Site Map CHURCH COMMITTEE REPORTS |
94TH CONGRESS } 2d Session SENATE { REPORT 1'\0. 94-755 INTELLIGENCE ACTIVITIES AND THE RIGHTS OF AMERICANS BOOK II FINAL REPORT OF THE SELECT COMMITTEE TO STUDY GOVERNMENTAL OPERATIONS WITH RESPECT TO INTELLIGENCE ACTIVITIES UNITED STATES SENATE TOGETHER WITH ADDITIONAL, SUPPLEMENTAL, AND SEPARATE VIEWS APRIL 26 (legislative day, APRIL 14),1976 68-7860 U.S. GOVERNMENT PRINTING OFFICE WASHINGTON : 1976 For sale by the Superintendent of Documents, U.8. Government Printing Office Washington. D.C. 20402 - Price $3.60 SENATE SELECT COMMITl'EE TO STUDY GOVERNMENTAL OPERATIONS WITH RESPECT TO INTELLIGENCE ACTIVITIES FRANK CHURCH, Idaho, Ohairman JOHN G. TOWER, Texas, Vice Ohairman PHILIP A. HART, Michigan HOWARD H. BAKER, JR., Tennessee WALTER F. MONDALE, Minnesota BARRY GOLDWATER, Arizona WAurER D. HUDDLESTON, Kentucky CHARLES McC. MATHIAS, JR., Maryland ROBERT MORGAN, North Carolina RICHARD S. SCHWEIKER, Pennsylvania GARY HART, Colorado WILLIAM G. MILLER, Staff Director FREDERICK A. O. SCHWARZ, Jr., Chief OOrlnael CURTIS R. SMOTHERS, COrlnael to the Minority AUDREY HATR"!, Clerk o! the Committee (n) LETTER OF TRAXS~IITTAL On behalf of the Senate Select Committee to Shulv Governmental Operations with Respect to Intelligence Aeti "itips, lind pursuant to the mandate of Senate Hesolution 21, I am transmitting herewith to the Senate the volume of the Committee's Final Heport which presents the results of the Committee's inH'stigation into Fedpral domestic intelligence acti\'ities. The Committee's fim]ings and conclusions concel'lling almsps in intelligence activity ancl wraknesses in the system of accountability anI] control are amply docllllH'nted. I belirn> tlwy makp a comprlling case for substantial reform. The rpcomnwnc1ations spdion of this \'olumr sets forth in detail the Committer's proposals for reforms necessary to protect the right of Americans. The facts r.pvealed by the Committee's inquiry into the development of (lomestic intelligence acti\'ity arr outlined in the balance of the volume. I \vould add one principal comment on the results of the Committe, e's inquiry: The root cause of the excesses whieh our reeord amply demonstrates has been failUl'e to apply the \visdom of the constitutiona] system of checks and balances to intelligence activities. OUl' ('xlwrienrr as a nation has taught us that we must place our trust in la\vs, and not solely in IllPn. The founding fathers foresaw eXCeA''> as the inpyitable consequenre of granting any part of government unchrckrfl power. This has bern drlllonstratrd in the intelligence field where, too often, constitutional principles \vere subordinated to a pragmatic course of perlllittinl! desirrll el1<18 to dictate and justify improper nwans. Our rrcommrndations arr (]esil!ne(l to place intrlligence activities \vithin the constitutional scheme for controlling gon>rnment po\\'er. The members of this CommitteI' haY<' SPl'\"pd \\"ith utmost diligence and ,lrdieation. ",\'p haw had 12() Full COll\lllittre mrptin§..rs, scores of othrl' sessions at which Senators presidpd at depositions foJ' the taking of testimony, awl ovrJ' .J-() sll]JCommittep medings (le\'ote(l to (lmiting the t\\'O volmnes of ollr final rppmt. I thank rarh and en'ry one of my collraglles for their hard work and for their ddermination that the job br done flilly alHl fairly. ,John Tower's srlTicr as Yirp Chairman was essential to our eft'ectin> ness from start to finish. This inquiry rould han> been distracte(] by partisan argument on.'r allocating the blalllP f()]" intelligrnee rxcesses. Instead, \Y{' han> unanimously eoncluded that intelliW>IH'r problems are far morr fumlanH'ntaJ. They are not thp }lro(luct of any single administration, party. or man. At thp OlitSet. of this partieular \'olullH'. slJPcial IllPntion is also dl1r to Senator ""alter F. ~[ondalp for his chairmanship of the subcommittee rhargpf] with dra it inl! the fi naI repOlt on domestie intPl ligencp aeti\'ity. Dliring 0111' hearings, Srnator ~[()ndale helped to bring into foeus the threats posed to thp rights of AlllPriean ritizens. He awl his (nIl IV domestic subcommittee colleagues-Senator Howard Baker, as ranking Minority member, and Senators Philip Hart, Robert Morgan and Richard Schweiker-deserve great credit for the complete and com~ lling draft which they presented to the Full Committee. The staff of the Committee has "'orked long, hard and well. ·Without their work over the past year-and during many long nights and weekends-the Committee could not have come close to coping with its massive job. I commend and thank them all. The staff member.:; whose work was particularly associated with this volume and its supplementary detailed reports are listed in Appendix C. FRAXK CHURCH, Chairman. PREFACE In .Tanuary 1975. tIlE' Senate resoln'd to establish a Committee to: eonduC't an investigation aud study of gO\'el'umeuta] operations with respect to intelligence aetivitips anl] the extpnt, if any, to which illegal. impropeL or unethical acti\-ities \yere engaged in by any agency of the Federal Government.' This Committee ,,'as organized shortly thereafter aUlI has conducted fl year-long im'estigation into thl' intE'lligencl' activities of the Fnited States Government. the first substantial inquiry into the intelligence community since 'Yorhl 'Yar TI. The inquiry arose out of allegations of substantial wrongdoing by intelligence agencies on behalf of the administrations which they sened. A deeper concern underlying tlw inwstigation was whether this Ciow.rnmenfs intelligencl' aeii vities \\"('rl' gowrIlPd and controlled consistently \\'ith the fundamental principles of American constitutional gO\'ernment-that power must be ehecked and balaneed and that the presen'ation of liberty requires thl' restraint of laws, and not simply the good intentions of men. Our investigation has confirmed that prolwrly controlled and lawful intelligl'nee is vital to the nation's intl'rest. A strong and effective intelligence system sern's, for example. to monitor potential military threats from the Soviet l'nion aIHI its allies, to verify compliance with international agreements such as SALT. anll to combat espionage and international terrorism. These. and many other necessary and proper functions are performed by dedicatl'd and hard working employees of tlw intelligence community, The Committee's im'estigation has. hmwyer. also confirmed substmltial wrongdoing. And it has demonstrated that intelligence activities han' not generally b('en governed and controllell in accord with the fundamental principles of our constitutional system of govemment. The task faced by this Committee was to propose effective measures to prevent intelligence excessl's.and at the same time to propose sound guidelines and oversight procellnres \yith \yhich to gO\'em and control legitimate activities. Having concluded its investigation, the COlllmittee issues its reports 2 for the purpos('s of: providing a fair factnal basis for informed Congressional and pnblic debate on Ct'itil'al issues affecting the role of gO\'ernmental intelligence activities in a free society; anel 1 Senate Resolution 21. January 27. 1975. Sec. 1. The full text of S. Res. 21 is printed at Appendix A. , The Committee's final report is divided into two main volumes. The !Jalance of this volume covers dome;;tic activities of intelIig;ence ag;l'ncil's and tlll'ir activities m'prseus to the extent that they afl'eet tIll" eonstitutional rig;hts of AIIlerieans. The othl'r vO]lIn1P eOVl'rs a1l othl'r aetivities of l"nitl'd Stat"s foreign and military intl"1ligencp ag;pneips. The COIllmittee has previously issued the reports and hearing records set forth in Appendix B. (V) VI recommending such legislati"e and executive action as, in the judgment of the Committee, is appropriate to prnent recurrence of past abuses and to insure adequate coordination, control and oversight of the nation's intelligence resourcps, capabilities, and activities. A. THE CO)DIITTEE'S ~IAXDATE In elaboration of the broad mandate set forth at the outset of this Report, the Senate charged the Committee with investigating fourteen specific "matters or questions" and with reporting the "full facts" on them. The fourteen enumerated matters and questions concern: (i) what kind of activitips han been-and should be-undertaken by intelligence agencies; (ii) whether those activities conform to law and the Constitution; and (iii) how intelligence agencies have beenand should be-coordinated, controlled and m·erseen.3 In addition to im'estigating the "full facts" with respect to such matters, the Committee ,vas instructed to determine: ·Whether any of the existing laws of the United States are inadequate, either in their provisions or manner of enforcement, to safeguard the rights of American citizens, to improve executive and legislative control of intelligence and related activities and to resolve uncertainties as to the authority of "Cnited States intelligence and related agencies. [Id., Sec. 2 (12) ] B. THE MAJOR QUESTIO~'S Our investigation addressed the structure, history, activities and policies of America's most important intelligence agencies. The Committee looked beyond the operation of individual agencies to examine common themes and patterns inherent in intelligence operations. In the course of its investigation, the Committee has sought to answer three broad qnestions: First, whether domestic intelligence activities have been consistent with law and with the individual liberties guaranteed to American citizens by the Constitution. Second, whether America's foreign intelligence activities have sen'ed the national interest in a manner consistent with the nation's ideals and with national purposes. 3 S. Res. 21, Sec. 2. Examples of the "matters or questions" include: "The conduct of domestic intelligence or counterintelligence operations against United States citizens" by t.he FBI or other agencies. [Sec. 2 (2)] ; "The violation or suspected ,iolation of law" by intelligence agencies [Sec. 2(10)] ; Alleg'ations of CIA "domestic" activity, and the l'elationship between CIA responsibility to protect sources and methods and the prohibition of its exercising' law enforcement powers or internal security functions [Sec. 2(1), (6)]; "The origin and disposition of the so-called Huston Plan" [Sec. 2 (7) (9)] ; "The extent and necessity' of "covert intelligence activities abroad [Sec. 2(14)]; Whether thpre is excessive duplication or inadequate coordination among intellig-ence agencies [Sec. 2 (4) (13)] and The "nature and extent" of t>xecutive oversig'ht [Sec. 2 (7) (9)] and tht> "nt>ed for improved, strengtht>ned or consolidated' Congressional oversight [Sec. 2(7) (I)) (11)]. VII Third, whether the institutional procedures for directing and controlling intelligence agencies haw adequately ensured their compliance with policy and law, and whether those procedures haye been based upon the system of checks and balances among the branches of gon~rnment required by our Constitution. " The Committee fully subscribes to the premise that intelligence agencies perform a necessary and proper function. The Preamble to the Constitution states that our goyernment was created, in part, to "insure domestic tranquility [and] provide for tlw common defense." Accurate and timely intelligence can and does help meet those goals. The Committee is also mindful, howe\-('1', of the danger which intelligence collection, and intelligence operations, may pose for a society grounded in democratic principles. The Preamble to our Constitution also declares that our government was created to "secure the lJlessings of liberti' and to "estalJlish justice? If domestic intelligence agencies ignore those principles, tlwy may threaten the very yalnes that form the foundation of our society. Similarly, if the gOYernment conducts foreign intelligence operations oyerseas which are inconsistent with our national idpals, our reputation, goals, and influence abroad may be undercut. C. THE XATFRE OF THE COl\DlITTEE'S I:'\TESTIGATIOX 1. SELECTIOX OF AGEXCIES, PROGRX~IS AXD CAS}~S TO E:\IPIL\SIZE Xecessarily, the Committee had to be selective. To investigate everything relennt to intelligence-and en'n everything relevant to the fundamental issues on which WE' had decided to focus-would take forever. Our job ,,-as to discoycr-alHl suggrst solutions for-the major problems "at the earliest practical date"! Accordingly, the Committee hall to choose the particular Governmental entities upon which we would concentrate aIH] then further had to choose particular cases to im'estigate in depth. )Iany agencies, departments or bureaus of the Federal Goycrnment haye an intrlligence function. Of thesr, the Committee spent thr overwhelming preponderance of its energies on five : The Federal Bnrpau of Inn·stigation; The Central Intelligence Agency; The Katiollal Spcurity Agpncy; The national intelligence components of the Defense Departnwnt (other than XSA) ; and The Xational Security Council and its component parts." The agencies upon \yhi('h the COlllmitt('(, concentrated are those whose powers are so grrat and \y1l0sr practices werp so extpnsiye that they must hr llndrrstood in order fairly to j1Hlgr ,,-ll('tll('r the intellig- p]}cr systrm of the rnitrd States ]}rpds reform and changr. Haying- selp('tpcl the agencips to pllIjlhasize, the Committer also had to sp]pct ]'('prespntatiyp programs and policirs Oll \yhich to concentrate. Thrrr wrre mallY more possihlr iSSllrs and alh'gations to im'rstigate 4 S. Res. 21 ; SP('. G. o Suhshlntial \York was also done on intE'l1i~pn('E' actiyitiE's of the Tlltprnal Rpyenne Spr\"iee and the State Department. VIII than could be covered fully and fairly. The principles which guided our choices were: (1) More is learned by inYestigating tens of programs and incidents in depth rather than hundreds superficially. Our goal was to understand causes and, where appropriate, to suggest solutions. (2) Cases most likely to produce gen('ral lessons should receive the most attention. (3) Programs were examined from each administration beginning with Franklin RooseYelt's. This assured understanding of the historical context within which intelligence activities have developed. Fundamental issues concerning the conduct and character of the nation deserw nonpartisan treatment. It has become clear from our inquiry, moreover, that intelligence excesses,at home and abroad, have been found in every administration. They are not the product of any single party, administration, or man. 2. LIMITATIOXS AXD STREXGTHS (a) The Focus on Problem Arcas The intelligence community has had broad responsibilitv for activities beyond those which we investigated as possibly "illegal, improper, or unethical". Our reports primarily lldclress problem areas ancl the command and control question generallv. Howewr, the intelligence community performs vital tasks outside the areas on which our investigation concentrated. This point must be kept in mind in fairness to the agencies, and to their employees who han' devoted their careers to the nation's service. Moreover, one of many reasons for checkin.~ intelligence excesses is to restore the confidence, good name, and effectiveness of intelligence agencies so that they may better sene the nation in the future.6 (b) Caution on Questions of Individual "Guilt" 01' "InrlOcence" A Senate Committee is not a prosecutor, a grand jury or a court. It is far better suited to determine how things went wrong and what can be done to prevent their going wrong again, than to resolve disputed questions of individual "guilt" or "innocence". For the resolution of those questions we properly rely on the courts. Of course, to understand the past in order to bettex propose guidance for the future, the Committee had to inYestigate the facts underlying charges of wrongdoing. Facts involve people. Therefore, the Committee has necessarily had to determine what particular individuals appear to have done and, on occasion, to make judgments on their responsibility. ",Ve haw, howewr, recognized our limitations and attempted to be cautious in reaching those judgments; the reader should be similarly cautious in evaluating our judgments. The Committee's hope is that this report will provoke a national debate not on "",",Tho did it ?", but on "How did it happen and what can be done to keep it from happening again?" 6 Indeed, it is likely that in some eases the high priority giYen to actiyities that appear queRtionable has rednced the attention giwn to other yital matterR. Thul', the FBI. for example, has placed more emphaRiR on domeRtic diRRent than on organized crime and, according to some. let HR effortR againRt foreign RpieR Ruffer because of the amount of time spent checking up on American proteRt groupR. IX (c) Ability to See the Full Scope of the Problem .This Commit~ee examined a very broad range of issues and complIed a hughe factual record' which covers: (i) the origins and development of intelligence programs over seven administrations; (ii) intel1igence activities both at home and abroad; and (iii) the programs and practices of the, several most important intelligence agencies. ~hus, for the first time, based upon the Committee's investigation, it 1S possible to examine the patterns of intelligence activity and nof merely isolated incidents. The, issues for the country to resolve, are best posed by looking, as we have done, at the, aggregate, rather than at particular incidents in isolation, Neither the dangers, nor the causes, nor the possible, solutions can be fairly evaluated without considering both the broad patterns of intel1igence activity ,vhich emerge from examining particular cases over the past several decades, and the cumulative effect of activities of different agencies. For example, individual cases or programs of governmental suneillance may constitute interference with constitutionally protected rights of privacy and dissent. But only by examining the cumulatiYe impact of many such programs can the danger of "Big Brother Gm-ernment" be realistically assessed. Only by understanding the full breadth of goycrnmental efforts against dissenters can one weigh the extent to which those efforts may chill lawful assembly and free exprpssion. D. TIlE PURPOSE OF THE CO:\DII'I'rEE's FIXDIXGS A~D RECOMMENDATIONS The central goal of the Committpe is to make inforIlH'd recommendations- based upon a detailpd and balanced factual investigation- about : (1) ",hich intelligpnce activities ought to be permitted, and ",hich should be restricted or prohibited; and (2) what controls and organihational structure are needed to keep intelligence operations both effective and consistent with this countrv's most basic values and fundamental interests. . 7 Some 800 witnesses were examined, approximately 2;->0 under oath in executive sessions, 50 in puhlic sessions, and the halaIH'e in interviews. The aggrpgate number of transcript pages is almost 30.000. Approximately 110,000 document pag-es were ohtained from the various intellig-encp ag-encies (still more were preliminarily reYiewed at the agencief;), af; well as from- the 'Vhite House, prpf;idpntiallihrarief;. and othpr sourcps. Over the course of its investigation tJIP Committee has had generallr good cooperation in obtaining information from the intelligpncp agpncies and the Adminif; tration. Of courf;p, there were problpms, particularl~' at the outset~ompliance took too long; hurpaucra tic rulps such as the "third agpncr rule" (which required ag-encies other than thp custodian of the document to rpview it if thpr wpre mpntionpd) werp frustrating. But our exppriencp suggestf; that those problemf; can he worked out. The most important lesson to hI' dprivpd from our experiencp is that effective O\-ersight is impof;sih]p without regular access to the underlying working documents of the intelligpnce eommunitr. Top If'vpI hriefingf; do not adpquatplr descrihe the realitips. For that the documents are a necessary supplement and at timef; the only source. x The first step for this Committee, its successor oversight Committees and the Congress as a whole is to devise the legal framework within which intelligence agencies can, in the future, be guided, checked and operate both properly and efficiently. A basic la,,"-a charter of powers, duties, and limitations-does not presently exist for some of the most important intelligence activities (e.g., FBI's domestic intelligence or NSA) or, where it does exist, as \vith CIA, it is vague, conflicting and incomplete. The absence of laws and the lack of clarity in those that exist has had the effect, if not the intention, of keeping vital issues of national importance away from public debate. This Committee's job was to pose the issues that have been ignored for decades. The technique for doing so was to investigate and then to propose basic laws and other rules as to what can and cannot be done, and on the appropriate command and control structure for intelligence activities. There are many other questions, such as the efficiency, cost and quality of intelligence, \vhich are also of vital national importance. ·We have also examined these matters and consider them in this report. But, the main emphasis of our investigation was on what should be done and not on how it should be done. vVe seek in our recommendations to lay the underlying legal foundation, and the control and oversight structure for the intelligence community. If these are sound, then we have faith that the other questions will be answered correctly in the future. But if the foundation is unsound or remains unfinished-or if intl.'lligence agencies continue to operate under a structure in which executive power is not effectively checked and examined-then we will have neither quality intelligence nor a society which is free at home and respected abroad. CONTENTS Page Letter of Transmittal_ _____________________________________________ iii Preface -------________________________________________________ v 1. INTRODUCTION AND SUMMARY_ 1 A. Intelligence Activity: A New Form of Governmental Power to Impair Citizens' Rights____ _________________________ 2 B. The Questions _________________________________________ 4 C. Summary of the Main Problems_________________________ 5 1. The Number of People Affected by Domestic Intelligence Activity ________________________________ 6 2. Too Much Information Is Collected For Too Long_ _ 7 3. Covert Action and the Use of Illegal or Improper Means_______________________________________ 10 a. Covert Action____________________________ 10 (1) The FBI's COINTELPRO_ _____ ____ 10 (2) Martin Luther King, Jr_____________ 11 b. Illegal or Improper Means_ ___ __________ 12 (1) Mail Opening______________________ 12 (2) NSA Monitoring_ _ ______________ 12 (3) Electronic Surveillance______________ 12 (4) Political Abuse_____________________ 13 (5) Surreptitious Entries_ ___ ________ 13 (6) Informants_ 13 4. Ignoring the Law________________________________ 13 5. Deficiencies in Accountability and ControL_ ________ 14 6. Th~ .Adverse Impact of Improper Intelligence ActlVlty________________________________________ 15 a. General Efforts to DiscrediL_ ______________ 15 b. Media Manipulation_ _____________________ 15 c. Distorting Data to Influence Government Policy and Public Perceptions_ __ _________ 16 d. "Chilling" First Amendment Rights__ _______ 17 e. Preventing the Free Exchange of Ideas_ __ ___ 17 7. Cost and Value__________________________________ 18 II. THE GROWTH OF DOMESTIC INTELLIGENCE, 1936 to 1976: A. Summary_____________________________________________ 21 1. The Lesson: History Repeats Itself ________________ 21 2. The Pattern: Broadening Through Time____________ 21 3. Three Periods of Growth for Domestic Intelligence___ 22 B. Establishing a Permanent Domestic Intelligence Structure: 1936-1945___________________________________________ 23 1. Background: The Stone Standard____ ______________ 23 2. Main Developments of the 1936-1945 Period________ 24 3. Domestic Intelligence Authority: Vague and Conflicting Executive Orders____ _______________________ 24 a. The Original Roosevelt Orders _____________ 25 b. Orders in 1938-39: The Vagueness of "Subversive Activities" and "Potential" Crimes_ 25 c. Orders 1940-43: The Confusion Continues_ __ 27 4. The Role of Congress ____________________________ 28 a. Executive Avoidance of Congress ___________ 28 b. Congress Declines to Confront the Issue_ ____ 29 (XI) II. THE GROWTH OF DOMESTIC INTELLIGENCE-Continued B. Establishing a Permanent Domestic Intelligence StructurE'- 1936-1945 Continued Page 5. Scope of Domestic Intelligence ____________________ 30 a. Beyond Criminal Investigations____________ 30 b. "Infiltration" Investigations_ ______________ 31 c. Partisan Use_____________________________ 33 d. Centralized Authority: FBI and Military Intelligence ____________________________ 33 6. Control by the Attorney General: Compliance and Resistance_ ___________________________________ 34 7. Intrusive Techniques: Questionable Authorization ___ 36 a. Wiretaps: A Strained Statutory Interpretation___________________________________ 36 b. Bugging, Mail Opening, and Surreptitious Entry_________________________________ 38 C. Domestic Intelligence in the Cold War Era: 1946-1963 ____ 38 1. Main Developments of the 1946-1963 Period________ 38 2. Domestic Intelligence Authority _ __________ __ 40 a. Anti-Communist Consensus ________________ 40 b. The Federal Employee Loyalty-Security Program__________________________________ 42 (1) Origins of the Program . _______ 42 (2) Breadth of Investigations . ___ 43 (3) FBI Control of Loyalty-Security Investigations_ ____________________ 44 c. Executive Directives: Lack of Guidance and Controls___________________________________ 45 3. Scope of Domestic Intelligence_ ___________________ 46 a. "Subversive Activities" ____________________ 46 (1) The Number of Investigations______ 47 (2) Vague and Sweeping Standards __ ___ 47 (3) COMINFIL ._ _____ 48 (4) Exaggeration of Communist Influence_________________________ 49 b. "Racial Matters" and "Hate Groups" ______ 50 c. FBI Political Intelligence for the White House_________________________________ 51 d. IRS Investigation of Political Organizations_ _ 53 4. Accountability and ControL ______________________ 54 a. Emergency Detention Act- _____ ___________ 54 b. Withholding Information_ _________________ 55 c. CIA Domestic Activity____________________ 56 (1) Vague Controls on CIA____________ 56 (2) Drug Testing and Cover Programs_ _ 56 5. Intrusive Techniques_____ ___________ __ _____ __ ____ 58 a. Communication Interception: CIA and NSA_ 58 b. FBI Covert Techniques____________________ 60 (1) Electronic Surveillance_____________ 60 (2) "Black Bag" Jobs _________________ 61 (3) Mail Opening__ ___________________ 62 c. Use of FBI Wiretaps_ _____________________ 62 6. Domestic Covert Action.. ________________________ 65 a. COINTELPRO: Communist Party_________ 65 b. Early Expansion of COINTELPRO___ ______ 67 D. Intelligence and Domestic Dissent: 1964-1976_____________ 67 1. Main Points During the 1964-1976 Period_ _________ 67 2. Scope of Domestic Intelligence_ ___________________ 70 a. Domestic Protest and Dissent: FBL________ 70 (1) Racial Intelligence________________ 71 (2) "New Left" Intelligence___________ 72 b. FBI Informants__________________________ 74 (1) Infiltration of the Klan _____ _______ 74 xm II. THE GROWTH OF DOMESTIC INTELLIGENCE-Continued D. Intelligence and Domestic Dissent: 1964-1976-Continued 2. Scope of Domestic Intelligence-Continued b. FBI Informants-Continued (2) "Listening Posts" in the Black Com- Page munity __ __ 75 (3) Infiltration of the "New Left" _______ 76 c. Army Surveillance of Civilian Political Activity - - - _- ________ 77 d. Federal Encouragement of Local Police Intelligence ____________________________ 77 e. The Justice Department's Interdivision Information unit (IDIU)__________________ 78 f. COMINFIL Investigations: Overbreadth_ ___ 81 3. Domestic Intelligence Authority __________________ 82 a. FBI Intelligence__________________________ 82 b. Army Intelligence_ ________________________ 84 c. FBI Interagency Agreements_ ______________ 85 4. Domestic Covert Action _________________________ 86 a. COINTELPRO__________________________ 86 (1) Klan and "White Hate"___________ 86 (2) "Black Nationalist" COINTELPRO_ 87 (3) "New Left" COINTELPRO_______ 88 b. FBI Target Lists__________________________ 89 (1) "Rabble Rouser/Agitator" Index_ ___ 89 (2) "Key Activist" Program ___________ 90 (3) "Key Black Extremist" Program_ ___ 91 (4) Security Index____________________ 91 c. Internal Revenue Service Programs_ ________ 93 (1) Misuse by FBI and CIA___________ 93 (2) The Special Service Staff: IRS Targeting of Ideological Groups_ _____ 94 5. Foreign Intelligence and Domestic Dissent_________ 96 a. Origins of CIA Involvement in "Internal Security Functions" ______________________ 96 b. CIA Intelligence About Domestic Political Groups_______________________________ 98 (1) CIA Response to FBI Requests_ ____ 98 (2) Operation CHAOS________________ 99 c. CIA Security Operations Within the United States: Protecting "Sources" and "Methods" _ 102 d. NSA Monitoring_________________________ 104 6. Intrusive Techniques____________________________ 104 a. Warrantless Electronic Surveillance_ ________ 105 (1) Executive Branch Restrictions on Electronic Surveillance: 1965-68_. _ 105 (2) Omnibus Crime Control Act of 1968_ 106 (3) Supreme Court Restrictions on National Security Electronic Surveillance: 1972 _____________________ 107 b. CIA Mail Opening_ _______________________ 107 c. Expansion of NSA Monitoring_ ____________ 108 d. FBI Cutbacks____________________________ 109 (1) The Long Subcommittee Investigation ___________________________ 109 (2) Director Hoover's Restrietions_ _____ 110 7. Accountability and ControL_____________________ 111 a. The Huston Plan: A Domestic Intelligence Network_______________________________ 111 (1) Intelligence Community Pressures_ __ 112 (2) The Interagency Committee Report-_ 113 (3) Implementation_ __________________ 115 XIV II. THE GROWTH OF DOMESTIC INTELLIGENCE-Cont.inued D. Intelligence and Domestic Dissent: 1964-1976-Continued 7. Accountability and C~mtrol-Continued Page b. Political Intelligence____ ___________________ 116 (1) Name Check Requests_ _ 116 (2) Democratic National Convention, Atlantic City, 1964_________________ 117 (3) By-Product of Foreign Intelligence Coverage_______________________ 119 (4) The Surveillance of Joseph Kraft (1969)_________________________ 121 (5) The"17"Wiretaps 122 c. The. J.u~tice Department's Internal Security DlvlslOn____ ____________________________ 122 (1) The "new" Internal Security Division_ 123 (2) The Sullivan-Mardian Relationship_ _ 124 d. The FBI's Secret "Administrative Index" 125 8. Reconsideration of FBI Authority _________________ 127 a. Developments in 1972-1974________________ 128 b. Recent Domestic Intelligence Authority _____ 131 III. FINDINGS_ _________________________________________________ 137 A. Major Finding: Violating and Ignoring the Law____________ 137 Subfindings : (a) Violating Statutory Law and Constitutional Rights__________________________________ 139 (b) Ignoring IllegalIssues_ ______________________ 140 (c) Continuing Legal Activities__________________ 141 (d) Tightening Security for Illegal Activities_ ____ _ 146 (e) Concealing Illegal Activities__________________ 149 (f) Weakness of Internal Inspection______________ 152 (g) Weakness of Oversight by Senior Administration Oflicials_________________________________ 157 B. Major Finding: The Overbreadth of Domestic Intelligence ActivUy____________________________________________ 165 Subfindings : (a) Broad Scope of Investigations_ __ _____________ 167 (b) Imprecise Standards for Investill;ations_ _______ 169 (c) Overinclusive Targeting_____________________ 172 (d) "Vacuum Cleaner" Approach________________ 178 (e) Excessively Long Investigations_ _____________ 179 C. Major Finding: Excessive Use of Intrusive Techniques______ 183 Subfindings: (a) Insufficient Legal Standards and Procedures_ __ 185 (b) Excessive Collection Coupled with Violent and Illegal Activities of Informants and Difficulty of Limiting Surveillance___________________ 192 (c) Imprecise Labels Lead to Abusive Use of Techniques______________________________ 205 D. Major Finding: Using Covert Action to Disrupt and Discredit Domestic Groups___ ____________________________ 211 Subfindings: (a) Targeting Law-Abiding Citizens______________ 213 (b) Interference With First Amendment Rights____ 214 (c) Dangerous Covert Tactics___________________ 216 (d) Actions Against Dr. Martin Luther King, Jr__ _ 219 E. Major Finding: Political Abuse of Intelligence Information_ _ 225 Subfindings: (a) Political Intelligence for the White House_ ___ 226 (b) Dissemination of Incidental Political or Personal Information_ ____________________________ 232 (c) Volunteering Information to the White House and Targeting Critics and Political Figures_ _ 237 (d) Influencing Social Policy and Political Action_ _ 240 xv III. FINDINGS-Continued: 'Page F. Major Finding: Inadequate Controls on Dissemination and Retention___________________________________________ 253 Subfindings : (a) Volunteering Irrelevant Information and responding Unquestioningly to Requests ______ 254 (b) Excessive Dissemination_ ___________________ 259 (c) Federal Employee Security Program_ _________ 261 (d) FBI Retention of Sensitive, Derogatory, and Illegally Obtained Information _____________ 262 G. Major Finding: Deficiencies in Control and Accountability __ 265 Subfindings : (a) Presidential Failure to Limit and Control Intelligence Activities_____________________ 267 (b) Attorneys General Failure to Limit and Control FBI Intelligence Activities_ ____________ 270 (c) Encouraging Political Intelligencc ____________ 274 (d) Executive Failures to Inquire________________ 275 (e) Congressional Failure to Oversee Intelligence Activity and Exert Legislative ControL _____ 277 (f) Intelligence Agencies Act with Insufficient Authorization_ ___________________________ 281 (g) Termination of Abusive Operations_ __________ 284 IV. CONCLUSIONS AND RECOMMENDATIONS________________ 289 A. Conclusions ___________________________________________ 289 B. Principles Applied in Framing Recommendations and the Scope of Recommendations_ ___________________________ 292 C. Recommendations_____ __________ ____________________ 296 1. Intelligence Agencies Are SUbject to the Rule of Law (Recommendations 1-3) ________________________ 296 2. United States Foreign and Military Agencies Should Be Precluded From Domestic Security Activities (Recommendations 4-27)___ __ __ _____ 297 a. Central Intelligence Agency (Recommendations 4-13) _____________________________ 297 b. National Security Agency (Recommendations 14-19)_________________________________ 308 c. Military Service and Defense Department Investigative Agencies (Recommendations 20-26)_________________________________ 310 3. Non-Intelligence Agencies Should Be Barred From Domestic Security Activity (Recommendations 27-37)_______________________________________ 313 a. Internal Revenue Service (Recommendations 27-35)_________________________________ 313 b. Post Office (U.S. Postal Service) (Recommendations 36-37)__________________________ 315 4. Federal Domestie Seeurity Activities Should Be Limited and Controlled to Prevent Abuses Without Hampering Criminal Investigations or Investigations of Foreign Espionage (Recommendations 38-69)________________________________________ 316 a. Centralize Supervision, Investigative Responsibility, and the Use of Covert Techniques (Recommendations 38-39) ________ 316 b. Prohibitions (Recommendations 40-41) ___ 317 c. Authorized Scope of Domestic Security Investigations (Recommendations 42-49) ____ 318 d. Authorized Investigative Techniques (Recommendations 50-63) ___________________ 324 e. ;Vlaintenance and Dissemination of Information (Recommendations 64-68) ___________ 330 f. Attorney General Oversight of the FBI, Including Termination of Investigations and Covert Teehniques (Recommendation 69)__ 332 XVI IV. CONCLUSIONS AND RECOMMENDATIONS-Continued Page C. Recommendations-Continued 5. The Responsibility and Authority of the Attorney General for Oversight for Federal Domestic Security Activities must be clarified and General Counsel and Inspectors General of Intelligence Agencies Strengthened (Recommendations 70-86) ________ 332 a. Attorney General Responsibility and Relaship With Other Intelligence Agencies (Recommendations 70-74) ______________ _ 333 b. General Counsel and Inspectors General of Intelligence Agencies (Recommendations 75-81)_________________________________ 333 c. Office of Professional Responsibility (Recommendation 82) __________ ___ ____ __ ____ 335 d. Director of the FBI and Assistant Directors of the FBI (Recommendations 83-85) ____ 335 6. Administrative Rulemaking and Increased Disclosure Should Be Required (Recommendations 86-89)_______________________________ 336 a. Administrative Rulemaking (Recommendations 86-88) ____________________________ 336 b. Disclosure (Recommendations 89-90) _______ 336 7. Civil Remedies Should Be Expanded (Recommendation 91)______________________________________ 336 8. Criminal Penalties Should Be Enacted (Recommendation 92) ___________________ _______ _ 338 9. The Smith Act and the Voorhis Act Should Either Be Repealed or Amended (Recommendation 93) _____ 339 10. The Espionage Statute Should Be Modernized (Recommendation 94)____ _____ ________________ _ 339 11. Broaden Access to Intelligence Agency Files Should Be Provided to GAO, as an Investigative Arm of the Congress (Recommendation 95)______________ 339 12. Congressional Oversight Should Be Intensified (Recommendation 96) _____________________ 339 13. Definitions_________ __ __ __ __ 339 Appendix A: Senate Resolution 21-__________________________________ 343 Appendix B: Previously Ismed Hearings and Reports of Senate Select Committee _________________________________________ 355 Appendix C: Staff Acknowledgments___ _____________________________ _ 357 Additional Views: Philip A. Hart_ _______________________________________________ 359 Robert Morgan_______________________________________________ 363 Introduction to Separate Views of Senators John G. Tower, Howard H. Baker, Jr., and Barry Goldwater___________________________ 367 John G. Tower________________________________________________ 369 Howard H. Baker, Jc_________________________________________ 373 Barry Goldwater______________________________________________ 389 Charles McC. Mathias, JL _____________________________________ 395
|