Site Map CHURCH COMMITTEE REPORTS |
INTELLIGENCE ACrrIVITIES-THE NATIONAL SEC[RITY AGENCY AND FOURTH AMEND~IENT RIGHTS WEDNESDAY, OCTOBER 29, 1975 U.S. SEX~\.TE, SELECT CmUIITTEF. To STUDY GOYERX1IEXTAL OPEr~\TIOXS ,VITH RESPECT TO IXn:LLIGEXCE ACTIVITIES, lVashington,D.C. The committee met, pursuant to notice, at 10 :15 a.m., in room 318, Russell Senate Office Building. Senator Frank Church (chairman) presiding. < • Present: Senators Church, Towel', 1Iondale, Huddleston, Morgan, Hart of Colorado. Baker. Goldwater. Mathias and Schweiker. Also present: 'VilliamG. ~fi1ler, staff director; Frederick A. O. Schwarz, Jr., chief counsel; Curtis R. Smothers, counsel to the minority, The CUAIR1IAN. The hearing "'i1l please come to order. This morning. the committee begins public hearings on the Xational Security Agency or, as it is more commonly known, the NSA. Actually, the Agency name is unknown to most Americans, either by its acronym or its full name. In contrast to the CIA, one has to search far and wide to find someone who has ever heard of the NSA. This is peculiar, because the Xational Security Agency is an immense i~stallation. In its task of collecting intelligence by intercepting foreIgn communications, the XS,," C'mplovs thousands of people and operates with an enormous budget. Its expansive computer facilities comprise some of the most complex and sophisticated electronic machinery in the world. Just as the NSA is one of the largest and least known of the intelligence agencies, it is also the most <reticent. ,Yhile it sweeps in messages from around thc world, it gives out precious little information about itself. Even the legal basis fOl' the activities of NSA is different from other intelligrnce agencies. X"O statnte establishes the NSA or defines the permissible scopc of its responsibilities. Rather, Executive directives make up the sole "cha]"ter~' for the Agency. Furthermore, these directives fail to deHne precisel~' what constitutes the "technical and intelligence information" which the NSA is authorized to collect. Since its establishment in 19:")2 as a part of the Defense Department, representatives of tIl(' NSA have never appeared before the Spnate in a public hearing. Today "'e will bring the Agency from behind closed doors, The committee has plectecl to hold p11blic hearings on the NSA only after the most careful considpration. For 2~ years this Agency has provided the Prpsic1ent and thr otl]('r intelli'!ypnce services with <:'omiunnications intelligence vital to dpcisionmaking "'ithin our Gowrn- (1) 2 ment councils. The value of its ,york to our national security has been and will continue to be inestimable. ",Ve arc determined not to impair the excellent contributions made by the NSA to the defense of our country. To make sure this committee does not interfere with ongoing intelligence activities, we have had to be exceedingly careful, for the techniques of the NSA are of the most sensitive and fragile character. ",V"e have prepared ourselves exhaustively: we have circumscribed the area of inquiry to include only those which represent abuses of power; and we have planned the format for today's hearing with great care, so as not to venture bevond our stated obicctives. The delicate character of communications intelligence has convinced Congress in the past not to hold public hearings on NSA. ",Vhile this committee shares the concern of earlier investigative committees, we occupy a different position than our predecessors. ",Vc are tasked. by Senate Resolution 21, to investigate "illegal, improper, or unethical activities" engaged in by intelligence agencies, and to decide on the "need for specific legislative authority to govern operations of * * * the National Security Agency." Never before has a committee of Congress been better prepared, instructed, and authorized to make an informed and judicious decision as to what in the affairs of NSA should remain classified and what may be examined in a public forum. Our staff has conducted an intensive 5-month investigation of NSA, and has been provided access to required Agency files and personne1. NSA has been cooperative with the committee, and a relationship of mutual trust has been developed. Committee members have received several briefings in executive session on the activities of the Agency, including a week of testimony from the most knowledgeable individuals, in an effort to determine what might be made public without damaging its effectiveness. Among others, we have met with the Directors of the NSA and the CIA, as well as the Secretary of Defense. Finally, once the decision was made to hold public hearings on the NSA, 'the committee worked diligently with the Agency to draw legitimate boundaries for the public discussion that ,,'ould preserve the technical secrets of NSA, and also allow a thorough airing of Agency practices affecting American citizens. In short, the committee has proceeded cautiously. We are keenly aware of the sensitivity of the NSA, and wish to maintain its important role in our defense system. Still, we recognize our responsibility to the American people to conduct a thorough and objective investigation of each of the intelligence services. We would be derelict in om duties if we were to exempt NSA from public accountability. The committee must act with the highest sense of responsibility during its inquiry into the intelligence services. But it cannot sweep improper activities under the rug-at least not if we are to remain true to our oath to uphold the Constitution and the laws of the land. We have a particular obligation to examine the NSA, in light of its tremendous potential for abuse. It has the capacity to monitor the private communications of American citizens without the use of a "bug" or "tap." The interception of international communications signals sent through the air is the job of NSA; and, thanks to modern technological developments, it does its job very well. The danger lies in the ability of the NSA to turn its awesome technology against domestic communications. Indeed, as our hearings into the Huston plan demon3 strated, a previous administration and a former NSA Director favored using this potential against certain U.S. citizens for domestic int€lligence purposes. 'While the Huston plan was never fully put into effect, our investigation has revealed that the NSA had in fact been intentionally monitoring the overseas communications of certain U.S. citizens long before the Huston plan ,vas proposed-and continued to do so after it was revoked. This incident illustrates how the NSA could be turned inward and used against OUI' own people. It has been the difficult task of the committee to find a way through the tangled webs of classification and the claims of national securityhowever valid they may be-to inform the American public of deficiencies in their intelligence services. It is not, of course, a task without risks, but it is the course we have set for ourselves. The discussions which will be held this morning are efforts to identify publicly certain activities undertaken by the NSA which are of questionable propriety and dubious legality. General Allen, Director of the NSA, will provide for us today the background on these activities, and he will be questioned on their origins and objectives by the conunittee members. Like the CIA and the IRS, the NSA, too, had a "watch list" containing the names of U.S. citizens. This list will be of particular interest to us this morning, though we will take up another important subject as well. The dominant concern of this committee is the intrusion by the Federal Government into the inalienable rights guaranteed Americans by the Constitution. In previous hearings, we have seen how these ri.ghts have bC2n violated by the intelligence services of the CIA, the FBI, and the IRS. As the present hearings will reveal, the NSA has not escaped the temptation to have its operations expanded into provinces protected by the law. While the committee has found the work of the NSA on the whole to be of a high caliber and properly restrained and has tremendous respect for the professional caliber of the people who work there, the topics we shall explore today do illustrate excesses and suggest areas where legislative action is desirable. That is why we are here. Senator Tower would like to make an opening statement. Senator TOWER. Thank you, Mr. Chairman. Mr. Chairman, I shall be brief. From the very beginning, I have opposed the concept of public hearings on the activities of the NSA. That opposition continues, and I should like to briefly focus on the reasons I believe these open hearings represent a serious departure from our heretofore responsible and restrained course in the process of our investigation. To begin with, this complex and sophisticated electronic capability is the most fragile weapon in our arsenal; and unfortunately, I cannot elaborate on that, because that would not be proper. Public inquiry on NSA, I believe, serves no legitimate legislative purpose, while exposing this vital element of our intelligence capability to unnecessary risk, a risk acknowledged in the chairman's own opening statement. S. Res. 21 does authorize the NSA inquiry, and this has been done very thoroughly in closed session. But that same resolution also picks up a recurring theme of the floor debate upon the establishment of this committee. Specifically, we were admonished not to disclose ont4 side the committee information which would adversely affect intrlligence activities. In my view, the public pursuit of this matter does adversely affect our intelligence-gathering capability. Even if the risks were minimal-and I do not belieYe they arc minimal-the NSA is the wrong target. The real quarry is not lurg-ely mechanical response of military organizations to orders. The rea 1 issues of who told them to take actions now alleged to be Cluestionablc should be addressed to the policy level. It is more important to know "why names were placed on a watch list than to know "what the XSA dill after being ordered to do so. In summary, Mr. Chairman, I believe we have fallen prey to our own fascination with the technological advances of the comnutel' agr. 'Ve have invited a three-star militarv officer to come before us to explain the awesome technology and the potential abuses of a hng-e vacuum cleaner. 'Ve have done this despite the fact that our exhaustive investigation has established only two major abuses in 2:1 yrars, both of which have been terminated. And despite the obvious risks of this sensitive component of the Nation's intelligence-gathering capability. I am opposed to a procedure which creates an mmecessarv risk of irreparable injury to the public's right to be secure: eYen if offered under the umbrella of the acknowledged presumption of a citizen's right to know. In taking such risks. we both fail to advancr the grlwral legislative purpose and, 1 believe. transgress the clearly exprl',ssNl concerns of the Senate requiring us to, if "e err at alL err on the side of caution. It is my view that there comes a point when thr peonle's right to know must of necessity be subordinated to the people's right to be secure, to the extent that a sophisticated and effectiYe intelligence-gathering capabilit:v makes them secure. I do not think that any of us here. for examplr. "'ould want 11" to sacrifice our capability for Yerification of Soyiet strategic weapons capahility. And whether or not that capability "Was thonght posture in a first-strike configuration, I cite it only as an example. Hence. my opposition to the conduct of these public hearings. 1 am a,,'are, Mr. Chairma.n. that through the democratic process. the committee has. bv a maiority vote. voted to go this route. But I frH, a compulsion to' state l~y own reasons for being in opposition. The CIL\IK'L-\~. Senator Tower. I appreciate your statement. and I might say that thel'(~ are two levels of concern in the committep. ana relating to the t,,'o differrnt practices that are, aT questionable ]e~ality. Am] so, we have dividrd this hearing into two parts. proceedmp: with th" portion that has least objection from members or th" committee who frel as Senator Tower does. And then. we will haw an opportunity to discuss furthrr the. second part. after General Allrn ha" IrTt the witness stand. And that is the procedure, that is satisfactorY with you? Sen'ator TOWEH. I accept the procedure, and it is totally satisfnctory tome. The CTL\TlDL\X. Yrry well. Xow, General AlleTi has rome 1)J'l'pared "'ith his statr!llrnt. aftrr ,,-hich. General. there wjlJ he 0,llestions Trom tIl(' committeC'. I wish yon "'ould identifv those ,,-ho ,,-ill be sitting: with YOU: and if theY • '. L· .... • 5 might respond to questions, then I would ask them to stand with you to take the oath. Would you first identify them, please? Gmeral .ALLEK. Yes. On my right is Mr. Benson Buffham, who is the Deputy Director of the National Security Agency. On my left is :Mr. Roy Banner, who is the General Counsel of the National Security Agrllcy. Sir, I suppose-or at least for our initial purposes-that I be the only witness. 'i'he CHAIR3L\X. Very well. Then you alone may stand and take the oath. Do you solemnly swear that all of the testimony you will give in this proceeding will be the truth, the whole truth, and nothing but the truth, so help you God? Gt'neral ALLEX. I clo. The CKUR3IAX. Thank vou. General. I know you l{ave a prepared statement. ,Yill you please pl'oeced with it at this time. TESTIMONY OF LT. GEN. LEW ALLEN, JR., DIRECTOR, NATIONAL SECURITY AGENCY, ACCOMPANIED BY BENSON BUFFHAM, DEPUTY DIRECTOR, NSA; AND ROY BANNER, GENERAL COUNSEL, NSA General ALLEX. 1\11'. Chairman, members of the committee, I recognize the important responsibility this committee has to investigate the intelligence operations of the U.S. Government and to determine the need for improvement by legislative or other means. For sen'l'al months, im'olving many thousands of man-hours, the National Security Agency has, I believe, cooperated with this committee to provide a thorough information base, including data whose continued secrecy is most important to our Nation. lYe are now here to discuss in open session certain aspects of an important and hitherto secret operation of the U.S. Gvernment. I recognize that the committee is deeply concerned that we protect sensitiyc and fragile sources of information. I appreciate the care which this committee and staff have exercised to protect the sensitive data "'e have provided. I also understand that the committee intrnds to restrict this open discll"-sion to certain specific activities and to avoid current foreign intelligence operations. It may not be possible to discuss all these activities completely without some risk of damage to continuing forrign intelligence capabilities. Therefore, I may request some aspects of our discussion be conducted in executive session where there can be opportunit:v to continue our full and frank disclosure to the committre of all the information you require. The committee may then de\'rlop an appropriate public statement. ,Ve are therefore here, sir, at vour request. prepared to cooperate in bringing these matters before your committee. In the interest of clarity and perspective, I shall first review the purpose of the National Security Agency and the authorities under \vhich it operates. Next, I will describe the process by which requirements for information are levied on NSA by other Government agencies. And finally, I will give a more specific description of an operation conducted in 1967-73 by NSA in response to external requirements, y,hich I \yin rcfer to as "the \vatch list activity." This ac6 tivity has been subject to an intensive review by this committee and staff in closed session. l~nder the authority of the President, the Secretary of Defense has been delegated responsibility for both providing security of U.S. governmental communicntions and seeking intelligence from foreign electrical communications. Both functions are executed for the Secretary of Defense by the Director. ~atiollal Security Agency, through a complex national system "which includes the NSA as its nucleus. It is appropriate for the Secretary of Defense to have these execntjye ngent responsibilities, since the great majority of the effort to accomplish both of these missions is applied to the support of the military aspects of the national security. The communications security mission is directed at enhancing the security of U.S. Government communications whenever needed to protect those communications from exploitation by foreign governments~ a complex undertaking in today's advanced electronic world. The United States. as part of its effort to produce foreign intelligence, has intercepted foreign communications, analyzed, and in some cases decoded these communications to produce such foreign intelligence since the Revolutionary ·War. During the Civil 'War and "World vVar I these communications were often telegrams sent by wire. In modern times, with the advent of wireless communications, particular emphasis has been placed by the Government on the specialized field of intercepting and analyzing communications transmitted by radio. Since the 1930's, elements of the military establishment have been assigned tasks to obtain intelligence from foreign radio transmissions. In the months preceding Pearl Harbor and thronghout World vVar II. highly successful accomplishments were made by gronps in the Armv and the Navy to intercept and analyze Japanese and German coeled mdio messages. Admiral Nimitz is reported as rating its value in the Pacific to the equivalent of another whole fleet. According to another official report, in the victory in the Battle of Midway, it would haye been impossible to have achieved the concentration of forces and the tactical surprise without communications intelligence. A congressionill committee. in its investigation of Pearl Harbor, stated that the success of communications intelJjgence "contributed enormously to the defeat of the enemy, greatly shortened the war, and saved many thousrrnds of lives." General George C. Marsh~ll commented that they~communicationsintelligence~had contributed "greatly to the victories and tremendously to the savings of American lives." Following World ",Var II, the separate military efforts were brought together and the National Security Agency was formed to focns the Government's enorts. The purpose was to maintain and improve this source of intelJjgence which was considered of vital importance to the national security, to our ability to wage war, and to the conduct of foreign affairs. This mission of NSA is directed to foreign intelligence, obtained from foreign electrical communications and also from other foreign signals such as radars. Signals are intercepted by many techniques and processe.d, sorted. and analyzed by procedures which reject imtppropriate or unnecessary signals. The foreign intelligence derived from these signals is then reported to various agencies of the Government in response to their approved requirements for foreign intelligenee. 7 The NSA works very 1mI'd at this task, and is composed of dedicated, patriotic citizens, civilian and military, most of whom have dedicated their professional careers to this important and rewarding job. They arc justifiably proud of their service to their country and fully accept the fact that their continued remarkable efforts can be appreciated only by those few in Government who know of their great importance to the United States. Congress, in 1933, recognized the importance of communications intelligence activities and acted to protect the sensitive nature of the information derived from those activities by passing legishttion that is now 18 U.S.C. 952. This statute prohibits the divulging of the contents of decoded foreign diplomatic messages, or information about them. Later, in 1950, Congress enacted 18 U.S.C. 798, which prohibits the unauthorized disclosure, prejudicial use, or publication of classified information of the Government concerning communications intelligence activities, cryptologic activities, or the results thereof. It indicates that the President is authorized: (1) to designate agencies to engage in communications intelligence activities for the United States; (2) to classify cryptologic documents and information; and (3) to determine those persons who shall be given access to sensitive cryptologic documents and information. Further, this law defines the term "communication intelligence" to mean all procedures and methods used in the interception of communications and the obtaining of information from such communications by other than the intended recipients. After an intensive review by a panel of distinguished citizens, President Truman in 1952 acted to reorganize and strengthen communications intelligence activities. He issued in October 1952 a Presidential memorandum outlining in detail how communications intelligence activities were to be conducted, designated the Secretary of Defense to be his executive agent in these matters, directed the establishment of the NSA, and outlined the missions and functions to be performed by the NSA. ThB Secretary of Defense, pursuant to the congressional authority delegated to him in section 133 (d) of title 10 of the United States Code, acted to establish the National Security Agency. The section of the law cited provides that the Secretary may exercise any of these duties through persons or organizations of the Department of Defense. In 1962 a Special Subcommittee on Defense Agencies of the House Armed Services Committee concluded, after examining the circumstances leading to the creation of defense agencies, that the Secretary' of Defense had the legal authority to establish the National Security Agency. The President's constitutional and statutory authorities to obtain foreign intelligence through signals intelligence are implemented through National Security Council and Director of Central Intelligence Directives which govern the conduct of signals intelligence activities bv the executive branch of the Government. In 1959, the Congress enacted Public Law 86-36 which provides authority to enable the NSA as the principal agency of the Government responsible for signals intelligence activities, to furiction without the di.sclosure of information which would endanger the accomplishment of its functions. 8 In 1964 Public Law 88-290 was cnacted by the Congrcss to establish a personnel security system and proccdures governing persons employed by the NSA or granted access to its sensitive cryptologic informntion. Public Law 88-2DO also delegatcs authority to the Secretary of Defense to apply these personnel security procedures to employees and persons granted access to the National Security Agency's scnsitive information. This law undcrscores the concern of the Congress regarding the extreme importance of our signals intelligence enterprise and mandates that the Secretary of Defense, and the Director, National Securit~! Agency, take measures to achieve security for the activities of the NSA. Title 18 U.S.C. 2511 (3) provides as follows: Xothing containerl in this chapter of in S('ction no;; of the Communicationfl Af't of 1034, 47 U.S.C. HO;;. shall limit the constitutional power of the Pre.sident to take fluch meaSures as he deems neClc'ssar~' to protect the nation against actual or potential attack or other hostile actfl of a foreign power, to obtain foreign intelligence information deemed essential to the security of the United States, or to proted national security information against foreign intelligence activities. In United Stf}t('.~ v. B1'01Cn, F.S. Court of Appeals, Fifth Circuit, dccided August 22, ID73, the court discussed this provision of the law as fo11O\ys: The constitutional power of the l'r('sidellt is l1dH~rted to, although not conferred, by Congress in Title III of the Omnibus Crime Control and Safe Streets Act of 19H8. Thus, while NSA does not look upon section 2511 (3) as authority to roncIuct communications intelligencr, it is our posit.ion that nothing in chapter 119 of title 18 affects or governs t.he conduct of communications intelligence for the purpose of gat.hering foreign intelligence. Finally, for the past 22 years, Congress has annually appropriated funds for the operation of the XSA, following hearings before the .\l'lllcd Services and Appropriations Committees of both Houses of CongTcss in which extensive briefings of the XSA's signals intelligence mi:::sion have been condncted. "Te app('ar before hoth the House and the Senate Defense Appropriations Subcommitte('s to discuss and rcport on the U.S. si~)lutls intelligencc and commllllications security programs, and to justify the budgetary requirements associated with these programs. ,VI' (10 this in formal exccutive session, in which we diseuss our activities in "vlmtever detail required by the Congress. In considering the fiscal year ID76 total cryptologic budget now ho£ore Congress. I appeared before the Defense Subcommittee of the House Appropriations Committee on two separate occasions for approximately 7 hours. In addition, I provided follow-up response to OWl' 100 questions of the subcommittee members and staff. ,Ve also appeared before armed services subcommittees concerned with authorizing research, development, test and evaluation, construction and housing programs and also before the appropriations subcommittees on construction and housing. In addition to this testimony, congressional oversight is accomplished in other ways. Staff members of these subcommittees have periodically visited the Agency for detailed briefings on specific aspects of our operations. Members of the investigations staff of the House Appropria60ns Committee recently conducted an extensive in9 vestigation of this Agency. The results of this study, ":hich lasted over a year, have been provided to that committee in a detailed report. ~\nothe1' feature of coni!],l':-sional rpyip,," is that sinec If)!):; residl'nt rlllditors of the (3l'11e1'al ~\.eeountini! Ollier haY(, hc'l'11 acsi[!·!lrd at t}lf' "' gency to perfOl'lll on-site audits~ Ac1c1ition~1 GAO a11~litors were (']ear('(] for aecrS8 in Ini:1. awl 0.\0. in addition to this audit, is initiatini! a eJas:-ijiecl 1'evir,,- of OUl' automatic data Drocessin,Q," flilletions. XSA's coo]Wl'atiH' rffol'ts in this arra ,\"ere notrd by a Senator in February or this war. Tn nddition, rrsident awlitors of the Oftice of Seeret:u:y of Drf(~nsr. Comptroller, conduct inclrpth managenwnt. re"ic,,'s of 0111' on~anization. A particular a~prct of XSA authoritil's whieh is prrtinent to toclfty's diseussion relates to t11(' definition of foreig11 comnmnications. Neitlwr the Pr't'sidential <Jirrctive of 10:;2 nor the Xational Security COlJlwil (]irectiYe No.6 defines the tl'l'ltl forl'ign communications. 'rhe NS.A has always confined its activities to eomnmnications involving at ll'ast one fOl'l'ign terminal. This intl'rprehltion is consistent with the definition of foreign cOlmmmicatiol1s in the Commlll1iclltions Act of 1934·. There is also II directiYe of the Director of Central Intelligence dealing with se{'urity regulations "'hieh employs II definition which excludes commnnications hl't\\'l'('11 U.s. eitizPllS or entities. While this directive has not hcen ('onstruccl as defining the XSA mission in the same sense as has the Xational Security Council dirl'rtive, in the past this exclusion has usually \)l'l'1l applied and is applied now. However, we will describe a particular aetiyity in the past whl'n that exclusion has not applied. XSA does not now. an(l "'ith an exrpption to be described, has not in the past conducted inteJ'rept operations for the purpose of obtaining the communications of U.S. citizens. However, it necessarily occurs that some circuits which arc known to carry forei,lJl1 commnnications necessary for foreign intellig'cnec will also carry personal communications between U.S. citizens. one of whom is at a foreign location. The interception of commlmieations. however it may occur, is condlle1l'd in such a manner as to minimize the unwanted messages. Xcvertheless, many unwantl'd eomll1unications are potentially available for selection. Subsequent proressing, sorting. and selecting for analysis is conductl'd in accordance with strict procedures to insure immediate and, wherevrr possibll', automatic l't'jection of inappropriate messages. The analysis am] reporting is accomplished only for those messag'es "'hich meet sperified ('onditions and requirements for foreig'n intelligl'nee. It is reltainly belicyed by XSA that our communications intelligence aetiYities are soleIv for thl' pnrpose of obtaining foreign intelIi,2:ence in a('eordance with the authQrities delegated hy the Pr't'sident stemming from his constitutional power to conduct forl'ign intelligence. NSA produces signals intplligl'ncl' in response to objectives, requirrml'nts and priorities as expressl·d hy the Director of Central IntelligencH with the ad"ice of thl' U.s. Intelligence Board. There is a separate committee of the Roanl ,yhich dl'yl'lops thl' particular requirements against which the KSA is l'xpl'rted to respond. The principal medranism used by the Board in formulating requirements for signals intellig'ence information has been one of Jisting areas of intelligence interest and sppcifying in some detail the signals intel10 ligence needed by the various elements of Government. This listing, which was begun in 1966 and fully implemented in 1970, is intended to provide guidance to the Director of the National Security Agency, and to the Secretary of Defense~ for programing and operating NSA activities. It is intended as an expression of realistic and essential requirements for signals intelligence information. This p,ocess recognizes that a single listing, updated annually, needs to be supplemented with additional detail and time-sensitive factors, and it establishes a procedure whereby the USIB agencies can express directly to the NSA information needs which reasonably amplify requirements approved by USIB or higher authority. In addition, there are established procedures for non-Board members, the Secret Service, and the BNDD at the time in question~ to ask the NSA for information. The NSA does have operational discretion in responding to requirements, but we do not generate our own requirements for foreign intelligence. The Director, NSA is directed to be responsive to the requirements formulated by the Director of Central Intelligence. However, I clearly must not respond to any requirements which I feel are not proper. In 1975 the USIB signals intelligence requirements process was revised. Under the new system, all basic reqUIrements for signals intelligence information on U.S. Government agencies will be reviewed and validated by the Signals Intelligence Committee of USIB before being levied on the NSA. An exception is those requirements which are highly time-sensitive; they will continue to be passed simultaneously to us for action and to USIB for information. The new system will also attempt to prioritize signals intelligence requirements. The new requirements process is an improvement in that it creates a formal mechanism to record all requirements for signals intelligence information and to establish their relative priorities. Now to the subject which the commIttee asked me to address in some detail-the so-called watch list activity of 1967 to 1973. The use of lists of words, including individual names, subjects, locations, et cetera, has long been one of the methods used to sort out information of foreign intelligence value from that which is not of interest. In the past such lists have been referred to occasionally as watch lists, because the lists were used as an aid to watch for foreign activity of reportable intelligence interest. However, these lists generally did not contain names of U.S. citizens or organizations. The activity in question is one in which U.S. names were used systematically as a basis for selecting messages, including some between U.S. citizens, when one of the communicants was at a foreign location. The origin of such activity is unclear. During the early sixties, requesting- agencies had asked the NSA to look for reflections in international communications of certain U.S. citizens traveling to Cuba. Beginning in 1967, requesting agencies provided names of persons and organizations, some of whom were U.S. citizens, to the NSA in an effort to obtain information which was available in foreign communications asa by-product of our normal foreign intelligence mission. The purpose of the lists varied, but all possessed a common thread in which the NSA was requested to review information available through our usual intercept sources. The initial purpose was to help determine the existence of foreign influence on specified activities of 11 interest to agencies of the U.S. Government, with emphasis then on Presidential protection and on civil disturbances occurring throughout the Nation. Later, because of other developments, such as widespread national concern over such criminal activity as drug trafficking and acts of terrorism, both domestic and international, the emphasis came to include these areas. Thus, during this period, 1967-73, requirements for which lists were developed in four basic areas: international drug trafficking; Presidential protection; acts of terrorism; and possible foreign support or influence on civil disturbances. In the sixties there was Presidential concern voiced over the massive flow of drugs into our country from outside the United States. Early in President Nixon's administration, he instructed the CIA to pursue with vigor intelligence efforts to identify foreign sources of drugs and the foreign organizations and methods used to introduce illiCIt drugs into the United States. The BNDD, the Bureau of Narcotics and Dangerous Drugs, in 1970 asked the NSA to provide communications intelligence relevant to these foreign aspects, and BNDD provided watch lists with some U.S. names [exhibit 4J.1 International drug trafficking requirements were formally documented in usrn requirements in August 1971. As we all know, during this period there was also heightened concern by the country and the Secret Service over PresidentIal protection because of President Kennedy's assassination. After the Warren Report, requirements lists containing names of U.S. citizens and organizations were provided to NSA by the Secret Service in support of their efforts to protect the President and other senior offic cials. Such requirements were later incorporated into USIB documentation. At that time, intelligence derived from foreign communications was regarded as a valuable tool in support of Executive protection. About the same time as the concern over drugs, or shortly thereafter, there was a committee established by the President to combat international terrorism. This committee was supported by an interdepartmental working group with USIB representatives. Requirements to support this effort with communications intelligence were also incorporated into USIB documentation. Now let me put the watch list in perspective regarding its size and the numbers of names submitted by the various agencies: The BNDD submitted a watch list covering their requirements for intelligence on international narcotics trafficking. On September 8, 1972, President Nixon summarized the efforts of his administration against drug abuse. The President stated that he ordered the Central Intelligence Agency, early in his administration, to mobilize its full reso~rces to fight the international drug trade. The key priority, the PreSIdent noted, was to destroy the trafficking through law enforcement and intelligence efforts. The BNDD list contained the names of suspected drug traffickers. There were about 450 U.S. individuals and over 3,000 forei~ individuals. The Secret Servlce submitted watch lists covering their requirements for intelligence relating to Presidential and Executive protec- 1 See J). 151. 12 tion. Public Law aO-331 of .Tune G, 1aG8. made it mandatory for Federal agencies to assist the Secret Service in the performance of its protective duties. These lists contained names of persons and groups who, in the opinion of the Secret Service, ,,'ere potentiallv a threat to Secret Service protectees, as well as the names of the' protectees themselves. On these lists were about 180 D.S. individuals and groups and about 525 foreign individuals and groups. - An Army message of October 20, 1967, informed the ::\S~\. that ~\.rmy _-\.CSI, assistant chief of staff for intelligence, hm] been designated executive agent by DOD for ci"il disturbance matters and requested any available information on foreign influence OYeL or control of, ciyil disturbances in the U.S. [exhihit IV TIlE' Director, NSA, sent a cable the same day to the DCI and to each L81B melllbel' and notified them of the" urgent request from the Army and stated that the KSA \,ould attempt to obtain communications intelligence regarding foreign control or influence m-er celiain L.S. indiyiduals and groups [exhibit 2].2 The Brownell Committee, "'hose report led to the creation of XS.\, stated that communications intelligence should be prO\'ided to the Federal Bureau of Inyestigation because of the essential role of the Bureau in the national securitv. The FBI submitted watch lists covering their requirements on foreign ties and support to certain U.S. persons and groups. These lists contained names of "so-called" extremist persons and groups, individuals and groups active in civil disturbancrs, and tC'rrm'ists. The lists contained a maximum of about 1,000 U.S. persons find groups and about 1,700 foreign persons and groups. The DIA submitted a watch list covering thrir rrquirements on possible foreign control of. or influence on, U.S. antiwar aetivity. The list contained names of individnals trawling to Xorth Vietnam. Thrre '\"ere about 20 F.S. individnals on this list. DIA is responsible under DOD directives for satisfving the intelligence rrquirements of the major components of the DOD and to validate and assign to XS_\ requirrmrnts for intelligence reqnireJ by DOD components. Between 1067 and 197;~ there was a cllll1n1ative total of about 4;)0 F.8. nameS on the narcotics list, and about 1,200 U.S. names on all other lists combinc<1. ,Yhat that amounted to was that at the hcight of the watch list activitv, there were about 800 U.S. names on thr \nltch list and about one-third of these 800 were from tl1P narcotics list. ,Ye estimate that on~r this G-year period, 1967-H)7~. abont 2.000 reports were issued by the XSA on international narcotics trafficking, and about 1,900 reports were issued covering the three arC'as of terrorism. Executive protection and foreign influence over U.S. groups. This \vould a,-erage about two reports per da~v. These reports included some messages between 17.S. citizens with one foreign communicant. but over flO percent had at least one foreign communicant and all mrssages had at least one foreign trrminal. Usinp: agencies rlid f)(>riodicall:' re" iew, and \\rre asked bv the XSA to review. their watch lists to insure inappropriate or unnecessary entries were promptly remon>'1. I am not. the proper person to nsk concerning the ya]ne of the p1'o(lnet from these fonr special efforts. ,Ye nrc aware thnt a mnjorterrorist ] ~pp p. 14:1. 2 See p. 147. 13 act, in the "Gnited States ,YflS prcwntcd. In addition. some largr: (hllgshipments ,YE'Te pl'PYented fron1 entC'ring- the Cnitrrl States !wcallsl' of onr efforts on international narcotics trafficking". 'Ye han' stntt'll:l']lts from the requesting- agencies in ,Yhich they hft;'e t'xprcssed appn'ciation for the vaine of the information which they hacll'eceiy~·clfrom 1IS. Xonethclt'ss, in my own jndgment, the controls ,Yhich wrl'(' placcd on the handling' of the intelligcnce ,,,cre so l'cstricti"e that thc' value "'as si!rnificantlv diminished. 'Sow let 'me address the qnestion of the lratch Jist activit,v as the SSA saw it at the time. This activity was reviewed b~' proper anthority ,yj(h!n XSA and hy competent external anthority. This includecl two former ~\.ttol'lleys General and 11 former SecretarY of Defense. The reqnirenH'nts for infonimtion had been approye(l h:, ofticia Is of the nsing agencies and snbsequently yalidatecl b~' the "Gllited St:ltPS Intelligence Board. For example. the Secret Sen-icC' and BN"DD requirements ,\ere formally included in USIB guidance in 1a70 awl 1971, respectiYel~·. In the areas of narcotics trafficking. tC'rrorism and reqnirmnC'nts rplilted to the protection of the lires of senior U.S. officials. the emphasis placed by the President on a strong-, coordinated Clonrnrnent f'lfort was clearly understood. There also was no question thnt tlwrC' \vas COJlsiderable Presidential concern and interest in detr.rmining thC' 0xistence and extent of foreign support to groups fomenting ci\-il disturhances in the United States. From 1967 to 1969 the procedure for submitting names was more informal, with written requests following as the 11snaI prnetiee. Starting in 1969 the procedure was formalized and the Jlames tor watr'h lists were submitted through channels in \\Titing [exhibit ;\].1 TIll' DiredDr and Deputy Director of the NSA apprond certain catpg"orips of subject matter from cnstomer agencies. and werr a Wal'i~ tlw t r.s. in<'lividllals amI organizations were being inr1nded on wat":l lji'ts. 'Vhile they did not review and approve each indi"idual nnnw. j-]I1»),(~ were continuing management l"Cviews at levels b<,lo,,- thC' DitPdoratr. XSA personnel somC'times mnde analytic amplifications on ellstollH'r watch list submissions in order to fulfill certain reqniremrnts. For pxample, when information was l'ecC'ived that a name on the wnt('h list used an alias. the alias was inserted: or when an address was 1111('O\'('red of a watch list name, the address was inclnc1<'d. This 11l'Pc"! ir'(' b~T analysts was done to enhance the selection process. not to expalHl the lists. The information proon('C'cl by the watch list adivit:'l' ml.,. with one exception, rntirely 11 byproduct of our foreign intelligence mission. All collection was conducted against internationa1('ommunicntiollS with at least one terminal in a foreign country, and for purposes llnrplatpc1 to the watch list activity. That is. the communications werC' ohtainE'<l. for example, by monitori'ng communications to and from Hanoi. All commnnications had a foreign terminal and the fOl'eig'n tHminal or communicant, with the one exception to 00 described, was th(~ initial obiect of the communications collection. The watch list acti"ity specifically consisted of scanning- international communications already intercepted for other purposes to derive 1 See p_ 14()' 67-;)22-76-2 14 information which met ,Yutch list requirements. This scanning was accomplished by using the entries provided to NSA as selection criteria. Once selected. the messages were analyzed to ddermine if the information therein met those requesting age~cies' refluirpments associated 'with the watch lists. If the message met the requirernent, the information therein was reported to the requesting agency in writing. Now let me discuss for a moment the manner in which intelligence derived from the watch lists was handled. For the period 1967-69, international messages between U.S. citizens and organizations. selected on the basis of watch list entries and containing foreign intelligence, were issued for background nse only and were hand delivered to certain requesting agencies. If the U.S. citizen or organization was only one correspondent of the international communication. it was published as a normal product report but in a special series to limit distribution on a strict need-to-know basis. Starting in 1969, any messages that fell into the categories of Presidential/ executive protection and foreign influence over U.S. citizens and groups were treated in an even more restricted fashion. They were provided for background use only and hand delivered to requesting agencies. ,V"hen the requirements to supply intelligence regarding international drug trafficking in 1970 and international terrorism in 1971 were received, intelligence on these subjects was handled in a similar manner. This procedure continued until I terminated the activity in 1073. The one instance in which foreign messages were intercepted for specific watch list purposes was the collection of some telephone calls passed over international communications facilities between the United States and South America. The collection was conducted at the specific request of the BNDD to 'produce intelligence information on the methods and locations of foreign narcotics trafficking. In addition to our own intercept, CIA was asked by NSA to assist in this collection. NSA provided to CIA names of individuals from the international narcotics trafficking watch list. This col1ection by CIA lasted for approximately 6 months, from late 1972 to early 1973, when CIA stopped because of concern that the activity exceeded CIA statutory restrictions. When the watch list activity began, the NSA and others viewed the effort as an appropriate part of the foreign intelligence mission. The emphasis of the President that a concerted national effort was required to combat these grave problems was clearly expressed. The activity was known to higher authorities, kept quite secret, and restrictive controls were placed on the use of the intelligence. The agencies receiving the information were clearly instructed that the information could not be used for prosecutive or evidentiary purposes, and to our knowledge, it was not used for such purposes. . It is worth noting that some Government agencies receiving the information had dual functions. For instance, BNDD was concerned on the one hand with domestic drug law enforcement activities and on the other hand with the curtailing of international narcotics trafficking. It would be to the latter area of responsibility that the NSA delivered its intelligence. However, since the intelligence was being reported to some agencies which did have law enforcement responsibilities, there was growing 15 concern that the intelligence could be used for purposes other than foreign intelligence. To minimize this risk, the material was delivered only to designated offices in those agencies, and the material "was marked and protected in a special way to limit the number of people involved and to segregate it from information of broader interest. In 1973, concern about the ~"S.A.'s role in these activities was increased, first, by concerns that it might not be possible to distinguish definitely between the purpose for the intelligence gathering which NSA understood was served by these requirements, and the missions and functions of the departments or agencies receiving the information, and, second, that requirements from such agencies \vere growing, and finally, that new broad discovery procedures in court cases were coming into use which might lead to disclosure of sensitive intelligence sources and methods. The first action taken was the decision to terminate the activity in support of BNDD in the summer of 1973. This decision was made because of concern that it might not be possible to make a clear separation between the re.quests for information submitted by BNDD as it pertained to legitimate foreign intelligence requirements and the law-enforcement responsibility of BNDD. CIA had determined in 1973 that it could not support these requests of BNDD because of statutory restrictions on CIA. The NSA IS not subject to the same sort of restrictions as CIA, but a review of the matter led to a decision that certain aspects of our support should be discontinued, and in particular the watch-list activity was stopped. NSA did not retain any of the BNDD watch lists or product. It was destroyed in the fall of 1973, since there seemed no purpose or requirement to retain it. With regard to watch lists submitted by FBI, CIA, and Secret Service, these matters were discussed with the National Security Agency Counsel and Counsel for the Department o£ De£ense, and we stopped the distribution of information in the summer. of 1973. In September 1973, I sent a letter to each agency head req,uesting him to recertify the requirement with respect to the appropnateness of the request, including a review of that agency's legal authorities [exhibit 6J.1 Somewhat later, on October 1, 1973, Attorney General Richardson wrote me, indicating that he was concerned with respect to the propriety of requests £01' information concerning U.S. citizens which NSA had received from the FBI and Secret ServIce [exhibit 7].2 He wrote the following: Until I am able more carefully to assess the effect of Keith and other Supreme Court decisions concerning electronic surveillance upon your current practice of disseminating to the FBI and Secret Service information acquired by you through electronic devices pursuant to requests from the FBI and Secret Service, it is requested that you immediately curtail the further dissemination of such information to these agencies. He goes on to say: Of course, relevant information acquired by you in the routine pursuit of the collection of foreign intelligence may continue to be furnished to appropriate government agencies. 1 See p. 158. 2 See p. 160. 16 The overall re~l11t of these actions ,vas that 'n' stopped accepting: "-atch lists containing names of F.S. citizens and no inrormationis produced or dissemInated to other agencies using these methods fexhibit 8].1 Thus, the watch list activity which im-olvec1 U.S. citizens ceased operationally in the summer or 197:3 and was terminated oflicially in the fall of 197:3. ~,"s to the futnre, the .Attorney G'E'lleral's dirprtion is that ,ye may not accept any requirement based on the names or l~.S. citizens unless he has personally appl'owc1 such a l:equi~'ement; m~c1 no sncl~ appr?val has been O'ive]1. ~\.dc1itiona]]v, cllrectlyes nmv III effect III ntl'lOUS agrncies, Gle1uding XSA, ~;]so preclude the resumption of such activity. fThe full statement of Lt. Gen. Lew Allen, .II'. follows:] PREPARED STATDIE:\T OF LT. GES. LE"- ALLEX, JR., DIRECTOR, XATIOXAL SECt-TIITY .\GEXCY :\11' .Chairman :\1embers of the Committee, I recognize the important rpspon" ihility this Committee has to im-estig-ate the inteIligence operations of the l:nited States noyernment and to determine the need for improvement hy leg-islatiYe or other means. For several months, involving many thousands of lllanhonrs. the Xational Security Ag-ency has, I helieve. cooperated with thiK Committee to pr<lYille a thoroug-h information base, including data whose con· tinned secrecy is IllOKt important to our nation. I am now here to discusli in opli'n session certain aspects of an important and hithli'rto seC'l'li't operation of the U.S. Goyernment. I recognize that the Committee is deeply concerned that we protect senKitive and frap;ile source~ of information, I appreciate the care which this Committee and Staff have exercised to protect the sensitiYe data \ye have provided. I also understand that the Committee intends to restrict this open discussion to certain specified activitips llIHI to a,oid current foreig-n intelligence operations. It lllay not be possible to diK('U8S all theKe actiYitieK complete]~' without some risk of damage to con· tinuing foreig-n intelligence capabilities. Therefore, I may request some aspectl'! of our discussion he conducted in executive session where there can be opportunity to continuli' our full and frank disclosure to the Committee of all information required. The Committee may then deYelop an appropriate pnblic statement. 'Ve are therefore here, sir, at your request, prepared to cooperate in bring-ing theKe matters before your Committee. "'HAT I PROPOSE TO COYER In the interest of clarity and perspective, I shall first review the purpose of the Xational Security Agency and the authorities under which it operates. Xext. I wii! describe the proeeKs by which requirements for information are leyicd on XSA by other goyernment agencies. And finally, I will give a more specific description of an operation conducted in 1967-1973 by NSA in response t(} external requirements, which I will refer to as "the watch list activity." This :lctivity has lleen sul)ject to an intensive review by this Committee and Stuff in closed session. XS.',:S MISSION {'nder the authority of the President, the Secretary of Defense hal'! been delpgated responsibility for both providing security of U.S. governmental COIllmunications and seeking intelligence from foreign electrical communications. Both functionK are executed for the Secretary of Defense by the Director. Xational Securit~' .\gency, through a complex national system which includps tilt' Xational Seeurity Agency at its nudeus. It is appropriate for the Secretary of Defense to have these executive agent responsibilities, since the great majority of the effort to accomplish both of these missions is applied to the support of the military aspects of the national security. 'See p. 102. Tile Communications ~ecurity mission is l1irecteu at enhancing the security "f r .~. Government communications \vhenever neeueu to protect the (,omlllunil" atiolls from exploitation by foreign governments-a complex undertaking in today·s adn\llced electronic world. The Uuited ~tates, as part of its effort to produce foreign intelligence, has iutl'rcl'pted foreign colllmunications, analyzed, and in some cases decoded, t lies" communications to produce such foreign intelligence since the Revolutiollary War. During the Civil War and 'Vorld War I these communications \ven, often telegrams sent by wire. III modern times, with the advent of wireless communications, particular emphasis has been placed by the government on the specialized field of intercepting and analyzing communications transmitted by radio. Since the 1930's, elements of the military establishment have been assigned tasks to obtain intelligenc-e from foreign ;adio transmissions. In the months preceding Pearl Harbor awl throughout World "'ar II, highly successful accomplishments were made by groups in the Anny and the Navy to intercept and analyze Japanese and German coded radio messages. Admiral Nimitz is reported as rating its value in the Pacific to the eqUivalent of another whole fleet; General Handy is reported to have said that it shortened the war in }<Jurope by at least a ~'ear. According to another official report, in the victory in the Battle of Midway, it would have l)(~en impossible to ha\·e achieved the concentration of forces and the tactical :-;urprise \vithout communications intelligence. It also contributed to the success of Ow Xormalldy invasion. Both the Army and Navy obtained invaluable intl'lligence from the enciphered radio messages in both Europe and the Pacific. "\ Congressional committee, in its investigation of Pearl Harbor, stated that the :-;nccc'ss of communications intelligence "contributed enormously to the defeat of the enemy, greatlr shortened the war, and saved many thousands of lives." (;Pl1prnl George C. ~Iarshall, referring to similar activities during World 'Yar II, cOlnmented that ther had contributed "greatly to the victories and tremendously to the savings of American lives." Similar themes run through the writings of nUln~' u.s. military officers and policy officials from that period and subsequentl.\' in our more recent history. FollOWing "'orld 'Val' II, the separate military efforts were brought together and the J'\ational Security Agency was formed to focus the government's efforts. 'I'he purpose was to maintain and improve this :-;ou1'c(' of int('lIigence which was consider('d of vital importance to the natiDnal :-;('('llrity, to our ability to \vage \val', and to the conduct (if foreign affairs. This mission of XSA is directed to foreign intelligence, obtained from foreign {'ll'etrieal communications and also from other foreign signals such as radar". Si;:mals are intercE'pted by many tedllliques and processed, sorted and analyzed by ]lrocedurp~ which reject inappropriate or unnece~~ary signali'!. 'The foreign intplligl'nce (Jprived from these signals is then reported to various agencies of the ,govprnment in resp.onse to their approved requirements for foreign intelligence. Thp Xational Security Agency work~ very hard at this task, and is ('omposed of dedicated. patriotic citizens, civilian and military, most of whom l1llYP dedicated their professional careers to this important and rewarding joh. Thry are .iu~tifiably proud .of their service to their country and fully accept the fapt that th('ir contimlPd r('markablp efforts can bp appr('ciated only by those fp\\" in govC'l'Ill1lcnt who kno,," of their great importance to the 'U.S, :'\SA AUTHORITIES ('ong-ress, in 1933, recognized the importancfl of communications intelligence acth'ities and acted to protect the s('nsitive nature of the information deriv('d from those acthities by passing legislation that is now 18 U.S.C. 952. This statute prOhibits the divulging of the eonte-nts of decoded foreign diplomatic messao·es or information about them. ,., , J~nter, in 1950, Congress enacted 18 U.S.C. 798, which prohibits the unauthori7, Pd disclosure, prejudicial use, or publication of classified information of the l!?yernment concerning communications intelligence activities. cryptologic actiy. 1tIPs. or the results thereof. It indicates that the President is authorized: (1) To (lesilmate agencies to engage in communications intelligence activities for the rnitf>d ~tate~. (2) to elassify cryptologic documents and information, and (3) to (ll't('rminp thosp pergons who Ilhall be given accells to Il('nsitive cryptolodc 11or'nments I111d information. Fllrther, this In'iv defines the term "communication infpl!igence" to nwan all llrocedures and n,ethods used in the interception of 18 communications and the obtaining of information from such communications by other than the intended recipients. After an intensive review by a panel of distinguished citizens, President Tru~ man in 195:l acted to reorganize and strengthen communications intelligence activities. He issued in October 1952 a Presidential memorandum outlining in detail how communications intelligence activities were to be conducted, designated the Secretanr of Defense to be his executive agent in these matters, directed the establishment of the National Security Agency, and outlined the missions and functions to be performed by the National Security Agency. The Secretary of Defense, pursuant to the Congressional authority delegated him in Section 133(d) of Title 10 of the U.S. Code, acted to establish the National Security Agency. The section of the law cited provides that the Secretary may exercise any of these duties through persons or organizations of the Department of Defense. In 1962 a Special SUbcommittee on Defense Agencies of the House Armed Services Committee concluded. after examining the circumstances leading to the creation of defense agencies, that the Secretary of Defense had the legal authority to establish the National Security Agency. The President's constitutional and statutory authorities to obtain foreign intelligence through signals intelligence are implemented through National Security Council and Director of Central Intelligence directives which govern the conduct of signals intelligence activities by the Executive branch of the government. In 1959, the Congress enacted Puillic La\v 86-36 which provides authority to enable the ~ational Security Agency, as the principal agency of the government responsible for signals intelligence activities, to function without the disclosure of information which would endanger the accomplishment of its functions. In 1964 Public Law 88-290 was enacted by the Congress to establish a personnel security system and procedures governing persons employed by the ~ational Security Agency or granted access to its sensitive cryptologic information. PUblic Law 88-290 also delegates authority to the Secretary of Defense to ,apply these personnel security procedures to employees and persons granted access to the National Security Agency's sensitive information. This law underscores the concern of the Congress regarding the extreme importance of our sig-nals intelligence enterprise and mandates that the Secretary of Defense, and the Director, National Security Agency, take measures to achieve security for the ,activities of the National Security Agency. Title 18 U.S.C. 2511 (3) provides as follows: "Nothing contained in this chapter or in Section 605 of the Communications Act of 1934 (47 U.S.C. 605) shall limit the constitutional power of the President to take such measures as he deems necessary to protect the nation against actual or potential attack or other hostile acts of a foreign power, to obtain foreign intelligence information deemed essential to the security of the United States, or to protect national security information against foreign intelli,g'?llce activities..." In Unitctl States v. Brown, United States Court of Appeals, Fifth Circuit, decided 22 August 1973, the Court discussen this provision of the law as follows: "The constitutional power of the President is adverted to, although not conferred, by Congress in Title III of the Omnibus Crime Control and Safl' Streets Act of 1968." Thus, While NSA doel'; not lo()k upon Section 2511 (3) as authority to conduct communications intelligencr, it is our position that nothing in Chapter 119 of Title 18 affects or governs the conduct of communications intelligence for the purpose of gathering foreign intelligence. Finally, for the past 22 years, Cong-ress has annually appropriated funds for the operation of the National Security Agpncy, following hearings before the Armed Services and Appropriations Committees of both Houses of Congress in which extensive briefings of the National Security Agency's signals intelligence mission have been conducted. We appt'ar before both the House and the Senate Defense Appropriations Subcommittees to discuss and report on the U.S. signals intelligence and communications spcurity programs. and to justify the budgetary requirements associated with these programs. We do this in formal executive spssion. in which we discuss our activities in whatever detail required by the Congress. In considering the Fiscal Year '76 total cryptologic budget now before Congress, I appeared before the Defense Subcommittee of the House Appropriation!! Committee on two separate occasions for :lpproximately seven hours. In addition. I providNl foUow-up response to over one hundred questions of the Subcommittee 19 members and staff. We also appeared before Armed Services Subcommittees concerned with authorizing research, development, test and evaluation (RDT&E), construction and housing programs and also before the Appropriations Subcommittees on construction and housing. In addition to this testimony, Congressional oversig-ht is accomplished in other ways. Staff members of these subcommittees have periodically visited the Agency for detailed briefings on specific aspects of our operations. :Members of the investigations staff of the House Appropriations Committee recently conducted an extensive investigation of this Agenc~·. The results of this study, which lasted over a year, have been provided to that committee in a detailed report. Another feature of Congressional review is that since 1955 resident auditors of the General Accounting Office have been assigned at the Agency to perform on-site audits. Additional GAO auditors were cleared for access in 1973 and GAO. in addition to this audit, is initiating a classified review of our automatic data processing functions. NSA's cooperative efforts in this area were noted by a Senator in February of this year. In addition, resident auditors of the Office of Secretary of Defense, Comptroller, conduct in depth management reviews of our organization. A particular aspect of NSA authorities which is pertinent to today's discussion relates to the definition of foreign communications. Neither the Presidential Directive of 1952 nor the National Security Council Directive No. 6 defines the term foreign communications. The National Security Agency has always confined its activities to communications involving at least one foreign terminal. This interpretation is consistent with the definition of foreign communications in the Communications Act of 1934. There is also a Directive of the Director ot Central Intelligence dealing with security regulations which employs a definition which excludes communications between U.S. citizens or entities. While this Directive has not been construed as defining the NSA mission in the same sense as has the National Security Council Directive, in the past this exclusion has usually been applied and is applied now. IIowever, we will describe a particular activity in the past when that exclusion was not applied. NSA does not now, and with an exception to be described, has not in the past conducted intercept operations fol' the purpose of obtaining the communications of U.S. citizens. However, it necessarily occurs that some circuits which are known to carry foreign communications necessary for foreign intelligence will also carry personal communications between U.S. citizens, one of whom is at a foreign location. The interception of communications, however it may occur, is conducted in ~uch a manner as to minimize the unwanted messages. Nevertheless, many unwanted communications are potentially available for selection. Subsequent processing, sorting and selecting for analysis, is conducted in accordance with strict procedures to insure immediate and, where possible, automatic rejection of inappropriate messages. The analysis and reporting is accomplished only for those messages which meet specified conditions and requirements for foreign intelligence. It is certainly believed by NSA that our communications intelligence activities are solely for the purpose of obtaining foreign intelligence in accordance with the authorities delegated by the President stemming from his constitutional power to conduct foreign intelligence. OVERALL REQUIREMENTS ON NSA NSA produces signals intelligence in response to objectives, requirements, and priorities as expressed by the Director of Central Intelligence with the advice of the United States Intelligence Board. There is a separate committee of the Board which develops the particular requirements against which the National Security Agency is expected to respond. The principal mechanism used by the Board in formulating requirementi'l for signals intelligence information has been one of listing areas of intelligence interest and specifying in some detail the signals intelligence needed by the various elements of government. This listing which was begun in 1966 and fully implemented in 1970, is intended to provide guidance to the Director of the National Security Agency (and to the Secretary of Defense) for programming and operating National Security Agency activities. It is intended as an expression of realistic and essential requirements for signals intelligence information. This process recognizes that a single listing, updated annually needs to be supplemented with additional detail and time-sensitive factors and it estahlishes a procednre whereby the USIB agencies can express, directly to the National Se20 curity Agency, information needs which reasonably amplify requirements approved by L~IB or higher authority, In addition, there are established proce(/ urps for non-Board members (the Secret Service and the BXDD at the time) to task the Xational Security Agency for information, The Xational Security Agency does have operational discretion in responding to requirements but we do not g-enerate onr own requirements for foreign intelligence, 'rhe Director, XS.-\. is directed to be re~ponsive to the requirements formulated by the Director of ('E'nrral IntelligencE'. howE'ver, I clearly must not respond to any requirements wilil'h I feel are not proper. III 1H,;:; the LSIB signals intelligence rt'quirements process was revised. Under tlw nE'W syHem, all basic requirements for signals intelligence information on l:nited States Government agencies will be reviewed and validated by the Signals Intelligence Committee of USIB before being levied on the National Security Agrncy. An exception is those requirements which are highly time-sensitive; they will contiml(, to be passed simultaneously to us for action and to USIB for information. The new system will also attempt to prioritize signals intelligence re'1uiremt'nts. The new rt'quirements process is an improvement in that it creatt',; a formal mechanism to record all requirements for signals intelligence information awl to e~tablish their relative priorities. THE WATCH LIST Xow to the subject \.-1Iich the Committee asked me to address in some detailtill' so-called watch list acti.-ity of 1007-1973. 'l'h'C use of lists of words, including indh'idual names, snhjects, locations, etc, ha~ long heen one of the methods used to sort out information of foreign intelligenec value from that which is not of interest. In the past snch lists have been rpfpI'fed to oc-('asionall~- a:" "watch lists," lJecau:"e the lists were used as an aid to watch for foreign activity of reportable intelligence interest. However. these lists generally did not contain names of U.S. citizens or organizations. The actiYi(y in qut'stion is one in which U.S. names were used systematically as a hasis for splecting messages, including some between U.S. citizens when one of tlw communicants was at a foreign location. The origin of such activity is unclear. During the early '60's, requestin~ ageneies had asl,ed the l\ational Security Agency to look for reflections in international communications of certain U.S. citizens travelling to Cuba. Beginning in 19(1,. requesting agt'ncles provided names of persons and organizations (some of whom were FS. citizens) to the Xational Security Agency in an effort to obtain information which was available in foreign communiactions as a by-product of our normal foreign intelligence mission. The purpose of the lists varied, but all possessed a common thread in which the Kational Security Agency was refj\ JPsted to review information available through our usual intercept sources. The initial purpose was to help determine the existence of foreign influence on specified activities of interest to agencies of the U.S. Government, with emphasis on presidential protection and on civil disturbances occurring throughout the nation. Later. hecause of otht'r developments, such as widespread national can(' pm over snch criminal activity as drug trafficking and acts of terrorism, both (lon1Pstic und international, the emphasis came to include these areas. Thus, durin,!:!; this lJeriod. 196,-1973, requirements for watch lists were developed in four husic areas: international drug trafficking. Presidential protection, acts of terrorism, and possible foreign support or influence On civil disturbances. In the '60's, there was Presidential concern voiced over the massive flow of drugs into our countn- from outside the United States. Early in President Nixon's administration, he instructed the CIA to pursue with vigor, intelligence efforts to Wf'utify foreign sources of drugs and the foreign organizations and methods IIsed to introduce illicit drugs into the U.S. The BNDD in 1970 asked the Xational Security Agency to provide communications intelligence relevant to these foreign aspects and BNDD provided watch lists with some U.S. names. Internation:ll drug trufficking requirements were formally documented in USIB requirements in August 1971. As we ull know, during this period there was also heightened concern by the country and the Secret Service over Presidential protection because of President Kennedy's assassination. After the Warren Report, requirements lists containing names of U.S. citizens and organizations were provided to NSA by the Secret SelTice in support of their efforts to protect the President and other senior omduls. Such requirements were later incorporated into USIB documentation. .At 21 that time intellig'ence uerived frolll foreign cOlllmunications \yas reg<lrdeu as a valuable tool in support of executive protection. About the sallle time as the concern over urugs, or shortly thereafter, there was a committee established by the President to combat international terrorism. This committee was supported by a working group from the USIB. Requirements to support this effort with communications intelligence \vere also incorporated into USIB documentation. Now let me put tile "watch list" in perspective regarding its size and the nmnbel'S of names submitted by the various agencies: '1'he B)iDD submitted a "watch list" covering their requirements for intelligence on international narcotics trafficking. On September 8, 1972, President :'\ixon summarized the efforts of his administration against drug abuse. The President stated that he ordered the Central Intelligence Agency, early in his administration, to mobilize its full resources to fight the international drug trade. The key priority, the President noted, was to destroy the traffickingthrough law enforcement and intelligence efforts. The BXDD list contained names of suspected drug traffickers. There \vere about 450 U.S. individuals and over 3,000 foreign individuals. The Secret Service submitted ",,"atch lists" covering their requirements for intelligence relating to Presidential and Executive protection. Public Law 90331 of June 6, 1968, made it mandatory for Federal agencies to assist the Secret Service in the performance of its protective duties. These lists contained names of persons and groups who in the opinion of the Secret Service were potentially a threat to Secret Service protectces, as well as the names of the protectees themselves. On these lists were about 180 U.S. individuals and groups and avout 525 foreign individuals and groups. An Army message of 20 October 1967 informed the :'\ational Recurity Agenc~' that Army ACSI had been designated executive agent b~" DoD for civil disturbance matters and requested any available information on foreign influence o\'er, or control of, civil disturbances in the U.S. The Director, Xational Security Agency sent a cable the same day to the DCI and to each USIB member and notified them of the urgent request from the Army and stated that the National Security Agency would attempt to obtain CO:\IINT regarding foreign control or influence over certain U.S. individuals and groups. The Brownell Committee, whose report led to the creation of NSA, stated that communications intelligence should be provided to the Federal Bureau of Investigation because of the essential role of the Bureau in the national security. The FBI submitted "watch lists" covering their requirements on foreign ties and support to certain U.S. persons and groups. These lists contained names of "so-called" extremist persons and groups, individuals and groups active in civil disturbances, and terrorists. The lists contained a maximum of about 1,000 C.S. persons and groups and about 1,700 foreign persons and gTOUpS. The CIA submitted "watch lists" covering their requirements on international travel, foreign influence and foreign support of "so-called" U.S. extremistH and terrorists. Section 403(d) (3) of Title 50. U.S. Coue, provided that it was the duty of the Central Intelligence Agency to correlate and evaluate intelligence relating to the national security and to provide for the appropriate dissccniEation of such intelligence within the government using, where appropriate, existing agencies and facilities. TheHe lists contained about 30 U.S. indiyiduals and about 700 foreign individuals and gronps. The DIA submitted a "watch list" cm"ering their requirements on posHihleo foreign control of, or influence on, U.S. anti-war activity. The list containecl names of individuals traveling to Xorth Vietnam. There were ahout 2() CS. individuals on this list. DIA is responsible under DoD directives for satisf.'"in.~ the intelligence requirements of the maJor components of the DoD ami to validate and assign to :'\SA requirements for intelligence required by DoD components. Between 19G7 and 1973 there was a cumulative total of about 4:;0 U.S. nameH on the narcotics list. and about 1.200 U.S. nameH on all other liHtS combined. What that amounted to was that at the height of the watch liHt activity, there were about 800 U.S. names on the "\'latch list" and about one third of this 800 were from the narcotics list. We eHtimate that over this six year period (1967-1973) ahout 2,000 reports were iSi"ued by the National Security Agency on international narcotics trafficking, and about 1.900 reports were issued covering the three areas of terroriHm. executive protection and foreign infhwnce over U.S. groups. This would an'rfl.ge about two reports per day. These reports included some mes~ages between C.S. 22 citizenf'. but over 90o/c had at least one foreign communicant and all messages JJnd at least oue foreign terminal. rsing agf'ncips did periodically review (and were askpd by the :'\ational Security Agency to review) their "watch lists" to ensure inappropriate or unnecessary entries were promptly removed. I am not the proper l)erSOn to ask concerning the value of the product from these four special efforts. WI' are aware that a major terrorist act in the U.S. was prevented. In addition, some large drug shipments were prevented from entering the 1'.S. he('ause of our efforts on international narcotics trafficldng. We have statements from the requesting agencies in which they have expressed appreciatilm for the value of the information which they had received from us. Nonetheless. in my own judgment, the controls which were placed on the handling of th(' intelligence were so restrictive that the value was significantly diminished. Xow let me address the question of the "watch list" activity as the Xational Seenrity Agency saw it at the time. This activity was reviewed by proper authority within N'ational Security Agency and by competent external authority. This included two former Attorneys General and a former Secretary of Defense. The requirements for information had also been approved by officials of the using agencies and subsequently validated by the United States Intelligence Bonrd. For example, the Secret Seryice and BKDD requirements were formally included in usrB guidance in 1970 and 1971, respectively. In the areas of narcotics trafficking, terrorism, and requirements related to the protection of the lives of spnior V.S. officials, the emphasis placed by the President on a strong, coordinutpd go,ernlllent effort was clearly understood. There also was no question thnt t!JprC' was considerable Presidential concern and interest in determining' the existf'ncf? and extent of foreign snpport to groups fomenting civil disturbances in the Cnited States. From 1967~1969 the procedure for submitting names was more informal with written requests following as the usual practice. Starting in 1969 the procedure was formalized and the names for "watch lists" were submitted through ('hanuels in ,niting. The Director and Deputy Director of the National Security Agency approved certnin categories of subject matter from customer agencies, and were a,,-are that U.S. individuals and organizations were being included on ""'atch lists." 'While they did not review and approve each individual name, there were continuing management reviews at levels below the Directorate. Xational Security Agency personnel sometimes made analytic amplifications on customer "watch list" submissions in order to fulfill certain requirements. For example, when information was received that a name on the "watch list" used an alias, the alias was inserted; or when an address was uncovered of a "watch list" name, the address was included. This practice by analysts was donI' to enhance the selection process, not to expand the lists. The information produced by the "watch list" activity was, with one exception, entirely a by-product of our foreign intelligence mission. All collection was conducted against international communications with at least one terminal in a foreign country, and for purposes unrelated to the "watch list" activity. That is, the communications were obtained. for example, by monitoring communications to and from Hanoi. All communications had a foreign terminal and the foreign terminal or communicant (with the one exception) was the initial object of the communications collection. The "watch list" aetivity itself specifically cflJ1sisted of scanning international communications already intercepted for other purposes to derive information which met "watch list" requirements. This scanning was accomplished by using the entries provided to NSA as selection criteria. Once selected, the messages were analyzed to determine if the information therein lllet those requesting agencies' requirements associated with the "watch lists." If the message met the requirement, the information therein was reperted to the requesting agency in writing. Nflw let me discuss for a moment the manner in which intelligence derived from the ''\''atch lists" was handled. For the period 1967-1969, international me,sages between U.S. citizens and organizations, selected on the basis of "watch list" entries and containing foreign intelligence, were issued for background use only and were hand-delivered to certain requesting agencies. If the U.S. citiz(' n or organization was only one correspondent of the international communication, it was published as a normal prodnct report but in a special series to limit distrilmtion on a f'trict need-to-know basis. Stnrting in lD69, lllly messages that fell into the categories of Presidential! expcutive protection and foreign influence over U.S. citizens and groups were trf.'ll.ted in an e\'en more restricted faShion. They were provided for background 23 us~ only and hand-delivered to requesting agencies. When the requirements to supply intelligence regarding international drug trafficking in 1970 and international terrorism in 1971 were received, intelligence on these subjects was handled in a similar manner. This procedure continued until I terminated the activity in HJ73. The one instance in which foreign messages were intercepted for specific "watcll list" purposes was the collection of some telephone calls passed over international communications facilities between the United States and South America. The collection was conducted at the specific request of the BNDD to produce intelligence information on the methods and locations of foreign narcotics trafficking. In addition to our own intercept, CIA was asked by NSA to assist in this collection. XSA provided to CIA naInes of individuals from the international narcotics trafficking watch list. This collection by CIA lasted for approximately six months, from late 1972 to early 1973, when CIA stopped because of concern that the activity exceeded CIA statutory restrictions. When the ",yatch list" activity began, the Xational Security Agency and others viewed the effort as an appropriate part of the foreign intelligence mission. The emphasis of the President that a concerted national effort was required to combat these grave problems ,vas clearly expressed. The activity was known to higher authorities, kept quite secret, and restrictive controls were placed on the use of the intelligence. The agencies receivillg the information were clearly instructed that the information could not be used for prose~utiveor evidentiary purposes and to our knowil~dgeit was not used for such purposes. It is worth noting that some government agencies receiving the information had dual functions: for instance BNDD was concerned on the one hand with domestic drug law enforcement activities and on the other hand with the curtailing of international narcotics trafficking. It would be to the latter area of responsibility that the National Security Agency delivered its intelligence. However, since the intelligence was being reported to some agpncies which did have law enforcement responsibilities, there was growing concern that the intelligence could be used for purposes other than foreign intelligence. To minimize this risk, the material was deliypred only to designated offices in those agencies and the material was marked and protected in a special way to limit the number of people involved and to segregate it from information of broader interest. WATCH LIST ACTIVITIES AND TERMINATION THEREOF In 1973, concern about the National Security Agency's role in these activities was increased, first, by concerns that it might not be possible to distinguish definitely between the purpose for the intelligence gathering which NSA understood was served by these requirements, and the missions and functions of the departments or agencles receiving the information, and second, that requirementB from such agencies were growing. Finally, new broad discovery procedures in court cases were coming into use which might lead to disclosure of sensith-e intelligence sources and methods. The first action taken was the decision to terminate the activity in support of BNDD in the summer of 1973. This decision was made because of concern that it might not be possible to make a clear separation between the requests for information submitted by BNDD as it pertained to legitimate foreign intelligence requirements and the law enforcement responsibility of BNDD. CIA had determined in 1973 that it could not support these requests of BNDD because of statutory restrictions on CIA. The National Security Agency is not subject to the same sort of restrictions as CIA, but a review of the matter led to a decision that certain aspects of our support should be discontinued, in particular the watch li"t activity was stopped. ""SA did not retain any of the BNDD watch lists or product. It was destroyed in the fall of 1973 since there was no purpose or requirement to retain it. With regard to "watch lists" submitted by FBI, CIA and Secret Service. these matters were discussed with the National Security Agency Counsel and Counsel for the Department of Defense, and we stopped the distribution of information in the summer of 1973. In September 1973, I sent a letter to each agency head requesting him to recertify the requirement with respect to the appropriate. ness of the request including a review of that agency's legal authorities. On 1 October 1973, Attorney General Richardson wrote me indicating that he was concerned with respect to the propriety of requests for information concerning U.S. citizens which NSA had received from the FBI and Secret Service. He wrote the following: 24 "{'ntH I am ab{e more carefully to assess the effect of Keith and other Supreme Court decisions concerning electronic suneillance upon your current practice of disseminating to the FBI and Secret Service information acquired by you Through electronic de,ices pursuant to reques,ts from the .FBI and Seeret Sen·iee. it is requested that you !mmediately curtail the further disseminations of sll('h information to these agencies, Of course, rele,ant information acquired by you in the routine pursuit of the collection of foreign intelligence information may continue to be furnished to appropriate Government agencies ..." The overall resnlt of these actions was that we stopped accepting' "watch lists" containin~ names of U.S. citizens and no information is prodneed or dissemilll\tc(l to other agencies using these methods. Thus, the "watch list" activity which involled U.S. citizens ceased operationally in the summer of 1973, and was terminated officially in the fall of 1973. As to the future, the Attorney General's direction is that we may not accept any requirement based on the names of U.S, citizens unless he has personally approved such a requirement; and no such approval has been given. Additionally, directives now in effect in various agencies also preclude the resumption of such activity, General ALLEX. Sir, with your permission, I may make some COIlchIding remarks after the questions, if I may. The CHAlli::\IAX. Very good. Thank you very much for your initial statement. 'With respect to the legal questions that are raised by the vurious vlatch lists that you have described, I might say for the benefit of evervone concerned, that it is the committee's intention to call on the Attorney General in order that the questions regarding the possible illegality of these watch list operations, and also questions relating to the constitutional guarantees under the fourth amendment, can be taken up with the proper official of the Government-the Attorney General of the united States. "Ve would hope to have Attorney General Levi here to discuss the legal and constitutional implications of your statement at a later date, perhaps next week. So I woulcl hope that on that score, members would not press you too far since the propel' witness, I think, is the Attorney General. General ALLEX. Yes, sir. The CIIAIRMAX. Xow, Mr. Sclnvarz will commence the questions. )1r, SCHWARZ. )11'. Chairman, I would like to ask just two questions which lay a factual basis for the questioning of the Attorney General, ::md I hope that is not out-of-line in light of your comment. They arc not designed to have him discuss law, but to lava factual basis for a dialog next ,veek. . The CHAIR::\UX. '~ery "lYell. 'Ye will listen to your questions and tlH'll pass on them. )[r. SCHWARZ, Very well. General Allen, were any warrants obtained for any of the 'interceptions involving U.S. citi~ens which yon haTe recounted in vour statement? General ALLEX:XO. Mr. SCHWARZ. And the second question: you have stated that XSA does not, in fact, intercept communications which are wholly domestic. That is, communications between two domestic terminals, and that its interceptions are limited to wholly foreign, or second terminals, one of which is in the United States and one of which is outside. lYith respect to wholly domestic communications, is there any statute that prohibits your interception thereof, or is it merely a matter of your internal executive branch directives? General ..chI,EX. ::\IY understanding, ::\11'. Schwarz, is that-at least tho XSC intelligence' direeti\'e defines our activities as foreign COlllmunications, and "'0 have adopted a definition for foreign communications consistent with the Communications Act of 1934. And therefore, I think that is the-- ::\fr. SClnvARz. But vou believe YOU are consistent "ith the statutes, hut there is not any st~ltute that p'rohibits your interception of domestie communication. General..c\.LIJEX. I believe that is correct. ::\£1'. SCIIWc\RZ. I have nothing further, ::\fr. Chairman. The CIHIR~IAX. .Just so I may understand your last answer, Genend, so that the definition of foreign intelligence is essentially one that has been given you by an executive directive from the XSC, and is not baseclupon a statutory definition. General ALLEN. Yes, sir. The CHAm~IAN. Very well. 'Ve are going to change our procedures t()(lay to gin> the Spnators at the pnd of the table ,vho are usually the last 'to ask questions, and sometimes have to wait a good length of time. instead of moving from the chairman outward. This I must say, lws the con:;ent of our vice chairman. Senator TO\Yer-so we will move to the. ends of the table first, and tlult means our first Senator to question is Senator Hart. Senator Ibm' of Colorado. Thank vou, ::\Ir. Chairman. General.Allen, there are two bro(1c1 areas that this committee is concerned about in terms of legislative recommendations. One is congressional oversight, and the other is the issue of command and control. And it is in these two areas that I would like to ask a couple of questions. First of all. you went to some lengths in your statement to talk about the history of NSA's briefing of Congress and various congressional committees. In that history. was there any occasion when officials of tlw XSA briefed members of Congress about the watch list activities '? General ALLEN. Sir, I honestly don't know about that, prior to my coming on in the summer of 1973. And the reason for that is that the testimony is in executive session-and there are conversations, and I really don:t know whether prerious Directors discussed it with Congress or not. I would say that I have no evidence that they did. Senator HART of Colorado. That thev did or did not? General ALLEN. I would say that I have no evidence that previous Directors discussed the watch list matters with Congress prior to the summer of 1973 when I came on board. Since I went on board, there have been a number of occasions where this has been discussed with various elements of Congress which, to a certain degree, began early in 1974 with the investigations of the House Appropriations Committee investigating team. ~enator HART of Colorado. With what degree of specificity did you b.l'Jef ele.ments as you say, of Congress about the watch list activitJes? 'VIth the same degree of specificity that is contained in your statement today-the numbers of names and so forth? ' General ALLE~. The investigation that I refer to by the Appropriations Committee investigative team did go into the nlatter in substantially more detail than we have described today. There were a number of pages in their report that \\e related to that.. 26 I would suspect that other briefings probably were of less detailwell, no, I would say the briefing before Mr. Pike's committee ,,-as in more detail, discussed today, in closed session. Senator HART of Colorado. For the purposes of our record today, did yon conduct some historical review, whether, prior to your assumption of the Directorship, such briefings on watch list activities took place? General ALLEN. "'Yell, to the extent that we're able to conduct those activities, we have. And we have no evidence that they did take place. Excuse me, I have just been pointed out an exception to that, and that is, Mr. Nedzi was briefed on the-at a previous time on the general subject of how tIlese kinds of communications are handled. And I presume that he was given a fairly thorough insight into this. Senator HART of Colorado. Do yon know when that was? General ALLEN. vVe will find that ont, sir.1 Senator HART of Colorado. The same question applies to the other program which we have under consideration here today, and over which there is some dispute. Could you tell us whether Congress, or any elements of Congress, were briefed on that program? General ALLEN. I do not know. I do not know that they were. Senator HART of Colorado. If yon could find out and let us know, I think we would appreciate it. The second broad area is the area of command and control: Who is in charge here? Who gives the orders? How high up are the officials who know what is going on? In this connection, it is my understanding that officials presently at NSA have testified, or given us information, that your predecessor, Admiral Gayler, and the former Deputy Director, Dr. Tordella, were completely aware of the watch list program, and their sworn testimony in the case of each or both of them is that they were not aware of thIS, or only became aware of it sometime aIter they assumed their positions. Could you give us a definitive answer as to whether both Admiral Gayler or Dr. Tordella knew about the watch list activities? General ALLEN. I am certain they did, sir. And I think the testimony you refer to must be misinterpreted in some way, because clearly, Admiral Gayler and Dr. Torclella knew, and have testified-I think, perhaps. sir, you may be referring to a question that did arise in our more complete closed discussions with the staff in which there was a question as to whether these analytic amplifications which NSA made to the lists-that is, where names were added by NSA people to enhance the selection process of the requirement already specifiedwhether those were approved by the proper command structure within NSA. And there has been a little bit of uncertainty about that. It is fairly clear to me in my research that there was an appropriate Directorship, Deputy Director review of those procedures. It has been a little unclear as to whether each name was approved, and so on. Senator HART of Colorado. In that connection, Admiral Gayler was asked" "Did people tell you the list included names of U.S. citizens or other entities?" and then came a rather long answer which includes 1 In II Nov. 6, 1975, letter from David D. Lowman, Special Assistant to the Director, XSA, the select oommittee was informed thllt the date of the briefing referred to above waH Jan. 10. 1975. 27 the following statement: "This particular subject didn't come to my attention until about the time this domestic problem was surfaced by the President." The staff then asked, more specifically, when that "as, and he said, "I became aware of that, I guess it was a year or so after I got there." So Admiral Gayler does not suggest that he was briefed on the existence of watch list activities until perhaps more than a year after he assumed the Directorship. Do you know why that would be? General ALLEN. No, sir, I don't. I was not aware of that aspect of hi" testimony. I do know, for example, of information that has been made available to the committee, that he was aware, and made fully aware, in 1971, early 1971 [exhibit 5].1 Your time refers, actually, to before that. Senator HART of Colorado. When did he assume the Directorship? In 19691 General ALLEN. Yes; it must have been 1969. Yes, sir. Senator HART of Colorado. So a period of time passed in ",hich the Director of NSA apparently did not know that this activity was going on. We find that extraordinary. You have stated that NSA officials or personnel were placing names on the list. There seems to be some dispute about that also. Admiral Gayler and Dr. Tordella both deny that they knew that NSA waS putting names on the list, yet, I think the suggestion here is that this was knowledge that the Director and the Deputy Director didn't know about. Is that the case? General ALLEN. 'Well, we have clearly had a conflict in people's recollections in that period of time. It is the clear recollection-and there certainly are some internal memorandums that reflect-that the procedures by which amplifications are made to lists were explained to the Director and Deputy Director at the time, and that they were aware of them. It apparently is also true that in the period of time when they gaye testimony. they didn't recall that particular briefing. . Senator HART of Colorado. 'VeIl your testimony here this mormng is a little confusing also. In your statement you say, we do not generate our own requirements for foreign intelligence, and yet the indication is that the staff or officials of NSA, do, or had in the past, added names out of the Office of Security, and so forth. General ALLEN. I'm sorry, sir, that is another question. That does not actually relate to foreign intelligence. I believe it is not the subject of discussion today. , The question of adding names that relate to the amplifications in tIlE' foreign intelligence field waS in no case a matter of adding anythiniZ new to the list. It was a matter of adding aliases, it was a matter of adding addresses in some cases where an organization had been specified, and it would assist picking np messages of that organization, the names of officials of the organization were added to enhance the selection process. Senator HART of Colorado. But it is "your testimonv that out of the NSA itself there was no generation of ii.ew names or organizations ~ 1 See p. 156. 28 General ALI.EX. That is correct,! :-:\enator H\P.T of Colorado. In connection 'w'ith the role of the Intelligence Board, YOU indicate in your statement that the U.S. IntelIig'ence Board 'r~yiewed these a'ctiyities and was kept cognizant of them. ,Ve luwe te:"timony~statements before this committee by people inyolnd in the Board's actiyities in the past, that the Board itself, in being' apprised that watch list actirities were going on was not a,yare of the bct that communications of 'C.S. citizens were being monitored. Is that the case. or not? GeneralALLEx. "~ell the difficultv that we haye here. sir. as I understand it, is there is no record that 'the U.S, Intelligence Board in its sc:'sions ever considered or had this information presented to them. The circumstances are that the requirements process of the U.S. Intellip:<' llce Board, which is directed toward substantiye requirements, did include in it yarious subject statements~that is, that related to these particular subjects. And on occasion, included such subjects as in satisfying the watch list individuals prodded by whatenr agency it was. So those things are in the U.S. Intelligence Board guidelines, It could he only presumed that U.S. Intelligence Board, which consists of membership of the requesting organizations, knew that the lists they were directing to us to follow were lists which their agency was preparing aIHl did contain some U.S. names. Senator HART of Colorado. And therefore, it is your testimony, or is it not, that the intelligence board knew that so-called civil disturbance names were beiug included on this list? General ALLEX. "~ell, the U.S. Intelligence Board certainly knew that, because my predecessor, General Carter, made it a yery specific point to notify them immediately upon getting what he considered to be the first request in this area. And that was his purpooo for doing that. Senator HART of Colorado. Including the civil di.sturbance names? General ALLEX. ,VeIl. yes, sir. His message is here in the record [exhibit 2J 2, but it states that he is being asked to respond to this requirement and to seek intelligence regarding foreign influence on certain organizations. Senator lim!' of Colorado. One final question, General. In connection with the Huston plan, one recommendation of that group was that communications intelligence capabilities should be hroadened and that the President was requested to authorize broadening of those rapabilities. To your kno\';ledge, did President Nixon know about the extent of this ,,,atch list? General ALLEX. To my personal knmvleclge? Senator HART of Colorado.1Vell, to your knowledge as Director. General AI,LEX. No. I have no such knowledge one way or another as to President Nixon's personal knowledge. 1 .\fter reviewing- a transcript of this testimony. NSA advised the committee that 50 to 7:) !l:lIllPS wprp IHlfled in its "amplification" of watch lists, and that this "was usually done pitllPr hy a(](ling the name of all eXE'cutl've officer of an organization, or by addin~ the organi," tinn name assodated with It person who was placed on the watch list by another agency." (Letter from David D. Lowman, Special Assistant to the Director, NSA, to the select commi1- tf'p, ~T()V. fl, 1975.) 'Srep.14', 29 Senator H.\I:T of Colorntlo. So YOl!o 01' pel'haps ::\11'. Buffham, can't account for the fact that the President was being asked to broaden a ea pn bility that he di(lnot knO\v existed in the first place? Grneral J.. LU:X. ,Yell. YOll aske(l me what I thought President Nixon knew. . C Sen:ltor II.\RT of Colorado. Yes. General .\LLEX.•\nd I say I really don't knO'v. There is some cyi( kncf' as to what :JIr. IIust;-m thou~ht because we have the various things whidl he 'Hote, and the docu;llents that he prepared. :Mr. Huston IlppareEtl," bf'lien>d that this activity which he knew of, and which II(> had seen the output of. "'as being condueted in a very restrictive and minimal mllllllel'-\vhieh ,vas true-and that it would be of value to those r"'qi:1('li\s ,v1lieh thr Pr('sidrnt hall on his minrl if it were expanded. And he also recognized that thr XS.\ would not respond to that kind 'Of a l'Nplest for expansion or broadening of this actiyit~· \\'ithont 'i("!.y deal' and slwcific Presidential (lirection to do so. So it is J1l v llmlel'st:wding that :JIr-. Huston was making such a recommendation. and of t'(lUrS~~ it (lid not C0111e to pass. . SPllatw H.\1tT of Colorado. That is all. ~Ir. Chairman. Than1c von. The CJi'\'I:'>L\x. Thank you. Senator Hart. Senator' ~('h\\"eiker? . Spn:,toI' Sf' f j WElK]':!:. Thank vou. ~Ir. Chairman. Ge11rr:1] ).1k11. who \\,(,l'e the hvo Attornevs General and the Secretary of Def('n,;e \yho approved this activity? . Gelleral Auxx. Our statrment said they rC\'iewed the activity. Senator SCIIWElKER. Reviewed it? . • Grnrral ALLEN. Yes. sir. ,Ye have documentation anlilable in looking- back at am records of this. that Admiral Gayler reviewed this actiyih" in detail 'Yith :JIr. Laird. Mr. Klpinc1ienst:and Mr. :Mitchell. on a c()uplr of occasions, one very clear one relating to }[r. Laird and ~Ir. Mitchell. ..:\.ppronl is an fmln'lard-it is not fair to those people in the f'ense that the memo for record sho,,"s that he discllssed it with them in S0me detail. that there was agreemrnt as to the procedurrs that ,wr('- to be folJO\vrd. and that hI' then submitted a memorandum back to thl'lll saying this is what \ve discllssed and this is thr procedure 'It' followerl. Srnator SCflWEIKEJ:. That is Admiral G:1vl(>r rcview(>d it with himwith thrTI1. I should sav? . GellC'raL\LLEx. Yes. sir. Sf'nntor Scrnnmom. _\nd then. just, a moment ago. we heard thrrr ,vas some discrepanry as to whether Admiral Gayler Ime\\' about the \vatch list himf'clf. GellPml Ar.u:x. ,YrU sir. that was at the time-apparently Admiral Gavler's lW'ol1edion had to do "ith a veal' or so afterward. I belirYE'o as ,ve look back at the records, it is pi'obably trne that that was not quite so long- as a year. Senator ~CHWETKER. General Allrn. in the course of intercepting intrrnational communications. does the NSA accidentally or incidentally intercept communicatiOlls between two American citizrns if one of thrm happens to be abroad? GrnrraI ~\.LLEX. Yrs, sir. 67-3~2-7G--3 30 Senator SCIIWEIKER. And what procedures. and what do you do after you intercept a message bebn~en two Amrl'ican citizens, either in terms of what YOU feel the law is or what your direchves arc? General ALLEX. The dil'echves are tl~at we do not do anything to those communications. and we reject it as early-reject such communications as early in the process as it is possible for us to do. For example, if by tuning the receiver, it is possible to reject them, that is what one does. It it turns out to be somewhat later in the process, one does it then. But the rules are clear, and that is that one rejects those messages as quickly in the selection process and as automahcally as it is physically possible to do. Senator SCIIWEIKER. Is there any Ilnv that you feel prohibits you from intercepting messages between Amrrican citizens if one is at a foreign terminal and the other is at a domestic terminal, or do you frr1tlw!'e is no law that covers this situahon ? General ALLEX. No, I do not believe there is a law that specifically does that. The judgment with regard to that is an interpretation. Senntor SOIWEIKER. General Allen, in a few words, what was Project MINARET? ,Vould you just describe. just briefly, what the objectin's of Proiect :\UXARET was? General ALLEX. ,Vell, sir, that was the project we have 1Wf'll talking aIJout. That '\"as a code word used for it during part of the time ,,'e described. Senator SCHWEIKER. Relating to the individuals, organizatiolls involved in civil disturbances, antiwar mon'ments. demonstrations. and things such as that: is that correct? General ALLEX. Yes, sir. :MINARET is n term thnt begnn in 1969. nndns we described somewhnt formali:>:ed the process hy which these messages ,\Ore handled, which had brgnn nppnrently about Hl67 [rxhibit 3].1 Senator SCHWEIKER. Now, in the initial communication on :\UXARET, is it true that one of thf' equall~' important aspects of :\UXARET was not to disclose that NSA ,vas doing this ? General ALLEX. That appears in the documentation regarding it. Yes. sir. Senator SClTWEIKER. And what ,,'as the rl'nson for not disclosing to the other intelligence agencies-because this information only 'wnt to other intelligence agencies-what ,,'as thr reason for not disrlosing to the other intel1igence agencies, who ,wre the consumers. that NSA was doing this? ~ (irnenll ALLEx. It is hard for me to 1'rall" nnf)'.wr it. becallse I am not l'xnetly sure as to what was the feeling ~f thl' people nt the timl'. 2\[y understanding is that the concrI'll was thrrt th0 peonlr at NSA felt it ,ns terribly important that the artiyit~, he solel~' reln.ted to foreign intelligence, and that bv c1eliyering these kinds of message'S to an Ilgency ,vhieh also hnd a law enforcement fmlC'tion, there wns n danger tllllt the material would end up being' used for n purpose which would. not he appropriate. Therefore. for that n'[\son then' were a srt of proc0clnrrs arlopted which made the materirrl be hancl1rcl in a (listincti"r nml srparate way to where it went to only specifird indiyidnals, only hand-carried, clearly marked "For Background Use Only;" also de- 1 See p. 149. 31 void of the kind of de3ignators that are placed on the kind of intelligence information which NSA produces for a broader range of users. :Senator SCHWElEER. Might there have been some cancel'll that this was a questionable legal area and that therefore dissemination of who was doing it and how they were doing it might also h:1\'e been injurious to the Agency? General ALLEN. It is possible. I think that of course the concern was that if the material was-the basic concern is, I imagine it was in people's minds at that time, was that if the material were used for some purpose associated with prosecutive or evidentiary bftsis. that the sources and methods which were used to obtain that intelligence would then be vulnerable to disclosure or demands by courts to see it; so there was a very great concern to insure that this material was handled in such a ,,-ay as to minimize the possibility that it ,,'auld be used in that fashion. Senator SCHWEIKER. "Yould it be possible-granted this is not your policy, and that you state you have not done this-,Yould it be possible to use this information and apparatus that you lwY(>, to monitor domestic conversations within the United States if some person 'Yith ma1intent desired to do it? Kat that you have done it, not that you intend to do, not that you don't have a prohibition about it; I am just asking you about capacity or capability. General ALLEN. I don't think I really knmy how to answer theqnestion. I suppose that such a thing is technically possiblr. It is c1rarly in yioIation of direetiyes procedures ,yhich are rstabJished throughout the entire structure and ,yhich are monitored with grrat care. Senator SCIlWEIKER. And it has not been done by your agency, is that correct? General ALLEX. Yes. sir. Senator SCIIWEIKER. The names that were pnt on the watch list could have been sent in by anyone of almost, I guess, a dozen security agencies or intelligence agencies. Did yon haw any criteria as to whether you accepted their names or not? In other words, suppose the FBI put names on a list; did you reject any of their names, or did you just accept that as the input and the recommendation or the suggestion from the FBI, for example? General ALLEn. It is my understanding, in going back and discussing how that process worked at that time, that there were, in at least two cases, discussions about substantial increases to names for a couple of different problems. These problems looked to the people at NSA as though they were in the law enforcement area, and therefore these agencies were told not to submit those kincls of names, and they were not so submitted. So, there was that kind of a review made, at least in some cases. In general it is true that the agencies did submit names and XSA accepted them based on the assurance of senior officials at those agencies that that was an appropriate thing to do. Senator SCIIWEIKER. Sa, it is KSA's basic position that the responsibility as to determining what criteria was used for putting names on the list, with the exceptions you have noted in terms of specifics, was basically the responsibility of the originating agencies, is that COlTect ? General ALLEN. Yes, sir. You will note in the record that when I arrived at NSA, one of the first things that I did 1-yas to contact each 32 i)f tll(' agency heads and l'Cfluest them to rppxamillc cxactly that point, ~lId to reassure 111(' that thev had reTicwecl these namcs on the list and that their requests for information ,,'ere appropriate within their statntol',\" and CXl'('lIti n' alIthorities, That. of course. ended up with having the cfred of t('!'minating the prOgram. But thc view that ,,'c had was that that l'l'sponsibility was one held by the rcquesting agPIl('Y . . Sen'ator SCHWEIKEH. Do yon think that the responsibility should rest with each agency ~ I am thinking of prospective legislation. "Where do yon think that l't'sj)()llsibility should lie as to who makes demands ()n your agency at this point for thc future? ShaH we forget the past? (}l'ncl'al ALLEX. ~'·l'lI. for tljf' futnl'l'. Wl' certainlv lu1\'C directiw's now ,,,hich prohibit this kind of activity in the futllre. and those are internal XSA dil'pctin's which I have issued. There are also, I under- stand. similar direetivrs at the requesting agencies. I believe that it has to be a responsibilit~, of both~ and I think the question of oversight was in the r:wcntin' branch is one that is appropriate for the €xeeutiw'. Senator SClnn:IKEH. Yes. And vet. Mr. Huston wrote a memo that ,ye referred to a Illomrllt ago~ wl{ere'the memo indicated, at least as far' as the memo ,ms concerned. he wasnl e,-en aware that the kind of aeti\'ity we are talking abont was going on. This was u memo to Hahlemull, to the whole '\'hite House struetm'p~ aIHI unless somebodY was misleading people in terms of writing a falsp mpTnO. or badly informed. the meIHo ,,"cnt out implying that none of this activity really was ]wing conducted now. Is that not corrpct? (~rl1Pral ALLE::-;-. Xo. sir. that is not conect. Senator SCInVF.IKEH. The Huston memo didn"t sav that vou nee(led more authority to (10 ,dwt you were doing? .. General AI-LEX. The Huston memo, according to my recollection, "il'. said that tIll' XS~\ was providing some intelligence pertinent to this problem at the prrsrnt time in accordance ,vith very restrictive and in a minimal ,yay. and that in order to do more of it, presumably ill accordance with the Presidenfs desires. thev would have to receive acl!litional instructions in order to do that. • Scnator SCIIWElKEJ:. Yet, the watch list was going on in full blast at the time with an~- agrncy having a right to put in any nume that tlll'v ,ytwtN!. I IUl\'l' trouble reconciling that. General ALLEX. ,Yell. Number on<:', sir, I am not sure what yon mean by "full blast." The program I rlcscribed was in process. Agencies ,ycre. I trust. constrain!'!l in their plaring namps on it. and NSA at least cXPl'cisrcl some constraints in their arc<:'pting of names. There 'vas It great dcnl of constraint in the manner in which the information was 1uHldlecl. There were also no activities undertaken by NSA, with the one exception ,ve noted, to obtain these communications~only to selrct them. And. it was to these issues. I think, that Mr. Huston was probably reTening when he said he thought there should be an expansion. Senator Scmncuu:R. One final question, General. You testified that in 1973, the CIA decided to discontinue certain activities because those activities might be in violation or the CIA's statutorY charter. Kow. XSA has no such charter. and wi. I think obviously you. too~ are concerned about the aetil'ities or the past. 33 Shouldn~t ,yp han a dun/PI' for XS~\, alHl ~houldn't ,ye write into ]aw some thin:,!s that won't be misconstrnrll 01' misunderstood or mi!!ht he abl1~ecl in the fntme? Shouldn't XSA haye a charter like t h~CIA does ~ General AU,Ex. 'YelL sil'~ I really must Iran that judgmrnt up to the Congress. It is certainly den!' now that the dil'Pctives rehlting to foreign intE']]igence~ and that the interprE'tatiolls of fOI'E'ign communications as they are appropriate at this tinw~ are both clear in executi\'c <lil'E'etiws, and are enfol'crd. Srnator SCInn:IKER. Thank vou, )1r. Ch:1irman. The CIL\m'L\X. Thank vou \~erv'much, Senator Schweiker. Senator l\fOI'!!an is next: ' Scnato!' )IOIl(;AX. GE'neral ~\llen, I noticed ill ~'onr testimony that vou said betwern t]l(' wars 10(;7 and 107:1 vou ha<] at most about 4iJO iwmes on the watch jist for the purpose of watching for narcotics. Is that correct? General ALLEX. Yes, sir, I beliew so. Srnato!' )[OR(;.\X. ~\nd about 1.200 other namE'S alto!!ether. C~rneral Au.Ex. Yrs, sir.' ~. Senator MOIw.\x. So clming that period of timr of about 6 years you had about 1,6;50 names on the watch list. (ieneral ALLEX. Yes, sir. Senator )[ORGAX. And I belieY(' vou said-Grnel'al ALLEX. U.S. names, sir: Spnator )[ORGAX. r.s. names, that is right. ~\Jl(1 that the most that vou had at anv one time ,,'as about 800 names. . GrnrraJ Jhi.EX. Yes, sir. Srnatol' )fORG.\X. Xow all of thesp names, Ol' r.s. names, were names that had brrn inyo]n·d in cOImmmications betwrrn a foreign station and ritlwr this ('ountl'~' 01' some other foreign station. Genrral AU,EX. 'Yell, thr reports which were generated as a result of those names fit that description~yes, sir. Sc>natol' ~fORG.\X. That is right. And you \',Cl'e' '''atching, of courseyou Jlnt thosr l:an1PS on. ~-on tpstine(1. for l1111ny Dnrposes; one. in an rffol't to stem the narcotics traffic. Is that one of the reasons? General.\u.r:x. Yes. sir. Senator ~IonG.\x ..\]](1 T br1irn' YOll trstifiN] pa rlirr that somr ]al'!!e shipments of narcotics "'el'r identified throngh this watch list :lIld wrJ'P pren'ntpd from coming' into this country. General ALLEX. That is my lInderstanding. ~-es. ,ir. Senator )IoRG\x. 'Yrl1. that y,'as yonI' t(',timonv and your bcst information. was it notf. ' " Grneral ALLEX, Yrs. sir. Senator )IoRGAx. You testifiE'd also that on One occasion an ns,sassination attrmpt on a promiJ1l'nt r.s. fignre abroar] was identified and pl'ennted by the use of this watch list. Is that col'lwt? Genrral Au.Ex. Sir. T ,youM han to srt the }'('('oI'11 straight. 'Vr did identify that in an ral'lirl' nl'sion. In l'eYie,,,ing' that particular itrm, there is some question in our mind as to wllPthcr the actual watch list procedures that wr described here werr the reason for srll,cting out thr message that made' that n~,·elation. So, in un attempt to br completelY fnir. I ,Yonld like to not say that ,''us a rf'snlt of the 'mtelt list.' . . 34 Spnator ~IoHG,\x. It did come from a nwssage though that you intprceptccl. General ,\LLEX. Yes. sil'o SenatOl' ~r()RG,\X. Yon gave llS another example as a yalne of this seni('c. a notitlcaJion to the FBI of a major foreign terrorist act that "',1'0; p1a;mrcl in a Jarg'e cit:" in this conntry, ,dlich action ,,'as prevented because of iJlfol'l~1f.tionvon recein~d? (;en(,1'[\l ,\LLEX. Yes. ·sir. Sr;,r.tor ~rOHG,\X. Is this the sort of information that yon arc ]ookin! 2' for fln,l \vatchin2: for? . 'Ccllerd ,\LLEX. l~es. sir. Senator ~rom;,\x. In all tllat Jwriod of time. in all of thosp (; ::eftr~ tl1'.'n. is it fail' to say YOU l1:1c[ abollt l,(;.J() ,\meriCilJl ltal1H'S ont of about 2()() ml11lon Amrric~His? ' Grner:l1~ \ fLEX. Yes. sir. ~cnatol' ~IoHG,\x. ,\11 riQ'ht. sir. Xow. hayc YOIl made all of that information n\'aiJa111c to th~ memhprs of this c;nnmittee or to tbe staff of this committrp in executiyc session before? GcnCl'a1_\LLEX. Yrs. sir. Scnator ~rORG},S. Xow. there is another project that has been aJ] uclpcl to 1mt has not l){'en named here todav. Han~ yon also testified to tlJP mrmhers of this committee and/or to'the stafr'aU the information rrlennt to that project? Gpneral ,\U,EX. Yps. sir. ~enator ~IoRG.\x. Haye YOU been willing at all times to disclose any and all information about'the XSA to th~membersof this committe'e in i'xecutin1 srssion? General ,\LLEX. Yes. sir. Senator ~IoRGAx. Ai1d are vou still now rradY-are YOU now readv and "'illin!! to disclose that or any other information? ' . General'ALLEx. In closed session? Yes. sir. ~rnator ~I()nG.\x. In dosed session, to this committee of the united States Senate. Genpral.\J,Ll'X. Yes. sir. Spnator MORGAX. Now you tpstifled also aholli the law with regard to this disclosme of information. If you would bear with me just a minute-I believe you testified that: The Congress of the United States in 1933, both the Honse and the Senate. enacted a law encoded in 18 U.S. Code 952, which prohibits the divulging- of the contpnts of decoded foreign diplomatic mesMges or information about them. _\nd you also said that: Again in 1950. the Congres~, both the Honse and the Senate, enacted another law, encoded in 18 U.S.C, 798, which prohibits the unauthorized disclosure. prejudicial use, or publication of classified information of the g-overnment concerning- cOJlllllunication intelligence activities, cryptolo;dc activitie!', or the results thereof. Is it )'onr opinion that that is still the law? General ALLEX. Yes. sir. Senator ~IoRG \X. Is it your opinion that the information with regard to the otlwr proji'ct, if disclosed publicly, would be detrimental 01' ('ould he detrimrntal to the national secllI'ity of the Uliited States? Gi'neral _\I,Ll'X. Yes. sir. ' 35 Sc'nator ::\IoITGAx. To yom ]:no\Vledge, is it ,till Hot the position of the President of the l~nited Stutes th-at that information should not be disclosed publicly? General ALu:x. That is my understandinc:. sir. Senator ::\10ITG.\x. _"-nd tlle •\ttOl'llev G(,~,el'al of the l~nitec1 States has so ('ommlmicatecl that to tltis cOll1n~ittee. But yon arc still willin2"ill the first place, yon han~ cOllllmmicatecl that'infol'll1ution. all that yOll have bC'C'll asked for. to this COllllnitteC' and yOil arc now willing to cOInmnnicrrte any other information ,rithin your command to this committee in exccutinl session. (~eneral "\1.I.EX. Yes. sir. Senator ::\loHGAx. _"-llright. Thank yon, sir. Thank you, ::\11'. Chair- The C!L\IlDL\X. Thank vou. Senator ::\Iorgan. Spnator ::\rathias~ ." ~ Senator :\Ln'IIL\s. Thank YOU, ::\11'. Cktirmall. (,pnera], on the last page of your statement, you say that: Thl1", the watch list activity, \yhich involved U.S. citi7.en,. cpased operationally in the sumlller of 19,3 and \yas terminated officially in the fall of 1973. I think that is perhaps the most important sentence in your statemJ'llt. _\.ncl I ,vant you to te11us if that is now the status. General ~hLEl\'".'Yes. sir, it is. Senator MATHIAS. And this \Vas done on the advice of Attorney Grneral Richardson, but in fact, by the agency itself. Is that correct'? Grneral ALLEX. Yes, sir. I terminated the-well, the distribntion of materials ,,,as terminated in the summer. I requested each of the agencies to review it and it ,,,as shortly after that that the Attorney Genrral also then wrote to me and stiid he was questioning the ri>qnests from FBI and the Secret Senice. Senator MATHIAS. "'VeIl, this is the kind of judgment and restraint that I wish more of the agencies of the Gon'rnment had exercised throughout the years. I thiilk, General, you are to be congratulated for the action that you took. I think it is a very import~mt addition to the administratiye history of the Federal Gonl'fiment. I think it is an example that I wish others would follow. I ha,-e no further questions. Senator GOLDWATER. He is Air Force, that docs not surprise me. Senator MATHIAS. Do you want that on the record? General ALLEX. Yes, s'ir. The CHAIR:\L\X. Senator ~Ionc1ale? Senator MOXDALE. Thank you. :Mr. Chairman. General Allen, I ,,'ould }j'ke to say for the record that I think that the work of the :NSA and the perfo~manceof yom staff and yourself before the committee is perhaps the most impressive presentation that ,,'e haye had. And I consider your Agencv and Your work to be possibly the most single important somce of 'intelligence for this Xation. Indeed, so much so that I am not convinced that we fully perceived the reyolution that has occurred in recent veal'S in intelligence gathering as a result of technological breakthrollghs, and it is'~'yom'agency which basically deals with that area. But it is that most impl'essiye capacity which works so often for the pmposes of defending this country and informing it that also scares me in terms of its possible abnsr. That is why I am interested in knowing ,vhat limitations exist, in 36 ~'ollr opinion. lIPOll ih UO'l' that ('oultl Ill' .]e:-c'l'illl'(1 aO' an <:In;8l' of the ]e![aJ rights of ~\.mel'iCall citiz('lls, ~\.s I l!JJ(!pl'stalld yom t,'S(iillO!lY. you liniit yom'self to thp intel'ception of comlllllllientions beh'\eC'll~ C'itllPl' to or from-a forei![ll terlllillal and OIl(' ill the r !tired Statps. You do llot inten.:C'pt mess,lges to and f!'Ol!J jJl'rSf1]]S \\'itlJin tlw rnited States. Gencral.\LLEx. That is COITl'Ct. sir. Senator )IoxD.\LF:. But I also nndl'rstaJl(l that this is a m:,t!('r of polic'y and Hot of law. that the basis for this limitation is a jUdg'l1lC'llt Oll the palt of our GOH'l'll111ent that thal ought to be ns fll!' as 'you go. There is 1l0L in yom jnclgnwllt, 01' ill thC' judgment of tlw AgelJ('~', a restrietion that ,,'onld limit ~'Oll prC'ciscly to those polje'y gllidpl]]J('s that vOllno,," haH'. Ge'llcral .\.LLEX. ,Yell, I Iw]ieve that is ('one(·t, fiir. as rar as the precise rC'stl'iction is ('OIwel'lH'c1. BlIt there i:" llO misunc]C'!'stulldillg "'itll re![arcL to the ExeclItin' din·eti\'es that C'xi:-t. tIll' l'C'stri('(jon is to f(JJ'pigll inteJ1igcllcc purposc's and fOl'pign cOllln;Hnieatiolls ,dlieh ,He (kfined in sOllie way. :-\enatol' )Ioxu_\LI'. GiVPll anothf'l' day and Hnotllpl" I'l'f'sic1cnt. another perceived risk and someone bl'patliing hot down the' neek of t Iw militulT leadcr then in charge of the XS~\: demanding- a 1'2yiew ba:wd on another watch list, another ,,-iele s'Yt'C'p to det~l1l1ine whether SOllle of the domestic dissent is really foreign based, mv cancel'll is wlwthel' that pl'f'SSUI'f' could bp l'Psiste(] on the basis of tIle law 01' lIOt. (~cncrnl ALLEX. ,YC'1], it ifi wry hard foJ' Illp. of COllrS{', to pl'oje(·t into a fntHre unknown situation.•\nd th('rC' are ccrtainly risks that SP('1ll to han> oCC'lIned in the' past. I can c'C'rta;nly assure 'YOll that at the prpsent timC'. undcr any comhination of thc present players. as I umkrstund t he rules an(1 the phyC'rs thelllSl'l \"\'s. t IH're is no possibil ity of that. SPllutor .\fO);J)ALL I ",ill accept that. TIut what we han' to deal "'ith is whetlwr this incl'Pflibly powcrfnl and impn'ssi,-e institution that you head cOllld be lIsC'd hy I'rpsidf'nt ".A" in tIl(' flltme to spy upon tll(' . \.lllf'rican people, to chill and intelTupt pol itiea1 disscnt. And it is my im])1'ession that tlH' prC'sent eonditioll of thf' law Illahs that clltirely possible. Ancl th('refore m' lleprl to. in my opinion. yery cnrefully define the law, spell it out so that it is clear what yom authority is and it is also clear ,,,hat yonI' autllOritv is not. Do you ohject to that! ' Oelll'l':tl ALLEX. Xo. :"il'. Senator ~[OXDM,F.. I am WIT heartpned llY that answer. In the old days of the watch list, as I Ilnderstand alii· earlier testimony, when a, name was presented to you from the FBI, from the CIA, or from other somces, your agency really ('auld not dctermine whether the purpose of including that name was for a leg-al objective or for an illegal purpose. In a Sf>nse, your role was larg'ely ministerial. The names "ere received. They were placed on the watch list. You intC'rcepted information and sent it to the consumer agency. TIut why they really asked for it. other than the Wt'\' g-eneralized description they "'ould often gi"e you. or how the information was used. ,,-as largely unknown to the XS.\.. Is that correet ~ GpJ;pral ALLJ:X. "\Ycl1. it is certainly to some (leg-rcp C01'1'ert. sir. Thc points that yOIl ha H' made ,,'prc l'eco,!!nizpd at the timp and there were 37 ~tcps bken to try to prot{'et against the dangers that yon point out. For example, therc was, as a matter of practic{', a description of the foreign intelligence rcquircrnent to which names were requested. Senator MO:-'-DALE. Yes, they would say this would be for drugs or t his is for persona1scclll'ity of the President. or this is for the purpose of determining whether there is foreign influence in terms of the :mtiwar 1ll0\:ement, and so on. But there was no way that you really bww in most cases. what mUcy have been behind a request or how that informfltion was lJPill2: lL-x'CI. ,Yas there! Geneml ALLt::-'-. Y~'s, "ir. In a strict sense that is certainly correct. ~fll<ltor ~IoxnALE. Th11s similarly, tlw IRS is in the same position that if some agency like the FBI in its COIXTEL Program is pursuing an illegal objecti\"e, you may be tasked to interc{'pt messages in order to procure infol'lllation for an illegal purpose. That too, then, ought to be defined nry carefully to protect your agency from abuse. Would you ~OTee with that? General ALLEX. Yes, sir. Senator ~fOXD.\LE. r'find that answ'er heartening. During the watch list days, you were oppressed heavily, along with the other agcncies. to find evidencc of foreign invoh"ement, direction, 01' ('ontrol of the antiwar mOH'lllpnt. ,Yonld you say that you foun<lllllH:h 2'1idl'!H'e of such foreign control and direction! (;enend ALLE:-'-. Sir. Illy understanding of that is not complete. From a n·\,ip\\- of results of tho:-:e messagps \\hich \ye did proyide other agpncies. they essl'ntia l1y did deal \yith foreign influences and foreign sl1pport to certain 110nH'stic actiyities. "\nd so, in that sense. I would say that the results of the XSA activity did show forei2:n influence. It i" 'also my understanding that \yhen tl~at information \,"as put in prrspl'(' ti'1l' hy particularly thl' CIA. I lw!ien, that their conclusion was that the (legree of foreign ('ontrol \'1as wry small. Spnatol' JfOXD.\LE. The first part of your answer surprised me a littlp hit hel'tluse almost unifol'mly WP have heard evidence from the \"ar[0115 otller agencirs that they found little or no foreign direction, 1'\"PH though they wrre being pressed so hard to find it by the-- nenpl'al ALLEx. ,Yell sir, you must bear in mind that we "'ere only !ll'alillg with mpssagops that related to a foreign contact or a foreign interaction for tl\l' person inyolvcd. So all \yc saw was that. And so ollr perspcctive all it is clearly hiased. "ltYhat we saw was foreign ill\"ohemrnt and fon'ig'n sllpport. I don't \'1ant to usc thr word control 1)('('a usr I (10 not know how to assess that. But my understanding is that t,he ngpncies enlhmting it concllHled as you said. Senator l\foxruLE. Onr of mv concerns. and I thil.lk this has come lip ,,"ith the othpl' a~tPIll'ies-th~' Postal J)ppnrtment. the IRS and so Oil-is that when yOIl are tasked to rpyie\'1 something as vag-ue as forpign inyoh"enwnt or direction, it )wcomes so \"ague that it is very hard to restrain the J'l'\"ir'" at all. And \w haw one example that it is a!.!.Tl'l'd that wp couM raise todav. A ]radin~ U.S. antiwar activista; 1(l \yc know him to 1)(' a lllodr;'atr, perreefnl person, as a mattrl' of fad. someone who quit the antiwar movement e\'en though he was (lrC'rwratrly a~ainst the war. hecausp hp so much opposed some of thp militanrv and violent rhctorir-srnt a messagc to a popula.1' singpr in a forrig;n cOllntr\" asking for contributions to a peace concert-and also his participation. The I!lrssagr notrd tllP planned participation 38 in this concert of some of the most popular musicians and groups ill the l'nitecl States at that time and asked the recipient "either to participate directIy in IH'oYiding the entertainment, or snpport the concert finnncially.~'Kow, "'e have agreed Hot to nse the names. I do not know wh.\' "'C have agreed not to use the n[\n1('s. but ,,'e 1m\'e. The CHAIIDrAX. I might say there. Sf'nator. the reason being: that \ve have not first cleared it \yith these ilHli\'iduals and there is a matter of their Own pri,'acy that \\'e han~ to take into account. Senator ~IOXDALE. All right, finf'. But ill allY ewnt, when you arp picking up stuff like this from peacrful prople who just are Opposp(l to a ,,'ar which no", most Americans frel \vas llll\yise, do you not think that it raiscs ycry serioEs rmestiollS abont hmv you contain snooping "lHl spying all Amcl'ican citizcns-particularly whrn yonI' agency is required to pursue an objective \vhich vil'tua]]~' defies definition amI so easily can spill over in a \vay to undermine and disconrage political criticism and disscnt in this cOllntrv? General ;\.LLEX. I am afraid, slr, I haw to dodge the basic philosophic nature of your qeustion because the facts are, that as a technical collection agency, KSA was asked a far more simple qnestion. ,,'hich is a little hard for me to go back and construct all the emotion at the time. It is certainly not the same as today. But that question was that the Defense Intelligence Agency. in this paricular case. asked for information on the funding of certain U.S. peace and anti-Yiptnrlm war groups. And this messagp was from such an organization or lwrson to an overseas location where forpig:n funding and support was requested. It's certainly trne that in this tinlP in history one "'0111<1 certainly have a substantially different view of that than at the tinlP. Spnat<or MOXD.\LE. TI11t it shows hmv nry difficult it is to definr the o11trr parftmeters of a search like that. cioes it noti I mean. if \VC could use the names today. I think lwople would be snrprised at governmental concern 01' thp fppling that Gonrnment had the right t(~ snoop in such messages. \yould they not? Gpneral ALLEX. 'YelL I only can say I don~t know how to ans\wr your Cl"estion. The requiremen't to us. the reCl11est for information ,,'as \'ery s))rcific and \'C'r~' constrained alHl addressed to a ycry llaITmy point. The broader aspects of yOUl' qurstion, I think: I am not really qualified to ans\yer. Senator ~IoXDALF:. I think that is \vhy \w hftye to drfine yom requirenwnts to include somr verI' prrcise 'limits on the inteITui)tion of citizrns' rights, because as I see it nO\1'. at ]rast as the agency has defined its restrictions in the past, you are largely unrrstl'icte(1. It has been the interpretation of yonr agenc~' that you can roam wry far indeed. Thank you nr~' much. ~Ir. Chairman. The CIIAIR~[AN.Thank vou Senator ~Iol1(lale. Senator Goldwater. . Senator GOLDWATER. First. I want to be on the record as opposecl to public hearings on this matter. GeneraL as I remember correctly. wl1('n YOU were brfore our committee. vou stated that thr law clid'not allO\:' vou to testify on any asp£' ct oftll!' NSA. Is that correct? ' <' Grnera] ALLF:X. That is what I belien to he the case. yes. sir. 39 Senator GOLD\';<\TER. Then. theoreticalh'. YOU are \'iolatin o' the law in being here. . . . • e Gc'nera] ~ \LI,EX. It would ~eem so. -nc.. sir. Scnator GOLD\BTEH. ,Yell I wanted to ask that question to O'et hvo rules that bear on this committee that maybe some of our n~mbers have forgotten about. • In the Senate Rule 36 paragraph 5 it says: 'WheneHr, by the request of the Senate or any Committee thereof any aoeuments or papers shall be communicated to the Senate by the President or the head of any Department relating to any matter pending in the Senate, the proceedings in regard to which are secret or confidential, under the rules. said aocuments and papers shall be considered as confidential and shall not be disdosed without leave of the Senate. I wanted to make that a part of the record in the ennt that any classified information might be offered by memlwrs of this committee under the assumption that we have the power to downgrade or dmnlclassifY classified information. Theil, \w in our own rules, under Senate Resolution 21 ';a select committee is requirecl to protect classified information." Section 7 reads as follmvs : The Select Committee shall institute and carry out such rules and proe('dur('s as it may deem necessary to prevent ... (2) the disclosurE', outside of the Sl'lect COlllmittee, of any information which would adversely affect the intelligenee activities of the Central Intelligence Agency in foreign countries 01' the intelligence activities in foreign countries of any other department or agency of the Federal government. So you are probably, in your opinion, operating outside the la\Y. I just \vanted to set the stage so that this committee \,ould not try to operate outside the rules of the Senate and the rules of its o\\'n committee. I have no questions. The CUAIRUAX. Thank YOU Senator Gold\vater. I think at the appropriate time I \\'illl'cply to the suggc·stion that the committee is operating outside of the rules of the Senate 01' outside of the la\v. I do not belicye that to be a correct statement of the position of this committee. But I \vill not interrupt the line of questioning at this time, because I think Senators would like to have a chance to complete the questioning: of the \vitness. Senator GOLDWATER. }1r. Chairman. I did not charlIe that \ve had operated outside the rules. I said \ve may. .- The CUAIRMAX. Very well, we will discuss that at greater detail unless the Senator would like to discuss it now. I thought \ve \vould go through the line of questioning first. Senator GOl.DWATER. I just ,,-ant to protect you and an of us. The CUAIRUAN. All right, fine. Thank you Senator Golcllntter. I really appreciate that. Seilator TOWER. I must say. )11'. Chairman, I am n'ry touched by Senator Goldwater's concern for your safety. The CHAJRlIIAX. I am too. Sellator. Let 'lls see. who is lH'xt here? SenatorBaker.' . Senator BAKER. Mr. Chairman, tlwnk ~'on verv m11r11. General, I notice in your stat~ment in speaking of the utilization of the \Yatrh list and your efforts in that respect over the Years. This sentence: "Examples of the yalne of this effort inclmling the notifka40 tion to tIle FBI of a major foreign tCl'l'orist act planned in a large city which permitted action to prevent completion of the act and thus avoid a large loss of life.~' Are vou at liberty to elaborate on that at this point? ~. General ALLEN. I really am not, sir. Senator BAKEl:. ~\nd the balance of the statement is equally provocative to me. It says: ';~\n assassination attempt on a prominant U.S. flgme abroad was identified and prenntec1." Can you give us any frirther information on that 'I. I am not urging you to go beyond the confine" of those things you are permittec1 to testify to at this point. General ALLEX. Sir, 'Ye 'Yill certainly prO\'ide that in execntive session to you and go into some (leta1l. Senator B.\Iom, On ]Joth those' points in rwcutin' sef'i'ion? General ALLEX. Yps. SClULtor R\T\:EH. TIH'n I will not. General. insist on it. at t.his t.ime oxcept. to ask you "'hC'ther or not I am to assume by your st.atement that both of these actidties. "'hich I \"ill hear more about in execut.ive srssion bter, were in fad pren~nted as a result of your adiyities in conjunction with the 'watch list. General Ar,LEN. Xo. sir. 'Yell. Semto!' ~Iorgan askerl the question and you have an earlier draft of the statement, the one with regard to the as:-,assinatioll attempt. on marc carcfll1review, ,,-e really could not support that it ,vas a ,vatch l~st entry that cuused us to select the message that revealed that partIcular act. So that was an error on my part t(l lJave inclmle(l that. The situation is COl'n,et in the intcrception of the message and all of that is correct. But it is unfair to say that we srleeted because of the watch list. Spnator BAlCEI:. Hut both of thpm were inyohTc1 with your watch Jistactivities. . Genera] ALLEX. Yes. sir. Senator B\KEI:. "'Yell I "'i1llook 101'\ya]'(1 to YOlll' further statement on that a littlE' latpr. . On tl,e gCllPral watrh list operations. Genpral, did you evrr re('(' in th~ written appl'O\'al of any _\ttorney General of the United States about these neti"itips I. General ALLEX. Xot to nw knowlcche. no. sir. Senator B.\Iocl:. "Tas am~ oYer sOl1~ht that '1'011 know of? (~pnrral AT,LEx. Xo. sir.'The briefings 'Yhi.ell a prerlecessor of mine gayp hail som~ of those charartel'istics aTHl the record shows that tlH'Y WPI'O hridrd in somr ddail am] ha(] some a!!l'rement on the proce(]llI'es to follow. TInt it is prohahly unfair to the .AttO!'lll'YS General innlh'ed to say that it was a sIwcific \\ritten apprO\'al. Senator BAKEl:. Do you know of particular circlllnstances whore a President or an Attol'ller General or Hny C'abinet member for that mattr!' may han' suggested names to be includE'd on the watch list? (Tenprnl ALLEN. Xo. sir. I do 110t. ;';pnator R\T\:En. Y(pre any names Her suggested to the NSJL that WPl"0 rejected for inclusion on the watch list I. Gener~\l "\r.u:x. ~ry Hnc1rrstaml1nQ:. six. as we haw 100k('(1 back at the histon' of that is that there wei.·p substantial numbers of names which wel:c snggestl.'(1. a Jar!!e numher from the FBI am] from another aQ:ellCY ;IS wPII "'hich ",'ere rejected in the sense that a discussion took pInel' as to the nppropriatenes3 of t1w-e nmnps. The XS~\ people point elI 41 ont to them that it w'as too close to law enforcement and that thereforc they should not be included. And, therefore, they were rejected. But that is not docnmented in the sense of it ,,,as turned dO\Yll before it got to the Director of the FBI and he did not in fact submit the name. Senator BAKER. That is a fairly general statement. But let, me tell you the impression that I <Iraw from it. You nre saying that in these particular cases that thc XSA said these names and the purposes for which yon would include these names are not close E'nOllgh to intelligence gathering, which is om bag, and are probably only justified as law enforcement, which is your bag, and therefore we are not going to inc1mlc them. Is that the essence of ,vhat YOU hflye said? General jlLLEX. Yes. sir.• Senfltor JhKlm. ,Vho made that determination? Did YOU make that determination? . General ALLEX. X0, sir. It was made at a 10,Y('r l('\"el within the agency, so the rcquest ne,"er came. I am reminded it was actually not the FBI but the Denartment of .Justice. Senator R\KErt. i see. All right. General ALI_EX. And it ,yas turned down before it got to the Attorney General. Senator BAKER. Thank you yery much, Mr. Chairman. The CIIAm~L\x.Thank you, Senator Baker. Senator BAKER. Before we go on, General I do ,Yant to be briefed on the other two points, Mr. Chairman, either in executive session or if the General would agree to fill me in on the details at a later time, I would be grateful for that. The CHAIRl\fAX. Very well. Senator Tower. Senator TOWER. General~ you are familiar of course with the efforts that have been made by the committee, by representatives of the administration and your agency to be circumspect in this public inquiry. K ow, taking' into account that effort and the good faith of all concerned, is there, in your opinion, a substantial risk still that these open hearing,') may impact adversely on the mission of your agency? General ALLEX. Yes, sir. Senator TOWER. Thank you, General. The CJLUR~fAN. General, your answer to the last question reflects the position of the admini~tmtion,does it not, which is opposed to any publie hearings onaH matters past or present relating to the NSA. GenernJ ALLEX. That was terribly broad, sir. The CIL\lRJ\IAN. 'Yell it seemed to me that the administration took a terribly broad position. GCllPJ"al ALLEX. I believe it is probably fair to sayan all matters thnt relate to the intelligence operations of the NSA. The CUAJR1L\N. And it is also clear that although the administration opposed these hearings this morning on the watch list question, they did (l('('la~sifv the documents at the committee's insistence and did antho~'iz~ ;;01\ to .appenT as a witness this morning to respond to the COITumttee's questIOns. Gel~eral ALLEN. That is correct, sir. 42 'I'll(' CIf.\Im[Xx. I ha,'0 listened with great interest to your testimony, (~ellcr,lL and to the answers. And it seems to mc that the real area of ('oncel'l1· for this committee has nothing to do with the fact that on occasion. your operation, ,Yatch list operation related to a perfectly gooel ancl important matter. I do not think that anybody here would flnarrel abont the fact that information affecting the protection of the Prc"illent is a Yel',\' important matter and if you have a capacity to help in that regard, I do not suppose any member of this committee would ,,'n nt to argue that that is irrelevant or unimportant. The samo thing can be said about narcotics. ,Vc arc all concerned abont narcotics. So our inquiry here has not as its purpose criticizing gi,'en obiectivcs that you sought to serve, of the kind that you deSCl'ilH'll. But, rather the lack of adequate legal basis for some of this aetiYit~- and ,,-hat that leads to. For example, you yourself testified that in connection with some information that you obtained on narcotil's and fumed oyer to law enforcement agencies of the Governmcnt. prosecutions could not be initiated bccause it was not possiblc to illtm(lnce that eyidcncc into court. It was not lawful and under the l'ul<'s of the court and laws of the land it could not be used. So prosecutions could not be initiated. Is that not correct? Ocneral ALLEX. ,VeIl, I do not know sir. The reason that that conccrn \yas felt at the time was because the information could not be lIsed in court because to do so would renal intelligence sourctls and methods. The CIL\IRMAX. ,VeIl. for whatever reason we will question the Attorney General on the legality of the use of that information. But fa!' aile reason or another~ it could not be used in actual proseeutions. Xm\', Senator )Iondale, it seemed to me, touched upon the root cause of our concern. Here we have an agency, the NSA, that is not based ll]>on a statute, like the CIA, which undertakes to define its basic authority. And your testimony makes clear that whatever foreign initlllig- ence may meau, it is being defined, from time to time by the execut i \'e. Is that not correct ~ C;encral ALLEN. Yos, sir. The CUAIRl\IAX. Now~ ordinarily, the executive does not decide such ha"ic matters. Ordinarily, as in the case of the CIA, an agency of this importance finds its fundamental power derived from legislation. Suppose. for example we had a President, we cannot be so certain what kinds of things may happen in this country, suppose we had a Presiclent one day who would say to you: "I have determined with my adYisers, who are my appointees, that foreign intelligence is seamless and it is quite impossible to differentiate between domestic and foreign intelligence because we need to know it all, and some of it we Can gather from domestic sources. And so, in the overriding interest of obtaining the maximum amount of foreign intelligence you are instructed to intercept messages between Americans that are purely domestic and various agencies of the Government will furnish you with lists of people whose messages you are to inrorcept--all without \\'a1'1'ant. all without any judicial process, all without any sanction in the law.~' Now, under those circumstances, is there anything in the present law that would permit you to say we cannot do this, :Mr. President, and we refuse to do it because it is illegal? 43 (}eneral ALLEN. Yes. sir. Tho CIIAIR::\IAN. ,Vh'at provision is there in the law? General ALLEN. It is my understanchng that the interpretaHons "'hich deal ,vith the right to privacy of unreasonable search and seizure of the fmuth amendment. The CIL\IR::\L\N. ,Yell all of those questions-- General ALLEN. Those domestic intercepts '"I"'hich cannot 'be condnrted undrr the President's cOlistituHonal authority for foreign intdligence, then ,YO are not authorized by lawaI' constitutional authority and they are clearly prohibited. The CIIATIDL\N. But those nry questions were raised with respect to some of the ,vatch list activities. In other words, do you not think j hat it ,Yould be in the interest of all of us if we had some statutory ]a,"I"' like most all other agencies have that defines the basic mission and ddlnes as a matter o{law foreign intelligence and contains what(, Wt' oth(,r guidelines may be necessary to be sure that this tremendous ('apability you possess is outward looking and is confined to legitimate illtelligenre concerns of the country. General ALLEN. Clearly. sir, neither I nor the agency I represent has ohjection to laws which are needed hy this country. And we look to the Congress to make those decisions. On the otlier hand, I certainly do not want to leave the impression, sir, that there are these broad ranges of evil nctivities ,vhich would be clone which in themselves-in m~' imclerstanding of the statns of the law and the executive branch (lil'ectiws-are clearly prohihited. The CITAIR3L\N. The executive branch directives which are largely determinative of the scope of your action at any given time are subject to change within the executive 'branch. The point I make is that there is a legislative responsibility here. And since it normally obtains "'ith respect to the work of all other Federal agencies, it would seem to me advisable that it should also obtain with respect to the NSA. I have no further questions of you General. Are there any other further questions on the part of the members of the committee? Yes, Senator :Mondale. Senator MONDALE. ::\1ay I ask, is it :Mr. Buffham? General ALLEN. Yes, tl~at is correct. Senator MONDALE. If he is not sworn in, he doesn't have to be. I jnst want to ask, you 'were I understand, representing the NSA, or at least representing General Gayler, in the preparation of the Huston plan, is that correct ? ::\11'. BUFFHA~L Yes. sir. Senator MONDALE.Can you help explain to us the mystery of why XSA appeared to be requesting authority from the President to do "'hat it was already doing? What, in addition, waS expected if the President signed off? 'What did you want to be able to do that was not then thought to be w'ithin the authority of the NSA? Mr. BmFHAM. Wen, the activities which were ongoing at that time ,wre very, very carefully controlled and very, very restrictive and n~rv, verv minimal. The procedures which Senator Schweiker described under )fINARET were drawn up to insure the most careful handling of this very, very restricted, very, very minimal effort. It appeared when this-whrn ,vo were asked to cooperate by the President in providing more information that would be helpful in the domestic area, it ap44 peared to 11S that we ,;ere going to be requested to do far more than we had done 'before and it appeared to us that this might actually involve doing some collection. which ,ve had nenr clone before, doing some collection for this purpose, And ,ve did not feel that ,n' could pngage in such activity unless there was approval at the very highest levels. So that was the reason that there ,vas a reservation on NSA's part, and the feeling that any increase in these acti"ities must have Presidential approva1. Senator MOXDALE. So it was your judgment at that time that you ,;ere being asked, or "ere about to be asked, to do something that ,vent substantially beyond-- Mr. BUFFHAM. That ,ye could do, but we weren't certain. It appeared as if this ,vas a request to increase activities. Senator MOXDALE. Could YOIl tell the committee what kinds of thin!2's you would expect to follo": had the Huston plan been npprowd, In terms of the use of the NSA ? Mr. BUFFH.Ur. I don't think ,ve eYer made an analysis of that, Senutor. Senator ~IoxDALE, But vou indicated you 'Wl'e c011('pl'nerl about what would be expected of'you-the degre'e to i\"hich yon would have to go he:vond your CUl'l'ent praetices-should the Huston plan 1m approverl. Can you tell us what things concerned you? ~rr. Ih'l;'FILDL ,VeIl. remember there was a lot of confusion on this particular item. ' The committee, which Admiral Gayler ,ms a member of, was tasked to draw up a plan, not a plan, it ,vas tasked to draw up an analysis of what kind of foreign threat existed and where there were gups in intelligence and they were not asked to make any recommendations, they ,,~ere merely asked to identify gaps and to suggest various alternatives which could remedy possibly that gap. Senator .!\rIoxnALE. One of the remedies suggested ,ms to greatly broaden the authority of the KSA to intercept messages. Mr. BUFFHA:Jr. That was one of a "m'ies of alternativE'S under that particular item. There was no recOlmnemlation made by Admiral Gayler or any members of that Ad Hoc Intelligence Committee. 'What happened was that after the cOI11Elittee's report ,vent to the "lVhite House, :Mr. Huston ana}yzccl all of the alternatiYes and he selected those which, in his judginent, he felt the President should approve. And he then prepared a memorandum to the President through Mr. Haldeman, which was approyed and then later. withdrawn and rejected and never implemented. But those i"ere ~Ir. Huston's ideas of ,yhat should be done. Senator MOXDALE. 'lVhat did Mr. Huston haye in mind? Had this approval been given to the NSA? Mr, HTJFVJLDL That I do not know. sir. Senator .!\rIOXDALE, Yon have no idea whatsoeyer? I am told this option was submitted bv the NSA. Mr. Bm;TILDI. No, This was one of three or four alternatiYCs drawn up uncleI' that particular item. Senator l\!oxDALE, Did the XSA i"ant it? Did Admiral Gayler oppose it? Mr, RFFFlL\:JI. Admiral Guyll'l' did not want it, to my knowledge, 45 Senator ),IOXIHLE. III.' opposed it 10 Is tllC'l'e anything in "Titin~ suggesting-- Mr. Ikl''}'lLDL IIp ,,-ns sprcificalJy asked~ ns an thc J1w;:nb~rs of the committee were asked by Huston. not to make recommcndations. but merely to sppcify altel:natins. But the detcl'mlllatioll as to ~\Yhat altel1lativc~ if any~ was to be selected was to be a ~White Honse matter. Kow, the only exception to that was that }Ir. Hoover. after the report had DPen signed by the other members. he gave his personal views as to \vhat should he (lone with those yarious a1tel'nati\-es~ and that was not checked \"jth the other members of the ad hoc committee report:. In othcr \vorc1s. ~\.dmjl'Hl Gavler did not know that M:l'. Hoovcr \\'as going to submit separate comillents~ awl A,lmiral Gayler <lid not submit sppa mt(~ eommcllts himself; lwcnuse it \\'as his undel'fohtllding. as it was all of us that were involved in that exercise. that that was not what was required or desired. . Senator ~IOXj)ALE. Mr. ButYham, is it your testimony that you do not have any idea what }Ir. Huston had in lllind by the option which we arc discussing; namely, to greatly broaden the discretionary authority of the XSA? :Mr. BCFF1LUr. 1Yell, I don't know positively. But I would assume that he would have thought that the other intelligence agencies would then increase the numbers or names on their lists, and ask KSA to do something by way of specifically targeting those people, including for coJJertion. And that was not a practice that was done then or ever has been done by ~SA. Senator )foxDALF:, It was one that concerned yon a g-reat ckal? MI'. IkFFILDL Yes: it concerned all of us in the NSA. Senator }fOXDALE. "'~ere you concerned about its legality? ~rr. RUFFIIA",I. Legality? Senator .:\IOXDM,E. \\1lCther it ,,-as legal. Mr. IkFPILnr. In what sense; \\'hether that would have bern it legal thing to do? Senator MOXDALE. Yes. . ~rr. 13rTFJI-ur. That particular aspect didn't enter into the discusSIons. Senator .:\IOXDALE. I was askin,g whether YOU were concerned about whether thllt would be leglll and pI'oper. • Mr. IkrFHA~r. 1Ve didn't consider it at the time; no. Senator }[OXDALE. But at least vou would not do it without the President's direct authority. • Mr. BUFFHAM. That is correct. Senator }loxDALE. All right. May I ask one more question of the General Counsel? In your opinion, was the \vatch list legal? Mr. R\XXER. I think it ~was lerral in the context of the Jaw at the time. ~~ Senator ,rOXDALF.. Has a~1V law ('han~('dthat legality? ~fr. R\XXEH. 'Yell. m~ ha-i-e sinc(' h:1<1 (lecisions'sncli as in the United States v. C.S. Di.~h·j(.t COIf1't casein HJ7:2 \\'11ich pJacc(l-\rhich stated in effrd that the President does not ha\'e the :mthorit\- to conduct a \YaTranth~s survpillanf'(' for intemal spcurity purpose,:. 46 The CUATIDIAX. )Iay I just suggest that in line ,,-ith my earlier "tatenwllt, it seems to the committee that the Attorney General of the United States shoulrl be asked about the legal and eonstitutional (Illestions that are raised bv the disclosures this morning. I do not J;lC'un to cut you off, Senator: Senator ~IoxDALE. I ,villli,'e with that. But what I was trying to d<'JIlonstrate is ,,-hat I think the private record discloses; that they thought that to be legal. I think that is important to the determination of this committee of how these laws are interpreted. I belieye they still think it is legal. That is what "orries me. ~[r. lhxXER. ~Iay I make just one comment, Mr. Chairman? There is one court decision on the matter. It was held in that decision to be lawful. Senator ~ImmALE.Then vou think it is lawful? That is what it held? ::\11'. BXXXER. I think it ,,:as ltt,,-flll at the time. Senator ::\IoxD.\LE. That is my point. They still think it is legal. SenatoI' ::\IoRG"\x. ~Ir. Chairman, could we ask him to give usa deci- ~ion some time? S<'wltor GOLDWATER. He said it ,yas la,dnl at the time. The CIL\IR~L\X. I think all rde,'ant decisions on the matter should hB supplied by the General Counsel of the Agency. But ,YB .willlook, in the main. to the .Tustice Departmcnt on these legal questIOns. Grneral, thank you \'CI'Y much for your testimony. If there are no further questions, you are excused at this time. Tho CIIAIR~IAX. Kow we han another matter that needs to be bmught up before the public hearing concludes this morning, and I ,,,ill speak of it just as soon as these gentlemen have an opportunity to depali. Please come back to order. At the outset this morning, I mentioned that this hearing would be conduded in two parts. The reason for (loing so has been made evident in the course of the proceedings. Although the administration had objected to a public hearing on any matter relating to the NSA. the committee. by majority vote. believed that it was necessary to bring the facts relating to the watch lists to the attention of the American people through a public hearing. As I mentioned earlier, though the administration opposed the hearing, it did cooperate to the extent of declassifying the materials, and consrnting to General Allen's appearance as a witness. Now, we come to the srco11(l part, another matter that the committee must decide upon to which the administration has given no consent either to furnish witnesses or to declassify materials. Senator Goldwater, I think, had special reference to this second aspect. Senator GOLDWATER. It does, but I would like to correct the record. ",Ye did not take a vote on this subject. The CHAIR~IAN. Yes; in executive session yesterday, with a quorum present, the procedures which we have followed todav 'Yrrc nresented andapproyed without objection. And I took that to mean, i~ accordance with normal procedure, that the committee had given its consent. Senator GOLDWATER. I left a note to be recorded against it, and I had assnmed a vote would be taken. But it was not. The CHAIR~L\X.Wen, had a Yote been taken, or anyone on the committee had moved to take a vote, Senator, your objection would have heen recorded as you requested. 47 XOIV, in connection 'Yith the second matter. I "'ould like first to J'cspond to some of the questions that were raised earlier by Senator (}olclwater with respect to the legality of our making a pub~ic dis(' losure of the second subject. I personally haye no problem wltl~ the leO'alitv of doinO' so. The Constitution of the "Cnitecl States proYldes. ill'" artlC'le I, section 3, clause 2, that each House may determin(\~he l'llles of its proceeding; and in clause 3, that each House shall pubhsh its proceedings, except parts as may, in their judgment, require SetTCCY. This committee ,yas empowered by a resolution of the Senate to in' lnirc into this snbjcct matter, iI.lcluding the :XSA. And that resolut ion. S. Res. 21, g-i H'S the commIttee thc power to pass such rules as it may cleelll nec(~ssary on disclosure, and makes clear that the comlIlittc(~ rules can authoi'ize disclosure. So that the rulcs are based solidly on S. Res. 21, the underlying resolution by ,Yhich the committee was created. Senator GOLDWATER. ,Yould the Senator yield? The CHAIRMAN. If I may just complete the-- Senator GOLDWATER. I wish you would read section 2 of that also. The CHAImIAN. Yes. I will. I was just getting to the Senate rule, and I 'Yill read it all. In pursuance of S. Can. Res. 21, the committee adopted its rules, and the relevant rule is section 7. Section 7.5 is the relevant rule. If counsel will find it for me, I will read it. It reads: ~o testimony taken, inclUding the names of witnesses testifying, or material presented at an executive session, or classified papers or other materials received by the staff or its consultants while in the employ of the Committee, shall be made public in whole or in part, or by way of summary, or disclosed to any person outside the Committee, unless authorized by a majority vote of the entire Committee; or after the determination of the Committee in such manner as may be determined lJy the Senate. So, it appears to me that making a public disclosure of the matter now under consideration is subject to the will of this committee; and I would like to read into the record the reasons why I believe such a public disclosure should be made; after which I will invite SenatOr Tower, who disagrees with me on this subject, to express for the record the reasons why he thinks such a disclosure should not be made. It being 25 minutes of 1 now, Senator, it may not be possible for this whole matter to be discussed or debated. But if it cannot be resolved at this time, it will be taken up in the next session of the committee this afternoon, and with the hopes that the committee can then reach a final determination by vote. Senator TOWER. Mr. Chairn1an, if you would yield at that point. The CHAIRMAN. Yes. Senator TOWER. I will state my reasons briefly at the conclusion of your remarks. Obviously, it is difficult to pursue the matter in open session, because those who oppose disclosure have some difficulty in explaining the reasons why in an open session. The CHAIRMAN. And for that reason, I will certainly accommodate the request in the interest of fairness, so that there can be a full and complete discussion within the committee and the vote then can be taken by the committee. That, I would anticipate, would occur this afternoon when the committee goes into executive session. The reasons why I believe that this second matter should be made public are as follows. This committee has proceeded with great caution 48 throughout its inn:,stigation, "'hich has conred a broad range of KSA activities. Testimonv has been taken from 1111l1JerOUS ~SA officials, all in executive session lmtil this morning. The committee has also receiycc1 extensive briefings from General Allen and others in private. )10st of these anivities \i'e have found to 1)(' legitimate. clearly within the scope of the intelligence purposes of the ~lgency, a'nd for'reasons that the committee feels relate to scnsitiYl' Hat iOllal security matters. should be kept secret. But our investigation did uncover'two XS"\ activities which I Leliew are properly subject to some form of publie dise1osure. Because, one, they would appeal' to be unlawful; two, they h~l\'c now been terminated, and thus do not represent ongoing activitics; throe, they cun be diseussed without rc\'oaling the NSA's sensitive techniques; and four, legislation is needed to prevent their repetition. 'What has occurred yesterday could occur tomono\v, if we leave it all to executive decision. Xow, as I have said, as to one of these-the 'watch list-the administration agreed to declassify the documents, and authorize General ~\.llen to testify as he has. As to the other, the executive branch has consistently opposed public hearings or any other form of public disclosure. Yesterdav, the committee. in the manner I described in response to Senator' Goldwater, agreed that we nevertheless would disclose facts concerning the second program to the American public. I believe that the public is entitled to an explanation of why that decision was made yesterday, in face of the administration's strongly stated opposition. I do not suggest that the administration has acted in any way other than in good faith to exercise its responsibilities as it perceives them. However, Congress has a right and duty to exercise some judgment on its ovm. It must do so fairly, properly, and with due regard to the views of the executive. But it cannot simply abdicate to the executive. 'Ve belir\'!, t11:\t-or at least let me speak for myseJ£-I believe that ,\'esterday\, decision does represent a proper exercise of the constitutional responsibility of the committee, which is charged with an investigation of this importance, and charged by the legislative brllnch to perform it. .\s I unclershllld it, the executive branch makes two arguments, whj"Jl were stated often in executive sessions of the committeC'. ag-ainst a pnblic disclosure of this second matter. Xeither of them, as I heard tlw many spokesmen who came up to pl'esput them, made any particubJ' point of sC'J1sitive technology, or anything of a character that would ]'('\'('al the nature of XSA's opr1'ations. Their arguments sePllled, ratl!p1', to focus first on their ccncern that the disclosure of tll(' i(kntity of e\'rl ain eompan:cs and activities wonld rnrrke other companies hesitate to cooperate with our intelligence agencies in the fntnrc; all(l S('('OlH1. that such a disclosure might be of embarrassment to tho partin.b l' cOllll)unies concerned. I belirvp th~lt tflC answer to the first argument is that companiC's should hesitalc to comply with reqnests of the Government :It leaf't long en011!2'll to determine if the actions they are requcsted to do arc 1nwfnl all~l do not yioJate the constitutionai ri!!hts of American citizrns. AJlil I IJPliew the answer to the second argument is that fairness to tlw ('Oll!p:::lirs themselws reqnires that the fnets hr fully and fairly statr(l, \\")1>'11 I thjnk this committee is in a position to de. 40 ll>clieve that it wOlilcl br inappropriate to kepp secret the facts of I his ::,ccond program, since in my judgment they establish apparent ,"iolations of section 60.) of tbr Frderal CommlmiCi1tions Act. awl of tll(' fourth amendment to the Constitution. Spcond. the program ill," oln'd neither ollg'oillg activity nor teelmolo,'!ical secrets. And third. n:posillg it is directly related to whethrr the XS_\ needs a lcgislatin ('harter to govern and ('ontrol its activities in the f"ture. Finally. the J>nhlic debate that In' hope will ellsue from this sessioll may make both the Government aml pri\"ate I'ompanirs more carriul to weigh the lega1ity of programs tlmt ma.," he suggestc(lin 1111' future'. ;-;0 in balancing tile al'gnIlH'nts for awl against Ilisclosure. which ,,"e lWH' (lone most cHrefulh". we han) consultr(l rxtrllsivrlv with the execIllin' branch. Seve'ral ti;llPS WP ha,-e I](·bvell onr action'to make certain that we had hear,l all of tlie pxpcutiye Lranch's arguments. 'Ve haye l'l1gagrd in cxtensin> intprrogntions of Grnrml ..\JJen and Director ColLy and the Becret:11'Y of Defense, ::\11'. Schlesin~'eL nllll finally, from tll(' _\ttorney Genrral :lI1rlrf'lm'sentatin's of the Prf'sidf'nt. So we hf'lin" r we have listcnf'd fnl]y to thr argl1l1'lf'llt::-: that tlwy wish to present. If the commiUpe rcmains firm in its deCISIon. the srcond matter I" what fOllll of disclosnre wonM IJe most appropriate. Since witlwsses han' not. been made anlilalJle bv the f'xel~utjn' lmlll('h. it seems to me that the most appropriatf' forlll'of disclos1I1'(' IHll1M he that of a 5tatc! ilcnt issl:ed on tll(' autllorit,- of the committee iUil'lf. carefullv drawn to present the key fads l\Il(';llotIonally aml ""It]lOllt fanfare . ..:(s to tIl(' ;(ccnracy of t.he stateI1H·nt. it 'vould be eardulJy dwcked ,,,itll the _\~"(,IH'Y itself so that there "'ouM he no faduall1istortions in the nrf'Sl ·j;tnti<;n. The statelliPIlt. I llli::!ht ell1plJasiz('. ,voulll he based on testi1110llY received Iw tlll' cOlllmittee in eXf'('utin~ session. It would 110t <Plot'I' in wlwh 01: in part from tIl(' text of any classified document pre.~ l·lltrll by thr execl1tin' hranch to the committcf'. Drl'anse the trstimOllY given in executin' srs:"ion heIol'e this cOll1rnitt('e was classified h~tIl(' eOlllll1ittep itself. pursuant to tlw I'olllinittpe',; ruleii. the committpe has every right to releasp snr:h fads baspr!n}lon sneh tpstimony. In<leel1. it has the right. to relpi!:"e the trstilllon.,-" it:"elf shoull] it so decide. ~o t1~(', decision taJ.:pll ypstenla v to rpleasp this information was hasPI1 primarily on tIl(' 1)('lip£ 'that programs of sll(~h dubious legality shonld lle (lise1ospd: \)(,I':lllS('. allsrllt real nntiOlwl sPcllri!y fal'tors. which are not present in this c:\sp. f'1a:,,,ificatiol1 s]]()uld not hp 'used to hide or cov(']" \\"]"on::!<101ng. And. as I han said. in the tec1mical sense, I do not think tll,1t I:lassified information is lJeing relpasec] at all. Tlw decision to make this matter pnblic should, in my vim\'. he tested not only against its particular facts hut also in the light of scn'ral general principles. First, in a democratic society, there 8110nld he a strong preference in fa,"or of letting the people know what their Govrrnment has been doing. Democracy depends npon an informed electorate. As one of 0111' Founding Fathers, Edward Livingston, stated: Xo nation haR <'\'Pl" fOlllHl any inconvenience 1"1"0]]1 too dl,sf' an jll~pection into 0,,· ('onduet of it" oflippr". I,nt man.v han> hef'11 hrona:ht to I"uin anll I"l'du('p,l to "lan'I"~- by suffl'l"in::, g-I"aIltWI impositions aJl(l almse" ,dJieh al'e imperceptihle. 0111.\" !>peause tlJe llIean~ of !lub1icit~- hnllnot hl'l'l1 "p('un'l1. ~('c()nd, thr> g<'!wral principlf' f()l" rlisclosllJ'(' is particularly apt in the context ill which 1his comrni1tce finds itself. For 30 years this 50 country has had a huge and highly secret intelligence apparatus ,yhose actions han~ not been the subject of an informed public debate. La,Y::; O'oycrninO' their aeti,-itv have an too often been lacking. as with the XSA. or ~verlv vague, as with the CLt. The agencies have sometimes acted in ways that appear to he unconstitutional and illegal. The Congress an'd the public should now he given a chance to decide whether changes in the htws and procedures governing the intelligence 'a\oO(''ecnacnieasfaforerdnae}cdeesbsaartey.aTt heaatsthoanscneo1.t1lhaagpepneenreadtI.foonr. 30 years, and surely Third, it does not follow, of coursp. that eycrything we learn in the "ork of this committee should be disclosed. And from what I have previously said, much of what :ve have learned ab01~t t~e ~SA, wl,lich, in the judgment of the commIttee, falls clearly wlthm Its pronnce. "ill not be disclosed. This country should have strong and pffective intelligence services. but we must act legally. Keeping unla,,-ful progTams secret can only serve in the long run to weaken our intelligence efforts. Unless the people are convinced that the intelligence agencips are acting within the law and in the best interests of the United States. a dpmocratic people will not SUppO'l't these agencies for long. "Eternal vigilance," as Thomas .Jefferson said, "is the price of liberty." And as .Tames ~Iadison concluded. "the right of freely examining public characters and measures and the free communication thereon is the onlv effective guardian of every other right." For these reasons. I belie,;e that it would be proper for the committee to approve the disclosure of the second matter to which the discussion relates. Now, I defer to Senator Tower. Senator TOWER. Thank you, :Mr. Chairman. )fr. Chairman. I "-as unavoidably abspnt from the mepting ypstprrIay in which, without objection, it '''as dp('ided that this matter ,,"oulrI be spread on the public record today. Had I been there, I would have objerted. and perhaps this debate could haw ensued at that point. ~Iy justification for not being there is that I am the ranking minority member of the Banking Committee ,,-hich was at that moment considering the plight of New York City. So I was buried in the bowels of the fiscal mismanagement of that great city, and I am sorry that I ,ns not there. I really see no legislati,-e basis for this public disclosure. I do not think it is necessary, from the standpoint of our legislative mandate. rt anpears that Committee Rule 7.5 is the only point having any merit at all. And in my view, it must fail. This rule provides for procedures insuring the protection of classified materials. This rule does not auth?rize the unilateral release of classified information. A proper readmg would be that the rule goes to disclosure of information. not declassification. A majority Yote is necessary prior to committee release of any material of a classified nature. But it is spurious to state that a simple majority vote is enough to declassify a docllll1cnt or information, an action which I do not believe has before been l'(,f'ognized as a f'ongressional prerogative. Let me read from the resolution, which I believe is superior to any rule that we may adopt: . The Select Committee shall institute and carr, out such rules and pro('ednres as it may deem necessary to prevent the disclosure outside the Select Com51 mittpe of any informccation which would adYer~ely affect the intelligence aetiYities of the Central Intelligence Agency in foreign countries or the intelligence actiyities in foreign countrips of any othpr dpvartmcnt or agenCj' of thc Fl'deral government. At this point, I read into the record a note from :JIr. Dayid D. Lmvman, Special Assistant to the Director, XSA, for Congressional EeYiew, to Mr. Barry Carter of the Select Committee staff. Barry, we have reviewed Senator Church's proposed statement on SHA~IROCK. \Vith the exceptions noted here preYiously, the statement is essentially correct. After reyiewing the document, we have concluded that, since it docs rpveal sources, methods and capabilities, its classification should be ~ecrl't, Handle via CO~IINTChannels Only. It is my view that it is not necessary for us to make this matter public. Therefore, ,ye should not, b~- yirtue of the risks that "c run in doing so. It occurs to me that todais disclosure, should we do so, ,Yould be cited in some future date as a precedent to allow each ~Iembel' of Congress and committee the right to decide what should he publicly available from what the executive branch has determined to ue secret. This would mean revelation through public channels to our enemies and would lead to chaos and ultimatelv destruction of thc YCIT fragile intelligence effort. . . President Truman decided that this matter should be kept secret. President Ford has personally and specifically requested of the committee that it be kept secret. Of course, a :JIember of the other body has threatened to make this matter available to the public before we have acted on it. I do not think we should rush to do the same. I think, quite to the contrary, we should implore the House not to. I think olle :.\fember out of 435 in the House of Representatives should not be encouraged to reveal matters that impact on the lives and safety of the people in the other 434 congressional districts in this country. They have a stake in this matter, too. Now, I think that if this information is released, as the chairmall has proposed, the ripple effect will seriously impair the confidence that other nations have in dealing with us, impact on the efficacy of Strategic Arms Limitation Agreement, progress in mutual balance of force agreements, nonnuclear proliferation arrangements. Already the intelligence services of other countries are showing some indisposition to cooperate with the United Stntes, for fear that their own methods, their own resources, their own activities, to the embarrassment 0:£ their respective governments, or to the detriment of their intelligencegathering capability, will be affected. For these reasons, Mr. Chairman, I urge that this matter of the details of the SHAMROCK operation not be made public. I would urge the members of the committee to reconsider the decision of yesterday in an executive session. The CHAIRJlIAN. Thank you, Senator Tower. Before we close, are there any other comments? Senator Mondale. Senator MONDALE. 1\fr. Chairman, I just wanted to comment briefly on what I thought I heard to be the argument, that somehow the classification and determination of the executive department should goyern how this committee decides to release or not to release information to the public. I do not think we can accept that definition for a moment. If we do, I think we arc no longer a coequal branch of Goyernment. 52 ~Ye huyc just !)(,l'll through one of thl' most dispiriting periods of Amerieiln history. and the defense that was always raised, every timl' ,'on w:mted to finrl ant about it. was national security. So it'seems to me tlH're are occasions when the national security interests clearly (1ictate and reqnirr sr('rr(')". And there are instances when natiolU11 s('('mity if; raised. not to protect this Xation's security, but to protect :,onw contNnporar~' politicians from emharrassment. It is our joh, as :\[pmbers of the CongTpss, to decide where that line is and to do so with a firm notion of onr sacred responsibility not only to innstigate Jmt to inform the pnblic. I am glad that it has ])e('n decided that we will hoM this debllte in prinltr. I think it ongllt to be thoroughly aired, but finally, it is OUl' responsihility as nwmhrrs of the Senate and of this committee to make 0111' own determination as to whether or not these matters, if ilisdosed. wonM undrnnine the "Kation's spcnritv. I look forward to t hat argnment. • Bnt I (hI want to say that I (10 not think for a moment that m' can accrpt t!lC "illlplr (It·('lanl'tion by thr Exrcntin that it is classified. as precllHling or llllc!rrmining our capacit,\, to make an indepenclrnt i lHh"mrnt. Thr, CnAlr:~L\X. Thank Yon. Senator. T agree ,,·jth that. I thiilk m~ "'onlcl he a pl'ison~r of the Excctlti\'{, if \'\(. took snch a ]1o,;ition. Srnatol' 'TOWEH. "fay T say. :\Ir. Chairman. thnt I have hern coop(' rati\'P. I hrl iC'\'('. a"m1 ha~'C' snppol'trr1 {'wry pffort to obtain thr (]ocuJ1wnhthat ,yp l'f'quil'r. That is onr thing. I helieve that we shoul(1 JUlI"e t!l0f'e dOCUlllC'llt8. "Te should han' arr('S8 to th('m; we should haw ;IC('('''8 to ",itnessc's. antI \w should br fnlly informed, and we should make thorongh jnvrstigations. The ql1rstion here i" 'Yhrthpl' or not this information should 1w mil(lC' pnhlir. YC's. tll('rC' is a right of tIl(' peonle to know, hut that mnst he habncecl against the fad that when thesp matters arp mad!' puhlic rr('01'(1, they are anlilable al:::o to onr enemirs. Let me ('itr onr f'xamplC'. A wepkly magazine published tlw fact that wp hnd heen rC'a(1ing the te1C'J1wtry on Rnssian wrapons systems from Turkey..\s soon as that maHer \\"as made a mattC'l" of pnhlic reeord. it wns fllso anlilahlr tD tlw E'oyirts. and that SOlUTe \yas then :lnd therC'aftC'l' (jpniCfl 118. This impads on our eapability for nrification in tcrms of s!Tfltegie a·rms eapahilitiE's and deploynwnt. I do not think that thr puhlic inten~st was srlTer1 in the releasr of tlurt information. IndrC'd. it "';lS no! sc'T'yc'(1. So Tthink thC'l"c arr some very strong examples that can he cltNl. T appl'rci:1te thr chairman's disposition to take this mattC'l' 1111 in C'xrcll'tiyr session an(l. lwpdnl1,v. I can prryail there. I have no illusion" nhont. thrsr mattrr". ThE' CTL\TTI1f.\X. "Trll. T think thr ~rnntor always stat.es his casr with grrilt anthorit~· and hilS persnndr(1 the committr8 on occasion. T hope he will not l)('r-:l1a(le the committre on 'this o(,l'ftsion, hecalFr tlw rxnmplrs 11(' givrs that are so terrifyino. haw nothing to do with thr casp at hand. which relates to qllite a diffprent matter. . E'rnator TOWEll. Yrs. ,thC'y do. becallsr ,YO are talking about people"s J'Io'hts to know hrre. Th~ CHAmilL\x. T think what. we arC' talking ahont-- 33 Senator Towl:n. I t !link it is propel' to cl te p:\a 111 plf'~ of W 11c'1'(' 1l);l t l'i!e'ht call he snbonlinated. 'The CHAIJC\L\~. Of course, :-;enator. \vlH'n ~'ou cite yonI' eXHlilpll'~. \yl1O would ar~ue \yith thelll! But till' ca~e at hand has to Ii:> Il'it iJ linlawfnl con<1ncr that relatps to eertain dOllll'stic eompHllic,;; in thi.~ (·onntrY. ,And it is not a mattpr of SHC!t ~nl\'ity that it \vo1l1tl ('n'n impail: the lla'tional sP('mity of the rnitl~(l :-;ta'tes-- :-;enator Tmn:n. ,Yell-- The CHAnGlL\~.In \yays that your examples snggest. ~enator TOWFl1- That j:, a 1l1,lttf'!' to 1)2 (Idmtf'd in l'x(,(·11tivc,.~(',,~jOll. 'fhe CIL\llDU~. \'('5. YPl'y \vell. \VP \vill debate it in px{'cntiYe S(,S~lon. ~f'nator Tlnn:n, ThC're is Illore to be :'aid tlwn. The CnAJIC\r.\~••\ p.'ooil dea1. ~enat{)rs who \yish to he Iward; I \yant to l'eco~nizf' fi.r~t-~enator :\[oI'gan ,,'ant; to be rp('op:nlzel1. First. let me I'e('oinize Senator Bakel'. :-'e11ator BAK}:n. :\fr. Chairman. thank YOU. I will 110t take very Ion!!. I ,jmp],v want to sa~·. as a matter of l(:g':;l argullH'nt. that th~~ rul;·s of this ('ommittee can be no hroader no1' (,1'eatp allV authority and jnrisdiction h('yond the rules of tIll' ~pnatp from whi;'!l "oe deri ~'e oIll' authority. anti it. seems to me that the rille's of tlIP Senate. at ka~t ar~uah]\o. say that a rJas",ifi('l1 110clllnell't cannot ])(' d('claCisined or reiease(ito the puhlie \yithour the prior conSl'nt of the eXe{'uti\'c dl'p, u'tJllrnt. or at least. not without changing tIll' rules of the Sl'nat!· itself. f'o the argnlllent that onr committee rules !.6H' Wi that alit hOl'i (~' hy majority Yote. I think ll1U"t be tell1jleI'pd h,\' tIl(' prrpositiol1 that the commiUre rules are subordinate to and can he no 2'reater than t lll' rilles of the f'enate itsl'lf. \\'hich ap]Jl'ar to :"ay :"ollll'tl;ing e!sr. lk\'ond that. as til(' chairman knows. a]](l as 11)(']il'l'p otllPl' lIlt'mlll'I's of the COlfwlittee kno\\'. I hayl' sometimrs J)('C'n t]w only memlwl' of tIlt' ('ommiUl'e. always. hO\\'('\'er. in a minorit\'. \\'!lo ]m,.; c(;ntended that a]] of our proceediilg-s should ill' in puhlic: awl I am rather I)(,Tt!ll'brci l'C'al]v. that we al'r a];out to 2'0 into exel'utin' :,ession on this u:atter :111(1 to (h'aI with ollly just a r~pol't. I am mther jwrturlwd rathr!' thar \\'(' al'r going into public srssion instead of ('xC'cntiyc' session, wlwn ~'Oll ('Oll1pare tl](' relatin' jJotC'nti:l1 fo]' harm. th(' I'Platin' comparison fol' tlw potrntial for embarrassmC'nt ill tIll' ('ase of the assassination plots. \\'hicl1 \\,(,I"r some time ago, \"'rsus the potential for df'strnction of illte]] igrncc somcrs and 1l1l'tholls \yhrn \Ye an' dl'alillg with an ongoing pl'Ogralll today, In a wo]'(1. if yon arc going to Ilan~ pnblic hearillg, Oil XSA,. von surr shoulli ha\'e 11fI(I thrm on assassinations hecausp I think assassinations arr fal' Jess srnsitiyc, in trl'11l of thr welfare of this COlllltl'V. than tIl(' XS.\ sitnation is. tlw SH.DIHOCK sitnation. XO\~. ~Ir. ChairmHIl. I think that the 1)1'0])('1' ('Olll'se for us to takp al1fI the course we wi]]. 110 dOllht. dphate in expcutiw ses.sion this a1'tI']'lIoon, is to try to gain accrs" to as much information as we can and to ohtnia the concurrrnce of thp executi\'e c1epnl'tlllPllt on as much infol'matioll as we ('nn hefol'P \H' proceed then to puhlie hearings. I fa\'or public hearin!!s. I do not.howeYl'l'. fa\'or rmh]i(· hearinrrs unti] \\'(, ha\'11 exhausted ('\"pry opportunity to ohtain thr c!pl'1as.sification of :IS Illuch information as possibll', I wi]] oppose tl](' unilatrral (IpcJassifi54 cation by this committee of tIlis information. ,,'hich I am afraill is the SUIll tob;l nnd the fnnctional cned of ,yhat is beinlY proposed. Tho CJL\1IDL\X. I tlwnk the Senator. I know his positicn on public llcflrings. Imt frequently in executin'l session. he has Yoted against t hem on t ]le grounds that ,ye ,yere not adcqnately prepared. ~C'lllltOl' }\\1\.ER. XO. I haY(' not. The CIL\TR:\I.\X. I think in this case ,ye are yc'ry acleqnate]y prepared j'el'ause Wl' h,lYC hacl al1 bnc1s of cxecuti,'c hparings. and lye han' ]ll'ard j Jw cxcentin· agl'ncies and their spokesITJ'?n again and again relating to a11 the pn rticu]ars of this particular subject. Senator B.\K~:H. :;\11'. Chair!11nn. if I understand YOU corrertly. I he1i c\·(' ~'OU saicl that in cxecntin session I had n;tc(l agninst' puhlic hearim!:s. I do not beErY<' the record ·\Yill disclose that. I think the n'c'Ol'cr"Yill disclosl' that I yotec1 against clcc!assif~'ing 01' proceeding ,,'ith a particular piece of information. I do not belien the record will shO\\' that I Yoted against public hearinlYs on any issue. '[JiG CIL\TlDL\X. The rccord can speak for itself, but in any event, I ha,'e heard the Senator make the argument before in connection ,yith puhlic hearings that we ,ypre not preparcd. Srnator R\KER. And I persist in the hope that someday I may jH'p\·ail. The CHATR~L\X. I do not know what more exhansti,'e preparation could ha,'e been laid than the one that has been laid for the matter no,," before the committee. Senator Jforgan. Senator JIORGAx. ::\Ir. Chairman. I would not want to go awav from here ,Yith anyone having the misunderstanding that informat[on has hren withheld from this committee. As General Allen testified this morning-and that is correct according to my kno\Yledge-he has furnished to us all of the information that \yp haye asked for and has indicated his willingness to furnish it to us. The thing that concrrns mr-and I was in and ant of the meeting ~'l'steJ'day rlfternoon. Like Senator TOIyer, I had to be on the Banking Committee anel on the floor-the thing that concrrns mr is so Il1tUl~' people express thrir concern about going public with this hearing after we have been able to work out almost every difficult situation ill tlw, past. I know from vour o\Yn statements that the President himself has personall:'l inten~ened with you or talked with you. No later than this morning he talked ,'lith me about it again through his emissary. He llns rxpressecl his concern. I haye a great deal of confidence in the Prrsiclent. I think \Ye ought to pass judlYment on it onrselves, but I just ,,'ould want the recon) to reflect that nobody is withholding information from this committee. There is one other thing I think Senator TmYer's comments Dointed out-the danger of going public. A couple of times Senator Tower referred to a couple of things that, so far, mavbe we should not refer to, but since he referred to President Trumail, let me say President Truman long. long ago was inyolved in this nnd gave his word and, because of it. I am awfully reluctant to go against the word of the President of the United States. If ,ye cannot depenel on the word of the President of the United States, I do not know who rIs!', the Amrrican Drople can 100kto. The CHAIR3fAN. Well, I think just to complete that since the Senator has statrc1 it. President Truman also said that his word would not be binding. He conlll not bind future administrations. So I really believe that was it long time ago anel the commitment was one that he, himself, put a condition on, and moreover the program changed. It changed greatly after the original agreement was entered into. So, an}"ay, this is a matter for executive debate. Senator GOLDW,\TETI• .Jlr. Chairman, I want to emphasize that had we knmvn that this subject was going to be decided yesterday, I would have stayed a,vay from the floor, where I had to be to engage in a debate on the promotion of an Air Force General, and these other gentlemen 'Yould haw been there, too. I do not even know if there "'as a quorum present, 1m!, the rule calls for a majority vote, and I do not believe the question \\'as eYer put, so that the answer could have been from the Chainmm lJy nnnllillJOllS conscnt it is agreed. I have not found a mClllLcr Yet that could substantiate that kind of a Jllon~, so ,ye have not HJtecl on this. In facL as I recall it, ,ye have only had a couple of Yotes in t ]10 v;hole history of this Committee. The CII,mm,\:-I. ,,'ell. Scnator. it is deal' that this will be debated once more in executiH~'session a'ncl wi]] then be voted, so there will be no basis for a complaint that the rules hayc not becn completely, fait hfnlly, and scrupulously adhered to. If thcre is no furthcr comment, this public session is now adjourned. I"'hercupon, at 1 :07 p.m., the committec recessed, subject to tho ('all of tIw Chair.]
|