Site Map CHURCH COMMITTEE REPORTS |
ADDITIONAL VIEWS OF SENATOR FRANK CHURCH COXCERXIXG COVET-{T ACTIOK I believe this committee has produced a remarkably thorough report on the difficult subject of covert action. However. it is my own personal view that the covert action capability of the 11$. intelligence community ought to be circumscribed more sharply than a majority of the full committee was willing to recommend. I include these adclitional remarks to explain my point of \'iew. \Ve live in a dangerouf' worH. Soviet submarines silently traverse thb vcrail floors carrying transi'ontinental lllissilps with thp cap3;city to strike. at 0111' heartland, The nuclear arms race threatens to C'ontmue its deadly spiral to,ntrd .\xmagprlrlon, In this perilous setting1 it i;.: imperative for the United States to maintain a strong and effective intelligence service. On this propositioll we can ill afford to be of 1\\'0 mi'v'ls. \V(' haw> no ,hoi('(' otlll'I' than to gather, analyze, and as~'ess-- to th,' ht'st of our abilities-vital information on the intent and prowess of foreign adversaries. present 01' potentiaL \VitDout an adequatE' intf'lJig'l"Tl"e-f'litllering apparatus we would be unable to gauge wIth ronfidpll('f' 0111' defense requirements; unable to conduct an informed foreign polie)'; unable to control. through satellite surveillance. a runaway nuelear arms race. "The winds and waveS are always on the side of t1w ablest navigators," wrote Gibbon. Thosp nations without a skill fn J i nh'lI i~pn('p service must navi;,rate beneath a clouded sky. 'Vhile one may debate the <VlaJity of the Agencyls performance, there has never been any (1I1PstlOn about the propriety and necessity of its evolvement in the procpss of ~athering and evaluating foreign intelligence. Nor have serious questIOns been raised about the means used to acquire such informatIOn. whether from the overt sources, technical deviees, Or by clanrlestine methods. 'Vhat has becomp rontronrsiaJ is quite nnn>lated to intplligenel', but has to do, instead, with the so-called covert operations of the CIA, those secret efforts to manipulate events within foreign countries in ways presumed to serve the interest" of the United States. Nowhere rrre such activities vouchsaferl in the statutory language which created the Agency in 1947. "No indication was given in the statute that the CIA WOllIn be{'ome a "ehi('le for foreign political action or clandestine political warfare," notes Harrv Howe Ransome. a scholar who has ,written widely and thought deeply about the problems of intelligence 111 mo.der~ society. Mr. Ransome concludes that "probably no other orgamzatlOn of the Federal Government has taken such liberties in interpreting its legally assigned functions as has the CIA." The legal basis for this political action arm of the CIA is very much open to question. Certainly the legislative history of the 1!l47 Act fails to indicatp that Congr'pss antieipntl'c1 the CI\ would ever engage in ('o\'(>rt politieul warfare abroad. (56:3) 564 The CIA points to a catch-all phrase contained in the 1947 Act as a rationalization for its operational prerogatives. A clause in the statute permits the Agency "to perform such other functions and duties related to intelligence affecting the national security as the National Security Council may, from time to time, direct." These vague and seemingly innocuous words have been seized upon as the green light for the CIA intervention around the world. Moreover, these interventions into the political affairs of foreign countries soon came to overshadow the Agency's original purpose of gathering and evaluating information. The United States came to adopt the methods and accept the value system of the "enemy." In the secret world of covert action, we threw off all restraints. Not content merely to discreetly subsidize foreign political parties, labor unions, and newspapers, the Central Intelligence Agency soon began to directly manipulate the internal politics of other countries. Spending many millions of dollars annually, the CIA filled its bag with dirty tricksranging from bribery and false propaganda to schemes to "alter the health" of unfriendly foreign leaders and undermine their regimes. The United States must acquire a longer view of history. We need not be so frightened by each Russian intervention. We need not feel so compelled to react in kind to each Russian move. We haVE} gained little, and lost a great deal by our past policy of compulsive interventionism. Above all, we have lost- or grievously impaired-the good name and reputation of the United States from which we once drew a unique capacity to exercise matchless moral leadership. Where once. we were admired, now we are resented. Where once we were welcom!>, now we are tolerated, at best. In the eyes of millions of once friendly foreign people, the United States is today regarded with grave suspicion and distrust. I must lay the blame, in large measure, to the fantasy that it lay within our pOWer to control other countries through the covert manipulation of their affairs. It formed part of a greater illusion that entrapped and enthralled our Presidents-the illusion of American omnipotence. Neverthe'less, I do not draw the conclusion of those who now argue that all American covert operations must 'be banned in the future. I can conceive of a dire emergency when timely clandestine action on our part might a.vert a nuclear holocaust and save an entire civilization. But for such extraordinary events, certainly we do not need a regiment of cloak-and-dagger men, earning their campaign ribbons-and, indeed, their promotions-by planning new exploits throughout the world. Theirs is a self-generating enterprise. Once the capability for covert activity is established, the pressures brought to bear on the President to use it are immense. I, myself, believe that all covert activity unrelated to the gathering of essential intelligence should be severed entirely from the CIA. If some circumstance in the future should require a secret operation in a foreign land, let it be done under the direct aegis of the States Department. And if the covert activity is not impelled by the imperative of survival, itself, then let it be directly connected with legitimate security interests of the United States in a way that conforms with our tradi565 tional belief in freedom. Then, if our hand were exposed, we could scorn the cynical doctrine of "plausible denial," and say openly, "Yes, we were there-and proud of it!" We were there in \Vestern Europe, helping to restore democratic governments in the aftermath of the Second World War. It was only after our faith gave way to fear that we'began to act as a self-appointed sentinel of the status quo. Then it was that all the dark arts of secret intervention-bribery, blackmail, abduction, assassination-were put to the service of reactionary and repressive regimes that can never, for long, escape or withstand the volcanic forces of change. And the United States, as a result, became even more identified with the claims of the old order, instead of the aspirations of the new. The remedy is clear. American foreign policy, must be made to conform once more to our historic ideals, the same fundamental belief in freedom and popular government that once made us a beacon of hope for the downtrodden and oppressed throughout the world. FRANK CHURCH ADDITIONAL VIEWS OF SEXATORS WALTER F. l\10NDALE, GARY HART, AXD PHILIP HART \Ve fully support the analysis, findings, and recommendations of this Report. If implemented, tIl(' re{'ommendations will go far toward providing our nation with an intelligence community that is more effective in protecting this country, more accountable to the American public, and more responsive to our Constitution and our laws. The key to effective implementation of these recommendations is a new intelligence oversight committee with legislative authority. Committees of Congress have only two sources of power: control over the purse and public disclosure. The Select Committee had no authority of any kind over the purse strings of th.. intelligence community, only the power of disclosure. The preparation of this volume of the Final Report was a case study in the shortcomillgs of disclosure as the sale instrument of oversight. Our experience as a Committee graphically demonstrates why legislative authority-in particular the power to authorize appropriations-is essential if a new oversight committee is to handle classified intelligence matters securely and effectively. In preparing the Report, the Select Committee bent over backwards to ensure that there were no intelligence sources, methods, or other e1assified material in the text. Asa re-snlt. important portions of t he Report have been excised or significalltly abridged. In some cases the changes were clearly justified on se,(~urity grounds. But in other cases, the CIA, in our view, used the classification stamp not for security, but to censor material that would be embarrassing, inconvenient, or likely to provoke an adverse public reaction to CIA activities. Some of the so-called security oojections of the CIA were so outlandish they ,,,ere dismissed out of 'hand. The CIA wanted to delete reference to the Bay of Pigs as a paramilitary operation, they wanted to eliminate any reference to CIA activities in Laos, and they wantE'd the Committee to excise testimony given in public before the television cameras. But on other more complex is.<;ues, the Committee's necessary and proper concern for caution enabled the CIA to llse the clearance process to alter the Report to thE' point where some of its most important implications are either lost. 01' obscured in vague language. \\'e shall abide by the Committee's agreement on the facts which are to remain classifi€'d. ,yp did what we had to do und€'r the circumstancE'S and the full tE'xts arE' available to the SE'nate in classified form. \Yithin those limits. howeyer. we belien it is important to point out those areas in tIll' Final Report w,hich no longer fully reflect the work of the Committee. For example: -Because of editing for classification rellsons, the italicized pllssages in the Findings and Recommendations obscllre tlw (567) 568 significant policy issues involved. The discussion of the role of U.S. academics in the CIA's clandestine activities has been so diluted that its scope and impact on the American academic institutions is no longer clear. The description of the CIA's clandestine activities within the United States, as well as the extent to which CIA uses its ostensibly overt Domestic Contact Division for such activities, has been modified to the point where the Committee's concern about the CIA's blurring of the line between overt and covert, foreign and domestic activities, has been lost. -Important sections which deal 'with the problems of "cover" 'were eliminated. They made clear that for many years the CIA has known and been concerned about its poor cover abroad, and that the Agency's cover problems are not the result of recent congressional investigations of intelligence activities. The deletion of one important passage makes it impossible to explain why unwitting Senate collaboration may be necessary to make effective certain aspects of clandestine activities. -The CIA insisted upon eliminating the actual name of the Vietnamese institute mentioned on page 454, thereby suppressing the extent to which the CIA was able to use that organization to manipulate public and congressional opinion in the United States to support the Viet Nam War. -Although the Committee recommends a much higher standard for undertaking covert actions and a tighter control system, we are unable to report the facts from our indepth covert action case studies in depth which paint a picture of the high political costs and generally meager benefits of covert programs. The final cost of these secret operations is the inability of the American people to debate and decide on the future scope of covert action in a fully informed way. The fact that the Committee cannot present its complete case to the public on these specific policy issues illustrates the dilemma secrecy poses for our democratic system of checks and balances. If the Select Committee, after due consideration, decided to disclose more information on these issues by itself, the ensuing public debate might well focus on that disclosure rather than on the Committee's recommendations. If the Select Committee asked the full Senate to endorse such disclosure, we would be unfairly asking our colleagues to make judgments on matters unfamiliar to them and which are the Committee's responsibility. In the field of intelligence, secrecy has eroded the system of checks and balances on which our Constitutional government rests. In our view, the only way this system can be restored is by creating a legislative intelligence oversight committee with the power to authorize appropri'ations. The experience of this Committee has been that such authority is crucial if the new committee is to be able to find out what the inteiligence agencies are doing, and to take 'action to stop things when necessary without public disclosure. It is the only way to protect legitimate intelligence secrets, yet effectively represent the public and 569 the Cong-ress in intelligence decisions affecting America's international reputatIOn and basic values. A legislative oversight committee with the power to authorize appropriations for intelligence is essential if America is to govern its intelligence agencies with the system of checks and balances mandated by the Constitution. PHILIP HART 1VALTER F. MONDALE GARY HART 207-932 0 - 76 - 37 INTRODUCTION TO SEPARATE VIEWS OF SENATORS JOHN G. TOWER, HOWARD H. BAKER, JR., AND BARRY M. GOLDWATER Our mutual concern that certain remedial measures proposed by this Committee threaten to impose undue restrictions upon vital and legitimate intelligence functions prevents us, in varying degrees, from rendering an unqualified endorsement to this Committee's Findings and Recommendations in their entirety. We also perceive a need to emphasize areas of common agreement such as our unanimous endorsement of intelligence reforms heretofore outlined by the President. Therefore, we have elected to articulate our common concerns and observations, as viewed from our individual perspectives, in separate views which follow. JOHN TOWER, Vice Chairman. HOWARD H. BAKER, Jr. BARRY M. GOLDWATER. (571) SEPARATE VIEWS OF SENATOR JOHN G. TOWER, VICE CHAIRMAN When the Senate mandated this Committee to conduct an investigation and study of activities of our Nation's intelligence community, it recognized the need for congressional participation in decisions which impact virtually every aspect of American life. The gravamen of our charge was to examine the Nation's intelligence needs and the performance of agencies charged with intelligence responsibilities, and to make such assessments and recommendations as in our judgment are necessary to maintain the delicate balance between individual liberties and national security. I do not believe the Committee's reports and accompanying staff studies comply fully with the charge to maintain that balance. The Committee's recommendations make significant departures from an overriding- lesson of the American experiencethe right of American citizens to be free is inextricably bound to their right to be secure. I do not question the existence of intelligence excesses-the abuses of power, both foreign and domestic, are well documented in the Committee's report. Nor do I question the need for expanded legislative, executive, and judicial involvement in intelligence policy and practices-the ''uncertainties as to the authority of United States inteUig-ence and related agencies" were explicitly recognized by Senate Resolution 2l. Nevertheless, I question, and take exception to, the Committee's report to the extent that its recommendations are either unsupported by the factual record or unduly restrict attainment of valid intelligence objectives. I believe that the 183 separate recommendations proposing- new detailed statutes and reporting procedures not only exceed the number and scope of documented abuses, but represent over-reaction. If adopted in their totality, they would unnecessarily limit the effectiveness of the Nation's intelligence community. In the area of foreign intelligence, the Committee was specifically mandated to prevent "... disclosure, outside the Select Committee, of any info-rmation which would adversely affect the intelligence activities ... of the Federal Government." In his separate view Senator Barry Goldwater clearly points up the damage to our efforts in Latin America occasioned by release of the "staff report" on covert action in Chile. I objected to releasing the Chile report and fully support Senator Goldwater's assessment of the adverse impact of this "ironic" and ill-advised disclosure. Another unfortunate aspect of the Committee's foreign report is its response to incidents of lack of accountability and control by recommending the imposition of a layering of Executive Branch reviews at operational levels and needless bifurcation of the decisionmaking process. The President's reorganization which centralizes foreign in- (573) 574 telligence operations and provides for constant review and oversight, is termed "ambiguous." Yet the Committee's recommended statutory changes would [in addition to duplication and multiplication of decisions], add little except to insure that the existing functions set up by the President's program were "explicitly empowered," "reaffirmed" or provided with "adequate staff." By concentration upon such details as which cabinet officer should chair the various review groups or speak for the President, the Committee's approach unnecessarily restricts Presidential discretion, without enhancing efficiency, control, or accountability. The President's reorganization is a thorough, comprehensive response to a long-standing problem. It should be supported, not pilloried with statutory amendments amounting to little more than alternative management techniques. It is far more appropriate for the Congress to place primary legislative emphasis on establishing a structure for Congressional Oversight which is compatible with the Executive reorganization while elimmating the present proliferation of committees and subcommittee's asserting jurisdiction over intelligence activities. Another area in which I am unable to agree with the Committee's approach is covert action. It would be a mistake to attempt to require that the Congress receive prior notification of all covert activities. Senator Howard Baker repeatedly urged the Committee to adopt the more realistic approach of obligating the Executive to keep the Congress "fully and currently informed." I believe any attempt by the legislative branch to impose a strict prior notification requirement upon the Executive's foreign policy initiatives is neither feasible nor consistent with our constitutionally mandated separation of powers. On the domestic front the Committee has documented flagrant abuses. Of particular concern were the political misuses of such agencies as the Federal Bureau of InveRtigation and the Internal Revenue Service. However, while thoroughly probing these reprehensible activities and recommending needed changes in accountability mechanisms, the Committee's "corrective" focus is almost exclusively on prohibitions or limitations of agency practices. I hope this approach to remedial action will not be read as broad criticism of the overall performanc. e of the intelligence community or a minimization of the Committee's own finding that "... a fair assessment must place a major part of the blame upon the failures of senior executive officials and Congress." In fact, I am persnaded that the failure of high officials to investigate these abuses or to terminate them when they learned of them was almost as reprehensible as the abuses themselves. A further objectionable aspect of the Committee's approach is the scope of the proposed limitations on the use of electronic surveillance and informants as investigative techniques. With respect to electronic surveillance of Americans suspected of intelligence activities inimical to the national interest, the Committee would limit authority for such probes to violations of specific criminal statutes. This proposal fails to address the real problem of utilizing electronic surveillance against myriad forms of espionage. A majority of the Committee recommended this narrow standard while acknowledging that existing statutes offer inadequate coverage of "modern forms of espionage." The Committee took no testimony on revision of the espionage laws and 575 simply proposed that another committee "explore the necessity for amendments." To prohibit electronic surveillance in these cases pending such revision is to sanction an unnecessary risk to the national security. In adopting this position the Committee not only ignores the fact that appellate courts in two federal circuits have upheld the Executives inherent authority to conduct such surveillance, but also fails to endorse the Attorney General's comprehensive proposal to remedy objection to current practices. The proposed safeguards, which include requirements for the Attorney General's certification of hostile foreign intelligence involvement and issuance of a judicial warrant as a condition precedent to electronic surveillance, represent a significant expansion of civil liberties protections. The proposal enjoys bi-partisan support in Congress and I join those members urging prompt enactment. I am also opposed to the methods and means proposed by the Committee to regulate the use of informants. Informants have been in the past and will remain in the future a vital tool of law enforcement. To adopt the Committee's position and impose stringent, mechanical time limits on the use of informants-particularly regarding their use against terrorist or hostile foreign intelligence activities in the United States--would be to place our faith in standards which are not only illusory, but unworkable. In its overly broad approach to eliminating intelligence abuses, the Committee report urges departure from the Congress' role as a partner in national security policy and comes dangerously close to being a blueprint for authorizing Congressional management of the day-today affairs of the intelligence community. Whether this management is attempted through prior notification or a shopping list of prohibitive statutes and regulations, it is a task for which the legislative branch of government is ill-suited. I believe the adverse impact which would be occasioned by enactment of all the Committee recommendations would be substantial. Substantial segments of the Committee's work product will assist this Congress in proceeding with the task of insuring the conduct of necessary intelligence activities in a manner consistent with our obligation to safeguard the rights of American citizens. However, we must now step back from the klieg lights and abuse-dominated atmosphere, and balance our findings and recommendations with a recognition that our intelligence agencies and the men and women who serve therein have been and will always be essential to the existence of our nation. TIlis Committee was asked to provide a constitutionally acceptable framework for Congress to assist in that mission. We were not mandated to render our intelligence systems so constrained as to be fit for employment only in an ideal world. In addition to the above remarks I generally endorse the positions set forth in Senator Baker's individual vie"\Ys. I specifically endorse: His views stating the need for legislation making it a criminal offense to pnblish the name of a Fnited States intelligence officer stationed abroad under cover. 576 His position that there must be a system of greater accountability by our intelligence operations to the United States Congress and the American people. His concern that the Congress exercise caution to insure that a proper predicate exists before any recommendations for permanent reforms are enacted into law. His view that there be careful study before endorsing the Committee's far reaching recommendations calling for an alteration of the intelligence community structure. I also support the individual views of Senator Goldwater. Further, I specifically endorse: His assessment that only a small segment of the American public has eyer doubted the integrity of our Nation's intelligence agenCIes. His opinion that an intelligence system, however secret, does not place undue strain on our nation's constitutional government. His excellent statement concerning covert action as an essential tool of the President's foreign policy arsenal. His opposition to the publication of an annual aggregate figure for United States intelligence and his reasons therefor. His views and comments on the Committee's recommendations regarding the National Security Council and the Office of the President. Specifically, comments number 12, 13 and 14. His views challenging the proposed limitation concerning the recruitment of foreigners by the Central Intelligence Agency. His views and general comments concerning the right of every American, including academics, clergymen, businessmen and others, to cooperate with his government in its lawful pursuits. For the reasons stated above, I regret that I am unable to sign the final report of the Select Committee to Study Governmental Operations With Respect to Intelligence Activities. JOHN G. TOWER, Vice Ohairman. INDIVIDUAL VIEWS OF SENATOR BARRY GOLDWATER This final report of the Select Committee on Intelligence Activities must be read with care. Historically, the work of the Committee and its report are an outgrowth of a period in which disillusionment, dismay, and disaffection were all too prevalent in America. Failure in Vietnam and the Watergate scandals were prime contributors to the foregoing and helped produce a feeling that the ship of state was rudderless. Under these circumstances of confusion, the basic premises of our foreign policy came into question, with some taking refuge in isolationism as the only way out. Others reacted as though some demon needed to be exorcized and launched a kind of guerilla attack upon our foreign policy. Pressure from the new isolationists and the demonologists forced a skittish Congress into asserting a greater influence over the conduct of our foreign policy. The results were mostly bad: -Two good allies, Greece and Turkey, were alienated. -Jewish emigration from Russia was reduced. -The hands of our President were tied in the day-to-day conduct of foreign policy. -U.S. intelligence was demoralized and its efl'ctiveness @:reatly diminished. -Our allies came to seriously question America's reliability, if not our collective sanity. -Our adversaries took comfort in watching us tear ourselves apart. In the field of intelligence activities, the worst of it all occurred in the Senate on October 2,1974 when the Hughes Amendment (ultimately the Hughes-Ryan Amendment) was included in the foreign aid bill. Under its provisions, six committees of the Congress are required to be informed of any covert action conducted abroad. This means that approximately 50 Senators and over 120 Congressmen may receive highly sensitive information on a covert action program. It also means that public disclosure is almost inevitable, as proved to be the case in Angola. As the Soviet Union moved decisively in Africa, pushing its Cuban mercenaries in the vanguard, and as the word "detente" came more and more to 'be understood as a game played under rules favorable to Moscow, a new appraisal seemed to be arising among our fellow citizens: The pendulum had swung too far and much damage was being done to the Nation's foreign policy and the organizations necessary to its conduct. The foregoing was largely in the past tense, because it is my hope and belief that the period of self-criticism, if not self-flagellation, is coming (577) 578 to an end. If not, our once proud and strong Nation is headed for very hard times. COVERT ACTION IN CHILE-1963-1973 Throughout the "Foreign and Military Intelligence" section of tihe Committee~s final report, there are references to covert action in Chile which are based on a staff report of the Committee entitled, "Covert Action in Chile-1963-1973." Because the report was a "staff report," Senators on the Commitee were n()lt entitled to submit opposing views. In my opinion, the staff report is 'a distort-ion of history and will not stand the test of time. The following is what I believe to be a :fair representation of events in Chile from 1963 to 1973 and any U.S. involvement. On December 4, 1973, the Senate Seled Committee on Intelligence Activities held public hearings on covert action in Chile covering the years 1963 to 1973. In his opening stJatement, Chail"II1an Church stated that, "The nature and extent of the American role in the overthrow ofa democra:tically-elected Chilean government are matters for deep and continuing public concern." The Chairman then introduced the staff director, who with other members of the staff, summarized a staff report entitled, "Oovert Action in Ohile 1963-1973." The staff conclusion was even more specific: "In the period 1970 through 1973, in order to prevent a Marxist leader from coming to power by democratic means, the U.S. worked through covert·aotion to subvert democraJtic processes.... this interference in the internal affairs of 'another country served to weaken the party we sought to assist and created internal dissensions which, over time, led to the weakening and, for the present time at lea:st, an end to constitutional government in Chile." These assertions, and the Committee report on which they are based, are misleading because they make it appear that the United States was responsible for the downfall of a respectable and truly democratic government. The real character of Allende and his coalition was ignored by excluding both public statements of philosophy and intent as well as the public record of highly illegal actions while in office. Omitting publicly available information (not to mention the exclusion of voluminous classified intelligence dealing with Chilean support of Soviet and Cuban international subversion) makes it difficult for the American public to understand why anti-Allende operations were undertaken by three successive U.S. administrat,ions. Moreover, the report concludes that "fears, often badly exaggerated or distort.W, appear to have activaJt:ed officials in Washington." Thus, Oovert Action in Ohile 1963-1973 leaves the impression of U.S. bungling in Chilean affairs induced by a corrosive fear of commllnism and Marxism. 'While there may have 'been some mistakes made in the conduct of our affairs in Chile, the threat of a communist dictatorship under Allende was very real. To set the record strllJight, here are :fac.ts that should be taken into account: 1. Salvador Allende and the Unidad Popular An avowed Marxist-Leninist. All('nrle narticipated in the creation of the Chilean Socialist Party in 1933, the year he graduated from medical school. He was elected a Federal Deputy in 1937, and was 579 named Secretary-General of the Socialist Party in 1943. Since its inception, the Chilean Socialist Party has been an extreme interpreter of Marxist-Leninist dogma, espousing violent revolution for Chile and the rest of Latin America. Castro's Cuba became the Socialist model, and many young Socialists were trained in Cuba in guerilla warfare as well as in politiool action. Allende personally headed the Chilean delegation to the 1966 Tricontinental Conference in Havana and was a key figure in the creation of the Cuban-sponsored Latin America Solidarity Organization called LASO---created specifically to foment guerilla warfare in Latin America. It was the guiding force for the "Che" Guevara Guerrilla adventure in Bolivia in 1967. In January 1970, Allende was listed as a director of the Chilean Committee of Support for the Bolivian People and the National Liberation Army, known as ELN. Meanwhile the stronger, but less violent, Chilean Communist Party had joined the Socialist Party in a coalition which backed Allende as its presidential candidate in four presidential elections (1952, 1958, 1964 and 1970.) Allende was an active member of many Communist front organizations, particularly the World Peace Council, of which he was Vice-President during his first visit to the USSR in 1954. Intellig-ence gathered over a period of many years has provided what Ambassador Korry calls "certain knowledge that the Soviet Union and other Communist governments and organizations provided substantial sums for covert political action to the Communist Party, to the Socialist Party, and to Allende himself." The significance of Allende's election as President of Chile was thus reltdily apparent or should have been. Allende affirmed publicly in his 1970 campaign, as he had in previous campaigns for the presidency, that his intention was to bring about an irreversible Marxist revolution in Chile. He viewed himself as the man who WQuld do what Castro failed to do: destroy America's leadership in Latin America. Allende minced no pre-election words. Prior to his election. he stated flat out tha;t the United States was to be treated as "public enemy number one" in the western hemisphere. Allende's tactics centered on using constitutional tools to fashion a socialist revolution, but he never pretended to expouse traditional parliamentary democracy. A minority president who received only 36.5% of the popular vote, he declared three months after taking office: I am the President of the Unidad Popular. I am not the President of all the Chileans. He and Castro chose to follow different roads, but Allende's intentions were never really masked. To quote again from his 1970 presidential campaign: Cuba in the Caribbean and a Socialist Chile in the Southern Cone will make the revolution in Latin America. Was this empty campaign rhetoric? Soon after the 1970 election, Allende met secretly with Latin American revolutionaries and pledged covert support to them. Ambassador Korry has written: "In 1970, as in 1963, we know beyond a shadow 580 ofa reasonable doubt that an Allende government intended to use the processes and laws of what it called formal democracy to eliminate and replace it with what it called popular democracy. (From 1961 to 1970, the Embassy, like the majority of Congress, agreed that such a development would do serious harm to U.S. interests and influence- for-good in the world.)" 2. Efforts of the Allende Government to Destroy Democratic Institutwns Communist Party leaders were largely in charge of the economic program of the Allende government. The communists intended gradually to replace private enterprise by State enterprise, thus enabling the government to assume complete social and economic power. The government, therefore, drew up a list of all Chilean corporations whose capital reserves exceeded $500,000. These companies, representing 82% of the capital holding-s of all companies incorporated in Chile, were earmarked for nationalization. Congress atempted to block this government program by passing legislation defining the economic areas subject to government ownership, but the government continued to take over Chilean firms, using methods which became progressively more illegal. These methods ranged from expropriations (declared unconstitutional by the Chilean Supreme Court), to requisitions (many of which were declared illegal by the Chilean Office of the Comptroller General), to "decrees of insistence" (a rarely used judicial tool created to resolve differences of legal interpretations between the judiciary and the executive) . In agriculture, all farms exceeding 80 hectares of irrigated land were made subject to legal expropriation. These "legal" expropriations were supplemented by those of roving armed bands who took possession of agricultural properties by force without any intervention by the Chilean police. Similarly, a series of economic pressures was exerted to silence the independent media, including coercion, bribery, the manipulation of government control over credit, imports and prices, and the incitement of strikes. As an adjunct to economic pressures, the Allende government began to develop the concept of "popular power", creating parallel revolutionary organizations which duplicated the functions of existing legal organizations. For example, special communal commands, known as JAPS, were established to control the distribution of essential articles, mainly food. Government supplies were channeled throu~h these new organizations rather than through established retailed outlets. Of Soviet oripin, the communal commands had the dual function of displacing "bourgeois" organizations and of training their members for armed revolution. Prior to the Allende regime, Chile had a strong democratic tradition and a firm commitment to constitutional processes. Under the Allende regime, its institutions fought long and tenaciously to save themselves from destruction by legal, constitutional means. When the government violated Chilean law, protests were filed with the courts and "contraloria." 1 1 (Comptroller-General of the Republic, who supervised the legality of the government's actions.) 581 When the courts and the Contraloria objected to these violations, however, the government either paid no heed to these decisions or overruled them through "decrees of insistence", which were themselves illegal. The National Congress also tried to check these violations of the law by impeaching the ministers responsible for them, but Allende merely moved the ousted ministers from one post to another, thus thwarting the purpose of Congressional sanctions. Finally, when all the protests of the Congress, the courts and the Contraloria had been repeatedly ignored, these bodies solemnly declared that the Allende government had placed itself outside both the law and the Constitution. These declarations were made by the Supreme Court on May 26, 1973, by the Contraloria on July 2, 1973, and by the Chamber of Deputies on August 22, 1973. The full text of the Chamber of Deputies resolution, and that of a subsequent August 29, 1973 Report of the Bar Association are appended in full, because they record many of the abuses and illegalities of the Allende government and also illustrate the inability of true democratic institutions to coexist with a Marxist government. The Chamber's declaration was, in fact, a notice to the armed forces that the legal and constitutional order of the country had broken down. The military coup of September 11, 1973 was the tragic climax of a long process of political polarization, exacerbated by the worst economic crisis in Chile's history : -Inflation exceeded 300% in 1973; -the trade balance deficit in the same year exceeded $450 million; -the foreign debt increased 60% in three years. As the economic situation deteriorated, strikes proliferated', crippling the country. It was not U.S. "interference," but rather a minority's attempt to impose doctrinaire Marxism on a democratic framework, which led to the establishment of the present military government. 3. Ohile: a B~e for Soviet ana Ouban Subversion Within the Allende government, the Communist Party was largely responsible for running the economic pro~am, counting heavily on Soviet support. There were 1,300-odd Soviets in Chile as of March 1972. Soviet Bloc credits of some $200 million had been extended. Moreover, the Soviets were dangling an offer of $300 million to the Chilean military for the purchase of miJitary equipment. The Soviets, however, left to the Cubans most of the revolutionary guidance and support provided to the Allende coalition. Under Allende. Chile became the center for Cuban operations in the southern cone of Latin America. Juan Carretero Ibanez, alias "Ariel", former chief of the Cuban Liberation Directorate (LD) for Latin America (the Cuban intelligence and executive action agency) arrived in Chile in October 1970 just prior to Allende's inauguration. He was soon followed by Luis Fernandez Ona, a senior intelligence officer of the DGI who became Allende's son-in-law. Chile re-established diplomatic relations with Cuba and the Cuban Embassy rapidly reached a 582 strength of 54 (later nearly 100) officers. Cuban visitors to Chile averaged 100 per month. Cuban support to the Chilean government was primarily in the security field. The Cubans trained and armed the Presidential security guard, and also helped to develop an intelligence organization which functioned independently of established government services. Chilean police were trained in repressive security tactics, such as setting up neighborhood informant systems. The Cubans also provided arms, funds, and guerrilla training to hundreds of members of the Socialist Party and other far leftist Chilean militia groups. Dozens of crates of arms, mostly of Soviet and Czech origin, we'l'e found stored in Allende's Santiago home and mountain retreat after he was overthrown. These crates had been flown in as "gifts" by Cuban airlines. The Cuban intelligence effort in Chile, concentrated on exporting revolution to other Latin American countries, primarily Bolivia but also Argentina, Brazil and Uruguay. Some ten to fifteen thousand foreign revolutionaries flocked into Chile, where the Cuban LD center conducted a thriving business. The Center had a unit for providing false documents and training, and its operatives met revolutionaries in exile and visitors from other countries to receive their reports, pass money, arrange travel to Cuba and direct their activities. In November 1971 Bolivian exiles in Chile announced formation of the Anti-Imperialist Revolutionary Front, known as FHA, which included the ELN. Its mission was to replace the Banzer Government with a government of the "proletariat". A number of FHA leaders in Chile travelled to and from Cuba. A massing of FRA exiles on the Chilean border drew official protests from the Bolivian government in April 1972. Chile also served as a support base for the Argentine terrorist organization PRT/ERP. (Subsequently the PRT/ERP was responsible for such actions as the abduction and shooting of a State Department official and for extracting ransom in excess of $20,000,000 from U.S. firms in Argentina.) 4. Actions of Allende's Coalition Subsequent to the March 1973 Elections Like the other Unidad Popular parties, the Communist Party, known as the PCCR, began almost immediately after Allende's election to arm and train its membership in paramilitary tactics. Prior to March 1973, however, the Communist Party publicly and privately advocated policies designed to lull the political opposition and military into believing that the government would not resort to flagrant violations of the Chilean constitution. The PCCR believed that time was on the side of the government, and that the political opposition would be effectively stifled by progressively increasing government control of the economy. This posture changed with the March 1973 congressional elections, which showed that the Christian Democrats and other parties in the political opposition were gaining rather than losing ground. The Communists, realizing that force was the only way to guarantee the continuance of the Marxist government, then joined the Socialist Party in pressing Allende to take harsher measures against the opposition. 583 After the September 1, 1973 coup, the junta government charged that the Unidad Popular had been planning a terrorist action, which was known as "Plan Z" and called for the assassination of military and opposition leaders as part of a move to secure total control of the country. A reliable leftist military source, who was in Chile prior to and during the military rebellion, confirmed that the leftist forces had indeed planned a pre-emptive move against the military, to have taken place during the independence celebrati?ns of Septem~e.r 17-18, 197? The documents and large arms caches dIscovered by mIlItary authorIties after the coup suggest that Plan Z may indeed have existed. A complete and fair assessment of the U.S. role in Chile can only be made if the following are taken into account: 1. The character of the Allende regime as revealed by public statements and by the nature of the political parties from which he drew support; 2. Efforts of the Allende regime to manipulate and ultimately destroy constitutional democracy; 3. Soviet and Cuban use of Chile as a base for international subversion; 4. The possibility that the Marxists were planning a pre-emptive and bloody coup to seize power totally. The Senate Select Committee Staff Report on Chile concludes that "fears, often badly exag~eratedand distored, appear to have activated officials in Washington." But even the National Intelligence Estimate cited as endorsing this conclusion was published on June 14, 1973 and was written before Allende's violations of civil liberties were intensified. In the months after the Estimate the country's democratic processes were reduced to chaos and provoked the solemn declarations by the Supreme Court, Comptroller-General and Chamber of Deputies mentioned earlier. U.S. policy toward Chile from 1962 to 1970 was consistent in attempting to prevent the take-over of the Government of Chile by Allende and his totalitarian Communist and Socialist supporters. The actions of the Allende regime after 1970 proves the wisdom of that policy. In Chile, the U.S. was acting within the broad mainstream of traditional U.S. policy in Latin America, which has been to resist encroachment by powers outside the Western Hempishere. The USSR dealt with the Allende government (and with the Chilean Communist Party, before and after Allende's election) at the very highest level. For example. the Soviet Ambassador to Allende's Chile, Alexander Vasilyevich Rasov, was oneoT only three members ofthe Central Committee of the Communist Partv to he stationed in non-Communist capitals. The other two being in Washintgon and Paris. The Allende experiment in Chile was seen bv the Soviets as a model for other strategic countries. It is worth noting' that both the Soviets and the Cubans considered the overthrow of the Allende government in Chile as a disaster to their interests. In their comments on Chile. the Soviets emphasize that Chile proves the thesis that '~socialist revolntion" !'hould never be attempted without political control of the military forces. There can he honest differences of oninion about the wisdom of American policy toward Chile over the last decade. What is missing 584 in the Staff report is the acknowledgement of a viewpoint contrary to its own conception: that "\Vashington opinionmakers were activated by badly exaggerated and distorted fears. History has proved that minority Communist and radical Marxist parties ultimately destroy the elements of democracy and diversity which enable them to gain power. Allende clearly stated his intent to bring about an irreversible Marxist revolution in Chile. Had the facts presented here been made available to the reader of the Staff Report, that reader might have concluded that U.S. Government fears were not "exaggerated or distorted", and might have concluded that the U.S. was essentially correct in its Chilean policy. This policy, prior to 1970, was to prevent a convinced Marxist from taking power and after 1970 strove to support and sustain until the 1976 elections a democratic opposition to a government which, by 1973, was clearly operating outside the laws and Constitution of Chile. The results of the disclosures of sensitive classified data which were made during open hearings and in the published report on Chile will not be evident for some time to come, but two recent developments may be of interest. First, the conclusion to the Staff Report sta:tes that "it would be the final irony of a decade of covert action in Chile if that action destroyed the credibility of the Chilean Christian Democrats." According to an official report received by this Government, "ExPresident Frei feels completely shattered as a result of the release of the Senate report ... and has confided to friends that it has brought his political career to a close ... The source commented tha:t it is ironic that U.S. congressional distaste for the role of the U.S. Government against the Allende Government may have succeeded in destroying the only viable alternative to the present Chilean government." Second, data taken from the Report are being used to give credibility to false allegations about the Agency. An example is the WashinQton Post article of ,ranuary 16, 197'6 by Walter Pincus entitled "CIA Funding Journalistic Network Abroad." After quoting data taken from the Chile Report, the author quotes "a former intelligence agent" as claiming that the CIA subsidized the Latin American news service LATIN in much the same manner as it gave money to "EI Mercurio." The true fact is that the CIA never gave any help, financial or otherwise, to LATIN, but this false allegation has been tied in with facts published in the Staff Report in such a way as to make it appear to have the Senate stamp of approval. As of this writing AnQ'ola has fa,llen into the hands of a revolutionary gTouP backed by the Soviet Union. The winning element was thousands of Cuban soldiers supplied with Russian weaponry. In other words. the Soviet Union used Cuban soldiers in Angola much the same way as Hessians were employed by the British during our own Revolutionarv War. To the world. the Soviet Union is boasting of its victory and the defeat of the U.S. There is an ironical, if not tragic. postlude to the report Oovert Action in Ohile 196/'1-1973. On December 17, 1975 Fidel Castro made 585 a speech which quoted several paragraphs of the Report. Here is Fidel Castro's accolade: ... We consider the revelation of the report a positive move by the Senate committee despite the opposition of the President of the United States, even when much information was omitted because of pressure from the CIA itself and from the President's office.... FOREIGN AKD MILITARY FIXDINGS AND RECOMMENDATIONS Turning to the report entitled "Findings and Recommend9:tions of the Committee: Foreign and Military," two general observatIOns can be made: 1. Much of the supporting evidence or information for this section of the report is drawn from a series of staff studies which have n?t been considered by the full committee in their final form as of th~ writing. Moreover, the staff reports are wider in scope than the testImony taken by the full committee. 2. Recommendations for reorganization of the intelligence community are not backed up by sufficient testimony or analysis. Below are some detailed comments on the report. They follow the heading given on the "Contents" page. 1.11istoricallVote The Select Committee on Intelligence Activities spent nearly $3 million and over 15 months investigating the intelligence community, and it had a peak staff of over 120 professionals, consultants, and clerical personnel. I believe these facts should be a matter of record, because no excuses can be made for the final report based on a lack of time, money, or personnel. In fact, the Senate was more than generous in providing repeated extensions of time and money to the Select Committee. The results speak for themselves. The truth of the matter is that approximately 6 months was spent in a fruitless investigation into alleged assassination attempts. During the course of the investigation of assassination attempts, not one bona fide assassination ordered by the U.s. Government wac;; discovered. What did emerge were attempts on the life of Fidel Castro during the early 60's when our relations with Cuba were very close to being a state of war. In any event, much time and effort was frittered away in this unproductive exercise. A. INTRODUCTION AND GENERAL FINDINGS Oommittee Report: ... Allerrations of ahuRe, revelations in the press, and the results of the Committee's 15 month inquiry have underlined the necessitv to restore confidence ill the iptplYl'ity of our Nation's intelligence agencies.... (See p. 423.) . 586 Oomment: Only a small segment of American public opinion has ever had any doubts in the integrity of our Nation's intelligence agencies. In general, the American people fully support our intelligence services and recognize them as the Nation's front line of defense. Accordingly, the use of the word "restore" is misleading. Oommittee Report: · . . At the same time, the Committee finds that the operation of an extensive and necessarily secret intelligence system places severe strains on the nation's constitutional government. . . . (See p. 425.) Oomment: It is not the operation of an intelligence system that strains our nation's constitutional government. Any strains that exist are the direct result. of Presidential- misuse, misunderstanding, or abnsl1 of the nation's intelligence capabilities. It should be noted that the report correctly salutes the men and women of the intelligence community, and also correctly points out that the 'Soviet KGB and other hostile intelligence services conduct spying and covert operations-(not to mention assassinations) . Oommittee Report: · .. The Committee finds that covert action operations have not been an exceptional instrument used only in rare instances when the vital interests of the United States have been at stake. On the contrary, presidents and administrations have made excessive, and at times self-defeating, use of covert action. In addition, covert action has become a routine program with a bureaucratic momentum of its own. The longterm impact, at home and abroad, of repeated disclosure of U.S. covert action never appears to have been assesed. The cumulative effect of covert actions has been increasingly costly to American interests and reputation. The Committee believes that covert action must be employed only in the most extraordinary circumstances. Oomment: Covert action is intended to provide the President of the U.S. and the nation with a range of actions short of war to preserve the free world and to thwart the global ambitions of Corrununist imperialism. Covert operations can and should be used in circumstances which might not be described as "vital" but are nevertheless neres· sary to prevent a crisis from occurring. One of the pnrposes of covert action is to prevent the occurrence of "most extraordinary circumstances." Those who support the above-mentioned quotation are in effect saying: "Don't put out the fire while it is small; wait until it becomes a conflagration." Oommittee Report: · .. Although there is a question as to the extent to which the Constitution requires publication of intelligence expen587 ditures information, the Committee finds that the Constitution at least requires public disclosure and authorization of an annual aggregate figure for United States national intelligence activities. . . . (See p. 425.) Comment: Publication of an annual aggregate figure for U.S. intelligence may appear to be innocent especIally because estimates, with varying degrees of accuracy, have appeared in the press. "Whether or not the Constitution requires such a disclosure is open to question. Traditionally, nations have kept their intelligence budgets secret for at least two reasons: First, they did not want to officially acknowledge the fact of these activities. Second, the publication of a figure might give potential adversaries some indication of the magnitude of their intelligence efforts. Both of these arguments may be somewhat obsolete in a world where little, if anything, is considered private. There is still another objection which I submit cannot be discounted: Disclosing an annual aggregate figure will inevitably lead to demands for a breakdown of that figure. If these demands cannot be resisted, ultimately we would hand our adversaries very important indicators concerning the magnitude and thrust of our intelligence activities. In addition, our allies would be inclined to view such a step as one more signal that America is unable to protect its secrets leading to a possible further erosion of cooperative intelligence efforts. In any event, this matter should be decided by a vote of the entire Senate. D. THE NATIOXAL SECURITY COUXCIL AXD THE OFFICE OF THE PRESIDENT Oommittee Report: . . . The Central Intelligence Agency, in broad terms, is. not "out of control." ... (See p. 27.) Oomment: After having heard the CIA described as a "rogue elephant run rampant", it is gratifying that the Committee now finds the CIA is not "out of control." Oommittee Report: ... 12. By statute, the Secretary of State should be designated as the principal administration spokesman to the Congress on the policy and purpose underlying covert action projects. . . . (See p. 430.) Comment: Making the Secretarv of State the spokesman for covert action could place him in a diplomatically untenable position. 'Vhat is meant by "the Congress" in this context? This recommendation is vague and if enacted into the statutes could overburden the Secretary of State, who has more than enough work to do. 588 Oommittee Report: ... 13. By statute, the Director of Central Intelligence should be required to fully inform the intelligence oversight committee (s) of the Congress of each covert action prior to its initiation. No funds should be expended on any covert action unless and until the President certifies and provides to the congressional intelligence oversight committee (s) the reasons that a covert action is required by extraordinary circumstances to deal with grave threats to the national security of the United States. The congressional intelligence oversight committee (s) should be kept fully and currently informed of all covert action projects, and the DCI should submit a semi-annual report on all such projects to the committee (s). (See p. 430.) Oomment: As mentioned in the introduction, the operation of the HughesRyan Amendment requires 6 committees to be informed of any covert action. This recommendation would merely add another layer to the cake in the absence of a repeal of the Hughes-Ryan Amendment. If the Oongresi> could agree that only a joint committee on intelligence or -preferably the House and Senate Armed Services Committees were to be informed, I might be able to su-ppoti the concept of prior notification. Prior notification raises an important point that should be carefully considered by the Congress: Does the OmgTess intend to share responsibility with the President for covert a<ltions~ In other words, will the Congress be content to accept our successes as well as our failures as secrets ~ oommittee Report: ... 14. The Committee recommends that when the Senate establishes an intelligence oversight committee with authority to authorize the national- intelligence budget, the HughesRyan Amendment (22 U.S.C., Section 2422) should be amended so that the foregoing notifications and Presidential certifications to the Senate are provided only to that committee.... (Seep. 431.) Oomment: This recommeni1ation presupposes that the House of Representatives wonld be willing to accept the creation of a Senate committee as a sufficient reaSQIl to repeal the Hughes-Ryan Amendment. In the absence. of an agreement with the House on repeal, this recommendation is meaningless. F. THE CENTRAL INTELLIGENCE AGENCY Oommittee Report: ... The Committee also questions the recruiting. for foreign esnionage purposes. of immigrants desiring American citi:r.enship because it might be construed as coercive. . . . (See p. 439.) 589 Oomment: Why should any category of foreigner be excl.uded from rec~u~~ment by the CIA? Does the Committee have any valId reason why It questions" that any such recruitments "might be construed as coercive?" I submit it doesn't. Finally, if the Committee believes that coercion should not be used in the handling of immigrants, then it should say so. Oommittee Report: ... 27. The congressional intelligence oversight committee should consider whether: -the Domestic Collection Service (overt collection operations) should be removed from the Directorate of Operations (the Clandestine Service), and returned to the Directorate of Intelligence; . -The CIA regulations should require that DOD's overt contacts be informed when they are to be used for operational support of clandestine activities; -The CIA regulations should prohibit recruiting as agents immigrants who have applied for American citizenship.... (See p. 442.) Oomment: Until 1973 the Domestic Contact Service was part of the Directorate of Intelligence. It was placed under the Directorate of Operations to enable the CIA to provide better support for the Foreign Resources Division. Because the Domestic Contact Service has contacts with leaders in all walks of life, it possesses a unique capability to open the door for the clandestine services. Requiring that the Domestic Contact Service inform overt contacts that they are to be used for operational support of clandestine activities violates the important rule of compartmentalization. As previously noted, there is no valid reason for excluding immigrants unless coercion is part of the process. Oommittee Report: ... Some covert operations have passed retrospect public judgments, such as the support given Western European democratic parties facing strong communist opposition in the late 1940s and 1950s. Others have not. In the view of the Committee, the covert harassment of the democratically elected government of Salvador Allende in Chile did not command U.S. public approval. (See page 445.) Oomment: Here as in other parts of the report the story of w'hat happened in Chile under Salvador Allende is distorted. While 'the Allende regime may have been "democratically elected'" it gradually evolved into an abusive left-Iwing dict'atorship. (See the preceding part of these individual views entitled 001lert Action in Ohile 1963-1973 as well as the comments of Senator .Tames L. Buckley in the Oongressional Record of February 26, 1976.) 590 Oommittee Report: · . . 36. The Committee has already re<lommended, following its investigation of alleged assassination attempts directed. at foreign leaders, a statute to forbid such activities. The Committee reaffirms its support for such a statute and further recommends prohibition by statute of the following covert activities : -All political assassinations. -Efforts to subvert democratic governments. -'Support for police or other internal security forces which engage in the systematic violation of human rights. . . . (See p. 448.) Oomment: Prohibiting "efforts to subvert democratic governments" is a vague phrase, because there is no standard set as to what constitutes "democratic" governments. It also raises the problem of what the U.S. may do when a democratic government is 'headed inexorably towards dictatorship of the right or the left, and that this process may lead to a government which is hostile to America. Here again, we are confronted with the problem of putting out a fire while it is small as opposed to waiting- until it becomes a conflagration. In some instances it is necessary for U.S. intellig-ence services to cooperate with the internal security forces of nations where thecre is systematic violation of human rights. The purpose of such cooperation is to gain foreign intelligence on vital targets. In order to gain the cooperation of the internal security forces in these countries, support is sometimes a condition for cooperation. In a world \Where the number of authoritarian regimes far outnumbers the number of democratic governments, such a prohibition limits the flexibility of our intelligence services in defending America. Oommittee Report: · .. 39. By statute, any covert use by the U.S. Government of American citizens as combatants should be preceded by notification required for all covert 'actions. The statute should provide 'that within 60 days of such notification such use shall be terminated unless the Congress has specifically authorized such use. The Congress should be empowered to terminate such use at any time.... (See p. 449.) Oomment: If such a statute is enacted, 'the intellig-ence services will have to place gre:ater reliance on foreign mercenaries for covert action. 'While I have no objection to the use of foreigners for this purpose, Americans are much more likely to serve loyally and courageously. Oommittee Report: · .. 42. The Committee is concerned about the integrity of American academic institutions for clandestine purposes. Accordingly. the Committee rPC'ommends that the CIA amend its internal directives to require that-individual academies 591 used for operational purposes by the CIA, together with the President or equivalent official of the relevant academic institutions, be informed of the clandestine CIA relationship. (See page 456.) Oomment: While I believe that any institution or org-anization has the right to take positions on domestic or foreign polley issues, I also believe each individual American has the right to cooperate with his government in its lawful pursuits. I submit this right should apply to academics, clergymen, businessmen, union mem'bers, newsmen, etc. The more groups we exclude from assisting the intelligence community, the poorer our intelligence will be. Surely, our values have been turned upside down, when cooperating with the CIA is viewed as unseemly or degrading. Oommittee Report: · .. 54. By statute, the CIA should be prohibited from causing, funding, or encouraging actions by liaison services which are forbidden to the CIA. Furthermore, the fact that a particular project, action or activity of the CIA is carried out through or by a foreign liaison service should not relieve the Agency of its responsibilities for clearance within the Agency, within the executive branch, or with the Congress.... (See p. 459.) Oomment: In order to gain foreign intelligence the CIA sometimes enters into liaison operations with foreign services who may engage in activities that would be unacceptable within the United States. Some of these services are creatures of governments whose policies both domestic and foreign are unpalatable to American public opinion. The problem with Recommendation 54 is the use of the word "funding." It may not always be possible for the CIA to fully determine how funds to foreign services have in fact been used. oommittee Report: · .. 55. The intellie:ence oversight committee (s) of Congress should be kept fully informed of agreements negotiated with other governments through intelligence channels. . . . (See p.459.) Oomment: If this requirement comes into effect, foreign intelligence services are going to be reluctant to enter into liaison arrangements with the CIA. Public disclosure of CIA activities over the past few years has already had a chilling effect on liaison operations. Let's not compound the felony. Oommittee Report: · .. 64. By statute, the General Counsel should be nominated by the President and confirmed by the Senate.... (See p. 461.) 592 Oomment: It is contrary to precedent to have the General Counsels of agencies and bureaus nominated by the President and subject to Senate confirmation. The General Counsel of any agency should be the choice of its chief executive officer. Oommittee Report: · .. 68. B. The Director of the CIA should be appointed by the President and subject to confirmation by the United States Senate. Either the Director or Deputy Director should be a civilian. . . . (See p. 465.) Oomment: Why should the Director or Deputy Director of the CIA be a civilian? First, this implies a lack of integrity or ability among our uniformed services. Second, the CIA was created to provide a civilian organization that, among other things, would offset any bias in the military intelligence services. Oommittee Report: · .. 69. By statute, a charter for the NSA should be established which, in addition to setting limitations on the operation of the Agency (see Domestic Subcommittee Recommendations), would provide that the Director of NSA would be nominated by the President and subject to confirmation by the Senate. The Director should serve at the pleasure of the President but for not more than ten years. Either the Director or Deputy Director should be a civilian.... (See p. 465.) Oomment: I agree that a charter for the NSA is desirable. Because the NSA is a service organi7,ation under the Department of Defense, I fail to see why the Director should be nominated by the President and confirmed by the Senate. NSA has a large proportion of civilians, and I can see no valid reason for prohibiting one of them rising to Director or Deputy Director. Nevertheless, Recommendation 69 repeats the implied insult mentioned above in connection with the DIA. L. THE DEPARTMENT OF STATE AXD AMBASSADORS Oommittee Report: · . . 71. The National Security Council, the Department of State, and the Central Intelligence Agency should promptly issue. instructions implementing Public Law 93-475 (22 U.S.G. 2680a). These instructions should make clear that Ambassadors are authorized recipients of sources and methods of information concerning all intelligence activities, including espionage and counterintelligence operations. Parallel instructions from other components of the intelligence community should be issued to their respective field organizations 593 and operatives. Copies of all these instructions should be made available to the intelligence oversight committee(s) of Congress. (See p. 468. ) 72. In the exercise of their statutory responsibilities, Ambassadors should have the personal right, which may not be delegated, of access to the operational communications of the CIA's Clandestine Service in the country to which they are assigned. Any exceptions should have the approval of the President and be brought to the attention of the oversight committee. . . . (See p. 468.) Oomment: As a general statement, I cannot take exception to the concept that Ambassadors should be privy to all of the activities within their missions. There may be instances where the Chief of Station believes that the identity of a particular intelligence source should not be made known to the Ambassador. Rather than giving the Ambassador the final say under these circumstances, I believe both the Ambassador and the Chief of Station should have the right to appeal to the Secretary of State and the DCI. Recommendation 72 is closely related to Recommendation 71 in that it extends the Ambassador's authority over the CIA Chief of Station. Here again, I believe the general statement is correct but that provision should be made for exceptional cases as previously stated. I believe exceptions in some cases should be worked out between the Secretary of State and the DCI rather than having to be submitted directly to the President. I have refused to sign the final report of the Select Committee on Intelligence Activities in the belief that it will cause severe embarrassment, if not grave harm, to the Nation's foreign policy. A lengthy report of this nature, produced under heavy deadline pressure, further increases the possibility of embarrassment and unintentional security violations. Finally, the majority report tends to blacken the reputation of agencies and persons who have served America well. Senate Resolution 21 that created the Select Committee held the promise of a calm and deliberate investigation. That promise was not fulfilled, and this is a report that probably should never have been written. BARRY GOLDWATER. 207-932 0- 76 - 38 SEPARATE VIEWS OF SENATOR HOWARD H. BAKER, JR. At the close of the Senate Watergate Committee, I felt that there was a compelling need to conduct a thorough examination of our intelligence agencies, particularly the CIA and the FBI. Congress never had taken a close look at the structure or programs of either the CIA or the FBI, since their inception in 1947 and 1924, respectively. l Moreover, there never had been a congressional review of the intelligence community as a whole. Therefore, I felt strongly that this Committee's investigation was necessary. Its time had come. Like the Watergate investigation, however, for me it was not a pleasant assignment. I say that because our investigation uncovered many actions by agents of the FBI and of the CIA that I would previously have not thought possible (e.g., crude FBI letters to break up marriages or ca,use strife between Black groups and the CIA assassination plots) in our excellent intelligence and law enforcement institutions. Despite these unsavory actions, however, I do not view either the FBI or CIA as evil or even basically bad. Both agencies have a long and distinguished record of excellent service to our government. With the exception of the worst of the abuses, the agents involved truly believed they were acting in the best interest of the country. Nevertheless, the abuses uncovered can not be condoned and should have been investi. gated long a~. - I am hopeful, now that all these abuses have been fully aired to the American people through the Committee's Hearings and Report, that this investigation will have had It cathartic effect; that the FBI and CIA will now be able to grow rather than decline. Such growth with a healthy respect for the rule of law should be our goal; It goal which I am confident can be attained. It is important for the future of this country that the FBI and CIA not be cast as destroyers of our constitutional rights but rather as protectors of those rights. With the abuses behind us this can be accomplished. LONG-TERM IMPROVEMENT OF INTELLIGENCE COMMUNITY On balance, I think the Committee carried out its task responsibly and thoroughly. The Committee's report on both the Foreign and Domestic areas are the result of extensive study and deliberation, as well as bipartisan cooperation in its drafting. The Report identifies many of the problems ill the intelligence field and contains positive suggestions for reform. I support many of the proposed reforms, while differing, at times, with the means we should adopt to attain those reforms. In all candor. however, one must recognize that an ~nvestigation such as this one, of necessity, will oause some short-term damage to our intelligence apparatns.A responsible inquiry. as this has been, will in the long run result in a stronger and more efficient intkllligence community. As my colleague Senator Morgan recently noted at a Committee meeting. f>uch short-term injury will be outweighed by longterm benefits gained from the re-structuring of the intelligence (',om- 1 Upon the eXpiration of the watergate Committee in September 1974, I had the privilpge to conRponRor with Senator Weicker, S. 4019, which would have creatf'd a joint committee on Congress to oversee all intelligence activities. (594) 595 munity with more efficient utilization of our intelligence resources. Former Direotor William Colby captured this sentiment recently in a New York Times article: Intelligence has traditionally existed in a shadowy field outside the law. This year's excitement has made clear that the rule of law applies to all parts of the American Government, including intelligence. In fact, this will strengthen American intelligence. Its secrets will be understood to be necessary ones for the protection of our democracy in tomorrow's world, not covers for mistake or misdeed. The guidelines within which it should and should not operate will be clarified for those in intelligence and those concerned about it. ImproVed supervision will ensure that the intelligence agencies will remain within the new guidelines. The American people will understand and support their intelligence services and press their representatives to give intelligence and its officers better protection from irresponsible exposure and harassment. The costs of the past year were high, but they will be exceeded by the value of this strengthening of what was already the best intelligence service in the world.2 The Committee's investigation, as former Director Colby points out, has probed areas in which reforms are needed not to prevent abuses, but to better protect and strengthen the intelligence services. For example, it is now clear that legislation is needed to make it a criminal offense to publish the name of a United States intelligence officer stationed abroad.3 Moreover, the Committee's investigation convinced me that the State Department should revise its publication of lists from which intelligence officers overseas predictably and often easily can be identified. Yet we have not been able, in a year's time, to examine carefully all facets of the United States' increClibly important and complex intelligence community.4 We have established that in some areas problems exist which need intensive long-term study. Often these most important and complex problems are not ones which lend themselves to quick or easy solutions. As Ambassador Helms noted in his testimony during the Committee's public hearings : . . . I would certainly agree that in view of the statements made by all of you distinguished gentlemen, that some result from this has got to bring about a system of accountability that is go,ing to be satisfactory to the U.S. Congress and to the AmerIcan people. • New York Times, Jan. 26, 1976. • I intend to propose an amendment to S. 400 to make it a criminal offense to pUblish the name of a United States intelligence officer who is operating in a cover capacity overseas. • For many months, the Committee thoroughly and exhaustively investigated the so-called "assassination plots" which culminated with the tiling of our report on Xovember 11'. 1975. This inv!'stigation was vitally important in order to clear the air and set the record straight. And, it WIIS instructive as to how "sensitive" operatioos are conducted within our intelligence structure. But, it necessarily shortened the time availahle to th!' Committee to investi~nte the intelli~ enc!' community as a whole. 596 Now, exactly how you work out that lWcountability in a secret intelligence organization, I think, is obviously going to take a good deal of thought and a good deal of work and I do not have anv easy ready answer to it because I 'assure you it is not an easy answer. In other words, there is no quick fix. (Hearings, Vol. I, 9/17/75, p. 124). THOROUGH STUDY NECESSARY IN SEVERAL AREAS The areas which concern me the most are those on which we as a Committee have been able to spend only a limited amount of time,5 i.e., espionage, counterintelligence, covert action, use of informants, and electronic surveillance. It is in these areas that I am concerned that the Committee be extremely careful to ensure that the proper thorough investigatory predicate exist before any permanent reform recommendations be enacted into law. Our investigation, however, has provided a solid base of evidence from which a permanent oversight committee can and should l'aunch a lengthy and thorough inquiry into the best way to achieve permanent restructuring in these particularly sensitive areas. It is my view that such a study is necessary before I am able to endorse some of the Committee's recommendations which suggest a far reaching alteration of the structure of some of thl' most important facets of our intelligence system. Therefore, while I support many of the Committee's major recommendations, I find myself unable to agree with all the Committee's ijndings and recommendations in both the foreign and domestic areas. Nor am I able to endorse every inference, suggestion, or nuance con· tained in the findings and supporting indiVIdual reports which together total in the thousands of pages. I do, however, fully support all of the factual revelations which our report contains concerning the many abuses in the intelligence field. It is important to disclose to the American people all of the instances of wrongdoing we discovered. With such full disclosure, it is my hope &at we can turn the corner and devote our attention in the future to improving our intelligence gathering capability. We must have reform, bat we must accomplish it by improving, not limiting, our intelligence productivity. I am confident this ca.n be done. CUMULATIVE EFFECT OF RECOMMENDATIONS With regard to the totality of the Committee's recommendations, I am afraid that the cumulative effect of the numerous restrictions which the report proposes to place on our intelligence community may be damaging to "our intelligence effort. I am "troubled by the fact that some of the Committee's recommendations dip too deeply into many of the operational areas of our intelligence agencies. To do so, Tam afraid, will cause practical problems. The totality of the proposals may decrease instead of increase our intelligence product. And, there • The Committee's mandate from Congress dictated that the abuses at home and abroad be given detailed attention. And, there are only a finite number of important problems which can be examined and answered conclusively in a year's time. 597 may be serious ramifications of some proposals which. will, I fear, spawn problems which are as yet unknown. I am u~convmcedthat.t~e uncertain world of intelligence can be regulated WIth the use of rIgId or inflexible standards. Specifically, I am not convinced that the answers to all our proble~ls are found by establishing myriad Executive Branch boards, commIttees, and subcommittees to manage the day-to-day operat~ons of the intelligence community. We must take care to avoid creatmg a Rube Goldberg maze of reVIew procedures which might result in a bureaucratic morass which would further increase the burden on our already heavily overburdened tax dollar. We should not over-reform in response to the abuses uncovered. This is not to say that we do not need new controls, because we do. But, it is to say that the controls we impose should be well reasoned and add to, not detract from the efficiency of our intelligence gatherering system. Increased Executive Branch controls are only one-half of the solution. Congress for too long has neglected its role in monitoring the intelligence community. That role should be significant but not allencompassing. Congress has a great many powers which in the past it has not exercised. We must now do our share but, at the same time, we must be careful, in reacting to the abuses uncovered, that we not swing the pendulum back too far in the direction of Congress. Both wisdom and the constitutional doctrine of separation of powers dictate that Congress not place itself in the position of trying to manage and control the day-to-day business of the intelligence operations of the Executive Branch. Vigorous oversight is needed, but should be carefully structured in a new powerful oversight committee. I believe this can be achieved if we work together to attain it. In moving toward improving our intelligence capability, we must also streamline it. It is m this approach that my thoughts are somewhat conceptually different from the approach the Committee is recommending. I am concerned that we not overreact to the past by creating a plethora of rigid "thou shalt not" statutes, which, while prohibiting the specific hypothetical abuse postured in the Report, cast a wide net which will catch and eliminate many valuable intelligence programs as well. The Committee Report recommends the passage of a large number of new statutes to define the functions of and further regulate the intelligence community. I am troubled by how much detail should be used in spelling out the functions and limitations of our intelligence agencies for all the world to see. Do we want to outline for our adversaries just how far our intelligence agencies can go ~ Do we want to define publicly down to the last detail what they can and cannot do ~ I am not sure we do. I rather think the answer is found in establishing carefully structured charters for the intelligence agencies with accountability and responsibility in the Executive Branch and vigilant oversight within the Legislative Branch. 598 PREsIDENT'S PROGRAM It is my view that we need to take both a moderate and efficient course in reforming our intelligence gathering system. In that regard, I think President Ford's recent restructuring of the intelligence community was an extraordinarily good response to the problems of the past. The President's program effected a massive reorganization of our entire intelligence community. It was a massive reaction to a massive problem which did not lend itself to easy solution. I am pleased that many of the Committee's recommendations for intelligence reform mirror the President's program in format. Centralizing the command and control of the intelligence community, as the President's program does, is the best way to ensure total accountability and yet not compromise our intelligence gathering capability. Therefore, I endorse the basic framework of intelligence reform, outlined by President Ford, as embodying: (1) a single permanent oversight committee in Congress, with strong and aggressive staff, to oversee the intelligence community;6 (2) the Committee on Foreign Intelligence to manage the day-to-day operation of the intelligence community; (3) the re-constituted Operations Advisory Group to review and pass upon all significant covert actions projects;? and (4) the Intelligence Oversight Board to monitor any possible abuses in the future, coordinating the activities and reports of what I am confident will be the considerably strengthened offices of General Counsel and Inspector General. This framework will accomplish the accountability and responsibility we seek in the intelligence community with both thoroughness ,and efficiency. Within this framework, Attorney General Levi's new guidelines in the Domestic Security area will drasti({all)' alter this previously sparsely supervised field. These guidelines will centralize responsibility for domestic intelligence withm the Department of Justice and will preclude abuses such as COINTELPRO from ever reoccurring.8 SPECIFIC REFORMS Within this basic framework, we must look to how we are going to devise a system that can both effectively oversee the intelligence community and yet not impose strictures which will eliminate Its productivity. It is to this end that I suggest we move in the following direction: • My original support for a single joint committee of Congress has evolved, somewhat as affected by the events of this past year's House Intelligence Committee investigation, to support for a single Senate committee. However, I al80 favor the mandate of the new committee including, as does the present S. 400, a charge to consider the future option of merging into a permanent joint committee upon consultation with and action by the House of Representatives. The moment for meaningful reform is now and we must not lose it by waiting for a joint committee to be approved by both Houses of Congress. 7 I think a rule of reason should apply here. All signill.cant projects certainly should receive careful attention from the Group. On the other hand, I would not require a formal meeting with a written record to authorize the payment of 2 sources in X country at $50 per month to be changed to the payment of 3 sources in X country at $40 per month. • I applaud the detailed guidelines issued by the Attorney General to reform the Department's entire domestic intelligence program. I think he is moving in the right direction by requiring the FBI to meet a specific and stringent standard for opening an intelligence investigation, i.e., the Terry v. Ohio standard. 599 (1) Demand responsibility and accountability from the .Ex~cutiv:e Branch by requiring all major :rolicy decisions and all ~a]or mtelhgence actlOn decisions be in writing, and therefore retrIevable.9 (2) I recommend, as I have previously, that Congress enact a ~ariation of S. 400, which I had the privilege to cosponsor. S. 400 IS the Government Operations Committee bill which would create a per~anent oversight committee to review the intelligen~e c~mmumty. The ~xisting Con~essionaloversight system has prOVIded I~frequent and meffectual reVIew. And, many of the abuses revealed mIght have been prevented had Congress been doing its job. The jurisdiction of the new committee should include both the CIA and the FBI, and the committee should be required to review and report periodically to the Senate on all aspects of the intelligence community's operations. In particular, I recommend that the Committee give specific careful attention to how we might improve as well as control our intelligence capabilit.Y in the counterintelligence and espionage areas. (3) SImultaneously with the creation of a permanent oversight committee, Congress should amend the Hughes-Ryan Amendment to the 1974 Foreign Assistance Act, § 662, which now requires the intelligence community to brief 6 committees of the Congress on each and every major intelligence action. Former Director Colby strikes a responsive chord when he complains that the present system will lead to leaking of vital intelligence information. We must put a stop to this. This can be done by allowing the intelli~nce community to report only to a single secure committee. (4) Concomitantly with improved oversight. we in Congress must adopt stringent procedures to prevent leaks of intellig-ence information. In this regard, I recommend we create R regular remedy to prevent the extraordinary remedy ofa sin~le member of Congress disclosing the existence of a covert intelligence operation with which he does not agree. Such a remedv could take the form of an appeal procedure within the Congress so that a single member, not satisfied with a Committee's determination that a particular program is in the national interest. will be provided with an avenue of relief. This procedure. however. must be coupled with string-ent penalties for any member of Con.£Tress who disrell'Rrds it and discloS(>S classified information anyway. I intend to offer an amendment to institute such a remedy whl'n S. 400 reaches the Senate floor.10 (5) The positions of General Counsel and Inspector General in the intellip"ence agencies should be elevated in imporlflnce and given increased powers. I feel that it is extraordinarily important that these • Never again should we be faced with the dilemma we faced in the assassination invpstigation. We climbed the ladder of authority only to reach a point where there were no more written rungs. Responsibility ceased; accountability ceased; and. in the end, we could not say whether some of the most drastic actioM our intelligence community or certain components of it had ever taken al!'ainst a forei!W country or foreign leader were approved of or even known of by the Preflident who was in office at the time. 10 I would favor a procedure, within the Congorl'ss. which would in effect create aD avenue of appeal for a member dissatisfied with a Committee determination on a classification issue. Perhaps an appeal committee made up of the Majority and Minority ll'aders and other appointl'd mpmbE'rs would be appropriate. Leaving thp mf'oCIHlniC's aside, however. I believe the concept is import:ant and can be implemented. 600 positions, particularly that of General Counsel, be upgraded. For that reason, I think that it is a good idea to have the General Counsel, to both the FBI and the CIA, subject to Senate confirmation. This adds another check and balance which will result in an overall improvement of the system.12 Additionally, I feel that it is equally important to provide both the General Counsel and Inspector General with unrestricted access to all raw files within their respective agenciespa This was not always done in the past and will be a healthy addition to the intraagency system of checks and balances. (6) I am in favor of making public the aggregate figure for the budget of the entire intelligence community. I believe the people of the United States have the right to know that figure. 13 The citizens of this country have a right to know how much of their money we are spending on intelligence production. But, they also want to get their money's worth out of that tax dollar. They do not want to spend that money for intelligence production which is going to be handicapped; which is going to produce poor or inaccurate intelligence. Therefore, I am opposed to any further specific delineation of the intelligence community budget. Specifically, I am opposed to the publication of the CIA's budget or the NSA's budget. It seems to me we are dealing with the world of the unknown in predicting what a foreign intelligence service can or cannot extrapolate from these budget figures. We received no testimony which Il'uaranteed that, if Conll'ress were to publish the budget figure for the CIA itself, a hostile intelligence organization could not extrapolate from that figure and determine much more accurately what the CIA capabilities are in any number of vital areas. Without such testimony, I am not prepared to go that far. The public's right to know must be balanced with the efficiency and integrity of our intelligence operations. I think we can accomplish both by taking the middle road; publishing the agwegate figure for the entire intelli. gence community. It is this proposal that I have voted in favor of. There are a number of other specific findinll'S and recommendations, supported by a majority of the Committee, which require additional brief comment. U I differ with the Committee in that I would not have the General Counsel and Inspector General file reports and/or complaints concerning possible abuses with the Attorney General. Rather. I think the more appropriate interface in a new oversight system would be for both to take complaints to the Intelligence Oversight Board and the new congressional oversight committee. The Attorney General would remain the recipient of any and all complaints regarding possible violations of law. ... I support the Committee's recommendation 11lat Illgency employees report any irregularities directly to the Inspector General without going through the ch.,in of command, i.e. through the particular division chief involved. 08 I do not feel that, despite my persona:l view that the ag~ate budget figure should he di~cl()Sed to the puhlic, only six to eleven members of the Senate have the right to release unilaterally the actual budget figures. A majority of both Houses of Congress should be necessary to release such information. And, while I would cast my vote in favor of the release of the all'grel1.'ate budll'et figure, I am tronhlPd that there mav he no such vote. I am not sure the "ril1.'ht" result. justifies the "wrong" procedures, ibecause the next time the wrong procedull'e can just as easily be utilized to reach the wrong result. 601 FOREIGN INTELLIGENCE RECOMMENDATIONS ( 1) COVERT ACTION I believe the covert action capability of our intelligence community is vital to the United States. 'Ye must maintain our strength in this capacity, but, we must also control it. The key and difficult question, of course, is how we can control it without destroying or damaging its effectiveness. In my view, the best way to both maintain strength and yet insure accountability is to have strict control of the covert action programs through the Operations Advisory Group, with parallel control and supervision by the proposed permanent congressional oversight committee. Covert action is a complex United States intelligence capability. Covert action provides the United States with the ability to react to changing situations. It is built up over a long period of time. Potential assets are painstakingly recruited all over the world. Having reviewed the history of covert action since its inception, I do not look upon the intelligence a,gents involved in covert action as a modern day group of bandits who travel the world murdering and kidnapping people. Rather, a vast majority of covert action programs are not only valuable but well thought approaches through media placement and agents of influence which produce positive results. Covert action programs cannot be mounted instantly upon a crisis. It is naive to think that our intelligence community will be able to address a crisis without working years in advance to establish sources in the various countries in which a crisis might occur. These sources provide what is referred to as the "infrastructure," which must necessarily be in place throughout the world so that the United States can predict and pret'ent actions abroad which are inimical to our national interest.14 I believe that, were we to completely abolish covert action or attempt to remove it from the CIA and place it in a new separate agency, these sources would dry up: and, when a crisis did come, our intelligence community would not be able to meet it effectively. Not only do I Question the effectiveness a new separate agency for covert action would have, but such a re-structuring would unnecessarily il_crease our already burgeoning bureaucracy. I think that it is important to realize that covert action cannot be conducted in public. We cannot take a Gallup Poll to determine whether we should secretly aid the democratic forces in a particular wuntry. I do not defend some of the covert action which has tak~n place in Chile. But, the ,fact remains that we cannot discuss publicly the many successes, both major and minor, which the United States has achieved through the careful use of covert action programs. Many individuals occupy positions of power in the world today as a direct result of aid given through a covert action program. Unfortunately, we cannot boast of or even mention these significant achievements. In short, we cannot a.pproach covert action from a public relations point of view. We should not forget that we must deal with the world as it is today~with our adversaries employing their equivalent of covert "For example, testimony before the Committee established that the CIA's failure to act more positively in Portugal was a direct result of an absence of sufficient clandestine infrastructure. William E. Colby testimony. 10/23/75; William Nelson testimony, 1l/7/7~. 602 action. 1Ve must either say that the intelligence community should have the power to address world problems in this manner, under the strict control of the President and Congr,ess, or we should take away that pmver completley. I cannot subscribe to the latter. Finally, the issue remains as to how we can best control covert action through statutory reform. First, I believe the Executive Branch can and should carefully review each significant covert action proposal. This will be accomplished through the Operations Advisory Group under the program outlined by President Ford. Second, Congress can control covert action by passing legislation requiring that the new oversight committee be kept "fully and currently informed." This, I believe, is the appropriate statutory language to apply to covert action. I do not agree with the Committee's recommendation that "prior notice" be given to Congress for each and every covert action project. As a matter of practice, the important and signifcant covert action programs will be discussed with the oversight committee in a form of partnership; and this is the way it should be. "Fully and currently informed" is language which has served us well in the atomic energy area. It has an already existing body of precedent that may be used as a guide for the future. It is flexible, like the Constitution, and provides a strong. broad base to work from. I am not prepar~d to say, however, that in the years ahead there may not be some vitally sensitive situation of which Congress and the oversight committee should not be told in advance. While the likelihood of this occurring is not great, we should never foreclose with rigid statutory language possibilities which cannot be foreseen today. Our statutory language must be flexible enough to encompass a variety of problems and potential problems, yet rigid enough to ensure total accountability. "Fully and currently informed" accomplishes both purposes. ( 2) CIA PUBLISHING RESTRICTIONS In the area of restrictions on the CIA's publishing of various materials, I am in complete agreement that anything published in the United States by the CIA, or even sponsored indirectly by the CIA through a proprietary, front, or any other means, must be identified as coming from the CIA. Publications overseas are another matter. We should allow the Agency the flexibility, as we have in our recommendations, to publish whatever they want to overseas and to publish under whatever subterfuge is necessary and thought advisable.15 DOMESTIC INTELLIGENCE RECOMMENDATIONS 'While the Committee's Domestic Intelligence Report represents an excellent discussion of the problems attendant to that field of intelligence, I feel several of the recommendations may present practical problems. Although our objective of achieving domestic intelligence reforms is the same, I differ with the majority of the Committee in how best to approach the achievement of this goal. 15 I do not .view the "domestic fallout" as a real problem. To be sure. some publications by the CIA abroad will find their way back to the United States. However, to try to impose severe restrictions to pr~ent STIch fallout would cause unnecessary damage to the CIA's valid production of propaganda and other publications abroad. 603 (1) INVESTIGATIVE STANDARDS Scope of Dome8tic Security Inve8tiqations At the outset, I note that most of my concern with the standards for investigations in the domestic security area stem from the fact that "domestic security" is defined by the Committee to include both the "terrorism" and "espionage" areas of investigation. Severe limitations, proscribing the investigation of student groups, are more readily acceptable when they do not also apply to terrorist groups and foreign and domestic agents involved in espionage against the United States. To include these disparate elements within the same "domestic security" rubric, it seems to me, will create unnecessary problems when it comes to the practical application of the theoretical principles enunciated in the Committee's recommendations. (a) Preventive intelliqence investigations-The Committee's recommendations limit the FBI's permissible investigations in these critical areas of terrorism and espionage under standards for what the Committee delineates as preventive intelligence investigations. Under these standards the FBI can only investigate where: it has a specific allegation or specific or substantiated information that (an) American or foreigner will 800n enqaqe in terrorist activity or hostile foreign intelligence activity [emphasis added.] 16 In am not convinced that this is the best way to approach the real problem of limiting domestic intelligence investigations. While in theoretical terms the standards of the recommendations may seem appropriate, I fear the inherent practical consequences of their application to the cold, real world of terrorism and espionage. The establishment of an imminency requirement by not permitting any investigation by the FBI unless the allegation or information received establishes that the person or group will "soon engage" in certain activity might prohibit any number of legitimate and necessary FBI investigations. For example, an allegation of an assassination attempt on a public figure at an unspecified date in the future could be precluded from investigation; or, vague information received by the FBI that there was a plan to obtain some nuclear components, but no indication of when or.how, could also be prohibited from investigation. Surely, matters such as these should be the valid subjects of investigation- no matter how vague or piecemeal the information isY (b) Time limit8-The Committee's recommendations would limit any preliminary FBI investigation of an allegation of wrongdoing in the Domestic Security area to 30 days from the receipt of the information, unless the Attorney General "finds" 18 that the investigation need be extended for an additional 60 davs. The FBI investigation may continue beyond 90 days only if the investigatory efforts establish "reasonable suspicion" that the person or group "will soon engage in" 1. Committl'e Doml'stic Report. p. 320. "My experience dictatf's that many investigations are begun with very limited or sketchy information. FBI agents and investigators in general are not always or even ofUm immediately presented with information which constitute6 'Probable cause of a crime. Probable cause is often established only through painstaking investigation; putting bits and pieces together. I think we must take this into consideration w.hen formulating threshold investigatory standards. ,. It is un~lear what standard is to be the predicate for any such finding. 604 terrorist or foreign espionage activitiesY And, even a full preventive intelligence investigation is not permitted to continue beyond "one year," except upon a finding by the Attorney General of "compelling circumstances." 20 ,Vhile well-intentioned, I am not persuaded that these are workable standards. I just don't think we can categorize all investigations into these rigid time frames. Investigations just are not conducted that way. Thirty days, for example, is probably not even enou~h time to obtain a license check return from some states. Moreover, limIting an investigation to one year may not be realistic when it applies to investigating a violence prone group like the SLA or a Soviet Union espionage ring. These investigations are not easily or Quickly accomplished. I do not believe that the creation of artifiCIal time limits is the best way to approach the real concern of the Committee, which is that we establish institutional controls on domestic security investigations. I would prefer approaching the control and accountability problems by providing periodic Department of Justice reviews of all categories of domestic intelligence investigations; not by imposing specific time limits upon all investigations. ( 2) INFORMANTS The Committee recommends broad new restrictions on the use o~ infol1llants by the FBI. While our investigation has established that, in the dom~tic intelligence field, there have been numerous abuses in the use of informants, I do not think that the proposed recommen·· dations are the best vehicles to achieve the needed reform. I cannot subscribe to recommendaitons limiting the use of informants to stringent time standards,2l To limit use of infol1llants to periods of "90 days" 22 unless the Attorney General finds "probable cause" that an American will "soon" engage in terrorist or hostile foreign intelligence activity is impractical and unworkable. When groups such as the SLA attempt to rob, kill, or blow up buildings, it is clearly necessary to cultivate informants who may provide some advance warning. I am concerned that the Committee's recommendations will preclude thi$ vital function of the FBI. Moreover, specific time limits, it seems to me, will prove to be impractical. For example, at the end of the pre· scribed time, with not enough evidence for arrests, will informant X be terminated and replaced by informant Y who starts anew, or are informants thereafter banned from penetrating the particular grou~ even if violence prone or involved in espionage ~ It should be remembered that informants are the single most important tool of the FBI, and local police for that matter, in the fight against terrorism and espionage, as well as organized crime, narcotics, and even the ever pervasive street crimes of murder, rape, and robbery. Indeed, they a.re the very lifeblood of such investigations. Moreover, informants are involved in a wide spectrum of activities ,. Committee Domestic Report, pp. 32(}-323. l!O Compelling circumstances is not further defined. so it is unclear what standards should be applied in making sueh a determination. 21 My concerns here parallel those I have with respecl to the general investigatory srnndRrds recommended. .. The Committee allows an additional 60 days if the Attorney General finds "compelling circumstances." 605 -from attending public meetings to actual penetration attempts. I am concerned that theoretical and abstract restrictions designed only for "domestic intelligence", if enacted, would soon limit our legitimate law enforcement efforts in many other fields as well. People and actions do not always fit nicely in neat little boxes labeled "domestic intelligence," particularly in the terrorist and espionage areas to which the proposed restrictions on informants would apply. Congress should carefully consider the scope and ramifications of any recommendations with respect to informants. It is my view that the better way to approach the problems encountered in the use of informants is to put their use tmder strict supervision of the Department of Justice. Creation ofa special staff or committee for this purpose, centralized in the Department of Justice, would provide effective controls over the potential abuses in the use of informants, yet not hamstring their legitimate and valuable use.23 ( 3) ELECTRONIC SURVEILLANCE I wholeheartedly support S. 3197, the new electronic surveillance bill sent to the Congress by President Ford.24 It needs consolidated bipartisan support because it represents a significant advance from existing practice. For the first time, it will bring all governmental electronic surveillance under the scrutiny of judicial warrant procedures. I commend the efforts of President Ford in taking this extraordinary step forward in the regulation of electronic surveillance. In supporting S. 3197, I do not regard the existing wiretaps presently maintained under the direction and control of Attorney General Levi as being in violation of the Constitution. The present practice of electronic surveillance authorization and implementation rests upon a lon~-standing body of precedent which provides a firm constitutional base for their continued maintenance. The President's approach is to move from the present practice toward better practices and procedures for authorization. The abuses of electronic surveillance of the past clearly dictate a need for a system of judicial warrant approval. Under the President's proposal the American people will be able to rest easyassured that electronic surveillance will be employed carefully, yet when needed to combat serious criminal and espionage activity. I differ with a majority of the Committee insofar as they recommend that before a jurlge can issue a warrant for electronic surveillance he must find more than that an American is a conscious agent of a foreign power engaged in clandestine intelligence activities. The Committee would require that probable cause be established for "criminal activity" before a wiretap can be authorized. I think this departure from the S. 3197 standard would be a dangerous one because it would eliminate certain areas of espionage, particularly industrial espionage, .. Attorney General Levi is in the process of l'Stablishin~ guidelines to regulate the use of informant.s. I recommend, however, that these guidelines be enforced through some appropriate form of Department of Justice review of the FRI'8 U!~e of informants. .. The bill enjoyed a bipartisan co-sponsorship of Senators. 606 from electronic surveillance. Many areas of espionage do not involve clearly criminal activity. Indeed, forms of espionage may not constitute a criminal offense, but should be the valid target of an espionage investigation. For example, a situation such as American oil company executives providing unclassified but important oil reserve information to a Soviet agent might not be a permissible subject of electronic surveillance if "criminal activity," rather than hostile foreign intelligence, were the standard.25 I think the Committee proposed standard would harm the FBI's espionage efforts and would therefore be a mistake. (4) CIVIL REMEDIES STATUTE I oppose any broad new civil remedies statute in the field of domestic intelligence as both dangerous and unnecessary. It is dangerous because it could easily open the flood gates for numerous lawsuits filed seeking injunctive relief in the courts to thwart legitimate investigations. It is unnecessary because any substantial actions are already permitted under present Supreme Court decisions, such as Bivens v. United States, for violation of constitutional rights. There is simply no valid reason to carve out a broad new category of lawsuits for those not only injured by domestic intelligence methods but "threatened with injury." 26 No such statutory provisions are available for "victims" in any other specific category of activity. The present avenues of relief provided by law today are clearly sufficient to address any future abuses in the domestic intelligence field. I note that we have not had the benefit of any sworn testimony from the many constitutional and crim. inal law experts in the country, either pro or con such a proposal. Without the benefit of an adequate record and with my concern about the practical results of such a statute, I cannot support its enactment. ( 5) CIVIL DISORDERS A final recommendation which requires brief comment in the Com. mittee's proposed standards permitting the FBI to assist "federal, state, and local officials in connection with a civil disorder." The Committee's recommendation will not allow any investigation by the F.B.I., not even preliminary in nature, unless the Attorney General finds in writing that "there is a clear and immediate threat of domestic violence" which will require the use of Federal troops. My reservation about this recommendation is that I think it deprives the Attorney General of the necessary flexibility in dealing with .. Those involved in the obtaining of information about our industrial processl.' S, vital to our national security, for our adversaries should be the legitimate subject of electronic surveillance, notwithstanding that no criminal statute is violated. I do not think we can afford to wait for exhaustive reform of our espionage laws. I note that the section of the proposed S.l dealing with espionage reform has presented great difficulty to the drafters. Indeed, drafting espionage into a criminal statute presents some of the same overbreadth problems that the Committee has been concerned with in the domestic intelligence area. 26 For example, would a cause of action exist simply because X notices a federal agent following him in an automobile, notwithstanding the nature or status of the partiCUlar investigation! 607 these delicate matters (i.e., civil disturbances) and might tend to exacerbate a possibly explosive situation. If the Attorney General is not allowed to dispatch FBI agents to the scene of disorders it seems to me that we deprive him of the very means he needs to make the extraordinarily important decision as to whether Federal troops are likely to be used. I believe the better practice would be to permit preliminary investigation by the FBI of potentially volatile situations so that the Attorney General might make the most reasoned decision possible with respect to what I consider the drastic step of deploying Federal troops to quell a civil disorder in one of our cities. WATERGATE-RELATED INQt:IRY Finally, I wish to address briefly an area of the Committee's investigation which I pursued for the most part independently. At the close of the Senate 'Vatergate investigation I filed a report as part of my individual views 27 which outlined remaining areas of investigation with respect to the relationships between the Central Intelligence Agency and the former CIA employees who participated in the Watergate break-in.28 By virtue of my membership on this Select Committee. I have been able to pursue a further inquiry into these matters, and wish to thank the Chairman and the Vice Chairman for the staff assistance and latitude provided me to pursue this area of investigation. Many of the concerns raised in the 'Vatergate Committee investigation have been overtaken by time and events. For example~the reported references to illegal CIA domestic activities have now been confirmed~ as described in detail in the Committee's Report. The reference to the CIA maintaining a file on .Tack Anderson 29 proved to be part of a lengthy investigation and physical surveillance of Anderson by the CIA during a "leak" inquiry. Similarly, the detailing of Howard Hunt's post-retirement contacts with the CIA has been supplemented with still more such contacts.3D Since July 1974, we have witnessed a variety of other disclosures relative to the CIA's domestic activities; indeed, the creation of our Senate Select Committee on Intelligence Activities was due in part to the continuing public concern about these matters. Unlike the Watergate Committee investigation of CIA activities, which was terminated because of the refusal of the CIA to turn over documents.31 this investigation was conducted in an atmosphere of cooperation. After some initial difficulties. which the Committee en- 27 Senate Waterl!ate Committee Final Report, S. Res. 93-981, pp. 1105-1165. "The "Action Required" section of the report. at pages 1150-1157. enumerated unresolved matters and identified materia1s not provided to the Watergate Committee hy the CIA. .. Senate Watergate Committee Final Report, p. 1128. .. For example this disclosure of personal correspondence (detailing certain of Hunt's activities in 1971 and 1972) betwE'en Hunt and the CIA secretary stationed in Paris whom Hunt sought to have reassigned to work fur him at the White Holl.'!e. .. By lE'tter of March 7, 1974, former Director Colby informed the Senate Watergoate Committee that certain items of requested information would not ·be made available to that emnmittee. Such a withholdi~ of timely information. including that which was totally exculpatory, unnecessarily focused an aura of suspicion and guilt. 608 countered in a variety of areas, the cooperation afforded by the CIA \yas exemplary. In particular, I especially want to express my appreciation to former Director ·William Colby and present Director George Bush for cooperating to the fullest extent in this investigation. I also want to thank Ambassador Richard Helms and former Counterintelligence Chief .James Angleton for their J?atience and extensive assistance in in numerous conferences, in trymg to reconstruct the elusi"e details of this significant period. In pursuing this area of inquiry, the Committee staff examined a great volume of highly sensitive material, much of 'Which contained speculative matters and a multitude of information of marginal relevance. This information, which had not been made available in large part to the Separate Watergate Committee, was examined in raw form and without sanitization deletions. Because of the sensitivity of the material, it was reviewed on the Central Intelligence Agency premises. Thus, it was in a spirit of cooperation that this examination was accommodated; and, this experience indicates that the Congress and the intelligence community can cooperate in an investigation without incurring unauthorized disclosure of sensitive information.32 At the close of this Committee's examination of the available record, I wish to state my belief that the sum total of the evidence does not substantiate a conclusion that the CIA per se was involved in the range of events and circumstances known as Watergate.33 However, there was considerable evidence that for much of the post-Watergate period the CIA itself was uncertain of the ramifications of the various involvements, witting or otherwise. between members of the Watergate burglary team and members of components of the Agency. Indeed, the CIA was apparently. at times as perplexed as Congressional investigators. 34 It should 'be noted that the Agency undertook an extensive internal inouirv in an effort to resolve these uncertainties. The investigation of Watergate and the possible relationship of the Centrol Intelligence Agency thereto. produced a panoply of puzzlement. While the available information leaves nagging qustions and contains bits and pieces of intriguing evidence, fairness dictates that an assessment be rendered on the basis of the present record. An impartial evaluation of that record compels the conclusion that the CIA, as an institution, was not involved in the 'Watergate break-in. HOWARD H. BAKER, Jr. .. For example, the staff was given access to the Martinez contact reports (to which access was refused during the Watergate Committee investigation) in th~r entirety. This review was accomplished in secure facilities at the CIA, and no notes were taken of sensitive information contained in the reports not related to Hunt or in some other way relevant to the Committee's inquiry. I cite this as an example of how a Congressional investigation can be thorough and yet not threaten the integrity of CIA secret documentation, containing names of officers and other highly classified information. .. I am filing with the Committee the detailed results of libis investigation in the form of classified memoranda. These memoranda will be turned over to the successor permanent oversight committee to be kept in its secure files. No useful purpose would be served in further publicizing the contents. because much of it is fragmentary and its sum total reinforces the findings stated herein. '" Colby to Helms letter of 28 January, 1974, references seven to nine communications from Hunt while he was at the White House to Helms' secretary, with the query: "Can you give us some idea as to what they were about?" SUPPLEMENTAL VIEWS OF SENATOR CHARLES MeG. MATHIAS, JR. I fully support the Final Report and Findings and Recommendations of the Senate Select Committee on Intelligence Activities. When the Majority Leader, Senator Mike Mansfield and I first proposed the creation of a Select Committee on Intelligence Activities on October 4,1974, in the aftermath of Watergate and charges of domestic spying and the misuse of the CIA and the FBI, confidence of the people in our vital government intelligence system was severely strained. It was the Majority Leader's and my view that in order to restore confidence and legitimacy to the intelligence activities of the United States, there was a need to examine in depth to what extent secret activities are required by the United States. In December 1974, in testimony in support of my resolution to create a Senate Select Committee to Study the intelligence activities of the United States, I stated: One of the most important tasks facing the United States and particularly the Congress is determining the proper role of intelligence agencies in our constitutional system of government and drawing new guidelines for the future intelligence activities of the executive branch. It is quite clear that our foreign and domestic intelligence agencies, including such valued agencies as the CIA, the FBI, and other departments and agencies, have in the course of their activities, violated the constitutional guarantees of citizens and have operated outside of normal constitutional processes. The instances of abuses of power by intelligence agencies and the abridgement of constitutional rights of individual citizens by these agencies revealed by 'Vatergate are sufficient cause to warrant a thorough systematic examination of not only the present intelligence activities; but more importantly, in my view, there is an urgent need to determine what our intelligence needs now are and how they can most effectively function under firm constitutional guidelines, providing for rigorous oversight and accountability. The Select Committee has just completed this task. Its recommendations represent an agenda of essential legislative and executive branch action. The history of United States intelligence activities since the end of World War II is a record of remarkable intellectual and organizational achievement. It is also a record of the exercise of subtle violence and brutal warfare. The latter is not a pretty picture, but given the attitudes of major powers since the end of World War II, our national leadership regarded such measures as necessary and unavoidable. The history of the past three decades raises the important issue of whether the United States must adopt all the methods of our potential adver- (609) 207-932 0 - 76 - 39 610 saries. or is able to exercise some restraints. I share the view of the COmIDittee that if we become "more ruthless than the enemy," as one important policy document of the 1950's urged, the U.S. will lose t~ose qualities which distinguish a free society from a totalitarian regune. It is my belief that restraints are possible and can be exercised in ways that are both consistent with the needs of national security and with our constitutional processes. The information obtained through intelligence activities is important to government at all policy and operational levels. The U.S. spends many billions of dollars a year on this effort. After over a year of study and investigation, there remain, however, many unanswered questions as to the value of some intelligence collection activities. More work needs to be done by a fully empowered permanent oversight committee. For example, in neither the Committee's investigations, nor in internal executive branch studies, has it been possible to determine exactly how much and what kind of intelligence is needed. There are very few solid indicators of the usefulness of the massive amount of intelligence available to the U.S. Government. There are, however, many tangible positive benefits; the ABM Treaty, for example, would not have been possible without reliable intelligence to assure that its provisions were being adhered to. The magnitude of the intelligence effort parallels the patterns of our military and diplomatic policies against potential enemies. In the early 1950's, the intent of United States policy was to counter and roll back Soviet activities worldwide. In recent years there has been a less~ning of tensions between the United States and the Soviet Union. In the world of intelligence similar patterns can be observed. The intelligence activities of the U.S. are largely shaped by the activities of our potential enemies. We do what they do. ·What is it that we both do ~ First, we spy on one another. The legal term is espionage; the euphemism is "clandestine collection;" the direct word is spying. Second, we make great efforts to know what it is they are doing in order to counter, stop, or destroy what they are doing against us. Response to potential enemies has tended to set the pace for our intelligence efforts. Third, we both engage in covert action. Covert action, plainly stated, is the secret exercise of influence. The means used range the gamut of technique between waging war and peaceful intercourse among nations. This includes "little" wars-paramilitary activity, subversion of other governments through propaganda, the use of money, agents of influence, economic warfare, and other lp.ss directly hostile means. All this is done to support policy interests. Fourth, we both collect vast amounts of information through open means, technological collection and spying. This information is analyzed and organized into finished intelligence available to the policymakers of the country in making national decisions. Upon systematic review, I share the view of the Committee that the U.S. must continue to undertake some secret intelligence activities. They are vital to our national sec1lrity. Certain activities, however, should be prohibit€d. In the past, some intelligenc€ activities have had the e~ct of eroding our processes of government, have violated our 611 principles, ideals and reputation, and have damaged our ability to exercise moral and ethical leadership throughout the world. The fundamental issue facing the Congress and the issue that particularly confronts the Committee is to decide how secret activities which are agreed to be necessary are to be governed by our democratic institutions. This issue has three aspects : First, how do we decide which activities should be undertaken? The answer the Committee has come to and that I fully support is that it must be the executive and legislative branches jointly: The legislature through appropriate legislative intelligence oversight committee( s) and the executive through its NSC and other management and oversight structures. Second, what system of accountability is necessary in order to assure that intelligence activities are prudent and appropriate.'! The Committee's decision is that there must be a rigorous recorded approval process within the executive branch and a searching oversight process within the legislative branch. All proposals and approvals for intelligence activities must be recorded in writing and placed in a central classified registry; the record of activities should be available to the legislative oversight committee(s) in accordance with their needs. Third, who can make use of intelligence information? The Committee's view is that both the legislature and the executive should have full access to the intelligence analyses produced by the intelligence community. The availability of sound intelligence will enable the legi'llature to become a partner with the executive branch as intended by the Constitution in this vital area of national policy. A better informed legislature can only benefit the nation. These three questions and their answers are at the heart of the Committee's recommended solutions to the problem of how secret intelligence activities can be governed within an open democratic society. These are solutions which I fully support. But for these solutions to work, a strong oversight committee must be created with power of the purse and full access to information. Without a strong oversight committee, the failures of the past will recur. Inherent contradictions are created when secret activities are permitted within a democratic society. The U.S. is a government of laws, yet laws have not been passed which accurately describe the nature and extent of intelligence activities. This dilemma has raised a number of important questions for the Committee. Although the Committee has come to conclusions about these issues, they are problems that require constant reexamination. In this regard, a key question before the Committee was whether the U.S. should be the first nation to say through its laws what it is in fact doing in the world of intelligence activities. Should it pass laws specifically authorizing and governing covert action, including the explicit right to make warfare, to practice subversion and propaganda? Should these intelligence methods-which have never been publicly acknowledged by any other nation-be put into law? Should the United States Government do so directly and explicitly, rather than through euphemisms and vague imprecise language, and not disguise from its own people what it is actually doing? Is it naive or innocent to express what the U.S. and all other nations in fact are doing? Or 612 would there be advantages to expressing directly what we and all other nations do, expressing also the hope that through negotiation between nations many activities could be stopped on a mutually acceptable basis~ In response to the question of whether we should express openly what we now do secretly in the world of intelligence, many have answered that to reveal the missions of the intelligence agencies with any precision and to set limitations on them by law would, at a minimum have severe diplomatic repercussions. Further, it is argued, disclosure would, as a practical matter, result in effective countermeasures by the intelligence services of other nations, particularly those nations hostile to the United States. In the past, all nations have disavowed acts of their intelligence agents abroad when they have been revealed. But as the scale of intelligence activities has grown, "plausible denial," once an accepted doctrIne for the U.S. Government, has become implausible. It is my belief that the failure to assure accountability through constitutional processes has jeopardized the integrity of our democratic institutions. Many of the practices and techniques exercised by our nation's intelligence agencies have also become obsolete in this age of nuclear weapons and other advanced technology. For example, there is now recognition, at least for the present, among the great powers that so-called "national technical means," that is, satellite reconnaissance, should not be interfered with. There are a number of intelligence missions which, through tacit international acceptance and widespread press discussion, have, over time and through common usage, become "overt" in fact. In such cases, public discussion and approval of these kinds of intelligence missions, such as technical collection systems, is essential, even if the details are not revealed. Shall the U.S. Government through laws exempt certain sectors of its society-such 'as the press, religious institutions, foundations, and the academic world-from any use by the intelligence agencies of the U.S.~ How can the executive and legislative branches of government control necessary but hazardous activities? How can the third branch, the judiciary, safeguard liberties without an adequate statutory foundation? The answers lie,the Committee has concluded in its report, and I fully share this conclusion, in a combination of precise statutory charters and an infonned interaction between the oversight committees of the Congress and the appropriate policy groups within the exeCutive branch. If the oversight committees of the Congress are to be effl'·ctive they must reflect the full spectrum of views of the legislature, they require not only the power of the purse and full access to information, including presentation of proposals before the initiation of significant intelligence activities. . The requirement that the legislature through its oversight committees be fully informed, very quickly raises the question of how fully ~ Whwt "advice" given to Presidents qualifies as "personal"-therefore privileged--communication as opposed to "decisions" or "facts and analysis" which all agree should be made available to the Congress? The experience of the Select Committee will be a good guide to the problems that oversight committees will face in the future. The execu613 tive bmnch made the entire record available in some cases. In only a few cases was adequate information not forthcoming. On the one hand, executive privilege was never formally asserted; on the other hand, the Committee insisted upon complete access only when absolutely necessary. I continue to be deeply troubled by the dilemma created by the necessity for Congress to work through an oversight committee to exact adherence to standards through secret consultations. On the one hand, the agreed-upon needs for secrecy argues for regulation through oversight, rather than through explicit legislation; yet, such a process must be supported by statutes embodying the broad principles of declared policy. Both the Committee and the executive branch agree that clearly defined statutory charters and a new strong and effective oversight committee for the intelligence agencies are necessary. If the proposed new legislative and executive branch oversight procedures prove insufficient, additional statutory controls can be instituted. But the first and present requirement is full executive and legislative support of the governance of intelligence activities through the newly-cast joint oversight mechanisms of the legislative and the executive branches. This is a time of testing. After 200 years of open democratic government t~e U.S. now has the burden of a permanent secret intelligence system. If secret intelligence activities are to continue-and there is present agreement between the branches that they are necessary-then the secret procedures required must have built-in checks and especially stringent provisions for accountability. Intelligence agencies have expressed the concern that some of the Committee's proposals will create excessive layers of approval through which a0tions must be approved, and that such layering will introduce new elements of caution into the approval process which are inconsistent with the view, held by many in the intelligence agencies, that to be effective risks must be taken. But in view of the dangers involved, and the past record of instances of recklessness harmful to the nation there is clearly a need for more caution through more accountability and fixed responsibility in the decisionmaking process governing the initiation and carrying out of intelligence activities. If such high-risk activities are -to continue, and if the decisions concerning secret activities are to remain secret, a thorough and rigorous paper trail must be constructed so that accountability can be fixed among all those involved in any secret intelligence activity approved. The possible drawbacks of a monitoring system of extensive checks and balances are far outweighed by the dangers of unchecked secret activities. The record of abuses in the past is sufficient warning. In time of peace a rigorously enforced system of checks and accountability is necessary for the preservaJtion of a free society. In my view, the purposes of our intelligence system are many. The major purpose, however, is the prevention of war. The recommendations made by the Committee for legislative charters and an informed interaction between the le~islative and executive branches are designed to assure that our llltelligence system operates effectively, accountably, and under the governance of constitutional processes. CHARLES MeC. MATHIAS, Jr. ADDITIONAL VIEWS OF SENATOR RICHARD S. SCHWEIKER The Senate Seled Committee has engaged in an extensive investigation of the intelligence activities of the United States. The investigation did not cover all alleged abuses or study in depth all the major issues. It was, however-and this is more a matter of concern than a matter of pride-the first thorough investigation of the United States intelligence community in almost thirty years. The Committee discovered the real strengths of American intelligence activities-dedicated personnel, broad expertise, and impressive technological achievements. But we also found real weaknesses. Among these is the absenee of statutory authority for many intelligence activities. Combined with this lack of explicit authorization were two noteworthy beliefs. First, that a claim of national security, however, defined or understood, could supersede the laws or regulations that govern other activities. Second, that if our enemies were engaging in certain activities we could, and should, do the same. The coming to maturity of the American intelligence community will help eliminate these pernicious beliefs. The recommendations which the Committee made, which I strongly support, will help to bring intelligence activities under law. Crucial to the success of the Committee's recommendations-and here I join with my colleagues, Senators Philip Hart, Walter Mondale and Gary Hart-is the e.<;tablishment of a new intelligence oversight commIttee with legislative authority. Our Committee did not have such authority. As a select committee we have had a limited mandate and a limited life. Thus we have had only one tool with which to accomplish reform--public disclosure, leading to publi(l concern. The Committee has been in a constant dilemma. Should it use the one tool available-public disclosure of certain intelligence activitieseven though it was claimed that almost any disclosure would damage the "national security"? For example, the Central Intelligence Agency argued that references to the invasion of the Bay of PIgS should be eliminated on such grounds. Or shouldit withhold information such as the fact that NSA was given access to millions of messages and risk well-deserved cover-up charges? I think, in general, the Committee chose the right balance. But an oversight committee with power to bring legislation to the floor and power to authorize the budget for national intelligence will not have to face this dilemma. Such a committee could and should disclose enough information to enable the public to understand how the intelligence community works or fails to work. Such a committee can and will protect vital secrets. And it can, in executive session, continue the intensive scrutiny of intelligence activities which was absent in the past and which is necessary because these activities cannot be completely open to public examination. RICHARD S. SCHWEIKER. (615) GLOSSARY Ad Hoc Requirements Committee: An interagency group established in 1955 by the Special Assistant to the DCI to coordinate collection requirements for the U-2 reconnaissance program. Agent: An individual who acts under the direction of an intelligence agency or security service to obtain, or assist in obtaining, information for intelligence or counterintelligence purposes. Agent of Influence: An individual who can be used to influence covertly foreign officials, opinion molders, organizations, or pressure groups in a way which will generally advance United Sta:tes Government objectives, or to undertake specific action in support of United States Government objectives. Analysis: A stage in the intelligence processing cycle whereby collected information is reviewed to identify significant facts; the information is compared with and collated with other data, and conclusions, which also incorporate the memory and judgment of the intelligence analyst, are derived from it. Armed Forces Security Agmu:y (AFSA): The predecessor to NSA; it was created in 1949 to consolidate the crytologic effort. Army Security Agency (ASA) : One of the Service Cryptologic Agencies; its collection activities are under the authority of the Director of NSA (DIRNSA) in his dual role as Chief of the Central Security Service (CSS). Asset: Any resource-a person, group, relationship, instrument, installation, or supply-at the disposition of an intelligence agency for use in an operational or support role. The term is normally applied to a person who is contributing to a CIA clandestine mission, but is not a fully controlled agent of CIA. Assessment: Part of the intelligence process whereby an analyst determines the reliability or validity of a piece of information. An assessment could also be a statement resulting from this process. Backstopping: A CIA term for providing appropriate verification and support of cover arrangements for an agent or asset in anticipation of ~nquiries or other actions which might test the credibility of hig or Its cover. Basic Intelligence: Factual, fundamental, and generally permanent information about all aspects of a nation-physical, social, economic, political, biographical, and cultural-which is used as a base for intelligence products in support of planning, policymaking, and military operations. Bigot Lists: Using the term bigot in the sense of "narrow," this is a restrictive list of persons who have access to a particular, and highly sensitive class of information. Biological Agent: A micro-organism which causes disease in humans, plants, or animals, or causes a deterioration of materiel. (617) 618 Biological Operations: Employment of biological agents to produce casualties in humans or animals, and damage to plants or material; or a defense against such an attack. Biological Warfare: Use of living organisms, toxic biological products, or plant growth regulators to cause death or injury to humans, animals, or plants; or a defense against such action. Biological Weapon: A weapon which projects, disperses, or disseminates a biologial agent. Black: A term used to indicate reliance on illegal concealment of an activity rather than on cover. Black Bag Job: Warrantless surreptitious entry, especially an entry conducted for purposes other than microphone installation, such as physical search and seizure or photographing of documents. Black List: An official counterintelligence listing of actual or potential hostile collaborators, sympathizers, intelligence suspects, or other persons viewed as threatening to the securIty of friendly military forces. Black Propaganda: Propaganda which purports to emanate from a source other than the true one. Blow: To expose-often unintentionally-personnel, installations, or other elements of a clandestine activity or organization. Board of National Estima,tes (BNE): Established in 1950 by DCI Walter Bedell Smith. The Board was composed of individuals who had responsibility for receiving National Intelligence Estimates for the Director of Central Intelligence. The Board was dissolved in 1973. Bug: A concealed listening device or microphone, or other audiosurveillance device; also, to install the means for audiosurveillance of a subject or target. Bugged: A room or object which contains a concealed listening device. Oase: An intelligence operation in its entirety; the term also refers to a record of the development of an intelligence operation, how it will operate, and the objectives of the operation. Oase Officer: A staff employee of the CIA who is responsible for handling agents. Oentral Intelligence Group (010.): The direct predecessor to CIA; President Truman established it by executive order on ,January 22, 1946. It operated under the National Intelligence Authority (NIA) , which was created at the same time. Ohemical Agent: A chemical compound which, when disseminated, causes incapacitating, lethal, or damaging effects on humans, animals, plants, or materials. Oenmical Operations: Using chemical agents--€xcludihg riot control agents-to kill, or incapacitate for a significant period, humans or animals, or to deny the use of facilities, materials, Or areas. Oipher: Any cryptographic system in which arbitrary symbols or groups of symbols represent units of plain text. Clandestine Intelligence: Intelligence information collected by clandestine sources. Olandestine OperaNon,~: Intelligence, counterintelligence, or other information collection activities and covert political, economic, propaganda and paramilitary activities, conducted so as to assure the s~·cre.cy of the operation. 619 Code: A system of communication in which arbitrary groups of symbols represent units of plain text. Codes may be used for brevity or for security. Code 'word: A word which has been assigned a classification and a classified meaning to safeguard intentions and information regarding a planned operation. Collation: The assembly of facts to determine the relationships among them in order to derive intelligence and facilitate further processing of intelligence information. Collection: The acquisition of information by any means and its delivery to the proper intelligence processing unit for use in the production of intelligence. Committee on Imagery Requirements and Exploitation (COMIREX) : One of three intdligence collection committees formerly under the United States Intelligence Board (USIB), dealing with photographic intelligence. Communicatiorus: A method or means of conveying information from one person or place to another; this term does not include direct, unassisted conversion or correspondence through nonmilitary postal agencies. Communicatiorus Center: A facility responsible for receiving transmitting and delivering messages; it normally contains a message center section, a cryptographic section, and a sending and receiving section, using electronic communications devices. Communicatioruslntelligence (COMINT): Technical and intelligence information derived from foreign communications by someone other than the intended recipient. It does not include foreign press, propaganda, or public broadcasts. The term is sometimes used interchangeably with SIGINT. Communication.'/ Security (COMSEC): The protection of United States telecommunications and other communications from exploitation by foreign intelligence services and from unauthorized disclosure. COMSEC is one of the mission responsibilities of NSA. I~ includes cryptosecurity, transmission security, emission securIty, and physical security of classified equipment, material, and documents. Oompartmentation: The practice of establishing specials channels for handling sensitive intelligence information. The channels are limited to individuals with a specific need for such information and who are therefore given special security clearances in order to have access to it. Oompromise.: A known or suspected exposure of clandestine personnel, mstallatlOns, or other assets, or of classified information or material, to an unauthorized person. Ooncealment: The provision of protection from observation only. Oonfusion Agent: An individual dispatched by his sponsor to confound the intelligence or counterintelligence apparatus of another country rather than to collect and transmit information. Oonsumer: A pers~>n or agency that uses information or intelligence ~roduced by eIther its own staff or other agencies. Oontznentq'z United States (CONUS): A military term which refers to Umted States territory, including adjacent territorial waters, 620 located within the North American continent between Canada and Mexico. Oontrol: Physical or psychological pressure exerted on an agent. or group to ensure that the agent or group responds to the dIrectIOn from an intelligence agency or service. oounterespionage: Those aspects of counterintelligence concerne~with aggresesive operations against another intelligence. servIce. to reduce its effectiveness, or to detect and neutralIze foreIgn espionage. This is done by identification, penetration, manipul~tion, deception, and repression of individuals, groups, or orgamzations conducting or suspected of conducting espionage activities in order to destroy, neutralize, exploit, or prevent such espionage activities. Oounterguerrilla Warfare: Operations and activities conducted by armed forces, paramilitary forces, or nonmilitary agencies of a government against guerrillas. Oounterimurgency: Military, paramilitary, political, economic, psychological, and civic actions taken by a government to defeat subversive insurgency within a country. Oounterintelligence: Activities conducted to'destroy the effectiveness of foreign intelligence operations and to protect information against espionage, individuals against subversion, and installations against sabotage. The term also refers to information developed by or used in counterintelligence operations. See also counterespionage, countersabotage, and countersubversion. Oounterreconnaissance: Measures taken to prevent observation by a hostile foreign service of an area, place, or military force. Oountersabotage: That aspect of counterintelligence desil!;ned to detect, destroy, neutralize, or prevent sabotage activities through identification, penetration, manipulation, deception, and repression of individuals, groups, or organizations conducting or suspected of conducting sabotage activities. OounterstWversion: That part of counterintelligence designed to destroy the effectiveness of subversive activities through the detection, identification, exploitation, penetration, manipulation, deception, and repression of individuals, groups, or organizations conducting or capable of conducting such activities. Oourier: A messenger responsible for the secure physical transmission and delivery of documents and material. Oover: A protective guise used by a person, organization, or installation to prevent identification with clandestine activities and to conceal the true affiliation of personel and the true sponsorship of their activities. Oovert Action: Any clandestine activity designed to influence foreign governments, events, organizations, or persons in support of United States foreign policy. Covert action may include political and economic action, propaganda and paramilitary activities. Oovert Operatiom: Operations planned and executed against foreign governments, installations, and individuals so as to conceal the identity of the sponsor or else to permit the sponsor's plausible denial of the operation. The terms covert action, covert operation, 621 clandestive operation and clandestine activity are sometimes used interchangeably. . Critical Intelligence: Information or intelligence of such urgent Importance to the security of the United States that it is transmitted at the highest priority to the President and other national decisionmaking officials before passing through regular evaluative channels. Cryptanalysis: The breaking of codes and ciphers into plain text without initial knowledge of the key employed in the encryption. Oryptography: The enciphering of plain text so that it will be unintelligible to an unauthorized recipient. Orytology: The science that includes cryptoanalysis and cryptography, and embraces communications intelligence and communications security. Cryptom.aterialo' All material-including documents, devices, equipment, and apparatus--essential to the encryption, decryption, or authentication of telecommunications. Cryptosecur-ity: That component of communications security which results from the provision of technically sound cryptosystems and their proper use. Cryptosystems: The associated items of cryptomaterial which are used as a unit and provide a single means of encryption and decryption. Current Intelligence: Summaries and analyses of recent events. Cut-out: A CIA term referring to a person who is used to conceal contact between members of a clandestine activity or organization. Deception: Measures designed to mislead a hostile person or entity by manipulating, distorting, or falsifying evidence to induce a reaction prejudicial to his or its interests. Decrypt: To convert encrypted text into plain text by use of a cryptosystem. Defector: A person who, for political or other reasons, has repudiated his country and may be in possession of information of interest to the United States Government. Defense Intelligence Agency (DIA): Department of Defense agency for producing military intelligence, created by directive of the Secretary of Defense in 1961. Defense Intelligence Objectives and Priorities (DIOP): A single statement of intelligence requirements compiled by DIA for use by all DOD intelligence components. Departmental Intelligence: The intelligence which government depa~~~ nts and agencies generate in support of their own actWItles. Directive: Basically any executive branch communication which initiates or governs departmental or agency action, conduct, or procedure. Director of Central Intelligence Directive (DCID): A directive issued by the DCI which outlines general policies and procedures to be followed by intelligence ag-encies under his direction; it is generally more specific than an NSCID. Dissemination: The distribution of information or intelligence rroducts (in oral, written, or graphic form) to departmenta and agency intelligence consumers. . 622 Domestic Emergencies: Emergencies occurring within the United States, its territories, or possessions, which affect the public welfare. Such emergencies may arise from an enemy attack, insurrection, civil disturbances, natural disasters (earthquakes, floods), fire, or other comparable emergencies which endanger life and property or disrupt the normal processess of government. . Domestic Intelligence: Intelligence relating to activities or con~itions within the United States which threaten internal securIty (in general or to a governmental department, agency, or official) and which might require the employment of troops. Double Agent: A person engaging in clandestine activity for two or more intelligence or security services who provides information to one service about the other, or about each service to the other, and who is wittingly or unwittingly manipulated by one service against the other. Economic Intelligence: Intelligence regarding foreign economic resources, activities, and policies. Electromagnetic Spectrum: The frequencies (or wave lengths) present in a given electromagnetic radiation (radiation made up of oscillating electric and magnetic fields and propagated with the speed of light-such as radar or radio waves). A particular spectrum could include a single frequency, or a broad range of frequencies. Electronic Intelligence (ELINT): Technical and intelligence information derived from the collection (or interception) and processing of foreign electromagnetic radiations (noncommunications) emanating from sources such as radar. ELINT is part of the NSA/CSS Signals Intelligence mission. Electronic Line of Sight: The path traveled by electromagnetic waves which is not subject to reflection or refraction by the atmosphere. Electronics Securit,!!: The detection, identification, evaluation, and location of foreIgn electromagnetic radiations. Electronic Surveillance: Surveillance conducted on a person, WOUO, or other entitly by electronic equipment which is often highly sopbisticated and extremely sensitive. Elicitation: The acquisition of intelligence from a person or group which does ndt disclose the intent of the interview or conversamono This is a HUMINT collection technique, generally of an overt nature, unless the collootor is other than what he or she purports to be. Emission Security: That component of communications security which results from all measures taken to deny unauthorized persons any information of value which might be derived from the interce~ ionandanalysis of c~mp:omisingemanations from cryptyeqUlpment or telecommUnICatIOns systems. Encipher: To convert 'It plain text message into unintelligible form by the use ofa cipher system. Encrypt: To convert a plain text message into unintelligible form by means 'of a cryptosySltem; this term covers the meanings of encipher and encode. 623 Entity: A company, form, corporation, institution, bank, or foundation. Espionage: Clandestine intelligence collection activity. This term is often interchanged with "clandestine collection." Estimating: An efforlt to appraise and analyze the future possibilities or courses of a0tiion in a situation under study and the various results or consequences of foreign or Uni,ted States actions relating ,to thtlit situation. This analysis of such a foreign situation would consider its development and trends to identify its major elements, interpret the significance of the situtlition, and evaluate the future possibilities and prospective results of various aotions whioh might be taken, including clandestine operations. Evaluation: The process of determining the value, credibility, reliability, pertinency, accuracy, and use of an item of information, 'an intelligence produ0t, or the performance of an intelligence system. Executive Action: This term is generally an euphemism for assassintlition, and was used by the CIA to describe a 'program aimed at overthrowing certain foreign leaders, by assassmating them if necessary. Exploitation: The process of getting information from any source and taking full advantage of it for strategic or tactical purposes. Foreign Intelligence: Intelligence concerning areas outside the United States. Grey Propaganda: Propaganda which does not specifically identify a source. Guerrilla: A combat participant in guerrilla warfare. Guerrilla Warfare: Military and paramilitary operations conducted in hostile or enemy-held territory by irregular, generally indigenous forces. Guidance: The general direction of an intelligence effort, particularly in the area of collection. Imagery: Representations of objects reproduced electronically or by optical means on film, electronic display devices, or other media. Indications I ntelZigence: Intelligence in various degrees of evaluation which bears on foreign intentions regarding a course of action. Infiltration: The placing of an agent or other person in a target area within hostile territory or within targeted groups or organizations. Informant: A person who wittingly or unwittingly provides information to an agent, a clandestine service, or police. In reporting such information, this person will often be cited as the source. Information: Raw, unevaluated data at all levels of reliability and from all kinds of sources, such as observation, rumors, reports, and photographs, which, when processed, may produce intelligence. Info'l"J1'Wr: One who intentionally discloses information about other persons or activities to police or a security service (such as the FBI), usually for a financial reward. Insurgency: A condition resulting from a revolt or insurrection against a constituted government which falls short of civil war. 624 Intelligence: The product resulting from the collection, collation, evaluation, analysis, integration, and interpretation of all collected information. Intelligence Oollection Plan: A plan for gathering information from all available sources to meet an intelligence requirement. Intelligence Oontingency Funds: Appropriated funds to ~ used for intelligence activities which are unforseen at the tIme of the budget and when the use of other funds is not applicable or would jeopardize or impede the task of an intelligence unit. Such funds are almost invariably used for covert activities. - Intelligence Oycle: The steps by which information is assembled, converted into intelligence, and made available to consumers. The cycle is com.l?osed of four basic phases: (1) dir.ection: the de~ermination of mtelligence requirements, preparatIOn of a collectIOn plan, tasking of collection agencies, and a continuous check. on the productivity of these agencies; (2) collection: the expIOl~ation of information sources and the delivery of the collected mformation to the proper intelligence processing unit for use in the production of mtelligence; (3) processing: the steps whereby information becomes intelligence through evaluation, analysis, integration, and interpretation; and (4) dissemination: the distribution of information or intelligence products (in oral, written, or graphic form) to departmental and agency intelligence consumers. Intelligence Data Base: All holdings of intelligence data and finished intelligence products at a given department or agency. Infonnation Data Handling Systems: Information systems that process and manipulate raw information and intelligence data. The systems are characterized by application of general-purpose computers, peripheral data processing equipment, and automated storage and retrieval equipment for documents and photographs. I ntelligence Estimate: An appraisal of intelligence elements relating to a specific situation or condition to determine the courses of action open to an enemy or potential enemy and the probable order of their adoption. Intelligence Process: Those steps by which information is collected, converted into intelligence, and disseminated. Intelligence Requirement: A consumer statement of information needed which is not already at hand. Intelligence Resources Advisory Oommittee (/RAO): Established in 1971 to advise the DCI in preparing a consolidated intelligence program budget for the President. It was abolished by President Ford's Executive Order, No. 11905,2/18/76. InterceptUm: This term generally refers to the collection of electromagnetic signals (such as radio communications) by sophisticate~ collection equipment without the knowledge of the COIllmUlllcants for the production of certain forms of signals intelligence. Interf/epartrrum.tal ~ntellig~nce: The synthesis of departmental intelbg~ nce whlch lS reqUIred by departments and agencies of the Ulllted States Government for performance of their missions' such intelligence is viewed as transcending the exclusive proouc: tion competence of a single department or agency. 625 International Lines of Oommunication (ILO): Commercial telecommunications links. . Interrogation: A systematic effort to procure informatio~ by direct questioning of a person under the control of the questioner. Interview: The gathering of information from a person who kno.ws that he or she is giving information, although not often with awareness of the true connection or purposes of the interv~ewer. This is generally an overt collection technique, unless the mterviewer is not what he or she purports to be. Joint Intelligence: Intelligence produced by elements of more than one military service. . Joint Intelligence Estimate for Planning (JIEP): A worldwide series of strategic estimates prepared annually by DIA for the Joint Chiefs of Staff; it is intended to be used as a base for developing intelligence annexes for JCS plans. Key Intelligence Question (KIQ): Topics of particular importance to national policymakers, as defined by the DCI. Link Encryption: The application of on-line crypto-operations to a communications system link so that all information passing over it is totally encrypted. Links of Oommunication: "Links" is a general term used to indicate the existence of a communications facility between two points. Microwave Relay: A process for propagating telecommunications over long distances by using radio signals relayed by several stations within "line of sight" from one another. Monitoring: The observing, listening to, or recording of foreign or domestic communications for intelligence collection or intelligencesecurity (e.g.,COMSEe) purposes. Multiplexing: A technique which allows one signal to carry several communications (e.g., conversations, messages) simultaneously. National Intelligence : Intelligence produced by the CIA which bears on the broad aspects of United States national policy and national security. It is of concern to more than one department or agency. National Intelligence Authority (NIA): An executive council created by President Truman's executive order of January 22, 1946, which had authority over the simultaneously created Central Intelligence Group (CIG). The NIA was a predecessor to the National Security Council. National Intelligence E8timate (NIE): An estimate authorized by the DCI of the capabilities, vulnerabilities, and probable courses of action of foreign nations. It represents the composite views of the intelligence community. National Security Agency (NSA) : Established by President Truman, October 24, 1952, to replace the Armed Forces Security Agency (AFSA). National Security Oouncil Intelligence Directive (NSOID): Intelligence guidelines issued by the NSC to intelligence agencies. NSCIDs are often augmented by more specific DCIDs and by internal departmental or agency regulations. Net Asse8sment Group: The group within the NSC staff that was responsible for reviewing and evaluating all intelligence products and producing net assessments. It was abolished in June 1978. 207-932 0 - 76 - 40 626 Notionals: Fictious, private commercial entities which exist on paper only. They serve as the ostensible employer of intelligence personnel, or as the ostensible sponsor of certain activities in support of clandestine operations. Office of Policy Ooordination (OPO) : An office in CIA, established in 1948, to carry out covert action missions assigned to CIA by the National Security Council. Office of Special Operations (OSO): Prior to 1952, 080 was a CIA component responsible for espionage and counterespionage. It merged with CIA's Office of Policy Coordination to form the Directorate for Plans. Office of Strategic Services (OSS): The United States Intelligence service active during World War II. It was established by President Roosevelt in June 1942, and disbanded October 1, 1945. OperatWnallntelligen.ce: Intelligence produced to support the planning and execution of operations. Operational Use: This term refers to using a person, group, organization, information, etc. in a clandestine operation or in support of a clandestine activity. Operation8 Oomodinating Board (OOB): This replaced the Psychologioal Strategy Board of the NSC on September 2, 1953. Order of Battle: This term refers to information regarding the identity, strength, command structure, and dispositIOn of personnel, units, and equipment of any military force. Overt lntelligen.ce: Information collected openly from public or open sources. Paramilitary Forces: Forces or groups which are distinct from th", regular 'armed forces of a nation, although they may resemble regular forces in organiz,ation, equipment, training, or mission. Paramilitary Operation: An operation undertaken by a paramilitary force. Penetration: The recruitment of agents within, or the planting of agents or technical monitoring deviceS within, a target organization to gain 'access 'to its secrets or to influence its activities. Photographic Intelligen.ce (PHOTlNT) : Information or intelligence derived from photography through photographic interpretation. Plain Temt: Unencrypted communications; specifically, the original message of a cryptogram, expressed in ordinary language. Planning and Ooordination Group (POG): A oommittee of the Operations Coordinating Board of the National Security Council. PCG became the normal channel for policy approval of covert operations under NSC directive 5412/1 in 1955. Plau..~ble Denial: Plumbing: A term referrin8 to the development of assets or services supporting the clandestme operations of CIA field stati0ns-such as. safehouses, unaccountable funds, investigative persons, survelHance teams. Political Intelligence: Originally, arranging, coordinating and cond~ cting coyert operat~ons so as to "plausibly" permit official dellll!' l of Umted States mvolvement, sponsorship or support. Later thIS concept evolved so that it was employed by high offici'als and their subordinates to communicate without using precise language 627 which WQuld reveal authorization and involvement in certain lWtivities and would be embarrassing and politically damaging if publicly revealed. Processinq: The manipulation of collected raw information to make it usable in analysIs or to prepare it for data storage or retrieval. Product: Finished intelligence reports disseminated by intelligence agencies to appropriate consumers. Production: The preparation of reports based on an analysis of information to meet the needs of intelligence users (consumers) within and outside the intelligence community. Propagamla: Any communication supporting national objectives which is designed to influence opinions, emotions, attitudes, or behavior of any group in order to benefit the sponsor, either directly or indirectly. Proprietaries: A term used by CIA to designate ostensibly private commercial entities capable of doing business which are established and controlled by intelligence services to conceal governmental affiliation of intelligence personnel and/or governmental sponsorship of certain activities in support of clandestine operations. Psychological Strategy Board (PSB): An NSC subcommittee established in 1951 to determine the desirability of proposed covert action programs and major covert action projects. Psychological Warfare: The planned use of propaganda and other psychological actions to influence the opinions, emotions, attitudes, and behavior of hostile foreign groups so as to support the achievement of national policy objectives. Reconnaissance: A mission undertaken to obtain, by observation or other detection methods, information about the activities and resources of foreign states. Req·uirement: A general or specific request for intelligence information made by a member of the intelligence community. Safe House: An innocent-appearing house or premises established by an intelligence organization for conducting clandestine or covert activity in relative security. Sanitize: The deletion or revision of a report or document so as to prevent identification of the intelligence sources and methods that contributed to or are dealt with in the report. Scan: In electromagnetic or acoustical contexts, a scan is one complete rotation of an antenna. With regard to ELINT, it refers to the motion of an electronic beam through space which is searching for a target. Scientific and Technical Intelligence: Information or intelligence c?ncerning foreign progress in basic and applied scientific or techmcal research and development, including engineering R&D, new technology, and weapons systems. Security Measures: taken by the government and intelligence departments and agencies, among others, for protection from espionage, observation, sabotage, annoyance, or surprise. With respect to c~assified materials, it is the condition which prevents unauthonzed persons from having access to official information which is safeguarded in the interests of national defense. 628 Sensitive: Something which requires special protection from disclosure, which could cause embarrassment, eompromise, or threat to the security of the sponsoring power. Service Oryptologic Agenda (SOAs): These are the Army Security Agency, Naval Security Group Command, and Air Force Security Service. Their signals intelligence-colleetion functions were brought under the operational control of the Director of NSA when the SCAs were eonfederated into the Central Security Senice in 1971, and the Director of NSA was given extra responsibility as Chief of the CSS. Sheep Dipping: The utilization of a military instrument (e.g., an airplane) or officer in clandestine operations, usually in a civilian capacity or under civilian cover, although the instrument or officer will covertly retain its or his military ownership or standing. The term is also applied to the placement of individuals in organizations or groups in which they can become active in order to establish credentials so that they can be used to collect information of intelligence interest on similar groups. Signal: As applied to electronics, any transmitted electrical impulse. Signals Intelligence (SIGINT) : The general term for the foreign intelligence mission of the NSA/CSS; SIGINT involves the inter ception, processing, analysis, and dissemination of information derived from foreign electrical communications and other signals. It is composed of three elements: Communications Intelligence (COMINT), Electronics Intelligence (ELINT), and Telemetry Intelligence (TELINT). Most SIGINT is collected by personnel of the Service Cryptologic Agencies. Smerce: A person, thing, or activity which provides intelligence information. In clandestine activities, the term applies to an agent or asset, normally a foreign national, being used in an intelligence activity for intelligence purposes. In interrogations, it refers to a person who furnishes intelligence information with or without knowledge that the information is being used for intelligence purposes. Special Agent: A United States military or civilian who is a specialist in military security or in the collection of in'telligence or counterintelligence information. Special Group (Augmented): A NSC subeommittee established in 1962 to oversee Operation MONGOOSE, a major CIA eovert action program designed to overthrow Fidel Castro. Special Grottp (OJ): The Special Group on Counter Insurgency, established by NSAM 124 on 1/18/63 to ensure the design of effective interagency programs to prevent and resist insurgency. Paramilitary operations were a prime focus. 5l,.l~/Special Group: An NSC subcommittee that was the predecessor to the 40 Committee. Special Operations Division (SOD): A facility at Fort Detrick, Maryland that was the site for research and some testing and storage of biological and chemical agents and toxins. Sterilize: To remove from material to be used in eovert and clandestine actions any marks or devices which can identify it as originating with the sponsoring organizllition or nation. 629 Strategic Intelligerwe: Intelligence required for the fonnation of policy and military plans and operations at the national and international levels. Subver8ion: ACltions designed to undermine the military, ooonomic, political, psychological, or moral strength of a nation or entity. It can also apply to an undennining of a person's loyalty to a government or entity. Surreptitious Entry: Surveillarwe: Systematic observation of a target. Tactical Intelligence: Intelligence supporting military plans and operations at the military unit level. Tactical intelligence and strategic intelligence differ only in scope, point of view, and level of employment. Target: A person, agency, facility, area, or country against which intelligence operations are directed. Targeting: In regard to COMINT, the intentional selootion and/or collection of telecommunications for intelligence purpose. Target of Opportunity: A tenn describing an entity (e.g., governmental entity, installation, political organization, or individual) that becomesavailaJble to an intelligence agency or service by chance, 'and provides the opportunity for the collection of needed information. Task: A tenn connoting the assignment or direction of an intelligence unit to perform a specified function. Teleeorrvmunieations: Any transmission, emission, or reception of signals, signs, writing, images, and sounds or information of any nature 'by wire, radio, visual, or other electromagnetic systems. 10/5 Panel: A predecessor to the 40 Committee of the NSC. 303 Committee: A predecessor to the 40 Committee of the NSC. Toxin: Chemicals which are not living organisms, but which are produced by living organisms and are lethal. Traffic: Messages carried over a telecommunications network. United State8 Country Team: The senior, in-country, United States coordinating and supervising body, headed by the Chief of the United States diplomatic mission (usually an ambassador) and composed of 'the senior member of each represented United States department or agency. United State8 /ntelligerwe Board (US/B) : Until it was abolished by Executive Order No. 11905 2/18/76, USIB was the NSC's central coordinating committee for the intelligence community. Watch List: A list of words-such as names, entities, or phrase&which can 'be employed by a computer to select out required information from a mass of data. LIST OF ABBREVIATIONS Abbreviations ACDA-Arms Control and Disarmament Agency. ACS(I)-Army Chief of Staff fo~ Intellig~nce.. AFOSI-Air Force Office of SpecIal InvestlgatIOns. AFSA-Armed Forces Security Agency. ARC-Ad Hoc Requirements Committee. ASA-Army Security Agency. . ASD/I-Assistant Secretary of Defense for Intelhgence. . ASD/PA&E-Assistant Secretary of Defense for Program AnalysIs and Evaluation. ASW-Antisubmarine Investigation. BI-Background Investigation. BNDD-Bureau of Narcotics and Dangerous Drugs. BNE-Board of National Estimates. CDIB-Consolidated Defense Intelligence Budget. CDIP-Consolidated Defense Intelligence Program. CFI-Committee on Foreign Intelligence. CIA-Central Intelligence Agency. CI&IA-Counterintelligence and Investigative Activity. CIG-Central Intelligence Group. CIRL-Current Intelligence Reporting List. CJCS-Chairman, Joint Chiefs of Staff. COMINT-Communications Intelligence. COMIREX-Committee on Imagery Requirements and Exploitation. COMOR-Committee on Overhead Reconnaissance. COMSEC-Communications Security. CONUS-Continental United States. CSS-Central Security Service. DAS-Defense Attache System. DCI-Director of Central Intelligence. DCID-Director of Central Intelligence Directive. DClI-Defense Central Index of Investigations. DDA-Deputy Director for Administration, CIA, or Directorate for Administration. DDCI-Deputy Director of Central Intelligence. DDI-Deputy Director for Intelligence, CIA, or Directorate for Intelligence. DDO-Deputy Director for Operations. CIA, or Directorate for Operations. . DDP-Deputy Director for Plans, CIA, or Directorate for Plans. DDR-Deputy Director for Research, CIA. DDS&T-Deputy Director of Science and Technology, CIA, or Directorate for Science and Technology. DDS-Deputy Director for Support, CIA. (631) 632 DIA-Defense Intelligence Agency. DIOP-Defense Intelligence Objectives and Priorities. DIPO-Defense InvestIgative Program Office. DIRG-Defense Investigative Review Council. DIRDIA-Director of the Defense Intelligence Agency. DIRNSA-Director of the National Security Agency. DIS-Defense Investigative Service. KKIQs-Defense Key Intelligence Questions. DMA-Defense Mapping Agency. DOD-Department of Defense. DOJ-Department of Justice. ELINT-Electronic Intelligence. ERDA-Energy Research and Development Administration. EXCOM- Executive Committee. FBI-Federal Bureau of Investigation. FBIS-Foreign Broadcast Information Service. FSO-Foreign Service Officer. FYDP-Fiscal Year Defense Plan. GDIP-General Defense Intelligence Program. GRU-Soviet Military Intelligence Service. HUMINT-Human Intelligence. ICS-Intelligence Commumty Staff. INR-State Department's Bureau of Intelligence and Research. IRAG-Intelligence Resources Advisory Committee. IR&DG-Intelligence Research and Development Council. IRS-Internal Revenue Service. ISA-International Security Affiairs, DOD. J-2--Joint Staff Director for Intelligence, DOD. JCS-Joint Chiefs of Staff. JRG-Joint Reconnaissance Center. JSOP-Joint Strategic Objectives Plan. KGB-Soviet National Intelligence Organization. KIQ-Key Intelligence Question. MBFR-Mutual and Balanced Force Reduction. NFIP-National Foreign Intelligence Program. NIA-National Intelligence Agency. NIB-National Intelligence Bulletin. NID-National Intelligence Daily. NIE-National Intelligence Estimate. NIQ-National Intelligence Officer. NIS-Naval Investigative Service. NKVD-Predecessor to the the KGB. NPIG-National Photographic Interpretation Center. NSA-National Security Agency. NSA/CSS-National Security Agency/Central Security Service. NSAM-National Security Action Memorandum. NSC-National Security Council. NSCIC-National Security Council Intelligence Committee. NSCID-National Security Council Intelligence Directive. NSDM-National Securitv Decision Memorandum. NSSM-Natioilal Security Study Memorandum. OCB-Operations Coordinating Board. 633 OMB-Office of Management and Budget. ONE-Office of National EstimatEs. ONI-Office of Naval Intelligence. OPG-Office of Policy Coordination. OSD-Office of the Secretary of Defense. OSO-Office of Special Operations, CIA. OSO-Office of Special Operations, DOD. OSS-Office of Strategic Services. PCG-Planning and Coordination Group, NSC. PFIAB-President's Foreign Intelligence Advisory Board. PNIOs-Priority National Intelligence Objectives. PSB-Psychological Strategy Board, NSC. R&D.-Research and Development. RD.T.&E.-R~rch, Development, Test &Evaluation. SALT-Strategic Arms Limitation Talks. SCAs-Service Cryptologic Agencies (collection) SIGINT-Signals Intelligence. SNIE-Special National Intelligence Estimate. SOD-Special Operations Division, Fort Detrick, Maryland. TELINT-Telemetry Intelligence. TOA-Total Obligational Authority. TSD-Technical Services Division, CIA. USAINTA-United States Army Intelligence Agency. USIB-United States Intelligence Board. WSAG-Washington Special Action Group. 634 Control and Direction of ,U.S. Foreign Intelligence within the NATIONAL SECURITY COUNCil Svdem [After Executive Order 11905. February 18. 1976) THE PRESIDENT NATIONAL SECURITY COUNCIL OFFICE OF t·1AHAGEMEHT & BUDGET IllTELl OVERSIGHT BOARD (OVERSIGHT BOARD) ........ '----........ .•• ••• •• ••.1 PRESIDENT'S fOREIGN IKTELl ADVISORY BD. IPFIABI OPERATIONS ADVISORY GROUP IOPERA nONS GROUP) o AP/HIA 0 SEC 11m olEe OEF 0 C/Je! 0 Del DIRECTOR OF CEHTRAl ItlTEllIGEIICE • President • Sec Slale o V.President • Sec Defense COMMlllEE ON fOREIGl1 I!HHl lem ooel oOilEe OEf oOAP/USA I I ~ INTElLIGENCE L. COlolllUIIITY STAFF t----ll---f IIC) rL---usis---l··iJisiB-coMMIrrul ~ J LriiiOSTRutTuRiI_ p_••- ••_--~._•• _.~----~. SERVICE IlIlEll COI1PONElITS USA UIH USAF (usn IDW) (Hill {·NcSmA 01,\. IDIRECIORl 10lRECIORl CIA mcn L-_ STATE /lURI IOIRECIORl TREAS (IP ASH TO lEU fBI lAlll OIRl ERDA (D/AlI NATiONAL INTELLIGENCE COMMUNITY STRUCTURE [Prior to Ex~cutive Order 11905, February 18, 1976) • ,- L • • • __ ~. DIRECTION RECOMMENDATION! GUIDANCE/ADVICE 635 Intelligence Community Staff Organization [After Executive Order 11905, February 18, 19761 OFFICE OF COMMUNITY DEPUTY Deputy/DCI/IC Assoc Deputy/DCI/le Executive Officer Executive Staff CFI/USIB Executive Secretariat Support Sttlff Registry Intelligence Community Stcff Orgc!"izatio.n [Prior to 8xecutive Order 11905, February 18, 19761 USIB '-IRAC Secrelarial Principal Depuly for Planning Depuly 10 Direclor of Cenlral InlelJigence/ Intelligence Community J-----i USIB Committee Chairmen Coordination Staff I I -, I Collection & Management. Processing Planning & Rmurce Producl Review Assessmenl Division Review Division Division {CPADl IMPRRDl {PRO, 636 94TH COXGRESS SRES 21 1ST SE88IOl'l • • IN TIlE SENATE OF THE UNITED STATBS JANUARY 21,1975 ?til.. PASTOIlE snomittpu the following resolution; which was ordered to be placed on thp ralpndllr (under general orders) JANUARY 27,1975 Considered, amended, and agreed to RESOLUTION To establish ll. select committee of the Senate to conduct an investigation and study with respect to intelligence activities carried out by or on behalf of the Federal Government. 1 ReS()lved, To establish a select committee of the Senate 2 to conduct an investigation and study of governmental op3 erations with respect to intelligence activities and of the 4 extent, if any, to which illegal, improper, or unethical activ5 ities were engaged in by any agency of the Federal Govern6 ment or by any persons, acting individually or in combination 7 with others, with respect to any intelligence activity carried 8 out hy or on behlllf of the Federal Government; be it further 9 Re.wlved, 'l'hnt (a) there is hereby established a select 10 commiUre of the Senate which may. be called, for· conV 637 2 1 yelllenCe of exprt'~SlOlI, the Select COlllmittee To Study 2 Goyernmeutal Opel'Utitlus Widl Respect to Intelligence Ac: 3 tivitics to couduct an iun~!;tigation aud study of the extent, if 4 any, to which illegal, improper, or unethiclll lIt'tivities were :> engaged in by auy agency 01' by auy P('\'~(lIlS, actiug ai.ther 6 individually or in combination with others, in: carrying out 7 any intelligence or surveillance activities hy or on behalf 8 of any agency of the Federal Government. 9 (b) The seleot committ.ee created by this resolution 10 shall consist of eleren Members of the Senate, six to he 11 appointed by the President of the Senate from the majority 12 Members of the Senate upon therecommendlltion of the 13 majority leader of the Senate, and five minority Members of 14 the SeINlte to be appointed by the President of the Senate 15 upon the recommendation of the minority leader of the 16 Senate. For the ,purposes of paragraph 6 of rule XXV of the 17 Standing Rules of the Senate, service of a SenatQr as a 18 . member, chairtnan, or vice chairman of the select commi.ttee 19 shall not be taken into account. 20 (c) The majority members of the committee shall sdect 21 a chairman and the minority members shall select a vice 22 chairman and the committee sh1111 adopt rules and procedures 23 to govern its proceedings. The vice chairman shall preside 24 over meetings of the select committee during the absence 25 of the chairman, and discharge such other responsibilities 638 3 1 as mny be assigned to him by the select committee or the 2 chairman. Vacancies in the membership of the select com3 mittee shall not affect the authority of the remaining mem4 bel'S to execute the functions of the select committee and 5 shall be filled in the same manner as original appointments 6 to it are made. 7 (d) A majority of the members of the select committee 8 shall constitute a quorum for the transactiQn of business, but 9 the select committee may affix a lesser number as a quontm 10 for the purpose of taking testimony or depositions. 11 SEC. 2. The select committee is authorized and directtld 12 to do everything necessary or appropriate to make the in13 vestigations and study specified in subsection (a) of the 14 first section. Without abridging in any way the. authority 15 conferred upon the select oommittee by the preceding 16 sentence, the senate further expressly authorizes and directs 17 the select c.o~ttee to make a complete investigation and 18 study of the activities of any agency or of any and all persons 19 or groups of persons Qr organizations of any kind which 20 have any tendency to reveal the full facts with respect to 21 the following matters or questions: 22 23 24 ( 1) Whether the Central Intelligence Agency has conducted an illegal domestic intelligence operation III the United States. 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 639 4 (2) Till' conduct of dOlll£'.~1 if' illt l'lJigP))('(\ 01' counterintl.' lligl.')H'l' opcra,t~ol1s against United States citizens by the }'edl.'l'l\l Bureau of Investigation or any other Federal agency. (3) The origin and disposition of the so-called Huston Plan to apply United States intelligence agency capu!bilities against individuals or organizations within the Uwed States. (4) The e.'l:tent to which the Federal Bureau of In· vest;igation, the Central Intelligence Agency, and other Federal law enforcement or inteHigenee agencies coordiIlftte their re9peotive activities, any agreements which govern that coordination, and the extent to which a lack of coordination has contn.buted to activities or actions which are illegal, improper, inefficient, unethical, or contrary to the intent of Congress. (5.). The extent to wmoh the ()peration of domestic intelligence or counterin'teHigence aotivities and the opemrion of any other activities within the United States by the Central Intelligence Agency comonns to the legislative charter of that Agency and the intent of the Congress. (6) The past ana present interpretation by the Director of Central Intelligence of the responsrbility to protect intelligence sources find methods as it relates to 1 2 3 4 5 6 7 8 9 10 11 12 13 14 1;; 16 17 18 19 20 21 22 23 24 2;; 640 5 the provisi<ln III section 102 (d) (3) of the National Security Act of 1947 (50 U.S.C. 403 (d) (3)) that "... that the agency shall han no police, subpena, law enforcement powers, or internal security funeti6ns.•.." (7) Nature and extent of executiv-e br1Ulch oversight of all United States intelligence aotivities. (8) The need for specific legislative authority to govern the opernti<lns of llny intelligence agencies .,f the Federal Government now existing without that explicit statutory authority, including but not limited to agencies such as the Defense IntelligencE Agency and the National Security Agency. The nature and extent to which Federal agencies c~opeIate and exchange intelligence information and the adequacy of any reguilltj()ll!l or statutes which govern such cooperation and exchal1~t of intelligence informat.ion. (9) The extent to which United States intelligence agencies are governed by Executive orders, mles, or regulations either published or seeret llnd the extent to which those Executive 01"(1(,J"s, rl1k~, Or r('glllations interpret, expand, or are in conflict with specific legislative authority. (10) The violation OJ" ~11~p(·l't('a ,"iolntion or allY State OJ" Fl'd('rnl stlltll t(' by <lilY illtd-lig:l'lIt(' llgl'llty 01' 641 6 1 2 3 4 5 6 7 8 9 10 i1 12 13 14 15 16 17 18 19 20 21 -by any p<,!'SOn by or on u<'half of any intelligence agency of the }'ederal Government includ-ing but not limited to surreptitious entries, surveillance, wireta~, or eavesdropping, illegal opening of the 1.)nit<,d States muil, or the monitoring of the United States mail. . (11) The need for improved, strengthened, or oonsolida. ted oversight of United States intelligence activitres by the Congress. (12) Whether any of the existing laws of the Unit~d States are inadequate, either in their provisions or manner of enforcement, to safeguard the rights of American citizens, to improve executive and legislative control of intelligence and related activities, and to 1'0solve ullcertainties as to the authority of United Stutes intelligence and re!aJted agencies. (13) Whether there is unnecessary duplication of expen~ture and effort in the eoUecti~n and processing of int~lligence -information by United States agencies. (14) The extent and necessity of overt and covert intelligence activities in the United States and abrood. (15) Such other related matters as the committee dt'ems necessary in order to curry ont its responsihilities :!:3 under section (a). 2t SEC. 3. (a) To enable the select committee to make 2;) the imcstip:ation and study authorized and directed hy th\8 207-932 0 - 76 - 41 642 7 1 resolution, the Scnatc hCl'l'hy empowers the select committee 2 n..; an a!u']H'Y of tIl(' Sp)wfc (I) to f'Tllploy nnd fix the !:OIJl- 3 pen:-atipn of :-1I{'\1 ell-rieal, iUH',tigntory, legal, tl'('hlli('al, 4 and otll('r as,istnllts as it deelJl)': necessary or al'llfopriatl·, 5 uut it m3.y Hot exceed the nonnal Senate salary schedules; 6 (2) to sit and act at any time Of plllce during scssions, 7 recesses, and adjournment periods of the Senate; (3) to hold 8 hearings for takill~ testimony on oath or to receive docu- 9 mentary or phpi(1l.1 evidence relating to the matters and 10 questious it is authorized to investigate or study; (4) to 11 require uy subpena or otherwise the attendance as witnesses 12 of allY persons who the select c(lmmittee believes have 13 knowledge or information concerning any of the matters H or questions it is l1uthorized to investigate and study; (5) 15 to require hy subpena or order any department, agency, 16 officer, or employee of the executive branch of the Umted 17 States G~vepunent, or any priva.te person, finn, or corpora18 tion, to produce for"its consideration or for use as evidence 19 in its investigation and study any books, checks, canceled 20 checks, correspondence, communications, document, papers, 21 pl)y~i('nl evideu('c, records, recordings, tapes, or mftterials re22. luting to any of the matters or qucstions it is authorized to 23 investigate and study which they or any of them may have 24 in their custody or under their control; (6) to mnke to the 25 Sl'llnte :my r('('OJlIniendations it deems appropriate in re8pect 643 8 1 to the willful failure or refusal of auy person tu answer (1\\(':;2 tions or give testimony in his charncter as a witness dming 3 his appearance before it or in resp('et to the willful failun' 4 or refusal ()f any OffiC(,f Of cmploy('C' of tile ('xcclltin' lmllle!l 5 of the United SIMes Gm'ernment or filly person, firm, or 6 corp0rlltion to produce bl'fi)J'(~ the COlllnlitt('c filly book" 7 checks, ('a,ncdcd checks, correspondeuel', eOlllmllllieation" 8 document, financial records, papers, physical evidence, 9 records, reoordings, tapes, or materials in obedience to any 10 subpena or order; (7) to take depositions and other testi11 mony on oath anywhere within the United States or in any 12 other country; (H) to prQCure the t('lI1porary or iutenuit1atl'ut sen'iel's of individual ~:mH.ultallts, or urglillizatiolls there14 of, in the same rnann~r lind under the SlillIe condition,.; as 15 a standing oonullittl'e of the Senate lUll}' 'procure slH.'h ,l'l'\'16 iel's under section 202 (i) of thc Lcgislatirc Reorglllliza- 17 tion Ad of 1~46; (9) to usc on a reimum'saulc hasis, with 18 the prior consent of the C()mmittee Qn Rules an~ Adminis19 trlltion, the services of personnel of any such department 20 or figency; (10) to use on Q rejmbursahle basis or other21 wise with the prior cons('ut of the cliail'lllall of any suu- ~2 oommittee of IIny committee of the Senate the facilities or ,)~ ~L :;el'viccs of nny memhers of the staffs of such other Senate 2-l ('o1lll1litl(.(.s or filly ,mhCollUllittccs of 8\1:('h oth('l' SCHate com- '..);) Pl~ttecs wh~ncy~r the :sekct ('ommitlcc or its cht~inllt\Il deenl" 644 9 that snch Iwtion ]8 necessary or Ilpproprillte to enl\Julr the 1 select cmnmittrr to make the iuwstigat.iou and stndy Ilnthor2 ') ized and dirr!'trl1 lIy this resolntion: (I I) to 1m\"(' (lirect " 4 1l('('("~S through Ill<' ogclICY of Ilny llwm!lers of the ~('led committcc or any of its invest4!!'l1.tory or leglll Ilssistlluts i) " G d('~ignfttC'd hy it or its ehaimllln or the mnking minority 7 uwm)1C'1' to IIIH' dilta, evidence, illfonllaf1ion, rrport, 1Illl1lysis, 8 or docnment or papC'rs, relati~lg to any of the matters or 9 questions whieh it is authorized Ilnd directed w investigate 10 and study in the custody or under the control of any dopart11 ment, Ilgeney, officcr, or employee of the executive hranch 12 of 1,lw FlIill'I1 KIIII('sGm'I'!'IJllwuI, iudllfliug' mlY (h~PIll'tllWllt, 13 a~ency, offil'er, or employee of the UlIited States GOYern14 mt>nt hllving the power nntler the law" of the United States 15 to inv('~t,iga/(l :In." alleged eriI1l(IliI,1 :ldivitil'N or til liJ'osceute IG IK'r~oIls chargt'tl with l'rill\cs against theUnited Statt's aud 17 any dCl)artplent, agency, o~cer, or elliployee of the Uuitetl 18 Staotes Government having the ll.utoority to conduct inteDi19 ~encc or surwillnnce within or outside the United States, 20 without reg-lIrd to the jm'isdiction or authority of any other 21 Scntlle C'ommittc(', whil'11 will aid the sdect committee tQ 22 prepare for or conduct. the invcstigatioon lind study lIuthOl;zed 2:~ Iln~ directod hy t·hi~ resolu.tion; and (12) to expend to the 2-t- extl'llt it dl'tNIl,illI'S llrl'l's8111)' or fl1)proprinte nny 1II0llCYS 645 10 1 made availitble to it by the Senate t{) pm10nn the duties 2 and exercise the powers oonferred upon it by this resolution 3 and to IOOke the investigati{)n and study it is authorized by 4 this resolution to make. 5 (b) Subpenas may be issued by the select c-ommittee 6 noting through the chinnan or any other member designated 7 by him, and may be served by any person designated by 8 such cha,innan or other member anywhere within the borders 9 of the United States. The chairman of the select committee, 1<J or any other member thereof, is hereby authorized to admin11 ister oaths to any witnesses appearing before the c()lllmittee. 12 (c) In preparing for or oonducting the investigMio~l 13 and study authorized and directed by this resolution, the 14 select committee shall be empowered to exemise the powers 15 oonferred upon ?ommittees of. the Senate by section 6002 of 16 title 18, United States (JQde, or any other Act of Congress 17 regulMing the" granting of immunity to witnesses. 18 SBC. 4. The seiect committee. shAH have authority to 19 recommend the enaotment of any new legislation or the 20 amendment of any existing statute which it considers neces21 sary or desira:ble to strenghen or clarify the national secu22 rity, intelligence, or surveillance activities of the United 23 States and to pr{)teot the rights of ITnited States citizens 24 with rega.rd to those activities. 646 11 1 SEC. 5. T!Je select cmnmittee shall make a final report 2 of the results of the inve~·tigation and study conducted l,y 3 it pursuant to this resolution, together with its findings and 4 its reoommendations as to new congressional legislation it 5 deems necessary or desirahle, to the Senate at the earliem 6 practicable dat{', but no later than September 1, 1975. The 7 select eommittee may also submit to the Senate sUch interim 8 reports as it considers a.ppropriate. After submission of its 9 final report, the select committee shaH have three calendar 10 months to close Its affairs, and on the expiration of such 11 three calendar months shall cease to exist. 12 SEC. 6. The expens{'s of the select committee through 13 SoptcOIher 1, 1975, under this rmlolution shall not exceed 14 $750,000 of which amount not to exeeed $100,000 shall be 15 Ilvailable for the procurement of the services of individual 16 consultants or org'luizations thereof. Such expenses shall be 1'1 paid from the contingent fund of the Senate upon vouchers 18 approved by the chiWman of the select committee. 19 SEC. 7. The select CO'Illmittee shaH institute and cany 20 out such rules lind procedures as it may deem necessary to 21 prcvent (1) the disclosun~, outt,i.de the seleot committee, of 22 allY infOl'lDatioll relating to the activities of the Central In23 telligence Agency or any other department or agency of the 24 Federal Government engaged in inteUigence activities, ob647 12 1 ta,ined by the select committee during the course of its study and investigation, not allthorized by the seled committee 3 to be disclosed; and (2) thi' disrlof'.ure, ontside the select 4 committee, of Ilny infol1Jl.'ltion which would a.dversely affect 5 the intelligence activities of the Central Intelligence Ageney 6 in foreign countries or the intelligence activities in foreign 7 cOllntn('s of flny other deparhnent or ngenry of the Fed<,rnl 8 Government. 9 SEC. 8. As 11 condition for oo1ployment as described in 10 section 3 of this resolution, each person shell agree I1'Ot to 11 accept any honorarium, roynlty Ol' oth<,l' payment for a 12 sl)ellkill~ clIgllgCIlU'llt, magazine nrtide, !I{)ok, or other ell13 deavor eonnected with the inYestigation and study ullder14: taken hy this committee. 15 SEC. 9. No <'Dl'plll)'('e of the st'h'l't ('ommiUe(' or lin)' 16 l>crsoll l'ugllg(\d 1Iy contract or otherwise to perforrl1 s('l"\'iet>t; 17 for the s~loot committee shall be given access to any cl/\slji18 tied infonnation by the select committee unleS'S such em19 pJoyee or person has received an appropriate security c1ear20 ance as d<,tel'lnined hy the select committee. The type of 21 se<'urity eleflrll1we to he required in the rfl,se of flny !,;I\ch 22 employ<'e or person shall, within the detcrminfltion of t.he 23 s('!ect eommittee, he eommens11Tnte with the sensitivity of 24 tll(' clas:,ifi<'tl iuFormlltion to ",hieh sneh employee or ))<'I'''OU :!3 will he ~iwn Il('('e~s hy the select rOllllllittl'(', STAFF LIST This Final Report is the result of a sustained effort by the entire Committee staff. The Committee wishes to express its appreciation to the members of the support, legal, research, and Task Force staffs, who made a substantial contribution to this Report and who have served the Committee and the Senate with integrity and loyalty: David Aaron Task Force Leader. William Bader Task Force Leader. Barbara Banoff Counsel. Howard Barkey Consultant. Frederick Baron________________ Counsel. Laurie BartleL_________________ Secretary. Lawrence Baskir . Counsel. John Bay-Iy Counsel. Charity Beuz Office Manager. Richard Betts Professional Staff Member. Beth Bloomfield Research Assistant. Sam Bouchard . Professional Staff Member. Harriet Bramble . Secretary. Belva Brissett Secretary. Nancy Brooks Secretary. Maxine Brown . Secretary. Andrew Burness Clerk. David Bushong Counsel. Margaret Carpenter . Research Assistant. Barry Carter Counsel. Barbara Chesnik . Research Assistant. Lot Cooke . Clerk/Security. Elizabeth Culbreth . Counsel. Lynn Davis Professional Staff Member. Spencer Davis Press Secretary. Rhett Dawson Counsel. Tom Dawson Research Assistant. James De Marco Counsel. Joseph Dennin . Counsel. Mary De Oreo Research Assistant. Mary de Temple Secretary. James Dick Counsel. Joseph di Genova Counsel. Dorothy Dillon Research Assistant. Patricia Doolittle_______________ Secretary. Daniel Dwyer, Jr Research Assistant. Robert Edwards, Jr Clerk/Security. John Elliff Task Force Leader. Betty Ellison Secretary. Michael Epstein________________ Counsel. (649) 650 .Toan Rrno Secretary. Peter Fenn Professional Staff Member. Harold Ford . (;onsultant. Richard Garwin . Consultant. Mark Gitenstein . Counspl. Janette Ghdewell Secretary. Bruce GranL Counsel: Edward Greissing . Research Assistant. Arthur Harrigan . Consultant. William Harris Consultant. Audrey Hatry Clerk of the Committee. Deborah HerbsL . Assistant Press Secretary. Paulette Hodges Secretary. Karl Inderfurth Professional Staff Member. Portia Iverson Secretary. Arthur Jefferson Counsel. Dorothy Johnson . Secretary. Loch Johnson Professional Staff Member. Yolanda J ohnson . Clerk. James J ohnston Counsel. Anne Karalekas Professional Staff Member. Jeffrey Kayden Research Assistant. Robert Kelley . Counsel. Lawrence Kieves Control Coordinator. Charles Kirbow Counsel. Joseph Kirchheimer Consultant. Diane KoppaL . Secretary. Susan Koscis . Secretary. Diane LaVoy Research Assistant. George Lawton . Professional Staff Member. Howard Liebengood Consultant. Charles Lombard . Professional Staff Member. Dan McCorkle Clerk/Security. Dorothy McIntyre . Secretary. Martha MacDonald . Secretary. Naldeen MacDonald Research Assistant. Michael Madigan_______________ Counsel. Ben MarshalL Security Director. Cynthia MasciolL . Secretary. Judith Mason . Research Assistant. Ernest May . Consultant. Betty Mayo . Secretary. Elliott MaxwelL Counsel. Ellen Metsky Clerk. Paul MicheL___________________ Counsel. William Miller . Staff Director. Patricia Monaco________________ Secretary. Janet Moore Secretary. Michael Murphy Clerk/Security Assistant. Lois Nuss . Secretary. James O'Flaherty Professional Staff Member. Jan Orloff Research Director. Lynsey Oster Clerk. 651 Drena Owens Secretary. John Peterson__________________ Research Director. Susan Pitts . Research Assistant. Andrew PostaL Counsel. Christopher Pyle ... Consultant. Alton Quanbeck________________ Task Force Leader. Ted Ralston Research Assistant. Harry Ransom Consultant. Gordon Rhea Counsel. Eric Richard Counsel. Walter Ricks IIL Counsel. Alan Romberg Professional Staff Member. James Rowe Research Assistant. Ruth Schneider Secretary. Frederick A. O. Schwarz, Jr Chief Counsel. Paula Schwartz________________ Clerk. Lester SeideL__________________ Counsel. Patrick Shea Professional Staff Member. John L. Smith Counsel. Elizabeth Smith Research Assistant. Stephanie Smith Clerk. Curtis Smothers Counsel for Minority. Britt Snidec Counsel. Martha Talley Counsel. Athan Theoharis_______________ Consultant Florence Thoben Mail Clerk. Sherry ToweIL_________________ Office Manager. Gregory Treverton Professional Staff Member. William TrueharL Consultant. James Tschirgi Professional Staff Member. James Turner Research Assistant. Richard IDlman Consultant. Paul Wallach Counsel. William White Professional Staff Member. Burton Wides Counsel. Carol Wiik Document Clerk. Joan Wilson Secretary. Otis Wilson Consultant. Peter Zimmerman Consultant. Phebe Zimmerman Research Assistant. u.s. GOVERNMENT PRINTING OFFICE, 1976 0-207-932
|