen,-i,lgs,pp.1123-1138. ” Stein testimong, 1971 Hearings, p. 266. ” “Jlilitarr Surveillance of Civilian Politics.” Senate .Jndiciary Subcommittee

on Constitu6onal Rights Report, 19i3. p. 57. cited hereafter as IW.? IZF~IWt. ‘a Rook Cable from Thomas Karamessines to various European Stations, Jane

1068. M Richard Ober testimony, Rockefeller Commission, 3/28/73, pp. 88-89.

Page 191: Church Committee: Reports-- Book II

175

“casual contacts based merely on mutual interest” between Americans opposed to the Vietnam war and “foreign elements” were deemed to const,itutr “subversive connections.” 45 1’ bimilarlg. CIA’s request to X3,% for materials on persons targeted by tl1e SSA Watch List called fo1 all inforniation regardless of how ikcuoiis it. niay ~~111.” 4G

The Conm1ittce’s in\-estigation has shown that the absence of precise statutory stantlartls and tl1c use of owrbroatl criteria for tlomestic intelligence activity rcsultecl iii the extension of intelligence inrcstigw tions bcyontl their original ‘*subversive ” or violent targets. Intelligence inr-estipations tstendetl to those tl1onpht. to be subject to “snbwrsiw inflwncr.” Moreover, those thought to hare a “potential” for violence were also taiyetctl and. in some caws, inwstipations estrntletl even to those rnqgctl in wholly non-\-iolrnt lawful political expression.

FBI “CONIA’FIL” In r~cstiyations.--r_nde~ the FBI’s COJIIT\‘FIL (“communist infiltration”) program, large n,umbers of groups and individuals engaged in lawful political activity have been subjected to informant coverage and intelligence scn1t.in-y. Although COMTN FIL investigations were supposed to focus on the Communist Party’s alleged efforts to penetrate domestic groups, in practice the target often became the domestic groi~ps themselres.

FBI COJIISFII, investigations wacl1etl into tlonlestic groups in virtually every area of A4merican political life. Tl1e FBI conducte(l (‘OJIT~FIL investigations in sucl1 areas as “religion.” “etlncation.” “veterans’ matters.” “women’s matters.” “Sepro question,” aad “cul- tural activities.” 4y The “entire spectrum of tl1c social and labor move- ment” was covered.‘8

Tl1n overbreadth that results fro111 the practice of investigating groups for indications of coiiiniunist influence or infiltration is illus- trated by tl1e following FBI CO?tIISFIL intelligence investigations:

Nd,4tiP.--hn intensire % rear long surveillance of the KAACP was conducted. ostensibly to determine whether there was Communist infiltration of the SAACP. This surveillance. however. produced detailed intelligence reports on NA4ACP activities wholly Lmrelated to any alleged communist “attempts” to infiltrate the NASCP, and despite the fact that no evidence was ever found to contradict the FBI’s initial findin that tl1e XdACP was opposed to communism.488

,Vol+hcm T’ivgi~za Citizem Concemecl -4bout the ABM.-In 1969. the FBI conducted an intelligence investigation and used informants to report on a meeting held in a public high school auditoriunl at which the merits of the Anti-Ballistic Slissile System were debated by, among others, Department of Defense officials. The in\-estigation was apparently opened because a communist newspaper had commented on the fact that the meeting n-as to be held.4g

Yflfionnl Conference on dm7resty JOT T7ietnam T7efwa97s.-In 1974. FRT informants reported on a national conference sponsored 1~~

ti Cable from CL4 Headquarters to field stations, Xorember 1965, pp. l-3. ” Memorandum from Richard Oher to SSA. Q/14/71. ” 1960 FBI Manual. Section Si, pp. 5-11. 48iZnnual Report of the Attorney General for Fiscal Tear 1955. p. 195. 48a See History of Domestic Intelligence, Report, Part II at note 139. “James .4dams testimony, 11/19/75, Hearings. Vol. 6. pp. 137-138. FBI docu-

ments indicate that another factor in the opening of the inrestigation was the role of the wife of a Communist in nssistillg in publicity wnrk for the meeting. ~JIemorandum from Washington Field Mice to FBI Headquarters. 5/28/X: memnrandnm from Alexandria Field Office to FBI Headquarters. 6/3/69) See Findings B(a), p. 10. for the broad dissemination of reports that resulted from this inquiry.

Page 192: Church Committee: Reports-- Book II

176

C~IWC~I :md civil liberties qyxlp~ to support amnesty for ~Xnnin vet- erans. The investigation n-as based on a t\yo-step “mfiltration” tllcol!-. Otlpr informants had reported that the ~~irtnam YetcraW .\pinst the JTar (which was itself the subject of an intelligrucc investigation because it was thought to be subject to communist or foreign influence) mightv trv to “control” the conference. j” ,~lthougli the conference was thus t&ice removed from the original target, it ws nr~vrrthelcss sub jetted to informant surveillance.

FBI intelligence investigations to find n-hether groltps are sub- ject) to communist or “subversive” influence result in the collection of information on groups and individuals engaged in wholly legiti- mate activity. Reports on the K\‘-UCP wxe not limited to alleged COG-

munist infiltration. Similarly, the investigation of the Sational -in- nestv Conference produced reports describing the topics discussed at the conference and the organization of a steering committee which would include families of men killed in Vietnam and congressional statI aicles.“l The reports on the meeting concerning the ,I1351 system covered the past and present residence of the person who applied to rent the high school auditorium, and plans for a future meeting, in- cluding the names of prominent political figures who planned to attend.52

The trigger for COJiINFIL-type investigations-that subversive “attempts” to infiltrate groups mere a substantial threat-was great- ly esaggerated. &cording to the testimony of FBI officials, the mention in a communist newspaper of the citizens’ meeting to de- bate the ,$BJf was sufficient to produce intelligence coverage of that meeting.53 A large public teach-in on Vietnam, including representa- t.ives of Catholic, Episcopal, Nethodist and I-nitarian churches, as Tell as a number of spokesmen for antiwar groups, leas investigated because a Communist Party official had “urged” party membcw to attend and one speaker representing the W. E. B. DuBois Club was identified as a communist.54 The FBI surveillance of the teach-in re- sulted in a 41-page intelligence report based on coverage by 13 in- formants and sources.55 ,1nd the FBI’s investigation of crl? Free Tyni- versities near colleges and universities -xvas undertaken because “sev- eral” allegedly had been formed by the Communist Party “and other subversive groups.” 50

Similarly. the FBI’s broad COXSFIL investigations of the civil rights movement in the South were based on the FBI’s conclusion that the Communist Party had “nttempted~’ to take advantage of racial un- rest and had “e&wcored” to pressure C.S. Government officials “through the press, labor unions and student groups.” 57 [Emphasis

“‘Raymond W. Wannall testimony, 12/2/i5, Hearings, Vol. 6, p. 139. “Memorandum from Louisville Field Office to FBI Headquarters, 11/21/74. m Memoranda from Alexandria Field Office to FBI Headquarters, 6/5/69. ” Adams, 11/19/75. Hearings, Vol. 6, p. 138. a Memorandum from Philadelphia Field Office to FBI Headquarters, 3/2/66. C-T Memorandum from Philadelphia Field Office to FBI Headquarters, 3/2/66. ” Memorandum from FBI Headquarters to Detroit Field Office, 2/1’7/66. ai SIrmorandum from J. Edgar Hoover, Chairman, Interdepartmental Intelli-

gence Conference. to McGeorge Bundy, Special Assistant to the President for Xa- tional Security. i/25/61, enclosing IIC Report. Status of P.S. Internal Secu- ritr Programs. See Findings on Political Abuse. p. 225 for discussion on the larger impact of such FBI terminology.

Page 193: Church Committee: Reports-- Book II

177

‘1’1~ Conmlittcc fintl~ t Ilat (‘O>ITSFTT, in\-c+tigatims have been based on an exaggerated notion of the threat 1ms~1 1)~ “snb~~ersiws” ant1 foreign inflntnc>e on ,\inerican I)olitic*al esl”.ession.‘Tllcre has been an unjnstifietl belief that Ainericxns need inforniants and go\-eriiinent sur\-cillancc to protect thcnl from ‘*snbrersi\-e” infliicnce in their miens. chnrches. scliools, prties and political eft’orts.

Im*estir/crtio?zs of 71vAo77y :l’o,,-T’iole,lt Politico/ Z:‘cl’r~esaio7~.-l>o- nwstic intelligence’ investigntions have estencled from those ~110 Colll-

init or arc lilicl~ to coinmit violent acts to those thought to hare a “PO- tent i al” for vihlenw . :lntl tllcn to thou engxgcd in purely peaceful political expression. This characteristic was graphically clescribed b; tile \vliite TIorw otkicinl who cooidiiixtetl the iiitelligenw agencies f.ec~oiliirlcii(l~itioiis for “espiiidetl” (and illegal) co\-erage iii 1970. Hc testified that intelligence investigations risked moving

from tile kit1 with n I~oinb to the kit1 u-itli n piclvt +n. and from the kit1 with the picket sign to the kit1 with ,the bumper sticker of the opl)wing c~ailclitlntc. A1iltl yowl jiwt keep going clown the line.“i

Wi:hout prcc~:ise s;an~la~ds to restrictit their scope. intelligence inr-es- tigntioii6 (lit1 nlo\-c bepntl those who coniillittctl or were likely to conunit cr*iminal 01’ violent acts. Fof~c~.wm1~lc :

-I>r. -\Iartin Luther King,, *Jr.! was targeted for the FBI? COIN TELPR.0 operations against “Black Sationalist-Hate Grol~ps” on the tlleory. withont factual justification, that T>r. King might “nbanclon” his adherence to nonriolencc.5”

-The intcwsi\-r I;I3T in\-cs:igation of the ~‘O~IICI~‘S T,iberation ~lovenieiit was similarly predicated on the theory that the activities of women iii that MO\-cnient might leatl to tl~~~iioii~tl~:~tioiis ant1 \-iolen(~e.“”

The (‘ommittec finds tllnt such intelligence sur\-eill:tncc of groups aJJtl illdividllak has glwltly Exceetkd the lrgitilllnte ilitelwt of tlifa

povemilient iii law enforcement and the prevention of riolenw. Where imsnpported determinations as to “potcnti:d” belli~\-iOr are tlJe basis for

” ‘l’onl Charles Hnston testimon,v. 9/23/75. Hearings. Tol. 2. I). 45. x1 JIen~ornndum from FBI Hwdqnnrters to all SAC’s, 3/4/6S. ““1\IPmora~~dunl from Sr\v York Field Office to FBI Headquarters. 5/S/69.

( IIcnringx. Vol. 6. Exhibit 54.) ” JIemomntlnm from Esecutires Conference to Tolson. 10/29/70. ” Froehllre, 1971 Hearings, p. 384.

68-186 0 - 16 - 13

Page 194: Church Committee: Reports-- Book II

178

snrreillancc of groups znd intlil-iduals, no one is safe from the inquisiti\-c c~-c of tllc intclligenc~r~ agency.

A’rrbplczirzgs (cl) Intelligence agencies pursued a “vac~iuin cleaner” :~l~l~roach to iii-

telligence collection-dra\T-ii~~ in all arailablc inforination abollt groups and individuals, including their lawful political activity and details of their personal lives.

Intelligence agencies collect an excessive anlount of infornintion 1~~ pursuing a “\-:~cllIl111 clrn11cl-” :~pl~roacli that draw in all available inforniation. including lawful politicyll acti\-it)-. lwrsonal matters, and triria. Even n-here the theory of the investigation is that the snl)- ject’ is likely to be engaged in c&minnl or violent activity, the OVCP broad approach to intelligence collection intrudes into per.sonal niatters unrelated to such criminal or violent activity.

FBI officials conceclecl to the Colnlnittee that in conducting bowed intelligence investigations to determine the “real ln~iyo~e” of ail or- ganization, they sonietinies gathered “too inuch inforniation.” li3

The FBI’s infclligence inr-estipation of the “Sew Left.” for esanlple. was directed towards a “col~~l~rcll~~llsi~e study of the whole movcnwnt” and producecl intcnsire nlonitorinp of such subjects as ‘*support of movement by religious. groups or individunl$. ” “denioiisti.aCioi~s ainird at social reforni,” *” lndlcntions of support by n~ss nledia,” “all a&i\-it> in the labor field,” and “efforts to influence public opinion. the eleca- torate and Gal-ernmcnt bodies.” ~4

Similar overl~rcntltl~ characterized the FBI’s collection of intelli- gence on “white niilitnnt ,croups.” In 1968 FBI field offices were in- Strllctecl not to pitlier inforination solely on actual or potential violations of lav- or \-iolcncr, but to use informants to deterniine the “minis anal l~url~oscs of the organization. inenibersliip” and otliel

its lentlers. approxiniatc

“niilitnncr.” iii “bnckgroiintl data” relating to the group’s

In 1O’il the criteria for in\-estigating individuals were widened. ‘Special A’qents in Charge of FRI field offices were instructed to investigate not onlr persons with % potential for violence3” but also anyone else “~110 ii1 judgment of S_4C should be subject of inresti- pxtion due to cxtrrinist activities.” FG

Even in searching for indications of potential violence in black urban areas or in collecting information about violence-prone Ku Klux Klan chxl~tcrs. there was lnnrked o\-erbreadth. In black urban areas, for example. FBI agents were instructed to have their inforn- ants obtain the I~:~~ws of (‘ AIfro-Aherican type bookstores” and thei “om-ners, operators and clientele.” w The act’ivities of civil rights and black groups as w-cl1 nS d&ails of the personal lives of Klan memhws, were reported on by an FBI intelligence informnnt in the Ku Klux Klall.G’a Cndcr this approach. the average citizen who nierely attends n meeting, signs a petition. is l&wd on ;\ mailing list. or visits a book store, is subject to being recorded in intelligence files.

A striking example of informant reporting on a11 they touch ws provided by an FRI informant in an antiwar group with only 55

” Memorandum from Philndclphia Firld Office to FRI Hendquartrrs. 8/12/C?. ‘ia Ron-e, 12/2/i& Hearings, Vol. 6. 11. 116.

Page 195: Church Committee: Reports-- Book II

170

regular members and some 250 persons who gave occasional supl)ort. The informant estimated she rel)ortecl ncarlv 1.000 names to the FIST in an 18-month period-M-70 percent of whom \vere members of other groups (such as the Ihited Church of Christ and the ,~mericnn Civil Liberties ITnion) which were engaging in peaceful. lawful lwlitical activity together with the antiwar groiip or who were on the grotip‘s mailing list.“s Similarlv in the intelligence investigation of the Women’s T,iberation Jldvement. informants reported the identities of individual n-omen attending meetings (as well as reporting such matters as the fact that women at meetings had stated “how they felt oppressed. sexually or 0therCse.“) .6L)

Such collection of “intelli,gence” unrelated to specific criminal Or

violent activity constitutes a serious misuse of governmental power. In reaching into the private lives of individuals and monitoring their lawful political activity;-matters irrelevant to any proper govern- mental interest-domestic intelligence collection has heen unreasonably broad.

s’u6 fi?zdhg (e) Intelligence investigations in many cases continued for excessively

long periods of time, resulting in sustained gorernmental monitoring of political activity in the absence of any indication of criminal con- duct. or “subversion.”

One of the most disturbing aspects of domestic intelligence inves- t$ations found b.y the Committee was their excessive length. Intel- ligence investigations often continued, despite the absence of facts in- dicating an individual or group is violating or is likely to violate the lax:, resulting in long-term gorrrnment nionitoring of lawful political activity. The following are examples :

(i) The FBI l?ltel!igcnce lnr~estignfion. of the n’dA(?P (lU& 1%X) .-The, investigation of the S,L%CP began in 1011 and continued for at least 25 years. Initiated according to one FI31 report as an investigation of protests by 15 black mess attendants about racial discrimination in the Sal-y.; ” the investigation espiidccl to encompass SAIAICI’ chal)ters in cities across the nation. Although the ostensible purpose of this invrstipation n-as to tleteniiiiir if there was “Com- munist infiltration” of the ?\‘-L\CP. the investigation constituted a long-term monitoring of the SAIA1(Ys wholly lawful political activity by Fl3T informants. Thus :

-The FBI Sew York Field Office submitted a 137-page report to FI3T heatlonartcis describing the national office of the S,L1CP, its national convention. its .gron-th am1 mcmbrrship, its officers and di- rectors, and it5 stand against Conimunisni.~l

--An FBI informant in Seattle obtained a list of KL\ACP branch otlicers and reported on a meeting where signatures were gathered on a “petition clirrctrtl to President IGsenhowcr” and plans for two mem- bers to go to Washington. D.C.. for a “Prayer Pilgrimage.” i2

88 Mary Jo Cook testimony. 12/2/E. Hearings. Vol. 6, pp. 112, 120. O0 Memorandum from Kansas Citr Field Office. 10/2O/iO : memorandum New

Ye>rk Field Office. ,5/28/GD : memnrandum from Baltimore Field Office. Z/11/70 to FRI Headquarters. CIi\ agents in the ITnitwl States also rrlmrted nil Wnmen’s TLlleratinn activities in the cnurse of their preparation for nverseas duty in Operation CH.1OS. IAgent 1. Contact Report. Tel. II. Agent 1 file.)

TO JIemnrandum from Washington Field Office to FBI headquarters, S/11/41. il JIemornndum from Sew York Field Office to FBI Headquarters. 2/12/.57. ‘2Memorandun~ from Seattle Field OfTke to FBI Headquarters, 6/l/57.

Page 196: Church Committee: Reports-- Book II

180

-In 1966, the Sew York Field Office reported the names of all SA1hCP national officers and board nwmbers, and summarized their political associations as far back as the 1940~.~~

-As late as 1966: the FBI was obtaining SLYAACP chapter member- ship figures by “pretext telephone call . . . utilizing the prete.xt of being interested in joining that branch of the SIUCP.‘Y :*

-Based on t.he reports of FBI informants, the FBI submitted a detailed report of a 1956 S,UCP-sponsored Leadership Conference on Civil Rights and dcsrribed plans for a Conference delegation to risit Senators Paul Douglas. Herbert Lehman, Wayne Morse, Hubert Humphrc~. and ,Jolm Bricker.;” Later reports covered what, transpired at several of these meetings with Senators.‘” Most significantly, all these reports were sent to the White House.i7

(ii) The FBI Intelligence In?*P.stigntion of the Sociulist Workers Pndy (15’40 to dote) .-The FBI has investigated the Socialist, Work- ers Party (SWP) from 1940 to the present day on the basis of that Party’s revolutionary rhetoric and alleged international links. Kerer- theless, FBI officials testified that the SWP has not been responsible for any violent acts nor has it urged actions constituting an indictable incitement to violence.‘7a

FBI informants hare been reporting the political positions taken by the SWP \vith respect to such issues as the “Vietnam War,” “racial matters, ” “1’23. involvement in Ar?gola. ‘? “food prices.” and any SM7P efforts to support a non-SWP candidate for political office.78

Moreover, to enable the FBI to develop “background information” on SWP leaders, informants have been reporting certain personal aspects of their lires, such as marital status.7s The informants also have been reporting on SWP cooperation with other groups Iv-ho are not, the subject of separate intelligence inrestigations.80

(iii) The Efort to Prow n’egati?res.--Intelligence investigations and programs have also continued for excessively long periods in ef- forts to prove negatives. CIA’s Operation CHAOS began in 1967. From that year until the program’s termination in 19’74,s’ the CIA repeatedly reached formal conclusions that there v-as negligible for- eign influence on domestic protest, activity. In 1967, the CIA concluded that Communist. front groups did not control student organizations and that there were no significant, links with foreign radicals; 82 in 1968, the CIA concluded that V.S. student protest was essentially homegrown and not stimnlated by an international conspiracy ; 83 am1 in 1971 the CIA found “there is no evidence that. foreign governments. organizations, or intelligence serrices now control U.S. Xew Left

‘is Memorandum from Sew York Field Office to FRI Hendauarters. 4/15/6.5 ” Memorandum from Los Angeles Field 0ffice to FRI Hea;lqoarters.‘4/iJ/BG. ” Memorandum from Hoover to Anderson, 3/S/56. ” Memorandum from Hoover to Anderson, 3/6/56. i7 See Findings on “Political Abuse.” “’ Robert Shackelford testimony, 2/2/X ; pp. SO-90. is Shackelford, 2/Z/76, p. 89. ” Shackelford, 2/2/i6 ; p. 90. M Shackleford, 2/2/76. p. 92. bl See Findings, “Deficiencies in Control and Accountability”, p. 265. *’ CIA memorandum, “Student Dissent and Its Techniques in the I.S.“, l/5/68. h3 CI.1 Report, “Restless Youth,” Conclusions, p. 1, 9/4/6S.

Page 197: Church Committee: Reports-- Book II

181

Movements . . . the T-.S. Sev; Tlcft is l~asicnlI~ self-snfficient and mores under its own inipetlis.” 84

The result of these rcpeatetl findings was not the termination of CII,1OS’s survcillanc~e of A1ntericans, but its redoubling. Presidents .Johnson and Sixon pressl~recl the CL4 to intensify its intelligence ef- fort. to fintl cl-iclence of foreign tlircction of the T-.8. peace movrmcnt. -1s Director IIcIms testified :

When a President keeps asking if there is ai?y information. “how are you petting along with, hour examination,” “hare. you picked up any more information on this subject,” it isn’t a direct order to do something, but it. seems to me it behooves the Director of Central Intelligence to find some way to im- prow his performance, or improve his Agency’s perform- ance.s5

In an effort to pro\-cx its negative finding to a skeptical White House- and to test its validity each succeeding year-CL4 expanded its pro- pra.m, increasing its coverage of Amerlcnns overstas and building an ever larger was exc,hanged

“data ba.se’! on domestic political activity. Intelligence with the FBI, SS.4. and other agencies, and even-

tually CIA agents who hat1 infiltrated domestic organizations for other purposes supplied general information on the. groups’ activi- ties.86 Thus. the intelligence mission became one of continued surveil- lance to prove a negative. with no thought to terminating the pro- gram in the face of the negative findings.

As in the CHAOS operation, FBI intelligence invest,igations have often continued even in the absence of any evidence of “subve.rsive” activities merely because the subjects of the investigation have not tlcmonstrated the.ir innocence to the FBI’s satisfaction. The Iong- term investigations of the SAA4CP and the Soc,iaIist Workers Party described above. arc typical examples.

h striking illustration of FBI practice is provided b,v the intelli- gence investigation of an advisor of Dr. Martin Luther King, Jr. The advisor was inr-cstigwted on the theory that he might be a commu- nist “synipatliizw.” The Bureau’s Xew York office concluded he was not.*’ TTsiy a. theory of “.guiItg until proven innocent.” FBI head- quarters tlirectetl that the investigation contiiiile :

The Bureau does not, agree with the expressed belief of the Sew York office that [ 1 8* is not svmpathetic to the Party c.ause. While there may not be any evidence that [ ] is a Comnlunist neither is there any substantial evidence that he is xnti-Coii~inuiiist.“9

a CIA Report, “Definition and Assessment of Existing Internal Security Threat--Foreign,” l/5/71, pp. 1-3.

hi Richard Helms testimony. Rockfeller Commission. 4/Z/76, pp. 2434-2435. lIelmS further testified : “President .Jolmson n-as after this all the time this WZlS something that came up almost daily and weekly.” Helms. Rockefeller Corn- mission. l/l.?/iT,. 1,~. 163-161.

w SW CHAOS Report : Section IT D, “Operations of the CHAOS program and Related PI.\ I’rojects,” and II E, “lW!f Expansion of CHAOS.”

” ~Iemorandnm from Srw York J?ield Office to FBI Headquarters, 4/14/G. ky Same deleted by Committee to protect privacy. *” JIemorandnni from FBI IIeadqnarters to Sew York Field Office, 4/24/B-l.

Page 198: Church Committee: Reports-- Book II

182

Where citizens must demonstrate not simply that they ha.ve no

connect ion with an intell@mx ta.rget. but must exhibit “substant.isl eridence” that they are m opposltlon to the targst~, intelligence in- vestigations are indeed open-ended.

Page 199: Church Committee: Reports-- Book II

The intelligeaco community has cmplo~ed surreptitious collection techniques-mail opening. snrreptitions ent.rirs. informants, and “t,raclitional” and highly sophisticated forms of electronic surveil- lance-to achicre its owrly broad intelligence targeting and collec- tion objectives. Although there are circlnnstances where these tech- niques. if properly controlled. are legal and appropriate, the Committee finds that their very nature makes them a threat to the personal privacy and Constitiition;lll~. protected activities of both the targets and of persons n-ho commmucate with or associate with the targets. The dangers inherent in the use of these techniques hare been corn-

ponndetl by the lack of adequate standards limit&g their use and by the absence of review by neutral authorities outside the intelligence agencies. ,1s a consequence, these techniques have collected e110r3110115

amounts of personal and political information serving no legitimate powrninental interest.

tTubfin.dings

(a) Given the highly intrusive nature of these techniques,l the legal standards and procedures regulating their IISC hare been insufficient. There have been no statutory controls on the use of informants; there have been gaps and exceptions in the law of electronic snrveil- lance ; and the legal prohibitions against warrantless mail opening and surreptitious entries have been ignored.

(b) In acldition to providing the means by which the Government, can collect too much information about too many people, certain techniques have their own peculiar dangers :

(i) Informants hare provoked and participated in violence and other illegal activities in orcler to maintain their cover, ancl they haw obtained membership lists and other private documents.

(ii) Scientific and technological advances hare rendered traditional controls on electronic surveillance obsolete and have made it more difficult to limit intrusions. TSecanse of the nature of wiretaps, micro- phones and other sophisticatecl electronic techniques. it has not always been possible to restrict. the monitoring of commLuiications to the per- sons being investigated.

(c) The imprecision and manipulation of labels such as “national

1 The techniques noted here do not constitute an eshanstire list of the sur- rrl?titious means I)$ which intelligence agencies hare collected information. The FBI, for esnmple, has obtained a great deal of financial information about Amer. ican ciitzens from tax returns filed with the Internal Revenue Service. (See IRS Rel)ort : Sec. I. “IRS Disclosures to FBI and C’IA.“) This section, hoverer, is limited to problems raised hy electronic surveillance. mail opening. surreptitions entries informants and electronic surveillances.

( 183 1

Page 200: Church Committee: Reports-- Book II

184

securitv, ” “domestic sccuritr,” “subversive activities,” and “foreign intclli&ncc” Iia\*e led to unj~istifiecl use of these techniques.

Elaborntion of Findh y-s The preceding ewtion described 110~ the absence of rigorous stand-

ards for openmg, controlling, and terminating investigations sub- jected manv diverse elements of this society to scrutiny by intelligence agencies. &thout their beiq suspected of violating any law. Once an investigation was opened. almost any item of information about a target’s personal behavior or political views was considered worth collecting.

Extremely intrusive technirp~es-such as those listed abore-haw often been usecl to accomplish those overly broad targeting and collec- tion objectives.

The paid and directed informant has been the most extensively used technique in FBI domestic intelligence investigations. Informants were used in 83% of the domestic intelligence investigations analyzed in a recent study by the General Accounting Office.‘” As of ,June 30. 1975. the FBI rvas using a total of 1,500 domestic intelligence infor- mants.2 In 1912 there were over 7.000 informants in the ghetto infor- mant program alone. In fiscal year 19’76. the Bureau has budgeted more than $7.9 million for its domestic intelligence informant program. more. than twice the amount allocated for its organized crime infor- mant program.3

Wiretaps and microphones have also been a significant. means of gathering intelligence. I’ntil lDi2. the FBI directed these electronic techniques against scores of L1merican citizens and domestic orpaniza- tions during investigations of such matters as domestic “subversive” activities and leaks of classified information. The Bureau continues to use these techniques against foreign targets in the I’nited States.

The most extensive use of electronic surveillance has been by the Xational Securitv ,\,gency. KS.4 has electronicallv monitored (with- out wiretapping in the traditional sense) international communication links since its inception in 1952: because of its sophisticated technol- ogy. it is capable of intercepting and recording an enormous nnmbei of communications between the. I-nited States and foreign countries.4

-211 mail opening programs have now been terminated, but a total of twelve such operations were conducted bv the CIA and the FBI in ten American cities between 1910 and 1973.” Four of these were oper- ated by the CIA. whose most. massive project, involved the opening of more than 215.000 letters between the T-nited States and the Soviet T’nion over a twenty-year period. The FBI conducted eight, mail open- ing programs. three of which included opening mail sent between two points in the United States. The longest FBI mail opening program

I* Report to the House Committee on the .Judiciarg, by the Comptroller General of the United States, “FRI Domestic Intelligence Operations-Their purpose and scope: Issues that Seed to be Resolved,” Z/24/76. p, 96.

* FBI memorandum to the Select Committee, 11/28/75. 3JIemorandnm. FR1 Overall I?ztclligcncc Progrnm FY 1977 Cmparcd fo FY

1976 nndatrd. The cost of the intelligence informant program comprises payments to informants for nerrices and expense as well as the costs of FBI personnel. support and nrerhead.

‘See SSA Report : Sec. I. “Jntrnduction and Summnryr.” ‘See Mail Opening Reports: Sec. I, “Summary and Principal Conclusions.”

Page 201: Church Committee: Reports-- Book II

’ Title 2s of the I*nitrd States (‘ode prorides ~)nlr that :Il)l)rol)ri;~tior~s for the I)rlmrtmriit of Jnstiw are arailal~lr for lmyment rtf informants. 2S T7.S.(‘. 5 5’24.

’ The .\ttomey General has nnnomcetl that he will issue guidelines on the use of informants in the near fntnre, illid nilr recomiiirnd:ltiolls I)roride standards for ilkfornlallt control and lm~liil~itions on informant nctiyitg. (See pl). 3X) In atltlitilln. the Attorlie.7 Genrral‘s recently proim~lgalrd giiitlelines 011 “I~omestic Swurity Inwstipation” limit thr nsc of iiifornxints at ‘thr early stngw of snrl1 inquiries rind lrroritle for rw-iew 11.v the .Jwtice Ikpnrtment of thr initi:ition of “fllll i~lrrstigntinlls” in which ne\v infornmnts may be recrnited.

Page 202: Church Committee: Reports-- Book II

186

’ In a criminal case inrolring charges of jury bribery. L-nifed S’f0tc.s V. Hoff~. 3% T’.S. 293 (I%.%). the Si~prcme (‘olut ruled thnt an infomxlnt’s testimow concerning conversations of n defendant could not IN-J considered the product of a wnrr:1ntlrss search in riolntion of the Fourth A\nlendment 011 the ground the defendant had c*onsentrd to the presence of the informant. In nnntlib criminal case. Lcu-is v. TTlritcd Stntcs. 38.5 T.S. 206 (1960). the Court stated that “in the detection of many typrc of crimes. the Gowrmnent is entitled to use decoys ilnd to conceal the identity of it< agents.”

’ In a more recent case. the Cnlifornia Snpremc Conrt held tll:lt srrrrt snrrrill:~ncc of classes and group meetings at n nnirereity thron,gh the use of undercorer agents was “liltrly to lww a snlwtantinl rrctmint upon the esercisr of First Amendment rights.” l171!itc v. Dnvis. ,533 Par. Rrp. 2tl. 223 (1075) (‘iting :I nnmlwr of T.S. Snl>rrnl~~ Court olbilliolls, the C’:lliforlliil Snprrmc Coiirt st;i ted in its iimllimolls tlpcisiou :

“In Tie\\- of this significant lwtentinl clrillin, cr effect. tllc chnlleng~l wrwil- lnncc activities can 01lly lw snutninetl if [the Go~ernnrent] can demonstrate n ‘conipellin,g’ state interest which justifies the rrsnltnnt deterrence of First .\mendment rights and which c:i1innt he served 1)~. xltrrnatire means less instru- i;i\-e 011 fmldamentnl rights.” 533 Pac. Rel). 2d. at 232

I” G:irr Ron-r twtimonr. E/1! /iS Hparilies. Tnl. 6. 1m. 111. 11s.

Page 203: Church Committee: Reports-- Book II

187

as it has seen fit. and, iii the case of SS_\ nionitoring, the stmclxrcls ;ind procedures for the use of electronic surveillance vcrc not :ippliecl at all.

When the Supreme Court first considered wiretapping, it lielcl that the warrantless 1150 of this technique was constitutional becallse the Fourth Amendment’s warrant reqldrement applied only to ph~sicd trespass ant1 did not extend to the seizure of con\cixition. This decision. the 19% cilsc of 077nstcurl v. Clzifed LCtcrfcs. inrolrecl a crini- inxl prosecution. and left federal agencies free to engage in the unrestricted use of wiretaps in both criminal and intelligence investi- gat1011S.13

Six years later: (‘ongress enacted the Fetleral Commmiications hct of 1934, which nmclc it a crime for “any l)erson, ** without anthorizatioll, to intercept and tlivnlgx~ or publish the contents of wire and racllo commllnications. The Suprcnie Court subsequently constrwvl this sec- tion to apply to federal agents as well as to ordinary citizens, and heltl that eridencc obtainecl directlv or indirectly from the interception of

wire and radio comnunicnti& w-as not htlmissible in court.14 But Congress acquiesed in the ,Jnsticc Department’s position that these c~~cs prohibitecl only the tli\-ulpence of contents of wire coniinunica- tions outside the executive 1~1xncli.~~ and Gorernnicnt wirctapl)ing for intclliprncc pi~rposes other than pumcution continued.

On the groui~d that neither the 1944 Act nor the Snpreinr Court tlecisions on wiretappin g were iiwant to apply to “grave matters in- volving the defense. of the nation,” President Franklin Roosevelt. anthorizccl Attorney General dacltson in 1940 to npprove wiretaps on “persons wlspectctl of subversive activities against, the Govern- ment of the I-nitccl States. including snspectecl spies.“1G In the abscncc of any gniilance from (‘ongrcss or the Court for another quartcl century, the csccntiw branch first broatlened this standarcl in 1946 to permit wiretapping iii “cases vitally affecting the domestic secnrit1 or where hi~nlan life is in jeol~ard~,“‘7 ant1 then iiiotlifiecl it in 1965 to allow wiretapping in “‘inr-estigations related to the national se- curity.” I8 Tntemnl ,Justice Department policy reclnire(l the prior approval of the Attorney General before the FBI coultl institnte wire- taps in particular cases,‘” but until the mid-1960’s there was no require-

1307tt1Steudv. Cuited fitntes,X7T’.S.J38 (1928). ‘I J~urtlorlc v. TVtrit,ct/ Sttctcs. 302 lT.S. 395 (193-i) ; 30s I’.S. 33s (1939). ” For esamplc, letter from Attorney (;enernl .Jnckaon to Rcl). Hatton Summers,

3/19/41 : See Electronic Snrveillanw Iiepc,rt : Sec. I I. lo Xemornndum from President Rooserelt to the Attorney General S/21/40. I’ Letter from Attorner General Tom C. Clark to President Truman. 7/li/46. ” Directive from President .Jolmsou to Heads of Agencies, 6/30/65. I” President Roosevelt’s 1MO order dirwted the Attorney General to approve

n-iretaps “after inrestigation of the need in each case.” (Memorandum from I’rcsident Roosevelt to Attorney General Jacl~son, S/21/40.) Howerer, Attorney General Francis Biddle recalled that Attorney General Jackson “turned it over to Edgar 1Ioorc.r without himself lussing on each Case” in 1940 and 1941. Biddle’s practice bcgimling ill 1941 conformed to the President’s order. (Francis Biddle, 1~ Ijricf Arctllority (Garden City : Doubleday. 1962), 1~. 16i.)

Since 1965, explicit written authorization has l)eeil required. (Directive of I’resident .Joh~lson 6/3O/lK ) This reclnirtment however. has often been dis- regarded. In violation of this requirement. for example. no written autliorizatiow were olbtained from the .\ttorney General--or from any one else-for a series of four wiretalls imlllementetl in l!)il alltl 1X2 on Teomnii (‘lmrlrs Ratlfortl. two of his friends, and his father-in-law. See Electronics Snrreillance Report ; Sec. VI.

(Continued)

Page 204: Church Committee: Reports-- Book II

188

me.nt of periotlic reapproval by the ,ittorncy General.ZO In the abscncc of any instruction to terminate them, some. \viretaps reniained in effect for years.*l

In 1967, the Supreme Court reversed its holding in the Olmstea~Z case and decided that the Foiirth A~niendnient’s warrant requirement did apply to electronic surveillancesZZ It expressly declined, hon-crer. to extend this holding to cases involving the “national security.” ZZa Congress followed suit the next year in tlie Omnibus Crime Control Act of 1068. wliicli established a warrant procedure for electronic sur- veillance in criminal cases but included a provision that neither it nor the Federal Communications -1ct of 193-l “shall limit the constitutional power of the President.” z A~ltl~oupl~ Congress did not purport. to define the President’s power, the ,1ct referred to five broad categories which thereafter served as the ,Justice Department’s criteria for war- rantless electronic surveillance. The first three categories related to foreign intelligence and counterintelligence matters :

(1) to protect the Sation against actual or potential attack or other hostile acts of a foreign power;

(2) to obtain foreign intelligence information deemed essential to the security of the United States; and

(3) to protect the national security information against for- eign intelligence activities.

The last two categories dealt with domestic intelligence interests :

(4) to protect the United States against, overthrow of the gor- ernment bv force or other unlawful means. or

(5) against any other clear and present danger to the structure or existence of the government.

In 197’2, the Supreme Court held in United St&es v. United Xtates District Court,23a that the Presiclent did not have the constitutional power to authorize warrantless electronic surveillances to protect the

(Continued) The first and third of these tans were imnlemented at the oral instruction of Attorney General John Mitcheli. (Memorandum from T. J. Smith E. S. Miller, 2/26/73.) The remaining taps were implemented at the oral request of David Young. and assistant to John Ehrlichman at the White House, who merely in- formed the Bureau that the requests originated with Ehrlichman and had the Attorney General’s concurrence. (Memorandum from T. J. Smith to E. S. Xiller. 6/14/73.

*’ Attorney General Sicholas Katzenbach instituted this requirement in March 196B. (Memorandum from J. Edzar Hoover to the Attorner General. 3/3/6.X)

n The FBI maintained one wiFetap on an official of the Sation of Islam that had originally been authorized by Attorney General Brownell in 1957 for seven years until l-964 \lithout any subsequent re-authorization. ( JIemorandum from J. Edgar Hoover to the Attorney General, 12/31/65, initialed “Approved: HB, l/2/57.“)

As Kicholas Katzenbach testified : “The custom was not to put a time limit on a tap, or any wiretap authorization. Indeed, I think the Bureau would have felt free in 1965 to put a tap on a phone authorized by Attorney General Jackson before World War II.” (Sicholas Katzenbach testimony. 11/12/75, p. 87.)

B Lutz r. C’nitcd States, 389 lT.S. 347 (1967). 2?n The Court wrote : “Whether safeguards other than prior authorization b$

n magistrate would satisfy the Fourth Amendment in a situation inrolling the national security is a rluestion not 1)rcsented by this case.” 3s9 1..s. at Frls 11. 23.

23 1s U.S.C. 2511 (3). z?a 407 U.S. 297 (1972)

Page 205: Church Committee: Reports-- Book II

189

nation from domestic threats. *( The Court pointedly refrained! how- ever, from any “juclgment on the scope of the Presidents’ surveillance power with respect to the act,ivities of foreign powers. within or with- out this country.” 25 Only “the domestic aspects of national security” came within the ambit of the Court’s decision.*”

To conform jvith the holding in this case, the Justice Department t.hereafter limited warrantless wire tapping to cases involving a “sig- nificant, connection with a foreign power. its agents or agencies.*’

At no time, however. x-ere. the Justice Department’s standards and procedures ever applied to KSh’s electronic monitoring system and its “watch listing” of American citizens.28 From the early 1960’s until 1973, SSA compiled a list. of individuals and organizations, including 1200 American citizens and domestic. groups, whose communications were segregated from the mass of communications intercepted by the Agency, transcribed, and frequently disseminated to other agencies for intelligence purposes2”

The Americans on this list, many of whom were active in the anti- war and civil rights movements, were placed there by the FBI, CIA, Secret Service, Defense Department, and NS4 itself without prior judicial warrant or even the prior approval of the Attorney General. In 1970, KSA began to monitor telephone communications links be- tween the United States and South America at the request of the Bureau of Narcotics and Dangerous Drugs (BNDD) to obtain infor- mation about international drug trafficking. BNDD subsequently submitted the names of 450 American citizens for inclusion on the

‘I At the same time, the Court recognized that “domestic security surveillance” mav involve different nolico and nractical considerations anart from the surveil- lance of ‘ordinary crime,’ 407 V.S. at 321, and thus did noi hold that “the same type of standards and procedures prescribed by Title III [of the lW3 Act] are necessarily applicable to this case.” (407 U.S. at 321.) The Court noted :

“Given the potential distinctions between Title III criminal surveillances and those involving the domestic security, Congress may wish to consider protective standards for the latter which differ from those already prescribed for specified crime in Title III. Different standards may be compatible with the Fourt Amend- ment.” (407 U.S. at 321.)

=407 U.S. at 307. “‘407 U.S. at. 320. United States I-. lTnitcd States District Cow-t remains the

onlv Sunreme C,ourt case dealine with the issue of warrantless electronic sur- veillance for intelligence~purnoses, Three federal circuit courts have considered this issue since 1072, however. The Third Circuit and the Fifth Circuit both held L that the President mar constitutionally authorize warrantless electronic surveil- lance for foreign counterespionage and foreign intelligence purposes. [United Rtatcs v. Buterrko, 494 F.2d 303 (3d Cir. 1X4), cert. denied srtb nom. Icanov r. l:jzited States, 419 U.S. 881 (lQi4) ; and 1,.nitcd Staten v. Brown, 484 F.2d 418 (5th Cir., 1973), cert. denicd 413 U.S. 960 (1974) .] The District of Columbia Cir- cuit held unconstitutional the warrantless electronic surveillance of the Jewish lkfensr League, a domestic organization whose activities allegedly affected I-.S. Soviet relations but which was neither the agent of nor in collaboration with a foreign power. [Ztccibon v. Mitchell, 516 F.2d X4 (D.C. Cir., 1075) (f?ll. bane) .]

zi Testimony of Deputy Assistant Attorney General Kevin Maroney. Hearings before the Senate Subcommittee on Administrative Practice and Procedures, 6/29/i” -. n. 10. This laneuaee naralled that of the Court in Unit& Rtnfcs v. f’nijcd Si<,tes Di,strict CoFrt~4Oi T.S. at 3OQ n. Cc.

28 Although Attorney General John Jlitchell and .Justice Department officials on the Intrlligrn~e Evaltmtion (‘ommittee apparently lrnrnrd that SS.k was making :I contribution to domestic intellieenct in I!171 there is no indicntion that the E’RI toltl them of its submission of names of hmericans for inclusion on a SSA “nat~h list.” When Assistant Attorney Gcweral I1cnr.v I’rtersen learned of these l)rnctices in lQi3. Attorney General Elliott Richardson ordered that they be terminated. (See Report on SSA : Sec. I, “Introduction and Summary.“)

x See SSh Report : Sec. I, “Introduction and Summary.”

Page 206: Church Committee: Reports-- Book II

190

JT7atch List, again without warrant or the approval of the Attorney Genera1.30

The legal standards and procedures regulating the use of micro- phone snrreillance have traditionally been even more lax than those regulating the use of wiretapping. The first major Supreme Court decision on microphone surreillance was Goldman ~7. Qrziited States, 316 ES. 129 (1942), which held that such surveillance in a criminal case was constitutional when the installation did not involve a trespass. Cit,ing this case. Sttorney General McGrath prohibited the trespas- sory use of this technique by the FBI in 1952.31 But two years later- a few weeks after the Supreme Court denounced the use of a micro- phone installation in a criminal defendant’s bedroom 32--httorney General Brownell gave the FBI sweeping authorit;y to engage in bugging for intelligence purposes. ((. . . (C) onsideratlons of internal security and the national safety are paramount,” he xvrote, “and, there- fore, may compel the unrestricted use of this technique in the national interest.” 33

Since Bromnell did not require the prior approval of the Attorney General for bugging specific targets, he largely undercut the policy that had developed for wiretapping. The FBI in many cases could

obtain equivalent coverage by utilizing bugs rather than taps and would not be burdened with the necessity of a formal request to the Attorney General.

The vague “national interest” standards established ,bv Brownell. and the policy of not requiring the Attorney General’s prior approval for microphone installations, continued until 1965, n-hen the Justice Departme.nt began to apply the same criteria and procedures to both microphone and telephone surveillance.

3. Ignoring the Prohibitions Against TT’awamt7f.w Nnil Opening and k!!~wreptitious Entvies

Warrantless mail opening and surreptious entries, unlike the use of informants and electronic surveillance, hare been clearly prohibited by both statutory and constitutional law. In violation of these pro- hibitions, the FBI and the CIA decided on their own when and how these techniques should be used.35

Sections 1701 through 1973 of Title 18 of the United States Code forbid persons other than employees of the Postal Service “dead letter” ofice from tampering with or opening mail that is not addressed to them. Violations of these statutes may result in fines of up to $2000

50Memorandum from Iredell to Gaxler, 4/10/70; See SSA Report: Sec. I. Introduction and Summary. BNDD originally requested SSA to monitor the South American link because it did not believe it had authority to wiretap a few public telephones in Sew York City from which drug deals were apparently being arranged. (Iredell testimony, 9/18/E, p. 99.)

‘* Memorandum from the Attorney General to Xr. Hoover, 2/26/52. 32 Ivuine v. CaZifoda, 347 U.S. 12d (1954). 33 Memorandum from the Attorney General to the Director, FBI, 5/20/54. 35 While such techniques might have been authorized by Attorneys General

under expansive “internal security” or “national interest” theories similar to Brownell’s authorization for installing microphones bg trespass, the issue was nerer presented to them for decision before 1967. when Attorney General Ramsey Clark turned down a surreptitious entry request. There is no indication that the legal questions were considered in any depth in 1970 or 19il at the time of the “Huston Plan” and its aftermath. See Huston Plan Report: Sec. III. Who, What, When and Where.

Page 207: Church Committee: Reports-- Book II

191

and iinprisoiment for not n1ore thm five \-e:t13. The S~ll)p~~e (‘ourt h:iS alSO ll(~ltl that both First llnieiidnient and E’onrtli ,1inciidnieiit restrictions al)ply to mail olwning.

The constitutional guaranty of the right of the lwol~lt to be secure in their papers :tgainst uiircasonublc scn~hes and seizures extends to their 1~1~15. thus closed against insprc- tion. wherever they may be. Whilst in the mail. tlie_v can only be opened and rsanlined mldrr like vxrlxnt . . . as is re- qniretl alien papers are siibjectctl to search iii one”5 own liousc- l1o1d.“6

This piGicil)lt was reafliriiied as recently as 1970 iii I-~nited LCtcrte.Y v. T’trjl LC ~~u2wu. :s!)G I7.S. 24!f (1!)70). The i”nfringenwnt of citizens’ First A1iiieiidnwi~t ri,ylits resulting from warrantless mail opening was first recognized by ,Jnsticr Holmes in 1921. “The use of the mails,” he wrote in a dissent now embraced by prevailing legal opinion, “is allllost as

much a part of free speecll as the right to use ow tonglws.” 3i This principle. too. has been nffirined in recent years.“s

Breaking and entering is n common law felons as well as a viola- tion of state and fetlcral statutes. When coinniittcd by Gow7nnent agents. it, has long been recopnizetl as “tlic, chief evil against which the wording of the Fourth A1nlendnient is directed.” “’

In the one judicial decision concei~iii~p the legality of w-ammtless “national security” break-ins for l~l~yslcal search purposes. United States District Court ,Judge Gerhard Gescll held such entries un- constitutional. This case. Pqlite~c! 8tcrte.s 17. EhAi~h722nn.~~ involved an entry into the oflice of a LOS A1ngelrs psychiatrist. Dr. Lewis Fielcl- ing. to obtain the ilieclical iwords of his client Daniel Ellsberg. who was then nntler federal intlictment for rrvcaliy classified docu- ments. The entry w-as approved by two I’resiclentlal assistants, John Ehrlichnxu~ and (‘harles Colson. v-ho argued that. it had been justi- fied “in the national interest.” Ruling on the, defendants disc,overy motions. Judge &sell found that becawe no search w-arrant WAS obtained :

The search of Dr. Fielcling’s ofice n-as clearl,~ illegal under the nnambignom nlandate of the Fourth Anwnclnlcnt. . . [T]he Governnlent must comply with the strict constitu- tional and statutory limitations on trcslmssory sca~~cl~cs and arrests even when knon-n foreign agents are involved. . . . To hold otherwise. except, under the most exigent circim- stances. woldrl be to abandon the Fourth ,1mendnlent~ to the n-liinl of the Esecuti\-c in total disreprcl of the Ainend- nient’s history nncl piq3ose.41

'" 3iG F. S~qq). 29. (ll.r).c'. lQi-1). 'I 3x F. 8111q). at 33.

Page 208: Church Committee: Reports-- Book II

192

In the appeal of this decision, the Justice Department has taken the position t,hat a physical search may be authorized by t,he Attorney General without n warrant for “foreign intelligence” l3roposes.“2 The warrantless mail opening programs and surreptitious entries by the FBI and CIA did not even conform to the “foreigp intelligence” standard, however7 now were they specifically approved 111 each case by the Attorney General. Domestic “subversives” and “extremists” were targeted for mail opening: and domestic “subversives” and “White Hate groups” were among those targeted for surreptitious entries? Until the Justice Department’s recent statement, in the Ehrlichman case, moreover, no legal justification had ever been advanced publicly for violating the statutory or constitutional prohibitions against, physi- cal searches or opening mail without a judicial warrant, and none has ever been officially advanced by any Administration to justify war- rantless mail openings.

~Yubfincling (71)

In addition to providing the means by which the Government can collect too much information about too many people, certain tech- niques have their own peculiar dangers :

(i) Informants have provoked and participated in violence and other illegal activities in order to maintain their cover, and they have obtained membership lists and other private documents.

(ii) Scientific and technological advances have rendered obsolete traditional controls on electronic surveillance obsolete and have made it more difficult to limit intrusions. Because of the nature of wiretaps, microphones, and other sophisticated electronic techniques. it has not always been possible to restrict the monitoring of communications to the persons being investigated.

a. The Zmkusiw iVatuw of thP 117 telligence Z,n fomzant Tech-

nique

The FBI employs two types of informants: (1) “intelligence informants” who are used to report on groups and individuals in the course of intelligence investigations, and (2) “criminal informants,” who are used in connection with investigations of specific criminal activity. FBI intelligence informants are administered by the FBI Intelligence Division at Bureau headquarters through a centralized system that is separate from the administrative system for FBI crimi- nal informants. For example, the FBI’s large-scale Ghetto Informant Program was administered by the FBI Intelligence Division. The Committee’s inrestication centered on the use of FBI intelligence in- formants. The FBI’s criminal informant program fell outside the scope of the Committee’s mandate. examined.

and accordingly it was not

The Committee recognizes that FBI intelligence informants in violent groups have sometimes played a key role in the enforcement of

“Letter from Acting Assistant Attorney General John C. Keeny to Hugh E. Kline. Clerk of the V.S. Court of .kppenls for the District of Columbia, 5/9/X

QThe Supreme Court’s decision in linitcrl StatcR v. United States District COUP, 4Oi V.S. 297 (1972). clearly established the I)rinciple that such warrant- less invasions of the piracy of Americans are Imconstitutionnl.

Page 209: Church Committee: Reports-- Book II

193

the criminal law. The Committee examined a number of such cases,44 and in public hearings on the use of FBI intelligence informants in- cluded the testimony of a former informant in the Ku Klux Klan whose reporting and court room testimony was essential to the arrest an d conviction of the murderers of Mrs. Viola Liuzzo. a civil rights worker killed in lg65.4” Former ,%ttorney General Katzenbach testified that informants were vital to the solutidn of the murders of three civil rights workers killed in Nississippi in 1064.46

FBI informant coverage of the Women’s Iliberation JIovement re- sulted in intensive reportiy on the identities and opinions of women who attended WLJI meetmgs. For example. the FBI’s Sew York Field Office summarized one informant’s report in a’ memorandum to FBI Headquarters :

Tnformant advised that a WLM meeting was held on ---------_-----_---___________________I 4i Each woman at this meeting stated why she had come to the meeting and holr- she felt oppressed. sexuxll~ or otherwise.

According to this informant. these women are mostly con- cerned with liberating women from this “oppressive society.” They are mostly agamst marriage. children. ,nnd other states of oppression caused by men. Few of them, according to the informant, have had political backgrountls.48

Individual women who attended WLM meetin,nj at. midwestern universities were identified by FBI intelligence informants. A report by the Kansas City FBI Field Ofice stated:

Informant indicates members of Women’s Liberation campus group who are now enrolled as students at I-niversity of Missouri. Kansas City, are ---------) - __-- -__, ____----. --__----. --------. 4s Informant noted that --------, and --------, 5o not currently students on the IXKC campus are reportedly roommates at ------------------------.51

“In one case, an FBI informant inrolred in an intelligence investigation of the Detroit Black Panther Party furnished advance information regarding a planned ambush of Detroit police officers which enabled the Detroit Police De- partment to take necessary action to prevent injury or death to the officers and resulted in the arrest of eight persons and the seizure of a cache of weapons. The informant also furnished information resulting in the location and confiscation b.r Bureau agents of approximately fiftr sticks of dynamite available to the Black Panther Party which likely resulted ‘in the saving of lives and the prevention of property damage. (Joseph Deegan testimony, 2/13/76. p. 51)

G Rowe, 12/2/75, Hearings, Vol. 6, p. 115. ” Katzenbach testified that the case “could not hare been solved without

acquiring informants who were highly placed members of the Klan.” (Katzen- bath. 12/3/75, Hearings, Vol. 6, p. 21.5.)

Ai Date and address deleted at FBI request so as not to reveal informant’s identity.

‘* Memorandum, from New York Field Office to FBI Headquarters, re : Women’s Liberation Movement, 5/28/69, p. 2.

” Sames deleted for security reasons. j” Sames deleted for security reasons. “Sames and addresses deleted for security reasons.

68-186 0 16 14

Page 210: Church Committee: Reports-- Book II

194

Informants were instructed to report ‘*everything” they knew about a group to the FBI.

. . . to go to meetings9 ITrite up reports . . . on what hap- pened. ~~1~0 u-as there . . . to try to totallv identify the background of every person there. what thei’r i~elntionsliil~s were? who they xvere living with. who they were sleeping with, to try to get some hense of the local structnrc and the local relatibnshlps among the people in the organizatioii.52

Another intelligence informant described his mission as “total report- ing.” Rowe testified that he reported “anything and everything I observed or heard’? pertaining to any member of the group he infil- tratecl.53

E\-en where intelligence informants are used to infiltrate groups where some members are suspected of \-iolent acti\-it?. the nature of the intclligencc mission resnlts in gowrmilciital intrusion into clatters irrclcvant~ to that inquiry. The FBI Special -igents who tlirectctl an iiitelligcnce informant iii the Ku Klns Klan testified that the informant

. . . furnished 11s inforniation on the meetings ant1 the thonphts and feelings. intentions and ambitions, as best. he knew then17 of other mcnlbers of the Klan, both the rank :antl file and the lcadei~hip.5~

Intelligence informants also report on other groups-not the sub- ject of intelligence investigation-which merely associate with, or are even opp~sccl to. the targeted group. For csample, an FBI in- formant in the VYhW hacl the following exchange with a member of the Committee :

Senator HART (Sch.). . . . did you report also on groups and individuals outside the [VVAW]. such as other peace groups or indiridnals who wre opposed to the war whom you came in contact with because they were cooperating with the [VVAV] in connection with protest demonstrations and petitions 1

Ms. COOK. . . . I ended up rep0rtin.g on gronps like the United Church of Christ. American Ciul Liberties I-nion. the National Lawyers Guild. liberal chnrch organizations [Khich] quite often xyent into coalition with the VVAW.55

This informant reported the identities of an estimated 1,000 in- diCdnxls to the FBI, nlthonph the local chapter to which she ~-as assigned had onlv % regular nlembers.5G SimilarJy. an FBI infor- mant in the Kn Klux Klan reported on the activities of civil rights and black groups that he observed in the course of his work in the Klnn.57

In short. the intell$ence informant technique is not a precise instru- ment. By its natnre. It extends far be?-and the sphere of proper gorern-

jz Cook, 12/2/75. Hearings, Vol. 6. 111. p. 53 Rowe, 12/2/75, Hearings. Vol. 6, 116. p. ES Special Agent, 11/2l/iR. p. 7. E-S Cook. 12/2/75. Hearings. Vol. 6. 119, pp. 120. ” Cook, 12/2/X, Hearings, Tel. 6. p. 120. si Rove, 12/2/75, Hearings, Vol. 6. 116. p.

Page 211: Church Committee: Reports-- Book II

195

mental interest and risks go\-ernn~cntnl monitoring of the private lives and the constitutionally-protected activity of ,1mericans. Sor is the intelligence informant technique used infreqncntlr. As reflected in the statistics described above. FBI intelligence ‘investigations are in large part conducted through the use of informants: and FBI yents are instructed to “de\-elop reliable informants at all levels and m all segments” of groups under investigation.5R

In the absence of clear .guidelines for informant conduct. FBI paid and directed intelligence mformants have participatetl in violence and other illegal activities and hare taken membership lists and other private documents.

I. Participations in Vio7encr and Other 177eyn7Acticity The Committee‘s investigation has revealed that there is often a

fundamental dilemma in the use of intelligence informants in violent organizations. The Committee recognizes that intelligence informants in such groups hare sometimes played essential roles in the enforce- ment of the criminal law. at the same time, however, the Committee has found that the intelligence informant technique carries with it the substantial danger that informants will participate in. or provoke.

violence or illegal activity. Intelligence informants are frequently infiltrated into groups for long-term reporting rather than to collect evidence for use in prosecutions. Consequently. intelligence informants must, participate in the activity of the group they penetrate to preserve their corer for extended pekods. Where the group is involved in violence or illegal activity, there is a substantial risk that the infor- ant must also become involved in this activity. ,4s an FBI Special agent who handled an intelligence informant in the Ku Klux KIan testified : “[;vou] couldnY be an angel and be a good informant.“5s

FBI officials testified that it is Bureau practice to instruct informants that they are not to engage in violence or unlawful activity and. if they do so, they may be prosecated. FBI Deputy A4ssociate Director *4dams testified :

. . . we have informants who have gotten involved in the violation of the law. and we hare immediately converted their status from ‘an informant to the subject, and have prosecuted, I would say, offhand . . . around 20 informants.60

The Committee finds, however, that the existing guidelines dealing with informant conduct do not adequatelv ensure that intelligence informants stay within the law in carr&g out their assignments. The FBI Manual of Instructions con&n no provisions governing informant, conduct. While FBI employee conduct regulations pro- hibit an FBI agent from directing informants to engage in violent or other illegal activity, informants themselves are not governed by these regulations since the FBI does not consider them as FBI employees.

hs FBI Manual. Section 107 c(3). 52 Special Agent. 11/X/75, 17. 12. B(J Adams, E/2/73. Hearings, Vol. 6, p. 160.

Page 212: Church Committee: Reports-- Book II

196

In the absence of clear and precise written provisions directly appli- cable to informants. FRI intelligence informants have engaged in vio- lent and other illegal activity. For example. an FBI intelligence in formant who penetrated the Rtr Klux Klan and reported on its activities for o\‘er five years testifietl that on a number of occassions he and other Klansmrn had “beaten people severely. had boarded buses and kicked people off: hat1 went in restaurants and beaten them with blackjacks, chains. pistols.” G1 This informant described 110~ he had taken part in Klan attacks on Freedom Riders at the Rirmin@un. Mabama. bus depot. where “baseball bats, clubs, chains and pistols” were usecl in be,at.ingsS2

Although the FBI Special Agents ~110 directed this informant in- structed him that he n-as not to engage in violence, it was recognized that. there was a substantial risk that he would become a participant in violent activity.

,4s one of the Agents testified :

. . . it is kind of difficult to tell him that we would like vou to be there on deck, observing. be able to give us information and still keep yourself cletached and uninvolved and clean, and that was the problem that we constantly hacl.03

In another example, an FBI intelligence informant penetrated “right wing” groups operating in California uncler the names “The Minutemen” and “The Secret Armv Oroganization.” The informant reported on the activities of these “right wing’r” paramilitary groups for a period of five vears but was also involved in acts of violence or destruction. In aclclition, the informant actually rose to a position of leadership in the SA40 aald became an innovator of various harass- ment actions. For example, he atlmittetllv participated in firebombing of an automobile and was present, conducting a “surveillance” of a professor at San Diego State University. when his associate and subordinate in the SAO took out a gun and fired into the home of the professor. wounding a young ~omaii.~~

An FBI intelligence informant in a group of antiwar protesters planning to break into a draft board claimed to harr provitled tech- nical instruction am1 nlaterials tllat x-err’ essential to the illegal break- testified to the committee :

Everything they learned about breaking into a building or climbing a wall or cutting glass or destroying lockers, I taught them. I pot sainnle eqnipment, the tvpc of windows that we xould go through. I picked up off the ioh and taught them how to cut the slass. how to drill holes in the glass so you cannot hear it and stuff like that. and the FRT supplied me with the equipment needed. The stuff I did not have, the [the FBI] pot off their own agents.F5

The Committee finds that where informants are paitl and directed by a povernment agen~~y, the government has a responsibility to

“I ROTP deposition. lO/l’i/X. 1,. 12. O2 Ron-e. E/2/75, Hearings, Vol. 6. p. 118. @ Sl~winl Afrnf. 11/21/7:5. pp. 16-17. “rJIrnlor;mdnn~ from the FBI to Senate Select C’ommitter, ‘2/26/7C,. with

rllclosnrcs. ” Hardy, Q/29/75, pp. 16-17.

Page 213: Church Committee: Reports-- Book II

impose clear restri(+ions 011 tlleir umthlct. I-nwritten practice or gell- era1 l)ro\-i5ions ainwtl at persons otlier than the informants themselves arc not sr&icicnt. Iii tile inwstigation of \~iolcnw or illegal activi,ty, it is c*entinl that the government not be implicated in such actirit;v.

2. AVe7niictship Liafx cr~id Ofho Pt~iwfo Ilocumchfs CIr’,fuittcd T)y fAc>

G0l’~‘m/ll~~lt 7’1~,~O//!/h rlitc~7liyvrcr Zt1fot ?wicfx

The (‘ommittee finals that tlwre arc inadcqnate guidelines to regulate the conduct of intelligence informants with respect to private ant1 confidential documents. such as mrmbersl~il~ lists, mailing lists and papers relating to legal matters. The Fourth hmendment provides that citizens shall l)e “stwir~ in their . . . papers and effects, against ~~nrcason:~blc scarclies and scixurcs” ant1 requires probable cause to believe there 11:~s been a violation of law before a search warrant may issue. Xoreorer the Supreme Court, in ,VBACP v. A7aba77ba.6F held that the First ,~mendment’s protwtions of speech, assembly and group association did not permit a state to conii~el the production of the membership list of a group engxaged in lawful activity. The Court dis- tinguished the case where a state was able to demonstrate a “control- ling justification” for such lists bv showing a group’s activities in- volved “acts of unlawful intimidiltioll and \-iolencc.” “’

There are no provisions in tllv FHT JIanual which preclude the FBI from obtaining pri\-atr and confidential docwments through intelligence informants. The Manual tloes prohibit informant report- ing of “a,ny information pertaining to defense plans or strategy,” but the FM Interprets this as appl$np only to privileged communications l~etw33i an attorney ant1 client 111 connection with a specific court lJroceeding.G7

The Committee’s investigation has shown that, the FBI, through its intelligence informants and sources. has sought to obtain member- ship lists and other confidential documents of groups and indivitluals.68 For example, one FBI Special ,Qrnt testified :

I remember one evening . . . [an informant] called my home and said I will meet you in a half an hour . . . I have a complete list of e\-erybotly that T Ilaw just taken out of the files, but I hare to have it back within such a length of time.

Well, naturally I left home and met him and had the list duplicated forthwith, and back in his possession and back in the files with nobody suspecting.” N

Similarly, the FBI Special Agent who handled an intelligence informaalt m an antiwar ,vroup testified that he obtained confidential lopers of the group which related to legal defense matters:

“She brought back several things . . . various position papem, taken by J-arions legal defense groups, general statements of . . . the T’VAW, legal thoughts on various trials, the

RB35i X7.8. UR (l%%). Similarly. in Rates v. City of Little Rnc?i-. 361 1Y.S. 516 (l%O), the Sngrrmr Court held compulsory diwlosure of gronp meml)ership lists w-ns an nnjnstified interference with members freednm of nsnoriation.

B(l* 361 LT. s. at 465. ” FRT Manna1 of Instructions, Section 107. a8 Surreptitious entry has also provided a means for the obtaining of such lists

and other confidential documents. 68 Special Agent, 11/19/i& pp. 10-11.

Page 214: Church Committee: Reports-- Book II

198

Gainesville (Florida) 8 . . . the Camden (Sew ,Jersey) 9 . . . various documents from all of these gro~~ps." TO

This informant also testified that she took the confidential mailing list of the group she had penetrated and gave it to the Fl3I.7’

She also gave, the FBI a legal manual prepared by the group’s

nttorneys to guide Ian-vers in tlefcntling the group’s members should thep be arrested in cormection xitll antiwar demonstrations or other pofitical activity.72 Since this document x-as prepared as a general legal reference manual rather than in connection with a, specific trial the FBI considered it outside the attorney-client privilege and not, barred by the FBI Manual pro\-ision with respect to legal defense and strategy matters.

For the government to obtain membership lists and other private documents pertaining to lawful and protected act,ivities covertly through intelligence informants risks infringing rights guaranteed by the (‘onstitution. The Committee ,fntls that there is a need for new guidelines for informant conduct with respect to the private papers of groups and individuals.

c. E7ect~*onic Xurvei7lunce In t,he absence. of judicial warrant. both the “traditional” forms of

electronic surveillance practiced by the FBI-wiretapping and bag- ging-and the highly sophisticated form of electronic monitoring prac- ticed by NSA have been used to collect too much information about too many people.

1. Wire tripping uw d Rugghg Wiretaps and bugs are considered by FBI officials to be one of the

most valwble technqucs for the collection of information relevant to the Bureau’s legitimate foreign counterintelligence mandate. W. Rnv- mend Wannall. the former Assistant Director in charge of the FR‘i’s Intelligence Division. stated that electronic surveillance assisted Bu-

rrau officials in making “decisions” as to operations against foreigners engagecl in espionage. “It gives us leads as to persons . . . hostile intel- ligence services are trying to subvert or utilize in the United States, so certainly it is a valuable technique.” 73

Despite its stated value in foreign counterintelligence cases. how- ever. the dangers inherent in its use implv a clear need for rigorous controls. J.37 their nature. wiretaps and-bugs are incapable of a sur- gical precision that would permit, intelligence agencies to overhear only the target’s conversations. Since wiretaps are placed on particular telephones. anyone who LIWS a tapped phone-including members of the target? family-can be overheard. So, too, can everyone with whom the target (or anvonr else using the target’s telephone) commn- nicates.” filicrophones l~lanted in the target’s room or office inevitably intercept all conversations in a particular area : anyone conferring in the room or office, not just, the target, is overheard.

” Spwial Agent, U/20/75, pp. X-16. n Cook, 12/2/55, Hearings, Vol. 6, p. 112.

i? Cook deposition. 10/14/75, p. 36. ‘3 IV. Ra.rmond manna11 testimony. 10/21/75. p, 21. ” Under the Justice I%partment’s lnvcedures for Title III (court-ordered)

wiretaps. however, the monitoring agent is ohlieated to turn ofi the recording equipment when certain privileged commnnications begin. Slanual for conduct of Electronic Surveillance under Title III of Public Law 90351, Sec. 8.1.

Page 215: Church Committee: Reports-- Book II

199

The intrusiveness of these techniques has a second aspect as well. It is extremely difficult. if not. impossible, to limit. the interception to convcrsatioris that are relevant, to the purposes for which the survcil- la.nce is placed. \-irtually all conversations are overheard, no niattcr how trivial, personal, or political they might be. When the electronic surveillance target is a political figure who is likely to discuss political affairs, or a lawyer, lvho confers with his clients, the possibilities for abuse are obviously heightened.

The dangers of indiscriminate interception are. perhaps most acute in the case of microphones planted in locations such as bedrooms. When Attorney Gtneral Herbert Rrownell gave the FBI sweeping au- thority to engage in microphone surveillances for intelligence pur- posts in 1(3X. he espresslv permitted t.hc 13urcau to plant microphones in such locations if. in the sole discretion of the FBI. the facts war- ranted the installation7” Acting under this general authority, for ex- ample, the 13mran installed no fewer than twelve bugs in hotel rooms occupied by Dr. Martin Luther Ring, Jr.i6

The King surveillances which occurred between January 1964 and October 1065, M-ere ostensibly approved within the FBI for internal security reasons, but, they produced vast amounts of personal infor- mation that were totally unrelated to any legitimate governmental interest.; indeed, a single hotel room bug alone yielded twently reels of tape that subsequently provided the basis for the dissemination of personal information about Dr. King throughout the Federal cstab- lishment.7”a Significantly, FBI internal memoranda with respect to some of the installations make clear that they were planted in Dr. King’s hotel rooms for the express purpose of obtaining personal in- formation about hini.77

Estrcmelv personal information about. the target, his family, and his frienk’is easily obtained from wiretaps as well as microphones. This fact is clearly illustrated by the warrantless electronic surreil- lance of an A1nlcrican citizen who leas suspected of leaking classified data to the prrss. A Kiretap on this individual produced no evidence that hc had in fact leaked any storks or documents. but among the items of information that the FBI did obtain from the tap (and de- Iivcrrtl in utmost stcrccy to tlic TTThite House) WV the following: that “meat was ordered [by the target? family] from a grocer;” that the target’s daughter had a toothache: that the target needed grass clip- pings for a compost heap he WIS building: and that during a telephone conversation between the target’s wife and a friend the “matters dis- cnssrd were milk bills, hair, soap operas, and church.” i8

” \Iemorandnm from the Attorncv General to the IXrector. FRI. 5/20/54. “Three additional hugs were planted in Dr. King’s hotel rooms in l!Wi after

the standards for xviretanninz and mirronhone surveillance herame identiral. A1rrording to FBI memoraLnda. nppnrentlv initiated 1)~ Katarnlrach. Attorney General Sicholas Katzenhaeh was given after the fact notification that these three snrveillnnrts of Dr. King had occurred. See p. 273, and the King Re- port. Ser. IV. for further details.

“’ SIemorandnm from F. .T. Baumgardener to W. C. Sullivan, 3/X/64. “For example. mrmornndnm from Kanmpnrdner to W. C. Sullivan, 2/4,/M. “FBI memoranda. Identifvine details are heine withheld 1~ the Select Com-

miftcc hrc:lnsc of privacy cnnsid~~ratinns. Even the FKI realized that this type of information was unrelated to criminal nctivit,v or national srcnritv: for the last four months of this surveillance. most of the summaries that were disseminated to the n-hi tr IIonsc I,fJgnn. “The followinr is a summnr.v of nonpertinent infnrmn- tinn concerning captioned individual as of . . .”

Page 216: Church Committee: Reports-- Book II

200

The so-called ‘%ewnteen” emplovres. which

wiretap5 on jownnlists and go~emn~ent collectircly lasted from >lny 1969 to Februa.ry 1971,

also iliustrnte the intiwsireness of electronic silrvtillance. Alccordinv to former President Sison. these tal)s l~i~odi~ced “jiist ,rrobs of nlaterial? gossip and bull. ” ‘n FBT summaries of illformation obtained from the wiretaps and dissrminatcd to the Whitr Honsc . su.ggrst that the former President’s private eralnation of them was correct. This wiretapping program did not wwnl the SOIII’CC of any leaks of rlassifkcl data. n-hich vins its ostensible l-mrpose. but it clid .geiierate a wealth of information about the personal lives of the targets-their social contacts, their vacation plans. their rmplo~mrnt satisfactions and dissatisfaction, the.ir marital problems, their drinking habits. and rvm their sex liwxp6

A1niong those who wwr incidentnll~ orerhcnrd on one of these v-ire- taps was a currently Fitting -1Tsociatr ,Jnsticr of thr SSnp~eme Cmrt of the United States. echo made plans to review a manuscript written bv one of the tar.gets.81 Vast amounts of political information were also obtained from these wiretaps.**

Thr “seventeen” wirrtaps also exemplify the particularly acute problems of wiretapping when the targeteci indiridnnls are inrolved in the domestic political process. These wiretaps produced vast amounts of purely political informati0n.8z milch of which was obtained from the homr telephones of t\\-o consultants to Senator Edmund Muskie and other Democratic politicians.

The incidental colle.ction of political information from electronic surreillance is also shown bv a series of telephone and microphone surveillances conducted dnril~g the Kennedy administration. In an in- vestigation of the possibl;v unlawful attempts of representatives of a foreign connt.ry to influence congressional deliberations about sugar quota lpgislatlon in the early INNS, ,4ttornev General Robert Kennedy authorized a total of twelve varrantless kiretaps on foreign and do- mestic targets. Among tlir wiretaps of :1merican citizens were tTT0 on American lobbyists. three, on executive branch officials. and two on a staff member of a House of Rcpresrntatires’ Con~n~ittee.83 ,4 bug VCRS

also planted in the hotel room of a IT&cd States Congressman, the Chairman of the House Agricnltwe Committee, Harold D. Cooley.84

Although this investigation was apparently initiated because of the Government’s concern about futnrr relations with the foreign conn- try involved and the possibility of bribery,85 it is clear that the Ken-

78 Transcript of Presidential Tapes. 2/28/73 (House Judiciary Committee State- ment of Information. Book WI. Part 4. p. 1754).

“Fnr esnmplr. letters from Hoover to the Attorney General. 7/25/69, and 7/N/69 : letters from Hoover to H. R. Hnldemnn. 6/25/X.

m Letter from Hoover to Haldeman. 6/25/70. *‘Examples of such information are listed in the finding on Political Abuse, “The

‘17’ wiretaps.” 83 Memorandum from J. Edgar Hoover to the Attorney General, 2/14/61:

Memorandum from J. Edgar Hnnrer to the Attorney General, 2/16/61: Memn- randnm from .J. Edgar Hoover to the Attnrney General, 6/26/62 : Memorandum from Wnnnnll to W. c’. Anllirnn. 12/22/66.

M Memorandum from n. E. Mnnre to A. H. Belmont, Z/16/61. 85 Memnran~nm from W. R. Wnnnnll to W. C. Nliran. 12/22,0X : Memnrnndnm

from A. H. Belmont to Mr. Parsons. 2/14/61. This inrestigatinn did discover that. representatives of n fnwi,w nation were attempting to inflncnce Cnngres- sinnal deliberations. but it did not rereal that money was being passed to any member of Congress or Congressional staff aide.

Page 217: Church Committee: Reports-- Book II

201

nedy administrat,ion was politically interested in the outcome of the sugar quota legislation as well. 8F Given the nature of the techniques used and of the targets they were directed pgainst, it is not surprising that a great deal of potential1 I useful pohtlcal information was gen- erated from these “Sugar Lo i: by” surveillances.87

The highly intrusive nature of electronic surveillance also raises special problems when the targets are lawyers and journalists. Over the past two decades there have been a number of wiretaps placed on the o&e telephones of lawyers. 88 In the Sugar Lobby investigation, for example, Robert Kennedy authorized wiretaps on ten telephone lines of a single law firm.g” All of these lines were apparently used by the one lawyer who was a target and presumably by other attorneys in the firm as well. ‘Such wiretaps represent a serious threat to the attor- ney-client privilege, because once they are instituted they are capable of detect&g all conversations between a lawyer and his clients, even those relating to pending criminal cases.

Since 1960, at least six American journalists and newsmen have also been the targets of warrantless wiretaps or bugs.“l These surveillances were all rationalized as necessary to discover the source of leaks of classified information, but, since wiretaps and bugs are indiscriminate in the types of information collected, some of these taps revealed the attitudes of various newsmen toward certain politicians and supplied advance notice of forthcoming newspaper and magazine articles deal- ing with administration policies. The collection of information such as this, and the precedent set by wiretapping of newsmen, generally, inevitably tends to undermine the constitutional guarantee of a free and independent press.

2. N&A Monitoring The Sational Security Agencv (N&Y) has the capability to monitor

almost any electronic communication which travels through the air. This means that SSA is capable of intercepting a telephone call or even a telegram, if such call or telegram is transmitted at least par- tially through the air. Radio transmissions, a fortiori, are also within MA’s reach.

Since most communications today-to an increasing extent even domestic communication-are, at some point, transmitted through the air, SSA’s potential to violate the privacy of American citizens is un- matched by any other intelligence agency. Furthermore, since the inter- cept.ion of electronic signals entails neither the installation of electronic surveillance devices nor the cooperation of private communications companies, the possibility that such interceptions will be undetected is enhanced.

X%1 has never turned its monitoring apparatus upon entirely do- mestic communications, but from the early 1960s until 1973, it did inter-

s Memorandum from Wannall to W. C. Sullivan, B/22/66. 8’ See Finding on Political Abuse, lx 233. a Electronic Surveillance Report: Sec. II, “Presidential and Attorney General

Authorization.” 80Jiemorandum from J. Edgar Hoover to the Attorney General, 6/26/62. ‘I Memorandum from J. Edgar Hoover to the Attorney General 6/29/61; memo-

randum from J. Edgar Hoover to the Attorney General T/31/62; memorandum from J. Edgar Hoover to the Attorney General 4/19/65 ; memorandum from J. Ed- gar Hoover to the A’ttorney General 6/4/69; memorandum from J. Edgar Hoover to the Attorney General g/10/69; letter from W. C. Sullivan to J. Edgar Hoover T/2/69.

Page 218: Church Committee: Reports-- Book II

202

cept the international communications of American citizens, wit.hout a v-arrant. at the request of otlw federal agencies.

Under current practice. KS_\ does not target any A1nlerican citizen or firm for the, purpose of intcrceptin, (r their foreign coiiiiililiiicatioils. As a result of monitoring international links of communication, how- ever, it does acquire an enormous number of communications to, from, or about, -1nicrican citizens and firnls.“3

As a practical matter, most, of the communications of -1mrrican citi- zens or firms acquired by SSA as incidental to its foreign intelligence- gathering process are destroyed upon recognition as a communication to or from an -1nierican citizen. But other such coiiim~uiications, which bear upon SSA‘s foreign intelligence reqniremrnts. are processed. and information obtained from them are used in Ss-1’~ reports to other imelligcnce agencies. Current practice precludes SSh from identify- ing American citizens and firms by name in such reports. ?I‘onetheless, the practice tlocs result in SK\% disseminating information derived from the international communications of American citizens and firms to the intelligence agencies and policymakers in the federal government.

In his dissent in 07msten.d v. United Atate.S,94 which held that the Fourth Amendment warrant requirement did not apply to the seizure of conversations by means of wiretapping. dusticr Lams D. Brandeis expressed grave concern that nwv technologies might outstrip the ability of the Constitution to protect American citizens. He wrote:

&Subtler and more far-reaching means of invading privacy have become available to the government . . . (and) the prog- ress of science in furnishing the Government with means of espionage, is not likely to stop lvith wiretapping. Ways may some day be developed by which the Government. without removing papers from secret drawers, can reproduce them in court. and by which it will be enabled to expose to a jury the most intimate occurrences of the home . . . . Can it be that the Constit,ution affords no protection against suc.h invasions of individual security ?

The question posed by ,Justice Brandeis applies Kith obvious force to the. technological developments that allow SSA to monitor an enor- mous number of communications each year. His fears mere firmly based, for in fact no Iv-arrant \vas ever obtained for the inclusion of 1200 American citizens on SSA’s ‘Watch List” between the early 1960s and 1973, and none is obtained todav for the dissemination with- in the intelligence community of information derived from the inter- national communications of -American citizens and firms. In the face of this new technology, it is well to remember the answer ,Justice Brandeis pave to his own question. Quoting from Boyd v. United Stntes. 116 T’.S. 616. he Jvrote :

It, is not the breaking of his doors. and the rummaging of his drawers that constitutes the esscnse of the offense: but it is t.he invasion of his indefeasible right of personal security, per- sonal liberty. and private property . . .94a

93 SSh has long asserted that it had the authority to do this so long as one of the partips ‘to snch cnmmnnicntion rrns located in a foreign country.

* 277 U.S. 438.473474 (1928). Bln 277 U.S. nt 474-475.

Page 219: Church Committee: Reports-- Book II

203

D. Mail Opening

By ignoring the legal prohibitions against warrantless mail open- ing! t.he CIA and the FBI were able to obtain access to the written com- munications of hundreds of thousands of individuals, a large propor- tion of whom lvere Bmericsn citizens. The intercepted letters were presumably sealed with the expectation that they would only be opened by the party to whom they were addressed, but intelligence agents in ten cities throughout the United States surreptitiously opened t.he seal and photographed the entire contents for inclusion in their intelligence files.

Mail opening is an imprecise technique. In addition to relying on a “Watch List” of names, the CIA opened vast numbers of letters on an entirely random basis: as one agent who opened mail in the CL4’s Sew York project testified, “You never knew what you would hit.” 95 Given the imprec.ision of the technique and t.he large quantity of cor- respondence that was opened, it is perhaps not surprising that during the twenty year course of t,he Agency% New York project., the mail that was randomly opened included that of at least three United States Senators and a Congressman, one Presidential Candidate, and numerous educational, business, and civil rights leadersg6

Se,veral of the FBI programs utilized as selection criteria certain “indicators” on the outside of envelopes t.hat suggested that the com- munication might. be to or from a foreign espionage agent. These “indicators” were more refined t.han the “shotgun approach” Q7 Which characjterized the ,CIA’s Kew York projeot, and thev did load TV the identification of three foreign spies.98 But even by t,he Bureau’s own nccountling. it is clear that the mail of hundreds of innocent American c.lt.ize.ns was opened and read for everv successful counterintelligence lead that was obtained by means of ‘5nbicators.” 99

Large volumes of m&l were also intercepted and opened in other FBI mail programs that were based not on indicators but on far less precise criteria. Two programs that involved the opening of mail to and from an Asiman country, for example, used “letters to or from a university, scientific, or technical facility?’ as one selection criterion.lOO According to FBI memoranda, an average of 50 to 100 letters per day vas opened and photographed during the ten years in which one of these two programs operaited.1o1

w “CIA Officer” testimony, g/30/75, p. 15. 88 Staff summary of “Master Index.” review, g/5/75. mJames Angelton testimony, 9/17/75, p. 28. 88 Wannall. 10/21/75, p. 5. 88 In one of the programs based on “indicators” a participating agent testified

that he opened 30 to 60 letters each day. (FBI agent statement, g/10/75, p. 23.) In a second such program, a total of 1.011 letters were opened in one of t.he six cities in which it operated; statistics on the number of letters opened in the other five cities cannot be reconstructed. (W. Raymond Wannall testimony, 10/n/75, p. 5.) In a third such project, 2,350 letters were opened in one city and statistics for the other two cities in which it operated are unavailable. (Memorandum from W. A. Rmniaan to W. C. Sullivan, S/31/61; Memorandum from 1Ir. Branigan to Mr. Sullivan, E/21/61; memorandum from Sew York Field Office to FBI Hytdquarters, 3/5/62.)

T,rtter from the FBI to the Senate Select Committee. 10/29/75. Six other criteria were used in these programs. See Mail Opening Report, Sec. IV.

lo1 Memorandum from A. R. Donohne to A. H. Belmont. 2/23/61: Memorandum from San Francisco Field Office to FBI Headquarters, 3/D/60. Statistics relat- ing to the number of letters opened in the other program which used this cri- terion cannot be reconstructed.

Page 220: Church Committee: Reports-- Book II

204

E. Xurreptitious Entries Surreptitious ent.ties, conducted in viol’ation of the law, have ‘also

permitted intelligence agencies to g&her la wide range of information about American ci’tizens and d’omestric organization as well as foreign targets. lo2 By definition this technique involves a phvsicnl entry into the private premises of individuals and groups. once intelligence agents are inside, no “papers or effects” are secure. As the Huston Plan recommendations stated in 1970, “It amounts to burglary.“lo3

The most private documents are rendered vulnerable by the use of surreptiirtious entries. According to a 1966 internal FBI memorandum, which discusses the use of this technique against dome&c organizations :

[The FBI has] on numerous occasions been able to obtain mlaterial held highly secret and closely guarded by subversive groups and organizat.ions which consisted of membership lists and mailing lists of t.hese organizations.‘04

A specific example cited in this memorandum also reveals the types of information that this technique can collec’t and the uses to which tlhe information thus collected may be put :

Through !a “black bag” job, me obtained the records in the possession of ‘three high-ranking offici’als of a Klan organiza- tion. . . . These records gave us the complete membership and financial ,information concerning t.he Klan’s operation which we have been using most effectively to disrupt the organization and, in fact, to bring about its near disintegration. lo5

Unlike techniques such as electronic surveillance, government entries into private premises were familiar to the Founding Fathers. “Indeed?” Judge Gesell wrote in the Ehrlichmm case, “the American Revolution was sparked in part by the. complaints of the colonists against the issuance of writs of assistance, pursuant to which the King’s revenue officers conducted unrestricted, indiscriminate searches of persons and homes to uncover contraband.” lo6 Recognition of the intrusiveness of government break-ins was one of the primary reasons

loa According to the FBI, “there were at least 239 surreptitious entries (for purposes other than microphone installation) conducted against at least fifteen domestic subversive targets from 1942 to April 196s. . . . In addition, at least three domestic subversive targets were the subject of numerous entries from October 1952 to .Iune 1966.” (FBI memorandum to the Senate Select Committee, 10/13/76.) One target, the Socialist Workers Party, was the subject of possibly as manv as 92 break-ins bv the FBI. between 1960 and 1966 alone. The home of at least-one SWP member was also apparently broken into. (Sixth Supplementary Response to Requests for Production of Documents of Defendant, Director of the-FBI, Socialist Workers Party v. Attorney General, 73 Civ. 3160, (SDNY), 3/24/76.) An entry against one “white hate group” was also reported by the FBI. (Memorandum from FBI Headquarters to the Senate Select Committee, 10/13/75.)

lmMemorandum from Tom Huston to H. R. Haldeman, ‘7/70, p. 3. z yI;;orandum from W. C. Sullivan to C. D. DeLoach, 7/19/66.

lo6 U&cd States V. Ehrlichman, 376 F. Supp. 29,32 (D.D.C. 1974).

Page 221: Church Committee: Reports-- Book II

for the subsequent adoption of the Fourth Amendment in 1’791,1O’ and this technique is certainly no less intrusive today.

Subfunding (c) The imprecision and manipulation of labels such as “national se-

curity,” “domestic security, ” “subversive activities” and “foreign in- telligence” have led to unjustifiecl use of these techniques.

Using labels such as ‘*national security” and ‘bforeign intelligence”, intelligence *agencies have directed these highly intrusive techniques against individuals and organizations who were suspected of 110 criminal activity and who posed no genuine threat to the national security. In the absence of precise standards and effective outside control, the selection of American citizens as targets has at times been predicated on grounds no more substantial than their lawful protests or their non-conformist philosophies. Almost any connection with any perceived danger to the country has sufficed.

The application of the “national security” rationale to cases lacking a substantial national security basis has been most apparent in the area of warrantless electronic surveillance. Indeed, the unjustified use of wiretaps and bugs under this and related labels has a long history. Among the wiretaps approved by Attorney General Francis Biddle under the standard of ‘Lpersons suspected of subversive activities”’ for example, was one on the Los Angeles Chamber of Commerce in 1941.‘Os This was approved in spite of his comment to J. Edgar Hoover that the target organization had “no record of espionage at this time.” log In 1945, *4ttorney General Tom Clark authorized a wiretap on a former aide to President Roosevelt.110 According to a memorandum by J. Edgar Hoover, Clark stated that President Truman wanted “a very thorough investigation” of the activities of the former official so that “steps might be taken, if possible, to see that [his] activities did not interfere with the proper administration of government.” I11 The memorandum makes no reference to “subversive activities” or any other national securit,v considerations.

The “Sugar Lobby” and Martin Luther King, Jr., wiretaps in the early lR6Os both show the elasticity of the “domestic security” stand- ard which supplemented President Roosevelt’s “subversive activities” formulat,ion. Among those wire‘tapped in the Sugar Lobby investiga- tion, as noted above, was a Congressional staff aide. Yet the documen- tary record of this investigation reveals no evidence indicating that the target herself represented any threat to the “domestic security.” Similarly, while the FBI may properlv have been concerned with the activities of certain advisors to Dr. King, the direct wiretapping of Dr. King sho\vs that the “domestic security” standard could be stretched to unjustified lengths.

The microphone surveillances of Congressman Cooley and Dr. King under the “national interest” standard rstablishcd by ,jttorncv Gen- eral Brownell in 1954 also reveal the relative ease with which elec- tronic bugging devices could he used against, American citizens who

lol SW P ,g. Olmntend v. T7nited Rtntcn. 277 U.S. 4.18, (192n8). lo8 M&norindum from Francis Biddle to Mr. Hoover, 13/19/41. xoa Ibid. ‘lo Unaddressed Memorandum from .I. Edgar Hoover, 11/X/45, found in‘

Director Hoover’s “Official and Confidential” files. n1 Ibid.

Page 222: Church Committee: Reports-- Book II

206

posed no genuine %ational securit,y” threat. Neither of these targets advocated or engaged in any conduct that was damaging to the security of t.he United States.

In April, 1964, Attorney General Robert &nncdy approved “tech- nical coverage (electronic surveillance) !’ of a black nationalist leader after the FBI advised Kennedy that he was “formin.g a new group” which would be “more aggress’ive” and would “participate in racial demonstrations and civil rights activities.” The only indication of possible darfger noted in the FBI’s request for the wiretaps, however, was that this leader had “recommended the possession of firearms by members for their self-protection.“2

One year later, Attorney General Kicholas Katzenbach approved a wiretap on the offices of the Student Non-Violent Coordinating Com- mittee on the basis of potential communist infiltration into that organi- zation. The request which was sent to the Attorney General noted that “confidential informants” described SKCC as “the principal target for Communist Party infiltration among the various civil rights organizations” and stated that some of its leaders had “made public appearances with leaders of communist-front organizations” and had “subversive backgrounds. “113 The FBI presented no substantial evi- dence however, that SNCC was in fact, infiltrated by communists-only that the organization lx-as apparently a target for such infiltration in the future.

After the Justice Department adopted ne\T criteria for the institu- tion of warrantless electronic surveillance in 1968, the unjustified use of wiretaps continued. In November 1969, Att0rne.y General John Mitchell approved a series of three wiretaps on orpamzations involved in planning the antiwar “March on Washington.” The FBI% request for coverage of the first, group made no claim that its members en- gaged or Kere likely to engage in violent activity: the request was simply based on the statement that the anticipated size of the dem- onstration was cause for “concern should violence of any type break ant " I14

‘r;he only additional iust,ification given for the wiretap on one of the other proilps, the Viet’nam Moratorium Committee, was th,at it “has recently endorsed fully the activities of the [first group] concerning the upcoming antiwar demonstrations.” I15

In 19’70, approval for a wiretap on a “New Left oriented campus ,rrroup ” n-as granted by Attorney General Mitchell on the basis of an FBI request which included, among other factors deemed relevant to the necessity for the wiretap, evidence that the group was attempting “to develop strong ties with the cafeteria, maintenance and other workers on campus” and wanted to “go into industry and factories and. . . take the radical politics they learned on the campus and spread t.hcm among factory Korkers.” Il.5

‘12 Memornndum from a. Edgar Hoover to the Attorney General, 4/l/64. *I3 \Iemornndnm from J. Edrar Hoover to the Attorney General, 6/X/6.5. I” itemorandum from .J. Edgar Hoover to the Attorney General. 11 /S/61).

‘I5 VPmnrandnm from .J. Edgar Hoover to Attorney General Mitchell. 11/7/69. ““~Innnrxndum from a. Edgar Hoover to the Attorney General, 3/16/70. The

strong& evidence that this group’s conduct was inimical to the national securitp was reported as follows :

“The [group] is dominated and controlled hp the pro-Chinese Marxist Leninist (ewiwd). .

“In carrying out the Marxist-Leninist ideology of the (excised) memhers have repeatedly sought to become involved in labor disputes on the side of labor, join

Page 223: Church Committee: Reports-- Book II

207

This approval was renewed three months later despite the fact that the request for renewal made no mention of violent or illegal activity b;v the group. The value of the wiretap was shown, according to the li‘I31. bv such results as obtaining “the identities of over 600 persons cithcr in touch with the national headquarters or associated with” it during the preceding three months.117 Sis months after the original authorization the number of persons so identified had increased to 1.4”8 : and approval was granted for a third three-month period.” 11*

The “seventeen wiretaps” also show how the term “national secu- rik” as a justification for wiretapping can obscure improper use of this technique. Shortly after these wiretaps were revealed publicly, President Nixon stated they had been justified by the need to prevent leaks of classified informaiion harmful to the national security.llQ

Wiretaps for this purpose had, in fact,, been authorized under t.he Kcnnedv and Johnson administrations. President Nixon learned of these &cl other prior taps and, at a news conference, sought to justify the taps hc hacl aut.horized by referring to past precedent. He stated that, in the :

period of 1061 to ‘63 there were wiretaps on news organiza- tions, on nc~s people, on civil rights lenders and on other people. And I think they I\-ere perfectly justified and I’m sure, that. President Kennedy and his brother, Robert Ren- nedy, woulcl never have. authorized them, unless he thought the.y XWIF in the nntional interest.. (Presidential News Con- ference, 8/B/73.)

Thus, questionable electronic surveillances by earlier administra- tions w-cre put, forward as a clefense for improper surveillances ex- posed in 1973. In fact, howe\-cr. t.wo of these. wiretaps 1Tci.e p1ace.d on donlestic affairs advisers at the White House who had no forejgn aflairs rrsponsibilitirs and appareritly no ~CCCSS to classified foreign po1ic.v materials. lzl A third target, was a White House speech writer who hacl bun ovc>rhcard on an existing tap agreeing to provide a re- porter with background information on a Presidential speech con-

picket lines and engage in disruptive and sometimes violent tactics against indus- try recruiters on college campuses. . .

“This faction is currently very active in many of the major demonstrations and student violenre on collrgr campuses. .” (Memorandum from .J. Edgar Hoover to thr Attorney General, 3/X/70. The excised words have been deleted by the FBI.)

I17 Memorandum from a. Edgar Hoover to the Attorney General, 6/16/70. Thn only other results noted by Hoover related to the fart that the wiretap had “obtained information concerning the activities of the national headquarters of rthe ernun and1 nlans fnr lthe zrnun’sl snnnnrt and narticinatinn in demon- &rations supporting antiwar-groups and the -(ixcised) .” It mai also noted that the wiretap “revealed . . contacts with Canadian student elements”.

‘19Jiemnrandnm from J. Edgar Hoover to the Attorney General, 9/16/70. The nnly other results noted by Hoover again related to obtaining information about the “plans and activities” of the group. Specifically mentioned were the “plans for thr Satinnnl Interim Committee (ruling body of [escisedl) mretinr \vhich took place in New York and Chicago”. and the plans “for demonstrations at San Francisco. Detroit. Salt T,ake City, Minneapolis. and Chicago.” There was no indication that these demonstrations were expected to be violent. (The excised 1rortls bnw been deleted by the FRI).

Ilo Public statement of President Sison, R/222/73. 121 Jlemnrandum from .T. Edgar Hnnrer to the Attorney General 7/23/69;

memorandum from J. Edgar Hoover to the Attorney General 12/14/70.

Page 224: Church Committee: Reports-- Book II

208

ccrning domestic revenue sharing and welfare reform.lZ2 The rcinstatrment of another wiretap in this series was requested by H. R. Hnltlrman simply because “they may have a bad n,pl)lc and hare to pet, him out of the basket.” ly3 The last four requests in this series that were sent to the ,4ttorney General (including t,he requests for a tap on the “bad apple”) did not) mention any nnt,ionnl security justifi- cation at all. As former Deputy At.torney General 1Yilliam Ruckels- haus has testified :

I think some of the individuals who were tapped, at least to the extent I have reviewed the record, had very htt,le, if any, relationship to any claim of national security . . . I think that as the program proceeded and it became clear to those who could sign off on taps how easy it was to institute a wire- tap under the present procedure that these kinds of considera- tions [i.e., genuine national security justifications] were con- siderably relaxed as the program went on.lZ4

None of the “seventeen” wiretaps was ever reauthorized by t,he Attorney General, although 10 of them remained in operation for periods longer than 90 days and although President Nixon himself stated privately that “[t]he tappin g was a very, very unproductive thing. . . it’s never been useful to any operation I’ve conducted . . .” *Z

In short, warrantless electronic surveillance hasbeen defended on the ground that it was essential for the national securit,y, but the history of t,he use of this technique clearly shows that the imprecision and manipulation of this and similar labels. coupled with the absence of any outside scrutiny, has led to its improper use against American citizens who posed no criminal or national securit,y threat to the country.lZ6

Similarly, the terms “foreign intelligence” and “counterespionage” were used by the CL4 and the FBI to justifv their cooperation in the CIA’s New York mail opening project,. but this project was also used to target entirelv innocent. American citizens.

AS noted above, the CIA compiled a “UTatch List” of names of per- sons and organizations whose mail was to be oprnrd if it pnsserl throngh the Kew York facility. In the earlv days of the project. the names on this list-which then numbered fewer than twenty-might reason-

*ZZ Memorandum from W. C. Sullivan to C. D. DeLoach, 8/l/69. 121Memorandum from J. Edgar Hoover to Messrs. To&on, Sullivan and D. C.

Brcnnan. 10/15/70. * Ruckdshaus testimony before the Senate Subcommittee on Administrative

Practice and Procedure. 5/g/74. pp. 311-12. lzF, Transcript of the Presidential Tapes, 2/28/73 (House .Judiciary Committee

Statement of Information Book VII, Part W, p. 17.54.) ya The term “national securitv” was also used hv John Ehrlichman and Charles

Co&n to justify their roles in the break-in of Dr. Fielding’s office in 1971. A March 21,1973 tape recording of a meeting hetween President Sixnn. John Dean. and H. R. Haldeman surgests. however. that the national security “justification” may have heen developed long after the event for the purpose of ohscuring its im- propriety. When the President asked what could he done if the break-in was revealed publicly, *John Dean suggested. “You might put it on a national security grounds hasis.” Later in the conversation. President Nisnn stated “With the hnmhing thinr coming nut and everything coming nut. the whole thing was national security,” and Dean said, of Presidential tapes, 3/21/73.)

“I think we could get by on that.” (Transcript

Page 225: Church Committee: Reports-- Book II

209

ably have been expected to lead to grenuine fore@ intelligence or connterintrlligcnce information. Rut as tlie project developed. the Watch List grew and its focus clianged. I3y the late 1060s there were approximately, 600 names on the list. many of tllcm llnlcrican citizens and or,rranizatlons who were engaged in purely lawful and consti- tutionally protected forms of protest against ~ovcrninental policies. -1niong the domestic organizations on the Watch List, which was supplenicntecl 1,~ snbmisslon~ front the FRI. were : Cler,qv and Laymen Concerned aborit T’ictnnm. the Sational ~lohilization Committee to End the War in Vietnam, I~nrnpm-ts, the Stuclcnt Son-Violent Coordi- nating Committee. the Center for the Study of Public Policy, and the American Friends Service Con~mittee.127

The FBI levied more general requirements on the CIA’s project as well. The focus of the origrinal catcpories of correspondence in which the FBI expressed an interest, was clearly foreign counterespionage, hut subsequent requirements became proprcssivcly more domestic in t.heir focus and progressively hroatlcr in their scope. The requirements t,hat, acre levied hy the FBI m 1972. one year before the termination of the project, included the followinp :

“. . . [plersons on the Watch List : known communists, New Left activists, extremists, and other subversives . . .

Communist partr and front, orqmizations . . . extremist, and New Left. organizations.

Protest and peace orpanizations, such as People’s Coalition for Peace and ,Jnsticc, Sational Peace Action Committee, and Women’s Strike for Peace.

Comnrnnists, Trotskyites and members of other Marxist- Leninist, subversive and extremist ,rrroups, such as the Black Nationalists and Liberation groups . . . Students for a Demo- cratic Society. . . and other Sew Left groups.

Traffic to and from Puerto Rico and the Virgin Islands showing anti-lJ.S. or subversive sympathies.” lz8

This final set. of requirements evidently reflected the domestic turmoil of the late IOAOs and early 1970s. The mail openin,rr program that began as a means of collectin,rr foreign intelligence information and dis- c.overing Soviet intelligence efforts in the I-nited States had expanded to e.ncompass detection of the act.ivities of domestic dissidents of all types.

In the absence of effective outside control. hi,rrhlg intrusive tech- niques have been used to gather vast amounts of information about the ent.irely lawful activities-and privately held beliefs-of large num- bers of American citizens. The very intrusiveness of these techniques demands the utmost circumspection in their use. Rut with vague. or non-existent standartls to guide them. and with labels such as “national security” and “forcipn intelligence” to shield them, executive branch officials have heen all too willing to unlcasli these techniques against American citizens with little or no legitimate justification.

1?7 Staff summary of Watch List review, R/5/75. lZ8 Routing slip from J. Edgar Hoover to James Angelton (attachment), s/10/72.

68-7860-76-15

Page 226: Church Committee: Reports-- Book II
Page 227: Church Committee: Reports-- Book II

D. USING COVERT ACTION TO DISRUPT AND DISCREDIT DOMESTIC GROUPS

MAJOR FINDIXG

The Committee finds that covert action programs have been used to disrupt the lawful political activit,ies of individual Americans and groups and to discredit them, using dangerous and degrading tactics which are abhorrent in a free and decent society. Sub fidings

(a) Although the claimed purposes of these action programs were to protect. the nat.ional security and to prevent violence, many of the victims were concededly nonviolent. were not controlled by a foreign power, and posed no threat to the national security.

(b) The acts taken interfered with the First Amendment rights of citizens. They were explicitly intended to deter citizens from joining grotips, “neutralize” those who were already members, and prevent or inhibit the expression of ideas.

(c) The tactics used against Americans often risked and some- times caused serious emot.ional, economic, or physical damage. Actions were taken which were designed to break up marriages, terminate funding or employment, and encourage gang warfare between violent rival groups. Due process of law forbids the use of such covert tactics, whether the victims are innocent law-abiding citizens or members of groups suspected of involvement in violence.

, (d) The sustained use of such tactics by the FBI in an attempt to destroy Dr. Martin Luther King, Jr., violated the law and funda- mental human decency.

Elabration of the Findings For fifteen years from 1956 until 19’71, the FBI carried out a series

of covert a&ion programs directed against American citizens.* These “counterintelligence programs” (shortened to the acronym COINTELPRO) resulted in part from frustration with Supreme Court rulings limitin g the Government’s power to proceed overtly against dissident groups.z

‘Before 1956 the FRI engaged in actirities to disrupt and discredit Communists and (before World War II) Fascists. but not as part of a formal program. The Bureau is the only agency which carried on a sustained effort to “neutralize” domestic groups. althourh other agencies made sporadic attempts to disrupt dis- sident groups. (See Militarp Surveillance Report : IRS Report.)

‘The Rureau personnel involved in COINTELPRO link the first formal coun- terintelligence proeram. against the Communist Party. USA, to the Supreme Court reversal of the Smith Act convictions, which “made it impossible to prose- rutc Commnnist Party members at the time”. (COTNTELPRO unit chief, 10/16/75, p. 14.) It should he noted, however, that the Court’s reversal occurred in 1957. the Tear after the nroaram was instituted. This belief in the deficiencies of the law &as a major fnct& in the four subsequent programs as well: “The other COTSTELPRO promnms rere opened as the threat arose in areas of extremism and suhrersion and there were not aderluate statutes to proceed against the organization or to prevent their activities.” (COINTELPRO Unit Chief, 10/16/75, p. 15.)

(211)

Page 228: Church Committee: Reports-- Book II

212

They ended formallv in 1071 with the threat- of public e~posure.~ Some of the findings discussed herein are related to the findings on lawlessness, overbreadth. and intrusive techniques previously set, fort.11. Some of the most offensive. actions in the FBI’s COIXTEL PRO programs (anonymous letters intended to break np marriages, or efforts to deprive people of their jobs, for example) were based upon the covert use of information obtained through overly-broad inves- tigations and intrusive kchniques. 4 Similarly, as notted above, COIN- TELPRO involved specific violations of law. and the law ancl the Constitution were ‘*not [given] a thought” under the FBI’s l>olicies.5

But COIKTELPRO was more t.han simply violating the law or the Constitution. In COINTELPRO the Bureau secretly 6 took the law into its own hands, going beyond the collection of intelligence and beyond it.s law enforcement fun&ion to act outside the legal process

altqgether and to covertly disrupt, discredit and harass groups and individuals. A law enforcement agency must not secrrtly usurp the functions of judge and jury, even when the investigation reveals crim- inal activity. But in COINTELPRO, the Bureau imposed summary punishment, not only on the allegedly violent, but also on the non- violent advocates of change. Such action is the hallmark of the vig- ilante and has no place in a democrat,ic society.

Under COINTELPRO, certain techniques the Bureau had used against hostile foreign agents n-we adopted for use against perceived domestic threats to the established political and social order.?

Some of the targets of COINTELPRO were law-abiding citizens merely advocating change in our society. Other targets were members

3 For further information on the termination of each of the programs, see The Accountability and Control Findings, p. 265 and the detailed reports on the Black Panther Pa& and COINTELPRG.

Although the programs have been formally terminated, Bureau witnesses agree that there is a “grey area” between “counter-intelligence” and investiga- tive activities which are inherently disruptive. These investigative activities continue. (See COISTELPRO Renort : “Command and Control-The Problems of Oversight.“)

‘Information gained from electronic surveillance, informant coverage, bur- glaries. and confidential financial records was used in COISTELPRO. n. 27.5. i

‘Moore, U/3/75, p. 83. ‘Field offices were instructed that no one outside the Bureau was to know

that COISTELPRO existed, although certain persons in the exwutive branch and in Congress were told about-and did not object twfforts to disrupt the CPI’SA and the Klan. Hoverer. no one was told about the other COISTELPRO programs. or about the more dangerous and degrading techniques employed. (See p. 275.)

’ As the Chief of the Racial Intelligence Section put it : “You can trace [the origins of COINTELPRO] up and hack to foreign intel.

ligence, particularly penetration of the group by the individual informant. Be- fore vou can eneaec in counterintelligence rou must have intelligence. . . I f you have good intelligence and know <-hat it’s going to do. you ran-seed distrust, sow misinformation. The same technique is used, misinformation, disruption. is used in the domestic groups, although in the domestic groups you are dealing in ‘67 and ‘68 with many, many more across the country . . . than you had ever dealt with as far as Four foreign groups.” (Snore, 11/3/75. pp. 32-33.)

Former Assistant Director William C. Sullivan also testified that the “rough, tough, dirty business” of foreign counterintelligence was “brought home against any organization against n-hich we were targeted. We did not differentiate.” (Sullivan, 11/l/75, pp. 97-98.)

Page 229: Church Committee: Reports-- Book II

213

of groups that had been involved in violence, such as the Ku Klux Klan or the Black Panther Party. Some victims did nothing more than associate with targets.8

of The Committee does not condone acts of violence, but the response Government to allegations of illegal conduct must comply with the

due process of law demanded by the Constitution. Lawlessness by citizens does not justify la\vlessness by Government.

The tactics which were employed by the Bureau are therefore unacceptable, even against the alleged criminal. The imprecision of the targeting compounded the abuse. Once the Government decided to take the law into its own hands, those unacceptable tactics came almost inevitably to be used not only against the “kid with the bomb” but also against the “kid with the bumper sticker.” g

Suhfinding (a) Although the claimed purposes of these action programs were

to protect the “national security” and to prevent violence, many of the victims were concededly nonviolent, were not cpntrolled by a foreign power, ‘and posed no threat to the “national security.”

The Bureau conducted five “counterintelligence programs” aimed against domestic groups : the “Communist Party, USA” program (1956-71) ; the “Socialist Workers Party” program (1961-69) ; the “White Hate” program (1964-1971) ; the “Black Nationalist-Hate Group” program (1967-71) ; and the “New Left” program (1968-71).

While the declared purposes of these programs were to protect the “national security” or prevent violence, Bureau witnesses admit that many of the targets were nonviolent and most had no connections with a foreign power. Indeed, nonviolent organizations and individ- uals were targeted because the Bureau believed they represented a “potential” for violence lo and nonviolent citizens who were against the war in Vietnam were targeted because they gave “aid and comfort” to violent demonstrators by lending respectability to their cause.*l

The imprecision of the targeting is demonstrated by the inability of the Bureau to define the subjects of the programs. The Black Nationalist program, according to its supervisor, included “a great number of organizations that you might not today characterize as black nationalist but which were in fact primarily black.” I2 Thus, the nonviolent Southern Christian Leadership Conference was labeled as a Black Nationalist-“Hate Group.”

Furthermore, the actual targets were chosen from a far broader group than the titles of the programs would imply. The CPUSA program targeted not only Communist Party members but also spon- sors of the National Committee to Abolish the House Un-American --

* For example, parents and spouse. of targets received letters containing accu- sations of immoral conduct by the target. (Memorandum from St. Louis Field Office to FBI Headquarters, l/30/70: memorandum from FBI Headquarters to Minneapolis Field Office. U/4/68.)

@ Huston, 9/23/75. Hearings, Vol. 2, p. 45. lo Moore, 11/S/75, p. 37. I1 New Left supervisor, 10/28/75, p. 69. la Black Nationalist Supervisor, 10/17/75, p. 12.

Page 230: Church Committee: Reports-- Book II

214

Activities Committee I4 and civil rights leaders allegedly under Com- munist influence or not deemed to be “anti-Communist7’.15 The Socialist, Workers Party program included non-SWP sponsors of antiwar demonstrations which were cosponsored by the SWP or the Young Socialist Slliance, its youth group.16 The Black Sationalist program targeted a range of organizations from the Panthers to Sh CC to the peaceful Southern Christian Leadership Conference, and included every Black Student Union and many other black student groups.” Sew Left targets ranged from the SDS I8 to the Inter- University Committee for Debate on Foreign Policy71Q from Sntioch College (“vanguard of the New Left”) 2o to the New Mexico Free ITnivcrsity and other “alternate” schools,** and from underground newspapers “2 to students protesting university censorship of a student publication by carrying signs with four-letter words on them.*‘j

Rub finding (6) The acts taken interfered with the First ,Qmendment rights of citi-

zens. They were explicitly intended to deter citizens from joining

I’ For example, the entire Unitarian Society of Cleveland was targeted because the minister and some members circulated a netition calling for the abolition of HUAC. and because the Church gave office space to the “Citizens for Constitu- tional Rights”. (Memorandum from FBI Headquarters to Cleveland Field Office, 11/6/64.)-

15 See Findine on “Overbreadth” D. 181. I3 For instan&, the Bureau targeted two non-member students who partici-

pated in an anti-xvar “hunger strike” at Oberlin, which was “guided and directed” by the Young Socialists Alliance. The students’ parents received anonymous let- ters. uurnortedlv from a friend of their sons. One letter exnressed concern that a group of “left wing students” were “cynically using” the bo$, which would lead to “injurg” to his health and “damage to his academic standing”. The other letter also stated that it n-as motivated by concern for “damage” to the student’s “health and personal future” and “the belief that you may not be aware of John’s current involvement in left-wing activities.” (Memorandum from FBI headquarters to Cleveland Field Office, 11/29/68. )

I’ One proposal sought to expose Black Student Union Chapters as “breeding grounds for racial militancy” by an anonymous mailing to “all institutions There there are BSU chapters or incipient chapters”. (Memorandum from Portland Field Office to FBI Headquarters, g/3/68.)

‘*For example Memorandum from FBI Headquarters to San Antonio Field Office, 10/31/6S.

‘OAn anonymous letter was sent to “intluential” Michigan political figures, the mass media.‘Universitr of Michiean administrators. and the Board of Reeents. in an attempt to “d&edit and-neutralize” the “communist activities” of the IUCDFP. The letter decried the “undue publicits” given anti-war protest activities which “undoubtedlr give ‘aid and comfort to the enemy” and encour- age the Yietconf and the Korth Vietnamese in “refusing to come to the bargain- ing table”. The letter continued, “I wonder if the strategy is to bleed the United States white br nrolondne the war in Vietnam and pave the way for a takeover by Russia?” (1\Iemorandum from Detroit Field Office to FBI Headquarters, lO/ll/ 66 : Memorandum from FBI Headquarters. to Detroit Field Office 10/26/66.)

20Memorandum from FBI Headquarters to Cincinnati Field Office, S/lS/sS. II The New Mexico Free Unirersitr was targeted because it taught such courses

as “confrontation politics” and “draft counselling”. (Jlemorandum from FBI Headquarters to Albuquerque Field Office, 3/19/69.) In another case, an “alter- nate” school for students “aged five and beyond”, which was co-sponsored b.r the ACLU, was targeted because “from the staff being assembled, it appears that the school will be a Sew Left venture and of a radical revolutionary nature”. The Bureau contacted a confidential sourre in the bank financing the school SO that he could “take steps to discourage its developments”. (Memorandum from FRI Headquarters to San Antonio Field Office, ‘i/23/69.

*‘See e.g., Memorandum from FBI Headquarters to Pittsburgh Field Office, 11/14/69.

=Memorandum from FBI Headquarters to Minneapolis Field Office, 11/4/68.

Page 231: Church Committee: Reports-- Book II

215

groups. “neutralize” those who were already members, and prevent or inhibit the expression of ideas.

In achieving its purported goals of protecting the national security and preventing violence. the Bureau attempted to deter membership in the target groups. As the supervisor of the “Black Nationalist” CO ISTELPRO stated, “Obviously, you are going to prevent violence or a greater amount, of violence if you hare smaller groups.” 24 The chief of the COISTELPRO unit agreed: “WC also made an effort . . . to deter recruitment where we could. This was done with the view that if we could curb the organization, we could curb the action or the vio- lence within the organization.” “j ,%s noted above, many of the orga- nizations “curbed” were not violent, and cove,& attacks on group membership contravened the First Amendment’s guarantee of freedom to associate.

Kor was this the only First Amendment right violated by the Bureau. In addition to attempting to prevent people from joining or continuing to be members in target organizations, the Bureau tried to “deter or counteract” what it called “propaganda” Z6-the expres- sion of ideas which it considered dangerous. Thus, the originating document for the “Black Sationalist” COIXTELPRO noted that “consideration should be given to techniques to preclude” leaders of the target organizations “from spreading their philosophy publicly or through various mass communication media.” H

Instructions to “preclude” free speech were not limited to “black nationalists;” they occurred in every program. In the New Left pro- gram, for instance, approximately thirty-nine percent of all actions attempted to keep targets from speaking, teaching, writing, or publisl~ing.2s

The cases included attempts (sometimes successful) to prompt the firing of university and high school teachers ; 29 to prevent targets from speaking on campus ; 3o to stop chapters of target groups from

*’ Black Nationalist supervisor, 10/17/X( p. 24. s COINTELPRO unit chief, 10/12/75, p. 54. 28 COISTELPRO unit chief. 10/12/75. D. 54. ” Memorandum from FBI Headquarters to all SAC’s, g/25/67. )B The FBI was not the only intelligence agency to attempt to prevent the

propagation of ideas with which it disagreed, but it was the only one to do SO in any organized war. The IRS responded to Congressional and Administration pressure by targeting political organizations and dissidents for audit. The CIA improperly obtained the tax returns of Ramparts magazine after it learned that the magazine intended to nuhlish an article revealing Agencs sunnort of the Nationai’Stndent Association. The CIA saw the article as “an attack on CIA in particular and the .\dministration in general.” (CIA memorandum re: “IRS

Briefing on Ramparts,” 2/2/67.) “For instance. a high school English teacher was targeted for inviting two

poets to attend a class at his school. The poets were noted for their efforts in the draft resistance movement. The Bureau sent anonymous letters to two local newsnaners. the Board of Education. and the school hoard. fMemorandum from FRT ‘Headquarters to Pittsburgh Field Office. S/19/69.1

3o In one case, the Rnreau attempted to stop a “Communist” speaker from annearing on campus. The snnnsoring organization went to court and won an order nrrmitting the lecture to proceed as scheduled : the Bureau then inresti- gnted the judge who issued the order. (~Iemnrnndnm from Detroit Field Office to FBI Hendquarters. IO/%/60 : 1Iemornndnm from FBI Hendnuartrrs to Detroit Field Office, 10/27/f%. 10/28/. 10/31/60; Memorandum from F. J. Baumgardner to A. H. Belmont, 10/26/60.)

Page 232: Church Committee: Reports-- Book II

216

being formed ; 31 periodicals ;

to prevent the distribution of books, newspapers, or 32 to disrupt or cancel news conferences ; 33 to interfere

with peaceful demonstrations, including the SCLC’s Poor Peo- ple’s Campaign and Washington Spring Project and most of the large anti-war marches ; 34 conferences.35

and to deny facilities for meetings or

As the above cases demonstrate? the FBI was not just “chilling” free speech, but squarely attacking it.

The tactics used against Americans often risked and sometimes caused serious emotional, economic, or physical damage. Actions were taken which were designed to break up marriages, terminate funding or employment, and encourage gang warfare between violent rival groups. Due process of law forbids the use of such covert tactics whether the victims are innocent law-abiding citizens or members of groups suspected of involvement in violence.

The former head of the Domestic Intelligence Division described counterintelligence as a “rough, tough, dirty, and dangerous” busi- ness.36 His description was accurate.

One technique used in COINTELPRO involved sending anony- mous letters to spouses intended, in the words of one proposal, to ‘Lproduce ill-feeling and possibly a lasting distrust” between husband and wife, so that “concern over what to do about it” would distract the target from “time spent in the plots and plans” of the orpaniza- tion.37 The image of an agent of the United States Government scrawl- ing a poison-pen letter to someone’s wife in language usually reserved for bathroom walls is not a happy one. Nevertheless, anonymous let-

91 The Bureau tried on several occasions to prevent the formation of campus chapters of SDS and the Young Socialist Alliance. (See, e.g., Memoiandum from San Antonio Field Office to FBI Headquarters, 5/l/69; Memorandum from FBI Headquarters to San Antonio Field Office, 5/l/69.)

81 For example, an anonymous letter to a state legislator protested the distribu- tion on campus of an underground newspaper’s “depravity”, (Memorandum from Newark Field Office to FBI Headquarters, 5/23/69 ; Memorandum from FBI Head- quarters to Newark Field Office, 6/4/69) and thhe Bureau anonymously contacted the landlady of premises rented by two “New Left” nawcpapers in an attempt to have them evicted. (Memorandum from Los Angeles Field Office to FBI Headquar- ters, g/9/68; Memorandum from FBI Headquarters to Los Angeles Field Office,

g/23/68. ) =For example, a confidential source in a radio station was contacted in two

successful attempts to cancel news conferences. (Memorandum from FBI Head- quarters to Cleveland Field Office, 10/l/65 ; Memorandum from FBI Headquarters to Cleveland Field Office 10/4/65 : Memorandum from Boston Field Office to FBI Headquarters, 2/5/64 ; Memorandum from F. J. Baumgardner to William C. Sulli- “a,“, 6/25/64.)

For instance, the Bureau used the standard counterespionage technique of “disinformation” against demonstrators. In one case. the Chicago Field Office duplirated blank forms soliciting housing for demonstrators coming to Chicago for the Democratic National Convention, filled them out with fictitious names and addresses and sent them to the organizers. Demonstrators reportedly made “long and useh?ss ionmevs to locate thpr;e addrecses.” (Memorandum from Chicago Field Office to FBI’Headquarters. g/9/68.) The same program was carried out by the Washington Field Office when housing forms were distributed for dem- onstrators comine to the 1969 Presidential inaueural ceremonies. (Memorandum from FBI Headquarters to Washington Field Offire. l/10/69.) Army intcllizence agents occasionally took similar, but wholly unauthorized action, see Military Surveillance Report : Section III : “Domesttic Radio Monitoring by ASA : 1967- 1970.”

85 Memorandum from FBI Headquarters to San Diego Aeld office, g/11/69. m Sullivan. 11/l/75, pp. 97-98. a Memorandum from St. Louis Field Office to FBI Headquarters, 2/14/69.

Page 233: Church Committee: Reports-- Book II

217

ters Were sent to. among others, a IClansman’s wife. informing her tllat her Il~sba~~d h:ld “taken the flesh of another unto llimself,” the other person bring a woman named Ruby, with her “lust filled eyes n11d smart CllfYl; fipw ;‘! afi and to a “Black Knt,ionalist’s” wife sa&g that, her husband “been maken it here” with other women in hii or- ganization “and than he gives us this jive bout their better in bed then VOLI.” ” A husband Fvho was concerned about his wife’s activities in a &racial group received a letter which started. “Look man I guess YOUR 01~1 lady doesn’t get enough at home or she wonldn’t be shucking and jiving with our 131ack Xen” in the gr~up.~~ The Field Office re- ported as a “tangible result” of this letter that the target and her husband separated.41

The Bureau also contacted employers and funding organizations in order to cause the firing of the targets or the termination of their support.4” For example, priests who alloTed their chnrc,hes to be used for the Black Panther breakfast programs were targeted, and anony- mous letters mere sent to their bishops; 43 a television commrntat.or who expressed admiration for a Black Nationalist leader and criticized heavy defense spending was t,ransferred after the Bureau contacted his employer ; 44 and an employee of the Urban League was fired after the FBI approached a “confidential source” in a foundation which funded the League.45

The Bureau also encouraged (‘gang warfare” between violent groups. An FBI memorandum dated Ko?ember 25,1968 to certain Field Offices

conducting investigat.ions of the Black Panther Party ordered recip- ient o&es to submit “imaginative and hard-hitting counterintelli- gence measures aimed at crippling the BPP.” Proposals were to be received every two weeks. Parti&lar attention was to be given to capitalizing upon differences between the Panthers and US, Inc. (an other “Black Nationalist” group), which had reached such propor- tions that “it is taking on the aura of gang warfare rrith attendant threats of murder and reprisals.” 4Ba On May 26,1070, after U.S. orpn- nization members had killed four BPP members and members of each o:ganization had been shot and beaten by members of the other, the Field Office reported :

Information received from local sources indicaters] that, in general! the membership of the Los Angeles BPP is physl- tally afraid of US members and take premeditated precau- tions to avoid confrontations.

38 Memorandum from Richmond Field Office to FBI Headquarters, S/26/66. m The wife who received this letter n-as described in the Field Offire proposal

as “faithful an intelligent respectable young mother who is active in the AJIE Method% khurch.” (Jlemarandum from St. Louis Field Office to FBI Head- quarters, 2/14/69. )

“‘Memorandum from St. Louis Field Office to FRI Headquarters, l/30/70. ‘I Memorandum from St. Louis Field Office to FBI Headquarters, 6/19/70. ‘*When the targets were teachers, the intent was to prevent the propagation of

ideas. In the case of other employer contacts, the purpose was to stop a source of funds.

a Memorandum from New Haven Field Office to FBT Headquarters, 11/12/69 ; memorandum from FBI Headquarters to San Diego Field Office, Q/9/69.

41 \Iemornntlnm from FRT Headquarters to Cinrinnati Field Ofire. 3/28/6Q. 45 ikemorandum from FBI Headquarters to Pittsburgh Field Office, 3/3/69. ‘GM Memorandum from FBI Headquarters to Baltimore Field Office, 11/25/68.

Page 234: Church Committee: Reports-- Book II

218

In view of their anxieties, it is not presently felt that the Los Angeles BPP can be prompted into what could result in an internecine struggle between the two organizations. . . .

The Los Angeles Division is aware of the mutually hostile feelings harbored between the organizations and the first opportunity to capitalize on the situation will be maximized. It is intended that US Inc. will be appropriately and dis- creetly advised of the time and location of BPP activities in, order that the two organizations might be brought together and thus .qrant nature the opportunity to take her due course.46 [Emphasis added.]

A second Field Office noted :

Shootings, bcratings land a high degree of unrest continues to prevail in the ghetto area of Southeast San Diego. Al- though no specific counterintelligence action can be credited with contributing to this ove.rall situation, it is felt that a substantial amount of the unrest is directly attributable to ‘this program.47

In another case, an anonymous letter was sent to the leader of the Blackstone Rangers (la group,.nccording to t.he Field Offices’ proposal, “to whom violent-type activity, shooting: and the like are second nature”) advising him that “the brothers that run the Panthers blame you for blocking their thing and there’s supposed to be a hit out for you.” The letter was intended to “intensify the degree of animosity between the two groups” and cause “retabatory action which could disrupt the BPP or lead to reprisals against its leadership.” 48

Another technique which risked serious harm to the target was falsely labeling a t.arget ‘a.n informant. This technique was used in all five domestic COINTELPRO. When a member of a nonviolent group was s~mcessfully mislabeled as an informant, the result was alienation from the group.4s When the target belonged to a group known to have killed suspected informants, the risk was substantially more serious. On several occasions, the Bureau used this technique against members of the Black Panther Party; it was used at least twice after FBI docu- ments expressed concern over the possible consequences because two members of the BPP had been murdered as suspected informants.50

The Bureau recognized that some techniques used in COINTELPR.0 were more likely than others to cause serious physical, emotional, or economic damage to the targets .51 niques-for example,

Any proposed use of such tech- encouraging enmity between violent rival

-- “Memorandum from Los Angeles Field Office to FBI headquarters, 5/26/70,

pp. l-2. “I Memorandum from San Diego Field Office to FBI headquarters, g/15/69. uI Memorandum from Chicago Field Offlce to FBI he’adquarters, l/12/69 ; Mem-

orandum from FBI Headquarters to Chicago Field Office, l/30/69. “See, e.g., Memorandum from San Diego Field Office to FBI Headquarters,

4/30/69. w One proposal to label a BPP member a “pig informer” was rejected because

the Panthers had recently murdered two suspected informers. The victims had not been targets of a Bureau effort to label them informants. (Memorandum from FBI Headquarters to Cincinnati Field Office, 2/18/71.) Serertheless. two similar proposals mere implemented a month later, (Memorandum from FBI Headquar- ters to Washington Field Office, 3/19/71; Memorandum from FBI Headquarters to Charlotte Field Office. 3/31/71.)

‘I At least four assaults-two of them on women-were reported as “results” of Bureau actions. (See COINTELPRO Report, Section IV : Wartimes Technique Brought Home.)

Page 235: Church Committee: Reports-- Book II

219

groups, falsely labeling group members as informants, and mailing anonymous letters to targets’ spouses accusing the target of infidelity- was scrutinized carefully by headquarters supervisory personnel, in an attempt. to balance the “greater good” to be achieved by the pro- posal against the known or risked harm to the target. If the “good” was sufficient, the proposal was approved. For instance, in discussing anonymous letters to spouses, the agent who supervised the New Left COINTI3LPRO stated :

[Before recommending approval] I would want. to know what you want to get out of this, who ire these people. If it’s somebody, and say they did split up, what would accrue from it as far as disrupting the Nen- Left is concerned? Say they broke up, what then. . . .

[The question would be] is it worth it? 52 Similarly: with regard to causing false suspicions that an individual

was an informant, the chief of the Racial Intelligence Section stated: You have to be able to make decisions and I am sure that la- beling somebody as an informant, that you’d want to make certain that it served a good purpose before you did it and not do it haphazardly. . . . It is a serious thing. . . As far as I am awarr, in the black extremist area, by using that technique, no one was killed. I ‘am sure of that.52a

This official was asked whether the fact that no one was killed was the result, of “luck or planning.” He answered : “Oh, it just happened that way, I am sure.” 52b

It is intolerable in a free society that. an agency of the Government should adopt such tactics, whether or not the targets are involved in criminal ,act,ivit,y. The “greater good” of the country is in fact served by adherence. to the rule of law mandated by the ,Constitution.

Xub finding (d) The sustained use of such tactics by the FBI in an attempt to de-

stroy Dr. Martin Luther King, Jr., violated the law and fundamental human decency.

The Committee devoted substantial attention td the FBI’s covert action campaign against Dr. Martin Luther King because it demon- strates just, how far the Government could go in a secret war against one citizen. In focusing upon Dr. King, however, it should not be forgotten that the Bureau carried out disruptive activities against hundreds of lesser-known american citizens. It should also be borne in mind that positive action on the part of high Government officials outside the FBI might hare prevented what occurred in this case.53

The FBI’s claimed justification for targeting Dr. King-alleged Communist, influence on him and the civil rights movement-is ex- amined elsewhere in this report.54

62 New Left supervisor 10/28/75, pp. 72,74. ‘?a Moore, 11/3/75, p. 62. Mb Moore, H/3/75, p. 64. j3 SW pp. 275-277 and 2OS-MB of this Report for a detailed discussion of which

officials were i?ware or should have been aware of what ‘the Bureau n-as doing to Dr. King and how their action or inaction might hare contributed to what went on.

M See Marin Luther King Report, Section III, “Concern in the FBI and the Kennedy Administration Over Allegations of Communist Influence in the Civil Rights Movement Increases, and the FBI Intensifies the Investigation: Octo- ber 1962-October 1963.” See generally, Finding on Overbreadth, p. 175.

Page 236: Church Committee: Reports-- Book II

220

The FBI’s campaign against Dr. Martin Luther King, Jr. began in December 1963, four months after the famous civil rights March on Washington, 55 when a nine-hour meeting was convened at FBI Head- quarters to discuss various “avenues of approach aimed at neutralizing King as an effective Negro leader. ” 56 Following the meeting, agents in the field were instructed to “continue to gather information con- cerning King’s personal activities . . . in order that we may consider using this information at an opportune time in a counterintelligence move to discredit him.” 57

About two weeks after that conference, FBI agents planted a micro- phone in Dr. King’s bedroom at the Willard Hotel in Washington, D.C.5s During the next two years, the FBI installed at least fourteen more “bugs” in Dr. King’s hotel rooms across the country.59 Physical and photographic surveillances accompanied some of the microphone coverage.6o

The FBI also scrutinized Dr. King’s tax returns, monitored his financial affairs, and even tried to deterrnine whether he had a secret foreign bank account.61

In late 1964, a “sterilized” tape was prepared in a manner that would prevent attribution to the FBI and was “anonymously” mailed to Dr. King just before he received the Nobel Peace Prize.62 Enclosed in.the package with the tape was an unsigned letter which warned Dr. King,

*The August 1963 march on Washington was the occasion of Dr. Kings “I Have a Dream” speech, on the steps of the Lincoln Memorial. (See memorandum from William C. Sullivan to Alan Belmont, 8/30/63, characterizing the speech as “demagogic”.)

r,a Memorandum from William C. Sullivan to Alan Belmont, 12/24/63. Although FBI officials were making derogatory references to Dr. King and passing personal information about Dr. King to their superiors. (Memorandum from Hoover to Deputv Attorney General Katzenbach, S/13/63.) Prior to December 1963, the Committee had discovered no document reflecting a strategy to deliberately discredit him prior to the memorandum relating to the December 1963 meeting.

“Memorandum from William C. Sullivan to Alan Belmont, 12/24/R 68 The microphone was installed on January 5, 1961 (Memorandum from

William C. Sullivan to Alan Belmont, l/6/64.), just days after Dr. King’s pic- ture appeared on the cover of Time magazine as “Man of the Year.” (Time Magazine, January 3, 19&l.) Beading of the Time magazine award, the Director had written, “They had to dig deep in the garbage to come up with this one.” (Note on UP release, 12/29/63.)

“FBI memoranda make clear that microphones were one of the techniques being used in the effort to obtain information about Dr. King’s private life. (Memorandum from F. J. Baumgardner to William C. Sullivan l/28/64.) The mi- drophones were installed at the following places: Wnshington: Willard Hotel (Jan. 1964) ; Milwmtkce: Shroeder Hotel (Jan. 1964) ; Honolulu: Hilton Hawai- ian Village (Feb. 1964) : Detroit: Statler Hotel (March 1964) : Sacramento: Senator Motel IAnr. 1964) : Arew York Cit?/: Park Sheraton Hotel (Jan. 19651. Americana Hotel ‘(Jan. and Nov. IS@), Sheraton Atlantic Hotel (May 1965), Astor Hotel (Oct. 1965). New York Hilton Hotel (Oct. 1965).

B” FBI summary memorandum, 10/3/75 : memorandum from F. J. Baumgardner to William C. Sullivan, 3/26/G-1 ; memorandum from William C. Sullivan to Alan Belmont, 2/22/64 ; and unsigned memorandum, 2/28/64.

BI Memorandum from F. J. Baumgardner to William C. Sullivan. 3/27/64; memorandum from New York Field Office to FBI Headquarters, 6/2/f%; memo- randum from F. ,J. Baumgardner to William Sullivan, 7/14/65.

aa Sullivan 11/l/75, pp. lM-105, staff summary of a special agent interview, 7/25/75. Three days before the tape was mailed, Director Hoover had puhliclv branded Dr. King “the most notorious liar in the country” and Dr. Kinr had responded with a criticism of the Bureau, (Memnrnndun~ from Cartha ~~lnach to John Mohr, 11/18/64; telegram from Martin Luther King to J. Edgar Hoover 11/19/64.)

Page 237: Church Committee: Reports-- Book II

221

“your end is approaching . . . you are finished.” The letter intimated that the tape might be publicly released, and closed with the follow- ing message :

King, there is only one thing left for you to do. You know what it is. You have just 34 days in which to do (this exact number has been selected for a specific reason, it has definite practical significance). You are done. There is but one way out for you . . .G3

Dr. King’s associates have said he interpreted the message as an effort to induce him to commit suicide.64

At about the same time that it mailed the “sanitized” t.ape: the FBI was also apparently offering tapes and transcripts to newsnlcn.“5 Later when civil rights leaders Roy Wilkins and James Farmer went to Washington to persuade Bureau officials to halt the FBI’s discredit- ing efforts,CG they were told that “if King want [s] war we [are] pre- pared to give it to him.“67

Shortly thereafter, Dr. King went to Europe to receive the Nobel Peace Prize. The Bureau tried to undermine ambassadorial receptions in several of the countries he visited,68 and when he returned to the

*This paragraph appears in a document in the form of a letter which the FBI has supplied to the Committee and which the Bureau maintains was discovered in the files of former Assistant Director Sullivan. (FBI memorandum to the Select Committee, g/18/75.) Sullivan stated that he did not recall the letter and sug- gested that it may have been “planted” in his files by his former colleagues. (Sullivan 11/l/75, p. 104.) Congressman Andrew Young has informed the Com- mittee that an identical paragraph was contained in the letter which was actnallp received by Dr. King with the tape, and that the letter the committee had, supplied by the Bureau, appears to be an “early draft.” (Young, Z/19/76, p. 36.)

Sullivan said that the purpose of sending the tape was “to blackmail King into silence . . to stop him from criticising Hoover; . . to diminish his stature. In other words, if it caused a break between Coretta and Martin Luther King, that would diminish his stature. It would weaken him as a leader.” (Sullivan, 11/l/75, 11/26/75, p. 152.)

a Young, 2/19/76, p. 37, Time magazine had reported earlier in the year that Dr. King had attempted suicide twice as a child. [Time magazine, Jan. 4, 196&l

* Several newsmen have informed the Committee that they were offered this kind of material or that thev were aware that such material was available. Some have refused to identify the individuals who made the offers and others have said they could not recall their identities. Former FBI officials have denied that tapes or transcripts were offered to the press (e.g., DeLoach testimony, 11/26/‘75, p, 152) and the Bureau maintains that their files contain no documents reflecting that this occurred.

” Staff interviews of Roy Wilkins, 11/23/75, and *James Farmer, U/13/75. “Memorandum from Cartha DeLoach to John Mohr. U/27/64: staff interview

of James Farmer, 11/13/75. Three days after Wilkins’ meeting with DeLoach, Dr. King asked to see the Director, telling the press “the time has come to bring this rontroversp to an end.” (UPI release, 12/l/64) Dr. King and Hoover met the following day; the meeting was described as “amicable.” (Memoranda from Cartha DeLoach to .John Mohr, 12/l/64 and 12/2/64.) Despite the “amicable” meeting, the Bureau’s campaign against Dr. King continued,

as Memorandum from F. J. Baumgardner to William C. Sullivan, 11/30/64 ; memorandum from Lrpat to FBI Headquarters, 12/10/62. Steps were also taken to thwart a meeting which Dr. King was planning to have with a foreign leader during this same trip (Memorandum from F. .J. Banmgardner to William C. Sullivan, 11/10/64 : memorandum from FRT Headouarters to Legat, 11/10/64), and to influence a pending USIA derision to send Dr. King on a ten-day lecture trip in Bfricn after receiving the Nobel Prize. (Memorandum from F. J. Baum- gardner to William C. Sullivan, U/12/64.)

Page 238: Church Committee: Reports-- Book II

222

United States, took steps to diminish support for a banquet and a special “day” being planned in his 11onor.6Q

The Bureau’s actions against Dr. King included attempts to prevent him from meeting with world leaders, receiving honors or favorable publicity, and gaining financial support. When the Bureau learned of a possible meeting between Dr. King and the Pope in August 1964, the FBI asked Cardinal Spellman to try to arrange a cancellation of the audience.70 Discovering that two schools (Springfield College and Marquette University) were going to honor Dr. King with special degrees in the spring of 1964;, Bureau agents tried to convince officials at the schools to rescind their plans. ‘l And when the Bureau learned in October 1966 that the Ford Foundation might grant three million dollars to Dr. King’s Southern Christian Leadership Conference, they asked a former FBI agent who was a high official at the Ford Motor Company to try to block the award.72

A magazine was asked not to publish favorable articles about him.‘3 Religious leaders and institutions were contacted to undermine their support, of him. 74 Press conference questions were prepared and dis-

‘*The Bureau was in touch with Atlanta Constitution publisher Ralph McGill, and tried to obtain the assistance of the Constitution’s editor. Eugene Patterson. to undermine the banquet. (Memorandum from William ~C: S&van to Alan Belmont, 12/21/64; staff summary of Eugene Patterson interview. 4/30/i%) A governor’s assistance was sought in the effort to “water down” the “King day.” (Memorandum from F. J. Baumgardner to William C. Sullivan, a/2/65.)

70The Bureau had decided it would be “astounding” for Dr. King to have an audience with the Pope and that plans for any such meeting should be “nipped in the bud.” (Memorandum from F. J. Baumgardner to William C. Sullivan, S/31/64.) When the Bureau failed to block the meeting and the press reported that the audience was about to occur, the Director noted that this was “astound- ing.” (FBI Director’s notation on UP1 release, Q/18/64). FBI officials took immediate stens to determine “if there could nossihlv have been a slin-un.” (Memorandum from F. J. Baumgardner to William C.- Sullivan, Q/17/64.*) -

“‘The Bureau had decided that it would be “shocking indeed that the pos- sibility exists that King may receive an Honorary Degree from the same ins&i- tion (Marquette) which honored the Director with such a Degree in 7950.” With respect to Springfield College, where the Director had also been offered an honor- ary degree, the Bureau’s decision about whom to contact included the observation that “it would not appear to be prudent to attempt to deal with” the President of the college because he “is verv close to Sargent Shriver.” (Memorandum from F. J. Bau&gardner to William -C. Sullivan, i/4/64 ; and 4/2/64 ; memorandum from Cartha DeLoach to John Bohr, 4/S/64.)

n Memorandum from Cartha DeLoach to Clyde Tolson, 10/25/66 and 10/26/66. At about the same time. the Bureau leaked a &tory to the mess about Dr. King’s intention to seek financial assistance from Teamsters Union President *James R. Hoffa because “[dlisrlosure would be mutually embarrassing to both men and probably cause King’s quest for badly needed funds tn fail in thiq ingtance.” (Memorandum from F. J. Baumeardner to William C. Sullivan, 10/28/66. ) ~ ~~~~~~~~~~ ~~~

The Bureau also tried to blockthe National Science Foundation (NSF) from dealing with the SCLC. “It is incredible that an outfit such as the SCLC should be utilized for the purpose of recruiting Negroes to take part in the NSF program. narticularlv where funds of the U.S. Government are involved.” (liemorandum ?rom F. J.‘Baumgardner to William C. Sullivan, 12/17/64.)

‘3 Memorandum from Special Agent to Cartha Deloach, 11/3/64. ” “It is shocking indeed that King continues to be honored by religious groups.”

(Memorandum from F. J. Baumgardner to William C. Sullivan, 2/l/65.) Contacts were made with representatives of the National Council of Churches of Christ, the Baptist World Alliance. the American Church in Paris. and Catholic Church. (Memnranda from William C. Sullivan to Alan Belmont, 6/12/64. 12/15/64 and 2/16/64: memorandum from F. .T. Banmgardner to William C. Sullivan. 2/18/66 : memorandum from Chicago Field Office to FBI Headquarters, 2/24/66, and

Page 239: Church Committee: Reports-- Book II

223

trihuted to “fricncllv” journalists. 75 And plans v~re even discussed for sabotaging his political campaign in the event he decided to run for national off+2.7G ;1n SCLC employee was “anonyn10us1y” informed that the SCLC was trying to .get rid of her “so that the Bureau [would be] in a position to capitalize on [her] bitterness.” i8 Bureau officials contacted members of Congress,79 and special “off the record” testimony was prepared for the Director’s use before the House Appropriations Conlmittec.80

The “neutralization” program continued until Dr. King’s death. As late as March 1068, FBI agents were being instructed to neutralize Dr. King because he might become a “messiah” who could “unify, and electrify, the militant, black nationalist, movement” if he mere to “abandon his sul~posccl ‘obedience’ to ‘white liberal doctrines’ (non- violence) and embrace black nationalism. “81 Steps were taken to sub- vert the “Poor People’s Campaign” which Dr. King was planning to lead in the spring of 1968. 82 Even after Dr. King’s death, agents in the fielcl were proposing methocls for harassing his widow,s3 and Bu- reau officials were trying to prevent his birthday from becoming a national holiday.84

The actions taken against Dr. Kin, v are indefensible. They repre- sent a sad episode in the dark hist,ory of covert actions directed against law abiding citizens by a law enforcement agency.

memorandum from Legat, Paris, to FBI Headquarters, 4/14/66 and 5/g/66.) The Director did disapprove a suggestion that religious leaders be permitted “to listen to sources we have” (FBI Director’s note on memorandum from Jones to Thomas Bishop, 12/8/64.) ~

“Memorandum from Charles Brennan to William C. Sullivan, 3/8/F7. The BU- reau also disseminated to “friendly media sources” a newspaper article which was critical of Dr. Kin&s nosition on the Vietnam war. The stated purposes were to “publicize King-as *a traitor to his country and his race,” and td “re- duce his income,” (memorandum from George C. Moore to William C. Sullivan, 10/18/67.) “Background information” was also given to at least one wire serv- ice (memorandum from Sizoo to William C. Sullivan. 5/24/651.

?s Jiemorandum from FBI Headquarters to Sew York Fieid Gffiw 5/M/67. There has been rumors about a “peace ticket” headed by Dr. King and Benjamin Speck.

‘* Memorandum from FBI Headquarters to New York Field Office, 4/13/64; memorandum from Sew York Field Office to FBI Headquarters, 4/2/64.

7B Xemorandum from Cartha DeLoach to John JIohr, S/14/65 ; memorandum from F. J. Baumeardner to William C. Sullivan l/10/67.

R” Memorandum from F. J. Baumgardner to ‘William C. Sullivan, l/22/64; memorandum from Sichnlas Callahan to *John Bohr, l/31/64. On one occasion the testimony leaked to other members of Congress, prompting the Director to note, “Someone on Rooney’s Committee certainly betrayed the secrecy of the ‘off the record’ testimony I gave re: King.” (Director’s note on memorandum from Cartha DeLnach to John Mohr, 3/16/64.)

m 3lemnrandnm from FBI Headquarters to all SACS, 3/4/68. 82Memorandum from George C. Moore to William C. Sullivan, 3/26/68. R? ~Iemorandum from Atlanta Field Office to FRI Headquarters, 3/M/69. “Memoranda: From George C. Moore to William C. Sullivan l/17/69; and

from Jones to Thomas Bishop, 3/18/69. Steps nlere even taken to prevent the issuance of “commemorative medals.” (Memorandum from Jones to Thomas Bishop, 5/22/6&l

Page 240: Church Committee: Reports-- Book II
Page 241: Church Committee: Reports-- Book II

E. POLITICAL A4BUSE OF INTELLIGENCE INFORMATION

MAJOR FIKDING

The Committee finds that information has been collected and dis- seminated in order to serve the purely political interests of an intel- ligence agency or the administration, and to influence social policy and political action.

Sub findings (a) White House officials have requested and obtained politically

useful information from t.he FBI, including information on the activi- ties of political opponents or critics. -

(b) In some cases, political or personal information was not specifi- cally requested, but was nevertheless collected and disseminated to ad- ministration officials as part of investigations they had requested. Neither the FBI nor the recipients differentiated in these cases be- tween national security or law enforcement information and purely political intelligence.

(c) The FBI has also volunteered information to Presidents and their staffs, without having beea asked for it, sometimes apparently to curry favor with the current administration. Similarly, the FBI has assembled intelligence on its critics and on political figures it believed might influence public attitudes or Congressional support.

(d) The FBI has also used intelligence as a vehicle for covert efforts to influence social policy and political action.

Elaboration of Findings The FBI’s ability to gather information without effective restraints

gave it enormous power. That power was inevitably attractive to politi- cians, who could use information on opponents and critics for their own advantage, and was also an asset to the Bureau, which depended on politicians for support.. In the political arena, as in other facets of American life touched by the intelligence community, the existence of unchec,ked power led to its abuse.

By providing polit,ically useful information to the White House and congressional supporters, sometimes on demand and some- t,imcs gratuitously, the Bureau buttressed its own position in the political structure. At the same time, the widespread-and accurate- belief in Congress and the administration that the Bureau had avail- able to it, deropatorv information on politicians and critics created what the late Majority Leader of the House of Representatives, Hale Boge, called a “fear” of the Bureau :

Freedom of speech, freedom of thought, freedom of action for men in public life can be compromised q&e as effectively by the fear of surveillance as by the fact of surveillance.1

‘Remarks by Rep. Hale Boggs, 4/22/71, Congressional Record, Vol. 117, Part 9, p. 11565.

( 225 ) 68-786 0 76 16

Page 242: Church Committee: Reports-- Book II

226

Information gathered and disseminated to the, White House ranged from purely political intelligence. such as lobbying efforts on bills an nd~ninir;tmtion opposed and the strategy of a clelegate challenge at a national political convention, to “tidbits” about the activities of poli- ticians and public figures which the Bureau believed “of interest” to the recipients.

Such participation in political machinations b- an intelligence agency is totally inlpropcr. Responsibilit;v for what amount~ed to a betrayal of the public trust in the integrity of the FBI must, be shared between the officials who requested such information and those who provided it.

The Bureau’s collrct.ion and dissemination of politically useful in- formation was not colored by partisan considerations; rather its effect was to ent,rench the Bureau’s own position in the political structure, rcqarrlless of which party was in power at the time. However, the Bureau also used its pow&s t,o serve ideological purposes, attempting corwtly to influence social policy and political action.

In its efforts to “protect society,” the FBI engaged in activities which necessarily affected the processes by which American citizens make decisions. In doing so, it distorted and exaggerated facts, made use of the mass media, and attacked the leadership of groups which it considered threats to the social order.

Law enforcement officers are, of course, entitled to state their opin- ions about what choices the people &ould make on contemporary social and political issues. The First ;\mendment guarantees their right to enter the market,place of ideas and persuade their fellow citizens of t.he correctness of those opinions bv making speeches, writing books, and, within certain statutory limit;. supporting political candidates. The problem lies not in the open expression of views, but. in the covert use of power or position of trust to influence others. This abuse is aggravated by the agency’s control over information on which the public and its elected representatives rely to make decisions.

The essence of democracy is the belief that the people must be free to make decisions about matters of public policy. The FBI’s ac- tions interfered with the democratic process, because attitudes within the Bureau toward social chang! led to the belief that such interren- tion formed a part of its obligation to protect, society. When a govern- mental agency clandestinely tries to impose its views of what is right upon the American people, then the democratic process is undermined.

rwJfY?ldi~?q (a) White House officials have requested and obtained politically use-

ful information from the FBI, including perFona1 life information on the activities of political opponents or critics.

Presidents and White House. aides have asked the FBI to provide political or personal information on opponents and critics. including “name checks” of Bureau file~.~ They hare also asked the Bureau to

‘A “name check” is not an inrestigation, but a Bearch of existing FBI files throwh the use of the Rnrean’s romm4lensire genpra1 name indtx. Rqlwsts for FBI “name checks“ n-ere peculiarly damnginr hecmwe no new inrwtieation \va~ done to verify allegations stored arav for years in Rureau files. A former FBI official responsible for compliance with such requests said that the RII- rean “?nc;wered ‘ . . hr furnishing the White House every piece of information in our files on the individuals requested.” Deposition of Thomas E. Bishop, former Assistant Director, Crime Records Division, 12/2/75, p. 144.)

Page 243: Church Committee: Reports-- Book II

227

conduct electronic surreillance or more limited inwstigntions of such pt’l3OllS. The FI31 appears to have complied unquestioningly with these requests. tlrspitc occasional internal doubts about their pro- priety.3

Precedents for certain political abuses go back to the very outset of the tlomestic intelligence program. In 1940 the FBT compl~cd with I’wsitlrnt I~oorewlt’s rcq~wst. to file the names of people sending critical telegrams to the White House.’ There is evidence of improper electronic slIr\-rillnnc~e for the White House in the 1!Wk5 And an aide to President T<iscnhon-er a&et1 the FI31 to conduct a questionable name check.‘: In 1969. the, FT31 complied unquestioningly with a re- qllrst. from -1ttorncF General T<cnnedy to interview a steel executive and several reporters who had written stories about a statement by the esccutivc. ,1s part of an inrestigation of foreign lobbying cfforlts OJI sugar quota legislation in 1961 ancl 19@2. Attorney General Ren- nedy requested wiretaps on a Congressional aide, three execut,ive officials. and two American lobbyists, including a Washington law fim.*

Kewrtheless. the political misuse of the FBI under the .Johnson and Nixon administrations appears to have been more extensive than in previous years.

Cndrr the ,Johnson administration, the FBI was used to gather and report political intelligence on the, administration’s partisan op- ponents in the last days of the 1964 and 1968 Presidential election

3 Former FBI executive Cartha DeLoach, who was FBI liaison with the White House during part of the Johnson administration, has stated, “I simply followed Mr. Hoover’s instructions in complying with White House requests and I never asked anv nuestions of the White House as to what thev did with the material afterwards.” (DeLoach deposition, 11/25/E, p. 28.) 0; at least one occasion, when a White House aide indicated that President Johnson did not want any record made 1)~ the FBI of a request for a “run-dnwn” on the links between Robert Kennedr and officials involved in the Rnhhr Raker inrestieatinn. the Bureau disregArded the order. DrLoach stated tha’t he “ignored the specific instructions” in this instance because he “felt that any instructions tve received from tl,e White House should be a matter of record.” (DeLoach deposition, 11/25/X, p. 89.)

Former Assistant Director Bishop sta’ted. “Who am I to ask the President of the United States what statutory basis he has if he wants to know what in- formation is in the files of the FBI?” It was a “Drowr dissemination” hecause it was “not a dissemination outside the executive )Jranch” and because there was “no law, no pn1ic.r of the Department of austice, . . no statute of the United States that says that was not permissible.” But even if there had been a statute

la.ring down standards, Bishop said “it wouldn’t hare made a bit. of difference when the Attnrner General or the President asks for it.”

‘iishnp recalled from’his “own knowledge” instances where President Kennedy, .Tnhncnn, and Sison had “called over and asked Mr. Hnorer for a memo on rertain people.” (Bishop deposition, 12/Z/75, pp. 153-1.54.)

’ Memoranda from Stephen Early, Secretary to the President. to Hoover, 5/21/40 and 6/17/40.

’ FRI memorandum to Senate Select Committee, 3/26/76 : See pp. 363’7. a 1lemnrnndnm from .T. Edgar Hoover to Thomas E. Stephens. Secretary to the

President. 4/13/W. ’ Cnurtner Evans deposition. 12/l/75. p. 39. ‘SW pp. RLB.5. The tap authorized by A4ttnrney General Kennedy on another

high esecntive official was not related to political ronsidwatinns, nor appar- ent1.v was the tap antbnriwd 11,~ Attorney General Kntzenbach in 1965 on the cditqr of an anti-communist newsletter n-ho had published a hook alleging improln?~t.~ by Robert Kennedy a year earlier.

Page 244: Church Committee: Reports-- Book II

228

campaigns. Ill the closing days of the 1964 campaign, Presiilential aide 13ill Moycrs asked the Bureau to contlr~ct 5~me checks” 011 all pCrS0llS cmpl0ycd in Scllntor Goldwater’s Senate ofice. and infolnia- tion 011 two staff members was reported to the IYliite ITollse.9 Simi- larly. in the last two weeks of the 1968 campaign, the ,Johnson TT’llite House requested an investigation (includilq mdirect electronic sur- veillance and direct physical surreillance) of Mrs. Ahunx Chenna$t, a prolllincnt Republican leader, and her relationships with certain South Trietnamcse officin1s.l” This investigation also included an FBI check of Vice Presidential candidate Spiro Agnew’s long distance telephone call records, apparently ,John~on.~~

at the personal request of President

,\nothcr investigation for the ,Johnson White House involved ex- ecutive branch officials who took part in the criminal investigation of former ;Tohnson Senat.e aide Bobby Baker. When Baker’s trial began in 1967, it was revealed that one of the government witnesses had been “wired” to record his conwrsations with Baker. Presidential aide, Xarvin Watson told the FBI that ,Johnson was quite “exercised,” and the Bureau was ordered to conduct a discreet “run-don-n” on the former head of the, dustice Department’s Criminal Division and four Treasury Department officials who had been responsible for “wiring”

’ hlemorandum from Hoover to Meyers, 10/27/64, cited in FBI summary memorandum. l/31/75.

“Bureau flies indicate that the apparent “reason” for the “White House interest” was to determine “ whether the South Vietnamese had secretlv been in touch with supporters of Presidential candidate Nixon, possibly through hlrs. Chennault, as President Johnson was apparently suspicious that the South Vietnamese were trying to sabotage his p&ice negotiations in the hope that Nixon would win the election and then take a harder line towards North Vietnam.” (FBI memorandum, subject : Mrs. Anna Chennault. 2/l/75.) The FBI has claimed that its investigation of Mrs. Chennault was “consistent with FBI rexponsibilitips to determine if her activities were in violation of certain provisions of the Foreign Agents Registration Act and of the Neutrality Act.”

Direct electronic sun-eillance of Mrs. Chennanlt n-as rejected, according to a contemnoraneous FBI memorandum. because FBI executive Cartha DeLoacb pointed out that “it was widely known that she was involved in Republican political circles and, if it became known that the FBI was surreilling her this would put us in a most untenable and embarrassing position.” (Memorandum from DeLoach to Tolson. 10/30/68.)

Electronic surveillance’ &s. $o&ver, directed at the South Vietnamese offi- cials and was approved by Attorney General Ramse.v Clark. Clark has testified that he did not know of the physical surveillance aspect of the FBI’s inrestiga- tion. hut that he did authorize the electronic surveillance of the South Vietnamese officials. (Clark testimnni. 12/3/75, Hearings. Vol. 6, p. 252.)

I* FBI executive Cartha DeLoach has stated that a White House aide made the initial reouest for the check of telenhnne comnany records late one night. According to jl)eLnaeh, the request was ‘Ito find o& &ho. either Mr. Agne& or Mr. Bison, when they had heen in Albuquerque (Sew Mexico) several dars prior to that, had called from Alhnquerr]ne while they were there.” When DeLoach refused to contact the telephone company “late in the evening,” President .Tohnsnn “ramp on the phone and proceeded to remind me that he Kas Commander in Chief and 11~ shnnld get That 11~ wanted. and he wanted me tn do it immedi- ately.” DeLoach then talked with Director Hoover, who told hi’m to “stand your ground.” The next day. however, Hoover ordered that the records he checked. hut the only calls identified were “made hy Mr. Apnew’s staff.” T~PTP were reported to the White House. (DeT,nach Deposition. 11/2.5/75. pp. 74-75.) Agnen-‘s arrival and departure times in and out of Alhuqnerqne were also “verified at the request of the White House.” (FBI summary memorandum. subject : Mrs. Anna Chennault, 2/l/75).

Page 245: Church Committee: Reports-- Book II

229

the witness. The Bureau was specifically insisted to include any asso- ciations between those persons and Robert I<ennedy.12

SC\-era1 ,Johnson Wllite House requests were directed at critics of the war in Vietnam. at ncwsn1en. and at other opponents. ,4ccording to a Bureau memorandul~1, White House aide Marvin Watson at- tempted to disguise his, and the President’s interest in such requests by asking the FBI to channel its replies through a lower level White House stat7 member.‘”

In 1966. Watson asked the FBI to monitor the televised hearings of the Senate Foreign Relations Committee on Vietnam policy and prepare a memorandum comparing statements of the President’s Sen- ate critics with “the Communist Party line.” 1c Similarly, in 196i when seven Senators made statements criticizing the bombing of North Yietnam. Watson requested (and the Bureau delivered) a “blind mem- orandum” setting forth information from FBI files on each of the Senators. ,4mong the data supplied n-ere the following items :

Senator Clark was quoted in the press as stating that the three major threats to America are the military-industrial complex, the Federal Bureau of Investigations and the Central Intelligence Agency.

Senator McGovern spoke at, a rally sponsored *by the Chi- cago Committee for a Sane Nuclear Policy, a pacifist group.

Senator McGovern stated that the “United States was mak- ing too much of the communist take-over of Cuba.”

[Another Senator now deceased] has, on many occasions, publicly criticized United States policy toward Vietnam. He frequently speaks before groups throughout. the United States on this subject. He has been reported as intentionally enter- ing into controversial areas so that his services as a speaker for which he receives a fee, will be in clen~and.‘g

The ,Johnson administration also requested information on contacts between members of Conprcss and certain foreign officials known to oppose the United States presence in Vietnam. hccording to FBI

I* FRI Director Hoover brought the matter to the attention of the White House in a letter describing why the FBI had refused to “wire” the n-itness (there was not adequate “secnrit~“) and how the Criminal Dirision had then used the Rurean of Sarrotics to do so. (JIemorandnm from Hoover to Watson, l/12/67.) This was the instance where FRT esecntire Cartha DeLoach made a record, after Watson told him that “the President does not want any record made.” (Memorandum from DeLoach to Tolson, l/17/67; see also FBI summary men~nrandnn~. Z/3/75.)

lR A1ccnrdinp to this memorandum, Watson told Cartha DeLoach in 1967 that “he and the President” wanted all “communications addressed to him bg the Ilirertor” to he addressed instead to a lower level White House staff member. Watson told DeLnach that the “reason for this change” n-as that the staff meml~er “did not hare the direct connection with the President that he had and, cnnw~nently. people who saw such communications would not suspicion (sic) that Watsnn or the President had reanested such information. nor were inter- ested in snrh information.” (Rlemnrandum from De Loach to Tnlsnn. 3/17/67.)

I’ FRI summar,r memorandum. subjert : Coverage of Television Presentation. Senate Foreign Relations Committee. l/31/76. Former FRI executire Cartha DeI,onch has stated. regarding this incident. “We felt that it was beyond the jurisdiction of the FRI. but nhriously Mr. Hoover felt that this was a request by the President and he desired it tn he done.” (DeLoach deposition, 11/25/E, p. x3)

” Blind FBI memorandum, 2/10/67.

Page 246: Church Committee: Reports-- Book II

records, President *Johnson believed these fore@ officials had pen- orated “much of the protest concerning his Vietnam policy, particu- larlv the hearings in the Senate.” l6

1%te House requests were not limite,d to critical Congressmen. Ordinary citizens who sent telegrams protesting the Vietnam war to the White House we.re also the subject of Watson requests for FBI name check reports.” Presidential aide Jake *Jacobsen asked for name checks on persons whose names appeared in the Congressional Record as signers of a letter to Senator Wayne Morse expressing support for his crit.icism of TJ.S. Vietnam policy.x8 On at least one occasion, a request was channeled through httorney General Ramsey Clark, who supplied Watson (at the latter’s request) with a summary of mfor- mation on the National Committee for a Sane Nuclear Policy.lg

Other individuals who were the subject of s~uzl~ name check requests under the Johnson Administration included NBC Commentator David Brinkley:y,2O Associated Press reporter Peter nrnett,2l columnist Joseph KraftYZ2 Life magazine Washington bureau chief Richard Stolley,23 Chiago Daily _ News Washington bureau chief Peter Lisagor,24 and Ben W. Gilbert of the Washington Post.Z5 The John- son White House also requested (and received) name check reports on the anthors of books critical of the Warren Commission re.port; some of these reports included derogatory information about the personal lives of the individuals.26

The Nixon administration continued the practice of using the FBI to produce political information. In 1969 John Ehrlichman, counsel to President Nixon, asked the FBI to conduct a “name check” on Joseph Duffy, chairman of Americans for Democratic Action. Data in Bureau files covered Duffy’s “handling arrangements” for an anti- war teach-in in 1965, his position as State Coordinator of the group

I8 President Johnson’s request also went beyond “legislators,” and included contarts hv anv “nrominent 1J.S. citizens.” (FBI summarv memorandum. sub- ject : Infc&ati”on *Concerning Contacts Be&en [Certain koreign officials] and Members or Staff of the United States Congress Furnished to the White House at the Request of the President, 2/3/75.) *he FBI’s reports indicated that its information came “through coverage” of the foreign officials and that the Bureau, in this case, had “conducted no investigation of members of Congress.” (FBI summary memorandum, 2/3/75.) FBI “coverage” apparently included electronic surveillance.

President Nixon also requested information on contacts between foreign nffiicials and Congressmen, but his request does not appear to have related to Presidential critics. Rather, the Nixon request grew out of concern about “an increase in lforeienl interest on Canitol Hill” which had been exnressed to President Nixon by at’ liast one Senatdr; and the FBI’s report “i&luded two examples of [foreienl intelligence initiatives directed against Capiltol Hill without identifring the [foreigners] or American involved.” (‘RI summary memorandum. 2/3/75.)

l’Mrmnranda from Hoover to Watson. 6/4/65 and 7/M/65. Is Memorandum from Hoover to Wats&‘7jl5/66. &&g’Jacobsen request. ‘8Jlemorandum from Clark to Watson. 4/R/67. enrlnsing memorandum from

Dirertnr, FBI to the Attorney General. 4/7/67. (LBJ Library.) 20JIemoranda from Hoover to Watson, 2/15/&5 and 5/29/65. p Memorandum from Hoover to Watson. 7/22/f%. za Memorandum from Hoover to Watson, l/27/67. 23 Memorandum from Hoover to Watson. 4/6/66. *‘Memornndum from Hoover to Watson. ‘2)24/66. *5Memorandum from Hoover to Watson. 4/6/66. ‘a JIemnrandum from Hoover to Watson, 11/S/66 ; Delnach, 12/3/75. Hear-

ings, Vol. 6, pp. X&182.

Page 247: Church Committee: Reports-- Book II

231

“Negotiation Now” in 1067, and his activity as chairman of Con- necticut Citizens for McCarthy in 1968.2Ga

Presidential aide H. R. Haldeman requested a name check on CBS reporter Daniel Schorr. In this instance, the FBI mistakenly con- sidered t.he request to be for a full background investigation and began to conduct interviews. These interviews made the inquiry public. Sub- sequently, White House officials stated (falsely) that Schorr was under consideration for an executive appointment.z7 In another case, a Bureau memorandum states that Vice President Agnew asked the FBI for information about Rev. Ralph David abernatby, then head of the Southern Christian Leadership Conference, for use in “de- stroying Sbernathy’s credibility.:’ 28 (Agnew has denied that he made such a request, but agrees that he received the information.)29

Several White House requests involved the initiation of electronic surveillance. Apparently on the instructions of President Nixon’s aide John Ehrlichman and i)irector Hoover, FBI ,Issistant Director Wil- liam C. Sullivan arranged for the microphone surveillance of the hotel room of columnist Joseph Kraft while he was visiting a foreign country.30 Kraft was also the. target of physical surveillance by the FBI.31 There is no record of any specific “national security” rationale for the surveillance.

Similarly, although the “17” wiretaps were authorized ostensibly to investigate national securitv “leaks.” there is no record in three of the cases of any national sec&ty claim having been advanced in their support. Two of the targets were domestic affairs advisersat the White House., with no foreign affairs duties and no access to foreign policy materlals.32 B third was a White House speechwriter who had been overheard on an existing tap agreeing to provide a reporter with back- ground on a presidential speech concerning, not foreign policy, but revenue sharing and welfare reform.33

*“* Letter from J. Edgar Hoover to John D. Ehrlichman, 10/6/69; letter from Clarence 11. Kelly to Joseph Duffy, 7/14/75, enclosing FBI records transmitted under Freedom of Information Act.

2i House Judiciary Committee Hearings, Book VII, White House Surveillance Activities (1954). n. 1111.

?8 According ty -Director Hoover’s memorandum of the conversation. Aenew asked Hoover for “some assistance” in obtaining information about Rev. Aber- nathg. Hoover recorded : “The Vice President said he thought he was going to have- to start destroying Abernathy’s credibility, so anything I can give him would he appreciated. I told him I would be glad to.” ( JIemorandnm from Hoover to Tolson, et al, 5/18/70.) Subsequently. the FBI Director sent Agnew a report on Rev. Abernathy containing not only the by-product of Bureau investigations, but also derogatory public record information. (Letter from Hoover to Agnew, 5/l R/iO. 1 -’ 1D Staff summary of Spiro Agnew interview, 10/15/75.

” Memoranda from Sullivan to Hoovpr. 6/30/69 and 7/Z/69. 31 Memorandum from Sullivan to DeLnach, 11/5/69.‘The Kraft surveillance is

also discussed in Part II, pp. 121-122. 32 Coverage in these two cases was requested by neither Henry Kissinger nor

Alesander Haig (as most of the “17” were), but by other White House officials: Attorney General MitcheIl approved the first at the request of “higher authority.” (>lemorandum from Hoover to Mitchell, 7/23/69.) The second was specifically reonested by H. R. Haldeman. (Memorandum frnm Hoover to Mitchell, 12/14/70.

sJ This tap was also apparently requested by White House officials other than Kissinger or Haig. (~Zemnrandnm from SuIIivan to DeLoach. 8/l/69.) The “17” wiretaps are also discussed at p. 122.

Page 248: Church Committee: Reports-- Book II

232

Subfi)lding (6) In some cases. political or personal information was not specifically

requested, but was nevertheless collected and disseminated to admin- istration officials as part of investigations they had requested. Neither the FBI nor the recipients differentiated in these cases between na- tional security or law enforcement information and purely political intelligence.

In some instances, the initial request for or dissemination of infor- mation was premised upon law enforcement or national security pur- poses. However, pursuant to such a request, information was furnished which obviously could serve only partisan or personal interests. As one Bureau official summarized its attitude, the FBI “did not decide what, was political or what represented potential strife and violence. We are an invest.igative agency and we passed on all data.” 34

Examples from the Eisenhower, Kennedy., Johnson, and Nixon ad- ministrations illustrate this failure to distmguish between political and nonpolitical intelligence. They include. the FBI’s reports to the White House in 1956 on XA4ACP lobbying activities, the intelligence about the legislative process produced by the “sugar lobby” wiretaps in 1961-1962, the purely political data disseminated to the White House on the credentials challenge in the 1964 Democratic Convention, and dissemination of both political and personal information from the “leak” wiretaps in 1969-1972.

(i) The NAACP In early 1956 Director Hoover se.nt the White House a memoran-

dum describing the “potential for violence” in the current “racial situation”.3” Later reports to the White House, however, went far beyond intelligence about possible violence; they included extensive inside information about SAACP lobbying efforts, such as the fol- lowing :

A report on “meetings held in Chicago“ in connection with a planned Lradership Conference on Civil Ri&ts to be held in Washington under the sponsorship of the NAACP.36

An extensive report on the Leadership Conference, based on the Bureau’s “reliable sources” and describing plans of Conference delegations to visit Senators Paul Douglas. Her- bert Lehman. Wayne Morse, Hubert Humphrey, and ,John Bricker. The report also summarized a sr)wcl~ bv Rnv Wil- kins. other conference proceedings, and the report of “an informant” that the Vnited ,4nto Workers was a “predomi- nant organization’! at the conference.37

Another report on the conference included an account of That transpired at meetings between conference delegations and Senators Paul Douglas and Everett, Dirksen.38

31 DeLoach. 12/3/75. Hearings. Pd. 6. p. 180. SMemorandum from Honver to Dillon Anderson, Special Assistant to the

President. 1/R/R& This report was also nror-ided to the ilttorney General. the Secretary of Defense. and military intelligence.

38 Memorandnm from Hoover to Anderson. 3/2/.56. n 3lemnrandnm from Hoover tn Anderson. 3/5/56. a8 Jlemornndum ffom Hoover to Anderson, 3/6/56.

Page 249: Church Committee: Reports-- Book II

233

A report including the information that two New Jersey congressmen would sign a petition to the attorney General.3s

A presidential aide suggested that Hoover brief the Cabinet on “developments in the South.” 4o Director Hoover’s Cabinet briefing also included political intelligence. He covered not. only the NAACP conference, but also the speeches and political activities of Southern Senators and Governors and the formation of the Federation for Con- stitutional Government with Southern Congressmen and Governors on its advisory board.41

(ii) The Augur Lobby The electronic surveillance of persons involved in a foreign country’s

lobbying activities on sugar quota legislation in 1961-1962, authorized by LIttorney General Robert Kennedy for the White House, also pro- duced substantial political intelligence unrelated to the activities of foreign officials.4z Such information came from wiretaps both on for- eign officials and on American citizens, as well as from the microphone surveillance of the chairman of the House Agriculture Committee when he met with foreipn officials in a New York hotel room.43 The following are examples”of the purely political (and personal) product :

a particular lobbyist “mentioned he is working on the Sen- ate and has the Republicans all lined up.” 41

The same lobbyist said that “he had seen two additional representatives on the House Agriculture Committee, one of

by-

58 Memorandum from Hoover to Anderson, 3/7/56. A National Security Council staff member responsible for intern.al security matters summarized these re- ports as providing information “regarding attempts being made by the Na- tional Association for the Advancement of Colored People to send instructed delegations to high-ranking Government officials ‘to tactfully draw out their positions concerning civil rights.’ ” (Memorandum from J. Patrick Coyne to Anderson, 3/6/56.)

1o After consulting the Attorney General, this aide advised the Secretary to the Cabinet that the FBI had “reported developments in recent weeks in several southern States, indicating a marked deterioration in relationships between the races, and in some instances fomented by communist or communist-front organi- zations.” (Memorandum from Anderson to Maxwell Rabb, l/16/56.) The Secre- tary to the Cabinet, who had “experience in handling minority matters” for the White House, agreed that “each Cabinet Member should be equipped with the plain facts.” (Memorandum from Rabb to Anderson. l/17/56.) A National Reru- rity Council staff member who handled internal secuAt$ matters reported shortly thereafter that the FBI Director was “prepared to b;ief the Cabinet along the general lines” of his written communications to the White House. (Memorandum from .J. Patrick Coyne to Anderson, 2/l/56.)

n Memorandum from Director, FBi, to tde Executive Assistant to the Attorney General, 3/g/56. enclosing FBI memorandum described as the “basic statement” used 1)s the Director “in the Cabinet Briefing this morning on Racial Tension and Civil Rirhts.” For a further discussion of the exaggeration of Communist influ- ence on the NAACP in this briefing, see pp. 250-257, note 151a.

“The electronic surveillances were generally related to foreign affairs con- cerns. See pp. 6445.

u The Americans include three Agriculture Department officials, the secretary fo the Chairmgn of the House Agricnlture Committee, and two registered lobby- ing agents for foreign interests. For Attorney General Kennedy’s relationship to the microphone surveillance of the Congressman, see p. 61. note 233. One of the wiretaps directed at a registered lobbying agent was placed on the office telenbnne of a Washington law firm. (Seep. 201)

“FBI memorandum, 6115162.

Page 250: Church Committee: Reports-- Book II

234

whom was ‘dead set against us’ and who ma;v reconsider, and the other was neutral and ‘may vote for us.’ ” 45

The Agriculture Committee chairman believed “he had ac- complished nothing” and that “he had been fighting over the Rules Committee and this had interfered with his attempt to organize.” 40

The “friend” of a foreign official “was under strong pres- sure from the present administration. and since the ‘friend’ is a Democ,rat, it would be very difficult for him to present a strong front to a Democrat.ic Administration.” d7

A lobbyist stated that Secretary of State Rusk “had received a friendly reception by the Committee and there appearecl to be no problem with regard to the sugar bill.” 45

A foreign official was reported to be in contact with two Con- gressmen’s secretaries “for reasons other than business.” The official asked one of the secretaries to tell the other that he “would not be able to call her that evening” and that one of his associates “was planning to take [the two secretaries and another Congressional aide] to Bermuda.” 49

The FBI’s own evaluation of these wiretaps indicates that they “un- doubtedly . . . contributed heavily to the Bdministration’s success” in passing the legislation it desired.so

(iii) The 1964 Democmtic Conmention

Political reports were disseminated by the FBI to the White House from the 1964 Democratic convention in Atlantic City. These reports, from the FBI’s “special squad” at the convention. apparently resulted from a civil disorders intelligence investigation which got out of hand because no one was milling to shut off the partisan by-producL51 They centered on the Mississippi Freedom Democratic Party’s credentials challenge. Examples of the political intelligence which flowed from FBI surveillance at the 1964 convention include the following : 52

(5 FBI memorandum, 6/15/62. ” 1Iemorandum from Hoover to Attorney General Kennedy, 2118161. This in-

i’ormation came from the Bureau’s “coverage” (by microphone surveillance) of the Congressman’s hotel room meeting.

” FBI memorandum. 2115162. * Memorandum from J. Edgar Hoover to Robert Kennedy, 3/13/61. ” Memorandum from J. Edgar Hoover to Robert Kennedy, 3/13/t%. M Memorandum from W. R. Wannall to W. C. Sullivan, 12/22/66. According to

a Bureau memorandum of a meeting between Attorney General Kennedy and FBI Assistant Director Courtney Evans, Kennedy stated in April 1961 that “now the law has passed he did not feel there was justification for continuing this extensive investigation.” (Memorandum from Evans to Parsons, 4/15/61.)

‘l There is no clear evidence as to what President Johnson had in mind when, as a contemporaneous FBI memorandum indicates, he directed “the assignment of the special squad to Atlantic City.” (DeLoach to Mohr, 8/29/64) Cartha De- Loach has testified that Presidential aide Walter Jenkins made the original re- quest to him. but that he said it should be discussed with Director Hoover and that “Mr. Jenkins or the President, to the best of my recollection. later called Mr. Hoover and asked that this be done.” Deloarh claimed that the nurnose was to gather “intelligence concerning matters of strife, violence. etc.” which might arise out of the credentials challenge. (DeJ,oqch, 12/3/75. hearings, Vol. 6. 17. 175.)

6aThe operations of the FBI in Atlantic City are described ingreater ditail in Section II, pp. 117-119.

Page 251: Church Committee: Reports-- Book II

235

Dr. Martin Luther King and an associate %ere drafting a telegram to President, Johnson . . . to register a mild protest. According to King, the President pledged complete neutrality regarding the selecting of the proper Mississippi delegation to be seated at the convention. King feels that the Credentials Committee will turn down the Mississippi Freedom Party and that they are doing this because the President exerted pressure on the committee along this line.” 53

,Qnother associate of Dr. King contacted a member of the MFDP who “said she thought King should see Governor Endicott Peabody of Massachusetts, blayor Robert Wagner of New York City, Governor Edmund G. (Pat) Brown of California, Mayor Richard Dale-y of Chicago, and Governor John W. King of New Hampshire.” The purpose was “t.0 urge them to call the White House directly and put pressure on the White House in behalf of the MFDP.” 5*

“MFDP leaders have asked Reverend King to call Gover- nor Egan of Alaska and Governor Burns of Hawaii in an at- tempt to enlist their support. According to the MFDP spokes- man, the Negro Mississippi Party needs these two states plus California and New York for the roll call tonight.” 55

An SCLC staff member told a representative of the MFDP : “Off the record,, of course, you know we will accept the Green compromise proposed.” This referred to “the proposa1 of Congressxvoman Edith Green of Oregon.” 56

In a discussion between Dr. King and another civil rights leader, the question of “a T7ice-Presidential nominee came up and King asked what [the other leader] thought of Hugh [sic] Humphrey, and [the other leader] said Hugh Hum- phrcv is not gomy to get it, that Johnson needs a Catholic. . . and therefore the Vice-President will be Muskie of Maine.” 57

An unsigned White House memorandum disclosing Dr. King’s strategy in connection with a meeting to be at,tended by President .Johnson suggests that there was political use of these FBI reports.58

(6~) The “17” Wiretaps. The Nixon White House learned a substantial amount of purely po-

litical intelligence from wiretaps to investigate “leaks” of classified information placed on three newsmen and fourteen executive officials during 19C,9-1971.5v The following illustrate the range of data supplied :

One of the targets “recentlv stated that he was to spend an hour with Senator Kennedy’s Vietnam man, as Senator Kennedy is giving a speech on the 15th.” co

m Memorandum from DeLoach to Jenkins. 8/24/f%. bl Memorandum from Der,oach to .Tenkins, 8/25/t%. rz RIemorandum from DeLoach to Jenkins, g/25/64. sB Ifemorandnm mm &Loach to Jenkins, 8/25/M. m ~~Wnnrandnm from DeLoach to Jenkins. S/25/64. 68 Blind memorandnm from LRJ Library bearing handwritten date B/26/64 and

the trpev’ritten date g/19/64. Hearings. Vol. 6, Exhibit 6%2, p, 713. ‘*In at least two instances. the wiretaps continued on targets after they left

the Esrcutire Rranch and became advisers to Senator Edmund Muskie, then the leadiw Democratic prospect for the Presidency. See Part TT. p. 122.

m Memorandum from Hoover to Nixon, Kissinger, and Mitchell, 10/9/69.

Page 252: Church Committee: Reports-- Book II

236

Another target said that Senator Fulbright postponed con- gressional hearings on Vietnam because he did not) believe they would be popular at that time.61

,4 well-known television news correspondent “was very distressed over having been ‘singled out’ by the Vice Press- dent.” 62

,4 friend of one of the targets said the Washington Star planned to do an article critical of Henry Kissinger.63

One of the targets helped former Bmbassador Sargent Shriver write a press release criticizing a recent speech by President Nixon in which the President “attacked” certain Congressmen.64

One of the targets told a friend it “is clear the Administra- tion will win on the ABM by a two-vote margin. He said ‘They’ve got [a Senator] and they’ve got [another Sen- ator] .‘.” 69

A friend of one of the targets wanted to see if a Senator would “buy a new amendment” and stated that “they” were “going to meet with” another Senator.66

A friend of one of the targets described a Senator as “mar- ginal” on the Cooper-Church Amendment and stated that another Senator might be persuaded to support it.67

One of the targets said Senator Mondale was in a “dilemma” over the “trade bill ” 68

A friend of one of the targets said he had spoken to former President Johnson and “Johnson would not back Senator Muskie for the Presidency as he intended to stay out of politics.” 6D

There is at least one clear example of the political use of such information. After the FBI Director informed the White House that former Secretary of Defense Clark Clifford planned to write a magazine article criticizing President Nixon’s Vietnam policy,7o White House aide Jeb Stuart Magruder advised John Ehrlichman and H. R. Haldeman that “we are in a position to counteract this article in any number of ways.” i1 It is also significant that., after May 1970, the FBI Director’s letters summarizing the results of the wiretaps were no longer sent to Henry Kissinger, the President’s national security advisor, but to the President’s political advisor, H. R. Haldeman.72

. . .

a1 Memorandum from Hoover to Nixon and Kissinger, 12/3/69. ” Memorandum from Hoover to Nixon and Kissinger, 2/26/70. w Memorandum from Hoover to H. R. Haldeman. 6/2/70. M Memorandum from Hoover to Haldeman. g/4/70: 85 Memorandum from Hoover to Nixon and Kissinger, 7/18/69. BB Memorandum from Hoover to Haldeman, S/18/70. ” Memorandum from Hoover to Haldeman, 6/B/70. ‘a Memorandum from Hoover to Haldeman, U/24/70. (I0 Memorandum from Hoover to Haldeman, 12/22/70. ” Memorandum from Hoover to Nixon, Kissinger, and Mitchell, 12/29/69. ‘I Memorandum from Magruder to Haldeman and Ehrlichman, l/15/70. Ehr-

lichman advised Haldeman, “This is the kind of early warning n-e need more of- your game planners are now in an excellent position to map anticipatory action.” (JIemorandum from “E” (Ehrlichman) to “H” (Haldeman), undated.) Haldc- man resnnnded. “I agree with *John’s point. Let’s get going.” (Memorandum from “H” to “M” (Magruder), undated).

‘* Report of the House Judiciary Committee, 8/20/74, p. 147.

Page 253: Church Committee: Reports-- Book II

237

These four illustrations from administrations of both political par- ties indicate clearly that direct c,hannrls of communication between top FBI officials and the White House, combined with the failure to screen out extraneous information, and coupled mith overly broad in- vestigations in t.he first instance, have been fiources of flagrant political abuse of the intelligence process.73

Subfinding (c) The FBI has also volunteered information to Presidents and their

staffs, without having been asked for it, sometimes apparently to curry favor with the current administration. Similarly, the FBI has as- sembled information on its critics and on political figures it believed might influence public attitudes or Congressional support.

There have been numerous instances over the past three decades where the FBI volunteered to its superiors purely political or personal information believed by the, FBI Director to be ‘lof interest” to them.i4

The following are examples of the information in Director Hoover’s letters under the Truman, Eisenhower, Kennedy, and Johnson administrations.‘5

To Major General Harry Vaughn., Military Aide to Presi- dent Truman, a report on the activities of a former Roosevelt aide who was trying to influence the Truman administration’s appoint.ments.76

To Matthew J. Connelly, Secretary to President Truman, a report from a “very confidential source” about a meeting of newspaper representatives in Chicago to plan publication of stories exposing organized crime and corrupt l)oliticians.7’

To Dillon Anderson, Special Assistant to President Eisen- hower, the advance text of a speech to be delivered by a promi- nent labor leader.i8

T3 It should be noted, however, that in at least one case the Bureau did dis- tinguish between political and non-political information. In 1968, when an aide to Vice President Humphrey asked that a “special squad” be sent to the Demo- cratic Sational Convention in Chicago. Director Hoover not only declined, but he also specifically instructed the SAC in Chicago not “to get into anything political” but to confine his reports to “extreme action or violence.” (Memo- randum from Hoover to Tolson., et al, 8/15/68.) There were no comparable in- structions at Atlantic City.

” Former Attorney General Francis Biddle recalled in his autobiography how J. Edgar Hoover shared with him some of the “intimate details” of what his fellow Cabinet members did and said, “their likes and dislikes, their weaknesses and their associations.” Riddle confessed that he enjoyed hearing these deroga- tory and sometimes “embarrassing” tidhits and that Hoover “knew how to flatter his superior.” (Francis Biddle. In Brief duthority [Garden City: Doubleday, 19621, pp. 258-259. )

A former FBI official has described one aspect of the Bureau’s practice : “Mr. Hoover nonld say what do we have in our files on this guy? Just -ivhat do

we have? Xot blind memorandum. not Dublic source information. evervthinr we’ve got. And we would maybe write a 2,5 page memo. When he got it and saw‘what’s in it, he’d say we’d better send that to the White House and the Attorney General so they can have in one place everything that the FBI has now on this guy. . (Bishop deposition, 12/2/75, pp. 141-142.)”

“None of these letters indicate that they were in response to requests, as is the rasr with other similar letters examined br the Committee. All were volun-

teered as matters which Director Hoover considered to be “of interest” to the recipients.

” Memorandum from Hoover to Vaughn, 2/15/47. n Memorandum from Hoover to Connelly, l/27/50. ” Memorandum from Hoover to Anderson, 4/21/55.

Page 254: Church Committee: Reports-- Book II

238

To Robert Cutler, Special *4ssistant to President Eisen- hower, a report of a “confidential source” on plans of Jlrs. Eleanor Roose\.elt to holcl a reception for the head of a civil rights group.‘”

To Attorney General Robert Kennedy, information from a Bureau “source” regarding plans of a group to publish allega- tions about the President’s personal life.80

To Attorney General Kcnned~, a sunlmary of material in FBI files on a prominent entertamer which the FBI Director thought “m.ay be of interest”.“’

To Jlarvm Watso?, Special Assistant to President .Johnson, a summary of data m Bureau files on the author of a play satirizing the President.82

As these illust.rations indicate! the FBI Director provided snch data to administrations of both political parties without apparent partisan favoritism.83

Additionally, during the Nixon Administration, the FBI’s INLET (Intelligence Letter) Program for sending regular short summaries of FBI intelligence to the White House was used on one occasion to provide information on the purely personal relationship between an entertainer and the subject of an FBI domestic intelligence investi- gation.84 SACS were inst,ructed under the INLET program to submit to Bureau headquarters items with an “unusual twist” or regarding “prominent” persons.85

One reason for t,he Bureau’s volunteering information to the M7hite House was to please the Administ.ration and thus presumably to build high-level political support for the FBI. Thus, a 1975 Bureau report on thr Atlantic City episode states :

One [agent said], “I would like to state that at no time did I ever consider (it) to be a political operation but it, was obvious that DeLoach wanted to impress Jenkins and Meyers with the Bureau’s ability to develop information which would be of interest to them.” Furthermore, in response to a question as to whether the Bureau’s services mere bemg utilized for political reasons, [another] ansxvered, “No. I do recall, however, that on one occasion I was present when DeLoach held a lengthy telephone conversation wit.11 Walter Jenkins. They appeared to be discussing the President’s ‘image.’ At the end of the conversation DtLoach told ~1s something to the effect, ‘that may have sounded a little political to you but this doesn’t, do the Bureau any harm.’ ” 86

In addition to providing information useful to superiors, the Bureau assembled information on its own critics and on polit.ical figures it believed might influence public attitudes or congressional support. FBI Director Hoover had massive amounts of information at his

” Memorandum from Hoover to Cutler, 2/13/58. @ Memorandum from Hoover to Robert Kennedy, 11/20/a. m Memorandum from Hoover to Robert Kennedy. 2/10/61. ” Memorandum from Hoover to Watson, l/9/67: R1 For additional examples, See Section II, pp. 51-53. R1 Staff memorandum : Review of INLET letters, 11/18/75. Rj Memorandum from FRI Headquarters to all SAC’s, 11/26/69. Be Memorandum from Bassett to Callahan, l/29/75.

Page 255: Church Committee: Reports-- Book II

239

fingertips. As indicated abore, he could have the Bureau’s files checked on anyone of interest to him. He personally received political infor- mation and “personal tidbits” from the special agents in charge of FBI field offices.s’ This information, both from the files and Hoover’s personal sources, was available to discredit crit.ics.

The following arc examples of how the Bureau disseminated in- formation to discredit its opponents :

In 1949 the FBI provided Attorney General d. Howard McGrath and Presidential aide Harry Vaughn inside infor- mation on plans of the Lawyers Guild to denounce Bureau surveillance so they would have an opportunity to prepare a rebuttal well in advance of the expected criticism.s8

In 1960, when the Knoxl-ille Area Human Relations Coun- cil in Tennessee charged that the FBI was practicing racial discrimination. the Bureau conducted name checks on mem- bers of the Council’s board of directors and sent the results to Attorney General William Rogers, including derogatory personal alle,yations and political affiliations from as far back as the late thirties and early forties.89

When a reporter wrote stories critical of the Bureau, he was not only refused any further intervieq but an FBI official in charge of press relations also spread derogatory personal information about him to other newsmen.“”

The Bureau also maintained a “not to contact list,” of “those in- dividuals known to be hostile to the Bureau.” Director Hoover spe- cifically ordered that “each name” on the list “should be the subject of a memo.” 81

=Fnrmer FBI official Mark Felt has stated that the SAC’s could have sent personal letters to Hoover containing such “personal tidbits” “to curry favor with him,” and on one occasion he did so himself with respect to a “scandalous” incident. (W. Mark Felt testimony. 2/3/76. D. 91.)

The following excerpt from one ‘S~%(%s’let&r is a’n example of political informa- tion fed to the Director: “I have heard several comments and items which I wanted to bring to your attention. As I imagine is true in all States at this time, the political situation in [this state] is getting to be very interesting. As you know, Senator [deleted) is coming up for re-election as is Representative [de- lrted]. For a long time it appeared that [the Senator] would have no opposition to amount to anything in his campaign for re-election. The speculation and word around the State right now is that probably [the Representative] will file for the U.S. Senate seat now held by [the Senator]. I have also been informed that [the Senator’s] forces have offered [the Representative] $50,000 if he will stay out of the Senate race and run for re-election as Congressman.” (Letter from SAC to Hoover, 5/20/64.)

gi Letter from Attorney General McGrath to President Truman, 12/7/49; letter from Hoover to Vaughn, l/14/50.

89 Memorandum from Hoover to Rogers. 5/25/60. *Bishop deposition, 12/2/75, p. 2yl. Bi$hoi stated that he acted on his own,

rather than at the direction of higher Bureau executives. However, Director Hoover did hare a memorandum prepared on the reporter summarizing every- thine in the Bureau’s files ahout him. which he referred to when he met with the &porter’s superiors. (Bishop deposition, 12/2/75, p. 215.)

‘l Memorandum from Executives Conference to Hoover, l/4/50. Early exam- plus included historian Henry Steele Commager, “personnel of CBS,” and former Interior Secretary Harold Ickes. (Memorandum from Mohr to Tolson, 12/21/49.) Br the time it was abolished in 1952, the list included 332 names, including mystery writer Rex Stout. whose novel ‘The Doorbell Rang” had “presented a highly distorted and most unfavorable picture of the Bureau.” (Memorandum from 1\1. A. Jones to Bishop, 7/U/72.)

Page 256: Church Committee: Reports-- Book II

240

This request for “a memo” on each wit ic meant that. before comrone was j)laccd on t11c list, the Director rccciwtl, iii effect, a “nanw clwck”

L

rrport, summarizing *‘xliat w had in our files” on th& indi~idnal.s2 In addition to assembling information ‘on criticr, nniiw checks were

run as a matter of regular 13urcnn policy on all “ne\~-ly elected Govcr- nor5 and Congressmen.” The (‘rime Records Division instructed the field ofices to snlnilit ‘%imm~ar~ memoranda” on such officials, cowr- ing both “public source informnt ion” and “any other info~~mntioii tliat) tliev had in their files.” O3 These “summary memoranda” were provided to i>irector IIoo~r and inaintnined in the Crime I<r~ords rXrision fol use in “congressional liaison”-which the Division head said included “selling” hostile Congressmen on “liking the FBI.” s4

It has been widely believed among ?tlembcrs of Congress that the l3urcau had information on each of them .g5 The impact of that belief led Collgressmnll 13oggs to state :

Our apathy in this Congress, our silence in this House, our very fear of speaking out in other forums has watered the roots and hastenecl the growth of a vine of tyranny which is ensnaring that Constitution and Bill of Rights which w-e are each sworn to uphold.

Our society can survive many challenges and many threats. It cannot survive a planned and programmed fear of its

own government bureaus aud agencksG ICUhfi?~ding (cl)

The FBI has also used intelligence as a vehicle for covert efforts to influence social policy and l,olitical action.

The FBI’s intcrfrrcnce with the democratic process was not the result of any overt decision to reshape society in conformance with Bureau-approwcl norms. Rather. the Bureau’s actions were the natural consequence of attitudes within the. Bureau toward social change, com- bined \vith a strong sense of duty to protect society-even from its own “wrong” choices.

The FBI saw itself as the guardian of the public order, and be- lieved that it had a responsibility to counter threats to that order, using any means arailablc.Q7 ,4t tile same time, the Bureau’s assess- ment, of what constituted a “threat” was influenced by its att,itude toma.rd the forces of change. In effect, the Bureau chose sides in the

” Bishop deposition, 12/2/75, p. 207. 03The field office was also expected to send to headquarters any additional

allegations about the Congressman or Governor which might crime to its atten- tion in future investigations, even if the Congressman or Governor was not himself the “subject” of the investigation. (Bishop deposition, 12/2/Z, pp. 194- 200.)

” Bishop deposition, 12/2/75, pp. 206-7. O5 The FBI is not the only agenc.v believed to have files on Congressmen. Ac-

cording to Ren. Andrew Youne. “in the freshman orientation” of new House memb&s, “on& of the things y& are told is that there are seven agenices that keep files on private lives of Congressmen.” (Rep. Andrew Young testimony, 2/19/76, p. 48.)

BBRemarks hy Rep. Hale Boggs, House of Representatives, 4/22/71, Cnngres- sional Record, Vol. 117, Part 9, p. 11562.

WThe means used are discussed in the finding on “Covert Action to Dixupt and Discredit Domestic Groups”, as well as the DetaiIed Repnrts on COIN- TELPRO, Dr. Martin Luther King, Jr., and the Black Panther Party.

Page 257: Church Committee: Reports-- Book II

241

major social movements of the last fifteen wars? and then attacked the other side with the unchecked power at its ~lispwal.

The clearest proof of the 1<11rwn’s attitude toward cliai~gc is its own rhetoric. The language nscd in internal documrnts ~li1cli were not intcndcd to bc disseminated outside the Ewean is that, of the IiiglilJ- charged l~olcmic rcwaliiig clear biases.

For csample, in one of its annual internal reports on COI~TI%- PRO. the 13urcaii took pride in Iin\-ing gircn “tlw lie” to what it callctl “the Communist canard” tllat “the Srgro is downtrocldcn and has no opportnnit its in L1mericn.” This was accomplished by placing a story in a ncwspaprr in which a “wealthy Kcpro industrialist” stated that “tllc Sepro will liar-e to earn respectability ancl a responsible posi- tion in the community before he is accepted as an equal.” It is signifi- cant that this view was rsprcssed at about the same time as the civil rights morement’s March on Washington, which was intended to focus public nttcntion on the denial of opportunities to black Ameri- cans, and which rejected the view that inalienable rights hare to be “earned.” 9S

The rhetoric used in dealing with the Vietnam War and those in opposition to it is even more revealing. The war in Vietnam produced sharply divided opinions in the country ; again, the I3ureau knew which side it was on. For instance, fifty copies of an article entitled “Rabbi in Vietnam Says Withdraw1 got The Answer” were anony- mously mailed by the FBI to members of the Vietnam Day Committee to “convince” the recipients policy in Vietnam.” Q9

“of the correctness of the U.S. foreign

The I3nrean also ordered copies of a film called “Wl~ile Brave Men Die” which depicted “communists, left-wing and pacifist actirities as- sociated with the so-called ‘peace morcment’ or student agitational demonstrations in opposition to the I’nited States position in Viet- nam.” The film was to be used for training Bureau personnel in con- nection with “increased responsibilities relating to communist inspired student agitational activities.” loo

In the same rein. a directive to the Chicago field office shortly after the lM8 Democratic Conrention instructed it to “obtain all possible evidence” that would “disprore” charges that the Chicago police used undue force in dealing with antiwar demonstrations at the Conrention :

Once again, the liberal press and the bleeding hearts and the forces on the left are taking advantage of the situation in Chicago surrounding the Democratic Kational Convention to attack the police and organized law enforcement. agen- cies. . . . We should be mindful of this situation and develop all possible evidence to expose this activity and to refute these false allegntions.‘O*

8*1\I~mnrandum from FBI Headquarters to Sew York Field Office, et al., S/13/63.

RBM~mornndnm from FBI Headquarters to San Francisco Field Office, U/11/65

lM Memorandi~m from FBI IIwdgunrtws to Sew York Field Office et al.. s/9/66.

‘“I Memnrnndum from FBI hrndquarters to Chicago Field Office S/28/68.

Page 258: Church Committee: Reports-- Book II

242

The Bureau also attempted to enforce its view of sesnnl morality. For rsamplc, two students lxcxmc COISTI%I’RO targets wlwn they defended the uric of a foul,-lcttcr \~ortl, e~cxn thongll the tlenlonstl.atiol1 in which tllev ])al?ici]~iJtetl “(low not appear to be iiq~iwtl by the Sew Left,” b~~~~:~u~~~ it “shows obvious disrc~gartl for tlcccncy ant1 15 tablislwl morality.” lo2 ,111 alloJl~lJlOllS 1tttw ~““‘I’Ol’tctlly from an irate parent ant1 an nrtirlc entitled “F~~~~ T,m-c (‘0111cs to _\nstin” wrc illailed to a state senator and the cliniJ~m:JJJ of the I*iiirersity of Texas Board of Rcgrnts to aid in b’fowing tlje 17niwrsity to tilli('

action against tliose administrators wlio arc 1wrniittiJig an ntmosphcrc to build up 0~1 campus that v-ill iw a fcrtilc firltl for the Sew Ikft.” “’ And a ficl(1 oflice was outraged at tlie distribution on campus of a 11ewspapcr called SCR\EW, which was described as ‘Lcontaininp a typr of filth that co1lld only originatct in a deprarcd mind. It is rrpre- scntntiw of the t,ypc of nicntalit]v that is following the Sew I,eft thf?OJ?’ Of illl~~lOJ’a~lt~ 011 NTtCliJl Cdk’~C C’:lJ”l”l”E”.“ lo4

,-\s these cstmplcs dcn~onstmtc. the FBI believed it had a duty to maintain the existing social and political order. Whether or not one agrees with the Bureau’s view, it is profoundly disturbing that an agency of the government secretly attempted to impose its views on the dmerican people.

(i) Use of the LVedin The FBI attempted to influence public opinion by supplying in-

formation or articles to “confidential sources” in the near-s me&a. The FBI’s Crime Records Division lo5 Fas responsible for covert liaison with the media to advance two main domestic intelligence objectives : lo6

1m Memorandum from FBI Headquarters to Minneapolis Field Office, 11/4/6S. ‘03JJemorandun~ from San Antonio field office to FBI Headquarters, S/12/68;

memorandum from FBI Headquarters to ‘San Antonio Feld Office, S/25/68. lo’ The field office also disapproved of the “hippo types” distributing the news-

paner. with their “nnkemnt clothes”. “mild beards;‘. and “other esnmnles of their tioLconformit~“. Accordingly. an anonymous letter’was sent ‘to a stair legislator protesting the distribution of such “depravity” at a state unirrrsit.r, noting that “this is becoming a way of campus life. Poison the minds of the young, destroy their moral being. and in less than one generation this country will hr riw for its downfall.” (Memorandum from Ken-.York Field Office to FBI Headquarters, s/23/69 ; memorandum from FBI Headquarters to Sewark Field Office, l/69.

lai The Crime Records Division also had responsibilit,r for disseminating infor- mation to cultivate a farorahle public image for the FBI-a practice common to many government agencies. This objective was pursued in rarious wags. One sec- tion of the Crime Records Dirision was assigned to assemble “material that was needed for a nuhlic relations nroeram.” This section “dewloned information for television sho&. for writers. Eor huthors. for ne\~spapermen.Al~enple who wanted in-dept.h informat,ion concerning the FBI.” The section also “handled scripts” for public sen-ice radio programs produced by FBI Field Offices : reviewed scripts for television and radio sho1y-s dealing with the FBI; and handled the “public relations and publicity aspect” of the “ten most tenanted fugitives program.” The Bureau attempted to assert control over media presentations of information about its activities. For example, Director Hool-er’s apprnral was necessary before the Crime Records Division would coonwate with an author intending to write a book about the FRI (Rishnp testimony, 12/2/W pp. CrS. 18.) I

loB Memoranda recommending use of the media for COISTELPRO purposes sometimes hore the designation “Mass Media Program.” which appeared mere- 1.v to signify the function of the Crime Rernrds Division as a “conduit” for disseminating information at the rrqnrst of the Domestic Intelligenre Division. (Bishop testimony. 12/2/Z. pp. 63-68, SK) The dissemination of derogatory information to the media was usually reviewed through the Bureau’s chain of rnmmnnd and received final approval from Director Hoover. (Bishop testimony, 12/2/i??, p. 89.)

Page 259: Church Committee: Reports-- Book II

243

(1) providing derogatorv information to the media intended to gen- erally tliscretlit the activit’ies or ideas of targeted groups or individuals; and (2) tlissrminatinp unfnrornble articles, news releases. and back- ground information m order to disrupt, particular activities.

Typically, a local FBI agent would provide information to a “friend- ly news SOllI'CC ‘* on the condition Yhat the I3urcau‘s interest. in these matters is to be kept in the strictest confidence.” loi Thomas E. Bishop, former Director of the Crime Records Dirision, testified that he kept a list of the Bureau’s “press friends” in his desk.los Bishop and one of his predecessors indicated that the FBI sometimes refused to CO-

operate with reporters critical of the Bureau or its Director.lO” Bishop stated that. as a “general rule,” the Eureau disseminated only

“public recorcl information” to its media contacts, but this category was viewed by the Bureau to include. any information which could conceivablv be obtained 1)~ close scrutiny of even the most obscure pub- lications.1~~ Within these l<aramcters, background informat.ion supplied to reporters “in most. cases [could] include everything” in the Bureau files on a targeted individual; the selection of information for publica- tion would be left to the reporter’s judgmcnt.111

Thrre are numerous examples of authorization for the preparation and dissemination of unfavorable information to discredit. generally the activities and ideas of a target : I12

-FBI headquarters solicited information from field offices “on a continuing basis” for “prompt . . . disseminat,ion to the news media . . . to discredit the K’cw Left, movement, and its adherents.” Headquarters requested, among otther things. that :

specific ‘data shonlcl be furnished depicting the scurrilous and depraved nature of many of the characters, activit.ics. habits and living conditions reprrsrntatire of New Left adherents.

Field Ofices were to be exhorted that “Every avenue of possible em- barrassment must be rigorouslr and enthusiastically explored.” I13

-FBI headquarters anthor&ed a Field Office to furnish a media con- tact, with “background information and any arrest record” on a man

Irn For esample, Memorandum from FBI Headquarters to Atlanta Field Office, 10/22/m

lo8 Bishop. 12/2/X, p. 33. lo8 Cartha DeI~oach, who handletl media contacts f,)r several years, testified that

this technique was not actunllg used as much as the Director desired:

If any unfair comment appeared ill any segment of the press concerning ;\Ir. Hoover or the FBI Mr. Hoover . wonld say do not contact this particular newspaper or do not contact this person or do not CO- operate with this lwrson. If I had complied strictly to the letter of the law to JIr. Hoover‘s imtrnctions, I think I would be fair in say- ing that we wnuldn’t he conyeratin, m with hardly a single newspaper in the Vnited States. The men down thrnngh the Fears had to overlook some of those instructions and deal fairly with all segments of the I)ress. (DeLnach testimony. 11/2.5/75. pp. 2X7-214.)

I” Bishop statfd that the Crime Records Division was “srrupnlnus” in prorid- ine information whirl1 could be cited to a “w~gc and paragraph” in a pnblic s&rcr. (Bishop. 12/2/75. pp. 24. 177-178.)

‘I1 Bishop. 12/2/75. pp. 1,3%130. ‘I? T. I?. Bishop stated that from the FRT dncnments nrailnhle to the Committee.

il \V:IS inipossil~le to determine whether an article was xctnnlly printed after a IICLVS release or a draft article had been supplied to a media source. (Bishop, 12/2/7-T p. 86.)

I13 Nekorandum from C. D. Brennan to W. C. Sullivan, 5/22/68.

Page 260: Church Committee: Reports-- Book II

244

affiliated with “a radical XeTT- Left element” who had been “active in shon-ing films on the Black Panthers ant1 police in action at various universities during student, riot.ing.” The media contact had requested material from the Bureau which “would have a detrimental effect on [the target’s] act,irit,ies.” 11*

-Photographs depicting a radical group’s apart.mcnt RS “a sham- bles with lewd, obscene and revolutionary slogans displayed on the walls? mere furnished to a free-lance writer. The directive from head- quarters said : “As this publicity will be derogatory in nat.uro and might serve to neutralize the group, it is being approved.” I”

-The Boston Field Office was nnthorizrd to furnish “derogatory information about the Kation of Islam (NOI) to established source [name excised] ” :

Your suggestions concerning material to furnish [name] are good. Emphasize to him that the SO1 predilection for via-

lonco, preaching of race hatred, and hypocrisy, should be ex- posed. Material furnished [name] should be either public source or known to enough people as to protect your sources. Insure the Bureau’s interest in this matter is completely protected by [name] .I10

One Bureau-inspired documen+ry on the NO1 reached an audience of 200,000.“7 Alt(llough the pubhc was t,o be convinced that the NO1 was “violent”, t,he Bureau knew t,his ~8s not in fact true of the or- ganization as a ~vhole.~‘~

-The Section which supervised the. COIKTELPRO against the Communist Party intended to discredit a couple “identified with the Community Party movement” by preparing a nen-s release on the drug arrest of their son, which jvas to be furnished to “nexus media contacts and sources on Capitol Hill.” A Bureau official observed that the son’s “arrest and the Party connections of himself and his parents presents an excellent opportunity for espoitation.” The news release noted that “the Russian-born mother is currently under a deportation order?? and had a former marriage to the son of a promi- nent Communist Party member. The release added : “the Red Chinese have long used narcotics to help weaken the ;vouth of target countries.” I19

“‘Memorandum to Director from SAC Miami, 3/10/70. Bishop testified that he “would hope” that in response to the directive to disseminate the target’s “arrest record” the Division would have disseminated only conviction records. Bishop said that under the Attorney General’s guidelines then in effect only conviction records or arrests which were a matter of public record in a par- ticular jurisdiction were to be disseminated. Bishop stated that his policy was not to disseminate an arrest record “especially if that arrest record resulted in an acquittal or if the charge was never completed., . because that is not, to mv mind, anything derogatory against a guy, (Bishop testimony, 12/2/E. pp. 163-167, 173.)

until he actually gets convicted.”

US Memorandum from FBI Headquarters to Boston Field Office, l/13/68. I” Memorandum from FBI Headquarters to Boston Field Office, 2/27/68. l*‘lIen~ornndum from Tampa Field Office to FBI Headquarters, 2/7/E+. =a Deposition of Rlack Nationalist COINTELPRO supervisor. 10/17/75, p. 21;

Dwosition of George C. Moore, Chief of the Racial Intelligence Section, 11/3/i’& 11, 36.

“leMemorandum from F. J. Baumgardner to TV. C. Sullivan, G/3/63.

Page 261: Church Committee: Reports-- Book II

245

---When the v7ife of a Communist 1’art.v leader purchased a new car, the FBI prepared a news item for distribution to “a cooperative news media source” mocking the lender’s “prosperity” “as a disruptive tactic.” The itcni commented sarcastically that “comrades of the self- proclaimed leader of the American lvorking class should not, allow this example of [the leader’s] prosperity to discourage their con- tinued contributions to Partr coffers.” 12”

-After a public mccting,r’in Sew York City, where “the handling of the [,JFR assassination] investigation was criticized,” the FBI prepared a news item for placement ‘*with :I cooperative news media source” to discredit the meeting on the grounds that “a reliable [FBI] source” had reported a “conrictecl perjurer and iclentifiecl espionage agent as present in the audience.” lZ1

-As part of the new Left COISTELPRO, the FBI sent a letter under a fictitious name to Lift magazine to “call attention to the unsavory character” of the editor of an underground magazine, who was characterized as “one of the moving forces behind the Youth International Partv, rommonlv known as the Yippies.“ To counteract a recent, L;fc “artic’le favorable” to the Yippie editor, the FBI’s ficti- tious letter said that “the cuckoo editor of an unimportant smutty little rag” should be “left in the sewers.” 12*

Murh of the Bureau’s use of the media to influence public. opinion was directed at disrupting specific activities or plans of targeted groups or individuals :

--In March 1968, FBI Headquarters granted authority for furnish- ing to a “cooperative national news media source” an article “designed to curtail success of JIartin J,uthcr King’s fund raising” for the poor people’s march on Washington, D.C’. by asserting that “an embarrass- ment of riches has befallen King . . . and King doesn’t need the monev.” lZ3 To further this objective. Headquarters authorized the JIiami Office “to furnish data &onccrning money wasted by the Poor People’s Campaign” to a friendly news reporter on the usual condition that “the Bureau must nat be rC\-calcd as the source.” lz4

The Section Chief in charge of the Black Xationalist COINTEL- PRO also rrrommcnded that ‘~I~1~otogrnI~hs of demonstrators” at the march should be furnished: he attached six photographs of Poor People’s Campaign participants at a Cleveland rally, accompanied by the note : “These show the militant7 aggressive appearance of the par- ticipants ant1 might be of interest to a cooperative news source.” lZ5

-As part of the Sew Left COISTELPRO, authority was granted to the -Atlanta Fieltl Office to fnrnisb a newspaper editor who had “written numerous editorials praising the Bureau” with “information to supl)lement that already known to him from public sources concern- ing sub\-crsive influences 111 the Atlanta peace movement. His use of this material in n-cll-timed articles would be used to thwart the [upcoming] demonstrations.” lZF

‘“Memornndmn from F. .T. Ranmnrdncr to W. C. Snllivnn. 8/R/65. 1x Memornndnm from F. .T. Ik~nn~~~rrlnrr to XV. C. Snllirnn. f/24/64. “’ ~I(~inor:~lltlrn~~ from Sew York Field Office to FRI Hendqnnrtrm. 10/16/6S. ‘23 .\Icmorniitl~~m from G. C. Moore to W. c’. Sullivan. 10/%/G?. “’ ~Iemorantlum from FRI Hwdqnnrters to 1linmi Field Office, ‘i/9)/68. I5 1\ltmornntliim from G. C‘. .\Ionre to n-. C. SnlliTnn. 5/l i/76. ‘% ~Irmornndnm from FBI Headquarters to Atlnntn Field Office. 10/22/6S.

Page 262: Church Committee: Reports-- Book II

246

-.2n FBI Special Agent in Chicago contacted a reporter for a. major newspaper to arrange for the publication of an article which was expected to “greatly encourage factional antagonisms during the SDS Convention!’ by publicizing the attempt of “an unde.rground communist, organization” to take over SDS. This contact. resulted in an article headlined “Red knit Seeks SDS Rule.” 127

-FBI Director Hoover approved a Field Office plan “to get cooper- ative news media to cover closed meetings of Students for a Democratic Society (SDS) and other Sew Left groups” with the aim of “dis- rupting them.” lZ8

-Se;Teral months after COIYTELPRO operations were supposed to have terminated, the FBI attempted to discredit attorney Leonard Boudin at the t,ime of his defense of Daniel Ellsberg in the Pentagon Papers case. The FBI “called to the attention” of the Washington bureau chief of a major news service information on Boudin’s alleged “sympat.hy” and “legal services” for “Communist causes.” The reporter placed a detailed news release on the wires which cited Boudin’s “iden- tification with Leftist causes” and included references to the arrest of Boudin’s daughter, his legal representation of the Cuban government and “Communist sympatliizer” Paul Robeson, and the statement that “his name also has been connected wit.11 a number of other alleged com- munist front groups.” In a handwritten note, J. Edgar Hoover di- rected that copies of the news release be sent to “Haldeman, A. G., and Deputy.” lZQ

The Burea.u sometimes used its media contacts to prevent or post- pone the publication of articles it considered favorable to its tar,wts of unfavorable to the FBI. For example, to influence articles which related t.o t.he FBI, the Bureau took advantage of a close relaltionship with a high official of a major national magazine, described in an FBI

I-’ Jlrmorandum from Chicago Field Office to FBI Headquarters, G/18/69. ‘2R Memorandum from FBI Headquarters to Indianapolis Fitld Office, 6/17/68. 129 FBI Memorandum from Bishop to Jlohr, 7/6/71; Bishop testimony, 12/2/i&

pp. 148-151. Two Fears earlier the Crime Records Division prepared a sixteen-page memo-

randum containing information on “I.onard B. Boudin. Attorney for Dr. Ren- jamin Speck,” written at the time of Speck’s indictment ior conspiring to violate the Selective Service Act. (FBI Memorandum from 11. A. Jones to T. E. Bishop, 2/26/M) The memorandum described “alleged associations and activities of Boudin” related to oreanizations or individuals considered “subversive” br the FBI, (Bishop, 12/2/75, pp. 134-135) and included : names of many of BoGdin’s clients; citations to magazines and journals in which Boudin had published articles ; references to peiitions he had signed ; and notes on rallies and academic conferences at which he had spoken. The memorandum indicated that “the White House and Attorney General have been advised” of the information on Boudin’s background. Notations on the cover sheet of the memorandum by high Bureau officials indicate that approval was granted for “furnishing the attached infor- mation to one of our friendly news contacts” but the information was not used until after the “results of appeal in Speck’s case.” Bishop did not recall dis- trihuting the Boudin memorandum. (Bishop, 12/2/i& pp. 1X-126)

The head of the Crime Records Division spwulated that the memorandum was prepared at the request of a reporter because he did not remember a request from Hoover or from the Domestic Intelligence Division. which xvas the normal route for assignments to the Crime Records Division. Division Chief Bishnl, testified that he probably instructed the Division “to get. 111, any public source information that we have concerning Bnudin that shows his connation with the Communist Party or related groups of that nature.” (Bishop. 12/2/T& pp. 131- 133)

Page 263: Church Committee: Reports-- Book II

247

nmnoranduin as “our good friend.” Through this relationship. the FBI %y!lcl~cd” a11 %nfarornble article against the Burenn” written b\- a free-lance xritcr about an FIST in\-wtigxt ion : “postl)onc(l l)ul)- llcntion” of an article on another FJ3I case: “fow~tallctl piil~lication” of an wticle by Dr. ;\lartin Luther King. ,Jr., . ant1 i*cwi\-cd infoixia- tion about proposctl editing of I<in$s nrticlfxl:“’

The Unrca~~ also attrinl)tetl to influence public opinion l)y using news inetlia SOIII’CC~ to discredit dissideid groups bv linking tlicni to the Coiiiniunist Party :

-A confidential soiwce who publislictl n %clf-tlescribed conserv:v tire weekly newpaper” was anonyiiioi~sl~ ninilcd infoixintion on a clinrcli’s sponsorship of efforts to abolish thr ITonsc Conmittcr on Un-A1nwricall activi’tics. This pron~ptrcl an article entitlecl “Locals to -iid Red Line.?’ naming ‘the minister. aniong others. as n local sponsor of what, it. termed 5 “Coininunist dominntctl plot?’ to abolish IIU.1C.‘“’

-The I%urewn targeted a professor who had been the president of a local pcwcc Cellter, n “coalition of anti-\‘ictiixill :inrl anti-draft groups.” In 1%X, he resigned tcnipomri!y to becoine state chairman of Eugene McCarthy’s presidciit~ial can~paign orgmizntion. Inforinat.ion on the professor’s wife. who had aplxircntly associated with Coniinu- nist, Party inrinbers in the early 1050’s. w-a.5 furnished to n newspaper editor to“‘espose those pcol~le at this time when they are receiving considerable publicity in orcld to “clisrnpt~ the lliembcrs” of the pcsce organization.132

-Other instances included an attempt to link a school bovcott with t,he Communists by alerting newsmen to the boycott leader’s plans to attend a. literary rrccption at the Soviet iiiissioii ; 133 furnishing infor- inntion to the iiieclia on the participation of the Coniinuiiist Party presidentiul cancliclutc in the I’nited Farm TYorkers picket line ; 13a “confidentially” inforlr1in.g established P~III’CES in three northem Cali- fornia newspapers that t.he San Frxnc.isco Count,y Conmlunist Part) Committee had stated that, civil rights groups were to “begin work- ing” on the area? large newspapers “in nii effort to secure grentel clllplo~~iiient of Kegroes ;” Ia3 alid fnrnishin,g information to the media on Socialist ~~orkci~s Party participation in the Spring Mobilization Comnlittec to End the War in Yietnatn to “discredit” the antiw-ar grOLIp.136

(ii) dttctcks 071 Leaders

Through covert propwgancla. the FBI not, only attcmptecl to in- flwnce public opinion on matters of social policy, but also directly in-

“’ 3Icmornndum from TV. H. Stapleton to C. I). I)eLonch, 11/B/M “I ItIrnlnrnndnn~ from Clereland Field Office to FBI Headqnnrters. 10/28/04 :

Il1P1llori7ildlii11 from FE1 Hmdqunrters to (‘lerrlxntl Field Office, ll/(i/fM. “’ ~Ie~uorandum from FRI Headqnnrters tn I’lloenis Field Office, G/11/68. lx3 JIemorandnm frnm FRI Henclqnarters to Sew York Field Office, 2/4/M. “*The target was not intended to be the rnited Farm Workers, but a local

cwllrpr professor espected to pnrticilmtr in the picket line. The Bureau had unsuccessfnll~ directed “consicleral~le efforts to lbrevent hiring” the professor. A\i)lmreiitlr. the Bureau did not consider the imnnct of this techninue on the ITnited Fal*;u Workers efforts. (Memornndum fro**; San Francisco Fiek Office to E’liT IIe:itlqnnrtrrs. 9/E/68 : memorandum from FRI Headqnnrtrrs to San Frnn-

lx’ ~1emor:1ndm11 from San Francisco Firltl Office to FRI Hc:~tlgnnrtrrs. 4/10/6-I. 1?o ;\leniornntlnm from San Francisco Field Office to FBI Hentlqilarters, 3/10/67 :

memorandum from FBI Headquarters to San Francisco Field Office, 3/14/67.

Page 264: Church Committee: Reports-- Book II

248

terrened in the people’s choice of leaclersl~il~ both through the electoral process and in other, less formal arenas.

For instance. the Bureau made plans to disrupt. a possible “Peace Party” ticket in the 1068 elections. One field office noted that “effec- tively tabbing as communists or as commlulist-backed the more hysteri- cal opponents of the President on the Vietnam question in the midst of the presitlcntial canipaign woultl be a real boon to Mr. ,Johnson.” K+;

In the FBI’s COI~TET,J?RO l)rograms, political candidates were targeted for disruption. The document which originated the Socialist, Workers Party COISTELPRO noted that, the SUP “has, over the past several vears, been openly espousing its line on a local and national basis through running candidates for public office.” The Bureau decided to “alert the public to the fact that the SW? is not, just another socialist group but follows the revolutionary principles of Marx, Lenin, and Engels as interpreted by Leon Trotsky.” Several S7VP candidates were targeted, usually by leaking derogatory in- formation about the candidate to the press.138

Other COIXTELPRO programs also included attempts to disrupt campaigns. For example, a Midwest lawyer running for City Council was targeted because he and his firm had represented “subversives”. The Bureau sent an anonvmous letter to several community leaders which decried his “commumst background” ancl labelled him a t‘charla- tan.” 139 I-ruler a fictitious name: the Bureau sent a letter to a television station on which the candidate was to appear, enclosing a series of questions about his clients and his activities which it believed should be asked.‘*O The candidate was defeated. He later ran (successfully. as it happened) for a judgeship. The Bureau attempted to disrupt this subsequent, successful campaign for a judgeship by using an anti- communist, group to distribute fliers and write letters opposing his candidacy.141

In another instance. the FBI attempted to have a Democratic Party fundraising affair raided bv the state ,llcoholic Beverage Control Commission. The, fund raiser was targeted because of two of the can- didates who would be present. One, a state assemblyman running for reelection. was active in the Vietnam Day Committee; the other, the Democratic candidate for Congress. had been a sponsor of the National Committee to Abolish the House Committee on ITn-American Activi- ties and had led demonstrations opposing the manufacture of napalm bonlbs.‘42

Although the disruption of election campaigns is the clearest exam- ple, the FBI’s interference with the political process was much broader.

ISi Memorandum from Chicago Field Office to FBI Headquarters, 6/l/67. I35 ~Ien~orandun~ from FBI IImdgunrters to all SAC’s, 10/E/61. ]a JIrmorandum from Detroit Field Office to FBI Headquarters, 9/l/65 ; memo-

randum from FBI Headquarters to Detroit Field Office, n/22/65. la0 Memorandum from Detroit Field Office to FBI Headquarters, Q/28/65 ; memo-

randum from FBI Headquarters to Detroit Field Office. 10/l/65. “I Memoranduni from Detroit Field Office, to FBI Headquarters. l/l!l/67. I” Memorandum from FBI Headquarters to San Antonio Field Office, 11/14/C%3.

The attempt was unsuecessfnl : a prior raid on a fire department’s fund raiser had angered the local District Attorney, and the ABC decided not to raid the Democrats because of “political ramifications.”

Page 265: Church Committee: Reports-- Book II

249

For esxml~le, all of the. COISTEI,I’RO 1 11-o g rams wrrr~ aimed at the leadership of dissident group~.‘~~

In one cast, the I<urean’s plans to discredit a civil rights leader in- cludetl an attempt to replace him with a candiclatc chosen by the Bureau. I>uring 1964, the FI31 began a massive program to discredit l>r. Martin Luther Rinp, .Jr. and to “neutralize” his effectiveness as the leader of the civil rights movement.“’ On ,January 8, 1964, Assistant Director William (‘. Sullivan proposed that the FBI select a next “national Segro leader” as Dr. King’s successor after the Bureau had taken Dr. Ring “off his pedestal” :

When this is done, and it can and will be done . . . t,he Negroes will be left without a national leader of sufficiently conlpelling personality to steer them in the right direction. This is what could h:~l~lxw, but need not happen if the right kind of Segro leader coultl at this time be gradually de,vel- aped so as to ol-crshadow Dr. Ring and be in the position to assume the role of leadership of the Srgro people. when King has bten completely discredited.

I want to makeSit clear at once that I clon’t propose that the FI3I in any way became in\-olrcd openly as the sponsor of a Negro leader to o\-ershadow Martin Luther King. . . . Hiit, I do propose that I be given permission to rsplore further this entire matter. . . .

If this thing can be set up properly without the Bureau in any way becoming directly in\-olvecl, T think it wonlcl not only be a great help to the FI3I l~it ~oultl be a fine thing for the country at large. While I am not specifying at this moment, tliere arc various ways iu which the FBI could give this entire matter the proper direction and develol~nrcnt. There are, highly placed contacts of the FHI who might. be very helpful to further such a step. . . .14.i

The, Rureau’s efforts to discredit Dr. King are discussed more fully elsewhere.‘46 It is, ho\wver. important to note here that some of the Bureau’s efforts coincided with I)r. King’s activities and statements concerning major social and political issues.

(iii) Eraggemting The Threcrt The Bureau also used its control over the information-gathering

process to shape the T-iews of government oflicials and the public on the

1’3The originating document for the “Black Sationalist” COISTELPRO ordered field offices to “expose, disrupt, misdirect, discredit, or otherwise neutralize” the “leadership” and “spokesmen” of the target groups. The “Sew Left” originating memo called for efforts to “neutralize” the Sew Left and the “Key Activitists,” defined as “those iudividuals who are the moving forces behind the iYew Left ;” the letter to field offices made it clear that the targets were the “leadership” of the “Sew Left’-a term which was never defined. (Memorandum from FBI Headquarters to all SAC’s, S/25/67.)

“‘Memorandum from Brennan to Sullivan, 5/Q/68; memorandum from FBI Headquarters to all SAC’s, .5/10./W.

I” Jlrmorandum from Sullivan to Belmont, l/8/64. Although this proposal was approved by Director Hoover, there is no evidence that any steps were taken to implement the plan.

“‘See Martin Luther King. Jr. Report : Sec. V, The FBI’s Efforts to Discredit, Dr. Martin Luther King : 1964, Sec. T’II, The FBI Program Against Dr. King : I Q6%1Q&S.

Page 266: Church Committee: Reports-- Book II

250

threats it. pcrceiwd to the social order. For example, the FBI ex- aggerated the strength of the Coiiimiunist Party and its iiiflncnce over the civil rights and anti-~~ictnnm war mo\cments.

Opponents of civil riglits Icgislation in tile early l!XOs had charge(1 that such lcgislntion was “a part of the world Communist consl)iracj to divide and conrluer our country from within.” The truth or falsity of these charges was a nintter of concern to the acliiiinisti~ntioll. (‘on- giws. and the public. Since the I3urcau ~-as assigned to conipile intclli- pencr 011 Comii~iiiiist activity. its e~tiiiintc was soll~llt and. plc5lllll~l~l~.

rtlicd upon. ,4ccordingly, in 1963. the Domestic Intclligcncc Division submittecl a men~orandun~ to Director Hoover detailing the CPUSA’s “efforts” to exploit black -Americans, which it, conclucled were an “obvious failure.” ‘*;

Director Hoortr was not pleased with this conclusion. He sent a sharp message back to the Division which, according to the ,\ssistnnt Director in charge. made it “evident that \v-e had to change our ways or wr, would all be out on the street.” 14’ Another memorandum was Itherefore written to give the Director “what Hoorcr wanted to hear.” I40

The memorandum stated, “The Director is correct ;” it called Dr. Martin Luther King, Jr. “the most dangerous Negro of the future in this Xation from the standpoint, of communism, the Negro, and na- tional security :” and it concluded that it. was “unrealistic” to “limit ourselves” to “‘legalistic proofs or definitelv conclusive evidence” that the Communist Party wields “substantial Aluence over Seproes which one day could become decisive.” IS0

Alt?lough the Division still had not said the influence WCIR decisire, by 196-l the Director testified before the HOLW Appropriations Sub

committee that the “Communist influence” in the “Xepro niorrmrnt” was “vitally important.” *j* Only someone with access to the underlying infornlation would note that the facts could be interpreted quite tlif- ferently.151a

‘I7 Memorandum from Baumgardner to Sullivan, 8/23/63, p. 1. “’ Sullivan deDosition. 11/l/75. D. 20. 1’D Sullivan deposition; lljlj75; p. 29. =” Jlemorandum from Sullivan to Director, FBI, S/30/63. Sullivan described

this process of “interpretive” memo writing ,to lead a reader to believe the Com- munists were influential without actually stating they were in control of a move- ment : “You have to spend years in the Bureau really to get the feel of this. . . . You came down here to ‘efforts’, these ‘colossal efforts’. That was a key word of ours when we arc getting around the facts. . . You will not find anywhere in the memorandum whether the efforts were successful or unsuccessful. . . Here is another one of our words that vve used to cover up the facts, ‘efforts to exploit’, that word ‘exploit’. Nowhere will you find in some of these memos the results of the exploitation. [Like] ‘planning to do all possible’, you can search in vain for a statement to the effect that their nlans were successful or unsuccessful. nartlv suc-

(Sullivan, 11/l/X, pp. 15-16.) - _ cessful or partly unsuccessful.” 161 Hearings before ‘the House Appropriations Subcommittee, 88th Cong.,

2d Sess. (1961). 1,. 309. Director Hoover’s statement was widely publicized. (E.g., “Hoover Says Reds Exploit Segroes,” Sew York Times, 4/22/M, 1). 30) It caused serious cnncern among civil rights leaders who feared that it would hurt, the prospects for passage of the 1964 civil rights bill.

I”’ Director Hoover had included similar exaggerated statements about Com- munist influence in a briefing to the Eisenhower Cahinet in 19X. Hoover had stated, regarding an NAACP&ponsored conference :

“The Communist Party plnna to use this conference to embarrass the Adminis- tration by causing a rift between the Administration and Dixiecrnts who have

Page 267: Church Committee: Reports-- Book II

251

,I similar cs;!ggcrntion occnrwcl iii some of the 13ure~n’s statements 011 coiiimm~ist influence on the anti-Vietnam war dcnlollstlations.

Imnifdiately after tlie nirf~tilig, 1iowe~ei~. Hoe\-cr told llis arsociates

that. tllr 13iirenn might not 1~ able to “tecliiiif~all~ state” that SIX3 w~5 “all actual colinllullist oiy~iliz:itioll. *’ The FI3I 11lerelv knew that there wW2 “comniiinists in it.” IIoo~er instrnrted. IioweG~r, “What I want to gf+ to the President is the I~ackgi~3und n-it11 cniph:~sis upon the f~ommmiist influence tlwrciil so tliat lie n-ill hion- exactly what the pic- ture is.” The I)irector nfltlrtl that lie wanted “a good, strong mcmo- rxndiun~” pinpointing that the tlcnioiisti~ntions had lxw~ “laigwly par- ticipated in hy communists evrn thong11 they may not, hare initiated t11cm ;” the Bure:~u could “at least” say that, they had “joined ant1 forced the issue.” ,1ccording to the Director, Pre&dcnt ,Johnson was “quite concerned” and wanted “1)rompt ant1 quick action.” IS4

Once again, the Hnreau n-rote a report which made Communist “ef- forts” sound like (‘ommmiist si1cfc3s. The eight-page lncniorxncliini detailed all of the Communist Partv’s atteml)ts to “encourage’? domes- tic dissent 1)~ “a crescendo of critic&m aimed at negating every effort of the I-nited States to prevent Victnanl from being engulfed by com- munist aggressors.” Twice ii1 the eight l)a.ges. for a total of two and a half sentences, it, was 1)oiiitcd alit that niost dciiionstr:ttors wrrc not Party members and their decisions were not initiated or controlled by the communists. E:ach of these brief stntrments nlorcover, was follomeh l):\- a qualification : (1) “ho7c*e7*e,-. the Comnlunist Party, IX1 . . . has vlgoronsly supported these gronl~s and exerted influence ;” (2) “WMc the March [on Washington] was not Commmnist initiatccl . . . Com- munist Party nien~bcrs froiii thi~ouphout the nation participntetl.” [Emphasis adclecl.] Ii;

The rest of the melllorandm~l is an illustration of what former Assistant I>irector Snllix-an called “intclyrctivr” mrmo writing in

snp~mrtefl it, l)F forriu p tllr Afllllinistrntioli to tnkr :i shnfl 011 civil rights leg- i~l:~ltinu with the prcsrnt Congress. The I’nrtr hope.? through a rift to affect the l!Wi elef+inns.” [Emphasis xdded.] ( JIen~orandum from Director, FBI, to the lbxutire Assistnut to tlifl Attoruey General, 3/9/X. arid enclosure.)

Dirwtnr IIonYer did lint iiiclude in his prepared briefing stntrmeut the infnr- mation reported to the White House separately earlier that thrrf~ was “un iudi- catinn” the the SAkCI had “allowed the Cnmmuuist Party to intiltrate the cwufwrnce.” (Hoover to Dillon Andersnn. Spfvial ,\ssistaiit to the I’resiflcut. 3/5/X.) According to nue historical account, Hoover’s Cabinet briefing “rrin- forcefl the President’s iucliuation to lxwsi~ity” on civil rights legislation. (.J. TY. Andrrsou, f:iscnIlozccr, I~~otc’~1c71, nilrl tltc Congress: The !7’n11,97etl 0tQin.q of tlrc’ Civil Rigkta Hill of 1956-57 [I-niyersity of Alabama Press, 19641, p. 34.)

‘X Jlemornndum from Hnorer to subordinate FBI officials, 4/28/C?. ‘yi Iioover I11f’111orilllfl11I11. 4/28/G. I” Hoo\-er 1l1elrlor~Ilflli1i1. 4/28/G. ‘X I,etter from Hoover to JIcCenrge I~unfl,v, Special Assistant to the

President (Sationnl Security). 4/2S/G.Z. enclosing FBI xlleillorilriflu1ii. Subject : <!ommunist A%&irities Relative to United States Policy on Vietnam.

Page 268: Church Committee: Reports-- Book II

252

which Conmunist efforts and d&w arc eulpllasized without any cwluation of whether they had been or were likely to be successful.

The exaggeration of (:onmunist participation, both by the FBI and White House staff members relying on FBI rel1oi+s,15G could only hare had the eflcct of reinforcing I’rrsidrnt ,Jolu~son’s original tcnd- enc-y, to discount dissent. apaiust the ~ictkn War as “Conununist inspired”--a. belief shared lq his sllccessor. Isi It is impossible to npxs- ure t.lie full effect of this distorted perception at, the very liigliwt pol- icymaking level.

I” See, e.g., a memorandum from Marvin (Watson) to the President, Z/16/67, quoting from a Rureau report that : “the Communist Party and other organiza- tions are continuing their efforts to force the Inited States to change its present policy toward Vietnam.”

I” The report prepared bg the intelligence agencies as the basis for the 1070 “Huston Plan” included the following similar emphasis on the potential threat (and downplaying of the actual lack of success) :

“Leaders of student protest groups” who traveled abroad were “considered to have potential for recruitment and participation in foreign-directed intelligence actiritr.”

“Antiwar activists” who had “frequently traveled abroad” were considered “as having potential for engaging in foreign-directed irrtellipence collection.”

The CIA was “of the view that the Soviet and bloc intelligence serrices are committed at the political level to exploit all domestic dissidents wherever possible.”

Although there was “no hard eridence” of substantial foreign control of “the black extremist movement,” there was “a marked potential” and the groups were “highly stcsccptible to expIoitation by hostile foreign intelligence serrices.”

“Communist intelligence services are capable of using their personnel, facili- ties, and agent personnel to work in the black extremist field.”

IVhile there were “no substantial indications that the communist intelligence services hare actively fomented domestic unrest,” their “capability” could not “be minimized.”

“The dissidence and violence in the I:nited States today present adversary intelligence services with oppohcnifics unparaZZelcd for forty years.” [Emphasis added.] (Special Report, Interagency Committee on Intelligence (Ad Hoc), .June 1970; substantial portions of this report appear in Hearings, Vol. 2, pp. 141-188.)

Page 269: Church Committee: Reports-- Book II

F. FIST>IS(;-ISAI)E:O,UI1TE: COSTROLS OS T)TSSEJTIS~\TIOS .\ST) RTSTTI:STIOS

The (‘oniniittec fintls that tlie ~)l'O~lli('t of intclligenw investigations has been tlisscniin:ttc(l without atleqttate cwntrols. Re1)orts on lawful political activity and lawabi(ling citizciis Iiave been tlisscniinnted to agencies ha\-inp no 1)1wIwr ream11 to rewivr theni. Tnformntion that should have IKW~ tliscartlctl. l)i~rge(l. 01’ ~calcd, inclu(1in.g the product of illcpl tccliniqites illltl overbroad investigations. has been retained and is available for future IISC.

iYlrbfiitdi/tgs

(a) Agencies linvc voluntcrretl massive amounts of irrelevant, inforniat.ion to other oflicinls antI :qell(*iw a~(1 have 1w1mi~lecl mqiics. tioningly in some iwlnnws to reclttcsts for tlata witliottt assuring that tile illfO~~llYiltiOll Wollltl I)e llietl f0l.a l:l\Vflll I)\ll’1)0Se.

(c) I-ncler the fctlcral eiiiplo~ec scm1rit~~ 1)1wpam, luiliec~essary information al)ortt the 1ioIitic21 Ix;liefs an11 :t+wc*i:tt ions of prospective ~~overnl~ielit. emplovers has been tlisscniinntctl. h ((1) ‘I’ltc T<‘I<T. I;-iiich has lwn the “c~I(~a~.ill~Iloll~(~” for all domestic intellipwce tlSltil. llli~illt:lills in watlily :tcccs4l)Ir files sensitive and tlcl*ogatory l~l?l~~OllilI iiiformation not relevant to any invesbigxt ion? as well as information which was improperI\- or illcgnlly obtained.

/:7flborufioit of I”;jldit,gii

The atlwrsc effects on privacy of tlic O\-erbrentlth of doniestic intrlli- gcnce collection and of the IIS~ of Intrusive ‘I’wllniqnes have heen mag- n&xl many times over by the tlis~rtliiilatioll practices of the collecting agencies. IllfOl~lllil:tiOll wliicli slioi~ltl not have been gatlicretl in the first p1ac.n has gone beyond tlic initial ageiic’v to ~i~iniei~oi~s other ilpllCiCS and 0fTieials. thus coml~ountling the original intrusion. The amount disseminated within the F:secutive l~ixwli lias often lmn so \-olumi- nous as to make it difficult to separate useful data from worthless det,ail.

of The Committee’s finding on T’olitical ,4husc describes dissemination intelligence for the political advantage of high officials or the

self-interest of an agency. The problems of excessive dissemination, however, include more than political ttse. Dissemination has not, been confined to what is appropriate for law enforcement or other proper government lm~*poses. Rather. any information which could have been conceived to be useful was passed on. and doubts were generally resolved in favor of dissemination. T-ntil recently, none of the stand- ards for the exchange of data among agencies has taken privacy interests into account. The same failure to consider privacy interests

(253)

Page 270: Church Committee: Reports-- Book II

254

has characterized the retention of data by the original collecting agency.

Subfinding (a) Agencies have volunteered massive amounts of irrelevant informa-

tion to other officials and agencies and have responded unquestioningly in some instances to requests for data without assurmg that the information would be used for a lawful purpose.

The following examples illustrate the extent of dissemination : -FBI reports on dissident Americans flowed to the CIA at a rate

as high as 1,000 a month. CIA ofhcials regarded any names in these reports as a standing requirement from the FBI for mformation about those pe.rs0ns.l

-In 1967 the Internal Securit.y Division of the Justice Department was receiving 150 reports and memoranda a day from the FBI on “organizat,ions and individuals engaged in agit.ational activity of one kind or another.” 2

--,4ttorney General Ramsey Clark could not “keep up with” the volume of FBI memoranda coming into him and to the Assistant At- torneys General on the 700,000 FBI investigations per year.3

-The Justice Department’s IDIIJ sent its computer list of 10,000 to 12,000 American dissidents to the CIA’s Operation CHAOS (\vhich apparently found it useless) and to the Special Service St,aff of t,he Internal Revenue Service (which did use it as part of its program of tax investigations).’

-In fiscal year 1974 alone, the FBI, the Civil Service Commission, and military intelligence received over 36’7.000 requests ‘for “national agency checks,” or name checks of their files, on prospective federal government employees.5

The information disseminated to other agencies has often been con- sidered useless by the recipients. FBI officials have said they received “very little in the way of good product” from the Kational Security hgency’s interce1)tion of the international communications of Amer- icans.6 FBI officials also considered most of the material on “the do- mestic scene!’ sent to them from the CIA mail opening project to be irrelevant “junk.” 6B The Secret Service destroyed over ninety percent of the information disseminated to it by the FBI without ever putting it in its own intelligence files.’ Defense Department directives re- quire the destruction of a great (lea1 of information it receives from the FBI about civilians considered ?hreatening” to the military, in- cluding reports on cirilia’n “subversion.” 8

Sometimes disseniination has become ,alnlost an end in itself. The FBI would often anticipate Ivhat it considerecl to be the needs of other

* Richard Ober testimon.v, 10/28/75, pp. 67,68, ZMen~orandum from Kevin Maroney. et al, to Attorney General Ramsey Clark,

1”/6/67. ‘Clark, 12/3/75, Hearings, Vol. 6, p. 249. This statistic refers to criminal in-

vestigations as well as intelligence investigations. ‘See Part II, pp. 80. 95. ’ Statement of AWorney General Edward H. Levi before House Judiciary Com-

mittee, February 19i5. ’ IV. R. Wannall testimony, 10/3/Z. p. 13. “W. A. Branigan testimony, 10/24/75, Hearings, Vol. 4, p. 168. ’ GAO Report, p. 125. a DOD Directive 5200.27,3/l/71.

Page 271: Church Committee: Reports-- Book II

The FBI dissenlinated a large volume of information on domestic lditical activities to the CIA%, thus providing a SUbStaIltii11 part Of

t11r c1ata for t11e CIL1OS proplm. I3 Alncll of this information was also furnished to the St,ate T)epartmcnt. I4 Tlle~ FBI sometimes dis- scmiiiatvtl sports to the (‘IA ant1 tlic Statv Ikpartment if the sul)jcct matter in\-olred public discussion of national security policy and 110% siblc “subversi\-e” influence.‘”

The FM was also the large,st source of political targets for tax investigations by the Special Service Staff of the Internal Rewnw Ser\-iw. While still in its formative clays3 SSS was p1nce.d on the FL31’s tlistribution list in response to a request from an Assistant IRS Com- missioner for information regarding :

various organizations of predominantly dissident or eskem- ist nature aid/or people prominently identified wit,h those organizations.”

!I For esamnle. in 1966 hefore the FRI had rewiveti nny snwific iiistructions from the Att&nes General to gather civil disturbance inteliigence, Rnreau Head- quarters advised all Field Offices that “national. state, and local” government offici9lq “rely on us” for information < . “so they cw talw appropriate actioii to avert disastrous outhrmks.” Thus. FBI offices were told to “intensifr and es- lx~iid” their “coverage” of deilloiistrations opposing “Ui~ited States fore‘ign polic> iii Vietnwn” or “protests inrolring racial issues.” ‘ in order to insure that “ad- vance signs” of violence coald 11e “ disseminated to appropriate antlioritiw.” (SAC Letter 6&Y. 5/‘2/66)

‘” These policies k&-e pakt of the formal obligation of the FBI under the 1949 Delimitation Agreement with military intelligence. The .\greement itself re. ciuired the FBI to keel) militnrs intelligence agencies advised of the actirities of “civilian grouns” classed as “subrersire.” (D~iimitation Aereement. 2/23/40.) L\nd a Sugp?eme~ltar>- Agreement said, “Where Ithere is doui;t as to ~&h&h&r or not one of the other *agencies is interested in information collected, it should be transmitted to the other agency.” (Supplemental Agreement Xo. 1 ‘to the Delimi- tation Agreement, 6/Z/4!).)

” “Jlilitnr~ Surreill,ance of Cirilian Politics,” Report of the Senate Snbcom- mittee on C’onsti~tntional Rights (19i3), 11. 72.

“The Agreements between the FRI and military intelligence hare not, been reriwd to take account of the restrictions on Army surreillanre imposed by the Department of Defense in 1Dil. See DOD Directive 5XW.27, 3/l/71.

I.1 Richard Ober, 10/28/75,lq. Gi, %. “The FBI Manual stated that information concerning “proposed travel

abroad” by domestic “sohversires” was to he furnished to the (‘IA and the State Ikpartment, and Bureau Field Offices were told to recommend the “extent of foreign investigation” required. (FBI Jlanual of Instructions, Section ST. 1). 33n. revised a/15/63.)

l5 For esnmple. Reports on the ABM debate discussed on pp. 257-258. lo Memorandum from D. W. Bacon to Director, FBI, 8/S/60.

Page 272: Church Committee: Reports-- Book II

256

The FBI, perceiving that SSS would “deal a blow to dissident ele- ments,” Ii decided to supply reports relating to this broad category of individuals and organizations.

The FBI did not select the reports it forwarded on the basis of the presence of a probable tax violation, but. on the basis of the political and ideological criteria IRS had supplied; yet the furnishing of the report resuited in establishment of an SSS file and, subject to resource limitations, to a review of possible tax liabiIity.‘8 Among the other lists of “extremist?, ” “subversives? and dissidents SSS received was a list of 2,300 organizations the FBI categorized as “Old Ikft,” “New Left,?’ and “Right 7Ving.YY I9

One reason for the Bureau’s widespread dissemination of intelli- gence throughout the Executive branch was recalled by a former FBI official. In the late 1940s a sensitire espionage case mvolved a high government official. At that time the FBI held such information “very tightly.” as it had during World War II. However, one item of in- forma’tion that “became rather significant” had allegedly “not been disseminated to the TVhite House or the Secretary of State.”

Mr. Hoover was criticized for that, and frankly, he never forgot it. From then on, you might, say, the pol&y was dis- seminate, disseminate, disseminate.20

This testimony illustrates the dilemma of an agency which was blamed for inadequate dissemination, but never criticized for too much dis- semination. In practice, this dilemma was resolved by passing on any information “which in any way even remotely suggested that there was a responsibility for another agency.” 21

The follo\ying are examples of excessive dissemination, drawl from a random sample of materials in FBI headquarters files:

-In 1969 the FRT disseminated to Army and Air Force intelligence. Secret Service, and the IDIU a report on a Black Student Union; the report which discussed “a tea” sponsored by the group to develop fac- ulty-student “dialogue” as a iunior college and the plans of the col- lege to establish a course on “The Histoiy of the American Negro.” There was no indication of violence whatsoever. Dissemination to the military intelligence agencies and Secret Service took place both at the field lerel and at headquarters in Washington, D.C. The informa- tion came from college officials.22

-In 19’70 thr FBI disseminated to military intelligence and the Secret Service (both lorallv and at Headquarters), as well as to the Justice Department, (IDIf’, Internal Security Division, and Civil Rights Division) a report receired from a local police intelligence wit on the picketing of a local Industries of the Blind plant bv “blind black workers” who were on strike. The sixteen-page report included a copy of a handbill distributed at a Vnited Church of Christ announc-

17FRI memorandum from D. J. Rrennan, Jr.. to W. C. Sullivan. S/15/69. ‘* SRS Ri-weekly Reports, 6/15/70: from Donald Bacon, g/15/75 pp. 91-05. I8 SSS Bi-weekly Report, S/29/69. 2o Former FBI liaison with CIA deposition, 9/22/E, pp. 1617. ?1 Former FBI liaison with CIA demsition, 9/22/75, pp. l&17; memorandum

from Attorney General Tom Clark to .J. EXgar Hoover. 12/5/47. ‘a JIemorandum from Tampa Field Office to FBI Headquarters, 5/M/69.

Page 273: Church Committee: Reports-- Book II

257

ing a meeting at the church to support the strike, as well as copies of “leaflets that hat1 been distributed l)y the blind workers.” Tile only

hint of violence in this report n-as the opinion of a local 1)olicr intelli- g~c~nce officer that “young black militants,” who supported the strike by urging blacks to ljoycott white-owiird stores in the colilinnnity. iii&lit cause “confrontations that might result iii violence.” 23

-The FRI dissiminated a report on 111.. (‘al.1 XcIntvre’s A1uwrican Christian ,iction Council to the Secret Service in 1972. The covw

memorandum to Secret Service indicated that the group fell within the category of the FBI-Secret Service agreement described as “poten- tially dangerous because of lrackground, emotional instability 01 activity in groups engaged in activities inimical to I’.S.” The report itself reflected no ‘activities inimical to” the country., but only plans to hold peaceful demonstrations. The rcl)ort also discussed policies and activities of the group unrclatcd to demonstl~ations, inclucling plans to enter lawsuits in “~(~liool busing” cases. opposition to “Sixon’s China trip” and support for a constitutional amendment for “public school prayer.” This data came from a Bureau informant.‘”

-In 1966 the FBI disseminated to the -1rmy, Savy, am1 Air Force intelligence divisions. to the Secret Service (locally ant1 at Hcadquar- ters), to the ,Justice I)epartment and to the State Department a ten- page report on a “Free ITniversity.” The report described in detail the courses offered, including such subjects as “Xodern Film,” “Workshop on Art and Values,” ‘Y”ontrmporarp Music,” “Poetry Kow,” and “Autobiography and the Image of Self.” Over thirty “associates” were listed by name, although only one was identified as having “subversive connections” (and his course had been “droplx~l because not, enough students had registered.“) Others were identified as “involved in Viet- nam protes,t activities” or as being known to officials of a nearby es- tablished university as “problem people.” The information came from several FBI informants and a confidential source.2”

-In 1966 the FBI disseminated to “appropriate federal and local authorities,” including military intelliprnce, Secret Service, the De- partment of State and .Justicc, and a campus sfcurity officers (who was a former FBI agent) a report on a group formed for “discussion on Vietnam.” The “controlling influence” to be “the local Friends Meeting.”

on the organization was said Only one person characterized as

“subversive,” was active in the group. The report was devoted to de- scribing a “speak out’! demonstration attended by approximately 300 persons on a unirrrsitg campus. The gathering was entirely peaceful and included “speakers who sllpported I7.S. 1)olicies in riet Nam.” The data came from two Bureau informants.26

-In 1969 the FBI disseminated reports to the Yhite House, the CIA%, the State Department. the three military intelligence agencies, Secret Service, the IDIU, the Attorney General, the rkpl~ty Attorney General: and the Internal Security and Civil Rights Divisions on a meeting sponsored by a coalition of citizens concerned about the Anti-

23 Memorandum from Charlotte Field Office to FBI Headquarters. 12/10/70. 21 Letter from Acting Director, FRI. to Director. United States Secret Service.

5/25/72. ” Memorandum from Detroit Field Office, to FBI Headquarters, 4/35/66. *8 Memorandum from Springfield Field Officr to FBI Headquarters, 7/S/66.

Page 274: Church Committee: Reports-- Book II

Ballistic Jlissilc. The only indication of ~‘slll)\-ersi\-e” illflllellcc \\-:ls tll:lt, OJJC \~OJJl:lJl nlnrrietl to :I (‘olliiilmiist n-as assistiiig ill l)ill)licaity work for the meeting. Tl le rel)orts dcswibed (froiii rtlial)lc 5’111 SO~l1.C~S) the sl,difYS, Ill’0 nlld (‘011. iiic~liltliiig I)roiiiiiiciit sciciitists, ncntleinics, aiid n Defense L>cpartmcnt s~&sJJJ~JJ.*~

-In 1974 the FBI disseniinatctl to tlir State I)el):lrtlnel~t, the IkfPJJSe Intclligc~iicc AI~gelJc;y, tile Scciyt Sc~ryice, tile Illtc>rn:tl Scy\\rit>- I)i\-ision, and the (‘iv11 J)~stnrbnnw I-nit (fol*nlc~rI~- II)117). (5tc311- sire reports on n national COJJ~~JTJJC~ on :JJJJJJ&\- for \wJ- JysisteJ.s.

One of the part.icipants had “recently organized ‘[a] llc)n\-iolent pro- test clcn~onst~atioi~” during a \-kit b\- I’rcsitlcilt I~‘ci~d. txo otlrcx were identified as draft cvaclei~s. niid ilie ~7ichJnJlJ ~TcteJxJls ;ig;JiJJst

thf IT:Ji* wow active at tllc cmfcrcnce. 13iit the report milt much fllJ~tlle~* to clcscril)e-bnsecl 011 information fronl FI<I infol*Jll:illts- the activities of religions. civil liberties. and student pronps. as well ClS “families of inen killed in ~ietiiani” and congressional staff aicles.2R

-In 1974 the FBI tlisscminnted a report on n peaceful vigil in the vicinity of the Soviet E:mbnssy in supl)ort of the rights of Soviet ~Jc~ws, not just to the Scxret Scr\-kc nld thr Justice Depa:~tmcnt’s Civil Disturbance T’nit, but also to the CIA and the. State Depart,- inent z9

-~JJ 1972 the FBI clisscn~inwted a report, to the CIA. ArnJy and Kay intellipencc, and nJJ nn-liainccl “1-S. Cr0\-~~lll~~clJt i\g?JlCy khicli condilcts secnrit~ltype inrrstigntions” in West Germany (appawlitl~ s military intellqence agency). The latter :Jg~cncy had asked the Rurcau for information about an antin-ar rcscrust group and a proj- ect, to furnish “legal advice to GI’s ant1 veterans.” The report. des- cribed not only the reservists group. but also (;a gi’o~ip dedicated to Firing free legal aitl to serl-iceilien” and “an antimar political. grollp" which endorsed “political candidates for office n-ho have a solid peace position and a favorable chance of being elected.” The three groups “plallJleCl to sllnl~r offices. *’ This clnta C~JW from R ~UJW~U infonnai~t.“”

The FBI does have an obligation to clisseminnte to local law en- forcrmcnt agencies information about crimes m?thiii their jiirisdic- tion. Se\-erthclcss, there has been improper dissemination to local police JJndw at least two Bureau 1~rO~rZtlllS. Such dissemination oc- cnrrecl under COIXTELPRO, as part of the FBI’s effort to dis- credit indiridwlls or disrullt. groups.’ T1 Others were in wsponse to local police requests for “pnl~lic sollrcc ” infoi~n~ntioii relating to “Slll~- versirc matters.” 32 F,sppricylcrrl poliw officials conti~~lled tllwt tile tern1

” JIemorandum from Washington Field Office to FBI Headquarters, ;i/%s/tig ; memorandum from Alesandria Field Office to FBI Headquarters. G/3/69.

28 Memorandum from 1,ouisrillr Field Office to FBI IIexdwnrters, ll/lWh 11/15/$4,11/20/74.

2o Memorandum from Washington Field Office to FBI Hratlyuart~rs. (i/%/74. 3o l\temorandum from Legal Attache. Bonn, to FBI Hendquarters. l/11/7% :

memorandum from Boston Field Office to FBI Headquarters. 5/J/72. 31 See COIS’I’EI,PRO report : Rec. I\‘. for esaml)les of FBI di~scnlinnti~~Il to

local lwlicc of data on tririal offenses for the lunrlmse of disrul)tion. =TThe FRI resl)onds to such requests with “a blind Iiie1liorari(lli1ll” upon the

condition that the Bureau’s “identity as source of the iuformatiou must lje kept strictly coufideutial.” Bureau regulations do not liuk this l~roccdure to aw specific criminal la\\- enforcement function. (FBI Jlanunl of Rules and Reguln- tions, Part II, Section 5, p. 7.)

Page 275: Church Committee: Reports-- Book II

259

“subversiw” is so broad that it inevitably lends to tlisscmination about political beliefs.“”

Other cxrcwt ire agenck ha\-c also rngagctl in excessive dissemina- tion. The ,Justicc Ikpartment’s Inter-IXrision Information Unit (111111) sent its computerized data to the CIA, in order that the CIA

could check its records on foreign travel of American dissidents.“” The IDIK sent the same material to the Internal Revcnne Service’s Special Service Stati, which used the information as part of its program for initiating tax andits.“” The Internal Rercnuc Serrice. itself dissemi- nated tax returns or related tax information to the CIA, the FBI, and the Justice Department’s Internal Security Division (which also made requests on behalf of the FBI), withont, ascertaining whethel there was a proper basis for the reqwst or the purpose for which the information would be us.ed.3F

<~ubfi?adiny (b) Excessive dissemination has sometimes contributed to the inef-

ficiency of the intelligence process itself. The dissemination of large amounts of relati\-rly useless or totally

irrelevant information has reduced the ef7icicnq of the intelligence process. It has made it difiicnlt for cle~ision-nlakrls to weigh the im- portance of rel~orts.37 Agencies sucll as the FBI hare collected intel- ligence, not because of its owl nrctls or desires. or because it had been requested to (10 so, but because the data was assiuned to br of value to somrone else. ITnits cst:~blishcd to screen and evaluate intelligence have encouraged. rather than r~luwd, further dissemination.

In some instances the FBI has dissrminatcd information to local police in a manner that was countei,pl.oducti\-c to efivctive law enforce- ment. One former police chief has tlcscribcd how the Bureau, under “pressure” from the White House to preparc for a specific demonstra- tion, “passed on information in suc~h a way that it was totally 11selt’Gs” because it was not “waluatcd” and thus esaggeratcd the dangers.“s The need for prior evaluation of the significance of raw intelligence has not been fully recognized in the Bureau’s policy for dissemination of data on protest tlenlonstr,atiolls.“”

33 Testimony of James F. Ahern (former New Haven police chief), Robert diGrazia (Boston chief of police), and I’atrick J-. 1Iurl)hy (former Sew York police commissioner and President of the Police Foundation), l/20/70. 1). 44. These esprienced law enforcement officials stated that local police an no< need information from the FBI about, “political beliefs.”

” See CHAOS Report: Section III. s See IRS Reljort : Section, “SSS.” ” See IRS Reljort : Section, “~isseminatinn.” c On at least one ncrasinn, ,Jnstice l?rpartmcnt nffic~ials rslwessrd concern that

they had rwrircd a report from the FBI on an incident and then a second report from Army intelligence which apl~eared to confirm the Bureau’s information, but the Army’s report turned ont to hnw been based on the FBI’s information. This led to a .Jnsticr Department reclnrst that the Army “screen” its intelligence and send “only key items.” (1\Ir1norandum for the Record General Counsel Robert El. Jordan to I:nder Secretary of the Army David McGiffert, l/10/68.)

38 Ahrrn. l/20/76. 1). 4. ‘” l’hr FRI hid adilrrrtl :lcrclss-tllr-l)o:lrcl to the lwsition that its reljorts do not

contain “conclusions ” . and Bureau rnlrs hare permitted the dissemination of data from “sources known to be nnrrlial~le” so long as “pond judgment” is used. It has ken up to the recipient agencies “to intelligently cralnnte thcb information” on the basis of “descriptive information” niwnt the Bureau’s sources. (FE1 Jlan-

((‘nntinued)

Page 276: Church Committee: Reports-- Book II

260

The assumption that some other agency might nertl information has not only produced excessive dissemination, but has also served as a specific rationale for collection of intelligence that was not otherwise within an agency’s jurisdiction. The hcst csample is the FBI’s collec- tion of intelligence on “general racial matters” for the military.43

One of tlic Ironies in the recent history of tlonlcstic intcllipcnce was that the ,Justicc Dcprtmcnt’s II>II-, Tv\-ikll ~1s set up to colhte and cvaluatc tllc massive amounts of data flowing to the ,Justicc Ikprt- merit from the FBI. contrihtctl to e\-tu 111ow esttnsivc collection and dissrnlinntion.44 The Imu encon~ngcd III~~I~CI’OI~S fetleral :lgencies

(Continued) \ ual of Rules and Reznlations. Part II. Section 5) Thus the FBI has not ride- quately distinguished l,et,~een~sitaatioIlu where e\-aluntion is or is not necessary. More than just “descriptive information” about FBI sources is needed to hell) recipients of data on l~ossible riolent protest demonstration understand the likeli- hood of ‘actual disorders.

‘” SW Part II. p. 78. “The GAO has ranked the tFl)es of sources of information relied nl,on I)g the

FBI in I)eginuing domestic intelligence inwstifations awording to whether the data initially snl~plicd were “hard;” ‘.liletliulli.“-or “soft.” .iccor;ling to the GA\O, police and other state and local agencies \vrre fount1 to hare provided the lowest proportion of “hard” information and the highest 1)roportion of “soft” informa- tiou. (GAO Renort. I). 106).

a Two majop cities hark made efforts recently to estal)lisll standards for police intelligeuce activities;. (Los Angeles Police Department, I’iil~lic Disorder Intel- ligencc Division : Standards and I’rocedurrs. 4/10/Z; SPW York (‘its I’olice Ik- partmeut. Procedures : Public Security Actirities of the Intelligence I)ivisiou, IIouse Internal Security Committee, IIearings, Domestic Intelligence Operations for Internal Security Purposes, 1974.)

bl Tlicl FBI Jlanual cited the needs of the military as a basis for its intellizence- gatheriug on “general racial matters.” The Mandal stated that the Rure& did not itself hare “inr-estigatirt, jurisdiction over such general racial matters,” but that its “intelligence function” included advising “approl~riate Government agen. ties” of informatic~n about “wonosetl or actual activities of indiridnals. officials. committws, lepi&itnres. org4iiGations. etc., in the racial field.” The Jlankil I,;& “Federal jurisdiction” on the military’s rcsl)onsibility :

“Insofar as Ffderal jurisdiction in general racial matters is concerned, U.S. Army regnlatioils lllace reslwnail~ility upon the Army to keel) advised of any derelnlnnents of a (.ivil tlisturl)auce nature which may require the rendering of assistance to civil authorities or the intervention of federal troops. OS1 (Air Force) and OS1 (Sary) have a collatt~ral reslwnsibility uuder Army in such matters and copies of pertinent tlocm~~ents tlissemin:~tt~tl to Army concerning such matters should Ire furnished to OS1 :iild OSI.” (1960 FBI Jlanual Section 122, pp. G-6)

” For esaml,le. in addition to rolltaining the names of known activists, the IDII. l)rint~lnts sul~l~lic~tl to IRS’s SSS also contaiiic~tl the Ilames of many promi- nellt citizens whom the .Jnstice Ikl~irtmellt thonzl1t cwnltl be of assistallcr in quelling a ciTi1 disturl~ance ill a l~:rl~ticnlar localit’r should one occur. SSS per- sonuel were unaware that the IDII’ l)riutont co:it:\ined the names of these per- sons and established files indiscriminately on them.

Page 277: Church Committee: Reports-- Book II

261

I’nder the federal employee security program. unnecessary infor- mation about, the political Iwlicfs and associations of prospective govr~l~l~l~l~llt cnlplovers has lwen clisseminated.

For nearly tllirt’v wars tlic fctleral employee scclirit~ program has requiretl a “iiatioilhl.aFcnc~ cliecbk” of the f&s of sere&l go\-crnment agencies. inclutling the I~‘BI, the Civil Service Commission, and mili- tar? intelligence, 011 pmspectire ~n~pIoyces.~” _ no information to report.

1Ithough there was often federal agencies received “name check”

reports on all candidates for employment. This appears to have been the single largest source of regular dissemination of data in intelli- gence files.

These name check reports have provided information from intel- ligence files not on]\- about possible criminal activity or personal weaknesses of the in;livitlual, but also about lawful poiitical activity and association. I-ntil recently the Executive Order on employee secu- rity required reports on any “association” with a person or group supporting “subversive’” views. These reports have been required for every federal employee. regardless of whether he or she holds a sensi- tive position or has access to classified information.4’

It has been the policy of the FBI, and presumably~other agencies as well. to disseminate via name check reports any mformation in its files-no matter how old or how unreliable-which might relate to the standards of the Executive Order. 48 The current criteria have been substantially narrowed : the basic stanclards for reporting are group membership and potential criminal conduct.“” However, the Justice Department has advised the FBI that, “it is not possible to set definite parameters” for organizations and that, the Bureau should include those with a “potential” for meeting the criteria.50 The FBI does not determine whether or not the information it furnishes is decisive under these standards. Departmental instructions state :

It is not the Bureau’s responsibility to determine whether the information is or is not of importance to the particuIar

---- ‘5 Attorney General Clark to Blaroney, et al, 11/g/67. do Executire Order 10450, Section 3(a). For a discussion of the origins and ap-

plication of this order, pp. 4234. ” Executive Order 10150, Section 8 (a) (5). “Memorandum from FBI to Senate Select Committee, 3/3/76. “The current criteria are: “Knowing membership with the specific intent of

furthering the aims of, or adherence to and active participation in, any foreign or domestic organization, association morement, group, or combination of per- sons (hereinafter referred to as organizations) which unlawfully advocates or practices the commission of acts of force or riolence to prevent others from exercising their rights under the Constitution or laws of the United States or of anr State. or which seeks to overthrow the Gorernrnent of the United States or ani? State’or subdivision thereof by unlawful means.” (Executive Order 11785, Section 3, June 4. 1974.) This order also abolished the “Attorney General’s list.”

to Memorandum from Assistant Attorney General Glen E. Pommerening to FBI Director Clarence Kelley, 11/l/74.

Page 278: Church Committee: Reports-- Book II

262

a,pncy in the cnrryinSg oilt of its mxwnt activities ant1 rcspon- sibilitifs ant1 whether or not any action is taken by the tlc- prtmrnt or ngciic\- is not, of course, ;I pi~iiicipnl coiiwrii of the Bureau.”

The FBI itself has esprcssccl misgirings about the breadth of its responsibilities under the rml~loyre security profrniJ~. It has con- tinued to seek “cl:\,,ificatioll” from the .Just ice Iklmrtmrnt. and it has pointed out that there 1~:)~ been no “aclwrsc ac?ioiis” taken ngniilst current or prospcctivc Fedcrnl en~l~lop3 under the loyalt\- and SCCLI~-

ity provisions of thr Esecntirr Order “for se\-era1 rears.” This lens IwrJL dur to the fact “tliat tlifficwltics of proof iinl~odetl 1)~ the courts in loyalty and scciiritv cases lia\-c p~~owcl ahliost iiisi~~mb,mtnl,le.)’ 52

Thr eml~loycc sccnr~tv program has sc~~vccl an cssrntinl function in full bnckgrouucl inr-estibation and ii:t~nc chrcks for those having access to classifircl information. But its extension to vagiicly-clrfined “sub- versives” in nonscnsiti\-c positions has gone lwyo~lcl tllc Go~crnnient’s proper need for inforniation on the suitability of lw~3oiis for employ- ment .j3

Suhjidng (d) Thr FBI. which has lwn the “clearinghouse” for all domestic

intelligence data. maintains in readily accessible files srnsitiw ant1 dCJ’O@OJ’). ~‘f”‘SOJlal illfOJWl~tiOll JlOt JX’le\-aJJt t0 ally iJlVt?Sti~~tiOJl.

as ~~11 as infornintion which was inil~rolwrl~ or illegally obtained. In recent years. tho Secrrt, Service, military intelligcncr, ant1 other

agencies hare inst~itutrtl significant prog~mis for the clrstruction or purging of nsele,ss information. ;14 Howrvrr. the FBT has retained its vast genrral files, ncciunul:~terl over the wars under its dut.y to serve as a “clearinglioiise” for domestic iiitelli+gencc data.“> Thrrr are over 6,500.OOO files at’ FBI hratlqnnrters: and the data is retrievable through R ge,nernl index consisting of over 58,OOO.OOO index cards. Each Bureau FFelcl Office has substantial additional information in its files. Domestic

intelligence information included in the general incles is Axscribed by the FBI as :

associates and relatives of t,he subject ; members of organize- Cons under iJlwst.igatioJL or determined to be possible subver-

El Letter from httorne? General Tom Clark to J. Edgar Hewer. 32/Z/47. The FBI advises that it constders ‘this directive still to be in effect. (Jlemorandum from FBI to Select Committee. 3/3/i&)

“‘Letter from Kelley to Pommerening. 12/11/i-1. The FBI has advised that federal employees are now evaluated nccording to “suital)ility” rather than “loyalty and security” criteria. (Nemorandum from FBI to Select Committee. 3/3/x. )

63 According to a 1074 Bureau mcmorandnm and a confirming Justice Depart- ment memorandum, the purpose is to provide “information concerning possible subrersire infiltration into the Executive Branch of Gorernment.” (Keller to Pommerening, S/14/74; Pommerening to Kelley-. S/26/74.) As indicated in the Committee’s finding on overbreadth, the concept “subrersion” is so vague and flexible as to inritc excesses.

” Secret Srrrice practices are described in Xccicx of Scewt Ncrzice Prntcctire Kcnn~oes, Hearings before the Senate Committee on Appropriations, !Mth Cong., 1st Srss. (10X), 1~. 16. Destruction of Army intelligence files is discnssed in Report on Military Surveillance.

65 For a discussion or the origins of this function. see p. 23.

Page 279: Church Committee: Reports-- Book II

263

511 Jlemornndnm from FBI to Senate Select Committee. <?/22/X 67Current FBI policies modif>- past practice with respect to the indexing of

unsolicited allegations. including those of “a lwrsonal nature,” not requiring “in- vestigative action,” The Bureau no longer includes in its name index Hie name of the person nl)ont whom the information is T-olnntt*r*red where the Bnreair has “no legitimate investigative intrrest.” In the case of an unsolicited letter, for example, the name of the sender oilly ia included in the index. The letter itself is also retained so the FBI “~311 retrieve” it via the index reference to the sender “should an orcnsion arise in the future ITT-hen n-e need to refer IMCli to it.” (Mem- orandum from FBI Headquarters to all SACS. 11/10/i5.)

68 Memorandum from FBI to Select Committee. i/21/75. This memnrandum states that the Bureau has ndn~~tfvl. under regnlations of tile SatiOnal .irchives, a program for destroying files wliicb “no longer hare cnntrml~nrary value.” The FBI has not, included within this program most of the investigative and intelli- gence information in its files dating back as far as 1939.

s JIemnrnndum from FBI Hendpuartrrs to all SACS. l/‘ZT/iG. The Field Offices were given the following specific guidance :

“For esnmplr. the statement of a local leader of the Ku Klux Klan in which he ndrncates regular attendance at cshurch would be merely an exercise of his right to free sneer,h and, hence. maintenance of such a record would be Drohibited. On the othr; hand, should this same indi~idnnl stand up before a gathering and ad- yocntr the use of violence in fnrthcring the organjzation’s objectives, this ob- viously would be pertinent to our investigation.”

ISnrenu headquarters recognized that these were “extreme” examples and that “problems” were created in “those instances which are in the middle and which are not so clear.” Thus, FBI agents were encouraged to consult Headquarters “to resolve any question concerning a specific l~rnblen~.”

” One Field Ofliice has described regular Rurenu procedures as follows : “[Our] informants, after attending meetings of these organizations [under

investigation]. ur;uxllg submit reports in n-hicb they describe hrieflg the ac- tivities and discussions which took place as well as listing those members and non-members in attendance nt such meetings. Copies of these informant re- ports are disseminated to various individuals files and fhc name8 of those in nttcnclnncc whwc no individunln file c.rints. ure indexed to the organization’s file.” ~JIemorandum from SAC to FBI Headquarters. 12/l/75). [Emphasis added.1

FBI Shradrlunrters did not indicate that this practice was outside the “scope” of authorized “law enforcement activity.” It is considered “pertinent” to the in- wsti~atinn “to maintain records rnnccrninp memlwrshil>, public utterings. and/or other artirities” of an organization under investigation. (AIemorandum from FBI Headquarters to all SACS. 1/2i’/i6.)

Page 280: Church Committee: Reports-- Book II
Page 281: Church Committee: Reports-- Book II

Jh0~ FISrnsc

The Committee finds that, those responsible for overseeing, super- . vlsln,g. and controlling domestic activities of the intelligence com- munlty, although often unaware of details of the excesses described in this report. made those excesses possible by delegating broad au- thority without establishing adequate guidelines and procedural checks; by failing to monitor and coordinate sufficiently the activities of the agencies under their charge; by failing to inquire further aftei receiving indications that improper activities may have been occur- ring ; by exhibiting a reluctance to know about secret details of pro- grams; and somctrmes by requesting intelligence agencies to engage in questionable practices. On numerous occasions, intelligence agencies have, by concealment. misrepresentation, or partial disclosure, hidden improper activities from those to whom they owed a duty of dis- closure. Rut such tleceit and the improper practices which it con- cealed would not have been possible to such a degree if senior officials of the Executive Branch and Congress had clearly allocated respon- sibility and imposed requirements for reporting and obtaining prior approval for activities, and had insisted on adherence to those requirements.

Sub findings

(a) Presidents have given intelligence agencies firm orders to col- lect information concerning “subversive activities” of American citi- zens, but have failed until recently to define the limits of domestic intelligences t.o provide safeguards for the rights of American citi- zens, or to coordinate and control the ever-expanding intelligence efforts by an increasing number of agencies.

(b) Attorneys General have permitted and even encouraged the PI31 to engage in domestic intelligence activities and to use a wide range of intrusive investigative techniques-such as wiretaps, micro- phones. and informants-but have failed until recently to supervise or establish limits on these activities or techniques by issuing ade- quate safeguards, guidelines, or procedures for review.

(c) Presidents, White House officials, and Attorne.ys General have requestecl and received domestic political intelligence, thereby con- tributing to and profiting from the abuses of domestic intelligence and setting a bad example for their subordinates.

(d) Presidents, Att orneys General, and other Cabinet officers have neglected until recently to make inquiries in the face of clear indica- tions that intelligence agencies were engaging in improper domestic actirit.ies.

(c) Congress, which has the authority to place restraints on do- mestic intelligence activities through Ir&lation, appropriat,ions, and

( 265 )

Page 282: Church Committee: Reports-- Book II

266

orersight committees. has not, effrctivrl~ asserted its responsibilities until rccent!,v. It 1~s failctl to tlefilic the scope of domestic intelli- gence acti\-ities or intclliSgence collection techniques. to uncover es- cesscs. or to propose legislative solutions. Some of its members have failed to object to iml)ropcr activities of whic,h they were aware and hnw prodded agencies into questionable activities.

(f) Tiitellipencc a.gencics bar-c often 1uidertaken programs without authorization with Insiifficient authorization. or in disrrgard of es- press orders.

(g) The weakness of the sy$cm of accountability ~111~1 control can be seen in the fact that many lllegnl or abusive domestic intelligence operations were terminated only after they had been rspose(1 or thrcat- enrd with exposure bp Congress or the news media.

E7nbomtion. of Fi,,dings The Committee has found excessrs conlmittrd bv intelligence ngcn-

ties-lawless ant1 improper behn\-ior, intcrrcntiol; in the democratic process, overbroad intelljgrnce targeting and collection. and the use of covert techniques to discredit 2nd “neutralize” persons and groups defined ns enemies b\- the agencies. Rut responsibility for those acts does not fall solely on the intelligence agencies which committed them. Systematic excesses would not have occurred if lines of authority had bee11 clearly defined; if procrtlwes for reporting and reriew had been established : ant1 if those responsible for supervising the intelli- genco community hat1 properly discharged their duties.

The pressure of events and the widespread confidence in the FRI help to explain the deficiencies in command 2nd authorization dis- covered by the Committee. Most of the activities examined in this report occurred during periods of foreign or domestic crisis. There was snbstantinl support from the public and all branches of gorern- mcnt for some of the central objectives of domestic intelligence policy, inclnding the search for “Fifth Columnists” before World War II; the desire to identify comn~unist “influence” in the Cold War atmos- phere of thr 1950s: the demand for action against Klan violence in thr rarlv 1960s: and thr reaction to riolrnt racial distnrhnnces and anti-T’iknam war actirities in the late 1960s and early 1970s. It was in this heated cnrironmcnt that President. and Attorn& Grneral or- dered the FBI to investigate “subversive activities”. Further. the Rwran’s reputation for effectiveness and professionalism. and Direc- tor Hoover’s abilitv to cultivate political support and to inspire appre- hension. played a significant role in shaping the relationship between the FRI and tile rest of the, Government.

With onlv n few rsceptions, the domestic intrlligencc activities re- \-irwcd by the Committrr were properly authorized ,u’Yf7~ju tile intelli- grnce, agencies. Thr FI31 epitomizes n smoothly functioning military strnctnrr : nctivitirs of agents nrr closedly snprrrised : programs arc authorized onlv after they haw trawled a Tell-defined bnrenucratic circuit ; and Grtiially all actiritirs-ranging from hi&lerel policy considerations to the minutia of daily reports from field agencies- arr rcdllcetl to writing. Thrse chnractrristics arc commendable. ~111 efficient law rnforcrnirnt and intrlli~rncr-pntlleriny mnchinr. acting consistently \y-ith law. can grentlv benefit the nation. Howewr, when WL~C~ for wrongflll l~~~rlxxcs, this’ rfficiency can pose n grave danger.

Page 283: Church Committee: Reports-- Book II

267

Its appears that. niany specific abuse n-err not known b\- the ,4ttor- ney Gciieral. the President, or other Cabinet-level officisals directly responsible for supervising domestic intrllipencc ‘wtivities. But, whether or not particular activities were authorizetl by a President or A4ttornev General, those individuals nlust-as tllc chief executive and the pA~cipa1 law enforcement officer of the I-nitecl States Gov- crnnicn-bear ultiniatc responsibility for the activities of execntiw agencies untlcr their command. The President anal his C’nbinet officers have ‘n thity to dcterniine the> nature of ‘activities engagetl in by execu- tiw agencEes ant1 to prcvenl undesired activities froni taking place. This duty is particularly compellin .g when responsible officials have reason to believe that undesirable activity is occurring. ‘as has often been the case in the context of donicstic intelligence.

The C’olllnlittcc’s inquiry has revealed a pattrrn of reckless disre- gard of activities that threatened our C”onstitlltiona1 systen1. Intelli- genco agencies were ordr~rd to investigate %ub\-ersi\-e activities,” and were then iisnallv left, to detjermino for the,niselves which ‘activities \VCl’O “subversive,” and how those activities should be investigated. Intelligence agencies were told they could USC inr-estipative tecll- niqiies-wiretaps, microphones, infornlants--that pernlitted them to pry into the iiiost. valncd areas of privacy and were then given in many cases the unregulated aut.hority to determine \vhen to use those tech- niques ‘ant1 how long to continue them. Intelligence agencies were en- couraged to gather “pure intelligence,” which was put to political use lw public officials outside of those agencies. This was possibly because (‘ongress had failctl to pass law-s limiting the areas into wliich intel- ligence agencies collltl legally inquire and the information they conltl cllsseminate.

Inlpropcr acts wcrc often intrntionally concealed from the Govern- ment, officials rcspon~ible for supervising the intclli.gence agencies, or witlertakcn without cxprrss ,antliority. Such behauor is inexcusable. 13ut equally inescnsable is the absence of executive ant1 congressional oversi@t that. engendered an atnlosphere in which the heads of those agencies bcliewtl they could conceal activitie,s frorii their superiors. htt,orney General I,c;-i’s recent guidelines and the I.ccolllmentlations of this Committee are intended to provide the necessary guidance.

Whether or not the responsible Government officials knew about improper intelligence activities. and even if the agency heads fiailed in their dutv of full t&closure, it, still follows that Presiclents and the approp&te Cabinet ofici,als shou70’ have known about. those activi- ties. This is ‘:I demanding standard, but one that must be iulposed. The future of democracy rests upon such acconnt~abilitg.

~~‘uhjilldi?lg (0) Presidents hare given intelligence agencies firm orders to collect,

information concerning “subversive activities” of American citizens, but, have failed until recently to define the limits of domestic intelli- gence. to provide safeguards for the rights of American citizens, or to coordinate and control the ever-expanding intelligence efforts bp an increasing niimber of agencies.

*is clmphasizrd thronghoiit, this rrl)ort, domestic intelligence adivi- tics have 1~11 Imdertaken pursuant. to mandates from the Executive branch, generally issued during times of Iwar or domestic crisis. The

Page 284: Church Committee: Reports-- Book II

268

dirwtiws of l3wident.s Roosevelt, Truman, and TSisenhower to investi- gate “subversive activit,ics,” or other equally ill-drfinetl targets, were echoed in various orders from ,1tt,orncys General, who themselves en- couraged t.he FBI to undertake domestic intelligence activities with vague but vigorous commands.

Neither Presidents nor t,heir chief legal oficew, the, Attorneys Gen- eral, have defined the “subversive actlvit,ies” which may be lnresti- gatetl or provided guitlelines to the agencies in detcrmini~g which in- dividuals or groups were e,ngaging in t.1los.e activities. 10 reporting procedures wwe established to enable Oabinet,-level officials or their designees to review the t.vpes of targets of clomestic investigations and to e,xercise indepcndent~ judgment concerning whether such inrestiga- tions II-err \varrant,ed. T;o mechanisms were established for monitoring the condllct of domestic investigations or for tlctermining if and when t,hey sl~o~~ltl be terminated. If Presidwts had articulated standards in these areas, or had designated someone to do the job for them, it is pas-

sible t,hat many of the abuses describecl in this report would not. have occurred.

Considering the proliferation of agencies engaging in domestic in- telligence and the overlapping jurisdictional lines, it is surprising that no President has successfully designated one individual or body to coordinate and supervise the domestic intelligence act,ivities of the vari- ous agencies. The half-hearted steps that were taken in that direction appear either to hare been abandoned or to have resulted in the con- centration of even more power in individual agency heads. For ex- ample, in 1949 President Truman attempted to establish a control mechanism-the Interclepartmental Intell.igence Conference-to cen- trnlizc authority for supervising domestic intelligence activities of the FBI and military intelligence agencies in a committee chaired by the Director of the FBI. The Committee reported to the Na- tlonal Security Council, and an NSC staff member was assigned responsibility for internal security. 1 The practical effect of the IIC was apparently to increase the power of the FBI Director and to IYYIIOJT control further from the Cabinet level. In 1962, the func- tions of the TIC were transferred to the ,Justice Department, and the Attorne,y General was put in nominal charge of domestic intelli- gence.? While in theory supervision resided in the Internal Security Division of the ,Justice Department, that Division deferred in large part to t.he FE1 and provided little oversight.3 The top two executives of the Internal Security Division were former FBI officials. They

1 Sationnl Security Council memorandum 17/S. G/15/49 ’ Sntioual Security- Action memorandmii lSi, 6/d,&. ” For rsnmlrlr. the FBI contiuued an iurcstigntiou of one group in I!%! after

the Internal Security Division told the Bureau there was “insnfficieut evidence” of any legal violations. (~Iemorandum from Traglry to Hoover, 3/3/a.) Two years later. nn FBI intelligence official suggested that it would IKJ “in the Bureau’s best interest to put the I)rlxirtment oii record again. ” The Department nl)prol-ed the FBI’s request for permission to continue the investigation even though there had Iwn “no sicnifirnnt cllanow as to the cllarnctrr and tnctiw of tllfa

organization.” The FBI did not request further instructions in this investigation 7JJItil 1973. ~J~rmorandum from ~aUmg:lrd~ler t0 ~IllliVNL i/1.5/66 : IIIelnOrandllnl

from Tengley to Ilower, i/S/66.)

Page 285: Church Committee: Reports-- Book II

269

appeared sympathetic to the Bureau. and like the Bureau, emphasized threats of Comniunist “influence” without mentioning actual results.4

,biotlirr ol~l~ortunity to coordinate intelligence c.ollcction was niissctl in 1967. when A1ttorncy (;rneral Ramsey Clark established the Inter- divisional Intclligcnw I-nit (IL)II-) to draw on virtually the entire Fetlwal Government’s intclligenw collecting capability for informa- tion concerning groul~s ant1 individuals “who nlay play a role. whcthcl l~url~oscfu11~~or not, either in instigating or sl)rca(ling civil tlisortlers. or in preventmg or checking them. ” 5 In the rush to obtain intclligencc. ii0 efforts were made to forinulate’st2uidartls or guidelines for con- trolling how the intelligence woultl be collrctctl. In the abscllw of Such guitlel1nes ant1 untlcr pressure for results, the agencies unclertook som of the nlost owrl\- broad progran~s cncounteretl by the (‘omniit- tee. For example, the FBI’s “ghetto” informant program was a direct response to tlw ,\ttorney General’s hroatl requests for intelligence.

The nrcd for centraliz~tl control of domestic intelligent was again given serious consitlcration tluri.ng the vigorous tlenioiisti*iitiolis agamst the war in Vietnam in 19’70. The intelligence community’s program for dealing with internal dissent-the Huston Plan-enr-isionctl not only relaxing controls on surveillance trchniques, but also coortlinating intelligence collection efforts. According to Tom Charles Huston’s testi- mony, the President viewed the suggestion of a coordinating body as the most important contribution of the plan. 8 Although the President quiclrlv revoked his approval for the Huston Plan, the i&a of a central tlomcstic intelligence body had taken root. Two months later, with the cncourngenwnt of Attorney General ,John Mitchell. the Intelli- gence I3valuation Committee was established in the ,Justice Depart- ment. That, Conmlittw. like its precursor, the IDII’. conipilctl and evaluated raw intelligence; it tlitl not. exercise sulwr\-ision.g

The growing sophist ication of intelligence collection techniques underscores the present need for celltl~al control and coordination of domestic intelligence activities. Although the Executive Branch has

’ For example, the annual report of .bsistant dttorney General J. Walter Teagley for Fiscal Tear 1959 emphasized Communist attempts to wield influence, without pointing out the lack of tangible results :

“Despite the ‘thaw, real or apparent, in the Cold War. and despite [its] losses. the [Communist] Party has continued as an organized force, constantly weking to repair its losses and to regain its former position of influence. In a nuinber of fields its activities are directed ostensibly toward laudable objwtires, such as the elimination of discrimination by reason of race, low wst housing for the eco- nomically underprivileged, and so on. These activities are pursued in large part nn a zcny op estmding the forces and currents in American life, and with the hope of hcing nhlc to ‘more in’ on such movements when the time seems prn- pitious.” [Emphasis added.] (Annual Report of the Attorney General for Fiscal Tear 1959, pp. 247-248.)

The same esecntires headed the Internal Security Division from 1959 until 1970, throuall the administrations of five Attnrness General and four Presidents. In 19il a ;lew Assistant Attorney General for the Internal Security Division, Robert, Mardian. actively encouraged FBI surveillance and collaborated with FBI esecntire William C. 8nlliran in transferring the records of the “17” wire- tans from the Bnreau to the Siron White House.

’ Memnrandum~ from Bttnrney General Clark to Kevin Xaroney, et al., 11/g/67. * Tom Charles Hustnn deposition, 5/23/75, p. 32. ‘Staff summary of interview of Colonel Werner E. Jlichel, 5/12/75.

Page 286: Church Committee: Reports-- Book II

270

recognized that need in the past, it has not, until recently, faced up to its responsibilities. President Geraltl Fortl’s joint effort with members of Congress to place further restrictions on wiretaps is a wclconie step in the right direction. Congress must act expeditiously in this area.

Subfinding (0) ,Utorneys General have permitted and even encouraged the FBI to

engage in domestic intelligence activities and to use a wide range of intrusive investigative techniques-such as wiretaps, microphones, and informants-but have failed until recently to supervise or estab- lish limits on these activities or techniques bi issuing adequate safe- guards: guidelines, or procedures for review.

The Attorney General is the chief law enforcement officer of the I-nited States and the Cabinet-level oficcr formally in charge of the FBI.‘” The ,Justice Department, until recently, has failed to issue directives to the FE1 articulating the grountls for opcni?g domestic intelligence investigations or the standards to be followed m carrying out those investigations. The Justice Dcpartmcnt has neglected to establish machinery for monitoring and supervising the conduct of FBI investigations, for requiring approval of major investigative decisions, and for determining when an investigation should be ter- minated. Indeed, in 1972 the Attorney General said he did not even know whether the FBI itself had formulated guidelines anal standards for domestic intelligence activities, was not alrare of the FBI’s manual of instructions, and had never reviewed the FBI’s internal guidelincs.ll

The Justice Department has frequently levied specific demands on the FBI for clomestic intelligence! but has not accompanied these demands with restrictions or guidelmes. Examples include the ,Jnstice Department’s Civil Rights Division’s requests for reports on demon- strations in the early 1960’s (including coverage of a speech by Gov- ernor-elect George Wallace 11* and coverage of a civil rights demon- stration on the 100th anniversary of the Emancipation Proclama- tion 12) : Attorney General Kennedy’s efforts to expand FBI infiltra- tion of the Ku Klux Klan in 1964; I3 Attorney General Clark’s sweep- ing instructions to collect intelligence about civil disorders in 1967; I-) and the Internal Security Division’s request for more extensive inresti- gations of campus demonstrations in 1969. IA While a limited inrestiga- tion into some of these areas may have been \wrranted. the improper acts committed in the course of those investigations were possible because no restraints had been imposed.

The Justice Department also cooperated with the FI31 in defying the Emergency Detention ,-\ct of 1950 by approving the Hurean’s Secu- rity Index criteria for the investigation of “potentially dangerous”

lo Despite the formal line of responsibility to the Attorney General, Director a. Edgar Hoorer in fact developed an informal channel to the White House. Dur- ing sereral administrations beginning with President Franklin Roosevelt the Director and the President circumrented the Justice Department and dealt directly with each other.

I” Memorandum from St. *John Barrett to Marshall, 6/18/m. I” Memorandum from Director. FBI to Assistant Attorney General Burke

Marshall. 12/4/62. UMen~orandum from Director, FBT to Assistant. Attorney General Burke I3 Annual Renort of the Attorney General for Fiscal Tear 196.7. pp. M-186. I4 Memorandbn from Attorney ‘General Clark to Hoorer, Q/11/67. I6 Jlemorandum from Assistant Attorney General Teagley to Hoorer, S/3/69.

Page 287: Church Committee: Reports-- Book II

271

Tllc 1;liI’s autonomy has l,wn a prominent ant1 lolls-:lcccl)tt~tl fca- triw of tII(l Fctlcixl I)ur.t~;l~ic‘l,;~tic ttxrr:lin. A1s (t;~rl\- 11s tllc l!jlfi,: tlw FBI c~)r~ltl 01)1)ose ,Jlwtic,c I)cl)artnlent inqlliries into’it s int(~lx:ll affairs 1)) raising t 11~ slx~+c~r of “lc:~l;s.” I7 T11(~ Ik1xlrtn1~nt ;Icqi~ic.~;cwl in the I311- i~cau’s clainl tliat it was riititlctl to witlllioltl its ix\\- files. conceal the identities of infoixlaiits. a31d. in 11 nllnlhcl~ of cases, 1Tflrlsc t0 give tllC

,Justicc I)el)artmcnt r\-itlcncr supl)orting broa(l allcpat ions ant1 charac- terizations. Former ,1ttornry General Ratzcnl~acl~ lias pointctl out that

there were hot11 positive and nepati\-c sides to tlic 13urcall’s ~lltoll0nlg :

Keeping the Bureau free from political interfcrciic~c was a powerful arguments against efYorts by l~oliticnlly alq~ointetl officials. wliate\-er their motivations, to gain il greater measure of control o\-er operations of the Bureau.. . . [Director IIoover also] found great value in his formal lwsition as subordinate to the -1ttorney General and the fact that the FBI was a part. of the Department of .Justice. . . . In effect, he was uniquely successful in having it both ways; he was protected from pub- lit criticism b>- having a theoretical superior who took re- sponsibilitr for his work, and n-as protected from his su- prior by his public reputation.”

As a consequence of its autonomy, the Bureau could plan and implc- ment many of the abusive operations described in this report. Former Attorneys General have told the Committee that they would never have permitted the more unsavory aspects of the Sew Left or Racial COIXTELPROs if they had been ail-are of the Bureau’s plans. To the estent that Attorneys (general were ignorant of the Bureau’s acti\-- ities. it was the consequence not only of the FBI Director’s independ- ent polit,ical position, but also of the failure of the ,1ttorneys ~encral to est.ablish procedures for finding out, what the Ijllreall was doing and for permitting an iltlllOSl~llClT to evolve in which I3luw~n officials believed that they llad no duty to report their activities to the ,J~~stice Department, and that they could conceal those acti\-ities with little risk of exl~osure.20

I6 Jlemorandum from Belmont to Ladd, 10/15/52. Ii Memorandum from Hoover to L. &I. C. Smith, Chief, Neutrality Laws I-nit,

11/2s/40. ‘* Skholas Katzenbach testimony, D/3/75, Hearings, Yol. G, p. 201. ” The Justice Department’s inrestigation of the FBI’s COJSTELPRO illnstraten

the relwztance of the Justice L)epartment to interfere in or even inquire about Internal Bureau matters. Althoueh the existence of COISTELPRO was made public in 1971, the austice Ibpnrtnkt did not initiate an investigation until 19741 The Department’s Committee, headed bg Assistant Attorney General Henry Peter- sen, which conducted the investigation, agreed to use only summaries of docu- ments prepared II~ the Bureau instead of examining the Bureau documents themsrlres.

Those summaries were often extremely misleading. For esamplc, one summary stntcd :

“It was recommended that an anonymous letter be mailed to the leader of the Blackstone Rangers, a hlncli extremist organization in Chirago. The letter would

(Continued)

Page 288: Church Committee: Reports-- Book II

272

Attorneys General ha\-c not only ncplccted to establish procedures for reviwvmg FHI programs and activities. but. they have at the same time granted the FI3L alithority to cn~plov highly intrusive investi- gative tcchnicjncs with iiiatleq)u~te guide&5 and review proceclures: and in some instances with ~10 external restraints whatsoever. Before l!)G, wiretaps required the approval of the Attorney General in XlKlXT, but once the Attorney General had authorized wiretap corerage of a subject. the J3uieau coultl continl)c tlie surveillance for as lol?g as it jnclgcd necessary.

This permissive policv n-as ctlrrent in October 19M when Attorney General Nobert Renncdv authorized the F‘131 to wiretap the plmles of Dr. Martin Luther icing, ,Jr. “at his current atl(lress or at, any future address to which he niav move” and to wiretap the New York and Atlanta SCJX oflic~s.~~ Reading the Attornev General’s wiretap a,uthorization broadly. the FJ3I construetl 111.. King’s “residence” SO

as to permit wiretnl)s on three of his liotcl rooms and the homes of

friends with whom he stayed ttnil~oraril~. I ** The FBI was still rely- ing on Attorney General Kennedy’s initial authorization when it sought reauthorization for the King wiretaps in April 10% in response to ~u2w procedures formulated by ,Attorney General Kat- zenbach. Although Attorney General Bcnnedy’s authorizing memo- raaidum in October 1063 saitl that the FBI should provide him with an evaluation of the wiretaps after 60 days, he failed to complain when the FBI neglected to send him the evaluation. ,4pparently the ,4ttorncy General never mentioned the wiretal)s to the FI3T again. even though he received FBI reports from the \viretaps until he re- signed in September, 1064 *3

The Justice Department”s policv toward the use of microphones has been even more permissive tha,n for \viretaps. I’ntil I!Ki. the FBI was free to carry out niicrophonc surveillance in national secu- rity cases without first seeking the approval of the Attorney General or notifying him afterward. The total absence of supervision enabled the FBI to hide microphones in Dr. Martin Tlttther King’s hotel rooms for nearly two years for the express lni~~~~osc of not, only determining whether he was being influenced bv allegedly communist advisers. but to “attempt” to obtain information about. the private “activities

(Continued) houefnllr drive a wedge between the Blackstone Raneers and the Black Panthers 1%&y. The anonynot~s~ letter xx-ould indicate that the Black l’anthrr Party in Chicago blamed the leader of the Blackstone Rangers for blocking their pro- grams.”

The document from which this summary was derived, howerrr, stated that the Blackstone Ranerrs were nrone to “violent trne actiritr. shooting. and the like.” The anon~-mous-letter was to state that “the Pantl~ers’blame <ou for blocking their thing and there’s supposed to be a hit out for rou.” The memorandum concluded that the letter “mar intensify the degree of animosity between the two groups” and “lead to reprisais against-its leadership.” (Xemorendam from Chi- cago Field Office to FBI Headauarters. l/18/69.1

’ Memorandum from J. Edga’r ~Hoover ‘to-Attorney General Robert Kennedy, 10/7/W; memorandum from J. Edgar Hoover to Attorney General Robert Kennedy, 10/18/63.

22 Letter from FBI to Senate Select Committee, 7/24/75, pp. 4-5. ?3 See JI. L. King Report : “Elecrtronic Surveillance of Dr. Martin Luther King

and the Christian Leadership Conference.” It should be noted, ho\revrr, that President Kennedy was assassinated a month after the wiretap was installed which may account for Attorney General Kenneds’s failure to inquire about the King wiretaps, at least for the first few months.

Page 289: Church Committee: Reports-- Book II

273

of Dr. King and his associates” so tllat Dr. liillg ~oultl be bbcoll~pletcly

discredited.” 24 Attorncv General Iicnned\- was apparently lie\-er told about the microphone sur\-eillanccs of ih. T<illg, altllottgh lie tlic] receive reports containing unattributetl information from that sur- veillance from which h might ha\-c c~o~icludrtl that niic~rol~lioncs were the sou1.ce.~”

The Justice Department imposed external control o\-er micrg)lloncs for t.llc. first time in March 1965, when Attorney General Katzc~nbacll al~l~lietl the same l~rocedurcs to wiretaps and microl~l~oncs, requir- ing not only prior authorization but also formal periodic i.cvirw.zG 15ut irregularities were tolwated even with this stanclard. For esam- pie, t,lle FBI has proritled the Commit.tcc three mcnloran~la from Ihrector Hoover, init.ialed by Attorney General Katzcnbacll, as evi- clcnce that it informed the *Just,ice Ikpartment of its microlhont surreillance of Dr. King after the March 1065 policy change. These documeuts, Ilowever? show that Katzenbacli K-as informed about the microlhoncs only nft.er they hat1 already been installcd.z7 Such aftrr- h-fact approval was permitted under Ratzcnbach’s l)rocedures.z’a There is no indicat,ion that, Batzenbacll inquired fur&r after rcceiv- ing the notice.z8

The Justice Department condoned, and often encouraged, the FBI’s use of informantsthe inr-estigatire twlinique xvitli the highest poten- tial for abuse. Howeve:, the ,Justice I>epartment imposed no reshic- tions on informant activity or reporting, and established no prow- (lures for reviewing the Bureau’s decision to use informants in a par- ticular case.

In 1051 the Justice Ihpartment entered into an agreement with the CIA in which the CIA was permitted to wit~hhold the names of

a Jlemorandum from Frederick Baumgardner to \Villiam Sullivan, l/%/&l. zi The FBI informed the Committee that it has no documents indicating that

Attorney General Kennedy was told about the microphones. His associates in the Justice Department testified that they were never told, and they did not believe that the Attorney General had been told ,about the micronhones. (See memorandum from Charles Brennan to \Yilliam Sullivan, 12/19/&I ; Courtney Evans testimony, U/l/i~j, 1, . 20 ; Burke JIarshall testimony, 3/3/i& p. 43.)

The question of whether iittorney General Kennedy suspected that the FBI was using microphones to gather information about Dr. King must be viewed iln light of the Attorney General’s express authorization of wiretaps in the King case on national security grounds, and the FBI’s practice-known to the Attorney General-f installing microphones in such national security cases without noti- fying the Dewrtment.

28Memoranduni from Director, FBI to Attorney General, 3/39/6.X p. 2. The Attorney General’s policy change occurred during a period of publicity and Congressional inquiry into the FBI’s use of electronic surveillance.

“Memorandum from Director, FBI to Attorney General, 5/li/65; 1Iemoran dum from Director, FBI, to Attorney General, 10/19/g; Jlemorandum from Director, FBI, to Attorney General, 12/l/65.

nr Katzenbach advised Director Hoover in September 1965 that “in emergency situations [wiretaps and microphones] may be used subject to my later ratifica- tion.” (Memorandum from Katzenbach to Hoover, 9/27/N) Xerertheless, there is no indication that these microphone surveillances of Dr. King presented “emergency situations.”

‘* Katzenbach testified that he could not recall having seen the notices, although he acknowledged the initials on the memoranda as in his handwriting and in the location where he customarily placed his initials. (Katzenbach, 12/3/75, Hearings, Vol. 6, 11. 225. )

Page 290: Church Committee: Reports-- Book II

274

employees whon~ it had determined were %~lmost certainly guilty of viokkions of criminal statutes;” when the CIA could “devise no ClMlgC" under which they could be pumxuted that wdd ilot “wquire

revelation of highly classilied information.” “!’ This pi,actice was ter- minated by the Justice Department in January, 197 j.2:‘c’

Desljitc the failure of A1ttoriiey5 C;cneral to exercise tlic sul’ervi- sion that is necessary in the area of dome&c intelligence, se\-era1 ~~ttOlIWJS Gcncral ha\e taken steps in the. riglit direction. Of note were Attorney General Sicbliolas l<:~tzellbncli’s review procedures for electronic surveillance in 1NLj; Ranisey, ClZlYli’S refusal to approve electronic surveillance of domestic intelligence targets and his rcjec- tion of re1~eatc.d requests by the E‘l(1 for such surreillnnce; Acting Deputy Attorney General William I~nclwlsliaiis‘ inquiries into the Rureau’s domestic intclligrnce program; Deputy Attorney General Laurence Silbtrman’s inquiry into political abuses of the FRI in early 1575; and ,1ttorncy General Saxbe’s tlecision to make the Justice Department’s (‘OISTELI’I~O rc.port public.

During the past year, Attorney General Edward I-T. I,cri has exrr- cised welcome leadership by formulating guidelines for FI31 inr-esti- gations; developing legislative proposals requiring a judicial war- rant for national security wiretaps and microphones; establishing the Oflice of Professional Responsibility to incluire into departmental misconduct : initiating inrcstipntions of alleged wrongdoing by the FBI; and cooperating with this Committee’s requests for documents on FRI intelligence operations. 3o The Justice Department’s concern in recent years is a hopeful sign, but long overdue. Rubfinding (c)

Presidents, White House officials, and Attorneys General have requested and received domestic political intelligence, thereby con- tributing to and profiting from the abuses of domestic intelligence and setting a bad example for their subordinates.

The separate finding on “political abuse” sets forth instances in which the FI3T was used bv White House officials to gather polit’- ically useful information. ‘including data on administration op-

ponents and critics. This misuse of the Rureau’s powers by its political superiors necessarily contributed to the atmosphere in which abuses flourishe,d.

If the Bureau’s superiors were willing to accept the fruits of m-

cessire intelligence gathering, to authorize electronic surveillance for political purposes, and to receive reports on critics which included intimate details of their personal lives, they could not credibly hold the ISmean to a high ethical standard. If political expediency char- acterized the decisions of those expected to set limits on the I3urcau's

conduct, it is not surprising that the FBI considered the principle of expediency endorsed.

28 Memorandum from Lawrence Houston to Deputy Attorney General, 3/l/54. 211a Nemorandum for the Record 1,~ General Counsel, CIB, l/31/75. “The Committee’s requests also provided the Department of *Justice with the

opportunity to see most of these FBI documents for the first time.

Page 291: Church Committee: Reports-- Book II

icubfiMli?ig (d)

I’I~esitlrllts. A\ttolxc~ys Gcnr~xl. and oth~~r c~nl)iwt officci~s linrr

lirplec~tc~tl. until wcc~ntly. to n~:tl;r inquiries ill tile face of clear intli- cations that intelligent agciicies wcrc engaging in in11)ro1wi* donicdic activities.

Ii~secnti\-c l~i~1iic~l1 oflicials contril)~~tctl to an atnlosl)llew in which cscw33 were phsihle h\- igiloiinLg clcnl. intlications of cs(*wScs illltl failing to take colwcti;-cl 111cai1lws n-lwn tliiwtly confmntrtl lvitll inipimpcr hhnvior. Tlic (‘oiiiniittc~c’~ fiiitlings 011 “T-iolating allcl Igno~ ing the IAW-” illustmtc that sewixl c~uestionable or illegal pi~opaiiis coiitinuctl nftcr highrr oflicials hat1 lcaimr~l partial dctalls ant1 failctl to ask for additional iiifoiwiation. either oilt of tllca ilai\.cl i~SSllllll~tiOll

tht intelligence agencies woultl not cliipagc in lawless coiitll~ct, 01’ because they p~efe~rctl not to lw infomie~l.“l

Some of tlic most tlistwbiny csaniplcs of insnficirnt action iii tlic face of clear thinpi* signals w’~‘e ~~nco\~c~c~l in tilt (‘onlnnittee’s iiivesti- gntioii of the FI3I’s l)mgyanl to “nrnti2lizc” Dr. Jhtin Luther King, .JI+. as the leader of tlw civil rights nlo\-cnwnt. The I3areau infomletl the Committee that its files contain no c\-idcnce that any officials oiit- side of the FBI “were specifically an-are of nnv effolb. steps, or plans or proposals to ‘dismetlit 0~’ ‘ntwtralizc’ King., ” 32 The relevant csecw tivc, bl~ancll officials ha\-e told the (‘ol!illiittfe that tliev ww2 uiiawaye of a general I3wenu l)Yograiii to tlisciwlit King. Foime~* At~toiwy Citm- cm1 Iiatzenhacli, however, ‘told the Coiiiinittec :

Nobody in the Departnwnt. of ,Jnsticr conncctctl with Civil Rights could possibly have lmn wlawn~~e of MI*. IIoorrr’s feelings [against Dr. King]. Sobotlg could have bceii iiii- aware of the potential for tlisnstel which those feelings cni- lmtlietl. Hut, given tlic realities of the situation, I (10 not Mieve one coriltl liavc anticipated the csti~eines to which it was npparentl~ cai~hyl.34

The eritlencc before the Committee confim~s that the “potential fol disaster” n-as iiitlcctl clcni. at the time. Tllcw is no question that. officials in the White ITousr ant1 ,Jnstice Dcpahment, including Ihs- dent, ,Jolmson and Attome\- Genr~xl Rntzcnbacll. knew that tllc l<n- IWLU was taking strp to disc&it Dr. King, altliougll they (lit1 not know lt,lle full rstmt of the I~I~IwI~‘s efforts.

-In ,Jannal:\- 196-1 the FRI gave Presidential Assistant. Walter ,Jcnkins all FHI relmrt ll~lfa\-o~able to Dr. King. ;hcording to a conteillpo~ancolls FIST nlenlo~~ldwn, ,Jenkins said that lie “n-as of the opinion that, tlic FI31 coultl lwrfomi a good service to the countq if this Illattel could sonlelion- bc confideiitially given to inenibers of the press.” ,Jenkins, in a staff interview, d&et1 having matle such a suggestion.3z

” One cabinet official, u-hen told thnt the CIA wanted to tell him something secret, replied, “I would rather not knon: anything about it.” The “srcret” matter was (‘1.1’~ illegal mail opening program. (.J. Fklwnrd Ijay testimony. 10/22/T;,. IIearings, Vol. 4. p. 4.5.)

33 Letter from FBI to thp Senate Select Committee, 11/G/55. ” Katzenkwh. 12/3/E. Hearings, Vol. 6, 1,. 209. ” ~Iemorandnm from (‘artha DeLoach to J. Edgar Hoover. 1/14/M ; Stnff sun-

may? of Walter .Jcnkins Interview. 12/l/E. pp. l-2. Mr. ,Jenliins subsequently said thnt lie was nnnble to testify formally I~ecmwe of illness and has f:iilcd to answer written interrogatories submitted to him by the Committee for response under oath.

Page 292: Church Committee: Reports-- Book II

-In Pcl)riiarv 1961 a reljorter infornicd thr ,Justicc Dcpartnient that the PI<1 hat1 oticrcd to **leak” infornintion unfavorable to Dr. King to the press. The. ,Justice Departnlcnt’s I’rcss chief, Edwin Glithman, aslx~l (‘artha DcLoach, the FEI’s liaison with the press! about this allegation and DcLoach denied any involrenlent. The Jx- tice Dcpartnicnt took no flirther action3”

-ISill foyers, an ksistant to President. ,Johnso~~, testified that he learned sonkime in early 1964 that an FBI agent twice oRered to play a tape recolding for j\‘altcr Jenkins that would have been per~01~1ly

embarrassing to Dr. King and that, ,Jrnl;ins refused to listen to the tape on both occasions. liia Moyer75 testified that he never asked the FBI why it had the tape or was offerin, ~7 to play it in the White House.37 When asked if he had ever questioned the propriety of the FBI’s dis- seminating inforniation of a personal nature about Dr. King within the Governinent, he replied, ‘.I never questioned it, no.” When he was asked if hc could recall anyone in the Mhite House ever questioning the propriety of the FBI ciisseniinating this type of material, Meyers testified. “I think . . . there were connnents that tended to ridicule the FBI’s doing this, but no.” 38

--Burke Jlarshall? ,ksistant. Attorney General in charge of the Civil Rights Division, testified that sonietiine in 1964 a reporter told him that the Bureau had offered information unfavorable to Dr. King. Jlarsl~all testified that he repcatecl this allegation to a Bureau ofkial and asked for a report. The Bureau official subsequently informed him “The Director wants you to know t.hat you’re a . . . damned liar.“39

-In November 1964 the Washington Buwau Chief of a national news publication told *Attorney General Katzenbach and Assistant Attorney General Marshall that. one of his reporters had been ap- proached by the. FBI and offered the opportunity to hear some “inter- esting” tape recordings involving Dr. King. Katzenbach testified that he had been “shocked,” and that he and Marshall had informed Presi- dent ~Johnson. who “took the matter very seriously” and promised to contact, Director Hoover.“” Seither Marshall nor Katzenbach knew if the President contacted Hoover. J1 Ratzenbach testified that, during t.his same period, he learned of at. least, one other reporter who had been offered tape recordings by the Bureau, and that he personally confronted DeLoach, who was reported to have made the offers.42 DeLoach told Katzenbach that he had never niade such offers.43 The only record of this episode in FBI files is a n1cmorandunl by DeLoach st.at.ing that Jloyers had informed him that the newsman was “telling

38 Memorandum from John JIohr to Cartha DeLoach, 2/5/65 ; Edwin Guthman testimony, 3/16/76, pp. 2623.

38X Bill JIoyers testimony, 3/2/76, p. 19. ai Bill JIoyers testimony, 3/2/76, p. 19 ; staff summary of Bill JIoyer;j interview,

11/24/55. In an unsworn staff interview, .Jenkins denied that he ever receired an offer

to listen to such tapes. (Staff summary of Walter Jenkins interview, 12/l/7*5.) 39 Meyers, 3/2/i6. pp. 17-18. Se Marshall, 3/S/76, pp. 46-47. ” Kntzenhach, 12/3/i5, Hearings, Vol. 6, p. 210. ” Marshall, 3/3/76, p. 43; Katzenhach, 12/3/E, Hearings, Tel. 6, p. 210. U Kntzenl~arli, 12/3/75. Hearings, Vol. 6. p. 210. u Katzenbach, E/3/75, Hearings, Vol. 6, p. 210. DeLoach testified before the

Committee that he did not recall conrersations with reporters about tape recordings of Dr. King. (Cartha DeLoach testimony, U/25/75, p. 156.)

Page 293: Church Committee: Reports-- Book II

277

In 1968 -\ttornc\- Gcncixl Rninse~ Clark :islwtl IXiwtor IIoo~c~i~ if he had “an? informntioii as to how” facts ahx1t A~ttolm~ Gr11cral

IGxmc$i’s antliorization of the wiretap on 111,. King liad lcakctl to colummsts Drew Pearson. and .Jack -1ndcrson. Clark rcquestcd the FI3I Director to “undcrtwlrc whater-cr investigation ~011 tlcclii frasiblc to tlctcrminr how this liaplx3td.” l:a IXrector IIoo\-w’s reply, drafted in the office of Cartha DeLoacli. csprcssctl “tlismay” at the leak ant1 of- fered no indication of the likely ~oiirce.~“~~

In fact? DeT,oach hat1 l~rcl~a~wl a 111(~11101’:11l(ll11~1 tfn clays earlier stat- ing that n middle-level ,Jllstice I )cl)artmcnt official with knowledge of the King wiretap met with liiiii and atlniittctl having “discussed this ninth with Drew Penrson.” .horcling to this i~iciiior:ii~diiiii. DeLoacli :Ltteml)ted to perwade the ofhcial llot to allow the story to be printed lwniisc “ccrtaiii Scgro gr01lps wo~iltl htill l~1:11iic the FBI. whether we were ordered to take such action or not.” +X Thus. DcIloach and Hoowr dclilwrattly misled .1ttornry Gencrnl Clark 1);~ withholding their l;iio~ledpc of the source of the “leak.”

&hfi,wh+q (c) Coy.ycss. which has the authority to placr restraints on domestic

intelligence activities tlirongl~ legislation. nl~l~rol~riations. and over- sight committees, has not effectively asserted its responsibilitiw until recently. It has failed to define the scope of domestic intelligence activ- ities or intrllipnce collection tecllniqiies. to iinco~cr escesscs, or to ljropose lepislatire solutions. Some of its m~nl~crs Iin\-c failed to object. to improper activities of which they wcrc aware and have proddrd apiicies into qucstionahlr activities.

Congress. linlilif the I?,sccati\x~ hlnnch, does not hare tllc function of supervising the day-to-day activities of agencies cngagrcl in domestic

” Memornndnm from Cartha T%T.onch to John Mohr. 12/l/61. iii ZIn,wrs. 3/2/m. p. 9. *’ Mcmnrnndnm from Clark to Hoo~c~r. 5/Bi/BS. Thr story was pul~lishrd in the

midst of Rolrert I<~nn~dv’s cnmpni,cn for the Dpmowatic prt’sidrntinl nominxtion. a Memorandmn from Horn-w to Clnrk. 5/28/6$. “cMemorandnn~ from C. D. IkT,onch to Mr. Tolson, 5/17/68. Four days later

D~r~onch had R phnnc conrcrsxtion with .Tnrk .\nderson in which. awording to vnrtmfvit. official “hntl ndvisrd him roncerninz snwific information inr-nlrine an

Page 294: Church Committee: Reports-- Book II

278

intelligence. Congress does, howvcr. haw the abi1it.y through legisla- tion to affect almost every aspect of domestic intelligence activity: to erect the framework for coordinatiy domestic intelligence activities; to define and limit the types of actI\-ltirs in which execntive agencies may engage; to establish the standards for conducting inrestigations; and to promulgate guidelines for controlling the use of wiretaps, micro- phones, and informants. Congress could also exercise a great in- fluence over domestic intelligenre through its power over thr appro- priations for intelligence agencies’ budgets and through the investipa- tire powws of its committees.

Congrrss has failed to establish precise standards governing do- mestic intelligence. PIT0 congressional statntcs deal with the authority of executive agencies to conduct domestic intelligence operations, or instruct the executirr in how to structure and superrise those opwa- tions. Xo statutes address when or under what conditions inrestiga- tions may be conducted. Congress did not attempt to formulate stand- ards for wiretaps or microphones until 1968, and even then aroided the issue of domestic intelligence wiretaps by allowing an exception for an undefined claim of inherent executive power to conduct do- mestic security surrcillancc, which was subsequently held unconstitu- tional. ,45d No legislative standards hare been enacted to govern the IIS~ of informants.

Congress has helped shape the environment in which improper intel!igence activities were pozsiblr. The FRT claims that sweeping prowsions in several vague criminal statutes and regnlatorg measures enacted by Congress provide a basis for much of its domestic intelli- ge.nce activity. 45e Congress also added its voice to the strong consensus in favor of povcrnmtntal action against Communism in the 19.50’s and domestic dissidents in the 1960’s and 1970’s.

Congress’ failure to define intelligence functions has invited act,ion by the esecnti:-e. If the top officials of the exwntire branch are respon- sible for failing to control the intelligence agencies, that. failure is in part dnr to a lack of guidance from Congress.

During most of the X-year period covered in this re,port, congres- sional committees did not effectirely monitor domestic intelligence activities. For example, in 1966, a Senate ,Jndiciary subcommittee nndcrtook an investigation of electronic surveillance and other intru- sive trchnic,urs by Federal agencies. According to an FBI memo- randum, its chairman told a delegation from the FRI that he would make “a commitment that he wonld in no way embarrass the FBI,” and acceded in the FBI’s request that the subcommittee refrain from calling FBI witnesses.46

‘5d T-.S. v. T7.S. District Cn~rrt, 407 T’.S. 297 (1972). 4Je Thew include the Smith Act of 1940 and the T’oorhis Act of l!Ml. In addi-

tion to reliance on these statutes to buttress its claim of authority for domestic intellieence operations. ‘the FBI has also pl,aced reliance on a Ciril War seditious ronsl~iracy statute and a rebellion and insurrection statute passed during the Whiskey Rebellion of the 17IH)‘s. FBI Director Clarence Kelley. in a letter to the Attorney General. stated that these later statutes were designed for Ilast renturies. “not the Twentieth Century.” (JIemnrandnm from Director, FBI. to Att0rne.r General, Hearings, Vol. 6, Exhihit 53.) The Committee agrees.

LB Memorandum from DeLoach to Clyde Tolson, l/21/66.

Page 295: Church Committee: Reports-- Book II

279

Another example of the deficiencies in congressional oversight is seen in the, House Al~l~rol~riations (‘ommittee’s regular nl~l~rov:~l of the FBI’s requests for al~l~rol~riations \vitliont raising objections to the activities described in the. Director’s testimony and off-the-record briefings. There is no question that members of a House L1lq)rol)ria- tions subcommittee were aware not onlv that the n11w111 was engaged in broad domestic intelligence investigations, but that it was also cml~loying disruptive tactics against domestic targets.

In 1058, I)ircctor Hoover infornled the subcommittee that the I3urcau had an “intcnsi\-c program” to ~~tlisorgnnize and disrupt” the Communist Party, that the progran~ hacl existctl “for years” and that l~urcau infornlants acre used “as a disruptive tactic.” 47 The nest year, the Director informed the subc~ommittce that informants in 12 field offices

have been carefully briefed to engage in controversial dis- cussions with the (Fonlniunist Party so as to promote clisscn- tion, factionalism ant1 defections from the communist Cause. This technique has been extremely successful from a disrup- tive standpoint.

I-nder another phase of this program. we have care,fullg selected 28 items of anticommunist propaganda and hare anonymously mailed it to selected communists. carefully con- cealing the identity of the FBI as its source. More than 2,809 copies of literature hare been placed in the hands of active con~niunists.4”

Hoover described more aggressive “psychological warfare” techniques in 1062 :

During the past year x-e have caused disruption at large Party meetings, rallies and I)ress conferences through various techniques such as caiisin, (p the last-minute cancellation of the rental of the hall, packing the illldiell~e with anticoiiimnnists, arranging adverse publicity in the press and making available embarrassing questions for friendly reporters to ask the Com- munist Party functionaries.

The .\l)l”‘ol)~‘iations subcommittee n-as also told during this briefing that the FBI’s operations included exposing and discrediting “com- munists who are secretly olwrating in lepitlmate organizations and rmployvnients, such as the k’oiing Men’s Christian ,4ssociation, Boy ,SvolltS, civic, groups. ant1 the lilie.” 4o

In 1966 Director Hoover informed the Appropriations subcommittee that the. disruptive program had been extended to the. Ku Klux Klan.”

The present, Associate Director of the FBI, Nicholas Callahan, who accompanied Director Hoover during several of his appearances before the Appropriations subcommittee, said that members of the subcom-

4’ 1958 Fiscal Tear Briefing Palmer ])repnrrd II!- FBI for House Approprintions Cnmnittee.

4”1959 Fiscal Tear Briefing Paper prepared 1)~ FBI for House Appropriations Committre.

‘” 19@ Fiscal Tear Briefing Paper prepared by FBI for House Appropriations Committee.

5o 1966 Fiscal Tear Briefinr Paper prepared 11~ FBI for House Appropriations Committee.

Page 296: Church Committee: Reports-- Book II

280

mittee made “no critical comment” about %he Bureau’s efforts to neu- tralize groups and associations.” 51

Subcommittee Chairman John Rooney’s statements in a televised interview in 1971 regarding FBI briefings about Dr. Martin Luther King are indicative of the subcommittee’s attitude toward the Bureau :

Representative ROOSEY. Xow yen talk about the F.B.I. leaking something about Martin Luther King. I happen to know all about Martin Luther King, but I have never told anybody.

Intemiezoer. How do you know everything about. Martin Luther King?

Representative ROONEY. From the Federal Bureau of In- vestigation.

Interviewer. They’ve told you-gave you information based on taps or other sources about Martin Luther King.

Representative Rooseu. They did. Interviewer. Is that proper Z Representative ROONEY. Why not 1 5z

Former Assistant Attorney General Fred Vinson recalled that in 196’7 the Justice Department averaged “fifty letters a week from Congress” demanding that. “people like [Stokely] Carmichael be jailed.” Vinson sa.id that on one occasion when he was explaining First Amendment limits at, a congressional hearing, a Congressman ‘<got so provoked he raised his hand and said, ‘to hell with the First, Amendment.’ ” Vin- son testified t.hat these incidents fairly characterized “the atmosphere of the time.” 53

The congressional performance has improved, however, in recent years. Subcommittees of the Senate Judiciarv Committee have initiated ;nquiries into Army surveillance of dome&c targets and into elec- tronic surveillance by the. FBI. House. Judiciary Committee subcom- mittees commissioned a study of the FBI by the General ,4ccounting Office ant1 have inquired into FBI misconduct and surveillance activ- ities. Concurrent with this Committee’s investigations, the House Select Committee on Intclligcnce considered FBI domestic intelligence activities.

Our Constitution envisions Congress as a check on the Executive branch, and gives Congress certain powers for discharging that. func- tion. TTntil recently, Congress has not. effectively fulfilled its consti- tutional role in the area of domestic intelligence. Mthough the appro- priate congressional committees did not always know what intelligence agencies wcrc doing, they could hare asked. The Appropriations sub- committee was aware that the FBI was engagir)g in activities far be- yond the mere collection of intelligence: yet it did not inquire into the details of those progran~s.54 If C&gress hat1 addressed the issues of domestic intelligence and passed regulatory 1Fgislation. and if it had p~*obctl into tile activities of intelligence agencies and required them to

‘l Jlemorandnm from FRI to Select Committee, l/12/76. ” Interview wit11 Congressman Rooner. XRC Kews’ “First Tuesdnr,” 6/l/71.

” Director Hoorrr npp&& to’havb told the subcommittee of the IIonse Appro- llrintions Committee more about COISTELPRO operations and techniques than he told the Justice Department or the White House.

Page 297: Church Committee: Reports-- Book II

281

account for their deeds, many of the excesses in t.his l&port might not have occurred. A~\‘ubjhdi?Lg (f)

Intelligence agencies have often undertaken programs without au- thorization, with insufficient aut,horization, or 111 defiance of express orders.

The excesses detailed in this report were due in part. to the failure of Congress and the Executive branch to erect a sound franlexork for domestic intelligence, and in part to the dereliction of responsibility by executive branch ofiiicials who were in charge of individual agencies. Yet substantial responsibility lies with officials of the intel- ligence agencies themselves. They had no justification for initiating major activities \vithout first seeking the express approval of their SU- periors. The pattern of concealment and partial and misleatling dis- closures must never a.gain be allowed to occur.

The Committee’s investigations have rerealed numerous instances in which intelligence agencies have assumed programs or activities were authorized ~uider circumstances where it could not, reasonably be inferred that higher oflicials intended to confer authorization. Some- times far-reaching domestic programs were initiated without the knowledge or approval of the appropriate official outside of the agen- cies. Sometimes it was claimed that higher officials had been “noti- fied” of a program after they had been informed only about some aspects of t,he program, or after the program had been described with vague references and eupl~en~isms, ~11~11 as “neutralize,” that c,arried different meanings for agency personnel than for uninitiat4 outsid- ers. Sometimes notice consisted of references to programs buried in the details of lengthy memoranda ; and “antllorization” was inferred from the fact that higher o&Gals failed to order the agency to dis- continue the program that had been obscurely mentioned.

The Bureau has made no c.laim of outside aut.horization for its CWIi\‘TELI’KOs against the Socialist Workers l’art,y, Islack Kation- alists, or T\‘ew Left adherents. ;ifter 1960, its fragile claim for authori- zation of the COISTELPROs against the C’ommunist Party USA and White Hate Groups was drawn from a series of hints and part.ia.1, ob- scured disclosures to the Attorneys General and the White House.

The first evidence of notification to higher government officials of the E’UI’s COISTELI’IIO against the Communist Party USA con- sists of letters front Director Iloo\-er to President Eisenhower and At- tornry General William Iiogers in May 1958 informing them that “in August. of 19.36, this Bureau initiated a program designed to promote disruption within the ranks of the Conuiiunist Party (Cl?) USA.” 55 There is no record of any reply to these letters.

Later that same year, Director Hoover told Presidents Eisenhower and his Cabinet :

To counteract a resurgence of Clommunist Party influence in the 17nitetl States, we ha\-e a . . . program designed to intcn- sify any confusion and dissatisfaction among its members.

Gj JIrmor:~nd~n~ from the Director, FBI to the Attorney General, 5/s/58.

Page 298: Church Committee: Reports-- Book II

282

During the past few years, this program has been most effec- tire. Selected informants were briefed and trained to raise controversial issues within the 1’art.F. . . . The Internal Rcre- nue Service was furnished names a~itl ntlclrwses of Party func- tionaries n-ho had hen zctiw iii the lintlergrountl ap1Xlra- tus . . . : ~~ntic,oiilJiimni~t literature a;ld simulated Party docu- 1llelltS \YC’JT JllFlild ZlJlOJl~lllOllS~~ t0 (%lYfld~J- ChOSCll 111CJ11-

bers. . . .86

The FBI’s only claim to ha\-ing notified the Kennedy ,4dnlinistra- tiOl1 CLbOllt COI~TErAPRO JYStS lq)Oll a IetteJ’ Wittell Sllodly before the iJlauguJxtioJ1 in January 1961 from Director IIoover to Attorney General-designate Robert. Iiennedy. Deputy -1ttorney General-desig- na.te Byron R. White, and Secretary of State-designate. Dean Rusk. One paragraph in the five-page letter stated that the Bureau had a “carefully planned program of counteratt,ack against the CPCSA which keeps it off balance:” and which was “carried on from both in- side and outside the party organization.!’ The Bureau claimed to have been “successful in preventing communists from seizing control of legi- timate mass organizations” and to have “discredited others who were secretly operating inside such organizations.” 57 Specific techniques \vere not mentioned, and no additional notice was provided to the Ken- nedy Administration. Indeed, when the Kennedy White House form- ally requested of Hoover a report on “Internal Security Programs,” the Director described only the FBI’s “investigative program,” and made no reference to disruptive actirities.58

The only c.laimed notice of the COINTELPRO against the Ku Klux Klan was given after the program had begun and consisted of a partial description buried within a discussion of ot.her subjects. In September 1965, copies of a two-page letter were sent to President Johnson and Attorney General Katzenbach? describing the Bureau’s success in solving a number of cases involvmg racial violence in the South. That report contained a paragraph stating that the Bureau was “seizing every opportunity to disrupt the activities of Klan organiza- tions,” and briefly described the exposure of a Klan member’s “kick- back” scheme involving insurance company premiums.59 More ques- tionable tactics, such as sending a letter to a Klansman’s wife to de- stroy their marriage, Ivere not mentioned. The Bureau viewed Katzen- bath’s reply to its letter-which praises the investigative successes which are the focus of the FBI’s letter-as constituting authorization for the White Hate COINTELPR0.60

The claimed notification to Attorney General Ramsey Clark of the White Hate COINTELPRO consisted of a ten-page memorandum captioned “Ku Klux Klan Invest.igations-FBI Accomplishments” with a buried reference to Bureau informants “removing” Klan offi- cers and “provoking scandal” within the Klan organization 61 Clark

w Dxcerpt from FBI Director’s Briefing of Cabinet, 11/6/58. 5’Nemorandum from Hoover to Attorney General Robert Kennedy, l/10/61,

copies to White and Rusk. @Letter from J. Edgar Hoover to McGeorge Bundy, 7/25/61, and attached

I.I.C. Report : “Status of U.S. Internal Security Programs.” “Letters from Hoover to Marvin Watson, Special Assistant to the President,

and Attorney General Katzenbach, 9/17/&s. B” Memorandum from Katzenbach to Hoover, g/3/65. BI Memorandum from Hoover to Clark, 12/18/G.

Page 299: Church Committee: Reports-- Book II

283

told the Committee that he did not recall reading those phrases or interpreting thcni as notice that thr Bureau n-as engaging in disruptire tact.ics (i2 Cartha I)eLoach, A4ssistant to the Director during this period, testified that hc “distinctly” recalled briefing Attorney General Clark “generally . . . concerning COI~TEI,PRO.” li3 Clark denied having been briefed.“”

The letters and briefings described above, which constiMe the Ru- reau’s entire claim to notice and authorization for the CPIJSA and White Hate COTSTELPROs, failed to mention techniqiies which risked physical, cniotional, or economic harm to their targets. In no case was an Attorney General clearly told the nature and extent of the programs and asked for his approval. In no case was approval ex- pressly given.

Former Attorney General Natzenbach cogently described another misleading form of “n~itllol,izntioii” relied on by the Rureaa and other intelligence agencies :

As far as Mr. IIoover was concerned, it was sufficient for the. Bureau if at. any time any ,4ttorney General had authorized [a particular] activitv in any circumstances. In fact, it was often sufficient if any Attorney General had w&ten some- thing which could be construed to authorize it or had been in- formed in some one of hundreds of memoranda of some facts from which he could conceivably hare inferred the possibil- ity of such an actiritg. Perhaps to a permanent head of a large bureaucracy this seems a reasonable way of proceeding. However, there is simply no way an incoming Cabinet, officer can or sl~o~~ld be charged with cndoising every dec.ision of his predecessor. . . .G5

For example, the CPVSA COISTELPRO was substantially de- scribed to the Eisenhower L4dministration, obliquely to the Ken- nedy A4dministration designees, but continued-apparently solely on the strength of those assumed authorizations-through the Johnson Administration and into the Sison Iltln~inist~~ation. The idea that authority might continue from one administration to the next and that. there is no duty to reaffirm authority inhibits responsible decision making. &cumstanccs may change and. judgments may differ. New officials should be given-and should insist) upon-the opportunity to review significant programs.

The CIA’s mail opening project illustrates an instance in which an intelligence agency appnrrntlv received authorization for a limited program and then expanded that prograni into significant new areas without seeking further authorization. In May 1951. DCI.4llen Dulles and Richard Helms. then Chief of Oprrntions in thr CT-~‘S Directorate of Plans. briefed Postmaster General ,1rthnr Sun~n~erfield about the CL4’s PITew York mail project, which at that time involved only the examination of enwlopc exteriors. CL1 memoranda indicate that Summerfield’s approval was obtained for photographing envelope PS- teriors, but no mention was made of the possibility of mail opcning.66

Jz Clark, 12/s/75, Hearings. Vol. 6. p. 235. ” DeLonch. 12/3/iR, Hwrinps. Vol. 6. p. l&3 81 Clark, 12/3/X. Hearings, TTol. 6. p. 232. s Katwnb~nch, 12/3/76. Hearings. Vol. 6. 1~. 202. w RIemorandnm frnm Richard Helms, Chief of Opcrntions, DDE’, to Director

of Security, 5/17/51.

Page 300: Church Committee: Reports-- Book II

284

The focus of the CL\‘s project shifted to mail openilfg sometime dur- ing the ensuing year. but the CIA1 did not return to Inform Summer- field and made no attempt to secure his approval for this illegal operation.

Intelligence oficers have sometimes withheld information from their superiors and concralecl programs to prevent discovery by theii superiors. The Bureau apparently ignored the Attorney General’s order to stop classifying persons as “dangerous” in 1943 ; unilaterally decided not to pro\-ide tile Justice I>epartment with information about, communist espionage on at least two occasions “for securitv reasons;” and withheld similar information from the Presidential commission investigating the government’s security program in 1947.67 More re- cently, CIA and XSA concealed from President Richartl Sixon their respective mail opening and communications interception programs.

These incident.s are not unique. The FRI also concealed its Reserve Index of prominent persons who were not included on the Security Index reviewed by the ,Justice Department : its other targetmg pro- grams against “Rabble Rousers, ‘: “,Ypitatoi3, ‘! “Key Activists,” and “K, Extremists;” and its use of intrusive mail opening and sur- repititious entry techniques. Indeed, the FBI institutionalized its capability to conceal activities from the ,Justice Department by estab- lishing a regular “Do Sot File” procedure, which assured internal control while frustrating external accountability.

Sub fhdiing (g) The weakness of the system of accountability and control can be seen

in the fact. that many illegal or abusive domestic intelligence opera- tions were terminated only after they had been exposed or threatened with exposure by Congress or the news media.

The lack of vigorous oversight and internal controls on domestic intelligence activity frequently left the termination of improper pro- grams to the ad hoc process of public exposure or threat, of exposure by Congress, the press, or private citizens. Less frequently, domestic intellige.nce projects were terminated solely because of an agency’s internal review of impropriety.

The Committee is aware that public exposure can jeopardize legiti- mate, productive, and cosf-1~ intelligence programs. We do not con- done the extralegal activities which led to the exposure of some ques- tionable operations.

Nevertheless two point emerge from an examination of the termi- nation of numerous domestic intelligence activities : (1) major illegal or imprope,r operations thrived in an atmosphere of secrecy and in- adequate executive, control; and (2) public airing proved to be the most effective means of terminating or reforming those operations.

Some intelligence officers and Executive branch administrators sought the termination of questionable programs as soon as they became aware of the nature of the operation-the Committee praises their actions. HoIT-ever, too often we have seen that the secrecy that protected illegal or improper activities and the insular nature of the agencies involved I,rerented intelligence officers from questioning their artions or realizing that they were. wrong.

“See Part II, pp. 35-36, 55-56.

Page 301: Church Committee: Reports-- Book II

285

There are several noteworthy examples of illegal or abusive domes- tic intelligence activities which were terminated only after the threat of public exposure :

-The FI3I’s widesweeping COIX’TIST,PKO operations were termi- nated on April 27, 1971, in response to disclosures about the program in t,he press.73

-IRS payments to confidential informants were suspended in Alarch 1975 as a result of journalistic in\-estigat,ion of Operation I~eprccliaun.7z

-The Armx’s termination of several major domestic intelligence operations. wli~cli were clearly overbroad or illegal, came only after the programs were disclosed m the press or were scheduled as the subject of congressional inquiry.75

-On one occasion. FBI I>irector Hoover insisted that electronic sur- veillance be discontinued prior to his appearance before the IIouse ,1ppropriations Committee so that he could report a relatively small number of wiretaps in place.7F Contrary to frequent. allegations, how- ever, no general pattern of temporary suspensions or terminations during the Director’s appearances before the House Appropriations Committee is revealed by Bureau records.

-Following the report of a Presidential committee which had been established in response to news reports in 196$, tile CIA terminated its covert relationship \rith a large number of domestically based orga- Ilizations: sacll as acadciiiic institutions; student ~;~oi~ps, pri\ate foun- dat,ions, and media projects aimed at, an international audience.78

Otlicr examples of curtailment of domestic intelligence actiritr in response to the prospect of public exposure include : President N&on’s

is JIrmorandum from Brennan to Sullivan, 4/27/U ; letter from Ilirector, FBI, to all Field Offices, 4/28/Z. Even after the termination of COINTELPRO. it was suggested that “counterilltelligrlIcr action” would be considered “in exdep tional instances” so long as there were “tight procedures to insure absolute secrecy” (Sullivan memorandum, 4/2i/il ; letter from Director. FBI to all Field Offices, 4/28/i?.)

” See IRS Rerlort : “Ot)eration I,enrrchaun.” “The Army lnade its first effort to curb its domestic collection of “civil dis-

turbance” intelligence on the political activities of In-irate citizens in .Jmle 1970. only after press disclosures about the 1)rogram wiiirh prompted two Congres- sional committres to schedule hearings on the matter. “C’ONl~S Intelligrnre :

(Christopher Pyle, The -1rrny Watrhes (‘irilian Politics” Il’an7tiagton

Monthly, January 1970.) Despite legal opinions, both from inside and outside the Army, that domestic radio monitoring hi the Army Srcurit.r Agency was illegal, the Army did not move to terminate the program until after the media revealed that the Army Security Agency had monitored radio transmissions during the 19668 Ijemncratir Satinnal Convention (Jlemnrandum from Army Assistant Chief of Staff for Intelligence to the Armr General Counsel re : TYPARA Covert Activities in Civil Disturbance Control Operations.) Department of Defense controls on domestic surveillance were not imposed until March 1971, after KBC News rppnrted that the Army had placed Senator Adlai Stevenson III and Congress- man Abner Mikva under surveillance. (NBC Sews, “First Tuesday”, 12/l/70.)

in This involved nine of the so-called “17” wiretaps in February 1971. (Report of the Committee on the Judiciary, House of Representatives, S/20/75, pp. 148, 149. )

“This included nine of the so-called “17” wiretaps in February 1971. In response to the storm of public and congressional criticism engendered by a press account of CIA support for a student organization, President Johnson appointed a Committee, chaired by then Pnder AecretarF of State Nicholas Katzenbnch. to review government activities that “endanger the integrity and independence” of United States educational and private voluntary organizations which operate abroad. In March 1967, the Committee recommended “that no fed- eral agency shall provide any covert financial assistance or support, direct or

(Continued)

Page 302: Church Committee: Reports-- Book II

286

revocation of approval for tile Hnston Plan out of concwn for the risk of disclosui~e of tlw possible illegal actions l~~o~~osccl and tile fact that “tlwir s&sitirity would likely they were employrd ;” 7

generate media criticism if 9 ,J. E:tlgar Hoover’s cessation of the bugging

of Dr. Martin Luther I<inp, ,Jr.‘s llotel rooms after tlw initiation of a Senate investigation cllaiwcl by II:dward r. Long of Missouri : *O and tlrr CT;\‘s considwation of suslwncling mail-olwning until tile Long inquiry abated and erentnal termination of tile l~~*og~m “in tllr Water- gate climate.” *I Mow recciit1-y. se\~~ral qwstionablr domestic intclli- pence practices Ilaw been terminated at least in part as a iwnlt of Congressional investigatioii.a2

(Continued) indirect, to any of the nation’s educational or prirate voluntary organizations.” The CIA responded with a major review of surh projects.

The quesstion of the nature and extent of the CIA’s compliance with the Katzenbach guidelines is discussed in the Committee’s Foreign Intelligence Report.

” Response by Richard Sixosn to Interrogatory Sumber li posed by Senate Select Committee.

8o On January 7, 1966, in response to Associate Director Tolsnn’s recommenda- tion, Director Hoover “&serre[dl final decision” about whether to disrnntinue all microphone surveillance of Dr. King “until DeLnach sees [Senator Edward V.] Long.” (Memorandum from Sulliranto DeLoach, l/21/66.) The only occasion on which the FBI Director rejected a recommendation for bugging a hotel room of Dr. King’s was .Tanuary 21. 1966. the same day that Assistant Director De- Loach met &th an aide to SellatoP Lone to tro to head off the Lone Committee’s hearings on the subject of FBI “bngs”land taps. (Memorandum from DeLnach to Tolsnn, l/21/66.) When DeLoach returned from the meeting, he reported:

“While we hare neutralized the threat of being embarrassed by the Long Subcommittee. we hare not yet eliminated certain dangers which might be created as a iesult of newspaper pressure on Long. We tllerefnl’e must k&p 011 lop of this situation at all times.” (JIemnrandum. Executives Conference to the Director, l/7/66.)

Another possible explanation for Hoover’s cemation of the King hotel bugging is found in the impact of a memorandum from the Solicitor General in the Black case which Hoover apparently interpreted as a restriction upon the @‘RI’s authority to conduct microphone surveillance. (Supplemental memorandum for the [-nited States, U.S. r. Black, submitted by Solicitor General Thurgood Marshall, 7/13/66: Katzenbach, 10/11/7.?. p. 5%)

m In 196& the Long Subcommittee investigation caused the CIA to con- sider whether its major mail opening “operations should be partially or fully suspended until the subcommittee’s investigations are completed.” When the CIA contacted Chief Postal Inspector Henry Jlontague and learned that he be- liered that the Long investigation would “soon cool off,” it Fas decided to con- tinue the oneration. (Memorandum to the filrs br “CIA officer.” 4/23/G.)

Despite continued apprehensions about the “flap potential”” of’ exr)owre and repeated recognition of its illegality, the actual termination of the CIA’s Xew York mail-opening project came, according to CIA Office of Security Direc- tor Howard Osborn because: “1 thought it n:as illegal and in the W&ergate climate we had absolutely no business doing this.” (Howard Osborn deposition, 8/28/i’s, p. 89.) He discussed the matter with William Colby who agreed that the project was illegal and should not be continued, “particularly in a climate of that type.” (Osborn deposition, 8/28/7& p. 90.)

m Shortly after the Senate Select Committee on Intelligence Activities held hearings on the laxity of the system for disclosure of tax return information to United States attorneys, the practice n-as changed. In October 1978, U.S. Attorneys requesting tax return information were required by the IRS to Droride a sufficient exnlanation of the need for the information and the;ntended use to which it-would be put to enable IRS tn ascertain the validity of the request. Operation SHAMROCK. SSA’s program of obtaining millions of international telegrams, was terminated in Nay 1975, according to a senior XSA official. nrimarilr because it was no lower a valuable source of foreign intelligence ‘and because the Senate Select Committee’s investigation of ti;e program had increased the risk of exposure. (Staff summarS of “senior SSA n5cial” interview, g/17/75, p. 3.)

Page 303: Church Committee: Reports-- Book II

287

There arc several prominent instances of twminations n-hicll ye- sl1ltcd from an intc~nal ye\-iev- l~~ocess :

--In August. 1973. slioi*tly after taking ofh. Internal Iicwnne Service (‘on~missionc~ Ihii:~ltl Alcswnclc~ ;~bolislictl the Hlxcial Service Staff ilpon lcnlnin,, 0 that it was engaged in political intelligence ncti\.i- ties wlllch lx conslclcrecl b~antitlwticnl to proper tax atliniiiist~atioii.” S3

--An internal legal review in 1!)73 prompted the teixiination of the joint effort h$ X;SA and (‘IA t 0 monitor T’nited States-Soutli .hicri- Can communications by intlivicluals iiamctl on n thg trafic “n-ntcl~ list.” 84

--On May 9, 19’3, newly al)l)ointe~l (‘I,1 Ihrevtor ,J:~mrs Schle- singer iqiicstctl from CIA1 p~~rsoiii~~l ail invciitory of all ‘bqnestionablo activities” n-liicll tile A1gellCy lliltl ll1lCl~lti~l<~ll. ‘I’llc 694 pi\geS Of IllClllO-

lYtlltl% wccivd iii i~eslxmsc‘ to this quest-which lwxlii~ kliowii at

the C’IA as ‘b’~lle I~amily ,Jr\~els”-l)l,ollIl,tcltl the terlllillation or limi- tdion of n number of programs which were in violation of the the A1gency’s mandate, notably- the (‘HAOS project involving intclli- pence-g:itlicrinp against A\mr~i~aii citizens.hz

-In the ca1*1.~ l!Mk, the C’IAL’s JlK~~J~TII,~ testing pqyxm, whicll involrrd suri,rptitionsly administei~ing tllngs to unwitting l~ei’sons,

XI 1)onald Alexnuder testimony, lo/%/Xi, Hearings, Vol. 3, 1). 8. Alexander testi- fied, however, that in a meeting with IRS administrators ou the day after he took office, the SSS was discussed, and “full disclosure” was uot made to him. Prior to the I,eI~rcclu~un revelations, Commissioner A1lexnudrr had also initiated a gen- eral review of IRS iilforillatioii-gatheriIlg and retrieval systems, and he had al- ready suspended certain types of inforlllRtion-gatliering due to discovery of vast quantities of non-tax-related material. (Alexander, 10/2/Z, Hearings, Vol. 3, pp. t+lO. )

Another termination due to internal review took l~lace at IRS in 1968. The Chief of the Disclosure Branch terminated what he cousidered the “illegal” pro- vision of tax return information to the FRI Ijy another IRS 1)ivision. (IRS ~Iemor:nidum, I). 0. Virdin to Harold Snyder, ,7/2/W. ) I mring this same ljeriod, the (‘IA was also obtaining returns in a manner similar to the FBI (though in much smaller numbers), yet no one in the Intelligence Division or elsewhere iu the Compliance 1)irision apparently thought to esamine that prar- tice in light of the change being made iu the practice with reslwrt to the FBI. (Donald 0. Virdin testimony, O/16/76. pp. 69-73.)

N The CIA susnended its narticination in the nrogram as a result of an oninion 1)~ its General ‘Counsel, Lawrence Houston, t̂ ha< the intercepts were ikegal. (JIemorandum from Houston to Acting Chief of 1)irision. l/20/73.) Shortl> thereafter. SAS.1 reviewed the legality and appropriateness of its own involvement in what was essentially a law enforcement effort Ilr the Bureau of Sarcotics and Dangerous Drues rather than a foreian intelligence uroeram. which is the only a&ioriz.ed l,rZvince for SS.1 0peratioYis. (‘*Se&r SSk &iciai depositlion.” O/16/55, 1). 10.) In .Juue 10i3 the Director of SSA terminated the drug watch list, several months after the CIA had terminated its own intercent 1)rogrnm. SSA’s drug watch list activity had been in operation since 1070. (Allen, lO/‘L’9/iZ, Hearings, Vol. 5, p. 23.)

In the fall of 19X, SSA terminated the remainder of its watch list activity, which had involved monitoring ~oillminlicatioiis by individuals targeted for SSA by other agencies including CIA, I’III, and IISI)I). In response to the Keith case and to another case which threatened to disclose the existence of the SSA watch list, SSA and the Justice I)epartment had begun to reconsider the propriety of the program. The review process culminated in termination. See KSh Report : Trrlllillatioll of Civil Disturbance VVntcli I,ist.

s Schlesinger described his review of “grry area activities” which were “per- haps lrpnl. lwrhnl)s not legal” as a part of “the cnhanccrl rffort that came in tllcb wake of U’atrrgate” for oversight of the 1)rol)riet.v of Government activities. (S,chlesingrr testimony. Rockefeller Commission. R/5/i5. pp. 114, 116.) Schlesinger testified that his reqne~t for the reporting of “cluestioiial~le activities” came after

(Continued)

Page 304: Church Committee: Reports-- Book II

288

WRS *.f l’ozcn” after the Inspector General questioned the morality and lack of acllllinist~~ati\-e control of the l)rogram.R5L

--Scvcr~al mail-opening operations were terminated because they laclrcd sufficient~ intelligence value, wllich was often measured in rela- tion to the “flap potential”-or risk of disclosure--of an operation. However, both the CIA and the FBI continuetl other mail-opening operat,ions after these terminations.8G

The Committee’s examination of the circumstances surrouncling terminations of a wide range of improper or illegal domestic intclli- pence. activities clearly points to the need for mow effective oversight from outside the agencies. In too many cases. the impetus for the ter- mination of propxms of obviously questionable propriety came from the press or the Congress rather than from intelligence agency admin- istrators or their superiors in the Executive I3ranch. Although there were several laudable instances of termination as a responsi’ble out- growth of an agcnc;v’s internal review pwces+ the Committee’s record

indicates that this process alone is insufficient-intelligence agencies cannot be left to police thcmsel~es.

(Continued) learning that “there \vas this whole set of relationships” between the CIA and White House “plumber” E. Howard Hunt, Jr.. ahout which Schlesinger had not heen briefed comnletelv unon assuming his uosition. (Schlesinger. RockefeIIer Commission testin~ony,~ p. 315.) “As a consequence.” &hlesinger “insisted that all people come forward” with “angthing to do with the Watergate affair” and any other arguably improper or illegal operations. (Schlesinger, Rockefeller Commission, R/S/75, p. 116.)

gia After the Inspector General’s survev of the Technical Services Division, he recommended termination of the testing program. (Earman memorandum, 5/5/63.) The program was then suspended pending resolution at. the highest levels within the CIA of the issues nrrsentrd bv the uroeram-“the risks of embarrassment to the Agency. couple<; with the moral p;obGm.” (Jlemorandum from DDP Helms to DC1 McCone. Q/4/65.) In response to the IG Report, DDP Helms recommended to DC1 JIcCone that unwitting testing continue. Helms maintained that the program could be conducted in a “se&e and effective manner” and heliered it “necessary that the Agenry maintain a central role in this activity, keep current on enemy capabilities in the manipulation of human behavior. and maintain an offensive canabilitv.” (JIemorandun~ from Helms to DC1 3IcConr. s/19/63.) The Acting DC1 deferred decision on the matter and directed TSD in the meantime to “continue the freeze on unwitting testing.” (CIA memorandum to Senate Select Commitee. received S/4/75.) Becording to a CIA rennrt to the Select Committee :

“With‘the destruction of the JIKI’LTRA files in ear1.v 1973, it is believed that there are no definitive records in CIA that would record the termination of the program for testing heharinral drugs on unwitting persons. . There is no record to our knowledge. that [the] freeze was ever lifted.” (CIA memorandum to Senate Selert Committee. received g/4/75. )

Testimony from the CL4 officials involved confirmed that the testing was not resumed. (S:re Foreign and Military Intelligence Report.)

@Two FRI mail-opening programs were suspended for security reasons in- volving changes in local postal personnel and never reinstituted, on the theory that the value of the programs did not justify the risk involved. (Memorandum from San Francisco Firld Office to FRT Headquarters, 5/19/66.) The CIA’s ,San Francisco mail-opening project “was terminated since the risk factor outweighed continuing an activity which had a1read.v arhiered its objectives.” (Memorandum to Chief. East Asia Division. June 1973.) The lack of any significant intelligence value to the CIA apparently led to the termination of the ?;ew Orleans mail- opening program. (Memorandum from “Identity 13” to Deputy Director of Se curitg. 19/9/5i.) Three other yrn,crams were terminated herause they had pro- d~tccd no valuable cn~~nterintelligencr information. while diverting manpower needed for other operations.

Page 305: Church Committee: Reports-- Book II

The findings us that the Go\

which have wnergctl from our investigation convince .crnment’s domestic intelligence policies and practices

require funtlamcntal reform. We have attcmptrtl to set out the basic facts: now it is tinlr for (longi~rss to turn its attention to IegisI,ating restraints upon intelligence activities which may endanger the consti- tutional rights of Americans.

The Conm~ittrr’s fundamental conclusion is that intelligence activ- ities hare untlermined the constitutional rights of citizens and that they have done so primarilp because checks and balances designed by the framers of the Constitution to assure accountability have not been applied.

Before examining that conclusion, we make the following observa- tions.

--While nearly all of our findiq focus on excesses and things that went wrong, we do not question the need for lawful domestic inteIIiprncc. We recognize that, certain intelligence activities serve perfectly proper anal clearly necessary ends of government. Surely, catching spies and stopping crime, including acts of terrorism, ‘is essential to insure “domestic tranquility” and to “provide for the common defense.” Therefore, the power of government to conduct p7*ope7’ domestic intelligence activities under effective restraints and controls must be preserved.

-We are aware that the few earlier efforts to limit domestic intel- ligence activities have proven inef&ctual. This pattern reinforces the need for statutory restraints coupled with much more effective over- sight from all branches of the Government.

-The crescendo of improper intelligence activity in the latter part of the 1960s and the early 1970s shows what we must watch out for: In time of crisis, the Government will exercise its power to concluct domestic inteIIi.gence activities to the fullest extent. The distinction between lqal dissent and criminal conduct is easilv forgotten. Our job is tn recommend means to help ensure that the disiinction will always be observed.

-In an era where the technological capability of Government relentlessly increases. we must be. wary abollt the drift toward “big brother government.” The potential for abuse is awesome and re- quires special attention to fashioning restraints which not only cure past problems but anticipate and prevent the future misuse of technology.

--We cannot dismiss n-hat we have found as isolated acts which were limited in time and confined to a few willful men. The failures to obey the law and. in the words of the oath of office. to “preserve, pro- tect, and defend” the Constitution, have occurred repeatedly through- out administrations of both political parties going back four decades.

(289)

Page 306: Church Committee: Reports-- Book II

290

-We must acknox-ledge that the asaipnment which the C2orernment has given to the intelligence communit\- has. in many ways. been impossible to fulfill. Tt has been expected to predict or prevent every crisis. resl~on~l imniediatyly with information on an? qiicstion, act to meet all threats. and anticipate the special needs of Presidents. A\nd then it. is chastisetl for its zeal. Certainly, a fair assessment must plare a major part of the blame upon the failures of senior executive officials ant1 collplws.

In the final analysis, hoverer. the purpose of this Committee’s work is not to allocate blame among individuals. Indeed. to focns on per- sonal culpability may divert attention from the underlying institn- tional causes and thus nia~ become an excuse for inaction.

Before this investigation. domestic intelligence had never been systematically siwve\-etl. For the first time, the Gorernment’s domestic sur\-eillance programs. as they have developed over the past forty years, can be measured against the values which our Constitution seeks to preserve arid protwt. hsed iipo~i 0771’ full record, and the findings which we hare set fortll in Part TIT above. the Committee concludes that :

Our findings and the detailed reports which supplement this rolullle

set. forth a massire record of intelligence abuses over the years. Through a vast network of informants. and through the uncontrolled or illegal use of intrusive teclinicIi7es-raJigilig from simple theft t0

sophisticated electronic surrrillance-the Go\-ernment has collected, and then used iniIn~operlr. huge aniounts of information about the private lives. political beliefs and associations of numerous Americans.

Affect L’pow Comfitutiow/7 Rights.-That these abuses hare ad- versely affected the constitutional rights of particular Americnns is beyond question. nut we believe tlw IMJ-JJI cstends far beyond the citi- zens directly affected.

Personal privacy is protected because it is essential to liberty and the pursuit of happiness. Our Constitution checks the power of Gorern- ment for the pqose of protecting the rights of individuals. in order that all our citizens may live in a free and decent society. T’nlike totalitarian states. we do not beliew that any go\-ernnient has a moJiop-

ol\- 011 t rnt11.

When Government, infringes those rights instead of nurturing. and protecting them. the injury sprea~ls far beyond the particular crtizrns targeted to untold numbers of other Americans who map be intimidated.

Free gorernment depends 711’0~1 the ability of all its citizens to speak their JlliJlds Kitlloiit fcaJ. of official sanction. The ability of ordinary people to be heard by their Icntlcrs JJw~J~s that they must be free to join in groups in order nio~‘e tffrctivcly to express their grievances.

Constit7rtior7:7l snfcg77:7Jds :~JT ncetlccl to protect the timid as well as the courageous, the weak as well as the strong. 1Yliilt niany -\mcricans hare been willmg to assert their beliefs in the face of possible govern-

Page 307: Church Committee: Reports-- Book II

291

mental reprisals, no citizen should hare to weigh his or her desire to esprrss an opinion, or join a group. a,, winst the risk of liar-ing la1vfnl speech or association used against him.

Persons most intinlidatetl may well not be those at the extremes of the political spectrum, but rather those ne:irer the mitldle. Yet voices of moclcrntion are vital to balance public debate and al-oid polarization of our socirtv.

The fede& gorernment has recently been looked to for answers to nearly every problenl. The result has been a vast centralization of power. Plwh power can be turned against the r&hts of the people. 37aii~ of the restraints iniposed by the Constitiitlon were designed t’0

guar’d a?ainst sncll 11s~ of power by tile gorcrnment. Since the end of World War IT . gowrnmentnl power has been in-

creasingly escrcisrd through a proliferation of federal intelligence programs. The Vera size of this intelligence system. multiplies the ol~portnnities for misuse.

Esposiire of the excesses of this huge structure has bcfn necessary. Americans are now aware of the capability and proven willingness of their Government to collect intelligence about their lawful activities and associations. What some siispectrcl and others feared has turned oiit to be largely true-vigorous expression of unpopiilar views. associ- ation with dissenting groups. participation in peaceful protest actiri- ties. liaw pi~o~oltcd both gorcrnmtnt surveillance and retaliation.

Over twenty years ago. Supreme Court ,Justicr Robert dackcon. previously an -1ttornry G3ieral. warned against growth of a cent.ral- izetl power of inwstigation. Without clear limits, a frdcral investlga- til-e agency would “haw rnonpli on enough pcoplr" so that “even if it tlocs not rlwt to prosecute thrm ” the Go\-ernmrnt would. he wrote. still “find no opposition to its l,olicies”. Jackson added, “Even those who arr snl)l,osed to suprrrisr ~intrlliprnce agencirs] are likely to fear [them].” His adrice speaks directly to our responsibilities today :

I belicw that the saf~gnnrd of our librrty lies in limiting any national police or investigative organization. first of all to a small numbrr of strictly fedrral offrnses. and secondly to nonpolitical onrs. Tllr fact that we may haw confidence in the administration of a fetlrral inrrstipa’tirc agency under its existing head does not mean that it may not revert again to the dars n-hrn the Department of ,Justice was headed by men to whom the investigative power n-as a weapon to be used for their own p~irposes.~

Fnilwc fo 9p7)7?/ PJlecfis cr?w? Rn7~~~cr,s.-Thr natural tendency of Government is toward abuse of power. Men entriistrd with power, even those aware of its dangers. tend. particularly when pressured, to slight librrty.

Our constitutional svstrm guards against this tendency. It establishes many different checks npnn polyer. It is those wisp restraints which keep mrn frre. In the fieltl of intelligence those rrstraints havr too often been ignored.

Page 308: Church Committee: Reports-- Book II

292

The three main depnrtnrrs in the intelligence field from tile consti- tutional plan for cnntrnllin,g ab~iw of power have been :

(II) l?mcssi7~ l?nwt~fiw POIWI-.-Tn a sms:c the ,yrnwth of domes- tic intelligence activities mirrnrcd the ,rrrnwth of presidential powc1 generally. But more than any other activity. n10rc t\-rn than eserciw of thr war pn~er. intelligence activities have been left to the control of the l?secntire.

For decades Conrrrrss and the cnnrts as n-cl1 ns the press and the public have accepted the notion that the control of intelligence actiri- ties was tllc rxcliisirc i2rero,~atirr of the Chief Esccntiw and his stir- ro,r”ates. The exrrciw of this pnvcr KCIS not cluestinned or cl-en inqnired into hr outsiders. Indeed. at times the poGr was seen as flowing not from the law. but as inherent in the Presidencv. Ihntcrer the throrr. the fact was that intclli,~encr activities were cssentinllr exempted from the normal srstem of ~~hccl~s and balances.

Qwh Ewcntiro powr, not, founded in law or checked bv Congress or the courts, contained the seeds of abuse and its growth was to be t?xp,rctra.

(71) Bwcssiw Srrwo~.-Abner thrires on secrccv. ObvinnslT, public disclncllrc of matters snrh as the names of intellikence awnts nr the technolngi~rnl details of collection methnrls is inapprnpriwtr. T3iit in the field of intelliwncc. secrcw has been extended to inhibit rcriew of the basic l>rn,yranis and prRcticestliemselres.

Those within the Execntirr branch and the Congress who wmld exercise their responsibilities n-iwly must be flllk informed. The r\mcricnn public. as well. shnnlrl know c~noiigh about intelli,~enrr nctiv- ities to bn able to apply its pond scnsc to the imdcrl!-ing issncs of policy and morality.

Knnwledpc is the kev to control. Sccrccy shnnlrl no 1n1qcr be al- inn-cd to shield the existence nf constitutional. lc~al and moral prnb- lcms from the scrutinv of all thrrc branches of gnvcrnmrnt or from the ~~mrricwn jwnplr thrmsclws.

(c) A47~oi~n7~rc of the Z?117p of L;n7c~.-Tln~rlrssnrss hr Gnmrnmrnt hrcrds corrosive crnicism among thr prnplr and crndrs the trust upon which gnl-rmment. deprnds.

Herr. thrre is no snrrreipn who stands abnrr thr law. Each of 11s. from prrsidents to thr most rlisadrantaped citizen. must obry the law.

,\s intc~lligence operations dcl-elnj-wrl, hnwerer. rntinnnlixntions wrr fnshinned to immnnizc them from the restraints of the Bill of Rights and thr snecific prohibitions of the criminal cndr. The rxperience of our investi~ntinn lends iis to cnnclndr that such rationalizations nrc a dangerous drlnsinn.

Althnng4~ our i~ecnmmrndatiniis 2i.c niimeiws and detililrrl. they flow nnturnllu from our basic conclusion. Escrssiw intrlligrnrr activity which ukdrrmines individnnl ri,&ts must encl. The systrm for cnn- trolling intelligrnre must be brnnght bark within the cnnstitiitional schrmr.

Snmr of our prnj,nsnls nw stark and siiilple. R~cnnsc rrrtnin dnmrs- 1:~ intc~lli~cncr nrtiritirs were clrarl\- wrnnr, thr nbviniis solution is to prohibit thrm nltnpcthcr. Thaw. M-C wnuld ban tactics slwh as thnsr nsrtl

Page 309: Church Committee: Reports-- Book II

293

in the FBI’s COTSTT3T,PRO. Put other activities present mow com- plcs problems. We see a clear need to safeguard the constitutional rights of speech, assembly, and privacy. ,it the same time? we do not want to prohibit or unduly restrict necessary and proper intelligence activity.

In seeking to ncconnnoclatc those sometimes conflictins inter&s we have been guided by the earlier efforts of those who originally shaped our nation as a republic under law.

The Constitutional amendments protecting speech and assembly and indiT-idunl pri\-acr seclc to prcscrve ~alncs at the core of our herltagc and vital to our fntnrr. The Bill of Rights, and the Supreme Court’s decisions interpreting it suggest thrtc principles which we hare fol- lowed :

(1) Gowrnmcntwl action which directlr infrinpes the rights of free speech and association must be prohibited. The First Amend- inent rcrog-nizcs that even if ustful to a proper end. certain gorern- mrntal actions are simply too dangerous to permit at all. It. commands that ‘Yongrrss shall make 710 law” abridging freedom of speech or assembly.

(2) The Supreme Court, in intrrprcting that command, has required that any go\-ernmcntal action which has a collateral (rather than rlirect) impact upon thr rights of speech and assembly is permissible onlr if it meets two tests. First. the action must be undertaken 0111y to fulfill a compellin, ~ v governmental need. and second, the govcrnment must use the least restrictive means to meet that need. The effect upon protected interests must be minimized.2

(3) Procedural safeguards--“auxiliary precautions” as t.hey were characterized in the Federalist Papers 3-must. be adopted along with substantive restraints. For esamplr. while the Fourth Amendment prohibits only 5inreasona1~1e” searches and seizures. it requires a pro- cedural checlr for rrnsonnblcness-the obtaining of a judicial warrant upon probable cause from a neutral magistrate. Our proposed pro- cedural checks ranpe from indicial review of intelligence Iactivity before or aftrr the fact. to formal and high level Executive branch approval. to greater disclosure and more effective Congressional oversight.

The Committee believes that its recommendations should be em- bodied in a comprchensiw lecislntire charter defining and control- ling the domestic. security activities of the Federal Government. AC- cortlingly, Psart i of the recommendations provides that intelligence agencies must be made subject to the rule of law. In addition, Part i nlaltes clear that no theory, of “inherent constitutional authority” or otherwise. can justify the violation of any statute.

Starting from the conclusion, based upon our record, that the Con- stitnt.ion and our fundamental values require a substantial cnrtailmentj

V.S. 539. 546 (1962) : &‘hrltw v. T?rrkcr. 364 U.S. 479,488 (1960). ’ Madison, Federalist No. 51. Madison made the point with grace : “If men Two angels:. no government would he necessary. If angels were to

govern men. neither external nor internal controls on government would he neces- sary. In framing a government. whirh is to he administered hy men over men. the great difficnlty lies in this: you must first enable the gnrernmrnt to control the governed; and in the next place oblige it to control itself. A dependence on the people is, no doubt, the primary control on the government ; hut experience has taught mankind the necessity of auxiliary precautions.”

Page 310: Church Committee: Reports-- Book II

294

of the scope of domestic surveillance, we deal after Part i with five basic questions :

1. Which ap’ncics should conduct domestic security inresti,rrations? The FBI should be primarily responsible for such investigations.

Vnder the minimization principle, and to facilitate the control of domestic intelligence operations, only one agencv should be involved in investigative activities which. even when limited as we propose, could give rise to abusr. Accordin@y, Part ii of these reconlmenda- tions reflects the Committee% position that foreign intelligence agen- cies (the CTAL XSA. and the military agencies) should be precluded from domestic security activity in the Vnited States. Moreover, they should only become involved in matters involving the rights of Amer- icans abroad where it is impractical to use the FBI, or where in the course of their lawful foreign intelligence operations 4 they inadrer- tently collect, information relevant to domestic security investigations. Tn Part iii the Committee rcconiniends that non-intelligence agcn- ties such as the Internal Revenue Service and the Post Office be re- qired, in the, course of any incidental involvement in domestic se- curity investigations, to protect the privacy which citizens expect. of first class mail and tax records entrusted to those agencies.

2. When should an American be the subject of an investigation at all; and when can particularly intrusive covert techniques, such as electronic surveillance or informants, be used?

In P’art iv. which deals with the FRI. the Committee’s recommen- dations seek to prevent, the excessively broad, ill-defined and open ended investijintions showi to have been conducted over the past four decades. We attempt to change the focus of investigations from con- stitutionally protected advocacy and association to dangerous con- duct. Part iv also sets forth specific. substantive standards for. and procedural controls on, particular intrusive techniques.

3. Who should be accountable within the Executive branch for en- suring that intelligence apcncies comply with the law and for the investiration of alleged abuses bv employees of those agcncics?

In Parts v and vi, the Committee recommends that these respon- sibilities fall initially upon the agency heads, their general counsel and inspectors general, but ultimately upon the Attorney General. The information necessary for control must be made available to those responsible for control, oversight and review; and their responsibili- ties must be made clear, formal. and fixed.

4. V7hat is the appropriate role of the courts8 Tn Part vii. the Conmlittce recomincnds tht enactment of a com-

prehensive civil remedy providing the courts with jurisdiction to entertain legitimate complaints by citizens injured by unconstitutional or illegal activities of intclligcnce agencies. Part viii suggests that criminal penalties should attach in cases of gross abuse. In addition, Part iv prnvi~les for judicial warrants befot% certain intrusive tech- niques can be used.

5. What is the appropriate role of Congress : In Part xii the, Comnrittee reiterates its position that the Senate

create a permanent, intelligence oversight committee. The recommendations deal with nnmcrons other issues such as the

proposed repeal or amendment of the Smith ,I&, the proposed mod-

’ Directed primarily at foreigners abroad.

Page 311: Church Committee: Reports-- Book II

295

ernization of the Espionage Act, to cover modern forms of espionage srriouslv detrimental to the national interest. the use of the GA40 to assist C’ongrcssionnl ovcrsi.ght of the intelligence community, and rt- nlctlinl n~casurcs for l)a.+ \-lctims of inll)roper intclligcncf activity.

~C~opc of h’croml72.cnc~nfiol,.~.-Tlle scope of our recommendations coincides \iTith the scolw of 0111‘ investigation. We examined the FI31, which has lwen rcspon~ible for most domestic security investigations. as well as foreign and military intclligcncc agencies. the IRS, and the Post Office, to the extent they became in\.olwd incidentally in domestic intelligence functions. While there are undoubtedly activi- ties of other agencies which might legitimately be addressed in these recommcndntiol~s. the Committee simple dicl not hare the time or re- sources to conduct a broader investigation. Furthermore, the mandate of Senate Resolution 21 required that the Committee exclude from the coverage of its recommendations those activities of the federal government which are directed at organized crime and narcotics.

The Committee believes that American citizens should not 10~ their constitutional rights to be free from improper intrusion by their Gowrnment, when they trawl overseas. ,Qccordingly, the Committee proposes recommendations which apply to protect the rights of Amer- icans abroad as well as at home.

1. ,4rti7*iti~s Porn-ed The Domestic Intelligence Recommendations pertain to : the domes-

tic security activities of the federal government; 5 and any act.ivities of military or foreign intelljgence agencies which affect the rights of Americans F and any intelligence activities of any non-intelligence agency working in concert with intelligence agencies, which affect those rights.

2. Activities Not Cowred The recommendations are not, designed to control federal investiga-

tire activities directed at organized crime, narcotics, or other law en- forcement investigations unrelated to domestic security activities.

3. Agmcies Co?-ered The agencies whose activities are specifically covered by the recom-

mendati&s are :

(i) the Federal Bureau of Investigation; (ii) the Central Intelligence Agency ; (iii) the Kat.ional Security Agency and other intelligence agencies of the Department, of De-

’ “Domestic security activities” means federal gorernmental activities, di- rected ncrainst ,Ymericans or conducted within the United States or its territories, inclncling enforcement of the criminal lay intended to (a) protect the IJnited States from hostile foreign intelligence activity, including espionage ; (1)) pro- tect the federal, state, and local governments from domestic violence or rioting ; and (c) protect Americans and their government from terrorist activity. See Part xiii of the recommendations and conclusions for all the definitions used in the recommendations.

’ “Americans” means U.S. citizens, resident aliens and unincorporated asso- ciations, composed primarily of U.S. citizens or resident aliens; and corpora- tions. incornorated or having their nrincinal nlace of business in the TJnited Stat& or having. majority o&ership ily U.S. citizens, or resident aliens, includ- ing foreign subsidiaries of such corporations, provided, however, Americans does not include corporations directed by foreign governments or organizations.

Page 312: Church Committee: Reports-- Book II

296

fense; (iv) the Internal Revenue Service: and (v) the I-nited States Postal Service.

TT’hile it might be approprisate to provide siniilar detailed trratmcnt to the activities of other agencies. sllch as the Sccrct Service. Customs 8ervice. and Alcohol, Tobacco. and Firearms T)i\-Lion (Treasury Department), the Committee did not study these agencies intensively. .4 permanent oversight comniit’tec should in\-rstigate and stud\- the intcllipcncr functions of those agencies’and the effect of their actlr-ities on the rights of Americans.

4. Indiwct P~~ohibitionn Except, as specifically pro\-ided herein, these Reconllnrndatiolls are

intended to prohibit an\- agency from doing indirectly that which it n-onld bn prohibited front doing dircctl>-. Specifically, no agency COV- erctl by these Recollllllelldntiolls should request or mduce an: other agency. or laiiv person. whether the agency or person is Amcrlcan or foreign, to en-gage in any activitv which the requesting or inducing agency is prohibited from doing i&elf.

5. Indi7*iclun7.s rind Groups A’ot Covered Xscept, as spccificallv provided hrrein, these Recommendations do

not apply to investigation of foreigners i who are oficels or employees of a forGign power, or foreigners who? pursnant to the direction of a foreign pan-er, are engaged in or about to engage in %ostilt foreign intelligence a&&y” or “terrorist activity”.8

6. Gcogmphic scope Theso Recommelldatiolls apply to intelligence actirities which af-

fe.ct, the r$hts of ,1mericans \I-hether ‘at home or abroad, including all domcst lc security ‘activities within the TTnited Sltatrs.

7. LegkZatiw E~znctmwt of Recomme~zdations Most of these Recomnlendatiolls are designed to be implemented in

the form of lcgisla~tion and others in the forni of regulations pursuant to statute. (Rt~conllllentlations 85 and 90 are not proposetl to be impje- mented by statute.

(7. r~:rcom nmrt7rrtiom Pursuant to the requirements of Senate Resolution 21. these recom-

mendations set forth the new congressional legislation [the Commit- tee] tlecnls necessary to ‘%afrguard the rights of -1nierican citizens.” 9 We bcliew these rccollllrlendatiolls are the ~appropriate conclusion to a traumatic year of disclosures of abuses. We hope they will prevent such abuses ii1 the future.

i. Intelligence Agencies Are Subject to the Ru7e of Law E.s+ablishin,n a legal frnmcn-ark for agencies engaged in domestic

security investigation is the most fundanlcnt~al reform needed to end the long history of violating ant1 ignoring the law s& forth in Finding A. The legal framework can be created by a two-stage process of enabling legislation and ,atlnlinistratire regulations promulgated to implement the legislation.

’ “Foreigners” means persons and organizations who are not Americans as de- fined abore.

’ These terms. which corer ‘the tn-o areas in which the Commilttee recommends authorizing prerentire intelligence investigations, are defined on pp. 340-341.

8S.Res.21,Sec.5;?(12).

Page 313: Church Committee: Reports-- Book II

297

Hoverer, the Committee proposes that the Congress, in developing this mix of legislative and administrative cha.rters, make clear to the Rsecutivo branch that it n-ill not condone, and does not accept., any

theory of inherent or implied authority to violate the Constitution, the proposed new chtarters, or any other stsatutes. We do not believe the Executive has, or should hlave, the inherent constitutional authority to violate the l,aw or infringe the legal rights of Americans, whether it be a, warrantle,ss break-in into the ,home or office of an American, warrantless electronic surveillance, or ‘a President,? authorization to the FRI to create a massive domestic security program based upon secret oral directives. Certainlv7 there would be no such authority after Congress has, as we propose iIt. should, covered the field by enactment of a comprehensive legislative charter.‘O Therefore statutes enacted pursuant to these recommendations should provide the exclusive legal authority for domestic security activities.

Xecommendation I.--There is no inherent constitutional authority for the Presidenk or any intelligence agency to viol,ate the law.

Recomm.endation, .Z.-It is the intent of t.he Committee that statutes implementing these recommendations provide the exclusive legal authority for federal domestic security activities.

(n) No intelligence agency ma,y engage in such lart.ivities unless anthorizecl by statute, nor may it, permit its employees. informants, or other covert human sources l1 to engage in such act’ivit.ies on its beh’alf.

(6) No executive directive or order may be issued which would conflict v&h such statutes.

Recommendation 3.-In authorizing intelligence agencies to engage in certain activities, it is not intended that, such aut,hority empower agencies: their informants, or covert human sources to violat.e, any pro- hibition enacted pursulant to these Recomendat,ions or cont.ained m the Const.itutzion or in any other Ijaw.

ii. C&ted Staies Foreign ami i!liliitar?/ dgen.cies Shouki Be Preduded from Domestic Secu.rity Act6~itks

Part iv of these RecommendaGons centralizes domestic security in- vestigations mit,hin the FBI. Past abuses also make it necessary that the Central Intelligence Agency, the Xa’tional Security Agency, the Defense Intelligence Agency, and the military departments be pre- c,luded expressly? except. as specifically. provided herein, from investi- gat,ivr activity which is conducted within the United States. Their act.ivities abroad should also be controlled as provided herein to mini- mize their impa& on the rights of Americans.

a. CPntrd Intelligence Agency The CT*4 is responsible for foreign intelligence and counterintelli-

gence. These recommendations mnnmize the impad of CIA opera- tions on Americans. They do not affect, CTA investigations of foreign- ers outside of the United States. The main thrust is to prohibit pa& a&ions revealed as excessive. and to transfer to the FBI otller ac’tivi- ties which might involve the CIA in internal security or law enforce-

” See, c.g., Youngstow?L Sheet and Tube Company v. Snzcuer, 343 C.S. 579 ( 10.5” )

I1 “Corert human s011rces” means undercover agents or inforrilants who are paid or otherwise controlled by an agency.

Page 314: Church Committee: Reports-- Book II

298

ment matters. Those~ limited activities which the CL1 retains are placed under tighter controls.

The Committee’s rccommenrlatio~~s on CTA domestic. ‘activities are similar ‘to Execnti~e Order 11905. They go beyond the Executive Order. however. in that they recommend that the main safegnarcls be mado law. And. in addition. the Committee proposes tighter standards to preclude rcpctition of some past abuses.

General P~*ovisions

The first two Recommendatiol~s pertaining to the. CT,1 provide the context, for more specific proposals. In Recommendation 4. the Coin- mitten endorses the prohibitions of the 1947 Act upon esercise by the CT,1 of subpoena. police or law enforcenlent powers or internal secu- rity functions. The Committee intelIds that Congress supplement, rather than supplai$t or derogate from the more general re&rictions of t.he 1947 Act.

Recommendation 5 clarifies the role of the Director of Cent.ral In- telligence in t.he protection of intelligence sources and methods. He should be charged with “coordinating” the protection of sources and met.hods-that. is, the development of procedures for the protect?on of so~wces and methods.12 (P rima.ry responsibility for investigations of sew&y leaks should reside in the FRI.) Recommendation 5 alsomakes clear that the Director’s responsibilit,y for protwting sources and met,hods does not permit, violations of Ian-. The effect of the new Ex- ecutive Order is substantially t,he same as Recommend&ion 5.

Recom.mendu.tion, &To supplement the prohibitions in the 1947 Na- tional Security Act against. the CIA e.xercisin.g “police: subpoena, law enforcement powers or internal securit.y func,tlons?” the CIA should be prohibited from conducting clomestic security act.ioities within the Thited States. recommendations.

except as specific.ally permitted by these

Zi’ecommrndafio~~ S-The Director of Central Intelligence shonld be made responsible for “coordinat~ing” t.he. protect,ion of sources and methods of the intelligence. community. As head of t.he CIA. the Di- rector should also be responsible in the first instance for the security of CIA fac.ilities, personne.1. operations, and information. Seither func- tion. however, authorizes the Director of Ccnt,ral Intelligence to violate :!ny federal or state law. or to take, any action which is otherwise incon- sistent with statutes implementing these. recommendNations.

CIA Activities Within tJ[p hifed Xtates

1. Tl’irctapping, Xai7 O?>enj?2q and C’nauthoyizd Eufl.y.-The Corn- mittee’s recommendations on CIA domestic. activities apply primarily to actions directed at Americans. However. in Recommendation 6 t&z Committee recommends that the most intrusive and dangerons investi-

u AR noted in the Report on CHAOS, former Directors hare had differing inter- pretations of the l~lillld~te of the 1947 dct to the Director of Central Tntelligenw to protect intelligmcr sources and methods. The Committee ngrees with former Director Willinm Golly that the 1947 ,2ct only authorizes the Ilirector to per- form n “coordinnting” and not an “operational” role.

Page 315: Church Committee: Reports-- Book II

299

pative techniques (electronic surveillance ; I3 mail opening; or unau- t.horized entry 14) should be used in the I-nited States only by the FBI and only pursuant to the judici’al warrant procedures described in Recommendations 53, 54 and 55.

This approach is similar to the I3xecutiv-e order except that the Order permi’ts the CIA to open mail in the United States pursuant to applical~le statutes and regulations (i.e.?, with a warrant). The Com- mittee’s recommendations (see Parts 111 and i\-), places all three techniques-mail opening, electronic surveillance and unauthorized entry-under judicial warrant procedures and cent.ralizes their use witkn the FBI under Attorney General supervision. The Committee sees no justification for distinguishing among these techniques, all of

-&ich represent an exercise of domestic police pen-ers I5 which IS inap- propriate for a U.S. foreign intelligence agency within the 1Jnite.d States and whkh inherently involve special dangers to civil liberties and personal privacy.

2. Other Covert Z'echnipues.-The use of other covert techniques16 by the CIA within cthe United States is sharply restricted by Recom- mentlation 7 to specific situations.

The Committee would permit. the CIA to condnc’t. physical surveil- lance of persons on the premises of its own installat.ions and facilities. Outside of its premises, the Committee would permit the CIA to con- duet limited physical surveillance and confident.ial inquiries of its own employees Ii as part of a preliminary w.2urit.y investigation.

“The activity complett4y prohibited to CIA includes only the interception of communications restricted under the 1968 Safe Streets Act, and would not limit the 71~ of body recorders, or telephone taps or other electronic surveillance where one partr to the communic&ion has given his consent. For example, electronic coverage of a case officer’s meeting with his agent would not be included. The prohibition also is not intended to cover the testing of equipment in the United States, when done with the written approval of the Attorney General and under procedures he has approved to minimize interception of private communications nnd to prer-ent improper dissemination or use of the communications which are unavoidably intercepted in the testing process. Sor does the prohibition preclude the use of countermeasures to detect electronic surveillance mounted against. the CIA, when conducted under general procedures and safeguards approved in writing by the CIA General Counsel.

I4 “ITnauthorized entry” means entrv unauthorized by the target. *‘As part of the CIA’s responsibility for its own security, however, appro-

nriate nersonnel should be nermitted to carrv firearms within the United States not only for courier protection of documents, but also to protect the Director and Deputy Director and defectors and to guard CIA installations.

I8 “Covert techniques” means the collection of -information including col- Iection from records sources not readily available to a private person (except state or loral law enforcement files) in such a manner as not to be detected br the subject. Covert techniques do not include a check of CIA or other federal agency or state and local police records, or a check of credit bureaus for the limited purpose of obtaining non-financial biographical data, i.e.. date and place of birth, to facilitate such name checks. and the subject’s place of emplnSment. Snr do “covert techniques” include interviews with persons knowl- edgeable about the subject conducted on a confidential basis to avoid disclosure of the inquiry to others or to the subject. if he is not vet aware of CIA in- terest in h $rospective relationship, piorided the intert:iew does not involve the provision of information from medical, financial, educational, phone or other confidential records.

17For purposes ,of Yhis section emnlovees includes those emnlorees or con- tractors who wnrk regularly at CIA facilities and have cnmpa&~& access or freedom of movement art CIA facilities as employees of CIA.

Page 316: Church Committee: Reports-- Book II

300

,iltllo@l the Coniinittee g~i~cr;~ll~ &ntrwlixes sncll in\-estigations yitllill the FBI, it n-011ld be too burdellS01llC to require th Ihrenn to il~\-estignt(~ e\-erv alleptioll tllat an clllplO~W ll:lS 1K~K5Oll:ll cliffi- clllties. \vllicll could lilalie liinl :I security risk, or allcgatiolls of SIIS- picions Iwha\-ioi sngystinp the disclosure of inforniatioll. 1icfOlT

ill,-ol\-ing the FIST. tlw (‘II1 coultl contlwt a prelin~ina.ry inquiry. Tvllicll usnall\- consists of notllillg more than inter\-iewi xltll tllC Sllb-

ject.5 o&r (~ollcag,~es, or his family. nci$bors or associates, and l)erll:~l)s confroiitation of the subject himself. Iii soiiie situations. however. liiuitcd 1)liysical surveillance might enable the (‘I&Y t0 K-

sol\-c the allegation or to cleterniine that there was a serious security hreacll involred.

1~nlike the TXsecntire Order, however, the Committee recommenda- tions limit this authority to 1)rescnt CIA employees who are subject to summary dismissal. The only remkdg available to the Government for secnritv problems with past employees is criminal prosecution or other le”gn1 action. -ill security leak investigations for proposed criminal prosecution should be centralizecl in the FBI. Authorizing the use of any covert technique against contractors and their em- ployees. let alone former eml)loyees of CIA contractors. as the Exec- nt,ive Order does, would authorize. CIA surveillance of too large a nnml)er of A\nlericnns. The CIA4 can withdraw security clearances until satisfied by the contractor that a security risk has been remedied and, in serious cases. any investigations conld be handled by the FBI.

The recommendation on the use of covert techniques within the Thited States also precludes the use of covert human sources such as iuidercorer agents and inforniants.lR with one exception csprewly stated to be limited to “exceptional” cases. The Committee would autllorize tile CT.-\ to place an n,yent in a domestic grollp, but only for the ~III*~OS~ of cstablishin,rr crctlible cover to be used in a foreip intelli- pence mission abroad and only when the Director of Central Intelli- gence fill& it to be “essential” to collection of information “vital” to the I-nited States and the -1ttornev General finds that the operation will be conducted under procedllres dckigncd to prevent misuse.1g

Apart from this limited exception. the CT.-\ could not infiltrate gl~o1llE within the I-nited States for yiy piiiyose, including. as was clolw in the past, the pnrported protectlon of intelligence sources ‘aand nlethods or the ge~lcrnl secnritT of the CIA’s facilities and personnel. (The. Esecntive~ Order prohibits infiltration of groups within the T-nitetl States “for p~lrposes of reporting on or inflnencing its activi- ties or members,” bnt does not explicitly prohibit infiltration to pro- tect. intelligence S~IIITCS and nletllods Or the physical security of the agency.)

I8 Recommendation 7 (c) does permit background and other security inresti- gations conducted with government credentials n-hich do not rweal CT.4 in- volvement and. in extremely 3ensitire cases commrrcial or other private identi- ficatinn to avoid disclosure of any government connection.

It would also permit CIA investigators to check the effectiveness of corer operations. without revealing their affiliation. hy means of inquiries at the ricinit,v of pnrticiilar1.r sensitive CIA projects. If in the cnurse of such in- quirieq. unidentified CIA employees or contractors’ employees are ohserred to be endangering the project’s cover, they may be the subject of limited physical

Page 317: Church Committee: Reports-- Book II

301

3. Co77ecfion o,f Inform,nfion.--In addition to limiting the 77~ of particular Covert techniques, the Conm1ktee limits. in Rccon1n1enda- tion 8. the sit77ntions in whicl1 tl1r CTA may intentionally. collect. 11;v any means. information within the United States conccrnmg ilmerl- cans. The recommendation permits tl1e CL1 to collect information n-ithin the United States about Americans onlv with ‘respect to per- sons wo1~l~inp for the CL\ or liaving soi1ic other significant affiliation or contact with CIA. The CIA should not be in tlw b77sincss of inr-estigat- i’fg .~n1rricai1s as intellige11ce or coniite7~i~1telligence t~argets within the I nitctl States-a responsibility wliicli sl1071ltl be centralized in the FBI anti lx9-formc7l only under tlie circumstances l1ropose.d as lawful in Part iv.

The Esccntiw Order only restricts CIA collection of information about ,~nicricans if the information concerns “the domestic activifies of United States citizens.” Unlike the Committee, the Order does not restrict CL% collection of information about. foreign travel or wholly law-f711 international contacts and commu71ication of Americans. AS

tl1e Committee has learned from its study of the CIh’s CHAOS opera- tion. in the. process of gathering informat.ion about the international travel and contacts of Americans, the CIA acquired within the United States a great deal of additional information~about the donlestic activi- ties of Americans.

The Executive Order also permits collection within the United States of information about the domestic activities of Americans in several ot,her instances not permitted under the Committee recom- mendations :

(cl.) Collection of “foreign intelligence or connterintelligence” about the domestic activity of conm1ercial organizations. (The Committee’s restrictions on tlie collw.tion of information apply to investigations of organizations as well as individuals.) ;

(6) Collection of information concerning the identity of persons in contact with CIA employees or with fore$prs who are subjects of a co77i1terii1trllig.rciice inquiry. (Within the I’nited States, the Commit-

surveillance at that time for the sole purpose of ascertaining their identity so that they may be subsequently contacted.

Is Such action poses serious danger of misuse. The preparation may in- volve the agent reporting on his associates so that the CIA ran assess his creden- tials and his observation and reporting ability. This could become an oppor- tunity to collect domestic intelligence on the infiltrated group even vvhen an investigation of that group could not otherwise be commenced under the applic~able standards. Obviously, without restrictions the intelligence Icorn- munitv could use this technique to conduct domestic spying, arguing that the agents were not being “targeted” against the group but were merely preparing for an overseas operation.

This was done, for example, in the use hy Operation CHAOS of agents being provided with radical credentials for use in “Project 2,” a foreign intelligence operation abroad. (See the CHAOS Report and the Rockefeller Commission Report.)

One alternative would be to let the FBI handle the agent while he is pre- paring for overseas assignment. On balance, hovvever, that seems less desir- able. The temptation to use the agent to collect domestic intelligence might be stronger for the agency with domestic security responsibilities-than it ‘&ould for the area division of the CIA concerned with foreign intelligence. Also, im- proper use of the agent to collect such information would be mnre readily identifiable in the context of the foreign intelligence operation run by the CIA than it would in the context of an agent operation run by the Intelligence Division of the FBI.

Page 318: Church Committee: Reports-- Book II

302

tee would require any investigations to collect such information to be conducted by the FBT, n?lcl only if authorized under Part iv, and sub- ject to its procednral controls.).;

(c) Collection of “foreign Intelligence” from R cooperating source within the Iynited States about the domestic activities of Americans.

’ “Foreign intelligence.‘, is an exceedingly broatl and rayic standard. The use of such a standard raises the prospect of another Project CHAIOS. (The Committee vould prohibit such collection by the CIA within the United States, except with respect to persons presently or proswctivrl\- affiliatrcl with CT-L) :

(4) Collection of information about Americans “rrnsonnbly be- lieved” to be acting on Iwhalf of n foreign looms’ or cnFa,rring in inter- national terrorist or narcotic activities. (Thp Committee would IV r(uire investigations to collect such information n-ithin the TTnited States. to be conducted by the FBI. and onl,~- if authorized under Part iv.) :

(r) Collection of information concerning persons considered by the CIA to pose a clear threat to intelligence agency ftlrilities or person- nel, provided such information is retained only by the “threatened” agenyv and that proper coordination is estal~lisl~ed with the FBI. (This was the Iwsis for the Office of Secllrity’s RI;‘,STSTL2SCE Iwo- gram inrestigating dissent throughout the countru.) (The Committee wonld require any such “threat” collection ontsi’dc the CIA be con- ducted by the FBI, crnrl only if authorized by Part iv, or by local law enforcement.)

Recommcndcrtion G.--The CIA shollld not conduct electronic snr- I-eillancc. unauthorized entry. or mail opening lrithin the United States for any purpose.

Rccommpndrrtion 7.-The CIA sl1onld not employ phvsical snrveil- lance. infiltration of proiips or any other covert, techniques against Americans IT-ithin the T’nitcd States except.:

(n) Physical surveillance. of persons on the gronnds of CL% in- stallations :

(6) Physical surveillance during a preliminarv investigation of allegations an rm~~lo~~ is n sccnritv risk for H limited period outside of CIA installations. Such sllrreillance should be conducted only upon written authorization of the Director of Central Intelligence and shonl(1 be limited to the wtbiect of the inr-estirntion and, onlv to the extent necessary to idcntifF them. to persons with whom the siiljject has contact;

(c) Confidential inquiries. during n preliminarv investigation of allegations an emplover is n secnritp risk. of outside sonrces concern- ing medical or fin:ln&nl information about the subject which is rele- vant to those allegations; ls’

(d) The use of identification which does not reveal CTA or govern- ment &iliation. in backgronnd and other security inrestigations per- mitted the CT.1 by these recolnmmrlntioils. and the conduct of checks. which do not reveal CIA1 or gorcrmnent affilintion for the purpose of judging the cffectimness of cover onerations, upon the written nn- thorization of the Director of Central Intelligence;

“a Any further inrentigntions condncted in connection n-ith (b) or Cc) should be conducted by the FBI. and only if authorized by Part iv.

Page 319: Church Committee: Reports-- Book II

303

(p) In exceptional cases, the placement or recruitment of agents \vitIiin an un\vitting tloincstic group solely for the purpose of prepnr- ing thcnl for assignments abroad and only for as long as is ncccssnry to acconlplish that purpose. This should take place onlv if the Director of Central Intelligence makes a written tinding that’ it is essential for foreign intelligence collection of vital importance to the T’nited States, and the Attorney General makrs a written finding that the operation will be conducted under procedures dcsigncd to prrrent misuse of the undisclosed participation or of any information obtained tIierefr0m.20 In the case of any such a&ion, no infornlation received by CL4 from the agent as a result of his position in the group should be disseminn- ted outside the CIA4 unless it indicates felonious criminal conduct, or threat of death or serious bodily harm. in which case dissemination should be permitted to an appropriate official agency if approved by the ,4ttornev General.

Xcco,,,Ine’,,dntion, 8.-The CT,4 should not collect 21 information within the T-nited States concerning ,-\nirricans except :

(n) Information c.oncerning CL4 emnIovees.** CL4 contractors and their’ employees, or applicang for such employment or contracting;

(6) Informat ion concerning individuals or organizations provid- in&, or offering to provide,a as&tance to the CIA ; -

(c) Information concerning individuals or organizations being con- sidered by the CL4 as potent,inI sources of information or assistance ;”

(d) Visitors to CIA facilities ;% (e) Persons otherwise in the immediate vicinity of sensitive CIA

sites ;28 or

tie? ’ ersons who give their informed written consent to such collec-

In (a), (b) and (c) above, information should be collected only if necessary for t.he purpose of determining t.he person’s fitness for em- ployment, contracting or assistance. If, in the course of such collec- tion, information is obta.ined which indicates criminal activity, it should be transmitted to the FRI or ot,her appropriate agency. When an American’s relationship with the CL4 is prospective, information should only be collected if there is a bona fide espec.tat.ion the person might be used by the CIA.

a In addition, the FM should be notified of such insertions. ‘l “Collect” means to gather or initiate the acquisition of information, or to

request it from another agency. It does not include dissemination of information to CIA by another agency acting on its own initiative.

‘a “En~ployees.” as used in this recommendation, would include members of the employee’s immediate family or prospective spouse.

*3 In the case of persons unknown to the CIA who volunteer to provide informa- tion or otherwise request contact with CI.1 personnel, the agency maI conduct a name check before arranging a meeting.

u The CIA may only conduct a name check and confidential interviews of per- sons who know the subject, if the sulrjwt is unaware of CIA interest in him.

2j The CIA may only collect information lry swans of a name check. 28 The CIA may make a name check and determine the place of en&logment

of persons residing or working in the immediate vicinity of sensitive sites, such as persons residing adjacent to premises used for safe houses or defector resettle- ment, or such as proprietors of businesses in premises adjacent to CIA offices in commercial areas.

Page 320: Church Committee: Reports-- Book II

304

CIA ActizGties Outside of fhc T7nitedXtates

The Committee ~onld permit a wider range of CIA activities apainst .1mcricans abroad than it x-onltl Iwiwiit tlic CIA1 to ui~tlri~taltr

within the I’nited States, bnt it. would not permit the CL1 to inwsti- gate abroad the lawful activities of Americans to any greater degree than the FBI could investi.gate such activities at home.

Abroad. the FBI is not m ‘a position to protect the CIA from serious threats to its facilities or pr~~onii~l. or to inwstipate all serious security violations. To the estcnt it is impractical to rely on local law cnforcc- nwnt authorities. the (‘IL! shoultl be free to prcscrve its sccuritv by sprcifie(l :~ppropriwtr inresti,, wtions which mnv iiirolrr ~~me&ans. incliitling siirveillnnce of peiwms other than its own emplorres.

The Committee @T-es to the FBI the sole responsibility &thin the Vnited States for authorized doniestic security investigations of Amer- icans. However. when such an investigation has overseas aspects. the FBI looks to the CIA as the overseas operational arm of the intclli- gence community. The recommendations would authorize the CId to target Americans abroad as part of an authorized investigation ini- tiated by the FRI.

The. Committee does not recommend permitting the CIA itself to initiate such investigations of Americans overseas.” Present commnni- cations permit rapid consultation with the De,partment of ,Jnstice. Moreover, the lesson of CHLIOS is that, an American’s activities abroad may be ambiguous. such as contact with persons n-llo may ‘be acting on behalf of hostile forei,gn powers at an illtcrnatioli:ll conf~iwlc~ on dis- armament. The qucstlon is who shall determine there is snfficicnt, in- formation to justify makin p an -\mcricaii citizen a target of his gal-- ernment’s intelligence apparatus?

The limitations contained in Recommendation 0 0111~ pertain to the CIA initiat.ing investigations or other~~ise intentionally collecting in- formation on Americans abroad. The CL1 wonlId not be prohibited from accepting and passin, (r on information 011 the illegal activities of Americans which the CTA acquires incidentally in the course of its ot,her activities abroad.

The Committee believes that judgments should be centralized with- in the dusticc Department to promote consistent. carefully controlled application of the appropriate standards ‘and protection of Constitn- tional rights. This is the same position taken by Director ‘Colby in setting current CIA policy fos moiintinp operations against LI\merlcans abroad. In JIarch l!fT& Director Colby formally tcrlrlinatcd the CH_%OS program and promulgated new guidelines for fntwc activity abroad inr-olrinp Americans. which. in effect. transferred such respon- sibilities to the Department of Justice.”

n The counterintelligence component of the VI.4 n-onld he ahlr to call to the attention of the FRI any patterns of significance which the CIA thonght war- ranted opening an investigation of an American.

a The gnidelinw state : A. “Whenerer information is nnrorered as n byproduct result of CIA foreign

targeted intelligence or counterintelligence nprrntinn,; abroad which makes Americans suspect for security nr cnnnterintelligenre reasons snrll informn- tion will be reported tc, the FRT specific CIA\ operations will not he mounted against such individuals ; CIA responsibilities thereafter will be restricted to

Page 321: Church Committee: Reports-- Book II

305

The Co17m~ittrc is somewhat more restrictive than the Executive Order with rcsprct to collection of information on ,2111ericans. As men- tioned earlier, the Order onlv restricts CTA collection of information abo77t the “tlonicstic nctiviti’es” of ,\nicricuns and does not prohibit the collection of inforn7ation regartling the lawf711 trawl or interna- tional contacts of l1171cricnn citizens. This creates a particularly significant problcni with respect to CT,4 activities directed against .~mericans abroad.

The Order permits the CIA &er latit71dc abroad than do the Committee’s Reco17711lcndatio17s in two other iniportant respects. The Order perniits collection of information if the ,\777erican is reasonably believetl to be acting on behalf of a foreign power. That exemption on its face woi~ld incl77tle Americans working for a foreign conntry on Inisincss or legal matters or otherwise. rngagetl in ~vholIy lawfnl activities in compliance with applicable registration or other regula- tory stnt77tcs. More importantly. the Order permits the CIA to collect “ ore&n f intelligence” or “counterintelligence” information abroad about the domestic crcfir*itiPs of Americans. The Order then broadly defines “foreign intelligencr” as information abont the intentions or activities of a foreign conntrv or person, or information abont. areas outsitlo thr I-nitctl States. This would a77thorize the CL4 to collect, abroad, for example. information about the domestic activkies of American bnsinessmen m-hi& provided intelligence about business transactions of foreign persons.

The CT.1 dots not at present specifically collect intelligence on the economic activities of -Americans overseas. The Committee suggests that appropriate oversight committees examine the question of the overseas collection of economic intelligence.

Recomn7endatio1~ 11 req77ires the 71~ of all covert techniques be governed by the same standards, procel”res, and approvals required for their 77~ by the J71stice Ikpartment against Americans within the Cnitetl States. Th71s, in the case of eIectronic surveillance, 77nanthor- ized entry. or mail opening. a j71dicial warrant would be reqiiired. Ss a matter of sound Constitutional principle, the Fourth A4mendment protections enjoyed by -1niericans at home sho71ld also apply to pro- tect them against their Government abroad. Tt would be just as offen- sive to have a CIA1 agent bnrplarize an ,~merican’s apartment. in Rome as it ~vould be for the FI31 to do so in Sew York.

Req77irements that a warrant be obtained in the United States would not present an excessive burden. Electronic wrreillance and unauthor- izecl entries are not presently condwted against. Americans abroad withont prior cons77ltation and approval from CL.4 Headquarters in

rqxxting any further intrlligence or counterintelligence aspects to the specific case which crimes to CIL1\‘s attention as a byproduct of its continuing foreign targeted operational nctirity. If the FBI, on the basis of the receipt of the .CIA information. however, specifically requests further information on terrorist or counterintelligencr matters relating to the prirnte nmerican citizens . CIA may respond to written requests by the FBI for clandestine collection ahrond hy (‘IA of infnrmntinn on foreign terrorist or counterintelligence matters inrolring American citizens.”

Page 322: Church Committee: Reports-- Book II

306

La.npley, Yirginia. Moreover, the present Deput? Director of CTh for Operations has testified that bona fide countcn~~tell~grIlce investi- gations are lengthy and time consuming and prior review within the United States. including consultation with the Justice Department, would not be a serious prol~leni. 28 Indcetl electronic surveillance of ,\mericans abroad imder present administration policy also requires approval by the -\ttorney Ge.neral.

The Committee reinforces the general restrictions upon overseas t.argeting of ;1mericans by reconmiendin~ that the CIA4 be prohibited from reqwst.inp a friendlp foreign intelligence service or other person from untlertakiiy actiritles against Americans which the CIA itself nlay not do. This ~onld not, require that a. foreign government’s use of covert techniques be conducted under the same procedures. e.g., warrants, required by those Recomlllendations for the Cr.-i and the FBI. It. would mean that the CTI1 cannot. ask a foreign intelligence service to by the apartment of an American unless the circumstances would permit the TJnited States Government to obtain a judicial war- rant from a Federal Court in this country to conduct such surveillance of the American abroad.

The Committee places greater restrictions upon the CIA’s use of covert techniques against. Americans abroad than does the Executive Order. For example, the Order permits the CL4 to conduct electronic surveillance and unauthorized entries wider “procedures approved by the Attorney General consistent with the law.” No judicial warrant procedure is required. In addit,ion, the Order’s restriction on CIA’s opening mail of Americans is limited to mail “in the I’nited States postal channels.” In other words. under the Order the CL4 is not pre- rented from intercepting abroad and opening a letter mailed by an American to his family. or sent to him from the United States.

The Order also contains no restrictions on the CIA infiltrat.ing a group abroad, even if it were one composed entirely of ,Ymericans engaged in wholly lawful activit.ies such as a political club of Bmeri- can students in Paris. Furthermore, the Order permits the CIA to conduct physical surveillance abroad of any American “reasonably believed to be?’ engaged in “activities threatening to the national security.” On its face this language appears overly permissive and might be read to authorize a repetition of the CHBOS program in which Americans were targeted for surveillance because of their par- ticipation in international conferences critical of the U.S. role in Vietnam.

Recommen.da.tion 9.-The CL4 should not collect information abroad concerning Americans except :

(a) Information concerning Americans which it is permitted to collect within the United States; 3~

(6) At, the request of the ,Justice Department as part of criminal investigations or an investigation of an L4merican for suspected t.er-

zB William Nelson testimony, l/28/76, pp. 33-34. Mr. Nelson was not addressing procedures to obtain a judicial warrant; but the time required for an rrp parte application on an expedited hasis to a Federal Court in Washington. ILC.. would not he excessive for the investigative time frames which Nelson described.

Furthermore, the present wiretap statute authorizes electronic surveillance (for 48 hours) on an emergency basis prior to judicial authorization.

3o Recommendation 8, p. 303.

Page 323: Church Committee: Reports-- Book II

307

rorist,30a or hostile foreign intell+yence 30b activities or security leak or sccur;ty risk investigations which the FBI has 01~~~1 pursuant to Part. iv of those rrco~nmeiitlatio~~s and which is conducted consistently with recomnielidatiolis contained in Part iv.“l

ZL’CCOW n~cntlatio,~ IO.-‘I’hc (‘T-1 should be able to transmit, to the FIZT or other appropriate agcncics information concerning Ahnrricans acquired as the incidental byproduct of othcrwisc pcrmissiblc foreign intelligence and colllitcrilltclligeiicc olwrati0ns.3z whenerw such infor- mation intlicatrs anv acti\-itr in violation of ,1mcrican law.

Z~ccon7772r7~tla,tio7L’ Il.--The CIA may cml~loy covert techniques abroatl :!gainst -1llirricans :

(u) I ntlcr circmnstanccs in which the CTA1 could use such covert techniques against ,imericans within the United States : 33 or

(i,) \\‘hrw collecting infornlntion as part of ,Justice Department in- vestigation, in which case the CIA may use a particular covert tech- niques under the standards and procedures and approvals applicable to its use against Americans within the ITnited States by the FRT (See Part. iv),; or

(c) To the extent nrccssay to identify persons known or snslw.+tl to be A’imericans who couie in contact with foreigners the CIA is in- vest igat ing.

Recommendation 12 tracks similar restrictions in the Executive Order but proposes an additional safeguard-giving the National Commission on T3iomedical Ethics and Human Standards jurisdiction to review any testing on Americans.

30a “Terrorist activities” mean.9 acts, or conspiracies, which: (a) are violent or dangerous to human life ; and (I)) violate federal or state criminal statutes con- cerning assassination, murder. arson. bombing, hij’acking, or kidnaping ; and (c) appear intended to, or are likely to have the effect of:

(1) Substantially disrupting federal, state or local government ; or (2) Substantially disrupting interstate or foreign commerce between the I’nited

States and another country ; or (3) DirecUT interfering with the exercise 1)s Americans, of Constitutional

rights protected by the Civil Rights Act of 1968:or bx foreigners, of their rights under the laws or treaties of the United States.

w” “IIostile foreign intelligence activities” means arts, or conspiracies, by Americans or foreigners, who are officers, employees, or conscious agents of a foreign power, or who, pnrsvant to the direction of a for&m Dower. engage in clandestine intelligence-activity, or engage in espionage, fiat&age ‘or Liiilar conduct in riolation of federal criminal statutes. (The term “clandestine intelli- gence activity” is inclndrd in this definition at the suggestion of officials of the Department of .Justice. Certain actirities engaged in 1)s ronscious agents of for- eign powers, such as some forms of industrial, technological, or economic espio- nage. are not now prohibited 1)~ federal statutes. It would be preferable to amend the espionage laws to corer such nctiritr and eliminate this term. As a matter of principle, intelligence agencies should not investigate activities of Americans v*liich are not violations of federal criminal statutes. Therefore, the Committee rernmmends (in Recommendatinn 91) that Congress immediately consider en- acting such statutes and then eliminating this term.)

‘l If the CIA beliel-es that an inrwtigation of an American should be opened but the FBI declines to do so. the CIA should he able to appeal to the Attorney General or to the appropriate committee of the National Security Council.

” Such information would include material rolunteered l)y a foreign intelligence service independent of anF request by the CIA.

83 See Recommendation 7, p. 302.

Page 324: Church Committee: Reports-- Book II

308

Recom,men&tio?? IZ-The CIA should not use in experimentation 011 human subjects. any drug, device or procedure which is designed or intended to harm, or is reasonably likely to harm, the physical or mental health of the human subject, except with the informed Kritten consent, witnessed by a disinterested third party, of each human suh- ject. and in accordance with the guidelines issued by the National Com- mission for the Protection of Human Subjects for Biomedical and Be- havioral Research The jurisdiction of the Commission should be amended to include the Central Intelligence Agency and other in- telligence agencies of the Unitecl States Government.

Be view and Certification

Recommendation 13 ensures careful monitoring of those CIA activi- ties authorized in the recommendations which are directed at ameri- cans.

Recommendation l&----gny CIA activity engaged in pursuant to Recommendations 7, 8. 9. 10. or 11 should be subject to periodic re- view and certification of compliance with the Constitution, applicable statutes, agency regulations and executive orders by:

(a) The Inspector General of the CL4 : (6) The General Counsel of the CL\ in coordination &h the

Director of Central Intelligence; (G) The Attorney General; and (d) The oversight, committee recommended in Part xii. All such certifications should be available for review by congressional

oversight commit.tees.

6. National Security Agency ’ The recommendations contained in this section suggest controls on

the electronic surveillance activities of the National Security Agency insofar as they involve, or could involve, Americans. There is no statute which either authorizes or specifically restricts such activities. NSA was created by executive order in 1952, and its functions are described in directives of the Kational Security Council.

While, in practice, NSA’s collection activities are complex and sophisticated, the process %v which it produces foreign intelligence can be reduced to a few easily understood principles. NSA intercepts messages passing over international lines of communication, some of

which have one terminal &hin the United States. Traveling over these lines of communication, especially those with one terminal in the United States, are the messages of Americans, most of which are ir- relevant to NSA’s foreign intelligence mission. NSA often has no means of excluding such messages, however, from others it intercepts which might be of foreign intelligence value. It does have, however, the capability to select part’icular messages from those it intercepts which are of foreign intelligence value. Most, international communica- tions of Bmericans are not selected. since they do not meet foreign intelligence criteria. Having selected messages of possible intelligence value, NSh monitors (reads) them, and uses the information it ob- tains as the basis for reports which it. furnishes the intelligence agencies.

Having this process in mind, one will more readily understand the recommendations of the Committee insofar as NSA’s handling of the messages of Americans is concerned. The Committee recommends first that NSA monitor only foreign communications. It should not monitor

Page 325: Church Committee: Reports-- Book II

309

domestic communications, even for forei,? intelligence purposes. Sec- ond, the Committee recommends that, KSA should not select messages for mollitorinp. from those foreign communications it, has intercepied, because the message is to or from or refers to a particular ,4merican, nnlrss the I~cpartmrnt of ,Justice has first obtained a search n-arrant, or the particular dmcrican has consented. Third, the Committee rec- ommends that SSA be required to make every practicable effort to eliminate or minimize the extent to which the communications of Americans are intercepted, selected! or monitored. Fourth, for those communications of L4mericans -rrhlch are nerertheless incidentally selected and monitored, the Committee recommends that, NSA be pro- hibited from disseminating such communicat,ion, or information de- rived therefrom, Thich identifies an America?! unless t.he communica- tion indicates eridence of hostile foreign intelligence or terrorist actiritv, or felonious criminal conduct, or contains a threat of deat,h or se&&bodily harm. In these cases. the Committee recommends that the ,4ttorney General approve any such dissemination as being con- sistent with these policies.

In summary, the Committee’s recommendations reflect its belief that NSA should hare no greater latitude to monitor the communications of Americans than anv other intelligence agency. To the extent that other agencies are req&red to obtain a ITarrant, before monitoring the communications of ,4mericans, KSh should be required to obtain a warrant.34

Reco~mmendation 14.-NSAi should not engage in doniest.ic security activities. Its functions should be limited in a precisely drawn legisla- tire charter to the collection of foreign intelligence from foreign communications.35

Recommendntion 15.-NSA should take all practicable measures consistent v-it11 its foreign intelligence mission to eliminate or mini- mize the interception, selection, and monitoring of communications of Americans from the foreign communications.3F

Recommendation 16.-NSA should not be permitted to select for monitoring any communication to! from, or about, an American with- out. his consent, escept for the purpose of obtaining information about, hostile foreign intelligence or terrorist activities, and then only if a warrant approving such monitoring is obtained in accordance with procedures similar 37 to those contained in Title III of the Omnibus Crime Control and Safe Streets ,4ct of 1068.

3L None of the Commibtee’s recommendations pertaining to NRA should he con- strued as inhibiting or preventing ,X8.4 from protecting U.S. communications against interception or monitoring hy foreign intelligence services.

es “Foreign communications,” as used in this section, refers to a communica- tion Iwtn-een or amonL tn-o or more Darties in which at least one Darts is out- side the rnited States,-or a communication transmitted between points within the T’nited States only if transmitted over a facility which is under the control of, or exclunirely used by, a foreign government

88 In order to ensure that this recommendation is implemented, both the At- torney General and the appropriate oversight committees of the Congress should be continuously apprised of. and periodically review, the meawres taken by SSA pursuant to this recommendation.

mThe Committee believes that in the case of interceptions authorized to ob- lain information about hostile foreign intellieence. there should be a nresumntion that notice to thp auhjrct of such intwcepts,~ which would nrdinarilySbe required under Title III (18 V.S.C. 2518(S) (d) ), is not required, unless there is evidence of gross abuse.

Page 326: Church Committee: Reports-- Book II

310

(This recommendation would eliminate the possibility that KS4 would reestablish its “watch lists” of the late 1960s and early 1970s. In that case, the names of Americans were submitted to SSA by other federal agencies ant1 were used as a basis for selecting am1 mon- toring, without a warrant, the international communications of those Americans.)

Recommendation 17.--,4ny personally identifiable information about an American rvhich SSA incidentally acquires. other than pur- suant to a warrant. should not be disseminated without the consent of the American. but should be destroyed as promptly as possible, unless it indicates :

(a) Hostile foreign intelligence or terrorist activities: or (b) Felonious criminal conduct, for which a warrant might be ob-

tained pursuant, to Title III of the Omnibus Crime Control and Safe Streets Act of 1968; or

(c) A threat. of deatll or serious bodily harm. If dissemination is permitted, by (a), (h) and (c) above, it must

only be made to an appropriate official and after approval by the at- torney General.

(This recommendation is consistent with NSA?s policv prior to the Executive Order.38 NSA’s practice prior to the Executive Order was not to disseminate, material containi.ng personally identifiable infor- mation about Americans.)

Recommendation 18.--N&4 should not request from any commer- cial carrier any communication which it could not otherwse obtain pursuant to these recommendations.

(This recommendation is to ensure that NSA miI1 not resume an op- eration such as SHAMROCK. disclosed during the Committee’s hear- ings, whereby KS.4 received for almost 30 years copies of most inter- national telegrams transmitted by certain international telegraph companies in the I-nited States.)

Recomm.endnfion 19.-The Office of Security at MA should be per- mitted to collect, background information on present or prospective employees or contractors of XSS. solely for the purpose of determin- ing thetr fitness for employment. With respect to security risks or the secnritv of its installations. NSA should be permitted to conduct physical surveillances, consistent, with such surveillances as the CIA is permitted to conduct. in similar circumstances, by these recom- mendations.

C. 3li?itur:l/ Xewke and 2k~fecn.w LQpmYmen.t Znvesfigafive Agencies This section of the Committee’s recommendations pertains to the

controls upon the intelligence activities of the military services and Department of Defense insofar as they involve Americans who are not members of or affiliated with the armed forces.

In general. the restrictions seek to limit military investigations to activities in the civilian community which are necessary and pertinent to the military mission, and which cannot feasiblv be accomplished by civilian agencies. In overseas locations where civilian agencies do not

38 The Esecntire Order places no snrh restriction on the dissemination of infor- mation hy KSA. T’nder the Executive Order, NSA is not required to delete names or destroy mwsagrs xvhich are personally identifixhk to Americans. As long as these messages fall within the categories established hp the Order, the names of Americans could be transmitted to other intelligence agrncies of thr Government.

Page 327: Church Committee: Reports-- Book II

311

perform inrestiqatirc activities to assist the military mission, military intellipence is glren more latitude. Specifically. the Committee recom- 1llPlldS that militnrv intelligence be limited within the T’nited States to cont1lwtin.g investiintions of violations of the l’niform Code of Mili- tary ,JlMce : investi;:ations for security clearances of Department of Defense en~plovecs and contractors : and investigations immediately before and dnriny the deplovment of armed forces in connection with civil tlistiirbances. Sonc of tilrw investigations shonld involve the use of any covert technique eniy)lo~-cd against AIniericnn civilians. In over- seas locations. the Committee recommends that military intelligence hare additional authority to conduct investigations of terrorist activity and hostile forciSgi intelligence activity. In these cases, covert, tech- niques directed at ,Imericans ma\- be employed if consistent with the Committee‘s restrictions upon the USE of such techniques in the United States in Part iv.

I;)CCo~/77/7.er~d~~tio~/ .2/I-Except as specifically provided herein, the Department of Defense should not engage in domestic security activi- ties. Its functions. as they relate to the activities of the foreign intelli- gence community. should be limited in a precisely drawn legislative charter to the conduct of fore@ intelligence and foreign counter- intelligence activities aiicl tactical military intelligence activities abroad, and production, analysis. and dissen&ation of departmental intelligence.

1TpcornIll~ndntion 21.-In addition to its foreign intelligence re- sponsibility. the Department of Defense has a responsibility to investi- gate its personnel in ortler to protect the secnritv of its installatSions ant1 propert>-. to ensure order and discipline within its ranks, and to conduct other limited investigations once dispatched b;v the President to suppress a civil clisordcr. AI l:gislatiw charter should define pre- cisely-in a manner which is not inconsistent with these recommenda- tion-the authorized scope and purpose of any investigations under- taken by the De;,artment of Defense to satisfy these responsibilities.

Rccol?,l,lrl,c~l/t/ol, .%?.--So agencu of the Department of Defense shoiild conduct investigations of violations of criminal law or other- wise perform any IRK enforcement or domestic security functions within the I7nited States. except on military bases or concerning mili- tary personnel. to enforce the I-niform Code of Military Justice.

The Department of the Army has ese~~ntive responsibility for render- ing assistance in connection with civil disturbances. In the late 1%X$, it instituted a nntionwicle collection program in which ,C\rniy investl- gators were dispntched to collect information on the political activi- ties of Americans. This was done on the theory that snch information was necessary to prepare the A1rniy in the event that its troops were sent to the scene of civil disturbances. The Committee believes that the Armv’s potential role in civil tlistnrbances does not justify SUCK an intelligence effort directed against A1nicrican civilians.

RPPO~~~ muddiou 2.?.-The Department of Defense shonld not, be permitted to contluct investigations of Ljmericans on the theqry that tlw information tlcri\-et1 thcwfroni nligllt be iiscfiil in potclltlnl civil tlixo~dcrs. The AI~*n~~- ~l~mld Iw permitted to rC wt11cr information about geogx~pliy. logistical matters. or tlir idcntitr of local officials which is

Page 328: Church Committee: Reports-- Book II

312

necessary to the positioning, support, and use of troops in an area where troops are likely to be deployed by the President, in connection with a civil disturbance. The Army should be permitted to investigate Ame.ricans involved in such disturbances after troops hare been de- ployed to the site of a civil disorder, (i) to the extent necessary to ful- fill the military mission. and (ii) to the extent the information can- not be obtained from the FBI. (The FBI’s responsibility in connection with civil disorders and its assistance to the Army is described in Part iv.)

Recommendation @.---Appropriate agencies of the Department of Defense sl~oulcl be. permitted to collect background information on t,heir present or prospective employees or contractors. Witlh respect t,o security risks or the security of its installations, the Department of Defense shonltl be. permitted to conduct physical surveillance consistent with such surveillances as the CIA is permitted to conduct., in similar circumstzances, by these recommendatttjons.

Prohibitions and Limitations of Covert Techniques

During the Army’s civil disturbance collection program of the late 196Os, Army intelligence agents employed a variety of covert tech- niques to gather information about civilian political activities. These included covert penetrations of private meetings and organizations, use of informants, monitoring amateur radio broadcasts, and posing as newsmen. This provision is designed to prevent the use of such covert techniques against American civilians. The Committee be lieves that none of the legitimate investigative tasks of the military within the United States justified the use of such techniques against unaffiliated Americans.

Recommendation %.-Except, as provided in 27 below, the Depart- ment of Defense should not direct any covert trchniclue (e.g., elec- t,ronic surreillance, informants, etc.) at American civilians.

Limited Investigations Ahroad

The militarv services currently conduct preventive intelligence in- vest.igations &thin the T’nited States where members of their respec- tive services are agents of, or are’ collaborating with, a hostile for- eign intelli,rrcnce service. These investigations are coordinated with, and under the ultimate control of, the FBI. The Committee’s recom- mendations are not, intended to prevent the militarv services from continuing to assist the FBI with such investipations.involring mem- bers of the armed forces. They are intended, however, to place respon- sibility for these inrestientions, insofar as they take place within th@ T’nited States, in the FBI. and not in the militarv services themselves. The military services. on the other hand, are ‘given additional re- sponsibility to condllct inresti,rrations of L!njericans who are suspected of en,rra:yinc in terrorist activity or hostile foreign intelligence activity in overseas locations.

Page 329: Church Committee: Reports-- Book II

313

should ordinarily be conducted in a manner consistent. mith the recom- I~uwtlations pertainin, 0’ to the FBI. containetl in Part iv; howzrer, in overseas locations, where I-.S. military forces constitute the governing power, or where I-.S. military forces are engaged in hostilities, cir- ClllllStnllCPS may require greater latitutlc to conduct such

investigations.

The Committee’s review of intelligence collection and investigative activity by IRS’ Intelligence Division and of the practice of furnish- ing information in IRS files to the intelligence agencies demonstrates that reforms are necessary and appropriate. The primary objective of reform is to prevent IRS from becoming an instrumentality of the intelligence agencies. beyond the scope of what, IRS. as the Federal tax collector, should ‘be doing. Recommendations 27 through 29 are designed to achieve, this objective bv providing that IRS collection of intelligence ,antl its conduct of investigations are to be confined strictly to tax matters. Moreover. programs of tas investigation, in which targets are selected partly because of indications of tax violat.ions and partly because, of reasons reIating to domestic security, are prohibited where they would erode, constitutional rights. Where otherwise appro- priate, such programs must be conducted under special safeguards ‘to prevent any adverse effect on the mcwisc of those rights.

These recommendations should prevent a recurrence of the excesses associated with the Special Services Staff and the Intelligence Gat,her- ing and Retrieval System.

Targeting of Persons or Groups ,fov Inwstigations or In.teAigence-GatheSng by IRS 3n

Recomm,endation 27.-The IRS should not, on behalf of any in- telligence agency or for its own use, collect any information about the activities of Americans except for the purposes of enforcing the ta.x laws.

Recommendntion B.-IRS should not select any person or group for tax investigation on the basis of political activity or for any other reason not relevant to enforcement of the tax laws.

Rrcommendrrfion. Zt9.-A1nv program of intelligence investigation relating to domestic security’in which targets are selected by both tax and non-tax criteria should onlv be initiated :

(0) ITnon the written request of the ,4ttorney General or the Secre- tarv of the Treasurv, specifying the nature of the requested program and the need therefore; and

(6) After the written certification by the Commissioner of the IRS that procedures have been developed which are sufficient to prevent

the infrinwment, of the constitlttional rights of Americans; and cc) With conpressional orersirrht committees bring kept continually

advised of the nature and extent of such programs.

a Based npon its studs of thp IRS:. the Committee lwliww thew rwcommenda- tions might propwlp he applied heyond the general domestic security scope of the recommendations.

Page 330: Church Committee: Reports-- Book II

314

Disclosure Procedures

The Committee’s review of disclosure of tax information by IRS to the FBI and the CIA showed three principal abuses by those in- telligence agencies : (1) the by-passing of disclosure procedures man- dated by law, resulting in the agencies obtaining access to tax returns and tax-related information through improper channels, and. some- times, without a proper basis: (2) the failure to state the reasons justifvinp the need for the information and the uses contemplated so that IRS could determine if the request met the applicable criteria for disclosure; and (3) the improper use of tax returns and informa- tion, particularly by the FBI in CCISTEI,PRO. Recommendations 30 through 35 ‘are designed to prevent t.hese abuses from occurring again.

While general problems of disclosure are being studied ,bv several different congressional committees with jurisdiction over IRS, these recommendat.ions reflect this Committee’s focus on disclosure prob- lems seen in the interaction between IRS and the intelligence agencies.

Recommendation 30.-No intelligence agency should request 4o from the Internal Revenue Service tax returns or tax-related information except, under the statutes and regulat.ions controlling such disclosures. In addition, the existing procedures under which tax returns and tax- related information are released by the IRS should be strengthened, as suggested in the following five recommendations.

Recom.mendation .32.-All requests from an intelligence agency to the IRS for tax returns and tax-related information should be in writing, and signed by the head of the intelligence agency making the request, or his designee. Copies of such requests should be filed with the Attorney General. Each request should include a clear state- ment of:

(a) The purpose for which disclosure is sought ; (6) Facts sufficient to establish that the requested information is

needed by the requesting agency for the performance of an authorized and lawful funct.ion ;

(c) The uses which the requesting agency intends to make of the information ;

(d) The extent of the disclosures sought; (e) Agreement by the requestin g agency not to use the documents

or information for any purpose other than that stated in t,he request; and

(f) Agreement. by the requestin g agency that the information will not be, disclosed to any other agency or person except in accordance with the law.

Recomm.endation 32’.-IRS should not release tax returns or tax- related information to any intelligence agency unless it has received a request satisfying the requirements of Recommendation 31, and the Commissioner of Internal Revenue has approved the request in writing.

Recommendation .?.?.-IRS should maintain a record of all such re- quests and responses thereto for a period of twenty years.

M “R~u&" as used in the recommendations concerning the Internal Revenue Service should not include circumstances in which the agency is acting with the informed written consent of the taxpayer.

Page 331: Church Committee: Reports-- Book II

315

Recommendation &&Ko intelligence agency should use the infor- mation supplied to it by the IRS pursuant to a request of the agency except, as stated in a proper request for disclosure.

RPcom.mendation .%-L4ll requests for information sought by the FBI should be filed by the T>epartment of Justice. Such requests should be signed by the Attorney General or his designee. following a determination by the Department that the request is proper under the applicable statutes and regulations.

b. Post Office (U.S. Postal Sewice) These recommendations are designed to tighten the existing re-

st.rictions regarding requests by intelligence agencies for both inspec- tion of the exteriors of mail (“mail corer”) and inspection of the conte.nts of first class mail (“mail opening”). ,4s to mail cover, the Committee’s recommendation is to centralize the review and approval of all requests by requiring that only the Attorney General may au- t.horize mail cover, and to eliminate unjustified mail covers by requir- ing that the mail cover be found “necessary” to a domestic.security invest,igat,ion. With respect to mail opening, the recommendations pro- vide that it can only be done pursuant to court warrant.

Recommendation N.-The Post Office should not permit the FBI or any intelligence agency to inspect markings or addresses on first class mail. nor should the Post Office itself inspect markings or addresses on behalf of the FBI or any intelligence agency, on first class mail, except upon the written approval of the Attorney General or his designee. Where one of the correspondents is an American, the Attor- ney General or his designee should only approve such inspection for domestic security purposes upon a written finding that it is necessary to a criminal investigation or a prrventive intelligence investigation of terrorist activity or hostile foreign intelligence activity.

Upon such a request. the Post Office may temporarily remove from circulat,ion such correspondence for t,he purpose of such inspection of its exterior as is r&ted to the investigation.

Recommendation. .?7.-The Post Office should not transfer the CUS- tody of any first class mail to any agency except the Department of Justice. Such mail should not be transferred or opened except upon a judicial search warrant.

(a) In the case of mail where one of the correspondents is an Amer- ican, the judge must find that there is probable cause to believe that t:he mail contams evidence of a c.rime.41

(6) In the case of mail where both parties are foreigners: (1) The judge must, find that there is probable cause to believe

that both parties to such correspondence are foreigners. land one of the correspondents is an officer. employee or conscious agent of a foreign power; and

(2) The ,\ttorncy General must certify that the mail ope.ning is likely to reveal information nwrssarv either (i) to the protection of the nation against actual or potential attack or other hostile acts of force of a foreign power: (ii) to obtain foreign intelligence informa- tion deemed essential to the security of the United States; or (iii) to

” See recommendation 94 for thr Committee’s recommendation that Congress consider amending the Espionage Act so as 20 corer mwlern forms of espionage not now criminal.

Page 332: Church Committee: Reports-- Book II

316

protect national security information against hostile foreign intelli- gence activity.

iv. Federal Domestic X~cuGty Acficitics Xhodd ZIP Lim.ited and Contro77ed to Prewnt Ahusrs 1Vithou.t Hnmpwing C?r’miwd Zncestigations or Znrestigations of Foreign Espionage

The recommendations contained in this part are designed to accom- plish two principal objectives : (1) prohibit improper intelligence ac- tivities and (2) define the limited domestic security investigations which should be permitted. As suggested earlier, the ultimate goal is a statutory mandate for t,he federal government’s domestic securi’ty function that will ensure, that. the FBI, as the primary domestic SXCU- rity investigative agent?. concentrates upon criminal conduct as Op- posed ‘to politic’tll rhetoric or association. Our recommendations would vast.ly curtail the scope of domestic securitv investigations as they have been conducted, by prohibiting inquiries initiated because the Bureau regards a group as falling wi?hin a vaguely defined cate- gory such as “subversive,” “Sew Left.?’ “Black Nationalist Hate Groups,” or “White Hate Groups.” The recommendations also ban investigations based merely upon the fact that a person or group is associafing with others who are being investigated (e.g., the Bureau’s investigation of the Southern Christian Leadership Conference be- cause of alleged “Communist, infiltration”).

The simplest way to eliminate investigations of peaceful speech and association would be to limit the FBI to traditional investigations of crimes which have been committed (including the crimes of at- tempt and conspiracy). The Committee found, however, that there are circumst,ances where the FBI should hare authority to conduct lim- ited “intelligence investigations” of threatened conduct (terrorism and foreign espionage) which is generally coVered by the criminal law, where ‘the conduct, has not, yet reached the stage of a prosecuteable act.

The Committee. however. found that abuses were frequently associ- ated even wit.11 such intelligence investigations. This led us also to recommend: precise limitations upon the use of covert techniques (Recomm.endations 51 to 60) ; restrictions upon maintenance and dis- semination of information gathered in such investigations (Recom- mendations 64 to 68) ; and a statutory requirement that the Attorney General monitor these invest.irations and terminate them as soon as practical (Recommendation 69).

a. Centralize Super&ion? Investigative Responsibility, and the Use

Investigations should be centralized within the Department of dustice. It is the Committee’s judgment that if former Attorneys Gen- eral had been held accountable by the Congress for ensuring compli- ance by the FBI and the intelligence aecncies with laws designed to protect, the rights of Americans. the Department of Justice would have been more IikeJy to discover and rnioin improper activities. Furthermore, centralizing domestic security ‘investi.gations within the FBI will facilitate the A\ttornry General’s superrlsion of them.

~WOlR7~?fndfftion 38.---All domestic security invcstieative activity, including the use of covert techniques, should be centralized within the Federal Bureau of Investigation, except those investigations by the

Page 333: Church Committee: Reports-- Book II

317

Secret Service designed to protect the life of the President or other Sccwt Srrricc protrctccs. Such inrcstigations and the use of covert ttchniqurs in those investigations should be centralized +thin the Swrct Service.

ZZccon/7/~cnilation ;?,!?.-A11 donwstic security activities of the federal gowrnnwnt and all other intrlligcncc agency activities covered by the T)onwkic Intclligencc Rccolillllrndations should be subjcctS to Justice Dcpartincnt oversight to ~SSIII’C conil)liance with the Constitution and laws of the Cnitecl States. 6. Pro11 ihitions

The (‘onin~ittre rwommcnds a set of l)rohil)itions. in addition to its Inter rrcomiiicii(l:ltions liniiting the scope of and procedural controls for domestic security investigations.

The following prohibitions cover abuses ranging from the political uw of the sensitive inforniation nlaintaincd by the IZurcau to tlw PS-

cesses of COISTELPRO. They are intended to cover activities en- gaged in. by. or on behalf of. the J?I(T. For csanlple, in prohibiting Bureau interference in lawful speech. publication. assembly. organiza- tion, or association of Americans, the Committee intends to prohibit a Bureau #agent from mailing fake letters to factionalize a group as well as to prohibit an informant, from manipulat.ing or influencing the peaceful act,ivities of 5 group on behalf of t.he FBI.

Subscqurnt rrronlnlcncla~it>ris limit the kintls of inwstigations which can be opened and provide controls for those investigations. Spccif- ically, the Committee limits FI)T authorit\- to collect information on ;\niericans to enunirratrtl circiuilstancts: lmiits authority to maintain information on political beliefs, political assocations, or private lives of hmericans; requires judicial warrants for the. most. intrusive covert collection techniques (electronic surwillancc, mail opening, and sur- reptitious entry) ; and proposes new restrictions upon the use of other covert techniques, particularly informants.

Zi’wommrndafion #I.-The FFST should be prohibited from engaging on its own or through irifornlnnts or others, in any of the follo\ving activities directed at Americans :

(a) IXsseminating any infornlation to thr White House? a?y other frdtral official, the news mrdia, or any other person for a political or other improper purpose, such as tliscrrditing an opponent of the ad- ministration or a critic of an intelligence or investigative agency.

(b) Inkrfering with lawful speech, publication, assembly, organi- zational activity, or association of Americans.

(c) Harassing individuals through unnecessary overt investigative techniques 4Z such as intcrviens or obvious physical surveillance for the purpose of intimiclation.

Recom?np,,datioll. hl.-The Bureau should be prohibited from main- taining information on thr political bclirfs. political associations, or priratr lives of A1mcricans except that which is clearly necessary for domestic srcnrity investigations as described in Part c.~~ --

4* “Orert investigative techniques” means the collection of information readily availahk from pnhlic sfmr~es or to a prirate person (inpInding interviews of the suhj~t or his friends or assoriates).

‘3 Thus, the Rurean wonld harp an obligation to review ang such information twfore it is placed in filrs and to revierr the files. thereafter, to remore it if no longer needed. This obligation does not extend to files sealed under Recom- mendation 65.

Page 334: Church Committee: Reports-- Book II

318

The Committee sought three objectives in defining the appropriate jurisdiction of the FRI. First, we sought to careful1.y limit any investi- gations other than traditional criminal investigations to five defined areas : preventire intelligence investigations (in two areas closely re- lated to serious criminal activity-terrorist and hostile. foreign in- telligence activities), c.ivil disorders assistance, background invrstiga- tions, security risk investigations, and security leak investigations.

Second, we sought substantially to narrow, and to impose special restrictions on the conduct of, those investigations which involved the most flagrant abuses in the past : preventive intelligence investigations and civil disorders assistance. Third, we sought to provide a clear sta- tutory foundation for those investigations which the Committee belief-es are appropriate to fill the vacuum in FBT legal authority

Achieving the first and second objectives Till have the most signif- icant impact upon the FBI’s domestic intelligence program and in- deed, could eliminate almost half its workload. Recommenclations 44 through 46 impose two types of restrictions upon the. conduct of in- telligence investigations ancl civil clisorcle.rs assistance. First, the scope of intelligence investigations is limited to terrorist activities or espio- nage and the scope. of civil disorders assistance is limited to civil disorders which may require federal troops. Second, the Committee suggests that, the threshold for initiation of a full intelligence inresti- gation be “reasonable suspicion.” 44 Preliminary intelligence inrestiga- tions-limited in scope. duration, and investigative technique-could be opened upon a “specific, allegation or specific or substantiated in- formation.?’ A written finding by the Attorney General of a likely need for federal troops is required for civil disorders assistance.

The Committee’s approach to FBI domestic, security investigations is basically the same as that adopted by the Attorney General’s guide- lines for domestic security investigations. Both are cautious about any departures from former At,torney General Stone’s maxim that the FBI should only conduct criminal investigations. For example, neither the Committee nor the Attorney General would condone in- vestigations which are totally unrelatecl to criminal statutes (e.g., the FBI’s 1970 investigation of all black student unions).

However, the Committee views its recommendations as a somewhat more limited cleparture from former A1ttorney General Stone’s line than the present Attorney General’s guidelines. First, the Committee would only permit intelhgence investigations with respect to hostile foreign intelligence activity and terrorism. The Attorney General’s guidelines have been read ky FBI officials as authorizing intelligence investigations of “subrers1ves” (individuals who may attempt to overthrow the government in the indefinite future). While the JuAice Department, under its current leadership, mi#t not adopt such an interpretation, ,a different, Attorney General might. Second, the guide- lines on their face appear to permit investigating essentially local civil disobedience (e.g., “use of force” to interfere with state or local government which could be construed too broadly).

u “Reasonable suspicion” is hased upon the Supreme Court’s decision in the case of Ten-l/ v. Ohio. 392 U.S. 1 (1968). and means specific and articnlahle facts which taken together with rational inferences from those facts, give rise to a reasonable suspicion that specified activity has occurred, is occurring, or is about to occur.

Page 335: Church Committee: Reports-- Book II

319

There are two reasons why the Committee would prohibit intel- ligence investigations of “subrersires” or local civil disobedience. First. those investigations inherently risk abuse because they in- evitably require surveillance of lawful speech and association rather than crminal conduct. The Committee’s examination of forty JWWS of investigations into “subversion” has found the term to be so vague as to constitute a license to investigate almost any activity of prac- tica!ly an)- group that actively opposes the policies of the adminis- tration in power.

,1 secontl reason for prohibitiq intelligence investigations of “sub- version” and local civil disobedlcnce is that both can be adequately hanclled by less intrllsirc methods \vithout unnecessarily straining limited Bureau rvsourccs. Any real threats to our form of government can be best identified through intelligence investigations focused on persons who may soon commit illegal violent acts. Local civil dis- obedience can be best, handled by local police. Indeed. recent. studies ‘-)y the General Accounting Office suggest that FBI investigations m these areas result in wry few prosecutions and little information of help to authorities in preventing I-iolcnce.

The FBI now cxpcnds more monev in its domestic security program than it does in its organized c&iv2 program, an$ indeed, t.wice the amount on “internal security” informant operations as on orga- nized crime informant coverage. “Subversive investigations’? and “civil disorders assistance” represent almost half the caseload of the FBI domestic security program. The national interest would be better sewed if I3urcau resources were directed at terrorism, hostile foreign intelligence activity, or organized crime. all more serious and pressing threats to the nlation than “subversives” or local civil disobedience..

For similar reasons, the Committee, like the ,ittorne;y General’s widelines, requires “reasonable suspicion” for preventive Intelligence Klvestipations which extend beyond a preliminarv stage. Invrstiga- tions of terrorism and hostile fbreign intelligence~actiritp which ire not limited in time and scope could lead to the same abuses found in intelligence investigations of subversion or local civil disobedience. However. an equally important, reason for this stxndartl is that it. should increase the efficiency of Bureau investigations. The General ,&ounting Office folmd that when the FBI initiated its investiga- tions on “soft e~iclence”--eridenct which probably would not meet this “reasonable suspicion” standard-it. nsnallv wasted its time on an innocent target. When it initiated its inr-estiiation on harder evi- dence, its ability to detect imminent, violence improved sipnificant!y.

The Committee’s recommendations limit preventive intelligence in- vestigations to situations where information indicates that the pro- hibited activity will “soo11~~ orcur. wl~r~xxs the guitlelinrs do not require that the activ’ity be imminent. This limit is essential to prevent a return to sweeping. endless investigations of remote and speculative “threafs.” The Conlmittee’s intent is that. to open or continue a full

inrcstipqtion, there should be a substantial indication of terrorism or hostile folrign intelligence- nctivitr in the near future.

The. Committee’s restrictions are intcndctl to eliminate nnnecessary investigations and to I)ro\-ide additional protections for constitutional rights. Shifting the focws of 13111w~11 ninnpo~cr in tlomwtic security invwtigations front lawful slwecli nut1 nssocimntion to criminal colltlllct~

Page 336: Church Committee: Reports-- Book II

320

bv twrorists and foreign spies provides further protection for consti- tutional rights of Aniericans as well as serving the nation’s interest) in security.

1. Investigations of ~ommAYed 0~ Immiueut 0 ffenses Recornm~endntion. &.-The FBI shoultl be permitted to investigate

a committed act which may violate a federal criminal statute pertain- ing to the domestic security to determine, the identity of the perpetrator or to determine whether the act violates such a statute.

Recommendation @‘.-The FBI should be permitted to investigate an American or foreigner to obtain I evidence of criminal activity where there is “reasonable suspicion” that the American or foreigner has committed, is committing> or is about to commit a specific act which violates a federal statute pertaining to the domestic security.4o

52. Prez*entit*e Inte77igence In?*estigations Recommendation .&J-The FBI should be permitted to conduct a

preliminary preventive intelligence investigation of an American or foreigner where it has a specific allegation or specific or substantiated information that the American or foreigner mill soon engage in ter- rorist activity or hostile foreign intelligence activity. Such a prelim- inary investigation should not continue longer than thirty days from receipt of the information unless the ,%ttorney General or his designee finds that the information and any corroboration which has been- ob- tained warrants investigation for an additional period which may not exceed sistv davs. If, at the outset or at any time during the course of a prelinrinary investigation the Bureau establishes “reasonable suspicion” that an ,knerican or foreigner will soon engage in terrorist activity or hostile foreign intelligence activity, it may conduct, a full preventive intelligence investigation. Such full investigation should not, continue longer than one year escept upon a findin.g of com- pelling circumstances by the attorney General or his designee.

Tn no event should the FBI open a ~weliminary or full preventive intelligence invcsti,~ation based upon information thsat an American is advocating political ideas or engaging in lawful political activities or is associating with others for the purpose of petitioning the ,govrrn- merit for redress of grievances or other such constitutionally protected purpose.

The second par:wraph of Recommendation 44 will serve as an im- portant, safr!mard if enacted into any statttte authorizing preventive intellirrencc investigations. It would supplement the protection that would be Iafforded bv limiting: the FBI’s intelligence investigations to terrorist and hostile forei.cm intclliwnce activities. It reemphasizes the Committee’s intent that the investigations of peaceful protest. groups and other lawful associations should not recur. It serves as a further reminder that advocacy of political ideas is not to be the basis for por- ernmcntlal snrwillance. *it the same time Recommendation 44 permits the initiation of investigations where the Bureau possesses information consisting of a “specific allegation or specific or substantiated informa-

4 This includes conspiracy to violate a federal statute pertaining to the domes- tic security. The Committee. however. recommends repeal or amendment of the Smith Act to make clear that “conPpiracg” to engage in political advocacy cannot be investigated. (See Recommendation 93.)

Page 337: Church Committee: Reports-- Book II

321

tion that [an] American or foreigner will soon engage in terrorist activity or hostile foreign intelligence activity.”

This recommendation has been among the most difficult of the domestic intelligence recommendations to draft. It. was difficult. be- cause it. represents the Committee’s effort to draw the fine line between legitimate investigations of conduct and illegitimate investigations of advocacy and association. Originally the Committee was of the view that a threshold of “reasonable susp’icion” should apply to initiating even limited preliminary intelhgence investigations of terrorist or hostile foreign intelligence activities. However, the Committee was persuaded by the Dqartment of ,Justice that. having narrowly defined terrorist, and hostile foreign intelligences activities, a “reasonable. sus- picion” threshold might be unrvorkable at the, preliminary stage. Such a threshold might prohibit the FBI from investigat.ing an allegation of extremelp dlangerous activity made by an anonymous source or a source of unknown reliability. The “reasonable susp~ion” standa.rd re- quires that the investigator have. confidence in the, reliability of the individual providing the information and some corroboration of the information.

However, the Committee is caut.ious in proposing a standard of “specific allegation or specific or substantiated information” because it permits initiation of a preliminary investigation which includes the use of phvsiwl surveillance and a survey of, but not targeting of, exist- ing confidential human sources. The Committee encourages the Attorney General to work with the Congress to improve upon the language we recomnlend in Recommendation 44 before including it. in any legislative charter. If adopted. both the attorney General and the appropriate oversight committees should periodicallv conduct a care- ful review of the application of the standard bv the FBI.

The ult)imate goal which Congress should seek in enacting such legislation is the development of a. standard for the initiation of intel- ligence investigations which permits investigations of credible allega- tions of conduct, which if uninterrupted will soon result in terrorist activit.ies or hostile foreign intelligence activities as lve define them. It must not permit, investigations of consitutionally protected activi- ties as the Committee described them in the last paragraph of Recom- mendcation 44. The following are examples of the Committee’s intent.

Recommendation 44 would prohibit the initiation of an investigation based upon “mere advocacv :”

-An investigation could not be init.iated, for example, when the Bureau receives an allegation that. a member of a dissident group has made statements at the group’s meeting that “America needs a Marx- ist-Leninist government -and needs to get rid of the fat cat capitalist pigs.”

The Committee has found serious abuses in past FBI investigations of groups. In the conduct of these investigations, the FBI often failed to distinguish between members who rere engaged in criminal activity and those who were exercising their constitutional rights of assoeia- tion. The Committee’s recommendations \vould only permit investiga- tion of a group in two situations : first, where the FBI receives infor- mation that the avowed purpose of the group is “soon to engage in ter- rorist activity or hostile forei,gn intelligence activitv”; or second, where the FBI has information that unidentified members of a group are

Page 338: Church Committee: Reports-- Book II

322

“soon to engage in terrorist activity or hostile foreign intelligence activity”. In both cases the FBI may focus on the group to determine the identity of those members who plan soon to engage in such activity. However, in ‘both cases the FBI should minimize the collection of in- format,ion about law-abiding members of the group or any lawful activities of the group.

-Where the FBI has information that certain chapters of a polit.ical or.ganization had “action squads,!’ the purpose of which was to com- mit terrrorist acts, the FBI could investigate all members of a partic- ular “action squad” where it had an allegation that this “action squad” planned to assassinate, for example, Members of Congress.

-An investigation could be initiated based upon specific informa- tion obtained by the FBI that unidentified members of a Washington, D.C ,., group are planning to assassinate Members of Congress.

The Committee’s recommendations would not permit investigation of mere association :

-The FBI could not investigate an allegation that a member of the Klan has lunch regularly with the mayor of a southern community.

-The FBI could not investigate the allegation that a U.S. Senator attended a cocktail party at a foreign embassy where a foreign intel- ligence agent was present.

However, when additional facts are added indicating conduct which might constitute terrorist activity or hostile foreign intelligence activity. investigation might be authorized :

-The FBI could initiate an investigation of a dynamite dealer who met with a member of the “action squad” described above.

-Likewise, the FBI could initiate an investigation of a member of the National Security Council staff who met clandestinely with a known foreign intelligence agent in an obscure Paris restaurant..

Investigations of contacts can become quite troublesome when the contact takes place within the context of political activities or associa- tion for the purpose of petitioning the government. Law-abiding American protest groups may share common goals with groups in other countries. The. obvious example was the widespread opposition in the late 1960’s, at home and abroad, to America’s role in Vietnam.

Furthermore, Americans should be free to communicate about such issues with persons in other countries! to attend international confer- ences and to exchange views or information about planned protest activities with like-minded foreign groups. Such activity, in itself, would not be the basis for a preliminary investigation under these recommendations :

-The FBI could not open an investigation of an anti-war group because “known communists” were also in attendance at a group meet- ing even if it had reason to believe that the communists’ instructions were to influence the group or that the group shared the goals of the Soviet Union on ending the war in Vietnam.

-The FBI coulcl not open an investigation of an anti-war act.ivist who attends an international peace conference in Oslo where foreign intelligence, agents wonld be, in attendance even if the*FBI had reason to belicrc that they might, attempt to recruit. the activist. Of course! t,he CL4 would not, be prevented from surveillance of the foreign agent.‘s activities.

However, if the Bureau had additional information suggesting that the activities of the -1111ericans in the above hypothetical cases were

Page 339: Church Committee: Reports-- Book II

323

more than mere association to petition for redress of grievances, an investigation would be legitimate.

-Where the FBI had received information that the anti-war activ- ist traveling to Oslo intended to meet with a person he knew to be a foreign intelligence agent to rece.ive inst.ruct.ions to conduct espionage on behalf of a host,ile foreign country, the FBI could open a prelinu- nary investigation of the activist..

The Committee cautions the Department of Justice and FBI that in opening investigations of conduct occurring in the context of politi- cal activities, it should endeavor to ensure that the allegation prompt- ing the investigation is from a reliable source.

Certainly, however, where the FBI has received a specific allega- tion or specific or substantiated information that an American or foreigner will soon engage in hostile foreign intelligence activity or terrorist activity, it may conduct an investigation. For example, it could do so :

-Where the FBI receives information that an American has been recruited by a hostile intelligence service;

-Where the FBI receives information that an atomic scientist has had a number of clandestine meetings with a hostile foreign intelli- gence agent.

Recommendation fi.-The FBI should be permitted to collect in- formation to assist federal, state, and local officials in connection with a civil disorder either-

(i) After the -4ttorney General finds in writing that there is a clear and immediate threat of domestic violence or rioting which is likely to require implementation of 10 U.S.C. 332 or 333 (the use of federal troops for the enforcement of federal law or federal court orders), or likely to result in a request by the governor or legislature of a state pursuant to 10 U.S.C. 331 for the use of federal militia or other federal armed forces as a countermeasure ; *ja or

(ii) After such troops have been introduced. Recommendation &-FBI assistance to federal, state, and local

officials in connection with a civil disorder should be limited to collect- ing information necessary for

(1) the President in making decisions concerning the introduction of federal troops ;

(2) military officials in positioning and supporting such troops ; and (3) state and local officials in coordinating their activities with such

military officials.

4. Background Investigations Recomwndation hr.--The FBI should be permitted to participate

in the federal government’s program of background investigations of federal employees or employees of federal contractors. The authority to conduct such investigations should not, however, be used as the basis for conducting investigations of other persons. In addition, Congress should examine the standards of Executive Order 10450, which serves as the current authority for FBI background investigations, to deter- mine whether additional legislation is necessary to :

(a) modify criteria based on political beliefs and associations unre- lated to suitability for employment; such modification should make

CFa This recommendation does not prevent the FBI from conducting criminal investigations or preventive intelligence investigations of terrorist atits in connection with a civil disorder.

Page 340: Church Committee: Reports-- Book II

324

those criteria consistent, with judicial decisions regarding privacy of political association; 4c and

(6) restrict the dissemination of information from name checks 47 of information related to suitability for employment.

5. Xecurity Risk Investigations

Recommend&on &?--Under regulations to be formulated by the Attorney General, t,he FBI should be permitted to investigate a spe- cific allegation that an individual within the Executive branch with ac- cess to classified information is a security risk as described in Execu- tive Order 104c50. Such investigation should not continue longer than thirty days except upon written approval of the Attorney General or his designee.

6. Xecurity Leak Investigations Recom.mendation @.--Under regulations to be formulated by the

Attorney General, the FBI should be permitted to investigate a spe- cific allegation of the improper disclosure of classified information by emplovecs or contractors of the Executive branch.48 Such investigation should not cont.inue longer than thirty days except upon written ap- proval of the Attorney General or his designee. d. Authorized Znvestigatice Techniques

The following recommendations contain the Committee’s proposed controls on the use of investigative techniques in domestic security investigations which would be authorized herein. There are three types of investigative techniques: (1) overt techniques (e.g., inter- views), (2) name checks (review of existing government files), and (3) covert techniques (which range, for example, from electromc sur- veillance and informants to the review of credit records).

The objective of these recommendations, like the Attorney General’s domestic security guidelines? is to ensure that the more intrusive the technique, the more stringent the procedural checks that will be ap- plied to it. Therefore, the recommendation would permit overt tech- niques and name checks in any of the investigative areas described above.

With respect to covert technique. the Committee decided upon pro- cedures to apply to the use of a particular covert technique based upon three considerations : (1) its potential for abuse, (2) the practicability of applying the procedure to the technique, and (3) the facts and cir- cumstances giving rise to the request for use of the technique (whether the facts warrant a full investigation or only a pr.eliminary investiga- tion). The most intrusive covert techniques (electronic surveillance. mail opening, and surreptitious entry) would be permissible only if a judicial warrant, were obtained as required in Recommendations 51 through 54. FBI requests to target paid or controlled informants, to review tax returns, to use mail corers. or to use any other covert tech- niques in domestic security investigations would be subject to review

(8 For example, NAACP v. Alabama, 357 U.S. 449 (1958) ; Bates v. Little Rock, 361 U.S. 616 (1960).

” See definition of “name checks” at p. 340. ‘*If Congress enacts a security leak criminal statute, this additional investi-

gative authoritg would be unnecessary. Securit? leaks would be handled as tra- ditional criminal investigations as described in Recommendations 42 and 43 above.

Page 341: Church Committee: Reports-- Book II

325

and in some cases to prior approval by the Attorney General’s office, as described in Recommendations 55 through 62.49

The judicial warrant require.ment the Committee recommends for electronic surveillance is similar in many respects to the Administra- tion’s bill, which is a welcome ‘departure from past pract.ice. The Com- mittee, like the Administration, believes that there should ‘be no elec- tronic surveillance within the United States which is not subject to a judicial warrant procedure. Both would also authorize warrants for electronic surveillance of foreigners who are officers, agents, or em- ployees of foreign powers, even though the government could not point to probable cause of criminal act,ivity.

However, while the constitutional issue has not been resolved, the Committee does not believe that the President has inherent power to authorize the targeting of an American for eledtronic surveillance without a warrant, as suggested by t.he Administration bill. Certainly, if Congress requires a warrant for the targeting of an American for traditional electronic surveillance or for the most sophisticated NSA techniques, at home or abroad, then the dange.rous doctrine of inherent Executive power to target an American for electronic surveillance can be put to rest at 1asL’~” The Committee also would require that no American be t.argeted for electronic surveillance except upon a judi- cial finding of probable criminal ‘activity. The Administration bill would permit electronic surre.illance in the absence of probable crime if the American is engaged in (or aiding or abetting a person engaged in) “clandestine intelligence activity” (an undefined term) under the direction of a foreign power. Targeting an American for electronic surveill~ance in the absence of probable cause to believe he might wm- mit a crime is unwise and unnecessary.

In Part X, the Committee recommends that Congress consider amending the Espionage Act to cover modern forms of industrial, technological, or economic espionage not now prohibited. At the same time, electronic surveillance targe.ted at an American should be author- ized where there is probable cause to believe he is engaged in such activity. Thus, the Committee agrees with the Attorney General that such activity may subject an American to electronic surveillance. But, as a matter of principle, the Committee believes t.hat an American ought not to be targeted for surveillance unless there is probable cause to believe he may violate the law. The Commit.tee’s record suggests that use of undefined terms, not tied to matters sufficiently serious to be the subject of criminal statutes, is a dangerous basis for intrusive investigations.

The paid and directed informant was a principal source of excesses revealed in our record. However, we do not propose the application of a judicial warrant procedure to informants. Instead, we propose a requirement of approval by the Attorney General based upon a probable cause standard. Because of t.he potential for abuse, however, we believe t.he warrant issue should be thoroughly reviewed after two years’ experience.

-Review of tax returns and mail covers would also be subject to the Post Office and IRS procedures described in earlier recommendations.

““‘When the President takes measures incompatible with the expressed or implied will of Congress, his power is at its lowest ebb. . . .” (Youngstown Sheet & Tube Co. v. Sawyer, 343 U.S. 579, 637 (1952), Justice Jackson concurring.)

Page 342: Church Committee: Reports-- Book II

326

There are some differences between the Attorney General and the Committee on the use of informants. 5. The Attorney General would permit, the FBI to make unrestricted use.of existing informants in a preliminary intelligence investigation. The Committee recognizes the legitimacy of using existing informants for certain purposes-for example, to identifv a nevi subject who has come to the attention of the Bureau. However, the Committee believes there should be certain restrictions for existing informants. Indeed, almost all of the infor- mant abuses-overly broad reporting, the ghetto informant program, agents provocateur. etc.-involved existing informants.

The real issue is not the development of new informants, bnt the sustained direction of informants, new or old, at a new target. There- fore, the restrictions suggested in Recommendations XI through 57 are designed to impose standards for the sustained targeting of in- formants against Americans.

The Committee requires that before an informant can be targeted in an intelligence investigation the Attorney General or his designee must make a finding that he has considered and rejected less intrusive techniques and that targeting the informant is necessary to the inves- tigation. Furthermore, the Committee would rermire that the infor- mant cannot be targeted for more than ninety days 51 in the intelli- gence investigation unless the Attornev General finds that there is “probable cause” that the American mill soon engage in terrorist or hostile foreign intelligence activity, except that if the Attornev Gen- eral finds compelling circumstances he may permit an additional sixty days.

Other than the restrictions upon the use of informants, the Com- mittee would permit basically the same techniques in preliminary and full investigations as the Attorney General’s guidelines, although the Committee would require somewhat closer supervision by the At- torney General or his designee. Interviews (including interviews of existing informant’s), name checks (including checks of local police in- telligence files), and physical surveillance and rerielv of credit and telephone records would be permitted during the preliminary investi- gation. The Attorney General or his designee would have to review that investigation within one month. Vnder the guidelines. preliminary in- vestigations do not require approval by the ,%ttorney General or his designee and can continue for as long as ninety days with an addi- tional ninety-dav extension. The remainder of the covert techniques would be nermitted in full intelligence investigations. TJnder the Attorney General’s guidelines, the Attorney General or his designee only become involved in the termination of such investigations (at the end of one year), while the Committee’s recommendations would re- quire the Attornev General or his designee to authorize the initiation of the full investigation and the use of covert techniques in the in- vestigation. 1. Owrt TPchniwPs rind .Vnmc Checks

Recommc,ndn6’on iin.-Overt techniques and n’arne checks should be permitted in all of the authorized dbmest.ic security investigations

w The Attorner General is considering additinnal guidelines on informants. m The period of ninety days hegins when the informant is in flaw and capable

of reporting.

Page 343: Church Committee: Reports-- Book II

327

described above, including preliminary and full preventive intelligence inve&iga.tions.

2. Covert Techniques a. Covert Techniguc.~ Co?qewcl

This section corers the standards and procedures for the use of the following covert techniques in authorized domest.ic security investigations :

(i) electronic surveillance ; (ii) search and seizure or surreptitious entry ; (iii) mail opening; (iv) informants ‘and other covert human sources; (v) mail surveillance ; (vi) review of tax returns and tax-related information; (vii) other cover% techniques-including physical surveil-

lance, photographic surveillance, use of body recorders and other consensual electronic surveillance, and use of sensitive records of state and local government: and other institutional records systems pertaining to credit., medical history, social welfare history, or telephone calls.52

13. Judicial Wawant Procedwes (EZectron.ic Surveillance, Mail Opening, Search and Xekuve, and Xurreptitious Entry)

The requiremen’ts for judicial warpants, set forth below, are not intended t,o cover NSA communication intercepts. Recommendations 14 through 18 contain the Committee’s recommendations pertaining to NSA intercepts, the circumstances in which a judicial warrant is required and the standards applicable for the issuance of such a warrant.

Recommmdation 5I.--All non-consensual electronic surveilllance, mail-opening, and unauthorized entries should be conducted only upon ,authority of a judicial warrant.

Recommendation 52.--All non-consensual electronic surveilla.nce should be conducted pursuant to judicial warrants issued under au- thority of Title III of the Omnibus Crime Control and Safe Streets Act of 1968.

The Act should be amended to provide, with respect to electronic surveillance of foreigners in the United States, that a warrant may issue if

(a) There is probable cause that t,he t’arget is an officer, employee, or conscious agent of a foreign power.

(b) The Attorney Gene~ral has certified that the surveillance is likely to reveal information necessary to the protection of the nation against actual or potential attack or other hostile acts of force of a foreign power; to obtain foreign intelligence information deemed essential to the security of the United States; or to protect nlational security informat,ion against hostile foreign int.elligence activity.

(c) With respect to any such e,lect.ronic surveillance, the judge should adopt procedures to minimize the ,acquisition ‘and retention of non-foreign intelligence informationlabout Americans.

“The Committee has not taken extensive testimony on these “other covert techniques” and therefore, aside from the general administrative procedures contained in c. below, makes no recommendations designed to treat these tech- niques fully.

Page 344: Church Committee: Reports-- Book II

328

(oY> Such electronic surveillance should be exempt from the dis- closure requirements of Title III of the 1968 -4ct as to foreigners gen- erally and as to Americans if they are involved in hostile foreign intelligence. activity.“”

hs noted earlier, the Committee believes that the espionage laws should be amended to include industrial espionapc ‘and other modern forms of espionage not presently covered and Title III should incor- porate any such amendment. The Committee’s recomendation is that both that change and the ,amendment of Tit.le III to require warrants for all electronic surveillance be promptly made.

Rccommendnfio~~ 53.--Mail opening should be conducted only pur- suant to a judicial warrant issued upon probable cause of criminal activity as described in Recommendation 37.

Rccommcndntion *id.-I’nauthorized entry should be conducted 0111~

upon judicial Iv-arrant issued on probable cause to believe that the pla.ce t.o be searched contains evidence of a crime, except unauthorized entry, including surreptitious entry, against foreigners n-ho are officers. employees, or conscious agents of a foreign power should be permit- ted upon judicieal warrant under the st’anclards which apply to elec- tronic surveillance described in Recommendation 52.

c. Administrative Procedures (Covert Hum.an Sources, Mail Sure-eillance. Reriezc of Tax Returns and Tax-Related Zn-

,formatiov. and Other Covert Techniques) Recommendation 55.~Covert human sources may not be directed 54

at, man American except : (1) In the course of a criminal investigat.ion if netessary to the

investigation proeided that covert human sources should not be di- rec’ted sat an American as a part of an investigation of a committed act unless t,here is reasonable suspicion to believe that the ,4merican is responsible for the act ,and then only for the purpose of identifying the perpetrators of the act.

(2) If t.lie American is the target of a full preventive intelligence inwst,igation and the Attorney General or his desinee makes a written finding that 5o (i) he has considered and rejected less intrusive tech- niques; and (ii) he believes that covert human sources are necessary to obtain information for the investigation.

Recom.mendation 5G.-Covert. human sources which have been di- rected at an American in a full preventive intelligence investigation should not be used to collect information on the activities of the Ameri- can for more than 90 days after the source is in place and capable of reporting. unless the attorney General or his designee finds in writing

a Except n-here disclosure is called for in connection with the defense in the case of criminal prosecution.

64 A “covert human source” is an undercover ‘agent or informant who is paid or otherwise controlled by the agency. A cooperating citizen is not ordinarily a corelit human source. A covert human source is “directed” at an American when the intelligence agency requests the corert human source to collect new information on the <activities of that individual. A covert human source is not “directed” at a target if the intelligence agency merely asks him for information already in his possession, unless through repeated inquiries, or otherwise, the agencr implicitly directs the informant against the targeit of the investigation.

6i The written finding must he made prior to the time the covert human source is directed at an American, unless exigent circumstances make application im- possible, in which case the application must be made as soon thereafter as possible.

Page 345: Church Committee: Reports-- Book II

329

either that there are “compelling circumstances” in which c.ase they may be used for an additional 60 days, or that. t,here is probable cause that t.he ,4merican will soon engage in terrorist activities or hostile foreign intelligence activities.

Recommendation 57.-All covert human sources used by the FBI should be revie,wed by the Attorney General or his designee as soon as practicable, and should be terminated 56 unless the covert human source could be directed against an L4nlerican in a criminal investi- gation or a full preventive intelligence investigation under these recommendat.ions.

Recommendation. 58.-Mail surveillance and the review of tax re- turns and tax-related information should be conducted consistently with the recomme.ndat.ions contained in Part iii. In addition to restric- tions cont,ained in Part iii, the review of tax returns and t.ax-related information, as well as review of medical or social history records, confidential records of private institutions and confidential records of Federal, state, and local government agencies other than intelligence or law enforcement agencies may not be used against an American except, :

(1) In the course of a criminal invest,igation if necessary to the in- vestigation ;

(2) If the ,4nierican is t,lie target of a full preventive intelligence investigat.ion and the ,Qttorney General or his designee makes a written finding that 5i (i) h e h as considered and rejected less intrusive tech- niques ; and (ii) he believes that the covert technique requested by the Bureau is necessary to obtain information necessary to the investiga- tion.

Recommendation 59.-The use of physical surveillance and review of credit and telephone records and any records of governmental or private inst.itutions other t.han those covered in Recommendation 58 should be permitted to be used against an American, if necessary, in the course of either a criminal invest.igation or a preliminary or full preventive intelligence investigation.

Recommendation. N-Covert techniques should be permitted at the scene of a potential civil disorder in the course of preventive criminal intelligence and criminal investigations as described above. Non-war- rant covert techniques may also be directed at an American during a civil disorder in which extensive acts of violence are occurring and Federal troops have been introduced. This additional authority to direct such covert techniques at Americans during a civil disorder should be limited to circumstances where Federal troops are actually in use and the technique is used only for the purpose of preventing further violence.

Recom~mPn.dation. 61.-Covert techniques should not be directed at an American in the course of a background invest.igation without the informed written consent of t.he Smerican.

Recommendation. &?-If Congress enacts a statute attaching crimi- nal sanctions to security leaks, covert techniques should be directed at Americans in the course of securit,y leak investigations only if such --

w Termination requires cessation of payment or any other form of direction or control.

“The written finding must he made prior to the time the technique is used against an American. unless exigent circumstances make application impossible, in which case the application must be made as soon thereafter as possible.

Page 346: Church Committee: Reports-- Book II

330

techniques are consistent with Recommendation 55 (1) , 58 (1) or 59. With respect to security risks, Congress might consider authorizing covert te&niques, other than those requiring a judicial warrant, to be directed at Americans in the course of security risk S8 investigations, but only upon a written finding of the Attorney General that (i) there is reasonable suspicion to believe that. the individual is a security risk, (ii) he has considered and rejected less intrllsive techniques, and (iii) he believes the technique requested is necessary to the investigation.

(d) Incidental Overhears Recommendation 63.-Except as limited elsewhere in these recom-

mendations or in Title III of the Omnibus Crime Control and Safe Streets ,4ct of 1968, information obtained incidentally through an au- thorized covert technique about an ,4merican or a foreigner who is not the target of the covert technique can be used as the basis for any au- thorized domestic sec.urity investigation.

e. Maintenance and Dissemination of Information The following limitations should apply to the maintenance and

dissemination of information collected as a result of domestic security investigations.

1. Relevance Recommendation 6,&--Information should not be maintained except

where relevant to the purpose of an investigation.

2. Sealing or Purging Recommendation 6’5.-Personally identifiable information on

Americans obtained in the following kinds of investigations should be sealed or purged as follows (unless it appears on its face to be necessary for another authorized investigation) :

(a) Preventive intelligence investigations of terrorist or hostile for- eign intelligence activities-as soon as the investigation is terminated by the Attorney General or his designee pursuant to Recommendation 45 or 69.

(b) Civil disorder assistance-as soon as the assistance is ttrmi- nated by the attorney General or his designee pursuant to Recom- mendation 69, provided t.ha’t &ere troops have been introduced such information need be sealed or purged only within a reasonable period after their withdrawal.

Recommendation 66.-Information previously gained by the FBI or any other intelligence agenc,v through illegal techniques should be sealed or purged as soon as practicable.

3. Disseminntion Recommendation 67.-Personallv identifiable information on Amer-

icans from domestic securitv inves’tiqations may ‘be disseminated out- side the Department of ,Justice as follows :

(0) Preventive intelligence investigations of terrorist activities- personallv identifiable information on Americans from preventive criminal ;ntellipencc inr&ipations of terrorist activities may he dis- seminnted only to :

68 lf Conrrrws Aow not rnnct a secnritr leak rriminal statnte. Conerws mieht consider nnthorivine cnwrt twhniqnw in the same rircnmstnncw as swnrity risk investigations either as an interim measnre or as an nlternntire to snch a ststnte.

Page 347: Church Committee: Reports-- Book II

331

(1) A foreign or domestic law enforcement agency which has jurisdiction over the criminal activity to which the information re- lates ; or

(2) To a foreign intelligence or military agency of the United States, if necessary for an activity permitted by these recommenda- tions ; or

(3) To an appropriate federal official with authority to make per- sonnel decisions about the subject of the information; or

(4) To a foreign intelligence or military agency of a cooperating foreign power if necessary for an activity permitted by these recom- mendations to similar agencies of the United States; or

(5) Where necessary to warn state or local officials of terrorist ac- tivity likely to occur within their jurisdiction ; or

(6) Where necessary to warn any person of a threat to life or prop- erty from terrorist activity.

(b) Preventive intelligence inve&igations of hostile foreign intelli- gence activities-personally identifiable information on Americans from preventive criminal intelligence investigations of hostile intelli- gence activities may be disseminated only :

(1) To an appropriate federal official with authority to make per- sonnel decisions about the subject of the information; or

(2) To the National Security Council or the Department of State upon request or where appropriate to their administration of U.S. foreign policy ; or

(3) To a foreign intelligence or military agency of the United States, if relevant to an activity permitted by these recommendations;

‘74) T 0 a foreign intelligence or military agency of a cooperating foreign power if relevant to an activity permitted by these recom- mendations to similar agencies of the United States.

(c) Civil disorders assistance-personally identifiable information on -4mericans involved in an actual or potential disorder, collected in the course of civil disorders assistance, should not be dissemi- nated outside the Department of .Just,ice except to military officials and appropriate state and local officials at the scene of a civil disorder where federal troops are presenLsg

(d) Rackground investigations-to the maximum extent feasible, the resnlts of backpround investigations should be segregated within t’he FHT and only disseminated to ofic,ials olltside the Depart,ment of .Justice authorized to make personnel decisions with respect to the suhiect.

(e) All other authorized domestic securitv investigations-to gov- ernmental officials who are guthorizerl to tyke action consistent with

the nnmose of an investigation or who have statutory duties which require the information.

4. Orer.qinh f A cress Rwomm,wdnfion. 6$.--officers of thp F,perllti\re branch. who are

made resnonsihle bv these recnmmcnrlations for overeeeinq inte]]i-

pence activities, and appropriate congressional committees should

“PWSnnnllY idpntifighle ‘infmmlaitinn on twrorict aptititr n-hich p&ins tu, a civil disordw ~nnld still he disseminated ~nrsunnt to !a) ahore.

Page 348: Church Committee: Reports-- Book II

332

have access to all information necessary for their functions. The com- mittees should adopt procedures to protect the privacy of subjects of files maint~aincd by the FBI and other agencies affected by the domes tic. intelligence recommendat,ions.

Rccommendntion &9.-The Attorney General should : (a) E&ablish a program of routine and periodic revielr- of FBI

domestic security investigations to ensure that the FBI is complying with all of the foregoing recommendations; and

(6) ;ksure, with respect to the following investigations of Amer- icans. that :

(1) Preventive intelligence investigations of terrorist activity 0.r

hostile foreign intelligence activity ‘are terminated within one, year, except that the Attorney Genneral or his designee may grant. exten- sions upon a w+tten finding of “compelling circumstances”;

(2) Covert techniques are used in preventive intelligence investiga- t.ions of terrorist activity or hostile foreign intelligence ‘activity only so long as necessary and ncit beyond time limits established by the Attorne,g General except that the ,4ttomey General or his designee may grant, extensions upon a written finding of “compelling ciirum- stances”;

(3) Civil disorders assistance is ternlinnted upon withdrawal of federal troops or. if troops were not introduced. within a reasonable time after the finding by the Attorney General that troops are likely to be requested. except that the Attorney General or his designee may grant. extensions upon a written finding of “compelling circum- stances.”

v. The Responsibi7itv and AuthoGty of the Atfomw Genwa~Z for Oversight of Federal Domestic Secwity ,4ctic~ties Must Be G?urificd ard Geneml Cownne7s and Inspectors Geneml of Znte7ligence Agencies Rtrengthened

The Committee’s Recommendations give the Attorney General broad oversight resnonsibilitv for federal domestic security activities. L4s the chief legal officer of the I’nited ‘States. the Attorney General is the. most appropriate official to be charged with ensuring that the in- tellipe,nce agencies of the IJnited States conduct their activities in accordance wit,11 the law. The Executive Order. however, places pri- mary responsibilky for oversight of the intelligence. agencies Jvith the newly created Oversight Board.

Both the Recommendations and the Order reroplize the Attorney General’s primary responsibility to detect, or prevent, violations of law by any employee of intelliience agencies. Both charge the head of intelligence agencies with the duty to report to the Attorney CTen- era1 information which relates to possible violations of law bv any employee of the respective intelligence a,yencies. The Order also re- quires’ the Oversight Board to report periodically, at least quatierly, to the Attorney General on its findings and to report. in a timely man- ner. to the Attorney General, any activities that raise serious questions about legality.

Page 349: Church Committee: Reports-- Book II

333

a. Attorney Genera7 Respokbility and Re7ationship With Other

These recommendations are intended to implement the ,Attorney General’s responsibility to control and supervise all of the domestic security activities of the federal government and to oversee activities of any agency affected by the Domestic Intelligence Recom- mendations :

Recommcudafiou 70.-The Attorney General should review the internal regnlatjons of the FBI ant1 other intelligence agrncirs engag- ing in domestic security activit.ies to ensure that such internal regula- tions are proper and adequate to protect the constitutiorral rights of Americans.

Recommendafiou 71.-The Attorney General or his designee (such as the Office of Legal Counsel of the Department of ,Justice) should advise the General Counsels of intelligence agencies on interpreta- tions of stat&es and rrgnlations adopted pnrsnant to these recommen- dations and on such other legal questions as are described in b. below.

Recommcndafio?,. %.-The Attorney General should have ultimate responsibility for the investigation of alleged violations of law re- latmg to the Domestic Intelligence RecolllmendatiolIs.

Recommendntiol, 7,9.-The Attorney General should be notified of possible alleged violations of law through the Office of Professional Responsibibty (described in c. below) by agency heads, General Counsel, or Inspectors General of intelligence. agencies as provided in R. below.

Recomm.Pndation 74.-The heads of all intelligence agencies affected by these recommendations are responsible for the prevention and de- tection of alleged violations of the law by, or on behalf of, their re- spective agencies and for the reporting to the Attorney General of a,11 snch alleged violations. 6o Each such agencv head shonld also assnre his agency’s cooperation with the Attorney General in investigations of alleged violations.

6. General Cou.nsel and Inspectors General of lntell~gence The Committee recommends that the FRRI and each other intelli-

gence agency should have a general counsel nominated by the Presi- dent and confirmed by the Senate,. There is no provision in the Execu- tive Order making General Counsels of intelligence agencies subject to Senate confirmation. The Committee believes that the extraordinary responsibilities exercised by the General Counsel of these agencies make it very important that these officials are subject to examination by the Senate prior to their confirmation. The. Committee further be- lieves that making such positions subject to Presidential appointment and senatorial confirmation will increase the statnre of the office and will protect, the independence of judgment of the General Counsel.

The Committee Recommendations differ from the Executive Order in two other important respects. The Recommendations provide that the General Connsel should review all significant proposed agency act,ivities to deterurine their legality. They also provide a mechanism

MThis recommendation must he read along with recommendations contained in Part ii, limiting the authority of foreign in~telligence and m’ilitarg agencies to investigate security leaks or security risks involving their employe& and centralizing those investigations in the FBI.

Page 350: Church Committee: Reports-- Book II

334

whcrrby the Inspector General or General Counsel of an intelligence agency can. in estraordinary circninst.ances. and if requested by an cn~pl+co of the A4genc;v. prokide information directly to the Attornyv General or appropriate con~ressionnl orersi,rrllt committees without informinp the head of the apency.

The Committee Recommendations also go beyond the Executive Orclcr in reqnirin,rr n,rrcncg hcnds to report to apllropriate committees of the Congress and the Attorney General on the activities of the Mice of the General Counsel and the Offke of the Inspector General. The Committee hclieves that, the reporting requirrments will facilitate orcrsipht of the intelli,rrence agencies and of those important offices n-ithin them.

Rrcommrndcrfion 7?i.-To assist. the Attorney General and the agency heads in the functions described in a. above. the FRI and each ot.her ‘intelligence apencg should have a General Counsel, nominated hy the President. and confirmed by the Senate, and an Inspector Gen- eral appointed bv the agency head.

Recommenhion. 76.-Anv individual having information on past, rnrrrnt, or proposed activities which anpear to he illegal, improper, or in violation of agency policy shonld he required to report the mat- ter immediately to the Apencv head, General Counsel, or Inspector General. Tf the rnntter is not. initially reported to the General Counsel, he should be notified by t.he Agency head or Inspector Genwal. Each agencv should regularly remind employees of their obligation to report snch information.

Recommenddion 77.-As provided in Recommemlation 74, the heads of the FRT and of other intellirrence arrencies are responsible for reporting to the Attorney General alIeged violations of law. When such reports are made, the appropriate congressional committees should he notified.61

Rrcommrn.dnfion 7X-The General Counsel and Tnsncctor General of the FBI and of each other intelligence agency should have nn- restricted access to all informat.ion in the nossrssion of the agency a.nd shonld have the authority to review all of the a.qency’s activities.c2 The, Attornev General. or the Office of Professional Responsibility on 11is behalf. shonld hare access to all information in the nossessioh of an agency which. in the oninion of the Att.orney General, is necessary for an investkntion of illewl activity.

Rtvwmmwdntion 7.9.-The Gwwral Counsel of the FBI and of each other intelligence aFencv should review all significant pronosed apenq activities to detrrmine their legality and constitutionality.

m The Inspector General and General Counsel should hare anthnrity, in ex- tranrdinary circnmstanres. anA if rqnestd hv av employee of the sgpneg proriAing information. to nass the information rlirertly to the Attorney General and to notify the apnrnnriatc congressional committees withnnt informing the head of the agency. Furthermore. nothing herein should nrnhihit an emnlnyee from renorting on his own snch information Airprt1.v to the Attorne.v General or an appropriate mngressinnal oversight committee.

“‘I%Q hwd of the agency shwlrl hp remind tn pmridp to the apnrnpriate orersight committees of thp Cnngrws anrl the Exwutiw branch and the At- tnrnPy Qneral an immwliate esplanatinn. in writing. of any instance in which the Inspwtor General or the General Crmnsel hns hwn rlpniwd arrpss to information. has hem instrncted not to report on a particnlar activity or has heen denied the authority to investigate a particular activity.

Page 351: Church Committee: Reports-- Book II

335

Recom.mendation 80.-The Director of the FBI and the heads of eac.h other intelligence a.gency should be required to report. at least annna!l~, to the appropriate committee of the Congress. on the activi- ties of the. General Counsel and the Office of the Inspector General.G”

Xcco,)z,n?cnclrrfio1,. 81.-The Director of the FBI and the heads of each other intelligence agency should be required to report, at. kast annualI\-. to the -1ttorney General on all reports of act,ivities which appear Illegal, improper, outside Olie Icgislative charter, or in violation of a.gency regulations. Such reports should include the General Coun- sel? find’iqgs concerning these activities, a summary of the Inspector General’s investigations of these activities, and the practices and pro- cedures developed to discover activities that raise questions of legality or propriety.

c. Office of Professional Responsi6il~ty

Rccol?2.?,2en.dcttio?zz &%--The Office of Professional Responsibility created by Attorney General Levi should be recognized in statute. The director of the office, appointed bg the Attorney General, should report directly to the Attorney General or the Deputy Attorney Gen- eral. The functions of t.he office should include:

(a) Serving as a central repository of reports and notifications provided the Attorney General ; and

(6) Investigation?, if requw&d by the Attorney General of alleged violations by intelhgence agencies of statutes enacted or regulations promulgated pursuant to these recommendations.64

d. Director of the FBI and Assistant Directors of the FBI Recommendation 83.-The Attorney Genera.1 is responsible for all

of the ,adirit.ies of the FBI, and the Dire&or of the FBI is responsible t.o, and should be under the supervision and control of, rthe Attorney General.

Recommendation g&-The Director of the FBI should be nominated by the President and confirmed by the Senate to serve at the pleasure of the President for a single term of not more than eight years.

Recommendation 85.-The Atitorney General should consider exer- cising his power to appoint Assistant Directors of khe FBI. A maxi- mum term of years should be imposed on the tenure of the Assistant Director for the Intelligence Division.e*a

@The report should include: (a) a summary of all agency activities that raise questions of legality or propriety and the General Counsel’s findings con- cerning these activities; (b) a summary of the Inspector General’s investiga- tions concerning any of these activities; (c) a summary of the practices and procedures developed to discover activities that raise questions of legality or propriety ; (d) a summary of each componen’t, program or issue survey, including the Inspector General’s recommendations and the Director’s decisions; and (e) a summary of all other matters handled b? the Inspector General.

The report should also include discussion of: (a) ma,jor legal problems facing the Agency ; (b) the need for additional statutes; and (c) any cases referred to the Department of Juwtiw.

64 The functions of the Oflke should not include: (a) exercise of routine super- vision of FBI domestic sewrity investkatinns ; (b) making requests to other agencies to conduct investigations or direct covert techniques at Americans; or (c) inrnlrement in any other supervisory functions which it might ultimately be required to investirate.

8L* It is not proposed that this recbmmendation be enadted as a statute.

Page 352: Church Committee: Reports-- Book II

336

vi. Adnuhistrative hhlcnzakiny a.nd Increased Disc7osure Xho?17d He Rcqui,yed

a. Administ~*atire Ru,7emaking Z:ccm?l.?n,cncJati017, R(i.-The Attorney General should approve all ad-

ministrative rcgnlations rcquircd to implement. statutes civatrd pur- slwnt to tl1esc recommendations.

ZZ~com~nzc~iclnfiot~~ 87.~Such regulations. except for regulations con- cerning investigations of liostilc foreign intelligtncr activity 01’ other i11attws which arc properly classified. slionld be issued pursuant to the Administrative Procedures hct and should bc subject to the apln+oral of tlic A\ttoi71ey Ge~irral.

/:~~0.1)7771~lln~1tiol/ 88.-The effective date of regulations prtiaining to tlio following matters should be delayed ninety days. during which time Congress would have the opportunity to review sncli rcgula- tions : 66

(n) Any CL4 activities against Smericans. as permittrtl in ii.a. above.;

(6) Military activities at. the, time of a civil disorder; (c) The. authorized scope of domestic security inrest.ipations, au-

tl1orized investigat.irc techniques, maintenance ant1 dissemination of information by the FBI ; ‘and

(n) The terminat.ion of investigations and covert, techniques as de- scribed in Part iv.

h. Zliw704ure RccommCndntion, 89.-Each year t,he FBI and other intelligence

agencirs affected by these recommendations should be required to seek annual statutory authorization for their programs.

Rccommendnfion SO.-The Freedom of Informat.ion Act (5 V.&C. 552(b) ) and the Federal Privacy Act. (5 I-7.S.C. 552(a) ) provide im- portant mechanisms by xyhich individuals can gain awes t.o informa- tion on intelligence activity directed against them. The Dome&k In- telligence Recommendations assume that these statutes will continue to be vigorously enforced. In addition, the Department, of Justice should notify all readily identifiable targek of past. illegal surveillance trchniques, and all COIKTELPRO vi&ims. and tl1ird parties who had received ‘anonvn1ous COINTELPRO communications. of the nature of the activities directed against them, or the source of the anonymous communication to them.6Sa

vii. Civil Remedies Xhou7d Be Expanded Recommendation 91 expresses the Committee’s concern for estab-

lishing a legislative scheme which will afford effective redress to people who are injured by improper federal inkllipence a&i&y. The rwom- mended provisions for civil remedies are also intended to deter im- l~l’opcr intelligence activity without restricting the sound exercise of tliwrrtion by intelligence officers at headquarters or in the field.

As t,he Committee’s investigation has shown, many Americans hare suffered injuries fron1 domestic intelligence activity. ranging from de- privation of constitutional rights of pr’ivacy and free speech to the loss of a job or professional standing, break-up of a marriage, and impairment of physical or mental health. But. the extent,, if ‘any, to

es This review procedure would be similar to the procedure followed with re- spect to the promlllgation of the Federal Rules of Criminal and Civil Procedure.

85L It is not proposed that this recommendation be enacted as a statute.

Page 353: Church Committee: Reports-- Book II

337

which an injured citizen can seek relief-either monetary or injunc- tive-from the govcriiincnt or from an indiritlunl intelligence officer is far fro111 cle:ll- ulltlcl~ t11c plY?“c”t state of the law.

One major disparity in the current, state of the law is that? under the Reconstrac-tion era Civil Hights Act of 1871, the deprivation of constitutional rights b;\’ an officer or agent of a state government pro- vides the basis for a suit to redress the, injury incurred; 66 but there is no statute x-hich extends the same remedies for identical injuries when they hare, caused by a federal officer.

In the landmark Ricens case, the Supreme Court held that a federal officer could be sued for money damages for violat,ing a citizen’s Fourth Amendment. rights.G: Whether monetary damages can be ob- tained for violation of other constit.utional rights by federal officers remains unclear.

While we believe that any citizen with a substantial and specific claim to injury from intelligence activity should have standing to sue, the Committee is aware of the need for judicial protection against legal claims which amount to harassment or distraction of government officials, disruption of legitimate investigations, and wasteful ex- penditure of government resources. We also seek to ensure that the creation of a civil remec!y for ‘aggrieved persons does not impinge upon the proper exercise of cllscretion by federal officials.

Therefore. we recommend that where a government official-as op- posed to the government itself-acted in good faith and with the reasonable belief that his conduct was lawful. he should have an affirm- ‘atire defense to a suit. for damages brought under the proposed statute. To tighten the system of accountability and control of clomestic intel- ligence activity, the Committee proposes that this defense be struc- tured to encourage intelligence officers to obtain written authorization for questionable activities and to seek legal advice about them.6s

To avoid penalizing federal officers and agents for the exercise of discretion, the Committee believes that the government should in- demnify their attorney fees and reasonable litigation costs when they are held not to be liable. To avoid burdening the taxpayers for the deliberate misconcluct of intelligence officers and agents, we believe the government should be able to seek reimbursement from those who willfully and knowingly violate statutory charters or the Constitution.

Furthermore, we believe that the courts will be able to fashion dis- covery procedures. including inspection of materilal in chambers, and to issue orders as the interests of justice require, to allow plaintiffs with substantial claims to uncover enough factual material to argue their case, whiln protecting the secrecy of governmental information in which there is a legitimate security interest..

The Committee recommends that a legislative scheme of civil reme- dies for the victims of intelligence activity be established along the

66 42 U.S.C. 19B. ” Bicms v. Six Unknomt Fed. Narcoticn Agents, 403 11.8. 388 (1971). =One means of structuring such a defense vnild he to create a rebuttable

presumption that an indiridd defendant acted so as to avail himself of this defense when he proves that he acted in good faith reliance upon : (1) a written order or dirpctire by a gorernment officer empowered to authorize him to take action ; or (2) a written assurance by an appropriate legal officer that his action is lawful.

68-186 0 - 76 - 23

Page 354: Church Committee: Reports-- Book II

338

following lines to clarify the state of the law, to encourage the respon- sible execution of duties created by the statutes recommended herein to regulate intelligence agencies, and to provide relief for the victims of illegal intelligence activity.

Recomrnendat7b.v .91.-C ongress should enact a comprehensive oivil remedies statute which would accomplish the following: 69

(a) Anv American n-ith a substantial and specific claim 7o to an actual or threatened injury by a violation of the Constitution by federal intelligence officers or agents i1 acting under color of law should have a federal cause of action against. the government and the individual federal intelligence officer or agent responsible for the violation, with- Out regarcl to the nlonetlary amount in controversy. If actual injury is proven in court, the Committee believes that the injured person should be entitled to equitable relief, actual, general, and punitive damages, and recovery of the costs of litigationTz If threatened injury is proven in court, the Committee believes that equitable relief and recovery of the costs of litigation should be available.

(6) Any American vith a substantial‘and specific claim to actual or threatened injury by violation of the st.atutory charter for intel- ligence activity (as proposed by these Domestic Intelligence Recom- mendations) should have a cause of action for relief as in (a) above.

(c) Because of the secrecy that surrounds intelligence programs, the Committee believes that a plaintiff should have two years from the date upon which he discovers, or reasonably should have discovered, the facts which give rise to a cause of action for relief from a constitu- tional or statutory violation.

(d) Whatever statutory provision may be made to permit an indi- vidual defendant to raise an affirmative defense t.hat he acted within the scope of his official duties, in good faith, and with a reasonable belief that the action he took was lawful, the Committee believes t,hat to ensure relief to persons injured by governmental intelligence activity, t,his defense should be available solely to individual defend- ants and should not extend to the government. Moreover, the defense should not be available to bar injunctions against individual defendants.

viii. Crimimd Penalties Should Be Enacted Recommendation 92.-The Committee believes that criminal penal-

ties should apply, where appropriate, to willful and knowing

B Due to the scope of the Committee’s mandate, we have taken evidence only on constitutional violations by intelligence officers and agents. However, the anomalies and lack of clarity in the present state of the law las discussed above) and the breadth of constitutional violations revealed by our record, suggest to us that a general civil remedy would be appropriate. Thus, we urge consideration of a statutory civil remedy for constitutional violations by any federal ofllcer; and we encourage the appropriate committees of the Congress to take testimony on this subject.

7o The requirement of a substantial and specific claim is intended to allow a judge to screen out frivolous claims where a plaintiff cannot allege specific facts which indicate that he was the target of illegal intelligence activity.

n “Federal intelligence officers or agents” should include a person who was an intelligence officer, employee, or agent at the time a cause of action arose. “Agent” should include anyone acting with actual, implied. or apparent authority.

@The right to recover “costs of litigation” is intended to include recovery of reasonable attorney fees as well as other litigation costs reasonably incurred

Page 355: Church Committee: Reports-- Book II

339

violations of statutes enacted pursuant to the Domestic Intelligence Recommendations.

ix. The Sm.ith Act and the Voorhis Act Should Either Be Repealed or Amwded

Recommendation 9Z.-Congress should either repeal the Smith Act (18 USC. 2385) and the Voorhis Act (18 U.S.C. 2386), which on their face appear to authorize investigation of “mere advocacy” of a political ideology, or amend those statutes so that domestic security investigations are only directed at conduct which might serve as the basis for a constitutional criminal prosecution, under Supreme Court decisions interpreting these and related statutes.73

x. The Espio‘nayc Statute Should be Modernized As suggested in its definition of “liost,ile foreign intelligence ac-

t,ivit.y” and its recommendations on warrants for electronic surveil- lance, the Committee agrees with the Attorney General that there may be serious deficiencies in the Federal Espionage Statute (18 U.S.C. 792 et seq.). The basic prohibitions of that statute have not been amended since 1917 and do not encompass certain forms of industrial, technological. or economic espionage. The Attorney General in a recent letter to Se,nator Kennedy (Reprinted on p. S3889 of the Congres- sional Record of March 23, 1976) describes some of the problem areas of the statute, including industrial espionage (e.g., a spy obtaining information on computer technolo,oy for ‘a foreign power). The Com- mittee took no testimony on this subject and, therefore, makes no specific proposal other than that the appropriate committees of the Congress explore the necessity for amendments to the statute.

Recommendation g&-The appropriate committees of the Congress should review the Espionage &Act of 1917 to determine whether it should be amended to cover modern forms of foreign espionage, in- cluding industrial, technological or economic espionage.

xi. Broader Access to Intelligence Agency File8 Should be Pro- vided to GAO, as an Investigative Arm of the Crmgress

Recommendation 95.-The appropriate congressional oversight committees of the Congress should, from time bo time, request the Comptroller General of the United States to conduct audits and re- views of the intelligence activities of any department or agency of the United States affected by the Domestic Intelligence Recommendations. For such purpose, the Comptroller General, or any of his duly au- thorized representatives, should have access to, and the right, to ex- amine, all necessary materials of any such department or agency.

xii. Congressional Oversight Should Be Intensified Recommendation 96.-The Committee reendorses the concept of

vigorous Senate oversight to review the conduct of domestic security activities through a new permanent intelligence oversight committee.

xiii. Definitions For the purposes of these recommendations :

A. “Americans” means U.S. citizens, resident aliens and unincor- porated associations! composed primarily of U.S. citizens or res-

"E.g. Yates v. United States, 354 U.S. 298 (1957) ; Noto v. United State& 367 U.S.296 (1961); BranndenWrg v. Ohio,395 U.S.444 (1969).

Page 356: Church Committee: Reports-- Book II

B.

C.

D.

E.

F.

G.

H.

I.

J.

K.

340

ident aliens; and corporations, incorporated or having their principal place of business in the United States or having majority ownership by U.S. citizens, or resident aliens, including foreign subsidiaries of such corporations provided, however, “Americans” does not include corporations directed by foreign governments or organizations.

“Collect” means to gather or initiate the acquisition of informa- tion, or to request it from another agency. A “covert human source” means undercover agents or informants who are paid or otherwise controlled by an agency.

“Covert techniques” means the collection of information, includ- ing collection from record sources not readily available to a pri- vate person (except state or local law enforcement files), in such a manner as not to be detected by the subject.

“Domestic security activities” means governmental activities against Americans or conducted within the United States or its territories, including enforcement of the criminal laws, intended to :

1. protect the United States from hostile foreign intelligence activity including espionage ;

2. protect the federal, state, and local governments from domestic violence or rioting; and

3. protect Americans and their government from terrorists. “Foreign communications,” refers to a communication between, or

among, two or more parties in which at least one party is outside the United States, or a communication transmitted between points within the United States if transmitted over a facility which is under the control of, or exclusively used by, a foreign government.

“Foreigners” means persons and organizations who are not Americans as defined above.

“Hostile foreign intelligence activities” means acts, or conspiracies, by Americans or foreigners, who are officers, employees, or con- scious agents of a foreign poFer, or who? pursuant to the direction of a foreign power, engage in clandestine intelligence activity,74 or engage in espionage, sabotage or similar conduct in violation of federal criminal statutes. “Name checks” means the retrieval by an agency of information already in the possession of the federal government or in the possession of state or local law enforcement agencies.

“Overt investigative techniques” means the collection of informa- tion readily available from public. sources, or availtable to a private person, including interviews of the subject or his friends or associates.

“Purged” means to destroy or transfer to the National Archieves all personally identifiable information (including references in any general name index).

” The term “clandestine intelligence activity” is included in this definition at the suggestion of ofkials of the Department of Justice. Certain activities engaged in bv the conscious agents of foreign wwers. such as some forms of industrial, techhological, or economic espionage, are not ‘now prohibited by federal statutes. It would be preferable to amend the espionage laws to cover such activity and eliminate this term. As B mat’ter of principle, intelligence agencies should not investigate activities of Americans which are not federal criminal statutea Therefore, the Committee recommends (in Recommendation -) that Congress immediately consider enacting such statutes and then eliminating this term.

Page 357: Church Committee: Reports-- Book II

341

L. ‘Sealed” means to retain personally identifiable information and to retain entries in a general name index but to restrict access to the information and entries to circumstances of “compelling ne- cessity.”

MI. “Reasonable suspicion” is based upon the Supreme Court’s decision in the case of Terry v. Ohio, 392 U.S. 1 (1968)) and means specific and articulable facts which taken together with rational inferences from those facts, give rise to a reasonable suspicion that specified activity has occurred, is occurring, or is about to occur.

N. “Terrorist activities” means acts, or conspiracies, which : (a) are violent or dangerous to human life; and (b) violate federal or state criminal statutes concernirw assassination. murder. arson. bombing, hijacking, or kidnappir;g; and (c) appear intended to: or are likelv to have the effect of :

(1) Substantially disrupting federal, state or local govern- ment ; or

(2) Substantially disrupting interstate or foreign commerce between the United States and another country; or

(3) Directly interfering with the exercise by Bmericans, of Constitutional rights protected by the Civil Rights Bet of 1968, or by foreigners, of their rights under the 1aFs or treaties of the United States.

0. “Unauthorized entry” means entry unauthorized by the target.

Page 358: Church Committee: Reports-- Book II
Page 359: Church Committee: Reports-- Book II

APPENDIX-A

IN THE SENATE OF TTIE UISITED STATES

MKPASTORE submitted the following resolution; which was ordered tobepIa& on tlic calendar (under gcueral orders)

J.isr.\sr 27,1X5

Considered, amended, and agreed to

FCESOIJJTION To establish n select conmittee of the Smote to conduct an in-

vestigation and study with respect to intelligence activities carried out by or on behalf of the Federal Gorernment.

1. Reso7wd, To estnl~lisll a select committee of the Senate

2 to condlwt an inI-estigation ml study of go\-erninentd op-

3 erations with respect to intelligeucc activities and of the

4 extent, if NIJ-, to \vllicll iilcgnl, hpoper, or unethical ddiv-

5 ities were engaged in l)~- any ;I~WCJ- of the Federd Govern-

6 meat or by my pcmou~, acting il~di~ihlly or in combination

7 Nith others, nit11 respect to my iutdligcncc activity carried

8 out by or on brhnlf of the Feded Gor-emneat; be it furher

9 Resohd, That (a) there is hereby estnl~lished a seIect

1Q committee of the Semte which nlny be called, for con-

v (343)

Page 360: Church Committee: Reports-- Book II

344

9

1 venience of csprwion, tllc Srht C’onmittee To Studg

2 Governnwnt;~l Olw~tiolls WitI I<wlwct to Intelligence AC-

3 tivities to coiidnc? nil ill\-cstl,, ‘wtioll,aiLd study of tllc .cSterlt, if

4 Q-y, .to kliicll illcgnl, irit~~rolw, or uilCtlliC;~l nctivitks W?l%

5 engaged iLL 1,~ my i~gmy or 1y :~IIS pr.soi~s, acting cithq

6 ill~ividudly or in colii~)in~?~iol! with OthCrS, ill caq~illg Out

7 any intelligcux or s~lr\-cilla1w cctivitica l)y or 011 1KhIt

8 of any agency of tl~ Federal G-overnmcllt.

9 (1~) The select comrni!lee created by this resoli~tion.

10 shall consist f 4 u t evw 3Icmbcrs of the Senate, six.fi, be

11 appointed by tlic I’re~idtnt of the Sciiatc from tlic majority

~2 Menlhers of tllrc %wnte upon the recolr!mendiltiOll of the

13 majority leader of the Senntc, and fire nlinority Members of

14 the fhlatc to be il~lpii~td by the Pl(‘sidcllt Of the Senate

Ii5 upon the rccoiilii~cndation of the minority lender of -the

16

17

58

lo

20

21

22-

23

24

25

Senate. Par tile l~~irposcs oi ~~~llYl~!X~~h 6 of’ rulC XXV of the

Studiiig 11~1~s of tlic $biiatt~, acrvicc uf a Srnator as a

member, cliairniaii, or vice cll;linunn of the select committee

shall not. be.taken into account.

(c) The majority. ~nrmbcrs of the colliinittcb shall sdeo~

1~ cha,irnlnn and the luiilcjrity ~n,onllwrs shall select 4 vice

ch&nan and thi: conunittee shall ::dopt r&s and procedures

to goveril its. proceedings. The cjtc chairman shall preside

over meetings of the sekct committee daring the absence

of the chairnx\n, and discharge such other responsibilities

Page 361: Church Committee: Reports-- Book II

345

3

2 as may be assigned to him by the select commit.tee or &B

2 chairman. Vacancies in the membership of the select corn-

3 mittee shall not affect the authority of the remaining mew

4 hers to execute the functions ‘of the select committee aad

5 shall be filled in the same manner as original appointme&

6 to it are made.

‘E (a) A majority of the members of the .select .commitf&~

8 shall constitute a quorum for the transaction of busiiess hut

9 the select committee may affix a lesser number as a quoruqz

IO for the purpose of taking testimony or depositions.

11 SEC. 2. The select committee is authorized and directd

I2 to do everything necessary or appropriate to make the in-

13 vestigations and study specified in subsection (!a) of the

I4 first section, Without abridging in any way the authori@

I5 conferred upon the select committee by the preceding

I6 sentence, the Senate further expressly puthorizes and dire&

I7 the select committee to make a. complete iW%tigation EC&,

I* study of the activities of any agency or of any and ti person8

19 or groups of persons or organizations of any kind l%i& 20 have any tendency to reveal the full facts with respect ti

21 the following mat&s or qu&ticms :

22 (1) Whether the Central Intelligence Agency b

23 co&ct,ed an illegal domestic intelligence operation ia

24 t.he United States.

Page 362: Church Committee: Reports-- Book II

346

(i) The ~coni(uct of domestic intelligence or co&

terint.elligerice opera~tions against United States citizeri;r

hy ihe li’edernl Burcnu of Inrcstigabion or any dthe:

Federal agency.

(3) The orfgh d disposition of the so-called Mus-

$on J?lan to apply United States intelligence agency

ca@rbilities against indi\-kluals or organizations within

the United States.

(4) The extent to which the Federal Bureau of In-

vestigat.ion, the Central Intelligence Agency, and ather

‘Federal law enforcement or intelligence agencies coordi-

n&e their respective actkities, any agreemen’ts +vhieh

govern ,tha.t coordination, and the extent to which a lack

of coordination has contributed to activities or actions

which are illegal, improper, inefficient, unethical, or .con-

trary to the intent of Congress.

(5) The extent to which the operation of domestic

tielligence or counterintelligence actkities and tk3

operation of any other activities within the ‘United States

hy the Central Intelligence Agency conforms to the leg-

&&&e charter of that Agency and the intent of the

Congress.

(6) The past and present interpretation by &e

Director of Cen’tral Intelligence of the responsibility ‘Fo

pr&ect intelligence sources and methods as it relates to

Page 363: Church Committee: Reports-- Book II

347

5

itlhe pro+ion in secti’oii 102 (d) (3) of &e N&on&I

Security Act of 1% (50 U.S.C; @3’(d) (3)) t&d

u . . . .that the ,agency shall have no poli6ej subpew, law

.enforcement powers, or internal security functions. . . l

(7) Nature and extent of executive .branch ov@

sight of all TJnited States intelligence activities.

(S) The need for specific legislative au’thority tb

govern the operations of any intelligence a.gencies ei

the Federnl Gorcmment now existing without th%

explicit statutory authority, including but ndt limited t0

agencies such as the Dcfcnse Intclligenco Ag@~y and

the National Security ,\gelicy.

The nature and extent to which Federal agencies-

cooperate and exchange iiltelligence informa;tion aa4

the ,?aeqtlacy of ~IIJ rcgd;~tions or sthfutes whi&

govern such coopcrntioil aid eschangc of intelligenca

information.

(9) The extent to mllich United States ‘iii-te~ligenb

agencies are governed by Esecntirc orders, rules, ‘31G

ZcguIations eitllcr puI,Iishd nr secret. niid the CX~&

b yjr]li& tllqse Eseciitivc odrrti, Ynle8; Or regulntiou9

jntqre’t, cxpana, or are in tionflict wit.11 specific legis-

lative authority.

(IO) The Tiolnlion .ol’ snsp;l,~ctd viokl;biI of w

&te or Fdepl slatnte by ally .intelligei~ce agHlQ7 W

Page 364: Church Committee: Reports-- Book II

348

by any person by or on behalf of any intelligence agency

of the I’ederal Gowrmnent including but not limited

.to surreptitious entrica, surveillance, wiretaps, or eaves-

‘&opping, illegal opening of the United States mail, 01

the monitoring of the United States mail.

(11) The need for improved, strengthened, or Collr

solid&d oversight of United States intelligence a+

tivities by the Congress.

(12) Whether any of the existing laws of the

Vnited States are inadequate, either in their provisions

or -manner of enforcement, to safeguard the rights d

American citizens, to improve executive and legislat,iVe

control of intelligence aud related activities, and to re-

solve uncertainties as to the :\u&ority of United St.atb

intelhgeiice Wd rclatcd ilgCllCiCS.

(13) Whether there is unnecessary duplicxttion of

expenditure and cfort in the collection and procossirrg

of kelligence inform&ion by U&xl States agencies,

(14) The extent and necessity of overt and cover&

ktehigence activities in the United States and abro&

(15) Such other relarted matters as the commit&

deems necessary in order to carry out its respoasibili&$

under section (a) .

SEC. 3. (a) To ena:ble the select committee. to m&t

z the inv&igati,on and study authorized and &rooted; by thk.

Page 365: Church Committee: Reports-- Book II

7

1 resolut.ion, the S.c~in;c 11erclq arlpowcrs the &cf carnmif.te@

2 as an Pygmy of th Swntc (I ) to employ and fix the corn-

3 pCiis:i~iOn of cnc~ll ClCl’iCiII, illvcdiptory, leg& teclmica?,

4 rind otlicr oAs!iIilt~ as it clccii~s ucccssnry cv appropriat+

5 hot it may 11ot ~~ZCCC~ tllc ilol~l~l:~l Scn:lte snlary schcdubs.;

6 (2) to sit and act at any time Or lh~w dru~hg scssion$

7 rcccsscs,, rind ntlj~~l~riiliiwt lwriods of tllc Scllntct;. (3) to LOl&

8 Ii~nriiigs for tilkillg twtilliwy 011 03th 01’ t0 rccciv,e dOCW

9 IIlcik~ry 01’ ~~ll~ziC.iIl cvidcncc rdnting to the 1WItCW Rlld

10 questions it is notllorizcd to it!\-e.<tigilte or stltdy; (4) to

II p@ire by sul)pc’~~a or otllrrwisc tllc atteldtince as witnesses-

12 of ally p!“s011s ~110 tllc select committee Mews have

13 knowlcdgc or illformation concerning any of the matters

14 01’ .~wstioJJs it is ilUtIJO~ZC!d to invcstignk and study; (5)

I5 t0 rc(piix 1)y’ SldJpXl 01’ order ally d~~~~illWellt, IlgWg,

16 O~XCCT, w W~~I()VN of tllc csccutivc IJri~ll~Il of the Tiriited I

37 States Gowrnlucut, or an?; priyntc person, firm, or COl~Or~~

18 tion, to produce for its consideration or for use as evidencs

39 in its investigation and study any books, checks, canedeb

20 checks, correspondence, communications, document, papers,

21 physical evidence, records, recordings, tapes, or materials re-

22 k&g to any of the matters or questions it is authorized to

23 inwstign.te and study which they or any of them may bxe

24 in thir custody or under their control; (6) to make to tka

25 Senate any recommendations it deems appropriate ian respect

Page 366: Church Committee: Reports-- Book II

350

8 3 b ihe willful failure or rrfi~al of any ‘person to answer quc8-

2 tions or give testimony in his character a’s n witness &wing

3 his appearawe before it or in rcspxt to the dlfd failur6

a or refusal of any officer or employee of tlic esccutive br~n’eh

5 Of the United States C~o~wnmcnt or any person, iiLx1, er

6 txqoration to prodace before the conunittcc any LooIs,

7 checks; canceled checks, correspondence, columLuniciitiouS,ic~t~ouS~

8 document, financial records, papers, pllysical cvidcnm,

9 xmords, reordings, tapes, or materials in obedience tv arIy

3; subpena or order; (7) to take depositions and other tOs&

Y mung cm oath anywhere within the United States or in any

32 other country; (s) tu procure the kinporary or intkIx&

13 tent services of individual consultants, or oiganizations there-

14 of, i.n the same manner and under the same conditions a*

15 a standing committee of the Senate may procure such serv-

36 ices under section 3.X (i) of tllc Lrgislatire Rcorganiza-

17 tion Act of 1946; (‘3) to MC on a reimburs&bk.basis, witk

18 the prior consent of the C’ommittee on Rules and Adm&- I

19 tration, the seryiccs of personnel of any such department

20 or ngxcy; (10) .lo use on n wilrrlmxIldc bnsis bY *dlOb

21 Gsc with llie prior consent of the clinirmnn of ,any $UIP

22 commit&e of any conmit tee of lhc Scnatc the facilitiC3 *;

23 scrviccs of tiny nicn~lwrs of tlic staffs of such. other -St?&%

?4 committees OP my s~ilwoi~imi t Ices of siich ollwl’ Bennb %om+

25 nlitt@ &3iiever the sch!ct committee or it,s diiCix<an.$I~eRW ;

Page 367: Church Committee: Reports-- Book II

351

Page 368: Church Committee: Reports-- Book II

352

14 j&3$ conllnitteC Shill bC Clll~~0~~~Cd t0 tXCr&3 dlC l)OWOl%

15 conferred upon committees of the Sennfe by scctiqn 6002 of

16 tith 18, United States Code, or any other. Act of Congress

17 regulaking the granting of immunity to witnesses.

lB 6EC. 4. The select committee shall have .authority to

10 recommend the enactment, of any new legislation or tie

U) amendment of any existing statute which it considers IEBX-

25 *sary or .desirable to strenghen or clarify the national sea?

22 rity, intelligence, or surreillnnce activities of the Unitsif

213 States and to protcc,t the rights of United States citizew.

.&$ wvitl! rega.rd to those nctkities,

Page 369: Church Committee: Reports-- Book II

353

I SEC. 5. The select. commitke sldl make a find report

2 Qf.Uie results of the inrestigntion and study c0dtd3d IJJ-

3 it*pwsuant to this xsolution, together with its findings ana

4 its recommendations as to new congressional legislation iC:

5 deems necessary or dcsidlc, to the Semtc at the earli&

6 practicnblc ihtc, but no IiItcr than ,Scptcmhcr 1, 1976.. The

7 s&et conmittec mny also sulm~it to tllc Scnfitc sirch interh

8 retorts as it considers ~1~lWOphiC. ;\ltcr sdm%sion of its

g find report, the sclccL. cmmil tee? shall hnw three cdcnda,r

10 months to close its nll’uirs, and on the expiration oE mok

11 three cdelldfir rrlontlls &ail cerise to exist.

12 SEC. 6. The esprn~~~ of the wlcct cwmi~tcc tboug~

13 l3c~ptWll,)~~~ 1, 1.9i3, llllh thid I’~W~ll~tiOll sllnll 1lOt CXC&

14 $iX,OOO of wlkh ;moru~t not to csccrd ,41OO,OOO shall be,

15 nvnild~lc for the prtrcnrcmwt of the scr\ices of individ~

16 consuhnts or orgn~~imtiul~~ tl~crcuf. Swh cspenses shall be

37 p&I lrolu the coulingcllt feud of the Scmtc upon vouchers

18 approved Ly the chairman of the select cdmmittee.

19 SEC. 7. The select committee shall instibute and carry

20 out such rules and procedures as it may deem necessary to

21 prevent. (1) the disclos~uc, outside the scleot committee, &

22 any informntioii rel:Itiq to the activities of the Centrd b

23 tclligcnce Apwc*y or ny- other dcpartmcnt or agency 01 &e

24 Federd Go\-ermnent engaged in intelligence activit& +

Page 370: Church Committee: Reports-- Book II

354

12

1 ta-ind by the select committee during the cowse of its study

2 and investigat~ion, not anthorized by the select committee

3 to be disdoscd; rind (23 the disclosure, ontside the select

-4 committee, of any infollll’ntion which woukl adversely aff&t

6 tic intelligcncc nctivitics of bhe Ccntrnl Intelligence *4gency

6 %I fOreigU countries or the intclli$pux wdrities in foreign

7 counties of any 0th~~ 3eprtinent or agency of the Federal

8 Ckmrnment.

9 SEC. 8. As n condXon for cmploy~ncnt ns ilc3Acd in

a0 8eotion 8 of this resolntion, cacli persons sldl agree nrot to

11 clccopt any honorari3in, royally nr other payniont for a

32 speaking engagement, magi\zillc wticlc, IJO&, or other en-

a deavor connected with the inwSt~igatio~1 and stu+- der-

14: taken by this committee.

Js &C!. 9. X0 eniphp~ of Lha $rlcct conunitkc or any

16 gerson engaged Ly con.hct or othcrn-kc to pwform scrvkcs

17 for the select committee Shill1 be giwn access to nny clnssi-

18 fied infolxintion hy the sclcct cmmittw iunles.3 such em-

39 pluycc or person Iin wcciwl :in nlquqNintc wcn~iiy clcnr-

20 ancc 3s dctcr~~~iw.4 hy 11x wlwt cimlinillct?. The lypc of

21 security cl~~:~l:~nP~? 10 lw Wjllirctl ill the C:IBc of filly SUClL

22 cmploycc or lw3011 d~:t!l, n.i tltin the dctc~*~l~i~~i~ tioll of the

23 s&ct ammittcc, 1bc rmmwna~~ratc with the sensitivity 0E.

24. tllC CliISSifiCtl ilifcbixl:llicm 10 wllidl Slld1 cwlplo~Cc Or ]pZ$NpI.

25 mill ]je givcii ncms 11: tlic wlwt routiiiittcc,

Page 371: Church Committee: Reports-- Book II

APPENDIX B

PREVIOTJELY ISSUED REPORTS AND HEARINGS OF THE SENATE SELECT COMMITTEE

A. Reports 1. Senate Report: “Alleged Assassination Plots Involving For-

eign Leaders”, November 20, 1975. 2. Staff Report: “Covert Action in Chile, 1963-19’73”?

December 18, 1975. 23. Hearings

1. “Unauthorized Storage of Toxic Agents”, Volume 1, Septem- ber 16,17 and 18,1975.

2. “Huston Plan”, Volume 2, September 23, ‘24 and 25, 1975. 3. “Internal Revenue Service”, Volume 3, October 2, 1975. 4. “Mail Opening”, Volume 4, October 21, 22 and 24, 1975. 5. “The National Security Agency and Fourth Amendment

Rights”, Volume 5, October 29 and November 6, 1975. 6. “Federal Bureau of Investigation”, Volume 6, November 18

and 19, December 2,3,9,10 and 11,1975. 7. “Covert Action”, Volume 7, December 4 and 5, 1975.

(355)

Page 372: Church Committee: Reports-- Book II
Page 373: Church Committee: Reports-- Book II

APPENDIX C

STAFF ACKNOWLEWMENT~: FINAL REPORT ON INTELLIGENCE Ac~fvr- TIES AND THE RIGHTS OF AMERICANS

The volume of the final report which summarizes the Committee’s in uiry into domestic intelligence activity and sets forth its findings

8 an recommendations was written and edited, along with the supple- mentary detailed reports, under the supervision of Chief Counsel Frederick A. 0. Schwarz, Jr., and Counsel to the Minority Curtis R. Smothers. The work of the entire staff of the Committee--over the long course of investigation, research and hearings-was channeled into the final report. The staff members listed below made major con- tributions to the writing and editing of this volume.

John Elliff Frederick Baron Barbara Ranoff Gordon Rhea

Principal Authors

James Dick Mark Gitenstein Robert Kelley

Genera2 Editor8

Frederick Baron Rhett Dawson John Elliff Michael Madigan Elliot Maxwell

Paul Michel Andrew Postal Walter Ricks Burton Wides

Research Coordination

Thomas Damson Lawrence Kieves

Contributing AutJors, Editors, and Investigator8

John Bayly Jim Johnston Sam Bouchard Chris Pyle Barry Carter Eric Richard Joseph Dennin Lester Seidel Mary DeOreo Patrick Shea Michael Epstein Elizabeth P. Smith Peter Fenn John Smith Arthur Harrigan Britt Snider Arthur Jefferson At.han Theoharris Loch Johnson Plaul Wallach

Edward Griessing Daniel Dwyer

Research A88&?ta?We

Phebe Zimmerman James Turner

(357)

Page 374: Church Committee: Reports-- Book II

358

SIPPLEMENTARY DETAILED REPORTS

COINTELPRO: The FBI’s Co- vert Action Programs Against American Citizens.

The FBI’s Efforts to Disrupt and Neutralize the Black Panther Party.

Principd Xtaff Authors

Barbara Banoff, assisted by Phebe Zimmerman and Mary DeOreo.

Arthur Jefferson, Gordon Rhea.

Dr. Martin Luther King, Jr., Case Study.

Michael Epstein, Gordon Rhea, as- sisted by Mary DeOreo and Dan McCorkle.

CL4 and FBI Mail Opening.

Warrantless Electronic Surveil- lance.

James Dick, Paul Wallach, as- sisted by Thomas Dawson and Edward Griessing.

James Dick, John Elliff.

The Use of Informers in FBI In- telligence Investigations.

Warrantless Surreptitious En- tries : FBI “Black Bag” Break- ins and Microphone Installa- tions.

Robert Kelley, assisted by Jeffrey Kayden and Thomas Dawson.

Frederick Baron.

The Development of FBI Domes- tic Intelligence Investigations.

The Internal Revenue Service : An Intelligence Resource and Col- h&or.

John Elliff

Walter Ricks, Arthur Harrigan, assisted by Thomas Dawson.

National Security Agency Surveil- lance Affecting Amerioans.

Improper Surveillance of Private Citizens by the Military.

CL4 Intelligence Collection About Americans: The CHAOS Pro- gram and t.he Office of Security.

National Security, Civil Liberties, and the Collection of Intel- ligence : A Report on the Huston Plan.

Peter Fenn, Britt Snider, James Turner, assisted by Judi Mason.

Britt Snider, assisted by James Turner.

Burton Wides, assisted by Jeffrey Kayden.

Loch Johnson, assisted by Mar- garet Carpenter and Daniel Dwyer.

General Xtaf Editors : Detailed Reports

Paul Michel Elliot Maxwell Rhett Dawson Andrew Postal Michael Madigan

Page 375: Church Committee: Reports-- Book II

ADDITIONAL VIEWS OF SENATOR PHILIP A. HART

The Committee’s proposal on domestic intelligence is a carefully crafted system of controls to prevent abuse and preserve vigorous dis- sent in America, The report lays out the issues, notes the problems, and suggests solutions. Committee members and staff, under Senator Mon- dale’s conscientious leadership, grappled with the exceedingly dif - ficult task of shaping broad principles into workable safeguards.

The recommendations would narrow t’he scope of permissible in- telligence, set standards and time limits for investigations, control dissemination, and provide civil remedies for improprieties.

This comprehensive scheme may be the best we can do to set the delicate balance wheel between liberty and security. It is a consider- able accomplishment, and I endorse its consideration by the appropri- ate legislative’ committees. I do 54, however, with misgivings that the Committee’s record fails to justify even this degree of preventive intelligence investigation of American citizens.

Unlike investigation of committed crimes, “preventive intelligence” means investigating persons thought likely to commit particularl;y se- rious acts; it is intended to prevent them. Providing, for the first time, statutory authorization of such surveillance is a dramatic and danger- ous step. Congress should take that step with the utmost caution.

It is appealing to say we should let the FBI do evervthing possible to avert bombing of the Capitol or other t,errorist a&s. But in America we must refuse to let the Government “do everything possible.” For that would entail spying on every militant opponent of official policy, just in case some of them may resort to violence. We would become a police stat,e. The question, then, is whether a limited form of pre- ventive intelligence, consistent with preserving our civil liberties, can be iustified by the expected benefits and can also be kept under effec- tive control.

The Committee was reluctant to authorize any investigations ex- cept, those of committed or imminent criminal acts. Nevertheless, our Report concludes that some preventive intelligence is justified because it might prevent a significant amount of terrorist activity without posing unacceptabIe risks for a free society.

However, the shocking record of widespread abuse suggests to me that before Congress endorses a blueprint for preventive Intelligence, we need a more rigorous presentation of the case for it than was of- fered to this Commit,tee.

The FBI only provided the Committee with a handful of substanti- ated cases-out of the thousands of Americans investigated--in which preventive intelligence produced warning of terrorist activity. Fur- ther, most of those few investigations which did detect terrorism could

(359)

Page 376: Church Committee: Reports-- Book II

3610

not have bee.n opened under the Commit.tee’s proposed restricti0ns.l In short? there is no substantial record before the Committee that pre- ventive mtelligence, under the restrict,ions wc propose, would enable the Government to thwart terrorism.

Essentially, we are asking the American people to accept t.he risks of preventive intelligence on the hypothetical possibility that the worst imaginable terrorist acts might be averted. Faced with the specter of bombings or assassination plots, we may be in danger of sanctioning domest,ic spying without any significant prospect t.hat such intelligence activities will in fact prevent them.

It might be argued that with adequate restraints to focus on hard core terrorism, preventive intelli.gence should be authorized even though we cannot demonstrate it IS likely to prevent much violence. In that view, some insurance would be worth the limited cost.

Assuming that premise, there are two overriding issues :

-When may the Government investigate the activities of Americans engaged in political dissent; and

-When may the Government use informants to spy on those Americar s ?

If we are to have a preventive intelligence program at all, then I believe the Committee’s recommendations on both these issues require refine- ment.

The Committee found that most improper invest.igations have been commenced merely on the basis of political advocacy or association, rather than on specific information about expected terrorist activity. The recommendations would preclude mere advocacy or association as a predicate for investigating Americans. In prac&e, however, that would simply require specific allegations that. an unpopular dissident, group was planning terrorist violence.

Of course, if the FBI receives a tip that ,John Jones may resort to bombing to protest American involvement in Vietnam, the Bureau should not be forced to sit. on its hand until the blast. But our pro- posals would permit more than review of federal and local records on John Jones a Id interviews of his associates, even in a preliminary investigation. On the basis of an anonymous letter. with no supportmg informat,ion-let alone any indication of the source’s reliabili!y-the FBI could conduct secret physical surveillance and ask existmp in- formants about him for up to three months, with the Attorney Gen- eral’s approval.

The Committee was concerned about authorizing such extensive investigations before there is even a “reasonable basis of suspicion” the subject will enpage in terrorism. The Report offers examples of how this recommendation would work, and indicates our desire to

1 In most of those cases warnine: came through informant nenetration of local chapters of a national organization undertaken’becanse some of the national lead- ers had indicated a willingness to use violent means. The Committee’s guidelines preclude investigating an organization’s entire membership throughout the rouu- trr on the basis of sDecific information about some individuals.

‘In the most sinisfer terrorist conspiracies. onlr penetration of the inner circle is likely to provide advance warning of an assassination or kidnapping plot. Our record suggests that the only way for the FBI to have much chance to detect such fillnts in adrance would he blanket penetration of ewrr militant nrnfoqt group in the country. And that would mean a return to precisely the kind of Big Brother government which was attempted in the past.

Page 377: Church Committee: Reports-- Book II

361

insulate I~Wflll political activity from inw&gatioll of violent ter- rorism. nut these very examples illustrate how inextricable the two may be at the outset of an inquiry into an allegation or ambiguous information. The task of finding out whether f~ dissident. is contem- plating violence or is onlv involved in vigorous protest inevitably requires investigation of his protest activities. In the process, the FBI could follow the organizers of a Washington peace rally for three months on the basis of an allegation they might also engage in vio- lence.

The second major issue is the use of paid Government informants to spy upon :jmericans. The great majority of abuses mlcovered in domestic intelligence involved the pervasive use of informants ?ga.inst dissident, political groups. The Committee defers the question of whether judicial approval should be required for targeting inform- ants, until review by the Attorney General alone has been tested.

In my view, control of informants and control of wiretapping can be distinguished only on the basis of present constitutional doctrine; the Supreme Court has not found the use of informants to violate Fourth Amendment guarantees against Government intrusion. HOW- ever, in terms of the values underlying both the First and Fourth Amendments, our record shows that the use of informants can, if anyt.hing be even more intrusive and more easily abused than electronic surveillance. As a matter ?f policy, they should be st.ringent.ly con- trolled.

From the prosecutor’s viewpoint, a wiretap is more precise and reliable than an informant. The accuracy of an informant Avitness may be vulnerable to challenge. But as a source of intelligence, informants can be directed at all of the subject’s associates. They can follow the subject from place to place and can even be asked to elicit information through specific questions. In effect, a well-placed informant can be a “walking, thinking ‘bug:.” The use of such informants is at the heart of the chilling effect which preventive intelligence has on political dissent.

Whether informant penetrations are to be approved by the Attorney General or by a judge, the Commit,tea report recogmzes the great dangers they pose. 2 We recommend a high standard for their use: Probable cause to believe the target soon will engage in terrorist activity. My concern is that, in an effort to accommodate the realities of preventive intelligence, our proposals may render this standard illusory.

The FBI argued that, in the case of tightly knit conspiracies, it could not meet that standard without the initial resort to informants.

‘Some of the “practical” reasons advanced against judicial warrants for in- formants do not bear close scrutiny. The Committee was told there is no flxed mint when a potential source becomes an “informant,” comparable to installa- tion of a wiretap. It was also urged that full supervision of an informant re quires day-to-day monitoring of his activities ; and that the Attorney General could exercise more comprehensive control. But our proposals do identify a specific event, targeting the informant on particular persons, which requires a decision by the Attorney General. The basic wisdom of the Fourth Amend- ment is its insistence that a disinterested party apply the appropriate standard rather than the head of an investigative agency. The Attorney General’s ongoing supervision of informant use could supplement the threshold decision of a neutral magistrate, just as it would for wiretaps. There is no need to choose between them.

Page 378: Church Committee: Reports-- Book II

362

Therefore, t,he Committee would permit “temporary” targeting of informants for up to five months. In effect, the FBI could bootst.rap its investigat,ion by employing informants t,o collect enough information to justify their use. The Committee does require that t,his use of in- formants be terminated if probable cause cannot be established within five months. But it is doubtful that such termination would be ef- fective to provide t.he high standard of protection the Committee feels is necessary for the use of such an intrusive tecllnique.3

To a great extent, our proposals for controlling preventive intel- ligence ult,imately rely upon t.he Attorney General and congressional oversight commit.tees. In view of the performances of t.he Congress and t.he Justice Department for the past two decades, it is not easy to have full confidence in their ability to prevent abuses of domestic intelligence without precise detailed statutory prohibitions.

Moreover, our task is not to fashion legislation which seems adequate for the present period of national calm and recent revelations of intelligence abuses. We do not need to draft safeguards for an Attorney General who makes clear-as Attorney General Levi has done-his determination to prevent abuse. We must legislate for the next periods of social turmoil and passionate dissent, when the current outrage has faded and those in power may again be tempted to in- vestigate their critics in the name of national security.

In a time of crisis, acts of violence by a tiny minority of those engaged in political protest will again place intense pressures on officials in the Department of Justice to stretch any authority we provide to its limits. For these reasons we must be extremely careful not to build too much flexibility and discretion into a system of preven- tive intelligence which can be used against domestic dissidents. As the Supreme Court has wisely observed :

The greater the importance of safeguarding the community from incitements to the overthrow of our institutions by force and violence, t,he more imperative is the need to preserve inviolate the constitutional rights of free speech, free press and free assembly in order to maintain the opportunity for free political discussion, to the end that, government may be responsive to the mill of the people and that changes, if desired, may be obtained by peaceful means. Therein lies the security of the Republic, the very foundation of constitutional government. (DeJong v. Oregon, 299 V.S. 353, 365.)

PHILIP A. HART.

3 The informant would still be in a position to report and the FBI could con- tinue to ask him questions, as they could of any citizen. Indeed, he might vol- urrteer information in order to reestablish a paying relationship. The only con- straint is that the FBI could no longer give him direction. After five months, however. even the most unsophisticated informant would be aware of those sub- jects and targets in which the Bureau was interested.

Page 379: Church Committee: Reports-- Book II

~IDDITIOSAI, STATEMEST OF SENATOR ROBERT MORGAN

In 1776 the citizens of a new America, in declaring their independ- ence from a repressive government, set forth the goals, ideals and standa.rds of their new government in the Declaration of Independ- ence. As we prepare to celebrate the 200th anniversary of the birth of our country later this year, we will reaffirm the beliefs of our fore- fathers that America will be a free country, with a government of laws and not one of men. That the Senate Select. Committee on Intelligence has completed its year-long investigation into the secret act.ivities of this country’s intelligence agencies and is releasing this Report is a great testament to the freedom for which Amerna stands.

During the course of the past year, the Committee has discovered and revealed to the American people many actions of agencies of om government which were undertaken in complete disregard for ,the principles of our democratic society. The Committee’s Report, docu- ments many of these abuses, basing its findings directly on the ad- missions of officials of the governmental agencies being investigated and upon information taken directly from the files of those agencies.

The Report also analyzes those findings and recommends guidelines and 1)rocedures designed to protect the rights of American citizens in the future, while at the same time ensuring that our intelligence agen- cies maintain the capability to function effectively. I fully support the findings, analyses and recommendations, and make this additional statement only for the purpose of sharing with the readers of this Report some of my personal thoughts on the significance of the Com- mittee’s work and where we .go from here.

The Committee has approached the performance of its obligation mandated by Sen. Res. 21 with an abundance of caution. Many of the Committee’s executive session hearings, because of the sensitive nat.urc of the subject matter, were even restricted to Members and only those staff who were assigned specific duties relevant to the inquiry. Because of the dedication of the Members and staff to the seriousness of the undertaking, we are allproaching the completion of our work with a remarkably clean record as far as leaks of classified material detrimental to the security of the connt.ry are concerned.

From the beginning of our work until the end, the Committee has gone beyond the dictates of normal congrcssiona.1 investigation to try to accommodate concerns of the agencies under investigation for the security of material requested by the Committee. To this end, long hours were spent negotiating over what material would be made avail- able to the Committee in response to its requests and in what form t,hat material would be given to the Committee once access to it had been acquired. Nevertheless, on many occasions the Commi,ttee re- ceived material from which significant details had been deleted, ne- cessitating further negotiations with the responsible agencies and, in

( 363 )

Page 380: Church Committee: Reports-- Book II

364l

some cases, severely hampering the Committee’s inquiry into impor tad and significant areas.

While it is understandable that executive agencies whose very oper- ations are secret would be in some respect resistant to senatorial in- quiry into their activities, I can only interpret the strong resistance to some Committee demands and inquiries as being symptomatic of the atmosphere within the agencies which contributed to the occur- rence of abuse in the first instance-one of the basic distrusts of the actions of fellow American c&ens who have as their goals the strengthening of this nation’s ideals, of its moral fiber.

Just as the American citizen was denied the right to decide for himself what was or was not in the best interest of the country, or what actions of a foreign government or domestic dissident threatened the national security, the impression has been generated by some that the Congress cannot be trusted with the nation’s crucial secrets. As the elected representative of the citizens of my state, I am entrusted with the right and duty to

i? roperly conduct the business of our

government. Without knowle ge of governmental actions or effective means of overseeing those actions, my efforts to fulfill the require- ments of that obligation are, at least, severely hampered; at most, impossible, and the successful implementation of an adequate system of checks and balances, as set forth in our Constitution, is effectively negated.

The Committee’s Report contains clear examples of the denial of the rights of American citizens to determine the course of American history. While the FBI’s counterintelligence activities directed at American citizens on many occasions violated the rights of the target,s of the programs, a greater abuse was the belief fostered that the ordi- nary American citizen was not competent enough to, indenendentlg of governmental actions, decide, given full knowlcdrre of all facts, what was in his or her best interest or in the best interest of the country. The judicial process, to which we turn for settlement of our disputes and nunishment of criminals, was also largelv ignored. FRI action was based, for example, on the assumption t,hat all Americans op- posed to this country’s participation in the Vietnam War might one day take to the streets in violent prot,est, thereby threatening our national security. It was assumed, for example, that right-wing, anti-communist *groups in the 1960s would gain the sympathies of too many Americans thereby impeding policies of the then admin- istration, so their taxes were checked. It was assumed, for example, that every black student on every college campus in America would resort to violence, so procedures were undertaken to establish files on all of them.

All of these a&ions deny Americans the right to decide for them- selves what will not be tolerated in a free society. ,Justice Doughrs, defending ‘the freedom of speech in his dissenting opinion in Dennis v. U.S., 341 U.S. 494, spoke words which vividly reflect the necessitv that we, t,o remain free, must hold high this basic right of self- determinaGon which has enabled us to attain the strength and pros- perity t,hat we as a nation now enjoy. Justice Douglas wrote,

FUR and free discussion has indeed been t.he first article of our faith. We have founded our political system on it. It has been the safeguard of every religious, pobtical, philosophical, economic, and racial group amongst us. We have counted on

Page 381: Church Committee: Reports-- Book II

365

it to keep us from embracing wh’at is cheap and false; we have trusted the comwn sense of our people to choose the doctrine true to our ge&us and to p-eject ths rest. This has Been the out- standing tenet that has made OUT institutions the symbol of freedom a.nd equality. We have deemed it more costly to lib- erty to suppress a despised minorilty than to let them vent their spleen. We have above all else feared the political censor. We have wanted a land where our people can be exposed to all the diverse creeds and cultures of the world. [Emphasis added.]

Furthermore, just as the American citizen must be given the right to validly assess the significance and merit of political change sought by othe,rs, the elected representatives of the people must hlave know]- edge of governmental action to properly determine which perceived threats to our way of life are real, Justice Brandeis, in Oh&ad v. 17.S., 2’77 U.S. 438, said, “The greatest dangers to liberty lurk in in- sidious encroachment by men of zeal, well-meaning but without understanding.”

The continued existence of our democracy demands that we zeal- ously protect the inherent right of all Americans to be free from unwarranted intrustion into their lives by governmental action. History has demonstrated, from the time of the founding of Chris- tianity through the founding of these United States, through today, that there is a place for differences of opinion among our citizenry; for new, bold and innovative ideas. Thomas Jefferson wrote that “the republican is the only form of government which is not eternally at open or secret war with the rights of mankind.” To maintain our Republic, we must be willing to tolerate the right of every Bmerican citizen to, within the confines of the law? be different.

Throughout the existence of the Committee, I have often said that while the occurrence of the events which gave rise to the investiga- tion were unfortunate and are, in many instances, embarrassing to our country and some of its agencies, public disclosure was necessary in order to clear the air so that the agencies could devote their full attention to properly carrying out their important duties. I feel the Committee as a whole shar,es this view and has attempted to enhance the performance of the functions of the agencies by making specific recommendations which, when implemented and coupled with the establishment of an effective oversight committee, will guarantee that our country will not be subverted, nor subvert its ideals in the name of national security or other improperly perceived threats. It is my sincere hope that our citizens will view this Report as one of the many expressions of freedom we will make this year and that it will rekindle in each of us the belief that perhaps our greatest strength lies in our ability to deal frankly, openly, and honestly with the problems of our government.

ROBERT MORGAN.

Page 382: Church Committee: Reports-- Book II
Page 383: Church Committee: Reports-- Book II

INTRODUCTION TO SEPARATE VIEWS OF SENATORS JOHN TOWER, HOWARD H. BAKER, JR., AND BARRY M. GOLDWATER

Our mutual concern that certain remedial measures proposed by this Committee t,hreaten to impose undue restrictions upon vital and legitimate intelligence functions prevents us, in varying degrees, from rendering an unqualified endorsement to this Committee’s findings and recommendations in their entirety. We also perceive a need to empha- size areas of common agreement such as our unanimous endorsement of intelligence reforms heretofore outlined by the President.

Therefore, we have elected to articulate our common concerns and observations, as viewed from our individual perspectives, in separate views which follow.

JOHN TOWER, Vice Chairman. HOWARD H. BAKER, JR. BARRY M. GOLDWATER.

Page 384: Church Committee: Reports-- Book II
Page 385: Church Committee: Reports-- Book II

SEPARATE VIEWS OF SENATOR JOHN G. TOWER, VICE CHAIRMAN

When the Senate mandated this Committe.e to conduct an invest.iga- tion and study of activities of our Sation’s intelligence community, it recognized the need for congressional part.icipation in decisions which impact. virt.ually every aspect. of American life. The gravamen of our charge was to examine the Nation’s intelligence needs and the per- formance of agencies charged with intelligence responsibilities, and to make such assessments and recommendations as in our judgment are necessary t.o maintain the delic.ate balance b&ween individual liberties and national security. I do not believe the Committee’s reports and accompanying staff studies comply fully with t.he charge to maintain that balance. The Committee’s recommendat.ions make significant departures from an overriding lesson of the American experience- the right of ,imarican citizens to be free is inextricably bound to their right to be secure.

I do not question the existence of intelligence excesses-the abuses of power. bot.h foreign and domestic, are well documented in the Com- mittee’s report.

Nor do I question t,he nee,d for expanded legisla.tive, executive, and judicial involvement in intelligence policy and practices-the “uncer- tainties as to the authority of IJnited States intelligence and related agencies” were explicitly recognized by Senate Resolution 21.

Nevertheless, I question? and take exception to, the Committee’s report to t,he extent, that its recommendations are either unsupported by the fac,tual record or unduly restrict attainment of valid intel- ligence objectives.

I. believe that the 183 separate recommendations proposing new de,t.ailed statutes and reporting procedures not only exceed the number and scope of documented nbuses, but represent over-reaction. If adopted in their t.ot.ality, they would unnecessarily limit the effective- ness of the Nation’s intelligence communit,y.

In the area of foreign intelligence, the Committee was specifically mandated to prevent “. . . disclosure, outside t,he Select Committee, of any information which would adversely affect the intslligence activi- ties . . . of the Federal Government.” In his separate view, Senator Barry Goldwater clearly points up the damage to our efforts in Latin America occ.asioned by release of the “staff report” on covert action in Chile. I objected to releasing the Chile resport and fully suppoti Senator Goldwater’s assessment of the adverse impact of this “ironic” and ill-advised disclosure.

(369)

Page 386: Church Committee: Reports-- Book II

370

L4nother unfortunate ‘aspect of the Committee’s foreign report is its response to incidents of lack of accountability and control bv rec- ommending the imposition of a layering of JXseclltiye Br:lnch &views at operational lrvcls and nretllcss bifurcation of the (lecisionmaking process. The Presitlent’s reorganization whicll centralizes fore&x intelligence operations and provides for constant review and oversight, is termed “ambiguous.” l-et the (‘ommittec’s recommended statutory changes Woultl [in addition to tluplication and multil~lication of decisions] acid little except to insure that the existing functions set up by the President’s 1)rogram were “eul~licitly empowered,” “re- affirmed” or provicled with -“adequate stall.” By concentration upon such details as which cabinet officer should chair the various review groups or speak for the President? the Committee’s approach un- necessarily restricts Presidential discretion, without enhancing ef- ficiency, control, or accountabi1it.y. The President’s reorganization is a thorough, comprehensive response to a long-stancling problem. It should be supportecl, not pilloried with statutory amendments amount- ing to little more than alternative ma.nagement techniques. It is far more appropriate for the Congress to place primary legislative em- phasis on establishing a structure for Congressional Oversight which is compatible with the Executive reorganization while eliminating the present proliferation of committees and subcommittee’s asserting jurisdiction over intelligence activities.

Another area in which I am unable to agree with the Committee’s approach is covert action. It. would be a mistake to attempt to require that the Congress receive prior notification of all covert activities. Senator How-arc1 Baker repeatedly urged the C‘ommittee to adopt the more realistic approach of obligating the Executive to keep the Con- gress “fully and currently informed”. I belie.ve any attempt by the legislative branch to impose a strict prior notification requirement upon the Executive’s foreign policy initiatives is neither feasible nor consistent with our constitmionally n1andate.d separat.ion of powers.

On the domestic front the Committee has documented flagrant abuses. Of particular concern were the political misuses of such agencies as the Federal Bureau of Investigation and the Internal Revenue Service. However, while thoroughly probing these repre- hensible activities and recommending needed changes in accounta- bility mechanisms, the Committee’s “corrective” focus is almost exclusively on prohibitions or limitations of agenc.y practices. I hope this approach to remedial action will not be rea,d as broad crit- icism of the overall performance of the intelligence community or a minimization of the Committee’s own finding that “. . . a fair assess- ment must place a major part of the blame upon the failures of senior executive officials and Congress.” In fact, I am persuaded that the failure of high officials to investigate these abuses or to terminate them when they learned of them was almost as reprehensible as the abuses themselves.

Page 387: Church Committee: Reports-- Book II

371

h further objectionable aspect of the Committee’s approach is the ~copr of the proposed limitations on the use of electronic surveillance and informants as in\-rstigative tccliniclues. With respect to electronic surveillance of Americans suspected of intelligence activities inimical to the national interest. the Committee would limit nntllority for such probes to violations of specific. criminal statutes. This pr0posal fails to ntltlress the real problem of utilizing electronic surveillance against myriad forms of espionage. A4 majority of the Committee recom- mentled this narrow standard while acknowledging that existing statutes offer inadequate co\-erage of ‘~inoclcrn forms of espionage. The Committee took no testimony on rr\-ision of the espionage laws and simply prol)osecl that another committee “explore the necessity for amendments.” To prohibit electronic surveillance in these cases pending such revision is to sanction an unnecessary risk to the national security. In adopting this position the Committee not only ignores the fact that appellate courts in t\vo federal circuits have upheld the Executive’s inherent authority to conduct such surveillance, but also fails to endorse the .ittorney General’s comprehensive proposal to remedy objection to current practices. The proposed safeguards, which include requirements for the Attorney General’s certification of hostile foreign intelligence involvement and issuance of a judicial warrant as a condition precedent to electronic surveillance, represent a signif- icant expansion of civil liberties protections. The proposal enjoys bi-partisan support in Congress and 1 join those members urpmg prompt enactment.

I am also opposed to the methods and means proposed by the Com- mittee to regulate the use of informants. Informants have been in the past and will remain in the future a vital tool of law enforcement. TO adopt the Committee’s position and impose stringent, mechanical time limits on the use of informants-particularly regarding their use against terrorist or hostile foreign intelligence activities in the United States-would be to place our faith in standards which are not only illusory, but unworkable.

In its overly broad approach to eliminating intelligence abuses, the Committee report, urges departure from the Congress’ role as a partner in national security policy and comes dangerously close to being a blueprint. for authorizing Congressional management of the day-to- day affairs of the intelligence community. Whether this management is attempted through prior notification of a shopping list of prohibi- tive statutes and regulations, it is a task for which the legislative branch of government is ill-suited. I believe the adverse impact which would be occasioned bv enactment of all the Committee recommenda- tions would be substantial.

Substantial segments of the Committee’s work product will assist this Congress in proceeding with the task of insuring the conduct of necessary intelligence activities in a manner consistent with our obli- <ration to safeguard the rights of American citizens. However, we must HOW step back from the klieg lights and abuse-dominated atmosphere, and balance our findings and recommendations with a recognition that our intelligence agencies and the men and women who serve therein have been and will always be essential to the existence of our nation.

Page 388: Church Committee: Reports-- Book II

372

This Committee was asked to provide a constitutionally acceptable framework for Congress to assist in that mission. We were not man- dated to render our intelligence systems so constrained as to be fit for employment only in an ideal world.

In addition to the above remarks I generally endorse the positions set forth in Senator Raker’s individual views. I specifically endorse :

His views stating the need for legislation making it a criminal offense to publish the name of a United States intel- ligence officer stationed abroad under cover.

His position that there must be a system of greater account- ability by our intelligence operations to the United States Congress and the American people.

His concern that the Congress exercise caution to insure that a proper predicate exists before any recommendations for permanent reforms are enacted into law.

His view that there be careful study before endorsing the Committee’s far reaching recommendations calling for an alteration of the intelligence community structure. I also support the individual views of Senator Goldwater.

Further, I specifically endorse :

His assessment that only a small segment of the American public has ever doubted the integrity of our Nation’s intelli- gence agencies.

His opinion that an intelligence system, however secret, does not place undue strain on our nation’s constitutional government.

His excellent statement concerning covert action as an essential tool of the President’s foreign policy arsenal.

His opposition to the publication of an annual aggregate figure for United States intelligence and his reasons therefor.

His views and comments on the Committee’s recommenda- tions regard the National Security Council and the Office of the President. Specifically, comments number l&13 and 14.

His views challenging the proposed limitations concerning the recruitment of foreigners by the Central Intelligence Agency.

His views and general comments concerning the right of every American, including academics, clergymen, business- men and others, to cooperate with his government in its law- ful pursuits.

For the reasons stated above, I regret that I am unable to sign the final report of the Select Committee to Study Governmental Opera- tions With Respect to Intelligence Activities.

JOHN G. TOWER, Vice Ghaimurn.

Page 389: Church Committee: Reports-- Book II

SEPARATE VIEWS OF SENATOR HOWARD H. BAKER, JR.

At the close of the Senate Watergate Committee, I felt that there was a compelling need to conduct a thorough examination of our in- telligence agencies, particularly the CIA and the FBI. Congress never had taken a close look at the structure or programs of either the CIA or the FBI, since their inception in 1947 and 1924, respec- tive1y.l

Moreover, there never had been a congressional review of the intelligence community as a whole. Therefore, I felt strongly that this Committee’s investigation was necessary. Its time had come. Like the Watergate investigation, however, for me it was not a pleasant assignment. I say that because our investigation uncovered many actions by agents of the FBI and of the CIA that I would previously have not thought possible (e.g., crude FBI letters to break up mar- riages or cause st.rife between Black groups and the CIA assassmatlon plots) in our excellent intelligence and law enforcement institutions. Despite these unsavory actions, however, I do not view either the FBI or CIA as evil or even basically bad. Both agencies have a long and distinguished record of excellent service to our government. With the exception of the worst of the abuses, the agents involved truly believed they were acting in the best interest of the country. Nevertheless, the abuses uncovered can not be condoned and should have been investi- gated long ago.

I am hopeful, now that all these abuses have been fully aired to the American people through the Committee’s Hearings and Report, that this investigat.ion will have had a cathart.ic effect; that the FBI and CIA will now be able to grow rather than decline. Such growth with a healthy respect for the rule of law should be our goal; a goal which I am confident can be attained. It is important for the future of this country that the FBI and CL4 not be cast as destroyers of our con- stitutional rights but rather as protectors of those rights. With the abuses behind us this can be accomplished.

LONG-TERM IMPROVEXENT OF INTELLIGENCE COMMUNITY

On balance, I think the Committee carried out its task responsibly and thoroughly. The Committee’s report on both the Foreign and Domestic areas are the result of extensive study and deliberation, as well as bipartisan cooperation in its drafting. The Report identifies many of the problems in the intelligence field and contains positive sug- gestions for reform. I support many of the proposed reforms, while differing, at times, with the means we should adopt to attain those reforms. In all candor, however, one must recognize that an sinvestiga- tion such as this one, of necessity, will clause some short-term damage to our intelligence apparatus. 9 responsible inquiry, as this has been, will in the long run result in a stronger and more efficient intelligence community. As my colleague Senator Morgan recently noted at a Com- mitt.ee meeting, such short-term injury 611 be outweighed by long- term benefits gained from the re-structuring of the intelligence com-

1 Upon the expiration of the Watergate Committee in September 1974, I had the pririlege to consponsor with Senator Weicker, S. 4019, which would have created a joint committee on Congress to oversee all intelligence activities.

(373)

Page 390: Church Committee: Reports-- Book II

374

munity with more efficient utilization of our intelligence resources. Former Dire&or William Colby captured this sentiment recently in a Sew k70rk Times article :

Intelligence has traditionally existed in a shadowy field outside the law. This year’s excitement has made clear that the rule of law applies to all parts of the American Govern- ment, including intelligence. In fact, this will strengthen American intelligence. Its secrets will be understood to be necessary ones for the protection of our democracy in tomor- row’s world, not covers for mistake or misdeed. The guide- lines within which it should and should not operate will be clarified for those in intelligence and those concerned about it. Improved supervision will ensure that the intelligence agencies will remain within the new guidelines.

The American people will understand and support their intelligence services and press their representatives to give intelligence and its officers better protection from irrespon- sible exposure and harassment. The costs of the past year mere high, but they will be exceeded by the value of this strengthening of what was already the best intelligence serv- ice in the world.2

The Committee’s investigation, as former Director Colby points out, has probed areas in which reforms are needed not to prevent abuses, but to better protect and strengthen t.he intelligence services. For example, it is now clear that legislation is needed to make it a criminal offense to publish the name of a United States intelligence officer stat.ioned abroad.3 Moreover. the Committee’s investigation convinced me that the State Department should revise its publication of lists from which intelligence officers overseas predictably and often easily can be identified.

Yet we have not, been able. in a vear’s time, to examine carefully all facets of the United States’ incredibly important and complex intel- ligence community.4 We have established that in some areas problems exist which need intensive long-term study. Often these most im- portant and complex problems are not ones which lend themselves to quick or easy solutions. As Ambassador Helms noted in his testimony during the Commit,tee?s public hearings :

. . . I would certainly agree that in view of the statements made by all of you distinguished gentlemen, that some result from this has got to bring about a system of accountability t.hat is going to be satisfactory to t,he U.S. Congress and to the American people.

* New York Times, Jan. 26,1976. ‘I intend to propose an amendment to S. 400 to make it a criminal offense to

publish the name of a United States intelligence officer who is operating in a cover capacity overseas.

’ For many months, the Committee thoroughly and exhaustively investigated the so-called “assassination plots” which culminated with the filing of our report on Sorember 18, 1975. This investigation was vitally important in order to clear the air and set the record straight. And, it n-as instructive as to how “sensitive” operations are conducted within our intelligence structure. But, it neces- sarily shortened the time available to the Committee to investigate the intelli- gence community as a whole.

Page 391: Church Committee: Reports-- Book II

375

Kow, exactly how you work out. that accountability in a secret intelligence organization, I think? is obviously going to take a good deal of thought and a good deal of work and I do not hare any easy ready answer to it because I assure you it is not an easy answer. In other words, there is no quick fix. (Hearings, Vol. I, 9/17/‘75, p. 124).

THOROUGH STUDP XIKESSARY IS SEVERAL ARUS

The areas which concern me the most are those on which we as a Com- mittee have been able to spend only a limited amount of time,5 i.e., espionage. counterintelligence, covert action, use of informants, and electronic surveillance. It is in these areas that I am concerned that the Committee be extremely careful to ensure that. the proper thorough investigatory predicate exist before any permanent reform recom- mendatlons be enacted into law.

Our investigation, however? has provided a solid base of evidence from which a permanent oversi.ght committee can and should l’aunch a lengthy and thorough inquiry mto the best way to achieve permanent restructuring in these particularly sensitive areas. It is my view that such a study is necessary before I am able to endorse some of the Com- mittee’s recommendations which suggest a far reaching alteration of the structure of some of the most important facets of our intelligence system.

Therefore, while I support many of the Committee’s major recom- mendations, I find myself unable to agree with all the Committee’s findings and recommendations in both the foreign and domestic areas. Nor am I able to endorse every inference, suggestion, or nuance con- tained in the findings and supporting individual reports which to- gether total in the thousands of pages. I do, however, fully support all of the factual revelations which our report contains concerning the many abuses in the intelligence field. It is important to disclose to the American people all of the instances of wrongdoing we dis- covered. With such full disclosure, it is my hope that we can turn the corner sncl clerote our attention in the future. to improving our intelli- gence ,oathe.ring capability. We must ha.ve reform, but we must accom- plish It by improving: not limiting, our intelligence productivity. I am conficlent this can be done.

CGMULATIVE EFFECT OF RECOMMENDATIOXS

With regard to the totality of the Committee’s recommendations, I am afraid that the cumulative effect of the numerous restrictions which the report proposes to place on our intelligence community may be damaging to our intelligence effort. I am troubled by the fact that some of the Committee’s recommendations dip too deeply into many of the operational areas of our intelligence agencies. To do so, 1 am afraid, will cause practical problems. The totality of the proposals may decrease instead of increase our intelligence product. And, there

5 The Committee’s mandate from Congress dictated that the abuses at home and abroad be given detailed attention. Snd, there are only a finite number of important problems which can be examined and answered conclusively in a year’s time.

Page 392: Church Committee: Reports-- Book II

376

may be serious ramifications of some proposals which n-ill, I fear, spawn problems which are as yet unknown. I am unconvinced that the uncertain world of intelligence can be regulated with the use of rigid or inflexible standards.

Specifically, I am not convinced that the answers to all our problems are found by establishing myriad Executive Branch boards, commit- tees, and subcommittees to manage the day-to-day operations of the intelligence community. We must take care to avoid creating a Rube Goldberg maze of review procedures which might result in a bureau- cratic morass which would further increase the burden on our already heavily overburdened tax dollar.

We should not over-reform in response to the abuses uncovered. This is not to say that we do not need new controls, because we do. But, it is to say that the controls we impose should be well reasoned and add to, not detract from the efficiency of our intelligence gather- ering system.

Increased Executive Branch controls are only one-half of the SO~U- tion. Congress for too long has neglected its role in monitoring the intelligence community. That role should be significant but not all- encompassing. Congress has a great many powers which in the past it has not exercised. We must now do our share but, at the same time, we must be careful, in reacting to the abuses uncovered, that we not swing the pendulum back too far in the direction of Congress. Both wisdom and the constitutional doctrine of separation of powers dictate that Congress not place itself in the position of trying to manage and control the day-to-day business of the intelligence operations of the Executive Branch. Vigorous oversight is needed, but it should be carefully structured in a nexv powerful oversight committee. I be- lieve this can be achieved if we work together to attain it.

In moving toward improving our intelligence capability, we must also streamline it,. It is in this approach that my thoughts are some- what conceptually different from the approach the Committee is rec- ommending. I am concerned that we not overreact to the past by creating a plethora of rigid “thou shalt not” statutes, which, while prohibit,ing the specific hypothet.ical abuse postured m the Report, cast a wide net which will catch and eliminate many valuable intel- ligence programs as well.

The Committee Report recommends the passage of a large number of new statutes to define the functions of and furthe’r regulate the intelligence community. I am troubled by how much detail should be used in spelling out the functions and limitations of our intelligence agencies for all the world to see. no we want to outline for our adver- saries just how far our intelligence agencies can go? Do we want to define publicly down to the last detail what they can and cannot do? I am not sure we do. I rather think the answer is found in establishing carefullv structured charters for the intelligence agencies with ac- countability and responsibilitv in the Executive Branch and vigilant oversight within the Legislative Branch.

Page 393: Church Committee: Reports-- Book II

377

PRESIDENT’S PR~GFUM

It is mv view that we need to take both a moderate ancl efficient course in reforming our intelligence gathering system. In that regard, I think President Ford’s recent restructuring of the intelligence community was an extraordinarily good response to the problems of t.he past. The President’s program efYected a massive reorganization of our entire intelligence communit 7. lem which did not len R

It was a massive reaction to a massive prob- itself to easv solution. I am pleased that many

of the Committee’s recommendations for intelligence reform mirror the President’s program in format. Centralizing the command and control of the intelligence community, as the President’s program does, is the best way to ensure total accountability and yet not compromise our intelligence gathering capability.

Therefore, I endorse the basic framelvork of intelligence reform, outlined by President Ford! as emboclying : (1) a single permanent oversight committee in Congress. with strong and aggressive staff, to oversee the intelligence community $ (2) the Committee on Foreign Intelligence to manage the day-to-day operation of the intelligence community; (3) the re-constituted Operations Adrisorv Group to re- view and pass upon all significant covert actions projkcts;7 and (4) the Intelligence Oversight Board to monitor any possible abuses in t.he future, coordinating the activities and reports of what I am confident will be the considerablv strengthened ofJiccs of General Counsel and Inspector General. Thi<framework will accomplish the accountability and responsibility we seek in the intelligence community with both thoroughness ancl efficiency. M?thin this framework, Attorney General Levi’s new guidelines in the Domestic Securitv area will drastically alter this previously sparsely supcrvisetl tie1d.O These guidelines lviil centralize responslb+ty for domestic intelligence within the Depart- ment of Justice and w-111 preclude abuses s11cl1 as COISTELPRO from ever reoccurring.8

SPECIFIC REFORMS

1%thin this basic framework. K-C must look to how we are going to devise a system that can bot,h effectively oversee the intelligence com- munity and yet not impose strictures which will eliminate its produc- tivity. It is to this end that I suggest we mow in the following direction :

‘My original support for a single joint committee of Congress has evolved, somewhat as affected by the events of this past year’s House Intelligence Com- mittee iurestigation, to support for a single Senate committee. However, I also favor the mandate of the new committee including. as does the nresent S. 400. a charge to consider the future option of merging into a permanent-joint committee upon consultation with and action by the House of Representatives. The moment for meaningful reform is now and we must not lose it by waiting for a joint com- mittee to be approved by both Houses of Congress.

“I think a rule of reason should apply here. Ml significant projects certainly should receive careful attention from the Group. On the other hand, I would not require a formal meeting with a written record to authorize the payment of 2 sources in X country at $50 per month to he changed to the payment of 3 sources in X countrv at $40 ner month.

a I applaud the deEailed guidelines issued by the Attorney General to reform the Department’s entire domestic intelligence program I think he is moving in the right direction by requiring the FBI to meet a specific and stringent standard for opening an intelligence investigation, i.e., the Terry v. Ohio standard.

Page 394: Church Committee: Reports-- Book II

378

(1) Demand responsibility and accountability from the Executive Branch by requiring all major policy decisions and all major intelli- gence actlon decisions be, in writing, and therefore retrievable.”

(2) 1 recommend, as I have previously: that Congress enact a varia- tion of S. 400, which I had the privilege to cosl~onsor. S. 400 is the C;overnment Operations Committee bill which would create a perma- nent oversight committee to review the intelligence community. The existing Congressional oversight system has provided infrequent aud inetiectual review. And, many of the abuses revealed might have been prevented had Congress been doing its job. The jurisdiction of the new committee should include both the Clh and the FBI, and the com- mittee should be required to reTieI\- and report periodically to the Senate on all aspects of the intelligence conimunity%i operations. In particular, I recommend that the Committee give specific careful attention to how we might improve as well as control our intelligence capability in the counterintelligence and espionage areas.

(3) Simultaneously with the creation of a permanent ove,rsight committee, Congress should amend the Hughes-Ryan Amendment to the 1974 Foreign Assistance Act, 5 668, which now requires the intelligence community to brief 6 committees of the Congress on each and every major intelligence action. Former Director Colby strikes a responsive chord when be complains that the present system will lead to leaking of vital intelligence information. We must put a stop to this. This can be done by allowing the intelligence community to report only to a single secure committee.

(4) Concomitantly with improved oversight, we in Congress must adopt stringent procedures to prevent leaks of intelligence informa- tion. In this regard. I recommend we create a regular remedy to pre- vent the extraordinary remedy of a single member of Congress dis- closing the existence of a covert intelligence operation lvith which he does not agree. Such a remedy could take the form of an appeal proce- dure within the Congress so that a single member, not satisfied with a Committee’s determination that a particular program is in the na- tional interest, will be provided with an avenue of relief. This proce- dure, however, must be coupled with stringent penalties for any mem- ber of Congress who disregards it and discloses classified information anyway. I intend to offer an amendment to institute such a remedy when S. 400 reaches the Senate floor.lO

(5) The positions of General Counsel and Inspector General in the intelligence agencies should be elevated in importance and given in- creased powers. I feel that it is extraordinarily important that these

‘Never again should we be faced with the dilemma we faced in the assassina- tion investigation. We climbed the ladder of authority only to reach a point where there were no more written rungs. Responsibility ceased ; accountability ceased; and. in the end, n-e could not sag whether some of the most drastic actions our intelligence community or certain components of it had ever taken against a foreign country or foreign leader were approred of or even known Of by the President who was in office at the time.

I0 I IVould faror a procedure, within the Congress, which n-ould in effect create an aVenUe Of appeal for a member dissatisfied With a Committee determination on a classification issue. Perhaps an appeal committee made up of the Majority and 3Iinorit.V leaders and other appointed members would be appropriate. Leaving the mechanics aside, howerer, I beliere the concept is important and can be implemented.

Page 395: Church Committee: Reports-- Book II

379

positions, particularly that of General Counsel, be upgraded. For that reason, I think that it is a good idea to have the General Counsel, to both the FBI and the CIA, subject to Senate confirmation. This adds another check and balance which will result in an overall improvement of the sy~tem.~~ Additionally, I feel that it is equally important to pro- vide both the General Counsel and Inspector General with unrestricted access to all raw files within their respective, agencies.lza This was not always done in the past and will be a healthy addit,ion to the intra- agency system of checks and balances.

(6) I am in favor of making public the aggregate figure for the budget of the entire intelligence community. I believe the people of the United States have the right to know that figure.l” The citizens of this country have a right to know how much of their money we are spending on intelligence production. But, they also want to get their money’s worth out of that tax dollar. They do not want to spend that money for intelligence production which is going to be handicapped ; which is going to produce poor or inaccurate intelligence. Therefore, I am opposed to any further specific delineation of the intelligence com- munity budget. Specifically, I am opposed to the publication of the CIA’s budget or the SSA’s budget. It seems to me we are dealing with the world of the unknown in predicting what a foreign intelligence service can or cannot extrapolate from these budget figures. We re- ceived no testimony lvhich guaranteed that, if Congress were to publish the budget figure for the CIA itself, a hostile intelligence organization could not extrapolate from that figure and determine much more ac- curately what the CIA capabilities are in any number of vital areas. Without such testimony, I am not prepared to go that far. The public’s right to know must be balanced with the efficiency and integrity of our intelligence operations. I think we can accomplish both by taking the middle road; publishing the aggregate figure for the entire intelli- gence community. It is this proposal that I have voted in favor of.

There are a number of other specific findings and recommendations, supported by a majority of the Committee, which require additional brief comment.

U I differ with the Committee in that I would not have the General Counsel and Inspector General file reports and/or complaints concerning possible abuses with the Attorney General. Rather, I think the more appropriate interface in a new oversight system would be for both to take complaints to the Intelligence Over- sight Board and the new congressional oversight committee. The Attorney Gen- eral n*ould remain the recipient of any and all complaints regarding possibIe violations of law.

IJ* I support the Committee’s recommendation that ‘agency employees report any irregularities directly to the Inspector General without going through the chain of command, i.e. through the particular division chief involved.

“I do not feel that, despite my personal view that the aggregate budget figure should be disclosed to the public, only six to eleven members of the Senate have the right to release unilaterally the actual budget figures. A majority of both Houses of Congress should be necessary to release such information. And, while I would cast my vote in favor of the release of the aggregate budget figure, I am troubled that there may be no such vote. I am not sure the “right” result. justifies the “wrong” procedures, because the next time the wrong procedure can just as easily be utilized to reach the wrong result.

Page 396: Church Committee: Reports-- Book II

380

FOREIGN IXTELLIGEXCE RECOMMESDATIOSS

(1) COVERT ACTION

I believe the covert action capability of our intelligence community is vital to the United States. We must maintain our strength in this capacity, but, we must also control it. The key and difficult question, of course., is how we can control it without destroying or damaging its effectiveness. In my view, the best way to both maintain strength and yet insure accountability is to have strict control of the covert action programs through the Operations Advisory Group, with parallel control and supervision by the proposed permanent congres- sional oversight committee.

Covert action is a complex United States intelligence capability. Covert action provides the United States with the ability to react to changing situations. It. is built up over a long period of time. Potential assets are painstakingly recruited all over the world. Having reviewed the history of covert action since its inception, I do not look upon the intelligence agents involved in covert action as a modern day group of bandits who travel the world murdering and kidnapping people. Rather, a vast majority of covert action pro rams are not only valu- able but well thought approaches through me 5 of influence which produce positive results.

ia placement and agents

Covert action programs cannot be mounted instantly upon a crisis. It is naive to think that our intelligence community will be able to ad- dress a crisis without working years in advance to establish sources in the various countries in which a crisis might occur. These sources provide what is referred to as the “infrastructure,” which must neces- sarily be in place throughout the world so that the United States can predict and prevelzt actions abroad which are inimical to our national interest.l’ I believe that, were we to completely abolish covert action or attempt to remove it from the CIA and place it in a new separate agency, these sources would dry up ; and, when a crisis did come, our intelligence community would not be able to meet it effectively. Not only do I question the effectiveness a new separate agency for covert action would have, but such a re-struc,turing would unnecessarily in- crease our already burgeoning bureaucracy.

I think that it is important to realize that covert action cannot be conducted in public. We cannot take a Gallup Poll to determine whether we should secretly aid the democratic forces in a particular aountry. I do not defend some of the covert action which has taken place in Chile. But, the ,fact remains that we cannot discuss publicly the many successes, both major and minor, which the United States has achieved through the careful use of covert action programs. Many in- dividuals occupy positions of power in the world today as a direct re- sult of aid given through a covert action program. Unfortunately, we cannot boast of or even mention these significant achievements, In short, we cannot approach covert action from a public relations point of view. We should not forget that we must deal with the world as it is today-with our adversaries employing their equivalent of covert

*‘For example, testimony before the Committee established that the CIA’s failure to act more positirely in Portugal was a direct result of an absence of suf- ficient clandestine infrastructure. William E. Colby testimony, 10/23/75 ; William Selson testimony, 11/7/75.

Page 397: Church Committee: Reports-- Book II

381

action. We must either say t.hat the intelligence community should have the power to address world problems in this manner, under the strict control of the President and Congress, or we should take away that power completley. I cannot subscribe to the latter.

Finally, the issue remains as to how we can best cont.rol covert ac- tion through statutory reform. First, I believe the Executive Branch can and should carefully review each significant covert action pro- posal. This will be accomplished through the Operations Advisory Group under the program outlined by President Ford.

Second, Congress can control covert action by passing legislation requiring that the new oversight committee be kept “fully and cur- rently informed.” This, I believe, is the appropriate statutory language to apply to covert action . I do not agree with the Committee’s recom- mendation that “prior notice” be given to Congress for each and every covert action project. As a matter of practice, the important and signif- cant covert act.ion programs will be discussed with the oversight com- mittee in a form of partnership ; and this is the way it should be. “Fully and currently informed” is language which has served us well in the atomic energy area. It has an already existin may be used as a guide for the future. It is flexi f

body of precedent that le, like the Constitution,

and provides a strong? broad base to work from. I am not prepared to say, however, that in the years ahead there may not be some vitally sen- sitive situation of which Congress and the oversight committee should not be told in advance. While the likelihood of this occurring is not great, we should never foreclose with rigid statutory language possi- bilities which cannot be foreseen today. Our statutory language must be flexible enough to encompass a variety of problems and potential problems, yet rigid enough to ensure total accountability. “Fully and currently informed” accomplishes both purposes.

(2) CIA PUBLISHING RESTRICTIONS

In the area of restrictions on the CIA% publishing of various mate- rials, I am in complete agreement that anything published in the United States by the CIA, or even sponsored indirectly by the CIA through a proprietary, front, or any other means, must be identified as coming from the CIA. Publications overseas are another matter. We should allow the Agency the flexibility, as we have in our recom- mendations, to publish whatever they want to overseas and to publish under whatever subterfuge is necessary and thought advisable.15

DOMESTIC IXTELLIGESCE RECOMMEKDATIONS

While the Committee’s Domestic Intelligence Report represents an excellent discussion of the problems attendant to that field of intel- ligence, I feel several of t.he recommendations may present practical problems. Although our objective of achieving domestic intelligence reforms is the same, I differ with the majority of the Committee in how best to approach the achievement of this goal.

161 do not view the “domestic fallout” as a real problem. To be sure, some publications by the CIA abroad will find their way back to the United States. However, to try to impose severe restrictions to prevent such fallout rrould cause unnecessary damage to the CIA’s valid production of propaganda and other publications abroad.

Page 398: Church Committee: Reports-- Book II

382

( 1) IXVESTIGATIVE STAKDARDS

Scope of Domestic Xecwify Investigations

At the outset, I note that most of my concern with the standards for investigations in the domestic security area stem from the fact that “domestic security” is defined by the Committee to include both the “terrorism” and “espionage” areas of investigation. Severe limita- tions, proscribing the investigation of student groups, are more readily acceptable when they do not also app.ly to terrorist groups and foreign and domestic ageds involved in espionage against the United States. To include these disparate elements within the same “domestic secu- rity” rubric, it seems to me, will create unnecessary problems when it comes to the practical application of the theoretical principles enun- ciated in the Committee% recommendations.

(a) Preeentive intelligence inzqestigations-The Committee’s rec- ommendations limit the FBI’s permissible investigations in these critical areas of terrorism and espionage under standards for what the Committee delineates as preventive intelligence investiga- tions. Under these standards the FBI can only investigate where:

it has a speci& allegation or specific or substantiated informa- tion that (an) &4merican or foreigner will Soon engage in terrorist activity or hostile foreign intelligence activity [emphasis added.] I6

In am not convinced that this is the best way to approach the real problem of limiting domestic intelligence investigations. While in theoretical terms the standards of the recommendations may seem appropriate, I fear the inherent practical consequences of their application to the cold, real world of terrorism and espionage. The establishment of an imminency requirement, by not permitting any investigation by the FBI unless the allegation or information received establishes that the person or group will “soon engage” in certain activit,y might prohibit any number of legitimate and necessary FBI investigations. For example, an allegation of an assassination attempt on a public figure at an unspecified date in the future could be pre- cluded from investigation; or, vague information received by the FBI that there was a plan to obtain some nuclear components, but no indication of when or how, could also be prohibited from investigation. Surely, matters such as these should be the valid subjects of investiga- tion-no matter how vague or piecemeal the information is.17

(b) Time lzkits-The Committee’s recommendations would limit any preliminary FBI investigation of an allegation of wrongdoing in the domestic Security area to 30 davs from the receipt of the infor- mat.ion, unless the Attornev General “finds” I8 that the investigation need be extended for an additional 60 days. The FBI investigation may continue beyond 90 days only if the investigatory efforts establish “reasonable suspicion’? that the person ‘or group “will soon engage in:’

la Committee Domestic Report. p. 320. ” 11~ experience dictates that many investigations are begun with very limited

or sketchy information. FBI agents and investigators in general are not always or even often immediately presented with information which constitutes probable cause of a crime. Probable cause is often established only ,through painstaking investigation; putting bits and pieces together. I think we must take this into consideration n-.hen formulating threshold investigatory standards.

I8 It is unclear what standard is to be the predicate for any such finding.

Page 399: Church Committee: Reports-- Book II

383

terrorist or foreign espionage activities. I9 And, even a full preventive intelligence investigation is not permitted to continue beyond “one year,” except upon a finding by the ,ittorney General of “compelling circumstances.” 2o

While \~-ell-intentionrd, I am not persuaded that these are workable standards. I just don’t think we can categorize all investigations into these rigid time frames. Investigations just are not. conducted that day. Thirty days, for example, is probably not even enough time to obtain a license check return from some states. JIoreorer, limiting an investiga- tion to one year may not be realistic when it applies to mvestigating a violence prone group like the SLA or a Soviet Union espionage ring. These investigations are not easily or quickly accomplished. I do not believe that the creation of artificial time limits is the best way to ap- proach the real concern of the Committee, which is that we establish institut,ional controls on domestic security investigations. I would prefer approachin, cp the control and accountability problems by pro- viding periodic Department of ,Justice reviews of aU categories of tlomcstic intelli~gence investigations ; not, by imposing specific time limits upon all mvestigations.

(2) INFORX ASTS

The Commit,& recommends broad new restrictions on the use of informants by t$e FBI. While our investigation has est.ablished that, in the. domestic intelligence field, there have been numerous abuses in the use of informants, I do not think that the proposed recommen d&ions are the best vehicles to achieve the needed reform. I cannot subscribe to recommendaitons limiting the use of informants to stringent time standardsZ1 To limit use of informants to periods of “90 days” 22 unless the Attorney General finds “probable cause” that an American will “soon” engage in terrorist or hostile foreign intelligence activity is impractical and unworkable. When groups such as the SLA attempt to rob, kill, or blow LIP buildings, it is clearly necessary to cult.ivate informants who may provide some advance warning. I am concerned that the Committee’s recommendations will preclude. this vital fmlction of the FBI. Moreover, specific time limits, it seems to me, will prove to be impractical. For example, at the end of the pre- scribed time, with not enough evidence for arrests, will informant X be terminated and replaced by informant Y who starts anew, or are informants thereafter banned from penetrating the particular group- even if violence prone or involved in espionage 1

It shoulcl be remembered that informants are the single most im- portant tool of the FBI, am1 local police for that matter, in the fight against terrorism and espionage, as well as organized crime, nar- cotics, and even t.he ever pervasive street crimes of murder, rape, and robbery. Indeed, they are the very lifeblood of such investigations. Moreover, informants are involved in a wide spectrum of activities

ID Committee Domestic Repart, pp. 320-323. SO Compelling circumstances is not further defined. so it is unclear what stand-

ards should be applied in making such a determination. ‘I JIy concerns here parallel those I hare with respect to the general inresti-

gatorr standards recommended. zL The Committee allows an additional 60 days if the Attorney General finds

“compelling circumstances.”

Page 400: Church Committee: Reports-- Book II

384

from attending public meetings to actual penetration attempts. I am concerned that theoretical and abstract restrictions designed only for “domestic intelligence”, if enacted, would soon limit our legitimate law enforcement efforts in many other fields as well. People and actions do not always fit nicely in neat little boxes labeled “domestic intelli- gence,” particularly in the terrorist and espionage areas to which the proposed restrictions on informants would apply. Congress should carefully consider the scope and ramifications of any recommendations with respect to informants.

It is my view that the better way to approach the problems en- countered in the use of informants is to put their use under strict supervision of the Department of Justice. Creation of a special staff or committee for this purpose, centralized in the. Depa.rtment of Justice, would provide eflective controls over the potential abuses in the use of informants, yet not hamstring their legitimate and valuable use.?”

(3 ) ELECTRO?r’IC SURVEILLANCE

I wholeheartedly support S. 3197, the new electronic surveilIance bill sent to the Congress by President Ford.z” It needs consolidated bi- partisan support because it represents a significant advance from existing practice. For the first time, it will bring all governmental electronic surveillance under the scrutiny of judicial warrant pro- cedures. I commend the efforts of President Ford in taking this ex- traordinary step forward in the regulation of electronic surveillance.

In supporting S. 319’7, I do not regard the existing wiretaps pres- ently maintained under the direct,ion and control of Attorney General Levi as being in violation of the Constitution. The present practice of electronic surveillance authorization and implementation rests upon a long-standing bocly of precedent which provides a firm constitutional base for their continued maintenance. The President’s approach is to move from the present practice toward better practices and procedures for authorization. The abuses of electronic surveillance of the past clearly dictate a need for a system of judicial warrant approval. Under the President’s proposal the American people will be able to rest easy- assured that electronic surveillance will be employed carefully, yet when needed to combat serious criminal and espionage activity.

I differ with a majority of the Committee insofar as they recommend that before a judge can issue a warrant for electronic surveillance he must find more than that an American is a conscious agent of a foreign power engaged in clandestine intelligence activities. The Committee would require that probable cause be established for “criminal ac- tivity” before a wiretap can be authorized. I think this departure from the S. 3197 standard would be a dangerous one because it would eliminate certain areas of espionage, particularly industrial espionage,

“Attorney General Levi is in the process of establishing guidelines to rey- late the use of informant& I recommend, however, that these guidelines be en- forced through some appropriate form of Department of Justice review of the FBI’s use of informants.

N The bill enjoyed a bipartisan co-sponsorship of Senators.

Page 401: Church Committee: Reports-- Book II

385

from electronic surveillance. Many areas of espionage do not involve clearly criminal activity. Indeed, forms of espionage may not con- stitute a criminal offense, but should be the valid target of an espionage investi,gation. For example, a situation such as American oil company executives providing unclassified but important oil reserve mforma- tlon to a Soviet agent might not be a permissible subject of electronic surveillance if “criminal activity,” rather than hostile foreign intelli- gence, were the standard.‘j I think the Committee proposed standard would harm the FBI’s espionage efforts and would therefore be a mistake.

( 4 ) CIVIL REMEDIES STATUTE

I oppose any broad nelv civil remedies statute in the field of domestic int,elligence as both dangerous and unnecessary. It is dangerous be- cause it could easily open the flood gates for numerous lawsuits filed seeking injunctive relief in the courts to thwart legitimate investiga- tions. It is unnecessary because any substantial actions are already per- mitted under present Supreme Court decisions, such as Bivens V. United States, for violation of constitutional rights. There is simply no valid reason to ca.rre out a broad new category of lawsuits for those not only injured by domestic intelligence methods but “threatened with . .

7 ” 26 No such statutory provisions are available for “victims” in gjy%her specific category of activity. The present avenues of relief provided by la\v today are clearly sufficient to address any future abuses in the domestic intelligence field. I note that we have not had the benefit of any sworn testimony from the many constitutional ,and crim- inal law experts in the country, either pro or con such a proposal. With- out the benefit of an adequate record and with my concern about the practical results of such a statute, I cannot support its enactment.

(5) CIVIL DISORDERS

A. final recommendation which requires brief comment in the Com- mittee’s proposed standards permitting the FBI to assist “federal, state, and local officials in connection with a civil disorder.” The Com- mittee’s recommendation will not allow any investigation by the F.B.I., not even preliminary in nature, unless the Attorney General finds in writ,ing that “there is a clear and immediate threat of domestic violence” which will require the use of Federal troops.

My reservation about this recommendation is that I think it deprives the Attorney General of the necessary flexibility in dealing with

2jTllo~e involved in the obtaining of information about our industrial proc- esses, vital to our national security, for our adversaries should be the legitimate subiect of electronic surveillance. notwithstanding that no criminal statute is viol”ated. I do not think we can ‘afford to wait for exhaustive reform of our espionage laws. I note that the section of the proposed S.1 dealing with espion- age reform has presented great difficulty to the drafters. Indeed, drafting espion- age into a criminal statute presents some of the same overbreadth problems that the Committee has been concerned with in the domestic intelligence area.

28 For example, would a cause of action exist simply because X notices a federal agent following him in an automobile, notwithstanding the nature or status of the particular investigation?

Page 402: Church Committee: Reports-- Book II

386

these delicate matters (i.e., civil disturbances) and might tend to exacerbate a possibly explosive situation. If the Attorney General is not allowed to dispatch FBI agents to the scene of disorders it seems to me that WC deprive him of the very means he needs to make the extraordinarily important decision as to whether Federal troops are likely to be used.

I believe the better practice would be to permit preliminary investi- gation by the FBI of potentially volatile situations so that the Attor- ney General might make the most reasoned decision possible with respect to n-hat I consider the drastic step of deploying Federal troops to quell a civil disorder in one of our cities.

\~ilTERG.\TE-REL-~TED ISQCIRY

Finally, I wish to address briefly an area of the Committee’s investigation which I pursued for the most, part independently. St the close of the Senate Watergate investigation I filed a report, as part of my individual views 27 which outlined remaining areas of investiga- tion with respect to the relationships between the Central Intelligence Agency and the former CIA employees who participated in the Water- gate break-inzs By virtue of my membership on t.his Select Committee, I have been able to pursue a further inqurry into these matters, and wish to thank the Chairman and the Vice Chairman for the staff assistance and latitude provided me to pursue this area of investigation.

Many of the concerns raised in the Watergate CommiUee investiga- tion have been overtaken by time ancl events. For example, the reported references to illegal CL4 domestic activities have now been confirmed, as described in detail in the Committee’s Report,. The reference to the CIA maintaining a file on Jack Bnderson 2g proved to be part of a lengthy investigation and physical surveillance of Anderson by the CIA during a “leak?’ inquiry. Similarly, the detailing of Howard Hunt’s post-retirement contacts with the CL4 has been supplemented v&h still more such contacts .30 Since July 1974, we have witnessed a variety of other disclosures relative to the CIA’s domestic activit.ies; indeed, the creation of our Senate Select ‘Committee on Intelligence Activities was due in part to the continuing public concern about these matters.

Unlike the Watergate Committee investigation of CIA activit,ies, which largely was terminated because of the refusal of the CL4 to turn over documents,31 this investigation was conducted in an atmosphere of cooperation. After some initial difficulties, which the Committee en-

nSenate Watergate Committee Final Report, S. Res. 9%981, pp. 1105-1165. ” The “Action Required” section of the report. at pages 115~1157. enumerated

unresolved matters and identified materials not provided to the Watergate Committee by the CIA.

28 Senate Watergate Commit&e Final Renort. D. 1128. 3o For example-this disclosure of personal ‘c&respondence (detailing certain

of Hunt’s activities in 1971 and 19i2) between Hunt and the CIA secretary sta- tioned in Paris whom Hunt sought to have reassigned to work for him at the White House.

al Br letter of March 7 19i4, former Director Colby informed the Senate Water- gate Committee that certain items of requested information would not be made nvailable to that committee. Such a withholding of timely information, including that which was totally exculpatory, unnecessarily focused an aura of suspicion and guilt.

Page 403: Church Committee: Reports-- Book II

387

countered in a variety of areas, the cooperation afforded by the CL4 was exemplary. In particular. I especially want, to express my appre- ciation to former Director William Colby and present Director George Bush for cooperating to the fullest. extent in this investigation. I also want to thank L\nibassador Richard Helms and former Counter- intelligence Chief ,James hngleton for their pat,ience and extensive assistance in numerous conferences, in trying to reconstruct t.he elusive details of this significant period.

In pursuing this area of inquiry, the Committee staff examined a great volume of highly sensitive material, much of ,which contained speculative matters and a multitude of information of marginal rele- vance. This information, which had not been made available in large part to the Separate Watergate Committee, was examined in raw form and without sanitization deletions. Because of the sensitivity of the material, it was reviewed on the Central Intelligence Sgency premises. Thus, it was in a spirit of cooperation that this examination was ac- commodated ; and, this experience indicates that the Congress and the intelligence community can cooperate in an investigation without in- curring unauthorized disclosure of sensitive information.32

At the close of this Committee’s examination of the available record, I wish to state my belief that the sum total of the evidence does not substantiate a conclusion that, the CIA per se was involved in the range of events and circumstances known as Watergate.33 However, there was considerable evidence that for much of the post-Watergate period the CL4 itself was uncertain of the ramifications of the various involve- ments, witting or otherwise, between members of the Watergate burglary team and members or components of the Agency. Indeed. the CIA was appacently at, t.imes as perplexed as Congressional inves- tigators. 3a It should be noted that the Agency undertook an extensive internal inquiry in an effort to resolve these uncertainties.

The investigation of Watergate and the possible relationship of the Central Intelligence Agency thereto. produced a panoply of puzzle- ment. While the available informatibn leaves nagging questions and contains bits and pieces of intriguing evidence, fairness dictates that an assessment, be rendered on the basis of the present record. An im- partial evaluation of that record compels the conclusion that the CIA, as a.n institution, was not involved in the Watergate break-in.

How- H. BAKW, Jr.

aa For example, the staff was given access to the Martinez contact reports (to which access was refused during the Watergate Committee investigation) in their entirety. This review was accomplished in secure facilities at the CIA, and no notes were taken of sensitive information contained in the reports not related to Hunt or in some other way relevant to the Committee’s inquiry. I cite this as an example of how a Congressional investigation can be thorough and yet not threaten the integrity of CIA secret documentation, containing names of officers and other highly classified information.

“I am filing with the Committee the detailed results of bhis investigation in the form of classified memoranda. These memoranda will be turned over to the successor permanent oversight committee to be kept in its secure files. No useful purpose would be served in further publicizing the contents, because much of it is fragmentary and its sum total reinforces the findings stated herein.

a1 For rsample. a Colby to Helms letter of 28 January, 1974. references seven to nine communications from Hunt while he was at the White House to Helms’ secretary, with the query: “Can you give us some idea as to \vhat they were about ?”

Page 404: Church Committee: Reports-- Book II
Page 405: Church Committee: Reports-- Book II

INDIVIDUBL VIEWS OF SENATOR GOLDWATER

For over a year the Senate Select Committee on Intelligence Sotivi- ties has been conducting hearings aznd taking testimony. Almost six months of this time was frittered away in an unproductive investiga- tion into alleged assassinations (see my individual views accompany- ing the foreign section of this report).

Thanks to extensive and often sensationalized public hearings, the deficiencies of our domestic intelligence agencies have now been ex- posed, labelled, and largely admitted to. In response, the individual agencies have undertaken substantial reforms and the Administration itself has piloted corrections by a thoughtful and detailed Executive Order 11905,2/18/‘76.

Not satisfied, however, the Select Committee’s Report sets forth a voluminous and rambling treatise which pillories the nation’s domestic intelligence agencies, fixes individual culpability, ignores agency ef- forts at reform, and urges the adoption of recommendations and find- ings unsubstantiated by fact.

The Report sets forth frequent and unfounded criticism of “execu- tive power.” Ignoring both past and present efforts by the Executive to provide guidance and reform, the Report voices theoretical objection to the conduct of intelligence activities by the “Chief Executive and his surrogates.” Unhappily, the sweeping dissatisfaction of theore- ticians and academicians is not reflected in the record of the Select Committee’s proceedings and is almost wholly unsupported by testi- mony. The pronouncements within the Report deal in a high-handed manner with matters that received little or no attention by the Com- mittee and are, consequently, utterly devoid of an adequate record.

of The free-wheeling, self-righteous, and frequently moralizing thrust the Report therefore assures recommendations which are bottomed

in wish and speculation rather than in fad or testimony. Rewmmenda- tions, for example, that civil remedies be expanded to cover parties alleging “injuries” from domestic intelligence activity ; that statutes be enacted to create ‘a cause of action for those allegedly so aggrieved; that criminal sanctions be enacted for willful violation of recom- mended statutes; and that the Smith and Voorhis Acts be repealed or amended, are all glibly presented without so much as a shred of evi- dence having been entered into the record in their support.

Although the Report has flatly assured its readers that “the scope of our recommendations coincides with the scope of our investigation”, such assurances are clearly hollow when, for instance, the Report af- firms in preamble to certain recommendations that the President has no inherent power to conduct a wiretap without a warrant. Repeatedly and withoult qualification, the Report reiterates such a proposition, without referring to the unsettled state of the case law, the views of legal scholars, or the relative silence of t,he Supreme Court on the matter. When, further, the Report counsels restrictions on, say, the use of

(389)

Page 406: Church Committee: Reports-- Book II

390

informants or t,he surveil1anc.e of foreign intelligence activities, it goes beyond restrictions already in the At.torney General’s Guidelines with scant attention to the effectiveness of the guidelines or their applica- tion.

Again and again the Report makes far-reaching recommendations which are unsubstantiated by the evidence. Thus the Report urges that the FBI not attempt frustration of hostile foreign intelligence ac- tivities by “specialized” techniques unless approved by the Attorney General upon advice of the Sccret.ary of State. What the Report omits, however, is any showing that the ,Qtorney General or the Secretary of State is available, capable, or prepared, to undertake such a role.

In similar fashion, the Report’s Recolnlllelldatiolls are frequently critical of the Executive Order’s determination to repose all domestic oversight in a Board rather than vest it exclusively or principally with the Attorney General. The apparent basis for the Report’s preference (and hence its criticism of the ,idministration’s Executive Order) is the brief and fairly bald conclusion that the Attorney Gen- eral is the “most appropriate official charged with ensuring that the intelligence agencies of the United States conduct their activities in accordance with the lam.” No examination of feasibility, organization, or jurisdiction, buttresses the Report’s conclusion in this respect.

The Report likewise recommends almost wholesale enactment of legislation to prevent recurrence of abuses and repetition of impro- prieties in the domestic area. In this respect the Report exhibits a decidedly hasty and almost exclusive preference for statute where Order, Rule, or Regulation would provide more expeditions? more particularized? and more flexible remedies. In view of the tentative and even halting nature of so many of the Committee’s conclusions, the clamor for statutes is premature and ill-advised. To urge the quick enactment of criminal provisions is even more injudicious. and, in some cases, verges on the fatuous.

To be precise : the Select Committee has endorsed Recommendation 52, which reads: “All non-consensual electronic surveillance should be conducted pursuant to warrants issued under authority of Title III of the Omnibus Crime Control and Safe Streets ,\ct of 1068.” At the same time, however, the Select Committee admits that “industrial espionage and other modern forms of espionage (are) not presently covered” by the criminal law.. and that “there may be serious deficien- cies in t,hc Federal Esnionape Statute (18 V.S.C. 792 et seq.) .” In fact, the Report is constrained to admit that it “took no testimony on this subject.” Nonetheless, in the verv teeth of its own admission, the Select Committee endorses a Recommendation that would restrict ~777 elec- tronic surveillance to the narrow and exclusive confines of the criminal law. At Select Committee direction. our counter-intelligence efforts would be forbidden by law to avail themselves of electronic snrveil- lance in the as yet undefined. but admittedlv vital, areas of economic, technological, and industrial espionage. JJ7ith virtual imrmnit,y an American could pass. deliver. or sell to the agent of a hostile foreign power any and all secrets of indnstrv or technol?gy-however Impor- tant to the nation’s economy or \\-ell-bein,~-\vhlle the FRT Tvould be effectively precluded from action. As criminal sanctions do not at- tach-and, in fact. may very well be incapable of attaching-to “indns- trial espionage”, electronic surveillance would he denied the nation’s

Page 407: Church Committee: Reports-- Book II

391

intelligence agencies in any effort to forestall, prevent or even moni- tor, hostile foreign intelligence activity in the economic or technologi- cal sphere. While the Report blithely recommends that the espionage laws be modernized to include technological or industrial espionage, it nowhere confronts the massive practlcnl difficulties in such a sug- gestion.

FEDEFCAL BUREAU OF INVESTIGATION

During the last decade or so of Mr. Hoover’s tenure abuses crept into the operations of the Bureau. Because these are thoroughly ven- tilated, i,f not overdrawn, in the Majority Report, I shall not dwell on t,hem here. with one exception: at times, suggestions from the White House or the conjectures of Presidential aid& directly sparked eaves- tlroppinp and interference with the political process.

A1lntost invariably~ however, Bureau impropriety can be at.tributed- whetllcr tlirectly or by implication-to higher authority. As in the foreign sector. the record of domestic abuse ancl excess is a commentary on improper or deficient guidance. While particular programs or per- sonnel cannot be spared their proportionate share of responsibility for impropriety, ultimate accountability for Bureau excesses must rest with a negligent Executive and an inattentive Congress.

While I concur in the general objectives of the Committee to insure no repetition of abuses of which the FBI may have been guilty in the past, I strongly disagree with certain specific recommendations in the Committee’s report.

I do not feel the best interests of this country would be served by imposing extraordinary curbs on the FBI or by opening additional clianncls through whiCli political influence conlcl flow into the inner workings of the FBT. And to a certain cstent, the recommendations I find objectionable would tend to accomplish exacflp that.

I refer specifically to Recommendat,ion 85, which encourages t.he LYttorney General to exercise his ‘authority to appoint executives in the FBI at the level of Assistant Director.

The Attorneys General, with rare exceptions, have historically been political supporters of the President and his party. By exhorting an ,ittorney General to by-pass the Director of the FBI and appoint ,issistant Directors, we run the risk of further extending White House intrusion into the daily operations of the FBI. FBI Assistant Direc- tors tlake part in admi&strat.ive decisions and policy-making, and they exercise day-to-day authority over the operations of their respective divisions. Traditionally, they have been professionals who advanced t,hrough the ranks of t.he FBI. Their law enforcement expertise, com- bined with administrative ability, ‘are qualities needed by the DIrector of the FBI in discharging his duties. Moreover, any chief executive officer of ‘a line agency should have flexibility in choosing his principal nssista.nts.

The Office of the General Counsel of the FBI is a career position ; and t,he person who occupies that office has traditionally been selected by the Director. No valid reasons have been given to require his nomi- nnt,ion by the President and confirma.tion by the Senate. As a. general rule, the Dire&or or Administrator of a bureau or agency is permitted to choose his own General Counsel.

Page 408: Church Committee: Reports-- Book II

392

Personal integrity cannot be assured through such measures as Rec- ommendation 8~. Proper supervision by the Attorney General and cffect.ive Conpressional oversight, can. and should. however. serve to discourage abuses of the sort that conrern all of us.

I t,ake exception. also. to Recommendations 45. 55-A and X-B, that. impose constraints on prerentive intelligence investigations and use of informants. The. work of the FBI in this area is far too vital to the sccuriQ of the American people to impose such stringently restrictive requirements and time limitlations on its investigative efforts.

With donwstic terrorism burgeoning in this countrv. T submit it, is I-erv risky to forbid the FBI to conduct, preliminal*y ikwstiqations of forkipners or citizens unless there is a “specific allegation” or proof that such individuals “will soon engage in terrorist. actirity or hostile fore@ intcllipence activity.” Here. ag!in. as in some of the foreign recommenclatik n-e seem to be saving. “Thn’t put nut the fire IThilc it is small : wait until it becomes a codkqration.”

Host.ile forces at home and abroad are. bound bv no such chains. .1nd. I don’t vant to he party in hamstringing the FBI so that it can- not effectivelr frustrate, those who would espouse the bomb and the gun to impose their evil vdl on Americ.a..

How in the world is the FRT to substantiate information that ter- rorists and enemy agents will act against dmericans without at least preliminary investiqntion ? To require them to hare such proof in hand before eve]; initiating investi,rration seems unrealistic and is potentially injurious to our security.

The recommendation also st.ates that such preliminary investigation must. be concluded within X0 days. unless the A\trtorney General or his rlesimrr finds that t.he facts warrant aclclitinnal investigation up to 60 days.

,4re we trul,v prepared to sap to the FBT: pou must conclude pour preventire intclliwnce investigations within 30 or 90 days unless you establish “reasonable suspicion” that individuals wi77 in fncf commit a terrorist, act or enpngr in hostile forrign intelligence actirky?

14nd. even then, a time limit, of one year is rccommencled for a full prerrntire intelligence inrestigation. barring a finding of “compelling circumstances” by the .ittorney General. Can we be x3surecl that our enemies will be so obliging as to commit an act dt,hin the time span we prescribe ?

And 1 qucstio’li the eflectireness of the recommended measures in preventing abuses of A4mericnns’ privacy or in assuring non-violent tlkentcrs in our country that they dll not be inhibited by FBI actions.

T submit that, effective, and proper Congressional oversight and supervision b;v the ;1ttnrney General obviates the necessity of strinpent standards and t.imc limitations IThere a quick response by the FBI mav be needed to avert disaster.

While I tend to agree with the motives and objectives of my c.ol- le?pues on the Committee on Recommendations :i:i-.2 and R. I main- tain the requiremenhs and limitdons imposed on the FBI’s use of informants gn beyond what is necessary.

How can we possibly espect the FRT to clewlop instant. security informants. use them for 90 days, and then turn them off like a light switch?

Page 409: Church Committee: Reports-- Book II

393

Are we truly qualified to dictate to a professional law enforcement agency under what circumstances it can use security informants and for how long? The value of such informants has been demonstrated over and over again. Good, stable, effective informants with proved credibility are not easy to come by.

The fact is that their cooperation must be cultivated. Their credi- bility must be tested. Their stability must be evaluated. Time and patience are essential. Does it make sense to state exactly under what circumstances and for how long a period t,he FBI will be permitted to accomplish these aims?

The stakes are too high to risk imposing unworkable or cumber- some restrict.ions-the stakes being human lives and the security of our country.

I have misgivings regarding Recommendation 90-B, which pro- vides a new civil action recourse to Americans who feel that their Constitutional rights have suffered actual or even threatened viola- tion bv Federal officers or agents in intelligence investigations. This provision would have the effect of injecting the courts into t,he investi- gative process. even at early stages of investigations when attempts are being made to substantiate or disprove specific alle.gations of actions requiring legitimate investigation.

We would open the way for individuals and agents hostile to our country and its lawful government to impede and tie up in prolonged litigation investigations required to preserve national security and prevent violence.

Turmoil, upheaval, and readjustment have taken their toll of the FBI. Fortunately for t,he nation, the many high-caliber and patriotic men and women who are the FBI have continued to serve with dedica- tion and loyalty.

INTERNAL REVENFE SERVICE

Nowhere has the perversion of domestic intelligence been more viv- idly demonstrated than in the Select Committee’s invest.igation of the Tntarnal Revenue Service. Vith much relish but no excuse, IRS func- tionaries hare pried and spied on countless organizations and activities. Intelligence components of the IRS have indiscriminately investigated hundreds of thousands of taspayers and have amassed reams of information wholly irrelevant to the IRS’s narrow respon- sibility for collecting the taxes. IRS agents have for decades con- ducted intrusive c,ampaigns of snoopmg virtually without let or hindrance. and certainly without justification in fact or in law.

In 1961, for instance, the IRS initiated a program to conduct a test audit of various “right-wing” organizations. Termed t.he “Ideo- logical Organizations Audit Program.” the project attempted inten- sive investigation of 10,000 tax-exempt organizations that was far removed from even-handed enforcement of the internal revenue laws. Precedent having been established. a Special Services Staff was or- ganized in 1969 to conduct audits of “activist” and “ideological“ tax- payers. Audits were run without reference to established tax criteria and the “special service” rendered the nation was the unwarranted tar- geting of 18,000 individuals and 3,000 groups. Its insatiable appetite

Page 410: Church Committee: Reports-- Book II

394

still unsatisfied, the IRS nest established an “Information Gathering and Retriera.1 System” (IGRS) in order to ga,rner still more general int.clligence. IGRS was hatched in 1973, and. during its two years of life, proceeded to .gather and store information in voracious fashion. Some 485,4+2 indl\-iduals or organizations were examined before the prograjm n-as terminated in 1975.

Operating secretly and &hout standards or safeguards. IGRS was typical of the arrogance of the tax collectors. Abuses uncovered in connection lvith the IRS’s Operation Leprechaun (1969-1972) merely represent, the expected and logical extension of policies which are as profoundly cont,emptuous of the American taxpayer as they.are char- acteristic of the IRS’s perennial efforts t.o transform itself into a re- pository of domestic intelligence.

I have refused to sign the final report of the Select Committee on Intelligence Operations in the belief that it can cause severe embarrass- ment, if not, grare harm, to the Nation’s foreign policy. The domestic part of the report has a strong dose of 20-20 hindsight. It will raise more questions than it answers. Reputations will suffer and little will have been gained.

When the resolution creating the Select Committee Teas presented to the Senate. I endorsed it because I felt it. was necessary to conduct such an investigation into any possible abuses on the privacy of 14meri- c,an cit,iztws. I thoroughlv expected that the Committee would con- centrate its efforts in thi’s particular field, but very little work was done on it,. Sot much can be gained from reading the report as a result of this, and I am, frankly, disappointed that. we don% know more today than we did a year and a half ago about questions raised on this subject.

DARRY GOLDWATER.

Page 411: Church Committee: Reports-- Book II

SUPFLEJIESTAL VIEWS OF SEXATOR CHARLES JIcC. J~THIAS, JR.

I fully support the Final Report and the Findings and Recom- mendations of the Select Committee on Intelligence.

The rea.flitmat~ion of Constitutional government requires more than rhetoric. It involves, at a minimum. the rendering of ,account,s by t,hose who have held public. trust. 1st also demands that. we renew those principles that are at the center of our democracy. In my view, the Select Committee’s Report is a critical contribution to the process of

Const,itutional government,. Those who Ron our independence 200 years ago understood the

need to ensure “domestic trawquility” and to “provide for the common defense.” Our intelligence services have played a valuable role in the attainment of those goals.

The Founders of our Nation also understood the need to place gov- ernmental polver under t,he rule of law. They knew t,hat. power car- ried wit.h it the seed of abuse. In framing the Constitmion, they cre- ated a system of checks and balances that, would preclude the exercise of arbitrary power. For they recognized that the exercise of power by individuals must be constrained. As Jefferson wrote, “In questions of power, let no more be heard of confidence in man, but bind him do\vn by the chains of the Constitution.”

When Senator Ma.nsfield and I first proposed the creat.ion of a Select Commit&e on Inte.lligence in the make of Wa-tergate, Iv-e mere not seek- ing to weaken t.he nation’s intelligence service but. to strengthen it. Effective government rests on the confidence of the people. In the aftermath of Watergate and charges of domestic spying sand misuse of the intelligence agencies. t.hat confidence was severely strained. And in the face of excessive claims of presidential prerogative, Congress had abdicated its Constit,utional responsibilities to oversee and check t,he exercise of executive power in the intelligence operations of the government,.

Secrecy and democrat.ic government are uneasy partners. Intelli- gence operations are in essence secret operations. But t.hat does not mean tihat’ t.hey can be immune from t.he rule of law and the standards our system of government places on all government operations.

If we can lose our liberties from a too-powerful Government imrud- ing into our lives through burdensome taxes or an excess of regula- tions. we can surely lose them from government agencies that collect vast amounts of information on the lawful activities of cit.izens in the interest of ‘domestic intelligence.” The excessive breadth of domestic intelligence operations investigated by the Committee and many of the techniques used against. Americans can severely chill First dmend- ment rights and deeply infringe upon personal privacy.

The Framers of our Constitution recognized that the vitality of our civil life depends on free discussion. They also recognized that the right of privacy is fundamental to the sanctity of the individual. That is why rve have the First and Fourth Amendments. Speech and poli- t,ical ideas are often unsettling. But it is only through free debate and

(395)

Page 412: Church Committee: Reports-- Book II

‘396

the free exchange of ideas that the people can inform themselves and make their government responsive. And it is through the protection of privacy that we nourish the individual spirit. These are the char- acteristics that set us apart from totalitarian regimes.

In this, our Bicentennial year, Amerioans have a special oppor- tunity to reaffirm the values of our forebears. We have emerged from the dangers of the post-war era and the trauma of tlhe last decade not by forsaking tihose value but by adhering to them. To ‘be worthy of our forebears a.nd ourselves, we need only have the courage to keep to the course. By bringing the intelligence arm of the government within our constitutional system, correcting abuses, and checking excesses, we will enable the proper range of intelligence activity to go forward under law in the service of the country.

CHARLEB McC. MATHLAB, Jr.

0