Site Map

CHURCH COMMITTEE REPORTS

III. FINDIXGS
The Committee makes senn major findings. Each finding is accompanied
by subfindings and by an elaboration ,,,hich draws upon the
Gvidentiary record set forth in our historical narrative (Part II herein)
and in the thirteen detailed reports ,vhich ,,,ill be published as supplements
to this volume. ,Ve have sought to analyze in our findings
characteristics shared by intelligence programs, practices which involnd
abuses, and general problems in the system which led to those
abuses.
The findings treat the fonowing themes that run through the facts
revealed by our investigation of domestic intelligence activity: (A)
Violating and Ignoring the Law; (B) Overbreadth of Domestic Intelligence
Activity; (C) Excessive Use of Intrusive Techniques; (D) r:-sing' Coycrt ~\ction to Disrupt and Discredit Domestic Groups;
(E) Political Abuse of Intelligence Information; (F) Inadequate
Controls Oil Dissemination and Retention; (G) Deficiencies in Control
and Accountabilitv.
Vlewed separately, each finding demonstrates a serious problem in
the conduct and control of domestic intelligence operations. Taken
together, they make a compelling case for the necessity of change.
Our recommendations (in Part IV) flow from this analysis and propose
changes which the Committee believes to be appropriate in light
of the record.
A. VIOLATING AND IGNORING THE LAW
MAJOR FIXDING
The Committee finds that the domestic activities of the intelligence
community at times violated specific statutory prohibitions and
infringed the constitutional rights of American citizens.! The legal
questions involved in intelligence programs were often not considered.
On other occasions, they '''ere intentionally disregarded in the belief
that became the programs served the "national security" the law
did not apply. ,,\Vhile intelligence officers on occasion failed to disclose
to their superiors programs which were illegal or of questionable legality,
the Committee finds that the most serious breaches of duty
were those of senior officials, who were responsible for controlling
intelligence activities and generally failed to assure compliance with
the law.
81lbfindings
(a) In its attempt to implement instructions to protect the security
of the rnited States. the inte11igence community engaged in some ac-
I This spetion discusses the legal issues raised by particular programs and actiyities
only: a discussion of the aggregate effect upon constitutional rights of all
domestic surYeillance practices is at p. 290 of the Conclusions section.
( 137)
138
tivities which violated statntory law and the constitntional rights of
American citizens.
(b) Legal issnes "'ere often overlooke(l by mallY of tIl(' intelligence
officers who directed these operations. Some held a pragmatic view of
intelligence activities that did not regnlarly attach sufficient significance
to <jnestlons of legality. The question raised mlS nsually not
whether a particnlar program was legal or ethical. bnt ,,,hether it
worked.
(c) On some occasions ,vhen agency officials did assume~ 01' were told,
that a program ,ns illega1. they still permitted it to continue. They
justified their conduct in some cases on the ground that the failure of
"the enemy" to play by the rules g-ranted them the right to do likewise'.
and in other cases on the ground that the "national security" permitted
programs that would otherwise be illega1.
(d) Internal recognition of the illegality or the qnestionable legality
of many of these activities frequently led to a tightening of securit~
· rather than to their termination. Partly to avoid exposure and a
public "flap~" knowledge of these programs was tightly held within
the agencies. special filing procedures "'ere used. and "coYer stories"
were devised.
(e) On occasion. intelligence agencies failed to disclose candidly
their programs and practices to their own General Counsels, and to
Attorneys Genera1. Presidents~ and Congress.
(£) The internal inspection mechanisms of the CIA and the FBI
did not keep-and. in the case of the FBI, were not designed to keepthe
activities of those agencies within legal bounds. Their primary
concern was efficiency, not legality or propriety.
(g) Wben senior administration officials with a duty to control
domestic intelligence activities knew, or had a hasis for suspecting.
that questionable activities had occurred. they often responded with
silence or approva1. In eertain cases, they were presented with a partial
description of a program but did not ask for details. thereby
abdicating their responsibility. In other cases, they were fully aware
of the nature of the practice and implicitly or explicitly approved it.
Elaboration of findings
The elaboration which follmvs details the general finding of the
Committee that inattention to-and disregard of-legal issues was
an all too common occurrence in the intelligence commnnity. ",Vhile
this section focuses on the actions and attitudes of intelligence officials
and certain high policy officials, the Committee recognizes that a
pattern of lawless actiyity does not result from the deeds of a single
stratum of the gOYernment Or of a fe,v indidduals alone. The implementation
and continuation of illegal and qnestionable programs
wonld not han' [)pen possible withont tIl(' cooperation or tacit approya1
of people at all leYels within and ahow the intelligence community,
through many successive administrations.
The ag~nts in th~ field. for their part. rarel~' qnestioned tlw orders
tl~ey receIYed. TheIr often l1ncertain knmvledge of the la\v. conpled
WIth the l~atura1 desire to please one's snperiors and \vith simple
bnreancratIc momentum. clearly contributed to their wil1ino'ness to
participate in illegal and fjnesti'onahle programs. The ahsenc; of any
prosecutions for law violations by intelligence agents ineYitably af139
fected their attitudes as well. Under pressure from above to accomplish
their assigned tasks, and without the realistic threat of prosecution
to remind them of their legal obligations, it is understandable
that these agents frequently acted "'ithout concern for issues of law
and at times assumed that normal legal restraints and prohibitions
did not apply to their activities.
Significantly, those officials at the highest levels of government,
who had a duty to control the activities of the intelligence community,
sometimes set in motion the very forces that permitted lawlessness to
occur-even if every act committed by intelligence agencies was not
known to them. By demanding results "'ithout carefully limiting the
means by which the results were achieved; by over-emphasizing the
threats to national security without ensuring sensitivity to the rights
of American citizens; and by propounding concepts such as the right
of the "sovereign" to break the law, ultimate responsibility for the
consequent climate of permissiveness should be placed at their door.2
8ubfirtdirtg (a)
In its attempt to implement instructions to protect the security of
the rnited States, the intelligence cOlllmunity engaged in some activities
which violated statutorv la,w and the constitutional rights of
American citizens. .
From 1940 to 1973, the CIA and the FBI engaged in twelve covert
mail opening programs in violation of Sections 1701-1703 of Title 18
of the United States Code ,,,hich prohibit the obstruction, interception,
or opening of mail. Both of these agencies also engaged in warrantless
"surreptitious entries"-break-ins-against American citizens
within the United States in apparent violation of state laws prohibiting
trespass and burglary. Section 605 of the Federal Communications
Act of 1934 was violated by NSA's program for obtaining millions
of telegrams of Americans unrelated to foreign targets and by the
Army Security Agency's interception of domestic radio communications.
All of these activities. as ,,,ell as the FBI's use of electronic surveillance
,,,ithout a substantial national security predicate, also infringed
the rights of rountless Americans under the Fourth Amendment
protection "against unreasonable searches and seizures."
The almsi"e techniques used by the FBI in COINTELPRO from
1956 to 1971 inclnde(l violations of both federal and state statutes prohibiting
mail fraud. ,,-ire fraud, incitement to violence, sending
obsrene material through thl' mail, and extortion. )10re fundamentally,
the harassment of innocent citizens engaged in lawful forms of political
expression did serious injury to tIle First Amendment guarantee
of freedom of speerh and the right of the people to assemble peaceably
and to petition the government for a redress of grievances. The
Bureau~smaintenance of the Security Index. whirh targeted thousands
of Ameriran citizl'ns for dl'tl'ntion in thl' event of national emergency,
elearly oycrsteppe(l the permissihle hounds estahlished by Congress
in the Emergl'ncy Detention .\ct of 1950 and represented, in contravention
of the Act, a potential general suspension of the privilege
2 Thl' acconntahility of Rl'nior adminiRtrntion offiC'ialR iR noted here to place
the (jl'tailR 'YhiC'h fol!O\y in their proper context. and is deYeloped at greater
length in Finding G, p. 265.
140
of the writ of hab('as corpus secured by Article I, Section 9. of the
Constitntion.
A distrpssi1J~t numhpr of tIl(' programs and technifllH's de\'eloped
by the intelligencp community involved transgressions against human
d('celln' that \\'('1'(' no less serious than any technical yiolations of la,Y.
Some of the most fUIl(lanwnta I nInes of tl\is society 'WI'P thl'patpnNl hy
activities such as the smear campaign against ·Dr. ::\fartin Luthe~
King, .rr., thp testing of (langerons drugs on unsuspecting American
ritizens. the dissemination of information about the sex lives. drinking:
habits. an(l marital prohlems of electronic sHlT('il1anre targets. an'd
the COIKTELPRO attempts to tnrn dissident organizations against
one another and to destroy marriages.
Subfil1dil1g (b)
Legal issues were often oYerlooked by many of the intelJigence
officers who directed these operations. Some held a pragmatic view
of intelligence activities that did not regularly attach sufficient significance
to questions of legality. The fluestion rais('d was usualJy not
whether a particular program was legal or ethical, but whether it
worked.
Legal issues were clearly not a primary consideration-if tlwy were
a consideration at all-in many of the programs and techni(]ues of
the intelligence community. When the former hrad of the FBI's Racial
Intelligence Section was asked whethrr anvbody in the FBI at
any time during the Ii>-year course of COINTELPRO discussed its
constitutionality or legal autl'ority. for example, he replied: "No, we
never gave it a thought." 3 This attitude is echoed by other Bureau
officials in connection with other programs. The former Section Chief
of one of the FBI's CounterinteJJigence sections, and the former
Assistant Director of the Bureau's Domestic Intelligence Division
both testified that legal considerations were simply not raised in policy
decisions concerning the FBI's mail opening programs.4 Similarly.
when the FBI was presented with the opportunity to assume responsibility
for the CIA's Ne'" York mail opening operation, legal factors
played no role in the Bnrean's refusal: rather. the opportunity was
declined simply because of the attendant expense, manpower requirements,
and security problems.5
One of the most abusiyf' of an FBI prog-rams was its attempt to
discredit Dr. Martin Luther King, .Jr. Yf't former FBI Assistant
Director ",ViJJiam C'. SnlliYan testified that he "nenr heard anyone
raise tl1f' qnestion of legality or constitutionality. neyer." 6 •
Former Director of Central Intf'lJigf'ncf' Richard Helms testifif'd
publicly that he neyer seriouslv qUf'stionf'd the legal status of the
twenty-year CIA New York mail opening project becanse he assumed
his prec1ecessor. Allen Dulles, had "made his legal peace with [it]." 7
• Georg-e C. Moore testimony. 11/3/75. p. 83.
• Branigan testimony, 10/9/7G, pp. 13, 139, 14D; Wannall testimony, 10/24/75,
Hearing-i':. Vol. 4. p. 149.
6 Branigan, 10/9/75, p. 89.
• William C, Sullivan testimony, 11/1/75, JIP. 49. 50.
7 Ri('hard Helms, 10/22/75. Hearings. Vol. 4. p. 94. This tf'stimony is partially
contradicted, howew'r. by the fact that in 1970 Helms SignM til(; Huston Report.
ill "'hid\ "('on'rt mail ('ol'el'age"-oefinf'd as mail opening-Ivas specifically
(Iescribed as illegal. (Special Report..Tune 1970, p. 30.)
141
" [F]rom time to time," he said, "the Agency got nseful inTormation
out of it," S so he permitted it to continue throughout his sevenveal'
tennre as Director.
. The Huston Plan that was prepared for President Richard Nixon
in .Tune 1070 constituted a virtual charter for the use of intrusive and
illegal techniques against American dissidents as well as foreign
agents. Its principal author has testified, howenr, that during the
drafting srssions with representatiYes of the FBI. CIA, NSA, and
Defense Intelligence Agency. no one ewr objected to any of the recommendations
on the grounds that they involved illegal acts, nor was
the legality or constitutionality of any of the recommendations ever
discussed. 9
William C. Sullivan. who participated in the drafting OT the Huston
Plan and served on the Pnited States Intelligence Board and as FBI
Assistant Director for Intelligence for 10 years, stated that in his
entire experience in the intelligence community he never heard legal
issues raised at all :
'Ye neYer gave any thought to this realm of reasoning. because
we were just naturally pragmatists. The one thing we
were concerned about was this: ,vm this course of action
work, ,,,ill it get us what we want, will we reach the objectiYe
that we desire to reach? As Tar as legality is concerned,
morals. or ethics, [it] was never raised by myself or
anyhody else ... I think this suggests really in government
that ,ve are amoral. In government-I am not speaking for
everyhody-the general atmosphere is one of amorality.lO
Subf/rlding (c)
On some occasions when agency officials did assume, or were told,
that a program was illegal. they still permitted it to continue. They
justifird their condnct in some cases on the ground that the failure of
"the enemy" to play hy the rules granted them the right to do likewise,
and in other cases on the ground that the "national security" permitted
programs that would otherwise be illegal.
Even when agency officials recognized certain programs or techniques
to be illegal. they sometimes advocated their implementation
or prrmitted them to continur nonetheless.
This point is illustrated by a passage in a 19;)4- mrmorandum from
an FBI Assistant Director to .T. Edgar Hoover. which recommended
that an rledronic listening dm'ice be planted in the hotel room of a
suspected Commnnist sympathizer: "Although such 'an installation
will not be lrg-al. it is belieYecl that the intellig-ence information to be
obtaine(l will' make such an installation neceSSary and desirable." 11
Hoover approvrd the installation.12 •
:Morc thana decade lat<>r, a memorandum was sent to Director
Hom'er "\\'hich described the current FBI policy and procedures for
"black bag: iobs" (warrantless break-ins for purposes other than lllicrophOl1f\
installation). This memorandum read in part :
B Helms. 10/22/75. Hearings. VoL 4. p. 103.
B Huston. 9/23/75. Hearings. Vol. 2, p. 21.
'" Sullivan, 11/1/75. pp. 92, 93.
11 :\fpmorandmn from MI'. Boardman to the Director, FBI, 4/30/54.
]2 Ibid.
142
Such a technique involves trespass and is clearly illegal;
therefore~ it mmJd be impossible to obtain any legal sanetion
for it. Despite this, "bJaek bag" jobs have been llspd because
they represent an invaluable technique in combatting subversiye
activities ... aimed directly at undermining and destroying
our nation.13
In other ,vords, breaking the law, ,vas seen as useful in combating
those who threatened the legal fabric of society. Although Hoover
terminated the general use of "black bag jobs" in .July 1fl66, they were
employed on a large scale before that time and have been used in
isolated instances since then.
Another example of disregard for the Jaw is found in a Hl6fl memorandum
from ,Yilliam C. Sullivan to Director Hoover. In .June of
that year, Sullivan was requested by the Director~ apparently at the
urging of ,Vhite House officials to travel to France for the purpose of
electronically monitoring the conversations of journalist .Joseph
Kraft.l! "'itlt the cooperation of local authorities, Sullivan was able
to have a microphone installed in Kraft's hotel room, and informed
Hooyer of his success. "Parenthetically," he wrote in his letter to the
Director, "I might add that such a cm'er is regarcledas illegal." 15
The attitude that legal standards and issues of privacy can be overridden
by other factors is further reflected in a memorandum written
by Richard Helms in connection with the testing of clangerous clrugs
on unsuspecting American citizens in 1963. Mr. Helms wrote the
Deputy Director of Central Intelligence:
""Vhile I share your uneasiness and distaste for any program
which tends to intrude on an individual's private and legal
prerogatives, I believe it is necessary that the Agency maintain
a central role in this activity, keep current on enemy
capabilities in the manipulation of human behavior, and
maintain an offensive capability. I, therefore, recommend
your approval for continuation of this testimony program
...15a
The history of the CIA's New York mail opening program is replete
with examples of conscious contravention of the law. The original
proposal for large-scale mail opening in 1955, for instance, explicitly
recognized that "[tJhere is no overt, authorized or legal censorship
or monitoring of first class mails which ent€r, depart or
transit the ljnited States at the present time." 16 A 1962 memorandum
on the project noted that its exposure could "give rise to grave charges
of criminal misuse of the mails by Government agencies" and that
"existing Federal statutes preclude the concoction of any legal excuse
for the violation ..." 17 And again in 1963, a CIA offieer "wrote:
"There is no legal basis for monitoring postal communications in the
l~nited States except during time of ,val' or national emergency ..." 18
"~I{'morandnmfrolll ,Yo C. Sullivan to C. D. DeLoach, 7/19/66.
11 Heport of the House Judiciary Committee, 8/20/74, p. 150.
I.. ~rf'nlOra]](llllll froIII "'iJJiam C. Snllivan to .T. Edgar Hoon-r, 6/30/69.
1," :\If'lllorandnm from Richard Helms to the Deputy Director of Central IntelligeIlef',
12/17/f,3.
16 Blind memorandum, 11/7/55.
17 ~IeIllorandulll from Dpputy Chipf, COllnterintelligpIlce Staff, to Director, Ofliet'
of SN'l1l'i!y, 2/1/62.
"~IeIlloralldulll frolll Chief, CI/Projeet to Chief, DiYision, 9/26/63.
143
Doth the fonner Chief of the Counterintelligence Staff and the former
Director of Security-who ,vere in charge of the Xew York projecttestified
that they believed it to be illegaJ.19 One Inspector General who
reviewed the project in 1969 also flatly stated: "[OJf course, we
knew that this was illegal. ... [E]verybody knew that it was
[illegal]. ..." 20
In spite of the general recognition of its illegality, the New York
mail opening project continued for a total of 20 years and was not
terminated until 197;3, when the "Watergate-created political climate
had increased the risks of exposure.~l
"With the full knO\vledge of J. Edgar I-rooYer, moreover, the FBI
continued to receive the fruits of this project for three years after the
FBI Director informed the President of the United States that "the
FBI is opposed to implementing any covert mail coverage because it is
clearly illegal ..... C~ The Bureau's own mail opening programs had
lle011 terminated in 1966, but it continued intentionally and knowingly
to benefit from the illegal acts of the CIA until 1973.
The Huston Plan is another disturbing reminder of the fact that
intelligence programs and techniques may be ad,'ocated and authorized
with the knowledge that they are illegal. At least two of the
options that were presented to President Nixon were described as
unla,dul on the face of the Report. Of "covert mail coverage" (mail
opening) it was written that "[t]his coverage, not haying the sanction
of la,v, runs the risk of any illicit act magnified by the im'olvement of
a Government agency." 23 The Report also noted that surreptitious
entry "involves illegal entry and trespass." 24 Thus, the intelligence
community presented the nation's highest executive official with the
option of approving courses of action described as illegal. The fact
that President Nixon did authorize them, even if only for five days, is
more disquieting stilU5
"-hen President :xixon eventually revoked his approval of the Huston
Plan, the intelligence cOlmmmity nevertheless proceded to initiate
some programs suggested in the Plan. Intelligence agencies also continued
to employ techniques recommended in the Plan, such as mail
opening which had been used previously without presidential apPl'OyuUG
]V Angleton, 9/24/75, Hearings, Vol. 2, p, 61; Howard Osborn, deposition,
1'/28/75, p. 00.
20 Gordon Stewart, 9/30/75, p. 28.
21 See e.g., Howard Osborn deposition, 8/28/75. p. 89.
" Special Report, June 1970, p. 31.
'" SI)ecial Report, June 1970, p. 30.
" Special Report, June 1900, p. 32.
" President Nixon stated that he approved these activities in part because they
"had bepn found to be effective." (Response of Richard 1'1. Nixon to Senate Select
Committee Interrogatory 19, 3/9/06, p. 13.)
,. For a description of the techniques which continued or were subsequently
in~tituted, see pp. 115-116,
A memorandum from John Dean to John Mitchell suggests that, after President
Xixon's revocation of approval for the Huston Plan, the "White House itself
~l1pported the continued pursuit of some of the objectives of the Huston Plan.
Through an interagency unit known as the Intelligence E"aluation Committee.
(~IplllOrandum from John Dean to the Attorne~' General, 9/18/70.) In this
memorllllClum, Dpan suggested the creation of such a unit for "both operational
and p'"aluation purposes." He wrote in part:
"[T]l1e unit can serve to make appropriate recommendations for the type of
intelligence that should be immediately pursued by the various agencies, In
(Continued)
144
The rrcent hi"torv of ~\rn1Y intrlligellce pr0"i(les all ad(litionaI example
of continuilig an actl\'ity descl'ilwd as illegal. Beginning in
1067, the Army Security ~\gen('y monijo]'('d the radio communications
of amatenr radio operators in this coulltry to determine if dissident
elements planned c1isruptin acti\'ity at particular demonstrations and
events. Because Army officials questioned \"hether such monitoring
was legal under Section 605 of the Federal Communications Act of
]034. they requested a legal opinion from the Federal Communications
Commission. At a meeting held in August 1068. the FCC flfh'ised the
Armv that such monitoring \"as illeg'al 111lder the Act. FCC representatives
also stated that the matter had been raised \"ith Attorney
General Ramsey Clark and that he had disappr0"ed the program.27
The FCC agreed. however. to submit a written reply to the Army,
stating only that it could not "provide a positive answer to the Army's
proposa1." 28
Despite havinrt been told that their monitoring activitv was illegal,
and that the Attorney General himself disapproved it, the Army
Security Agencv continued to monitor the radio communications of
American citizens for another two vears.29
Several factors may explain th~ intelligence community's frequent
disregard of legal issues.
Some intelligence officials expressed the view that the legal and
ethical restraints that applied to the rest of societv simplv did not
apply to intelligence activities. This concept is reflected in a 1959
memorandum on the Armv's covert drug testing program: "In intelligence,
the stakes involnd and the interest of national security may
permit a more tolerflnt interpretation of moral-ethical values 000" 30
As 'William C. Sullivan also pointed out, many intelligence officers
had been imbued with a "war psychology." "Legality was not questionE'ft"
he said, "it was not an issue." 31 In war, one simply did what
(CnntinuPd)
regard to this ... point, I believe we agreed that it would be inappropriate to
havp any blanket removal of restrictions: rathpr. the most appropriate procedure
would be to decide on the type of intpl'igpnce we need, based on an
assessment of the recommendations of this unit, and then to proceed to remove
tbf' rf'straints as necessary to obtain such intelligence." (Dean memorandum,
9/18170. )
:n :\If'mornndum for the record b:v Army Assistant Chief of Staff for Intelligence,
8/16/68; Staff summary of S"l Tindenbaum (former Executive Assistant
to the Attorney General) intf'rvif'w. 5/8/75.
28 ~If'mornnrlum for the record by Army Assistant Chief of Staff for Intf'lligence.
8/16/68.
29 Thf' Army's gpnpral rlomf'stic snrvpiIlanf>e prngram provirlps an examplf' of
evasion of a departuwntal order which barl heen issnerl out of concern with
legal issues. The practice of collecting vast amounts of information on American
citizf'ns was tf'rminated in 1971. when new Departmf'nt of Df'ff'nse restrictions
cl1me into effect calling for the de~truction of all files on "unaffiliaterl" persons
and organizations. Rather than df'stroyinrr the files, howpver. severn I Army
intf'llie;enf'e nni1." simply tnrnf'rl thpir intelli,gence tiles on rlissiflent imlh'irlnal
amI gronns oypr to local po!iCf' anth0ritips : and onp Air ForN' conntf'rintpllh!f'nf'e
nnit in San Diprro hprran to f'rpntp npw fill'S the next ypar. (Hpnrings IIPforp Rnhcommittee
on Constitntional Rie;hts. Cnmmittpp 0T1 th" .Tnrliciary. FR, Rf'nntf'.
!l2nfl Conrrrpss, 1~t ~e~sion, 1971. D. 1297: "Ex-FBI Aid Accnspd in I'olicf' Rpy
HenriT1r'S" r'IJjcrrrrn Trilmne. flI2117!'i. n. 3.)
3. PSAINTC Staff Study: Matprinl Testin'! Prorrram EA 1729. 10/15/5\).
31 Rn1liyan nttrihntf'~ mnf'h of this attitnrle to the mnlrlinrr inf!nenf'e of World
War II upon young intelligence agents who later rose to positions of influence in
145
one "as "expected to do as a soldier." 32 "It was my assumption," said
Gnc FBI oiIicial COllllcc!ecl with th(' BIl1'('all'8 mail olwning programs,
"that "hat \H' ,yere doing ,,'as justifieel by "hat \H' had to do." 33
Since the ;;('Hemy" did not play by the 1'\11('s. nlO1'eo,er, intelligence
officials often belie,-ed they could not aft'ord to do so either. H
One FBI intelligence officer appeared to attribute the disregard of
the la\, in the Bureau's COIXTELPRO operations to simple restlessness
on the part of ''artion-01'ientecl'' FBI agents. George C. .:\1oore,
the Racial Intelligence Section Chief, testified that:
... the FBI's counterintelligenee program came up because
if you ha,e anything in the FBI, you have an action-oriented
group of people ,,,ho see something happening and want to do
something to take its place.36
Others in the intelligence community have contended that questionable
and illegal acts were justified by a law higher than the
Fnitecl States Code or the Constitution. An FBI Counterintelligence
Section Chief. for example, stated the following reason for believing
in the necessity of techniques such as mail opening:
The greater good. the national security. this is correct. This
is "hat I believed in. 'Yhy I thought these programs were
good, it was that the national security required this, this is
correctY
Similarly. when intelligence officials sec'med the cooperation of telegraph
company executiyes for Project SILUIROCK, in which NSA
received millions of copies of international telegraph messages without
the sender's knowledge. they assmed the exeeutives that they would
not be' subjected to criminal liability because the project "as "in the
highest interests of the nation." 38
the intelli~ence community. (Sullivan. 11/1/75. pp. 94-95.) Disregard of the
"niceties of law." he stated. continued after the war had ended:
"Along ('ame the Colrl War. 'We pursuerl the same course in the Korean War,
and the Colrl 'Var eontinued. then the Vietnam 'Var. 'Ve never fref>rl ourselves
from that ps.\-cholog" that we were indoctrinated with. right after Pearl Harhor,
~-ou see. I think this accounts for the fact that nohody seemed to be coneerned
ahout raising the question is this lawful, is this legal, is this ethieal? It was just
like a snldier in the hattlefield. "rhen lie shot do~-n an enemy he did not ask
himself is this legal or lawful, is it ethical? It is what he was expeeted to do
as a soldier."
"We did what we were expected to do. It became part of our thinking, a part
of our persona Iit~'." (f'nllh-an. 11/1 /7e;. pp, 95. 96. )
Unfortnn'ltely, it made too little difference whether the "enemy" was a foreign
sp,. a civil rights leader, or a Vietnam protester.
" f'u1livan, 11/1/75, p. 96.
33 Rrani~an. 10/9/75. n. 41.
" Staff summary of William C. Sullivan interview, 6/10/75.
36 ~foore deposition. 11/3/75. p. 79.
31 Branigan deposition, 1/9/7i'l. p. 41. Richarrl Helms referred to another kind
of "~reater ~ood" when asked to speculate about the possible motivation of a
CIA scientist who did not he('rl Presirlent Xixon's directiwto destroy all biological
and chemical toxins. Xoting that the sC'if>ntist mi~ht haw "had thoughts
ahout immunization ... or treatment of rlismse \yhf>re [the toxin he had developPel]
might he useful," Hplms t.;airl that the l"ptention of this biological a~ent
could be explainpd as "yiplrling- to that human impulsp of the greater good."
I Ri<'lwJ'(1 Helms testimon,. fl/15175. p. fl6.)
38 Rohert Anclre\\'s testimon, fl/:?3175. p. 34: Rep XRA Rf>j1ort: "fUIA3IROCK."
By cooperating with the Gm-ernment in ~HA~rRO(,K. executives of three eompanies
chose to ignore the advice of their respective legal counsels who had recom(
Continued)
68-786 0 - 76 - 11
146
Perhaps the most novel reason for advocating illegal action was
proffered by Tom Charles Huston. Huston explained that he belie,-ed
the real threat to internal security ,vas potential repression by rightwing
forces within the United States. He argued that the "Xe,,' Left"
was capable of producing a climate of fear that ,Yould bring forth
every repressive demagogue in the country. Huston believed that the
intelligence professionals, if given the chance, could protect the people
from the latent forces of repression by monitoring the Kew Left,
including by illegal means.39 Illegal action directed against the New
Left, in other words, should be used by the Government to forestall
potential repression by the Right. .
In attempting to explain why illegal activities ,,-ere advocated
and defended, the impact of the attitudes and actions of government
officials in supervisory positions-Presidents, Cabinet officers, and
Congressmen-should not be discounted. Their occasional endorsement
of such activities, as well as the atmosphere of permissiveness created
by their emphasis on national security and their demands for results,
clearly contributed to the notion that strict adherence to the law was
unimportant. So, too, did the concept, propounded by some senior
officials, that a "sovereign" president may authorize violations of the
law,
,Yhahwer the reasons, hO\H'nr. it is clear that a number of intelligence
officers acted in knowing contravention of the law.
8ubfil1ding (d)
Internal recognition of the illegality or questionable legality of
many of these activities frequently led to a tightening of security
rather than to their termination. Partly to avoid exposure and a public
"flap,'~ knowledge of these programs was tightly held ",'ithin the agencies,
special filing procedures were used, and "cover stories" were
devised.
,Vhen intelligence agencies realized that certain programs and techniques
were of questionable legality. they frequently took special
security precautions to avoid public exposure, criticism. and embarrassment.
The CIA's study of student unrest throughout the world in the
late 1960s, for example, included a section on student dissent in the
United States, an area that was clearl;.-' outside the Agency's statutory
charter. DCI's Hichard Helms urged the Presi(lent's national securitv
advisor, Henry Kissinger. to treat it with extreme sensivity in
light of the acknmdedged jurisdictional violation:
"Herewith is a SUITev of student dissidence world-wide 'Us requested
by the President. In an effort to round out our discussion
of this subject, we have included a section on American
students. This is an area not within the charter ot this Agency.
so I need not emphasize hO\v extremely sensitive this makes
the paper. Should anyonp learn of its existence, it would prove
most embarrassing for all concerned." 40
Concern for the FBI's public imaQ'e prompted security mensures
which nrotected numerous questionable aetiyities. For example, in
(Continued )
mended ag-ainst participation hecause the:> considerf'd the prog-ram to he in
yiolation of thE' la\y and FCC reg-ulations. D[pmorandllm for thE' rpcord, Anued
ForcE'" SE'curH:> AI!E'ncy. SuhjE'ct: SHA~[ROCK OpE'ration. 1'/25/50.)
.. Tom Charles Huston dE'position, 5/22/75, p. 43; Staff Summary of Tom
CharlE's Huston interview. 5/22/75.
'" Letter from Richard Helms to Henry Kissinger. 2/18/69.
147
approving or denying COIXTELPRO proposals, many of ,,-hich were
clearly megaL a main consideration ,vas prrn·nting "embarrassment
to the Bureau." 41 A characteristic cantion to FBI agents appears in
the letter ,yhich initiated the COIXTELPRO against "Black
Xationalists" :
You are also cautioned that the nature of this new endeavor
is such that under no circumstances shonkl the existence of
the program be made kn01yn outside the Bureau and appropriate
,yithin-office security should be afforded to sensiti,-c
operations and techniques considered under the program.
Examples of attention to such security are that anonymous letters had
to be 'Yritten on commercially purchased stationery; newsmen had to
bo so completely trnstwOlthy that they were guaranteed not to re"eal
the Bureau's interest; and inquiries of law enforcement officials had to
be made under the pretext of a criminal inycstigation.
A similar preoccupation with security measures for improper acti,'·
ities affected both the XSA and the Army Security Agency.
XSA's guidelines for its watch list activity provided that NSA,s
name should not be on any of the disseminated watch list material
involving Americans. The aim was to "restrict the knowledge that
such information is !being collected and processed" by NSA.43
The Army Security Agency's radio monitoring activity, which continued
even after the Army was told that the> FCC and the Attorney
General regarded it as illegal, also had to be conducted in secrecy if a
public outcry ,vas to be aToided. 'Yhen Army officials decided to permit
radio monitoring in connection "'ith the military's Civil Disturbance
Collection Plan, their instruction prodded that all ASA
personnel had to be "disguised" either in civilian clothes or as members
of regular military unitsY
The perceived illegality-and consequent "flap potential"-of the
CIA's Kew York mail opening project Jed Agency officials to formulate
a drastic strategy to follow in the event of public exposure.
A review of the project by the Inspector General's Office in the early
1960s conclmled that it would be desirable to fabricate a "cover story."
A formal recommendation was therefore made that "[a]n emergency
plan and cover story be prepared for the possibility that the operation
might be blown." 45 In response to this recommendation, the Deputy
Chief of the Counterintelligence Staff agreed that "a 'flap' will put
us 'out of business' immediately and may give rise to grave charges
of criminal misllse of the mails by goyernment agencies," but he
argued:
41 See COINTELPRO Report: Sec. Y, "Outside the Bureau" memorandum; from
FBI Headquarters to all SAC's, 8/25/67.
43 Buffham, 9/12/75, p. 20; ~IINARET Charter, 7/1/69.
At other times, however, NSA's special security measures were applied to
protect documents which concerned far more than NSA. Thus, at Richard Helms
suggestion, Huston Plan working papE'rs and documents WE're all stamped with
legends designed to protect XSA's lawful communications activity. although only
a fimall portion of the documents actually concerned NSA. (Unaddressed memorandum,
Subject: "Interagency Committee on Inte]]jgence, 'Working Subcommittee,
~Iinutf's of the Firfit ~If'('ting," 6/10/70.)
" DE'pal'tmE'nt of ArmJ' ~Iessage to Subordinate Commands, 3/31/68.
'0 CIA memorandum. Subject: Inspector General's Survey of the Office of
Security, Annex II, undated.
148
Since no good pUl'pose can bp sPr\'Nl by an official admission
of the \'iolation, and existing Federal statutes preclude the
concoction of any legal excuse for the \'iolation, it must be
recognized that no COHr story is available to any Government
Agency. Therefore, it is important that all Federal law
enforcement and 1'S Intelligence Agencies vigorously deny
any association, direct or indire~t, with any such activity as
charged.... Unless the charge is supported by the presentation
of interior items from the Project, it should be relatively
easy to "hush up" the entire affair, or to explain that it consists
of legal mail COYer activities conducted by the Post Office at
the request of authorized Federal agencies. Under the most
unfavorable circumstances ... it might be n~ssary after the
matter has cooled off during an extended period of inYestigation,
to find a scapegoat to blame for unauthorized tampering
with the mails. Such cases by their vel'Y nature do not
have much appeal to the imagination of the public, and this
would be an effective way to resolve the initial charge of
censorship of the mails.46
This strategy of complete denial and transferring blame to a scapegoat
\yas approved by the Director of Security in February 1962.47
Another extreme example of a security measure that was adopted because
of the threat that illegalnetivity might be exposed \yas the outright
destruction of files.
The FBI developed a special filing system-or, more a~urately, a
destruction system-for memoranda written about illegal techniques,
such as break-ins," and highly questionable operations, such as the mirrophone
surYeillance of .Joseph Kraft!9 Under this system-which
was referred to as the "DO XOT FILE" procedure-authorizing documents
and other memoranda were filed in special safes at headquarters
and field offices until the next annual inspection by the Inspection Division.
at \vhich time they \\'ere to be systematically destroyed.50
.. Memorandum from Deputy Chief, CI Staff, to Director Office of Security,
2/1/62,
.1 Memorandum from Sheffield Edwards. Director of Security. to Deputy Director
for Support, 2/21/62.
48 ~Iemorandum from W. C. Sullivan to C. D. DeLoach. 7/19/66. The same document
that describes the application of the "DO NOT FILE" procedure to "black
bag jobs" also notes that before a break-in could be approved within the FBI, the
Special Agent in Charge of the field office had to assure headquarters that it
could be accomplished without "embarrassment to the Bureau." (Sullivau memorandum,
7/19/66.)
An isolated instance of file destruction apparently occurred in the Los Angeles
office of the Internal Revenue Senice in December 1974, at a time when Congressional
investigation of the intelligence agencies was imminent. This office had
collected large amounts of essentially political information regarding black militants
and political activists. In violation of internal document destruction procedures
the files were destroyed prior to their proposed review b~' IRS authorities.
See IRS Report; Sec. IY. "The Information Gathering and Retrieval System"
; Staff Summary of interview \Yith Chief, IRS Diyision, Los Angeles. 8/1/75.
•• For example, letters from W. C. Sullivan to J. Edgar Hooyer, 6/30/69. 7/2/69,
7/3/69, 7/7/69. These letters were sent to Hooyer from Paris. where Sullivan
coordinated the Kraft sllrYeillance. All of them bear the notation "DO XOT
FJJ,J~."
00 ~Iemorandum from ViT
• C. Sullivan to C. D. DeLoach, 7/19/66.
149
8ubfindinq (e)
On occasion, intelligence agencies failed to disclose candidly prog-
rams and practices to their own General Counsels, amI to Attorney
G-enerals, Presidents, and Congress.
(i) Concealment from E[J'ecuth'c Branch Officials
Intelligt'nce officers frequently conct'ult'c1 or misrt'presented illegal
activitit's to their own General Counsel and superiors \vithin and outside
the agencies in order to protE'ct these acti,:ities from exposure.
For example, during the entire 20-year history of the CIA's mail
opening project, the Agency's General Counsel was never informed of
its existence. According to one Agency official, this knowledge was
purposefully kept from him. Former Inspector General Gordon St€Wart
testified:
Well, I am sure that it was held back from [the General
Counsel] on purpose. An operation of this sort in the CIA is
run-if it is closely held, it is run by those people immediately
concerned, and to the extent that it is really possible, according
to the practices that we had in the fifties and sixties, those
persons not immediately concerned were supposed to be
ignorant of it.51
The evidence also jndicates that two Djrectors of Central Intelligence
under whom the Xcw York mail operations continued-John
McCone and Admiral Raborn-were never informed of its existence."'
In 1954, Postmaster General Arthur Summerfield was informed that
the CIA operated a mail cover project in New York, but he was not
told that the Agency opened or intended to open any mail.53 In 1965, the
CIA briefly considered informing Postmaster General John A. Gronouski
about the project when its existence was felt to be jeopardized
by a congressjonal subcommitt€e that was jnvestigatjng the use of majl
covers and other investigative techniques by federal agencies. According
to an internal memorandum, however, the idea was qujckly rejected
"in view of various statements by Gronouskj before this subcommittee."
54 Since Gronouski had agreed with the subcommittee that
tighter administrative controls on mail covers were necessary and generally
supported the principle of the sanctity of the mail, it is reasonable
to infer that CIA officials assumed he would not be sympathetic
to the technique of mail opening.r
..;
vI Gordon Stewart, 9/30/75, p. 29.
52 :\IcCone, 10/9/75, pp. 3-4; Angleton, 9/17/75, p. 20; Osborn, 10/21/75; Hearing-
b, Vol. 4, p. 38.
63 Memorandum from Richard Helms to Director of Security, 5/17/74; Helms,
10/22/75, Hearings, Vol. 4, p. 84. By the CIA's own account, moreoyer, at most
only three Cabinet-level officials may have been told about the mail opening aspects
of this project. Each of these three-Postmasters General J. Edward Day
and Winton :\1. Blount, and Attorney General John :\Iitchell-dispute the Agency's
claim. (Day, 10/22/75. Hearings, Vol. 4, p. 45; Blount, 10/22/75, Hearings,
Vol. 4, IJ. 47; :\Iitchell, 10/2/75. pp. 13-14.)
.. Blind memorandum from "CIA Officer," 4/23/65.
w Ibi(l. :\Ir. Grononski testified as follows about the CIA's successful attempt
to keep knowledge of the Xew York project from him:
"When this news [about CIA mail opening] broke [in 19751. I thought it was
incredible that a person in a top position of responsibility in Government in an
ug-ency should have something of this sort that is very illegal going- on within
his own agency and did not know about it. It is not that I did not try to know
about these things. I think it is incumbent upon anybody at the top office to try
to know everything that goes on in his organization." (Gronouski, 10/22/75,
Hearings, Vol. 4 p. 44.)
150
The only claim that any President may han known about the project
was made by Richard Helms, who testified that "there was a possibility"
that he "mentioned" it to President L;yndon .Tohnson in 1967
or 1968."6 X0 docllluentary e\-idence is availalJle that either supports or
refutes this statement. During the preparation of the Huston Plan,
neither CIA nor FBI representatives informed Tom Charles Huston,
President Xixon's representative, that the mail opening project
existed. The final interagency report on the Huston Plan signed by
Richard Helms and J. Edgar Hoover, was sent to the President with
the statement, contrary to fact, that all mail opening programs by
federal agencies had been discontinued.57
In connection with another CIA mail opening project, middle-level
Agency officials apparently did not even tell their own superiors within
the CIA that they intended to open mail, as opposed to merely inspecting
envelope exteriors. The ranking officials testified that they
approved the project believing it to be a mail cover program only.fiB
No Cabinet officials or President knew of this project and the approval
of the Deputy Chief Postal Inspector (for what he also beheved to
be a mail cover operation) was secured through conscious deception.59
A pattern of concealment was repeated by the FBI in their mail
opening programs. There is no claim by the Bureau that any Postmaster
General, Attorney General, or President was ever advised of
the true nature and scope of its mail projects. One FBI official testified
that it was an unofficial Bureau policy not to inform postal officials
with whom they dealt of the actual intention of FBI agents in receiving
the mail, and there is no indication that this policy was ever
violated.60 At one point in 1965, Assistant Director Alan Belmont and
Inspector Donald Moore apparently informed Attorney General
Xicholas deB. Katzenbach that FBI agents received custody of the
mail in connection with espionage cases on some occasions.61 But
:\'foore testified that the Attorney General was not told that mail was
actually opened. "'hen asked if he felt any need to hold back from
Katzenbach the fact of mail openings as opposed to the fact that Bureau
agents received direct access to the mail, Moore replied:
It is perhaps difficult to answer. Perhaps I could liken it
to ... a defector in place in the KGB. You don't want to tell
anybody his name, the location, the title, or anything like
that. Xot that you don't trust them completely, but the fact
66 Helms, 10/23/75, pp. 28, 30-3l.
5' Special Report, p. 29. Richard Helms testified as follows about this inaccurate
statement:
"... the only explanation I have for it was that this applied entirely to the
FBI and had nothing to do with the CIA, that we never .lld,-ertised to tllis Committee
or told this CommitLee that this mail operation was going on, and there
was no intention of attesting to a lit'. ..."
"And if I signed this thing, then mayiJe I didn't read it carefully enough."
"There was no intention to mislead or lie to the President." (Helms. 10/22/75,
Hearings Vol. 4, p. 95) .
38 Howard Osborn, 8/28/75, pp. 58, 59; Thomas Karamessilles. 10/8/75, p. 12;
Richard Helms, 9/10/75, p. 127.
59 For example, Chief, Security Support Division memorandum, 12/24/74;
Memorandum from C/TSD/CCG/CRB to the filp, 3/26/69; memorandum from
C/TSD/CCG/CRB to the file, 9/15/69.
00 Donald E. )!oore, 10/1/75, p. 79.
61 )!oore, 10/1/75, p. 31; Katzenbach, 12/3/75, Hparings, vol. G, pp. 204, 20::;.
151
is that any time one additional person becomes aware of it,
there is a potential for the information to ... go further.""
Another Bmeau agent speculat('rl that the Attol'lll'Y General ,vas
not told because mail opening "was not legaL as far as I knew." G:I
SimilarlY, there is no indication that the FBI ever informerl anv
Attorney (;'enpral about its use of "black bag jobs" (illegal brpak-ills
for purposes other than microphone instaHations) ; the full scope of
its activities ill COIXTELPHO; or its submission of names for inclusion
on either the CIA's "",Yatch List" for mail opening or. before 1973,
on the XSA's "",Yatch List" for electronic monitoring of international
eommunications.G4
After .T. Edgar Hoover disregarded Attorney General Biddle's
1943 order to terminate the Custodial Detention List by merely changing
its name to the Security Index moreover, Bureau headquarters
instructed the field officers that the new Jist should be kept "strictly
confidential" and that it should neYer be mentioned in FBI reports or
"discussed with agencies or individuals outside the Bureau" except for
military intelligence agencies. For sHeral years thereafter, the Attorney
General and the .Justice Department ,vere not informed of the
FBI's decision.60
An incirlent which occurred in 1967 in connection with the Bureau's
COIXTELPRO operations is particularly iIlustrative of the lengths to
which intelligence agencies ,vould go to protect illegal programs from
scrutiny byexeeutive branch officers outside the intelligence comnlllnity.
As one phase of its disruption of the rnited lOans of America,
the Bureau sent a letter to Klan officers purportedly prepared by the
highly secret "Xational Intelligence Committee" (NIC) of the Klan.66
The fake letter pmported to fire the Xorth Carolina Graml Dragon
for personal misconduct and misfeasance in office, and to suspend
Imperial "'izard Robert Shelton for his failure to remove the Grand
Dragon. Shelton complained to the FBI and the Post Office auout.
this apparent violation of the mail fraud statutes-without realizing
that the Bureau had in fact sent the letter.G7 The Bureau, after
solemnly assuring Shelton that his complaint wa,.<.; not within the
FBI's jurisdiction, approached tIlE' Chief Postal Inspector's office in
"Tashington to determine what action the Post Office planned to take
regarding Shelton's allegation. The FBI was advised that the matter
had 1)('el\ referred to the .Justice Department's Criminal Division.GS
At no time did the Bureau inform either the Post Office or the ,Justice
Department that FBI agents had authored the letter. ",Yhen no investigation
,vas deemed to be warranted by the Criminal Division, FBI
Headquarters directed the Bureauls Charlotte, Xorth Carolina office
to prepare a second phony XIC letter to send to Klan officials.69 This
.2 )loore 10/1/75, p. 48. See )Iail Report: Sec. IV, "Xnture and Value of the
Product Received."
G:l FBI agent testimony, 10/10/75. p. 30.
., See XSA Report: Sec. II. "Summary of XSA Watch List Acth·ity."
"0 )Iemorandulll from .J. Edgar Hom'er to J<'BI Field Offices, 8/14/43.
66 )IelllOrandulll from Atlanta Field Office to FBI Headquarters. tI/7/tiT.
'" )Iemorandull! froll! Birmingham Field Office to FBI Headquarter~, 6/14/67.
68Po~tal official~ toW Bureau liaison that ~ince Shelton's all(>gations "appear
to involn> an internal struggle for control of Ku Klux Klan activities in Xorth
Carolina and ~inee the evidence of mail fraud was somewhat tenuous in nature.
the Post Offiee did not contemplate any inn'stigation." Dlemorandum from Speeial
Ag'ent to n ..J. Brennan. 7/11/67.) Had tllP J<'BI informed the Post Office
that Bureau agent~ had written tllP letter, it would han' been apparent that
SI1Plton'~ allegation~ '\"pre not hased Oil an "internal ~truggle" within the KKK.
69 )lemorandum from FBI Headquarters to Charlotte Field Office. 8/21/67.
152
letter ,,-as not mailed. hmvever, because the Charlotte office proposed
and implemented a <lifferent idea-the formation of an FBI-controlled
alternative Klan organization, which eventually attracted 21)0
members.70
The Huston Plan itself was prepared ,,-ithout the knmvledge of the
Attorney General. K either the ~\Jtornev General nor anvone in his
office ,,-;s ill\-ited to the drafting sessioni at Langley or cOl{sulted during
the proceedings. Huston testified that it never occurred to him
to confer with the Attorney General before making the recommendations
in the Report. in part because the plan ,,-as seen as an intelligence
matter to be handled by the intelligence agency directors!"
Similarly. the CIA's General Counsel ,,-as not included or consulted
in the fOrIl1Ulation of the Huston Plan. As James Angleton testified.
"the custom and usage was not to deal ,vith the General Counsel, as a
rule, until there were some troubles. lIe was not a part of the process
of project approval." 73
(ii) Ooncealment from Oongress
At times, knowledge of illegal programs and techniques has been
concealed from Congress as well as executive branch officials. On two
occasions, for example, officials of the Army Security Agency ordered
its units-in apparent yiolation of that Agency's jurisdiction-to conduct
general searches of the radio spectrum without regard to the
source or subject matter of the transmissions. ASA did not report these
incidents to ranking Army officials. e\-en when specifically asked to do
so as part of the Army's preparation for the hearings of the Senate
Subcommittee on Constitutional Rights in 1971.74
Events surrounding the 1965 and 1966 investigation by Senator Edward
Long of )Iissouri into federal agencies' use of mail covers and
other investigative techniques clearly showed the desire on the part of
CIA and FBI officials to protect their programs from congressional
r~view.75 Fearing that the Xew York mail opening program might be
dIscovered by this subcommittee, the CIA considered suspending the
operation until the investigation had been completed. An internal
CIA memorandum dated April 23, 1965, reads in part :
Mr. Karamessines [Assistant Deputy Director for Plans]
felt that the dangers inherent in Long's subcommittee activi-
70 Memorandum from Charlotte Field Office to FBI Headquarters 8/22/67.
71 Huston, 9/23/75, Hearings, Yol. 2, p. 24.
When J. Edgar HOO\'er informed Attorney General .John :\Iitchell about the
Report on July 27, 1970, :\Iitchell oojected to its propoEals and influenced the
President to withdraw his original approval.
According to John :\Iitchell, he believed that the proposals "were inimical to
the hest interests of the country and certainly should not be something that the
President of the Cnited States should oe approving." (John :\Iitchell testimony.
10/24/75. Hearings, Vol. 4, p. 23.)
73 .James Angleton, 9/24/75, Hearings, Yol. 2, p. 77.
.. See ~Iilitary Surveillance Report: Sec. I, "Improper Surwillance of Private
Citizens or the :\Iilitary"; Inspector General Report, Department of the Arm~',
1/3/72.
75 The Johnson Administration itself attempted to restrict the Long Subcommittee's
im-estigation into national security matters, although there is no indication
that this attempt was motivated by a desire to protect ille~al activities.
(E.g., :\Iemorandum from A. H. Belmont to :\Ir. Tolson, 2/27/65; memorandum
from J. Edgar Hoover to Messrs. Tolson, Belmont, Gale, Rosen, Sullivan, and
DeLoach, 3/2/65,)
153
ties to the security of the Project's operations in Xew York
shoulc1 be thoroughly studied in order that a determination
ean be made as to \yhether these operations shoulcl be partially
01' fully suspended until the subcommittee's innstigations are
completed.76
,Yhen it \yas lea1'lled that Chief Postal Inspector Henry }Iontague
had been contacted about the Long in\·pstigation and belien'cl that it
\ycmld "soon cool ofI". hO\yc\'er. it \yas elecieled to continUE thc operation
\yithout snspcnsion. 77 .
The FBI was also concerned that the subcommittpe might expose its
mail opening programs. Bureau nlC'llloranda indicate that the FBI intencled
to ;'\yarn the Long Committee away from those arcas \yhich
would be injurious to the national defense," 7S .r. Edgar Hooycr personally
contacted the Chairman of the Senate .Judiciary Committee,'"
and u;'ged him "to see Long not later than ,Yednesday nlorning to caution
him that [the Chief Counsell must not go into thc kind of question
he madc of Chief Inspector :\Iontague of thl:' Post Office Department'"
SO~qucstioning that had threatened to rHeal the FBI's mail
projpct the pn>\'ious week.SI
"llC'n the Long subcommittee began to inYestigate electronic suryeillance
practiccs seycral months later, Bureau officials conyinced
Senator Echyarcl Long that there \yas no need to l)1\rsue such an in\'
estigation sine'e. thH saiel. the FBI's operations were tightl~' controlled
and properly implemented.s2 According to Bureau documents,
FBI agents \\Tote a press releasp for the Spnator from }fissouri. \yith
his approyal, that statpd his snbcommittee had
cOlHlncted pxhaustin> research into the aetiYities, procedures,
and techniques of this agel1('~' [andl based upon careful study
... \H~ are fully satisfied that the FBI has not participated in
highhanded or uncontrolled usage of wiretaps. microphones.
01' other electronic equi pment.'j
Xot onl~' \vas this release \\Titten by the FBI itself, it \yas misleading.
Tlw "exhausti n> research" apparently consistrd of a ninety-minute
briefing by FBI officials describing their eleetronic sUlTeillance practices;
neitlwr the Senator nor the publiC' lrarned of the instances of
improper P]rctronie sUITeillancrs that had been conducted by the
FBI.s4 ,Vhen Senator E<h\'ard Long later asked certain FBI officials
to testify about the BUI'rau's rlrctronic s\llTeillance policy before the
Subcommitter. they rrfused. arguing: " ... to put an FBI witness on the
70 Blind memorandum from "CIA Officer," 4/23/65.
• 7 Ibid.
78 1Iemoralldum from A. H. Belmont to ::\11'. 'l'olson, 2/27/65.
71l 11emorandum from J. Edgar Hoover to 1Iessrs. Tolson. Belmont. Gale, ROHen.
Sullivan. and DeLoach. 3/1/65.
BO 1Iemorandum from J. Edgar Hoover to 1Iessrs. Tolson, Belmont, Gale. Rosen,
Sullivan. and DeLoach 3/1/65.
H 1Iail Rpport Part IV. Sec. VII, "ConcPrJ] with Exposure." At the time of his
t€'stimon~' hpfore the Long Suhcommittpp. Chi€'f Postal Inspector Montague knew
of ongoing FBI proj€'C'ts in which Bur€'au agents received custody of the mail,
hut he was apparentl~' unaware that th€'He projects illYolved mail openingH.
'" For examplp. )lemorandum from C. D. DeLoach to )11'. Tolson, 1/10/66.
" 1[emoralldum from 1I. A..J ones to 11r. 'Yick, Attachmen'r, 1/11/66.
" Se€' pp. 62-65, 105, 205-206 for a description of some of these improper
surveillances.
154
stand would be an attempt to open a Pandora's box, insofar as our
enemies in the press \yere concerned...." B5
~'"fter the press release hall been deliwred to Senator Long and
tlw refusal to testify had bern accepted. onp FBI official wrote to the
~,"ssociate Director that \yhile SOIllr pl'olJlems still existed, ",,-e haye
neutralized the threat of being embarrassed by the Long Subcommittee
..." 86
Subfirtding (f)
The internal inspection mechanisms of the CIA and the FBI did
not keep-and, in the case of the FBI, were not designed to keep-the
activities of those agencies within legal bounds. Their primary concern
was efficiency, not legality or propriety.
The intemal inspection mechanisms of the CIA and the FBI were
ineffective in ensuring that the activities of these agencies were kept
within legal bounds. This failure was sometimes due to structural
deficiencies which kept knmdedge of (pIestionable programs tightly
compartmented and shielded froIll those who could Haluate their
legality.
As noted above, for example, the CIA's General Counsel was not
informed about either the Xe\\" York mail opening project or CIA's
participation in the Huston Plan deliberations. The role of the CIA's
General Counsel ,,-as essentially a passi \-e one; he did not initiate
inquiries but responded to requests from other Agency components.
As James Angleton stated, the General Counsel was not a part of
the normal project approval process and generally was not consulted
lllltil "something \yas going wrong." 8,
'Vhen the General Counsel was consulted, he often exerted a positive
influence on the conduct of CIA activities. For example, the CIA
stopped monitoring telephone calls to and from Latin America after
the General Counsel issued an opinion describing the telephone intercepts
as illegal. 8s But intprnal CIA regulations have never required
employees who know of illegal. improper, or questionable activities
to report them to the General Counsel; rathel', employes with such
knowledge are instructed to inform either tlll~ Director of Central
Intelligence or the Inspector General. The Diredor and the Inspector
General may refer the matter to the General Counsel but until recentIv
they were Il0t obligated to (10 SO.b'a As Richard Helms stated. "Some'times
we did [consult the General Counsel]; sonwtimes we did not. I
think the record on that is rather spotty, quitc frankly." 89
IJ1(leerl. the record suggests that those programs that wcre most
questionable-such as the Xew York mail opening: project and Project
CHAOS-were not referred to the General Counsel because they were
B."i :\lemorandum from C. D. DeLoach to :\11'. Tolson, 1/21/66.
86 DeLoach memorandum, 1/21/66. This incident also illustrates that Congress
has at times permitted itself to be "neu'tralized." The general reluctance of
Congress to discharge its responsibilities toward intelligence agencies is discussed
at pp. 277-281.
87 James Angleton. 9/17175. D. 48.
SlI :\lemorandum from Lawrence Houston to Acting Chief, Di\"isioll D, 1/29/73.
SR. Proposed regulations drafted in response to Executil"f> Order 1190;; (:\Iarcl!
1976) require the Inspector General tll refpr "all lpgal mattprs" to thp Office of
General Counsel. (Draft Reg. HR 1-3.)
89 Helms deposition, 9/10/75, p. 59.
155
considered extremely sensitin."o EYen whpn questionable actiyities
were called to the attention of the Gelll'ral Counsel. moreonl'. the internal
Agency regulations diel not guarantee him llllrestriete<l access
to all relevant information. Thus, the General Counsel was not in a
position to conduct a complete ('\'aluation of the propriety of particular
programs.
Part of the failurC' of internal inspection to terminate improper programs
and practices may be attributed to the fact that the primary
focus of the CIA's Office of the Inslwctor General and the FBI's Inspection
Division has been on efficiency amI effectiveness rather than
on propriety.
The CL\.\; Inspecltor General is charged with the respons'ibility,
among othpr mattl'rs, of inH'stigating activities \vhich might be construell
as "ilkgaL impl'opcr, and outside 'the CIA's legislatin'
chartcl'." Vl In at least one case, the Inspector General dill force the
suspension of ~t suspeclt activity: the sUl'l'rpt,itious a<lministration of
LSD to unwitting, non-\-Olllllteer, Illlman snbjects \vhich was suspended
in Hl63.92 An earlier Inspector General's review of the larger,
more general program for the testing of behayorial control agents.
hmyever. ha<llabele<l that program "unethical and illegal" and it nonetheless
continurcl for another seyen yrars."" In general, as the Rockefr]]
er Commission pointed out. "the focus of the Inspector General
component revie\ys was on operational effectivC'ness. Examination of
the legality or pl'Oprirty of CIA aetivitirs was not llorma]]y a primary
C'onerrn." "' Two separate reviews of the Xrw York mail opening projccts
by the Inspector General's office, for example, considered iSStll's
of administration and srcurity at lenbrth lmt did not eYen mention
legal considerations.D5
Intemal inspedion at 'the FBI has tradit.ionally nat encompassed
legal 01' ethical questions at all. Aceonling to "T. ~Iark Felt, the As·
sistant FBI J)irec~ol' in eharge of the Inspection Division from 1964 to
1971, his job was to ensure that Bureau progmllls were being opemlted
efficientl y. not constirtutionally: "There was no instruction to me," he
stated. "nor do I belicH' there is any instmction in the Insprctor's
manna,]s, that inspectors shoulll be on the alert to ser that constitutional
values are bCl;ng protected." 96 He could nut recall any program
\yhich ,vas terminated because it might han> been violating someone's
civil rights.97 .
90 Gordon Stewart deposition. 4/30/73, p. 29; Rockeller ComDlis~ion Report,
p. 146; Report 011 the Offices of the General Counsel and Inspector General; The
General Counsel's Responsibilities, 9/30/75, p. 29.
9'Regulation HR 7-1a(6l.
92 :.\Iemorandum for the Record by .J. S. Earman, Inspector General, 11/29/63;
:.\Iemorandum from Helms to DCI, 11/9/64.
93 1937 I.G. Inspection of the Technical Services Di"ision.
.. Rockefeller Commission Report, 6/6/73, p. Sf).
" :.\Iemorandum from L. K. "'hitI', Deput.v Director for Support, to Acting In~
pector Genl'ral, Attachment, 3/9/62; hlind memorandum, undated (1969). The
Inspector General under whose auspice;; the second review W'aS conducted stated
"[Olf course we knl'w that thi~ wa~ illegal." but Iw believed that it \vas "Ullne('
p~~ary" to rai~e the ma tter of its illegality ,vitb Diredor Helms "since everJ-body
knew that it wa~ [illp~al] and it didn't sPpm ... that I would be telling
:.\11'. Helms anything that he didn't know," (Gordon Stewart, 9/30/75, p. 32.)
11. 32.)
00 W. :.\Iark Felt testimony, 2/3/75, p. 65.
91 Felt, 2/3/75, p. 57.
156
A number of questionable FBI programs were apparently never inspected.
Felt could recall no inspection, for instanC€, of either the FBI
mail opening programs or the Bureau's participation in the CIA's
Xew York mail opening project.as Even when improper programs
were inspected, the Inspection Division did not attempt to exercise
oversight in the sense of looking for wrongdoing. Its responsibility
was simply to enSure that FBI policy, as definE'cl by J. Edgar Hoover
was effectively implemented and not to question the propriety of the
policy.DD Thus, Felt testified that if, in the COllrse of an inspection of a
field office, he discovered a microphone surveillance on )Iartin Luther
King, Jr., the only questions he would ask were whether it had been
approved by the Director and whether the procedures had been properly
followed. loo
'\'hen Felt was asked whether the Inspection Division conducted
any investigation infto the propriety of COIXTELPRO, the
following exchange ensued:
)11'. FELT. Kot into the propriety.
Q. So in the case of COIKTELPRO, as in the case of
XSA interceptions, your job as Inspector was to determine
,,·hether the program was being pursued effectively as opposed
to whether it was proper?
)11'. FELT. Right., ,vith this exception, that in any of these
situations, Counterintelligence Program or whatewr, it very
frequently happened that the inspectors, in reviewing :the
files, would clirC('t thart a certain investigation be discont,inued,
that i:t was not productive, or thoM there ,,-as some reason that
it be discontinued.
But I don't recall any cases being discontinued in the
COlmtel1intelligence program.IOl
As a result of this role definition, the Inspection Division became an
active participant in some of the most questionable FBI programs For
example, it was responsible for reviewing on an annual basis all memoranda
relating to illegal break-ins prior to their destmction under the
"DO XOT FILE" procedure.
Improper programs and techniques in the FBI were protected not
only by the Inspection Division's perceptrion of its function, but also
by the maxim that FBI agents should newr "embarrass the Bureau."
This standard, which sened as a shield to outside scrutiny, was
explicitly reflected in the FBI Manual:
Any investigation necessary to develop complete essential
facts regarding any allegation against Bureau employees
must be instituted promptly, and eyery logical lead which
will esta,blish the true facts should be completely run out
unless such action would embarrass the BUlY'au ... in which
event the Bureau will weigh the facts, along with the re,commendations
of the division head. [Emphasis addecl.] 102
9. Felt, 2/3/75, pp. 54, 55.
.. Felt, 2/3/75, pp. 59-60.
100 Felt, 2/3/75, p. 60.
101 Felt, 2/3/75, pp. 56, 57.
102 When asked about this Manual provision, Attorney General Edward Levi
stated:
"I do believe ... some further explanation is in order. First, the Bureau informs
me that the provision has not been interpreted to mean that an investiga157
Such an instruction, coupled with the Inspection Diyision's inattention
to the law, could only inhibit or prcYeut the tcrmination and exposure
of illegal practices.
Subfinding (g)
"When senior administration officials with a duty to control domestic
intelligence activities kne,,·, or had a basis for suspecting, that questionable
activities had occurred, they often responded with silence or
approval. In certain cases, they were presented "with a partial description
of a program but did not ask for details, thereby abdicating their
responsibility. In other cases, they were fully aware of the nature of
the practice and implicitly or explicitly approved it.
On several occasions, senior administration officials with a duty to
control domestic intelligence activities were supplied with partial
details about questionable or illegal programs but they did not ask
for additional information and the programs continued.
Sometimes the failure to probe further stemmed from the administration
official's assumption that an intelligence agency would not
engage in lawless conduct. Former Chief Postal Inspector Henry
){ontague, for example, was aware that the FBI received custody
of the mail in connection with several of its mail opening programsindeed,
he had approved such custody in one case-but he testified
that he believed these were mail cover operations only.loa Montague
stated that he did not ask FBI officials if the Bureau opened mail
because he:
never thought that would be necessary.... I trusted them
the same as I would another [Postal] Inspector. I would
never feel that I would have to tell a Postal person that you
cannot open mail. By the same token, I would not consider
it necessary to emphasize it to any great degree with the
FBI."04
A former FBI official has also testified, as noted above, that he
informed Attorney General Katzenbach about selected aspects of the
FBI mail opening programs. This official did not tell Katzenbach
that mail was actually opened, but he testified that he "pointed out
[to the Attorney General] that we do receive mail from the Post
Office in certain sensitive areas." 105 "While Katzenbach stated that he
never knew mail was opened or that the FBI gained access to mail
on a regular basis in large-scale operations,"06 the former Attorney
Hon should not take place and that 'any interpretation that an investigation
,vould not be instituted because of the possibility of emlJarrassment to the Bureau
was never intended and, in fact, has never been the policy of this Bureau.' I am
told that 'what was intended to be conveyed was that in such eventuality FBI
Headquarters desired to be advised of the matter hefore investigation is instituted
so that Headquarters would be on notice and could direct the inquiry.
if necessary.' "
"Second, the manual provision dates hack to March 30, 1955."
"Third, I am informed by the Bureau that 'rimmeuilate steps are heing taken to
remm"e that phraseology from our ::\lanual of Rules and Regulations.' "
(Letter from Attorney Gem'raJ Levi to Senator Richard Rchweiker, 11/10/75.)
103 Henry ::\lontague testimony, 10/2/75, pp. 55, 71.
10< Henry Montagne, 10/2/75, pp. 15-16.
lOll Donald ::\loore, 10/1/75, p. 31.
100 ~icholas Katzenbach, 10/11/75, p. 3f).
158
General acknmdedged that he did learn that "in some cases the outside
of mail might haye been examined or ewn photographed by
persons other than Post Office employees~~.lo7 HOWe\Oel', neither at this
time nor at any other time did the .Justicp Dppal'tment make any
inquiry to dP1ermine the full scope of the FBI mail operations.
Similarly, former Attorneys General Xicholas Katzenbach and Ramsey
Clark testified that they '\"ere familia I' with the FBI's efforts to
disrupt the Ku Klux Klan through regular inyestigatiye techniques
but said thev were una\yare of the offensiye tactics that occurred
in COIKTELPRO. Katzenbach said he did not believe it necessary
to explore possible irregularities since" [i]t neyer occurred to
me that the Bureau would engage in the sort of sustained improper
aetiyity which it apparently did." 108
Both Robert Kennedy and Xicholas Katzenoach were also aware of
some aspects of the FBI's inYestigation of Dr. ~fartin Luther King,
.Jr., yet neither ascertaineel the full eletails of the Bureau's campaign to
discredit the ci viI rights leaeler. Kenneely intensified the original "communist
influence" inwstigation in October UJ68 by authorizing wiretaps
on King's home and office telephones.l09 Kennedy requested that
an evaluation of the results be submitted to him in thirty days in
order to determine whether or not to maintain the taps, but the eYaluation
was nenr delivered to him and he diel not insist on it.110 Since
he neyer ordered the termination of the wiretap, the Bureau could,
and did, install additional 'Yiretaps on King by inyoking the original
authorirA'ltion. lll According to Bureau memoranda apparently initialled
by Attorney General Katzenbach~ Katzenbach receiveel after
the fact notification in 1965 that three bugs had been planted in
Dr. King's hotel rOOl11s.112 A transmittal memorandum \yritten by
107 Katzenbach statement, 12/3/75, Hearings, Yol. 6, p. 205.
108 Katzenbach testimony, 12/3/75, Hearings, Yol. 6, p. 207; Ramsey ('lark,
12/3/75; Hearings, Vol. 6 p. 235; KatzenbaCT1's and Clark's knowledge of disruptire
operations is discussed at greater length in Finding G: "Deficiences in Control
and Accountability" p. 265.
100 ~Iemorandum from J. Edgar Hoorer to the Attorney. General, 10/7/63;
memorandum from ,T. Edgar HoO'oer to the Attorney General, 10/18/63.
110 ~Iemorandulll from C. A. Eyans to ~Ir. Belmont 10/21/63.
In May 1961, Robert Kennedy also became awar" of the CIA's use of organized
crime figures in connection with "clandestine efforts" against the Cuban goyernment.
(Memorandum from J. Edgar HoO'oer to the Attorney General, 5/22/61. J
But he did not instruct the CIA to terminate its inrolyement with underworld
figures either at that time or in ~Iay 1962, when he learned at a briefing br CIA
officials that an assassination attempt had occurred. According to the CIA's General
Counsel, who partIcipated in the 1962 briefing, Kennedy only said, "... if we
were going to get inyolyed with :Mafia per,;;onnel again he ,yanted to be informed
first." (La ",rence HOllston deposition, 6/2/75, p. 14. J
The CIA's use of underworld figures clearly posed problems for the FBI's ongoing
investigation of organized crime in the "CnitE'd States, which had in large
part been initiated b~o Attorney GeIlPral Kenned~o himself. (Senate Select Committee,
"Alleged Assassination Plots Im'olving ForE'ign Ll'aders." pp. 125-129.)
111 The FBI instituted additional wiretaps on King on four separate occasions
betwE'E'n 1964 and 1\)65. Since Justice Department policy before ~Iarch 1965
imposed no limit on the duration of wiretaps and they were approyed by the
Attorm'y General, the Bureau claimed that the King taps WE're justifipd as a continuation
of the tap originally authorized hy Kennedy in October 1963. (For example.
memorandum from FBI Headquarters to Atlanta Fipld Office. 4/19/&,:
~[artin Luther King Report: Sec. IC, ",nrE'tap Surypil!ancp of Dr. King and the
SCLf'." -
110 Katzcnbach's initials apppar on Il!pnlOranda addrpssed to thp Attorney General
adyising him of these bugs, but he eannot recall seeing or initialing them.
159
Katzenbach also indicates thM he lIlay han' instmcted the FBI to
be '",-ery etl utious~~ in conducting t hes~' surTeillanees.11.3 There is no
iJl(licatiOll, llO\yen'l", that he l'eqw'sU'd fmother (letails about any of
tllrm or prohibit!'d til!' FBI f!'Om futun' lise of this technique against
Dr. King.
"\Yhil!' there is no e\-idence that the fll11 extcnt of tllP FBI's campaign
to discl'c<!it Dr. IGn<r ,nlS authorizc(l by or knO\yn to anyone outside
of the Bureau, therpis pyi(lence that officials responsible for supen-ising
thc FBI recpiw(] indications that somc such efforts ,,-ere being
undertaken. For (·xample, fonner Attorney General Katzenbaehand
former Assistant AttoI'll!'v General Blll'ke ~Iarshall both testifiell
that in late 10fi-! thry lea]']1e(] that thp Burpan h~H] offerc(] tape recon]ings
of Dr. King to ccrtain neWSlllcn in 'Yashington. D.C. They further
stated that they inforllle(l Pn'sident .Johnson of the FBI's
offers. ' H The Committee has discoYere<! no evi(]enee. hO\yever, that the
Prcsil]ent 01' .Jnstice Depal'tment officials made any further effort to
halt the discrediting campaign at this time or at any other time; indeed,
the Bureau~s eampaign eontinuec1 for seYeral years after this
ineident.
On some oecasions, a(lministration officials did not request further
details abont intelligence programs because they simply did not "ant
to knO\y. Former Pustmaster General .J. Edward Dav testified that
when Allen Dulles and Richard Hclms spoke to hin'l about a CIA
project in !!)()l, he intcrrupte(l them before thcy could tell him the
purpose of their "isit (which Helms sail] was to say mail mlS being
opened). Day stated:
... Ml'. Dulles~ after some pn'liminary yisiting aIH] so on,
said that he wanted to tell me something ,-ery secret~ and I
said, "Do I han> to 100mY about it?"~ And lw said, "Xo:~
I said. "~ly experience is that where there is something that
is Yery secret. it is likely to leak out, an(l anybody that kne,v
about it is likely to be suspected of lUl\-ing been part of leaking-
it out. so I ,yould rather not know anything about it."
"That additional things were said in connection with him
building up to that. I don't knO\v. But I am sure ... that I
,,-as not told anything about opening maiL" 115
By his own account, therefore, }Ir. Day did not leal'll the true natun,
of this project because he "would rather not know anything about it.~~
Although rarely expressed in such unequivocal terms, this attitude
appears to have been all too common among senior government
officials. . .
C\Iemoranda from .T. Edgar Hoo,-er to the Attorney General. 5/17/65. 10/19/65,
1:!/l/6:i: KatzPllbach. 1:!/1/75. Hearing~, YoL 6, p. 211, p. 46.) He stated. how1'\"('
1', that if he had read the~e doeument~. lw would hare "done ~omething ahout
it." (KatzeniJach, Hparing~. vol. 6. p. 230.)
111 A tran~mittal ~Iip, which the FBI claims had been nttaehed to the 12/1/65
memorandum, notes that "these are particnlarly delicate surreillances" and
that "we ~hould be ren' eaution~ in terms of the non-]'BI people who may from
time to time necp~~arily hI' ill\'ol1'ed ill some a~peet of installation." (:\Iemorandum
from Xicholas Katzpllbach to .T. Edgar Hoon-r. 12/10/65.) This mes~
age i~ ~igned h~' KatzPllhaeh, hut he te~tified that he i~ unsure it related to
tll(' Kill!!; ~lIrreillallef'S. (KatzP1I1Jaeh. 12/3/7.•. Hearings, Vol. 6. II. 229.)
11\ Katzenlmch. 12/3/7;). Hparings. YoL 6, ]l. 210; Burkp ~Iarshall te~timony.
3/3/7(;. JlJl. 39-13.
'" .T. Ed\Yard Day tp~tilllony, 10/22/7.). Hearings, VoL 4. p. 45.
160
Enn ,,-hen administration officials ,vere fully apprised of the illegal
or questionable nature of celtain programs awl techniques. they sometimes
permitted them to continue..\n example of acquiescence is presented
in the case of 'Yilliam Cotter, a former Chief Postal InspectDr
who knew that the CIA opene(lmail in connection ,yith its Xe'y York
project but took no direct action to terminate the project for a period
of four years.l16 Cotter had learned of this project in his capacity as a
CIA official in the mid-1930's and he knew that it ,vas continuing ,yhen
he was sworn in as Chief Postal Inspector in April 1969,117 Because
the primary responsibilit)- of his position ,vas to insure the
sanctity of the mails, he ,vas understandably "yery. very uncomfort·
able ,vith [knowledge of the ~ew YorkJ project," 118 b1lt he felt constrained
by the letter and spirit of the secrecy oath ,vhich he had signed
when he left the CIA in 1969 "attesting to the fact that I ,Yould not
divulge secret information that came into my possession during the
time that I was with the eLL" 119 Cotter stated; "After coming from
eighteen years in the CIA. I ,vas hypersensitive. perhaps, to the protection
of what I 'believed to be a most sensitive project ..." 120 For
senral years. he placrd the dictate of the secrecy oath above that of
the law he was charged ,,-ith enforcing.
Former "7hite House ad,-iser .John Ehrlichman also stated that he
learned of a program of intercepting mail bebveen the United States
and Communist countries "because I had seen reports that cited those
kinds of sources in connection with this. the bombings, the dissident
activities." 121 Yet he cannot recall any "'hite House inquiry that was
made into such a program nor can he recall raising the matter with the
Presiclent,122
"'hen President Xixon learned of the illegal techniques that were
recommended in the Huston Plan. he initially endorsed, rather than
disavowed them. The former President state'd that "[tJo the extent
that I reviewed the Special Report of Interagency Committee on Intelligence.
I would have been informed that certain recommendations
or decisions set forth in that report were, or might be construed to be,
illegal." 123 He nonetheless approved them. in part because they represented
an efficient method of intelligence collection. As President Nixon
explained, "PIJy approval was based largely on the fact that the procedures
were consistent with those employed by prior administrations
and had been found to be effectin by the intelligence agencies." 124
Mr. Nixon also apparently relied on the theory that a "sovereign"
President can authorize the violation of criminalla,vs in the name of
"national securitv" when the President, in his wle discretion, deems it
appropriate. He ~ecent1y stated:
116 In 1973, however, :\lr. Cotter was instrumental in effecting the termination
of the CIA's New York project. (Cotter, 8/7/75, p. 45.)
117 Cotter, 8/7/75, p. 45.
116 Ibid.
11' Cotter 10/22/75, Hearings, Vol. 4, p. 74.
120 Ibid.
121 John Erlichman testimony, President's Commission on CIA Actiyities
Within the l:nited States, 4/17/75, p. gs.
122 Erlichman testimony, President's Commission on CIA Actiyities 'Within the
United States, 4/17/75, p. 98.
223 Answer of Richard ;'\1. Nixon to Senate Select Committee Interrogatory 23,
3/9/76, p. 13.
'" Answer of Richard :\1. Nixon to Senate Select Committee Interrogaton' 19,
3/9/76, p. 13.
161
It is quite obvious that there are certain inherently gm'emmental
aetions \vhieh if undertaken by the sovereign in protection
of the interrst of the nation's sec1ll'ity are la\vful lmt
which if undertaken by pri\'flte persons are Ilot. ...
. . . [1]t is nain~ to att('mpt to categorize activities a Prpsident
might authorize as "legal" 0/' ;'illegal" ,vithout referencr
to the circumstances undrr which he concludes that the
activity is llrcessarY....
In short. thprr l;an> brpn-and \vill bp ill thr fut1ll'r--circumstances
in \vhich Presidents may ]awfulh authorize actions
in tIl(' interests of thp secl1l'ity ~)f this cOlmtry, which if
nndertaken by other persons. or ('Yen by the President under
ditlerent circumstancrs. \vouldlX' illegal.l2:i
As the former President described this doctrine, it could apply not
only to actions taken openly, which are subject to later challenge by
Congress and the courts, but also to actions snch as those recolllmrnded
in tIle Huston Plan, which arr covertly endorsed and implemented.
The dangers inherent in this theory are clear, for it permits a 'p.resident
to create exceptions to normal legal restraints and prohibItIOns,
without review by a neutral authority and without objectiYe standards
to guide him.'26 The Huston Plan itself seITes as a reminder of
these dangers.
Significantly, President Xixon's revocation of approval for the
Huston Plan \vas based on the possibility of "media criticism" if the
usc of these techniques \vas revealed. The former President stated:
Mr. Jfitchell informed me that it was Director Hoover's opinion
that initiating a program which would permit several
government intelligence agencies to utilize the investigati,-e
techniques outlined in the Committee's report would significantly
increase the possibility of their public disclosure. JIr.
Mitchell explained to me that JIr. Hoover believed that although
each of the intelligence gathering methods outlined in
the Committee's recommendations had been utilized by one or
more previous Administrations. their sensitivity \vould likely
generate media criticism if they \Yere employed. Ml'. Jfitchell
further informed me that it was his opinion that the risk of
disclosure of the possible illegal actions, such as unauthorized
entry into foreign embassies to install a microphone transmitter,
was greater than the possible benefit to be derived. Based
upon this conversation with AttDrney General Mitchell, I decided
to revoke the approval originally extended to the Committee's
recommendations.'27
In more than one instance, administration officials outside the intelligence
community haw specifically requested intelligence agencies
to undertake questionable actions. XSA~s program of monitoring telephoni?
communications bet\wen Xew York City and a city in South
Amel'lca, for example, was undertaken at the specific request of the
Bureau of ~arcotics and Dangerous Drugs, a law enforcement agency.
'''' Answer of Richard ~I. Xixon to Senate Select Committee Interrogatory 34,
,~/!l/7G, pp. 16-17.
"'" President Ford has recently rejected this doctrine of Presidential power.
127 Answer of Richard ~I. Nixon to Senate Select Committee Interrogatory 17,
3/9/76,pp.11-12.
68-786 0 - 76 - 12
162
BXDD officials had been conc2rned ahout drug deals that were apparently
arrano-cd in calls from public telephones in Xe'" York to South
Am;>rira. b~t they felt that they C011]d not legally wiretap these telephone
booths.128 In order to avoid tapping a limited number of phones
in Xew York. B~DD submitted the names of 450 American citizens
for inclusion in XSA's 'Yatrh List. and requested XSA to monitOl' a
communications link behveen Xew York and South America which
necessitated the interception of thousands of international telephone
ca11s.'29
The legal limitations on domestic wiretapping apparently did not
conrern certain offiria]s in the 'White H01lse or Attol11evS General ,vho
requested the FBI to do their bidding. In some instances. they specifically
requested the FBI to institute wiretaps on American citizens
,vith no substantial national security predicate for doing so,13°
On occasion, Attorneys General have also encouraged the FBI to
rirrumn>nt the will of both Congress and the Snpreme Court. As noted
aboye. after Congress passed the Emergency Detention Act of 1950 to
regulate the FBI program for listing people to be detained in case of
war or other emergency, Justice Department officials conrlnded that
its procedural safeguards and substantive standards 'YeTI' "nnworkable".
Attorney General .J. Howard McGrath instructed the FBI to
disregard the statute and "proceed with the fSecurity Index] program
as preyiously outlined." 131 Two subsequent Attorneys General-James
McGranery and Herbert Brownell-endorsed the decision to ignore
the Emergency Detention Act.132
In 1954, the Supreme Court denounced the use of microphone surveillances
by local police in criminal cases: 133 the fact that a microphone
had been installed in a defendant's bedroom particularly outraged
the court. 'Yithin weeks of this decision, however, Attorney
General Herbert Brownell rerersed the existing .Tustice Department
policy prohibiting trespassory microphone installations by the FBI.
and IYaye the Rnreau sweeping new authority to engage in bugging for
intelligence purposes-even when it meant planting microphones in
bedrooms.'34 Brownell wrote J. Edgar Hoover:
Obviously. the installation of a microphone in a bedroom or
in some comparably intimate location should be avoided
whenever possible. It may appear. however, that important
intelligence or evidence relating to matters connected ,vith the
national security can onlv be obtained bv the installation of a
microphone in s;lch a location. . . . .
... . I recognize that for the FBI to fulfill its important intellIgence
function, considerations of internal security and the
national safety are paramount and, therefore. may compel the
unrestricted use of this technique in the national interest.135
128 :\filton Iredell, 9/18/75, p. 99.
129 ::Uemorandum from Ingersoll to Gayler, 4/10/70.
1:10 gee Findings, "Political Abusp" and "Intrusire Tpchniques" for examples.
131 :\!emorandum from A. H. Belmont to D. :\1. Ladd. 10/15/52.
132 :\!emorandum from Attorney General .Tames :\IcGranery to .T. Edgar Hoover.
11/25/52: memorandum from Attorney General Herbert Brownell to .T. Edgar
Hoorer, 4/27/53.
133 lrvil1e v. Calijnrnia, 347 U.S. 121' (954).
~: :\!emorandum from the Attorney General to the Director, FBI. 5/20/54.
":\Iemorandum from the Attorney General to the Director, FBI. 5/20/54.
163
Bro,,",l(~ll did not eYen require the Bureau to seek the Attorney General's
prior approval for microphonE' installations in particular
caSE's.136 In the face of the l1'l'ill£ decision, therefore, he gave the FBI
authority to bug "'homeYer it wished whereH'r it wished in cases that
the Bureau-and not thE' Attornev General-determined "'E're "in the
national interest.~~ .
In ShOli~ disregard of the la,,' by intel1igE'nce officers "'as seldom
corrected, and sometimes encouraged or facilitated~ by officials out;.:
ide the agencies. 'Whether hy inaction 01' dirpct participation, these
administration officials contributed to the percE'ption that legal restraints
did not apply to intelligence activities.
136 Ibid.
 

Go to Next Page