Home

PIKE COMMITTEE REPORTS

INTERCEPTION OF INTERNATIONAL TELECOMMUNICATIONS BY THE NATIONAL SECURITY AGENCY
Report by the Committee on Government Operations

Introduction

The federal intelligence agency which is subject of this report is the National Security Agency (NSA). Official figures, showing its size in terms of dollars expended or manpower employed, are not available to the public.1 Unofficial estimates place NSA's annual spending at as much as $15 billion and its manpower at upwards of 120,000 persons, when the three military agencies under the NSA's direction are included.2 Whatever its actual budget and personnel levels, it has, through a network of specialized intercept positions around the world, the technological capability to intercept a significant portion of worldwide telecommunications. This capability can be brought to bear against any country. If used against the American people, Senator Frank Church has noted, "no American would have any privacy left... there would be no place to hide."3

The NSA was created by a Top Secret memorandum from President Harry S. Truman to Secretary of State Dean G. Acheson and Secretary of Defense Robert A. Lovett, on October 24, 1952. Under this directive, which even today remains, classified, the NSA was placed under the Department of Defense and assigned the intelligence responsibilities of the Armed Forces Security Agency, which in turn had largely inherited its role from the Army Security Agency (which remains one of the three service agencies under NSA's operational control).4

The NSA's two basic functions, derived from directives of the National Security Council and Director of Central Intelligence, are: (1) to protect the "Communications Security" (CONEEC) of U.S. telecommunications that are related to the national security; and (2) to obtain foreign intelligence through the interception of telecommunications, otherwise known as "Signals Intelligence" (SIGINT).5

SIGINT interception is the NSA's dominant operational activity. It consists of "Communications Intelligence" (COMINT), or intelligence obtained through the interception of electronic message communications (such as telegrams and telephones), and "Electronic Intelligence" (ELINT), intelligence obtained through the interception of electronic signals (such as radar and missile emissions), which were not intended by the sender to communicate messages.6

This report is primarily concerned with one type of COMINT activity under- taken in the past by NSA -- the interception of international telegrams -- and to a lesser extent, an activity ostensibly undertaken in furtherance of NSA's COMSEC mission, that may likewise encroach on the privacy of American citizens.

Background

Prompted by a press report,7 the Subcommittee on Government Information and Individual Rights initiated in August 1975, an investigation into the interception and monitoring by federal intelligence agencies, of telegrams and other forms of data transmissions entering and leaving the United States. The investigation was undertaken pursuant to the subcommittee's oversight responsibility for matters concerning the rights. of privacy of American citizens and for the operations of the Federal Communications Commission.. Public hearings were held on October 23, 1975, and February 25, March 3, 10, and 11, 1976,8 in the face of intense Executive branch efforts to have them curtailed or postponed.9

Similar pressure was exerted on the Senate Select Committee to Study Governmental Operations with Respect to Intelligence Activities. (Hereafter referred to as the Church Committee.) On October 7, 1975, Attorney General Edward Levi personally asked Senator Church on behalf of the President to postpone committee hearings on selected National Security Agency activities, scheduled for October 8 and 9, at which NSA Director Lew Allen, Jr. was to testify. The Church Committee agreed to delay Gen. Allen's appearance indefinitely.

Whereas the Church Committee had conducted its NSA investigation by going directly to that Agency, the subcommittee approached no government agency, going instead to the international telegraph companies who allegedly had participated in such activities. These companies were initially responsive. It was apparently not until October 21, 1975 -- two days prior to the subcommittee's initial hearing -- that the Administration became aware of the investigation and it reacted strongly. On that day, the subcommittee received a letter from FBI Director Clarence Kelley, advising, that a former FBI special agent, whom the subcommittee staff had interviewed, would not be allowed to testify.10 On the same day, as a result of government pressure, the two largest international common carriers involved -- RCA. Global Communications and ITT World Communications -- suddenly withdrew their offers to appear voluntarily and demanded that they be issued subpenas as a condition to their testifying. (A representative of another communications carrier subsequently informed the subcommittee that highly placed Justice Department officials, immediately prior to the subcommittee's October 23 hearing, had urged his company to demand subpenas as well. The company did not accede to the Executive branch request, however.)

On October 22, 1975, the subcommittee Chairwoman, Representative Bella S. Abzug, was visited by Deputy Attorney General Harold Tyler, NSA Director Allen, Assistant Secretary of Defense for Intelligence Albert Hall, Special Counsel to the President Jonathan Marsh, and White House Congressional Liaison Charles Leppert, who requested the hearings not be held on grounds of jeopardizing both an ongoing Justice Department criminal investigation and national security.

On October 23, moments before the subcommittee's hearing was to begin, Attorney General Levi unexpectedly arrived at the hearing room, bearing the same message. Like the previous visitors, Mr. Levi could not say which "national security" interests or ongoing investigations were being jeopardized, nor suggest to the subcommittee any course of action beyond postponement or cancellation. The subcommittee's hearing proceeded as scheduled, but former FBI special agent Joe R. Craig, and representatives of RCA Global Communications and ITT World Communications refused to testify unless subpenaed. Testimony was taken from representatives of American Telephone and Telegraph Company and one of its operating subsidiaries, the Chesapeake & Potomac Telephone Company.

Within hours of the close of the subcommittee's initial session, the Church Committee reversed its earlier decision and voted to hold public hearings on the NSA.

On October 29, NSA Director Allen, accompanied by NSA Deputy Director Benson Buffham and NSA General Counsel Roy Banner, appeared before the Church Committee in public session, essentially confining their testimony to the Agency's "watch- list" activity.11 A second matter raised at the hearing, identified as Operation SHAMROCK, was temporarily put off.12

On November 6, in public session. Senator Church read into the record the committee's SHAMROCK report, a summary of the Church Committee's investigation to date.13 No testimony, however, was elicited in public session.

The Church report primarily dealt with contacts between U.S. telegraph companies and government representatives between 1947 14 and 1975, and procedures by which telegrams entrusted to the carriers were turned over to the NSA and, to a lesser extent, the FBI. The Church Committee's initial report did not discuss how the information made available to the intelligence agencies was utilized by its collectors / or to whom it was disseminated, or the uses made of it by those entities -- subjects of vital interest to this Committee.

On February 4, 1976, this Committee issued subpenas ad testificandum and subpenas deces tecum to three FBI special agents, one former FBI special agent, one NSA employee, and executives of ITT World Communications, RCA Global Communications, and Western Union International. On February 17, President Ford instructed Secretary of Defense Rumsfeld and Attorney General Levi "to decline to comply with the subpenas" directed to the government and corporate witnesses, stating that disclosure of the records sought by the Committee were not in the public interest.15 Immediately, Secretary Rumsfeld instructed the NSA employee, and Attorney General Levi instructed the FBI employees, including the retired bureau agent, that the Committee's subpenas deces tecum were not to be complied with, inasmuch" as "President Ford has asserted executive privilege."16 On February 17, Attorney General Levi also requested "that Western Union International honor [President Ford's] invocation of executive privilege, and that it not produce and deliver documents described. by the said subpenas."17 These entreaties to private corporations and to a former government employee to honor a claim of "executive privilege" were unprecedented expansions of that concept.

On February 25, the aforementioned former FBI employee, three current FBI agents, and one NSA employee appeared before the subcommittee, but refused to testify. Both the present and former FBI agents refused to testify on instructions from the Attorney General, while the NSA employee refused on orders from the Deputy Secretary of Defense, William P. Clements, Jr. Because of their failure to give testimony, the subcommittee recommended that all five be cited, pursuant to 2 U.S.C. 192, for contempt of Congress. Four of the witnesses were also recommended for contempt citations for their failure to produce documents pursuant to subpenas.18

On March 3, the Executive Vice President of Western Union International testified before the subcommittee, and turned over an eight year old list of NSA targets, the production of which President Ford had attempted to block by asking the corporation to honor his claim of "executive privilege."

Attorney General Levi also asked RCA Global Communications that its representatives neither testify before the subcommittee, nor produce documents, "until procedures can be agreed upon to assure that the President's invocation of executive privilege is not effectively undone."19 Without procedures being "agreed upon", however, representatives of RCA Global Communications testified on March 3 and 10, and subsequently turned over to the subcommittee records that the company had previously considered as beyond the scope of the subcommittee's subpena duces tecum.20 Also on March 10, the subcommittee received the testimony of the Chairman of the Federal Communications Commission, Richard E. Wiley.

On March 11, representatives of ITT World Communications, which had apparently not received an "executive privilege” request from Attorney General Levi, testified before the subcommittee.

PART I

CHRONOLOGY OF U.S. TELEGRAPH COMPANIES' COOPERATION WITH FEDERAL INTELLIGENCE AGENCIES

Pre-World War II

I. History

During World War I, U.S. government intelligence agents censored telegraphic telecommunications by working in the offices of private telegraph companies All telegrams entering or leaving the United States were placed at the disposal of a military intelligence unit of the War Department known as MI -8 [Military Intelligence - Section 8].21 This practice ceased soon after the conclusion of the war.17

MI-8, from its inception in 1917, had been directed by Herbert Osborne Yardley, considered by some cryptologists to be the most famous in history. At war's end, faced with the phasing out of his organization, and envisioning its having a peacetime role, Yardley, in May 1919, convinced the State and War Departments to approve a plan for a "permanent organization for code and cipher investigation and attack.22 Forty thousand dollars of the organization's $100,000 annual budget was to come from State Department special funds, with the balance to come from military intelligence budgets after selected Congressional leaders had been briefed on the project.24

Although supported by government funds, the resulting organization had no visible government connection. Known as "The Blade Chamber" by the few persons familiar with its existence, it operated, from 1919 until 1929, under Yardley’s leadership in New York City — under the cover name "Code Compilation Company.”25 The operation was initially situated in Manhattan townhouses, but following a 1925 break-in in which desks were rifled, it was moved to a large office building.

In 1929, President Hoover's newly appointed Secretary of State, Henry L. Stimson was shocked to learn of the Black Chamber's existence and abruptly terminated the operation26 in the belief its activities were shameful in a "world [that] was striving with good will for lasting peace."27

Suddenly without a job and in need of funds, and apparently believing that since the Black Chamber had been destroyed there was no longer any valid reason for withholding its secrets, Yardley wrote a book. The American Black Chamber, published in 1931, which soon became an international best- seller. In it Yardley boasted:

we solved over forty-five thousand cryptograms from 1919 to 1929, and at one time or another, we broke the codes of Argentina, Brazil, Chile, China, Costa Rica, Cuba, England, France, Germany, Japan, Liberia, Mexico, Nicaragua, Panama, Peru, Russia [sic], San Salvador, Santo Domingo, Soviet Union and Spain. 28

The Black Chamber, he stated,

also made preliminary analyses of the codes of many other governments. This we did because we never knew at what moment a crisis would arise which would require quick solution of a particular government's diplomatic telegrams. Our personnel was limited and we could not hope to read the telegrams of all nations.29

Despite his proclivity towards sensational disclosures, Yardley coyly avoided stating how, in the ten years of MI-8's peacetime existence, from 1919 to 1929, the Black Chamber had obtained telegrams it had analyzed:

We employed guards, replaced all the locks and were ready to begin [in 1919] our secret activities. But there were now no code and cipher telegrams to work on! The cable censorship had been lifted and the supervision of messages restored to the private cable companies. Our problem was to obtain copies of messages. How?

I shall not answer this question directly. Instead I shall tell you something of the Soviet Government's type of espionage as revealed by documents that passed through my hands. After you read these, you can draw your own conclusions as to how the United States Government obtained the code and cipher diplomatic messages of foreign governments. 30

Despite his reluctance to place this information in his book, Yardley, in a letter to his publisher on March 18, 1931, candidly revealed that those cablegrams had been supplied by international telegraph companies.31 There he wrote that none of the messages alluded to in the manuscript of The American Black Chamber,

other than certain wireless messages exchanged between Germany and Mexico, were sent by radio. They came by cable. With respect to every cablegram referred to in [my ] book, the copies .. thereof to which I refer therein were obtained - by the consent and authority of the respective presidents of the Western Union Telegraph Company and of the Postal Telegraph Company over the wires of one or the other of such companies such messages were transmitted. [Emphasis added.]

In the 1920's, these two companies carried almost all the telegraphic communications m and out of this country.32

According to Yardley 's book, only coded messages were turned over to MI-8; plain text (i.e. uncoded) messaged were never made available. 33

The Army Security Agency's 323-page Historical Background of the Signal Security Agency 1919-1939 [which the subcommittee requested and received in an unclassified form from the Department of Defense) omits any mention of the arrangement described by Yardley, whereby MI- 8 received telegraph messages from the Western Union and Postal Telegraph companies, or any other company. It suggests only that the Army Signal Corps did not continue to support the MI-8 activities:

Plans for establishing MI-8 on a peace-time basis in 1919 included no provision for the development of facilities for obtaining the necessary intercepted messages. A detailed account of the situation will be given shortly but at this point it will suffice to indicate that it was doubtless assumed that the cable companies would continue to supply copies of all messages passing through their offices and that the Signal Corps would continue its war-time intercept facilities which would be at the call of MI-8. These assumptions proved to be unwarranted. That no satisfactory solution for this problem was ever reached was one of the prime causes for the decline of activity of MI -8 in New York. It was also one of the factors which led to the absorption of the Bureau by the Signal Corps, an organization which could more easily develop intercept facilities. 34

The "detailed account" of the cable companies' cooperation, suggested in this passage, was deleted from the manuscript provided the subcommittee. If Yardley's account is accurate, however, MI-8 did remain operational for ten years after World War I with the cooperation of the telegraph companies identified above. Furthermore, it was Secretary Stimson's philosophical objections, and not the reluctance of the telegraph companies, which apparently brought the activities of MI-8 to a halt in 1929.

II. Legality

When World War I ended, the Radio Communications Act of August 13, 1912, which provided that the Government would guarantee the secrecy of communications, was still in effect. That Act provided, in pertinent part:

No person or persons engaged in or having knowledge of the operation of any station or stations shall divulge or publish the contents of any messages transmitted or received by such station, except to the person or persons to whom the same may be directed, or their authorized agent, or to another station employed to forward such message to its destination, unless legally required so to do by the court of competent jurisdiction or other competent authority. 35

This law did not prohibit the interception of radio traffic per se, but merely prohibited the employees of common carriers covered by the Act from divulging or publishing the contents of messages to unauthorized persons. Although no court had occasion to so rule, the -prohibition contained in the statute would seem to have been violated by those employees of the cable companies who divulged the contents of telegrams to MI-8, unless MI-8 could have been considered as "other competent authority". This point, was never the subject of a judicial determination.

The 1912 statute remained in effect until the enactment of the Radio Act of 1927, which considerably broadened the prohibition against unauthorized disclosures:

No person receiving or assisting in receiving any radio communication shall divulge or publish the contents, substance, purport, effect, or meaning thereof except through authorized channels of transmission or reception to any person other than the addressee, his agent or attorney, or to a telephone, telegraph, cable or radio station employed or authorized to forward such radio communication to its destination, or to proper accounting or distributing officers of the various communicating centers over which the radio communication may be passed, or to the master of a ship under whom he is serving, or in response to a subpoena issued by a court of competent jurisdiction, or on demand of other lawful authority; and no person not being "authorized by the sender shall intercept any message and divulge or publish the contents, substance, purport, effect or meaning of such intercepted message to any person; and no person not being entitled thereto shall receive or assist in receiving any radio communication and use the same or any information therein contained and no person having received such intercepted radio communication or having become acquainted with the contents, substance, purport, effect, or meaning of the same or any part thereof, knowing that such information was so obtained, shall divulge or publish the contents, substance, purport, effect, or meaning of the same or any part thereof, or use the same or any information therein contained for his own benefit or for the benefit of another not entitled thereto.... [Emphasis added.]36


Whereas the 1912 Act had applied only to employees of common carriers, the 1927 Act applied to all persons not authorized by the sender to receive such communications. This would bring MI-8, as well as the employees of the cable companies, under the Act's prohibition. The Army Security Agency's historical record states that the law's "or on demand of other lawful authority" provision was never cited by MI-8 to justify its interception of foreign diplomatic traffic. Apparently, there was never a need for MI -8 to assert such authority. Hence, subsequent to 1927 at least, the Black Chamber apparently operated in violation of the law.

The Army Security Agency's historical record suggests, to the contrary, that the activities of military intelligence gathering -- including MI-8's -- were not intended to be covered by the 1927 Act's prohibitions:

The purpose behind the legislation was of course, the security of communications from the danger of interception by unauthorized persons who might have made use of intelligence contained therein for personal profit. That the laws would also hamper Governmental agencies engaged in the production of intelligence upon which the safety of the United States might be based was probably far from the minds of the legislators. Indeed, prior to World War I, no such agency existed, and until 1931, the fact that one had existed during the war period was unknown either to the general public or to most officers in the Army itself.

On the other hand, inclusion in these acts of specific exemptions permitting the interception of radio communications for the purposes of military intelligence would have given notice to the world in general, and therefore to a possible enemy in particular, that cryptanalytic units were indeed operating. Such a course would have been highly undesirable. What solution this thorny problem could have had is not clear: the fact that no solution was ever reached constituted one of the greatest obstacles to the proper functioning of MI-8. 37

Yardley infers that the 1927 Act presented no obstacle at all to MI-8. It was simply ignored.

III. Government Reaction to Yardley Disclosures

The publication of Yardley's book, in 1931, prompted the War Department to state that the American Black Chamber had not existed for four years (a date which coincided with the passage of the Radio Act in 1927]. 38 General Douglas MacArthur, then Army Chief of Staff, said he did not know anything about it, while high officers in the intelligence divisions said no such bureau then existed and they professed to have no knowledge of it in former years. 39 State Department officials similarly said they were sure there had been no such practice and one official, speaking on behalf of Secretary Stimson, said he had never heard of any organization called the "black chamber. "40

Yardley, a man who had been revered as a cryptanalytic genius, and who, in 1922, had been awarded the Distinguished Service Medal by the Secretary of War, was portrayed in official commentaries as an opportunist and braggart whose actions bordered on treason.

The Army Security Agency history, written in 1946, described Yardley as a man who "had demonstrated a certain amount of cryptanalytic ability and had achieved within the War Department a reputation as a cryptanalyst." He was, the report stated, a poor administrator who had "neither the initiative nor foresight to build MI-8 on a firm foundation." He ignored his duties, the report continued, "while he profited from read estate activities; his enthusiasm for cryptanalysis lagged as he became a consultant in more profitable code production activities for commercial firms. Then, when his own position was abolished, he divulged information of the highest secrecy and made himself notorious in the annals of cryptology."41

In 1932, Yardley wrote a new book entitled "Japanese Diplomatic Secrets" that was never published. On February 20, 1933, U.S. marshals in New York seized the manuscript in the publishing offices of The Macmillan Company, on the grounds Yardley, as an agent of the U.S. government, had appropriated secret documents.42 Yardley was never prosecuted,, but his case prompted Congress to enact the "Protection of Government Records", bill in 1933 Now codified as 18 U.S.C. 952, the law makes disclosure of diplomatic codes or correspondence a felony.

IV. Assessment of MI-8 by the Army Security Agency.43

ASccording to the Army Security Agency's historical chronology, MI -8 primarily failed because "its principal support was derived from a department of the government which reflected political changes and the temper of the times more directly than does the War Department." In other words, such a sensitive activity as MI-8 was not to be entrusted to the political whims of the country's civilian leadership. The Army Security Agency, in hindsight, also saw other reasons for MI-8's demise:

(1) Its leader was not sufficiently concerned with its secrecy (though there is no evidence Yardley compromised the secrecy of the "Black Chamber" in any way, during its twelve year existence).

(2) Its isolation from direct supervision as a result of its transfer to New York produced neither the desired secrecy nor the attention it should have had from the War Department (though there was every evidence, from Yardley 's narration, its existence was well known at the highest State and War Department levels).

(3) The separation of cryptanalysis (breaking the codes and ciphers of foreign governments) and cryptography (making codes and ciphers for one's own government) was a mistake. (MI-8 was not involved in cryptography).

Even before MI-8 formally terminated its operations on October 31, 1929, the War Department had formed' the Signal. Intelligence Service (SIS) to carry out most cryptological work on a continuing basis. The SIS was placed within the Army, and was the predecessor of the Armed Forces Security Service and, ultimately the National Security Agency.

Post World War II

I. History

During World War II, U.S. government agents acting pursuant to the wartime powers of the President, again censored written telecommunications by working directly in the offices of the telegraph companies. Three companies — ITT Communications, RCA Communications, and Western Union -- transmitted almost all international cablegrams and radiograms entering or leaving the United States. All such messages were placed at the disposal of military intelligence.44

However, the War Department's post World War II actions to convince the cable companies to make international telegrams available to federal intelligence agents were markedly different than those taken after World War I. The post World War I period was marked by inaction:, six months after the Armistice, Herbert Yardley had to single-handedly persuade the government to enter into such an arrangement and his scheme provided that ' only coded messages would be handed over. But in August 1945, immediately after the end of the war, the Army Signal Security Agency (now the Army Security Agency) implemented a plan that led ultimately to making most telegrams entering and leaving the United States -- including those in plain text -- available to that agency.45 On August 18, 1945, four days after Japan surrendered, "two representatives of the Army Signal Security Agency were sent to New York 'to make the necessary contacts with the heads of the Commercial Communications Companies in New York, secure their approval of the interception of all [foreign] Governmental traffic entering the United States, leaving the United States, or transiting the United States, and make the necessary arrangements for this photographic intercept work.'"46 ITT and Western Union began their participation by September 1, 1945, and RCA by October 9, 1945.45

While the Army Signal Security Agency was ostensibly only interested in the interception of foreign government traffic, in practice it was given access to all traffic. This was necessary, former RCA Executive Vice President Sidney Sparks testified, because the procedures initially proposed by the government -- that special electrical connections be put on certain tielines, or that tapes originating and terminating with certain tielines be turned over -- would result in a situation where "everybody and his brother would know just exactly what we were doing and why."48 To avoid that revelation, the government was given by RCA, according to Mr. Sparks, "all. of the perforated tapes,", access to all messages.49

ITT also agreed to allow the Army access to all incoming, outgoing, and transiting messages -- private as well as governmental -- passing over the facilities of its subsidiaries involved in international communications. ITT agreed to record all such messages on microfilm, which would then be turned over to the Army messengers.50

For the next thirty years, between 1945 andl975, RCA and ITT -- which together handled approximately 70 percent of all international non-verbal telecommunications in and out of this country -- continued to make all their customers' communications available to the NSA.51 Only the form in which these messages were turned over changed during this thirty-year period.

Western Union's procedure was far more selective. It insisted from the time it entered into the program in 1945, that its own personnel do the actual handling of all messages delivered. Moreover only messages to one foreign country initially were made available to NSA.52 At an undetermined later date, all foreign government telegrams were made available to NSA.53

Western Union's participation was also of shorter duration. In 1963, Western Union divested itself of its international operations, which were taken over by Western Union International, an independent company formed for that purpose. Sometime between 1965 and 1972, an NSA Recordak machine located in the company's New York operations room and used by company employees to copy foreign government messages for the National Security Agency, was removed at the company's request.54

The subcommittee has no evidence that, after World War II, the Army Security Agency -- or, In 19S2, its successor agency, the NSA -- made any attempts to limit its "take" to coded messages from the telegraph companies, as was done by Herbert Yardley's MI -8 organization after World War I. Both coded and uncoded messages were received and analyzed, seemingly in violation of the 1958 National Security Council Intelligence Directive (NSCID number 6, dated September 15, 1958) setting out the functions of the NSA:

For the purpose of this directive, the terms "Communications Intelligence" or "COMINT" shall be construed to mean technical and intelligence information derived from foreign communications by other than the intended recipients.

COMINT activities shall be construed to mean those activities which produce COMINT by the interception and processing of foreign communications passed by radio, wire, or other electromagnetic means, with specific exception stated below, and by the processing of foreign encrypted communications, however transmitted. Interception comprises search, intercept, and direction finding. Processing comprises range estimation, transmitter operator identification, signal analysis, traffic analysis, cryptanalysis, decryption, study of plain- text, the fusion of these processes, and the reporting of results.

COMINT and COMINT activities as defined herein shall not include (a) any intercept and processing of unencrypted written communications, press and propaganda broadcasts, or (b) censorship. [Emphasis added.]

The NSA contends that the specific exclusion of unencrypted written communications, which would appear to prohibit its interception of telegrams, "is and always has been limited to mail and communications other than those sent electronically."55 Hence, the NSA appears to have interpreted this directive as a carte blanche to intercept and process all foreign communications, i.e., all those in which at least one terminal is foreign, even though such communications were unencrypted.

Operation SHAMROCK, the code name under which the cable companies made most of their international telecommunications traffic available to the NSA, and to a lesser extent to the FBI, was terminated by the Secretary of Defense in May 1975 -- a date coinciding with the Church Committee's first demonstration of interest in the program. " The "take" from Operation SHAMROCK -- and from other NSA intercept operations -- was used by the NSA in the 1960s and early 1970s to compile files on American citizens. NSA maintained a "watch- list" of names of individuals and organizations against which the "take” was sorted.56

MINARET was the code name applied to the NSA's efforts to protect its watch-list activities on American citizens, from disclosure. The watch-list had actually begun in the early sixties but the MINARET restrictions were not applied until 1969. 57 The MINARET charter described the watch-list program as involving "communications concerning individuals or organizations involved in civil disturbances, anti-war movements/demonstrations and military deserters involved in anti-war movements."58 MINARET was considered so sensitive that information being disseminated was classified TOP SECRET and labeled "Background Use Only," and while handled as SIGINT and distributed to SIGINT recipients,59 it was specifically not identified as having any NSA connection.60

Also utilizing the telegrams intercepted under Operation SHAMROCK, the NSA's Office of Security maintained approximately 75,000 files on American citizens between 1952 and 1974.61 These files were apparently created from .information obtained through SHAMROCK and NSA's other intercept programs. Persons included in these files included civil rights leaders, antiwar activists, and Members of Congress. For at least 13 years, CIA employees were given unrestricted access to these files, and one or more worked full time retrieving information that presumably was contributed to the CIA's domestic intelligence program -- Operation CHAOS -- which existed from 1967 to 1974.62

According to the NSA, its. Office of Security files on American citizens were destroyed in 1974.63

II. Legality of SHAMROCK

The fourth amendment to the Constitution guarantees to the people the right to be "secure — in their papers...against unreasonable searches and seizures." It further provides that "no Warrants shall issue, but upon probable cause."

The fact that NSA, and its predecessors, indiscriminately obtained without a warrant copies of virtually every international telegram, leaving the United States for a period of thirty years would appear to. violate this constitutional guarantee of privacy. The Supreme Court has held consistently that official searches may violate the fourth amendment if they are not reasonably limited to the accomplishment of some legitimate governmental purpose.64 Even assuming the collection of foreign intelligence- to be a legitimate governmental purpose, the fact the NSA did not limit its interceptions to the telegrams of foreign governments, or even to those which were relevant to foreign intelligence requirements, but rather intercepted all international telegrams regardless of their source or subject matter, suggests this constitutional standard was violated.

The interception of international telegrams also appears to have violated section 605 of the Communications Act, enacted eleven years prior to the commencement of SHAMROCK, although this point has never been the subject of a judicial determination. Section 605, as originally enacted, prohibited employees of common carriers, as well as any other person "not being authorized by the sender", from intercepting and divulging the contents of telegrams, except in certain specified situations.65 The exception most relevant here allowed for publication "on demand of other lawful authority." However, no court decision prior to the start of SHAMROCK had interpreted this phrase to mean anything other than some form of official process.66 In particular, no federal intelligence agency had ever been designated by any court as "other lawful authority" under this section,67 nor did the legislative history of the Act indicate that such an interpretation was intended. 68

It is, furthermore, important to note that the international telegraph companies which participated in SHAMROCK did not themselves interpret the "other lawful authority" exception to section 605 as legal justification for their participation. 69To the contrary, they informally sought to have section 605 amended to permit, as a matter of law, the actions which they were being asked to undertake by the government.70 They agreed to participate in SHAMROCK, nonetheless, upon the assurances of the Attorney General and the President that they would not be prosecuted under the provisions of section 605.71 Whether these high- level assurances would satisfy the legal requirement of section 605 (i.e., would constitute "demands of other lawful authority") has never been the subject of a court decision.

Section 606 essentially remained in its original form until 1968, when it was amended to read in pertinent part:

receiving, assisting in receiving, transmitting, or assisting in transmitting, any interstate or foreign communication by wire or radio shall divulge or publish the existence, contents, substance purport, effect, or meaning thereof, except through authorized channels of transmission or reception...on demand of other lawful authority. No person not being authorized by the sender shall intercept any radio communication and divulge or publish the existence, contents, substance, purport, effect, or meaning of such intercepted communication to any person ..." (Emphasis added.)

Chapter 119 of title 18, cited in-this section, provided in pertinent part: "Nothing contained in this chapter or in section 605 of the Communications Act of 1934... shall limit the constitutional power of the President to obtain foreign intelligence information deemed essential for the security of the United States." 72

Ostensibly, this language, seems intended to remove any doubts that communications companies, or N5A, might have with respect to whether a program such as SHAMROCK might constitute a violation of section 605. But if this was the apparent purpose of the 1968 amendments, it remained unclear whether they had this legal effect. In the well-known Keith case, for example, decided in 1972, the Supreme Court considered the language in chapter 119., quoted above, and found that it "confers no power", but instead "merely provides that the Act shall not be interpreted to limit or disturb such power as the President may have under the Constitution." 73 Thus, if chapter 119 of title 18 did not authorize any action by the President, as the Court suggests, one is left to ponder the meaning of the language found in the amended version of section 605 which says "Except as authorized by chapter 119, title 18..." telegraph companies shall not disclose telegrams in their possession. (Emphasis added.)

This apparent incongruity between the dicta in the Keith case and the statutory language in the amended section '605 has not been resolved by the courts. In United States v, Butenko, a 1974 case, however, the Court of Appeals for the Third Circuit, without attempting to reconcile the two, appeared to resolve the issue of 605 ’s applicability in favor of the intelligence community by holding:

"Section 605 of the Communications Act neither prohibits the President from gathering foreign intelligence information nor limits the use to which material so obtained may be put."74.The Supreme Court denied certiorari. 75

While the Butenko case involved intercepts of telephone conversations in the course of a wiretap which was exclusively and undisputedly undertaken for foreign intelligence purposes, the court's conclusions with respect to the legal effects of section 605 appear broad enough to insulate foreign intelligence-gathering procedures of all types from prosecutions under section 605. 76

But as far-reaching as the Butenko language seems to be, even that decision indicates that section 605 may have continued vitality vis-a-vis the activities of intelligence agencies to the extent that such activities are undertaken for other than foreign intelligence purposes. The Butenko court stated its conclusion in the following manner: "The surveillances at issue here were conducted solely for the purpose of gathering foreign intelligence. Therefore, section 605 does not render them, in and of themselves,... unlawful." 77

It would appear, then, that the amended version of section 605, even when read in light of the broad holding in Butenko, would prohibit the sort of activity which took place under SHAMROCK. By NSA's own account, it used information gleaned from the SHAMROCK "take"--from the early 1960s until 1973--for law enforcement and internal security purposes, and not solely for foreign intelligence purposes.78 Virtually all overseas cables of Americans were read during this period, not simply those which had obvious foreign intelligence value. 79 Two of the telegraph companies, for their part, turned over everything to NSA, making no effort to select messages which could reasonably be expected to contain information of foreign intelligence value. 80 Thus, even under the Butenko standard, it is apparent that section 605 would still present a serious legal difficulty to a program like SHAMROCK, which was conducted for other than strictly foreign intelligence purposes.

PART II

CURRENT NSA OPERATIONS

NSA has never fully explained how it operates, and, given the fragile nature of its work, complete disclosure is neither necessary nor desirable. The Committee feels, however, that insofar as how NSA's operations impact upon the communications of U.S. citizens and corporations, there is a compelling interest in disclosure. Indeed, enough has appeared on the public record, and has been conveyed to this Committee, to indicate NSA's enormous potential to silently violate the rights of Americans on an immense scale. The following discussion focuses upon several apparent problem areas.

The "Vacuum Cleaner" Method

NSA's work necessarily brings it in possession of the private communications of Americans. This is so because in order for NSA to monitor international lines of communications for foreign intelligence, NSA must intercept all communications transmitted over such links. Former NSA Director Lew Allen, Jr., explained the problem which this presents to NSA to the Church Committee:

"[ I]t necessarily occurs that some circuits which are known to carry foreign communications necessary for foreign intelligence will also carry personal communications between U.S. citizens, one of whom is at a foreign location. The interception of communications, however it may occur, is conducted in such a manner as to minimize the unwanted messages. Nevertheless, many unwanted communications are potentially available for selection. Subsequent processing, sorting and selecting for analysis, is conducted in accordance with strict procedures to insure immediate and, where possible, automatic rejection of inappropriate messages. The analysis and reporting is accomplished only for those messages which meet specified conditions and requirements for foreign intelligence."81

General Allen's statement, apparently made to assure the Church Committee and the public, indicates the enormous potential for violation of personal privacy which NSA possesses.

First, it suggests that NSA is able to monitor virtually every international communication entering or leaving the United States. At present, some 24 million telegrams and 50 million telex (teletype) messages enter, leave, and transit the United States annually,82 and most of these are sent or received by private citizens. Millions of additional messages are transmitted over leased lines, including millions of computer data transmissions electronically entering and leaving the country each year. International telephone calls are yet another potential source of intelligence.

Secondly, it is apparent from General Allen's statement that NSA, in the course of its intelligence-gathering, obtains access to virtually all types of information. NSA's "ear" picks up not simply messages with political and military significance, but messages concerned with financial and economic affairs, agricultural matters, cultural and social affairs, as well as purely personal affairs. NSA may not make use of all such information, but the opportunity is, nonetheless, present.

Finally, General Allen’s statement describes in general terms NSA's capability to select those messages which it decides meet its foreign intelligence criteria. Elaborating further on this capability, Allen noted: ”[t]he use of lists of words, including individual names, subjects, locations, etc., has long been one of the methods used to sort out information of foreign intelligence value from that which is not of interest." 83Presumably, therefore, NSA's selection process might be applied to. sort out the communications of a particular government, a particular company, or a particular individual. NSA could presumably select a message going to or from such target or one which simply mentioned it. NSA could also presumably select communications about a particular subject, such as plutonium or oil.

In short, NSA possesses an extraordinary capability to intercept and make intelligible electronic signals which carry communications. No other agency of the federal government undertakes such activity on such an immense scale.

Targeting for "Foreign Intelligence" Requirements

General Allen's statement to the Church Committee alluded to the fact that NSA selects messages on the basis of "foreign intelligence" requirements supplied by its consumers in the U.S. intelligence community.84 What may constitute "foreign intelligence", however, is far from clear. As the Church Committee points out:

'"Foreign intelligence' is an ambiguous term. Its meaning changes, depending upon the prevailing needs and views of policymakers, and the current world situation. The internal politics of a nation can also play a role in setting requirements for foreign intelligence; the domestic economic situation, an upcoming political campaign, and internal unrest can all affect the kind of foreign intelligence that a political leader desires. Thus, the definition constantly expands and contracts to satisfy the changing needs of American policymakers for information." 85

Indeed, NSA's monitoring of the international communications of U.S. citizens involved in antiwar activities in the late 1960s was considered to have been part of the agency's "foreign intelligence” mission. 86 NSA claims that it no longer targets U.S. citizens by name for any purpose, 87 but it concedes that this limitation is a matter of self-restraint, rather than one of law 88 or practicality. 89

Apart from even this sort of blatantly improper intrusion, however, it is not difficult to see how a broad range of activity carried out with foreign entities by American citizens, especially activities of an economic and financial nature, could be of "foreign intelligence" interest, and, thus, be "fair game" for NSA.

It may be of "foreign intelligence” interest, for example, to know what is being said between U.S. banks and their large Middle Eastern depositors, whose actions could have a substantial inpact on the U.S. economy.90 It may be of "foreign intelligence" interest to know the details of oil transactions between U.S. importers and their foreign suppliers, of commodities sales with foreign governments, of negotiations regarding the purchase of equipment or services from American concerns, of the location and quantity of various raw materials, or the location of influential U.S. businessmen traveling in foreign countries, or of what is being said about or to members or employees of the U.S. government. 91

Thus, while an American citizen or company might not be targeted by name, by virtue of his international activities, his communications might be selected by NSA on the basis of its "foreign intelligence" criteria. NSA has not denied that it, in fact, "selects" U.S. messages of this nature; and, indeed, several uncorroborated reports have reached this Committee indicating that such monitoring is presently underway. 92 For a discussion of the restrictions which govern this activity, see page, infra.

Communications Security

In addition to its foreign intelligence mission, NSA is charged with the protection and security of U.S. government communications. 93 NSA carries out this function primarily by developing codes and encryption devices to ensure that governmental communications cannot be read by foreign intelligence-gathering agencies.

Recently, however, press reports have stated that NSA has carried out its communications security function by monitoring purely domestic communications links to determine what information, if any, is being gleaned from American complications by Soviet intercepts within the United States. 94

NSA has not publicly denied these reports, nor has it sought to explain them. 95 When asked about such reports, the current NSA Director, Vice Admiral Bobby R. Inman, only repeated NSA's claim that "no U.S. citizen is now targeted by the NSA in the United States or abroad".96 As heretofore noted, however, the fact that NSA does not target U.S. citizens by name. does not necessarily mean that NSA does not intercept and select the communications of U.S. citizens to carry out its work. If domestic communications are being systematically intercepted and perused by NSA with the idea of discovering what the Soviets are able to obtain from U.S. communications, NSA' s communications dragnet could conceivably be of mammoth proportions.

Uncommon Secrecy

To understand NSA's reluctance to provide greater public explanation of the manner in which it intercepts and handles U.S. communications,. one must understand the uncommon secrecy which has traditionally enshrouded its existence and functions. The Agency was created by classified Executive order in 1952, and its functions were assigned by classified Executive directives thereafter. Prior to 1962, its existence was not acknowledged in the U.S. Government Manual. It was not until. 1975, twenty-three years after its creation, that any Director of the agency ever appeared before a congressional committee in public session.

SA has furthermore refused to provide evidence in judicial proceedings on the grounds that such public disclosures could lead to a compromise of its "sources and methods". The Church Committee reported that at least one criminal prosecution was dropped by the Justice Department because of NSA's refusal to discuss such intercepts in a public forum.97 Attorney General Levi admitted to the Church Committee that even he was not 1 privileged to NSA's secrets:

"Attorney General Levi:... [A]t this time I would have to say that I do not know what [NSA's] procedures are. I do not know what the possibilities are. I do not know enough about the minimization procedures [for the interception and use of U.S. communications ]...

"Senator Church: Until you have that information, you really do not have the foggiest idea of whether what they [NSA] are doing is legal or illegal, constitutional or unconstitutional?

"Attorney General Levi: I would be glad to accept the protective shape of that proposed answer. I suppose I have a foggy idea." 98

It has finally been this Committee's experience during its independent investigation, of the SHAMROCK program, that even after the Church Committee had released its public report in April 1976, exposing in great detail the nature of the program, NSA steadfastly refused to declassify any of the documents regarding the program for requested purposes of this Committee's work.

RESTRICTIONS UPON NSA’S CURRENT OPERATIONS

NSA contends that, since it is concerned solely with gathering "foreign intelligence", neither the restrictions contained in the wiretap statute (18 U.S.C. 2510, et seq.) or in section 605 of the Communications Act of 1934 affect its operations. 99 In short, NSA claims its activities are not subject to any statutory controls.

NSA does appear, however, to be subject to the general limitation contained in Executive order 11905, issued February 18, 1976, that as a "foreign intelligence agency", it may not engage in electronic surveillance of domestic communications for foreign intelligence purposes. Moreover, it appears that NSA is subject to classified restrictions imposed by the Attorney General. pursuant to section 5 of that order. 100

Although these restrictions have not been released, even in "sanitized" form, to the public, they have been alluded to in various public statements issued by agency officials. Former NSA Director Lew Allen, Jr., in testimony before the Church committee, referred to the Attorney General’s guidelines stating that under them "we may not accept any requirement based on the names of U.S. citizens unless (the Attorney General) has personally approved such a requirement, and no such approval has been given." 101 In response to a question about NSA's handling of U.S. communications which had been inadvertently intercepted, he added:

"The directives are that we do not do anything to those communications, and we reject it as early--reject such communications as early in the process as it is possible for us to do. For example, if by tuning the receiver, it is possible to reject them, that is what one does. If it turns out to be somewhat later in the process, one does it then. But the rules are clear, and that is that one rejects those messages as quickly in the selection process and as automatically as it is physically possible to do. "102

Allen further suggested that the directives prohibited NSA from monitoring purely domestic communications. 103

Allen's successor, Vice-Admiral Bobby R. Inman, elaborated further on the restrictions in remarks made to the Senate Intelligence Subcommittee on Intelligence and Human Rights, suggesting that, the guidelines required that information on U.S. citizens which had been collected accidentally "be destroyed and not used in any way".104

In addition to these public comments, a report made to the subcommittee by the General Accounting Office served to shed further light on the content of the classified restrictions imposed by the Attorney General. 105 In its report, GAO found that:

"It necessarily occurs that foreign communications may contain references to U.S. persons. The Agency [NSA] takes great pains to remove the identity of the U.S. person from any foreign intelligence report. That material which is not used in the reporting process is destroyed. "106

GAO found, however, that although the names of U.S. persons, including U.S. corporations, were removed from intelligence reports, that it was sometimes possible to identify such persons from the content of the reports:

"Employing sampling techniques, we selected a random sample of reports from a large number. of report titles for a detailed review and verified that there had been no unauthorized use of the names of U.S. persons. We did find three instances in which the mention of equipment might identify the U.S. manufacturer to a knowledgeable person. "107

CONCLUSIONS

At the outset, this 'Committee realizes that the newly-created intelligence oversight committees of the Congress have primary jurisdiction over the foreign intelligence activities of NSA. The Committee is equally aware that it may not have sufficient information in its possession regarding these activities to make informed judgments regarding the controls that should be placed upon NSA. Nevertheless, in the course of this Committee's investigation of the telegram interception program, in the work of the Church Committee, and in what has appeared elsewhere on the public record, it has become apparent that the activities of NSA have had, and probably continue to have, an adverse impact upon the rights and privacy of American citizens. This does concern the Committee.

Although NSA no longer sends its messengers to the offices of international telegraph carriers in the early hours of the morning, as it did while SHAMROCK was operational, it nevertheless intercepts international communications just as effectively and just as indiscriminately. In fact, the international communications of Americans are presumably being intercepted today in a significantly greater volume than was ever available under SHAMROCK. Moreover, the ability of NSA to sort such great volumes of material has undoubtedly improved with advances in computer technology.

NSA concedes that it must unavoidably acquire many communications of American citizens but it will not explain -- except in a general, piecemeal fashion -- what it does with those communications.

NSA further concedes that some of the communications of American citizens may be of "foreign intelligence" value but it will not say what it does with these communications. The General Accounting Office reports that while the names of U.S. citizens and corporations are deleted from NSA's reports, it is often still possible to identify the person or corporation involved.

NSA also says that it intercepts only communications which have one foreign terminal, but it does not explain, or deny press reports that it monitors domestic long-distance calls to determine what the Soviets obtain from U.S. domestic communications, even though such activity would seem to -violate Executive order 11905.

NSA says that it operates under strict guidelines established by the Attorney General but it refuses to reveal the guidelines, and refuses to allow a public assessment of their effectiveness.

All of this leaves the public to wonder if their communications are being silently intercepted and used by the government without, their knowledge. Apart from a fundamental concern for the privacy of one's communications, these practices unavoidably bring other possibilities to mind. Could the government be using information gleaned from such communications to influence or disrupt international business transactions? Could it provide NSA or Executive branch employees with "insider" information regarding investments or information which might otherwise give them a competitive advantage on some economic venture? Could such information be used to "blackmail" or threaten some individual or business? Could this information be turned over to a federal agency, such as the Securities and Exchange commission or Commerce Department, in pursuit of its administrative Would information which suggested that a crime had taken place or was about to take place be turned over to a law enforcement agency? Would information relating to a potential civil disturbance or forthcoming political rally be turned over? Would information regarding the future of certain legislation be passed on to the appropriate federal agency? Would information. which suggested some person may be a security risk be turned over to the appropriate federal agency? Could information under any circumstances be turned over to a private employer? Could such information ever be used to deny a federal benefit?

RECOMMENDATIONS

It is the opinion of the Committee that, notwithstanding the important and sensitive work undertaken by NSA, democratic government demands greater public accountability for an agency with the potential which NSA has to violate the rights of American citizens. At the very least, NSA should make public the Attorney General's guidelines which govern its acquisition and handling of the communications of U.S. citizens, and should open such restrictions to the invigorating effects of public debate. If the guidelines as they are now written cannot be disclosed because of the intelligence methods which they might reveal, the Committee encourages that they be released in a form which does not compromise such techniques.

Over the long term, the Committee concludes that Congress should adopt statutory controls to govern the activities of NSA, at least insofar as they impact upon the communications of Mexican citizens. At present, NSA contends that laws governing wiretapping and radio interceptions are not applicable to its operations. It has no statutory charter, nor is its director even subject to confirmation by the Senate. To this point at least, even the recently-created congressional oversight committees have provided' the public with no greater insight.

In view of the Agency's considerable potential for violations of the privacy of Americans, however, and the doubts already cast upon the legitimacy of its current practices, the Committee concludes that NSA's limited accountability does not serve the public's interest. Neither the Congress nor the public can carry out their constitutional responsibilities in a vacuum. Both need information. When the activities of an Executive agency come into apparent conflict with the rights and privacy of the individual, it is essential to good government that the public be informed of the nature and extent of that conflict. We should not be left to wonder whether we are abiding the activities of NSA at the expense of the Constitution.

FOOTNOTES

1/ The suppressed Report of the House Select Committee on Intelligence "[hereafter cited as Pike Committee), which was published in private channels, noted that the total annual intelligence community budget was "more than $10 billion"'; that the NSA "has one of the largest budgets in the intelligence community"; that "roughly 20 percent of the National Security Agency's budget is not added into the intelligence budget"; that "the costs given Congress for military intelligence [much of which would be applicable to NSA's functions] do not include expenditures for tactical military intelligence, which would approximately double intelligence budgets for the three military services". (Pike Committee Report, Village Voice, February 16, 1976, p. 72.)

2/ David Kahn, author of The Codebreakers, a definitive work on cryptology, describes the NSA as "the largest and most secretive of all American intelligence organs', and estimates that on its own it "spends about $1 billion a year". But, he adds, "the agency also disposes of about 80,000 servicemen and civilians around the world, who serve in the' cryptologic agencies of the Army, Navy, and Air Force [that] stand under NSA control, and if these agencies and other collateral costs are included, the total spent could well amount to $15 billion". (Source: David Kahn "Big Ear of Big Brother", New York Times Magazine, May 16, 1976.)

3/ "Meet the Press" interview, August 17, 1975.

4/ See footnote 2.

5/ See Final. Report of the Select Committee to Study Governmental Operations with Respect to Intelligence Activities, U. S. Senate, 94th Cong., 2d Sess., 1976, Vol. Ill, pp. 736-737. (Hereinafter cited as the Church Committee Report.) See also, testimony of Lt. Gen. Lew Allen, Jr., Hearings before the Select Committee to Study Governmental Operations with Respect to Intelligence Activities, U. S. Senate, 94th Cong., 2d Sess., 1976, Vol. 5, pp. 6-7. (Hereinafter cited as the Church Committee Hearings.)

6/ Ibid.

7/ Frank Van Riper, "Find U. S. Agents Spy on Embassies' Cables", New York Daily News, July 22, 1975, p. 2

8/ Hearings before a Subcommittee of the Committee on Government Operations, "Interception of Nonverbal Communications' by Federal Intelligence Agencies", 94th Cong., 2d Sess., 1976. (Hereinafter cited as Subcommittee Hearings.)

9/ Subcommittee Hearings, pp. 2-3.

10/ Id., p. 62.

11/ Church Committee Hearings, Vol., 5, pp. 5-46.

12/ Ibid., pp. 51-55.

13/ Church Committee Hearings, Vol. 5, pp. 57-60.

14/ Subsequently amended to 1945. See Church Committee Report, Vol. III, p. 768.

15/ Subcommittee Hearings, p. 56.

16/ Id., pp. 58-59.

17/ Id., p. 99.

18/ Although five contempt citations were voted by the subcommittee for the individuals who refused to testify or produce documents, the subcommittee, in light of the subsequent disclosure of documents it had requested, did not recommend to the full committee that such contempt citations be issued.

19/ Id., pp. 125-126

20/ Id., p. 240, et seq.

21/ Army Security Agency, Historical Background of the Signal Security Agency, Vol. III, p. 74; prepared under the Direction of the Assistant Chief or Staff, G-2, April 12, 1946.

22/ Id.

23/ David Kahn, The Codebreakers (New York, The Macmillan Company, 1967), p. 344.

24/ Herbert O. Yardley, The American Black Chamber (Indianapolis, The Bobbs-Merrill Company, 1931), p. 240.

25/ Army Security Agency, op. cit., p. 48: "In order to conceal the true nature of its activity, the office was called 'Code Compilation Company', a cover name for MI-8 but the real name of an incorporated business firm established by Yardley and Charles J. Mendelsohn, partners in this venture. This firm produced and sold in fairly large quantity, a code called the Universal Trade Code."

26/ Yardley, on cit., p. 370.

27/ Quoted in Kahn, 033. cit., p v 360n. (In this regard, Secretary Stimson also made his well-known declaration, "Gentlemen do not read each other's mail".)

28/ Yardley, op. cit., p. 332. (This forty-five year old list is not dis-similar to one possessed by Western Union International which, when subpenaed by this Committee on February 4, 1976, prompted President Ford to attempt to extend the so-called "executive privilege" doctrine to a private corporation. See p. below.

29/ Id.

30/ Yardley, op. cit., pp. 240-41.

31/ Copy of letter in possession of subcommittee.

32/ Postal Telegraph, the holding company controlling Commercial Cable, merged with Western Union in 1943. (Of the three U. S. companies now dominating the international telegraph business in this country -- ITT World Communications, RCA Global Communications, and Western Union International, a subsidiary of Western Union — two were very small in the 1920's, and one did not exist.)

33/ Yardley, op. cit., p. 342.

34/ Army Security Agency, op. Cit., pp. 73-74.

35/ "An Act to regulate radio communication," August 13, 1912., 62nd Cong., 2d Sess., Ch. 287, Statutes at Large, Vol. 37, Part I, p. 307.

36/ "An Act for the regulation of radio communication," February 23, 1927. 53th Cong., 2d Sess., Ch. 189, Statutes at Large, Vol. 44, Part II, Sec. 27, p. 1172.

37/ Army Security Agency, on. cit., p. 77.

38/ New York Times, June 2, 1931; p. 18.

39/ New York Herald Tribune, June 9, 1931; p.

40/ New York Times, June 2, 1931; op cit.

41/ Army Security Agency, op. cit., p. 177.

42/ New York Times, February 21, 1933, p. 3.

43/ Primarily from Army Security Agency, op. cit., pp. 176-80.

44 / ITT Communications is now ITT World Communications. RCA Communications is now RCA Global Communications. In 1963, Western Union's international operations were transferred to Western Union International, which was established as an independent company. Between 1971-1974, these three companies carried 94.9 percent of all international telegraph messages in and out of the U.S. (Source: FCC letter to subcommittee, January 28, 1976.)

45/ In March 1976, when representatives of the three major American telegraph companies engaged in international communications testified before the subcommittee, the subcommittee believed that the government had not commenced its post World War II interception of private messages until 1947. This belief was based on a report issued by the Church Committee on November 6, 1975, at which time Sen. Church stated:

At meetings with Secretary of Defense James Forrestal in 1947, representatives of the three companies were assured that if they cooperated with the Government in this program, they would suffer no criminal liability and no public exposure, at least as long as the current administration was in office. They were told that such participation was in the highest interests of national security.

Shortly after the subcommittee's March 1976 -hearings, a subcommittee staff inquiry led to records being uncovered in the Archives which indicated that the Army Security Agency had, in fact, taken steps to initiate the interception program as soon as the war ended. Prior to making these records available to the subcommittee. Archives sought Department of Defense permission; that permission was refused. The Department of Defense then advised the Church Committee of the existence of these documents, and allowed a staff member of that committee to inspect them. This transpired just prior to the issuance, in May 1976, of the Church Committee staff report :on "National Security Agency Surveillance Affecting Americans," which was amended accordingly.

46/ Letter from Intelligence Officer of Army Signal Security Agency to Commanding General, August 24, 1945, quoted in Church Committee Final Report, Book III, pp. 767-68.

47/ Id., p. 769.

48/ Subcommittee Hearings, p. 212.

49/ Ibid. Sparks testified that within RCA he was the sole authority for making all messages available to government agents, and that this arrangement began in 1947. The Committee has no reason to doubt the accuracy of Mr. Spark's testimony insofar as he was aware of the facts. The 1947 date, as he recalled it, was presumably a result of that being the program's generally accepted date of commencement, at the time of his testimony. His belief that he was responsible for. making the arrangements with the government apparently is based on initiatives made to him by Army Security Agency representatives, subsequent to arrangements unknown to him being made with his superiors. (See October 9, 1945 letter from RCA Vice-President W. H. Barsby to Brig. General W. Preston Corderman, in Subcommittee Hearings, p. 208). Mr. Sparks apparently never knew about the 1947 meeting with Secretary Forrestal; Spark's superior, Gen. Harry C. Ingles, then president of RCA Communications, represented the company.

The ITT delegation to the 1947 Forrestal meeting was led by ITT Chairman and President, Sosthenes Behn. Joseph L. Egan, Western Union president, was invited but did not attend, and his company apparently was not represented.

50/ Army Signal Security Agency letter, August 24, 1945, op. cit., p. 772.

51/ For a detailed description of these procedures see Church Committee Final Report, Book III, pp. 765-776.

52/ Id., p. 773.

53/ Subcommittee Hearings, p. 107.

54/ Western Union International's executive vice-president' testified he had the machine removed in 1965. However, the Church Committee reported at Book III, p. 774: This recollection "was not borne out by documents furnished by NSA. The documents showed that on February 2, 1968, a company vice-president (not the one referred to above) had discovered the existence of NSA's Recordak (microfilm) machine in the Western Union transmission room. The machine was reported to the company president, who directed his employees to find out to whom the machine belonged.... It is clear that NSA continued to receive duplicates of all messages to the foreign country referred to above until 1972; when again as a result of 'discovery' by company officials, this procedure was halted.... In effect, Western Union International's participation in SHAMROCK ended by 1972."

On June 7, 1976, Mr. Greenish advised the subcommittee, through counsel "... that the practices discussed by him, copying foreign government traffic on the Recordak, terminated with the removal of the one and only Recordak 'about 1965'". (Subcommittee Hearings, p. 111.)

55/ Church Committee Final Report,. Book III, p. 737.

56/ Id., p. 777-778.

For a detailed discussion of NSA watchlist activities, see Church Committee Hearings, Vol. 5, pp. 1-55 and'145-163; also Church Committee Final Report, Book III, pp. 737-65.

57/ Id., p. 739.

58/ "Establishment of Sensitive SIGINT Operation Project Minaret", dated July 1, 1969, in Church Committee Hearings, Vol. 5, pp. 149-50.

59/ SIGINT recipients included the President's Foreign Intelligence Advisory Board (PFIAB), the Central Intelligence Agency (CIA), the Federal Bueau of Investigation (FBI), the Defense Intelligence Agency (DIA), the (Army) Assistant Chief of Staff for Intelligence (ACSI), the Office of Naval Intelligence (ONI), the Air Force Office of Special Investigations (AFOSI), the Energy Research and Development Agency (ERDA) and the Department of State's Office of Current Intelligence.

60/ Church Committee Hearings, Vol. 5, p. 150

61/ For a detailed discussion of NSA Office of Security files on American citizens, see Church Committee Final Report, Book III, pp. 777-78.

62/ For a detailed discussion of the CIA's Operation CHAOS, see the Church Committee Final Report, Vol. Ill, pp. 681-720.

63/ Church Committee Final Report, Vol. III., p. 778. It is noteworthy that the destruction of these files occurred when Defense Department inspectors found them being held in violation of departmental directives prohibiting the maintenance of files on "non-affiliated" civilians. See Church Committee Final Report, Vol. Ill, p. 827.

64/ Adams v. William 407 U. S. 143 (1972); Wyman v. James 500 U. S. 309 (1971); Terry v. Ohio 392 U. S. 1 (1968): Camara v. Municipal Court 387 U. S. 523 (1967).

65/ § 47 U. S. C. 605, as originally enacted, provided, in pertinent part: "No person receiving, assisting in receiving, transmitting or assisting in transmitting, any interstate or foreign communication by wire or radio shall divulge or publish the existence, contents, substance, purport, effect, or meaning thereof, except through authorized channels of transmission or reception... on demand of other lawful authority. No person not being authorized by the sender shall intercept any radio communication and divulge or publish the existence, contents, substance, purport, effect, or meaning of such intercepted communication to any person..."

66/ In Newfield v. Ryan 91 F.2d 700 (3rd Cir. 1937), cert, den. 302 U. S. 729 (1937), the court held that SEC subpoenas to telegraph companies to produce telegrams relating to matters under investigation constituted "other lawful authority” for purposes of section 605.

67/ Indeed, in Nardone v. United States 302 U. S. 379 (1937), the Supreme Court expressly decided that the second clause of section 605 "comprehends federal agents" within its prohibition. 302 U. S. at page 381.

68/ See Sen. Rep. No. 781, 73rd Cong., 2d Sess. 1 (1934); H. Rep. No. 1850, 73rd Cong., 2d Sess. 3 (1934).

69/ See Memorandum of Richard W. Cutler, "Possible Liabilities Arising from surrender of RCA- Transmitted Messages to Government Officials", November 11, 1948, reprinted in Abzug Committee Hearings, at p. 255 ff.

70/ See letter from Thomas K. Latimer, Department of Defense, to Robert Fink, Staff Member of the House Government Operations Committee, May 10, 1976, reprinted in Abzug Committee Hearings, at p. 324.

71/ See Church Committee Final Report, Vol. III, p. 769.

72/ United States v. United States District Court for the Eastern District of Michigan, 407, U. S. 297 (1972).

73/ 18 U. S. C. 2511 (3).

74/ United States v. Butenko 494 F. 2d 593 (3rd Cir. 1974), cert, den, sub nom United States v. Ivanov 419 U. S. 881 (1974).

75/ Ibid.

76/ Presumably, this would apply to purely domestic intercepts as well as international intercepts.

77/ The Butenko court also suggests that Fourth Amendment issues, as identified by the Supreme Court in Keith, supra, footnote 72, would be raised by surveillance conducted for other than foreign intelligence purposes. 494 F. 2d at page 603.

78/ See Church Committee Hearings, pp. 20-23.

79/ See Church Committee Final Report', Vol. III., pp. 770-776.

80/ Ibid.

81/ Church Committee Hearings, Vol. 5, p. 19. Former CIA Director William E. Colby gave similar testimony before the Pike Committee on August 6, 1975, stating: "On some occasions, (the interception of U. S. citizens' communications ) cannot be separated from the traffic that is being monitored. It is technologically impossible to separate them." p. 241. (In fact, Mr. Colby's use of the expression "on some occasions" is probably misleading inasmuch as NSA routinely faces this problem in its search of international communications entering and leaving the United States.)

82/ Letter from Michael Senkowski, Legal Assistant to the Chairman, Federal Communications Commission to Robert Fink, Professional Staff Member, Subcommittee on Government Information and Individual Rights, dated January 28, 1976.

83/ Church Committee Hearings, Vol. 5, p. 20.

84/ Ibid., p. 9.

85/ Church Committee Report, Book III, pp. 736-37.

86/ General Allen stated that when the watch-list activity began, it was viewed as "an appropriate part of the foreign intelligence mission". See Church Committee Hearings, Vol. 5, p. 23.

87/ Testimony of General Lew Allen, Jr., Church Committee Hearings, Vol. 5, p. 16. See also the statement of NSA Director Bobby R. Inman before the Senate Subcommittee on Intelligence and Human Rights, as reported in the Washington Post, July 22, 1977. Inman reportedly stated: "Let there be no doubt, no U. S. citizen is now targeted by the NSA in the United States or abroad."

88/ Senator Schweiker, at the Church Committee hearings asked then NSA Director Lew Allen, Jr.: "Is there any law that you feel prohibits you from intercepting messages between American citizens if one is at a foreign terminal and the other is at a domestic terminal, or do you feel there is no law that covers this situation?

"General Allen: No, I do not believe there is a law that specifically does that." (Church Committee Hearings, Vol. 5, p. 31.) See also discussion between Senator Mondale and NSA General Counsel Roy Banner at pp. 45-46.

89/ Senator Schweiker at the Church Committee hearings, asked then NSA Director Lew Allen, Jr.: "Would it be possible--granted this is not your policy, and you state that you have not done so--would it be possible to use this... apparatus that you have to monitor domestic conversations within the United States if some person with mal- intent desired to do it?

"General Allen: I don't think I really know how to answer the question. I suppose that such a thing is technically feasible." (Church Committee hearings, Vol. 5, p. 31.)

90/ For a discussion of the impact of actions taken by banks and their foreign depositors on U. S. foreign and 'economic policy, see the staff report' entitled "International Debt, The Banks, and U. S. Foreign Policy", Subcommittee on Foreign Economic Policy, Committee of Foreign Relations, U. S. Senate, 95th Cong., 1st Sess., 1977.

91/ The final report of the Pike Committee noted that "preliminary investigation reveals at least one new area of non-political and non-military emphasis in international intercept--economic intelligence. Communications interception in this area has rapidly developed since 1972, partly in reaction to the Arab oil embargo and the failure to obtain- good information on Russian grain production and negotiations for the purchase with American corporations", p. 88.

92/ Three such cases have been reported to the subcommittee. In the first, a U. S. Businessman engaged in selling commercial building products to a Middle East oil sheikdom, reported that soon after his first international communication regarding such sale, he and his wife were visited by federal intelligence agents who were knowledgeable about the proposed sale. He further suspected that he was kept under surveillance thereafter until the sale was completed. He reported that every aspect of the transaction had been conducted using international communications.

In a second case, a member of a Washington law firm, which represented a client involved in international trade, reported that in litigation with the Justice Department, the government presented evidence which could only have been obtained through the interception of its clients international communications. The law firm did not feel it was in their client's best interest to pursue the matter, however.

In the third case, a senior official of a large multinational U. S. corporation told the committee that he knew that NSA was intercepting its international communications. He stated that the company encrypted such communications but government regulations prevented the level of encryption from being so sophisticated that NSA would be prevented from reading it. He further stated, however, that the company felt such monitoring by the government to be "legitimate".

93/ Church Committee Hearings, Vol. 5, pp. 16-17.

94/ See New York Times, "Administration Maps Secret Plan to Fight Telephone Intrusion", July 10, 1977, p. 1; Washington Post, "Carter Seeking Ways to Block Interception of Classified Calls", July 11, 1977, p. A-3.

95/ Theoretically, NSA could determine what the Soviets were obtaining U. S. domestic communications by monitoring Soviet transmissions leaving this country. There has been doubt expressed by some authorities, notably David Kahn, author of The Codebreakers, however, that NSA is able to break Soviet coded transmissions See David Kahn, "Embassy Burglaries? Old Hat...", New York Times, June12, 1973. If this is true, then it would seem that NSA may be forced to monitor domestic communications itself, if it hopes to determine what the Soviets are gaining from these intercepts.

96/ See footnote 8.

97/ Church Committee Report, Book III, p.758. Recently, however, the Justice Department, for the first time, revealed evidence in civil-suit specifically attributed to NSA interceptions. See Washington Post, "NSA Tapped Six Overseas Messages by Attorney for Sirhan, FBI Reveals", August 3, 1977.

98/ Church Committee Hearings, Vol. 5, p. 111.

99/ Church Committee Hearings, Vol. 5, p. 18.

100 / Attorney General Eliot Richardson had apparently imposed informal restrictions upon NSA's monitoring of U. S. communications in 1973. See Church Committee Hearings, Vol. 5, p. 16. After the issuance of EO 11905, however, these restrictions were revised and issued by Attorney General Edward Levi on May. 26, 1976, pursuant to such order.

101/ Church Committee Hearings, Vol. 5, p. 16. This statement apparently made reference to the restriction imposed by Attorney General Richardson.

102/ Ibid., p. 30.

103/ Ibid., p. 31.

104/ See footnote 8.

105/ Letter from Comptroller General of the United States, Elmer G. Staats to Chairwoman Bella S. Abzug, November 12, 1976.

106/ Ibid., p. 5.

107/ Ibid.

 

Return to Table of Contents