Site Map

CHURCH COMMITTEE REPORTS

C. EXCESSIVE USE OF INTRUSIVE TECHNIQUES
)L\,TOR FrXDIXG
The intelligence community has employed surreptitious colle~tion
techniques-mail opening. surreptitious entries. informants, and
"traditional" and highly sophisticated forms of electronic surveillance-
to achieve its owrly broad intelligence targeting and collection
objectives. Although there are circnmstances where these techniques.
if properly controlled. are legal and appropriate. the Committee
finds that their wry nature makes them a threat to the personal
privacy and Constitutionally protected activities of both the targets
and of persons who communicate with or associate with the targets.
The dangers inherpnt in the lise of these techniques have been compounded
by the lack of adequate standards limiting their use and by
the absence of reYiew by nentral authorities outside the intelligence
agencies. As a consequence. these techniques have col1ected enormous
amounts of personal and political information selTing no legitimate
gowrnmental interest.
Subjindings
(a) Given the highly intrusive nature of these techniques,l the legal
standards and procedures regulating their nse have been insufficient.
There have been no statutory controls on the use of informants; there
have been gaps and exceptions in the law of electronic surveilJance;
and the legal prohibitions against warrantless mail opening and
surreptitious entries have been ignored.
(b) In addition to providing the means by which the Government
can collect too much information about too many people. certain
techniques han their mvn peculiar dangers:
(i) Informants have provoked and participated in violence and
other illegal activities in order to maintain their cover, and they have
obtained membership lists and other private documents.
(ii) Scientific and technological advances have rendered traditional
controls on electronic sUlTeillance obsolete and have made it more
difficult to limit intrusions. Because of the nature of wiretaps, microphones
and other sophisticated electronic techniques. it has not always
been possible to restrict the monitoring of communications to the persons
being innstigated.
(c) The imprecision and manipulation of labels such as "national
1 The techniques noted here do not constitute an exhaustiye list of the surrE'ptitious
means h~' which intelligE'llce agencies hayE' collE'Cted information. ThE'
FRI, for examplE', has ohtainE'd a great deal of financial information ahout Ameriran
ciitzE'ns from tax returns filed with the Internal Reyenue Seryice. (See IRS
Report: Sec. I, "IRS Disclosures to FBI and CTA.") This section, howE'YE'r, is
IimitE'd to prohlE'ms raised h:> electronic suryeillance. mail opening. surreptitious
E'ntries informants and electronic surveillances.
( 183)
184
securitv," "domestic ~ecuritv:: "sub\'ersiw actidties,:: and "foreign
intelligence': ha\'e led to unjllstified use of these techniques.
Elaboration of Finding8
The preceding section described ho" the absence of rigorous standards
for opening, controlling. and terminating inn'stigations subjected
many dinrse elements of this society to scrutiny by intelligence
agencies, without their being suspected of violating any la". Once an
investigation was opened: almost any item of information about a
targees personal behavior or political views was considered ,vorth
collecting.
Extremely intrusive techniques-such as those listed above-havl~
often been used to accomplish those overly broad targeting and collection
objectives.
The paid and directed informant has been the most extensively used
technique in FBI domestic intelligence investigations. Informants
were used in 83% of the domestic intelligence investigations analyzed
in a recent study by the General Accounting Office.1a As of .June 30,
1975: the FBI was using a total of 1,500 domestic intelligence informants.
2 In 1972 there were over 7,000 informants in the ghetto informant
program alone. In fiscal year 1976. the Bureau has budgeted more
than $7.4 million for its domestic intelligence informant program:
more than twice the amount allocated for its organized crime informant
program.3
vViretaps and microphones have also been a significant means of
gathering intelligence. 1~ntil 1972, the FBI directed these electronic
tE'chniques against scores of American citizens and domE'stic organizations
during investigations of such matters as domestic "subycrsive:'
acti"ities and leaks of classified information. The Bureau continues to
use these techniques against foreign targets in the rnited States:
The most E'xtensive use of elE'ctronic suryeillance has been by the
National Security Agency. KSA has electronically monitored (without
,viretapping in the traditional sense) international communication
links since its inception in 1952; because of its sophisticated terhnology.
it is capable of interrepting and recording an enormous number
of rommunications between the 1~nited States and foreign countries.4
All mail opening programs han now been terminated, but a total
of t"elve such operations were conducted by the CIA and the FBI in
ten American cities bebveen 1940 and 19n.5 Four of these were operated
by the CIA. whose most massive project involved the opening of
more than 215.000 letters between the rnited States and the Soviet
t'nion over a twenty-year period. The FBI conducted eight mail opening
programs, three of which included opening mail sent bE'tween two
points in the United States. The longest FBI mail opening program
1a Report to the House Committee on the .Judiciary, hy the Comptroller General
of the United States, "FBI Domestic Intelligence Operations-Their purpose and
scope: Issues that Xeed to be Resolved," 2/24/76, p. 96.
2 FBI memorandum to the Sele<'t Committee, 11/28/75.
3 ~Iemorandum, FRI O?;crall lntrlligcnrc Program FY 1977 COlllpurn/ to FY
1976 undated. The cost of the intelligence informant program comprises pa~'ments
to informants for sen'ices and expense as well as the costs of FBI personnel.
support and overhead.
4 ~ee :'\~A Report: Sec. I. "Jntroduction and Summary."
'See ~Iail Opening Reports: Sec. I, "Summary and Principal Conclusions."
185
lasted. \yith one period of suspenSIOn. for approximately twenty-six
years.
o The FBI hac; al~o ('oJu!lIl'ted llillldn'dc; of \yaJ'J'antlpss slll'J'eptitions
plltripc;-hn'ak-ins-dnrilll-t tIl(' past twenty-fin' ,wal's, Often tlil'se
pntripc \\'('1'(' ('OlH]IIl'te(] to install plel't]'()nic listpnin~' dp\-icpc;: at othPl'
t iJllPS t Il('y imol n'd physi('a I c;pa rchl's f()r in fOJ'lllat i,~n. The ,,-idps])J'pacl
usp of ,,-arl'Hntless slll'l'pptitiollS pntJ'ip~ ag'ainst lloth fOJ'('ign and do1I1estic
targds ,,-as tpJ'lliinatpd hy thp BnJ'('ali in l!)(i(i ],"t tIl(' FBI has
occasionally made snch entries t;gainst foreign targets in morp I'pepnt
years.
v .\11 of thpsp tpc1l1liqlles han> ],ppn IIIl'llpd against .\nll'rican citizPIl:-i
as "'ell as against cprtaill foreign targets. On the tlwory that tllP
exe('lItin>'s J'('sponsihility in tIll' ,lrea of "national spcllrity" and "forpign
intplligPIH'p" jllstitjpd tlll'ii' IIH> ,,-ithonl thp nppd of jwlicial snper\-
ision. thp intp]]igelH'p ('olllnlllllity 1)'}lip\'('d it \yas frpp to dirpc! thl'sl~
tpchniqnes against indiyiduals and organizations \yhom it lwlien>d
threatpnp(l thp ('01llltrY's s?('lIrity. TIlP standards gon'rning thp m;p of
thpse techniqllps han' ill'en iIlI\H'l~cisl' and snsceptihlp to pxpansi\'(> intPl'pretatioll
and in tIll' absence of any jm]icial check on the application of
tllPSP nlgllp standards to particular casps. it ,,-as relatin>ly easy for
intelligencp agpnpips and tll<'ir sll\Jl'riors to pxtPIH] tll<'Jll to many casps
\yhere they \"ere clparly inappropriate. Lax intel'llal controls on the
nse of SOllIe of tlll'se tpclmiqnes COIII\)OlllH]e(] the problem.
These intrllsiw tpc1l1liqllPs hy thpir nT\- lIatlll'p inn1<]p(] tlw priyate
COlllJlIllllications and al'ti\'itips hoth of tIl<' incli\-iellialc; tlIPY \ypre elirpl'te(]
against an(1 of the jlpJ'SOll:"i with \"hOIiI thp targ'ds ('Olll'nlllnicatp(]
or asc;ociatpd. Conseql1('ntly. tlwy l)J'oYidp(] tIll' nH'anc; by \\'hich a]]
typps of infol'lllation-inc!llding pprc;onal an(1 political infoJ'mation
totally llllrplated to any legitimatp gon'rllllH:,ntal ol,jpl'tiyp-\wJ'(> colIpctp(]
and in SOJllP casps (]is,-,;pl11inatp(] to thp highest Ip\-p],.; of tlIP
f,!:0n>l·nlllent.
Subfinding (a)
Giyen the highly intrusi \'e natlll'e of these techniqnes. the legal
standards and procedures regulating tlwir use have been insnfficient.
There han been no statntory controls on tll(' llse of informants; there
have been gaps and exceptions in tll(' law of electronic slllTeillnnce; and
the legal prohibitions against \n1l'rant less mail opening and surreptitious
entries haye been ignored.
1. The .17J81'11('1' of ,"'tl!futOI,lj Rl'stmilits 011 thl' [-se of fll/OI'IIUllits
Then' arp 110 statutps ()]. publishp<l ]'eg-illations gO\'(>l'ning the usp of
informants." Consequently. the FBI is irep to use informants. gui(](·d
onh by itc; o\yn intel'llal (]ireetins which call be change(] at any tinIP by
FB'T (;f1i(·jals without apprond fronl outsi(]e the Bui'cau.'· .
G Title 21' of the rnited States Codp proyides onl~- that appropriations for the
DppurtnlPnt of Justice are anlilahle for payment of informants. 21' r.S.l'. *;)24.
7 The Attol'lley General has announced that Ilt' \Yill issue guidelines on the use
of informants in the near future. and our recommendations pro"ide standards for
informaut control and prohihitions on informant HctiYity. (See pp. :~2K) In
:)(ldition. the Attornpy Genpral's recrntl~- promulg-ated g;uidelinps on "Domestic
Sp('urity Inypstig;ations" limit tilt' usp of informants at 'the parl~' stagp,", of sudl
inrlllirip,", amI IH'oyidp for re\'jp\y h~- tllP .Inc-tice J)ppHrtnwnt of tllP initiation of
"full inypstigations" in which np\Y informants nnl~' he recruited,
186
Apart from comt decisions prC'cllHling- thC' usC' of informants to
C'ntl'ap pl'I':'0I1S into criminal acti\·ity. thl'l'C' aI'(' fl'\Y jndil'ial opinions
lll'al ing- ,,·ith informants aJJ(l most of t hosC' concern criminal rat her
than inte 11 ig-l'nn' in formants,' The l'n iu'd :"iratl's Sn)ll'('llll' ('ourt has
npn'!' ['ull'(l on ,\"llethel' tIl(' nse of intelligence informants in the
contpx'ts n'\"E'alpd by the Committee's inwstig-ation offend Fir"t
,\.ml'ndnll'1lt rig-his of f!'t'l'dom of ('xpression awl association."
In tIl(' absence of rpgulat ion throngh statutt'. pnblishe{lregnlarion.
or comt decision. the FBI ha" ns(>(l inform:lllh to rppor~ on Yirtually
('\'ery aspeet of a targNed group or indiYi(lnal's aetiYity. incllHling
Itndul political exprpssion. polil ical meNing-s, the identities of group
memlw['s and their associates. thr "thoughts and frclings. intpntions
ilnd ambitions." of memlwrs.'° and personal matters irrelenlllt to any
legitimatl' gonrnmental intprest. Informants han also been u5rd by
tlw FBI to obtain thc confidential records and documents of a g-roup."
Informants coul(l br usp{l in an~' intplligpncp ill\·pstigation. FBI
dirpcti\'es han not limite(l infol'mant rppOlting to aetnal 0[' lik<'ly
yiolcnce or other yiolations of la \\".'2 Xor has any determination ]wcn
ma{lr concrrning ,YIlPt hrr the substantial intl'llsion rppresentpd by
informant CO\'erage is jnstilied by the goyprnmenfs interest in obtaining
information, or ,Yhether less intrusiw means ,nmld adeqnately
SetTe t hp goYernnwnfs inten'st. There has aIso bepn no reqnil'l'ment
that tIl{' drcisions of FBI officials to nse informants bp rpyirwpd by
anyone ontsidr the FBI. In short. int('ll igencc informant conrail'
has not bern subject to tIl(' standards ,Yhich gonrn thr n5(' of other
intrusin, teclmiqurs such as plectronic suneillancp. ('yen though informants
can produce a far broader range of information.
2. Gaps and Exceptions in the L((U' of Electronic Surveillance
Congress and the Supreme' Court haY(' both addressed the legal
issues raised by electronic slllTPillancp. but t hp law has been riddled
,Yith gaps ami eveptions, The' Executin branch has been able to
apply yague standards for the use of this technique to particular cases
H In a criminal case inYol,ing- charg-es of jury bribery. United State8 ". Hoffa.
885 r,S. 293 (1900). the SuprpnH' Court ruled that an informant",.; testimony
concerning conyersations of a defendant couhl not he considered tlIP product of a
warrantless search in Yiolation of the Fourth AmendnlPnt on the g-round the
llefendant had ('onspntell to the preSE'ncE' of the informant, In another criminal
casp, [,CWi8 v. ['J/ited Statc8. 385 r.s. 20G (l9GG), the Court stated that "in
tllP llptpction of many t~·pps of primps. thp Govprnment is entitlpd to USe' dE'coys
and to conceal the identit~· of its agE'nts."
• In a morE' rpcent casE'. thE' California SuprpnIP Court hE'hl that sE'crpt
~nrYeillance of ('las~ps and .~rOllp lllpC'ting-:::: at a nniYer:-:ity throng-h the US? of
IllH]prCOYE'r ag-ents was "likE'I.'· to posp a suhstantial rE'straint upon thE' eXE'rcisE'
of First AnIPndnlPnt rig-hts." 11'liitc Y. naris. 333 Pac. Rep. 2ll. 223 (1973)
Citing- a nlllllher of r.s. Suprpmp Court opinions. thp California Suprpmc COllrt
sta tpll in its unanimolls dE'Pi"ion :
"In yiE'w of this sig-nifip,wt potpntial chilling pffpet. tllp chaIlpng-pd sUrYE'illanpp
adi"ities can onl~' hp sustaine(] if [thp Governlllent] pan llpmonstratp a
'comppIling' state interpst which justifies the rpsultant dptE'rrencp of First
.\nlPndlllPnt rig-hts and 'Ylliell eHnnDt hp ,spl"\'E'd b~' alternatiYe mE'ans les,; instrn,
I\'e all fUll(lall1E'ntal rig-hts." ;)33 Pac, Rep. 2d, at 232
'" Gary RO\yp tE'stimon~', 12/2/75 Hparing-s. Yo!. G. pp. 111. 118.
11 Cook. ]2/2/73. Hearing-s. Yo!. G, p. ]]1.
"ThE' FBI :\fanual of InstnlPtions prosprihp,; onl~' rt>porting: of pri,ilE'g:E'{]
('olllmullipntions ])pt,Yeen nn atton1P~' anll plipnt. legal "(]{,fpllsP plnns or strntE'gy."
"pmplo:ver-eml)lo~'E'P rp1ntionships" (whE'rp an informant is COllllE'PtE'(] with a
lahor llnioll), nnll "legitimatE' institlltioll or camplls actiyities" at schools, (FBI
)Ianllal Spction 107.)
187
as it has seen fit. and, in tIll' case of XSA monitoring, the standards
and procedures for the use of electronic sUlTeillance \Yere not applied
at all.
'Vhen the Supreme Court first considered \yiretapping, it held that
the \yarrantless use of this technique \yas constitutional because the
Fourth Amendment's \Yarrant requirement applied only to physical
trespass and did not extend to the seizure of conyprsation. This
decision, the 18:28 case of Olmstcad Y. Cnlted Statcs, im~olypd a criminal
prosecution, and left federal agencies free to engage in the
unrestricted use of \yiretaps in both criminal and intelligence im-estigations.
13
Six years later, Congress enacted the Federal Communications Act
of 1934, which made it a crime for "any person," without authorization,
to intercept and di Ylllgp or publish the contents of \yire and radio
communications. The Supreme Court subsequently constrlH~d this section
to apply to federal agents as \yell as to ordinary citizens, and held
that evidence obtained directly or indirectly from the interception of
\yire and radio comnmnications \vas not admissible in court." But
Congress acquiesed in the .Justice Department's position that these
cases prohibited only the di "lilgence of contents of wire communications
outside the exe('uti\~e branch,l;; and GO\-ernment wiretapping for
intelligence purposes other than prosecution continued.
On the ground that neither the 1934 Act nor the Supreme Court
decisions on wiretapping were meant to apply to "grave matters involving
the defense of the nation," President Franklin Roosevelt
authorized Attorney General .Jackson in 1940 to apprO\~e wiretaps
on "persons suspectc(] of subversive aeti\~ities against the Gon~l"Ilment
of the rnited States, including suspected spies."IG In the absence
of any guidance from Congress or the Court for another quarter
century, the cxecutiH branch first broadened this standard in 184G
to permit wiretapping in "cases vitally affecting the domestic security
or where human life is in jeopardy," 17 ancl then modified it in 1965
to allow \yiretapping in "inwstigations related to the national security."
18 Intel'l1al .Justice Department policy required the prior
appnmd of the Attol'lley General before the FBI could institute \Yiretaps
in particular eases, 10 but until tIll' mid-18liO's t IlPre ,,-as no require-
13 DIll/stead v. United States, 277 V.S. 438 (1928).
)l X (J rr!one Y. r~n it,rd States. 30~ C S, 3D7 (1937) ; 308 r.s, 338 (1D39).
l' For examlllp, letter from Attornpy Gpneral ,Jnck~on to Rl'll. Hatton Sunllner~,
3/1D/41; Spp Electronic S\1l~\'pillancl'I{Pllort; Spc. II,
16 :Uemorandum from President Roose\~elt to the Attorney General 5/21/40.
17 Letter from Attorney Genpral Tom C. Clark to President Truman, 7/17/46.
18 DirpctiYe from President .To!Jnson to Head~ of Agencies, 6/30/65.
'" Pre~ident RooseYelt'~ 1940 ordpr dirpeted the Attorney Gpneral to approve
\yiretajJ~ "aftpr inyp~tigation of thp need in pnch ca~e." Dlemorandum from
l'rp~ident Rooseyelt to Attorney General Jackson, 5/21/40.) HO\veyer, Attorney
Gel.eral Francis Dicldle recalled that Attorney General Jackson "turned it ovpr
to Edgar lIooH'r \yithout him~elf ]la~~ing on pach cn~e" in 1940 and 1941. Biddle'~
practice he-ginning in 1941 conformed to the President's order. (Francis Biddle,
III Brief Authority (Garden Cit~': Doubleda~~, 1962), p. 167.)
Since HHl;;, PXlllicit writtpn authorization ha~ heen requirpd, (DirectiYe of
l're~ident .John~on (;/30/();).) Thi~ requin'mpnt ho\wypr. ha~ often hpen di~~
regarded. In yiolation of thi~ rPfjlJirPlllPnt. for PXllmlJlp, no writtpn authorization~
werp ohtained fmm tIll' Attorney Gelleral~or from an~~ OIlP pl~p-for n ~prie~
of four \\"irptall~ illllllpmpntpd inl!),1 amI ID,~ on Yeoman ('harlp~ Radford, two
of his frielld~, and hi~ father-in-law. See Electronics SUl'Yeillallce Report; Sec. VI.
(ContinuPd)
188
ment of periodic reapprm'al by the Attorney GeneraU0 In the absrnce
of any instruction to terminate them, some \viretaps remained in effect
for years.21
In HH)7. the Supreme C01ll't reversed its holding in the Olmstead
case and decided that the Fourth ~\mendnwnt's \varrant requirement
did apply to electronic slilTeillances.2o It expressly declined, howe\"('1'.
to extend this holding to cases im'olving the "national security." 20a
Congress followed suit the next year in the Omnibus Crime Control
Act of ID68, which established a warrant procedure for electronic surveillance
in criminal cases but included a provision that neither it nor
the Federal Communications ~\ct of 1D34 "shall limit the constitutional
power of the President." 23 Although Congress did not purport to
define the President's power. the Act referred to five broad categories
which thereafter selTed as the .Justice Department's criteria for warrantless
electronic surveillance. The first three categories related to
foreign intelligence and counterintelligence matters:
(1) to protect the Xation against actual or potential attack or
other hostile acts of a foreign power;
(~) to obtain foreign intelligence information deemed essential
to the security of the rnited States: amI
(3) to protect the national security information against foreign
intelligence activities.
The last two categories dealt 'with domrstic intelligence interests:
(4) to protect the United States against overthrow of the gO\'ernment
by force or other unla\dul means. or
(5) agalnst any other clear and present danger to the structure
or existence of the government.
In 1972, the Supreme Court held in United States v. United States
District Oourt.23a that the President did not have the constitutional
power to authorize warrantless electronic surveillances to protect the
(Continued)
The first and third of these taps were implemented at the oral instruction of
Attorney General John ~fitchell. (~femorandum from T. J. Smith E. S. ~Iiller,
2/26/73.) The remaining taps were implemented at the oral request of David
Young, and assistant to John Ehrlichman at the \Vhite House, who merely in,
formed the Bureau that the requests originated with Ehrlichman and had the
Attorney General's concurrence. (~lemorandumfrom T. J. Smith to E. S. ~Iiller.
6/14/73.
2' Attorney General Xicholas Katzenbach instituted this requirement in ~larch
1965. D1emorandum from J. Edgar Hoover to the Attorney General, 3/3/65.)
21 The FBI maintained one wiretap on an official of the Xation of Islam that
had originally been authorized by Attorney General Brownell in 1957 for seven
years until 1964 without any subsequent re-authorization. (~lemorandum from
J. Edgar Hoover to the Attorney General, 12/31/65, initialed "Approved: HB,
1/2/57.")
As Nicholas Katzenbach testified: "The custom was not to put a time limit
on a tap, or any wiretap authorization. Indeed, I think the Bureau would have
felt free in 1965 to put a tap on a phone authorized by Attorney General Jackson
before World War II." (Xicholas Katzenbach testimony, 11/12/75, p. 87.)
22 Katz v. United Statc8, 389 1'.8.347 (1967).
22' The Court wrote: "Whether safpguards other than prior authorization by
a magistrate would satisfy the Fourth Amendment in a situation lIn-olving the
lUltional "ecurity is a que"tion not 11l'PRcnted b~' this case." 3S9 r .8. at :1.')1'\ n. :.!3.
2318U.S.C.2511 (3).
233 407 U.S. 297 (1972)
189
nation fl'om domestic threats.2< The Court pointedly refrained, ho\,,ever,
from any "judgment on the scope of the Presidents' suneillance
power with respect to the activities of foreign powers, \"ithin or without
this country." 25 Only "the domestic aspects of national security"
came \"ithin the ambit of the Court's decision.20
To conform with the holding in this case, the .Justice Department
thereafter limited warrantless wire tapping to cases involving a "significant
connection with a foreign power, its agents or agencies. 27
At no time, hm"ever, \wre the Justice Department's standards and
procedures eYer applied to KSA's electronic monitoring system and its
"watch listing" of American citizens.28 From the early 1960's until 1973,
NSA compiled a list of individuals and organizations, including 1200
American citizens and domestic groups, whose communications were
segregated from the mass of commun.ications intercepted by the
Agency, transcribed, and frequently disseminated to other agencies
for intelligence purposes.2U
The Americans on this list, many of whom were active in the antiwar
and eivil rights movements, were placed there by the FBI, CIA,
Secret Service, Defense Department, and NSA itself without prior
judicial warrant or even the prior approval of the Attorney GeneraL
In 1970, NSA began to monitor telephone communications links bet\"
een the United States and South America at the request of the
Bureau of Narcotics and Dangerous Drugs (BNDD) to obtain information
about international drug trafficking. BNDD subsequently
submitted the names of 450 American citizens for inclusion on the
2' At the same time, the Court recognized that "domestic security surveillance"
lllay involve different policy and practical considerations apart from the surveillance
of 'ordinar~' crime,' 407 l'.S. at 321, and thus did not hold that "the same
type of standards and procedures prescribed by Title III [of the 1968 Act] are
necessarily applicable to this case." (407 l:.S. at 321.) The Court noted:
"Gh'en the potential distinctions between Title III criminal sun-eillances and
those inVOlving the domestic security, Congress may wish to consider protective
standards for the latter which differ from those already prescribed for specified
erime in Title III. Different standards may be eompatible with the Fourt Amendment."
(407 L.S. at 321.)
25 407 l:.S. at 307.
'6407 L.S. at 320. United States v. ['nited States District Court remains the
only Supreme Court case dealing with the issue of warrantless electronk surveillance
for intelligence pumoses, Three federai circuit courts have considered
this issue since 1972, howeypr. The Third Circuit and the Fifth Cireuit both held
that the Presiclent may eonstitutionally anthorize warrantless eleetronic snrveillance
for foreign eounterespionage and foreign intelligence purposes. [United
States \'. Butel/ko, 494 F.2d 593 (3d Cir. 1974), eert. denied sllb 110m. I1;anov v.
['I/ited States, 419 L.S. 881 (1974) ; and ['nited State8 v. BrOlcn, 484 F.2d 418
(i'ith Cir., 1973), eert. denied 415 l:.S. 960 (1974).] The District of Columbia Cireuit
held unconstitutional the warrantless eleetronk sun-eillance of the Jewish
Defensp League, a domestic organization whose activities allegedly affected
1'.S. So\'iet relations but which was neither the agent of nor in collaboration
with a foreign power. [Zlcribon \'. Mitchell, i'i16 F.2d 594 (D.C. Cir., 1975)
(en bal/e).]
To Testimony of Deputy Assistant Attorney General Kevin ~Iaroney, Hearings
before the Senate Subcommittee on Administrative Practice and Procedures,
6/2!l/72. p. 10. This language paralled that of the Court in United States v.
l'nited St((te.~ District COllrt, 407 LS. at 309 n. 8.
28 Although Attorne~' General John :\Iitchpll and .Justice Department offieials on
the Intelligence Enlluation Committe? appal'pntly learned that ::'\SA was making
a contribution to dompstie intelligence in 1\)71. there is no indication that the
FBI tol<l them of its submission of names of Americans for inclusion on aNSA
"watc'h list." \Yhpn Assistant Attorney Gpueral IIpnry pptersen learned of these
practices in 1!l73. Attorney General Elliott Riehardson ordered that they be
terminated. (See Report on ::'\SA: Sec. I, "Introduction and Summary.")
2Il See ::'\SA Report: See. I, "Introduction and Summary."
190
'Watch List, again without warrant or the approval of the Attorney
General.3D
The legal standards and procedures regulating the use of microphone
survei11ancc have traditionally been even more lax than those
regulating the use of ,,-irctapping. 'The first major Supreme Court
decision on microphone survei11ance was Goldman \-. United States,
316 U.S. 129 (1942), \vhich held that such surveillance in a criminal
case was constitutional when the installation did not involn a trespass.
Citing this case, Attorney General McGrath prohibited the trespassory
use of this technique by the FBI in 1952.31 But two years latera
few weeks after the Supreme Court denounced the USe of a microphone
installation in a criminal defendant's bedroom 32-Attorney
General Browne11 gave the FBI sweeping authority to engage in
bugging for intelligence purposes. ". . . (C) onsiderations of internal
security and the national safety are paramount," he wrote, "and, therefore,
may compel the unrestricted use of this technique in the national
interest." 33
Since Brownell did not require the prior approval of the Attorney
General for bugging specific targets, he largely undercut the policy
that had developed for wiretapping. The FBI in many cases could
obtain equivalent coverage by utilizing bugs rather than taps and
\vould not be burdened with the necessity of a formal request to thl'
Attorney General.
The vague "national interest" standards established by Brownell.
and the policy of not requiring the Attorney General's prior approval
for microphone insta11ations, continued until 1965, when the Justice
Departme.nt began to apply the same criteria and procedures to both
microphone and telephone surnillance.
3. Ignoring the P1'Ohibition.s Against lVw'ra;ntless Mail Opening ami
S'urreptitiO'Us Entries
Warrantless mail opening and surreptious entries, unlike the use
of informants and electronic suneillance, have been clearly prohibited
by both statutory and constitutional law. In violation of these prohibitions,
the FBI and the CIA decided on their o\Yll when and how
these techniques should be used.35
Sections 1701 through 1973 of Title 18 of the "Cuited States Code
forbid persons other than employees of the Postal Service "dead letter"
office from tampering with or opening mail that is not addressed to
them. Violations of these statutes may result in fines of up to $2000
30 :\lemorandum from Iredell to Gayler, 4/10/70; See XSA Report: Sec. I.
Introduction and Summary. BXDD originally requested XSA to monitor the
South American link because it did not believe it had authority to wiretap a few
public telephones in New York City from which drug deals were apparently being
arranged. (Iredell testimony, 9/18/75, p. 99.)
.1 Memorandum from the Attorney General to Mr. Hoover, 2/26/52.
32 Irvine v. California, 347 U.S. 128 (1954).
33 Memorandum from the Attorney General to the Director, FBI, 5/20/54.
35 While such techniques might have been authorized by Attorneys General
under expansive "internal security" or "national interest" theories similar to
Brownell's authorization for installing microphones by trespass, the issue was
never presented to them for decision before 1967. when Attorney General Ralllse~'
Clark turned down a surreptitious entry request. There is no indication that the
legal questions were considered in anr depth in 1070 or 1971 at the tim£' of the
"Huston Plan" and its al'ternlath. See Huston Plan Report: Sec. III, 'Who,
What, When and Where.
191
and imprisonment for not more than fin' years. The Supreme Court
has also held that both First ~\.mendnlPnt and FOUl'th Amendment
restrictions apply to mail opening.
The Fourth ~'unenchnent concprns weI'(' articulated as early as 1878,
\yhen the Conrt "Tote: ' ,
The constitntional guaranty of the right of the people to be
secure in their papers against unl'('asonable searches and
seizures extends to their papers. thus closed against inspection.
\Y!wTenr they mlH be. 'Yhilst in the mail. they can only
be oppned and ex'amin'ed nnder likE' warrant .. : as is rrqnired
\yllPn papers are snbjeeted to search in one's myn honsehold.
eo
This principle \yas reaffirmed as recently as Hl70 in Cnited States Y.
ran Leewcell. :)\Hi l-.S. :2.J-H (IH70). The infringenwnt of citizens' First
.\mendment rights resulting from \yarrantless mail oppning \yas first
recognized by Justiee Holmes in ID:21. "The use of the mails," he "Tote
in a dissent now embraced by preyailing legal opinion. "is almost as
much a part of free speech as the right to use our tongnes." 3, This
principle. too. has been affirmed in recent years. 38
.
Breaking and entpring is a common law felony as \ypll as a nolatian
of state and fecleral statutes. ,Yhen eommitted by GO\'t'rnment
agents, it has long been recognized as "the ehief evil 'against \yh1ch
the \yonling of the Fourth Amendment is directed." 3fl
In the one judicial deeision concerning the legality of warrantless
"national security" break-ins for physical srarch purposes, United
States District Court Judge Gerhard Gesell held such entries unconstitutional.
This case. United 8tatc8 v. ElIr7ich1llan!O involved
an entry into the office of a Los ~\ngeles psychiatrist. Dr. Le\yis Fielding,
to obtain tIl(' medical rrcords of his elipnt Daniel Ellsberg. who
was then under federal indictment for renaling elassified documents.
The entry \yaS appro\'ed by two Presidential assistants, John
Ehrlichman and Charles Colson. \yho argued that it had been justifiecl
"in the national interest.'· Ruling on the clefendants' discovery
motions. Judge Gesell found that becanse no search walTant was
obtained:
The search of Dr. Fielcling's office \yas dearly illegal under
the unambiguons mandate of the Fourth ~-~mrndment. ..
[T]he Government must comply \yith the strict constitutional
and statutory limitations on trespassory searcllPs and
arrests eyen \yllPn knm\"ll foreign agents are inyolved....
To hold othrrwise. except under the most exigellt circumstances.
\yonl(l be to abandon the Fourth Amendment to tIll'
\yhim of the Executi\'c in total disregard of the Amendment's
history and purpose!1
'" Rx Parte .Jacksol1. 96. "[', S. 7n. 73:3 (1878),
'17 Jfi11Calikee PIIV, Co, \". Bllrleson. 25::; r.S. 407. 437 (1921) (dissent).
38 See Lall/ont Y. Postll/aster Geneml, 381 "[',So 301 (19G5) ; Proeunier Y. :lJartinez.
4lG U.S. 39G (1975).
"" rniter! 8t(/te8 Y. lJniter! States nistrict ('ollrt. 407 1"S 21)7. 313 (1972).
"3W F. Snpp. :W. (D.D.C.1974).
H 37G F, Snpp. at 33.
192
In the appeal of this decision, the Justice Department has taken the
position that 11 physical search may be authorized by the Attorney
General \vithout a warrant for "foreign intelligence" proposes.42
The warrantless mail opening programs and surreptitious entries
by the FBI and CIA did not Hen conform to the "foreign intelligence"
standard, hO\ve,-er, now were they specifically approved~in each case by
the Attorney General. Domestic "subversives" and "extremists" were
targeted for mail opening; and domestic "subversives" and "\Yhite
Hate groups" were among those targeted for surreptitious entriesY
rntil the Justice Department's recent statement in the Ehrlichman
case, moreover, no legal justification had eYer been advanced publicly
for violating the statutory or constitutional prohibitions against physical
searches or opening mail \vithout a judicial warrant, and none has
ever been officially advanced by any Administration to justify warrantless
mail openings.
8ubfinding (b)
In addition to providing the means by which the Government
can collect too much information about too many people, certain techniques
have their own peculiar dangers:
(i) Informants have provoked and participated in violence and
other illegal activities in order to maintain their cover, and they have
obtained membership lists and other private documents.
(ii) Scientific and technological advances have rendered obsolete
traditional controls on electronic surveillance obsolete and have made
it more difficult to limit intrusions. Because of the nature of wiretaps,
microphones, and other sophisticated electronic techniques, it has not
always been possible to restrict the monitoring of communications to
the persons being investigated.
a. The Int7'Usi1'e Nat1l1Y' of the Intelligence Informant Technique
The FBI employs two types of informants: (1) "intelligence
informants" who are used to report on groups and indivi.duals i.n the
course of intelligence inYestigations. and (2) "criminal informants,"
who are used in connection with im-estigations of specific criminal
activity. FBI intelligence informants are administered by the FBI
Intelligence Division at Bureau headquarters through a centralized
system that is separate from the administrati,-e system for FBI criminal
informants. For example. the FBI's large-scale Ghetto Informant
Program was administered by the FBI Intelligence Division. The
Committee's im-estigation CE'ntered on the use of FBI intelligence informants.
The FBI's criminal informant program fell outside the
scope of the Committee's mandate, and accordingly it was not
examined. .
The Committee recognizes that FBI intelligence informants in
violent groups have sometimE's played a key role in the enforcement of
42 Letter from Actin!;" Assistant Attorney General John C. Keeny to Hugh E.
Klinf'. Clerk of tIl{' P.S. Court of Appeals for the District of Columbia. ri/9/75.
'" The Supreme Court's decision in Unitcd 8tatc8 Y. United 8tatc8 Di8trict
OOllrt. 407 U.S. 297 (1972), clearly estahlislwd the principlf' that sueh warrantless
im-asions of tIl(' priyacy of Americans are unconstitutional.
193
the criminal law. The Committee examined a number of such cases,H
and in public. hearings on the use of FBI intelligence informants included
the testimonv of a former informant in the Ku Klux Klan
whose reporting ancI court room testimony was essential to the arrest
and conviction of the murderers of Mrs. Viola Liuzzo, a civil rights
worker killed in 1961'),4" Former Attorney General Katzenbach testified
that informants were vital to the solution of the murders of three civil
rights workers killed in J1ississippi in 1964.46
FBI informant coverage of the ,Yomen's Liberation Jlovement resulted
in intensin l'f'porting on the identities and opinions of women
,,'ho attended ,YL)I meetings. For example. the FBI's Xew York
Field Office summarized one informant's report in a memorandum to
FBI Headquarters:
Informant ach'ised that a ,VL~I meeting was held on
______________________________________.47 Each woman at
this meeting stated why she had come to the meeting and how
she felt oppressed, sexlially or othenvise.
According to this informant. these women are mostly concerned
",ith liberating ,,'omen from this "oppressive society."
They are mostly against marriage, children, and other states
of oppression caused by men. Fe,,' of them, according to the
informant, have had political backgrounds.48
Indi\,idual women \vho att{'nded ,YLJI meetings at michwstern
uni\-ersities ,,-ere identified by FBI intelligence informants. A report
by the Kansas City FBI Field Office stated:
Informant indicates members of ,Yomen's Liberation
campus group \vho are now enrolled as students at l-niversity
of JIissonrL Kansas City, are , , ,
________ • ,49 Informant noted that , and
________,50 not currently students on the r:~IKC campus are
reportedly roommates at .51
.. In one case, an FBI informllnt involved in an intelligence inve>;tigation
of the Detroit Black Panther Party furnished advance information regarding a
planned ambush of Detroit police officers which enabled the Detroit Police Department
to take necessary action to prevent injury or death to the officers and
resulted in the arrest of eight persons and the seizure of a cache of weapons. The
informant also furnished information resulting in the location and confiscation by
Bureau agents of approximately fift~· sticks of dynamite available to the Black
Panther Party which likely resulted in the saving of liveR and the prevention of
property damage. (Joseph Deegan testimony, 2/13/76, p. 54)
45 Rowe, 12/2/75, Henring>;, Vol. 6, p. 115.
46 Katzenbach testified that the case "could not have been Rolyed without
acquiring informants who were highly placed members of the Klan." (Katzenbacll,
12/3/75, Hearings, Vol. 6, p. 215.)
H Date and address deleted at FBI request so as not to revenl informant's
iclentit~-.
48 Memorandum, from New York Field Office to FBI Headquarters, re: Women's
Liheration ~Iovement, 5/28/69, p. 2.
4. Xames deleted for security reaRons.
;;0 XameR deleted for security reaRons.
"Xames and addresses deleted for security reasons.
68-786 0 - 76 - 14
194
Informants ,,"ere instructed to report "everything" they knew about
a group to the FBI.
... to go to meetings, 'nite up reports ... on ,vhat happeneeL
,,-ho ,ms there ... to try to totally identify the
background of every person there, ,vhat their relationships
were, ,vho they ,ycre E,-ing ,vith. who they ,vere sleeping
with, to try to get some sense of the local structure and the
local relationships among the people in the organization.52
Another intelligence informant described his mission as "total reporting."
Rowe testified that he reported "anything and everything I
observed or heard" pertaining to any member of the group he infiltrated.
53
E,-en where intelligence informants are used to infiltrate groups
,vhere some members are suspected of violent actiYity, the nature of
the intelligence mission results in g'onl'llI11ental intrusion into matters
irrelennt to that inquiry. The FBI Special ~\gents ,vho directed an
intelligence informant in the Ku Klux Klan testified that the
informant
... furnished us information on the meetings and the
thoughts and feelings. intentions and ambitions. as best he
knC\v them, of other members of the Klan. both the rankalHl
file and the leadership. 54
Intelligence informants also report on other groups-not the subject
of intelligence inYestigations-which merely associate with, or
are eyen opposed to, the targeted group. For example, an FBI informant
in the VVA1,V had the following exchange ,vith a member of
the Committee:
Senator HART pIich.) .... did you report also on groups
and individuals outside the rVYA1,YJ. such as other peace
groups or individuals ,vho were opposed to the war whom you
came in contact with because they ,vere cooperating with the
[VVA,v1 in connection with protest demonstrations and
petitions?
Ms. COOK. ••• I ended up reporting on groups like the
United Church of Christ. Amrrican Civil Liberties Fnion. the
National Lawyers Guild. liberal church organizations
[whichJ quite often went into coalition with the VVA1,V.55
This informant reported tlw ir1entitirs of an estimated 1,000 individuals
to the FBI, although the loral chaptrr to ,vhirh she ,vas
assigned had onlv 55 regular members.5G Similarly. an FBI informant
in the Ku Klux Klan reportr,l on the artivities of civil rights
and black groups that he obsernd in the course of his ,vork in the
Klan.57
In short. the intelligence informant technique is not a prerise instrument.
By its nature. it extends far be~-onc1 the sphere of proper gOYC'rn-
'" Cook, 12/2/75, Hearings, Vol. 6, p. 111.
53 Rowe, 12/2/75, Hearing-s, Vol. 6, p. 116.
M Special Agent, 11/21/75, p. 7,
55 Cook, 12/2/75. Hearings, Vol. 6, pp. 119, 120.
or, Cook, 12/2/75, Hearings, Yol. 6. p" 120.
57 Rowe, 12/2/75, Hearings, Vol. 6, p, 116.
195
mental interest and risks governmental monitoring of the private liyes
and the constitutionally-protected acti,-ity of Americans. Xor is the
intelligence informant technique used infrequently. As reflected in
the statistics described above. FBI intelligence inrestigations are
in large part conducted through the use of informants; and FBI
agents are instructed to "dnelop ]'('liable informants at all levels and
in all segments" of groups under investigation.5R
b. Other Danger8 ill the Intelligence Informant Tech nique
In the absence of clear guidelines for informant conduct. FBI paid
and directed intelligence informants have participated in violence and
other illegal actirities and ha,-e taken membership lists and other
private documents.
1. Pal'ticipationin Violence and Other 17legal Activity
The Committee's ilwestigation has reYealecl that there is often a
fundamental dilemma in the use of intelligence informants in violent
organizations. The Committee recognizes that intelligence informants
in such groups ha,-e sometimes played essential roles in the enforcement
of the criminal law. At the same time, howe,-er, the Committee
has found that the intelligence informant technique carries ,,-ith it
the substantial danger that informants will participate in, or provoke.
violence or illegal activity. Intelligence informants are frequently
infiltrated into groups for long-term reporting rather than to coIled
evidence for use in prosecutions. Consequently. intelligence informants
must participate in the acti,-ity of the group they penetrate to presen-e
their cover for extended periods. 'Where the group is inroh-ed in
riolence or illegal activity. there is a substantial risk that the inforant
must also become involved in this activity. As an FBI Special
Agent who handled an intelligence informant in the Ku Klux Klan
testified: "ryou] couldn't be an angel and be a good informant."59
FBI officials testified that it is Bureau practice to instruct informants
that they are not to engage in violence or unlawful activity and. if
they do so. they may be prosecuted. FBI Deputy Associate Director
Adams testified:
... we hare informants who have gotten im-olved in the
violation of the law. and we have immediately connrted their
status from an informant to the subject, and'have prosecuted,
I would say, offhand ... around 20 informants.6o
The Committee finds. however, that the existing guidelines dealing
with informant conduct do not adequately ensure that intelligence
informants stay within the law in carrying out their assignments.
The FBI "Manual of Instructions contain no prm-isions gm'erning
informant conduct. 'While FBI employee conduct regulations prohibit
an FBI agent from direeting informants to engage in violent
or other illegal activity, informants themselres are not governed by
these regulations since the FBI does not consider them as FBI
employees.
68 FBI ManuaL Section 107 c(3).
59 Special Agl"nt, 11/21/75, p. 12.
00 Adams, 12/2/75, Hearings, Yo1. 6, p. 150.
196
In the absence of clear and precise written provisions directly applicable
to informants. FBI intelligencp informants haw engaged in violpnt
and otllPr illegal activity. For example, an FBI intel1igence informant
,dw ]wnetratpd the Ku Klux Klan and reported on its
activities for on'r fin' years testified that on a number of occassions he
and other Klansmen had "beaten people sewrely, had boarded buses
and kicked people off; hac] ,,-ent in restaurants and beaten them with
blackjacks, chains, pistols." 61 This infoI1nant described hmv he had
taken part in Klan attacks on Freedom Riders at tlw Birmingham,
Alabama, bus depot, ,,-here "baseball bats, clubs, chains and pistols"
were nsed in be.atings.62
Although the FBI Special Agents who directed this informant instrncted
him that he "as not to engage in violence, it was recognized
that there "as a snbstantial risk that he ',onld become a participant
in violent activity.
As one of the Agents testified:
... it is kind of difficult to tell him that we wonld like. yon to be
there on deck, obsen-ing, be able to giye us information and
still keep yourself detached and uninvo]yed and clean, and
that ,ms the problem that we constantly had.63
In another example, an FBI intelligence informant penetrated
"right Wing" groups operating in California under the names "The
Minutemen" and "The Secret Armv Oroganization." The informant
reported on the activities of these "right ,,-ing" paramilitary groups
for a period of five years but was also involved in acts of violence or
destruction. In addition, the informant actually rose to a position of
leadership in the SAO and became an innovator of various harassment
actions. For example, he (\c]mittedlv participated in firebombing
of an automobile and was present, conducting a "sllrYeil1ance" of a
professor at San Diego State rniversity, "hen his associate and
subordinate in the SAO took out a gun and fired into the home of the
professor, wounding a young "oman.64
An FBI intelligence informant in a group of antiwar protesters
planning to break into a draft board claimed to haw provided technical
instruction and materials that ,verp essential to the jl1egal breaktestified
to the committee:
Everything they learned abont breaking into a bnilding or
climbing a "a11 or cntting glass or destroying lockers, I taught
them. I got sample eqnipmpnt, the type of windows that we
would go throngh. I picked up off the job and taught them how
to cnt the glass, hmv to drill holes in the glass so yon cannot
hear it and stuff like that, aJl(l the FBI snpplied me with the
equipment needed. The stuff I did not have, the [the FBI] got
off thpir mvn agents. 65
The Committee finds that ,,-here informants are paid and directed
by a goyernment agpn('y, the gon'rnnwnt has a responsibility to
61 RmYl' dppo>;ition. 10/17/75. p. 12.
eo RowE'. 12/2/75, HE'arings, Yo1. 6. p. 118.
., ~pPC'inl Ag-pnt. 11/21/7;";. pp. 16-17.
6! ~IplllOral1dllm from tllP FBI to SE'nate SE'IE'C't Committee. 2/2()/7(). with
P11('1 OSIl rps.
6G Hard." 9/29/75, pp. 16-17.
197
imposp drar rpstrietiolls OJl tllPir ('(mduct. rmHittPll practice or gpnpral
proyisiolls ainw\l at persons otlwl' than the informants thrmsplws
are not snffieient. In tllP inH'stigation of \'iolpnce or il1rgal activity, it
is e&"ential that the gOH'rnment not be implicated in such activity,
B. J[embn·ship Lists awl O[hel' PI'/W[C J)()(,lImeld,~ 01J!II/ned liy the
(i01'l'1'lIlJIellt Through Illtelliycilct In/oll/lallts
The Committl'e finds that tlwre are inadequate guidelines to regulate
the C'ondurt of intelligence informants ,vith resprct to pri\'ate and
confidpntial documents. such as Illrmbership lists. mailing lists and
papers relating to Ipgal matters. TIll' Fourth Amendment prov~des
that citizens shall be "securt' in their ... papPI'S and effects, agalllst
unreasonable, searches and s(>izures" and requires probable cause to
belipvc therc has ])('en a violation of law beforp a srarcll warrant may
issue. )loreonr the Supreme Court, in NAAOP v. Alabmna,6G held
that the First ~\.mendmenrsprotpetions of spepch. assembly and group
association dio. not permit a state to con1])el the production of the
membership list of a group engaged in lawful activity. The Court distinguisheo.
the case where a state ,,,as able to demonstrate a "controlling
justification" for such lists by showing a group's activities in\'
olveo. "acts of unla,,,ful intimio.ation and violpllcP.'· 6Ga
There are no provisions in tIl\' FBI )[anual which preclude thr
FBI from obtaining pri \'atp and confidential documents through
intelligence informants. The ~Iallllal does prohibit informant reporting
of "any information pprtaining to dpfpnsp plans or stratpgy," but
t he FBI intrrprets this as applying only to pri \-ilegpd communications
hptwprll all attornpy awl client in connection with a specific court
proceeding.G
'
The Committec's inn'stigation has sho\vn that. the FBI, through
its intelligence informants and sources. has sought to obtain membership
lists and other confidential documents of groups and individwl1s.68
For examplr. one FBI Special Agent testified:
I remember one Hening . . . [an informant] called my
home and said I ,,,ill meet you in a half an hour ... I have
a complete list of eYerybod~: that I haw just taken out of the
fill'S, but I haw to have it back ,,,ithin such a length of time.
",Vell, naturally I left llOnw and met him and had th\' list
duplicated forth\vith, and back in his possession and back in
thr files with nobody suspecting." 69
Similarly, the FBI Special Agent ,vllo handled an intelligence
informant in an antiwar group testified that he obtained confidential
papers of the group ,,-hie]} rrlatpd to legal defense matters:
"She brought back sewral things ... various position papers,
taken by yal'ious lpgal ddenst' groups, general statements
of ... the YVA",V, legal thoughts on yarious trials. the
"" 357 r.s. +Hl (11).'58). Similarly. in Rates Y. City of Little Rock, 361 CS.
516 (l(J60) , the Snllreme Court h"ld comllul~or~' di~('losur" of groull member~hill
lists was an unjustified interference with members' freedom of association.
""" 361 U. S. at 46;";.
07 FBI )Ianual of Instructions, Section 107.
6S Surreptitious E'ntry has also proYided a mean~ for the obtaining of such lists
and other confidE'ntial documE'nts. .
.. Special Agent, 11/19/75, llP. 10-11.
198
Gainesyille (Florida) 8 ... the Camden (~ew .Jersey)
9 ... yariOllS documents from all of these groups.~~ ;0
This informant also testified that she took the confidential mailing
list of the group she had penetrated and gan~ it to the FBI.;t
She also ga ye the FBI a legal manual preparecl by the group's
attorneys to guide lln"yers in elefending the gl'Oup's members should
they be arrested in connection with antiwar demonstrations or other
political activity.;2 Since this elocument \\'as prepared as a general
legal reference manual rather than in connection \"ith a specific trial
the FBI considered it outside the attorney-client privilege anel not
barred by the FBI ~Ianual prm'ision with respect to legal defense and
strategy matters.
For the goyernment to obtain membership lists and other private
documents pertaining to lawful and protected activities covertly
through intel1igence informants risks infringing rights guaranteed by
the Constitution. The Committee ,finds that there is a need for new
guidelines for informant conduct with respect to the private papers of
groups and individuals.
c. ElcctJ'onic Survcilla11Cc
In the absence of judicial warrant. both the "traditional" forms of
electronic surveillance practiced by the FBI-wiretapping and bugging-
and the highly sophisticated form of electronic monitoring practiced
bv NSA haye been used to collect too much information about
too mallY people.
1. lVir'etapping and Bugging
'Wiretaps and hugs are considered by FBI officials to be one of the
most \'aluable terhniques for the collection of information relevant to
the Bureau's legitimate foreign counterintelligence mandate. ,,~. Raymond
1VannalL the former Assistant Director in charge of the FBI's
Intelligence Division. stated that electronic surveillance as"isted Bureau
officials in making "decisions" as to operations against foreigners
engaged in espionage. "It gives us leads as to persons ... hostile intelligence
services are trying to Rubyert or utilize in the United States, so
certainly it is a valuable technique." n
DeRpite its stated value in foreign counterintel1igence cases, however.
the dangers inherent in its use imply a clear nE'ed for rigorous
controls. By their nature. wiretaps and bugs are incapable of a surgical
precision that would permit intelligence agencies to overhear
only the target's conrersations. Since wiretaps are placed on particular
telephones. anyone who uses a tapped phone-including members of
tIlE' target's family-can be onrheard. So. too. can enryone with
whom the target (or am'one rIse using the target's telephone) communicates.
a Microphones planted in the target's room or office inevitably
intE'rcept all cOll\Tersations in a partirular area: anyone conferring in
the room or office, not just the target, is overheard.
70 Special Agent. 11/20/75, pp. 15-16.
71 Cook, 12/2/75, Hearing-~. Vol. 6, p. 112.
"" rook rlppo~ition, 10/14/75, p. 36.
7'1V. Raymonrl Wannall te~timony. 10/21/7". p. 21.
74 Unrler the Justice Dppartment's procpdurps for Titlp III (conrt-ordpred)
wiretaps. however, thp monitoring- ag-pnt is ohlig-ated to turn off the recordingeCluipmpnt
when certain privileg-ed commnnications begin. Manual for conduct
of Electronic Surveillance under Title III of Public Law 90-351, Sec. 8.1.
199
The intrusiveness of these techniques has a second aspect as well. It
is extremely difficult, if not impossible, to limit the interception to
cOIl\'ersations that are relevant to the purposes for which the sUlTeillance
is placed. Virtually all conversations are overheard, no matter
how trivial, personal, or political they might be. ",Yhen the electronic
sUlTeillance target is a political figure who is likely to discuss political
affairs, or a lawyer. who confers with his clients, the possibilities for
abuse are obviously heightened.
The dangers of indiscriminate interception are perhaps most acute
in the case of microphones planted in locations such as bedrooms.
'When Attorney General Herbert Browne]] gave the FBI sweeping authority
to engage in microphone surveillances for intelligence purposes
in 1054. he expressly permitted the BllI'eau to plant microphones
in such locations if. in the sole discretion of the FBI. the facts warranted
the installation." Acting under this general authority, for example.
the Bureau installed no fewer than twelve bugs in hotel rooms
occupied by Dr. ~fartin Luther King, J 1'.76
The King suneillances which occurred between January 1064 and
October 11")65, were ostensibly approved within the FBI for internal
security reasons, but they produced vast amounts of personal information
that were totally unrelated to any legitimate governmental
interest; indeed, a single hotel room bug alone yielded twenty reels
of tape that subse'luently provided the basis for the dissemination
of personal information about Dr. King throughout the Federal establishment.'''
· Significantly, FBI internal memoranda with respect to
some of the installations make clear that they were planted in Dr.
King's hotel rooms for the express purpose of obtaining personal information
about him.77
Extremely personal information ahout the target. his family, and
his friends. is easily obtained from ,viretaps as well as microphones.
This fact is clearly illustrated by the ,varrantless electronic surveillancr
of an American citizen ,vho 'YaS suspected of leaking classified
data to the press. A wiretap on this individual produced no evidence
that 11(' had in fact leaked any storii's or documents. but among the
items of information that thr FBI did obtain from the tap (and deJinred
in utmost sC'crrcy to thi' 'White House) were the following: that
"meat was ordered [by the target's family] from a grocer;" that the
target's daughter had a toothache: that the target needed grass clippings
for a compost h('ap he was building: and that during a telephone
conwrsation hehwen the target's wife and a friend the "matters discussed
were milk bills. hair, soap operas, and church." 78
75 :\fpnlOranr]um from the AttorTIf'Y Gpneral tc, the Director. FBI. 5/20/154.
76 Thrf'c additional bugs werf' planted in Dr. King's hotf'l rooms in 10015 after
thp standards for "irptapping and microphonf' !'urYeillancp hecame idpntical.
According- to FBI memorancla. apparently initiatf'(] h~' Katzf'nhach. Attornf'Y
General Xicholas Katzenbach was given after the fact notification that these
thref' survPillanN's of Dr. King- had occurred. See p. 273. and the King Report.
Sec. IV. for further details.
7"' :\If'morandum from F..T. Baumgardener to W. C. Sullivan. 3/26/64.
77 For f'xamplp. IllPllloramlum frolll Baumgardner to 'V. r'. Sullivan. 2/4/f4.
"FBI IllPllloranda. Identifying dptails are hping ,,·ithllPld hy thp Sf']pct COIllmitt!'!'
hecans(' of prh'ncy consic]l'ration~. EVf'n tllP FBI r!'alilwd that this type of
informntion ,,'n~ \lIlrp]atl'd to criminnl neth·ity or nntional s\'curity: for the last
four month~ of this survpillancp. most of the summarips that ,,"pre disseminatpd
to Ow "'hit\' fIo11.'\' !wgan. "Th\' follmying i~ a summar.v of nonpf'rtin!'nt information
conc\'rning captioned individual as of ..."
200
The so-called "sennteen" "iretaps on joul11alists and gowrnment
employees. \\hi('h collecti vely lastp(l from ~Iay 1060 to February 1971,
also illustratE' the intl'usiwnE'ss of electronic sUl'willance. According
to fonner Presidcnt Xixon. these taps produccrl "just gobs of matE'rial:
gossip and bull." 79 FBI summaries of information obtained from the
"iretaps and disscminated to the 'Yhitc House. suggest that the former
PresidE'nt's pl'iYate eyaluation of them \YtlS correct. This "irE'tapping
program did not renal the source of any leaks of classified data. "hich
"as its ostensible purpose. but it did genE'rate a 'walth of information
about the personal liYes of the targets-their social contacts. their
vacation plans. thE'ir employment satisfactions and dissatisfaction,
their marital problems. their drinking habits. and e,en their sex lives.86
"\mong those "ho ,wre incidentall)' m'E'rheanl on one of these wiretaps
was a currently sitting Associate .rustice of the Supreme ('ourt
of the "LnitE'd States. who made plans to rE'vie,Y a manuscript written
by one of the targets.S
! Vast amounts of political information were also
obtained from these "iretaps.82
The "seventeen" wiretaps also exemplify the particularly acute
problems of wiretapping when the targeted individuals are involved
in the domestic political process. These "iretaps produced vast amounts
of purely political information.82 much of "hich ,vas obtained from
the home telephones of h,o consultants to Senator Edmund Muskie
and other Democratic politicians.
The incidental collection of political information from electronic
surveillance is also shown bv a series of telej1hone and microphone
surveillances conducted durillg the Kennedy administration. In an inYestigation
of the possibly unla,dul attempts of representatives of a
foreign country to influence congressional deliberations about sugar
quota legislation in the early 1060s. Attorney Gel1E'ral Robert Kennedy
authorized a total of twelYe warrantless wiretaps on foreign and domestic
targets. Among the "iretaps of American citizens ,\pre h,o on
American lobbyists. three. on executi"e branch officials. and two on a
staff member of a House of Representatiws' Committee.83 A bug was
also planted in the hotel room of a Fnited States C(Jngressman, the.
Chairman of the House Agricultnre ('ommittee, Harold D. Cooley.84
Although this imestigation ,yas apparently initiated because of the
Gowrnment's concern about future relations with the forei.!!n countr:,
im-olwd and the possibility of bribery,85 it is clear that the KE'n-
7l> Trans('ript of Pre;:;idential Tapes. 2/21'/73 (House Judiciary Committee Statement
of Information. Book VII. Pa rt 4. p. 1754).
EO For pxamplp. lpttprs from Hoonr to thp Attornpy Gpnpral. 7/25/69, and
7jR1/6!): If'ttpr~ from Hoowr to H. R. Halopman. 6/2;)/70.
III Letter from HooYerto Haldeman. 6/25/70.
82 Examplps of such information arp listpd in the finding on Politi('al Abuse, "The
'17' wirptaps."
83 Memorandum from J. Edgar Hoonr to the Attorney General. 2/14/61;
Memorandum from .T. Edgar Hooypr to thp Attorney General. 2/16/61: Memorandum
from .T. Eflgar HooYer to tIl(' Attornpy General, 6/26/62; l\lemorandum
from Wannall to W. C. SulliYan. 12/22/66.
.. Memorandum from D. E. ::\Ioorp to A. H. Belmont. 2/16/61.
85 Memorandum from W. R. "'anna11 to W. 0. Sulliyan. 12/22/66: Memorandum
from A. H. Belmont to Mr. Parsons. 2/14/61. This inwstigation did discoyer
that. rpprpspn'tatiyes of a forpign nation \yprp attpmpting to inflnpnN' ('ongrpssional
delihprations. but it did not rewal that money was being passed to any
member of Congress or Congressional staff aide.
201
nedy administration was politically interested in the outcome of the
sugar quota legislation as wel1.86 Given the nature of the techniques
used and of the targets they were directed against, it is not surprising
that a great deal of potentially useful political information was generated
from these "Sugar Lobby" surveillances.S
'
The highly intrusi"e nature of electronic surveillance also raises
special problems when the targets are lawyers and journalists. Over
the past two decades there have been a number of wiretaps placed on
the office telephones of lawyers.88 In the Sugar Lobby investigation,
for example, Robert Kennedy authorized wiretaps on ten telephone
lines of a single law firm.9o All of these lines were apparently used by
the one lawyer who was a target and presumably by other attorneys in
the firm as well. Such wiretaps represent a serious threat to the attorney-
client privilege, because once they are instituted they are capable
of detecting all conversations between a lawyer and his clients, even
those relating to pending criminal cases.
Since 1960, at least six American journalists and newsmen have also
been the targets of warrantless wiretaps or bugs.B1 These surveillances
were all rationalized as necessary to discover the source of leaks of
classified information, but, since wiretaps and bugs are indiscriminate
in the types of information collected, some of these taps revealed the
attitudes of various newsmen to'ward certain politicians and supplied
advance notice of forthcoming newspaper and magazine articles dealing
with administration policies. The collection of information such
as this, and the precedent set by wiretapping of newsmen, generally,
inevitably tends to undermine the constitutional guarantee of a free
and independent press.
92. NSA Jfonitoring
The Xational Security Agency (NSA) has the capability to monitor
almost any electronic communication which travels through the air.
This means that XSA is capable of intercepting a telephone call or
even a telegram, if such call or telegram is transmitted at least partially
through the air. Radio transmissions, a fortiori, are also within
NSA's reach.
Since most communications today-to an increasing extent even
domestic communications-are, at some point, transmitted through the
air, XSA's potential to violate the privacy of American citizens is unmatched
by any other intelligence agency. Furthermore, since the interception
of electronic signals entails neither the installation of electronic
surveillance devices nor the cooperation of private communications
companies, the possibility that such interceptions will be undetected
is enhanced.
XSA has never turned its monitoring apparatus upon entirely domestic
communications, but from the early 1960s until 1973, it did inter-
86 Memorandum from Wannall to W. C. Sullivan, 12/22/66.
87 See Finding- on Political Abuse, p. 233.
8ll Ell'ctronic Surveillance Report: Sec. II, "Presidential and Attorney General
Authorization."
00 :\Iemorannum from J. Edgar Hoover to the Attorney General, 6/26/62.
•, :\Iemorandum from J. Edgar Hoover to the Attorney General 6/29/61; memo·
randum from .J. Edgar Hoover to the Attorney General i /31/62; memorandum
from J. Edg-ar Hoover to the Attorney General 4/19/65; memorandum from J. Ed·
g-ar Hoover to the Attorney General 6/4/69; memorandum from J. Edgar Hoover
to the Attorney General 9/10/69 ; letter from W. C. Sullivan to J. Edgar Hoover
7/2/69.
202
cept the international communications of American citizens, without a
,varrant, at the rrquest of othrr fedrral agencirs.
Under current practice. XSA does not target an.v American citizen
or firm for the purpose of intC'rcepting- tlwir foreign communications.
As a result of monitoring international links of communication, however,
it does acquire an enormous number of communications to, from,
or about American citizens and firms. ns
As a practical matter, most of the commnnications of American citizens
or firms acquired by XSA as incidental to its foreign intellig-cncegathering
process are destroyed upon recognition as a communication
to or from an American citizen. But other such communications. which
bear upon XSA's foreign intelligencc requirements. are processed. and
information obtained from them are used in NSA's reports to other
intelligence agencies. Current practice precludes XSA from identifying
American citizens and firms by name in such reports. Xonetheless,
thr practice (lacs result in XS"\'s disseminating information derind
from the international communications of American citizens and firms
to the intelligence agencies and policymakers in the federal
government.
In his dissent in Olrnstea,d v. United 8tates,94 which held that the
Fourth Amendment ,varrant requirement did not apply to the seizure
of conversations by means of wiretapping. .Justice Louis D. Brandeis
expressed grave concern that new technologies might outstrip the
ability of the Constitution to protect American citizens. He wrote:
Subtler and more far-reaching means of im-ading privacy
have become ayailable to the gOYernment ... (and) the progress
of science in furnishing the Gon~Tnment ,vith means of
espionage is not likely to stop with wiretapping. 'Ways may
some day be deyeloped by ",hich the GOyeTnment, without
removing papers from secret drawers. can reproduce them in
court. and by which it ,..ill be enabled to expose to a jury the
most intimate occurrences of the home .... Can it be that the
Constitution affords no protection against such invasions of
individual security?
The question posed by .Tustice Brandeis applies with obyious force to
the technological deYelopments that allow NSA to monitor an enormous
number of communications each year. His fears were firmly
based, for in fact no ,.-arrant ,..as eYer obtained for the inclusion o'f
1200 American citizens on NSA.'s "1Yatch List" between the early
1960s and Hl73, and none is obtained today for the dissemination ,..ithin
the intelligence community of information deriYed from the international
comlnunications of American citizens and firms. In the face
of this new technology, it is ,Yell to remember the ans,..er .Tustice
Brandeis gave to his own question. Quoting from Boyd v. United
State8.116 17'.8.616. he wrote:
It is not the breaking of his doors. and the rummaging of his
draweI'S that constitutes the essrnse of the offense: but it is
the im-asion of his indefrasible right of personal security, personalliherty,
and priyate property ...94a
93 XSA has long as~erted that it had the authority to do this so long as one of
the pnrtie~ 'ro ~lleh eOffiffillnkntion ,,-as loeated in a foreign eonntry.
04 277 U.S. 438, 473-474 (1928).
04a 277 U.S. at 474-475.
203
D. Jfail Opening
By ignoring the legal prohibitions against warrantless mail opening,
the CIA and the FBI were able to obtain access to the ,nitten communications
of hundreds of thousands of individuals, a large proportion
of whom "ere American citizens. The intercepted letters were
presumably sealed with the expectation that they would only be
opened by the party to whom they were addressed, but intelligence
agents in ten cities throughout the United States surreptitiously
opened the seal and photographed the entire contents for inclusion in
their intelligence files.
Mail opening is an imprecise technique. In addition to relying on
a "'Watch List" of names, the CIA opened vast numbers of letters on
an entirely random basis; as one agent who opened mail in the CIA's
.New York project testified, "You never knew what you would hit." 95
Given the imprecision of the technique and the large quantity of correspondence
that was opened, it is perhaps not surprising that during
the twenty year course of the Agency's New York project, the mail
that was randomly opened included that of at least three United
States Senators and a Congressman, one Presidential Candidate, and
numerous educational, business, and civil rights leaders.96
Seyeral of the FBI programs utilized as selection criteria certain
"indioators" on the outside of envelopes that suggested that the communication
might be to or from a foreign espionage agent. These
"indicators" were more refined than the "shotgun approach" 97 which
characterized the CIA's New York projeCt, and they did lead toO the
identificatJion of three foreign spies.98 But even by the Bureau's own
!lccountling, it is clear that the mail of hundreds of innocent American
eltizens was opened and read for every successful counterintelligenee
lead that was obtained by means of "indicators." 99
Large volumes of mail were also intercepted and opened in other
FBI mail programs that were based not on indicators but on far lesg
precise criteria. Two programs that involved the opening of mail to
and from an Asian country, for example, used "letters to or from a
university, scientific, or technical facility" as one selection criterion.loo
According to FBI memoranda. an average of 50 to 100 letters per day
was opened and photographed during the ten years in which one of
these two programs operated.lol
.. "CIA Officer" testimony, 9/30/75, p.15.
.. Staff summary of "Master Index." review, 9/5/75.
"'James Angelton testimony, 9/17/75, p. 28.
.. Wannall. 10/21/75, p. 5.
.. In one of the prog-rams based on "indicators" a participating ag-ent testified
that he opened 30 to 60 lett~rs each day. (FBI agent statement, 9/10/75, p. 23.) In
a second such prag-ram, a total of 1,011 letters were opened in one of the six cities
in which it operatE'd; statistics on the number of letters opened in the other
five cities cannot be reconstructed. (W. Raymond Wannall testimony, 10/21/75,
p. 5.) In a third such project. 2.350 letters were opened in one city and statistics
for the other two cities in which it operated are unavailable. (Memorandum from
W. A. Branilmn to ,V. C. Sullivan. 8/31/61; :\[t>morandum from :\[r. Branig-an
to Mr. Sullivan, 12/21/61; memorandum from New York Field Office to FBI
Headquarters, 3/5/62.)
100 Letter from the FBI to the Senate Select Committee. 10/29/75. Six other
criteria were used in these programs. See Mail OpeningReport.Sec.IV.
101 :\1emornndnm from S. B. Donohoe to A. H. Belmont. 2/23/61 : :\1emorandum
from San Francisco Field Office to FBI Headquarters, 3/11/60. Statistics relating
to the number of letters opened in the other program which used this criterion
cannot be reconstructed.
204
E. Surreptitiou8 Entrie8
Surreptitious entrties~ conduded in violation of the law~ have also
permitted intelligence agencies to gatther 'a wide range of information
about Amrrican ci:tizens and domestic organiz'at,ion as well as foreign
targets.102 By definition this technique involves a physical entry into
the private premises of individuals and groups. Once intelligence
agents are inside, no "papers or effects" are secure. As the Huston
Plan recommendations stated in 1970, "It amounts to burglary." 103
The moot private documents n,re rendered vulnf'rable by the use of
surreptitious entries. According to a 1966 internal FBI memorandum,
which discusses the use of this technique against domestic
organizations:
[The FBI has] on numerous occasions been able to obtain
material held highly secret and closely guarded by subversive
groups and organizations which consisted of membership
lists and maiiling lists of these organizations.lo,
A specific example cited in this memorandum also reveals the types
of information that this technique can collect and the uses to which
the information thus collected may be put:
Through :a "black bag" jab, we obtained the records in the
possession of three high-ranking officials of a Klan organi~aNon....
These records gave us the complete membership
and financial information concerning the Klan's operation
which we have been using most effectively to disrupt the
organization and, in fact, to bring about its near
disintegration. 105
Unlike techniques such as electronic surveillance, government
entries into private premises were familiar to the Founding Fathers.
"Indeed," Judge Gesell wrote in the Ehrl1chrnan case, "the American
Revolution was sparked in part by the complaints of the colonists
against the issuance of writs of assistance, pursuant to which the King's
revenue officers conducted unrestricted, indiscriminate searches of
persons and homes to uncover contraband." 106 Recognition of the
intrusiveness of government break-ins was one of the primary reasons
102 According to the FBI, "there were at least 239 surreptitious entries (for
purposes other than microphone installation) conducted against at least fifteen
domestic subversive targets from 1942 to April 1968.... In addition, at least
three domestic subversive targets were the subject of numerous f'ntries from
October 1952 to .June 1966." (FBI memorandum to the Senate Select Committee,
10/13/76.) One target, the Socialist Workers Party, was the subject of possibly
as many as 92 break-ins by the FBI, between 1960 and 1966 alone. The home of
at least one SWP mpmber was also apparently broken into. (Sixth Supplementary
Response to Requests for Production of Documents of Defendant, Dirpctor of
the FBI, Socialist Workers Party v. Attorney General, 73 Civ. 3160, (SDNY),
3/24/76.) An entry against one "white hate group" was also reported by the
FBI. (Memorandum from FBI Headquarters to the Senate Select Committee,
10/13/75.)
103 Mpmorandum from Tom Huston to H. R. Haldpman, 7/70, p. 3.
1~ Memorandum from W. C. Sullivan to C. D. DeLoach, 7/19/66.
105 Ibid.
106 United States v. Ehrlichman, 376 F. Supp. 29, 32 (D.D.C. 1974).
205
for the subsequent adoption of the Fourth Amendment in 1791,101 and
this technique is certainly no less intrusive today.
Subfunding (c)
The imprecision and manipulation of labels such as "national security,:'
"domestic security," "subversive activities" and "foreign intelligence"
have led to unjustified use of these techniques.
Using labels such as "national security" and "foreign intelligence",
intelligence agencies have directed these highly intrusive techniques
against individuals and organizations "'ho ,Yen~ suspected of no
criminal activity and who posed no genuine threat to the national
security. In the absence of precise standards and effective outside
control, the selection of American citizens as targets has at times been
predicated on grounds no more substantial than their lawful protests
or their non-conformist philosophies. Almost any connection with any
perceived danger to the country has sufficed.
The application of the "national security" rationale to cases lacking
a substantial national security basis has been most apparent in the
area of warrantless electronic surveillance. Indeed, the unjustified use
of wiretaps and bugs under this and related labels has a long history.
Among the wiretaps approved by Attorney General Francis Biddle
under the standard of "persons suspected of subversive activities," for
example, was one on the Los Angeles Chamber of Commerce in 1941.108
This was approved in spite of his comment to .r. Edgar Hoover that the
target organization had "no record of espionage at this time." 109
In 1945, Attorney General Tom Clark authorized a wiretap on a
former aide to President RooseveltYo According to a memorandum
by J. Edgar Hoover, Clark stated that President Truman wanted "a
very thorough investigation" of the activities of the former official so
that "steps might be taken, if possible, to see that [hisJ activities did
not interfere with the proper administration of government." 111
The memorandum makes no reference to "subversive activities" or
any other national security considerations.
The "Sugar Lobby" and Martin Luther King, Jr., wiretaps in the
early 1960s both show the elasticity of the "domestic security" standard
which supplemented President Roosevelt's "subversive activities"
formulation. Among those wiretapped in the Sugar Lobby investigation,
as noted above, was a Congressional staff aide. Yet the documentary
record of this inyestigation reveals no evidence indicating that
the target herself represented any threat to the "domestic security."
Similarly, while the FBI may properly han~ bern concerned with the
activities of certain advisors to Dr. King, the direct wiretapping of
Dr. King shows that the "domestic security" standard could be
stretched to unjustified lengths.
The microphone slln'eillances of Congressman Cooley and Dr. King
under the "national interrsf' standard rstablished by Attorney Genrral
Brownell in IDf)1 also reveal the relative easr ~vith ",hi~h electronic
bugging devices could be usrd against American citizens who
10'1 Rpp, p.g., Olm.qtead v. United Sltate8. 277 U.S. 4~8, (lfl28).
108 )fpmorandum from Francis Biddle to Mr. Hoover, 11/19/41.
100 Ibid.
110 Unaddre~sed Mpmorandum from .T. Edgar Hoover, 11/15/45, found in
Director Hoover's "Official and Confidential" files.
III Ibid,
206
posed no genuine "national security" threat. Neither of these targets
advocated or engaged in any conduct that was damaging to the
security of the United States.
.In April, 1964, Attorney GC'neral RobC'rt Kennedy approved "techmcal
coverage (electronic surveillance)" of a hlack nationalist leader
after the FBI advised Kennedy that he was "forming a new group"
which would be "more aggressive" and would "participate in racial
demonstrations and civil rights activities." The only indication of
possible danger noted in the FBI's request for the wiretaps, however,
was that this leader had "recommended the possession of firearms by
members for their self-protection.l12
One year later, Attorney General Nicholas Katzenbach approved a
wiretap on the offices of the Student Non-Violent Coordinating Committee
on the basis of potential communist infiltration into that organization.
The request which was sent to the Attorney General noted that
"confidential informants" described SNCC as "the principal target
for Communist Party infiltration among the 1'arious civil rights
organizations" and stated that some of its leaders had "made public
appearances with leaders of communist-front organizations" and had
"sub1'ersive backgrounds." 113 The FBI presented no substantial evidence
however, that SNCC was in fact infiltrated by communists-only
that the organization was apparently a target for such infiltration in
the future.
After the Justice Department adopted new criteria for the institution
of warrantless electronic surveillance in 1968. the unjustified use
of wiretaps continued. In November 1969, Attorney General ,Tohn
Mitchell approved a "cries of three wiretaps on organizations involved
in planning the antiwar "March on 'Vashington.'· The FBI's request
for cO\'erage of the first group made no claim that its members engaged
or were likely to engage in 1'iolent activity: the request was
simply based on the statement that the anticipated size of the demonstration
was cause for "concern should violence of any type break
out." 114
The only additional justification given for the wiretap on one of the
other groups. the Vietnam Moratorium Committee, was that it "has
recently endorsed fully the activities of the [first group] concerning
the upcoming antiwar demonstrations." 115
In 1970, approval for a wiretap on a "New Left oriented campus
group" ,,,as granted by Attorney General Mitchell on the basis of an
FBI request which included, among other factors deemed relevant to
the necessity for the wiretap. evidence that the group was attempting
"to develop strong ties with the cafeteria, maintenance and other
workers on rampus" and wanted to "go into industry and factories
and ... take the radical politics they learned on the campus and spread
them among factory workers." 116
112 ME'morandum from .T. Edgar Hoover to the Attorney General, 4/1/64.
113 :\Iemorandum from J. Edgar Hoover to the Attorney General. 6/Hi/6n.
114 :\Iemorandum from .T. Edgar Hoover to the Attorney Gpneral. 11/n/6f!.
115 :\Ipmorandllm from .T. Edgar Hoover to Attornf>Y General Mitchell. 11/7/69.
116 :\If'morandum from ,T. Edgar Hoover to the Attorney General. 3/16/70. The
fltrongpst evidence that this group's conduct was inimical to the national security
was reported as follows:
"The [lrroup] is dominated and controlled hy the pro-Chinese Marxist Leninist
(excisf'dL ...
"In carrying out the Marxist-Leninist id('ology of the (excised) memhers have
repeatedly sought to become involved in labor disputes on the side of labor, join
207
This approval was renewed three months later despite the fact that
the request for renewal made no mention of violent or illegal activity
by the group. The value of the wiretap was shown, according to the
FBI. by such results as obtaining "the identities of over 600 persons
eitlwr in touch with the national headquarters or associated with" it
during the preceding three months,117 Six months after the original
authorization the number of persons so identified had increased to
1,428: and approval was granted for a third three-month period." 118
The "seventeen ,viretaps" also show how the term "national security"
as a justification for wiretapping can obscure improper use of
this technique. Shortly after these wiretaps were revealed publicly,
President Nixon stated they had been justified by the need to prevent
leaks of classified information harmful to the national security.ll9
'Yiretaps for this purpose had, in fact, been authorized under the
Kennedv and .Johnson administrations. President Nixon learned of
these alld other prior taps and, at a news conference, sought to justify
the taps he had authorized by referring to past precedent. He stated
that in the:
period of 1£)61 to '63 there were wiretaps on news organizations.
on ne,,-s people, on civil rights leaders and on other
people. And I think they ,,-ere perfectly justified and I'm
sure that President Kennedy and his brother, Roberl Kennedy,
would never han authorized them, unless he thought
they were in the national intf'rcst. (Presidential News Conference,
8/22/73.)
Thus, questionable electronic surveillances by earlier administrations
,,-ere put forward as a defense for improper sunreillances exposrd
in 1~73. In fact. howe\'(>r. two of these ,viretaps ,vere placed on
domestic affairs advisers at the ,Yhite House who had no foreign
affairs rcsponsibilitips and apparently no access to cla:osified foreign
policy materials.12l A third target was a ,,,rhitr House speech writer
,,-110 had '!wen onrheard on an existing tap agreeing to provide a reporter
with background information on a Presidential speech conpicket
lines and engage in disrupti,e and sometimes violent tactics against industry
recruiters on college campuses....
"This faction is currently ,ery acti,e in many of the major demonstrations and
studpnt violence on collpgp campnses...." (Mpmorandum from ,J. Edgar Hoover
to the Attorney General, 3/16/70. The excised words have been deleted by the
FBI.)
117 "Iemorandum from .T. Edgar Hoo,er to the Attorney General, 6/16/70. Tho
only other results noted hy Hoo,er related to the fact that the wiretap had
"ohtained information concerning the activities of the national headquarters of
[the group and] plans for [the group's] support and participation in demonstra
tions supporting antiwar groups and the (excised)." It was also noted that
the wiretap "re,ealed ... contacts with Canadian student elements".
113 "Iemorandum from .T. Edgar Hoover to the Attorney General, 9/16/70. The
only other results noted hy Hom-er again related to obtaining information about
the "plans and activities" of the group. Specifically mentioned were the "plans
fol' the Xationnl Intpl'im Committee (ruling hody of [excispd]) met'ting which
took place in Np,,- York and Chicago". and the plans "for dt'monstrations at
San Fl'ancisco. Detroit, Salt Lake City, Minneapolis. and Chicago." There was no
indication that these demonstrations were expected to be violent. (The excised
\\'01'(1.' ha"p hpen delett'd hy the FBI).
110 Public statpment of Presidpnt Xixon, ))/22/73.
1.21 ~remorandl1m from .T. Edgar Hoover to the Attorney General 7/23/69;
memorandum from J. Edgar Hoover to the Attorney General 12/14/70.
208
cerning domestic revenue sharing and welfare reform.122 The
reinstatrment of another ,Yirrtap in this serirs was reqnested by H. R.
Haldeman simply because "they may ha\'e a bad apple and han:, to
lYet him out of the basket." 121 The last four requests in this series
that were sent to the AHorney Genem1 (incl ueling the requests for a
tap on the "bad apple") did not mention any national srcurity justification
at all. As former Deputy Attorney General ,Villiam Ruckelshaus
has testified:
I think some of the individuals who were tapped, at least to
the extent I have revim,ed the record. had very little, if any,
relationship to any claim of national security ... I think
that as the program proceeded and it became clear to those
who could sign off on taps how easy it was to institute a wiretap
under the present procedure that these kinds of considerations
[i.e., genuine national security justifications] were considerably
relaxed as the program went on.124
None of the "seventeen" wiretaps was ever reauthorized by the
Attorney General, although 10 of them remained in operation for
periods longer than 90 days and although President Nixon himself
stated privately that "[tJhe tapping was a very, very unproductive
thing ... it's never been useful to any operation I've conducted ..." 125
In short, warrantless electronic surveillance has been defended on the
ground that it was essential for the national security, but the history
of the use of this technique clearly shows that the imprecision and
manipulation of this and similar labels, coupled with the absence of
any outside scrutiny, has led to its improper use against American
citizens who posed no criminal or national security threat to the
country.126
Sim{larly, the terms "foreign intelligence" and "counterespionage"
were used by the CIA and the FBI to justify their cooperation in the
CIA's New York mail opening project, but this project was also used to
target entirely innocent American citizens.
As noted above. the CIA compiled a ",Vatch List" of names of pereons
and organizations whose mail ,vas to be opened if it passed through
the New York facility. In the early days of the project. the names
on this list-which then numbered fewer than twenty-':'-'might reason-
122l\ft'morandum from W. C. Sullivan to C. D. DeLoach. 8/1/69.
123 Memorandum from J. Edgar Hoover to Messrs. Tolson, Sullivan and D. C.
Brpnnan, 10/15/70.
1Jl4 Ruckel~haus te~timony before the Senate Subcommittee on Administrative
Prnctice and Procedure. 5/9/74, pp. 311-12.
1$ Transcript of the Presidential Tapes, 2/21'/73 (House .Tudicinry Committee
Stntement of Information Book YIl, Part W, p. 17M.)
1>6 The term "national security" ,,'as also used by John Ehrlichman and Charles
Colson to justify their roles in the break-in of Dr. Fil'lding's office in 1971. A
March 21, 1973 tapp recording of a meeting bl'tween Prpsidpnt Nixon..Tohn Dpan.
and H. R. Haldeman su,gogests. however, that the national security "justification"
may have hepn developed long aftpr the evpnt for the purpose of ohscuring its impropril'ty.
Whl'n the Prpsident asked what could be done if the hreak-in was
reveall'd publicly, .Tohn Dean suggl'sted. "You might put it on a national security
grounds basis." Latl'r in the conversation. Prl'sirlent Nixon statpd ""rUh the
homhing- thing- coming- out and e'l'l'rything- coming out. thl' whole thing waR
nation:)l st'curity," and Dean said, "I think we could get hy on that." (Transcript
of Presidential tapes, 3/21/73.)
209
ably have been expected to lead to genuine foreign intelligence or
counterintelligence information. But as the project developed, the
'Vatch List grew and its focus changed. By the late 1060s there were
approximately 600 names on the list. many of them American citizens
and organizations who ,yere engaged in purely lawful and constitutionally
protected forms of protest against governmental policies.
Among the domestic organizations on the 'Vatch List, which was
supplemrnte(] by submissions from tJw FBI. were: Clergy and Laymen
Concernrd about Vietnam. tl1(' Xational "Mobilization Committee to
End thr 'Varin Vietnam. Ramparts, thr Studpnt Xon-Violent Coonlinating
Committer. tlw Center for thp Stndy of Pnblic Policy, and the
American Friends Service Committee.127
The FBI lpvied more general requirements on the CIA's project as
well. The focus of the original categorips of correspondence in which
the FBI expressed an interest was clearly foreign counterespionage,
but subsequent requirements became progressively more domestic in
their foens and progressively broader in thrir scope. The reqnirementE
t.hat were lcyird bv the FBI in 1972. one veal' before the termination of
the project. inclmled the following: .
" ... [plersons on the 'Vatch List: known communists, New
Left activists, extremists. and other subversives ...
Communist part)' and front organizations ... extremist and
New Left organizations.
Protest and peace organizations. such as People's Coalition
for Peace and ,rustice. Xational Peace Action Committee. and
vVomen's Strike for Peace.
Communists. Trotskvites and meml1Crs of other :MarxistLeninist,
snbversive arid extremist groups, such as the Black
Nationalists and Liberation gronps ... Students for a Democratic
Society ... and oth0r Xew Left groups.
Traffic to and from Pnerto Rico and the Virgin Islands
showing anti-U.S. or subversive sympathies." 128
This final sd of requiremrnts eyidrntly reflected the domestic turmoil
of the late 1960s and rarly 1£)70s. Themail op0ning program that began
as a means of collecting foreign intelligence information and discovering
Soyiet intelligence efforts in the rnited States had expanded
to encompass detection of the aetiyities of domestic dissidents of all
types.
In the absence of effectiYe ontside control. highly intrnsive techniques
haYe been used to gather vast amounts of information about the
entirely lawful actiyities-and priyately held beliefs-of large numbers
of American citizens. The nr)' intrnsi,'elwss of these techniqnes
demands the utmost circumspection in thcir use. But with yague or
non-rxistent standards to gnide them. and ,yith labels such as "national
security" and "foreign intelligence" to shipld them. execntiye branch
officials han> been all too willing' to nnleash these trchniques against
American citizens with littlr or no legitimate justification.
121 Staff ~ummary of Watch Li~t rpview, 9/5/75.
128 Routing slip from J. Edgar Hom-er to .Tames Angelton (attachment), 3/10/72.
68-7860- 76 - 15
 

Go to Next Page